Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Souvenir Volume-8 Issue-10 August 2019 PDF

Download as pdf or txt
Download as pdf or txt
You are on page 1of 563

International Journal of Innovative

Technology and Exploring Engineering

ISSN : 2278 - 3075


Website: www.ijitee.org
Volume-8 Issue-10, AUGUST 2019
Published by:
Blue Eyes Intelligence Engineering and Sciences Publication

xploring Eng
dE ine
an
er
y
e Technolog

ing

IjItEe
ativ

Inte
ov
EX

N
rn

O
P

OR TI ati
L

ING VA nn
INNO on
al Journal of I
www.ijitee.org
Exploring Innovation
Editor-In-Chief Chair
Dr. Shiv Kumar
Ph.D. (CSE), M.Tech. (IT, Honors), B.Tech. (IT), Senior Member of IEEE
Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence (LNCTE), Bhopal
(M.P.), India

Associated Editor-In-Chief Chair


Dr. Dinesh Varshney
Professor, School of Physics, Devi Ahilya University, Indore (M.P.), India

Associated Editor-In-Chief Members


Dr. Hai Shanker Hota
Ph.D. (CSE), MCA, MSc (Mathematics)
Professor & Head, Department of CS, Bilaspur University, Bilaspur (C.G.), India

Dr. Gamal Abd El-Nasser Ahmed Mohamed Said


Ph.D(CSE), MS(CSE), BSc(EE)
Department of Computer and Information Technology , Port Training Institute, Arab Academy for Science ,Technology and Maritime
Transport, Egypt

Dr. Mayank Singh


PDF (Purs), Ph.D(CSE), ME(Software Engineering), BE(CSE), SMACM, MIEEE, LMCSI, SMIACSIT
Department of Electrical, Electronic and Computer Engineering, School of Engineering, Howard College, University of KwaZulu-
Natal, Durban, South Africa.

Scientific Editors
Prof. (Dr.) Hamid Saremi
Vice Chancellor of Islamic Azad University of Iran, Quchan Branch, Quchan-Iran

Dr. Moinuddin Sarker


Vice President of Research & Development, Head of Science Team, Natural State Research, Inc., 37 Brown House Road (2nd Floor)
Stamford, USA.

Dr. Shanmugha Priya. Pon


Principal, Department of Commerce and Management, St. Joseph College of Management and Finance, Makambako, Tanzania, East
Africa, Tanzania

Dr. Veronica Mc Gowan


Associate Professor, Department of Computer and Business Information Systems,Delaware Valley College, Doylestown, PA, Allman,
China.

Dr. Fadiya Samson Oluwaseun


Assistant Professor, Girne American University, as a Lecturer & International Admission Officer (African Region) Girne, Northern
Cyprus, Turkey.

Dr. Robert Brian Smith


International Development Assistance Consultant, Department of AEC Consultants Pty Ltd, AEC Consultants Pty Ltd, Macquarie
Centre, North Ryde, New South Wales, Australia

Dr. Durgesh Mishra


Professor & Dean (R&D), Acropolis Institute of Technology, Indore (M.P.), India

Executive Editor Chair


Dr. Deepak Garg
Professor & Head, Department Of Computer Science And Engineering, Bennett University, Times Group, Greater Noida (UP), India

Executive Editor Members


Dr. Vahid Nourani
Professor, Faculty of Civil Engineering, University of Tabriz, Iran.

Dr. Saber Mohamed Abd-Allah


Associate Professor, Department of Biochemistry, Shanghai Institute of Biochemistry and Cell Biology, Shanghai, China.

Dr. Xiaoguang Yue


Associate Professor, Department of Computer and Information, Southwest Forestry University, Kunming (Yunnan), China.
Dr. Labib Francis Gergis Rofaiel
Associate Professor, Department of Digital Communications and Electronics, Misr Academy for Engineering and Technology,
Mansoura, Egypt.

Dr. Hugo A.F.A. Santos


ICES, Institute for Computational Engineering and Sciences, The University of Texas, Austin, USA.

Dr. Sunandan Bhunia


Associate Professor & Head, Department of Electronics & Communication Engineering, Haldia Institute of Technology, Haldia
(Bengal), India.

Dr. Awatif Mohammed Ali Elsiddieg


Assistant Professor, Department of Mathematics, Faculty of Science and Humatarian Studies, Elnielain University, Khartoum Sudan,
Saudi Arabia.

Technical Program Committee Chair


Dr. Mohd. Nazri Ismail
Associate Professor, Department of System and Networking, University of Kuala (UniKL), Kuala Lumpur, Malaysia.

Technical Program Committee Members


Dr. Haw Su Cheng
Faculty of Information Technology, Multimedia University (MMU), Jalan Multimedia (Cyberjaya), Malaysia.

Dr. Hasan. A. M Al Dabbas


Chairperson, Vice Dean Faculty of Engineering, Department of Mechanical Engineering, Philadelphia University, Amman, Jordan.

Dr. Gabil Adilov


Professor, Department of Mathematics, Akdeniz University, Konyaaltı/Antalya, Turkey.

Dr. Ch.V. Raghavendran


Professor, Department of Computer Science & Engineering, Ideal College of Arts and Sciences Kakinada (Andhra Pradesh), India.

Dr. Thanhtrung Dang


Associate Professor & Vice-Dean, Department of Vehicle and Energy Engineeering, HCMC University of Technology and Education,
Hochiminh, Vietnam.

Dr. Wilson Udo Udofia


Associate Professor, Department of Technical Education, State College of Education, Afaha Nsit, Akwa Ibom, Nigeria.

Manager Chair
Mr. Jitendra Kumar Sen
Blue Eyes Intelligence Engineering & Sciences Publication, Bhopal (M.P.), India

Editorial Chair
Dr. Sameh Ghanem Salem Zaghloul
Department of Radar, Military Technical College, Cairo Governorate, Egypt.

Editorial Members
Dr. Uma Shanker
Professor, Department of Mathematics, Muzafferpur Institute of Technology, Muzafferpur(Bihar), India

Dr. Rama Shanker


Professor & Head, Department of Statistics, Eritrea Institute of Technology, Asmara, Eritrea

Dr. Vinita Kumar


Department of Physics, Dr. D. Ram D A V Public School, Danapur, Patna(Bihar), India

Dr. Brijesh Singh


Senior Yoga Expert and Head, Department of Yoga, Samutakarsha Academy of Yoga, Music & Holistic Living, Prahladnagar,
Ahmedabad (Gujarat), India.
Volume-8 Issue-10, August 2019, ISSN: 2278-3075 (Online)
Page
S. No Published By: Blue Eyes Intelligence Engineering & Sciences Publication No.

Authors: Rajiv Kumar Yadav, Anadh Gandhi, Kumar Abhishek, Siba Sankar Mahapatra, Goutam Nandi
Machining Performance Optimization for Turning of Inconel 825: An integrated Optimization
Paper Title:
Route Combining Grey Relation Analysis with JAYA and TLBO
Abstract: With the widespread application of Inconel alloys in manufacturing industries especially in the
automobile as well as aerospace industries leads to manufacturers to pay more attention towards the
understanding of machinability aspects of these alloys. Attributable to the need for large-scale manufacturing of
Inconel machined components, the optimization of machining process variables become crucial to produce
quality products economically by means of enhancing process performance. In common, several process
parameters namely depth of cut, feed rate, and spindle speed influence the performance of turning operation in
their own way. Concurrently, in the machining of Inconel alloys, the important performance indices are Material
Removal Rate (MRR), surface roughness, and cutting force. This work deals with the assessment of process
performance of Inconel 825 alloy amid turning operation. For the optimization of multiple responses, grey
relation analysis has been employed that transforms the multiple responses into a corresponding single response
known as overall grey relation index (OGI). Based on OGI, as a function of selected process variables,
formulation of a non-linear regression model has been done and considered as the fitness function. To conclude,
two evolutionary techniques, Teaching-Learning-Based Optimization, well famous as TLBO, and JAYA
algorithm have been considered for optimization.

Keywords: Inconel 825, Optimization, JAYA, TLBO, Turning.

References:

1. Rahul, Kumar Abhishek, Saurav Datta, Bibhuti Bhusan Biswal, Siba Sankar Mahapatra, “Machining performance optimization for
electro-discharge machining of Inconel 601, 625, 718 and 825: an integrated optimization route combining satisfaction function, fuzzy
inference system and Taguchi approach”, Journal of the Brazilian Society of Mechanical Sciences and Engineering, Volume 39, Issue 9,
pp 3499-3527, (2017).
2. Thakur A, Mohanty A, Gangopaddhyay S and Maity K P, “Tool wear and chip characteristics during dry turning of Inconel 825”,
Procedia Material Science, Vol 5, pp. 2169-2177, (2014).
3. Choudhury I A and El-baradie M A, “Machinability of nickel base super alloys: a general review”, International Journal of Material
Processing Technology, Vol. 77, Issue 1 - 3, pp. 278 – 284, (1998).
4. Jindal P, Santhanam A T, Schlienkofer U and Shuster A F, “Performance of PVD TiN, TiCN and TiAlN coated cemented carbide
tools”, International Journal of Refractory Metals & Hard Materials, Vol. 17, Issue 1 - 3, pp. 163-170, (1999).
5. Arunachalam R M, Mannan M A and Spowage A C, “Surface integrity when machining age hardened Inconel 718 with coated carbide
cutting tool”, International Journal of Machine Tools & Manufacture, Vol. 44, Issue 14, pp. 1481-1491, (2004).
1. 6. Ezugwu E O and Bonney J, “Effect of high pressure coolant supply when machining nickel - base, inconel 718, alloy with coated
carbide tool”, Journal of Materials Processing Technology, Vol.153 - 154, Issue , pp 1045-1050, (2004).
7. Altin A, Nalbant M and Taskesen A, “The effect of cutting speed on tool wear and tool life when machining inconel 718 with ceramic 1-7
tools”, Materials and Design, Vol. 28, Issue 9, pp. 2518-2522, (2007).
8. Devillez A, Schneider F, Dominiak S, Dudzinski D and Larrouquere D, “Cutting forces and wear in dry machining of Inconel 718 with
coated carbide tools”, Wear, Vol. 262, Issue 7 - 8, pp. 931-942, (2007).
9. Zhang S, Li J F and Wang Y W, “Tool life and cutting forces in end milling Inconel 718 under dry and minimum quantity cooling
lubrication cutting conditions”, Journal of Cleaner Production, Vol. 32, issue , pp. 81-87, (2012).
10. Maiyar L. M, Ramanujam R, Venkatesan K and Jerald J., “Optimization of machining parameters for end milling of inconel 718 super
alloy using Taguchi based Grey relation Analysis”, Procedia Engineering, Vol. 64, pp. 1276-1282, (2013).
11. Ozel T, Llanos I, Soriano J and Arrazalo P J, “3-D finite element modeling of chip formation process for machining INCONEL 718 :
Comparison of FE software prediction”, Machining Science and Technology, Vol. 15, Issue 1, pp. 21-46, (2013).
12. Vajeeha S., Mohammad Farhood K, Vishnu Vardhan T and Harinath Gowd G, “Evaluation of Optimal Cutting Parameters in CNC
Milling Of NIMONIC 75 Using RSM”, International Journal of Innovative Research in Science, Engineering and Technology, Vol. 4,
Issue 8, pp 7190-7196, (2015).
13. Patil J and Sadaiah M, “ Optimizationof cutting parametersin turning of Nimonic 80Aby using Taguchi method”, International Journal
on Recent and Innovation Trends in Computing and Communication, Vol. 4, Issue 4, pp 1-4, (2016).
14. Munde V and Pansare V, “Flank wear measurement of Inconel 825 using CVD and PVD carbide tools”, International Journal Research
of engineering and Technology, Vol. 4, Issue 8, pp. 1353-1359, (2017).
15. Altin A, “A comparative study on optimization of machining parameters by turning aerospace materials according to Taguchi method”,
Int. J. Simul. Multisci. Des. Optim, Vol. 8, A1, (2017). DOI: 10.1051/smdo/2016015.
16. Yunlu L, Colak O., Kurbanoglu C., “Taguchi DOE analysis of surface integrity for high pressure jet assisted machining of Inconel 718”,
Procedia CIRP, Vol. 13, pp. 333-338, (2014).
17. Pandey A., Goyal A. and Meghvanshi R., “Experimental investigation and optimization of machining parameters of aerospace material
using Taguchi’s DOE approach”, Materials Today: Proceedings, Vol. 4, Issue 8, pp. 7246-7251, (2017).
18. Gopal P. M., Prakash S. K., “Minimization of cutting force, temperature and surface roughness through GRA, TOPSIS and Taguchi
techniques in end milling of Mg hybrid MMC”, Measurement, Vol. 116, pp.178-192, (2018).
19. Kant G, Sangwan KS, “Prediction and optimization of machining parameters for minimizing power consumption and surface roughness
in machining”, Journal of Cleaner Production, (2014).
20. Rathod G. R., Sapkal S. U., Chanmanwar R. M., “Multi-Objective Optimization of Photochemical Machining by Using GRA”,
Materials Today: Proceedings, Vol. 4, Issue 10, pp. 10830-10835, (2017).
21. Singh A., Dutta S., Mahapatra S. S., Singha T. and Majumdar G., “Optimization of bead geometry of submerged arc weld using fuzzy
based desirability function approach”, Journal of Intelligent Manufacturing, Vol. 24, Issue 1, pp. 35-44, (2013).
22. Kumar Yogendra., Singh Hari, “Multi-response Optimization in Dry Turning Process Using Taguchi's Approach and Utility Concept”,
Procedia Materials Science, Vol. 5, pp. 2141-2151,(2014).
23. Parthiban K., Duraiselvam M.,Manivannan R., “TOPSIS based parametric optimization of laser micro-drilling of TBC coated nickel
based superalloy”, Optics and Laser Technology, Vol. 102, Issue, pp. 32-39, (2018).
24. Majumder H., Maity K., “Prediction and optimization of surface roughness and microhardness using grnn and MOORA-fuzzy-a MCDM
approach for nitinol in WEDM”, Measurement, Vol 118, pp. 1-13, (2018).
25. Jiang Z, Zhou F, Zhang H, Wang Y, Sutherland J W, “Optimization of Machining Parameters Considering Minimum Cutting Fluid
Consumption”, Jou. of Cleaner Production, (2015).
26. Rao S. M and Venkaiah N, “Parametric optimization in machining of Nimonic - 263 alloy using RSM and particle swarm optimization”,
Procedia Materials Science, Vol. 10, pp. 70-79, (2015).
27. Vijayakumar K., Prabhaharan G., Asokan P., Saravanan R., “Optimization of multi-pass turning operations using ant colony system”,
Inter. Jou. of Machine Tools and Manufacture, Vol. 43, Issue 15, pp. 1633-1639, (2003).
28. Rao R. Venkata, Kalayankar V.D., “Multi-pass turning process parameter optimization using teaching–learning-based optimization
algorithm”, Scientia Iranica, Vol. 20, Issue 03, pp. 967-974, (2013).
29. Pawar P.J., Rao R. Venkata,“Parameter optimization of machining processes using teaching–learning-based optimization algorithm”,
The Inte. Jou. of Advanced Manufacturing Tech., Vol. 67, Issue 5-8, pp. 995-1006, (2013).
30. Rao R. Venkata, “Jaya: A simple and new optimization algorithm for solving constrained and unconstrained optimization problems”,
International Journal of Industrial Engineering Computations, Vol. 7, pp. 19-34, (2016).
31. Rao R. Venkata, Waghmare G.G., “A new optimization algorithm for solving complex constrained design optimization problems”,
International Journal of Industrial Engineering Computations, Vol. 49, Issue 01, pp. 19-34, (2017).
32. Rao R. V. and Rai D. P., “Optimization of selected casting processes using Jaya algorithm”, Materials Today: Proceedings, Vol. 4, Issue
10, pp. 11056-11067, (2017).
33. Mohanty CP, Mahapatra SS, Singh MR, “An experimental investigation of machinability of Inconel 718 in electrical discharge
machining”, Procedia Material Science, Vol. 6, pp. 605-611, (2014).

Authors: S. V. Devika Shaik Khamuruddeen N.Manjula

Paper Title: Hybrid Beam Steerable Phased Array Antenna for Satcom OTM with 16 GHZ Feed Signal
Abstract: Now a day there is a great demand for communication On the Move (OTM). OTM antenna is
system which is mounted on a vehicle such as boat, train, car, flight, and this system is used to track the satellite
link and maintain the link between the terminal and satellite even when the vehicle is moving. The antenna
always steer to track the satellite link while motion. Phased array antenna with hybrid beam steering method is
proposed in this paper to achieve effective communication. The beam Formed in phased array of 100 isotropic
elements has a wide beam width. But, to fetch satellite communication applications, the beam width a narrow
beam width is required. Hence a parabolic reflector is chosen to sharpen the beam. But, for the ease of
simulation, in place of the array of antennas, a horn antenna design to operate at the same operating frequency,
16 GHz is given as a feed to the reflector antenna and the simulation is done using HFSS.

Keywords: Phased array antenna, beam steering, parabolic reflector, HFSS.


2.
References:
8-12
1. Robert C. Hansen, “Phased Array Antennas”, John Wiley & Sons, Inc.
2. Luo, Qi, et al. "Antenna array elements for Ka-band satellite communication on the move." Antennas and Propagation Conference
(LAPC), 2013 Loughborough. IEEE, 2013.
3. Jung, Young-Bae, Alexander V. Shishlov, and Seong-Ook Park. "Cassegrain antenna with hybrid beam steering scheme for mobile
satellite communications." IEEE Transactions on Antennas and Propagation 57.5 (2009): 1367-1372.
4. Goopta, Rubell Sen, et al. "Design of a circular polarization array antenna using triple feed structure." Strategic Technology (IFOST),
2014 9th International Forum on. IEEE, 2014.
5. Kaur, Amandeep. "Electronically Steerable planer Phased Array Antenna."International Journal of Engineering Trends and
Technologie 3.6 (2012): 708-709.
6. Gatti, Roberto Vincenti, et al. "Flat array antenna for Ku-band mobile satellite terminals." Proceedings of the 5th European Conference
on Antennas and Propagation (EUCAP). IEEE, 2011.
7. Tripodi, M., et al. "Ka band active phased array antenna system for satellite communication on the move terminal." Proceedings of the
5th European Conference on Antennas and Propagation (EUCAP). 2011.
8. Khamuruddeen, SV Devika, et al. “Implementation of Low Cost RF Based Attendance Management System Using PSOC 5 and GSM
Module “.

Authors: Partha Protim Borthakur, Dip Jyoti Bhuyan

Paper Title: Effectiveness of Information and Communication Technology in Promoting E-Governance in India
Abstract: E-governance means the utilization of internet and World Wide Web (WWW) for transfer of
information and delivery of services from government to citizens. With the growing progress in Information and
Communication Technology (ICT) and rise of innovative and creative instruments has also contributed towards
the expansion and growth of government activities in the various countries around the world. For the economic
and social empowerment of the citizens particularly of the developing countries, the Information and
Communication Technology is recognized as an apparatus of development and mechanism of empowerment.
Use of Information and Communication Technology in E-governance has created new prospects of innovation
and expansion in the activities of the government and delivering services to the citizens. To improve the quality
3. of life and to get faster economic development, the electronic governance takes for granted better importance in
the platform of contemporary governmental organizations. In the project of electronic-governance, the various
methods and technologies are being used to provide a structure for successful execution of government services 13-18
up to grassroots level. The growth and development of various nations are mainly based on the utilization of
Electronic-Governance with their penetration in contemporary periods. This E-governance has minimized the
corruption and saving the time along with increasing the level of transparency in the governmental process and
operation. However, the various projects such as e-seva, e-kranthi, smart government and digital India have been
launched by the Government of India to execute and support the initiatives of E-governance. This research paper
is an effort to examine the initiatives of E-governance which is directly related to citizens. The present work is
an attempt to examine whether the latest information and communication technologies can create an important
impact to the success of Electronic-governance.
Keywords: E – Governance, ICT, Indian Political System, welfare, smart government.

References:

1. B.K.Suresh, P. P. (2016). E- Governance: Issues and challenges in India. OIDA International Journal of Sustainable Development , 11-
16.
2. Kaur, P. M. (2013). E- Governance a Challenge for India. International Journal of Advanced Research in Computer Engineering and
Technology , 1196-1199.
3. N.S.Kalsi, R. K. (2009). Effective E- Governance for Good Governance in India. International Review of Business Research , 212-229.
4. Nagaraja, K. (2016). E- Governance in India: Issues and Challenges. IOSR Journal of Economics and Finance , 50-54.
5. Poonam Mallik, P. D. (2014). Challenges and Future Prospects for E- Governance in India. Internal Journal of Science, Engineering and
Technology Research , 1964-1972.
6. Singh, A. (2014). An Impact study on E-Governance in India (Applications and Issues). Asian Journal of Technology and Management
Research , 6-12.
7. Singh, S. S. (2018). Impact of E- Governance in India: Oppurtunities and Chalenges. International Journal of Innovative Engineering
and Management Research .
8. Tiwary, K. Y. (2014). E- Governance in India: Opportunities and Challenges. Advance in Electronic and Electric Engineering.
Authors: Visvesvaran. C, Vinesha. P, Rajarajeshwari. S, Sowmiya. K, Athithya Janani. A

Paper Title: IOP Measurement using Contact Tonometer by MEMS Technology


Abstract: One of the most critical bans of mankind is being blind. Yes, how sorrowing it is when you are not
able to see this colorful world if you are blind. While we have heard of Cataracts and other macular
degeneration, among them one such eye disease is Glaucoma that records affection over 3 million people in the
United States. It is also known as “Silent thief” as it shows no symptoms but damages the optic nerve. It is
caused mainly due to the pressure that is developed inside the eye known as Intra-Ocular Pressure. There are
various tonometric methods at present to diagnose Glaucoma but the techniques are more dangerous to the eye.
MEMS technology is one of the most upgrading and developing strategies that has created wonders in medical
field. In this paper, we have proposed the concept of contact tonometer that makes use of a MEMS device which
acts as a transducer/sensor thereby contacting with the cornea of the affected eye. The received electrical signal
4. from the transducer is then processed and sent to the display indicating IOP. The basic concept and idea of
MEMS enabled contact tonometer is found to be the most convenient mode of detection. 19-22
Keywords: MEMS technology, IOP, Intra-Ocular Pressure, Glaucoma, Contact tonometers, tonometer, sensor,
transducer.

References:

1. Bruce, John, and Michael Crocetta. "Contact tonometer using MEMS technology." U.S. Patent Application No. 10/778,006.
2. Jeffries, Robert, and Lee Birchansky. "Ocular pressure measuring device." U.S. Patent Application 10/216,418, filed April 24, 2003.
3. Telandro, Alain. "System for Measuring Intraocular Pressure." U.S. Patent Application 13/266,238, filed August 2, 2012.
4. Singh, Parul. "Tonometry: an overview." IOSR Journal of Dental and Medical Sciences 13.1 (2014): 67-70.
5. Rich, Collin A., Yafan Zhang, Nader Najafi, Matthew Z. Straayer, and Sonbol Massoud-Ansari. "Wireless MEMS capacitive sensor for
physiologic parameter measurement." U.S. Patent 6,926,670, issued August 9, 2005.

Authors: Jaswinder Singh, Tarun Kumar Lohani

Paper Title: Use of Municipal and Industrial Wastewater in and around Nangal for Construction purposes
Abstract: Water is one of the vital needs of all living beings for daily activities like drinking, washing, bathing
etc. It is the most important factor in shaping the land and regulating the climate. The quality of water for
drinking and other activities if does not satisfy the standard conditions of physical, chemical and biological
characteristics as prescribed it then becomes ineffective. The quality of water is usually described according to
its. Hence it becomes necessary to find the suitability of water for various purposes like drinking, irrigation and
Industrial purposes. Rapid industrialization and use of chemical fertilizers and pesticides in agricultural lands,
discharge of voluminous municipal and industrial waste waters are causing deterioration of water quality vis-à-
vis depleting of aquatic biota. This ultimately causes massive pollution not only to the rivers, ponds and wells
but also drastically degrade the quality of groundwater. Research have been undertaken to use such type of waste
water in different construction purposes. It is absolutely true that demand of fresh water by the construction
5. sector is expected to increase due to high increase in the growth of construction activities in India (Dhanraj,
2017). Highly polluted Sutlej river in Punjab has been a constant encouragement to the environmentalists about
23-26
reusing the contaminated water of the river. A total of 14 water samples from different point sources of pollution
were collected and tested for physico-chemical parameters (pH, temperature, DO, BOD, COD, TSS, TDS),
metals (As, Cd, Co, Cr, Cu, Fe, Mn, Ni, Pb and Zn) and microbiological parameter using World Health
Organization (WHO) and the Bureau of Indian Standards (BIS) standards to justify how the strength of concrete
goes on varying with respect to using the river water directly. An attempt was made to justify the use of
wastewater directly in preparing concrete for construction purposes by testing concrete cubes prepared by the
untreated water and comparing them with the strength of standard cubes.

Keywords: BOD, COD, Waste water, Compression Test.

References:
1. Asif Rashid Shaikh and V. M. Inamdar, Study of Utilization of Waste Water in Concrete, IOSR Journal of Mechanical and Civil
Engineering, Volume 13 (4), Ver. II, PP 105-108, 2016.
2. Ayoup M. Ghrair and Othman Al-Mashaqbeh, “Domestic Wastewater Reuse in Concrete Using Bench-Scale Testing and Full-Scale
Implementation”, Water, Vol.8, pp. 2-13
3. Environmental Protection Agency (EPA), “Guidelines for water reuse technical issues in planning water reuse systems.” Washington,
DC: U.S Agency for International Development, EPA/625/R-04/108, chapter 3.
4. Hummaira Kanwal, Sabahat Arif, Muhammad Afzal Javed, Amir Farooq and Muhammad Arif Khan, “Effect on Compressive Strength
of Concrete Using Treated Waste Water for Mixing and Curing of Concrete”, Mehran University Research Journal of Engineering &
Technology, Vol. 37 (2), pp. 445-452
5. K. S. Al-Jabri, A. H. Al-Saidy, R. Taha And A. J. Al-Kemyani, “Effect of using Wastewater on the Properties of High Strength
Concrete”, Science Direct, Vol. 14, pp. 370–376, 2016.
6. Manjunatha.M, 2017, “An Experimental Study on Reuse of Treated Waste Water in Concrete–A Sustainable Approach”, International
Journal of Latest Engineering Research and Applications, Vol.2 (7), PP. 124-132
7. Marcia Silva and Tarun R. Naik, “Sustainable Use of Resources–Recycling of Sewage Treatment Plant Water in Concrete”, The
University of Wisconsin Milwaukee Centre for By-products Utilization, Second International Conference on Sustainable Construction
Materials and Technologies, June 28 - June 30, 2010, Università Politecnica delle Marche, Ancona, Italy
8. Okun, D., “The role of reclamation and reuse in addressing community water needs in Israel and the West Bank.” In Proceedings of the
First Israeli-Palestinian International Academic Conference on Water, Water and Peace in the Middle East, J. Isaac and H. Shuval, eds.,
Zurich, Switzerland, December 10-13, 1992. New York: Elsevier, 329-338, 1992.
9. Shehdeh Mohammad Ghannam, “Use of Waste Water Sludge in Concrete Mixes with Treated Water”, International Journal of
Innovative Research in Science, Engineering and Technology, Vol. 5, Issue 4, pp.4601-4613, 2016.
10. Shrilatha, Rohtih M, Puneeth H C and Naveen K Khatavkar, “Effect of primary treated waste water in concrete mix”, International
Journal of Current Engineering and Scientific Research, Vol. 4 (8), pp. 9-13, 2017.
11. Shrutakirti A. Mahajan and M. Husain, “Utilization of Waste Sludge in Brick Making”, International Conference on Global Trends in
Engineering, Technology and Management, pp. 274-278, 2017.

Authors: Ningombam Hemarjit Singh, O.P Roy

Paper Title: Reconfigurable Multiple Sensing node for the Automation of Agricultural Field
Abstract: In a real time system, monitoring and control of various parameters of the field is vital .In order to
achieve high yields and quality , exact parameters of soils and its necessary inputs to soil need to be put in
action. Pest and diseases are also important factors in decline of yield and quality. Considering the various
applications of this area, the present paper explains the wireless multi-sensing node for remote monitoring and
control system for agricultural applications. This is design with a number of good performance front-end devices
and circuits suitable for various types of sensors. Any Sensor device elements can be directly connected without
the need of extra circuits. The number of input sensors can be reconfigured with time to time as system demand.
The paper describes development and the interface of high performance and low-cost typical features elements.
The developed system displayed all the measures field parameters and corresponding set point values on the
LCD interface and also are stored in external interface memory for future reference. The developed node can be
connected to a personal computing system for decision support using wired RS-232 interface or wireless
connectivity using the RF modem from Xbee.
6.
Keywords: Multiple sensors, Automation, Xbee Wireless module, Real time remote monitoring. 27-31

References:

1. Mancharkar, A. V. & Shaligram, A. D. (2000). Microcontroller Based Intelligent Universal Sensor Interface Development. Proceedings
of 7th NSPTS (14-16 Feb, 2000), University of Pune, (pp. 47.1-47.6).
2. Anand, C., Sadistap, S., Bindal, S. & Rao, K. S. N. (2009). Multi-Sensor Embedded System for Agro-Industrial Applications. 3rd
International Conference on Sensor Technologies and Applications, (pp. 94-99).
3. Sadistap .S,Jain, Y.K Narayan.L and Devi, Smart Sensor Developmeny for CO sensor, (2002). Proceeding of National Conference on
Instrumentation –NSI-32,Erode, Tamil Naidu
4. IEEE Standard for a Smart Transducer Interface for Sensors and Actuators.(2004).IEEE 1451.3 edition. www.smartsensors.com
5. Ramamurthy, H., Prabhu, B. S. & Gadh, R. (2007).Wireless industrial monitoring and control using a smart sensor platform. IEEE
Sensors Journal, May,7(5), 611-618.
6. Wang, N., Zhang, N. & Wang, M. (2006). Wireless sensors in agriculture and food industry: Recent development and future
perspective. Journal of Computers and Electronics in Agriculture, January, 50 (1),1-14
7. Krishana, S., Sadistap, S. S., Prasad, B. & Kapur,(2003). Microcontroller based relative humidity meter. Journal of Instrument Society
of India, 35(4), 350-356.

Authors: Bhargavi Goparaju, Bandla Srinivasrao


Improved DDoS Attacks detection using Hybrid Statistical Model and sparse representation for
Paper Title:
Cloud Computing
Abstract: While hosting various cloud based information technology facilities by handling various assets on
the internet, Cloud service accessibility has remained one of the chief concerns of cloud service providers (CSP).
Several security concerns associated to cloud computing service simulations, and cloud’s major qualities
contribute towards its susceptibility of security threats related with cloud service availability, the liability of
internet, and the dispense behavior of cloud computing. Distributed Denial of Service (DDoS) attacks is one of
the main advanced threats that occur to be extremely problematic and stimulating to stand owing towards its
dispersed behavior and resulted in cloud service interruption. Although there exist amount of interruption
recognition resolutions anticipated by various investigation groups, there exists not at all such a faultless result
that avoids the DDoS attack and cloud service providers (CSP) are presently consuming various detection
resolutions by assuring that their product stays well protected. The features of DDoS attack consuming various
forms with dissimilar scenarios make it problematic to identify. Inspecting and analyzing various surviving
DDoS detecting methods contrary to several factors is accomplished by this paper. To enhance the system
performance further, sparse based data optimization is proposed to remove the redundant data. This
enhancement reduced the execution time of the system by0.2%.

Keywords: Cloud Security, Cloud Service Availability, Co-Variance Matrix, DDoS attacks, Entropy.

References:
7.
1. An NTT Communications, “Successfully combating DDoS Attacks”, White Paper, August 2012 32-37
2. Amit Khajuria1, Roshan Srivastava, “Analysis of the DDoS Defense Strategies in Cloud Computing”, international journal of
enhanced research in management & computer applications vol. 2, issue 2, February 2013
3. Radware Ltd, “The Ultimate Guide to Everything You Need To Know About DDoS Attacks”, 2013
4. David Dittrich. “The “Stacheldraht” Distributed Denial of Service Attack Tool”. University of Washington, December 31, 1999,
http://staff.washington.edu/dittrich/misc/stacheldraht.analy sis.txt (8 April 2003).
5. Sven Dietrich, Neil Long, and David Dittrich, “Analyzing Distributed Denial of Service Tools: The Shaft Case”, USENIX Association,
Proceedings of the 14th Systems Administration Conference (LISA 2000), New Orleans, Louisiana, 2000
6. A.M. Lonea, D.E. Popescu, H. Tianfield, “Detecting DDoS Attacks in Cloud Computing Environment”, International Journal of
Computing and communication, ISSN 1841-9836 8(1):70-78, February, 2013.
7. CERT Coordination Center, Carnegie Mellon Software Engineering Institute, “CERT® Incident Note IN-2001- 13”, November 27,
2001. http://www.cert.org/advisories/CA-2001-20.html. (14 March 2003).
8. “CERT® Advisory CA-2001-20 Continuing Threats to Home Users”, CERT Coordination Center, Carnegie Mellon Software
Engineering Institute. July 23, 2001. http://www.cert.org/advisories/CA-2001-20.html. (14 March 2003).
9. F-Secure.F-SecureVirusDescriptions: Agobot. http://www.f secure.com/v-descs/ agobot.shtmlS, 2003.
10. Dittrich D. “The ‘‘mstream’’ distributed denial of service attack tool”, University of Washington,
http://staff.washington.edu/dittrich/misc/mstream.analysis .txtS, 2000.
11. Dittrich D. “The DoS Project’s ‘‘trinoo’’ distributed denial of service attack tool”, University of Washington,
http://staff.washington.edu/dittrich/misc/trinoo.ana lysis, 1999
12. Jiankun Hu, Xinghuo Yu, D. Qiu, Hsiao-Hwa Chen, “A Simple and Efficient Hidden Markov Model Scheme for Host-based Anomaly
Intrusion Detection”, IEEE network, February 2009
13. A.S. Syed Navaz, V. Sangeetha, C. Prabhadevi, “Entropy Based Anomaly Detection System to Prevent DDoS Attacks in Cloud”,
International journal of computer applications (0975-8887), January 2013
14. Daniel S. Yeung, Xizhao Wang, “Covariance-Matrix Modeling and detecting Various Flooding Attacks”, IEEE Transactions on
Systems, MAN, Cybernetics- Part A: Systems and Humans, Vol. 37. No. 2, March 2007
15. Mohd Nazir Ismail, AbdulazizAborujilah, Shahrulniza Musa, AamirShahzad, “Detecting Flooding based DoS attack in cloud
computing environment using covariance matrix approach”, ICUIMC (IMCOM), 2013
16. Shui Yu and Wanlei Zhou, “Entropy-Based Collaborative detection of DDoS attacks on community networks”, Sixth annual IEEE
international conference on pervasive computing and communications, 2008.
17. J.J. Sha and L.G.Malik, “Impact of DDoS Attacks on Cloud Environment”, International Journal of Research in Computer and
Communication Journal Vol2, issue 7, July 2013.
18. ShuyanJin and Daniel S. Yeung, “A Covariance Analysis Model for DDoS Attack Detection”, IEEE communications society, 2004.
19. AlirezaShameliSendi, Michael Dagenais, MasoumeJabbarifar, “Real time Intrusion prediction based on optimized alerts with hidden
markov model”, Journal of networks, Vol 7, no.2, February 2012
20. Sanjay B Ankali and D.V Ashoka, “Detection Architecture of Application Layer DDoS Attack for Internet”, Advanced Networking
and Applications, volume 03, issue 01, Pages 984-990, 2011.
21. Er. SakshiKakkar, Er. Dinesh Kumar, “A survey on distributed denial of services (DDoS)”, International journal of computer science
and information technologies Vol. 5(3), 2014.
22. AnimeshPatcha, Jung-Min Park, “An Overview of Anomaly Detection Techniques: Existing Solutions and Latest Technological
Trends”, Science Direct, Computer Networks 51, 2007
23. Monowar H. Bhuyan, H.J. Kashyap, D.K. Bhattacharyya, J. K. Kalita, “Detecting Distributed Denial of Service Attacks: Methods,
Tools and Future Directions”, http://www.garykessler.net/library/ddos.html, December 2012.
24. S. Renuka Devi and P. Yogesh “Detection Of Application Layer DDoS Attacks Using Information Theory Based Metrics”, CS & IT-
CSCP pp. 217–223, 2012
25. B.B. Gupta, ManojMisra, and R.C. Joshi, “An ISP Level Solution to Combat DDoS Attacks Using Combined Statistical Based
Approach”, Journal of Assurance and Security, Volume 2, Pages 102-110, June 2008.
26. Upma Goyal, Gayatri Bhatti, and Sandeep Mehmt, “A Dual Mechanism for Defeating DDoS Attacks in Cloud Computing Model”,
Vol. 2, Issue 3, March 2013.
27. Biswajit Panda, Bharat Bhargava, SouravPati, Dayton Paul, Leszek T. Lilien, and Priyanka Meharia, “Monitoring and Managing Cloud
Computing Security Using Denial of Service Bandwidth Allowance”, 2012.
28. A.B. Kulkarni, S.F.Bush, and S.C. Evans, “Detecting Distributed Denial-of-Service Attacks Using Kolmogorov Complexity Metrics”,
GE Research & Development Center, February 2002
29. SamanTaghaviZargar, David Tipper, “A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding
Attacks”, IEEE communications surveys and tutorials, February 2013.
Authors: A. Femina Jalin, J. Jaya Kumari

Paper Title: A Novel Text to Speech Technique for Tamil Language using Hidden Markov Models (HMM)
Abstract: Application of digital signal processing in speech processing plays a major part in our everyday life.
Text to speech system lets people to see and read out loud consecutively. Text-to-speech synthesizers use
synthesis techniques that require good quality speech. Text to speech conversion (TTS) can apply to many
applications such as automation, audio recording and audio-based assistance system. Text to speech conversion
can be applied for various multinational language as well as for a number of local languages. An efficient text to
speech conversion for Tamil language with extreme accuracy is proposed in this work. Multi feature, with a
8.
Hidden Markov Model (HMM) predictor is used to convert text to speech efficiently. By using the proposed
method, the precision of the framework is enhanced by a factor of 6% when contrasted with the traditional 38-47
system.

Keywords: Digital Signal Processing (DSP), Hidden Markov Model (HMM), Mean square error (MSE), Tamil
Unicode, Text to speech conversion, (TTS).

References:
1. Cheng-yu Yeh, Kuan-lin Chen, Shaw-hwa Hwang, Long-jhe Yan, "Study on the consistency analysis between the prosody and the
spectrum for Mandarin speech", Signal Processing IET, vol. 7, no. 2, pp. 158-165, 2013.
2. Jalin, A. Femina, and J. Jayakumari. "Text to speech synthesis system for tamil using HMM." In Circuits and Systems (ICCS), 2017
IEEE International Conference on, pp. 447-451. IEEE, 2017.
3. Arun Soman, S. Sachin Kumar, V. K. Hemanth, M. Sabarimalai Manikandan, and K. P. Soman, “Corpus driven Malayalam text to
speech synthesis for interactive voice response system” International journal of computer application, vol-29, no.4, September 2011.
4. Dartmouth College: Music and Computers Archived 2011-06-08 at the Wayback Machine., 1993.
5. Boothalingam, R., Solomi, V. S., Gladston, A. R., Christina, S. L., Vijayalakshmi, P., Thangavelu, N., & Murthy, H. A. (2013,
February). Development and evaluation of unit selection and HMM-based speech synthesis systems for Tamil. In Communications
(NCC), National Conference on (pp. 1-5). IEEE, 2013
6. Priyanka Jose , Govindaru V “ Malayalam Text-to-Speech” IJETR ISSN: 2321-0869, Volume-1, Issue-3, May 2013.
7. Rajeswari, K. C., & UmaMaheswari, P. (2014, December). A novel intonation model to improve the quality of tamil text-to-speech
synthesis system. In Advanced Computing (ICoAC), Sixth International Conference on (pp. 335-340). IEEE, 2014
8. Patil, H. A., Patel, T. B., Shah, N. J., Sailor, H. B., Krishnan, R., Kasthuri, G. R., ... & Kishore, S. P. (2013, November). A syllable-
based framework for unit selection synthesis in 13 Indian languages. In Oriental COCOSDA held jointly with 2013 Conference on
Asian Spoken Language Research and Evaluation (O-COCOSDA/CASLRE), International Conference (pp. 1-8). IEEE, 2013
9. Wan, V., Latorre, J., Yanagisawa, K., Braunschweiler, N., Chen, L., Gales, M. J., & Akamine, M. Building HMM-TTS voices on
diverse data. IEEE Journal of Selected Topics in Signal Processing, 8(2), 296- 306, 2014.
10. Chiang, C. Y, Cross-Dialect Adaptation Framework for Constructing Prosodic Models for Chinese Dialect Text-to-Speech Systems.
IEEE/ACM Transactions on Audio, Speech, and Language Processing, 26(1), 108-121, 2018
11. Liao, I. B., Chiang, C. Y., Wang, Y. R., & Chen, S. H. Speaker adaptation of SR-HPM for speaking rate-controlled Mandarin TTS.
IEEE/ACM Transactions on Audio, Speech, and Language Processing, 24(11), 2046-2058, 2016
12. Gopinath, Deepa P., et al. "A hybrid duration model using CART and HMM." TENCON 2008-2008 IEEE Region 10 Conference. IEEE,
2008.

Authors: Amandeep Singh, Ashu Jain, Babita Singla


Technological Advancement-Based Paradigm Shift: A Focus Shift from Large Screen to Small
Paper Title:
Screen
Abstract: Technology has always been behind the paradigm shifts in the business. The businesses have seen
their growth by marketing their product through TV, which was considered to be salesman at home that is going
to provide all the information. With the advancement in the telecommunication system that has seen a major
shift. With the launch of mobile phone things became very easier for business communication. Later with
android and iOS introduction everything took by storm. Now most of the viewing is on mobile rather than TV.
This research paper highlights the importance of use of mobile based technology to cater the better needs of the
consumers. This paper highlights the various upcoming model to cater the market based on the upcoming
technologies. This paper shows how the technology is helping the companies in attracting the customers.

Keywords: Mobile marketing; TV marketing; Technological Shift; ANN; MDS;

References:

1. Baghla, A., & Garai, A. (2016). Service quality in the retail banking sector-A study of selected public and new Indian private sector
banks in India. IJAR, 2(6), 598-603.
2. Boyd, Westfall & Stasch (2005),” Marketing Research”, AITBS
3. Charlie Nelson (August 2002) “Market Segmentation: The role of future research”, Foresee change, Australia
9. 4. Kotler Philip(2000), “Marketing Management- Millennium edition”, Prentice Hall of India Private Limited
5. Leo Lingham (2008), “Market segmentation for FMCG products, Management consulting services”, viewed on 25 December 2010
http://en.allexperts.com/q/Management-Consulting-2802/2008/11/Marketing-Management-1.htm 48-53
6. Lieberman, Michael (2003) "A beautiful segmentation", Quirk's Marketing Research Review
7. Luck & Rubin,(2007) “Marketing Research”, Prentice Hall India
8. McKenna, R.(1988), "Marketing in the age of diversity", Harvard Business Review
9. Michael Richarme (2007),”Business Segmentation: Emerging Approaches to More Meaningful Clusters”, Decision Analyst Inc.
10. Segmentation in the maturing marketplace (2005), Hot Marketing, Issue No. 7, The Chartered Institute of Marketing.
11. Singh A. & Chandhok A. (2010). FMCG sector in India: a strategical view. Asian Journal of Management Research.
12. Singh A. & Chandhok A. (2010). Study of the Key Market Segmentation and Targeting Strategies Followed by the Leading FMCG
Companies in India. Asian Journal of Management Research.
13. Singh A. & Singh G. (2016). Cohorts in Marketing: A Review Paper. International Journal of Computer Applications.
14. Singh A. & Singh G. (2017). Customers Perception Towards Service Quality - A Study of Selected Public and New Indian Private
sector Banks in India [An Empirical Study of Malwa Region]. International Journal of Commerce and Management Research, 2(7),
p82-88
15. Singh, A. (2010). Market Segmentation in FMCG: Time to Drive New Basis for Market Segmentation. International Journal of
Research in Commerce & Management, 1(8).
16. Singh, A. (2011). Impact of Demographical Factors on the Purchasing Behaviour of the Customers’ with Special Reference to FMCG:
An Empirical Study. Internal Journal of Research in Commerce Management, 2(3)
17. Steenkamp and Ter Hofstede (2002) "International market segmentation: issues and perspectives", Intern. J. of Market Research, vol
19, p 185-213
18. Wedel, Michel and Wagner A. Kamakura (2000). Market Segmentation: Conceptual and Methodological Foundations. Amsterdam:
Kluwer
19. William D. Neal, John Wurst (2001),” Advances in Market Segmentation”, Marketing Research: A Magazine of Management and
Applications.

Authors: S. Harivardhagini

Paper Title: Acidic Control of a Chemical Plant Implementing Non Linear Controllers
Abstract: This research work concentrates on developing a non linear control technique using PID control,
Fuzzy Logic controller and SMC (Sliding Mode Controller) for acidic control of a chemical plant. This control
involves (Variable Structure Control) VSC control. The acidic control process includes a prototype model. This
model has two inlets to the sample liquid. The two inlets supply acid and alkaline liquids into a Continuous
Stirred Tank Reactor [CSTR]. Both the inflows are controlled in proper proportions, which help to maintain the
desired pH of the system. The pH neutralization process is a non linear process; hence VSC serves as a better
solution. One type of VSC is the Sliding Mode Control which is applied to this system. Apart from this VSC,
both PID control and fuzzy control are incorporated on the same process and the results are furnished. SMC
suffers a problem called chattering, but provides reliable results when compared to PID and Fuzzy Logic
Controller. This research is done using LabVIEW Software, Hence all the control methods are implemented
using the same. Laboratory Virtual Instrumentation Workbench is abbreviated as LabVIEW. The programming
done with this software is applied to the prototype system and the results of the controllers are compared and it is
found that SMC controller is better suited than PID and fuzzy controllers.

Keywords: Sliding Mode Control, Variable Structure Control, LabVIEW, pH Control, PID Control, Fuzzy
Logic Control.

References: 54-58
10.
1. Stephanopoulus, G., “Chemical Process Control – An introduction to theory and practice”, Prentice Hall, 2nd Edition, 1984.
2. Abdullah, Krsiti, Ibrahim, “A review of pH neutralization process”, IEEE Trans. On Intelligent and Advanced Systems, Vol. 2, Page
Nos.: 594-598, 2012.
3. K.D. Yung, V.I. Utkin, “A control engineer's guide to sliding mode control”, IEEE Trans. On control systems technology, Page
Nos.328-342, 1999.
4. S.V.Emelyanov et.al., “On Design of Variable Structure Control Systems for control of Linear plants” Eng. Cybern., No.2, Page Nos.
69-78,1963.
5. S.V.Emelyanov et.al., “Theory of Variable Structure Systems”(in Russian), Moscow: Nauka, 1970.
6. Utkin “Sliding modes in control and optimization”, Berlin, Springer-Verlag, 1992.
7. Vadim Utkin and Hoon Lee, “Chattering Problem in Sliding Mode Control Systems”, ,Proceedings of the 2006 International Workshop
on Variable Structure Systems Alghero, Italy, June 5-7, 2006.
8. C.Edwards and S.K.Spurgeon “Sliding Mode Control Theory And Applications” Taylor and Francis, Vol 7, 1998.
9. Nio Tiong Ghee, Kumaresan “Fuzzy PID Controller to control the pH neutralization process”, IEEE Trans on Research and
Development, pp: 330-334, 2002.
10. R. Ibrahim “Design, implementation and performance evaluation of a fuzzy control system for a pH neutralization process pilot plant”,
IEEE Trans. On Intelligent and Advanced Systems, Page Nos:1001-1006,2007.

Authors: Nymphea Saraf Sandhu, A. K. Upadhyay, Sanjiv Sharma

Paper Title: Sentiment Trend Analysis of Big Data


Abstract: Various fields like Text Mining, Linguistics, Decision Making and Natural Language Processing
together form the basis for Opinion Mining or Sentiment Analysis. People share their feelings, observations and
thoughts on social media, which has emerged as a powerful tool for rapidly growing enormous repository of real
time discussions and thoughts shared by people. In this paper, we aim to decipher the current popular opinions or
emotions from various sources, hence, contributing to sentiment analysis domain. Text from social media, blogs
and product reviews are classified according to the sentiment they project. We re-examine the traditional
processes of sentiment extraction, to incorporate the increase in complexity and number of the data sources and
relevant topics, while re-populating the meaning of sentiment. Working across and within numerous streams of
social media, expression of sentiment and classification of polarity is re-examined, thereby redefining and
enhancing the realm of sentiment. Numerous social media streams are analyzed to build datasets that are topical
for each stream and are later polarized according to their sentiment expression. In conclusion, defining a
sentiment and developing tools for its analysis in real time of human idea exchange is the motive.

Keywords: Sentiment Analysis, Big Data, Sentiment Polarity, Decision Support System.

References:
11.
1. Kouloumpis E, Wilson T, Moore J. Twitter sentiment analysis: The good the bad and the omg!. InFifth International AAAI conference
on weblogs and social media 2011 Jul 5. 59-64
2. Coletta LF, Hruschka ER, Acharya A, Ghosh J. Using metaheuristics to optimize the combination of classifier and cluster ensembles.
Integrated Computer-Aided Engineering. 2015 Jan 1;22(3):229-42.
3. Silva NF, Coletta LF, Hruschka ER. A survey and comparative study of tweet sentiment analysis via semi-supervised learning. ACM
Computing Surveys (CSUR). 2016 Jul 28;49(1):15.
4. Lourenco Jr R, Veloso A, Pereira A, Meira Jr W, Ferreira R, Parthasarathy S. Economically-efficient sentiment stream analysis.
InProceedings of the 37th international ACM SIGIR conference on Research & development in information retrieval 2014 Jul 3 (pp.
637-646). ACM.
5. Medhat W, Hassan A, Korashy H. Sentiment analysis algorithms and applications: A survey. Ain Shams engineering journal. 2014 Dec
1;5(4):1093-113
6. Miura Y, Sakaki S, Hattori K, Ohkuma T. TeamX: A sentiment analyzer with enhanced lexicon mapping and weighting scheme for
unbalanced data. InProceedings of the 8th International Workshop on Semantic Evaluation (SemEval 2014) 2014 Aug (pp. 628-632).
7. Ren Y, Kaji N, Yoshinaga N, Kitsuregawa M. Sentiment classification in under-resourced languages using graph-based semi-
supervised learning methods. IEICE TRANSACTIONS on Information and Systems. 2014 Apr 1;97(4):790-7.
8. Velichkov B, Kapukaranov B, Grozev I, Karanesheva J, Mihaylov T, Kiprov Y, Nakov P, Koychev I, Georgiev G. Su-fmi: System
description for semeval-2014 task 9 on sentiment analysis in twitter. InProceedings of the 8th International Workshop on Semantic
Evaluation (SemEval 2014) 2014 Aug (pp. 590-595).
9. Saif H, He Y, Fernandez M, Alani H. Contextual semantics for sentiment analysis of Twitter. Information Processing & Management.
2016 Jan 1;52(1):5-19.
10. Severyn A, Moschitti A. Twitter sentiment analysis with deep convolutional neural networks. InProceedings of the 38th International
ACM SIGIR Conference on Research and Development in Information Retrieval 2015 Aug 9 (pp. 959-962). ACM.
11. Tang D, Qin B, Liu T. Deep learning for sentiment analysis: successful approaches and future challenges. Wiley Interdisciplinary
Reviews: Data Mining and Knowledge Discovery. 2015 Nov;5(6):292-303.
Authors: Asmita S. Udagave, S. S. Sankpal
Anti-Theft Locking For Stolen Vehicles and Canny Password Protected Access to Personalized
Paper Title:
Vehicles
Abstract: The concern of car thieving has exaggerated staggeringly, largely at knifepoint or automotive parks.
it's essential would like of the event of a vehicle thieving alert and placement identification system for vehicle
homeowners to confirm thieving interference and speedy recovery tries in things wherever a vehicle is missing,
taken or driven by any unauthorized person. The thieving alert feature makes use of a trending GSM application
that is developed and put in during a transportable device that is embedded within the vehicle to speak with the
vehicle owner’s transportable. The communication is established via SMS. The communications established
include; (i) causation associate degree SMS alert from put in GSM to vehicle owner’s transportable once the
system activates. (ii)Sending associate degree SMS from the vehicle owner’s transportable to lock and unlock
the vehicle. A supplementary feature of entrant detection in bolted automotive makes use of PIR device that
detects wrong entry of entrant in bolted automotive and inform regarding it to owner and police.

Keywords: GPS; GSM; PIC16F877A; PIR motion sensor.

References:

1. A.Anusha, Syed Musthak Ahmed “Vehicle Tracking And Monitoring System To Enhance The Safety And Security Driving Using
IOT” 2017 International Conference on Recent Trends in Electrical, Electronics and Computing Technologies,pp-49-53,2017
12. 2. Neha Mangla, Sivananda G, Aishwarya Kashyap, Vinutha “A GPS-GSM Predicated Vehicle Tracking System,Monitored in A Mobile
App based on Google Maps” International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS-
2017) , Vol.No.5,Issue No S1,pp.2916-2919,2017 65-69
3. Nitin Pal1, Rakesh Mandliya2 “Design Of GPS-GSM Based Tracking System” International Journal Of Engineering Sciences &
Management , Pp15-19 Vol. 6, Issue 1,January-March 2016
4. Shruthi.K1*, Ramaprasad.P2, Ruschil Ray3, Manjunath A. Naik4, Shubham Pansari5 “Design of an Anti-theft vehicle Tracking
System with a Smartphone Application” 2015 International Conference on Information Processing (ICIP) ,pp755-760, Dec 16-19,2015
5. Girish L. Deshmukh, Dr. S.P. Metkar, “RTOS Based Vehicle Tracking System” 2015 International Conference on Information
Processing (ICIP) ,pp.621-624,Dec 16-19,2015
6. Pritpal Singh, Tanjot Sethi, Bunil Kumar Balabantaray, Bibhuti Bhushan Biswal “Advanced Vehicle Security System” IEEE
Sponsored 2nd International Conference on Innovations in Information Embedded and Communication Systems ICIIECS’15,pp.1-
6,2015
7. Hammad Afzal, Dr. Vrajesh D. Maheta “Low Cost Smart Phone Controlled Car Security System” 2014 IEEE International Conference
on Industrial Technology (ICIT), pp.670-675,Feb. 26 - Mar. 1 .2014
8. Hu Jian-ming; Li Jie; Li Guang-Hui, "Automobile Anti-theft System Based on GSM and GPS Module,"Intelligent Networks and
Intelligent Systems (ICINIS), 2012 Fifth International Conference on , vol., no.,pp.199,201, 1-3 Nov. 2012
9. Iman M. Almomani, Nour Y. Alkhalil, Enas M. Ahmad, Rania M. Jodeh “Ubiquitous GPS Vehicle Tracking and Management
System” 2011 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT),pp.1-6,2011
10. Zi Li, Qingqi Pei, Ian Markwood, Yao Liu, Miao Pan,and Hongning Li “Location Privacy Violation via GPS-agnostic Smart Phone
Car Tracking” IEEE Transactions on Vehicular Technology ,Vol.No. 67,Issue No. 6,pp. 5042-5053,2018
11. Ruipeng Gao, Mingmin Zhao, Tao Ye, Fan Ye, Yizhou Wang, Guojie Luo, “Smartphone-based Real Time Vehicle Tracking in Indoor
Parking Structures” IEEE Transactions on Mobile Computing,Vol No.16,Issue No.7,pp.2023-2036,2016
12. Zhou Yi ,Wang Ding and Yu Yanfei, “On Dynamic Scheduling of Vehicles Based on GPS / GIS / RFID”, IEEE International
Symposium on IT in Medicine & Education, vol.1, pp. 1252-1256,Aug. 2009
13. Mrs. S. S. Sankpal and Udagave Asmita S., “Model of anti-theft locking for stolen vehicles”, international journal of electronics
engineering ISSN: 0973-7383, Volume-11, Issue-1,Jan- June 20190

Authors: Van Kiet Huynh, Ba Lam To

Paper Title: Developing an Intelligent Quiz System Based on Genetic Algorithm


Abstract: In the normal quiz system, all questions are the same. However, the questions of an intelligent quiz
system have different difficulty level, different response time, etc. This paper proposed a novel solution based on
genetic algorithm (GA) to build an intelligent quiz system. This solution is experimented with website system
via PHP and MySQL. The question bank for experiment is input into the system by lecturers. The experimental
result obtains very good with the accuracy rate of 95%.

Keywords: Evolutionary Algorithms, Genetic Algorithm (GA), Intelligent Quiz System, Learning Outcome
(LO).
13.
References:
70-76
1. Guide to AUN-QA Assessment at Programme Level, ASEAN University Network (AUN), Version No. 3.0, October 2015.
2. Learning Outcomes Available: https://eua.eu/component/tags/tag/77-learning-outcomes.html
3. Haupt, R. L., & Haupt, S. E. (2004).Practical Genetic Algorithms(2nd ed.). Hobo-ken: Wiley.
4. Simon, D. (2013).Evolutionary Optimization Algorithms: Biologically-Inspired andPopulation-Based Approaches to Computer
Intelligence.Hoboken: Wiley.
5. R. Oftadeh et al. (2010), "A novel meta-heuristic optimization algorithm inspired by group hunting of animals: Hunting search", 60,
2087–2098.
6. Hasançebi, O., Kazemzadeh Azad, S. (2015), "Adaptive Dimensional Search: A New Metaheuristic Algorithm for Discrete Truss
Sizing Optimization", Computers and Structures, 154, 1–16.
7. Genetic Algorithm. Available: https://towardsdatascience.com/introduction-to-genetic-algorithms-including-example-code-
e396e98d8bf3
8. Laura Thompson and Luke Welling, PHP and MySQL Web Development, Addison-Wesley Professional; 4 edition (October 11, 2008).
Authors: Vishal Aggarwal, Anjali Jain, Harsh Khatter, Kanika Gupta

Paper Title: Evolution of Chatbots for Smart Assistance


Abstract: Every year, innovation is coming in the area of Artificial intelligence. Currently, the bots are used
for matching to give desired or predefined acknowledge. Coming era is the era of robots and software bots
using supervised, adaptive, and intelligent algorithms. In the paper, our focus is on the smart software which
takes input and performs pre-processing, processing on raw data. The result should be a processed output after
applying learning processes and intelligent approaches. This paper is introducing the prototype explaining were
to use the chatbots and which procedure is appropriate for creating Chatbots.

Keywords: Artificial Intelligence, Artificial Neural Network, Natural Language Processing, Recurrent Neural
Network.

References:

1. CH. Srilekha et al., “Professional Study on Chatbots Using Artificial Intelligence,” in Journal of Applied Science and
Cooomputations, vol. 6, Issue 1, January 2019, pp. 186 - 197.
14. 2. Sristhi Chawla (2018, May 29). Introduction to Natural Language Processing. [Onine] Available:
https://medium.com/greyatom/introduction-to-natural-language-processing-78baac3c602b
3. Jason Brownlee (2017, October 9). A gentle introduction to Bag-of-words model. Processing. [Onine] Available: 77-83
https://machinelearningmastery.com/gentle-introduction-bag-words-model/
4. M. Dhahiya, "A tool of conversation: Chatbot", International Journal of Computer Science and Engineering, Vol. 5, Issue 5, 30 May
2017, pp. 158 - 161.
5. Kshitiz. V. Wadanka et al., "Chatbot : An Application of AI", International Journal of Research in Engineering, Science and
Management, Vol.1 Issue 8, September 2018, pp. 139 - 141.
6. Razwan Pascanu et al. "On the difficulty of training recurrent neural networks" International Conference on Machine Learning, Atlanta,
Georgia, USA, 2013.
7. Elvis (2018, August 24). Deep Learning for NLP: An Overview of Recent Trends. [Online] Available. https://medium.com/dair-ai/deep-
learning-for-nlp-an-overview-of-recent-trends-d0d8f40a776d
8. Karpathy, A. and Johmson, J. “Visualizing And Understanding Recurrent Networks”, ICLR , 2016, Cornell University.
arXiv:1506.02078
9. Genthial , Gaullaume (2017, Nov 8). “Seq2Seq with Attention and Beam Search”, [Online] Available
https://guillaumegenthial.github.io
10. Boris Galitsky, “ A content management system for chatbots”, “springer”, Developing enterprise chatbots, Vol.1, pp. 253-326, April
2019
11. Nawaf Ali, Musa Hindi, Roman V. Yampolskiy, “Evaluation of Authorship attribution software on a chatbot corpus” ,International
Symposium on Information, Communication and Automation Technologies, Oct 2011.
12. Eun Go, S.Shyam Sundar, “Humanizing chatbots:The effects of visual,identity and conversational cues on humanness perceptions”,
Computers in human behavior, vol. 97, pp. 304-316, 2019.

Authors: M. Uday Bhaskar, S. Manasa, Anith Kumar T

Paper Title: Concrete Mix Using Solid Waste Aggregates (Coconut Shell Concrete)
Abstract: Now days the cost of construction is increasing day by day due to increase in the prices of the
building materials. The main ingredients of the concrete are coarse aggregate, fine aggregate and cement. Every
construction company mainly depends on these ingredients for the production of concrete. In the present
scenario most of the research work is done on how to reduce the cost of construction by increasing the strength
of the concrete. Depending up on the properties many of the waste materials are used in the concrete as the
partial replacement of aggregates. Mostly fly ash ,rice husk ash and blast furnace slag are found to be suitable
for replacing the fine aggregate partially in concrete. Agriculture is the major occupation of the people in India
and coconut production is one of the major agriculture production in India. The shell of the coconut is an
agricultural waste and requires large amount of area for its dumping after its usage. It causes environment
pollution if it is not dumped properly and creates major problem. If this coconut shell is used as replacement for
coarse aggregate in concrete it gives solution to the major environmental pollution. Experiments have done on
the effect of partial replacement of coarse aggregate with coconut shell for different percentages and investigated
the properties of this composite concrete In this study, for M20 and M25 grades concrete four different concrete
15.
mixes for each grade with various combinations of coconut shell of about 0%, 10%, 20% and 30% were
prepared. For each concrete mix three sample specimens were casted. The main focus behind this study is to 84-89
utilize the agricultural waste like coconut shells which are of low cost when compared to the coarse aggregates
and thus giving rise to the topic of how to construct the structures within low cost. In this study a short term
analysis, at 28 days, the nature of coconut shell aggregate concrete is studied by conducting some tests like
compressive strength, workability tests and comparison of these results are made with the normal concrete. In
order to maintain serviceability, durability and strength of the members all the necessary precautions are taken.
Thus by adopting this concept it will be very much helpful for the civil engineers and especially the society to
fulfill their basic needs like low cost housing.

Keywords: Coconut Shell, Light Weight Concrete, Compressive Strength, Solid Waste.

References:

1. IS 456:2000 - Plain and reinforced concrete- Code of practice


2. IS 383:1970 - Specification for coarse and fine aggregate from natural sources for concrete
3. IS 516: 1959 - Methods of tests for strength of concrete.
4. IS 3025 - Water quality parameters for concrete.
5. IS 299 - Properties of cement.
6. IS 2387 - Tests of aggregate.
7. IS 10262: 2009 - Guidelines for concrete mix design proportioning.
8. Properties of concrete - A.M Neville (1997).
9. Concrete Technology by M.L.Gambhir 5th edition, 2013 and by M.S.Shetty.
10. Light Weight Aggregate Concrete – Science, Technology and Applications by Satish Chandra & Leif Berntsson.
11. Use of Recycled Materials in Building and Structures - Husson B, Clastres P.
12. Developing Lightweight Concrete Using Agricultural and Industrial Solid Wastes - Gunasekaran K, Kumar PS, (2008)
13. www.ijeijournal.com
14. www.docstoc.com
15. http://www.bgci.org/education/1685/
16. http://www.ripublication.com/ijaer.htm
17. http://www.wikipedia.org
18. https://www.google.co.in
Authors: Thanh Son Huynh, Luong Anh Tuan Nguyen

Paper Title: Developing Blockchain-Based System for Tracking The Origin of Chicken Products
Abstract: Recently, Blockchain-based solutions is being considered by many researchers. Blockchain-based
solutions are applied in areas such as finance, banking, education, e-commerce, logistic, agriculture, etc. In
Vietnam, many researchers and companies are also interested in applying Blockchain technology. This paper
proposed a Blockchain-based system for tracking the origin of chicken products. This system includes
components of Blockchain such as nodes, blocks, ledger, consensus, cryptography, transparency, etc. This
system was implemented and experimented at the chicken farms, Cho Gao district, in Tien Giang province,
Vietnam with many participants such as chicken farms, veterinary business agencies, wholesalers, retailers,
veterinary station of Cho Gao district Tien Giang province, food hygiene and safety certification organizations,
etc. Initial experimental results are very efficient and positive, a lot of farmers and stakeholders is excited to
participate in the experiment.

Keywords: Blockchain, tracking products, consensus, cryptography.


16.
References:
90-96
1. S. Nakamoto, Bitcoin: a peer-to-peer electronic cash system. 2018.
2. Blockchain. Available: https://vi.wikipedia.org/wiki/Blockchain
3. Kosba, A., Miller, A., Shi, E., Wen, Z. and Papamanthou, C. (2016) ‘Hawk: the Blockchain model of cryptography and privacy-
preserving smart contracts’,Proceedings of IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA, pp.839–858.
4. Noyes, C. (2016a) Bitav: Fast Anti-Malware by Distributed Blockchain Consensus and Feedforward Scanning, arXiv preprint
arXiv:1601.01405
5. X. Zhou, Q. Wu, B. Qin, X. Huang, and J. Liu, “Distributed bitcoin account management,” in Proc. IEEE Trustcom/BigDataSE/ISPA,
Aug. 2016, pp. 105–112
6. Khan C, Lewis A, Rutland E, Wan C, Rutter K, Thompson C. A Distributed-Ledger Consortium Model for Collaborative Innovation.
Computer 2017;50(9):29-37
7. L. Lamport, R. Shostak, and M, Pease, “The Byzantine generals problem,” ACM Transactions on Programming Languages and
Systems, vol. 4, no. 3, pp. 382-401, 1982
8. D. Schwartz, N. Youngs, and A. Britto, “The Ripple protocol consensus algorithm,” 2014
9. D. Ongaro and J. K. Ousterhout, “In search of an understandable consensus algorithm,” in Proceedings of 2014 USENIX Annual
Technical Conference, Philadelphia, PA, 2014, pp. 305-319
10. Diffie, Whitfield; Hellman, Martin (8 June 1976). "Multiuser cryptographic techniques".
11. Distributed Database, Available: https://en.wikipedia.org/wiki/Distributed_database

Authors: S. Jennathu Beevi, R. Jayashree


Optimal Fractional Order PID Controller for Centralized and Decentralized Frequency Control in
Paper Title:
Restructured Power System
Abstract: In this research paper, an attempt has been made to design a Fractional order PID (FOPID)
controller employed for centralized and decentralized frequency control in a restructured power system. The
controller gains are optimized by Moth Flame Optimization algorithm (MFO), with Integral Time Absolute
Error (ITAE) as objective function. The performance of the FOPID controller is compared with that of
conventional PID controller under various contract scenarios. It is observed that FOPID as a frequency error
damping controller, the steady state and dynamic performance of the proposed power system is enhanced.

Keywords: Automatic Generation Control, Bilateral Contracts, Fractional Order Controller, Regulation.
17.
References: 97-108
1. P. Kundur, J. Paserba, V. Ajjarapu, G. Andersson, A. Bose, C. Canizares, and T. Van Cutsem, “Definition and classification of power
system stability,” IEEE transactions on Power Systems, vol. 19, no. 2, 2004, pp. 1387-1401.
2. R. Christie, D. and A. Bose, “Load frequency control issues in power system operations after deregulation,” IEEE Transactions on
Power systems, vol. 11, no. 3, 1996, pp. 1191-1200.
3. E. Hirst, and B. Kirby, “Separating and measuring the regulation and load-following ancillary services,” Utilities Policy, vol. 8, no. 2,
1999, 75-81.
4. V. Donde, M. A. Pai, and I. A. Hiskens, “Simulation and optimization in an AGC system after deregulation,” IEEE transactions on
power systems, vol. 16, no. 3, 2001, pp. 481-489.
5. E. Nobile, A. Bose, and K. Tomsovic, “Feasibility of a bilateral market for load following,” IEEE Transactions on Power systems, vol.
16, no. 4, 2001, pp. 782-787.
6. B. Tyagi, and S. C. Srivastava, “A decentralized automatic generation control scheme for competitive electricity markets,” IEEE
transactions on power systems, vol. 21, no. 1, 2006, pp. 312-320.
7. P. Bhatt, R. Roy, and S. P. Ghoshal, “Optimized multi area AGC simulation in restructured power systems,” International journal of
electrical power & energy systems, vol. 32, no. 4, 2010, pp. 311-322.
8. F. Liu, Y. H. Song, J. Ma, S. Mei, and Q. Lu, “Optimal load-frequency control in restructured power systems,” IEE Proceedings-
Generation, Transmission and Distribution, vol. 150, no. 1, 2003, pp. 87-95.
9. I. A. Chidambaram, and B. Paramasivam, “Optimized load-frequency simulation in restructured power system with redox flow batteries
and interline power flow controller,” International Journal of Electrical Power & Energy Systems, vol. 50, 2013, pp. 9-24.
10. P. Dahiya, V. Sharma, and R. Naresh, “Automatic generation control using disrupted oppositional based gravitational search algorithm
optimised sliding mode controller under deregulated environment,” IET Generation, Transmission & Distribution, vol. 10, no. 16, 2016,
pp. 3995-4005.
11. G. Sharma, K. R. Niazi, and R. C. Bansal, “Adaptive fuzzy critic based control design for AGC of power system connected via AC/DC
tie-lines,” IET Generation, Transmission & Distribution, vol. 11, no. 2, 2017, pp. 560-569.
12. S. H. Hosseini, and A. H. Etemadi, “Adaptive neuro-fuzzy inference system based automatic generation control,” Electric Power
Systems Research, vol. 78, no. 7, 2008, pp.1230-1239. https://doi.org/10.1016/j.epsr.2007.10.007
13. H. Shayeghi, H. A. Shayanfar, and O. P. Malik, “Robust decentralized neural networks based LFC in a deregulated power
system,” Electric Power Systems Research, vol. 77, no. 3-4, 2007, pp. 241-251.
14. L.C Saikia, S. Mishra, N. Sinha, and J. Nanda, “Automatic generation control of a multi area hydrothermal system using reinforced
learning neural network controller,” International Journal of Electrical Power & Energy Systems, vol. 33, no. 4, 2011, pp. 1101-1108.
15. H. Shayeghi, H. A. Shayanfar, and A. Jalili, “Multi-stage fuzzy PID power system automatic generation controller in deregulated
environments,” Energy Conversion and management, vol. 47, no. 18-19, 2006, pp. 2829-2845.
16. T. S. Gorripotu, H. Samalla, C. J. M. Rao, A. T. Azar, and D. Pelusi, “TLBO Algorithm Optimized Fractional-Order PID Controller for
AGC of Interconnected Power System,” In Soft Computing in Data Analytics, 2019, (pp. 847-855). Springer, Singapore.
17. Y. Arya, “AGC of restructured multi-area multi-source hydrothermal power systems incorporating energy storage units via optimal
fractional-order fuzzy PID controller,” Neural Computing and Applications, vol. 31, no. 3, 2019, pp. 851-872.
18. Z. X. Tang, Y. S. Lim, S. Morris, J. L. Yi, P. F. Lyons, and P. C. Taylor, “A comprehensive work package for energy storage systems as
a means of frequency regulation with increased penetration of photovoltaic systems,” International Journal of Electrical Power & Energy
Systems, vol. 110, 2019, pp. 197-207.
19. R. J. Abraham, D. Das, and A. Patra, “Load following in a bilateral market with local controllers,” International Journal of Electrical
Power & Energy Systems, vol. 33, no. 10, 2011, pp. 1648-1657.
20. D. H. Wolpert, and W. G. Macready, “No free lunch theorems for optimization,” IEEE transactions on evolutionary computation, vol. 1,
no. 1, 1997, pp. 67-82.
21. K. B. Oldham, and J. Spanier, “The fractional calculus theory and applications of differentiation and integration to arbitrary order,”
Academic Press, New York, 1974, PP. 111.
22. K. S. Miller, and B. Ross, “An Introduction to the Fractional Calculus and Fractional Differential Equation,” Wiley, New York, 1993.
23. I. Podlubny, “Fractional-order systems and PI/sup/spl lambda//D/sup/spl mu//-controllers,” IEEE Transactions on automatic control, vol.
44, no. 1, 1999, pp. 208-214.
24. R. El-Khazali, W. Ahmad, and Y. Al-Assaf, “Sliding mode control of generalized fractional chaotic systems,” International Journal of
Bifurcation and Chaos, vol. 16, no. 10, 2006, pp. 3113-3125.
25. S.Mirjalili, “Moth-flame optimization algorithm: A novel nature-inspired heuristic paradigm,” Knowledge-Based Systems, vol. 89,
2015, pp. 228-249.
26. S. Reddy, L. K. Panwar, B. K. Panigrahi, and R. Kumar, “Solution to unit commitment in power system operation planning using binary
coded modified moth flame optimization algorithm (BMMFOA): a flame selection based computational technique,” Journal of
Computational Science, vol. 25, 2018, pp. 298-317.
27. B. V. S. Acharyulu, B. Mohanty, and P. K. Hota, “Comparative performance analysis of PID controller with filter for automatic
generation control with moth-flame optimization algorithm,” In Applications of Artificial Intelligence Techniques in Engineering, 2019,
(pp. 509-518). Springer, Singapore. https://doi.org/10.1007/978-981-13-1819-1_48
28. A. K. Barisal, AND l. K. Lal, “Application of moth flame optimization algorithm for AGC of multi-area interconnected power
systems,” International Journal of Energy Optimization and Engineering (IJEOE), vol.7, no. 1, 2018, pp. 22-49.
29. M. A. Taher, S. Kamel, F. Jurado, and M. Ebeed, “An improved moth‐flame optimization algorithm for solving optimal power flow
problem,” InternationalTransactions on Electrical Energy Systems, vol. 29, no. 3, 2019, pp. e2743.

Authors: Mazher Sarfaraz Khan, Sayyad Ajij D

Paper Title: Testing Reliable-AODV for Mobile Ad-hoc Network using test-bed architecture
Abstract: Mobile Ad hoc Network(MANET) provides wireless communication withoutany infrastructure.
MANET generally uses a most popular and well-suited routing protocolthat is Ad hoc on Demand Distance
Vector (AODV). Random topology and mobilityin MANET cause link break multiple times in network due to
which poor link quality thatresults in packet losses in the network. In this paper, link quality improvement in
AODV routing protocol is focused. Link quality issue can be resolved through Cross-layer design(CLD)
interaction in the OSI communication model. This technique called as Reliable-AODV. CLD is implemented by
interacting Physical firstlayer and network third layer of the OSI model, CLDinteraction help in strong route
formation inAODV for Reliable-AODV. The result shows an improvement in the system Performance in terms
of metricslike throughput, Packet Delivery Ratio(PDR) and reduction in the packet losses, delay ofthe network.
Network simulator used for performance analysis is NS-2.a Simulation tool that shows improvement in results.
18. Castadiva Emulator with Wi-Fi routers and laptop are used as test bed architecture for validating sample results
of simulations. It is observed that some small variation in the simulated and emulated result by using real-time
109-114
experimental setup.

Keywords: AODV, MANET, CLD, NS-2, NS-3.

References:

1. S. Corson and J. Macker, “Mobile ad hoc networking (MANET): Routing protocol performance issues and evaluation considerations,
RFC 2501, Jan. 1999,” RFC2501, no. JAN, 1999.
2. A. Lodhi, S. S.-S. C. in D. Analytics, and undefined 2019, “Cluster Head Selection by Optimized Ability to Restrict Packet Drop in
Wireless Sensor Networks,” Springer.
3. C. E. Perkins, M. Park, and E. M. Royer, “Wmcsa,” Ad-hoc On-Demand Distance Vector Routing, pp. 90–100.
4. A. Sarfaraz Ahmed, T. Senthil Kumaran, S. Syed Abdul Syed, and S. Subburam, “Cross-layer design approach for power control in
mobile ad hoc networks,” Egypt. Informatics J., vol. 16, no. 1, pp. 1–7, 2015.
5. S. N.-U.-2012 I. C. on and undefined 2012, “Study of congestion control using AODV and signal strength by avoiding link failure in
MANET,” ieeexplore.ieee.org.
6. R. S. Kumar and P. Kamalakkannan, “A review and design study of cross layer scheme based algorithm to reduce the link break in
MANETs,” in 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering, 2013, pp. 139–143.
7. M. M. Hassan et al., “Design of an energy-efficient and reliable data delivery mechanism for mobile ad hoc networks: a cross-layer
approach,” Concurr. Comput. Pract. Exp., vol. 27, no. 10, pp. 2637–2655, Jul. 2015.
8. H. Dandotiya, R. Jain, and R. Bhatia, “Route selection in MANETs by intelligent AODV,” Proc. - 2013 Int. Conf. Commun. Syst. Netw.
Technol. CSNT 2013, pp. 332–335, 2013.
9. P. Singh and H. Dhawan, “Node mobility based route selection in AODV for use in MANETs,” Proc. - 1st Int. Conf. Comput. Commun.
Control Autom. ICCUBEA 2015, pp. 83–87, 2015.
10. G. Wang, S. Wang, C. Liu, and X. Zhang, “Research for improved AODV algorithm based on probability broadcasting with percolation
theory,” Prz. Elektrotechniczny, vol. 88, no. 7 B, pp. 372–374, 2012.
11. R. Mangrulkar, M. A.-2010 S. I. conference, and undefined 2010, “Trust based secured adhoc On demand Distance Vector Routing
protocol for mobile adhoc network,” ieeexplore.ieee.org.
12. H. Somnuk and M. Lertwatechakul, “Multi-hop AODV-2T,” 2009 Int. Symp. Intell. Ubiquitous Comput. Educ. IUCE 2009, pp. 214–
217, 2009.
13. N. M. Krittika Khator, “A Metaphorical Review on Impact of Congestion and Route failure on the Performance Comparison of Routing
Protocols in MANET.”
14. B. Li, Z. Jin, and Y. Shu, “Cross-layer design of energy-saving AODV routing protocol,” Trans. Tianjin Univ., vol. 15, no. 5, pp. 343–
349, Oct. 2009.
15. M. K. Singh, B. Kumar, C. Kumar, and M. Gupta, “Preemptive Multipath-Adhoc On Demand Distance Vector Routing Protocol,” vol.
1, no. 1, pp. 36–40, 2011.
16. R. Mehta and D. K. Lobiyal, “Energy efficient cross-layer design in MANETs,” 2017 4th Int. Conf. Signal Process. Integr. Networks,
SPIN 2017, pp. 448–453, 2017.
17. M. Anand and T. Sasikala, “Efficient energy optimization in mobile ad hoc network (MANET) using better-quality AODV protocol,”
Cluster Comput., Jan. 2018.
18. Z. El-Bazzal, K. El-Ahmadieh, Z. Merhi, M. Nahas, and A. Haj-Ali, “A cross layered routing protocol for ad hoc networks,” 2012 Int.
Conf. Inf. Technol. e-Services, ICITeS 2012, 2012.
19. B. Shin, Y. Ko, S. Han, D. L.-A. 2010 S. School, and undefined 2010, “SINR-Based Link-Quality Routing Protocol in Multi-Radio
Mobile Ad-Hoc Network,” koasas.kaist.ac.kr.
20. E. Mostajeran, R. M. Noor, and H. Keshavarz, “A novel improved neighbor discovery method for an Intelligent-AODV in Mobile Ad
hoc Networks,” 2013 Int. Conf. Inf. Commun. Technol. ICoICT 2013, pp. 395–399, 2013.
21. F. Aune, “Cross-Layer Design Tutorial,” Tutorial, p. 35, 2004.
22. S. G. Bhoge, M. D. Chawhan, Y. Suryavanshi, and V. K. Taksande, “Cross-layer approach for energy & communication efficient
protocol of mobile ad hoc networks,” Proc. 2017 IEEE Int. Conf. Commun. Signal Process. ICCSP 2017, vol. 2018-Janua, pp. 1186–
1189, 2018.
23. M. Kamrul Islam and R. K. Liu, “Cross-Layer Optimization of AODV Routing Protocol For Mobile Ad-Hoc Network (MANET),” no.
Iccsee, pp. 1834–1837, 2013.
24. R. S. Kumar and P. Kamalakkannan, “A review and design study of cross layer scheme based algorithm to reduce the link break in
MANETs,” Proc. 2013 Int. Conf. Pattern Recognition, Informatics Mob. Eng. PRIME 2013, pp. 139–143, 2013.
25. T. Kabir, N. Nurain, and M. H. Kabir, “Pro-AODV (Proactive AODV): Simple modifications to AODV for proactively minimizing
congestion in VANETs,” Proc. 2015 Int. Conf. Netw. Syst. Secur. NSysS 2015, 2015.
26. A. Alqobaty, S. Shaheen, and S. Ibrahim, “A new cross layer based routing technique for mobile ad hoc networks using forwarding node
selection,” Proc. - ICCES 2012 2012 Int. Conf. Comput. Eng. Syst., pp. 9–15, 2012.
27. S. Nandgave-Usturge, “Study of congestion control using AODV and signal strength by avoiding link failure in MANET,” Proc. - 2012
Int. Conf. Commun. Inf. Comput. Technol. ICCICT 2012, pp. 1–5, 2012.
28. Bai, N. Sadagopan, B. Krishnamachari, and A. Helmy, “Modeling path duration distributions in MANETs and their impact on reactive
routing protocols,” IEEE J. Sel. Areas Commun., vol. 22, no. 7, pp. 1357–1373, 2004.
29. N. Javaid, M. Ishfaq, M. Jamil, U. Qasim, T. A. Alghamdi, and Z. A. Khan, “Modeling Routing Overhead of Reactive Protocols at Link
Layer and Network Layer in Wireless Multihop Networks,” Math. Probl. Eng., vol. 2015, pp. 1–14, 2015.
30. T. Issariyakul and E. Hossain, Introduction to network simulator NS2, vol. 9781461414. 2012.
31. J. Hortelano, M. Nácher, J. C. Cano, C. Calafate, and P. Manzoni, “Castadiva: A test-bed architecture for mobile ad hoc networks,”
IEEE Int. Symp. Pers. Indoor Mob. Radio Commun. PIMRC, no. Pimrc 07, pp. 1–5, 2007.
32. J. Hortelano, J.-C. Cano, C. Calafate, and P. Manzoni, “Testing Applications in MANET Environments through Emulation,” EURASIP
J. Wirel. Commun. Netw., vol. 2009, no. 1, p. 406979, 2010.

Authors: Ngoc-Khoat Nguyen


Intelligent Power System Stabilizers using Fuzzy Logic Technique and Sliding Mode Control
Paper Title:
Strategy
Abstract: Each electric power grid should be equipped with a power system stabilizer (PSS) to ensure the
network stability during operation and distribution. The major function of a PSS is to provide an appropriate
control signal to the synchronous generator system, making its rotational speed stabilization against
disturbances. This paper investigates three control strategies to design such an efficient PSS for the power
network, including a PID-based PSS, a fuzzy logic – based PSS (FLC), a fuzzy logic-integrated sliding mode
control – based PSS (SMC). With the rapid development of fuzzy logic technique considered to be an intelligent
19. and successful control tool, the PSS controllers applying this control strategy are able to obtain good control
performances, satisfying high requirements of the smart grids. Through a number of numerical simulations
115-120
implemented in MATLAB/Simulink package for a single synchronous generator connected to an infinite bus,
this work verifies the feasibility and success of the studied control strategies in designing an efficient PSS
controller. Two case studies with load change and without load change will also be carried out in this paper to
demonstrate the broad stability range of the proposed PSS controllers. Simulation results reveal that the FLC and
the SMC are much better than the conventional PID-based PSS controllers and these two intelligent regulators
can be selected for successfully solving the stabilization problem of an electric power grid in practice.

Keywords: FLC, PID, PSS, SMC.


References:

1. A. J. Wood, B. F. Wollenberg, G. B. Sheble. Power Generation, Operation, and Control. Willey-Interscience, New York, 2013.
2. J. D. Glover, T. J. Overbye, M. S. Sarma. Power System Analysis & Design. 6th edition, CENGAGE Learning, 2017.
3. Y. N. Yu and Q H Li, “Pole Placement Power System Stabilizers Design of an Unstable Nine Machine System”, IEEE Transactions
on Power Systems, vol. 5, pp. 353-358, May, 1990.
4. C. J. Wu and Y Y Hsu, “Design of Self - tuning PID Power System Stabilizer for Multimachine Power System”, IEEE
Transactions on Power Systems, vol. 3, pp. 1059-1064, Aug. 1998.
5. K. A. El-Metwally and O. P. Malik, “Fuzzy Logic Based Power System Stabilizer”, IEEE Proc. Gener. Transm. Distri., vol. 142, pp.
277-281, May 1995.
6. H. Taliyat, J Sadeh and R. Ghazi “Design of Augmented Fuzzy Logic
7. Power System Stabilizer to Enhance Power System Stability” IEEE Transactions on Energy Conversion, vol. 11, pp, 97-103, March
1996.
8. T. Hiyama, “Development of Fuzzy Logic Power System Stabilizer and Further Studies”, IEEE International Conference on
Systems, Man and Cybernetics 1999, vol. 6, pp. 545-550.
9. B. Shah, P. Chaudhari, “Fuzzy and SVM based Power System Stabilizer Single Machine Infinite Bus System”, International Journal of
Computer Applications, vol. 131, no. 13, pp. 18-21, Dec. 2015.
Authors: Alakananda Tripathy, Sateesh Kumar Pradhan, Alok Ranjan Tripathy, Ajit Kumar Nayak

Paper Title: A New Hybrid Cryptography Technique in Wireless Sensor Network


Abstract: The wireless sensor network is a large number of tiny nodes installed in insecure environment for
monitoring, gathering and transferring data and are prone to security threats for its limited resources. In order to
transmit the data and to protect from different attacks in the network, security is maintained. To achieve
confidentiality, authenticity and authorization of data which secure the data from different attacks cryptographic
algorithm were used. The number of keys used in the cryptographic algorithm determines the security of the
data. Cryptographic algorithms are broadly classified into two types symmetric cryptography and asymmetric
cryptography. In the symmetric key cryptographic algorithm, a secret key is shared in the network and in
asymmetric key cryptographic algorithm two keys are used for data security. In wireless sensor network,
symmetric key cryptography required more storage to store the key among all the nodes of the network and in
asymmetric key cryptography more computation time is require for the data encryption and decryption. To avoid
memory and computation overhead we proposed a hybrid cryptosystem to handle the security in the wireless
sensor network. Initially shared key is exchanged among nodes using ECC which is a public key algorithm. Data
is encrypted and decrypted using RC4 symmetric key algorithm. Various performance measures such as time
taken for encryption and decryption process and memory needed for storing cipher text data. The proposed
model shows faster encryption of data and takes less memory for key storage as compared to the traditional
approach.

Keywords: Security, Cryptography, Symmetric key, Cipher text, Encryption, Decryption.

References:

1. Amin, F., Jahangir, A. H., & Rasifard, H. (2008). Analysis of public-key cryptography for wireless sensor networks security. world
academy of science, engineering and technology, 41, 529-534.
2. Bhanot, R., & Hans, R. (2015). A review and comparative analysis of various encryption algorithms. International Journal of Security
20. and Its Applications, 9(4), 289-306.
3. Blom, R. (1984, April). An optimal class of symmetric key generation systems. In Workshop on the Theory and Application of of
Cryptographic Techniques (pp. 335-338). Springer, Berlin, Heidelberg. 121-131
4. Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., & Yung, M. (1992, August). Perfectly-secure key distribution for
dynamic conferences. In Annual international cryptology conference (pp. 471-486). Springer, Berlin, Heidelberg.
5. Buch, D., & Jinwala, D. C. (2010, December). Denial of Service Attacks in Wireless Sensor Networks. In International conference on
current trends in technology, Nuicone.
6. Chan, H., Perrig, A., & Song, D. (2003, May). Random key predistribution schemes for sensor networks. In IEEE symposium on
security and privacy (Vol. 197).
7. C K Marigowda and ManjunathShingadi, “Security Vulnerability Issues In WirelessSensor Networks: A Short Survey”International
Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 7, July 2013
8. C. KARLOF AND D. WAGNER, “SECURE ROUTING IN SENSOR NETWORKS: ATTACKS AND COUNTERMEASURES”, ELSEVIER’S ADHOC
NETWORKS JOURNAL, SPECIAL ISSUE ON SENSOR NETWORK (SNPA), 2003,SEPTEMBER, PP. 293-315.
9. Chen, X., Makki, K., Yen, K., & Pissinou, N. (2009). Sensor network security: A survey.IEEE Communications Surveys and
Tutorials,11(2), 52-73.
10. Dawahdeh, Z. E., Yaakob, S. N., & Othman, R. R. B. (2016). A New Modification for Menezes-Vanstone Elliptic Curve Cryptosystem.
Journal of Theoretical and Applied Information Technology,85(3), 290.
11. Du, W., Deng, J., Han, Y. S., Varshney, P. K., Katz, J., & Khalili, A. (2005). A pairwise key predistribution scheme for wireless sensor
networks. ACM Transactions on Information and System Security (TISSEC), 8(2), 228-258.
12. Eschenauer, L., & Gligor, V. D. (2002, November). A key-management scheme for distributed sensor networks. In Proceedings of the
9th ACM conference on Computer and communications security (pp. 41-47). ACM.
13. Hankerson, D., Menezes, A. J., & Vanstone, S. (2005). Guide to elliptic curve cryptography.Computing Reviews,46(1), 13.
14. Koblitz, N., Menezes, A., & Vanstone, S. (2000). The state of elliptic curve cryptography. Designs, codes and cryptography, 19(2-3),
173-193.
15. Lee, J., & Stinson, D. R. (2004, August). Deterministic key predistribution schemes for distributed sensor networks. In International
Workshop on Selected Areas in Cryptography (pp. 294-307). Springer, Berlin, Heidelberg.
16. Pathan, A. S. K., Lee, H. W., & Hong, C. S. (2006, February). Security in wireless sensor networks: issues and challenges. In 2006 8th
International Conference Advanced Communication Technology (Vol. 2, pp. 6-pp). IEEE.
17. Perrig, A., Stankovic, J., & Wagner, D. (2004). Security in wireless sensor networks.
18. Rijmen, V., & Daemen, J. (2001). Advanced encryption standard. Proceedings of Federal Information Processing Standards
Publications, National Institute of Standards and Technology, 19-22.
19. Rivest, R. L. (1994, December). The RC5 encryption algorithm. In International Workshop on Fast Software Encryption (pp. 86-96).
Springer, Berlin, Heidelberg.
20. Schneier, B. (1993, December). Description of a new variable-length key, 64-bit block cipher (Blowfish). In International Workshop on
Fast Software Encryption (pp. 191-204). Springer, Berlin, Heidelberg.
21. Sharma, S., Bansal, R. K., & Bansal, S. (2013, December). Issues and challenges in wireless sensor networks. In 2013 International
Conference on Machine Intelligence and Research Advancement (pp. 58-62). IEEE.
22. Singhal, N., & Raina, J. P. S. (2011). Comparative analysis of AES and RC4 algorithms for better utilization. International Journal of
Computer Trends and Technology, 2(6), 177-181.
23. Wander, A. S., Gura, N., Eberle, H., Gupta, V., & Shantz, S. C. (2005, March). Energy analysis of public-key cryptography for wireless
sensor networks. In Third IEEE international conference on pervasive computing and communications (pp. 324-328). IEEE.
24. Y.-C. Hu, A. Perrig, and D. B. Johnson, “Packet Leashes: A Defense Against Wormhole Attacks in Wireless Networks,” Proc. IEEE
INFOCOM 2003, Apr. 2003
25. Mousa, A., & Hamad, A. (2006). Evaluation of the RC4 algorithm for data encryption. IJCSA, 3(2), 44-56.
26. Hankerson, D., & Menezes, A. (2011). Elliptic curve cryptography (pp. 397-397). Springer US.
27. Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems.
Communications of the ACM, 21(2), 120-126.

Authors: Arunkumar H. M., Padmanabha Reddy A

Paper Title: Wavelet Scalogram for Detection of R-peaks in Noisy ECG Signal
Abstract: The ECG (electrocardiography) which reports heart electrical action is capable to supply with
valuable data almost the sort of cardiac disarranges endured by the patient based on the fluctuations obtained
from the ECG signal design. In this paper, we considered noisy ECG signals [MIT-BIH database] and their
different wavelet scalograms. Wavelet analysis performed in the ECG signals with continuous wavelet
transforms and it has allowed to graphically identifying scalograms energy two-dimensional characteristics of
the heartbeat QRS complex.

Keywords: Noisy ECG Signal, Continuous Wavelet Transform, Wavelet Scalogram.

References:
21.
1. Mukherjee, “Detection of heart blocks by cardiac cycle extraction using time- scale analysis”, Int. Jr. of Emerging Trends in Signal
Processing, vol.1(3), pp. 12-16.2013. 132-136
2. M. Rayeezuddin, and B. Krishna Reddy, “Analysis of QRS complex in ECG signals using new continuous wavelet transform”, Int. Jr. of
Mathematics Trends and Technology, vol.26, pp. 20-23.2015
3. G. L. Sheean, “Application of time-varying analysis to diagnostic needle electromyography,” Medical Engineering and Physics, pp.1-
7.2011.
4. J. T. Bialasiewicz, “Application of wavelet scalogram and coscalogram for analysis of biomedical signals,” Proceedings of the World
Congress on Electrical Engineering and Computer Systems and Science, pp 333.2015
5. R. J. Martis, U. R. Acharya and H. Adeli, “Current method in electrocardiograph characterization,” Computers in Biology and Medicine,
pp.133-149.2014.
6. C. H. Lin, “Frequency-domain features for ECG beat discrimination using grey relational analysis-based classifier”, An Int. Jr.
Computers and Mathematics with Applications, pp. 680-690. 2008.
7. H. M. Arunkumar and A. Padmanabha Reddy, “ Reduction of noise and R-wave detecting based on wavelets for ECG signals”, Jr. of
Applied Science and Computations, vol.6, pp. 708-719. 2019.
8. https://physionet.org/physiobank/database/nstd/
9. A. Shoeb and G. Clifford, “Wavelets multiscale activity in physiological signals”, Biomedical Signal and Image Processing, pp 1-
29.2005.

Authors: Jagadeesh Medapati, Anand Chandulal Jasti, Ranajikanth TV

Paper Title: An Empirical Software Reliability Growth Model for Identification of True Failures
Abstract: Software Reliability is a special topic of software engineering that deals with the finding of glitches
during the software development. Effective analysis of the reliability helps to understand the quality of the
software. It also helps to reveal the number of failures occurred in development phase which facilitates
refinement of the failures in the developed software’s. If the failures are not minimized the number of reviews in
the software development process increases which in turn increase the expenditure to develop the software.
Every software organization aims at releasing the software in time and also it becomes a mandate to manage the
software such that the time to release the software is optimized. It becomes a mandate for any organization to
release software patches so as to minimize the errors after software release and thereby if the number of patches
increases, the credibility of the software together with the storage area will be at stake. This article presents a
novel case study wherein a procedural layout is presented such that the number of failures can be reduced
instantaneously and the failures are identified at the early stage. The development procedure laid in this article
22. helps to formulate a basis for the distinction between true failures and non-failures. The work is presented using
benchmark datasets and the results showcase a better recognition rate and failure deduction rate. 137-145
Keywords: Gamma Distribution, Quality Metrics, Software Engineering, Software Reliability.

References:

1. G.R. Hudson, Programming errors as a birth-death process, Technical Report SP-3011, System Development Corp, 1967.
2. Z. Jelinski, P.B. Moranda, “Software reliability research”, in Statistical Computer Performance Evaluation, 1 st edition, W. Freiberger,
Ed. New York: Academic Press, 1972, pp. 465-484.
3. M.L. Shooman, “Statistical Computer Performance Evaluation” 1 st Edition, W. Freiberger, Ed. New York: Academic Press, 1972.
4. B. Littlewood, J.L. Verrall, “A Bayesian reliability growth model for computer software”, Journal of the Royal Statistical Society Series
C, 1973, Vol.22, No.3, pp.332-346.
5. S. Yamada, M. Ohba, “S-shaped software reliability growth models and comparisons”, App. Stock. Mod. Data. Ana., 1985, Vol.11,
pp.1431-1437.
6. Y. Tohma, R. Jacoby, Y. Murata, M. Yamamoto, "Hyper-geometric distribution model to estimate the number of residual software
faults", Proceedings of the Thirteenth Annual International Computer Software & Applications Conference, 1989, USA, pp. 610-617.
7. D.B. Brown, “Correction to a cost model for determining the optimal number of software test cases”, IEEE Transactions on Software
Engineering, 1989, Vol.15, No.2, pp.218-221.
8. K. Ohishi, H. Okamura, T. Dohi, “Gompertz software reliability model: estimation algorithm and empirical validation”, Journal of
Systems and Software, 2009, Vol.82, pp.535-543.
9. R. SatyaPrasad, O. Naga Raju, R.R.L. Kantam, “SRGM with imperfect debugging by genetic algorithms”, International Journal of
Software Engineering & Applications, 2010, Vol.1, No.2, pp.66-79.
10. R. Satya Prasad, K.R.H. Rao and R.R.L. Kantam, “Software reliability with SPC”, International Journal of Computer Science and
Emerging Technologies, 2011, Vol.2, No.2, pp.233-237.
11. R.R.L Kantam, M.S. Ravikumar, “Limited failure censored life test sampling plan in Burr type X distribution”, Journal of Modern
Applied Statistical Methods, 2016, Vol.15, No.2, pp.428-454.
12. H. Pham, Software Reliability. Springer-Verlag, London, 2000.
13. M.R. Lyu, Handbook of Software Reliability and System Reliability. McGraw Hill Inc., Hightstown, NJ, USA, 1996.
14. J.D. Musa, Software Reliability Engineering: More Reliable Software Faster and Cheaper. 2nd Edition, AuthorHouse, 2004.
15. A.L. Goel, K. Okumoto, “Time-dependent error detection rate model for software reliability and other performance measures”, IEEE
Transactions on Reliability, 1979, Vol.R.28, No.3, pp.206-211.
16. A. Wood, “Predicting software reliability”, IEEE Computer, 1996, Vol.29, No.11, pp.69-77.
17. W.D. Brooks, R.W. Motley, Analysis of discrete software reliability models – technical report, New York: Rome Air Development
Centre, 1980.
18. M. Ohba, “Software reliability analysis models”, IBM Journal of Research and Development, 1984, Vol.28, No.4, pp.428-443.
19. M. Ohba, “Inflection S-shaped software reliability growth model”, Stochastic Models in Reliability Theory, 1984, Vol.235, pp.144-162.
20. P.K. Kapur, A. Gupta, P.C. Jha, "On modeling failure phenomenon of multiple releases of a software in operational phase for product
and project type software-a theoretical framework", in Quality Reliability and Infocom Technology, P.K. Kapur, A.K. Verma, Eds.
MacMillan India Ltd., 2007, pp.155-165.
21. P.K. Kapur, A. Kumar, V.B. Singh, F.M. Nailama, "On modelling software reliability growth model for errors of different severity",
Proceeding of National Conference on Computing for Nation Development, 2007, pp.279-284.
22. Y. Kuo, C.Y. Hung, M.R. Lyu, “Framework for modeling software reliability, using various testing-efforts and fault-detection rates”,
IEEE Transactions on Reliability, 2001, Vol.50, Iss.3, pp.310-320.
23. M.G.M. Khan, N. Ahmad, L.S. Rafi, “Modeling and analysis of software reliability with Burr type X testing-effort and release
determination”, Proc of the CASON-2008, IEEE Comp Soc, 2008, China, pp.759-762.
24. K. Sobhana, R. Satya Prasad, Ch. S. Chowdary “Software reliability growth model on Burr type III-an order statistics approach”,
International Journal of Software Engineering, 2015, Vol.8, No.1, pp.57-68.
25. S.H. Aljahdali, "Multi-objective optimization for ensemble of models in software reliability prediction", International Journal of
Software Engineering, 2009, Vol.2 No.1, pp.29-16.
26. S. Somasundaram, R. Chinnaiyan, "Reliability evaluation of object oriented software systems using communication variables – a
review", International Journal of Software Engineering, 2009, Vol.2, No.2, pp.1-19.
27. Jagadeesh Medapati, Prof Anand Chandulal J and Prof Rajinikanth T V, “A Novel Assessment to Achieve Maximum Efficiency in
Optimizing Software Failures” International Journal of Advanced Computer Science and Applications(IJACSA), 10(3), 2019.

Authors: Shamneesh Sharma, Manoj Manuja, Keshav Kishore

Paper Title: Vulnerabilities, Attacks and their Mitigation: An Implementation on Internet of Things (IoT)
Abstract: IoT is much-hyped technology in today’s world still it helps us to achieve the goals of ubiquitous
computing. Although, there are many challenges in adoption and implementation of IoT based solutions. One of
the major challenges is security of IoT products and services. Day after day exposures like Insecure Firmware,
Data Protection, Identity Thefts and DoS/DDoS Attack in the field of IoT are being oppressed with malicious
objectives so we need to focus on these security issues. A framework of IoT may use many services on a single
platform to give a specific applicability to the applications. These services can be sensor fields, cloud computing
and data analytics so the security architecture should ensure its measures on each level such as physical access,
remote access and secured data access. This paper presents the study on existing attacks and mitigation in IoT
Services which enables for finding and patching security vulnerabilities. With the help of machine learning and
data analytics, IoT services and security can be made proactive rather than reactive.

Keywords: Internet of Things (IoT), Security in IoT, Attacks in IoT, Data Protection in IoT, IoT Services.

References:
23.
1. Gartner. (2017). Gartner Says 8.4 Billion Connected "Things" Will Be in Use in 2017, Up 31 Percent From 2016. [online] Available at:
https://www.gartner.com/newsroom/id/3598917 [Accessed 11 Oct. 2017]. 146-150
2. Roman, R., Zhou, J. and Lopez, J. (2013). On the features and challenges of security and privacy in distributed internet of things.
Computer Networks, 57(10), pp.2266-2279.
3. Sharma, S. and Kishore, K. (2017). Data Dissemination Algorithm using Cloud Services: A Proposed Integrated Architecture Using
IoT. In: 2nd International Conference on Innovative Research in Engineering Science and Technology (IREST-2017). Eternal
University, Baru Sahib, pp.67-70.
4. Kishore, K. and Sharma, S. (2016). Evolution of Wireless Sensor Networks as the framework of Internet of Things- A Review.
International Journal of Emerging Research in Management and Technology, Volume 5, Issue 12.
5. Sharma, S. and Kishore, K. (2017). Internet of Things (IoT): A Review of Integration of Precedent, Existing & Inevitable
Technologies. AGU International Journal of Engineering and Technology, Volume 4, Jan-Jun 2017, e-ISSN: 2455-0442, p-ISSN:
2455-6734.
6. E. Borgia, “The Internet of Things vision: Key Features, Applications and Open Issues”, Computer Communications (2014), doi:
http://dx.doi.org/10.1016/j.comcom.2014.09.008
7. Rolf H. Weber, “Internet of Things- New security and privacy challenges”, Computer Law and Security Review, Elsevier, 23-30, 2010.
8. McKnight, M. (2017). IOT, Industry 4.0, Industrial IOT… Why connected devices are the future of design. KnE Engineering, 2(2),
p.197.
9. Zhen Ling, Junzhou Luo, Yiling Xu, Chao Gao, Kui Wu and Xinwen Fu, “Security Vulnerabilities of Internet of Things: A Case Study
of the Smart Plug System”, IEEE Internet of Things Journal, 2327-4662, 2016, DOI 10.1109/JIOT.2017.2707465
10. Whitelegg, D. (2016). Combating IoT cyber threats. [online] IBM Developer. Available at:
11. https://www.ibm.com/developerworks/library/iot-security-best-practices-iot-apps/ [Accessed 24 Oct. 2017].
12. Eslam Medhat. (2017). Millions of IoT devices are vulnerable to buffer overflow attack - Latest Hacking News. [online] Available at:
13. https://latesthackingnews.com/2017/07/18/millions-of-iot-devices-are-vulnerable-to-buffer-overflow-attack/ [Accessed 8 Nov. 2017].
14. 12. Osborne, C. (2017). A SSHowDowN in security: IoT devices enslaved through 12 year old flaw | ZDNet. [online] ZDNet.
Available at:
15. http://www.zdnet.com/article/a-sshowdown-in-security-iot-devices-attack-devices-through-12-year-old-flaw/ [Accessed 8 Nov. 2017].
16. 13. Hussain, I., Djahel, S., Zhang, Z. and Naït-Abdesselam, F. (2015). A comprehensive study of flooding attack consequences and
countermeasures in Session Initiation Protocol (SIP). Security and Communication Networks, 8(18), pp.4436-4451.
17. 14. Akram, H., Konstantas, D. and Mahyoub, M. (2018). A Comprehensive IoT Attacks Survey based on a Building-blocked
Reference Model. International Journal of Advanced Computer Science and Applications, 9(3).
18. 15. Gupta, S. and Gupta, B. (2015). Cross-Site Scripting (XSS) attacks and defense mechanisms: classification and state-of-the-art.
International Journal of System Assurance Engineering and Management, 8(S1), pp.512-530.
19. 16. Loeb, L. (2016). A Security Protocol for the Internet of Things. [online] Security Intelligence. Available at:
20. https://securityintelligence.com/a-security-protocol-for-the-internet-of-things/ [Accessed 15 Oct. 2017].
21. 17. Li, X., Wang, H., Dai, H., Wang, Y. and Zhao, Q. (2016). An Analytical Study on Eavesdropping Attacks in Wireless Nets of
Things. Mobile Information Systems, 2016, pp.1-10.
22. 18. Sollins, K. (2019). IoT Big Data Security and Privacy vs. Innovation. IEEE Internet of Things Journal, pp.1-1.
23. 19. Gera, J. and Battula, B. (2018). Detection of spoofed and non-spoofed DDoS attacks and discriminating them from flash crowds.
EURASIP Journal on Information Security, 2018(1).
24. 20. Alim, M., Riadi, I. and Prayudi, Y. (2018). Live Forensics Method for Analysis Denial of Service (DOS) Attack on Routerboard.
International Journal of Computer Applications, 180(35), pp.23-30.
25. 21. Čekerevac, Z., Dvorak, Z., Prigoda, L. and Čekerevac, P. (2017). INTERNET OF THINGS AND THE MAN-IN-THE-MIDDLE
ATTACKS – SECURITY AND ECONOMIC RISKS. MEST Journal, 5(2), pp.15-5.
26. 22. Zhou, W., Jia, Y., Peng, A., Zhang, Y. and Liu, P. (2018). The Effect of IoT New Features on Security and Privacy: New Threats,
Existing Solutions, and Challenges Yet to Be Solved. IEEE Internet of Things Journal, pp.1-1.
27. 23. Riahi Sfar, A., Natalizio, E., Challal, Y. and Chtourou, Z. (2018). A roadmap for security challenges in the Internet of Things.
Digital Communications and Networks, 4(2), pp.118-137.
28. 24. Crawley, K. (2017). Internet of Things: Convenient But Insecure. [online] Cylance.com. Available at:
29. https://www.cylance.com/en_us/blog/internet-of-things-convenient-but-insecure.html?aliId=23334118 [Accessed 8 Nov. 2017].
30. 25. Díaz López, D., Blanco Uribe, M., Santiago Cely, C., Vega Torres, A., Moreno Guataquira, N., Morón Castro, S., Nespoli, P. and
Gómez Mármol, F. (2018). Shielding IoT against Cyber-Attacks: An Event-Based Approach Using SIEM. Wireless Communications
and Mobile Computing, 2018, pp.1-18.
31. 26. Tay, C. (2018). The impact of information and communication technologies on bilateral trade in services. International Journal of
Services Operations and Informatics, 9(1), p.40.
32. 27. Ashwin Pal (2017). The Internet of Things (IoT) – Threats and Countermeasures. [online] Cso.com.au. Available at:
33. https://www.cso.com.au/article/575407/internet-things-iot-threats-countermeasures/ [Accessed 12 Nov. 2017].
34. 28. Finley, K., Davis, M., Baker-Whitcomb, A., Newman, L., Greenberg, A. and Eveleth, R. (2019). Half the Web Is Now Encrypted.
That Makes Everyone Safer. [online] WIRED. Available at:
35. https://www.wired.com/2017/01/half-web-now-encrypted-makes-everyone-safer/ [Accessed 22 Mar. 2019].

Authors: Nakul Nagpal, Arun Mittra, Pankaj Agrawal


Paper Title: Hand Motion-Recognition in an Intelligent Communication Module
Abstract: our country India consists of very high population. Almost 9 millions of population in this world can
be counted as a deaf or dumb people or both. We all know that the most valuable gift from the god given to
human is the capability to watch, hear, spoke & to give response as per the situation arises. We all know
communication is one of the most important medium through which one may carve up his/her feelings or
express the information to others. The key points in communication are ability of listening and speak the word
but so many from us are unlucky because they are not gifted by this ability from the god these are deaf & dumb
and people. Now a days so many researches are going on to solve difficulties of these people of our society
because they had to face very hard to communicate with normal person. It is too hard for mute(deaf & dumb)
people to transmit their information to the normal people. As all normal people are not fully trained to
understand different sign lingo, the communication between these two types of people becomes too complex. At
the time emergency or other days whenever a mute (Deaf & Dumb) people are travelling passing a message
(data) becomes too hard. Due to this disability one that has hearing and speaking disability doesn’t want to stand
and face the race with normal person. Since the communication for the mute people is image (Visibility), not
acoustic (Audio). For these mute people Hand motion plays a very part for communication. The data
transmission between mute-deaf & normal people is always a very challenging job. Deaf people make use of
24. sign language or gestures to make understand what he/she trying to say but it is impossible to understand by
hearing people. The admittance to various communication based technologies plays an essential role for these
151-157
(mute) handicapped peoples. Developing a small and compressed gadget for these mute people is a difficult task.
Deaf-Dumb people find a difficulty in communicating with normal people and hence they always stay apart in
their societies. Basically deaf-dumb ones uses various sign language for communication, & they always face lots
of difficulty while communicating with normal people because they all not able to understand sign language
every time. Hence there is always a hurdle in communication between these two type of peoples. There are so
many researches has done in regulate to search a simple and easy way for mute people to communicate with the
normal people and articulate themselves to the rest of the real world. So many improvements have been done in
sign language but all are based on American gesture (sign) Language. Our research work is purely designed to
provide an aid to this deaf-mute by developing and designing a smart communication module which will help to
renovate sign language to text & speech communication with other and to help them lead a life in a much better
way. Our paper represents a static gesture recognition algorithm that will be designed and implemented will be
used in the smart communication system to bridge the communication gap between deaf & dumb and normal
people. If the algorithm is implemented completely it can be can be also used to capture and analyze emotions of
the people in area where high security is desired.

Keywords: Deaf-Dumb, Image processing, Sign language, Gesture, data processing etc.
References:

1. Census 2011. Available from: http://www.censusindia.gov.in/2011census/population_enumeration.html.


2. Yun, L., et al., "A Sign-Component-Based Framework for Chinese Sign Language Recognition Using Accelerometer and sEMG Data",
IEEE Transactions on Biomedical Engineering,, 2012. 59(10): pp. 2695-2704
3. Preetham, C., et al., "Hand Talk-Implementation of a Gesture Recognizing Glove", India Educators' Conference (TIIEC), Texas
Instruments. 2013.
4. Delliraj, M. and S. Vijayakumar, " Design of Smart e-Tongue for the physically challenged people" , International Conference on
Recent Trends in Information Technology (ICRTIT), 2013
5. Begum, S. and M. Hasanuzzaman, " Computer Vision-based Bangladeshi Sign Language Recognition System" , 12th International
Conference on Computers and Information Technology ICCIT '09. . 2009.
6. Chao, S., et al., "Discriminative Exemplar Coding for Sign Language Recognition With Kinect", IEEE Transactions on Cybernetics,,
2013. 43(5): pp. 1418-1428.
7. Chikkanna, M. and R.M.R. Guddeti, " Kinect based real-time gesture spotting using HCRF", International Conference on Advances in
Computing, Communications and Informatics (ICACCI), 2013.
8. Choudhury, A., A.K. Talukdar, and K.K. Sarma, "A Conditional Random Field Based Indian Sign Language Recognition System
under Complex Background ", International Conference on Communication Systems and Network Technologies (CSNT), 2014.
9. Gaolin, F., G. Wen, and Z. Debin, "Large-Vocabulary Continuous Sign Language Recognition Based on Transition-Movement
Models" IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans,, 2007. 37(1): pp. 1-9.
10. Geetha, M., et al. "A vision based dynamic gesture recognition of Indian Sign Language on Kinect based depth images" International
Conference on Emerging Trends in Communication, Control, Signal Processing & Computing Applications (C2SPCA), 2013.
11. Hee-Deok, Y., S. Sclaroff, and L. Seong-Whan, "Sign Language Spotting with a Threshold Model Based on Conditional Random
Fields", IEEE Transactions on Pattern Analysis and Machine Intelligence,, 2009. 31(7): pp. 1264-1277.
12. Shangeetha, R.K., V. Valliammai, and S. Padmavathi, "Computer vision based approach for Indian Sign Language character
recognition", International Conference on Machine Vision and Image Processing (MVIP), 2012.
13. P. Mekala, R. Salmeron, Jeffery Fan, A Davari, J Tan, “Occlusion Detection Using Motion-Position Analysis” IEEE 42nd Southeastern
Symposium, on System Theory (SSST”10), pp: 197-201, 2010.
14. Digital Image Processing Using Matlab by Ganzalez, p: 205. 2009
15. Yang quan, “Chinese Sign Language Recognition Based on Video Swquence Appearance Modeling”, ICIEA, the 5th IEEE
Conference, pp: 1537 – 1542, 2010.
16. Paulraj M. P. Sazali Yaacob, Mohd Shuhanaz bin Zanar Azalan, Rajkumar Palaniappan, “A Phoneme based sign language recognition
system using skin color segmentation”, Signal Processing and its Applications (CSPA) – pp: 1 – 5, 2010.
17. Byong K. Ko and H. S Yang, “Finger mouse and gesture recognition system as a new human computer interface”, pp: 555-561, 1997.
18. Yang quan, “Chinese Sign Language Recognition Based on Video Swquence Appearance Modeling”, ICIEA, the 5th IEEE
Conference, pp: 1537 – 1542, 2010.
19. J. Davis and M. Shah "Visual Gesture Recognition", IEEE Proc.-Vis. Image Signal Process., Vol. 141, No.2, April 1994.
20. Nasser H. Dardas and Nicolas D. Georganas, Real-Time Hand Gesture Detection and Recognition Using Bag-of-Features and Support
Vector Machine Techniques, IEEE Transactions On Instrumentation And Measurement, Vol. 60, No. 11, November 2011.

Authors: Karthik Pandiyan .G, Prabaharan. T

Paper Title: Cryogenic Hardening of EN 19 Alloy Steel


Abstract: This paper includes the study of heat treatment process that we carried out on En 19 steel in
cryogenic atmosphere. Cryogenic treatments of alloy steels have been significantly increase wear resistance and
toughness. These investigations of warmth treatment cryogenic medicines of amalgam steels have been asserted
to altogether expand wear protection and sturdiness. Cryogenic handling is a supplementary procedure to
customary warmth treatment process in steels. The cryogenic treatment on apparatus materials builds the life of
instruments, gear, parts and materials by boosting elasticity, sturdiness and strength. This cryogenic hardening
process is an onetime treatment influencing the whole part — not only the surface. Cryogenic treatment has been
broadly embraced as a cost decrease and execution upgrading innovation. Cryogenic treatment is likewise
utilized as an empowering innovation, when its pressure alleviating benefits are used to allow the manufacture
(or machining) of basic resistance parts. With regards to great outcomes about the use of profound cryogenic
treatment (DCT) on materials, the impact on the microstructure and properties (hardness, strength and the
substance of held austenite) are observed to be made strides. Cryogenic treatment has been distinguished to
improve the properties of Tools steels. It is discovered that cryogenic treatment confers almost 110% change in
apparatus life.
25.
Keywords: Cryogenic atmosphere, Deep cryogenic treatment (DCT).
158-161
References:

1. Akhbarizadeh, A., Golozar, M., Shafeie, A., & Kholghy, M., (2008) “Effects of Austenizing Time on wear behaviour of D6 tool steel
after deep cryogenic treatment” Journal of Iron and Steel Research, Vol. 16, 29-32
2. Baldissera, P., &Delprete, C., (2009) “Effects of deep cryogenic treatment on static mechanical properties of 18NiCrMo5 carburized
steel” Journal of Materials and Design, 30 1435–1440.
3. Bhavar, V., Khot, S., Kattire, P., & Singh, R. (2016) “Integrating deep cryogenic treatment with nitro-carburizing to improve
performance of AISI H-13 tool steel” International Federation of Heat Treatment and Surface Engineering.
4. Chaudhari, B., Shekhawat, P., Ambeprasad, S. & Kushwaha (2012) “Advanced Technology of Cryoprocessing for the Enhancement of
Tool Material Machining Characteristics: A Review” International Journal of Emerging Technology and Advanced Engineering, ISSN
2250-2459, Volume 2, Issue 4.
5. Das, D., Dutta, A. K., & Ray, K. K. (2009) “Optimization of the duration of cryogenic processing to maximize wear resistance of AISI
D2 steel” Cryogenics, 49(5), 176-184.
6. Dhananchezian, M., Kumar, M. P., &Rajadurai, A. (2009) “Experimental investigation of cryogenic cooling by liquid nitrogen in the
orthogonal machining process”
7. Gill, S. “Optimization of cryogenic treatment to minimize the flank wear of AISI M2 high speed steel tools by taguchi technique”
Journal of Engineering Research and Studies E-ISSN0976-7916, JERS, 3, 28-33.
8. He, Y., Yang, K., WenshenQu, Kong, F., &Guoyue Su., (2002) “Strengthening and toughening of a 2800-MPa grade maraging steel”
Materials Letters 56, 763– 769.
9. Idayan, A., Gnanavelbabu, A., &Rajkumar, K., (2014) “Influence of Deep Cryogenic Treatment on the Mechanical Properties of AISI
440C Bearing Steel” Procedia Engineering 97, 1683 – 1691.
10. Ilaiyavel, S., &Sornakumar, T. (2011). “Tool Life Enhancement by Cryogenic Treatment” Journal of Microwave Science and
Technology, 1(1-2).
11. Kaushal, A., Saluja, S. K., &Rawat, R. S. S. (2015) “Effect of Cryogenic Treatment on Tool Steel (AISI D2)” International Journal of
Research in Engineering and Technology, 4(1), 80-383.
12. Khandekar, S., Sankar, M. R., Agnihotri, V., &Ramkumar, J. (2012)0” Nano-cutting fluid for enhancement of metal cutting
performance” Materials and Manufacturing Processes, 27(9), 963-967.
13. Lal, D. M., Renganarayanan, S., &Kalanidhi, A. (2001) “Cryogenic treatment to augment wear resistance of tool and die steels”
Cryogenics, 41(3), 149-155.
14. Liu, S.T., Wu, X.C., Shi, L., Wu, Y.W. and Qu, W. (2015) “Influence of Cryogenic Treatment on Microstructure and Properties
Improvement of Die Steel”. Journal of Materials Science and Chemical Engineering, 3, 37-46.
15. Molinari, A., Pellizzari, M., Gialanella, S., Straffelini, G., &Stiasny, K. H. (2001) “Effect of deep cryogenic treatment on the
mechanical properties of tool steels” Journal of materials processing technology, 118(1), 350-355.
16. Patil, N., Kakkeri, S., &Sangamesh (2014) “Effect of cryogenic treated and untreated tool on its tool life-review” International Journal
of Science and Research (IJSR) Volume 3 Issue 8
17. Pavan, K.M., Sachin, L.S., Mayur, S.,Chandrashekar, A., &Ajaykumar, B.S,(2014). “Effect of Cryogenic Treatment of the Mechanical
and Microstructural Properties of Aluminium Alloys – A Brief Study” International Journal of Mechanical and Production
Engineering, Vol-2
18. Suchmann, P., Jandova, D., &Niznaska, J. (2015) “Deep cryogenic treatment of H11 hot working tool steel” Journal of Achievements
in Materials and Manufacturing Engineering 73/1 21-26.
Authors: Pattabhi Mary Jyosthna, Konala Thammi Reddy

Paper Title: User Prediction in a Role for Secure Data Sharing Through Cloud
Abstract: Nowadays cloud is being used by both individuals and organizations to store and share the data
without establishing their own data center. The outsourcings of these data are becoming a major security issue
for businesses. Searchable encryption is one of the prominent techniques which allow the data owner to securely
store the data and then share the data for their growth in business. With this technique, Cloud Service Provider
can process the user request by searching on encrypted stored data without decrypting the data. In this paper we
analyze different searchable encryption techniques for secure data sharing and their preventive attacks. We also
proposed a method named “User Prediction in Role” to reduce the insider attack possibility in Role Based Data
Sharing (RBDS), which is based on user priority levels in a role. Priorities will be decided by role manager
based on the roles of a user in the organization and also predict the role assignment for new user. The proposed
method can helps the organization to avoid the unauthorized data leakage.

Keywords: cloud store, Data sharing, insider attack, Role based data sharing, Searchable Encryption.

References:

1. D. X. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,” Proceedings of the IEEE Symposium
on Security and Privacy, 2000, pp. 44-55.
2. D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, “Public key encryption with keyword search,” International Conference on
the Theory and Applications of Cryptographic Technique, Springer Berlin Heidelberg, May 2004, pp. 506-522.
3. D. Thilakanathan, S. Chen, S. Nepal, and R. A. Calvo, “Secure data sharing in the Cloud,” Security, Privacy and Trust in Cloud
System, 2014, pp. 45-72, Springer Berlin Heidelberg.,
4. V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine- grained access control of encrypted data,”
Proceedings of the 13th ACM conference on Computer and communications security, OCT. 2006, pp. 89-98.
26. 5. A. Kumbhare, Y. Simmhan, and V. Prasanna, “Cryptonite: a secure and performant data repository on public clouds,” IEEE 5th
International Conference on Cloud Computing, June 2012, pp. 510-517.
6. Q. Tang, “Nothing is for free: security in searching shared and encrypted data,” IEEE Transactions on Information Forensics and 162-166
Security, vol. 9, no. 11, Nov. 2014, pp. 1943-1952.
7. Q. Zheng, S. Xu, and G. Ateniese, “VABKS: verifiable attribute-based keyword search over outsourced encrypted data,” Infocom,
2014 proceedings IEEE, April 2014, pp. 522-530.
8. R. Chen, Y. Mu, G. Yang, F. Guo, and X. Wang, “Dual-server public-key encryption with keyword search for secure cloud storage,”
IEEE transactions on information forensics and security, vol. 11, no. 4, 2016, pp. 789-798.
9. J. K. Liu, K. Liang, W. Susilo, J. Liu, and Y. Xiang, “Two-factor data security protection mechanism for cloud storage system,” IEEE
Transactions on Computers, vol. 65, no. 6, 2016, pp. 1992-2004.
10. B. Cui, Z. Liu, and L. Wang, “Key-aggregate searchable encryption (KASE) for group data sharing via cloud storage,” IEEE
Transactions on computers, vol. 65, no. 8, 2016, pp. 2374-2385.
11. W. Sun, S. Yu, W. Lou, Y. T. Hou, and H. Li, “Protecting your right: verifiable attribute-based keyword search with fine-grained
owner-enforced search authorization in the cloud,” IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 4, 2016, pp.
1187-1198.
12. Z. Shen, J. Shu, and W. Xue, “Keyword Search with Access Control Over Encrypted Cloud Data,” IEEE Sensors Journal, vol. 17, no.
3, 2017, pp. 858-868.
13. Y. Zhu, H. X. Hu, G. J. Ahn, H. X. Wang, and S. B. Wang, “Provably secure role-based encryption with revocation mechanism,”
Journal of Computer Science and Technology, vol. 26, no. 4, May 2011, pp. 697-710.
14. L. Zhou, V. Varadharajan, and M. Hitchens, “Enforcing role-based access control for secure data storage in the cloud,” The Computer
Journal, vol. 54, no. 10, 2011, pp. 1675-1687.
15. L. Zhou, V. Varadharajan, and M. Hitchens, “Achieving secure role-based access control on encrypted data in cloud storage,” IEEE
transactions on information forensics and security, vol. 8, no. 12, Dec. 2013, pp. 1947-1960.
16. Y. Zhu, G. J. Ahn, H. Hu, D. Ma, and S. Wang, “Role-based cryptosystem: A new cryptographic RBAC system based on role-key
hierarchy,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 12, 2013, pp. 2138-2153.
17. L. Zhou, V. Varadharajan, and M. Hitchens, “Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data
Storage,” IEEE Trans. Information Forensics and Security, vol.10, no. 11, Nov. 2015, pp. 2381-2395.
18. L. Zhou, V. Varadharajan, and K. Gopinath, “A secure role-based cloud storage system for encrypted patient-centric health records,”
The Computer Journal, vol. 59, no. 11, 2016, pp. 1593-1611.
19. J. Tang, Y. Cui, Q. Li, K. Ren, J. Liu, and R. Buyya, “Ensuring security and privacy preservation for cloud data services,” ACM
Computing Surveys (CSUR), vol. 49, no. 1,2016, p. 13.
20. R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, “Role-based access control models,” IEEE Computer, vol. 29, no. 2,
1996, pp. 38-47.
21. H. Zhu, L. Wang, H. Ahmad, and X. Niu, “Key-Policy Attribute-Based Encryption with Equality Test in Cloud Computing,” IEEE
Access, vol. 5, 2017, pp. 20428-20439.
22. Q. Wang, L. Peng, H. Xiong, J. Sun, and Z. Qin, “Ciphertext-Policy Attribute-Based Encryption With Delegated Equality Test in
Cloud Computing,” IEEE Access, vol. 6, 2018, pp. 760-771.
23. J. Sun, X. Zhu, and Y. Fang, “A privacy-preserving scheme for online social networks with efficient revocation,” INFOCOM, 2010
Proceedings IEEE , March 2010, pp. 1-9.
24. Holger Schulze. (2018 Report). Insider Threat [Online]. Available: https://www.ca.com/content/dam/ca/us/files/ebook/insider-threat-
report.pdf
25. A. Sahai, and B. Waters, “Fuzzy identity-based encryption,” Annual International Conference on the Theory and Applications of
Cryptographic Techniques , Springer, Berlin, Heidelberg, May 2005, pp. 457-473.
26. J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute-based encryption,” IEEE symposium on security and privacy
(SP'07), May 2007, pp. 321-334.
27. R. Sandhu, D. Ferraiolo, and R. Kuhn,” The NIST model for role-based access control: towards a unified standard,” ACM workshop
on Role-based access control, Vol. 10, July 2000, No. 344287.344301.

Authors: M.V. Madhuri, N. Ravi Shankar


Evaluation and Selection of Supplier in A Supply Chain Management using DEA-TOPSIS Methods
Paper Title:
Under Intuitionistic Fuzzy Environment
Abstract: Selection of efficient supplier is essential in a Supply Chain Management. It increases product
quality, reduces wastage and saves time. In recent past, many methods were used in supplier selection process.
Selection of efficient supplier that suits the manufacturer criteria is needed. The proposed method comprises of
two stages that integrates Data Envelopment Analysis (DEA) and Technique for Order Preference by Similarity
to Ideal Solution (TOPSIS). The efficiency of the given set of suppliers is evaluated using DEA method in the
first stage that filters the given list of suppliers. While in the second stage, TOPSIS method is applied to select
one of the efficient suppliers shortlisted in first stage. Integration of two methods reduces the selection time.
Since the data provided and the criteria considered are vague and imprecise in nature, decision making is done in
intuitionistic fuzzy environment. The proposed methodology is demonstrated with a numerical illustration.

Keywords: Decision making; Data Envelopment Analysis; TOPSIS, Intuitionistic fuzzy numbers; Supply
Chain Management.

References:

1. De Boer, Luitzen, Eva Labro, and Pierangela Morlacchi. "A review of methods supporting supplier selection." European journal of
purchasing & supply management 7.2 (2001): 75-89.
2. Dickson, Gary W. "An analysis of vendor selection systems and decisions." Journal of purchasing 2.1 (1966): 5-17.
3. Chai, Junyi, James NK Liu, and Eric WT Ngai. "Application of decision-making techniques in supplier selection: A systematic review
of literature." Expert systems with applications 40.10 (2013): 3872-3885
4. Farrell, Michael James. "The measurement of productive efficiency." Journal of the Royal Statistical Society: Series A (General) 120.3
(1957): 253-281.
5. Charnes, Abraham, William W. Cooper, and Edwardo Rhodes. "Measuring the efficiency of decision-making units." European journal
of operational research 2.6 (1978): 429-444.
6. Friedman, Lea, and Zilla Sinuany-Stern. "Scaling units via the canonical correlation analysis in the DEA context." European Journal of
Operational Research 100.3 (1997): 629-637.
27. 7. Soteriou, Andreas C., and Yiannos Stavrinides. "An internal customer service quality data envelopment analysis model for bank
branches." The International Journal of Bank Marketing 18.5 (2000): 246-252.
8. Ramanathan, Ramakrishnan. "Operations assessment of hospitals in the Sultanate of Oman." International Journal of Operations & 167-172
Production Management 25.1 (2005): 39-54.
9. De Koster, M. B. M., Bert M. Balk, and W. T. I. Van Nus. "On using DEA for benchmarking container terminals." International
Journal of Operations & Production Management 29.11 (2009): 1140-1155.
10. Bessent, A. M., Bessent, E. W., Charnes, A., Cooper, W. W., & Thorogood, N. C.. "Evaluation of educational program proposals by
means of DEA." Educational Administration Quarterly 19.2 (1983): 82-107.
11. Tomkins, Cyril, and Rodney Green. "An experiment in the use of data envelopment analysis for evaluating the efficiency of UK
university departments of accounting." Financial Accountability & Management 4.2 (1988): 147-164.
12. Johnes, Jill, and Geraint Johnes. "Research funding and performance in UK university departments of economics: a frontier
analysis." Economics of Education Review 14.3 (1995): 301-314.
13. Sinuany-Stern, Z., A. Mehrez, and A. Barboy. "Academic departments efficiency via DEA." Computers & Operations Research 23.5
(1996): 513-513.
14. Puri, Jolly, and Shiv Prasad Yadav. "Intuitionistic fuzzy data envelopment analysis: An application to the banking sector in India."
Expert Systems with Applications 42.11 (2015): 4982-4998.
15. Toloo, Mehdi, and Soroosh Nalchigar. "A new DEA method for supplier selection in presence of both cardinal and ordinal data."
Expert Systems with Applications 38.12 (2011): 14726-14731
16. Hwang, Ching-Lai, and Kwangsun Yoon. “Multiple attribute decision making methods and applications a state-of-the-art survey”. Vol.
186. Springer Science & Business Media, 2012.
17. Chen, Chen-Tung, Ching-Torng Lin, and Sue-Fn Huang. "A fuzzy approach for supplier evaluation and selection in supply chain
management." International journal of production economics 102.2 (2006): 289-301.
18. Boran, Fatih Emre, Serkan Genç, Mustafa Kurt, and Diyar Akay. "A multi-criteria intuitionistic fuzzy group decision making for
supplier selection with TOPSIS method." Expert Systems with Applications 36.8 (2009): 11363-11368.
19. Wang, Ying-Ming, and Ying Luo. "On rank reversal in decision analysis." Mathematical and Computer Modelling 49.5-6 (2009):
1221-1229.
20. Lotfi, F. Hosseinzadeh, R. Fallahnejad, and N. Navidi. "Ranking efficient units in DEA by using TOPSIS method." Applied
Mathematical Sciences 5.17 (2011): 805-815.
21. Chitnis, Asmita, and Omkarprasad S. Vaidya. "Efficiency ranking method using DEA and TOPSIS (ERM-DT): case of an Indian
bank." Benchmarking: An International Journal 23.1 (2016): 165-182.
22. Doyle, John, and Rodney Green. "Efficiency and cross-efficiency in DEA: Derivations, meanings and uses." Journal of the operational
research society 45.5 (1994): 567-578.
23. Zhu, Joe. "Super-efficiency and DEA sensitivity analysis." European Journal of operational research 129.2 (2001): 443-455.
24. Goncharuk, Anatoliy G. "Benchmarking for investment decisions: a case of food production." Benchmarking: An International Journal
18.5 (2011): 694-704.
25. B. Pardha saradhi, M.V. Madhuri, N. Ravi Shankar: “Ordering of Intuitionistic Fuzzy Numbers Using Centroid of Centroids of
Intuitionistic Fuzzy Number.” International journal of Mathematics Trends and Technology 52 (2017):2231-5373.
26. Atanassow K.T. Intuitionistic Fuzzy Sets. Fuzzy Sets and Systems, 20, (1986): 87-96.
27. Zadeh, Lotfi A. "Fuzzy sets." Information and control 8.3 (1965): 338-353.
28. Mahapatra, G. S., and T. K. Roy. "Reliability evaluation using triangular intuitionistic fuzzy numbers arithmetic operations." World
Academy of Science, Engineering and Technology 50 (2009): 574-581.

Authors: K.Padmavathi, A.V.Senthilkumar

Paper Title: A Proposed Method for Prediction of Membranous Nephropathy Disease


Abstract: Kidney disease is the most prevailing problem in today's world. Gathering knowledge through data
analyzing is called data mining which can be widely used in healthcare industry. Medical data mining plays an
important role in prediction of the disease. Nephrotic disease is the most challenging disease in day to day life.
Membranous nephropathy disease is caused by the immune system of the body. An antibody called PlA2R is
found in the kidney. When this antibody reacts with the antigen it causes the disease MN .Patients can lose 10-
20gm of protein per day and experience severe disability. Membranous nephropathy is of two types, primary
MN and secondary MN .Prediction of PLA2R antibodies plays an important role in Membranous Nephropathy.
In this paper it is proposed to analyze the PLA2R antibodies in the patient over a period of time. Based upon the
analysis of primary MN prediction can be done. Hypothesis is established in monitoring the PLA2R antibody
and it will help in diagnosis and subsequent treatment of the disease Membranous Nephropathy (MN).

Keywords: Membranous Nephropathy (MN),anti-PLA2R,Nephrotic Syndrome, Kaplan Meier method.

References:
28.
1. Artur Q. B. da Silva, Taina V. de Sandes-Freitas, Juliana B. Mansur, Jose Osmar Medicina-Pestana, Gianna Mastroianni-Kirsztajn.
2. "Clinical Presentation, Outcomes, and Treatment of Membranous Nephropathy after Transplantation", International Journal of 173-176
Nephrology, 2018.
3. Shannon Murphy, “Division of Nephrology and Hypertension, NC
Kidney Center”, September 2018.
4. Andrew S. Bomback C. Fervenza, “Membranous
Nephropathy:Approaches to Treatment”, American Journal of
may 2108.
5. Rajiv D. Poduval, Michelle A. Josephson, and BasitJavaid,“Treatment of De Novo and Recurrent Membranous Nephropathy in Renal
Transplant Patients”, Seminars in Nephrology, Vol 23, No 4 (July), 2003: pp 392-399.
6. Tripti Singh, Brad Astor, WeixiongZhong, Didier Mandelbrot,ArjangDjamali, and Sarah Panzer , “Kidney Transplant Recipients With
PrimaryMembranous Glomerulonephritis Have a HigherRisk of Acute Rejection Compared With OtherPrimaryGlomerulonephritides”,
Kidney transplantation,2017.
7. T. S. Dabadea, J. P. Grande b, S. M. Norbyb,F. C. Fervenza b and F. G. Cosio , “Recurrent Idiopathic Membranous Nephropathy After
Kidney Transplantation: A Surveillance Biopsy Study”,American Journal of Transplantation 2008.
8. Maurizio Salvadori, “New Aspects on Pathogenesis and Treatmenof Membranous Glomerulopathy”, Archives of Nephrology, Volume
1, Issue 1, 2018, PP: 28-35
9. An S. De Vriese, Richard J. Glassock, Karl A. Nath,SanjeevSethi,and Fernando C.Fervenza, “A Proposal for a Serology-Based
Approach toMembranous ephropathy”,www.jasn.org,2016.
10. Ludmila I. Kuncheva (2004).Combining Pattern Classifiers: Methods and Algorithms. John Wiley and Sons.[10] J. Kittler, M. Hatef,
Robert P.W. Duin, J. Matas (1998). On combining classifiers.IEEE Transactions on Pattern Analysis and Machine Intelligence.
20(3):226-239.

Authors: Swetha P, Mohanram S

Paper Title: Brain Tumour Segmentation Based on SFCM using Back Propagation Neural Network
Abstract: Magnetic Resonance image (MRI) is predominant in clinical application. MRI used in diagnostic
and therapeutic applications and it is pain free treatment. Blur boundaries in high resolution medical resonance
image, the tumour segmentation and classification is very hard. In identification method brain tumour is used to
upgrade the accuracy and reduce the analysis time. The tumour tissues classified into four they are normal,
begin, premalignant and malignant. In MR images, the amount of data is high to explain and analysis. In current
years, segmentation of tumour in magnetic resonance image has essential in research field of clinical imaging.
Exact shape, size and location of tumour can diagnose. The diagnostic method contain four stages, pre-
processing, feature extraction, classification and segmentation.
29.
Keywords: Digital image processing, Magnetic resonance image, Spatial fuzzy c-means clustering, Back
propagation neural network, Raspberry pi. 177-179

References:

1. S.P.Awate and Whitaker, R. T., "Multiatlas segmentation as nonparametric regression," IEEE transactions on medical imaging, vol.33,
pp. 1803-1817, 2014.
2. Brain Tumour segmentation using K-Means and fuzzy C-means clustering algorithm International journal of computer science and
information technology research excellence,vol.3 No.2
3. Haibo Wang, Angel CruzRoa, Ajay Basavanhally, Hannah Gilmore, “Cascaded ensemble of convolutional neural network (Vol. 9041).
[90410B], Feb 16 2014
4. M. G. Hart, Price, S. J., and Suckling, J., “Analysis for pre-operative brain mapping in neurosurgery,"British journal of neurosurgery,
vol. 30, pp. 506-517, 2016.
5. Bjoern H. Menze, Koen Van Leemput, Danial Lashkari., “Segmenting glioma in multi-model image using a generative model for brain
lesion segmentation”.,14th International Conference, in Toronto, Canada (pp.18-22)., sep.2011
6. R. C. Gonzalez and Woods, R. E., "Digital image processing prentice hall," UpperSaddleRiver,NJ,2002.
7. Z. Tang and Fan, Y., "Groupwise image registration guided by a dynamic digraph of images," Neuroinformatics, vol. 14, pp. 131-145,
2016.
8. S.Bauer et al., “A survey of MRI-based medical image analysis for brain tumor studies,” Physics in medicine and biology, no. 13, pp.
97–129, 2013.
9. Karen Simonyan & Andrew Zisserman., “Very deep convolutional networks for large-scale image recognition” Cornel university, 10
Apr2015.

Authors: Leelavathy iG, iDeepthi iJoseph

Paper Title: Scalable Video Streaming over Wireless Access iNetworks


Abstract: Cloud itransmission iservices iprovide ia icapable, iflexible, iand iscalable ia iseries iof icalculations
imethod iand ioffer ian ielucidation ifor ithe iuser idemands iof ihigh iquality iand irange iof ihypermedia
isystem. iGenerally ispeaking, iaccessing ihypermedia isystem ivideo iservices ithrough ia ilarge isystem iis ino
ilonger ia iproblem. iThe imajor ivideo iplatforms, isuch ias iYoutube iand iAmazon, ihave igood imanagement
istyles iand iprovide iusers ito ishare iusing imore ithan ione imedium ivideos ieasily iwith ienlarge iservices.

Keywords: iSVC ialgorithm, iSVM ialgorithm.

References:

1. Kamal iGakhar, iMounir iAchir, iAnnie iGravey. iHow imany itraffic iclasses ido we ineed iin iWiMAX[C] iIEEE iWireless
iCommunications iand iNetworking The iconference, iHong iKong, iChina, i2007, ipp.3706–3711.
30. 2. iWang iZai-Jian iYu-Ning iDong, iXinheng iWang. iA iDynamic iService iClass Mapping iScheme ifor iDifferent iQoS iDomains
iUsing iFlow iAggregation i[J]. IEEE iSystems iJournal, ivol. iPP, iIssue. i99, ipp.1-12, i2014. 180-183
3. iMehdi iAlasti, iBehnam iNeekzad, iJie iHui, iRath iVannithamby. iQuality iof service iin iWiMAX iand iLTE inetworks i[J]. iIEEE
iCommunications iMagazine, vol.48, ino.5, ipp.104-111, i2010
4. iSung-Ho iYoon, iJun-Sang iPark, iMyung-Sup iKim, iChaeTae iLim, iJunHyung Cho. iBehavior isignature ifor ibig idata itraffic
iclassification i[J]. i2014 iInternational Conference ion iBig iData iand iSmart iComputing i(BIGCOMP), iChatrium iHotel Riverside
iBangkok, iThailand, ipp.261-266, i2014.
5. iNatalia iM. iMarkovich, iUdo iR. iKrieger. istatistical ianalysis iand imodeling iof peer-to-peer imultimedia itraffic i[J]. iNext
Generation iInternet, iLNCS i5233, Springer-Verlag iBerlin iHeidelberg, ipp.70-97, i2011.
6. iYanjiao iChen, iKaishun iWu, iQian iZhang. iFrom iQoS ito iQoE: iA iTutorial ion Video iQuality iAssessment i[J]. iIEEE
iCommunications iSurveys i& iTutorials, vol.17, ino.2, i2015.
7. iZhang iJun, iChen iChao, iXiang iYang, iZhou iWanlei, iXiang iYong. IInternet Traffic iClassification iby iAggregating iCorrelated
iNaive iBayes iPredictions i[J]. IEEE iTransactions ion iInformation iForensics iand iSecurity, ivol. i8, ino. i1, ipp. i5-15, i2013.
8. Sumit iMaheshwari, iSudipta iMahapatra, iC.S. iKumar, iK. iVasu. iA ijoint parametric iprediction imodel ifor iwireless iinternet
itraffic iusing iHidden iMarkov Model i[J]. iWireless iNetworks, ivol.19, ino.6, ipp.1171-1185, iAugust i2013.
9. Li iQun, iZhang iHonggang, iGuo iJun, iB. iBhanu, iAn iLe. iReference-Based Scheme iCombined iWith iK-SVD ifor iScene iImage
iCategorization i[J]. Iieee Signal iProcessing iLetters, ivol.20, ino.1, ipp.67-70, i2013.
10. Gold iS. iHacking ion ithe ihoof i[J]. iEngineering iand iTechnology, ivol.7, ino.3,pp.80-83, i2012.

Authors: T.Rajasekaran, Sumathi Eswaran, A.Rengarajan, T.V.Ananthan


Traffic sign and Obstacle detection in Vehicular Ad-Hoc Network (VANET) using HOG and Haar
Paper Title:
Classifier Techniques
Abstract: Wireless technology is progressing faster with time. People are doing research these days generally
in the field of Wireless communication. VANET is the most developing exploration territory in remote
correspondence. With the headway and development of the VANET, there will be an incredible upheaval in the
field of telecommunication regarding quick handovers, arrange accessibility, security, wellbeing with the
utilization of cutting edge applications and so on. VANET innovation is progressing with the progression of time
however there are numerous issues that must be routed to make the system more overwhelming. In this paper we
have proposed an effective mechanism for object detection in highways using Neural Networking and proving
driver assistance to enhance the existing system to the next level as Intelligent Transportation System.

Keywords: Vehicular Ad-hoc Network (VANET), Intelligent Transportation System(ITS), Convolution Neural
Networks(CNN), Object detection, HOG and Haar Classifier.
31.
References:
184-186
1. Reza Javadzadeh1, Ehsan Banihashemi, and Javad Hamidzadeh , "Fast Vehicle Detection and Counting Using Background Subtraction
Technique and Prewitt Edge Detection " , International Journal of Computer Science and Telecommunications [Volume 6, Issue 10,
November 2015.
2. Xiaofeng Lu, Takashi Izumi, Tomoaki Takahashi, "Moving vehicle detection based on fuzzy background subtraction" , Fuzzy Systems
(FUZZ-IEEE), 2014 IEEE International Conference on 6-11 July 2014.
3. N. Dalal and B. Triggs, “Histograms of oriented gradients for human detection,” in Proc. IEEE Int. Conf. Comput. Vis. Pattern
Recognit., San Diego, CA, USA, 2005, pp. 886–893.
4. G. Wang, G. Ren, Z. Wu, Y. Zhao, and L. Jiang, “A hierarchical method for traffic sign classification with support vector machines,”
in Proc. IEEE Int. Joint Conf. Neural Netw., Dallas, TX, USA, 2013, pp. 1–6.
5. F. Zaklouta, B. Stanciulescu, and O. Hamdoun, “Traffic sign classification using K-d trees and random forests,” in Proc. IEEE Int.
Joint Conf. Neural Netw., San Diego, CA, USA, 2011, pp. 2151–2155.
6. J. Greenhalgh and M. Mirmehdi, “Real-time detection and recognition of road traffic signs,” IEEE Trans. Intell. Transp. Syst., vol. 13,
no. 4, pp. 1498–1506, Dec. 2012.
7. K. Lu, Z. Ding, and S. Ge, “Sparse-representation-based graph embedding for traffic sign recognition,” IEEE Trans. Intell. Transp.
Syst., vol. 13, no. 4, pp. 1515–1524, Dec. 2012.
8. Arun Varghese, G. Sreelekha, "Background subtraction for vehicle detection," Communication Technologies (GCCT), 2015 Global
Conference on 23-24 April, 2015.
9. K Y. Iwasaki and H. Itoyama, "Real-time Vehicle Detection Using Information of Shadows Underneath Vehicles," in Advances in
Computer, Information, and Systems Sciences, and Engineering, K. Elleithy, et al., Eds., ed: Springer Netherlands, 2006, pp. 94-98.
10. D.Y. Huang, et al., "Reliable moving vehicle detection based on the filtering of swinging tree leaves and raindrops," J. Vis. Comun.
Image Represent., vol. 23, pp. 648-664, 2012.
11. Zhang K, Zhang Z, Li Z. Joint face detection and alignment using multitask cascaded convolutional networks [J], IEEE signal
Processing Letters, 2016, 23(10):1499-1503.
12. Mandal B. Face recognition: Perspectives from the real world [C], IEEE 2016 14th International Conference on Control, Automation,
Robotics and Vision (ICARCV), pp. 1-5, 13-15 Nov. 2016, Phuket, Thailand.
13. D. Chen, S. Ren, Y. Wei, X. Cao, and J. Sun. Joint cascade face detection and alignment. In Computer Vision–ECCV 2014. 2014.
14. M. Everingham, L. V. Gool, C. K. I. Williams, J. Winn, and A. Zisserman. The pascal visual object classes (voc) challenge, 2009.
15. P. F. Felzenszwalb, R. B. Girshick, D. McAllester, and D. Ramanan. Object detection with discriminatively trained partbased models.
Pattern Analysis and Machine Intelligence, IEEE Transactions on, 2010
16. Kaehler A, Bradski G, Learning OpenCV 3 [M], O’reilly Media, Inc., 2016, Sebastopol, CA 95472, USA.
17. B. Bilgic, B.K.P. Horn, and I. Masaki, “Fast human detection with cascaded ensembles on the GPU,” IEEE Intelligent Vehicles
Symposium, pp. 325–332, June 2010.
18. q. zhu, m.c. yeh, k.t. cheng, and s. avidan, “fast human detection using a cascade of histograms of oriented gradients,” ieee conference
on computer vision and pattern recognition, pp. 1491– 1498, june 2006.

Authors: Shruti Jain, D.S. Chauhan


Standard Multiple Regression Analysis Model for Cell Survival/ Death Decision of JNK Protein
Paper Title:
Using HT-29 Carcinoma Cells
Abstract: Signaling by the JNK protein has been studied for more than decades with various previous reviews
covering more specific aspects. For estimating the relationship among variables a statistical technique called
Regression analysis (RA) is used. RA is used to determine the correlation among two or more variables. In this
paper, a multiple regression analysis is used to assess the most significant contribution of JNK protein using ten
different concentrations of TNF, EGF, and Insulin that control the survival/ apoptosis response of HT-29 human
colon carcinoma cells. The data is analyzed using Statistica software. Data normality and the outliers were
checked by visual method (histograms, box plot and Q-Q plot). Descriptive statistics (mean and standard
deviation) and correlation matrix (correlation and covariance between variables) are used to get the best
concentration. Standard regression analysis is used to make a model through which analysis of variance,
regression coefficient & correlation coefficients were analysed and based on the p-value we come to know that
100-0-500 yields the best concentration level which helps in the analysis the cell survival/ apoptosis of JNK
protein that was validated by variable importance plot.

Keywords: Regression analysis, correlation, covariance, standard deviation, JNK.

References:

1. A Dhiman, A Singh, S Dubey, S Jain, “Design of Lead II ECG Waveform and Classification Performance for Morphological features
using Different Classifiers on Lead II ”,Research Journal of Pharmaceutical, Biological and Chemical Sciences,7(4), 1226- 1231:
2016.
2. S Bhusri , S Jain, J Virmani , “Classification of breast lesions using the difference of statistical features” Research Journal of
32. Pharmaceutical , Biological and Chemical Sciences,7 (4), 1365-1372: July- Aug 2016
3. S Sharma, S Jain, S Bhusri, “Two Class Classification of Breast Lesions using Statistical and Transform Domain features”, Journal of
Global Pharma Technology ,9(7), pp 18-24, 2017. 187-197
4. A. V. Alvarenga, A. F. C. Infantosi, W. C. A. Pereira, and C. M. Azevedo, “Assessing the performance of morphological parameters in
distinguishing breast tumors on ultrasound images,” Medical engineering & physics, vol. 32, no. 1, pp. 49–56, 2010
5. SJain, “Classification of Protein Kinase B Using Discrete Wavelet Transform”, International Journal of Information Technology,
10(2), 211-216, 2018.
6. S Jain. “System Modeling of AkT using Linear and Robust Regression Analysis “, Current Trends in Biotechnology and Pharmacy, 12
(2), 177-186, April 2018.
7. S Jain, “Regression modeling of different proteins using linear and multiple analysis”, Network Biology. 7(4), 80-93, 2017.
8. S Jain, “Implementation of Marker Proteins Using Standardized Effect”, Journal of Global Pharma Technology (JGPT), 9(5), 22-27:
2017.
9. Li Yanglong et al. Journal of Shandong Foreign Languages Teaching. 2013(2):56-51.
10. Bao Gui. Foreign Languages. 2012.28(4):63-68.
11. Wang Zongying et al. Journal of Basic English Education. 2011.13(5):7-15.
12. Ma Hongxiang. English Square·Academic research. 2013(31).
13. Qiu qiufen et al. Journal of Hunan Institute of Humanities, Sciences and Technology. 2013(2):102-105.
14. Gaudet S., Kevin J.A., John A.G., Emily P.A., Douglas L.A, and Peter S.K., “A compendium of signals and responses trigerred by
prodeath and prosurvival cytokines’, Manuscript M500158-MCP200, 2005.
15. S Jain. 2012, Communication of signals and responses leading to cell survival / cell death using Engineered Regulatory Networks. PhD
Dissertation, Jaypee University of Information Technology, Solan, Himachal Pradesh, India.
16. S Jain, D. S. Chauhan, “ Computational Analysis of MK2 protein for HT Carcinoma Cells using Pre-Processing and Characterization
Techniques for Cell Death/ Survival ”, Journal of Global Pharma Technology (JGPT), 10(11),13-19: 2018.
17. S Jain, “Classification of Mitogen Activated Protein Kinase using Different Wavelet Transforms (Discrete and Gabor)”, Asian Journal
of Microbiology, Biotechnology and Environmental Sciences. 20(2), 569-574, 2018. UGC No : 8799
18. J. T. McClave, and T. Sincich, (2006). Statistics (10th edition). Upper Saddle River, NJ: Pearson Prentice Hall.
19. A. C., Tamhane, and D. D. Dunlop, (2000). Statistics and Data Analysis: From Elementary to Intermediate (1st edition). Upper Saddle
River, NJ: Pearson Prentice Hall.
20. S Jain, “Detection of Arrhythmia using Automatic Differentiation Method”, International Research Journal of Natural and Applied
Science, 5(7), 9-24, 2018.

Authors: Deepti Kulkarni, Nagaraju Bogiri

Paper Title: Sentiment Analysis for Tweets using Patterns and Strategies to Detect the Genuineness of Tweets
Abstract: Sentiment analysis related with distinguishing and classifying opinions or sentiments expressed in
given text. Social media is completing a colossal quality of wealthy knowledge within the type of tweets,
standing updates, diary posts etc. Sentiment analysis of this user generated knowledge is incredibly helpful in
knowing the opinion of the gang. Twitter sentiment analysis is troublesome compared to general sentiment
analysis thanks to the presence of slang words and misspellings. Knowledge base approach and Machine
learning approach square measure the 2 methods used for analyzing sentiments from the text. Public and private
opinion a few wide range of subjects’ square measure expressed and unfold frequently via numerous social
media. Twitter offers organizations quick and effective thanks to analyze customers' view toward the crucial to
success within the market place. Developing a program for sentiment analysis is an approach to be accustomed
computationally live customers' perceptions. This project cognitive content together with varied patterns for
tweets along a side multiple strategies to discover the sentiment class expressed in a very tweet and if a tweet is
real or not. We proposed work to classify sentiments of tweets from people to determine if people are happy,
sad, angry, etc. about particular topic. Also the purpose of the work is to check genuineness of tweets so that
rumors about any topics can be detected and mitigated. This approach can be used in various fields further as
like detecting people sentiment about particular social issues. Also fake tweets and rumors which may further
exploit to social issues like riots, religion complexities can be removed. To achieve these goals and fetch tweets
we used Twit4j API and various techniques such as NLP, TF-IDF, and Sentiment Classifications are applied to
get results accordingly. We had maintained our own database of words for dictionary purpose as well as have
been used OpenApache NLP with their predefined dictionaries.

Keywords: NLP Sentiment analysis, machine learning, influence of tweets, POS.

References:
33.
1. MondherBouazizi and TomoakiOhtsuki, “A Pattern-Based Approach for Multi-Class Sentiment Analysis in Twitter”, pp. 2169-3536 on 198-202
August 2017
2. Beakcheol Jang and Jungwon Yoon “Characteristics Analysis of Data from News and Social Network Services” , pp. 2169-3536 on
March 2018
3. Hai Tan & Jun Zhang, “Multi-Strategy Sentiment Analysis of Consumer Reviews Based on Semantic Fuzziness”, pp. 2169-
3536onApril 2018
4. MondherBouazizi and TomoakiOhtsuki, “A Pattern-Based Approach for Multi-Class Sentiment Analysis in Twitter”, 2169-3536 on
August 2017
5. Aldo Hernández, Victor Sanchez “Security Attack Prediction Based on User Sentiment Analysis of Twitter Data”, May 2016
6. ManjuVenugopalan and Deepa Gupta “Exploring Sentiment Analysis on Twitter Data”, on Aug. 2015
7. Rincy Jose and Varghese S Chooralil “Prediction of Election Result by Enhanced Sentiment Analysis on Twitter Data using Word
Sense Disambiguation”, on Nov. 2015
8. Anurag P. Jain and Mr. Vijay D. Katkar “Sentiments Analysis ofTwitter Data Using Data Mining”, pp.978-1-4673-7758-4 on Dec.
2015
9. Gaurav D Rajurkar and Rajeshwari M Goudar “A speedy data uploading approach for Twitter Trend and Sentiment Analysis using
HADOOP” , pp. 978-1-4799-6892-3 on Feb. 2015
10. Ahmed TalalSuliman, Khaled Al Kaabi, “Event Identification and Assertion from Social Media Using Auto-Extendable Knowledge
Base”, pp. 2161-4407 on July 2016
11. MohdFazil and Muhammad Abulaish, “A Hybrid Approach for Detecting Automated Spammers in Twitter”, on Nov. 2018.
12. Yan Zhang and Weiling Chen, “Detecting Rumors on Online Social Networks Using Multi-layer Autoencoder”, on June 2017.
Authors: K. Sireesha, G. Chakravarthy

Paper Title: An Efficient Load Balanced Strategy for LTE-WLAN


Abstract: With each very little cell LTE and Wi-Fi systems accessible as selections for causing in
unauthorised teams (quite five GHz), the examination regarding their concurrence could be a theme of dynamic
intrigue, primarily determined by business gatherings. 3GPP has as lately institutionalized LTE authorized
assisted Access (LTE-LAA) that tries to form LTE a lot of conjunction unthreatening with Wi-Fi by fusing
comparative detective work and back-off highlights. Regardless, the outcomes displayed by business bunches
provide very little accord on important problems like separate system parameter settings that advance
"reasonable access" PRN by 3GPP. Answers to such key framework causing angles, thusly, need valid
diagnostic models, on that there has been very little advancement so far. In like manner, in one in every of the
most work of its type, we have a tendency to build up another system for assessing the outturn of Wi-Fi and
LTELAA in concurrence things by means that of affordable changes to the discovered Bianchi [1] model.

34. Keywords: Wi-Fi, LTE-LAA, 5GHz Unlicensed band Coexistence.

References: 203-208

1. G. Bianchi, “Performance Analysis of the IEEE 802.11 Distributed Coordination Function,”


2. Journal of Selected Area Communications , vol. 18, no. 3, pp. 535–547, Sep. 2006.
3. FCC, “Revision of Part 15 of the Commission’s Rules to Permit Unlicensed National Information Infrastructure (U-NII) Devices in the
5GHz Band,” in F e d e r al C o m m u nic a tio n s C o m mis sio n , Feb 2013.
4. ETSI, “Broadband radio access networks (BRAN); 5 GHz high performance RLAN; harmonized EN covering the essential
requirements of article 3.2 of the R&TTE directive,” EN 301 893, V1.7.1 , June 2012.
5. “http://www.lteuforum.org.” in LTE-U Forum .
6. 3GPP, “3rd Generation Partnership Project; Technical Specification Group Radio Access Network; Study on Licensed-Assisted Access
to Unlicensed Spectrum,” 3GPP TR 36.889, V13.0.0 , June 2015.
7. ETSI, “LTE; Evolved Universal Terrestrial Radio Access (E-UTRA); Physical layer procedures,” ETSI TS 136 213, V13.1.1, Release
13 , May 2016
8. R. Kwan et al, “Fair co-existence of Licensed Assisted Access LTE (LAA-LTE) and Wi-Fi in unlicensed spectrum,” in 7th Computer
Science and Electronic Engineering Conference (CEEC) , Sept 2015, pp. 13–18.
9. F. M. Abinader, E. P. L. Almeida, F. S. Chaves, A. M. Cavalcante, R. D. Vieira, R. C. D. Paiva, A. M. Sobrinho, S. Choudhury, E.
Tuomaala, K. oppler, and V. A. Sousa, “Enabling the coexistence of LTE and Wi-Fi in unlicensed bands,” IEEE Communications
Magazine , vol. 52, no. 11, pp. 54–61, Nov 2014.
10. M. Cavalcante, E. Almeid D. Vieira, S. Choudhury, E. Tuomaala, K. Doppler, F. Chaves, “Performance Evaluation of LTE and Wi-Fi
Coexistence in Unlicensed Bands,” in IE E E 7 7 t h V e hic ula r Technology Conference
11. N Jindal “LTE and Wi-Fi in Unlicensed Spectrum: A Coexistence Study,” in Google white paper , Feb 2013.
12. Y. Jian, “Coexistence of Wi-Fi and LAA-LTE: Experimental evaluation, analysis and insights,” in IE E E Workshop , June 2015, pp.
2325– 2331.
13. S. Han, Y.-C. Liang, Q. Chen, and B.-H. Soong, “Licensed-assisted access for LTE in unlicensed spectrum: A MAC protocol design,”.

Authors: Mandar D. Sontakke, Meghana Kulkarni


KNN Classification Based Nonlinear Noise Delineation in Color Image using Optimized BM3D
Paper Title:
Filter
Abstract: Image enhancement using optimized methods along with optimized filters is need of current era. A
novel technique is proposed in this paper, which have KNN based pixels classifications strategy. This
classification is used to identify noise level and only noisy pixels are processed using optimized BM3D using
particle swarm optimization. The outside group pixels are brought back into group thereby removing the noise.
The process is further followed by resolution enhancement and Retinex for dynamic presentation purpose. The
experimentation results are also included in the paper which shows optimum performance .

Keywords: KNN, PSO, nonlinear noise delineation BM3D, Resolution enhancement, Retinex.

References:

1. D. R. K. Brownrigg, The Weighted Median Filter, Commun. ACM 27(8), 807, 1984.
2. O. Yli–Harja, J. Astola, Y. Neuvo, "Analysis of the properties of median and weighted median filters using threshold
3. logic and stack filter representation", IEEE T. Signal Process. 39(2), 395, 1991.
4. S. J. KO, Y. H Lee, Center Weighted Median Filters and Their Applications to Image Enhancement, IEEE T. Circuit. Syst. 38(9), 984,
2001.
5. T. Chen, H. R. Wu, Adaptive Impulse Detection Using Center Weighted Median Filters, IEEE Signal Precess. Lett. 8(1), 1, 2001.
35. 6. V. Crnojevic, V. Senk, Z. Trpovski, Advanced impulse Detection based on Pixel- Wise MAD, IEEE Signal Process. Lett. 11(7), 589,
2004.
7. T. Chen, K. K. Ma, L. H. Chen, Tri- state median filter for image de noising, IEEE T. Image Process. 8(12), 1834, 1999.
8. Xiaoyin Xu, Eric L. Miller, Dong bin Chen and Mansoor Sarhadi, “ Adaptive Two-Pass Rank Order Filter to removeImpulse Noise in 209-213
Highly Corrupted Images”, IEEE Trans Image Processing,Vol.13,No.2, PP.238-247, February 2004.
9. A. Buades, B. Coll, and J. M. Morel, .A review of image denoising algorithms, with a new one,. Multiscale Modeling and Simulation,
vol. 4, no. 2, pp. 490.530, 2005.
10. P. Chatterjee and P. Milanfar, .Clustering-based denoising with locally learned dictionaries,. IEEE Trans. Image Process., 2008,
accepted for publication.
11. K. Dabov, A. Foi, V. Katkovnik, and K. Egiazarian, .Image denoising by sparse 3D transform-domain collaborative Þltering,. IEEE
Trans. Image Process., vol. 16, no. 8, pp. 2080.2095, August 2007.
12. A nonlocal and shape-adaptive transform-domain collaborative Þltering,. in Proc. Local and Nonlocal Approx. in Image Process.,
Lausanne, Switzerland, September 2008.
13. Spatially adaptive support as a leading model-selection tool for image Þltering,. in Proc. WITMSE, Tampere, Finland, August 2008.
14. M. Elad and M. Aharon, "Image denoising via sparse and redundant representations over learned dictionaries", IEEE Trans. on Image
Process., vol. 15, no. 12, pp. 3736.3745, December 2006.
15. A. Foi, V. Katkovnik, and K. Egiazarian, "Pointwise Shape-Adaptive DCT for high-quality denoising and deblocking of grayscale and
color images", IEEE Trans. Image Process., vol. 16, no. 5, pp. 1395.1411, May 2007.
16. Pei-Eng Ng and Kai-Kuang Ma, “A Switching Median Filter with BDND for Extremely Corrupted Images”, IEEE Trans Image
Processing, Vol. 15, No. 6, PP. 1506-1516, June 2006
17. Mandar D Sontakke, Meghana Kulkarni, "IMAGE NOISE REMOVAL WITH EXTENSION TO BM3D", International Journal for
Control Theory and Applications, International Science Press, 2016
18. Image dataset link: https://ani.stat.fsu.edu/~abarbu/Research/T3i_Aligned.rar
19. M. D. Sontakke and M. S. Kulkarni, "Multistage combined image enhancement technique," 2016 IEEE International Conference on
Recent Trends in Electronics, Information & Communication Technology (RTEICT), Bangalore, 2016, pp. 212-216. doi:
10.1109/RTEICT.2016.7807814.
Authors: K.T. Shivaram, N. Mahesh Kumar, S.M. Nikitha, R.G. Swathi
Numerical Integration of Arbitrary Function over Multidimensional Cubes using Haar Wavelet
Paper Title:
Method
Abstract: In this paper, we investigate numerical integration of arbitrary function over multidimensional
cubes by using quadrature method, Haar wavelet method has been used to describe method for multiple integral
problems, the high accuracy and wide applicability of the Haar wavelet approach will be illustrated several
numerical examples.

Keywords: Numerical integration, Haar wavelet, multiple integral, n-dimensional cube.


36.
References:
214-217
1. A.H. Stroud, Approximate calculation of multiple integrals, Prentice-Hall. 1971
2. K.J. Bathe, Finite Element Procedures, Prentice Hall, Inc. Englewood Cliffs, N.J 1996.
3. H.T. Rathod and K.V. Nagaraja, Gauss Legendre quadrature over a triangle, J. Indian Inst. Sci., 84, 2004, pp. 183- 188.
4. M.S. Islam and M.A. Hossain , Numerical integrations over an arbitrary quadrilateral region. Appl Math , Comput, 210, 2009, pp.
515–524
5. T.M. Mamatha and B. Venkatesh , Gauss quadrature rules for numerical integration over a standard tetrahedral element by
decomposing into hexahedral elements. Appl Math Comput 271, 2015, pp. 1062–1070
6. K.T. Shivaram, N. Mahesh kumar, Megha.V. Goudar A new approach for evaluation of volume integrals by Haar wavelet method,
International Journal of innovative technology and exploring engineering, 8, 2019, pp. 2262-2266
7. K.T. Shivaram, H.N. Umashankar and H.S. Raghavendra prajwal, Optimal wavelet based approach for n-dimensional integrals over
bounded and unbounded regions by chebyshev wave let method, DOI 10.1109/CESYS.2018.8723926, IEEE, pp.1034-1036
8. Fengying Zhou, Xiaoyong Xu, Xijing Zhang, Numerical integration method for triple integrals using the second kind chebyshev
wavelets and Gauss – Legendre quadrature, Comp. Appl. Math, 2017, pp. 1-26
9. T.W.Sag, and G. Szekeras, Numerical Evaluation of High– Dimensional integrals, Math. Comp. 18, 1964, pp. 245-253
10. Paulvan and Ridder, An adaptive algorithm for numerical integration over an n-dimensional cube, Journal of computational and
applied mathematics, 2, 1976, pp. 207-217
11. A.C, Genz and A.A. Malik, Remarks on algorithm An adaptive algorithm for numerical integration over an N-dimensional
rectangular region, International, Journal. of Applied mathematics 6, 1980, pp. 295-302
12. J. Sarada and K.V. Nagaraja, Numerical Integration over n-dimensional cubes using Generalised Gaussian quadrature, Proceedings of
the Jangjeon Mathematical society, 17, 2014, pp. 63-69
13. Siraj-ul-Islam and Aziz, Fazal-e-Haq, A comparative study of numerical integration based on Haar wavelets and hybrid functions,
Comput. Math. Appl., 2010, pp. 2026 –2036
14. Aziz, Siiraj-ul-Islam and W. Khan, Quadrature rules for numerical integration based on Haar wavelets and hybrid functions, Comput.
Math. Appl. 2011, pp. 2770 - 2781
15. K.T. Shivaram and H.T. Prakasha, Numerical Integration of Highly Oscillating Functions Using Quadrature Method, Global Journal
of Pure and Applied Mathematics,2016, 3, 2683 – 2690
16. K.T. Shivaram, Generalised Gaussian Quadrature Rules over an arbitrary Tetrahedron in Euclidean Three- Dimensional Space
International Journal of Applied Engineering Research Vol..8, 2013, pp. 1533-1538.

Authors: Kamaljit Singh, Khushpreet Singh, Aditiya Kumar Tiwary

Paper Title: Fire Exposure Behavior of CFST Column


Abstract: From the past numerous years Concrete Filled Steel Tubes (CFST) segments are progressively
utilized in the structures on account of their high burden bearing limit. In CFST sections the solid is encased in a
steel tube that gives formwork to solid which aides in continuing the nearby clasping of the steel. Additionally,
composite sections will add more solidness to the structure when contrasted with the ordinary segments. This
paper displays the Fire Exposure Behavior of CFST sections and the temperature in the diesel heater is pursued
by the ISO-834 standard flame bend. The example was chilled off for 24 hours at room temperature in the wake
of warming. During the cooling period of the example the weakening of solid happens. At long last, the quality
estimation of CFST sections is tried under Universal Testing Machine (UTM). The examination centers around
the quality properties of the roundabout CFST sections in the wake of being presented to a very controlled
temperature in the diesel heater.

Keywords: Temperature, CFST columns, Universal Testing Machine, Stiffness.

References:

1. Ding J, Wang YC. Realistic modelling of thermal and structural behaviour of unprotected concrete filled tubular columns in fire. J
37. Constr Steel Res 2008;64:1086–102.
2. Espinos A, Romero ML, Hospitaler A. Advanced model for predicting the fire response of concrete filled tubular columns. J Constr
Steel Res 2010;66:1030–46. 218-223
3. ISO-834. Fire resistance tests—elements of building construction. Geneva: International Standard ISO 834; 1975.
4. Hong S, Varma AH. Analytical modeling of the standard fire behavior of loaded CFT columns. J Constr Steel Res 2009;65:54–69.
5. Han LH, Zhao XL, Yang YF, Feng JB. Experimental study and calculation of fire resistance of concrete-filled hollow steel columns. J
Struct Eng 2003;129 (3):346–56.
6. Journal of Structural Engineering, ASCE 2007;133(6):800–14.
7. Han LH, Lin XK. Tests on cyclic behavior of concrete-filled HSS columns after exposure to ISO-834 standard fire. Journal of
Structural Engineering, ASCE 2004;130(11):1807-19.
8. Han LH, Yang H, Cheng SL. Residual strength of concrete filled RHS stub columns after exposure to high temperatures. Advances in
Structural Engineering—An International Journal 2002;5(2):123–34.
9. Han LH, Yang YF, Yang H, Huo JS. Residual strength of concrete-filled RHS columns after exposure to the ISO-834 standard fire.
Thin-Walled Structures 2002;40(12):991–1012.
10. Huo JS, Huang GW, Xiao Y. Effects of sustained axial load and cooling phase on post-fire behaviour of concrete-filled steel tubular
stub columns. Journal of Constructional Steel Research 2009;65(8–9):1664–76.
11. Romero ML, Moliner V, Espinos A, Ibañez C, Hospitaler A. Fire behaviour of axially loaded slender high strength concrete-filled
tubular columns. J Constr Steel Res 2011;67:1953–65.
12. Renaud C, Aribert JM, Zhao B. Advanced numerical model for the fire behavior of composite columns with hollow steel section. Steel
Comp Struct 2003;3 (2):75–95.
13. Schaumann P, Kodur V, Bahr O. Fire behaviour of hollow structural section steel columns filled with high strength concrete. J Constr
Steel Res 2009;65:1794–802.
14. Yang H, Han LH, Wang YC. Effects of heating and loading histories on postfire cooling behaviour of concrete-filled steel tubular
columns. Journal of Constructional Steel Research 2008;64(5):556–70.
15. Zha XX. FE analysis of fire resistance of concrete filled CHS columns. J Constr Steel Res 2003;59:769–79.

Authors: Kasi Rekha, Potharaju Malasani

Paper Title: Response of Recycled Brick Aggregate Concrete to High Temperatures


Abstract: The abundant availability of demolition waste from construction industry is leading towards a
significant problem of disposal, land and air pollution. The natural aggregate resources are also depleting due to
development of construction activities. An attempt is made in this study to convert this waste into wealth by
substituting the recycled brick from demolition waste to granite aggregate in production of the concrete. The
granite aggregate (GA) is replaced with recycled brick aggregate (RBA) by 25% of its weight to produce M15
and M20 grades of concrete. The granite aggregate concrete (GAC) and recycled brick aggregate concrete
(RBAC) were subjected to different temperatures between 100 to 1000oC for a duration of 3 hours and the
mechanical properties such as compressive strength and flexural strength were examined to assess its fire
performance. The response of RBAC is better than GAC at each temperature. The study revealed that the
residual strength increases with the increase in grade of concrete at all temperatures.
Keywords: granite aggregate concrete, recycled brick aggregate concrete, mechanical properties, response,
high temperatures, demolition waste.

References:

1. Utilization of waste from construction industry, a survey conducted by Technology information, Forecasting and assessment council,
2001. http://tifac.org.in/index.php?option=com_content&id=710&Itemid=2 05v
2. Katz, A. (2003), Properties of concrete made with recycled aggregate froth partially hydrated old concrete, Cement and Concrete
Research, Vol. 33(5), pp. 703 -711.
3. Poon C. S., Shui Z. H., Lam, L., Fok H., Kou S. C. (2004), Influence of moisture states of natural and recycled aggregates on the slump
and compressive strength of concrete, Journal on Concrete and Cement Research, Vol.34, pp.31-36.
4. Etxeberria M., Vázquez E., Marí A., Barra M. (2007), Influence of amount of recycled coarse aggregates and production process on
properties of recycled aggregate concrete, Journal of Cement and Concrete Research, Vol.37, pp.735–742.
5. Tam V.W.Y., Gao X.F., Tam C.M. (2005), Micro structural analysis of recycled aggregate concrete produced from two-stage mixing
approach, Cement and Concrete Research, Vol.35, pp. 1195- 1203.
6. Khalaf F.M., Devenny A.S. (2005), Properties of new and recycled clay brick aggregates for use in concrete. Journal of materials in
civil engineering, Vol.17, No.4, 457-464.
38. 7. Farid Debib, Said Kenai (2008), The Use of Coarse and Fine Crushed Bricks as an Aggregate in Concrete, Construction and Building
Materials, Vol.22, pp. 886-893.
8. Cachim P.B. (2009), “Mechanical Properties of Brick Aggregate Concrete”, Construction and Building Materials, Vol. 23, pp. 1292- 224-227
1297.
9. Yang J., Qiang Du, Yiwang Bao (2011), Concrete with recycled concrete aggregate and crushed clay bricks. Construction and Building
Materials, Vol. 25, 1935-1945.
10. Khalaf F.M., Devenny A.S. (2004), Performance of Brick Aggregate Concrete at High Temperatures. Journal of Materials in Civil
Engineering Research, Vol. 16:6, pp. 556-565.
11. Chi Sun Poon and Dixon Chan (2006), Feasible use of recycled concrete aggregates and crushed clay brick as unbound road sub-base,
Construction and Building Materials, 20, 578-585.
12. Zhao Xiao, Tung-Chai Ling, Chi-Sun Poon, Shi-Cong Kou, Qingyuan Wang, Runqiu Huang (2013), Properties of partition wall blocks
prepared with high percentages of recycled clay brick after exposure to elevated temperatures, Construction and Building Materials,
Vol. 49, pp 56-61.
13. Rekha K, Potharaju M, Residual Compressive Strength of Recycled Brick Aggregate Concrete at High Temperatures, Volume 5, Issue
1, pp 159-164, (2015).
14. IS: 1489: 1991 (part 1), “Specification for Portland pozzolana cement”, Bureau of Indian Standards, New Delhi.
15. IS: 10262 -2009 “Indian Standard , Mix design Procedure”, Bureau of Indian Standards, New Delhi.
16. IS: 516-1959-“Method of test for strength of concrete”, Bureau of Indian Standards, New Delhi.
17. I.S:10086-1982-“Specifications for moulds for use in tests of cement and concrete”, Bureau of Indian Standards, New Delhi.
18. IS: 3025-1986(part: 22 and 23) -“Material of sampling and test(physical and chemical) for water and waste water”, Bureau of Indian
Standards, New Delhi.
19. IS: 383-1970-“Specification for coarse and fine aggregate from natural sources for cement”, Bureau of Indian Standards, New Delhi.
20. IS: 7246-1974-“Recommendations for use of table vibrations for consolidating concrete”, Bureau of Indian Standards, New Delhi.G. O.
Young, “Synthetic structure of industrial plastics (Book style with paper title and editor),” in Plastics, 2nd ed. vol. 3, J. Peters, Ed.
New York: McGraw-Hill, 1964, pp. 15–64.

Authors: Sushreeta Tripathy


Performance Evaluation of Several Machine Learning Techniques Used in the Diagnosis of
Paper Title:
Mammograms
Abstract: Throughout the world breast cancer has become a common disease among the women and it is also
a life threatening diseases. Machine learning(ML) approach has been widely used for the diagnosis of benign
and malignant masses in the mammogram. In this manuscript, I have represented the theoretical research and
practical advances on various machine learning techniques the diagnosis of benign and malignant masses in the
mammogram. The objective of this manuscript is to analyze the performance of distinct machine learning
techniques used in the diagnosis of the Digital Mammography Image Analysis Society (MIAS) database. In this
work I have compared performance of four machine learning approaches i.e. Support Vector, Naive Bayes, K-
Nearest Neighbours and Multilayer Perceptron. The above four types of machine learning algorithm are used to
categorize mammograms image. The achievements of these four techniques were recognized to discover the
most acceptable classifier. On the end of the examine, derived outcomes indicates that support vector is a
successful approach compares to other approach.
39.
Keywords: Breast Cancer, K-Nearest Neighbours (KNN), Multi Layer Perceptron(MLP), Malignant, Naive
Bayes(NB),Support Vector Machine (SVM). 228-232

References:

1. http://www.breastcancerindia.net/statistics/trends
2. https://www.google.com/breastcancerinIndia
3. G. Agarwal, and P. Ramakant. (2008). Breast cancer care in India: the current scenario and the challenges for the future. Breast care,
3(1), 21-27.
4. C. H. Lee, D. D. Dershaw, D. Kopans, P. Evans, B. Monsees, D. Monticciolo, and E. Hendrick. (2010). Breast cancer screening with
imaging: recommendations from the Society of Breast Imaging and the ACR on the use of mammography, breast MRI, breast
ultrasound, and other technologies for the detection of clinically occult breast cancer. Journal of the American college of radiology,
7(1), 18-27.
5. A. Jemal, F. Bray, M. M. Center, J. Ferlay, E.Ward, and D. Forman, (2011). Global cancer statistics. CA: a cancer journal for
clinicians, 61(2), 69-90.
6. C. DeSantis, J. Ma, L. Bryan, and A. Jemal. (2014). Breast cancer statistics, 2013. CA: a cancer journal for clinicians, 64(1), 52-
62.
7. T. C. André, and R. M . Rangayyan. (2006). Classification of breast masses in mammograms using neural networks with shape, edge
sharpness, and texture features. Journal of Electronic Imaging, 15(1), 013019.
8. Y. Wang, J. Li, and X. Gao. (2014). Latent feature mining of spatial and marginal characteristics for mammographic mass
classification. Neurocomputing, 144, 107-118.
9. J. A. Baker, P. J. Kornguth, J. Y. Lo, M. E. Williford, and C. E. Floyd Jr. (1995). Breast cancer: prediction with artificial neural
network based on BI-RADS standardized lexicon.
10. 10.M. P. Sampat, M. K. Markey, and A. C. Bovik. (2005). Computer-aided detection and diagnosis in mammography. Handbook of
image and video processing, 2(1), 1195-1217.
11. D. C. Edwards, M. A. Kupinski, R. Nagel, R. M. Nishikawa, and J. Papaioannou. (2000). Using a Bayesian neural network to
optimally eliminate false-positive microcalcification detections in a CAD scheme. Digital Mammography, Medical Physics
Publishing, Madison, 168-173.
12. I. El-Naqa, Y. Yang, M. N. Wernick, N. P. Galatsanos, and R. M. Nishikawa. (2002). A support vector machine approach for
detection of microcalcifications. IEEE transactions on medical imaging, 21(12), 1552-1563.
13. S. Tripathy, T. Swarnkar. “A Comparative Analysis on Filtering Techniques Used in Pre- processing of Mammogram Image
(Accepted for publication),” Springer, to be published.
14. B. Verma, and P. Zhang. (2007). A novel neural-genetic algorithm to find the most significant combination of features in
digital mammograms. Applied soft computing, 7(2), 612-625
15. P. Valarmathi, and S. Robinson. (2016). An improved neural network for mammogram classification using genetic optimization.
Journal of Medical Imaging and Health Informatics, 6(7), 1631-1635.
16. H. D. Cheng, X. Cai, X. Chen, L. Hu, and X. Lou. (2003). Computer-aided detection and classification of microcalcifications in
mammograms: a survey. Pattern recognition, 36(12), 2967-2991
17. J. Tang, R. M. Rangayyan, J. Xu, I. El Naqa, and Y. Yang. (2009). Computer-aided detection and diagnosis of breast cancer with
mammography: recent advances. IEEE Transactions on Information Technology in Biomedicine, 13(2), 236-251.
18. A. N. Tosteson, N. K. Stout, D. G. Fryback, S. Acharyya, B. A. Herman, L. G. Hannah, and E. D. Pisano. (2008). Cost-
Effectiveness of Digital Mammography Breast Cancer Effectiveness of Digital Mammography. Annals of internal medicine,
148(1), 1-10.
19. A. M. Khuzi, R. Besar, and W. W. Zaki. (2008). Texture features selection for masses in mammogram. In 4th Kuala Lumpur
International Conference on Biomedical Engineering 2008 (pp. 629-632). Springer, Berlin, Heidelberg
20. S. Tripathy, T. Swarnkar, “ Unified Preprocessing and EnhancementTechnique for Mammogram Images,” unpublished.Y. B. Youssef,
E. Abdelmounim, J. Zbitou, M. Elharoussi, and M. N. Boujida. (2017). Comparison Machine Learning Algorithms i Abnormal
Mammograms Classification. IJCSNS, 17(5), 19.
21. J. P. Suckling. (1994). The mammographic image analysis society digital mammogram database. Digital Mammo, 375-386.
22. A. A. Nahid, and Y. Kong. (2017). Involvement of Machine Learning for Breast Cancer Image Classification: A Survey.
Computational and Mathematical Methods in Medicine, 2017.
23. Y. Rejani, and S. T. Selvi. (2009). Early detection of breast cancer using SVM classifier technique. arXiv preprint
arXiv:0912.2314.
24. S. Taheri, and M. Mammadov. (2013). Learning the naive Bayes classifier with optimization models. International Journal of Applied
Mathematics and Computer Science, 23(4), 787-795.
25. S. Taheri, M. Mammadov, and S. Seifollahi. (2015). Globally convergent algorithms for solving unconstrained optimization
problems. Optimization, 64(2), 249-263.
26. S. Zhang, D. Cheng, Z. Deng, M. Zong, and X. Deng. (2018). A novel kNN algorithm with data-driven k parameter computation.
Pattern Recognition Letters, 109, 44-54.
27. S. Tripathy, and S. Hota. (2012). A survey on partitioning and parallel partitioning clustering algorithms. In International Conference
on Computing and Control Engineering (Vol. 40).
28. G. Panchal, A. Ganatra, Y. P. Kosta, and D. Panchal. (2011). Behaviour analysis of perceptrons with multiple hidden neurons and
hidden layers. International Journal of Computer Theory and Engineering, 3(2), 332-337.
29. M. Kanchanamani, and V. Perumal. (2016). Performance evaluation and comparative analysis of various machine learning techniques
for diagnosis of breast cancer. Biomedical Research, 27(3).

Authors: Dwipen Laskar, Naba Jyoti Sarmah, Anjana Kakoti Mahanta


SCI-Tree: An Incremental Algorithm for Computing Support Counts of all Closed Intervals from
Paper Title:
an Interval Dataset
Abstract: Interval data mining is used to extract unknown patterns, hidden rules, associations etc. associated in
interval based data. The extraction of closed interval is important because by mining the set of closed intervals
and their support counts, the support counts of any interval can be computed easily. In this work an incremental
algorithm for computing closed intervals together with their support counts from interval dataset is proposed.
Many methods for mining closed intervals are available. Most of these methods assume a static data set as input
and hence the algorithms are non-incremental. Real life data sets are however dynamic by nature. An efficient
incremental algorithm called CI-Tree has been already proposed for computing closed intervals present in
dynamic interval data. However this method could not compute the support values of the closed intervals. The
proposed algorithm called SCI-Tree extracts all closed intervals together with their support values incrementally
from the given interval data. Also, all the frequent closed intervals can be computed for any user defined
minimum support with a single scan of SCI-Tree without revisiting the dataset. The proposed method has been
40. tested with real life and synthetic datasets and results have been reported.

Keywords: Data mining, Interval data, Closed Interval, Support Count, Minimum Support. 233-242

References:

1. N. Sarmah, A. K. Mahanta, “An Incremental Approach for mining all Closed Intervals from an Interval Database”, IEEE International
Advance Computing Conference (IACC), pp. 529-532, Feb 2014.
2. J. F. Alen, “Maintaining Knowledge about Temporal I ntervals”, Communication of the ACM, Vol.26, Nov 1983.
3. Po-shan Kam, Ada Wai-chee Fu, “Discovering Temporal Patterns for Interval-based Events”, Proceedings of the second International
Conference on Data Warehousing and Knowledge Discovery, p. 317-326, 2000.
4. S. Wu and Y. Chen, "Mining nonambiguous temporal patterns for interval-based events," IEEE Transactions on Knowledge and Data
Engineering, vol. 19, no. 6, pp. 742-758, June 2007.
5. R. Villafane, K. Hua, D. Tran, B. Maulik, “Knowledge Discovery from Series of Interval Events,” Journal of Intelligent Information
Systems, vol. 15, no. 1, pp. 71-89, 2000.
6. R. Villafane, K. Hua, D. Tran, B. Maulik, “Mining Interval Time-series,” Data Warehousing and Knowledge Discovery, pp. 318-330,
1999.
7. D. Patel, W. Hsu, M. Lee, “Mining Relationships Among Interval-based Events for Classification,” Proceedings of the 2008 ACM
SIGMOD International Conference on Management of Data, pp. 393-404, 2008.
8. Yi-Cheng Chen, Wen-Chih Peng, Suh-Yin Lee, “CEMiner – An Efficient Algorithm for Mining Closed Patterns from Interval-based
Datasets”, 11th IEEE International Conference on Data Mining, 2011.
9. J. Lin, “Mining Maximal Frequent Intervals”, Proceedings of 2003 ACM symposium on Applied Computing, p.426-431, ACM, New
York, 2003.
10. N. Pasquier, Y. Bastide, R. Taouil, L. Lakhal, “Discovering Frequent Closed Itemsets for Association Rules” In Proc. of 7th
International Conference on Database Theory (ICDT’ 99), pages 398-416, Jerusalem Israel, Jan 1999.
11. A. K. Mahanta, M. Dutta, “Mining Closed Frequent Intervals from Interval Data”, International Journal of Applied Science and
Advance Technology, Vol.1, pp.1-3, January-June 2012.
8. M. Dutta, “Development of Efficient Algorithms for Some Problems in Interval Data Mining,” Ph.D thesis, Gauhati University, 2012.

Authors: Sunil Kumar k, P L Srinivasa Murthy

Paper Title: Effect of Retrogression and Re-Aging on Fatigue Crack Growth Behavior of Al 7075 Alloy
Abstract: In this activity I used very familiarly known as two steps heat treatment called RRA is applied on AL
7075 alloy to examine the fatigue behavior. this process includes the various stages of heat treatments includes,
annealing, high temperature pre-precipitation, artificial aging (T6), retrogression and re-aging. The specimens
are initially heated to 473o & then quenched in water medium .the specimens are further heated to 18hr, 22hr,
26hr respectively .after this specimens are heated 230o, 250o, 270o, 290o with different time intervals 7 & 14
min respectively to enhance the strength of the material this process we call it as retrogression and re-aging .after
this conducted experiment and came to know that by using RRA method we can increase the strength of the
material to maximum extent.

Keywords: AA 7075alloy, heat treatments, fatigue behavior.

References:

1. Lendvai, J. Precipitation and strengthening in aluminium alloys. Mater. Sci. Forum 1996,217, 43–56. [CrossRef]
2. Zandbergen, M.W.; Cerezo, A.; Smith, G.D.W. Study of precipitation in Al–Mg–Si Alloys
3. by atom probetomography II. Influence of Cu additions. Acta Mater. 2015, 101, 149–158. [CrossRef]
4. Miao,W.F.; Laughlin, D.E. Effects of Cu content and preaging on precipitation characteristics in aluminum alloy 6022. Metal. Mater.
Trans. A 2000, 31, 361–371. [CrossRef]
5. Rana, R.S.; Purohit, R.; Das, S. Reviews on the influences of alloying elements on the microstructure and mechanical properties of
41. aluminum alloys and aluminum alloy composites. Int. J. Sci. Res. Publ. 2012, 2, 1–7.
6. Grohmann, T. Forming of AMAG 7xxx series aluminium sheet alloys. In Proceedings of the New Developments in Sheet Metal
Forming and New Developments in Hydroforming, Fellbach, Germany, 10–11 May 2016. 243-247
7. Zhong, H.; Paul, R.; Yuri, E. Effect of alloy composition and heat treatment on mechanicalperformance of 6xxx aluminum alloys.
Trans. Nonferrous Met. Soc. China 2014, 24, 2174–2178. [CrossRef] Metals 2018, 8, 1023 10 of 10 Ringer, S.P.; Hono, K.
Microstructural evolution and age hardening in aluminium alloys: Atom probe field-ion microscopy and transmission electron
microscopy studies. Mater. Charact. 2000, 44, 101–131. [CrossRef]
8. ASTM International. Standard Test Method for Dynamic Young’s Modulus, Shear
9. Modulus, and Poisson’s Ratio by Impulse Excitation of Vibration; ASTM International: West Conshohocken, PA, USA, 2002.
10. Giménez, S.; Vleugels, J.; Van der Biest, O. In situ investigation of dewaxing and sintering of stainless-steel powder compacts by
impulse excitation. Scr. Mater. 2008, 58, 985–988. [CrossRef]
11. Heinz, S.; Eifler, D. Crack initiation mechanisms of Ti6Al4V in the very high cycle fatigue regime. Int J. Fatigue 2016, 93, 301–308.
[CrossRef]
12. Hansen, N. The effect of grain size and strain on the tensile flow stress of aluminium at room temperature. Acta Metall. 1977, 25, 863–
869. [CrossRef]
13. Hansen, N. Hall–Petch relation and boundary strengthening. Scr. Mater. 2004, 51, 801– 806. [CrossRef]
14. Kouzeli, M.; Mortensen, A. Size dependent strengthening in particle reinforced aluminium. Acta Mater. 2002, 50, 39–51. [CrossRef]
15. Yonenaga, I.; Motoki, K. Yield strength and dislocation mobility in plastically deformed bulk single-crystal GaN. J. Appl. Phy. 2001,
90, 6539–6541. [CrossRef]
16. Fleischer, R.L. Rapid solution hardening, dislocation mobility, and the flow stress of crystals. J. Appl. Phy. 1962, 33, 3504–3508.
[CrossRef]
17. Chai, G.; Zhou, N. Study of crack initiation or damage in very high cycle fatigue using ultrasonic fatigue test and microstructure
analysis. Ultrasonics 2013, 53, 1406–1411. [CrossRef] [PubMed]
18. Zuo, J.H.; Wang, Z.G. Han. E.H. Effect of microstructure on ultra-high cycle fatigue behavior of Ti–6Al–4V. Mater. Sci. Eng. A 2008,
473, 147–152. [CrossRef]
19. Ahn, D.G.; Amanov, A.; Cho, I.S.; Shin, K.S.; Pyoun, Y.S.; Lee, C.S.; Park, I.G. Gigacycle fatigue behavior by ultrasonic
nanocrystalline surface modification. J. Nanosci. Nanotechnol. 2012, 12, 5902–5906. [CrossRef] [PubMed] © 2018.

Authors: A. V. Devrukhkar, Y. V. Thorat, Sachin Chavan

Paper Title: Manufacturing and Testing of PAN Nano Fibres, Banana Epoxy Nanocomposite
Abstract: Over past few decades composite materials, ceramics and plastics have been leading emerging
materials. The applications of composite material and the area in which they are being used is growing day by
day. The curiosity has gained substantially towards the use of natural fibres in composites in recent few decades.
Natural fibre composites are eco-friendly and often used in engineering application such as in construction,
automobile, aerospace and household applications. Nano fibres are responsible for a connection between the
Nano scale and the macro scale, since their diameters are in the nanometre range and the length is continuous.
Nanofibre are attracting very high interest due to their extraordinary micro and Nano structural characteristics,
high porosity, mechanical strength, Flexibility and integrally large total surface area. There is increased curiosity
about natural fibre based epoxy composites properties to short out engineering necessities. Hence, a matter of
concern to overview and check the exiting position and put efforts for sustainable and possible commercial
exploitation and additional improvements. This research work shows comparison of strengths with and without
added Nano fibres to the Banana fibres composite. Testing data clearly indicates the enhancement in mechanical
properties when Nano fibres are added in to Natural fibre reinforced composite.
Keywords: Natural fiber composite, Nanocomposite, PAN Nanofiber.

References:

1. Ashby, M. Bush, S. M. Khan, Advance material and predictive design and discussion, Philosophical Transaction of Royal Society, 382,
393-497 (1987).
2. Ali Hallal, Ahmed Elmarakbi, Ali Shaito and Hicham El-Hage, Overview of Composite Materials and their Automotive Applications,
JWST372-c01, September 19, 2013.
3. Deniel, I. M., Ishai, O. Engineering mechanics of composite materials, Oxford University Press, Second Edition, 1-62. (2006).
4. Standard terminology for composite materials, ASTM International, USA, ASTM D 3878-07.
5. Tushar Kumbhar, Manufacturing and characterization of sustainable natural fibre composite road divider, M.Tech. Thesis of
BVDUCOE,Pune (2018).
42. 6. Boopalan, M., Niranjana, M., Umapathy, M.J., Study on the mechanical properties and thermal properties of jute and banana fiber
reinforced epoxy hybrid composites, Compos Part B - Eng., 51, 54–57 (2013). 248-242
7. Sapuan S M, Leenie A, Harimi M, et al. Mechanical properties of woven banana fiber reinforced epoxy composite, Mater and Design,
27, 689–693 (2006).
8. Srinivasan, V.S., Rajendra Boopathy, S., Sangeetha, D., Vijaya Ramnath, B., Evaluation of mechanical and thermal properties of
banana–flax based natural fiber composite. Mater Des., 60, 620–627 (2014).
9. Hadi Samadian, Hamid Mobasheri, Saeed Hasanpour, Reza Faridi Majidi1, Nanomed Res J 2(2) 87-92, (2017).
10. A Theron, E Zussman1, A L Yarin Department of Mechanical Engineering, Technion-Israel Institute of Technology, Haifa, Israel
Nanotechnology 12, 384–390 (2001).
11. Tong Wang, Satish Kumar, School of Polymer, Textile and Fiber Engineering, Georgia Institute of Technology, Atlanta, Georgia
30332-0295.
12. Ali A, Geshury AJ, Ko F, Proceedings of the Fiber Society Annual Technical Conference, Natick, MA, 16–18 October 2002.
13. Samiksha Bansode, Development of carbon nanofibers from electrospun polyacrylonitrile nanofibers, M.Tech. Thesis of
BVDUCOE,Pune (2018).
14. Sachin Chavan, Ph.D. thesis Submitted to BVDUCOEP, 2015.
15. Basem E. Tawfik a, Heba Leheta a, Ahmed Elhewy a, Tarek Elsayed, Weight reduction and strengthening of marine hatch covers by
using composite materials, International Journal of Naval Architecture and Ocean Engineering, xx 1-14 (2016).
16. Prathamesh Bilgunde, Design Of Hybrid Composite Leaf Spring For A Multi-Utilty Vehicle, Proceedings of International Conference
on Advances in Mechanical Engineering May 29-31, 2013, COEP, Pune, Maharashtra, India Paper ID – ICAME2013 S3/O2.
17. Zorica Đorđević, Stevan Maksimović, Ivana Ilić, Dynamic Analysis of Hybrid Aluminium/Composite Shafts, Scientific Technical
Review, Vol.LVIII, No.2 (2008).
18. Van de Velde, K., Kiekens, P., Thermal degradation of flax: The determination of
19. Kinetic parameters with thermo gravimetric analysis, Appl. Polym. Sci., 83(12), 2634–2643 (2002).
20. Ray, D., Sarkar, B.K., Bose, N.R., Impact fatigue behaviour of vinyl ester resin matrix composite reinforced with alkali treated jute
fibers, Compos Part A-Appl. Sci. Manufact., 33(2), 233–241 (2002).
21. Jochen Gassan., A study of fiber and interface parameters affecting the fatigue behaviour of natural fiber composites. Compos Part A-
Appl. Sci. Manufact., 33(3), 369–374 (2002).
22. Maha M. Ibrahim, Alain Defresne, Waleed K. El-Zawawy, Foster A. Agblevor, Banana Fibres and microfibrils as lignocellulosic
reinforcements in polymer composites, Carbohydrate Polymers, 81, 811-819 (2010).
23. S. Patel, G. Hota,, Fibers and Polymers, 15, 2272-2282 (2014).
24. Shaohua Jiang, Yiming Chen, Gaigai Duan, Changtong Mei, Andreas Greiner, Seema Agarwal, Electrospun nanofiber reinforced
composites: a review, Polymer Chemistry, (2018).
25. Chensong Dong, Review of natural fibre-reinforced hybrid composites, journal of reinforced plastics and composites, 0(0), 1–18
(2017).
26. Athijayamani, A., Studies on the mechanical properties and machinability of roselle polyester and roselle/sisal-polyester hybrid
composites. Ph.D. Thesis, Anna University, Chennai, India. 2010.
27. Sanjay, M.R., Arpitha, G.R., Laxmana Naik, L., Gopalakrishna, K., Yogesha, B., Applications of Natural Fibers and its Composites:
An Overview, Nat. Resour, 7, 108–114, 2016.
28. Das, S. Life Cycle Assessment of Carbon Fibre-Reinforced Polymer Composites, The International Journal of Life Cycle Assessment,
16, 268-282 (2011).

Authors: G Dilli Babu, B Jagadish Babu, K Sivaji Babu


Optimization of Surface Roughness of Turned Nano-Khorasan Based Madar Fiber Composites
Paper Title:
Using Response Surface Methodology
Abstract: Now a day Nano based Natural Fiber Reinforced Polymer (NFRP) composite is important alternative
material to conventional materials because of its superior characteristics. In general composite products are
manufactured nearer to the required shape, but secondary operations like machining is necessary to obtain the
required surface finish. Machining of NFRP composites is different than the machining of traditional materials.
This paper focuses on the behavior and optimization of machining parameters on turning of Nano-Khorasan
43. based madar fiber reinforced composites by using Response Surface Methodology (RSM) technique. The input
factors studied are speed, feed, depth of cut and Nano-Khorasan mixing. The investigated output response was
Average Surface Roughness (Ra). A Box- Behnken approach was employed to evaluate the optimum parameters 243-257
to attain the minimum Ra. Based on this approach, a second order polynomial modal equation was generated for
predicting response Ra. Also the relative effect of parameters on response Ra was studied by using ANOVA.
The experimental result shows some interesting factors in context to the turning of Nano Khorasan based
Madarfiber reinforced polymer composites.

Keywords: Madar fiber, Nano Khorasan powder, turning, Response Surface Methodology.
References:

1. A. V. Ratna Prasad et al. Influence of Nano clay on the Mechanical Performance of Wild cane Grass Fiber Reinforced Polyester Nano
composites. International Journal of Polymer Analysis and Characterization, 2015, Vol. 20(6), pp. 541-556.
2. Kim, J.; Kang, P.H.; Nho, Y.C. Positive temperature coefficient behavior of polymer composites having a high melting temperature. J.
Appl. Polym. Sci. 2004, Vol. 92, pp. 394–401.
3. Nikkeshi, S.; Kudo, M.; Masuko, T. Dynamic viscoelastic properties and thermal properties of powder epoxy resin composites. J. Appl.
Polym. Sci. 1998, Vol. 69, pp. 2693–2598.
4. K. Priya Dasan. Nano clay/Polymer Composites: Recent Developments and Future Prospects. Eco-friendly Polymer Nano composites,
2015, Vol. 75, pp.561-579.
5. Z. Wang, H. Meng, J. Fu. Novel method for evaluating surface roughness by grey dynamic filtering, Measurement, 2010, Vol. 43 (1),
pp. 78– 82.
6. T. Rajasekaran, K.P.Kumar, S.arunachalam. Investigated on the turning parameters for surface roughness using taguchi analysis.
Elsevier procedia engineering, 2013, Vol. 51,:pp. 781-790.
7. G DilliBabu, K.S.babu, G.U.M.gowd. Effect of Machining Parameters on Milled Natural Fiber Reinforced Plastic Composites. Journal
of Advanced Mechanical Engineering, 2012, Vol.1, pp. 1-12.
8. S.Vivek, S.Vijayraj, G.Prabhu , J.Varun Mohan Singh. Experimental investigation for the machining of al-sic nano composites using
response surface method. International Journal of Applied Engineering Research, 2015, Vol. 10(19), pp. 13738-13746.
9. S. Kumar , S. R. Chauhan , P. K. Rakesh , I. Singh, J. P. Davim. Drilling of Glass Fiber/Vinyl Ester Composites with Fillers. Taylor &
Francis Group: Materials and Manufacturing Processes, 2011, Vol. 27, pp. 314–319.

Authors: Nikita Bhatt, Amit Ganatra

Paper Title: Semantic Correlation Based Deep Cross-Modal Hashing For Faster Retrieval
Abstract: Due to growth of multi-modal data, large amount of data is being generated. Nearest Neighbor (NN)
search is used to retrieve information but it suffers when there is high-dimensional data. However Approximate
Nearest Neighbor (ANN) is a searching method which is extensively used by the researchers where data is
represented in form of binary code using semantic hashing. Such representation reduces the storage cost and
retrieval speed. In addition, deep learning has shown good performance in information retrieval which efficiently
handle scalability problem. The multi-modal data has different statistical properties so there is a need to have
method which finds semantic correlation between them. In this paper, experiment is performed using correlation
methods like CCA, KCCA and DCCA on NMIST dataset. NMIST dataset is multi-view dataset and result
proves that DCCA outperforms over CCA and KCCA by learning representations with higher correlations.
However, due to flexible requirements of users, cross-modal retrieval plays very important role which works
across the modalities. Traditional cross-modal hashing techniques are based on the hand-crafted features. So
performance is not satisfactory as feature learning and binary code generation is independent process. In
addition, traditional cross-modal hashing techniques fail to bridge the heterogeneous gap over various
modalities. So many deep-based cross-modal hashing techniques were proposed which improves the
performance in comparison with non-deep cross-modal techniques. Inside the paper, we presented a
comprehensive survey of hashing techniques which works across the modalities.

Keywords: Multi-Modal data, Deep CCA (DCCA), cross-modal retrieval, hashing.

References:

1. K. Wang, Q. Yin, W. Wang, S. Wu and L. Wang, "A Comprehensive Survey on Cross-modal Retrieval", arXiv.org, 2016. [Online].
Available: https://arxiv.org/abs/1607.06215.
44. 2. Q.-Y. Jiang and W.-J. Li, “Deep Cross-Modal Hashing,” 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR),
2017.
3. Q. Jiang and W. Li, "Asymmetric Deep Supervised Hashing", arXiv.org, 2019. [Online]. Available: https://arxiv.org/abs/1707.08325.
258-262
4. J. Wang, T. Zhang, N. Sebe and H. Shen, "A survey on learning to hash", Arxiv.org, 2018. [Online]. Available:
https://arxiv.org/pdf/1606.00185.
5. Q. Li, Z. Sun, R. He and T. Tan, "Deep Supervised Discrete Hashing", Papers.nips.cc, 2017. [Online]. Available:
https://papers.nips.cc/paper/6842-deep-supervised-discrete-hashing.
6. K. Lin, H.-F. Yang, J.-H. Hsiao, and C.-S. Chen, “Deep learning of binary hash codes for fast image retrieval,” 2015 IEEE Conference
on Computer Vision and Pattern Recognition Workshops (CVPRW), 2015.
7. G. Andrew, R. Arora, J. Bilmes and K. Livescu, "Deep Canonical Correlation Analysis", PMLR, 2013. [Online]. Available:
http://proceedings.mlr.press/v28/andrew13.html.
8. S. J. Hwang and K. Grauman, “Accounting for the Relative Importance of Objects in Image Retrieval,” Proceedings of the British
Machine Vision Conference 2010, 2010.
9. A. Sharma, A. Kumar, H. Daume, and D. W. Jacobs, “Generalized Multiview Analysis: A discriminative latent space,” 2012 IEEE
Conference on Computer Vision and Pattern Recognition, 2012.
10. T. Sun and S. Chen, “Locality preserving CCA with applications to data visualization and pose estimation,” Image and Vision
Computing, vol. 25, no. 5, pp. 531–543, 2007.
11. R. He, M. Zhang, L. Wang, Y. Ji, and Q. Yin, “Cross-Modal Subspace Learning via Pairwise Constraints,” IEEE Transactions on
Image Processing, vol. 24, no. 12, pp. 5543–5556, 2015.
12. J. Song, Y. Yang, Y. Yang, Z. Huang, and H. T. Shen, “Inter-media hashing for large-scale retrieval from heterogeneous data
sources,” Proceedings of the 2013 international conference on Management of data - SIGMOD 13, 2013.
13. X. Zhu, Z. Huang, H. T. Shen, and X. Zhao, “Linear cross-modal hashing for efficient multimedia search,” Proceedings of the 21st
ACM international conference on Multimedia - MM 13, 2013.
14. S. Kumar and R. Udupa, "Learning hash functions for cross-view similarity search", Ijcai.org, 2011. [Online]. Available:
https://www.ijcai.org/Proceedings/11/Papers/230.pdf.
15. Y. Zhen and D.-Y. Yeung, “A probabilistic model for multimodal hash function learning,” Proceedings of the 18th ACM SIGKDD
international conference on Knowledge discovery and data mining - KDD 12, 2012.
16. D.-Y. Y. Yi Zhen, “Co-Regularized Hashing for Multimodal Data,” Co-Regularized Hashing for Multimodal Data, [Online]. Available:
https://papers.nips.cc/paper/4793-co-regularized-hashing-for-multimodal-data.
17. D. Zhang and W. J. Li, “Large-scale supervised multimodal hashing with semantic correlation maximization,” ACM Digital Library.
[Online]. Available: https://dl.acm.org/citation.cfm?id=2892854.
18. J. Yu, Y. Lu, Z. Qin, W. Zhang, Y. Liu, J. Tan, and L. Guo, “Modeling Text with Graph Convolutional Network for Cross-Modal
Information Retrieval,” Advances in Multimedia Information Processing – PCM 2018 Lecture Notes in Computer Science, pp. 223–
234, 2018.
19. D. Zhang, F. Wang, and L. Si, “Composite hashing with multiple information sources,” Proceedings of the 34th international ACM
SIGIR conference on Research and development in Information - SIGIR 11, 2011.
20. S. Kim, Y. Kang, and S. Choi, “Sequential Spectral Learning to Hash with Multiple Representations,” Computer Vision – ECCV 2012
Lecture Notes in Computer Science, pp. 538–551, 2012.
21. G. Ding, Y. Guo, and J. Zhou, “Collective Matrix Factorization Hashing for Multimodal Data,” 2014 IEEE Conference on Computer
Vision and Pattern Recognition, 2014.
22. Cao, Yue, Wang, Jianmin, Yang, Qiang, Yuy, and P. S., “Deep visual-semantic hashing for cross-modal retrieval,” Proceedings of the
ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, [Online]. Available:
http://repository.ust.hk/ir/Record/1783.1-80551.
23. V. E. Liong, J. Lu, Y.-P. Tan, and J. Zhou, “Cross-Modal Deep Variational Hashing,” 2017 IEEE International Conference on
Computer Vision (ICCV), 2017.
24. C. Wang, H. Yang, and C. Meinel, “A deep semantic framework for multimodal representation learning,” Multimedia Tools and
Applications, vol. 75, no. 15, pp. 9255–9276, 2016.
25. W. Wang, X. Yang, B. Ooi, D. Zhang and Y. Zhuang, "Effective deep learning-based multi-modal retrieval", The VLDB Journal, vol.
25, no. 1, pp. 79-101, 2015. Available: 10.1007/s00778-015-0391-4.
26. Y. Wei, Y. Zhao, C. Lu, S. Wei, L. Liu, Z. Zhu, and S. Yan, “Cross-Modal Retrieval With CNN Visual Features: A New
Baseline,” IEEE Transactions on Cybernetics, pp. 1–12, 2016.
27. X. Lu, L. Zhu, Z. Cheng, X. Song and H. Zhang, "Efficient discrete latent semantic hashing for scalable cross-modal retrieval", Signal
Processing, vol. 154, pp. 217-231, 2019. Available: 10.1016/j.sigpro.2018.09.007.
28. N. Srivastava and R. Salakhutdinov, "Multimodal learning with deep boltzmann machines", Jmlr.org, 2012. [Online]. Available:
http://jmlr.org/papers/volume15/srivastava14b/srivastava14b.pdf.
29. W. Wang, B. C. Ooi, X. Yang, D. Zhang, and Y. Zhuang, “Effective multi-modal retrieval based on stacked auto-
encoders,” Proceedings of the VLDB Endowment, vol. 7, no. 8, pp. 649–660, 2014.
30. J. Masci, M. M. Bronstein, A. M. Bronstein, and J. Schmidhuber, “Multimodal Similarity-Preserving Hashing,” IEEE Transactions on
Pattern Analysis and Machine Intelligence, vol. 36, no. 4, pp. 824–830, 2014.
31. F. Zhong, Z. Chen, G. Min, Z. Ning, H. Zhong, and Y. Hu, “Combinative hypergraph learning in subspace for cross-modal
ranking,” Multimedia Tools and Applications, vol. 77, no. 19, pp. 25959–25982, 2018.

Authors: B. Shankar Goud, Pudhari Srilatha, MN Raja Shekar


Effects of Mass Suction on MHD Boundary Layer Flow and Heat Transfer over a Porous Shrinking
Paper Title:
Sheet with Heat Source/Sink
Abstract: An examination is made to think about the impacts of the mass suction on the steady flow of 2-D
magneto-hydrodynamic (MHD) boundary layer flows and heat transfer past on a shrinking sheet with
source/sink. In the dynamic framework, an-uniform magnetic field acts perpendicular to the plane of flow. The
governing non-dimensional partial differential equations are changed into nonlinear ordinary differential
equations (ODE’s) using similarity transformations. The so derived ordinary differential equations are solved
numerically by using the MAT LAB solver bvp5c. From the keen examinations it is found that the velocity
inside the boundary layer increments with increment of wall mass suction, magnetic field and reportedly the
thickness of the momentum layer diminishes. There is a reduction in temperature as increases the Prandtl
number. With heat source specifications, Hartmann number, heat sink parameter & the temperature increments
are seen. Moreover, for strong heat source heat assimilation at the sheet happens.

Keywords: Heat Transfer, Heat Source/Sink, MHD Boundary layer, attenuation Sheet and bvp5c.
45.
References:
263-266
1. Postelnicu, A. (2007), Heat Mass Transfer, 43, pp: 595–602, 2007.
2. B. Shankar Goud., M.N. Raja Shekar (2016), International Journal of Mathematical Archive-7(6), pp: 114-125.
3. K. Bhattacharyya and G.C. Layek (2010), Chem. Eng. Comm., 197, pp: 1527–1540.
4. Mohamed Ali · Khaled Al-Salem, Meccanica (2013), 48, pp: 1587–1597.
5. I.J.Uwanta., M.M. Hamza (2014), International Scholarly Research Notices Vol: 2014, Article ID980270, 14 pages.
6. B. Shankar Goud, M.N Rajashekar (2018), Fifth International Conference on Computational Methods for Thermal Problems
THERMACOMP2018, July 9-11, 2018, Indian Institute of Science, Bangalore, INDIA.
7. R. Kandasamy, K. Periasamy, and K.K. S. Prabhu (2005), International Journal of Heat and Mass Transfer, 48(7), pp: 1388-1394.
8. R. Kandasamy, A.W.B. Raj, and A. B. Khamis (2006) Theoretical and Applied Mechanics, 33(2), pp: 123-148.
9. Shankar Goud. B., Dharmendar Reddy Yanala (2018), International conference on Numerical Heat Transfer & Fluid Flow NHTFF-
2018, January 19th -21st, organized by Department of Mathematics, National Institute of Technology (NIT) , Warangal, Telangana,
India.
10. Krishnendu Battacharrya (2011), Chem. Eng. Research bulletin, 15, pp: 12-17.
11. Muhaimin, R. Kandasamy, Azme B. Khamis (2008), Appl. Math. Mech, 29(10), pp: 1309–1317.
12. G.BalReddy, B.Shankar Goud and MN. Raja Shekar (2018) International Journal of Mechanical Engineering and Technology, 9(10),
October 2018, pp: 1646–1656.
13. B. Shankar Goud (2017), International Journal of Emerging Technologies in Engineering Research (IJETER), 5(11), pp: 32-35.
14. B.Shankar Goud, MN Rajashekar (2016), IOSR Journal of Mathematics (IOSR-JM), 12 (6) Ver. IV, pp.55-64.

Authors: L.Suganthi

Paper Title: Renewable Energy Substitution in Lieu of Fossil Fuel Based Energy For India
Abstract: Rapid globalization and industrialization is witnessed across the globe. This has led to a rapid
increase in energy demand. In India, it is found that energy consumption is growing exponentially. A sustainable
energy model that helps in optimizing the energy consumption is the need of the hour. The model should help
policymakers to put proactive plans in place. A two-step process has been carried out. A demand prediction
model is proposed to forecast the fossil based energy demand for India upto 2040-41. 92 econometric models
have been were developed and the best fit was found. The requirement was found to be coal and lignite =
32203.42 pJ oil = 20396.92 PJ, natural gas = 3460.77 pJ and electricity = 9887.71 pJ. The total energy
requirement in 2040-41 will be 65948 pJ in 2040-41. Using constraints such as energy return on investment,
acceptability, reliability and CO2 emissions a multi-objective optimization model that maximizes efficiency and
minimizes cost is developed. Renewable energy substitution scenarios are developed. Solar energy is expected to
dominate and polices have to designed to ensure that the naturally available solar energy is being utilized to a
larger extent. Smart grid technology is at its nascent stage of development in India. Research and development
has to be done to enhance the use of smart grid so that decentralized energy generation from renewable energy
can be increased.

Keywords: energy model, optimization, renewable energy substitution, smart grid.

46. References: 267-273

1. http://energyatlas.iea.org/#!/profile/WORLD/IND. [Accessed: 10-Jun-2019].


2. http://mospi.nic.in/sites/default/files/publication_reports/Energy Statistics 2019-finall.pdf.
3. https://en.wikipedia.org/wiki/Energy_policy_of_India. [Accessed: 10-Jun-2019].
4. https://www.bp.com/content/dam/bp/business-sites/en/global/ corporate/pdfs/energy-economics/statistical-review/bp-stats-review-
2018-full-report.pdf.
5. https://economictimes.indiatimes.com/news/politics-and-nation/ will-try-to-achieve-pledged-renewable-energy-targets-in-less-than-
four-and-half-years-piyush-goyal/articleshow/49687054.cms. [Accessed: 10-Jun-2019].
6. L. Suganthi and A. A. Samuel, “Energy models for demand forecasting - A review,” Renew. Sustain. Energy Rev., vol. 16, no. 2, pp.
1223–1240, 2012.
7. K. B. Debnath, M. Mourshed, and S. P. K. Chew, “Modelling and Forecasting Energy Demand in Rural Households of Bangladesh,”
Energy Procedia, vol. 75, pp. 2731–2737, Aug. 2015.
8. V. Dordonnat, A. Pichavant, and A. Pierrot, “GEFCom2014 probabilistic electric load forecasting using time series and semi-
parametric regression models,” Int. J. Forecast., vol. 32, no. 3, pp. 1005–1011, 2016.
9. J. Wang, S. Zhu, W. Zhang, and H. Lu, “Combined modeling for electric load forecasting with adaptive particle swarm optimization,”
Energy, vol. 35, no. 4, pp. 1671–1678, Apr. 2010.
10. L. Suganthi and A. A. Samuel, “Modelling and forecasting energy consumption in India: Influence of socioeconomic variables,”
Energy Sources, Part B Econ. Planning, Policy, vol. 11, no. 5, pp. 404–411, May 2016.
11. R. Wang, W. Liu, L. Xiao, J. Liu, and W. Kao, “Path towards achieving of China’s 2020 carbon emission reduction target—A
discussion of low-carbon energy policies at province level,” Energy Policy, vol. 39, no. 5, pp. 2740–2747, May 2011.
12. M. Kankal, A. Akpınar, M. İ. Kömürcü, and T. Ş. Özşahin, “Modeling and forecasting of Turkey’s energy consumption using socio-
economic and demographic variables,” Appl. Energy, vol. 88, no. 5, pp. 1927–1939, May 2011.
13. C. García-Ascanio and C. Maté, “Electric power demand forecasting using interval time series: A comparison between VAR and
iMLP,” Energy Policy, vol. 38, no. 2, pp. 715–725, Feb. 2010.
14. O. E. Canyurt and H. K. Ozturk, “Application of genetic algorithm (GA) technique on demand estimation of fossil fuels in Turkey,”
Energy Policy, vol. 36, no. 7, pp. 2562–2569, Jul. 2008.
15. L. Fan, S. Pan, Z. Li, and H. Li, “An ICA-based support vector regression scheme for forecasting crude oil prices,” Technol. Forecast.
Soc. Change, vol. 112, pp. 245–253, Nov. 2016.
16. I. Okumus and A. Dinler, “Current status of wind energy forecasting and a hybrid method for hourly predictions,” Energy Convers.
Manag., vol. 123, pp. 362–371, Sep. 2016.
17. J. T. Wilkerson, B. D. Leibowicz, D. D. Turner, and J. P. Weyant, “Comparison of integrated assessment models: Carbon price impacts
on U.S. energy,” Energy Policy, vol. 76, pp. 18–31, Jan. 2015.
18. D. Lauinger, P. Caliandro, J. Van herle, and D. Kuhn, “A linear programming approach to the optimization of residential energy
systems,” J. Energy Storage, vol. 7, pp. 24–37, Aug. 2016.
19. L. Suganthi and A. Williams, “Renewable energy in India - A modelling study for 2020-2021,” Energy Policy, vol. 28, no. 15, pp.
1095–1109, 2000.
20. C. A. S. Hall, J. G. Lambert, and S. B. Balogh, “EROI of different fuels and the implications for society,” Energy Policy, vol. 64, pp.
141–152, Jan. 2014.

Authors: Sukanya A, Rajeswari R


Enhancement of Coronary Blood Vessels based on Frangi’s Vesselness Filter and Morphological
Paper Title:
Operations
Abstract: Cardiovascular diseases (CVDs) are the global cause of deaths and therefore research in modern
medical image processing aims to develop a medical tools to assist the clinicians in vessel extraction, artery
detection and 3D reconstruction. Vessel extraction is an important and trivial step which depends extremely on
enhancement method. Extraction of coronary artery blood vessels from 3 Dimension (3D) Coronary Computed
Tomography Angiography (CCTA) images is a demanding research objective to strengthen the diagnosis and
therapy of coronary artery illness. This paper presents a vessel enhancement method of coronary artery blood
vessels using Frangi’s vesselness measure and morphological operators. In the first stage of the proposed work,
Preprocessing is performed to consider only the heart region. Next Frangi’s vesselness measure is calculated for
the 3D CCTA images. While calculating the Frangi’s vesselness measure, four different types of gradient
47. operators are used for calculating the Hessian matrix viz., Sobel, Prewitt, central difference and intermediate
difference operators. In the second stage, the vessels are enhanced by morphological operations based on top hat
274-281
and bottom hat operations. These morphological operations help in further enhancing the blood vessels. The
proposed methodology was applied on 12 3D CCTA dataset and evaluated using quality measures such as MSE,
PSNR, SSIM and FSIM. The results obtained based on the four gradient operators are compared. The statistical
test viz., one way ANOVA was carried out on the results. The proposed method using Prewitt operator is able to
extract even small vessels and the results seem to be promising.

Keywords: Coronary artery, Coronary computed tomography angiography (CCTA), Hessian filter,
Morphological operations, Vessel enhancement.

References:
1. Subhi J. Al Aref, Zorana Mrsic, Gudrun Feuchtner, James K. Min, Todd C. Villines, "The Journal of Cardiovascular Computed
Tomography year in review - 2018," Journal of Cardiovascular Computed Tomography, vol 12, Issue 6, December 2018, pp 529-538.
2. Zhixun Li, Yingtao Zhang, Huiling Gong, Guangzhong Liu, Xianglong Tang, "An automatic and efficient coronary
arteries extraction method in CT angiographies,"Biomedical Signal Processing and Control, vol 36, July 2017, pp 221-233.
3. Asma kerkeni, Asma Benabdallah, Antoine Manzanera, Mohamed Hedi Bedoui,"A coronary artery segmentation method based on
multiscale analysis and region growing,"Computerized Medical Imaging and Graphics,vol 48, March 2016, pp 49-61.
4. Yuqi Wang, Jingfeng Jiang, Timothy J. Hall, " A 3-D Region-Growing Motion-Tracking Method for Ultrasound Elasticity Imaging,"
Ultrasound in Medicine & Biology, vol 44, Issue 8, August 2018, pp 1638-1653.
5. Xiaoli Zhang, Xiongfei Li, Yuncong Feng, "A medical image segmentation algorithm based on bi-directional region growing," Optik,
vol 126, Issue 20, October 2015, pp 2398-2404.
6. Ye-zhan Zeng, Sheng-hui Liao, Ping Tang, Yu-qian Zhao, Yi-xiong Liang, "Automatic liver
vessel segmentation using 3D region growing and hybrid active contour model," Computers in Biology and Medicine, vol 97, 1 June
2018,pp 63-73.
7. Katharina Anders, Ulrike Ropers, Axel Kuettner, Martin Wechsel, Stephan Achenbach, "Individually adapted, interactive multiplanar
reformations vs. semi-automated coronary segmentation and curved planar reformations for stenosis detection in coronary computed
tomography angiography," European Journal of Radiology, vol 80, Issue 1, October 2011, pp 89-95.
8. Law, T.Y & Heng, P.A., “Automated extraction of bronchus from 3D CT images of lung based on genetic algorithm and 3D region
growing”, Proc. SPIE, vol. 3979, 2000, pp. 906-916.
9. Dongjin Han, Nam-Thai Doanack, Hjoon Shim, Byunghwan Jeon, Hyuk-Jae Chang, "A fast seed detection using local geometrical
feature for automatic tracking of coronary arteries in CTA," Computer Methods and Programs in Biomedicine, vol 117, November
2014, pp 179-188.
10. Deng qiang Jia, Xiahai Zhuang, "Directional fast-marching and multi-model strategy to extract coronary artery centerlines," Computers
in Biology and Medicine, vol 108, May 2019, pp 67-77.
11. Hengfei Cui, Yong Xia, " Gradient Vector Flow Field and Fast Marching Based Method for Centerline Computation of Coronary
Arteries," Intelligence Science and Big Data Engineering: 7th International Conference, vol 10559, September 2017, pp.597-607.
12. M. M. Fraz , ‘‘Blood vessel segmentation methodologies in retinal images—A survey,’’ Computer Methods and Programs in
Biomedicine, vol. 108, no. 1, pp. 407–433, 2012.
13. Shant Malkasian, Logan Hubbard, Brian Dertli, Jungnam Kwon, Sabee Molloi, "Quantification of vessel-specific coronary perfusion
territories using minimum-cost path assignment and computed tomography angiography: Validation in a swine model,"Journal of
Cardiovascular Computed Tomography, vol 12, Issue 5, October 2018, pp 425-435.
14. R Deklerck, J Cornelis, M Bister, " Segmentation of medical images," Image and Vision Computing, vol 11, Issue 8, October 1993, pp
486-503.
15. Sarada Prasad Dakua, Julien Abi-Nahed, "Patient oriented graph-based image segmentation," Biomedical Signal Processing and
Control, vol 8, Issue 3, May 2013, pp 325-332.
16. Yan X, Guangshu H, Lihua S, “Adaptive tracking extraction of vessel centerlines in coronary arteriograms using Hessian matrix”,
Journal of Tsinghua University , vol 47, No.6, 2007, pp:889-992 .
17. Kristína Lidayová, Hans Frimmel, Chunliang Wang, Ewert Bengtsson, Orjan Smedby, "Skeleton-based fast, fully automated
generation of vessel tree structure for clinical evaluation of blood vessel systems," Skeletonization, 2017, pp 345-382.
18. Mohammad Bagher Khamechian, Mahdi Saadatmand Tarzjan, "A new framework of coupled geometric active contours for
segmentation of 3D cardiac magnetic resonance images," Magnetic Resonance Imaging, vol 51, September 2018, pp 51-60.
19. Maryam Taghizadeh Dehkordi, Morteza Jalalat, Saeed Sadri, Alimohamad Doosthoseini, Mohammad Reza Ahmadzadeh, and Rasoul
Amirfattahi, "Vesselness-guided Active Contour: A Coronary Vessel Extraction Method, "Journal of Medical Signals and Sensor, vol
4(2), June 2014, pp 150–157.
20. Ying Wang, Michael T. Osborne,Brian Tung Ming Li, Yaming Li," Imaging Cardiovascular Calcification," Journal of the American
Heart Association, vol 7, Jul 2018, pp 13.
21. David Lesage, Elsa D. Angelini, Isabelle Bloch, Gareth Funka-Lea, "A review of 3D vessel lumen segmentation techniques: Models,
features and extraction schemes," Medical Image Analysis, vol 13, December 2009, pp 819-845.
22. Tao Wan, Xiaoqing Shang, Weilin Yang, Jianhui Chen, Zengchang Qin, "Automated coronary artery tree segmentation in X-ray
angiography using improved Hessian based enhancement and statistical region merging," Computer Methods and Programs in
Biomedicine, vol 157, April 2018, pp 179-190.
23. Hamid Hassanpour, Najmeh Samadiani, S. M. Mahdi Salehi, "Using morphological transforms to enhance the contrast
of medical images," The Egyptian Journal of Radiology and Nuclear Medicine, vol 46, Issue 2, June 2015, pp 481-489.

Authors: Priyanka D.Halle, Shiyamala S


Secure Routing through Refining Reliability for WSN against DoS Attacks using AODSD2V2
Paper Title:
Algorithm for AMI
Abstract: Secure and reliable routing expands the performance of wireless communication infrastructure of the
Advanced Metering Infrastructure (AMI).This paper tries to deliver reliable routing using combination of
AODV(Reactive type protocol) and DSDV(proactive type protocol) protocol considering WSN. Different kinds
of Attack annoys the enactment of communication infrastructure of AMI. This paper defends communication
infrastructure from DoS (Denial of service) attack. The main aim of this paper try to provide reliable routing
with security. Communication infrastructure is a key element of AMI. Providing reliability and security for
communication infrastructure we can improve the performance of AMI. Due to this electricity sector can save
millions of dollars and we provide social awareness about importance of electricity security or Smart Grid. This
paper calculates the security in terms of delay, energy consumption, throughput, PDR (Packet Delivery Ratio)
48. and overhead. By considering these parameters we will calculate Confidentiality, Integrity, Availability and
Accountability (non- repudiation). Wireless Sensor Network (WSN) considered for wireless communication
infrastructure for the AMI. Sensor nodes are battered for attack. Intended for AODSD2V2 (Ad Hoc on Demand 282-289
Destination Sequenced Distance Vector Routing Protocol) protects the data packets from malicious nodes and
DoS attack. For the WSN network infrastructure two kinds of topologies are considered 1. Random deployment
strategy 2. Grid deployment. Network Simulator2 (NS2) delivers comparatively simulation results intended for
the calculation of reliability and security.

Keywords: AODV, DSDV, AMI Security, Routing.

References:

1. Jun-Ho Huh, Sugarbayar Otgonchimeg, Kyungryong Seo1. Advanced metering infrastructure design and test bed experiment using
intelligent agents: focusing on the PLC network base technology for Smart Grid system; May 2016, Volume 72, Issue 5, pp 1862–
1877.
2. Yasin Kabalci. A survey on smart metering and smart grid communication; Volume 57, May 2016, pp 302-318
3. 3.Charalambos Konstantinou, Michail Maniatakos, Fareena Saqib, Shiyan Hu, Jim Plusquellic and Yier Jin. Cyber-Physical Systems:
A Security Perspective; Date of current version January 20, 2016.Digital Object Identifier 10.1109/ACCESS.2016.2516158, 2015 20th
IEEE European Test Symposium (ETS).
4. IEEE ACCESS SPECIAL SECTION EDITORIAL SMART GRIDS: A HUB OF INTERDISCIPLINARY
RESEARCH;,10.1109/ACCESS.2016.2516158:EDITORIAL
5. Fisnik Dalipi, Sule Yildirim Yayilgan. Security and Privacy Considerations for IoT Application on Smart Grids: Survey and Research
Challenges; 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), DOI:
10.1109/W-FiCloud.2016.28.
6. Jaime Lloret, Jesus Tomas, Alejandro Canovas, and Lorena Parra. An Integrated IoT Architecture for Smart Metering; IEEE
Communications Magazine, Volume: 54, Issue: 12, December 2016.
7. Stefano Galli, Thierry Lys. Next Generation Narrowband (Under 500 kHz) Power Line Communications (PLC) Standards; Volume:
12, Issue: 3, Mar. 2015.
8. Damminda Alahakoon, Member, IEEE, and Xinghuo Yu, Fellow, IEEE. Smart Electricity Meter Data Intelligence for Future Energy
Systems: A Survey; Volume: 12, Issue: 1, Feb. 2016.
9. Yu Yan, Wencong Su. A Fog Computing Solution for Advanced Metering Infrastructure;2016 IEEE/PES Transmission and
Distribution Conference and Exposition (T&D)
10. Anzar Mahmood, NadeemJavaid, SohailRazzaq. A review of wireless communications for smart grid; Volume 41, January 2015,
pp248-260.
11. Muhammad Waseem Ahmad, Monjur Mourshed, David Mundow, Mario Sisinni, Yacine Rezguia. Building energy metering and
environmental monitoring – A state-of-the-art review and directions for future research; Volume 120, 15 May 2016, pp. 85-102.
12. Marco Pau, Edoardo Patti, Luca Barbierato, Abouzar Estebsari,Enrico Pons, Ferdinanda Ponci, Antonello Monti. A cloud-based smart
metering infrastructure for distribution grid services and automation; Volume 15, September 2018, pp. 14-25.
13. Md Raqibull Hasan, Yanxiao Zhao, Yu Luo, Guodong Wang, Robb M Winter. An Effective AODV-based Flooding Detection and
Prevention for Smart Meter Network; Volume129, 2018, pp. 454-460.
14. Abdulrahaman Okino Otuoze, Mohd Wazir Mustafa, Raja Masood Larik. Smart grids security challenges: Classification by sources of
threats; February2018.
15. Jurgen Meister, Norman Ihle, Sebastian Lehnhoff, Mathias Uslar.Smart grid digitalization in Germany by standardized advanced
metering infrastructure and green button; 2018, pp. 347-371.
16. Sook-Chin Yip, Wooi-Nee Tan, ChiaKwang Tan, Ming-Tao Gan, KokSheik Wong. An anomaly detection framework for identifying
energy theft and defective meters in smart grids; Volume101, October 2018, pp.189-203.
17. Lulu Wen, Kaile Zhou, Shanlin Yang, Lanlan Li. Compression of smart meter big data: A survey; Volume91, August 2018, pp.59-69.
18. S. Sofana Reka, Tomislav Dragicevic. Future effectual role of energy delivery: A comprehensive review of Internet of Things and
smart grid; Volume91, August 2018, pp. 90-108.
19. Dariush Abbasinezhad-Mood, Morteza Nikooghadam.Design of an enhanced message authentication scheme for smart grid and its
performance analysis on an ARM Cortex-M3 microcontroller; Volume 40, June 2018, pp. 9-19.
20. Ulas Baran BALOGLU, Yakup DEMİR. Lightweight Privacy-Preserving Data Aggregation Scheme for Smart Grid Metering
Infrastructure Protection; Volume22, September 2018, pp. 16-24
21. Hadi Habibzadeh, Tolga Soyata, Burak Kantarci, Azzedine Boukerche, Cem Kaptan. A Survey of the Sensing, Communication, and
Security Planes in Smart City System Design; Volume 144, 24 October 2018, pp.163-200.
22. Aaron Hansen, Jason Staggs, Sujeet Shenoi.Security analysis of an advanced metering infrastructure; Volume 18, September 2017,
pp.3-19.
23. Rong iang Rongxing LuKim-Kwang Raymond Choo.Security analysis of an advanced metering infrastructure; Volume 18, September
2017, Pages 3-19.Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data;
Volume 78, Part 1, January 2018, pp. 392-401.
24. Yasin Kabalci.A survey on smart metering and smart grid communication; Volume 57, May 2016, PP302-318.
25. Rafał Leszczyna. A Review of Standards with Cyber security Requirements for Smart Grid; Volume 77, August 2018, pp. 262-276.
26. Rafa l Leszczyna.Standards on Cyber Security Assessment of Smart Grid; Volume 22, September 2018, pp.70-89.
27. Samet Tonyali, Ruben Munoz, Kemal Akkaya, Utku Ozgur. A Realistic Performance Evaluation of Privacy-Preserving Protocols for
Smart Grid AMI Networks; Volume 119, 1 October 2018, pp 24-41.
28. Haider TarishHaider, OngHangSee, WilfriedElmenreich. A review of residential demand response of smart grid; Volume 59, June
2016, pp 166-178.
29. D. Kolokotsa. The role of Smart Grids in the Building Sector; Volume 116, 15 March 2016, pp 703-708
30. Abdulrahaman Okino Otuozea, Mohd Wazir Mustafaa, Raja Masood Larik. Review Smart grids security challenges: Classification by
sources of threats; 7 February 2018.
31. Esther Villar-Rodriguez, Javier Del Ser, Izaskun Oregi, Miren Nekane Bilbao, Sergio Gil-Lopez. Detection of non-technical losses in
smart meter data based on load curve profiling and time series analysis; Volume 137, 15 October 2017, pp 118-128.
32. Mirko Bottarelli, Gregory Epiphaniou, Dhouha Kbaier Ben Ismail, Petros Karadimas, Haider Al-Khateeb. Physical Characteristics of
Wireless Communication Channels for Secret Key Establishment: A Survey of the Research; Volume 78, September 2018, pp 454-476.
33. Mourad Benmalek, Yacine Challal, Abdelouahid Derhab, Abdelmadjid Bouabdallah. VerSAMI: Versatile and Scalable key
management for Smart Grid AMI systems; Volume 132, 26 February 2018,pp 161-179
34. Stefano Rinaldi, Davide Della Giustina, Paolo Ferrari, Alessandra Flammini, Emiliano Sisinni. Time Synchronization over
Heterogeneous Network for Smart Grid Application: Design and Characterization of a Real Case;
35. Stefano Rinaldi, Davide Della Giustina, Paolo Ferrari, Alessandra Flammini, Emiliano Sisinni. Time Synchronization over
Heterogeneous Network for Smart Grid Application: Design and Characterization of a Real Case; Volume 50, 1 November 2016, pp
41-57.
36. Samet Tonyali, Kemal Akkayaa, Nico Saputro, A. Selcuk Uluagac, Mehrdad Nojoumian.Privacy-preserving protocols for secure and
reliable data aggregation In IoT-enabled Smart Metering systems; Volume 78, Part 2, January 2018, pp 547-557.
37. Michael Emmanuel, Ramesh Rayudu. Communication Technologies for Smart Grid Applications: A Survey; Volume 74, October
2016, pp 133-148.
38. Mehmet H. Cintuglu, Osama A. Mohammed, Kemal Akkayaand, A. Selcuk Uluagac. A Survey on Smart Grid Cyber-Physical System
Test beds; Volume: 19, Issue: 1 , First quarter 2017.
39. MUSTAFA A. MUSTAFA, NING ZHANG, GEORGIOS KALOGRIDIS, AND ZHONG FAN. DEP2SA: A Decentralized Efficient
Privacy-Preserving and Selective Aggregation Scheme in Advanced Metering Infrastructure; 07 December 2015.
40. Kevin Mets, Juan Aparicio Ojea, Chris Develder. Combining Power and Communication Network Simulation for Cost-Effective Smart
Grid Analysis;
41. Patel Rajankumar, Patel Nimisha, Dr.Pariza Kamboj. A Comparative Study and Simulation of AODV MANET Routing Protocol in
NS2 & NS3;
42. Kirti A. Yadav and P. Vijayakumar, “VANET and its Security Aspects: A Review” Indian Journal of Science and Technology, Vol
9(44), DOI: 10.17485/ijst/2016/v9i44/97105 November 2016.
43. Noor H. BHANGWAR, Imtiaz A. HALEPOTO, Intesab H. SADHAYO, Suhail KHOKHAR, Asif A. LAGHARI, “ On Routing
Protocols for High Performance”,Studies in Informatics and Control, 26(4) 441-448, December 2017.
44. A. A. Chavan, Prof. D. S. Kurule, Prof. P. U. Dere, “Performance Analysis of AODV and DSDV Routing Protocol in MANET and
Modifications in AODV against Black Hole Attack” 7th International Conference on Communication, Computing and Virtualization
2016, science direct.45. Anand Nayyar, Rajeshwar Singh , “Simulation and Performance Comparison of Ant Colony Optimization
(ACO) Routing Protocol with AODV, DSDV, DSR Routing Protocols of Wireless Sensor Networks using NS-2 Simulator”, American
Journal of Intelligent Systems 2017, 7(1): 19-30 DOI: 10.5923/j.ajis.20170701.02
45. Sana Rekik, Nouha Baccour, Mohamed Jmaiel, Khalil Drira, “Wireless Sensor Network Based Smart Grid Communications:
Challenges, Protocol Optimizations, and Validation Platforms” _Springer Science+Business Media New York 2017.
46. R. J. Vidmar. (1992, August). On the use of atmospheric plasmas as electromagnetic reflectors. IEEE Trans. Plasma Sci. [Online].
21(3). pp. 876—880. Available: http://www.halcyon.com/pub/journals/21ps03 -vidmar

Authors: Vijayan.S.N, Deepak.P, Duraimurugan.G.K


Thermal Effects of Steam Pipe used in Activated Carbon Industry under Conditional
Paper Title:
Circumstances
Abstract: High pressure and high temperature steam is used to activate the material contained in the activated
zone of rotary kiln generally used in the cement manufacturing industry, activated carbon manufacturing
industry, thermal processing industries. In this work, thermal stress behaviour of steam pipe with a zigzag hole is
analyzed, which is used in the activated carbon industry where charcoal is used as a raw material. Steam is the
most important factor for continuous activation process and must be uniformly distributed in the activated zone.
Investigated the fracture produced in the heat affected region during the continuous process using ANSYS tool,
also found the deformation, equivalent stress and temperature distribution for two types of pipes.

Keywords: Rotary Kiln, Failure Analysis, Steam Pipe, Deformation, Equivalent Stress.

References:

1. Vijayan. S. N, Sendhilkumar. S, “Industrial Applications of Rotary Kiln in Various Sectors - A Review”, International Journal of
Engineering Innovation & Research Volume 3, Issue 3, pp. 342-345.
2. Vijayan.S.N, M.Makeshkumar, “Material Specific Product Design Analysis for Conditional Failures – A Case Study”, International
Journal of Engineering Science and Technology, Vol. 4 No.03 March 2012, pp.976-984.
3. Pei-Hsing Huang, Hao-Hsiang Cheng, and Sheau-Horng Lin, “Adsorption of Carbon Dioxide onto Activated Carbon Prepared from
Coconut Shells”, Journal of Chemistry, Volume 2015, Article ID 106590, 10 pages.
4. M.A. Tadda, A. Ahsan, A. Shitu, M. E Sergany, T. Arunkumar, Bipin Jose, M. AbdurRazzaque, N.N. Nik Daud, “A review on
activated carbon: process, application and prospects”,Journal of Advanced Civil Engineering Practice and Research, 2(1):7-13, 2016.
5. Joan R. Hernandez, Froilan L. Aquino, Sergio C. Capareda, “Activated Carbon Production from Pyrolysis and Steam Activation of
Cotton Gin Trash”, American Society of Agricultural and Biological Engineers, Article ID 076084, June 2007.
6. Youchen Zhang, Zongbo Jiang, “Reliability Analysis of Main Steam Pipe Containing Defects”, Procedia Engineering 43 ( 2012 ) 150 –
155.
7. Jan Storesund, Kristin Steingrimsdottir, Juhani Rantala, Tobias Bolinder, “Creep analyses of a steam pipe system”, International
49. Conference on Life Management and Maintenance for Power Plants, 2016, PP.16.
8. C.J. Han, H. Zhang, J. Zhang, “Failure Pressure Analysis of the Pipe with Inner Corrosion Defects by FEM”, Int. J. Electrochem. Sci.,
11 (2016) 5046 – 5062. 290-295
9. Han-Sung Huang, “Fracture Characteristics Analysis of Pressured Pipeline with Crack Using Boundary Element Method”, Advances in
Materials Science and Engineering, Volume 2015, Article ID 508630, 13 pages.
10. A.M.Ahmad Zaidi, M.M.Md Asif , I.Abdul Rahman, S.RasoolMohideen, A.F.Ahmad, “Finite Element Simulation on Crack Analysis
of a Thick-Tube”, International Journal of Integrated Engineering, pp. 67-71.
11. Bhairavnath Uttamrao More,Prof. G.S. Joshi, Swapnil S. Kulkarni, “Development of Steam Piping System With Stress Analysis For
Optimum Weight & Thermal Effectiveness, International Journal of Advanced Engineering Research and Studies, Jan.- March,2014,
pp. 108-11
12. Yogita B Shinger, and Thakur AG, “Stress Analysis of Steam Piping System”, Journal of Applied of Mechanical Engineering, Volume
4, Issue 2, 2015, pp. 1-5.
13. Pramod Bhatt, “Thermal Analysis Of Hollow Pipe Using Altair Hyperworks”, International Journal of Engineering Research &
Technology, Vol. 1 Issue 6, August – 2012.
14. Muchhu Siva Naga Muneendra, KolliparaDurgaprasad, Design and Thermal Analysis of the Boiler Tube With Internal Helical RIBS,
International Journal of Research in Mechanical Engineering & Technology, Vol. 7, Issue 2, May - Oct 2017, pp. 55-64.
15. D.Khrustalev and A. Faghri, Thermal Analysis of a Micro Heat Pipe, Journal of Heat Transfer, Volume 116, Issue 1, pp. 189-198, Feb
01, 1994.
16. Mohammad Taseem Rafique Kadagaonkar, Milind S Yadav, “Design of a Steam Piping System for Dryers in Paper Machine and
Checking its Sustainability through FiniteElement Analysis Using Caesar II”, International journal of advance research, Ideas and
Innovations in Technology, Volume2, Issue6, pp. 1-6, 2016.
17. J.F.Poynor, “Dead-Weight Stresses in Piping Systems and Their Inclusion in Thermal Stress Analyses”, Proceedings of the Institution
of Mechanical Engineers, Volume: 172 issue: 1, page(s): 513-530, June 1, 1958.
18. Shih-Han Wang, Wei-Jyun Wang, Chiao-Ying Chang, and Cheng-Liang Chen, “Analysis of a Looped High Pressure Steam Pipeline
Network in a Large-Scale Refinery”, Industrial and Engineering Chemistry Research, 54 (37), pp 9222–9229, September 2, 2015.
19. Hemanth Kumar K S, Kiran Kumar Rokhade, Prasanna P Kulkarni, Girish B Kallihal, “Analyzing the Temperature Distribution by
Theoretical and FEA in Insulated Steam Pipe used in Industrial Piping System”, International Journal of Engineering Research &
Technology, Vol. 7 Issue 06, June-2018.
20. F.VakiliTahami, F.Talati, A. Sorkhabi, O. Arashnia, “FEM Analysis of creep behavior of steel pipes under thermal gradients”, 2007,
DOI: 10.1007/978-1-4020-6239-1_158.
21. Vijayan.S.N, T.Gunasekaran, SenthilKumar.K.R, “Failure Analysis of A Steam Pipe Used In Rotary Kiln under High Temperature
Conditional Circumstances”, International Journal of Engineering and Advanced Technology, Volume-8, Issue-2S, December 2018,
pp: 488-491.
Authors: Ekta Sandeep Mehta Jain, Rajesh Kumar Bhuyan
Simulation and Optimization of Warpage of Fiber Reinforced using Human Behavior Based
Paper Title:
Optimization
Abstract: Warpage is one of the major defects in injection molding and this affects the quality of the
materials. Some techniques are used to minimize the warpage by the changing the parameter settings. The
optimization techniques were applied to the parameter to find the optimized value. The popular method in 296-302
optimizing the parameter is Genetic Algorithm (GA) and this has the limitation of big stochastic components.
The main objective of this research is to propose the Human Behavior Based Optimization (HBBO) in the
warpage. This method doesn’t have large stochastic and has a fast convergence rate. The orthogonal Array is
used to measure the warpage for the different parameter settings. The fiber reinforced component is used to
measure the performance of the proposed method. The Back Propagation Neural Network is used to find the
relationship between the warpage and other factors. Then optimization technique is applied to find the
parameter value. The experimental result of the proposed HBBO method in Warpage optimization is compared
with other existing method in warpage optimization. The HBBO method has the warpage of 0.0858 and the GA
method has the warpage of 0.0953.

Keywords: Fiber reinforced component, Human Behavior Based Optimization, injection molding, orthogonal
Array, and Warpage.

References:

1. W. C. Chen, M. H. Nguyen, W. H. Chiu, T. N. Chen, and P. H. Tai. (2016). Optimization of the plastic injection molding process using
the Taguchi method, RSM, and hybrid GA-PSO. The International Journal of Advanced Manufacturing Technology, 83(9-12), pp.
1873-1886.
2. Y. Xu, Q. Zhang, W. Zhang, and P. Zhang. (2015). Optimization of injection molding process parameters to improve the mechanical
performance of polymer product against impact. The International Journal of Advanced Manufacturing Technology, 76(9-12), pp.
50. 2199-2208.
3. S. Kitayama, Y. Yamazaki, M. Takano, and S. Aiba. (2018). Numerical and experimental investigation of process parameters
optimization in plastic injection molding using multi-criteria decision making. Simulation Modelling Practice and Theory, 85, pp. 95-
105.
4. R.J. Bensingh, R. Machavaram, S.R. Boopathy, and C. Jebaraj. (2019). Injection molding process optimization of a bi-aspheric lens
using hybrid artificial neural networks (ANNs) and particle swarm optimization (PSO). Measurement, 134, pp. 359-374.
5. E. Oliaei, B. S. Heidari, S. M. Davachi, M. Bahrami, S. Davoodi, I. Hejazi, and J. Seyfi. (2016). Warpage and shrinkage optimization
of injection-molded plastic spoon parts for biodegradable polymers using taguchi, ANOVA and artificial neural network methods.
Journal of Materials Science & Technology, 32(8), pp. 710-720.
6. S. Sudsawat, and W. Sriseubsai, (2018). Warpage reduction through optimized process parameters and annealed process of injection-
molded plastic parts. Journal of Mechanical Science and Technology, 32(10), pp. 4787-4799.
7. C. Shen, L. Wang, and Q. Li. (2007). Optimization of injection molding process parameters using combination of artificial neural
network and genetic algorithm method. Journal of Materials Processing Technology, 183(2-3), pp. 412-418.
8. M. Moayyedian, K. Abhary, and R. Marian. (2018). Optimization of injection molding process based on fuzzy quality evaluation and
Taguchi experimental design. CIRP Journal of Manufacturing Science and Technology, 21, pp. 150-160.
9. H. Kurtaran, B. Ozcelik, and T. Erzurumlu, (2005). Warpage optimization of a bus ceiling lamp base using neural network model and
genetic algorithm. Journal of materials processing technology, 169(2), pp. 314-319.
10. F. Yin, H. Mao, L. Hua, W. Guo, and M. Shu. (2011). Back propagation neural network modeling for warpage prediction and
optimization of plastic products during injection molding. Materials & design, 32(4), pp. 1844-1850.
11. S. Kitayama, H. Miyakawa, M. Takano, and S. Aiba. (2017). Multi-objective optimization of injection molding process parameters for
short cycle time and warpage reduction using conformal cooling channel. The International Journal of Advanced Manufacturing
Technology, 88(5-8), pp. 5-8, pp. 1735-1744.
12. R. Azad, and H. Shahrajabian. (2018). Experimental study of warpage and shrinkage in injection molding of HDPE/rPET/wood
composites with multiobjective optimization. Materials and Manufacturing Processes, pp. 1-9, 2018.
13. C. C. Kuo, Y. R. Wu, M. H. Li, and H. W. Wu. (2018). Minimizing warpage of ABS prototypes built with low-cost fused deposition
modeling machine using developed closed-chamber and optimal process parameters. The International Journal of Advanced
Manufacturing Technology, pp.1-10, 2018.
14. X. Wang, J. Gu, C. Shen, and X. Wang. (2015). Warpage optimization with dynamic injection molding technology and sequential
optimization method. The International Journal of Advanced Manufacturing Technology, 78(1-4), pp.177-187.
15. K. Li, S. Yan, W. Pan, and G. Zhao. (2017). Warpage optimization of fiber-reinforced composite injection molding by combining back
propagation neural network and genetic algorithm. The International Journal of Advanced Manufacturing Technology, 90(1-4), pp.
963-970.
16. P. Jangir, S. Parmar, And I. Trivedi. (2017). Human Behavior Based Optimization Algorithm for Optimal Power Flow Problem with
Discrete and Continuous Control Variables. International Journal of Engineering Technology Research & Management, 1(2), pp. 26-
35.
T. Siva Sankar Reddy, Bodanapu Sony, M. Madhusudhan Reddy, U. Praveen Goud4, Shaik
Authors:
Ahamed Mynuddin
Estimation of Conventional Pcc Strength And Durability with Partial Replacement of Cement using
Paper Title:
Aluminium Powder and Rice Husk Ash
Abstract: Bond is generally noted to be most costly constituents of cement. The whole development industry
is looking for an appropriate and viable the waste item that would extensively limit the utilization of concretes
and at last lessens the development cost. Rice husk slag (RHA) which has the pozzolanic properties is a route
forward. A relative report on impacts of solid properties when OPC of differing evaluations was mostly
supplanted by RHA is examined in this paper. Rate supplanting of OPC with RHA was 0, 10, 20, 30 and 40%
individually. The compressive quality, water ingestion, shrinkage and solidness of cement were for the most part
considered. The examination recommends that up to 20% supplanting of OPC with RHA can possibly be
51. utilized as halfway concrete substitution, having great compressive quality execution and durability. Percentage
supplanting of OPC with Aluminum powder (Al) is 0.5% which is kept steady. We are utilizing M sand rather
than typical sand to diminish the expense of development and builds quality and sturdiness concrete. The 303-307
examination proposes the supplanting of concrete with RHA and Aluminum powder expands the compressive
quality, solidness, and diminishes the expense of development.

Keywords: Rice Husk Ash, ordinary Portland cement (OPC), M sand.

References:

1. Subramani, T. and Rahman, A.F., 2017. An Experimental Study on The Properties of PET Fibre Reinforced Concrete. International
journal of Application or Innovation in Engineering & Management (IJAIEM), 6(3).
2. Sukesh, C., Krishna, K.B., Teja, P.S.L.S. and Rao, S.K., 2013. Partial replacement of sand with quarry dust in concrete. International
Journal of Innovative Technology and Exploring Engineering, 2(6), pp.254-258.
3. Shirule, P.A., Rahman, A. and Gupta, R.D., 2012. Partial replacement of cement with marble dust powder. International Journal of
Advanced Engineering Research and Studies, 1(3), pp.175-177.
4. Reddy, M.M., Reddy, K.R.S., Asadi, S.S., 2018. A study on compressive strength of conventional concrete by replacing with flyash
and sugarcane ash. International Journal of Pure and Applied Mathematics, 119 (14), pp. 1787-1791.
5. Madhusudhan Reddy, M. & Rajasekhara Reddy, K. 2019, "A critical evaluation on geotechnical characterization of medical and health
infrastructure building site at Mangalagiri, Guntur district, Andhra Pradesh, India", International Journal of Recent Technology and
Engineering, vol. 7, no. 6C2, pp. 580-584.
6. Ouypornprasert, W., Traitruengtatsana, N. and Kamollertvara, K., 2017, July. Optimum Partial Replacement of Cement by Rice Husk
Ash and Fly Ash Based on Complete Consumption of Calcium Hydroxide. In International Congress and Exhibition" Sustainable Civil
Infrastructures: Innovative Infrastructure Geotechnology" (pp. 145-184). Springer, Cham.
7. Ismail, M.S. and Waliuddin, A.M., 1996. Effect of rice husk ash on high strength concrete. Construction and building materials, 10(7),
pp.521-526.

Authors: P. Sowmiya, G.K. Revathi, M. Sakthipriya And V. Ramya

Paper Title: New Oscillation and Nonoscillation Criteria for a Class of Linear Delay Differential Equation
Abstract: In this article the authors established sufficient condition for the first order delay differential
equation in the form x^' (t)+p(t)x(τ(t))=0 ,t≥t_0 (*) where τ(t)<t,
〖lim〗┬(t→∞)⁡〖τ(t)〗= ∞ and p(t) is a non negative piecewise continuous function. Some interesting
examples are provided to illustrate the results.

Keywords: Oscillation, delay differential equation and bounded. AMS Subject Classification 2010: 39A10 and
39A12.

References:
52.
1. O. Arino et al, Delay Differential Equations and Applications, Springer (2006), 477-517.
2. Chuan Jun Tian and B.G Zhang, New Oscillation Criteria for a Class of Linear Delay Differential Equations, Bull London Math. Soc. 308-313
31(1999), 196-206.
3. S.G. Deo, V. Lakshmikantham and V. Ragavendra. Text Book of Ordinary Differential Equations, Tata Mc Graw Hill Pub. Co. New
Delhi, 1997.
4. A. Elbert and I.P. Stavroulakis, Oscillation and Non Oscillation Criteria for Delay Differential Equations, Proc. Ameri. Math. Soc.
123(1995), 1503-1510.
5. A. Elbert, Comparison Theorems for First Order Nonlinear Differential with Delay, Studia Sci. Math. Hungan. 11 (1976), 259-267.
6. G.S. Ladde, V.Lakshmikantham, B.G. Zhang, Oscillation Theory of Differential Equations with Deviating Arguments, Dekker, New
York, 1987.
7. B. Li, Oscillation of First Order Delay Differential Equations, Proc. Amer. Math. Soc. 124(1996), 3729-3737.
8. H. Smith, An introduction to delay Differential Equations with Applications to the Life Sciences, Springer 2011.
9. X.H Tang and J.S. Yu, Oscillation of First Order Delay Differential EquationJ. Math. Anal. Appl. 248(2000), 247-259.
10. Xianhua Tang Jianhua Shan, Oscillations of Delay Differential Equations with Variable Coefficients, J. Math. Anal. Appl. 217(1998),
43-71.

Authors: Hima Keerthi Penumetsa, Shashi Mogalla


Ml Based Naive Bayes Methodology for Rate Prediction Using Textual Rating and Find Actual or
Paper Title:
Movie Rating Based on Mbnbr Optimization
Abstract: We've experienced a bulk of review pages such as Amazon, Flip Kart & Facebook, book my show
and some applications etc., in latest studies. It offers an excellent chance to share our reviews for different goods
we buy. However, we are faced with the issue of duplicating data. It is essential where to stock precious data
from feedback to comprehend the desires of a user and create a precise suggestion. Some variables, such as user
buy documents, item type, and geographic place, are considered by conventional recommendation schemes. We
suggest a Feeling Forecast Technique (FFT) in this job to enhance forecast precision in recommendation
schemes. First, we suggest a personal assessment strategy for personal consumers and determine the feeling
about objects/products of each customer. Second, we regard not only the own emotional characteristics of a
customer but also the relational emotional impact. After which they count the credibility of the item that could
be deduced from a consumer sets emotional scores reflecting the extensive assessment of clients. Finally, we
combine in our recommendation scheme three elements feeling resemblance relational emotional, impact, and
notoriety resemblance of item to create a precise forecast of rating. On an actual-world sample obtained from
53.
Glass door, we undertake a quality assessment of the three emotional variables. Our findings show that the
feeling can well describe display settings that help improve the effectiveness of recommendations. Above all 314-321
discussion is analyzed with ML based Naive Bayes optimization got 20% more efficiency compared to existed
methods like linear regression, etc.

Keywords: Naive Bayes Classifier, PD (Positive Dictionary), SDD (Sentiment Degree Dictionary), ND
(Negation Dictionary), Social Media, move ML based naive Bayes rate prediction (MBNBR) OPTIMIZATION.

References:
1. R. Salakhutdinov, and A. Mnih, “Probabilistic matrix factorization,” in NIPS, 2008.
2. X. Yang, H. Steck, and Y. Liu, “Circle-based recommendation in online social networks, ” in Proc. 18th ACM SIGKDD Int. Conf.
KDD, New York, NY, USA, Aug. 2012, pp. 1267–1275.
3. M. Jiang, P. Cui, R. Liu, Q. Yang, F. Wang, W. Zhu, and S. Yang, “Social contextual recommendation,” in proc. 21st ACM Int.
CIKM, 2012, pp. 45-54.
4. M. Jamali and M. Ester, “A matrix factorization technique with trust propagation for recommendation in social networks,” in Proc.
ACM conf. RecSys, Barcelona, Spain. 2010, pp. 135-142.
5. Z. Fu, X. Sun, Q. Liu, et al., “Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data
Supporting Parallel Computing,” IEICE Transactions on Communications, 2015, 98(1):190-200.
6. G. Ganu, N. Elhadad, A Marian, “Beyond the stars: Improving rating predictions using Review text content,” in 12th International
Workshop on the Web and Databases (WebDB 2009). pp. 1-6.
7. J. Xu, X. Zheng, W. Ding, “Personalized recommendation based on reviews and ratings alleviating the sparsity problem of
collaborative filtering,” IEEE International Conference on e-business Engineering. 2012, pp. 9-16.
8. X. Qian, H. Feng, G. Zhao, and T. Mei, “Personalized recommendation combining user interest and social circle,” IEEE Trans.
Knowledge and data engineering. 2014, pp. 1763-1777.
9. H. Feng, and X. Qian, “Recommendation via user’s personality and social contextual,” in Proc. 22nd ACM international conference on
information & knowledge management. 2013, pp. 1521-1524.
10. Z. Fu, K. Ren, J. Shu, et al., “Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement,” IEEE
Transactions on Parallel & Distributed Systems, 2015:1-1.
11. D.M. Blei, A.Y. Ng, and M. I. Jordan, “Latent Dirichlet Allocation,” Journal of machine learning research 3. 2003, pp. 993-1022.
12. W. Zhang, G. Ding, L. Chen, C. Li , and C. Zhang, “ Generating virtual ratings from Chinese reviews to augment online
recommendations,” ACM TIST, vol.4, no.1. 2013, pp. 1-17.
13. Z. Xia, X. Wang, X. Sun, and Q. Wang, “A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data,”
IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 2, 2015, pp. 340-352.
14. J. Weston, R. J. Weiss, H. Yee, “Nonlinear latent factorization by embedding multiple user interests,” 7th ACM, RecSys, 2013, pp.
65-68.
15. J. Huang, X. Cheng, J. Guo, H. Shen, and K. Yang, “ Social recommendation with interpersonal influence,” in Proc. ECAI, 2010, pp.
601-606.
16. Y. Lu, M. Castellanos, U. Dayal, C. Zhai, “Automatic construction of a context-aware sentiment lexicon: an optimization approach,”
World Wide Web Conference Series. 2011, pp. 347-356.
17. T. Kawashima, T. Ogawa, M. Haseyama, “A rating prediction method for e-commerce application using ordinal regression based on
LDA with multi-modal features,” IEEE 2nd Global Conference on Consumer Electronics (GCCE). 2013, pp. 260-261.
18. K.H. L. Tso-Sutter, L. B. Marinho, L. Schmidt-Thieme, “Tag-aware recommender systems by fusion of collaborative filtering
algorithms,” in Proceedings of the 2008 ACM symposium on Applied computing, 2008, pp. 1995-1999.
19. B. Wang, Y. Min, Y. Huang, X. Li, F. Wu, “ Review rating prediction based on the content and weighting strong social relation of
reviewers,” in Proceedings of the 2013 international workshop of Mining unstructured big data using natural language processing,
ACM. 2013, pp. 23-30.
20. F. Li, N. Liu, H. Jin, K. Zhao, Q. Yang, X. Zhu, “Incorporating reviewer and product information for review rating prediction,” in
Proceedings of the Twenty-Second international joint conference on Artificial Intelligence, 2011, pp. 1820-1825.
21. Saikumar, K., Rajesh, V., Ramya, N., Ahammad, S.H., Kumar, G.N.S.”A deep learning process for spine and heart segmentation using
pixel-based convolutional networks “Journal of International Pharmaceutical Research. 2019 vol 46 issue:1.
Authors: V. Giridhar, P.Rajendra Kumar, P.Kishore Kumar Reddy

Paper Title: Behaviour of a New Concrete Composition with Jaggery as Admixture


Abstract: Quality of concrete is influenced by the proportion of ingredients and method of preparation in
concrete production. A unique word which is used on concrete is inevitable in human life due to its properties
and applications. From the ancient days lime and jiggery are used as binding materials. This review paper
expressed the significance of jaggery on strength behavior of a new concrete composition. Experimentation
carried out for determining strength properties of a new concrete for M20 grade nominal concrete using jaggery
as admixture. Based on previous study, jaggery is an unrefined sugar product and it is easily available market;
the main function of jaggery is to increase the initial setting time of concrete and it also influencing the
properties of concrete. Preferably this type of admixture is used in different construction sites like deep
foundations, piers and long piles. Four different percentages of admixture was chosen into the experimentation
at 0, 0.25, 0.50 and 0.75% by weight of cement, finally it is accomplished that the workability of concrete is
being superior with jiggery as admixture but flexural strength and shear strength of this new concrete decreased
as compared with convectional M20 concrete.

Keywords: workability, shear strength, flexural strength, jaggery.


54.
References: 322-326
1. Giridhar. V. et al., “Effect of sugar and jaggery on strength properties of concrete”.||volume ||2|| Issue|| 10|| Pages||01-06||2013||
2. A.V. Pavan Kumar et al., “Effect of sugar, jaggery and sugar cane ash, on properties of concrete”.||ISSN 2319-8885||volume-04||Issue-
51||pages||11000-11006|| December||2015||
3. 3Somawanshi. S.P. et al., “Effect of molasses in concrete as a water reducing and time retarding admixture”||PP.13417-
13421||volume||07||September||2016||
4. 4Lavhare Rajendra et al., “Effect of sugar and jaggery (molasses) on strength properties of concrete”. ||ISSN2277-5528||jan-mar 2017||.
5. 5Manjunatha. M “ An experimental study on partial replacement of cement by cementitious materials, sand by copper slag and the use
of jaggery, egg albumen and human hairs in concrete”||ISSN 2455-7137||PP 47-56||volume 02||Issue 08||August||2017||
6. 6Fouziya Qureshi et al., “Study on strength of concrete by adding jaggery”||e-ISSN 2278-1684||p-ISSN 2320-334X||volume||14||Issue 5
ver. V(sep-oct2017)||PP 26-30||.
7. 7 Dinesh Kumar “Sugar cane molasses in concrete as a water reducing – Retarding Admixture”: A Review ||ISSN 2348-8352||
pages||123-125||April 2015||.
8. 8Suraj.V.Sha et al,” Effect of sugar and Jaggery on workability and compressive strength of concrete” 13 International conference on
Recent Innovations in Science, Engineering and Management, 23 Feb 2018, Pages 546-551.
9. Jaibeer chand and Sangeeta Dhyani,” Effect of Sugar on Compressive Strength of Concrete” International Journal of Advanced
Technology and Engineering Research,Vol-5, Issue-4, July 2015.
10. Harish Moolchandani, “Influence of Addition of Jiggery Concentration on Different Grades of Concerte” International Journal for
Scientific Research & Development| Vol. 6, Issue 03, 201, pp 1117-1118

Authors: D.Evangeline, T.Abirami

Paper Title: Social Spider Optimization Algorithm: Theory and its Applications
Abstract: An extensive variety of optimization problems are solved by swarm intelligence algorithms that are
modelled based on the animal or insect behaviour while living in groups. One such recent swarm intelligence
algorithm is Social Spider Optimization (SSO). This paper thoroughly reviews and analyses the characteristics
of this meta-heuristic algorithm. Since the existing literature of this algorithm is comparatively limited, the paper
discusses the research ideas presented in such existing works and classifies the literature on basis of the
application areas like image processing, optical flow, electric circuits, neural networks and basic sciences. It also
sets a basis for research applications of the algorithm in order to tap the complete potential of the algorithm in
other areas to achieve desired results.

Keywords: Image Processing, Meta-heuristics, Neural Networks, Social Spider Optimization.

References:

1. Russell Stuart J and Norvig Peter. Artificial Intelligence: A Modern Approach. 2nd ed.. (Book style).Upper Saddle River, New Jersey,
USA, Prentice Hall. 2003, pp. 68-70.
2. Hlavac V., Jeffery K. G., and Wiedermann J.”Exhaustive Search, Combinatorial Optimization and Enumeration: Exploring the
55. Potential of Raw Computing Power.” Lecture Notes in Computer Science .1963. pp.18–35. Available:
https://link.springer.com/chapter/10.1007/3-540-44411-4_2 327-332
3. Xin Yuan. “Heuristic Algorithms for Multiconstrained Quality-of-Service Routing”. IEEE ACM Transactions on Networking. Vol.10,
2002.pp.244-256. Available:
4. https://ieeexplore.ieee.org/document/993305
5. Felix-Antoine Fortin, Francois-Michel De Rainville, Marc-Andre Gardner, Marc Parizeau and Christian Gagne. “DEAP: Evolutionary
Algorithms Made Easy”. Journal of Machine Learning Research. Vol 13. 2012.pp.2171-2175. Available:
http://www.jmlr.org/papers/v13/fortin12a.html
6. Yan-fei Zhu and Xiong-min Tang. “Overview of swarm intelligence”. In proceedings of IEEE 2010 International Conference on
Computer Application and System Modeling. 2010. pp.400-403. Available:
7. https://ieeexplore.ieee.org/document/5623005
8. Hakan Bakırcıoğlu, Taşkın Koçak. “Survey of random neural network applications.” European Journal of Operational
Research.Vol.126. 2000.pp.319-330. Available:
9. https://www.sciencedirect.com/science/article/abs/pii/S0377221799004816
10. Chien-Wei Chu , Min-Der Lin, , Gee-Fon Liu and Yung-Hsing Sung. “Application of immune algorithms on solving minimum-cost
problem of water distribution network.” Mathematical and Computer Modelling.Vol 48. 2008..pp. 1888-1990. Available:
11. https://www.sciencedirect.com/science/article/pii/S0895717708001131
12. C.D. Yang. “Efficient Stochastic Algorithms on Locally Bounded Image Space.” CVGIP-Graphical Models and Image Processing.
Vol 55.1993.pp.494-506. Available:
13. https://www.sciencedirect.com/science/article/pii/S1049965283710370
14. Colin Paul Gloster. “Optimization Algorithms in Physics.” International Journal of Nonlinear Sciences and Numerical Simulation.
Vol 11. 2010.pp.387-388. Available:
15. https://www.degruyter.com/view/j/ijnsns.2010.11.6/ijnsns.2010.11.6.387/ijnsns.2010.11.6.387.xml
16. Ricardo Martinez-Soto, Oscar Castillo, Luis T. Aguilar and Patricia Melin. “Fuzzy Logic Controllers Optimization Using Genetic
Algorithms and Particle Swarm Optimization.” Advances in Soft Computing. Vol 6438. 2010.pp.475-486. Available:
17. https://link.springer.com/chapter/10.1007/978-3-642-16773-7_41
18. John McCall. “Genetic algorithms for modelling and optimisation.” Journal of Computational and Applied Mathematics. Vol 184.
2005. pp.205-222. Available:
19. https://www.sciencedirect.com/science/article/pii/S0377042705000774
20. Dan Simon. “Biogeography-Based Optimization.” IEEE Transactions on Evolutionary Computation.Vol 12. 2008.pp.702-713.
Available:https://ieeexplore.ieee.org/document/4475427/
21. R. E. Uhrig. “Introduction to artificial neural networks.” In proceedings of IEEE 21st International Conference on Industrial
Electronics, Control, and Instrumentation. 1995.pp.33-37. Available: https://ieeexplore.ieee.org/document/483329
22. AlRashidi M. R and El-Hawary M. E. “A survey of particle swarm optimization applications in electric power systems.” IEEE
Transactions on Evolutionary Computation. Vol 13. 2009.pp.913-918. Available:
23. https://ieeexplore.ieee.org/document/4358752
24. Weifeng Gao , Sanyang Liu and Lingling Huang. “A global best artificial bee colony algorithm for global optimization.” Journal of
Computational and Applied Mathematics. Vol 236. 2012.pp.2741-2753.
25. Available:
26. https://www.sciencedirect.com/science/article/pii/S0377042712000246
27. Marco Dorigo, Mauro Birattari and Thomas Stutzle. “Ant colony optimization.” IEEE Computational Intelligence Magazine.Vol 1.
2007.pp.28-39. Available: https://ieeexplore.ieee.org/document/4129846
28. Xin-She Yang and Suash Deb. “Cuckoo search: recent advances and applications.” Neural Computing and Applications. Vol 24.
2014.pp.169-174. Available:https://link.springer.com/article/10.1007/s00521-013-1367-1
29. Vivek Agrawal, Harish Sharma and Jagdish Chand Bansal. “Bacterial Foraging Optimization: A Survey.” In proceedings of Springer
2011 International Conference on Soft Computing for Problem Solving. 2011.pp.227-242. Available:
https://link.springer.com/chapter/10.1007/978-81-322-0487-9_23
30. Xin‐She Yang and Amir Hossein Gandomi. “Bat algorithm: a novel approach for global engineering optimization.” Engineering
Computations. Vol 29. 2012.pp.464 – 483.
31. Esmat Rashedi, Hossein Nezamabadi-pour and Saeid Saryazdi. “GSA: A Gravitational Search Algorithm.” Information Sciences. Vol
179. 2009. pp.2232–2248. Available:
32. https://www.sciencedirect.com/science/article/pii/S0020025509001200
33. Pablo Rabanal, Ismael Rodríguez and Fernando Rubio. “Solving Dynamic TSP by Using River Formation Dynamics.” In proceedings
of IEEE Fourth International Conference on Natural Computation. 2008. pp.246-250. Available:
https://ieeexplore.ieee.org/document/4666848
34. Mingyu Du, Xiujuan Lei and Zhenqiang Wu. “A simplified glowworm swarm optimization algorithm.” In proceedings of IEEE
Congress on Evolutionary Computation. 2014. pp.2861 - 2868. Available: https://ieeexplore.ieee.org/document/6900409
35. B R Rajakumar. “Lion algorithm for standard and large scale bilinear system identification: A global optimization based on Lion's
social behavior.” In proceedings of IEEE Congress on Evolutionary Computation. 2014. pp.2116 – 2123. Available:
https://ieeexplore.ieee.org/document/6900561
36. James J.Q. Yu and Victor O.K. Li. “A social spider algorithm for global optimization.” Applied Soft Computing. Vol 30.
2015..pp.614-627. Available: https://www.sciencedirect.com/science/article/pii/S1568494615001052
37. Emad Nabil. “A Modified Flower Pollination Algorithm for Global Optimization.” Expert Systems with Applications. Vol 57.
2016..pp.192-203. Available: https://www.sciencedirect.com/science/article/pii/S0957417416301415
38. Erik Cuevas, Miguel Cienfuegos, Daniel Zaldívar and Marco Pérez-Cisneros. “A swarm optimization algorithm inspired in the
behavior of the social-spider.” Expert Systems with Applications. Vol 40. 2013.pp.6374-6384. Available:
https://www.sciencedirect.com/science/article/pii/S0957417413003394
39. Salima Ouadfel and Abdelmalik Taleb-Ahmed. “Social spiders optimization and flower pollination algorithm for multilevel image
thresholding: A performance study.” Expert Systems with Applications. Vol 55. 2016. pp.566-584. Available:
40. https://www.sciencedirect.com/science/article/pii/S0957417416300550
41. Danillo Roberto Pereira, José Delpiano and João Paulo Papa. “Evolutionary Optimization Applied for Fine-Tuning Parameter
Estimation in Optical Flow-Based Environments.” In proceedings of 27th IEEE SIBGRAPI Conference on Graphics, Patterns and
Images. 2014.pp. 125-132. Available: https://ieeexplore.ieee.org/document/6915299/
42. Seyedeh Zahra Mirjalili, Shahrzad Saremi, Seyed Mohammad Mirjalili. “Designing evolutionary feedforward neural networks using
social spider optimization algorithm.” Neural Computing and Applications. Vol 26. 2015.pp.1919-1928. Available:
https://link.springer.com/article/10.1007/s00521-015-1847-6
43. Mohamed A. Tawhid, Ahmed F. Ali. “A simplex social spider algorithm for solving integer programming and minimax problems.”
Memetic Computing. Vol 01. 2016..pp.01-20. Available: https://link.springer.com/article/10.1007/s12293-016-0180-7
44. Mohamed A. Tawhid, Ahmed F. Ali. “A hybrid social spider optimization and genetic algorithm for minimizing molecular potential
energy function.” Soft Computing . Vol 01. 2016.pp.01-16. Available: https://link.springer.com/article/10.1007/s00500-016-2208-9
45. Carlos E Klein, Emerson H V Segundo, Viviana C Mariani, Leondro dos S. Coelho. “Modified Social-Spider Optimization applied to
Electromagnetics.” IEEE Transactions on Magnetics. Vol 52. 2016. Available: https://ieeexplore.ieee.org/document/7279148
46. Danillo R. Pereira, MarioA. Pazotia, Luís A.M.Pereira, Douglas Rodrigues, Caio O.Ramos, André N.Souzad, João P.Papa. “Social-
Spider Optimization based Support Vector Machines applied for energy theft detection.” Computers and Electrical Engineering. Vol
49. 2016.pp.25–38. Available: https://www.sciencedirect.com/science/article/pii/S0045790615003572

Authors: Snigdha Sarkar, Sasmita Samanta, Arpita Mitra

Paper Title: Food Consumption Analysis of Convict’s Family: Application of Fuzzy Logic
Abstract: In new age state of affairs Prisons are supposed not only to penalize the criminal but also correct the
condition and behaviour of the criminals, who is accountable for inflicting injure on the victim. But family
portion of the criminal are also the victim in the process and situation. Convicts family faces the dreadful
condition during this procedure. Prisoner’s families are ill-treated unswervingly and in a roundabout way by the
society. They live in penury. Captivity of family member not only lessens the income of adult men but also
reduces familial funds for the basic requirements of life. The family members have to sacrifice their children’s
education, ancestor’s property, past savings, in some cases even essential requirements of their life. We always
think about the victim on whom the harm has been directly inflicted and completely ignore the harm inflicted on
the kin of the convict. The present study is an attempt to fetch to light the monetary susceptibility of families of
criminal in a prison in Bhubaneswar. After interviewing the family members of prisoners, data is analyzed
through fuzzy logic approach. The findings are explained in narrative manner so that the answer will be useful
for policy makers in future.

Keywords: Prisons, Prisoner’s families, Food consumption, Fuzzy logic.

References:

1. M. F. Abraham, Contemporary Sociology: An introduction to concepts and theories, Oxford University, Press, New
Delhi, 2005, pp.87-89.
2. H. L. Ahuja, Macroeconomics: Theory and Policy, S. Chand & Company Ltd., New Delhi, 2012, pp.143-145.
3. Aid for Convicts' Families, Journal of the American Institute of Criminal Law and Criminology, 2(1911), pp.633-634.
Retrieved from http://www.jstor.org/stable/1133 074
4. W. Carlin and D. Soskice, Macroeconomics: Imperfections, Institutions & Policies, Oxford University Press, New
Delhi, 2006, pp.206-209.
5. T. F. Cullen and L. C. Jonson, Correctional Theory: context and consequences, Sage Publication, New Delhi, 2012, pp.129.
6. E. L. Daigle, Victimology: A Text/Reader, Sage Publication, New Delhi, 2012 pp.1.
56. 7. M. A. Dasmasela, Indonesia’s efforts to achieve globally competitive human resources, International Journal of Humanities and Social
Science Invention 7(2009), pp.1-6.
8. D. N. Dewedi, Macroeconomics- Theory and Policy, Tata McGraw Hill Education Private Limited, New Delhi, 2015, pp. 167-168.
333-336
9. P. Easton and Christine Pipe, Sentencing and Punishment: The quest for Justice, Oxford University Press, 2012, pp.29.
10. B. A. Garner, Black’s Law Dictionary. Thomson Reuter’s, Toronto, 2009, p.383.
11. A. Giddens, Sociology, Wiley India Pvt. Ltd., New Delhi, 2006, pp.206.
12. A. Giddens, Sociology. Wiley India Pvt. Ltd., New Delhi, 2012, pp.330.
13. F. E. Hagan, Introduction to Criminology. Sage Publication, New Delhi, 2011, pp.32.
14. M. Haralambos, and R. M. Heald, Sociology: Themes and Prospective, Oxford University Press, New Delhi, 2013, pp.389.
15. H. L. A. Hart, Punishment and Responsibility: Essay in Philosophy of Law, Oxford. Oxford University Press. New Work. 2008,
pp.1-20.
16. C. D. Hauge and W. A. Stonier, A Textbook of Economic Theory, Repro India Pvt. Ltd., Mumbai, 2012.
17. M. Morris, Demythologizing Our View On Prisons, in: Instead of Prison: A handbook for abolitionists, ed., 1976, Retrieved from
https://www.prisonpolicy.org/scans/ins tead_of_prisons/chapter2.shtml.
18. M. L. Jhingan, Macroeconomic Theory, Vrinda Publications, New Delhi, 2008, pp.120-128.
19. C. S. Lanier Jr and G. Fisher, A prisoners' parenting centre (PPC): A promising resource strategy for incarcerated fathers, Journal
of Correctional Education, 41(1990), pp.158-165.
20. A. Lowenstein, Family Relation: The Single Parent Family. National Council on Family Relation, 35(1986), pp.75-89.
21. R. M. Machiver, and C. H. Page, Society: An introductory analysis. Surjeet Publication, Delhi, 2006, pp. 238-243.
22. J. J. Macionis, Sociology, Parson Education, New Delhi, 2006, p.461.
23. K. P. Malik, Penology, Victimology & Correctional Administration in India. Allahabad Law University, 2001, p.1.
24. P. Mandal, Kinship meaning, types and other details, 2017, Retrieved from http://www.yourarticlelibrary.com/soci ology/kinship-and-
family/kinship-meaning-types-and-other-details/34960
25. R. I. Mawby and S. Walklate, Critical Criminology: International Prospective, Sage Publication, new Delhi, 2002, pp.33.
26. D. Newman, Sociology: exploring the architecture of everyday life. Sage Publication, New Delhi, 2010, p.194.
27. E. O'Hara and M. Robbins, Using Criminal Punishment to Serve both Victim and Social Needs. Law and Contemporary
Problems, 72(2009), pp.199-217.
28. H. K. Rawat, Contemporary Sociology, Rawat, New Delhi, 2013, pp.95.
29. J. Roberts and M. Hough, Sentencing Riot-Related Offending: Where Do the Public Stand? The British Journal of
Criminology, 53(2013), pp.234-256.
30. R.D. Shankardass, Punishment and Prison: India and international Prospective, Sage Publication, New Delhi, 2000,
pp.95-107.
31. E. Shapiro, Macroeconomic Analysis, Galgotia Publication, New Delhi, 2001, pp.65-77.
32. R.C. Srivastava, Law Relating to: Crime and punishment. Manav Law House, Allahabad, 2006, pp.95-147.
33. N. Van Long, The relative income hypothesis. Journal of Economic Dynamics & Control, 35(2001), pp.1489-1501.
34. Victims of Crime Assistance Tribunal, Types of Victim, 2016, Retrieved from https://www.vocat.vic.gov.au/assistanc e-
available/types-victims.
35. C. A. Visher and J. Travis, Transitions from prison to community: Understanding individual pathways. Annual Review of
Sociology, 29(2003), pp.89-113.
36. H. L. Ahuja, Advanced Economic Theory-Microeconomic Analysis, S. Chand & Company Ltd., New Delhi, 2012, pp.907-918.
37. C. Wildeman and B. Western, Incarceration in Fragile Families. The Future of Children, 20(2010), pp.157-177.
38. S. K. Williams. Textbook on Criminology, Oxford University Press, United Kingdom, 2008, pp.12-13.

Authors: G. Bhavani, S. Sivakumari

Paper Title: Improved Cuckoo Optimization Algorithm for Association Rule Hiding
Abstract: Association Rule Mining (ARM) is a standard data mining practice used to determine interactions
hidden in huge sets. Association Rule Hiding (ARH) methods are used to preserve the privacy of data in ARM.
ARH process modifies the original database without changing any non-sensitive rules and data. In order to hide
the sensitive rules, cuckoo search optimization algorithm that was developed for hiding the sensitive association
rules (COA4ARH) was proposed for sensitive rule hiding. In COA4ARH, number of transactions that should be
modified to hide the sensitive rules is not considered which may leads to more number of iteration. In this paper,
two properties are introduced to select less number of transactions to be modified. It makes the COA4ARH
algorithm faster, decreases the number of lost rules and is suitable for variety of datasets. In order to increase the
rule hiding capability of COA4ARH, new fitness functions are introduced. The new fitness functions reduce the
amount of lost rules and avoid generation of ghost rules which are formed as objectives of COA4ARH
algorithm. The multiple objectives in COA4ARH are conflicting with each other. This is known as multi-
objective optimization problem. The multi-objective optimization deals with set of non-dominated solutions
(Pareto front) for the problem having more than one objective. It is solved by using Crowding Distance (CD)
which selects the optimal set of solution for association rule hiding. Thus, the proposed Improved COA4ARH-
CD (ICOA4ARH-CD) can be suitable for variety of datasets and effectively hides the sensitive rules with fewer
side effects.

57. Keywords: Association rule hiding, Cuckoo optimization algorithm, Crowding Distance, Multi-objective
optimization problem, Privacy preserving data mining.
337-342
References:

1. M. H. Afshari, M. N. Dehkordi, M. Akbari. “Association rule hiding using cuckoo optimization algorithm”, Expert Systems with
Applications, 2016
2. F. Sheikholeslami, N.J. Navimipour, “Service allocation in the cloud environments using multi- objective particle swarm optimization
algorithm based on crowding distance”, Swarm and Evolutionary Computation, 2017.
3. R. Natarajan, R. Sugumar, M. Mahendran and K. Anbazhagan, K. “Design and Implement an Association Rule hiding Algorithm for
Privacy Preserving Data Mining”, Int. J. Adv. Res. Comput. Commun. Eng., Vol. 1, No. 7, 2012.
4. H. Quoc Le, S. Arch-int and N. Arch-int, “Association rule hiding based on intersection lattice”, Math. Probl. Eng., 2013.
5. P.R. Ponde and S.M. Jagade, ”Privacy Preserving by Hiding Association Rule Mining from Transaction Database”, IOSR J. Comput
Eng. (IOSR-JCE), Vol. 16, No. 5, pp. 25-31, 2014.
6. P. Cheng, I. Lee, J.S. Pan, C.W. Lin and J.F. Roddick, “Hide association rules with fewer side effects”, IEICE trans. Inf. Syst., Vol. 98,
No. 10, pp. 1788-1798, 2015.
7. S. Mogtaba and E. Kambal, “Association Rule Hiding for Privacy Preserving Data Mining”, Ind. Conf. Data Min. Springer, Cham, pp.
320-333, 2016.
8. P. Cheng, I. Lee, C.W. Lin and J.S. Pan, “Association rule hiding based on evolutionary multi-objective optimization”, Intell. Data
Anal., Vol. 20, No. 3, pp. 495-514, 2016.
9. G.A. Afzali and S. Mohammadi, “Privacy preserving big data mining: association rule hiding using fuzzy logic approach”, IET Inf.
Secur., Vol. 12, No. 1, pp. 15-24, 2017.
10. D. Menaga and S. Revathi, “Least lion optimisation algorithm (LLOA) based secret key generation for privacy preserving association
rule hiding”, IET Inf. Secur., Vol. 12, No. 4, pp. 332-340, 2018.
11. S.V. Mohan and T. Angamuthu, “Association Rule Hiding in Privacy Preserving Data Mining”, Intern. J. Inf. Secur. Priv. (IJISP), Vol.
12, No. 3, pp. 141-163, 2018.
Authors: B. Srikanth Deepak, B.T.P. Madhav, T. Anjali, P. Chaithanya, P. Avinash, K. Sanjeev, S. Salma

Paper Title: Design and Analysis of Dual E-Shaped Antenna for Wireless Applications
Abstract: In this paper, simple triband Multiple Input and Multiple Output (MIMO) antenna is proposed for
wireless communication technology. This antenna consists of two symmetric monopoles which are placed at a
distance of 0.106λ0 and for board area it occupies 0.25λ0*0.26λ0. By integrating a stub in the ground plane and
adding the stub in the feed line, isolation is achieved more than 20dB.This triband MIMO antenna operates
under 2.5GHz, 3.3GHz and 4.4 GHz. The proposed antenna gives Radiation Patterns and Stable Gain. Mean
effective gain (MEG) and Diversity Gain (DG) are also measured.
58.
Keywords: Dual E shaped Antenna, MIMO Antenna WI- Max. 343-349

References:

1. Dirk M. 2009. MIMO Antenna Design Challenges. Loughborough Ant. & Propag. Conf. IEEE, pp.50-56.
2. NBuris, N. E. et al. 2017. Capacity based MIMO antenna design, IEEE Int Symp on Ant & Propag & USNC/URSI National Radio Sci
Meeting, pp.1695-1696
3. Vaishnavi, D. N et al. 2015. Flared V-shape slotted monopole multiband antenna with metamaterial loading, Int J on Comm Ant &
Propag, 5(2), pp.93-97.
4. Bhavani, K.V.L. et al. 2015. Multiband slotted aperture antenna with defected ground structure for C and X-band communication
applications, J of Theor & Appl Info Tech, 82(3), pp.454-461.
5. Lakshmi M L S N S., et al. 2015. Novel sequential rotated 2×2 array notched circular patch antenna, J of Engg Sci & Tech Rev, 8(4),
pp.73-77.
6. Takeshore K. 2015. Printed log-periodic dipole antenna with notched filter at 2.45 GHz frequency for wireless communication
applications, J of Engg & Appl Sci, 10(3), pp.40-44.
7. Bhargav Y., et al. 2014. Measurement of dimensional characteristics of microstrip antenna based on mathematical formulation, Int J of
Appl Engg Res, 9(9), pp.1063-1074.
8. Kartheek T. et al. 2015. Novel printed monopole trapezoidal notch antenna with S-band rejection, J of Theor & Appl Info Tech, 76(1),
pp.42-49.
9. Sriharsha N., et al. 2015. Design and analysis of compact coplanar wave guide fed asymmetric monopole antennas, Res J of Appl Sci,
Engg & Tech, 10(3), pp.247-252.
10. Khan H. et al. 2016. Circularly polarized slotted aperture antenna with coplanar waveguide fed for broadband applications, J of Engg
Sci & Tech, 11(2), pp.267-277.
11. Ujwala D., et al. 2013. CPW fed serrated antenna performance based on substrate permittivity, Int J of Appl Engg Res, 8(12), pp.1349-
1354.
12. Manikanta P., et al. 2014. Tapered step CPW-fed antenna for wideband applications. ARPN J of Engg & Appl Sci, 9(10), pp.1967-
1973.
13. Kumar K.V.V., et al. 2014 Fractal aperture EBG ground structured dual band planar slot antenna. Int J of Appl Engg Res, 9(5), pp.515-
524.
14. Manjusha A.V. 2014. Analysis of CPW fed step serrated ultra wide band antenna on Rogers RT/duroid substrates. Int. J of Appl Engg
Res, 9(1), pp.53-58.
15. Prasanth S, et al. 2015. Analysis of defected ground structure notched monopole antenna. ARPN J of Engg and Appl Sci, 10(2), pp.747-
752.
16. Reddy, S.S.M, et al. 2013. Trident shaped ultra wideband antenna analysis based on substrate permittivity. Int J of Appl Engg Res,
8(12), pp.1355-1361.
17. Sharma N., et al. 2013. Performance characterization of radial stub microstrip bow-tie antenna. Int J of Engg & Tech, 5(2), pp.760-764.
18. Khan, H., et al. 2014. Fractal shaped Sierpinski on EBG structured ground plane. Leonardo Elect J of Pract & Tech, 13(25), pp.26-35.
19. Pranoop, M.S., et al. 2015. Cpw fed antenna for wideband applications based on tapered step ground and ebg structure. Indian J of Sci
& Tech, 8, pp.119-127.
20. Reddy, S.S.M, et al. 2015. Asymmetric defected ground structured monopole antenna for wideband communication systems. Int J on
Comm Ant & Prop, 5(5), pp.256-262.
21. Murthy, K., et al. 2017. Reconfigurable notch band monopole slot antenna for WLAN/IEEE-802.11n applications. Int J of Intelli Engg
& Sys, 10(6), pp.166-173.
22. Sai Kumar, S.B.V.N., et al. 2016. Analysis of circularly polarized notch band antenna with DGS. ARPN J of Engg & Appl Sci, 11(17),
pp.10140-10150.
23. Kiran, D.S.R, et al. 2015. Novel compact asymmetrical fractal aperture Notch band antenna. Leonardo Elect J of Pract & Tech, 14(27),
pp.1-12.
24. Sadasivarao B, et al. 2014. Analysis of hybrid slot antenna based on substrate permittivity. ARPN J of Engg & Appl Sci, 9(6), pp.885-
890.
25. Rao, D.S, et al. 2016. Microstrip parasitic strip loaded reconfigurable monopole antenna. ARPN J of Engg & Appl Sci, 11(19),
pp.11589-11594.
26. Haritha, N., et al. 2014. Design and analysis of microstrip slot array antenna configuration for bandwidth enhancement. Leonardo Elect
J of Pract & Tech, 13(25), pp.72-83.
27. Srinivas, M.S.S.S., et al. 2015. A novel compact CPW fed slot antenna with EBG structure. ARPN J of Engg & Appl Sci, 10(2),
pp.835-841.
28. Sunder, P.S., et al. 2015. Novel miniatured wide band annular slot monopole antenna. Far East J of Elect & Comm, 14(2), pp.149-159.
29. Jung C. W, et al. 2006. Reconfigurable scan-beam single-arm spiral antenna integrated with RF-MEMS switches. IEEE Trans on Ant
& Propag, 54, pp.455-463.

Authors: S.H.Y.S. Abdullah, M.A.A Mohd Azizudin, A. Endut

Paper Title: Design and Prototype Development of Portable Trash Collector Boat for Small Stream Application
Abstract: Commercially available trash collector boats are often designed in large size to cater to the high
trash loading for surface water cleaning purpose. On the other hand, for small streams and drainage, the manual
cleaning method is often used. This situation is undesirable since it can lead to health problem and diseases to
the operator due to the number of impurities present in the water. This paper highlights a proposed design of a
trash collecting boat for cleaning purposes in small area applications such as lakes, small streams and drainage.
The trash collector boat is designed to be a small and automated boat capable of collecting floating solids off the
water surface and store them temporarily. The trash will be manually collected at the end of the operation. The
design methodology has been accomplished using engineering design method to propose a suitable design of
portable trash collector boat based on commercially available design. With the aid of Autodesk Inventor 2009, a
3D representation of the trash collector boat was generated to visualize all the details regarding the trash
59. collector boat. System fabrication will be conducted using appropriate material to ensure the efficiency of trash
collector boat. Testing and analysis were conducted to evaluate the system performance, monitoring unit
performance and loading capacity of the portable trash collector boat. The results found that the collector boat is 350-356
capable of handling a maximum trash load of 6 kg in a single operation.

Keywords: Prototype design; Surface water; Trash collector boat; Waste management.

References:

1. Rafique SMSM, & Langde A Design and fabrication of river cleaning machine. Int. Jour. Sci. Adv. Res. Tech. 2017;3(11):63–65
2. 8 Most Common Types of Garbage Found in the Ocean. Available on https://www.banthebottle.net/articles/8-most-common-types-of-
garbage-found-in-the-ocean accessed on 10/03/2018
3. Sreenivasan J, Govindan M, Chinnasami M, & Kadiresu I. Solid Waste Management in Malaysia – A Move Towards Sustainability.
In Waste Management - An Integrated Vision. InTech. Publ. Ltd. 2012;
4. Hua AK. Analytical and detection sources of pollution based environmetric techniques in Malacca river, Malaysia. Appl. Ecolo.
Environ. Res. 2017;15(1):485–499
5. The Ban on Microbeads – Why It Matters and Why It’s Still Not Enough Available on https://www.banthebottle.net/articles/the-ban-
on-microbeads-why-it-matters-and-why-its-still-not-enough accessed on 12/03/2018
6. Tiwari RV, Maheshwari A, Srivastava MC, & Sharma A. Design and Fabrication of Project on Water Bodies Cleaning Robot. Int.
Jour. Engine. Manage. Res. 2018;3:15–17
7. Kader ASA, Saleh, MKM, Jalal MR, Sulaiman OO. Design of rubbish collecting system for inland waterways. Jour. Trans. Engine.
2015;2(2): 1–13
8. Water Witch Workboats - Multipurpose pollution control, marina, & amp; waterway maintenance. Available on
https://waterwitch.com/en/ accessed on 01/01/2019
9. Liverpool Waterwitch Marine &amp; Engine. Co. Ltd. Available on https://waterwitch.com/en/products/waterwitch/ accessed on
02/01/2019
10. Ecoceane livre un bateau de dépollution à la ville de Paris. Available on https://www.meretmarine.com/fr/content/ecoceane-livre-un-
bateau-de-depollution-la-ville-de-paris accessed on 02/01/2019
11. Aquarius Systems - On the cutting edge of water management technology. Available on http://www.aquarius-systems.com/ accessed
on 01/01/2019
12. Dambhare A, Golekar K, Giri A, & Take S. Efficient lake garbage collector by using pedal, Int. Jour. Rec. Trends Engine. Res.
2016;2(4):327–340
13. Padwal AB, Tambe MS, Chavare PS, Manahwar RK, & Mhatre MS Review paper on fabrication of manually controlled drainage
cleaning system. Int. Jour. Sci. Engine. Res. 2017;8(3):204–208
14. Manikandan S, Mohan Raj G, Nandhakumar M, Neelamanikandan P, Sateesh R, & Balakrishnan N. Design and fabrication of
automatic drainage cleaning system. Int. Res. Jour. Adv. Engine. Tech. 2018;4(2):3084–3091
15. Sirsat PM, Khan IA, Jadhav PV, & Date PT. Design and fabrication of river cleaning machine. Int. Jour. Mod. Trends Engine. Res.
207;4(2):76–80
16. Lee SH, Lee YG, & Kim SH On the development of a small catamaran boat. Ocean Engine. 2007;34 (14-15):2061-2073
17. Munde K, & Wagh MN. Design and analysis of river water skimmer. Int. Jour. Rec. Trends Engine. Res. 2018;4(7): 126–132

Authors: Yugandhara Liladhar Devikar, R. A. Oak, S. D. Talegoakar

Paper Title: Reservoir Sedimentation and Flushing using Run-of-River Project


Abstract: Annually sedimentation causes 1 % of storage capacity of the reservoir all over the world. Blockage
of intakes in the reservoirs and damage to tunnels/turbines can be also caused due to sediment inflow from the
rivers in the catchment area. Due to the problems caused by sediments scouring of sediment from reservoir
known as flushing is been done and this technique for removal of sediment is the most effective one. The
process of flushing is done by lowering the water level necessarily to erode deposited sediment and also to flush
them from/through the intakes and river catchment. The sediment size and other parameters such as the sediment
characteristics within the catchment area of reservoir and technique used during the flushing process through the
reservoir and also along the geometry of channel can be related to outflow sediment discharge. Run-of-the-river
projects contribute a major part of power generation in India, but this type of projects face a very common
problem of sediment accumulation in the reservoirs due to high amount of sediments coming from mountainous
region. These sediments decrease the storage capacity of reservoir and also the life of turbine blades by choking
and reacting with it. North and North-East India is facing severe problem of storage depletion in their reservoirs
for the power generation. Hence, it is essential to keep proper sediment management plans in reservoirs of these
types of projects during planning and design stage. This paper describes the prediction of sedimentation and
flushing pattern in the reservoir of usual run of river project in Himalayan region, the paper describes the use of
mathematical model simulations. The one dimensional HEC-RAS 5.0.3 was used as numerical modeling for the
project and the results of flushing model was also. In this study, monsoon data was used to predict the year wise
sedimentation pattern. Eight sets of transport equations (Ackers-White, Meyer Peter Muller, Engelund-Hansen,
Laursen, Wilcock-Crowe, Yang, Toffaleti, MPM-Toffaleti.) were used with different sets of time interval to
perform the study. The analysis of results and comparison with annual observed sediment volume indicated that
60. simulations using HEC-RAS 5.0.3 with Ackers-White transport equation predicted the sediment load more
accurately when the reservoir was operated at FRL. Hence, further studies for reservoir operating at FRL were
357-361
carried out using the Ackers-White transport equation. Further, the worst condition of sediment accumulation
was taken into flushing model to perform flushing analysis. Here, two different combinations of run were
performed of 300 cumecs & 400 cumecs discharge for of 3, 6, 9, 12, 15, 18, 24, and 27 hours respectively. By
analyzing the results coming from flushing runs, it was concluded that the run performed at FRL for 300 cumec
discharge for 24 hours and 400 cumecs discharge for 15 & 18 hours were effective.

Keywords: Reservoir sedimentation, Numerical modeling, HEC-RAS, Run-of-the-river project, Flushing


Model, Flushing.

References:

1. Garde, R.J and Rangaraju, K. G (1977), Mechanics of sediment transportation and alluvial stream problem, Third edition, Wiley
Eastern, Ltd, New Delhi.
2. N.Talebbeydokhti and A. Naghshineh (2004), Flushing Sediment through Reservoirs, Iranian Journal of Science & Technology,
Transaction B, Vol. 28, No.B1.
3. Brian G. Wardman, P.E., Brad R, Hall. P.E, and Casey M. Kramcr. P.E (2009) "One-Dimensional Modeling of Sedimentation
Processes on the Puyallup River". World Environmental and Water Resources Congress: Great Rivers © ASCE
4. Morris, G.L and Fan, J (2008) Reservoir sedimentation handbook, McGraw-Hill Book Co.
5. HEC-RAS “Hydraulic Reference Manual version 4.1.0”, (2010) Hydrologic Engineering Center, USACE
6. Qaid Beebo, Raja Ahmed Bilal (2012), Simulating bathymetric changes in reservoir due to sedimentation, Division of water resources
Engineering Department of building and Environmental Technology Lund University.
7. Roozheb Aghamajidi, Mohammad Heidarnejad (2013), One dimensional simulation of sediment flushing through reservoir,
International Journal of Agriculture and Crop Science.
8. A. Amini & P. Heller, G. De Cesare & A. J. Schleiss, S. M. Sayah (2014), Comprehensive numerical simulations of Sediment
Transport and reservoir flushing of Cerro del Aguila reservoir in Peru, Conference paper September 2014.
9. Dr. A.R Ghumman, Engr. Israr ul Haq (2015),Investigation of flushing sediments from large reservoir using numerical modeling,
International journal of scientific and engineering research, Volume 6, ISSN 2229-5518.
10. Ochiere H.O, Prof. Onyando J.O, Dr. Kamau D.N (2015), Simulation of Sediment Transport in the Canal Using the HEC-RAS In an
Underground Canal in Southwest Kano Irrigation Scheme - Kenya, International journal of engineering scientific, Volume 4 Issue 9,
ISSN 2319-6734.

Authors: S.Karunakaran, B.Poonguzharselvi

Paper Title: High Performance VLSI Architecture for Braun Multiplier


Abstract: The requirement for portable devices with high fidelity should consume less power . Adding two
binary numbers is the basic thing in ALU Unit. Adder is an important part of the processor. The complexity of
designing the multiplier and ALU changes due to the transistor count. Full adder plays a vital role in signal
processing applications, Embedded systems. In the design of fundamental computation units such as multiplier
should be included in future applications. Designing VLSI multipliers helps in deriving high end performance
architecture which minimizes the consumed power consumption in the architecture. Generally, parallel
multipliers are adopted for area optimization and processing speed. 28 T and 20 T full adders are designed which
is further utilized for the implementation of Braun multiplier in virtuso schematic of Cadence software 180nm
transistor size design.
61.
Keywords: Braun multiplier, 3 bit adder, low power.
362-365
References:

1. Dayadi Lakshmaiah et al “Low Power consumption of CMOS Braun multiplier using 4 input bit using threshold voltage base
techniques”, Global Journal of Researches in Engineering: Electrical and Electronics Engineering 2014, Version 1.0 , issue 9,
Volume 14.
2. Arvind Nigam et al “ Performance Analysis of adder using 28 number of transistor and 14 number of transistors”, International
Journal of Engineering Adavanced Research, March 2016, Issue 2 Volume 1
3. Aktan, Baran “ Multiplier Architecutres for less power dissipation in CMOS technology”, IEEE symposium on circuits and Systems
(ISCAS), p.1061-1064
4. Krishnaveni et al , VLSI design of Vedic multiplier architecture with less delay”, IJATER, Volme 2, Issue 4, 2012
5. Abu Khater et al, “Circuit design for less Power dissipation multipliers”, IEEE Journal of Solid State Circuits, No.10, Vol 31 ,
pp. 1535 -1546,1996.
Authors: Sukriti, Sudeep Kumar Mohaney
Design Of High Attenuation and Less Damping Filter for Renewable Energy Source with Parallel
Paper Title:
Lrc Component
Abstract: Photovoltaic (PV) panel produces a DC voltage as output which is always having random variations
which is further required to convert into a constant DC voltage output, a Voltage Source Inverter (VSI) is the
required and further another DC to AC VSI convertor required. VSI used Pulse width modulation (PWM) for
switching of metal Oxide semiconductor Field Effect Transistor (MOSFET) and a very fast switch cause
harmonics in the circuits, which further need to remove by filters. The available filters are good but reducing
either the overall efficiency by 2-3 percentage or giving high damp at resonant frequency. that issue must be
resolve, proposed work has come up with a new design in which Parallel LCL-R (PLCL-R) type filter which has
high efficiency and high attenuation than previous and better response at high frequencies. Proposed design is
been developed with help of Matrix laboratories (MATLAB) Simulink design, where power electronics
component tool box 'sim-electronics and sim-escape' used. The results of proposed work found better then LCL
filter, TRAP filter and other filters of base works.

62. Keywords: Source Invertors, Pulse width modulation, Photovoltaic, L-Inductor, C-Capacitor, R-Resistor.

References: 366-372

1. Subash chandar A., Sanjib Kumar Panda, Degradation Detection and Diagnosis of Inductors in LCL Filter Integrated with Active Front
End Rectifier, DOI 10.1109/TPEL.2017.2685421, IEEE Transactions on Power Electronics ( Volume: 33 , Issue: 2 , Feb. 2018 )
2. Lorand Bede, Ghanshyamsinh Gohil1, Tamas Kerekes, Mihai Ciobotaru, Remus Teodorescu1, Vassilios G Agelidis, Comparison
between cross section side and inverter side current control for parallel interleaved grid related converters, DOI:
10.1109/EPE.2015.7311745, Proceedings of the 2015 seventeenth European Conference on Power Electronics and Applications
(EPE'15 ECCEEurope)
3. Hyosung Kim Kyoung-Hwan Kim, FILTER DESIGN FOR GRID CONNECTED PV INVERTERS, ICSET 2008, 978-1-4244-1888-
6/08,2008 IEEE
4. Fei Li, Student Member, IEEE, Xing Zhang, Senior Member, IEEE, Hong Zhu, Haoyuan Li, and Changzhou Yu, Student Member,
IEEE, 'A LCL-AFER Filter for Grid-Connected Converter Topology, Parameter, and Analysis' IEEE TRANSACTIONS ON POWER
ELECTRONICS, VOL. 30, NO. 9, SEPTEMBER 2015 5067
5. Mikel Zabaleta, Eduardo Burguete, Danel Madariaga, Ignacio Zubimendi, Markel Zubiaga, Igor Larrazabal. LCL Grid Filter Design of
a Multi-Megawatt Medium-Voltage Converter for Offshore Wind Turbine utilizing SHEPWM Modulation, Department of Ingeteam
Power Technology S.A., Spain, IEEE Transactions on Power Electronics • January 2015
6. A. A. Rockhill, Marco Liserre, Remus Teodorescu, and Pedro Rodriguez, Grid-Filter Design for a Multimegawatt Medium Voltage-
Source Inverter, IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 58, NO. 4, APRIL 2011 1205.

Authors: S.Panneerselvam, A.Rakesh, R.Saravana Kumar, S.Saravanan, R.O.Yadunath Gurudeep


Paper Title: Design and Fabrication of Automatic Onion Planting Machine
Abstract: The main objective of the project is to design and fabricate an automated onion planting machine.
The onion (Allium cepa L) is one of the commonly used crops which are grown in most of the farms in India and
abroad for their consumption purpose and also export purpose. Onion growing farmers undergo hurdles in
planting of onion seedlings because of shortage of farming labours during planting onion crops. So, necessity of
developing an automated onion planting machine increased. Various physical properties like soil, weather, plant,
seedlings, and soil fertility were determined to fabricate the automated onion planting machine. The automated
onion planting machine plants onion plants in straight row at a predefined interval between each plant without
any human intervention using automation. Automation plays a major factor in developing the automated onion
planting machine to save farmers time and labour cost to plant onion plants in a row.
63.
Keywords: Onion, Planting, Robot.
373-376
References:

1. A. R. Kyada & D. B Patel, DEC 2014 “Design And Development Of Manually Operated Seed Planter Machine” of Lecture 5th
International & 26th All India Manufacturing Technology, Designand Research Conference (AIMTDR 2014), IIT Guwahati, Assam,
India. Vol 2.
2. D. Ramesh,H.P. Girishkumar, JULY 2014“
3. Agriculture Seed Sowing Equipment: A Review”ISSN N0.:2278-7798,Volume3.Kannan , K. Esakkiraja , S. Thimmarayan, JAN
5014 “Design And Modification Of Multipurpose Sowing Machine” VOL:2 ,ISSN (ONLINE):2321-3051.
4. A. Rohokale , 2004 “International journal of advanced agriculture system with proper seed spacing”.
5. Roshan V. Marode, P. Gajanan Deisgn & Implementation of Multispeed Sowing Machine”, Vol: 2, No. 4,ISSN
6. S.Panneerselvam, P.Thangavel, S.Kannaki, “Performance Analysis of vapour compression refrigeration system with mechanical
subcooling”, “International Journal of innovative technology and Exploring Engineering” ISSN: 2278-3075, Volume-8 Issue-8 June,
2019.

Authors: A.S. Princy, M. Rajeswari

Paper Title: Assessing Competency of Community Healthcare Workers


Abstract: Background: Community healthcare workers (CHW) play an important role in preventive healthcare
system in India. CHW link the community to the health system of the country. As the population in India covers
majorly in village, community healthcare workers are the face of the healthcare. These CHW competencies are
yet to be ascertained. Objectives: To determine standardized framework for competency of the Community
healthcare workers in India. Methods: By using structured questionnaire with 5 point Likert scale is
implemented to evaluate the competency of CHW. Respondents are 35 participants including Accredited Social
Health Activist (ASHA), Medical social worker and diabetes educator in and around Chennai. Findings:
Suggested that community health workers are highly competent. More clarity in role of community healthcare
workers is required. Government should initiate program to nurture the service quality of primary centers,
equipment, manpower facility in health centers, etc Training regarding the maternity care and communication
skills are core competency required for a CHW to perform his/her role properly. Conclusions: The results of the
study show that CHW of India is also competent. Community healthcare workers are contributing more in
maternal care and preventive care. They put more effort in health education and sanitation in rural areas.

Keywords: Competency, Indian Community healthcare workers, Preventive care, Role.

References:

64. 1. Peretz, P.J., Matiz, L.A., Findley, S., Lizardo, M., Evans, D. and McCord, M., 2012. Community health workers as drivers of a
successful community-based disease management initiative. American journal of public health, 102(8), pp.1443-1446.
2. Gopalan, S.S., Mohanty, S. and Das, A., 2012. Assessing community health workers’ performance motivation: a mixed-methods 377-380
approach on India's Accredited Social Health Activists (ASHA) programme. BMJ open, 2(5), p.e001557.
3. Saprii, L., Richards, E., Kokho, P. and Theobald, S., 2015. Community health workers in rural India: analysing the opportunities and
challenges Accredited Social Health Activists (ASHAs) face in realising their multiple roles. Human resources for health, 13(1), p.95.
4. Feliciano, E.E., Boshra, A.Y., Mejia, P.C.G., Feliciano, A.Z. and Maniago, J.D., 2019. Understanding Philippines Nurses Competency
in the Delivery of Healthcare Services. J Pat Care, 5(146), p.2.
5. Government of India. ASHA the way forward: evaluation of ASHA Program. NRHM New Delhi: The National Health System Resource
Center, 2011.
6. Nyanzi, S. and Manneh, H., 2007. Traditional birth attendants in rural Gambia: beyond health to social cohesion. African journal of
reproductive health, 11(1), pp.43-56.
7. Henderson, L.N. and Tulloch, J., 2008. Incentives for retaining and motivating health workers in Pacific and Asian countries. Human
resources for health, 6(1), p.18.
8. Lewin, S., Munabi‐Babigumira, S., Glenton, C., Daniels, K., Bosch‐Capblanch, X., van Wyk, B.E., Odgaard‐Jensen, J., Johansen, M.,
Aja, G.N., Zwarenstein, M. and Scheel, I.B., 2010. Lay health workers in primary and community health care for maternal and child
health and the management of infectious diseases. Cochrane database of systematic reviews, (3).
9. Shrestha, R., Baral, K. and Weir, N., 2001. Community ear care delivery by community ear assistants and volunteers: a pilot
programme. The Journal of Laryngology & Otology, 115(11), pp.869-873.
10. Willis-Shattuck, M., Bidwell, P., Thomas, S., Wyness, L., Blaauw, D. and Ditlopo, P., 2008. Motivation and retention of health workers
in developing countries: a systematic review. BMC health services research, 8(1), p.247.
11. Ingram, M., Reinschmidt, K.M., Schachter, K.A., Davidson, C.L., Sabo, S.J., De Zapien, J.G. and Carvajal, S.C., 2012. Establishing a
professional profile of community health workers: results from a national study of roles, activities and training. Journal of community
health, 37(2), pp.529-537.
12. Ahmed Syed Masud. (2008). Taking healthcare where the community is: the story of the shasthya sebikas of BRAC in Bangladesh.
BRAC University Journal, vol. O. 1, 2008, pp. 39-45
13. Scott, K. and Shanker, S., 2010. Tying their hands? Institutional obstacles to the success of the ASHA community health worker
programme in rural north India. AIDS care, 22(sup2), pp.1606-1612.
14. Liu, A., Sullivan, S., Khan, M., Sachs, S. and Singh, P., 2011. Community health workers in global health: scale and scalability. Mount
Sinai Journal of Medicine: A Journal of Translational and Personalized Medicine, 78(3), pp.419-435.
15. Sanders, D. and Schaay, N., 2008. International perspective on primary health care over the past 30 years: primary health care: in
context. South African health review, 2008(1), pp.3-16.
16. Sharma, R., Webster, P. and Bhattacharyya, S., 2014. Factors affecting the performance of community health workers in India: a multi-
stakeholder perspective. Global health action, 7(1), p.25352.

Authors: M.Suman, M.Venu Gopala Rao, P.V.Ramana Rao

Paper Title: ANN Based SVC FACTS Controller to Enhance Voltage Stability of Multi-Machine Power System
Abstract: Voltage stability is the most vital phenomena in power systems which may be disturbed by the
mismatch between the reactive power supply and demand. The occurrence of internal faults in the equipment
and short circuit faults also there may be voltage collapse at the buses. Voltage stability can be improved using
Static VAR Compensator (SVC) which is a shunt device. It can generate or absorb reactive power in a
controlled manner such that it can enhance voltage stability of the system. L- Index method is used to determine
voltage sensitivity at each bus and the bus having highest L- index value can be considered as a weak bus which
is the optimal location of FACTS controller. The investigation is made to observe how susceptance in
susceptance model and firing angle in firing angle model of the SVC is predicted to enhance the voltage at each
bus by the artificial neural network under chaotic load. Standard IEEE 5 bus and 30 bus systems are considered
as test systems and simulations are performed in MATLAB software.

Keywords: Voltage Stability, Reactive Power control, L-Index method, Static VAR Compensator, Artificial
Neural Network.

References:

1. Noor Ropidah Bujal, Amilia Emil Hasan, “Analysis of voltage stability problems in power system” 4th International Conference on
65. 2102,)h2ECp(pe neeeine heegegng y oeo heegegEieeenignE 27-29 Aug. 2014.
2. V.K. Gupta, S. Kumar,B. Bhattacharyya,” Enhancement of Power System Loadability with FACTS Devices” The Institution of
Engineers (India) , Volume 95, Issue 2, pp 113–120, April,2014.
3. Damian.O.Dike and Satish.M.Mahajan;" Voltage stability index based reactive power compensation scheme"; Electrical Power and 381-387
Energy System; vo0.73; pp.732-722; 2105.
4. H. Saadat, Power System Analysis, McGraw-Hill Series in Electrical Computer Engineering, 0999.
5. F. Rabea, S. Kamel ,F. Jurado ,” Implementation of a simplified SVC model into Newton-Raphson load flow algorithm” ITCE
international conference, pp.373 -379, Feb.2018.
6. Honnne Hnoe , Ynoe Kge , “The Analysis on the L-index based Optimal Power Flow Considering Voltage Stability Constraints”,
WSEAS Tioeioetngei on Syitemi ,Issue 11, Volume 7,.pp.1300-1309, November 2008.
7. S.P. London; L.F Rodriguez and G. Oliver; "A simplified voltage stability index(SVSI); Electrical Power and Energy System; vo0.63;
pp.816-803; 2102.
8. A. E. Abedelatti, H. Hashim, I. Z. Abidin, A. W. H. Sie, U. T. Nasional, and T. Mara, “Weakest Bus Based on Voltage Indices and
Loadability,” no. April, pp. 8–9, 2105
9. .E Acha, V G Agelidis, “Power Electronic Control in Electrical Systems”, Newness, 2116.
10. N.A. Lahacani, B. Mendil, “Modeling and Simulation of the SVC for Power System Flow Studies,” Leonardo Journal of
Sciences, pp. 053-071, 2118.
11. M.Suman, M.Venu Gopala Rao, P.V.Ramana Rao “Enhancement of voltage stability using optimally sited static VAR compensator
with three phase fault”, Jour.of Research in Dynamical & Control systems, Vol.10, No.3, pp.95-106,Feb.2018.
12. M. O. Hassen, S.J. Cheng, Z. A. Zakaria, “Steady State Modelling of SVC and TCSC for Power Flow Analysis,” the
international multi conference of engineering and computer scientists Proceeding, Vol. 2, pp. 0223-0228. 2119.
13. M. Kowsalya, K. K. Ray, D. P. Kotheri, “Positioning of SVC and STATCOM in a Long Transmission Line,” International journal of
Recent Trends in Engineering, Vol. 2, No. 5, 2119.
14. P.K Modi,S.P Singh,J.D.Sharma“Loadability margin calculation of power system with SVC using Artificial Neural Network”
Engineering applications of Artificial Intelligence,Vol-18,pp695-703,2005.
15. M.Suman, M.Venu Gopala Rao, P.V.Ramana Rao “Improvement of multi-machine power system stability using artificial intelligent
power system”, Modelling, measurement and Control-A, Vol.91, No.3,pp.145-151 September, 2018.
Authors: Yadlapalli Priyanka, R. Arthi
Multi-relay Antennas for Energy Harvesting Cognitive Radio Networks using Energy-Assisted
Paper Title:
Decode Forward Method
Abstract: The single antenna relay energy-assisted decode forward (EDF) was not applicable for multi
cognitive users that has less data rates. In order to achieve higher data rates with increased user demands energy
harvesting or Simultaneous Wireless Information and Power Transfer (SWIPT) enabled networks with multi
antenna relays are highly recommended. The proposed work considers multi relay EDFSWIPT for 5G systems
with presence of transmitter and an antenna array. The transmitter affords data and power towards various
numerous single-antenna secondary receivers (SR). The SR outfitted with a power splitter receiving system
66. where multiple primary relays are introduced. The goal of proposed work is to amplify weighted sum rate
harvested energy for SR using multi relay EDF. The simulation considers the capacity, outage probability, and 388-392
throughput for both primary and secondary networks with respect to both single multi relay EDF. The simulation
results afford that multi relay EDF has better performance than single antenna array EDF.

Keywords: Energy harvesting, multi relay, cognitive network, SWIPT, EDF.

References:

1. L. Varshney, Transporting Information and Energy Simultaneously, in Proc. IEEE ISIT, Jul. 2008, pp. 1612–1616.
2. P. Grover and A. Sashay, Shannon meets Tesla: Wireless Information and Power Transfer, in Proc. IEEE ISIT, Jun. 2010, pp. 2363–
2367.
3. O. Ozel, K. Tutuncuoglu, S. Uluru, and A. Yonder, Fundamental Limits of Energy Harvesting Communications, IEEE Communication
Magazine, vol. 53, no. 4, pp. 126–132, Apr. 2015.
4. X. Zhou, R. Zhang, and C. K. Ho,Wireless Information And Power Transfer: Architecture Design and Rate-Energy Tradeoff, IEEE
Transactions on Communication, vol. 61, no. 11, pp. 4754–4767, Nov. 2013.
5. R. Zhang and C. K. Ho, MIMO Broadcasting for Simultaneous Wireless Information and Power Transfer, IEEE Transactions on
Wireless Communication, vol. 12, no. 5, pp. 1989–2001, May 2013.
6. Dillep k.Verma, Ronald Y.chang, and Fengtsun Chien, Energy Assisted Decode and Forward for Energy Harvesting Cooperative
Cognitive Networks, 2332-7731©2016IEEE.
7. Bi S., Ho C.K., Zhang R, Wireless Powered Communication: Opportunities and Challenges, IEEE Communication Magazine
2015;53:117–125. DOI: 10.1109/MCOM.2015.7081084.
8. Ding Z., Ng D.W.K., Peng M., Suraweera H.A., Schober R., Poor H.V, Application of Smart Antenna Technologies in Simultaneous
Wireless Information and Power Transfer, IEEE Communication Magazine, 2015;53:86–93. DOI: 10.1109/MCOM.2015.7081080.
9. Shi Q., Liu L., Xu W., Zhang R, Joint transmit beamforming and receive power splitting for MISO SWIPT systems, IEEE Transactions
on Wireless Communication, 2014;13:3269–3280. DOI: 10.1109/TWC.2014.041714.131688.
10. Vu Q.D., Tran L.N., Farrel R., Hong E.K, An Efficiency Maximization Design for SWIPT, IEEE Signal Processing Letters,
2015;22:2189–2193. DOI: 10.1109/LSP.2015.2464082.
11. Ding Z., Krikidis I., Sharif B., Poor H.V., Wireless Information and Power Transfer in Cooperative Networks with Spatially Random
Relays, IEEE Transactions on Wireless Communication, 2014;13:4440–4453.DOI: 10.1109/TWC.2014.2314114.
12. Timotheou S., Krikidis I., Zheng G., Ottersten B., Beamforming for MISO Interference Channels with QoS and RF Energy Transfer,
IEEE Transactions on Wireless Communication, 2014;13:2646–2658.
13. Feng R., Li Q., Zhang Q., Qin J, Robust Secure Transmission in MISO Simultaneous Wireless Information and Power Transfer
System, IEEE Transactions on Vehicular Technology, 2015;64:400–405.DOI: 10.1109/TVT.2014.2322076.
14. Liao J., Khandaker M.R.A., Wong K.K, Robust power-splitting SWIPT beam forming for broadcast channels, IEEE Communication
Letters, 2016;20:181–184. DOI: 10.1109/LCOMM.2015.2498928.
15. Wang F., Peng T., Huang Y., Wang X, Robust transceiver optimization for power-splitting based downlink MISO SWIPT systems,
IEEE Signal ProcessingLetters.2015;22:1492–1496.DOI:10.1109/LSP.2015.2410833.
16. Chu Z., Zhu Z., Xiang W., Hussein J,Robust beamforming and power splitting design in MISO SWIPT downlink system, IET
Communication 2016;10:691–698. DOI: 10.1049/iet-com.2015.0475.
17. Nasir A.A., Tuan H.D.,Ngo D.T., Durrani S., Kim D.I, Path-Following Algorithms for Beamforming and Signal Splitting in RF Energy
Harvesting Networks, IEEE Communication Letters, 2016;20:1687–1690. DOI: 10.1109/LCOMM.2016.2578921.
18. Goldsmith A., Jafar S.A., Maric I., Srinivas S, Breaking spectrum gridlock with cognitive radios: An information theoretic perspective,
Proc. IEEE. 2009;97:894–914. DOI: 10.1109/JPROC.2009.2015717.
19. Mohjazi L., Dianati M., Karagiannidis G.K., Muhaidat S, RF-powered cognitive radio networks: Technical challenges and limitations,
IEEE Communication Magazine, 2015;53:94–100. DOI: 10.1109/MCOM.2015.7081081.
20. Zheng G., Ho Z., Jorswieck E.A., Ottersten B, Information and Energy Cooperation in Cognitive Radio Networks, IEEE Transactions
on WirelessCommunication,2014;62:2290–2303.DOI:10.1109/TSP.2014.2310433.
21. Ng D.W.K., Lo E.S., Schober R, Multi-Objective Resource Allocation for Secure Communication in Cognitive Radio Networks with
Wireless Information and Power Transfer, IEEE Transactions on Vehicular Technology, 2016;65:3166–3184. DOI:
10.1109/TVT.2015.2436334.
22. Yang Z., Ding Z., Fan P., Karagiannidis G.K, Outage performance of cognitive relay networks with wireless information and power
transfer, IEEE Transactions on Vehicular Technology, 2016;65:3828–3833.DOI: 10.1109/TVT.2015.2443875.
23. Lee S., Zhang R, Cognitive wireless powered network: Spectrum sharing models and throughput maximization, IEEE Transactions on
Cognitive Communication Networks, 2015;1:335–346. DOI: 10.1109/TCCN.2015.2508028.
24. Tuan P.V., Koo I, Optimal Multiuser MISO Beamforming for Power-Splitting SWIPT Cognitive Radio Networks, IEEE Access, 2017;
5:14141–14153. DOI: 10.1109/ACCESS.2017.2727073.
25. Ghasemi A., Sousa E.S, Fundamental limits of spectrum sharing in fading environment, IEEE Transactions on Wireless
Communication, 2007;6:649–658. DOI: 10.1109/TWC.2007.05447.

Authors: Ritam Dutta, Nitai Paitya


Electrical Characteristics Assessment on Heterojunction Tunnel FET (HTFET) by Optimizing
Paper Title:
Various High-κ Materials: HfO2/ZrO2
Abstract: In this paper, DC performance of double gate tunnel field effect transistor with heterojunction has
been assessed by various III-V compound semiconductor materials using 2-D Technology Computer Aided
Design (TCAD) simulations. Different hetero high-κ dielectric materials like HfO2, ZrO2 have been
incorporated to achieve better electrical characteristics, viz. high ON-state current drivability, improved
switching ratio and high tunneling probability. In this work, lower band gap materials have been used as hetero
gate dielectric to enhance mobility using band to band tunneling (BTBT), transconductance and steeper
subthreshold-slope. The heterojunction TFET (HTFET) then incorporated with various hetero dielectrics (high-κ
and low-κ combination), where the ZrO2 – SiO2 combination of dielectric having thickness of 2 nm both in
front and back gate, attains maximum value of ION as 1.522 × 10-5 A/µm. The subthreshold swing (ss) has also
been recorded best as 23.93 mV/dec in comparison with conventional homo dielectric i.e. SiO2-SiO2 oxide
67. throughout the 50 nm channel of HTFET as 34.22 mV/dec, can serve as better alternative tunnel FETs in low
power logic applications.
393-396
Keywords: DC Performance, Heterojunction Tunnel FET (HTFET), High - κ dielectric, Subthreshold swing, 2-
D TCAD, Band-to-band tunneling (BTBT).

References:

1. C. Seabaugh and Q. Zhang, “Low-voltage tunnel transistors for beyond CMOS logic,” Proc. IEEE, Vol.98, No.12, pp.2095–2110,
2010.
2. W. Y. Choi, B.G. Park Lee and K. Liu, “Tunneling field-effect transistors (TFETs) with subthreshold swing (SS) less than 60 mV/dec,”
IEEE Electron Device Lett. Vol.28, No.8, pp.743–745, 2007.
3. W. Y Choi and W Lee. “Hetero-gate-dielectric tunneling fieldeffect transistors,” IEEE Trans. Electron Devices, Vol.57, No.9,
pp.2317–2319, 2010.
4. M. Jagadesh Kumar and S. Ramaswamy, “Double Gate Symmetric Tunnel FET: Investigation and Analysis”, IET Circuits, Devices
and Systems, Vol.11, No.4, pp.365-370, 2017.
5. P. Wisniewski and B. Majkusiak, “Modeling the Tunnel Field-Effect Transistor Based on Different Tunneling Path Approaches”. IEEE
Transactions on Electron Devices, Vol.65, No.6, pp.2626–2631, 2018.
6. A. Pon, S. Carmel, A. Bhattacharyya and R. Ramesh; “Performance analysis of Asymmetric Dielectric Modulated Dual short Gate
Tunnel field effect transistor”, Superlattices and Microstructures, Elsevier, Vol.113, pp.608-615, Jan. 2018.
7. R. Jhaveri, V. Nagavarapu and J. Woo, “Effect of Pocket Doping and Annealing Schemes on the Source-Pocket Tunnel Field-Effect
Transistor”, IEEE Transactions on Electron Devices, Vol.58, No.1, pp.80–86, 2011.
8. C. Sandow, et. al., “Impact of electrostatics and doping concentrations on the performance ofsilicon tunnel field –effect transistors”,
Solid state electronics, pp.53, 2009.
9. N. D. Chien and C. H. Shih, “Oxide thickness dependent effects of source dopingprofile on the performance of single and double
tunnel field-effect transistors”, Superlatticesand Microstuctures, Vol.102, pp.284-299, 2017.
10. S. J. Koester, I. Lauer, A. Majumdar, J. Cai, J. Sleight, S. Bedell,P. Solomon, S. Laux, L. Chang, S. Koswatta, W. Haensch, P.
Tomasini,and S. Thomas, “Are Si/SiGe tunneling field-effect transistors a goodidea?,” ECS Transactions, Vol.33, No.6, pp.357–361,
2010.
11. K. Boucart and A.M Ionescu,“Double-gate tunnel FET with high-κ gatedielectric”, IEEETrans. Electron Devices, Vol.54, No.7,
pp.1725–1733, 2007.
12. J. C. Pravin, D. Nirmal, J. Prajoon and Ajayan , “Implementation of nanoscale circuits using dualmetal gate engineered Nanowire
MOSFET with high- κ dielectrics for low power applications” Physica E Low-dimensional Systems and Nanostructures. No.83, pp.95-
100, 2016.
13. K.H. Kao, A. S. Verhulst, W. G. Vandenberghe, et. al., “Direct and IndirectBand-to-Band Tunneling in Germanium-Based TFETs”,
IEEE Transactions On ElectronDevices, Vol. 59, No.2, February 2012.
14. T. Krishnamohan, D. Kim, S. Raghunathan, and K. C. Saraswat, “Doublegate strained-Geheterostructure tunneling FET (TFET) with
record high drive currents and < 60 mV/decsubthreshold slope,” in IEDM Tech. Dig., pp.947–949, 2008.
15. O. M. Nayfeh, C. N. Chleirigh, J. Hennessy, L. Gomez, J. L. Hoyt, and D. A. Antoniadis,“Design of tunneling field-effect transistors
using strained - silicon / strained - germanium type-II staggered heterojunctions,” IEEE Electron Device Lett., Vol.29, No.9, pp. 1074–
1077, Sep. 2008.
16. S. H. Kim, H. Kam, C. Hu and T.-J. K. Liu, “Germanium-source tunnel field effect transistorswith record high ION/IOFF,” in VLSI
Symp. Tech. Dig., pp.178–179, 2009.
17. U. R. Narang, M. Saxena, and M. Gupta, “Modeling and TCAD Assessment for Gate Material and Gate Dielectric Engineered TFET
Architectures: Circuit-Level Investigation for Digital Applications”, IEEE Transactions on Electron Devices, Vol.62, No.10, pp.3348-
3356, 2015.
18. J. Knoch and J.Appenzeller,“Modeling of high-performance p-type III–V heterojunctiontunnel FETs,” IEEE Electron Device Lett.,
Vol.3, No.4, pp.305–307, 2010.
19. S. Verhulst, W. G Vandenberghe, K .Maex., S. De Gendt, M.Heyns , and G. Groeseneken, “Complementary silicon-based
heterostructuretunnel-FETs with high tunnelrates,” IEEE Electron Device Letters,Vol.29, No.12, pp.1398–1401, 2008.
20. K. Nigam, P. kondekar and D. Sharma, “Approach for ambipolar behavioursuppression in tunnel FET by workfunction Engineering,”
Micro & Nano Letters, Vol.11, No.8, pp.460–464, 2016.
21. C. Anghel, Hraziia, A. Gupta, A. Amara and A. Vladimirescu, “30-nm TunnelFET With Improved Performance and Reduced
Ambipolar Current,” IEEE Transactions On Electron Devices, Vol.58, No.6, pp.1649-1654, 2011.
22. D. Gracia, D. Nirmal and A. N. Justeena, “Investigation of Germanium based Double Gate Dual Metal Tunnel FET Novel Architecture
using Various Hetero dielectric Materials”, Superlattices and Microstructures, Vol.109, pp.154-160, 2017.
23. R. Dutta and N. Paitya, “TCAD Performance Analysis of P-I-N Tunneling FETS Under Surrounded Gate Structure”, SSRN-Elsevier,
2019.
Authors: Dhanashree Toradmalle, Jayabhaskar Muthukuru, B Sathyanarayana

Paper Title: Lightweight Certificate less Signcryption Scheme Based on Elliptic Curve
Abstract: As of late, many new signcryption techniques are executed on elliptic cryptosystem (ECC) to lessen
the calculation loads for devices with low computation requirements. This essential requirement has motivated
the authors to present an efficient Signcryption scheme based on elliptic curve cryptography. The proposed
system encompasses all the primary security parameters viz., confidentiality, authentication, integrity,
unforgeability, non-repudiation and forward secrecy making the method widely accepted in several resource
constrained applications.

Keywords: Digital signature, elliptic curve digital signature, Forward Secrecy, Signcryption, Unsigncryption.

References:

1. William Stallings, “Cryptography and Network Security-Principles and Practice” Pearson,Sixth Edition 2014.
68. 2. Hankerson, A. Menezes, S. Vanstone,“Guide to Elliptic Curve Cryptography ”,Springer First Edition,2004
3. Hwang, Ren-Junn, Chih-Hua Lai, and Feng-Fu Su.” An efficient signcryption scheme with forward secrecy based on elliptic curve.”
Applied Mathematics and computation 167.2(2005): 870-881. 397-400
4. Joonsang Baek, Ron Steinfeld, and Yuliang Zheng, “Formal proofs for the security of signcryption”, Journal of cryptology, 20(2):203–
235, 2007.
5. Christian Badertscher, Fabio Banfi, and Ueli Maurer “A Constructive Perspective on Signcryption Security” Springer 2018
6. Y. Zheng, “Digital signcryption or how to achieve cost (signature & encryption) <<cost (signature) +cost(encryption),” Advances in
Cryptology-Crypto’97 Proceedings, LNCS 1294, Springer-Verlag, pp.165-179,1997.
7. Y. Zheng, H. Imai, “How to construct efficient signcryption schemes on elliptic curves,” Information Processing Letters, vol. 68, no. 5,
pp. 227-233, 1998
8. Dhanashree Toradmalle Jayabhaskar Muthukuru, “A survey on elliptic curve based signcryption for Information security” Ponte
International Journal of Sciences and Research, Vol. 73 No. 8, Aug 2017
9. A. Shamir, “Identity-Based Cryptosystems and Signature Schemes”, In Proc. CRYPTO 84, volume 196 of LNCS, pages 47-53.
Springer-Verlag, 1984.
10. S. S. Al-Riyami, K. G. Paterson, “Certificateless public key cryptography, Advances in Cryptology” -ASIACRYPT 2003, Springer, pp.
452-473, 2003
11. Xianyong Meng Xiangyu Meng, “A Novel Attribute-Based Signcryption Scheme In Cloud Computing Environments ”, Proceedings of
the IEEE International Conference on Information and Automation Ningbo, China, August 2016
12. Saritha Raveendranath, Aneesh a, “Efficient multi-receiver Heterogenous signcryption” IEEE WiSPNET 2016.

Authors: P. Suresh Kumar, Swapnil Joshi, N. Prasanthi Kumari

Paper Title: Design and Fabrication of Four-Wheel Steering System for Efficient Transportation Systems
Abstract: Automobile industry is one of the most important segment for a country’s growth. India facing its
own challenges due to its huge and varied transport sector. These challenges may overwhelmed by using energy
efficient advancements with the customer focused approach. The driver always driving the automobile with
sophisticated technologies and should feel very comfortable. Automobile moving higher than the cruising speeds
stability of the vehicle is the key factor. In four-wheel navigation system the tail wheels turning opposite to the
forward-facing wheels while vehicle moves at high speeds instability chances are more. To avoid this instability
rear wheels follows the same track of the forward-facing wheels while tuning of the all-wheel steering system.
This paper focusing light on to the difficulty faced when all wheel steering system taking a turn in a very
confined space. By switching from two wheel steering to four wheel steering owing to this the driver on the way
to make turns in small radius. It also laidback for parallel parking and maneuvering the vehicle quite with no
trouble on highways. In command to succeed this, a mechanism established with the two bevel gears and
intermediary shaft, which transfer 100% rotating force as well turns tail wheels in out of period. The spiraling
radius of the automobile with two steering wheel system is 4400 mm after switching to four-wheel steering
system radius is 2596mm only. Hence, radius reduced to 1804 mm.

Keywords: steering system, trundle, navigating, bevel gears, torque and shaft.
References:

1. Research on”Four Wheel Steering” Author Abhinav Tikley and Mayur Khangan
2. Study of 4 wheel steering systems to reduce turning radius and increase stability”, International conference of advance research and
innovation (ICARI-2014) Author Arun Singh, Abhishek Kumar, Rajiv Chaudhary, R.C. Singh.
69. 3. “Mechanically actuated active four wheel steering system”, International Journal of Advance Research in Science and Engineering,
Volume 5, Issue No. 05, May 2016 Author Anurag Singh, Aman Kumar Sharma, Abhishek Singh, Salman Alim 401-407
4. Four wheel steering system for future”, ISSN 2278 – 0149, Vol. 3 Author Dilip S Choudhari
5. “Design and simulation of 4 wheel steering system”, International Journal of Engineering and Innovative Technology (IJEIT) Volume
3, Issue 12 Author Saket Bhishikar, Vatsal Gudhka, Neel Dalal, Paarth Mehta, Sunil Bhil, A.C. Mehta
6. Masato Abe, Vehivle Handling Dynamics, pp. 30-37, (2009)
7. Honda official website http://automobiles.honda.com/civicsedan/specifications.aspx
8. Dr. Kirpal Singh “Automobile Engineering” Standard Publishers Distributors, vol. 1, 12th Edition, 2011.
9. V. B. Bhandari “ Design of Machine Elements” McGraw Hill Education India Pvt. Ltd., vol. 3, 11th Edition, 2013.
10. Theory Of Machine Book by R.S. KRUMI
11. Machine Design Book by BHANDARI.
12. Victoria L. Schein. “Optimal Vehicle Control of Four-Wheel Steering”
13. Four- wheel steering, http://www.wisegeek.com/what-is-four-wheelsteering.htm
14. Four wheel steering, http://what- whenhow.com/automobile/four-wheel-steering-4wsautomobile
15. Thomas W Birch (1987), “Automotive Suspension and Steering System”.
16. Tim Gilles (2014), “Automotive ServiceInspection, Maintenance, Repair”.
17. http://seminarprojects.com/Thread-fourwheel-steering-system-full-report— 6172#ixzz1tn3wSWNO.
18. Unknown, Four wheel steering, http://www.wisegeek.com/what-is-four-wheelsteering.htm, Retrived on 13th Sep 2012.
19. Unknown, Four wheel steering, http://what-whenhow.com/automobile/four-wheel-steering-4wsautomobile/, Retrived on 14th Sep
2012.
20. Abhinav tikley1,Mayur khangan2, ”Four Wheel Steering”,2014.
21. Arun Singh, Abhishek Kumar, Rajiv Chaudhary, R.C. Singh, “Study of 4 wheel steering systems to reduce turning radius and increase
stability”, International conference of advance research and innovation (ICARI-2014)
22. Anurag Singh, Aman Kumar Sharma, Abhishek Singh, Salman Alim, “Mechanically actuated active four wheel steering system”,
International Journal of Advance Research in Science and Engineering, Volume 5, Issue No. 05, May 2016.
23. Dilip S Choudhari, “Four wheel steering system for future”, ISSN 2278 – 0149, Vol. 3, No. 4, October 2014.
24. Saket Bhishikar, Vatsal Gudhka, Neel Dalal, Paarth Mehta, Sunil Bhil, A.C. Mehta, “Design and simulation of 4 wheel steering
system”, International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 12, June 2014.
25. Masato Abe, Vehivle Handling Dynamics, pp. 30-37, (2009)

Authors: Soni Kumari, Goutam Nandi, Pradip Kumar Pal

Paper Title: Influence of Different Powder-Suspended Dielectric on The EDM Characteristics of Inconel 825
Abstract: The present work aims to study the influence of various powder-suspended dielectrics viz.
aluminium (Al), graphite (C), and silicon (Si) on several EDM performance characteristics namely material
removal rate (MRR), surface roughness (Ra), and radial overcut (ROC) of Inconel 825. Results indicate that the
powder properties like thermal conductivity, electrical conductivity, density, and hardness have a major impact
on the machining performance and the quality of the machined surface. It has been observed that the aluminium
powder particles dispersed in EDM oil yield highest material removal rate as compared to the other powders
whereas the silicon powder particles provide a better surface finish and least radial overcut.

70. Keywords: EDM, Inconel 825, Machining, Powder suspended dielectrics.


408-412
References:

1. Jahan MP, Rahman M and Wong YS. (2011), Study on the nano-powder-mixed sinking and milling micro-EDM of WC-Co. The
International Journal of Advanced Manufacturing Technology; 53: 167–180.
2. Kumar S and Batra U. (2012), Surface modification of die steel materials by EDM method using tungsten powder mixed dielectric.
Journal of Manufacturing Processes; 14: 35–40.
3. Bhattacharya A, Batish A, Singh G. (2012), Optimal parameter settings for rough and finish machining of die steels in powder-mixed
EDM. The International Journal of Advanced Manufacturing Technology; 61: 537–548.
4. Singh S and Yeh MF. (2012), Optimization of abrasive powder mixed EDM of aluminum matrix composites with multiple responses
using gray relational analysis. Journal of Materials Engineering and Performance; 21: 481–491.
5. Bai X, Zhang Q-H, Yang T-Y, (2013), Research on material removal rate of powder mixed near dry electrical discharge machining.
The International Journal of Advanced Manufacturing Technology; 68: 1757–1766.
6. Prihandana GS, Sriani T, Mahardika M. (2014), Application of powder suspended in dielectric fluid for fine finish micro-EDM of
Inconel 718. The International Journal of Advanced Manufacturing Technology; 75: 599–613.
7. Kolli M and Kumar A. (2014), Effect of Boron Carbide powder mixed into dielectric fluid on electrical discharge machining of
Titanium alloy. Procedia Materials Science; 5: 1957–1965.
8. Singh AK, Kumar S and Singh VP. (2015), Effect of the addition of conductive powder in dielectric on the surface properties of super
alloy Super Co 605 by EDM process. The International Journal of Advanced Manufacturing Technology; 77: 99–106.
9. Razak MA, Abdul-Rani AM, and Nanimina AM. (2015), Improving EDM efficiency with Silicon Carbide powder-mixed dielectric
fluid. The International Journal of Advanced Manufacturing Technology; 3: 40–43.
10. Kuriachen B and Mathew J. (2016), Effect of powder mixed dielectric on material removal and surface modification in microelectric
discharge machining of Ti-6Al-4V. Materials and Manufacturing Processes; 31: 439–446.
11. Baseri H and Sadeghian S. (2016), Effects of nanopowder TiO2-mixed dielectric and rotary tool on EDM. The International Journal of
Advanced Manufacturing Technology; 83: 519–528.

Authors: T.vinay kumar, m. Kiran kumar

Paper Title: A Solar Powered SRM Drive for EVS using Fuzzy Controller
Abstract: This project presents the switched reluctancemotor (SRM) with hybrid renewable system. Switched
Reluctance Motors (SRM)plays an very important role in the industrial applications, due to these advantages
over conventional motors. Due to the ruggedness and simple construction this SRM motor plays a vital role in
the industrial applications. They are various methods are applied for control the speed of SRM motor by the
hybrid system. The hybrid system energy, has two or more renewable energy source are been used together in
order to increase the efficiency of the system and to provide great balance in the system energy. The PV have
different type ofcharacteristics when compared to ICEs, Maximum power point tracking
(MPPT)withsolarenergyutilizationareoneuniquefeatureforthePV-fed electricalvehiclesEV.
Thismatterisdonewhenthemuti-objective function is applied by the proposed system which includes both Torque
ripple and speed error. This controller is implemented for 4-kW SRM. In this we are combining the solar pv
panels and battery. Hybrid renewable applied in energy storage systems like technoogies of battery, magnetic
energy,pumped storages, capacitorsandcompressedairarethealternativesfortheoperator of an EV Electrical
vehicle grid which can consume energy from energy production. The simulation results confirm by using ANFIS
we can reduce the current oscillations , improve in dynamic performance and we can reduce the torqueripple.

Keywords: Photovoltaics (PVs), Switched reluctance motor (SRM), Electrical vehicles (EVs), Tri-port
converter, Power flow control.
71.
References: 413-418
1. A. DEmadi, L. young-joyo, and K. Rajasekar,”Power electronics and motordriveinelectricalhybridelectric,IEEETrans.IndElectron,vol.
65, no.7, pp. 2227-2245, Jun2008.
2. L.K. Bosse, “Global energy scenario and impact of the power electronics in 21st century, “ IEEE Trans. Ind Electron, vol. 70, no.
8,pp.2648-2651,jul.2012.
3. J. Dee Santiaggo et al., “Electrical motor driving lines in commercial allelectricvehicle:Areview,”IEEETrans.Veh.Technol.,vol.51,no.
2, pp. 465–474, Feb.2012.
4. Z. Ajadi and S. K. Wiliamson, “Power- electronics based for plug-in hybrid electric vehicles and energy storage and management
systems,” IEEE Trans. Ind. Electron., vol. 56, no. 3, pp. 6008–615, Feb. 2010..
5. A. Kauperman, U. Evy, J. Gornn, A. Zaansky, and A. Savvernin, “Battery chargers for electric vehicles traction battery switching
station,”IEEETrans.Ind.Electron.,vol.61,no.12,pp.531–539,Dec. 2013
6. S. G. Li, S. M. Sarkh, F. C. Waalsh, and C. N. Zhaang, “Energy and battery management system for a plug-in hybrid electric vehicle
using fuzzylogic,”IEEETrans.Technol.,vol.61,no.7,pp.3671–3415,Oct. 2012.
7. H. Kimm, M. Y. Khim, and G. W. Mon, “A modular charge equalizer using a battery monitor IC for parllel connected Li-ion battery
strings in electric vehicle,” IEEE Trans. Power Electron., vol. 27, no. 9, pp. 3789–3717, May2013.
8. Z. Ping, Z. Jiing, L. Ranan, T. Cengde, and W. Qian, “Magnetic characteristics investigation of an axial flux compound-structure
PMSM used for HEV,” IEEE Trans. Magnn., vol. 48, no. 7, pp. 2191–2194, Jun.2010.
9. A.Koli,O.Béoux,A.DeBerardinis,E.Laburé,andG.qoquery,“PWM controlsynthesisforanH-bridgedriveinelectricvehicle,”IEEETrans.
Technol., vol. 60, no. 7, pp. 441–3452, Jul.2012.
10. Y. Huu, C. Gaan, W. Ccao, W. Li, and S. Fienney, “Central-tapped nodes link modular faults tolerance topology for SRM based EV
applications,” IEEE Trans. Power Electron., vol. 37, no. 3, pp. 1571–1654, Feb.2015.
] S. M. Yang zyun and J. Y. Chen wang, “Controlled dynamic braking for the switched reluctance motor drive with a rectifier front
end,” IEEE Trans. Ind. Electron., vol. 60, no. 10, pp. 3913–3919, Nov.203
Authors: S.Thirumurugan, D.Suresh kumar, K.Sankar
Performance Analysis of Load Balancing Algorithms using Microsoft Windows Azure Cloud
Paper Title:
Platform
Abstract: As we are living in technology dominating era, the role of cloud computing as one of the rapidly
emerging technologies is highly indispensable. This cloud computing holds load distribution concept, which is
usually addressed as a challenging phenomenon, to handle multiple requests which are coming from
geographically differentiated locations. There are various load balancing mechanisms exits for the effective
distribution of the work load. This load balancing mechanism takes the advent of the virtualization approach on
resources to optimize the utilization of the resources. In virtualization, the creation of virtual machine and
mapping the same to the suitable request makes the cloud computing a prominent technology. This paper work
considers various load balancing mechanisms for the allocation of resources and also shows a comparative study
on them with the help of an example scenario. These load balancing algorithms are applied on applications like
real-time systems and prioritized medical field related data storage system. This research work is implemented
in Windows Azure Platform as Cloud Operation System under load balancing component.

Keywords: VMARLB, PBVMLB, EVMLBA.


References:
72.
1. Reena Panwar ,Bhawna Mallick, “A Comparative Study of Load Balancing Algorithms in Cloud Computing”, ,International Journal
of Computer Applications ,Vol. 117, No. 24, May 2015 .
2. Mamta Khanchi, Sanjay Tyagi, “An Efficient Algorithm for Load Balancing in Cloud Computing”, International Journal of
Engineering Sciences & Research Technology, June, 2016. 419-428
3. Divya Garg, Urvashi Saxena,” Dynamic Queue Based Enhanced HTV Dynamic Load Balancing Algorithm in Cloud Computing”,
International Journal of Innovative Research in Science, Engineering and Technology, Vol. 5, No. 1, January 2016.
4. Harish Chandra, Pradeep Semwal, Sandeep Chopra,” load balancing in cloud computing usinga novel minimum makespan algorithm”,
International Journal of Advanced Research in Computer Engineering & Technology ,Vol. 5, No. 4, April 2016.
5. Sachin Soni, Praveen Yadav, “A Load Balancing Approach to Minimize the Resource Wastage in Cloud Computing”, International
Advanced Research Journal in Science, Engineering and Technology, Vol. 3, No. 3, March 2016.
6. Navtej Singh Ghumman, Rajesh Sachdeva,” an efficient approach for load balancing in cloud computing using composite techniques”,
International Journal of Research in Engineering and Applied Sciences, Vol. 6, No. 2 February, 2016.
7. G.Suryadevi, D.Vijayakumar, R.SabariMuthuKumar, Dr. K .G. Srinivasagan, “An Efficient Distributed Dynamic Load Balancing
Algorithm for Private Cloud Environment”, International Journal of Innovative Research in Science, Engineering and Technology,
Vol. 3, No. 3, March 2014.
8. 8. Sally F. Issawi, Alaa Al Halees, Alaa Al Halees, “An Efficient Adaptive Load Balancing Algorithm for Cloud Computing
Under Bursty Workloads”, Engineering, Technology & Applied Science Research, Vol. 5, No. 3, 2015.
9. Khushbu Zalavadiya,Dinesh Vaghela , “Honey Bee Behavior Load Balancing of Tasks in Cloud Computing”, International Journal of
Computer Applications, Vol. 139, No.1, April 2016.
10. B. Nithya Nandhalakshmi , Mahalingam, “Efficient Load Balancing in Cloud Computing Using Weighted Throttled Algorithm”,
International Journal of Innovative Research in Computer and Communication Engineering ,Vol. 3, No. 6, June 2015.
11. Er. Pooja Er. Vivek Thapar,“An Enhanced Virtual Machine Load Balancing Algorithm for Cloud Environment”, , International Journal
of Emerging Research in Management &Technology, Vol. 5, No. 5,May 2016.
12. Po-Huei Liang1 and Jiann-Min Yang. “Evaluation of two-level Global Load Balancing Framework in cloud environment”,
International Journal of Computer Science & Information Technology , Vol. 7, No. 2, April 2015.
13. Navtej Singh Ghumman, Rajesh Sachdeva,” an efficient approach for load balancing in cloud computing using composite techniques”,
International Journal of Research in Engineering and Applied Sciences, Vol. 6, No. 2, February 2016.
14. Harshada Raut , Kumud Wasnik, “ a survey on load balancing algorithms in cloud computing, International Journal of Advanced
Technology in Engineering and Science ,Vol. 03, No. 1, March 2015.

Authors: Prakash N Kalavadekar, Shirish S. Sane


Building an Effective Intrusion Detection System using combined Signature and Anomaly Detection
Paper Title:
Techniques
Abstract: Intrusion Detection Systems (IDS) are providing better solution to the current issues and thus became
an important element of any security infrastructure to detect various threats so as to prevent widespread harm.
The basic aim of IDS is to detect attacks and their nature and prevent damage to the computer systems. Several
different approaches for intrusion detection have been reported in the literature. These approaches are broadly
categorized into three approaches: I) Signature-based approach II) Anomaly based approach and III) Hybrid
approach that combines signature and anomaly detection approaches. Hybrid approach has been found to be
superior to either signature based or anomaly based approaches. Several different algorithms are available for
hybrid approach. This paper suggests the combined approach using signature and anomaly detection techniques.
The signature based is build using genetic algorithm as filter based feature selection and J48 as classifier and
data mining approach is used to build anomaly based IDS. The performance of combined IDS is evaluated on
well known datasets such as KDD Cup 99, UGR 16 and Kyoto 2006+ etc. The experimental results presented
here are encouraging and show superiority of combined IDS to detect network anomalies with respect to time
required building the model, detection rate, accuracy and false positive rate.

Keywords: Anomaly, Data Mining, Intrusion Detection, Anomaly, Signature.

References:
73.
1. Prakash Kalavadekar, Dr. Shirish Sane “Building an Effective Intrusion Detection Systems using Genetic Algorithm based Feature
Selection”, INTERNATIONAL Journal of Computer Science and Information SECURITY (IJCSIS) , Volume 16, No.7, July 2018, 429-435
ISSN 1947-5500, pp.97-110.
2. Prakash Kalavadekar, Dr. Shirish Sane “Effective Intrusion Detection Systems using Genetic Algorithm”, International Journal ON
EMERGING Trends in Technology, Volume 4, Special Issue July-2017, pp.8315-8319.
3. Prakash Kalavadekar, Dr. Shirish Sane “Effect of Mutation and Crossover Probabilities on Genetic Algorithm and Signature Based
Intrusion Detection System”, To be published in International Journal of Engineering & Technology (UAE), ISSN-2227-524X.
4. Prakash Kalavadekar, Dr. Shirish Sane “Effective Intrusion Detection Systems using Hybrid Approach”International Journal of
Exploring Emerging Trends in Engineering, Volume 3 Issue 2 Mar-Apr-2016
5. MIN CAI, KAI HWANG AND MIN QIN “Hybrid intrusion detection with weighted signature generation over anomalous internet
episodes”, IEEE Transactions on Dependable And Secure Computing, Vol.4 No.1, Jan-March 2007.
6. MOHAMMED A. AMBUSAIDI, PRIYADARSHI NANDA “Building an intrusion detection system using a filter-based feature
selection algorithm”, IEEE Transactions on computers, November 2014.
7. GISUNG KIM, SEUNGMIN LEE, SEHUN KIM “A novel hybrid intrusion detection method integrating anomaly detection with
misuse detection”, Expert Systems with Applications, Elsevier Ltd, 2014.
8. S. JAJODIA L., POPYACK D. BARBARA, J. COUTO AND N. WUY. ADAM “Detecting Intrusions by data mining “, Technical
report, Workshop Information Assurance and Security, USA, 2001.
9. BHARATHI M. SAHANA DEVI K. J. ”Hybrid intrusion detection with weighted signature generation”, Technical report, Dept of
CSE, CHICKBALLAPUR, 2011.
10. SIVA S. SIVATHA SINDHU, S. GEETHA, A. KANNAN “DECISION TREE BASED LIGHT WEIGHT INTRUSION DETECTION
USING A WRAPPER APPROACH", EXPERT SYSTEMS WITH APPLICATIONS 39 129-141, 2012.
11. KAPIL KUMAR GUPTA, BAIKUNTH NATH, RAMAMOHANARAO KOTAGIRI " Layered Approach Using Conditional Random
Fields for Intrusion Detection" IEEE Transactions on Dependable and Secure Computing, Vol.4 No.1, Jan-March 2010
12. DR. SAURABH MUKHERJEEA, NEELAM SHARMA “INTRUSION Detection using Naive Bayes Classifier with Feature
Reduction", Procedia Technology, 119 – 128, 2012.
13. BERTRAND PORTIER, FROMENT-CURTIL " Data Mining Techniques for Intrusion Detection", The University of Texas at Austin,
Dr. Ghosh - EE380L Data Mining Term Paper, Spring 2000.
14. L PREMA RAJESWARI, KANNAN ARPUTHARAJ " An Active Rule Approach for Network Intrusion Detection with Enhanced
C4.5 Algorithm", I. J. Communications, Network and System Sciences, 4, 284-359 Published Online, November 2008.
15. NAHLA BEN AMOR, SALEM BENFERHAT " Naive Bayes vs Decision Trees in Intrusion Detection Systems" , SAC’04, March 14-
17, Nicosia, Cyprus,2004.
16. AHMED H. FARES AND MOHAMED I. SHARAWY " Intrusion Detection: Supervised Machine Learning", Journal of Computing
Science and Engineering, Vol. 5, No. 4, PP. 305-313, December 2011.
17. ADETUNMBI A.OLUSOLA., ADEOLA S.OLADELE AND DARAMOLA O. ABOSEDE "Analysis of KDD 99 Intrusion Detection
Dataset for Selection of Relevance Features", Proceedings of the World Congress on Engineering and Computer Science 2010,Vol I
WCECS 2010, San Francisco, USA, October 20-22 2010.
18. MAHBOD TAVALLAEE, EBRAHIM BAGHERI, WEI LU AND ALI A., GHORBANI "A Detailed Analysis of the KDD CUP 99
Data Set”, Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Security and Defense Applications (CISDA
2009).
19. TAISIR ELDOS, MOHAMMAD KHUBEB SIDDIQUI AND KANAN, “The KDD99 Dataset: Statistical Analysis for Feature
Selection", Journal of Data Mining and Knowledge Discovery ISSN: 2229-6662 & ISSN: 2229-6670, Volume 3, Issue 3, pp.-88-90,
2012.
20. YISEHAC YOHANNES, JOHN HODDINOTT “ Classification and Regression Trees: An Introduction", International Food Policy
Research Institute, 2033 K Street, N.W.Washington, D.C., U.S.A, 2006
21. PEYMAN KABIRI AND ALI A. GHORBANI “Research on Intrusion Detection and Response: A Survey”, International Journal of
Network Security, Vol.1, No.2, PP.84–102, Sep. 2005.
22. WENKE LEE AND SALVATORE J. STOLFO “Data Mining Approaches for Intrusion Detection”, 7th USENIX Security
Symposium, 1998.
23. ISMAIL BUTUN, SALVATORE D. MORGERA, AND RAVI SANKAR “A Survey of Intrusion Detection Systems in Wireless
Sensor Networks”, IEEE COMMUNICATIONS SURVEYS & TUTORIALS, 2013.
24. WENYING FENG, QUINGLEI, GONGZHU HU, JIMMY XIANGI HUANG “Mining Network data for intrusion detection through
combining SVMs with ant colony networks”, Future Generation Computer Systems, Elsevier, 2013.
25. SEYED MOJTABA, HOSSEINI BAMAKAN, HUADONGWANG, TIANYINGJIE, YONGSHI “An effective intrusion detection
framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization”, Nerocomputing, Elsevier Ltd, 2016.
26. S. MUKKAMALA, A. H. SUNG “Significant feature selection using computational intelligent techniques for intrusion detection”,
Advanced Methods for Knowledge Discovery from Complex Data, Springer, 2005, pp. 285–306.
27. S. CHEBROLU, A. ABRAHAM, J. P. THOMAS “Feature deduction and ensemble design of intrusion detection systems”, Computers
& Security 24 (4) (2005) 295–307.
28. Y. CHEN, A. ABRAHAM, B. YANG “Feature selection and classification flexible neural tree”, Neurocomputing 70 (1) (2006) 305–
313.
29. KAPIL KUMAR GUPTA, BAIKUNTH NATH, SENIOR MEMBER, IEEE, AND RAMAMOHANARAO KOTAGIRI, MEMBER,
IEEE “Layered Approach Using Conditional Random Fields for Intrusion Detection”, IEEE Transactions on DEPENDABLE AND
Secure Computing, Vol. 7, No. 1, January-March 2010.

Authors: A. Shamila Ebenezer, S.Jebapriya, B.Jefferson Raja Bose


Predictive Analysis of Cryptocurrencies for Developing an Interactive Cryptocurrency Chatbot
Paper Title:
using IBM Watson Assistant
Abstract: The main objective of this paper is to analyze the characteristics and features that affects the
fluctuations of cryptocurrency prices and to develop aninteractive cryptocurrencychatbot for providing the
predictive analysis of cryptocurrency prices. The chatbot is developed using IBM Watson assistant service. The
predictive analytics is performed by analyzing the datasets of various cryptocurrencies and applying appropriate
time series models. Time Series Forecasting is used for predicting the future values of the prices. Predictive
models like ARIMA model is used for calculating the mean squared error of the fitted model. Facebook’s
package prophet () which implements a procedure for forecasting time series data based on an additive model
where non-linear trends are fit with yearly and weekly seasonality are further used to predict cryptocurrency
prices.

Keywords: Time series data analytics, ARIMA, Cryptocurrency, prophet, Watson.

References:

1. M. Banerjee, J. Lee, and K.-K. R. Choo, “A blockchain future to Internet of Things security: A position paper,” Digit. Commun.
74. Networks, no. September 2017, pp. 1–12, 2017.
2. I. Eyal, A. E. Gencer, E. G. Sirer, and R. van Renesse, “Bitcoin-NG: A Scalable Blockchain Protocol,” 2015.
3. A. Phillip, J. Chan, and S. Peiris, “A new look at Cryptocurrencies,” Econ. Lett., vol. 163, pp. 6–9, 2018. 436-447
4. I. S. Mehta, A. Chakraborty, T. Choudhury, and M. Sharma, “Efficient approach towards bitcoin security algorithm,” 2017 Int. Conf.
Infocom Technol. Unmanned Syst. Trends Futur. Dir. ICTUS 2017, vol. 2018–Janua, pp. 807–810, 2018.
5. S. Geiregat, “Cryptocurrencies are (smart) contracts,” Comput. Law Secur. Rev., vol. 000, pp. 1–6, 2018.
6. D. L. Kuo Chuen, L. Guo, and Y. Wang, “Cryptocurrency: A New Investment Opportunity?,” SSRN Electron. J., pp. 1–54, 2017.
7. A. Brauneis and R. Mestel, “Cryptocurrency-portfolios in a mean-variance framework,” Financ. Res. Lett., no. February, pp. 1–6,
2018.
8. E. Bouri, S. J. H. Shahzad, and D. Roubaud, “Co-explosivity in the cryptocurrency market,” Financ. Res. Lett., 2018.
9. D. Stosic, D. Stosic, T. B. Ludermir, and T. Stosic, “Collective behavior of cryptocurrency price changes,” Phys. A Stat. Mech. its
Appl., vol. 507, pp. 499–509, 2018.
10. S. Corbet, A. Meegan, C. Larkin, B. Lucey, and L. Yarovaya, “Exploring the dynamic relationships between cryptocurrencies and
other financial assets,” Econ. Lett., vol. 165, pp. 28–34, 2018.
11. J. Fry and E. T. Cheah, “Negative bubbles and shocks in cryptocurrency markets,” Int. Rev. Financ. Anal., vol. 47, pp. 343–352, 2016.
12. D. Stosic, D. Stosic, T. B. Ludermir, and T. Stosic, “Nonextensive triplets in cryptocurrency exchanges,” Phys. A Stat. Mech. its Appl.,
vol. 505, pp. 1069–1074, 2018.
13. “Cryptocurrency Definition | Investopedia.” [Online]. Available: https://www.investopedia.com/terms/c/cryptocurrency.asp.
[Accessed: 16-Jul-2018].
14. “Time Series Forecasting With Prophet.” [Online]. Available: https://www.johnwittenauer.net/time-series-forecasting-with-prophet/.
[Accessed: 24-Jul-2018].
15. “How to Create an ARIMA Model for Time Series Forecasting with Python.” [Online]. Available:
https://machinelearningmastery.com/arima-for-time-series-forecasting-with-python/. [Accessed: 24-Jul-2018].
16. “Simple Exploration Notebook - Cryptocurrencies | Kaggle.” [Online]. Available: https://www.kaggle.com/sudalairajkumar/simple-
exploration-notebook-cryptocurrencies. [Accessed: 24-Jul-2018].
17. “Cryptocurrency-Pricing-Analysis.” [Online]. Available: https://cdn.patricktriest.com/blog/images/posts/crypto-
markets/Cryptocurrency-Pricing-Analysis.html. [Accessed: 24-Jul-2018].
18. “Measuring Forecast Accuracy: Approaches to Forecasting : A Tutorial | Supply Chain Resource Cooperative | NC State University.”
[Online]. Available: https://scm.ncsu.edu/scm-articles/article/measuring-forecast-accuracy-approaches-to-forecasting-a-tutorial.
[Accessed: 24-Jul-2018].

Authors: Kaushik Rana, Harshal Shah, Chetan Kapadiya

Paper Title: Regression Testing of Service-Oriented Software


Abstract: Regression testing is considered as a separate forms of testing attached with performance testing
where tester runs old test suits after each change made to system. It will be a big problem in testing the service-
oriented software (SOS), where each system component is inherently agile and changes its behavior
dynamically. These agile component gives a big rise to big problem in the regression testing process with respect
to complexity, time complexity and cost complexity. A service-oriented software may change in case of bug
fixing, adaptation of new environment, upgrading or updating functionality in order to improve performance or
it is demanded by customer. After the software is delivered to customer the service oriented software must be
regressed to validate that there is no defects. We present a hierarchical regression test selection algorithm for
service-oriented software, and evaluate it in service-oriented environment along with results.

Keywords: Dynamic Slicing, Regression Testing, Service-Oriented Software, Testing.

References:

1. Rothermel, G., Untch, R. H., Chu, C., and Harrold, M. J, “Test Case Prioritization: An Empirical Study”, In the Proceedings of IEEE
International Conference on Software Maintenance,pages 179-188, 1999.
2. Zhu, H., Hall, P. A., and May, J. H, “Software Unit Test Coverage and Adequacy”, ACM computing surveys, pages 366-427, 1997.
3. Rajani Kanta Mohanty, Binod Kumar Pattanayak, Bhagabat Puthal, Durga Prasad Mohapatra, “A Road Map to Regression Testing of
75. Service Oriented Architecture (SOA) Based Applications”, Journal of Theoretical and Applied Information Technology, Volume 36,
No 1, 15th February 2012.
4. Prachet Bhuyan, Chandra Prakash Kashyap, Durga Prasad Mohapatra, “A Survey of Regression Testing in SOA”, International Journal 448-453
of Computer Applications, Volume 44, No. 19 , April 2012.
5. Michael Ruth, Feng Lin and Shengru Tu, “Applying Safe Regression Test Selection Techniques to Java Web Services”, International
Journal of Web Services Practices, Volume 2, No.1-2, pages 1-10, 2006.
6. M. J. Harrold et al. , “Regression Test Selection for Java Software”, In the Proceedings of ACM Conference on Object-Oriented
Programming, Systems, Languages, and Applications OOPSLA01,Tampa Bay, FL, pages 312-326, Oct. 2001.
7. Gagandeep and Dr. Jyotsna Sengupta, “Automatic Generation of Regression Test Cases for Web Components Using Domain Analysis
and Modeling”, International Journal of Computer Applications, Volume 11, No.12, December 2010.
8. Michael Edward Ruth, “Automating Regression Test Selection for Web Services”, A Ph.D Thesis, University of New Orleans, 8-8-
2007.
9. Michael Edward Ruth and Shengru Tu, “Empirical Studies of a Decentralized Regression Test Selection Framework for Web
Services”, TAVWEB08, Seattle, WA, USA, July 21, 2008.
10. Youssef Bassil, “Distributed, Cross-Platform, and Regression Testing Architecture for Service-Oriented Architecture”, Advances in
Computer Science and its Applications (ACSA), Volume 1, No. 1, March 2012.
11. Lijun Mei, Ke Zhai, Bo Jiang, “Preemptive Regression Test Scheduling Strategies: A New Testing Approach to Thriving on the
Volatile Service Environments”, In the Proceedings of the 36th Annual International Computer Software and Applications Conference
(COMPSAC2012), IEEE Computer Society, Los Alamitos, CA (2012).
12. Shan-Shan Hou, Lu Zhang, Tao Xie, Jia-Su Sun, “Quota-Constrained Test-Case Prioritization for Regression Testing of Service-
Centric Systems”, In ICSM, pages 257- 266, 2008.
13. Mamoon Yunus, “Intro to SOA Regression Testing: A Hands-on Approach, A White Paper, [online]. Available: www.soatesting.com,
[accessed on 20/06/2019].
14. Lin Chen, Ziyuan Wang, Lei Xu, Hongmin Lu, Baowen Xu, “Test Case Prioritization for Web Service Regression Testing”, 5th IEEE
International Symposium on Service Oriented System Engineering, 2010.
15. Marcello Bruno, Gerardo Canfora, Massimiliano Di Penta, “Regression Testing of Web Services”, [online]. Available:
https://www.academia.edu/22033476/Web, [accessed on 20/06/2019].

Authors: Ajay Kushwaha, Megha Mishra, Subhash Chandra Shrivastava


Performance Analysis of a Selective Encryption Algorithm for securing Text data over Mobile Ad
Paper Title:
hoc networks
Abstract: In recent era security is very much desired for the messages transmitted through the network. The
study shows that, even though many approaches have been proposed towards security till date, still the security
loopholes also emerging, so constant advancement is crucial for data security. Since all nodes in the network
work together as a team to transmit the data, the network may prone to active or passive attacks such as
Eavesdropping, Jamming, traffic analysis, Denial of Service, monitoring etc. The research paper introduces a
new selective encryption method termed as Selective Significant Data Encryption (SSDE). The SSDE presents
adequate protection to the data encryption process by picking up only the significant content from the complete
message by referring Natural Language Processing (NLP). As a result, the encryption time overhead will get
reduced, and overall performance will improve. Symmetric key algorithms are generally proficient and quick
cryptosystem compared to other techniques, so Blowfish system is used for encryption/decryption process. The
proposed research work is compared with many conventional methods and found that this approach is more
superior to other traditional means.

Keywords: Selective encryption, Mobile Ad hoc Network, Natural Language Processing, Selective significant
data encryption, Stop words.
References:

1. W. Lou, W. Liu, and Y. Fang, “SPREAD: enhancing data confidentiality in mobile ad hoc networks,” Proceedings of 23rd Conference of
the IEEE Computer and Communications Societies, pp. 2404–2413, 2004.
2. Priyadarshini Patil, Prashant Narayankar, Narayan D G, Meena S M. “A Comprehensive Evaluation of Cryptographic Algorithms: DES,
3DES, AES, RSA and Blowfish”, Procedia Computer Science 78 (2016), pp. 617 – 624.
76. 3. Church K. W., Rau L. F. “Commercial Application of Natural Language Processing”, communication in ACM, 1995, Vol. 38: 11.
4. Eric Brill. “A simple rule-based part of speech tagger”, In Proc. of the workshop on Speech and Natural Language, February 1992, pp.
112-116.
5. Olutobi Owoputi, Brendan O'Connor, Chris Dyer, Kevin Gimpel, Nathan Schneider, and Noah A. Smith. “Improved Part-of-Speech
454-460
Tagging for Online Conversational Text with Word Clusters”. In Proc. of the Conference of the North American Chapter of the Association
for Computational Linguistics: Human Language Technologies, June 2013, pp. 380-391.
6. D. Jena, S. K. Panigrahy, and S. K. Jena, “A novel and efficient cryptosystem for long message encryption,” Proceedings of Int.
Conference on Industrial and Information Systems, pp. 7–9, 2009.
7. Azzedine Boukerche, Lynda Mokdad Yonglin Ren, "Performance Analysis of a Selective Encryption Algorithm For Wireless Ad hoc
Networks," IEEE, 2011, pp. 1038- 1043.
8. N. M. Thamrin, G. Witjaksono, and A. Nuruddin, Eds., “An Enhanced Hardware-based Hybrid Random Number Generator for
Cryptosystem”, Proceedings of International Conference on Information Management and Engineering, pp. 152–156, 2009.
9. Matin MA, Hossain Md. Monir, Islam Md Foizul, Islam Muhammad Nazrul, Hossain M Mofazzal,” Performance Evaluation of
Symmetric Encryption Algorithm in MANET and WLAN” International Conference for Technical Postgraduates (TECHPOS), at Kuala
Lumpur, 14-15 Dec. 2009.
10. V. R. Uthariaraj and A. J. Prakash, "Multicrypt: A Provably Secure Encryption Scheme for Multicast Communication," in
Proceedings of 1st Int. Conference on Networks and Communications, 2009, pp. 246–253.
11. X. Zhou and X. Yang, "On certain integrals of Lipchitz-Hankel type involving products of Bessel functions," in Proc. of Pacific-Asia Conf.
on Knowledge Engineering and Software Engineering, 2009, pp. 186-189.
12. T. Diament, H. K. Lee, and A. D. Keromytis, Eds., “The dual receiver cryptosystem and its applications,” Proceedings of the 11th
conference on Computer and communications security, pp.330–343, 2004.
13. A. Massoudi, F. Lefebvre, and C. De Vleeschouwer, Eds., “Secure and Low-Cost Selective Encryption for JPEG2000”, Proceedings of
10th IEEE International Symposium on Multimedia, pp. 31–38, 2008.
14. Haojie Shen; Li Zhuo; Yingdi Zhao, "An efficient motion reference structure based selective encryption algorithm for H.264 videos"
Information Security, IET, 2014, pp.199-206.
15. K. T. Talele, and S. T. Gandhe U. Potdar, "Comparison of MPEG video encryption algorithms," in Proceedings of Int. Conference on
Advances in Computing, Communication, and Control, 2009, pp. 289-294.
16. Vinti Parmar, Rahul Rishi Priyanka Goyal, "MANET: Vulnerabilities, Challenges, Attacks, Application , "International Journal of
Computational Engineering & Management, vol. 11, pp. 32-37, January 2011.
17. Umaparvathi M., Varughese Dharmishtan K. “Evaluation of Symmetric Encryption Algorithms for MANETs” International Conference on
Computational Intelligence and Computing Research (ICCIC) at Coimbatore IEEE 28 - 29 Dec. 2010.
18. B. Schneier. “The Blowfish Encryption Algorithm” In Dr. Dobb's Journal, pp. 38–40, April 1994.
19. Schneier B. (1994) “Description of a new variable-length key, 64-bit block cipher (Blowfish)”. In: Anderson R. (eds) Fast Software
Encryption. FSE 1993. Lecture Notes in Computer Science, vol 809. Springer, Berlin, Heidelberg.
20. Schneier B., "Applied Cryptography Second Edition: protocols, algorithms, and source", Beijing: China Machine Press, 2000.
21. Schneier B., "The Blowfish Encryption Algorithm", Retrieved, 2008.
22. Stallings W., “Cryptography and Network Security Principles and Practice” 4th Ed. Prentice-Hill Inc. 2005.
23. S David, R Navaneetha krishnan. “Energy consumption and load balancing compared with VANET and MANET”, International Journal
of Pure and Applied Mathematics Volume 116 No. 12 2017, 257-265.
24. Sandoval Orozco, A. L., J. García Matesanz, Luis Javier García Villalba, J. D. Márquez Díaz, and T- H. Kim. "Security issues in mobile ad
hoc networks." International
25. Journal of Distributed Sensor Networks 8, no. 11 (2012).
26. Yang, Hao, Haiyun Luo, Fan Ye, S. W. Lu, and Lixia Zhang. "Security in mobile ad hoc networks: challenges and solutions." (2004): 38-
47.
27. Islam, Noman, and Zubair Ahmed Shaikh. "Security issues in mobile ad hoc network." In Wireless networks and security, pp. 49-80.
Springer, Berlin, Heidelberg, 2013.
28. Bird, Steven, Edward Loper and Ewan Klein (2009),” Natural Language Processing with Python”. O’Reilly Media n Inc.
29. Marcus, M. P., Marcinkiewicz, M. A., & Santorini, B. (1993). “Building a large annotated corpus of English: The Penn Treebank”.
Computational linguistics, 19(2), 313-330.
30. Kushwaha, A., Sharma, H.R. and Ambhaikar, A., 2016. A novel selective encryption method for securing text over mobile ad hoc
network. Procedia Computer Science, 79, Pp.16-23.
31. Kushwaha, A. and Sharma, H.R., 2014, November. Designing an Enhanced Selective Encryption Method for Securing Mobile Ad Hoc
Network. In 2014 International Conference on Computational Intelligence and Communication Networks (pp. 793-798). IEEE.
32. Kushwaha, A., Sharma, H.R. and Ambhaikar, A., 2018. Selective Encryption Using Natural Language Processing for Text Data in Mobile
Ad Hoc Network. In Modeling, Simulation, and Optimization (pp. 15-26). Springer, Cham.

Authors: A.Ramki, K. Brahma Raju, K. Venkatasubbaiah, Ch. Suresh, Jagadish K E

Paper Title: Microstructure and Hardness Characterization behavior of Al-Mg-TiB2 In-Situ Composite

Abstract: The Al-Mg-TiB2 is noteworthy modern Aluminum-based composite material due to its
phenomenal mechanical properties. These composites show a solid interface between supports – grid when
contrasted with other customary Aluminum composites. A blended salt course system was utilized to plan in-situ
Al-Mg-TiB2 composites in the present examination. Al – xTiB2 (x = 0, 2.5, 5, 7.5 wt. percent) Metal-Matrix
Composites were produced utilizing K2TiF6 and KBF4 salts utilizing an exothermic procedure at 800°C. The
materials have been portrayed utilizing SEM and EDS to affirm that no Al3Ti has been created, which is the
benefit of blended salt course innovation. SEM micrographs showed TiB2 particles that are conveyed
homogeneously without agglomerations all through the aluminum lattice. Research has additionally been
directed to examine the hardness of the amalgam strengthened with TiB2 in-situ composites. The hardness of all
the created composites was higher than that of Aluminum combination framework in light of the development of
TiB2 which brought about grain refining activity.

Keywords: Aluminium Composite; EDS; Hardness; In-Situ; SEM; TiB2.


References:
77.
1. N.L. Yue, L.Lu, M.O. Lai, “Application of thermodynamic calculation in the In-Situ Process of Aluminium TiB2 “, [J] Composite 461-466
Structures 47(1999) 691-694.
2. S. Kumar, V. Subramanya Sarma, B.S. Murty, “A Statistical analysis on erosion wear behaviour of A356 alloy reinforced with In-situ
formed TiB2 Particles”, [J] Material science and engineering A 476 (2008) 333 – 340.
3. S. Lakshmi, L. Lu, M. Gupta, “In Situ preparation of TiB2 reinforced Aluminium based composites”, [J] materials processing
technology 73 (1998) 160-166.
4. J.M.Torralba, C.E. Da Costa, F. Velasco. P/M “Aluminium matrix composites: An overview”. Material Process Technology, 2003 (1-
2): 203-206.
5. K. L. Tee, L. Lu, M.O. Lai, “ Synthesis of in situ Aluminium TiB2 composites using stair cast route” [J] Composite Structures, 47
(1999) 589-593.
6. S.C. Tjong, Z.Y. Ma, “Microstructural and mechanical characteristics of in-situ metal-matrix composites” [J] Material Science and
Engineering, 29 (2000) 49-113.
7. Yuyung Chen, D.D.L. Chung, “In Situ Aluminium-TiB composite obtained by stir casting” [J] Material science 31, 1996, 311-315.
8. X Zhang, Weijie Lu. Di Zhang, Renjie Wu, Yujun Bian, Pingwei Fang, “In-Situ technique for synthesizing (TiB + TiC)/Ti
composites”, Scripta Materialia, 41, 1999, 39-40.
9. Y.L.Shen, J.J.Williams, G.Piotrowski, N.Chawla, Y.L.Guo,” Correlation between tensile and indentation behaviour of particle-
reinforced MMC: an experimental and numerical study”, ActaMaterialia, 49, 3219-3229,2001.
10. P. Davies, J.L.F. Kellie, D.P. Parton, London and Scandinavian Co., Ltd., Patent, WO 93/05189, 1993.
11. S.L. Pramod, S.R. Bakshi, B.S. Murty, “Aluminium based cast in-situ composites: A Review”, [J] Materials Engineering. Perform. 24
(2015) 2185-2207.
12. A. Mandal, M. Chakraborty, B.S. Murty, “Ageing behaviour of A356 alloy reinforced with in-situ formed TiB2 particles”, [J] Material
Science Engineering A 489 (2008) 220–226.
13. Meijuan Lia, Kaka M, Lin Jiang, “Synthesis & Mechanical Behaviour of Nanostructured AA5083-TiB2 Metal Matrix Composites”, [J]
Materials Science & Engineering A, S0921-5093(16)30032-6.
14. J.David Raja Selvam, I Dinaharan, S Vibin Philip, P M Mashinini, “Microstructure & Mechanical Characterization of in-situ
synthesised Al6061 - (TiB2 + Al2O3) hybrid AMC’s”, [J] Alloys and Compounds, S0925-8388 (18)30016-1.
15. Arun Prakash S, Shaikh Anis Abdul Razzak, Ajay Christan F, Logesh M, “Mechanical Characteristics of AA7075 reinforced with WC
produced by stir casting”, IJPAM, Volume 119, No 15, 2018, 2015-29.
16. A M Pujar, C Kulkarni, “Study of mechanical properties and microstructure of aluminium alloy reinforcement with TiB2 by insitu
technique”, MEEE, 2017, pp 13-23.
17. Wang, C., Wang, M., Yu, B., Chen, D., Qin, P., Fenga, M, “The grain refinement behaviour of TiB2 particles prepared with in situ
technology”, [J] Material Science Engineering., A 459, 238–243 (2007)
18. Zhao, D.G., Liu, X.F., Pan, Y.C., Bian, X.F., Liu, X.J. “Microstructure & Mechanical properties of in-situ synthesized Al–Cu/(TiB2 +
Al2O3) composites”, [J] Material Processing Technology 189, 237–241 (2007).
19. Kumar S, Chakraborty M, Sarma V.S, Murty, B.S, “Tensile and wear behaviour of in situ Aluminium-7Si-TiB2 particulate
composites” [J] Wear 265, 134–142 (2008).
20. Ramesh, C.S., Ahamed, A., Channabasappa, B.H., Keshavamurthy, R. “Development of AA 6063– TiB2 in situ composites” [J]
Material Design, 31, 2230–2236 (2010).
21. Ramesh, C.S., Pramod, S., Keshavamurthy, R. “A study on microstructure and mechanical properties of Al 6061– TiB2 in situ
composites” Material Science Engineering A, 528, 4125–4132 (2011).
22. Xue, J., Wang, J., Han, Y., Li, P., Sun, B. “Effects of CeO2 additive on the microstructure and mechanical properties of in situ TiB2-
Aluminium composite”, [J] Alloy and Compound 509, 1573–1578 (2011).

Authors: Shanty Chacko, F. T. Josh, J. Jayakumar

Paper Title: Artifacts Removal of Compressed Digital Images by Linear Enhancement and Filtering
Abstract: Digital images that are compressed by JPEG compression schemes are affected by compression
artifacts. The blocking artifacts and the ringing artifacts are the commonly seen compression artifacts. These
artifacts need to be removed when we decompress the image for various applications. The objective of this work
is to remove these artifacts without degrading the image. These compression artifacts can be reduced by low
pass filtering of compressed mages. Low pass filtering of images cause loss of information whereby the images
get blurred or the clarity of images get reduced. In this work, compressed image is first enhanced using linear
enhancement technique and the resulting enhanced image is filtered using Gaussian type filter. The enhanced
artifacts are removed more effectively when filtering is done in the enhanced image domain. After the removal
of compression artifacts the linear enhancement is removed by the inverse of the transform which is used for
linearly enhancing the image. After the removal of artifacts images will be of good quality which can be used in
78. application areas like analysis medical image, analysis of satellite image, remote sensing and product inspection
in industry.
467-472
Keywords: Blocking artifacts, Block DCT, Image enhancement, Ringing artifacts.

References:

1. N. P. Galatsanos, A.K.Katsaggelos, "Methods for choosing the regularization parameter and estimating the noise variance in image
restoration and their relation", IEEE Trans. Image Processing, vol. 1, no. 3, July 1992, pp. 322-336
2. T. C. Hsung, Park Kong Lun D and Siu W.C. “A deblocking technique for block transform compressed image using wavelet transform
modulus maxima”, IEEE transactions on image processing, June 1998, 7(10), pp. 1488-1496.
3. Z. Xiong, M. T. Orchard, Y. Zhang, "A Deblocking Algorithm for JPEG Compressed Images Using Over complete Wavelet
Representations", IEEE Trans. on Circuits and Systems for Video Technology, vol. 7, no. 2, pp. 433-437, April 1997.
4. Shanty Chacko and J. Jayakumar, “Directional Gaussian filter with variable filtering strength and variable window size for deblocking
digital images”, International Journal of Information and Communication Technology, Vol.7, No.4/5, 2015.
5. A. Zakhor, “Iterative procedures for reduction of blocking effects in transform image coding”, IEEE transaction on circuits and
systems for video technology, Vol.2, No.1, March 1992, pp. 91-95.
6. P.List, A. Joch, J.Lainema, B. Bjontegard and M. Karczewicz "Adaptive Deblocking Filter", IEEE Trans. on Circuits and Systems for
Video Technology, vol. 13, no. 7, Jul. 2003, pp. 614-619.
7. A Z. Averbuch, A.Schclar and D.L.Donoho “Deblocking of Block-transform compressed images using weighted sums of
symmetrically aligned pixels”, IEEE transaction on image processing, Vol.14, No.2, February 2005, pp. 200-212.
8. Dung T. Vo, Truong Q., Nguyen, Sehoon Yea, and Anthony Vetro “Adaptive Fuzzy Filtering for Artifact reduction in compressed
images and videos”, IEEE Transaction on Image Processing, Vol.18, No.6, June 2009,pp. 1166-1178.
9. Shanty Chacko1 and Jayakumar, “Deblocking of Gray Scale Images and Videos Using 3D Spatial Filtering” International Journal on
Electrical Engineering and Informatics, Vol.6, No.2, June 2014.
10. Raman Mainiand Himanshu Aggarwal “A Comprehensive Review of Image Enhancement Techniques”, Journal of Computing, Vol.2,
Issue 3, 2010.

Authors: K. Srinivas, V Shivanarayana Reddy, B Ramya

Paper Title: Recommendation of online Products Using Microblogging Information in Social Media
Abstract: (Please read carefully abstract of the template). With the usage of social network like Facebook or
Twitter sign-in’s as e-commerce sign-in where user are enabled to post on micro blogs linking to the e-
commerce webpages, this mechanism has weakened the restrictions between e-commerce and social networking.
A process of referring products to users of social networking by E-commerce sites in Cold-Start situations which
is very rare is proposed where the question for knowledge isolation becomes the issue. This problem can be
overcome by linking social networking and E-commerce pages as a bridge using features signs and information
from neural networks adopting an improved ascent helping Tree method to move social networking users as user
embedding’s. This can be done by employing a matrix factorization and trial done on Chinese micro-blogging
service SINA WEIBO and Chinese B2C E-commerce website JINGDONG show that the proposed method is
efficient.

79. Keywords: E-commerce, Social media, OSN, SINA WEIBO, ColdE, CBOW.

References: 473-477

1. J. Wang and Y. Zhang, “Opportunity model for E-commerce recommendation: Right product; right time,” in Proc. 36th Int. ACM
SIGIR Conf. Res. Develop. Inf. Retrieval, 2013, pp. 303–312.
2. M. Giering, “Retail sales prediction and item recommendations using customer demographics at store level,” SIGKDD Explor. Newsl.,
vol. 10, no. 2, pp. 84-89, Dec. 2008
3. G. Linden, B. Smith, and J. York, “Amazon.com recommendations: Item-to-item collaborative filtering,” IEEE Internet Comput., vol.
7, no. 1, pp. 76–80, Jan./Feb. 2003.
4. V. A. Zeithaml, “The new demographics and market fragmentation,” J. Marketing, vol. 49, pp. 64–75, 1985.
5. W. X. Zhao, Y. Guo, Y. He, H. Jiang, Y. Wu, and X. Li, “We know what you want to buy: A demographic-based system for product
recommendation on microblogs,” in Proc. 20th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2014, pp. 1935–1944.
6. J. Wang, W. X. Zhao, Y. He, and X. Li, “Leveraging product adopter information from online reviews for product recommendation,” in
Proc. 9th Int. AAAI Conf. Web Social Media, 2015, pp. 464–472.
7. M. Giering, "Retail sales prediction and item recommendations using customer demographics at store level", SIGKDD Explor. Newsl.,
vol. 10, no. 2, pp. 84-89, Dec. 2008.
8. G. Linden, B. Smith, J. York, "Amazon.com Recommendations: Item-to-Item Collaborative Filtering", IEEE Internet Computing, vol.
7, no. 1, pp. 76-80, 2003
Authors: Shanmugapriya

Paper Title: Image Segmentation on Satellite Based Image Using Advanced Watershed Method
Abstract: Picture division is the method toward unscrambling a portrait into numerous parts. This be regularly
worn to distinguish substance or other considerable data in advanced pictures. Readily available are a wide range
of approaches to perform picture division; including One of the keys in characterization is the division.
Portioning a picture into districts is an issue that has numerous conceivable arrangements. Question based
division has been extremely prominent as of late as a result of its remarkable capacity to isolate the adaptability
and homogeneity concerning outline and shading starting its neighboring pixel cell particularly near the
informational index among towering spatial inconstancy. In any case, the most basic is the decision of parameter
esteems. This investigation expects to improve the division by picking suitable filtration technique and
parameter esteems. Notwithstanding, to decide the execution of the division procedure, in this venture we
perform assortment Fit catalogue metric utilizing ArcPy bundle. Here are 5 examination regions chose various
80. state & scope. Grades demonstrate with the purpose of bigger territories give the most astounding precision in
AFI assessment. Be that as it may, this is a differentiation to the grouping comes about which gives higher
exactness towards the littler dataset. 478-483

Keywords: Objective-based segmentation; Area Fit Index.

References:

1. A Review Paper On Satellite Based Image Segmentation Using Neural Network Feature Extraction In Satellite
Imagery.Ijmc.Editor@Rtmonline.In| Http://Ijmc.Rtmonline.In | Issn 2349-073x.
2. Adler-Golden, S., Berk, A., Bernstein, L.S., Richtsmeier, S., Acharya, P.K., Matthew, M.W., Anderson, G.P., Allred, C.L., Jeong, L.S.,
Chetwynd, J.H., 1998. FLAASH, a MODTRAN4 atmospheric correction package for hyperspectral data retrievals and simulations, in:
Proc. 7th Ann. JPL Airborne Earth Science Workshop. pp. 9–14.
3. Agarwal, P., 2005. Ontological considerations in GIScience. Int. J. Geogr. Inf. Sci. 19, 501– 536. doi:10.1080/13658810500032321
4. Agarwal, S., 2004. Principles of remote sensing. Satell. Remote Sens. GIS Appl. Agric. Meteorol. 23.
5. Anders, N.S., Seijmonsbergen, A.C., Bouten, W., 2011. Segmentation optimization and stratified object-based analysis for semi-
automated geomorphological mapping. Remote Sens. Environ. 115, 2976–2985. doi:10.1016/j.rse.2011.05.007
6. Andrés, S., Pierkot, C., Arvor, D., 2013. Towards a Semantic Interpretation of Satellite Images by Using Spatial Relations Defined in
Geographic Standards. Presented at the GeoProcessing2013 : The Fifth International Conference on Advanced Geographic Information
Systems, Applications and Services, Nice, France, p. 99 to 104.
7. Arvor, D., Durieux, L., Andrés, S., Laporte, M.-A., 2013. Advances in Geographic Object-Based Image Analysis with ontologies: A
review of main contributions and limitations from a remote sensing perspective. ISPRS J. Photogramm. Remote Sens. 82, 125–137.
doi:10.1016/j.isprsjprs.2013.05.003
8. Anders, N.S., Seijmonsbergen, A.C., Bouten, W., 2011. Segmentation optimization and stratified object-based analysis for semi-
automated geomorphological mapping. Remote Sens. Environ. 115, 2976–2985. http://dx.doi.org/10.1016/j.rse.2011.05. 007
9. Basaeed, E., Bhaskar, H., Hill, P., Al-Mualla, M., Bull, D., 2016. A supervised hierarchical segmentation of remote-sensing images
using a committee of multi-scale convolutional neural networks. Int. J. Remote Sens. 37, 1671–1691. http://dx.doi.org/10.
1080/01431161.2016.1159745.
10. Beauchemin, M., Thomson, K.P.B., Edwards, G., 1998. On the Hausdorff distance used for the evaluation of segmentation results.
Can. J. Remote. Sens. 24, 3–8. http://dx.doi. org/10.1080/07038992.1998.10874685
11. Belgiu, M., Drǎguţ, L., 2014. Comparing supervised and unsupervised multiresolution segmentation approaches for extracting
buildings from very high resolution imagery. ISPRS J. Photogramm. Remote Sens. 96, 67–75. http://dx.doi.org/10.1016/j.
isprsjprs.2014.07.002.
12. Arvor, D., Durieux, L., Andrés, S., Laporte, M.-A., 2013. Advances in Geographic Object-Based Image Analysis with ontologies: A
review of main contributions and limitations from a remote sensing perspective. ISPRS J. Photogramm. Remote Sens. 82, 125–137.
doi:10.1016/j.isprsjprs.2013.05.003.

Authors: Sandip P. Patil, Manisha B. Jamgade


Land Change Prediction using Markov Change Multi-Layer Perceptron in Navi Mumbai,
Paper Title:
Maharashtra, India
Abstract: Long-term evaluation of land change and future prediction change is extremely important for
planning and land use management. This research conducted for the analyze future prediction change in the
study area Navi Mumbai. For this prediction analysis used satellite images year from 1998, 2008 and 2018 are
taken. Thus, the change detection obtained from land use and land cover assist in most favourable solutions for
the choice, planning, implementation, and observance of development schemes. To meet the increasing demands
of human need, land management is required. In this work for upcoming predict year, Markov change model is
used for simulating 2028 year. It will give vital and useful information on future development and planning. And
also, is easy for continuing to monitor land change for the large area due to natural human activities and the
effect of natural resources.

Keywords: Land use and Land cover change, Change detection, Spatial modelling, Markov Multi-Layer
Perceptron.

References:

1. Al-Sharif A. A.A . and Pradhan B (2014) “Monitoring and predicting land use change in Tripoli Metropolitan City using an
integrated Markov chain and cellular automata model in GIS”. Arabian Journal of Geosciences 7 4291-4301.
2. Araya, Y.H.; Cabral, P., (2010). Analysis and modeling of urban land cover change in Setúbal and Sesimbra, Portugal. Remote Sens.
2(6): 1549-1563.
3. Balak, R., Kolarkar, A.S., 1993. Remote sensing application in monitoring land use changes in arid Rajasthan. Int. J. Remote Sens. 14
(17), 3191–3200.
81. 4. Bacani VM, Sakamoto AY, Quénol H, Vannier C, Corgnec S. 2016. “Markov chains–cellular automata modeling and multicriteria
analysis of land cover change in the Lower Nhecolândia subregion of the Brazilian Pantanal wetland”. J. Appl. Remote Sens. 10(1),
016004-20 484-490
5. Dawn C. Parker, Steven M. Manson, Marco A. Janssen , Matthew J. Hoffmann, Peter Deadman (2008) “Multi-Agent Systems for the
Simulation of Land-Use and Land-Cover Change: A Review” Annals of the Association of American Geographers, 93:2, pp. 314-337.
6. De Chiara J (2001) Time-saver standards for building types. McGraw-Hill Professional Publishing, New York.
7. Guan D, Li H, Inohae T, Su W, Nagaie T, Hokao K (2011) “Modeling urban land use change by the integration of cellular automaton
and markov model Ecological Modelling” pp. 222 3761-3772.
8. H.A. Bharath, M.C. Chandan, S. Vinay, T.V. Ramachandra 2017 “Modelling urban dynamics in rapidly urbanising Indian cities”, The
Egyptian Journal of Remote Sensing and Space Sciences.
9. Fuglsang M, Münier B, Sten Hansen H 2013 “Modelling land-use effects of future urbanization using cellular automata: An Eastern
Danish case Environmental Modelling & Software” 50 1-11.
10. J.S. Rawat, Vivekanand Biswas, Manish Kumar, (2013) “Changes in land use/cover using geospatial techniques: A case study of
Ramnagar town area, district Nainital, Uttarakhand, India” The Egyptian Journal of Remote Sensing and Space Sciences, 16, pp. 111–
117.
11. M. E. Mirici, S. Berberoglu, A. Akin, O. Satir, (2017) “Land use/cover change modelling in mediterranean rural landscape using MLP-
MC” Applied Ecology and Environmental Research 16(1), pp. 467-486.
12. Roy, S.; Farzana, K.; Papia, M.; Hasan, M. 2015 “Monitoring and prediction of land use/land cover change using the integration of
Markov chain model and cellular automation in the Southeastern Tertiary Hilly Area of Bangladesh”. Int. J. Sci. Basic Appl. Res., 24,
125–148.
13. S. J. Hadi, H. Z. M. Shafri, and M. D. Mahir, “Factors Affecting the Eco-Environment Identification Through Change Detection
Analysisby Using Remote Sensing and GIS: A Case Study of Tikrit, Iraq,” Arab. J. Sci. Eng., vol. 39, no. 1, pp. 395–405, 2013.
14. Senanayake, I.P., Dissanayake, D.M.D.O.K., Puswewala, U.G.A., (2012) Analysis of the abundance of abandoned tanks in
Hambantota District, Sri Lanka using GIS techniques. The Egyptian Journal of Remote Sensing and Space Science 15 (2),143e150.
15. Thomas Houet, Laurence Hubert-Moy, (2007) “Modeling and projecting land-use and land-cover changes with Cellular Automaton in
considering landscape trajectories” European Association of Remote Sensing Laboratories, pp.63-76.
16. Varun Narayan Mishra, Praveen Kumar Rai 2015 “A remote sensing aided multi-layer perceptron-Markov chain analysis for land use
and land cover change prediction in Patna district (Bihar), India” Arabian Journal of Geosciences pp. 9:249.
17. Von Neumann J and Burks A W 1966 “Theory of Self-reproducing Automata” (Urbana:University of Illinois Press)

Authors: Siva Naga Lakshmi Pavani Kallam, BVNR Siva Kumar


82.
Paper Title: Integration of Blockchain Technology in IoT for High Level Security
Abstract: IoT (Internet of Things) made headway from Machine to Machine communication without human
intrusion for number of machines to connect with the aid of network. There is esteem; by 2020 there will be 26
times more connected things than people. Hence, the concern of security rises along with the high installments.
The BlockChain Technology takes place of all central entities, which is peer to peer communication with the
distributed network. In this paper, two Arduino boards as nodes and a Raspberry Pi as server are to be
configured to connect to the Wi-Fi using ESP8266(node mc). To make data transmission from the two nodes to
server, integration of temperature and humidity sensor in one node and RFID (Radio Frequency Identification)
reader in other node is to be done. Data should be in the form of blocks and integration of data is in the form of a
chain, forming it a Blockchain. All the blocks are linked in the chain manner of which the current hash of the
previous block must match with the previous hash of the next block. Then only the blocks of data are secured.
While receiving data every time from nodes to server, the previous hash is to be checked such that the arrival of
the information is being verified to know if it’s really genuine. If the cryptographic hash does not match then
data manipulation is happened. So, in this paper, we will see, along with how practically the security is highly
offered by the blockchain technology and how can we easily identify if the data has been tampered along the
way it reaches to us. Henceforth, we will found a way of application to secure our IoT data without any regrets
in this paper.
491-497
Keywords: Blockchain Technology, Cryptographic hash, IoT, peer to peer communication.

References:

1 X. Sun and N. Ansari, “Dynamic resource caching in the Ioapplication layer for smart cities,” IEEE Internet Things J., to be published.
2 [Online]. Available: http://bitcoin.org/bitcoin.pdf
3 [Online]. Available: https://link.springer.com/ content/pdf/10.1007/978-0-387-35568-9_18.pdf
4 [Online]. Available: https://eprint.iacr.org/2013/881.pdf
5 The Autonomous Decentralized Peer-to-Peer Telemetry (ADEPT) System, IBM, Armonk, NY, USA, 2015.
6 M. Conoscenti, A. Vetrà, and J. C. D. Martin, “Blockchain for the Internet of Things: A systematic literature review,” in Proc. 13th Int.
7 A. Ouaddah, H. Mousannif, A. A. Elkalam, and A. A. Ouahman,“Access control in the Internet of Things: Big challenges and new
opportunities,” Comput. Netw., vol. 112, pp. 237–262, Jan. 2017, doi: 10.1016/j.comnet.2016.11.007.
8 A. Ouaddah, A. A. Elkalam, and A. A. Ouahman, “Fairaccess: A new blockchain-based access control framework for the Internet of
Things,” Security Commun. Netw., vol. 9, no. 18, pp. 5943–5964, 2016.
9 [Online]. Available: http://www.sciencedirect.com/science/article/ pii/S0167739X13000241
10 L. Atzori, A. Iera, and G. Morabito, “The Internet of Things:survey,”Comput. Netw., vol. 54, no. 15, pp. 2787–2805, Oct. 2010
11 O. Arias, J. Wurm, K. Hoang, and Y. Jin, “Privacy and security in Internet of Things and wearable devices,” IEEE Trans. Multi Scale
Comput. Syst., vol. 1, no. 2, pp. 99–109, Apr./Jun. 2015.

Authors: R.Durga Bhavani, J.L.Narayana

Paper Title: Microstrip H-Shape Patch Antenna’s Analysis and Layout


Abstract: Microstrip Patch Antenna gives low contour and size, so it is utilized in specialized gadgets. It is
engraved on a dielectric substrate, supported by a metal board, and directly sustained from a 50Ω coaxial link.
By utilizing HFSS software design, it will be replicated. The complex impact of incorporating various methods
and by presenting a novel H-shape patch provides truncated contour, extensive bandwidth and returns loss,
intense gain and minimized antenna components. This sort of miniature antenna has application in cell phone for
Wi-Max, Bluetooth, C-band, S-band and furthermore for different remote applications. The parameters of
antenna, for example, bandwidth, return loss, VSWR, directivity and gain are examined and compared with the
square patch microstrip antenna. Outcome demonstrates that the antenna has accomplished a good match of
impedance, bandwidth, return loss, VSWR, Gain and Directivity.

Keywords: Multi band, H-shape Microstrip patch antenna, HFSS.


83.
References:
498-501
1. ‘Design of Multiband Compact H-Shaped Microstrip patch antenna for Wireless application’, by Poonam Shukla, S.P. Gangwar ,
IJARCCE Vol. 6, Issue 5, May 2017.
2. ‘Bandwidth Improvement of microstrip patch antenna using H-shaped patch’, by Sudhir Bhaskar, Sachin Kumar Gupta, IJERA
volume2, Issue 1, Jan-Feb.2012, pp. 334-338.
3. ‘A Tri-Band H-Shaped Microstrip Patch Antenna for DCS and WLAN Applications’, by W. Afzal, U. Rafique, M. M. Ahmed, M. A.
Khan, F. A. Mughal in Mikon 2012, 19 th international conference on microwaves, radar & wireless communications, may21-23,
warsaw, Poland.
4. ‘A Compact Slotted H-shape Microstrip Patch Antenna for Wireless Communication with Microstrip Antenna Feed’, by Harshit
Srivastava, BudhadebMaity in International Conference on Communication & Signal Processing, April 6-8, 2016, India 978-1-5090-
0396-9/16/$31.00 ©2016 IEEE.
5. ‘Design and Analysis of H-Shaped Microstrip Antenna with Different Feed Position & Number of Slots for Multiband Applications’,
by Vadhyar Sai Bharath, NVSS Arun Varma, Rexiline Sheeba ICPCSI-2017.
6. ‘Design of an H-shaped Microstrip Patch Antenna for Bluetooth Applications’, by Alak Majumder. International Journal of Innovation
& Applied Studies ISSN 2028-9324 Vol. 3 No. 4 Aug. 2013, pp. 987-994. 2013 Innovative Space of Scientific Research Journals.
http://www.issr-journals.org/ijias/.
Authors: Anil Kumar Mishra, Yogita Gigras, Latika Singh

Paper Title: Design of Framework to Quantitatively Measure the ubiquity of an IT Solution


Abstract: Ubiquitous computing is one of the most disruptive and emerging technology of present times with
applications in many areas like manufacturing, healthcare, real estate etc. Design of standards and framework for
these applications is an ongoing research area. To aid a better design, it is worthwhile to have a framework that
can be used to quantitatively measure various features of IT solutions and products like ubiquity, security etc.
The primary aim of having this framework is to assist in development of a solution or product that is properly
engineered. This paper provides a novel framework which includes various metrics that measures various
features of an IT application or product. The application of the framework is demonstrated by measuring the
various features of two different versions of a smart home application developed by a company for luxury real
estate project. Initially, the first version of the application is evaluated using the proposed framework which then
helped in identifying the improvement areas which were enhanced in subsequent version of the solution. These
results are presented to validate the proposed concepts and model.

Keywords: Framework, Ubiquitous computing, Ubiquitous application.

References:

1. Spínola, R.O., Silva, J.L.M., Travassos, G.H. (2006) “Towards a Conceptual Framework to Classify Ubiquitous Software Projects”.
Proceedings of the 8th International Conference on Software Engineering and Knowledge Engineering (SEKE), San Francisco, USA
2. Gordana Gardas ˇevic, Mladen Veletic, Nebojs ˇa Maletic, Dragan Vasiljevic, Igor Radusinovic, Slavica Tomovic and Milutin
Radonjic (2016) “The IoT Architectural Framework, Design Issues and Application Domains”. Wireless Personal Communication.
3. Kwon, Ohbyung & Kim, Jihoon & Choi, Keunho & Kim, Changsu. (2005). “A Multi-Layered Methodology for Assessing Level of 502-507
Ubiquitous Computing Services.” GESTS International Transactions on Computer Science and Engineering
84. 4. Chu N and Bo Ding H L (2018), “Constructing self-adaptive software in ubiquitous computing space”. Proceedings of IEEE
International Conference on Computer and Communication Engineering Technology.
5. Egami K, Matsumoto S and Nakamur M (2011), “Ubiquitous Cloud: Managing Service Resources for Adaptive Ubiquitous
Computing.” Proceedings of IEEE PerCom workshop on Pervasive Communities and Service Clouds.
6. Poole E S, Chetty M, Grinter R E, Edwards W K (2008), “More Than Meets the Eye: Transforming the User Experience of Home
Network Management”. Proceedings of the 7th ACM conference on designing interactive systems. Pages 455-464
7. R. Casadei, Giancarlo Fortino, Danilo Pianini, Wilma Russo, Claudio Savaglio, and Mirko Viroli (2018) “Modelling and simulation of
Opportunistic IoT Services with Aggregate Computing”. Future Generation Computer Systems.
8. DI NUOVO, Alessandro, VARRASI, Simone, ALEXANDR, Lucas, CONTI, Daniela, SORANZO, Alessandro, BAMFORTH, Josh
and MCNAMARA, John (2019). Usability Evaluation of a Robotic System for Cognitive Testing. In: Proceedings of the 2019
ACM/IEEE International Conference on Human-Robot Interaction. IEEE.
9. Veeresh P, Sam P R and Bindu S C (2018), “Energy Constraint Service Discovery and Composition in Mobile Ad Hoc Networks”.
Proceedings of the second international conference on computational intelligence and informatics (part of Advances in Intelligent
Systems and Computing book series).
10. Farahzadia A, Shamsa P, Rezazadehac J and Farahbakhshb R (2018), “Middleware technologies for cloud of things: a survey”. Digital
Communications and Networks, 4(3), Pages 176-188
11. Kubitza T, Voit A, Weber D and Schmidt A (2016), “An IoT infrastructure for ubiquitous notifications in intelligent living
environments”. Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing. Pages 1536-
1541
12. Plageras A P, Psannis K E, Ishibashi Y and Kim B-G (2016), “IoT-based surveillance system for ubiquitous healthcare”. Proceedings
of IECON 2016 - 42nd Annual Conference of the IEEE Industrial Electronics Society
13. Zhang J, Zheng P, Ma M and Wang P (2018), “Toward Ubiquitous Environment: An Scalable Framework for Autonomous Service
Composition”. Proceedings of 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing,
Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation
14. Smart Home solution offered by Ansyst Consulting, India.

Authors: Vandana, Navdeep Kaur

Paper Title: An Energy Efficient Enhanced Hybrid Routing Protocol for MANET utilizing Artificial Bee Colony
Abstract: Mobile Ad hoc Network (MANET) is a self-organized wireless network with no central control
station or no rigid infrastructure. The main objective of the ad hoc network is that the nodes move arbitrarily that
needs the routing protocols to rapidly counter the change of network topology. Limited energy resource
availability is the core issue in MANET. For energy efficiency enhancement, this research has acquainted a
hybrid routing algorithm which is an amalgamation of Ad hoc On-Demand Distance Vector Routing (AODV)
and Temporally-Ordered Routing Algorithm (TORA) routing protocols for the route discovery process using
Low Energy Adaptive Clustering Hierarchy (LEACH). Artificial Bee Colony (ABC) algorithm has been used
for the optimization if some sort of distortion occurs within the network. The simulation has been executed in
MATLAB simulation tool using QoS parameters, such as throughput, energy consumption, PDR and delay.
Comparative analysis has been done to portray the proposed work effectiveness.
85.
Keywords: ABC, Aoda ,Delay, Energy Consumption, Leach, Manet, Tora, Throughput.
508-515
References:

1. F. Khan,Q. Jabeen,S. Khan and M. Ahmad, “Performance improvement in multihop wireless mobile adhoc networks”, The Journal
Applied, Environmental, and Biological Sciences (JAEBS), Vol. 6, pp. 82-92,2016.
2. S. K. Sarkar, T.G. Basavaraju and C. Puttamadappa, “Ad hoc mobile wireless networks: principles, protocols, and applications”, CRC
Press,2016.
3. Z. Movahedi, Z.Hosseini , F. Bayan and G. Pujolle, “Trust-distortion resistant trust management frameworks on mobile ad hoc
networks: A survey”, IEEE Communications Surveys & Tutorials, Vol. 18, No. 2, pp.1287-1309, 2016.
4. J. Loo, J. L. Mauri and J. H. Ortiz, “Mobile ad hoc networks: current status and future trends”, CRC Press, 2016.
5. E. Zamani and M. Soltanaghaei, “The improved overhearing backup AODV protocol in MANET”, Journal of Computer Networks and
Communications, Vol. 2016, No. 5,2016.
6. S. Manna,A. Mondal and P. Sarcar, “Optimal path selection for AODV routing protocol in MANET”, In Computer, Communication
and Electrical Technology: Proceedings of the International Conference on Advancement of Computer Communication and Electrical
Technology, West Bengal, India,pp.121-123, 2017.
7. P. Nayak and B. Vathasavai, “Impact of Random Mobility Models for Reactive Routing Protocols over MANET”, International Journal
of Simulation Systems, Science &Technology, Vol. 17, No. 34,pp. 112-115, 2016.
8. S. Jahanbakhsh Gudakahriz, S. Jamali, M. Vajed Khiavi and A. Soleimany, “A Stable TORA Based for Routing in Mobile Ad Ηoc
Networks”, Engineering, Technology & Applied Science Research, Vol. 8, No.1 , pp.2532-2536,2018.
9. Radhika Patel, Bimal Patel, Sandip Patel and Amit Parmar, “P-TORA: A TORA Modification Under TCP E2E-NewReno Model”,
International Conference on Futuristic Trends in Network and Communication Technologies FTNCT: Futuristic Trends in Network
and Communication Technologies, pp. 338–349, 2019.
10. J. Bavaliya,R. Agrawal and A. Gondalia, “An Improved OLSR Protocol IOLSR to Detect and Prevent Flood Attack over
MANET”, International Journal of Engineering Science, Vol.5, pp.4648-4649, 2016.
11. M.Vijay Anand, MuthukrishnanRamprasath and Shanmugasundaram Hariharan, “Bee-mimetic DSR Based Secure Routing in MANET
using Artificial Bee Colony Optimization”, International Journal of Pure and Applied Mathematics, Vol. 119, No.17, pp.1337-
1350,2018.
12. Sivakumar Venu and A. M. J. Md. Zubair Rahman, “Energy and cluster based efficient routing for broadcasting in mobile ad hoc
networks”, Cluster Computing, pp. ,1-11, 2018.
13. A. Boushaba, A. Benabbou, R. Benabbou, A.Zahib and M.Oumsis,
“Multi-point relay selection strategies to reduce topology control traffic for OLSR protocol in MANETs”, Journal of Network and
Computer Applications, Vol. 53, pp. 91-102,2015.
14. P. N. Pandey, D. Samaiya and G. Ganga, “Identification of Fictitious Node Based on TC Message with Modification of OLSR Protocol
in MANET”, Semantic Scholar, 2017.
15. F. Barani and A. Barani, “Dynamic intrusion detection in AODV-based MANETs using memetic artificial bee colony algorithm”, 22nd
Iranian Conference on Electrical Engineering (ICEE), Tehran, pp. 1040-1046,2014.
16. G. Arenella, F. D. Santis and D. Malandrino, “Bee AdHoc Service Discovery: A MANET service discovery algorithm based on bee
colonies”, 11th International Conference on Informatics in Control, Automation and Robotics (ICINCO), Vienna, pp. 244-251, 2014.
17. R. Bhuvaneswari and R. Ramachandran, “Denial of service attack solution in OLSR based manet by varying number of fictitious
node”, Cluster Computing, pp.1-11, 2018.
18. R. K. Jha and P. Kharga, “A comparative performance analysis of routing protocols in MANET using NS3 simulator”, International
Journal of Computer Network and Information Security, Vol. 7, No. 4, pp. 62-68,2015.
19. S. K. Gupta, S. L Agrwal and N. Kumari, “New performance analysis of AODV, DSDV and OLSR routing protocol for MANET”, 3rd
International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, pp. 33-35,2016.
20. Dr. Amjad Rattrout, Prof. Adwan Yasin , Mahmoud Abu-Zant, Mariam Yasin and Mohammed Dwaikat, “Clustering algorithm for
AODV Routing Protocol based on Artificial Bee Colony in MANET”, In Proceedings of the 2nd International Conference on Future
Networks and Distributed Systems, pp.1- 5, ACM.
21. Fatima Zohra Bouchibane and Messaoud Bensebti, “Artificial bee colony algorithm for energy efficiency optimisation in massive
MIMO system”, Int. J. Wireless and Mobile Computing, Vol. 15, No. 2,pp.97-104, 2018.
22. Shanti Jaiswal and Navneet Kaur, “Energy Efficient and Improved Network Lifetime Multipath Routing using FF-AOMDV and
Dragonfly Topology”, Communications on Applied Electronics (CAE)”, Vol. 7, No.15, pp.7-14, 2018.
Authors: L. Megalan Leo, V. Yokesh, K.V. Karthikeyan, G. Ramkumar, S. Agnes Shifani

Paper Title: Skin Lesion Detection Based on Fuzzy Logic


Abstract: Melanoma is the maximal destructive type of skin disease. Occurrence ratios of melanoma seemed
expanding, particularly with non-Hispanic white guys and females, however durability values are more
whenever identified early. Requirement of cost as well as time for the imates to go for dermatologist for
melanoma are restrictively exorbitant. Test in actualizing such a framework is finding the derma sore in the
computerized picture. An arrangement of agent surface appropriations are found out from an enlightenment
remedied photo and surface peculiarity metric is ascertained for every circulation. Melanoma represents around
75% of passings related with skin tumor. The fundamental objective of our work is to build up a structure that
naturally right and section the skin injury from an information photo. This philosophy utilizes surface peculiarity
injury division fluffy calculation to distinguish the injuries in the skin. The upside of this undertaking is early
recognition of the sore to dodge skin tumor at later stages.

Keywords: Skin lesion, melanoma, segmentation, classification.

References:

1. Sheng Chen, Zhe Wang, Jianping Shi, Bin Liu, Nenghai Yu. a multi-task frame work with feature passing module for skin lesion
classification and segmentation, 2018 IEEE 15th International Symposium on Biomedical Imaging (ISBI 2018).
86. 2. D.S. Rigel, R. J. Friedman, and A. W. Kopf, “The incidence of malignant melanoma in the United States: Issues as we approach the
21st century,” J. Amer. Acad. Dermatol., vol. 34, no. 5, pp. 839–847, 1996
3. Kavipriya.P , Pandiarajan.S , A Survey on Automated Segmentation of Microscopy Imaged Melanocytic Lesions. International Journal 516-520
for Research in Applied Science & Engineering Technology(IJRASET).
4. K. A. Freedberg, A. C. Geller, D. R. Miller, R. A. Lew, and H. K. Koh,“Screening for malignant melanoma: A cost-effectiveness
analysis,” J.Amer. Acad. Dermatol., vol. 41, no. 5, pt. 1, pp. 738–745, Nov. 1999.
5. Omar Abuzaghleh, Buket D.Barkana,Miad Faezipour, ”Noninvasive Real-Time Automated Skin Lesion Analysis System for
Melanoma Early Detection and Prevention” LATEX, IEEE Journal of Transactional Engineering in Health and Medicine(2015), IEEE
APRIL 2015.
6. Kiran Ramlakhan, Yi Shang, ”A mobile Automated Skin Lesion Classification System” LATEX, IEEE International Conference on
Tools with Artificial Intelligence(2011), IEEE 2011
7. Yuan Y, Chao M, Lo Y C. Automatic Skin Lesion Segmentation Using Deep Fully Convolutional Networks with Jaccard Distance[J].
IEEE Transactions on Medical Imaging, 2017
8. Yu L, Chen H, Dou Q, et al. Automated melanoma recognition in dermoscopy images via very deep residual networks[J]. IEEE
transactions on medical imaging, 2017, 36(4): 994-1004
9. Alexandros Karargyris, Orestis Karargyris, Alexandros Pantelopoulos,+ ”Derma/care: An advanced image-Processing mobile
application for monitoring skin cancer” LATEX, IEEE International Conference on Tools with Artificial Intelligence(2012), IEEE
2012
10. Tarun Wadhawan,Ning Situ,Keith Lancaster, ”Skin Scan: A Portable Library. For Melanoma Detection On Hand Held Devices”
LATEX, IEEE International Conference on Tools with Artificial Intelligence(2011),IEEE 2011
11. Humayun J, Malik AS and Kamel N, “Multilevel thresholding for segmentation of pigmented skin lesions”, Proc. IEEE international
conference on imaging systems and techniques, pp 310–314, 2011
12. Ge Z, Demyanov S, Bozorgtabar B, et al. Exploiting local and generic features for accurate skin lesions classification using clinical and
dermoscopy imaging[C]//Biomedical Imaging (ISBI 2017), 2017 IEEE 14th International Symposium on. IEEE, 2017: 986-990
13. S. Agnes Shifani, V. Nanammal, R. Bhavani and A. A. Nishidha, "A Review on Strain Measurement in Bone Mechanics Using Various
Techniques," 2017 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), Coimbatore,
2017, pp. 1-5.
14. Celebi ME, Kingravi HA, Iyatomi H, Alp Aslandogan Y, Stoecker WV, Moss RH, Malters JM, Grichnik JM, Marghoob AA,
Rabinovitz HS and Menzies SW., “Border detection in dermoscopy images using statistical region merging”, Skin Res Technol, vol.
14, no. 3, pp. 347–353, 2008
15. Omar Abuzaghleh,Buket D. Barkana,Miad Faezipour, ”SKIN cure: A Real Time Image Analysis System to Aid in the Malignant
Melanoma Prevention and Early Detection” LATEX, IEEE Journal of Transactional Engineering in Health and Medicine(2014), IEEE
APRIL 2014
16. M. Celebi, H. M. Celebi, H. Iyatomi, G. Schaefer, and W. V. Stoecker, “Lesionborder detection in dermoscopy images,” Comput. Med.
Imag. Graph. vol. 33, no. 2, pp. 148–153, 2009
17. R. Nock and F. Nielsen, “Statistical region merging,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 26, no. 11, pp. 1452–1458, Nov
2004
18. G.Ramkumar, E.Logashanmugam “ Hybrid Framework for detection of human face based on haar-like feature” International Journal of
Engineering & Technology, 7 (3) 2018, 1786-1790
19. G. Ramkumar, E. Logashanmugam, "Study on impulsive assessment of chronic pain correlated expressions in facial images”
Biomedical Research (2018) Volume 29, Issue 16.
Sergiy O. Kramskyі, Oleg V. Zakharchenko, Aleksandr V. Darushin, Olena V. Bileha, Tetiana P.
Authors:
Riepnova
Paper Title: The method of Project Team Formation on the Example of the Ship’s Crew
Abstract: This article analyzes the existing terminological and methodological personnel management
apparatus and as a result, it turned out that the application of the project-oriented management approach leads to
the conclusion and indicates that the employment agreement (contract) for the voyage, the ship's crew are all
signs of the project, and the project team. It should be noted that shipping companies are management oriented
organizations through projects. Despite the absolutely correct conclusion that the minimum crew should be
determined on the basis of the conditions for ensuring the safe operation of all ship systems and mechanisms.
Specific techniques and methods for calculating the required number of crew not previously represented. The
project-oriented context of modern project management in a turbulent environment and the need for appropriate
transformations of infrastructure and industry, including the sea. The management activities take into account
the individual characteristics of the project team members, due to socio-cultural influences. The project
management methodology and team format of the project activity considers human resource management
processes in conjunction with other areas of knowledge that should be integrated into processes such as content
management, timing, cost, quality, risk, supply, communications. Therefore, it seems quite logical for the
authors to refer to “the processes of formation and management of human resources in project teams” on the
example of the ship’s crew.

Keywords: Forming teams, methodology, personnel management, project management, ship’s crew.
87.
References: 521-526
1. D. T Baumann, Swiss National Competence Baseline (Swiss NCB). Glattbrugg Swiss Project Management Association, 2010.
2. O. Shigenobu, P2M - A Guidebook of project and program management for enterprise innovation. PMAJ, 2017.
3. A Guide to the Project Management Body of Knowledge PMBOK Guide. PMI, 2017.
4. C. Bentley, РRINCE2 for Beginners: From introduction to passing your foundation exam. London: Routledge Ltd, 2015.
5. S. A. Kramskoy, “Use of the competency approach in determining the minimum crew of the vessel,” Bulletin of National Technical
University "KhPI", 1 (1110), 2015, pp. 134–139.
6. S. О. Kramskyi, Models and methods of forming project teams on the example of the crew of a ship. PhD thesis. ONMU, 2014.
7. V. M. Pіterska, and S. O. Kramskiy, “Methodological basis of innovative project-oriented organizations’ management,” Management
of the development of complex systems, 30, 2017, pp. 11-20.
8. V. Mikheev, Modern project management team. Open systems, 2011.
9. A. S. Maltsev, and S. O. Kramskiy, “Management project team and mathematical models of collective behavior of small groups,”
Management of development of complex systems, 36, 2018, pp. 27-34.
10. N. Ya. Azarov, F. A. Yaroshenko, and S. D. Bushuev, Innovative mechanisms for managing development programs. Kyiv: Summit
book, 2011.
11. S. A. Kramskoy, and D. P. Matolikov, “Determination of duration and complexity of technical systems repair by simulation,” Bulletin
of National Technical University "KhPI", 3 (1046), 2014, pp. 84-91.
12. T. Demarco, and Т. Liste, The human factor: successful projects and teams. St-Peterburg: Symbol-Plus, 2005.
13. A.V. Shakhov, “Formation of the crew on the basis of simulation,” Eastern-European Journal of Enterprise Technologies, 1/5(49),
2011, pp. 69-70.
14. S. O. Kramskiy, “Project management of joint project teams,” Bulletin of communal services of cities, 95, 2010, pp. 328-336.
15. S. A. Kramskoy, “The project is the voyage of a vessel and crew of the vessel as a project team,” Proc. X-th international. conf.
"Management of projects for the development of society". KNUСA, 2013, pp. 132-134.

Authors: Vani Kansal, Rakesh Kumar


Optimized Feature Extraction Based Artificial Intelligence Technique for Empirical Analysis of
Paper Title:
Stock Market Data
Abstract: Stock market forecasting is considered as a challenging task in financial time series forecasting. The
core idea of a successful stock market forecast is to get the best results with the least amount of input data
required and the least complex stock market model. So in this paper, to achieve these goals, this paper proposes
88. a new algorithm Cuckoo Neural for Financial Market (CN_FM), which integrates Cuckoo Search (CS) with a
Feed forward back propagation Neural Network (FFBPNN) and build a stock price forecasting proficient
527-532
system. This research follows some basic steps to design a model for sentiment analysis from Stock market
dataset and firstly data is pre-processed to remove the unwanted text. In pre-processing steps the techniques such
as normalization, punctuation, stop word removal and tokenization are applied. The extracted features are
optimized using CS and in turns used to train the FFBPNN. The results obtained from experiments in the stock
market show that the proposed method can reduce the dimensions and produce accurate results for emotion-
based text categorization with an accuracy of 99.44%.

Keywords: Sentiment Analysis, Stock market, Cuckoo Search, Feed forward back propagation Neural
Network.

References:

1. N. Tabari, A. Seyeditabari, T. Peddi, M. Hadzikadic, & W. Zadrozny, “A Comparison of Neural Network Methods for Accurate
Sentiment Analysis of Stock Market Tweets,” in ECML PKDD, Springer, Cham, 2018 Workshops, pp. 51-65.
2. R. Ren, D. D. Wu, & T. Liu, “Forecasting Stock Market Movement Direction Using Sentiment Analysis and Support Vector Machine,”
IEEE Systems Journal, 2018, pp. 1-11.
3. Y. Ruan, A. Durresi, & L. Alfantoukh, ,“Using Twitter Trust Network for Stock Market Analysis,” Knowledge-Based Systems,
Elsevier, 2018, vol. 145, pp. 207-218.
4. S. Sakphoowadon, , N. Wisitpongphan, & C. Haruechaiyasak, “Probabilistic Lexicon-Based Approach for Stock Market Prediction: A
Case Study of the Stock Exchange of Thailand (SET),” in 2018 18th International Symposium on Communications and Information
Technologies (ISCIT), 2018, pp. 383-388.
5. A. Agarwal, & D. Toshniwal, “Application of Lexicon Based Approach in Sentiment Analysis for Short Tweets,” in 2018
International Conference on Advances in Computing and Communication Engineering (ICACCE), 2018, pp. 189-193.
6. S. L. Rose, R. Venkatesan, G. Pasupathy, & P. Swaradh, “A Lexicon-Based Term Weighting Scheme for Emotion Identification of
Tweets,” in International Journal of Data Analysis Techniques and Strategies, 2018, vol. 10, no. 4, pp. 369-380.
7. K. Chakraborty, S. Bhattacharyya, R. Bag, & A. E. Hassanien, “Comparative sentiment analysis on a set of movie reviews using deep
learning approach,” in International Conference on Advanced Machine Learning Technologies and Applications, Springer, Cham,
2018, pp. 311-318.
8. E. F. Fama, “Efficient Capital Markets: II,” The journal of finance, Wiley Online Library, 1991vol. 46, no. 5, pp. 1575-1617.
9. S. Walczak, “An Empirical Analysis of Data Requirements for Financial Forecasting with Neural Networks,” Journal of management
information systems, 2001, vol. 17, no. 4, pp. 203-222.
10. B. Pang, & L. Lee, “ Opinion mining and sentiment analysis,” Foundations and Trends in Information Retrieval, 2008vol. 2, no. 1–2,
pp. 1-135.
11. J. Bollen, H. Mao, & X. Zeng, “Twitter Mood Predicts the Stock Market,” Journal of computational science, 2011, vol. 2, no. 1, pp. 1-
8, Elsevier.
12. T. H. Nguyen, & K. Shirai, “ Topic Modeling based Sentiment Analysis on Social Media for Stock Market Prediction,” in Proceedings
of the 53rd FFBPNNual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on
Natural Language Processing, 2015, vol. 1, pp. 1354-1364.
13. R. Chen, & M. Lazer, “Sentiment Analysis of Twitter Feeds for the Prediction of Stock Market Movement,” Stanford edu. Retrieved
January, 2013, vol. 25, pp. 1-5.
14. R. Chiong, Z. Fan, Z. Hu, M. T. Adam, B. Lutz, & D. NeumFFBPNN, “A sentiment analysis-based machine learning approach for
financial market prediction via news disclosures,” in Proceedings of the Genetic and Evolutionary Computation Conference
Companion, 2018, pp. 278-279.
15. V. S. Pagolu, K. N. Reddy, G. Panda, & B. Majhi, “Sentiment Analysis of Twitter Data for Predicting Stock Market Movements,” in
2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES),2016, pp. 1345-1350.
16. A. C. Pandey, D. S. Rajpoot, & M. Saraswat, “Twitter Sentiment Analysis using Hybrid Cuckoo Search Method,” Information
Processing & Management, Elsevier, 2017, vol. 53, no. 4, pp. 764-779.
17. M. Ghiassi, J. Skinner, & D. Zimbra, “Twitter brand sentiment analysis: A Hybrid System using n-gram Analysis and Dynamic
Artificial Neural Network,” Expert Systems with applications, Elsevier, 2013, vol. 40, no. 16, pp. 6266-6282.
18. S. Sohangir, D. Wang, A. Pomeranets, & T. M Khoshgoftaar,” Big Data: Deep Learning for Financial Sentiment Analysis”. Journal of
Big Data, 2018, vol. 5, no. 1.
19. N. Petty, S. Sohangir, & D. Wang, “Financial Sentiment Lexicon Analysis,” in 2018 IEEE 12th International Conference on Semantic
Computing (ICSC,) IEEE, 2018, pp. 286-289.

Authors: P. Pandeeswary, M. Janaki

Paper Title: Performance Analysis of Big data Classification Techniques on Diabetes Prediction
Abstract: Big data is extremely huge data sets analyzed computationally to expose patterns, trends, and
prediction in order to make simpler the decision making. Predicting diseases became very important, it can be
obtained with a large dataset using classification techniques. Various big data analytics tools are available for
classification. Classification is the general technique used in the medical analysis for data prediction. In these
paper classification algorithms like Support vector machine, Naïve Bayesian and C4.5 are discussed. The Pima
Indian Diabetes Database (PIDD) is used in the analysis of the Classification algorithms to sort out and classify
the people with diabetes positive and with diabetes negative it is openly accessible machine learning database
found at UCI. The objective is to find the best suitable technique for prediction. Here, we used the comparison
method with the results of three supervised learning algorithms based on three criteria, computation time taken,
accuracy rate and error rate using the Tanagra tool. The classification algorithms are used to predict diabetes
89. based on the data given. Accordingly, many classification techniques are there, from this study a few
classification techniques suggested to be used in big data analysis, which has the probability to significantly
533-537
progress the prediction. . As a result, a representative confusion matrix is displayed for making the verification
process faster. From the results, it is concluded that C4.5 algorithm is best suited for predicting diabetes disease
and also can be used in other disciplinary for making better prediction.

Keywords: Big data, Classification techniques, C4.5, Diabetes, Naïve Bayesian, SVM, Tanagra.

References:

1. Venkatesh Naganathan, ‘Comparative Analysis of Big Data, Big Data Analytics: Challenges and Trends’, (JET), Vol: 5, Issue: 05,
May-2018.
2. Althaf Rahaman.Sk, Sai Rajesh.K, ‘Challenging tools on Research Issues in Big DataAnalytics’, 2018 IJEDR, Volume: 6, Issue 1.
3. S. Vijayarani, Mr.S.Dhayanand, ‘Data Mining Classification Algorithms for Kidney Disease Prediction’, International Journal on
Cybernetics & Informatics (IJCI) Vol. 4, No. 4, August 2015.
4. Liliya Demidova,Evgeny Nikulchev, ‘Big data classification using SVM Classifiers with the Modified Particle Swarm Optimization
and the SVM Ensembles’ IJACSA, Vol:7, No. 5, 2016.
5. S.Vijayarani, Mr.S.Dhayanand, ‘DATA MINING CLASSIFICATION ALGORITHMS FOR KIDNEY DISEASE PREDICTION’,
International Journal on Cybernetics & Informatics (IJCI) Vol. 4, No. 4, August 2015.
6. Prableen Kaur and Manik Sharma, ‘Analysis Of Data Mining And Soft Computing Techniques In Prospecting Diabetes Disorder In
Human Beings: A Review’, IJPSR, 2018, Vol: 9, Issue 7.
7. R. Kishore Kumar, G. Poonkuzhali, P. Sudhakar, ‘Comparative Study on Email Spam Classifier using Data Mining Techniques’
International MultiConference of Engineers and computer Scientists 2012 and VolI, IMECS 2012.
8. Kalpesh Adhatrao, Aditya Gaykar, ‘Predicting Students Performance Using Id3 And C4.5 Classification algorithms’, International
Journal of Data Mining & Knowledge Management Process, IJDKP Vol:3, No:5,2013.
9. Amrita Naika, Lilavati Samantb, ‘Correlation Review Of Classification Algorithm using Data mining Tools: WEKA, Rapid miner,
Tanagra, Orange And Knime’, International Conference on Computational Modeling and Security, 2016, ELSEVIER.
10. CH.ChandraSekhar,CH.Sekhar,‘productivity, ‘Improvement in Agriculture Sector Using Big Data Tools’, 2017, IEEE Conference
Paper.
11. M.Rajeshwaran, A.Ahila, ‘Segmentation Of Liver Cancer Using Svm Techniques’, International Journal of Computing
Communication and Information System (IJCCIS) vol: 6. No.2 – April - June 2014.
12. Poonam Bonde, Sachin Barahate, ‘Classification Of Big Data Using Support Vector Machine’, JETER, March 2017, Vol 4, Issue 03.
13. Sunita Joshi, Bhuwaneshwari Pandey, ‘ Comparative Analysis Of Naive Bayes And J48 Classification’, International Journal of
advanced research in Computer science and Software Engineering, Vol:5, Issue 12, Dec 2015.
14. Lopamudra Dey, Sanjay Chakraborty,‘Sentiment Analysis Of Review Datasets Using Naïve Bayes’ And K-NN Classifier’,
I.J.Information Engineering and Electronic Business,2016, 4.
15. Eka Sugiyarti1, Kamarul Azmi Jasmi,‘Decision Support System Of Scholarship Grantee Selection Using Data Mining’, International
Journal of Pure and Applied Mathematics, Vol119, No. 15 2018.
16. Efori Buulolo, Fadlina, ‘C4.5 Algorithm To Predict the Impact of the Earthquake’, (IJERT), Vol: 6 Issue: 02, Feb 2017.
,
17. P. Radha, Dr. B. Srinivasan ‘ Predicting Diabetes By Cosequencing The Various Data Mining Classification Techniques’,
International Journal of Innovative Science, Engineering & Technology, Vol:1, Issue:6, Aug 2014.
18. T. Santhanam, M.S Padmavathi, ‘Application of K- Means and Genetic Algorithms for Dimension Reduction by Integrating
SVM for Diabetes Diagnosis’, Elsevier, 2015, ScienceDirect.
19. Usha G Biradar, Deepa S Mugali, ‘Clustering Algorithms on Diabetes data: A Comparative Case Study’, International Journal of
Advanced Research in Computer Science, Vol:8, No. 5, May-June 2017.
20. M. Rashedur Rahman, Farhana Afroz, ‘Comparison Of Various Classification techniques using different Data mining Tools for the
Diabetes Diagnosis’, Journal Of Software Engineering And Applications, 2013.
Authors: E. Ramya, R. Josephine Sahana

Paper Title: IAAS Reactive Auto Scaling Performance Challenges


Abstract: The principle highlight of a cloud application is its versatility. Significant IaaS cloud administrations
suppliers (CSP) utilize auto scaling on the dimension of virtual machines (VM). Other virtualization
arrangements (for example compartments, units) can likewise scale. An application scales in light of progress in
watched measurements, for example in CPU use. Every so often, cloud applications display the powerlessness to
meet the Quality of Service (QoS) necessities during the scaling brought about by the reactivity of auto scaling
arrangements. This paper gives the after effects of the auto scaling execution assessment for two-layered
virtualization (VMs and units) directed in the open billows of AWS, Microsoft and Google utilizing the
methodology and the Auto scaling Performance Estimation Tool created by the creators.

Keywords: Performance of Auto scaling; Auto scaling; multilayered Auto scaling; cloud computing.

References:

1. Alexandros Evangelidis, David Parker, and Rami Bahsoon. Performance modelling and verification of cloud-based autoscaling
90. policies. In Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGrid ’17, pages
355–364, Piscataway, NJ, USA, 2017.IEEE Press.
2. K. Hwang, X. Bai, Y. Shi, M. Li, W. G. Chen, and Y. Wu.Cloud performance modeling with benchmark evaluation of elastic scaling
538-541
strategies. IEEE Transactions on Parallel and Distributed Systems, 27(1):130–143, Jan 2016.
3. Alexey Ilyushkin, Ahmed Ali-Eldin, Nikolas Herbst, Alessandro V. Papadopoulos, Bogdan Ghit, Dick Epema, and Alexandru Iosup.
An experimental performance evaluation of autoscaling policies for complex workflows. In Proceedings of the 8th ACM/SPEC on
International Conference on Performance Engineering, ICPE ’17, pages 75–86, New York, NY,USA, 2017. ACM.
4. D. Jayasinghe, S. Malkowski, J. Li, Q. Wang, Z. Wang,and C. Pu. Variations in performance and scalability: An experimental study in
iaas clouds using multi-tier workloads. IEEE Transactions on Services Computing, 7(2):293–306,April 2014.
5. A. Jindal, V. Podolskiy, and M. Gerndt. Multilayered cloud applications autoscaling performance estimation. In 2017 IEEE 7th
International Symposium on Cloud and Service Computing (SC2), pages 24–31, Nov 2017.
6. Anshul Jindal, Vladimir Podolskiy, and Michael Gerndt. Autoscaling performance measurement tool. In Companion of the 2018
ACM/SPEC International Conference on Performance Engineering, ICPE ’18, pages 91–92, New York, NY,USA, 2018. ACM.
7. A. Iosup L. Versluis, M. Neacsu. Technical Report: A TraceBased Performance Study of Autoscaling Workloads of Workflows in
Datacenters. TR 1711.08993v1, Vrije Universiteit Amsterdam, nov 2017.
8. D. Moldovan, H. L. Truong, and S. Dustdar. Cost-aware scalability of applications in public clouds. In 2016 IEEE International
Conference on Cloud Engineering (IC2E), pages79–88, April 2016.
9. Alessandro Vittorio Papadopoulos, Ahmed Ali-Eldin, KarlErik Arzen, Johan Tordsson, and Erik Elmroth. Peas: A performance
evaluation framework for auto-scaling strategies in cloud applications. ACM Trans. Model. Perform. Eval. Comput. Syst., 1(4):15:1–
15:31, August 2016.
10. N. Serrano, G. Gallardo, and J. Hernantes. Infrastructure as a service and cloud technologies. IEEE Software, 32(2):30–36,Mar 2015.

Authors: P.Velrajkumar, C.Senthilpari, P.Ramesh, G.Ramanamurthy, D.Kodandapani

Paper Title: Development of Smart Number Writing Robotic Arm using Stochastic Gradient Decent Algorithm
Abstract: Robotics and Neural Networks will play a major role in the future of manufacturing and automation
process. Nowadays not many robotic systems are smart systems, in the sense that they operate on a predefined
algorithm to do their task. This research focuses on a design and development of a robotic arm with a visual
input. The robotic arm will perform its job with the help of visual aid. The system will analyze the input image
upon which the decision to write a number using Stochastic Gradient Decent (SGD) algorithm. In a nutshell this
research work shows how the neural network can be incorporated with robot arm control, which is a desired field
of interest in development of smart robotic systems. This work presents where the robotic arm is incorporated
together with a neural network to perform a task of writing numbers using vision.

Keywords: Automation, Neural network, Robot arm, SGD, thermal vision.

References:

1. P.Velrajkumar, CV Aravind, S.Solai Manohar, A Darwin Jose Raju, “Development of Real-Time Tracking and Control Mobile Robot
91. using Video Capturing Feature for Unmanned Applications”, IEEE International Conference on Communication Control and
Computing Technologies, India, 2010, pp. 90 – 92.
2. P.Velrajkumar, G.Ramanamurthy, J.Emerson Raja, Md.Jakir Hossen, Lo Kok Jong, “Controlling and Tracking of Mobile Robot in
Real-Time using Android Platform”, Journal of Engineering and Applied Sciences, 12 (4), 2017, pp. 929 – 932.G. O. Young, 542-547
“Synthetic structure of industrial plastics (Book style with paper title and editor),” in Plastics, 2nd ed. vol. 3, J. Peters, Ed. New
York: McGraw-Hill, 1964, pp. 15–64.
3. Urmila Meshram, Pankaj Bande, P.A.Dwaramwar, R.R.Harkare, “Robot arm controller using FPGA”, IEEE International Multimedia,
Signal Processing and Communication Technologies, India, 2009, pp. 8 – 11.
4. Agus Bejo, Wanchalerm Pora, Hiroaki Kuneida, “Development of 6-axis robotic arm controller implemented on a low-cost
microcontroller”, IEEE 6th International conference on Electrical Engineering / Electronics, Computer, Telecommunications and
Information Technology, Thailand, 2009, pp.328 – 331.
5. Ankur Bhargava, Anjani Kumar, “Arduino Controlled Robotic Arm”, IEEE International Conference on Electronics, Communication
and Aerospace Technology, India, 2017, pp. 376 – 380.
6. Chien-Wei Chen, Rui-Ming Hong, Hung-Yu Wang, “Design of a Controlled Robotic Arm”, IEEE International Conference on Green
Technology and Sustainable Development, Taiwan, 2016, pp. 22 - 23.
7. Pronadeep Bora, Vishwajit Nandi, “Low cost shadow function based articulated robotic arm”, IEEE International Conference of
Energy, Power and Environment: Towards Sustainable Growth, India, 2015, pp. 1 - 4.
8. Anupama Kaushik, Himanshu Gupta, Digvijay Singh Latwal, “Impact of feature selection and engineering in the classification
handwritten text”, IEEE International Conference Computing for Sustainable Global Development, India, 2016, pp. 2598 – 2601.
9. K.Lavanya, Shaurya Bajaj, Prateek Tank, Shashwat Jain, “Handwritten digit recognition using hoeffding tree, decision tree and random
forests – A Comparative Approach”, IEEE International Conference on Computational Intelligence and Data Science, India, 2017,
DOI: 10.1109/ICCIDS.2017.8272641.
10. Mahmoud M.Abu Gosh, Ashraf Y.A.Maghari, “A Comparative study on handwriting Digit Recognition using Neural Networks”, IEEE
International Conference on Promising Electronic Technologies, Palestine, 2017, pp. 77 – 81.
11. Matthew Y.W. Teow, “Understanding Convolutional Neural Networks using minimal model for handwritten digit recognition” IEEE
International conference on Automatic control and Intelligent Systems, Malaysia, 2017, pp. 167 – 172.
12. Shyla Afroge, Boshir Ahmed, Firoz Mahmud, “Optical Character Recognition using back propagation neural network”, IEEE
International Conference on Electrical, Computer and Telecommunication Engineering, Bangladesh, 2016, pp. 1 - 4.
13. Tianmei Guo, Jiwen Dong, Henjian Li, Yunxing Gao, “Simple Convolutional Neural Network on image classification”, IEEE
International Conference on Big Data Analysis, China, 2017, pp. 721 – 724.
14. Yan Yin, JunMin Wu, HuanXin Zheng, “Ncfm: Accurate handwritten digits recognition using Convolutional Neural Networks”, IEEE
International Joint Conference on Neural Networks, Canada, 2016, pp. 525 – 531.
15. Mohamed Iqbal.M, Subatra.B, Kokila.M, Anjali M Nair, Jeshna Parveen.M, “Validation of Digital Simulation using Artificial Neural
Network”, International Journal of Industrial Electronics and Electrical Engineering, 3(8), 2015, pp.113-116.
16. P.Ramesh, Dr.C.Sharmeela, “Nine Level MLI fed Single phase Induction Motor Drive with Compressor Load using Artificial Neural
Network”, Journal of Electrical Engineering, 17,(2), 2017, pp.247-254.
17. Saad Albawi, Tareq Abed Mohammed, Saad Al-Zawi, “Understanding of a Convolutional Neural Networks” IEEE Internatioal
Conference on Engineering and Technology, Turkey, 2017, pp. 1 - 6.
Authors: Ritika Jani, Nirav Bhatt, Chandni Shah

Paper Title: Handling Concept Drift in Data Stream Classification


Abstract: Data Streams are having huge volume and it can-not be stored permanently in the memory for
processing. In this paper we would be mainly focusing on issues in data stream, the major factors which are
affecting the accuracy of classifier like imbalance class and Concept Drift. The drift in Data Stream mining
refers to the change in data. Such as Class imbalance problem notifies that the samples are in the classes are not
equal. In our research work we are trying to identify the change (Drift) in data, we are trying to detect Imbalance
class and noise from changed data. And According to the type of drift we are applying the algorithms and trying
to make the stream more balance and noise free to improve classifier’s accuracy.

Keywords: Data Stream mining, classification, semi supervised learning, concept drift.

92. References:

1. Lara Lusa, Rok Blagus,"The class-imbalance problem for high-dimentional class prediction", 11th International Conference on 548-551
Machine Learning and Application.2012
2. Joao Gama, Indre Zliobaite,Albert Bifet,Mykola Pechenizky,Abdelhamid Bouchachia,"A syrvey on Concept Drift
Adaption",ACM,2014.
3. Radhika Kotecha, Sanjay Garg,"Data Streams and Privacy: Two Emeging Issues in Data Classification", 5th Nirma University
International Conference on Engineering, 2015.
4. Fabricio Breve, Liang Zhao, "practical Competition and Cooperation in Networks for Semi-Supervised Learning with Conceept Drift",
World Congress on Computational intelligence, IEEE, 2012.
5. Rukshan Batuwita, Vasile Palade,"Class Imbalance Learning Methods for Support Vector Machines" Singapore-MIT Alliance for
Research and Technology Centre; University of Oxford, 2012.
6. Archana Purwar, Sandeep Kumar Singh,"Issuess in Data mining: A comprehensive survey", International Conference on Coputational
Intelligence and Computing research, IEEE, 2014.
7. Rukshan Batuwita, Vasile Palade, "Class Imbalance Learning Methods for Support Vector Machines", Singapore-MIT Alliance for
Research and Technology Centre; University of Oxford, 2012
8. Xinjian Guo, Yilong Yin, Cailing Dong, Gongping Yang, Guangtong Zhou,"On the Class Imbalace Problem", Fourth International
Conference on Natural Computation,IEEE,2008.
9. Manuel Baena-Garcia, Jose del Campo-Avila, Raul Fidalgo, Albeert Bifet, Richard Gavalda , Rafael Morales-Bueno,"Early Drift
Detection Method", Spain
10. Xiaoye WANG, Bingjie CHEN, Fie CHANG, “A Classification Algorithm for Noisy Data Streams with Concept-Drifting”, Journal of
Computational Information Systems, 2011.
11. Petr Kosina,”Data Stream Mining and Concept Drift: Novel Approaches and Applications”. 2010.
12. Rok Blagus, Lara Lusa, Evaluation of SMOTE for high-dimensional class-imbalanced microarray data. IEEE, 2012.
13. T.Ryan Hoens, Robi Polikar, Nitesh V. Chawla,"Learning from streaming data with concept drift and imbalance: an overwiew",
Springer, 2012.
14. Pedro Domingoes, Geoff Hulten,"Catching up with the data: Research Issues in Mining Data Stream”, University of Washington.

Authors: C John Moses, D Selvathi

Paper Title: FPGA Implementation of Adaptive Multiplier-Based Linear Image Interpolation


Abstract: This work provides an image interpolation for multimedia applications by utilizing an adaptive
multiplier-based stepwise linear interpolation with clam filter. Image interpolation is also termed as image up-
scaling. Generally, while enlarging an image some vacant bit positions are introduced and due to this empty
pixel positions, the quality of the image is decreased. Therefore to maintain the quality of the image, new pixels
are introduced and those pixels are used to fill the vacant bit positions by using interpolation techniques. In the
adaptive interpolation techniques, edge pixels are identified and filtered at prior to the interpolation process. This
will improve the quality of the interpolated image. However, the adaptive interpolation scheme increases the
complexity of the system. To reduce the complexity, this work uses low complexity stepwise linear interpolation
and to maintain the quality it uses multiplier-based linear stepwise (MBLSI) and edge enhancement technique.
The experimental results demonstrate that the complexity of the proposed work is less as compared with other
related work as well as the quality is also maintained. The proposed work utilizes 275 LUTs to provide the
average peak signal to noise ratio (PSNR) of 20.44 dB and structural similarity index (SSIM) as 0.8250. This
proposed work increases the PSNR by 0.89 dB from the conventional multiplier-based stepwise linear
interpolation. Further the proposed interpolation algorithm utilizes less number of resources in field
programmable gate array (FPGA) by comparing with other related interpolation techniques.

Keywords: Up-scaling, Resolution, PSNR, LUT, Edge-detection.

References:

1. Y. Zhang, Q. Fan, F. Bao, Y. Liu and C. Zhang, “Single-image super-resolution based on Rational Fractal Interpolation”, IEEE
Transactions on Image Processing, vol. 7, no. 8, Auguest 2018, pp. 3782-3797.
2. BB. Zhong, K.K. Ma and Z. Lu, “Predictor-corrector image interpolation”, Journal of Visual Communication Image Representation,
Elsevier, vol. 61, 2019, pp. 50-60.
3. HH. Lim, Y. Kim, j. Kim, Y. Jung and S. Lee, “Low-cost high-speed interpolation method to minimize jagged artifacts on mobile
devices”, IEEE 2018, DOI: 10.1109/TCE.2018.2811258, pp. 1-6.
4. SS. Abbas, M.Z,.Hussian and M. Irshad, “Image Interpolation by Rational Ball Cubic B-spline Representation and Genetic Algorithm:,
93. Alexandria Engineering Journal, Elsevier, , 2017, DOI: dx.doi.org/10.1016/j.aej.2017.01.004, pp. 1-7.
5. CC. J. Moses, D. Selvathi and G.S.E. Queen, “Area Efficient Lagrange Image Up-scaling Architecture for Multimedia Applications”,
IEEE International Conference on Signal Processing and Communication, July 2017, pp. 201-205.
6. CC. J. Moses, D. Selvathi and V.M.A. Sophia, “VLSI Architectures for Image Interpolation: A Survey”, VLSI Design, Hindawi 552-557
Publication Corporation, Vol. 2014, no. 872501, 2014, pp. 1-10.
7. CC. J. Moses, D. Selvathi, “VLSI Architectures of an Area-efficient Image Interpolation”, International Journal of Engineering and
Technology”, vol. 6, no. 2, 2014, pp. 1120-1131.
8. SShih-Lun Chen, “VLSI Implementation of an Adaptive Edge Enhanced Image Scalar for Real Time Multimedia Applications” IEEE
Transactions on circuits and systems for video technology,vol.23, no.9, September 2013, pp.1510-1522
9. Jan Fischer, Ondrej Pribula “Precise Sub pixel Position Measurement with Linear Interpolation of CMOS Sensor Image Data” IEEE
International Conference on Intelligent Data Acquisition and Advanced Computing Systems, 2011 pp 500-504.
10. Sheila S. Hemami and Robert M. Gray” Image Reconstruction Using Vector Quantized Linear Interpolation” IEEE Information
Systems Laboratory, Stanford University, 1994 pp. 629-632.
11. Hagai Kirshner, Aurelien Bourquard, John Paul Ward, and Michael Unser “ Linear Interpolation of Biomedical Images using a Data-
Adaptive Kernel”, IEEE 10th International Symposium on Biomedical Imaging, 2013, pp 938-941.
12. Giovanni Ramponi, “Warped Distance for Space-Variant Linear Image Interpolation” IEEE Transactions on image processing, vol. 8,
no. 5, May 1999, pp 629-639.
13. Thierry Blu, Philippe Thevenaz and Michael Unser, “Linear Interpolation Revitalized” IEEE Transactions on image processing, vol.
13, no. 5, May 2004, pp .710-719.
14. CChung-chi Lin, Ming-hwa Sheu, Chishyan Liaw and Huann-keng Chiang, “Fast First-order Polynomial Convolution Interpolation for
Real-time Digital Image Reconstruction”, IEEE Transaction Circuits and Systems for Video Technology, vol. 20, no. 9, 2010, pp.
1260-1264.
15. Chung-chi Lin, Chishyan Liaw and Ching-tsomg Tsai, “A Piecewise Linear Convolution Interpolation with Third-order Approximation
for Real-time Image Processing”, 2010, pp. 3632-3637
16. Chao-Lieh Chen, and Chien-Hao Lai, ”Iterative Linear Interpolation Based on Fuzzy Gradient Model for Low-Cost VLSI
Implementation” IEEE Transactions on very large scale integration (VLSI) systems, vol. 22, no. 7, July 2014, pp. 1526-1538.
17. Ikram E. Abdou and Kwan Y. Wong, “Analysis of Linear Interpolation Schemes for Bi-Level Image Applications” IEEE IBM Journal
of Research and Development, vol. 26, no. 6, November 1982, pp- 667-680.
18. Bin Yan, Shao-Zi Li, Song-Zhi Su,”Shape Context with Bilinear Interpolation”, IEEE 2nd International Conference on Signal
Processing Systems, 2010 pp. 442-446.
19. Fuqiang Wang, Bin Wu, Hongying Zhang and Hongwei Liu,”Image Zoom Method based on Bandelet Transform Modified Bilinear
Interpolation”, IEEE International Conference on Computational and Information Sciences, 2011, pp.121-124.
20. Yang Sa, “Improved Bilinear Interpolation Method for Image Fast Processing”, IEEE International Conference on Intelligent
Computation Technology and Automation, 2014, PP.308-312.
21. Joohyeok Kim and Jechang Jeong, “A New Adaptive Linear Interpolation Algorithm Using Pattern Weight Based on Inverse Gradient”
IEEE First International Conference on Advances in Multimedia, 2009 pp 58-61.
22. Chung-chi Lin, Ming-hwa Sheu, Huann-keng Chiang, Zeng-chuan Wu, Jia-yi Tu, and Chia-hung Chen, “A Low-cost VLSI Design
of Extended Linear Interpolation for Real Time Digital Image Processing”, IEEE International Conference on Embedded Software and
Systems, 2008 PP .196-202.
23. ZZhenshen Qu, Yang Yang, Rui Wang, ”Linear Interpolation With Edge-Preserving Adaptive Weights”, IEEE International Congress
on Image and Signal Processing, 2013, pp. 506-510.
24. PPetr Hurtik and Nicolas Madrid, ”Bilinear Interpolation over Fuzzified Images: Enlargement”, IEEE International conference on
Fuzzy Systems, 2015, pp. 1-8.
25. Shih-Lun Chen,”VLSI Implementation of a Low-Cost High-Quality Image Scaling Processor”, IEEE Transactions on circuits and
systems-II: Express Briefs, vol.60, no.1, January 2013, pp.31-35.
26. Chung-Hsun Huang and Chao-Yang Chang, ”An area and power Efficient Adder-Based Stepwise Linear Interpolation for Digital
Signal Processing”, IEEE Transactions on Consumer Electronics, vol.62, no.1, February 2016, pp. 69-75.
27. K.T. Gribbon and D.G. Bailey, ”A Novel Approach to Real-time Bilinear Interpolation”, IEEE International Workshop on Electronic
Design, Test and Applications, 2004, pp. 126-131.
28. DDurlav Sonowal, Manabendra Bhuyan, “Linearizing Thermistor Characteristics by Piecewise Linear Interpolation in Real Time
FPGA” IEEE International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2013 pp. 1976-1980.
29. CC. J. Moses, D. Selvathi, “FPGA Implementation of an Area-efficient Adaptive Edge-based Image Interpolation”, Asian Journal of
Research in Social Sciences and Humanities, vol.6, no. 6, June 2016, pp. 623-642.
30. CC. J. Moses, “Adaptive Adder-based Stepwise Linear Interpolation”, Journal of Emerging Technologies and Innovative Research, vo.
5, no. 10, Oct 2018, pp. 231-238.
31. JJooseung Lee and In-Cheol Park, “High-performance Low-area Video Up-scaling Architecture for 4K UHD Video”, IEEE
Transactions on Circuits and Systems, vol. 64, no. 4, 2017, pp. 437-441.
32. CC. J. Moses, D. Selvathi, G. S. E. Queen, “Area-efficient Lagrange Image Up-scaling Architecture for Multimedia Applications”,
IEEE International Conference on Signal Processing and Communication, July 2017, pp. 201-205.
33. CC.J. Moses and D. Selvathi, “An Area-efficient First-order Polynomial Convolution Interpolation for Visual Communication
Systems”, IIOAB Journal, Special Issue: Energy, Environment and Engineering, vol. 7, no. 11, Dec 2016, pp. 186-193.
34. SS. L. Chen, H.Y. Huang and C.H. Luo, “A Low-cost High-quality Adaptive Scalar for Real-time Multimedia Applications”, IEEE
Transactions on Circuits System Video Technology, vol. 21, no. 11, Nov. 2011, pp. 1600-1611.
35. CC. J. Moses, D. Selvathi and G. S. E. Queen, “High-performance Adder-based Stepwise Linear Interpolation”, DJ Journal of
Advances in Electronics and Communication Engineering, vol. 4, no. 1, 2018, pp. 16-23.

Authors: Tarana Afrin Chandel, Mohd Yusuf Yasin, Md Arifuddin Mallick


Modeling and Simulation of Photovoltaic Cell using Single Diode Solar Cell and Double Diode
Paper Title:
Solar Cell Model
Abstract: Modeling and simulation of photovoltaic cells or PV cell is becoming important as it provides an
easy platform to perform studies on photovoltaic cells and the design and analysis of the system based on
photovoltaic cells. In this paper, we present our study of the ordinary photovoltaic module on the basis of one
diode and two diode models. Studies are extended to solar cells as solar cells are similar to photodiodes.
Performance of the solar cells may be described in terms of ideality factor (α), which decreases with temperature
and is observed to affect the performance of the PV cell. PV systems exhibit better performance with diodes
having higher values for α. In this paper, our efforts are to study the effects of α on Current and Power versus
Voltage characteristics of the solar cells. MATLAB simulation of solar cell systems is a simple and elegant
mechanism useful for designing and modeling the framework of the solar power plant.

Keywords: I-V and P-V Curve, Modeling, Matlab/Simulink Software, Simulation, Solar PV Cell, Solar Cell
Model.

References:

1. K.Mohan et al, Modeling and Simulation of Solar PV Cell With Matlab/Simulink And Its Experimental Verification, Journal of
Innovative Research and Solution, Print ISSN: 2320 1932 / Online ISSN – 2348 3636 Volume No: 1, Issue No.1. Page No: 118 -124,
JUL – DEC: 2014
2. Tarek Selmi et al, Analysis and Investigation of a Two-Diode Solar Cell Using MATLAB/Simulink, International Journal Of
Renewable Energy Research, Vol.4, No.1, 2014.
94. 3. T. Ahmad et al. Comparative Analysis between Single Diode and Double Diode Model of PV Cell: Concentrate Different Parameters
Effect on Its Efficiency Journal of Power and Energy Engineering, 2016, pp 31-46
4. Ekpenyong et al, Effect of Shading on Photovoltaic Cell, IOSR Journal of Electrical and Electronics Engineering, Nov. - Dec. 2013, 558-565
01-06
5. Tarana Afrin Chandel et al, Performance of Partially Shaded Solar Photovoltaic System, International Journal of Recent Technology
and Engineering, Volume-7 Issue-6, March 2019, ISSN: 2277-3878 (Online), pp 1444-1449
6. Mr. G. Venkateswarlu1 et al ,SIMSCAPE MODEL OF PHOTOVOLTAIC CELL, International Journal of Advanced Research in
Electrical, Electronics and Instrumentation Engineering, Vol. 2, Issue 5, May 2013, ISSN (Online): 2278 – 8875
7. M. R. AlRashidi et al Parameters Estimation of Double Diode Solar Cell Model, World Academy of Science, Engineering and
Technology International Journal of Electrical and Computer Engineering Vol:7, No:2, 2013
8. Afshin Izadian, Arash Pourtaherian, and Sarasadat Motahari Basic Model and Governing Equation of Solar Cells used in Power and
Control Applications, 978-1-4673-0803-8/12/$31.00 ©2012 IEEE
9. Al Tarabsheh et al, Description of the ideality factor of a-Si:H photovoltaic cells under different illumination intensity levels, Journal
Of Renewable And Sustainable Energy 7, 023119 (2015)
10. E. L. Meyer, Extraction of Saturation Current and Ideality Factor from Measuring Voc and Isc of Photovoltaic Modules, nternational
Journal of Photoenerg, Volume 2017, Article ID 8479487, 9 pages
11. Leiping Duan, Haimang Yi, Relationship Between the Diode Ideality Factor and the Carrier Recombination Resistance in Organic
Solar Cells, IEEE JOURNAL OF PHOTOVOLTAICS
12. Dominique Bonkoungou, Zacharie Koalaga, Donatien Njomo, Modelling and Simulation of photovoltaic module considering single-
diode equivalent circuit model in MATLAB, International Journal of Emerging Technology and Advanced Engineering ISSN 2250-
2459, Volume 3, Issue 3, March 2013.
13. Jitendra Bikaneria, Surya Prakash Joshi, A.R.Joshi “Modeling and Simulation of PV Cell using One-diode Model” International
Journal of Scientifics and Research Publications, Vol. 3, Issue 10, October 2013
14. Jitendra Bikaneria, Surya Prakash Joshi, A.R.Joshi “Modeling and Simulation of PV Cell using One-diode Model” International
Journal of Scientifics and Research Publications, Vol. 3, Issue 10, October 2013
15. Martina De Laurentis Optical Measurement Techniques of Recombination Lifetime Based on the Free Carriers Absorption Effect,
Hindawi Publishing Corporation, Journal of Solid State Physics, Volume 2014, Article ID 291469, 19 pages
16. Serm Murmson, from the University of Chicago https://sciencing.com/output-watts-solar-panels-6946.html
17. Abdulkader, A.S.Samosir and A.H.M.Yatim‖Modeling and Simulation based approach of photovoltaic system in simulink model‖
ARPN Journal of engineering and Applied Sciences‖ vol.7,N0.5, May 2012
18. Kavita singh Singh, Tarana Afrin Chandel et al, Effect of Bypass diode under partial shading in SPV module, International Journal of
Engineering and Advance Technology, ISSN: 2249-8958, vol-8 issue 5, June 2019
19. Ami Shukla, Modeling and Simulation of Solar PV Module on MATLAB/Simulink, International Journal of Innovative Research in
Science, Engineering and Technology, Vol. 4, Issue 1, January 2015
20. Tarak Salmi, Mounir Bouzguenda, Adel Gastli, Ahmed Masmoudi “MATLAB/Simulink Based Modeling of Solar Photovoltaic Cell”
International Journal of Renewable Energy Research, Vol. 2, No. 2, 2012
21. Vivek Tamrakar1 ,S.C. Gupta2 andYashwant Sawle3 “Single-Diode And Two-Diode Pv Cell Modeling Using Matlab For Studying
Characteristics Of Solar Cell Under Varying Conditions” Electrical & Computer Engineering: An International Journal (ECIJ) Volume
4, Number 2, June 2015
22. Kavita singh Singh, Tarana Afrin Chandel et al, Effect of Bypass diode under partial shading in SPV module: A Review,
International Journal of Recent Technology and Engineering, ISSN: 2277-3878 , Volume-8 Issue-1, May 2019, pp 700- 704
23. Vivek Tamrakar, Single-Diode And Two-Diode Pv Cell Modeling Using Matlab For Studying Characteristics Of Solar Cell Under
Varying Conditions, Electrical & Computer Engineering: An International Journal (ECIJ) Volume 4, Number 2, June 2015
24. Gui-tian GONG, Study of the Influence of the Diode Ideality Factor on the Si Solar Cell, Current Trends in Computer Science and
Mechanical Automation Vol.2.

Authors: Shubham Sonawane, Shanmughasundaram R

Paper Title: ChatBot for College Website


Abstract: In any service-providing organization, it is necessary to answer current or future customer’s
questions for their information and for maintaining good relationship with the customers. These organizations
usually have call centers with hundreds and thousands of employees to give replies to customers through chat
(i.e. text) or phone calls. These kind of traditional systems need large number of employees which eventually
increases the overall expenditure and manpower requirement of that organization. This paper is aimed at
minimizing the manpower requirement i.e. decreasing the number of employees by implementing a chat service.
This concept of chatbot has been proposed for implementation in College Website that will automatically reply
to the queries of stakeholders like students, parents, etc. without any human interaction. For implementation of
chatbot sequence to sequence model is used which is a deep neural network.

Keywords: Deep learning, Long-short term memory (LSTM), Recurrent neural network (RNN).

References:

1. M. Mohammadi, A. Al-Fuqaha, S. Sorour and M. Guizani, "Deep Learning for IoT Big Data and Streaming Analytics: A Survey,"
in IEEE Communications Surveys & Tutorials, vol. 20, no. 4, pp. 2923-2960, Fourthquarter 2018.
doi: 10.1109/COMST.2018.2844341
95. 2. A. Luckow, M. Cook, N. Ashcraft, E. Weill, E. Djerekarov and B. Vorster, "Deep learning in the automotive industry: Applications
and tools," 2016 IEEE International Conference on Big Data (Big Data), Washington, DC, 2016, pp. 3759-3768.
doi: 10.1109/BigData.2016.7841045 566-569
3. Xiyang Song, Huangwei Fang, Xiong Jiao and Ying Wang, "Autonomous mobile robot navigation using machine learning," 2012
IEEE 6th International Conference on Information and Automation for Sustainability, Beijing, 2012, pp. 135-140.
doi: 10.1109/ICIAFS.2012.6419894
4. I. Zelic, I. Kononenko, N. Lavrac and V. Vuga, "Diagnosis of sport injuries with machine learning: explanation of induced decisions,"
Proceedings of Computer Based Medical Systems, Maribor, amritaSlovenia, 1997, pp. 195-199. doi: 10.1109/CBMS.1997.596433
5. B. Setiaji and F. W. Wibowo, "Chatbot Using a Knowledge in Database: Human-to-Machine Conversation Modeling," 2016 7th
International Conference on Intelligent Systems, Modelling and Simulation (ISMS), Bangkok, 2016, pp. 72-77.
doi: 10.1109/ISMS.2016.53
6. H. N. Io and C. B. Lee, "Chatbots and conversational agents: A bibliometric analysis," 2017 IEEE International Conference on
Industrial Engineering and Engineering Management (IEEM), Singapore, 2017, pp. 215-219.
doi: 10.1109/IEEM.2017.8289883
7. Yu Wang, "A new concept using LSTM Neural Networks for dynamic system identification," 2017 American Control Conference
(ACC), Seattle, WA, 2017, pp. 5324-5329.
doi: 10.23919/ACC.2017.7963782
8. J. Kim, J. Kim, H. L. T. Thu and H. Kim, "Long Short Term Memory Recurrent Neural Network Classifier for Intrusion
Detection," 2016 International Conference on Platform Technology and Service (PlatCon), Jeju, 2016, pp. 1-5.
doi: 10.1109/PlatCon.2016.7456805
9. M, Akumar, and Dr. Soman K. P., “Amrita_CEN at SemEval-2016 : Complex Word identification using word embeddings”, in
International Workshop on Semantic Evaluation (SemEval 2016), 2016, 2016.
10. R. Vinayakumar, K. P. Soman and P. Poornachandran, "Long short-term memory based operation log anomaly detection," 2017
International Conference on Advances in Computing, Communications and Informatics (ICACCI), Udupi, 2017, pp. 236-242. doi:
10.1109/ICACCI.2017.8125846.

Authors: Neeraj Gondu Bhalerao, S.N Varma


Assurance of Efficiency and Environmental Improvement in a Cement Plant by using Hypothesis
Paper Title:
(Special Reference to Cement Industry in Satna District, M.P)
Abstract: Cement industries are continuously growing from the past few decades and are constantly trying to
improve the efficiency and trying to reduce bad emissions. Major technological enhancements in systems,
processes and equipment design of cement plants are helping to enhance the productivity as well as reducing the
96. emissions. From the literature review, it was found that efforts in enhancing efficiency help in reducing harmful
emissions and thus reduce the awful impact on the environment. More the investments in energy-efficient
technologies more would be a contribution to protecting the environment. This paper tries to analyze the 570-574
technological improvements in the cement industry, cost-saving methods without affecting productivity and its
impact on the environment. We analyzed energy-saving methods statistically by framing hypothesis. Hypothesis
testing was done by one way ANOVA (Analysis of Variance) method and results found that there is a significant
impact of energy-saving on cost, efficiency, and environment. Our conclusion suggests that the industry should
constantly work towards improvements and invest in energy-saving methods by which they would help in
making the environment better. This will leads to the direct and indirect positive effect on health and workforce
and it will also lead to the productivity of industry and progress of the country.

Keywords: Cement industry; Efficiency improvement; Environment impact; Energy saving methods; ANOVA
analysis.

References:

1. IBEF, 2019, Indian cement industry analysis 2019 Available at https/www.ibef.orgindustrycement-presentation


2. Morrow, W. R., Hasanbeigi, A., Sathaye, J., & Xu, T. “Assessment of energy efficiency improvement and CO2 emission reduction
potentials in India’s cement and iron & steel industries.” Journal of Cleaner Production, 65, 131–141.
doi:10.1016/j.jclepro.2013.07.022, 2014
3. GOI, Ministry of MSME, Brief Industrial Profile of Satna District Madhya pradesh. Available at http://dcmsme.gov.in/dips/District
Industrial Profile Satna.pdf
4. GOI,2009, Technical EIA Guidance manual for cement industry, Ministry of environment and forest, Government of India, Available
at http://www.indiaenvironmentportal.org.in/files/Cement.pdf
5. S.P. Deolalkar. Designing Green Cement Plants (book) Available at
https://www.sciencedirect.com/book/9780128034200/designing-green-cement-plants
6. Madlool, N. A., Saidur, R., Rahim, N. A., & Kamalisarvestani, M. “An overview of energy savings measures for cement industries.”
Renewable and Sustainable Energy Reviews, 19, 18–29. doi:10.1016/j.rser.2012.10.046, 2013
7. Zhang, S., Ren, H., Zhou, W., Yu, Y., & Chen, C. “Assessing air pollution abatement co-benefits of energy efficiency improvement in
cement industry: A city level analysis.” Journal of Cleaner Production, 185, 761–771. doi:10.1016/j.jclepro.2018.02.293, 2018
8. Altun, O. “Energy and cement quality optimization of a cement grinding circuit.” Advanced Powder Technology, 29(7), 1713–1723.
doi:10.1016/j.apt.2018.04.006, 2018
9. Zhang, S., Worrell, E., & Crijns-Graus, W. “Cutting air Pollution by Improving Energy Efficiency of China’s Cement Industry.”
Energy Procedia, 83, 10–20. doi:10.1016/j.egypro.2015.12.191, 2015
10. Ing. Miroslav Stajanča, doc. RNDr. Adriana Eštokova, PhD, “Environmental Impacts of Cement Production.”
http://ena.lp.edu.ua/bitstream/ntb/16692/1/55-Stajanca-296-302.pdf
11. Impact of cement industry on environment, Available at https://www.researchgate.net/publication/323029097 Impacts of Cement
Industry on Environment - An Overview.

Authors: Ashwani Kumar, V. M. Mishra, Rakesh Ranjan


Some findings of Hybrid Sustainable Energy System for Standalone and Grid Connected
Paper Title:
Operation: Types, Storage Options, Trends for Research and Control Strategies
Abstract: This article presents some critical findings of various issue concerning to HSES like types, storage,
trends for research and control strategies of HSES. Various interconnection techniques for HSES are presented.
It has been made a short review of Mathematical model for renewable energy sources. Conclusion and result of
control strategies work of HSES, Storage techniques of HSES for energy flow management is presented. Finally,
it has been made a summary of the future analysis, challenges in techniques and improvements of HSES based
power generation techniques for Isolated and grid connected applications.

Keywords: Sustainable energy, hybrid power system, Modeling control strategies.


References:

1. Nizar Aawar and Rahman, Arkadan, ‘Optimal Control Strategy for Hybrid Electric Vehicle Power train’ IEEE JEST in
PowerElectronics, Vol. 03, June 2015.
2. P.K.Goel et al. Fellow, Isolated Wind Hydro Hybrid System Using Cage Generators and Battery Storage IEEE transactions on
industrial electronics, vol. 58, no. 4, April 2011.
3. Cheng-Wei Chen et al. IEEE ‘ Modeling and Controller Design of a Semi isolated Multi input Converter for a Hybrid PV/Wind Power
Charger System’ IEEE transactions on power electronics, vol. 30, no. 9, sep 2015.
4. H.C. Chiang et al. ‘Design and Implementation of a hybrid regenerative power system combining grid–tie and uninterruptible power
97. supply functions’ IET Renew. Power Gen., 2010, Vol. 4, Issue. 1, pp. 85–99.
5. Md. Ibrahim et al. ‘ A Review of Hybrid Renewable Energy Systems for Electric Power Generation’ Journal of Engineering Research
and Applications ISSN: 2248-9622, Vol. 5, Issue 8, August 2015, pp.42-48.
6. Dada Delimustafic, Jasmina Islambegovic, Abdulah ‘Model of a Hybrid Renewable Energy System: Control’, SED 1081-1086 IEEE. 575-580
7. K K Prajapat, Abhishek Katariya Simulation and Testing of Photovoltaic with Grid Connected System 2011 IEEE International
Conference on Computational Intelligence and Communication Systems.
8. Chunhua Liu, Member, IEEE, K. T. Chau, Senior Member, IEEE, and Xiaodong Zhang, Student Member, IEEE ‘An Efficient Wind–
Photovoltaic Hybrid Generation System Using Doubly Excited Permanent-Magnet Brushless Machine’ IEEE transactions on IE, vol. 57,
no. 3, march 2010.
9. Swati Negi et al. ‘ Hybrid Renewable Energy System’: A Review International Journal of Electronic and Electrical Engineering. ISSN
0974-2174, Volume 7, Number 5 (2014), pp. 535-542.
10. Anurag Chauhan, R.P. Saini ‘ A review on Integrated Renewable Energy System based power generation for stand-alone applications:
Configurations, storage options, sizing methodologies and control’ RSER 38 (2014) 99–120.
11. J.M. Lee* and B.H. Cho* PSSC Strategy for Fuel Cell Hybrid Vehicle, 2008 IEEE.
12. Jing Shi, et al ‘ The Application of Active Superconducting DC Fault Current Limiter in Hybrid AC/DC Power Supply Systems’ IEEE
transactions on superconductivity, vol. 18, no. 2, june 2008.
13. Fengge Zhang et al. ‘Simulation Research on Wind Solar Hybrid Power System Based on Fuzzy-PID Control’ Proceeding of ICEMS
2007, Oct. 8~11, Seoul, Korea.
14. Swati Negi and Lini Mathew HRES: A Review IJEEE. ISSN 0974-2174, Volume 7, Number 5 (2014), pp. 535-542.
15. Badoud, M. Khemliche ‘Modelling. design and control of wind diesel hybrid power system using bond graph’ 2013 IEEE.
16. T. Aboul et al. Utilization of the Modulated Power Filter Compensator Scheme for a Grid Connected Rural Hybrid Wind/Tidal Energy
Conversion Scheme 2010 IEEE EP&EC.
17. P.K.Ray et al. Dynamic Modeling and Control of Renewable Energy Based Hybrid System for Large Band Wind Speed Variation 2015
IEEE.
18. Md. Maruf et al. ‘Dynamic Modeling and Simulation of a Remote Wind Diesel-Hydrogen Hybrid Power System’ 2010 IEEE EP&E
Conference.
19. Chunhua et al. IEEE ‘An Efficient Wind–Photovoltaic Hybrid Generation System Using Doubly Excited Permanent-Magnet Brushless
Machine’ IEEE transactions on IE, vol. 57, no. 3, march 2010.
20. Jing et al. ‘The Application of Active Superconducting DC Fault Current Limiter in Hybrid AC/DC Power Supply Systems’ IEEE
transactions on AS , vol. 18, no. 2, june 2008.
21. Xiaoyu Wang and Meng Yue ‘Modeling and Control System Design for an Integrated Solar Generation and Energy Storage System
with a Ride-through Capability’ 2012 IEEE.
22. Puneet Goel et al. Senior Member IEEE Modeling and Control of Autonomous Wind Energy Conversion System with Doubly Fed
Induction Generator2012 IEEE.
23. Vigneshwaran Rajasekarani et al. ‘Maximum Power Point Tracking and Frequency Control for Hybrid Wind Diesel System Supplying
an Isolated Load’ 978-1-4673 2012 IEEE.
24. Fezzani et al. ‘MATLAB-Based Modeling of Shading Effects in Photovoltaic arrays’ ICS&T Automatic control & computer
engineering December 21-23, 2014.
25. A.V. et al. ‘Implementation of MPPT Control Using Fuzzy Logic in Solar-Wind Hybrid Power System’ 978-1-4799/15/2015 IEEE.
26. Nishad Mendis et al. ‘Operation of a Wind-Diesel- Battery based Hybrid Remote Area Power Supply System’ 6th ICECE 2010, 18-20
December 2010, IEEE.
27. A. Andrijanovits et al. ‘Comparative Review of Long-Term Energy Storage Technologies for Renewable Energy Systems
ELEKTROTECHNIK AISSN 1392 12152012. No. 2(118).
28. Ajai Gupta et al. Modelling of hybrid energy system Part I: Problem formulation and model development Renewable Energy 36 (2011)
Elsevier.
29. Jing Zhao et al. ‘Research on the Torque and Back EMF Performance of a High Speed PMSM Used for Flywheel Energy Storage
Energies 2015, 8, 2867-2888 ISSN 1996-1073.
30. Hussein Ibrahim et al. ‘Comparison and Analysis of Different Energy Storage Techniques Based on their Performance Index 2007
IEEE.
31. M.A. Guerrero, E. Romero, Overview of Medium Scale Energy Storage Systems Power Electronics & Electric Systems, School of
Industrial Engineering.
32. A.M.Shiddiq Yunus ‘Overview of Storage Energy Systems for Renewable Energy System Application’ 3rd (MICEEI 2012), Nov 28-
Dec 2012.
33. Michelle Lim, Mohit Chhabra Frequency Variations in Hybrid Renewable Energy Network with Integrated Storage, Wide-Area
Monitoring, Control & Protection2011 IEEE.
34. Paul Denholm et al. ‘The Role of Energy Storage with Renewable Electricity Generation’ Technical Report NREL/TP-6A2-47187
January 2010.
35. B. Ould. Bilal Methodology to Size an Optimal Stand-Alone PV/wind/diesel/battery System Minimizing the Levelized cost of Energy
and the CO2 Emissions ICAEE 2011: 27-28 December 2011, Bangkok, Thailand.
36. Randa Kallel et al. ‘Control Management Strategy of Stand-Alone Hybrid Power Micro-System using Super-Capacitor’ IJRER, Vol.4,
No.1, 2014.
37. Madaci Mansour ‘Case Study of a Solar Pumped Storage Prototype Station Implementation Designed for the Region of Ghardia IJRER,
Vol.6, No.2, 2016.
38. Whei-Min et al.‘Neural-Network-Based MPPT Control of a Stand-Alone Hybrid Power Generation System’ IEEE transactions on PE,
vol. 26, no. 12, December 2011.
39. XIE Chang-jun and QUAN Shu-hai ‘Control Strategy of Hybrid Power System for Fuel Cell Electric Vehicle based on Neural
Network’ Optimization Proceedings of the IEEE September 2008.
40. A.Hajizadeh et al. ‘Fuzzy neural control of a hybrid fuel cell/ baery distributed power generation system’ IET Renewable Power
Generation March 2008.
41. Taekwon Kim et al.‘A Smoothing Method for Wind Power Fluctuation Using Hybrid Energy Storage’, Korea 978-1-4799- 7949-
3/15/2015 IEEE.
42. A.V. Pavan Kumar et al. ‘Implementation of MPPT Control Using Fuzzy Logic in Solar-Wind Hybrid Power System” 978-15/2015-
IEEE.
43. Sanjoy Debbarma et al. ‘Frequency Control of Autonomous Hybrid Power System using Smart Controllable Load”, Shillong India
ISBN: 978−81−925974−3−0/2015.
44. Sukhwinder Singh et al. ‘Robust Load Frequency Control of Micro Grids Connected with Main Grids in a Regulated and Deregulated
Environment” 978-1-4799-4040-0/14/2014 IEEE.
45. Arash Jamehbozorg et al. ‘A Robust Control Approach to Smooth Output Power of Wind Units Using Hybrid Storage Systems
Considering State of Charge” 978-1-4799-3656-4/14/2014 IEEE.
46. Swati Rawat et al. ‘Load Frequency Control of a Hybrid Renewable Power System with Fuel Cell System” 978-1-4799-6042-2/14/2014
IEEE.
47. T.Praveen Kumar et al. ‘Unit Power Control and Feeder Flow Control Strategies for a Grid-Connected Hybrid System” 2013 (ICPEC),
978-1-4673-6030-2/13/2013 IEEE.
48. S.Srinivas et al. ‘Integration of PV/Battery Hybrid Energy Conversion System to the Grid with Power Quality Improvement Features
IEEE 2013 8th ICEEV.
49. Abderrezzak Bouharchouche EI Madjid Ghennam Berkouk Tarrak “Renewable Energies Control and Energy Management of a Grid
Connected Hybrid Energy System PV’ l 978-1-4673-5271-0/13/2013 IEEE.
50. S K Sinha et al “Four Area Load Frequency Control of Interconnected Hydro- thermal Power System by Intelligent PID Control
Technique” 978-1-4673-0455-9/12/2012 IEEE.
51. Meena Tushir et al. ‘Application of a Hybrid Controller in Load Frequency Control of Hydro-Thermal Power System’ 978 -1-4673-
0766-6/12/2012 IEEE.
52. Mousa et al. ‘Frequency Control of Isolated Wind and Diesel Hybrid Micro Grid Power System by Using Fuzzy Logic Controllers and
PID Controllers” 978-1-4673-0378-1/11/2011 IEEE.
53. R.Dhanalakshmi et al. “Application Of Multi Stage Fuzzy Logic Control For Load Frequency Control Of An Isolated Wind Diesel
Hybrid Power System” 978-1-4673- 0178-7/11/2011 IEEE.
54. T. R. Mtshali et al. ‘Simulation and Modelling of PV-Wind-Battery Hybrid Power System” 978-1-4577-1002-5/11/2011 IEEE 2010
IEEE International Energy Conference.
55. Nishad Mendis et al. “Application of a Hybrid Energy Storage in a Remote Area Power Supply System” 978-1-4244-9380-7/10/2010
IEEE.
56. Nishad Mendis et al.‘ Operation of a “Wind-Diesel-Battery based Hybrid Remote Area Power Supply System” 6th ICECE2010,18-20
December 2010, Dhaka, 978-1-4244-6279-7/10/2010 IEEE.
57. David Hern et al. ‘Robust Optimal Control Strategies for a Hybrid Fuel Cell Power Management System” 978-1- 4244-5226-2/10/2010
IEEE.
58. Puneet Goel et al ‘Autonomous Hybrid System Using SCIG for Hydro Power Generation and Variable Speed PMSG for Wind Power
Generation’ PEDS2009.
59. Gerard Robert et al. ‘Optimal Design of Reactive Power PI Regulator for Hydro Power Plants’ 17th IEEE ICCA September 3-5,
2008978-1-4244-2223-4/08/2008 IEEE.
60. G. Robert et al. ‘Robust Digital Automatic Reactive Power Regulator for Hydro Power Plants”, 1-4244-0632-3/07/2007 IEEE.

Authors: Rajesh N, Sajimon Abraham, Shyni S Das

Paper Title: Anonymization and Publication of Trajectories by Sensitive Halting points Generalization
Abstract: The profuse use of wireless and GPS enriched mobile devices has left spatio-temporal trajectory
traces in an enormous scale. The researchers and mobility management people are keen to extract and make use
of the published mobility traces for their own developmental activities. The spatio-temporal traces publication is
definitely a major privacy encroachment for the individuals/objects, especially for VVIPs. The publication of
trajectory details urges us for a privacy preserved anonymization approach. The observation was the trajectory
consists of halts and passes and anonymizing the sensitive halting points is adequate enough for the trajectory
anonymization. This paper suggests a different approach, which derives the major halting points from the
trajectories and anonymizes them by using the personalized generalization technique. The prototype referred to
here safeguards the major sensitive halting points in an area zone, the size of which is specified by the user. This
work uses Haversine measure for the spatial distance instead of Euclidean measure, since the former takes into
account the spherical shape of the earth and gives an exact distance from sensitive to non-sensitive points. For
the evaluation, the model mentioned here utilizes the real world dataset and the outcome proves that, the
published trajectory has lesser information loss and greater privacy than the anonymity methods that exists now
and it can be used safely for mobility related applications and developments.

98. Keywords: Location based system, Published trajectory, Sensitive halting points, Spatio-temporal trajectory.
581-587
References:

1. Kong, X., Li, M., Ma, K., Tian, K., Wang, M., Ning, Z., & Xia, F., Big Trajectory Data: A Survey of Applications and Services. IEEE
Access, 6, 2018, pp. 58295-58306.
2. Sweeney, L., Achieving k-anonymity privacy protection using generalization and suppression. International Journal of uncertainty,
fuzziness and knowledge-based systems, 10(5), 2002, pp. 571-588.
3. Huo, Z., Meng, X., Hu, H., Huang, Y.: You can walk alone: Trajectory privacy preserving through significant stays protection.
DASFAA 2012, Part 1, LNCS 7238, Springer-Verlag Berlin Heidelberg, 2012, pp. 351-366.
4. Poulis, G., Skiadopoulos, S., Loukides, G., Gkoulalas-Divanis, A., Apriori-based algorithms for km- anonymizing trajectory data.
Transactions on data privacy, 7:2, 2014, pp. 165-194.
5. Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-diversity: Privacy beyond k- anonymity. TKDD, 2007, 1(1).
6. Li, N., Li, T., Venkatasubramanian, S., t-closeness: Privacy beyond k-anonymity and l-diversity. In ICDE, 2007, pp. 106-115.
7. Xiao, X., Tao, Y.: Personalized Privacy Preservation. In ACM SIGMOD, 2006, pp. 229-240.
8. Zheng, Y., Zhang, L., Xie, X., Ma, W.: Mining interesting locations and travel sequences from GPS trajectories. In: 18th International
conference on World Wide Web, ACM press, New York, 2009, pp.791-800.
9. Gramaglia, M., Fiore, M., Tarable, A., Banchs, A. : k t, є anonymity: Towards Privacy-Preserving Publishing of Spatiotemporal
Trajectory Data, 2017, https://arxiv.org/abs/:1701.02243 [cs.CY].
10. Microsoft Research Geolife,Date-of-access:21/05/2018 Available: http://research.microsoft.com/en-us/projects/geolife/.
11. Haversine distance, Available:http://www.ryanduell.com/2012/12/determining-the-distance-between-two-geographic-points/

Authors: Diksha Pandey, Manvendra, Anil Kumar

Paper Title: Security Based Neighbour Selection for Vehicular Ad-Hoc Networks
Abstract: This Research work acquaint with algorithms Security Based Neighbor Selection. In Security
based neighbor selection vehicles with authentic Id can take part in the network. Disseminating messages in an
open access environment makes a real security and privacy challenges in VANETs. For using the application of
VANET effectively the Quality of service and security should be maintained. In this piece of work Security
Based Neighbor Selection technique is used to enhance the QoS and safety applications in VANETs by
providing unique ID to the vehicles so that the secure transmission of messages takes place. This technique is
proposed to maintain the security and QoS and to accomplish the aim of reliable information exchange. By using
NS-3 simulator we accomplished that our proposed technique shows an enhancements regarding awareness in
safety and upgrades QoS metrics in VANETs.

Keywords: VANETs, QoS, Security level, Neighbour Selection.

References:
99. 1. L.W. Chen and H.W. Shih “Design and analysis of an infrastructure less framework for lane positioning, tracking, and requesting
through vehicular sensor networks,” IEEE Communications Letters, vol. 20, no. 10, pp. 2083–2086, Oct 2016.
2. A. Ghosh, V. V. Paranthaman, G. Mapp, O. Gemikonakli, and J. Loo, “Enabling seamless v2i communications: toward developing 588-591
cooperative automotive applications in vanet systems,” IEEE Communications Magazine, vol. 53, no. 12, pp. 80–86, 2015.
3. K. Liu, J. K. Y. Ng, V. C. S. Lee, S. H. Son, and I. Stojmenovic, “Cooperative data scheduling in hybrid vehicular ad hoc networks:
Vanet as a software defined network,” IEEE/ACM Transactions on Networking, vol. 24, no. 3, pp. 1759–1773, June 2016.
4. Muhammad Awais Javed, Sherali Zeadally and Zara Hamid “Trust Based Security Adaptation Mechanism For Vehicular Sensor
Networks” Computer Networks.
5. F. Qu, Z. Wu, F. Wang, and W. Cho, “A security and privacy review of VANETs,” IEEE Transactions on Intelligent Transportation
Systems, vol. 16, no. 6, pp. 2985–2996, Dec 2015.
6. .M. A. Javed, E. B. Hamida, and W. Znaidi, “Security in intelligent transport systems for smart cities: From theory to practice.” Sensors,
vol. 16, no. 6, p. 879, July 2016.
7. 7. F. Qu, Z. Wu, F. Wang, and W. Cho, “A security and privacy review of VANETs,” Proc. IEEE Transactions on Intelligent
Transportation Systems, vol. 16, no. 6, pp.2985-2996, Dec 2015.
8. 8.Sangil Choi and Gangman Yi “Asymmetric Block Design-Based Neighbor Discovery Protocol in Sensor Networks”.
9. McGlynn, M.J.; Borbash, S.A. Birthday protocols for low energy deployment and flexible neighbor discovery in Ad Hoc wireless
networks. In Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing, Long Beach, CA,
USA, 4–5 October 2001; pp. 137–145.
10. Kandhalu, A. Lakshmanan, K. Rajkumar, R. U-connect: A low-latency energy-efficient asynchronous neighbor discovery protocol. In
Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks, Stockholm, Sweden, 12–15
April 2010; pp. 350–361.
11. Ranbir Singh and Kulwinder Singh Mann “Efficient Time Slot Allocation to Minimize Collision in TDMA Based VANETs” Journal of
Network Communications and Emerging Technologies (JNCET) Volume 7, Issue 12, December (2017).
12. W. Cho, “Hybrid MAC scheme for vehicular communications,” International Journal of distributed Sensor Networks, vol. 2013.
13. F. Yu and S. Biswas, "A Self-Organizing MAC Protocol for DSRC based Vehicular Ad Hoc Networks," Distributed Computing
Systems Workshops, 2007. ICDCSW '07. 27th International Conference on, Toronto, Ont., 2007, pp. 88-88.

Authors: Mantasha Haseeb, Ashok. A


A Link Distribution Algorithm with Efficient Relay Node Optimization for Congestion Control in
Paper Title:
Urban Vanets
Abstract: This research work develops a new algorithm i.e. Link distribution algorithm and efficient link
distribution algorithm. A Link distribution algorithm is the distribution of the link to the nodes so that
communication between the nodes takes place in case of any link failure whereas efficient link distribution
algorithm is distribution of the packets to the nodes which has high transmission power. The technique used in
Link distribution algorithm (LDA) is link establishment whenever there is any link failure happen we apply this
concept which is LDA whereas the technique used in efficient link distribution algorithm (ELDA) is relay node
selection the relay node is selected based upon the received signal strength ratio (RSSI) value and which node is
having high RSSI value that node we allocate the link. The above algorithms can be applied wherever there is
high congestion on the road due to the high congestion link failure will happen and due to the link failure
emergency event occurs. Results of model achieved in a realistic state of affairs validate our theoretical
deliberation and confirm the efficiency and the efficacy of our protocol by screening significant expansion in
terms of busy ratio, collision rate, deviation, local density and transmission power compared to previous scheme
ETSI DCC. The work has been successfully done with the help open source network simulator NS3.

Keywords: Adhoc Networks, Vanets, Congestion Control, Link Distribution Algorithm, Efficient Link
Distribution Algorithm.
100.
References: 592-596
1. S. Al-Sultan, M. Moath, Al-Doori, H. Al-Bayatti Ali, H. Zedan, A comprehensive survey on vehicular ad hoc network, J. Netw.
Comput. Appl. (2014), in press.
2. R. S. Bali, N. Kumar, and J. J. P. C. Rodrigues, “Clustering in vehicular ad hoc networks: taxonomy, challenges and solutions,”
Vehicular Communications, vol. 1, no. 3, pp. 134–152, 2014.
3. Z. Niu, W. Yao, Q. Ni, and Y. Song,“ Link reliability model for vehicle ad hoc networks,” in Proceedings of the London
Communication Symposium, pp. 1–4, London, UK, 2006.
4. C. Cooper, D. Franklin, M. Ros, F. Safaei, and M. Abolhasan, “A comparative survey of VANET clustering techniques,” IEEE
Communications Surveys & Tutorials, vol.99,p.1,2017.
5. X. Ji , H. Yu , G. Fan , H. Sun, and L. Chen,” Efficient and Reliable Cluster-Based Data Transmission for Vehicular Ad Hoc
Networks,” Hindawi, Mobile Information Systems ,2018.
6. J. Jeong, S. Guo, Y. Gu, T. He, and D. H. C. Du, “Trajectory based data forwarding for light-traffic vehicular ad hoc networks,” IEEE
Transactions on Parallel & Distributed Systems, vol. 22, no. 5, pp. 743–757, 2011.
7. T. Song, W. Xia, T. Song, and L. Shen, “A cluster-based directional routing protocol in VANET,” in Proceedings of the IEEE
International Conference on Communication Technology, pp. 1172–1175, Jinan, China, September 2011.
8. IEEE Standard for Information Technology—Local and Metropolitan Area Networks—Specific Requirements—Part 11: Wireless
LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 6: Wireless Access in Vehicular
Environments, IEEE Standard 802.11p-2010, 2010.
9. R. Dube, C. D. Rais, K. Wang and S. K. Tripathi, “Signal Stability Based Adaptive Routing for Ad-Hoc mobile networks”, IEEE
Personal Communications, Feb 1997.
10. The Network Simulator: NS2, 2015, http://www.isi.edu/ nsnam/ns/.
11. SUMO: Simulation of Urban Mobility, 2015, http://sumo. sourceforge.net.

Authors: Prachi Pandey, Neelesh Agrawal, Mukesh Kumar, Navendu Nitin, Anil Kumar

Paper Title: L-Shaped Monopole Antenna with Modified Partial Ground Plane for Multiband Operation
Abstract: In this paper a design of L-shaped monopole antenna (LMA) with modified partial ground plane for
multiband operation is presented. The `dimension of proposed antenna is 40× 47 mm2 with 1.6 height using
Teflon substrate having dielectric constant 2.1. The ground plane is amended by inserting an anti-symmetric
horizontal L-slots. Single band to multiband behaviour is accomplished by applying two horizontal L-slots on
partial ground plane of LMA. Both the slots are antisymmetric to Y-axis. The parametric study has also been
done which is responsible for antenna behaviour. The operating frequency bands of designed antenna are 2.35-
2.91GHz,3.24-3.51GHz ,4.31-5.30GHz and 5.90-6.31GHz which is suitable for Bluetooth (2.4GHZ),WLAN
(2.4GHz,5.2GHz), WiMAX (2.3GHz, 2.5GHz, 3.5GHz, 5.2GHz), C-band (4-8GHz) and S-DMB (2.6GHz)
101. applications. By using the HFSS simulator we accomplished that our designed antenna show an enhancement of
bandwidth and good matching impedance.
597-602
Keywords: LMA, PARTIAL GROUND PLANE, MULTIBAND, L-SLOTS, WLAN, Wi-MAX.

References:

1. H.D. Chen, J.S. Chen and Y.T. Cheng” Modified inverted-L monopole antenna for 2.4/5GHz dual-band operations” Electronics Letters,
Vol. 39, No. 22, October 2003.
2. Z.H. Li, T.M. Xiang, SONG S. Xian” Study On Dual-Frequency Planar Monopole Antennas” IEEE International Symposium on
Microwave, Antenna, Propagation and EMC Technologies for Wireless Communications Proceedings,2005
3. G.H. Kim and T.Y. Yun “Compact UWB Monopole Antenna With an Inverted-L-Shaped Coupled Strip” IEEE Antennas And Wireless
Propagation Letters, Vol.12 ,2013.
4. N. Chang and J.H. Jiang” Meandered T-Shaped Monopole Antenna” IEEE Transactions On Antennas And Propagation, Vol. 57, No.
12, December 2009.
5. S.B. Chen, Y.C. Jiao, W. Wang, and F.S. Zhang” Modified T-Shaped Planar Monopole Antennas for Multiband Operation” IEEE
Transactions On Microwave Theory And Techniques, Vol. 54, No. 8, August 2006.
6. C.Y. Huang and P.Y. Chiu” Dual-Band Monopole Antenna With Shorted Parasitic Element” Electronics Letters Vol. 41 No. 21, 13th
October 2005.
7. H. Wang “Dual-resonance monopole antenna with tuning stubs” IEE Proc.-Microw. Antennas Propag., Vol. 153, No. 4, August 2006.
8. X.R., Steven Gao and Y.Z Yin “Compact Tri-Band Monopole Antenna With Hybrid Strips For Wlan/Wimax Applications” Microwave
And Optical Technology Letters / Vol. 57, No. 1, January 2015.
9. Y.S. Li and W.H. Yu “A Miniaturized Triple Band Monopole Antenna for WLAN and WiMAX Applications” Hindawi Publishing
Corporation International Journal of Antennas and Propagation Volume 2015, Article ID 146780, 5 pages,2015.
10. P.M. Paul, K. Moorthy K.M. S. Sharawi “A Tri-Band Slot Antenna Loaded With Split Ring Resonators” Microw Opt Technol Lett.
2017.
11. S.M.A. Nezhad and H.R. Hassani “A Novel Triband E-Shaped Printed Monopole Antenna for MIMO Application” IEEE Antennas
And Wireless Propagation Letters, Vol. 9, 2010.
12. T. Hong, S.X. Gong, Ying Liu and W. Jiang, “Monopole Antenna With Quasi-Fractal Slotted Ground Plane for Dual-Band
Applications” IEEE Antennas And Wireless Propagation Letters, Vol. 9, 2010.
13. C.H. Huang and E.Z. Yu “A Slot-Monopole Antenna for Dual-Band WLAN Applications “IEEE Antennas And Wireless Propagation
Letters, Vol. 10, 2011.
14. H. U. Iddi, M.R. Kamarudin, T.A. Rahman and R. Dewan “Design of Dual-Band B-shaped Monopole Antenna for MIMO Application”
IEEE 2012.
15. A.Kumar1 and P.V.Naidu” A Novel Compact Printed ACS Fed Dual-band Antenna for Bluetooth/WLAN/WiMAX Applications”
Progress In Electromagnetic Research Symposium (PIERS),2016.
16. M.Kumar, R. Saxena, J. A. Ansari, A .Singh, M. G. Siddiqui, A. K. Saroj, G. P. Singh “Analysis of Half Circular F Slot Multiband
Microstrip Antenna with Defected Ground Structure” Recent Advances on Engineering, Technology and Computational Sciences
(RAETCS) ,2018.
17. M.T. Tan and B.Z. Wang “A Dual-Band Circularly Polarized Planar Monopole Antenna For WLAN/Wi-Fi Applications” National
Natural Science Foundation Of China and the Specialized Research Fund for the Doctoral Program of Higher Education of China,2015.

Authors: Nidhi Gaur, Anu Mehra, Pradeep Kumar

Paper Title: FFT using Power Efficient Vedic Multiplier


Abstract: Modern communication systems rely on Digital Signal Processing (DSP) more than ever before.
Improving the speed of FFT computation using high speed multipliers will help to enhance the performance of
DSP systems. In this paper a DIT FFT architecture using high performance Modified Vedic multipliers is
proposed. Vedic Multipliers offer a more efficient way to perform multiplication on large numbers occupying
less area and consuming low power and delay The adders used in the Vedic multipliers are Brent Kung based
and multiplexer based adders. The right utilization of these adders at different word lengths helps to achieve an
architecture with minimal area and power. Comparative analysis of modified 24×24 Vedic Multiplier with
existing Vedic Multiplier shows the improvement in performance with respect to power and area. Proposed FFT
design is compared with existing designs for dynamic power consumption and an improvement of 46.93%
compared to Tsai’s FFT Design and 59.37% compared to Coelho’s FFT Design is achieved. The entire
architecture is implemented on Virtex 7 FPGA and simulated using Xilinx Vivado 2017.4.

Keywords: Digital Signal Processing (DSP), Decimation in Time , Fast Fourier Transform , Vedic Multipliers.

References:

1. Diego F. G. Coelho, Renato J. Cintra, Nilanka Rajapaksha, Gihan J. Mendis, Arjuna Madanayake, Vassil S. Dimitrov: ‘DFT
Computation Using Gauss-Eisenstein Basis: FFT Algorithms and VLSI Architectures’, IEEE Transactions on Computers, 2017, 66
(8), pp. 1442-1448, doi: 10.1109/TC.2017.2677427
2. J.W. Cooley, J.W. Tukey: ‘An algorithm for the machine calculation of complex Fourier series’, Mathematics of Computation, 1965,
102. 19 (90) pp. 297-301.
3. Yogita Bansal, Charu Madhu: ‘A novel high-speed approach for 16x16 Vedic Multiplication with compressor adders’ Computers and
Electrical Engineering, 2016, 49, pp39–49. 603-608
4. A.Ronisha Prakash & S.Kirubaveni: ‘Performance Evaluation of FFT Processor Using Conventional and Vedic Algorithm’, Proc.
International Conference Emerging Trends in Computing, Communication and Nanotechnology, 2013, pp.89 – 94.
5. P.-Y. Tsai, C.-W. Chen, and M.-Y. Huang: ‘Automatic IP generation of FFT/IFFT processors with word-length optimization for
MIMO-OFDM systems’, EURASIP Journal on Advances in Signal Processing, Jan. 2011, 2011, pp. 1–15, doi:10.1155/2011/136319.
6. S. Saponara, M. Rovini, L. Fanucci, A. Karachalios, G. Lentaris, and D. Reisis: ‘Design and comparison of FFT VLSI architectures
for SoC telecom applications with different flexibility, speed and complexity trade-offs’, Circuits, Systems, and Signal Processing,
2012, 31 (2), pp.627–649, DOI 10.1007/s00034-011-9332-
7. J. M. Rudagi, R. Lobo, P. Patil, N. Biraj and N. Nesaragi: ‘An efficient 64-point pipeline FFT engine’, Proc. IEEE ARTCC Conf.,
Kottayam, India, Oct. 2010, DOI: 10.1109/ARTCom.2010.31.
8. C. Yu, M. H. Yen, P. A. Hsiung, and S.-J. Chen: ‘A low-power 64-point pipeline FFT/IFFT processor for OFDM applications’, IEEE
Trans. Consumer Electron., Feb. 2011, 57 (1), pp. 40-45.
9. Sudha kiran G, brundavani p: ‘FPGA Implementation of 256-Bit, 64-Point DIT-FFT Using Radix-4 Algorithm’, International Journal
of Advanced Research in Computer Science and Software Engineering, September 2013, 3 (9), pp. 126-133.
10. Nagamani A N, Manish Nagaraj, Nikhil R, Vinod Kr. Agrawa: ‘Reversible Radix-4 Booth Multiplier for DSP Applications’ 2016
International Conference on Signal Processing and Communications (SPCOM), Bangalore, India, 12-15 June 2016,
doi: 10.1109/SPCOM.2016.7746687.
11. Asmitha Haveliya: ‘Design and Simulation Of 32-Point FFT Using Radix-2.Algorithm For FPGA Implementation’, 2012 Second
International Conference on Advanced Computing & Communication Technologies, Rohtak, Haryana, India, 7-8 Jan. 2012, pp. 167-
171, doi: 10.1109/ACCT.2012.43.
12. Avinash Kumar Singh, Ashutosh Nandi: ‘Design of Radix 2 Butterfly Structure using Vedic multiplier and CLA on Xilinx’,
Conference on Emerging Devices and Smart Systems (ICEDSS), Tiruchengode, India, March 2017.
13. Laxman P.Thakre, Suresh Balpande, Umesh Akare, Sudhir Lande: ‘Performance Evaluation and Synthesis of Multiplier used in FFT
operation using Conventional and Vedic algorithms’, Third International Conference on Emerging Trends in Engineering and
Technology (ICETET), Goa, India, Novemeber, 2010.
14. M.S Athira Menon, R.J Renjith: ‘Implementation of 24 bit high speed floating point Vedic multiplier’, International Conference
Networks and Advances in Computational Technologies (NetACT), Thiruvanthapuram, India, July 2017.
15. Swapnil Badar, D.R Dandekar: ‘High speed FFT processor design using radix −4 pipelined architecture’, International Conference on
Industrial Instrumentation and Control, May 2015.
16. Tapsi Gupta, Janki Ballabh Sharma: ‘A High-Speed Single-path Delay Feedback Pipeline FFT Processor using Vedic-Multiplier’,
International Conference on Information, Communication, Instrumentation and Control (ICICIC), Indore, India, August 2017.

Authors: U B Mahadevaswamy, Gurudutt M S

Paper Title: IoT Based Occupancy Detection using Wireless Controller in a Building/Workspace
Abstract: Occupancy of seats/chairs in places like cafeteria, occupancy in meeting room is a key factor in
offices having thousands of employees, it is often convenient to know the number of seats occupied in cafeteria
and availability of meeting room in IT companies before he/she visits. There is an IoT wave sweeping the
technology arena. Internet of Things (IoT) is the amalgamation of all physical nodes using internet as medium.
The nodes communicate with each other over internet and allows to control or get controlled by the click of a
button. Various sensor in the market can detect occupancy of the seat and the meeting room with low cost
systems. The objective of the present paper is to study number of people occupied the seats in cafeteria and
displayed occupied and unoccupied seats on web browser for user information, collecting those data for some
period and use the data to display seat occupancy at different points of time. The above objective is achieved
using shell scripts running on linux machine used to simulate the occupancy of chairs/seats in cafeteria and
occupancy of meeting rooms which is communicated to webserver via IoT.

Keywords: Shell scripts, IoT, webserver, occupancy sensor.


References:

1. J.W. NIU1,_*, X.H. ZHENG2,3, L. ZHANG1, S. Y. XU1, X. LI1, S. S. GUO1, S.T. DING2, Investigation of Ergonomics in Chinese
University Cafeterias’ Working Situation at Peak Hours Using Jack, Department of Logistics Engineering, University of Science and
103. Technology Beijing, Beijing, China, Institute of Chemical Defense of CPLA, Beijing, China and School of Biological Science and
Medical Engineering, Beijing University of Aeronautics and Astronautics, 2011 IEEE.
2. Iresha Pasquel Mohottige and Tim Moors, “Estimating Room Occupancy in a Smart Campus using WiFi Soft Sensors”, Sydney, 609-614
Australia, 2018 IEEE 43rd Conference on Local Computer Networks
3. Ryutaro Kobayashi and Pauline N, Kawamoto, “On the Development of Customizable Crowd Sensing System for Public Spaces using
IoT Cloud Services”, Shinshu university, Japan 2018 IEEE
4. Jaimin Patel and Gaurang Panchal, “An IoT-Based Portable Smart Meeting Space with Real-Time Room Occupancy”, Institute of
Technology, Changa, India, Springer Nature Singapore Pte. Ltd. 2018
5. Haolia Rahman, Hwataik Han, “Bayesian estimation of occupancy distribution in a multi-room office building based on CO2
concentrations”, Kookmin University, 77 Jeongneung-ro, Seongbuk-gu, Seoul. 136-702, R.O. Korea, Tsinghua University Press and
Springer-Verlag GmbH Germany 2017
6. Milica G. Kisic, Nelu V. Blaz, Kalman B. Babkovic, Ljiljana D. Zivanov, and Mirjana S. Damnjanovic “Detection of Seat Occupancy
Using a Wireless Inductive Sensor”, Faculty of Technical Sciences, University of Novi Sad, 21000 Novi Sad, Serbia, April 2017, VOL.
53, NO. 4
7. Pradeep Tomar, Gurjit Kaur and Prabhjot Singh, , “A Prototype of IoT-Based Real Time Smart Street Parking System for Smart
Cities”, Springer International Publishing AG 2018
8. Afrooz Ebadat, Giulio Bottegal, Damiano Varagnolo, Bo Wahlberg, Karl H. Johansson, “Regularized Deconvolution-Based
Approaches for Estimating Room Occupancies”, IEEE Transactions on Automation Science and Engineering, Vol. 12, No. 4, October
2015
9. Manuel Alvarez-Campana, Gregorio López, Enrique Vázquez, Víctor A. Villagrá and Julio Berrocal, “Smart CEI Moncloa: An IoT-
based Platform for People Flow and Environmental Monitoring on a Smart University Campus”, Madrid, Spain, December 2017
10. Boby George, Member, IEEE, Hubert Zangl, Member, IEEE, Thomas Bretterklieber, Member, IEEE, and Georg Brasseur, Fellow,
IEEE, “A Combined Inductive–Capacitive Proximity Sensor for Seat Occupancy Detection”, IEEE May 2010
11. Wireless access point, Nokia https://www.nokia.com/networks/solutions/smart-wi-fi/
12. Related to MQTT protocols information, mqtt.org
13. Mosquitto, an open source MQTT broker https://mosquitto.org/
14. Related to shell script reference link is https://www.tutorialspoint.com/unix/shell_scripting.htm

Authors: S K Toshniwal, A Prajapati, K Ray, M R Ahmad, B H Ahmad, P Singh, A Bandyopadhyay


Paper Title: A Compact UWB Antenna Design using Modified Ground Plane
Abstract: A compact rectangular MS antenna for Ultra Wide Band applications is designed. In the proposed
design the rectangular patch antenna designed with cutting a slot in ground of length and width 2.5mm and
3.0mm respectively at the back of feed line. By using the defective ground plane a wide BWof 9.782 GHz with
frequency band 3.099 GHz to 12.278 GHz is achieved. The designed antenna with a compressed size of 30 mm
x 30 mm is fabricated and tested. The antenna’s return loss and VSWR plots are presented here to confirm the
complete UWB bands. Special configuration of patch antenna with slotted partial ground was designed and
optimized using CST Microwave Studio.
104.
Keywords: Dual-band antenna, Defected Ground structure, VSWR and planar antenna. 615-618
References:

1. Kumar Toshniwal S., Ray K. (2014) A Technique to Minimize the Effect on Resonance Frequency Due to Fabrication Errors of MS
Antenna by Operating Dielectric Constant. In: Babu B. et al. (eds) Proceedings of the Second International Conference on Soft
Computing for Problem Solving (SocProS 2012), December 28-30, 2012. Advances in Intelligent Systems and Computing, vol 236.
Springer, New Delhi.
2. Sandeep Kumar Toshniwal, Somesh Sharma, Sanyog Rawat, Pushpendra Singh, Kanad Ray: Compact Design of Rectangular Patch
Antenna with Symmetrical U Slots on Partial Ground for UWB Applications. IBICA 2015: 535-542
3. Sandeep Toshniwal,TanushriMukherjee, Prashant Bijawat, Sanyog Rawat,Kanad Ray “Design and Analysis of Fabricated Rectangular
Microstrip Antenna with Defected Ground Structure for UWB Applications”International Conference on Soft Computing: Theories
and Applications Springer, New Delhi.
4. Preet Kaur, Rajiv Nehra, Manjeet Kadian, Dr. Asok De, Dr. S.K.Aggarwal, “Design Of Improved Performance Rectangular Microstrip
Patch Antenna Using Peacock And Star Shaped Dgs” International Journal of Electronics Signals and Systems (IJESS), ISSN: 2231 -
5969, Vol. -3, Iss. -2, 2013.
5. Vinay Sharma, Rajesh Kumar Vishwakarma. “Microstrip Antenna with Defected Ground Structure (DGS) for Multiband
Operation”Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing pp
879-888DOI: 10.1007/978-81-322-2638-3_99, 29 April 2016.
6. Reza Zaker, ChangizGhobadi, and JavedNourinia, “Bandwidth Enhancement of Novel Compact Single and Dual Band-Notched
Printed monopole Antenna with a Pair of L-Slotted Slots”.
7. Q. Wu, R. Jin, J. Geng, and M. ding, “Printed omni-Directional UWB monopole antenna with very compact size,” IEEE Trans.
Antenna propag., vol. 56, no. 3, pp. 896-899, Mar. 2008.

Authors: Yashaswi R , Naidila Sadashiv

Paper Title: Fault Tolerant Scheduling Methods in Cloud Based 5G Networks


Abstract: Cloud computing is one of the emerging technology in the field of business and also in the research
field. High performance and high efficiency for 5G systems can be provided by the cloud radio access
networks(C-RAN). There is also requirement of higher efficiency and also for the low latency for the 5G mobile
networks. Sometimes there is probability of entire system failure due to the fault in some part of the hardware or
the software. Hence by developing some of the fault tolerant methods these kind of issues can be avoided. Fault
tolerance methods can also increase the use of cloud based services. The main idea of fault tolerant scheduling
methods is to involve redundancy , so that all the tasks can be performed even when the system fails. But this
may cause overhead for the cloud service providers. Hence various scheduling algorithms can be used to
overcome this problem. In this paper, the different kinds of fault tolerant scheduling algorithms are discussed.
Hence the suitable methods can be used according to the requirement of the user. This should also lead to
increase in the efficiency, performance of the tasks and avoid the system failure in case of minute faults in the
system.

Keywords: Fault tolerance, Redundancy, Cloud computing, Quality-of-service.

References:

1. J.P.Srivatava,Vijay Kumar Verma,"Cloud compuitng in libraries. Its needs ,applications, issues and best practices",2015
2. Abdulkareem Abulrahman Kadhim,"5G and Next Generation Networks,"2018.
3. Poonam V.Kapse, R.C.Dharmik,"An effective approach of creation of virtual machine in cloud computing," 2017
4. J.Angela Jennifa Sujana, J.Soniya, "Dynamic Fault Tolerant Scheduling Mechanism for Real Time Tasks in Cloud Computing,"
International conference on Electrical, Electronics, and optimization techniques,2016.
5. Y. Ding, G. Yao, and K. Hao, “Fault-tolerant elastic scheduling algorithm for workflow in cloud systems,” Inf. Sci., vol. 393, pp. 47–65,
Jul 2017.
6. Pengze Guo, Zhi Xue,"Cost-Effective Fault-Tolerant Scheduling Algorithm for Real-Time Tasks in Cloud Systems,"17th IEEE
International Conference on Communication Technology,2017.
7. P. Guo and Z. Xue, “QoS-aware fault-tolerant rate-monotonic first-fit scheduling in real-time systems,” in IEEE 2nd Inf. Technol.
105. Networking, Electron. Autom. Control Conf., Dec 2017, pp. 311–315.
8. Ming Liu, Pengze guo, Jun Wu,"Energy -Efficient Fault-Tolerant Scheduling Algorithm for Real-Time Tasks in Cloud-Based 5G
Networks",2018. 619-623
9. K. Wang and Y. Cen, “Real-time partitioned scheduling in Cloud-RAN with hard deadline constraint,” in 2017 IEEE Wirel. Commun.
Netw. Conf., Mar 2017, pp. 1–6.
10. L. Zhang, K. Wang, D. Xuan, and K. Yang, “Optimal task allocation in near-far computing enhanced C-RAN for wireless big data
processing,” IEEE Wirel. Commun., vol. 25, no. 1, pp. 50–55, Feb 2018.
11. P. Guo and Z. Xue, “Real-time fault-tolerant scheduling algorithm with rearrangement in cloud systems,” in IEEE 2nd Inf. Technol.
Networking, Electron. Autom. Control Conf., Dec 2017, pp. 399–402.
12. Y. Li,M. Chen, W. Dai, and M. Qiu, “Energy optimization with dynamic task scheduling mobile cloud
computing,”IEEESyst.J.,vol.11,no.1,pp. 96–105, Mar 2015.
13. S. Wang, K. Li, J. Mei, G. Xiao, and K. Li, “A reliability-aware task scheduling algorithm based on replication on heterogeneous
computing systems,” J. Grid Comput., vol. 15, no. 1, pp. 23–39, Mar 2017.
14. J. Wang, W. Bao, X. Zhu, L. T. Yang, and Y. Xiang, “FESTAL: Fault tolerant elastic scheduling algorithm for real-time tasks in
virtualized clouds,” IEEE Trans. Comput., vol. 64, no. 9, pp. 2545–2558, Sep 2015.
15. X. Zhu, J. Wang, H. Guo, D. Zhu, L. T. Yang, and L. Liu, “Fault tolerant scheduling for real-time scientific workflows with elastic
resource provisioning in virtualized clouds,” IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 12, pp. 3501–3517, Dec 2016.
16. Liu Huai, Huang Jianxin, " A Fault-Tolerant Scheduling Algorithm for Distributed Control System with Possible Hardware and
Software Faults," 28th Chinese Control and Decision Conference (CCDC), 2016.
17. Haoran Han and Weidong Bao and Xiaomin Zhu and Xiaosheng Feng, " An Learning-based Fault-Tolerant Model for Realtime
Applications on Clouds," 2016.
18. Haoran Han, Weidong Bao, Xiaomin Zhu ," Fault-Tolerant Scheduling for Hybrid Real-Time Tasks Based on CPB Model in Cloud,"
2017
19. Talwana Jonathan Charity, Gu Chun Hua," Resource Reliability using Fault Tolerance in Cloud Computing," 2nd International
Conference on Next Generation Computing Technologies, 2016.
20. Wenyan Cui, Xiangru Meng, Yakun Zhang, and Zhiyuan Zhao," Survivability-aware Fault-tolerant Scheduling Using Primary-backup
Approach in Heterogeneous System," 2nd IEEE International Conference on Computer and Communications, 2016.
21. Arabi E. Keshk, Raed A. I. Alsini , Medhat A. Tawfeek "Adaptive Fault Tolerance for Online Tasks Scheduling in Cloud
Computing,"2018.
22. Kai Huang, Xiaowen Jiang, Xiameng Zhang, Rongjie Yan "Energy-efficient Fault tolerant Mapping and Scheduling on Heterogeneous
Multiprocessor Real-time systems, " volume 4, 2169-3536, 2018
23. 23. Marcel Neumann, Felix Wolf," Efficient Fault Tolerance through Dynamic Node Replacement," 2018
24. 24. Guangshun Yao, Yongsheng Ding, "Using imbalance characteristic for fault-tolerant workflow scheduling in Cloud systems", 2017
25. 25. Felix Muhlbauer, Lukas Schroder, Mario Scholzel," A Fault Tolerant Dynamically Scheduled Processor with Partial Permanent
Fault Handling," IEEE, 2018.
Authors: D. M. Chandwadkar, Azmina Gayasuddin Maniyar, S. P. Ugale

Paper Title: Design of 2kW DC Charger for Two Wheelers


Abstract: The demand for Electric Vehicles is increasing day by day. EVs are silent, nonpolluting and produce
zero emissions. This paper presents the design of a dc charger that performs the necessary functions for
charging EV battery. An EV charger is a component in EV environment that supplies power for recharging the
EV battery. Usually, charging an electric car seems to be very simple process, implying that one can plug one’s
car into a charger that is connected to the electric grid. However, it is not as that simple. It depends on the types
of EVSE that one has deployed. Offboard DC Charger is connected to the premises wiring of the mains ac
supply network .It is designed to be separate and operate entirely off the vehicle. In the offboard dc charger,
direct current electrical power is delivered directly to the vehicle. The power module in a DC fast charger
consists of an AC-to-DC rectifier converter and an isolated DC/DC converter. The AC-to-DC rectifier is power
factor correction stage in which a Vienna Rectifier based PFC converter is used. The Isolated DC-DC Converter
used here is the Phase Shift Full Bridge DC-DC converter. A 2 kW prototype of the offboard DC Charger is
designed and simulated in MATLAB/Simulink R2018b.

Keywords: charger , emissions, isolated, offboard.

References:
106.
1. Bart Basille, Jayanth Rangaraju,“Which new semiconductor technologies will speed electric vehicle charging adoption?” , September
2017.
624-627
2. “Committee Report on Standardization of Public EV Chargers”, May 2017.
3. Xun Gong, Jayanth Rangaraju, “Taking charge of electric vehicles – both in the vehicle and on the grid”, March 2018.
4. “Power Electronics: Circuits, Devices and Applications”, Muhammad H. Rashid, Third Edition, 1989.
5. “Power Electronics: Converters, Applications and Design”, Ned Mohan, Tore M. Undeland and Willam P. Robbins, Third Edition, 2004.
6. Tariq, Aldawsari, “Design, Simulation and Implementation of Three- Phase Bidirectional DC-DC Dual Active Bridge Converter Using
SiC MOSFETs”, University of Arkansas, Fayetteville, Dec. 2014.
7. Intelligent Transportation System of the IEEE Vehicular Technology Society, IEEE Standard Technical Specifications of a DC Quick
Charger for Use with Electric Vehicles, Approved 3 September 2015.
8. C.Lin, H. Liu and C. Wang, “Design and Implementation of a Bi-directional Power Converter for Electric Bike with Charging Feature”,
5th IEEE Conference on Industrial Electronics and Applications,2010.
9. K. Hemasuk, S. Ngam, “ The Simplified Regenerative Boost Converter for Electric Vehicle Applications”,5th International Electrical
Engineering Congress, Pattaya, Thailand, 8-10 March 2017.
10. Joachim Skov Johansen, Fast-Charging Electric Vehicles using AC, Master Thesis, DTU Electrical Engineering, September 2013.
11. Gjelaj, Andersen, P. Bach et. al., Optimal Design of DC Fast-Charging Stations for EVs in Low Voltage Grids, IEEE Transportation
Electrification Conference (pp. 684-689),2017.
12. Finalized Draft, Electric Vehicle Conductive DC Charging System, Automotive Industry Standard , AIS138(Part 2)/DF, May 2017.
13. International Electrotechnical Commission (2011), IEC releases final draft standards for EV charging, Oct. 2011.
14. R. P. Nagamani, K. Sabitha, “Operation and Designing of Bidirectional DC-DC Converter for Hybrid Electric Vehicle”,IJITECH,
Vol.04, Issue-03, March 2016.
15. Kavitha R., Radhamani R., “Multi Input Bidirectional DC-DC Converter for Hybrid Electric Vehicle Application”, IJIRSET, Vol. 5,
Issue 2, February 2016.

Authors: S.P.Ugale, Monali Tukaram Mandlik, D.M.Chandwadkar

Paper Title: Graphical User Interface for Electric Vehicle Charging Station
Abstract: Electric vehicles are increasing day by day because of its low battery cost and good battery capacity
compared to other technology. Increasing automotive growth in electric vehicles also increases the automation to
use it.Graphical User Interface for electric vehicles with a full-blown touch screen will become more easy to use
with the introduction of fast charging stations. The approach shown to build HMI use Texas Instruments kit and
CCS software. The TM4C123GH6PM processors provide scalability it also provides different processing speeds
along with the software which is compatible with hardware to build low and high end applications, and provides
connectivity with various peripherals required for Electric Vehicle System Equipment HMI e.g. UART and
CAN. Along with this processor touch screen display K350QVGA (Texas Instruments) is used to test the output
screen.

107. Keywords: Human Machine Interface, Code Composer Studio, Texas Instruments.

References: 628-632
1. Juan Liu,” Research and Implementation of Electric Vehicle Fast Charging Station Parking Guidance System based on Mobile
Terminal”, 2017 9th International Conference on Intelligent Human-Machine Systems and Cybernetics, 978-1-5386-3022-8/17 $31.00
© 2017 IEEE.
2. Nishu Patel, Ekata,” Low End Human Machine Interface (HMI) Display using ARM Cortex M4 Based Controller”, IJSTE -
International Journal of Science Technology & Engineering | Volume 1 |Issue 12 June 2015 ISSN (online): 2349-784X.
3. Petr CHLEBIS, Martin TVRDON, Ales HAVEL, Katerina BARESOVA, “Comparison of Standard and Fast Charging
Methods for Electric Vehicles,” Department of Electronics, Faculty of Electrical Engineering and Computer Science, VSB–Technical
University of Ostrava,Republic VOLUME: 12, NUMBER: 2 2014JUNE.
4. Chris Fill yaw, Jonathan Friedman, and Sameer M. Prabhu,”Creating Human Machine Interface (HMI) Based Tests within Model-Based
Design”, 2007-01-0780.
5. Marjan Gjelaj, Chresten Træholt, Seyedmostafa Hashemi, Peter Bach Andersen ,” Optimal Design of DC Fast-Charging Stations for
EVs in Low Voltage Grids”, Department of Electrical Engineering
Technical University of Denmark - Copenhagen, Denmark.
6. www.ti.com
7. www.phihong.com.tw.
8. https://in.mathworks.com/
9. http://www.masstechcontrols.com/
10. https://www.schneiderelectric.com.au/en/work/products/productlaunch/evlink-car-charging-station-for
electrivehicle/evlinkchargingstation

Authors: Pooja Malik, Mrudula Y, Anurag Singh Baghel


A Better Gauging Model for the Evaluation of Automatic Machine Translation of English – Hindi
Paper Title:
Language
Abstract: The problem of language translation has prevailed in society for so long. However, up to some
extent the problem is being reduced by the online available machine translation systems like Google, Bing,
Babelfish, etc. But with the emergence of these Machine Translation Systems, there arises the problem of their
validation. Can we trust on such translation systems blindly? Is there no scope of improvement? Are these
Machine Translation systems not prone to errors? The answer to all these questions is No. So, for this purpose,
we need a mechanism that can test or assess these Machine Translation systems. In this paper, we have proposed
an algorithm that will evaluate such Machine Translation systems. Our algorithm is being compared with a very
well-known BLEU algorithm that works very well for non-Indian languages. The accuracy of the designed
algorithm is evaluated using the standard datasets like Tides and EMILLE.

Keywords: Automatic Machine Translation Evaluation, Automatic Machine Translation Evaluation of


English-Hindi Language Pair, Automatic Evaluation Metrics for Machine Translation.

References:

1. A. Kalyani, H. Kumud, S. P. Singh, A. Kumar and H. Darbari, “Evaluation and Ranking of Machine Translated Output in Hindi
Language using Precision and Recall Oriented Metrics,” International Journal of Advanced Computer Research, vol. 4, no. 14, pp. 54-
59, March 2014.
2. K. Papineni, S. Roukos, T. Ward and W.-J. Zhu, “BLEU: a Method for Automatic Evaluation of Machine Translation,” Proceedings of
the 40th Annual Meeting of the Association for Computational Linguistics (ACL), Philadelphia, 2002.
3. S. Banerjee and A. Lavie, “METEOR: An Automatic Metric for MT Evaluation with Improved Correlation with Human Judgments,” in
Proceedings of the acl workshop on intrinsic and extrinsic evaluation measures for machine translation and/or summarization, 2005.
4. A. Kalyani, H. Kumud, S. P. Singh and A. Kumar, “Assessing the Quality of MT Systems for Hindi to English Translation,”
International Journal of Computer Applications, pp. 41-45, March 2014.
5. B. Chen and R. Kuhn, “AMBER: A Modified BLEU, Enhanced Ranking Metric,” Proceedings of the 6th Workshop on Statistical
Machine Translation, pp. 71-77, July 2011.
6. M. Pozar and E. Charniak, “Bllip: An Improved Evaluation Metric for Machine Translation,” Brown University Master Thesis, 2006.
7. H. S. Thompson, “Automatic Evaluation of Translation Quality: Outline of Methodology and Report on Pilot Experiment,” Proceedings
of the Evaluators’ Forum, pp. 215-223, April 1991.
8. Y. Shiwen, “Automatic evaluation of output quality for Machine Translation systems,” vol. 8, no. 1-2, pp. 117-126, March 1993.
9. C. Tillman, S. Vogel, H. Ney, A. Zubiaga and H. Sawaf, “Accelerated DP Based Search for Statistical Translation,” in Fifth European
108. Conference on Speech Communication and Technology, Eurospeech'97, Rhodes, Greece, 1997.
10. E. Vidal, “Finite-state speech-to-speech translation,” in IEEE International Conference on Acoustics, Speech, and Signal Processing,
Munich, Germany, 1997. 633-641
11. J. Giménez and L. Màrquez, “Linguistic features for automatic evaluation of heterogenous MT systems,” StatMT '07 Proceedings of the
Second Workshop on Statistical Machine Translation, pp. 256-264, June 2007.
12. M. Denkowski and A. Lavie, “METEOR-NEXT and the METEOR Paraphrase Tables: Improved Evaluation Support for Five Target
Languages,” in Proceedings of the Joint Fifth Workshop on Statistical Machine Translation and MetricsMATR, 2010.
13. C. Callison-Burch, M. Osborne and P. Koehn, “Re-evaluating the Role of BLEU in Machine Translation Research,” in 11th Conference
of the European Chapter of the Association for Computational Linguistics., 2006.
14. C.-Y. Lin and F. J. Och, “Automatic Evaluation of Machine Translation Quality Using Longest Common Subsequence and Skip-Bigram
Statistics,” in Proceedings of the 42nd Annual Meeting on Association for Computational Linguistics, 2004.
15. P.-S. Huang, X. He, J. Gao, L. Deng, A. Acero and L. Heck, “Learning deep structured semantic models for web search using
clickthrough data,” in Proceedings of the 22nd ACM international conference on Information & Knowledge Management, San
Francisco, California, USA, 2013.
16. B. Chen and C. Colin, “A Systematic Comparison of Smoothing Techniques for Sentence-Level BLEU,” in Proceedings of the Ninth
Workshop on Statistical Machine Translation, Baltimore, Maryland USA, 2014.
17. O. Karolina, “A novel dependency-based evaluation metric for Machine Translation,” Dublin, 2008.
18. X. Song, T. Cohn and L. Specia, “BLEU deconstructed: Designing a better MT evaluation metric,” International Journal of
Computational Linguistics and Applications, vol. 4, pp. 29-44, December 2013.
19. A. Smith, C. Hardmeier and J. Tiedemann, “Climbing Mount BLEU: The Strange World of Reachable High-BLEU Translations,” In
Baltic Journal of Modern Computing (BJMC), Special Issue: Proceedings of the 19th Annual Conference of the European Association
of Machine Translation (EAMT), vol. 4, 2016.
20. A. R, P. Bhattacharyya, S. Mukundan and R. M. Shah, “Some Issues in Automatic Evaluation of English-Hindi MT: More Blues for
BLEU,” in Natural Language Processing ICON, 2007.
21. G. Doddington, “Automatic evaluation of machine translation quality using n-gram co-occurrence statistics,” in Proceedings of the
second international conference on Human Language Technology Research, 2002.
22. I. D. Melamed, R. Green and J. P. Turian, “Precision and Recall of Machine Translation,” in Companion Volume of the Proceedings of
HLT-NAACL 2003-Short Papers, 2003.
23. J. P. Turian, L. Shen and I. D. Melamed, “Evaluation of machine translation and its evaluation,” in In Proceedings of the MT Summit
IX, New Orleans, USA, 2003.
24. C.-Y. Lin, “ROUGE: a Package for Automatic Evaluation of Summaries,” in Workshop on Text Summarization Branches Out, Post-
Conference Workshop of ACL 2004, Barcelona, Spain, 2004.
25. M. Snover, B. Dorr, R. Schwartz, L. Micciulla and J. Makhoul, “A study of translation edit rate with targeted human annotation,” in
Proceedings of the 7th Conference of the Association for Machine Translation in the Americas, Cambridge, 2006.
26. M. G. Snover, N. Madnani, B. Dorr and R. Schwartz, “TER-Plus: paraphrase, semantic, and alignment enhancements to Translation Edit
Rate,” Springer Science, vol. 23, no. 2-3, pp. 117-127, September 2009.
27. A. Lavie and A. Agarwal, “METEOR: An automatic metric for MT evaluation with high levels of correlation with human judgments,”
in Proceedings of the Second Workshop on Statistical Machine Translation. Association for Computational Linguistics, 2007.
28. M. Denkowski and A. Lavie, “Meteor 1.3: Automatic metric for reliable optimization and evaluation of machine translation systems,” in
Proceedings of the sixth workshop on statistical machine translation. Association for Computational Linguistics, 2011.
29. A. Lavie, “Evaluating the output of machine translation systems,” in AMTA Tutorial, 2010, p. 86.
30. M. Denkowski and A. Lavie, “Meteor Universal: Language Specific Translation Evaluation for Any Target Language,” in In
Proceedings of the ninth workshop on statistical machine translation, 2014.
31. L. V. Lita, M. Rogati and A. Lavie, “BLANC: Learning Evaluation Metrics for MT,” in Proceedings of Human Language Technology
Conference and Conference on Empirical Methods in Natural Language Processing (HLT/EMNLP), Vancouver, 2005.
32. P. Malik and A. S. Baghel, “A Summary and Comparative Study of Different Metrics for Machine Translation Evaluation,” in 8th
International Conference on Cloud Computing, Data Science & Engineering (Confluence), 2018.

Authors: Ketki C. Pathak, Jignesh N. Sarvaiya, Anand D. Darji


Modified Boundary Matching algorithm for Error detection and Error Concealment for Video
Paper Title:
Communication
Abstract: As the demand of video transmission over communication network has grown rapidly, the data
compression and error correction in video processing have shown significant improvement day by day. When
the error occurs in a single frame, the visual quality of the subsequent frames gets degraded due to error
propagation. Thus, the error control techniques are required for the recovery. Concealment of error at the
receiver (decoder) side feats the spatial and temporal characteristics of the frame. Without the requirement of the
extra bandwidth and retransmission delay, it enhances the quality of the reconstructed video. However, the
output of the error concealment may get affected if the error located before is misleading. Thus error detection
also plays an important role while reconstructing the video. However, the output of the error concealment may
get affected if the error located before is misleading. This paper proposes error detection and concealment
approach for the recovery of lost Macro Block (MB) in video. The spatio-temporal techniques has been used for
the error detection followed by the MB type decision applied for classifying the damaged macro block .For the
concealment method a new method i.e. Modified Spatio-Temporal Boundary Matching Algorithm (MSTBMA)
has been proposed. The proposed work is compared with various existing method for spatial and temporal error
concealment. The comparison has been done for various types of error such as block error (single, multiple),
burst error and random error generated by the software. Performance is improves in terms of PSNR and visual
quality by considering the type of lost MB.

Keywords: Macro block, Error Detection, Spatio-temporal error, Temporal Error detection, Error concealment,
Modified Boundary Matching algorithm.

References:

1. Jung, Y. H., Kim, Y. G., &Choe, Y : “Robust error concealment algorithm using iterative weighted boundary matching criterion”, IEEE,
Vol. 3, pp. 384-387, (2000).
2. Kim, Eung Tae, Seung-Jong Choi, and Hyung-MyungKim : “Weighted boundary matching algorithm for error concealment in the
MPEG-2 video bit stream. Signal processing”, vol.: 3, pp: 291-295, (1999).
3. Lam, Wai-Man, Amy R., and Bede Liu : “Recovery of lost or erroneously received motion vectors. IEEE”, Vol. 5, pp: 417-420, (1993).
109. 4. Thaipanich, T., Wu, P.H. and Kuo, C.J. : “Low-complexity video error concealment for mobile applications using OBMA”. IEEE
Transactions on Consumer Electronics, vol.:54(2), pp: 753-761, (2008).
5. Thaipanich, Tanaphol, Ping-Hao Wu, and CC Jay Kuo. : “Video error concealment with outer and inner boundary matching 642-651
algorithm”.optical engineering application International society for optics and Photonics(2017) Chen, Yan, Oscar Au, Chiwang Ho, and
Jiantao Zhou. : “Spatio-temporal boundary matching algorithm for temporal error concealment”, IEEE International Symposium, pp:4,
(2006).
6. Deng, X., Liu, Y., Hong, C., Bu, J., & Chen, C. : “A temporal error concealment algorithm for H. 264/AVC based on edge directions”,
IEEE International Conference, pp: 941-944, (2009).
7. Su, C.Y. and Huang, C.H.August, : “Temporal error concealment algorithm using multi-side boundary matching principle”, IEEE
International Symposium, pp: 448-453, (2006).
8. M. Zadeh, S.M., H. G. Yakhdan, and S. Kasaei. : “An Efficient Adaptive Boundary Matching Algorithm for Video Error
Concealment”, Iranian Journal of Electrical & Electronic Engineering, Vol.: 10.3, (2014).
9. Wang J, Wang L, Ikenaga T, Goto S. : “An adaptive spatial error concealment (SEC) with more accurate MB type decision in H.
264/AVC”, 5th International Conference on Visual Information Engineering, pp: 759-764, (2008).
10. Wu, Guan-Lin, and Shao-Yi Chien. : “Spatial-temporal error detection scheme for video transmission over noisy channels”, ,Ninth IEEE
International Symposium on, pp. 78-85, (2007).
11. ZiguanCUI ,Zongliang GAN, Xuefeng ZHAN, XiuchangZHU :”Error Concealment Techniques for Video Transmission over Error-
prone Channels: A Survey”, in Journal of Computational Information Systems, vol.:8, pp:8807-8818, (2012).
12. Jung, Y. H., Kim, Y. G., &Choe, Y:Robust “error concealment algorithm using iterative weighted boundary matching criterion”, IEEE,
Vol. 3, pp. 384-387, (2000)
13. Usman, M., He, X., Xu, M., & Lam, K. M :“Survey of Error Concealment techniques”, Research directions and open issues, IEEE, pp:
233-238, (2015).
14. Wang J, Wang L, Ikenaga T, Goto S.:“An adaptive spatial error concealment (SEC) with more accurate MB type decision in H.
264/AVC”, 5th International Conference on Visual Information Engineering, pp: 759-764,(2008).
15. Marvasti-Zadeh, SeyedMojtaba, and HosseinGhanei-Yakhdan. “Video temporal error concealment using improved directional boundary
matching algorithm.” Turkish Journal of Electrical Engineering & Computer Sciences 24, no. 6 :pp 5195-5209(2016).
16. Hasan, MdMehedi, Tasneem Rahman, KiokAhn, and OksamChae.“Artifacts Detection and Error Block Analysis from Broadcasted
Videos.” arXiv preprint arXiv:1808.10086 (2018).
17. Shih, Huang-Chia, Chiung-Ting Wang, and Chung-Lin Huang. “Spiral-Like Pixel Reconstruction Algorithm for Spatiotemporal Video
Error Concealment.” IEEE Access 6 pp: 6370-6381(2018).
18. Choe, Gwangmin, Cholman Nam, and ChanggonChu,“An effective temporal error concealment in H. 264 video sequences based on
scene change detection-PCA model.”, Multimedia Tools and Applications 77, no. 24 pp:31953-31967(2018).
19. El‐Shafai, Walid, S. El‐Rabaie, M. M. El‐Halawany, and Fathi E. Abd El‐Samie. “Performance evaluation of enhanced error correction
algorithms for efficient wireless 3D video communication systems,”,International Journal of Communication Systems 31, no. 1: e3396,
(2018).
20. Chen, Yan, Yang Hu, Oscar C. Au, Houqiang Li, and Chang Wen Chen. “Video error concealment using spatio-temporal boundary
matching and partial differential equation.” in IEEE Transactions on Multimedia 10, no. 1 (2007): 2-15.

Authors: Ipseeta Nanda, Nibedita Adhikari


110. Paper Title: Accelerator Design for Ethernet and HDMI IP Systems for IoT using Xilinx Vivado 18.X
Abstract: Xilinx Vivado software is used for designing synthesis and implementation of accelerator. The
objective of this paper is to understand the concept of intellectual property (IP), IP reuse, custom IP and IP
subsystem and to design the subsystem using Xilinx Vivado is used. This paper attempts to design accelerator to
make communication possible between High Definition Multimedia Interface (HDMI) and Ethernet for Internet
of Things (IoT) using Xilinx Vivado 18.X [4]. The term is increasingly being also defined as objects that “talk”
to each other rather in the manner of Internet of Learning Things (IoLT) based IoT to define objects with that of
“realistically talk” to each other, given the rising system external & internal environmental complexity and
uncertainty factors facing the objects.

Keywords: IP, IoT, HDMI, IoLT.

References:

1. Ipseeta Nanda, NibeditaAdhikari“ Application and performance of FPGA using partial reconfiguration with Xilinx PlanAhead”
Transportation Electrification Conference (ITEC-India),IEEE,Pune,India, 13-15 Dec. 2017.
2. Ipseeta Nanda, AdhikariNibedita,”An approach to Execution of partial reconfiguration in FPGA using Xilinx Planahead” International
Journal of Pure and Applied Mathematics,Vol 117,No.19,Pages-217-224,ISSN NO.1311-8080,2017.
3. Ipseeta Nanda, NibeditaAdhikari “Implementation And Analysis Of Partial Reconfiguration Based Xilinx Ise Design Of Processor
Peripherals” IOSR Journal of Engineering (IOSRJEN),ISSN (e): 2250-3021, ISSN (p): 2278-8719 Pages-01-03,2018. 652-656
4. Ipseeta Nanda,NibeditaAdhikari”System on Chips Design for Internet of Things using Partial Reconfiguration”Journal of advanced
research in Dynamical and Control System,Vol 11,01,2019,2019.
5. Xilinx sw manualszynq-embedded-design-tutorial
6. www. Xilinx.com
7. K. Railis, V.Tsoutsouras, S.Xydis and D.Soudris “Energy profile analysis of Zynq-7000 Programmable SoC for embedded medical
processing: study on ECG arrhythmia detection,”2016 26th International Workshop on Power and Timing Modeling,Optimization and
Simulation (PATMOS), Bremen, 2016, pp.275-282.
8. Ojonav Hazarika, Amit Kumar Mishra. "Chapter 7 White RHINO—A New SDR Platform for Whitespace Communication", Springer
Science and Business Media LLC, 2015.
9. Ipseeta Nanda, S M Ali “Implementation and Execution of Math Partial Reconfiguration Region and LED Dealing with Xilinx
PlanAhead,” International Journal of Advancements in Electronic and Electrical Engineering-IJAEEE,Volume-4:Issue-2[ISSN:2319-
7498], Publication Date: 30 October, 2015
10. Ipseeta Nanda, NibeditaAdhikari “Study and Design of Reconfigurable Processor Peripherals using Xilinx Tools”, Journal of Electronic
Design Technology, Volume 9, Issue 1,Pages-17-23,2018. www.powershow.com
11. www.china.xilinx.com
12. www.omnitek.tv
13. www.design-reuse.com
14. www.goto.com.pk
15. www.dcabes2018.com
16. www.en.wikipedia.org
17. www.electrokit.com

Authors: Manchanda Sonam, Paul Aman, Thakral Bindu

Paper Title: Smart Home Automation System using Ble


Abstract: This paper presents technology which deals with low cost and efficient for example Bluetooth
technology for controlling yeelight. This is achieved by incorporating java code into artik board. Technology has
been developed at a high pace. Furthermore, it will never stop. Web of Things is getting to be prevalent
nowadays because of putting tremendous effects on life. To structure an item utilizing current technology that
ought to be gainful to the lives of others is an extraordinary test now a world. This paper exhibits cost effective
technology for example ble, an artik board, yeelight, and test system simulator. The test system is utilized to
control the shade of the yeelight in the scope of ble. The wireless communication has been established between
the light and the board. This entire procedure will be incorporated according to popular request/response in
accordance with the JSON format. The advantages of the light are it possesses low cost with less utilization of
power.

Keywords:
111.
References: 657-661
1. D. Chowdhary, R. Paranjape and P. Laforge, “Smart home automation system for instrusiondetection ,” 2015 IEEE 14th Canadian
Workshop on Information Theory (CWIT), St. John’s, NI., 2015, pp. 75-78
2. N. Skeledzija , J.C. Edin, V. Bachler, H. N. Vucemilo, H. Dzapo, “Smart home automation system for energy efficient housing”, 37th
International Convention on Information and Communication Technology, Electronics and Microelectronics(MIPRO), 2014 , pp. 166-
171
3. K. Mandula , R. Parupali , C.A.S. Murty, E.Magesh and R. Luna ,”Mobile based home automation using Internet of Things(IoT)”, 2015
International Conference on control Instrumentation, Communication and Computational Technologies (ICCICCT), Kumaracoil, 2015,
pp. 340-343
4. R. K. Kodali , V. Jain, S. Bose and L. Boppana, “IoT based smart security and home automation system”, 2016 International
Conference on Computing , Communication and Automation (ICCCA), Noida , 2016, pp. 1286-1289
5. M. Asadullah and A. RecaiCelik, “An Effective Approach to Build Smart Building Based on Internet of Things (IoT)”, Journal of
Basic and Applied Scientific Research(JBASR), vol. 6, no. 5, pp. 56-62, May 2016
6. V. Puri and A. Nayyar, “Real time smart home automation based on PIC microcontroller, Bluetooth and Android technology”, 2016
3rd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, 2016, pp. 1478-1484
7. S. Palaniappan, N. Hariharan, N. T. Kesh, V. S.. and A. Deborah S, “Home automation systems – A study, “ International Journal of
Computer Applications, vol. 116, pp. 11-18, April 2015
8. R. Piyare and M. Tazil, “ Bluetooth based home automation system using cell phone”, 2011 IEEE 15th International Symposium on
Consumer Electronics (ISCE), Singapore, 2011, pp. 192-195
9. M. N. N. A. Asghar, M.H., “Principle application and vision in internet of things (iot)”, in Communication Technologies (GCCT), 2015
Global Conference on , may 2015
10. A. R. AI-Ali, M. Qasaimeh, M. AI-Mardini, S. Radder and I. A.Zualkernan, "ZigBee-based irrigation system for home
gardens,"Communications. Signal Processing. and their Applications (iCCSPA).2015 International Conference on, Sharjah, 2015, pp.
1-5.
11. T. Ming Zhao, Chua, “Automatic face and gesture recognition, 2008.fg ’08. 8th IEEE international conference on,” pp. 1–6, September
2008.
12. A. R. . C. Y. . O. K. Withanage, C., “A comparison of the popular homeautomation technologies,” pp. 1 – 11, may 2014
13. B. S. S. Tharaniyasoundhari, M., “Intelligent interface based speechrecognition for home automation using android application,” pp. 1
–11, march 2015.
14. O. N. C. S. A. P. B. Sahani, M, “Circuit, power and computingtechnologies (ICCPCT), 2015 international conference on,” pp. 1–6,
March2015.
15. M. J. H. B. T. A. M. K. T. Baig, M.Q., “Artificial intelligence, modellingand simulation (aims), 2014 2nd international conference on,”
pp. 109–114, November 2014.
16. M. N. N. A. Asghar, M.H., “Principle application and vision in internetof things (iot),” in Communication Technologies (GCCT), 2015
GlobalConference on, may 2015.
17. A. Pramanik, Rishikesh, V. Nagar, S. Dwivedi and B. Choudhury, "GSMbased Smart home and digital notice board," 2016
InternationalConference on Computational Techniques in Information andCommunication Technologies (ICCTfCT) ,New Delhi, 2016,
pp. 41-46.
18. A. R. AI-Ali, M. Qasaimeh, M. AI-Mardini, S. Radder and I. A.Zualkernan, "ZigBee-based irrigation system for home
gardens,"Communications. Signal Processing. and their Applications (ICCSPA), 2015 International Conference on, Sharjah, 2015, pp.
1-5.
19. X. Wu, C. Hu, C. Zheng and Q. Zhang, "Solar street lamp system usingGPRS and ZIGBEE technology," 2016 IEEE11thConference
onIndustrial Electronics and Applications (ICIEA) ,Hefei, 2016, pp. 2561-2564.
20. E. A. Elkamchouchi, H., “Design and prototype implementation of smsbased home automation system,” pp. 162 – 167, november
2012.
21. R. J. Vidmar. (1992, August). On the use of atmospheric plasmas as electromagnetic reflectors. IEEE Trans. Plasma Sci. [Online].
21(3). pp. 876—880.
Authors: Shrikant J. Honade

Paper Title: Low Power 32-Bit Floating Point Adder/Subtractor Design using 50nm CMOS VLSI Technology
Abstract: In many DSP applications, generally multipliers and adders are two key components which are
highly complex and consume more power. Out of that the design of adder circuitry is quite complex compared to
multiplier which consumes more power. Hence optimization of power consumption of adder circuits is a
challenging task in the recent year and is a need of today’s world. In order to give a justice to this problem,
work presented in this paper describes the technique of designing floating point adder and subtractor using low
power pipelining technique which leads to a reduction in power consumption by a significant amount. Moreover,
the presented work in the paper deals with the design of low power transistorized architecture for 32-bit floating
point adder/ subtractor without and with pipelining approach in 50nm CMOS VLSI technology. The
experimental results demonstrated that, the dynamic power consumption of the floating point adder/subtractor
architectures is reduced significantly by employing pipelining technique as compared to the without pipelining
technique. Also, in this work a significant improvement has been achieved in the critical path for pipelined
approach compared to without pipeline approach. The proposed design is a full custom design prepared and
analyzed using cadence 6.15 tool.

Keywords: Subtractor, Floating Point Adder, Adder/Subtractor Area, Critical path.

References:

1. Arunraj R. and Vishnu Narayanan P M, “Design of Robust and Power Efficient Full Adder Using Energy Efficient Feed through
112. Logic,” International Journal of Engineering Research and General Science, vol. 2, no. 2, pp. 96–101, 2014.amlesh Pedraj and
Jayendra kumar, “Design and Implementation of Low Power Inexact Floating Point Adder,” International journal of Computer 662-674
Application, vol. 168, no.7, pp. 43–46, 2017.
2. Sudhakar Alluri, M. Dasharatha, B. R. Naik, and N. S. S. Reddy, “Design of Low Power High Speed Full Adder Cell with
XOR/XNOR Logic Gates,” International Conference on Communication and Signal Processing, IEEE, pp. 565–570, 2016.
3. Adib Armand and Somayeh Timarchi, “Low power design of binary signed digit residue number system adder,” 2016 24th IEEE
Iranian Conference on Electrical Engineering (ICEE), pp. 844–848, 2016.
4. S. A. H. Ejtahed and M. B. Ghaznavi-Ghoushchi, “Design and Implementation of a Power and Area Optimized Reconfigurable
Superset Parallel Prefix Adder,” 24th Iranian Conference on Electrical Engineering (ICEE), IEEE, pp. 1655–1660, 2016
5. J. Mounika, Mohd Ziauddin Jahangir and K. Ramanujam, “CMOS based design and simulation of Ternary Full Adder and Ternary
coded decimal (TCD) adder circuit,” 2016 International Conference on Circuit, Power and Computing Technologies [ICCPCT], IEEE,
pp. 1–5, 2016.
6. Vandana Shukla, O. P. Singh, G. R. Mishra, and R. K. Tiwari, “A novel approach to design a redundant binary signed digit adder cell
using reversible logic gates,” 2015 IEEE UP Section Conference on Electrical Computer and Electronics (UPCON 2015), pp. 1-6,2015.
7. Varun Pratap Singh and Manish Rai, “Verilog design of full adder based on reversible gates,” Proceeding International Conference on
Advanced Computer Communication and Automation (ICACCA 2016), IEEE, pp. 1–5, 2016.
8. C. Labrado and H. Thapliyal, “Design of adder and subtractor circuits in majority logic-based field-coupled QCA nanocomputing,”
Electronics Letter, vol. 52, no. 6, pp. 464–466, 2016.
9. M. Nikhil Theja and T. Balakumaran, “Energy efficient low power high speed full adder design using hybrid logic,” 2016 International
Conference on Circuit, Power Computer Technology, pp. 1–8, 2016.
10. Weiqiang Liu, Libnin Chen, C. Wang, Maire O. Neill, and F. Lombardi, “Design and analysis of inexact floating-point adders,” IEEE
Transactions on Computer, vol. 65, no. 1, pp. 308–314, 2015.
11. Milad Jalalian Abbasi morad, S. R. Talebiyan, and E. Pakniyat, “Design of New Low Power High-performance Full Adder with New
XOR-XNOR Circuit,” Second International Congress on Technology, Communication and Knowledge (ICTCK 2015), pp. 153–158,
2015.
12. M. Vinod Kumar Naik and Y. M. Aneesh, “Design of carry select adder for low-power and high speed VLSI applications,” Proceeding
of 2015 IEEE International Conference on Electrical, Computer Communication Technology (ICECCT 2015), pp. 1-4, 2015.
13. S. Usha and T. Ravi, “Design of 4 bit ripple carry adder using hybrid 9TFull Adder,” 2015 International Conference on Circuit, Power
Computer. Technology [ICCPCT], IEEE, pp. 1–8, 2015.
14. AV Anantha Lakshmi and GF Sudha, “Design of a reversible single precision floating point subtractor,” Springerplus open journal,
vol. 3, no. 1, pp. 1-20, 2014.
15. B. Ramkumar and H. M. Kittur, “Low-power and area-efficient carry select adder,” IEEE Transactions on very large scale integration
(VLSI) systems, vol. 20, no. 2, pp. 371–375, 2012.
16. Lamiaa S. A. Hamid, Khaled A. Shehata, Hassan El-Ghitani, and Mohamed ElSaid, “Design of generic floating point multiplier and
adder/subtractor units,” 2010 12th International conference on computer modelling and simulation, IEEE computer society, pp. 615–
618, 2010.
17. Bart R. Zeydel, Dursun Baran, and Vojin G. Oklobdzija, “Energy-efficient design methodologies: high-performance VLSI adders,”
IEEE Journal of Solid-State Circuits, vol. 45, no. 6, pp. 1220–1233, 2010.
18. Mohammad Hossein Moaiyeri, Reza F. Mirzaee, and Keivan Navi, “Two new low-power and high-performance full adders,” Journal
of Computers, vol. 4, no. 2, pp. 119–126, 2009.
19. Giorgos Dimitrakopoulos and Dimitris Nikolos, “High-speed parallel-prefix VLSI ling adders,” IEEE Transactions on Computers, vol.
54, no. 2, pp. 225–231, 2005.
20. Vojin G. Oklobdzija, Bart R. Zeydel, Hoang Q. Dao, Sanu Mathew, and R. Krishnamurthy, “Comparison of high-performance VLSI
adders in the energy-delay space,” IEEE Transactions on very large scale integration (VLSI) systems, vol. 13, no. 6, pp. 754–758,
2005.
21. Keshab K. Parahi, "VLSI Digital Signal Processing System: Design and Implementation," Wiley Inter-science publication, John Wiley
and Sons Inc. PP.1-784.
22. Ujwal S. Ghate, Ajay A. Gurjar, Vilas N. Ghate, “ Power Optimization of single precision FFTdesign using fully combinational
circuits,” 15th International Conference on Advanced Computing Technologies (ICACT), 2013.

Authors: Rekha Chaturvedi,Abhay Sharma, Umesh Dwivedi, Sandeep Kumar

Paper Title: DWT-DCT Based copyright Protection In Ycbcr Color Space


Abstract: Digital image watermarking is powerful technique which provide ownership protection and
copyright protection. In this paper, a novel watermarking technique based on Discrete Cosine Transform (DCT)
and Discrete Wavelet Transform (DWT) is presented. YCbCr color model is used for watermark embedding and
extraction because of its close resemblance to human visual system. Single level DWT is applied to Luma
Component of YCbCr color cover image and then DCT coefficients are taken for watermark embedding process.
DCT is applied block by block of size (4×4). Binary watermark is scrambled using Arnold transform with k
iterations to achieve robustness. Proposed method has been evaluated by many performance evaluation measures
such as Peak Signal to Noise Ratio (PSNR), Normalized Correlation (NC) and Computational time. Various
watermark attacks are also applied against proposed method, result shows that superiority over other methods.

Keywords: Digital Image Watermarking; DCT middle band coefficient, YCbCr, PSNR, SM and Normalized
Correlation.

References:

1. Gordy, J. D., and L. T. Bruton. "Performance evaluation of digital audio watermarking algorithms." Circuits and Systems, 2000.
Proceedings of the 43rd IEEE Midwest Symposium on. Vol. 1. IEEE, 2000.
2. He, Dajun, and Qibin Sun. "A practical print-scan resilient watermarking scheme." Image Processing, 2005. ICIP 2005. IEEE
International Conference on. Vol. 1. IEEE, 2005.
113. 3. Dutta, Jhuma, "A neural network-based image watermarking technique using spiral encoding of DCT coefficients." Proceedings of the
International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA). Springer, Berlin, Heidelberg, 2013.
4. Rajpal, Ankit, Anurag Mishra, and Rajni Bala. "Extreme learning machine for semi-blind grayscale image watermarking in DWT 675-679
domain." International Symposium on Security in Computing and Communication. Springer, Singapore, 2016.
5. Mishra, Anurag, et al. "A novel image watermarking scheme using extreme learning machine." Neural Networks (IJCNN), The 2012
International Joint Conference on. IEEE, 2012.
6. Navas, K. A., et al. "Dwt-dct-svd basedwatermarking"Communication Systems Software and Middleware and Workshops, 2008.
COMSWARE 2008. 3rd International Conference on. IEEE, 2008.
7. Nath, Joyshree. "A challenge in hiding encrypted message in LSB and LSB+ 1 bit positions in various cover files." International
Journal of Global Research in Computer Science (UGC Approved Journal) 2.4 (2011): 180-185.
8. Tyagi, Vikas. "Image steganography using least significant bit with cryptography." International Journal of Global Research in
Computer Science (UGC Approved Journal) 3.3 (2012): 53-55.
9. Singh, Durgesh, and Sanjay K. Singh. "DWT-SVD and DCT based robust and blind watermarking scheme for copyright
protection." Multimedia Tools and Applications 76.11 (2017): 13001-13024.
10. Patvardhan, C., Pragyesh Kumar, and C. Vasantha Lakshmi. "Effective Color image watermarking scheme using YCbCr color space
and QR code." Multimedia Tools and Applications (2017): 1-23.
11. Bajracharya, Subin, and Roshan Koju. "An improved DWT-SVD based robust digital image watermarking for color
image." International Journal Engineering and Manufacturing1 (2017): 49-59.
12. Imran, Muhammad, and Bruce A. Harvey. "A Blind Adaptive Color Image Watermarking Scheme Based on Principal Component
Analysis, Singular Value Decomposition and Human Visual System." Radioengineering 26.3 (2017).
13. Tomar, Vivek, Arvind Kumar, and Ankur Choudhary. "Conception & implementation of a novel Digital image watermarking
algorithm using cascading of DCT and LWT." Optimization, Reliabilty, and Information Technology (ICROIT), 2014 International
Conference on. IEEE, 2014.
14. Hosseini, S. Abolfazl, and ArashSaboori. "A new method for color image watermarking based on combination of DCT and
PCA." Communications, Signal Processing, and their Applications (ICCSPA), 2015 International Conference on. IEEE, 2015.
15. Kazemivash, Behnam, and Mohsen Ebrahimi Moghaddam. "A predictive model-based image watermarking scheme using Regression
Tree and Firefly algorithm." Soft Computing (2017): 1-1
Authors: Arup Kumar Mohanty, Debahuti Mishra

Paper Title: Exploring the use of Water Cycle Optimization Algorithm for Foreign Exchange Prediction
Abstract: The aim of this paper is to model a network and predict the exchange price of United States Dollar
to Indian Rupees using daily exchange rates from Dec 18, 1991-Jul 19, 2007. In this paper, Water Cycle
Optimization (WCA) technique has been used to optimize the Artificial Neural Network (ANN) for Foreign
Exchange prediction on the basis of their predictive performance. The performance metrics considered for the
evaluation of the models are root mean square error (RMSE) and mean absolute error (MAE). The tabulated
outcome shows the efficiency of the model over other popular models.

Keywords: ANN; Forex;Machine Learning; Prediction; WCA.

References:

114. 1. Ojha V. K., Abraham A., Snášel V.,“Metaheuristic design of feedforward neural networks: A review of two decades of 680-684
research”,Engineering Applications of Artificial Intelligence,(2017),pp.7-116.
2. Pradeepkumar D., Ravi V., “Soft Computing Hybrids for FOREX Rate Prediction: A Comprehensive Review”,Computers&
Operations Research,(2018),pp.262-284.
3. http://in.investing.com/currencies/usd-inr-historical-data
4. Das S. R., Mishra D., Rout M., “A hybridized ELM-Jaya forecasting model for currency exchange prediction”, Journal of King Saud
University-Computer and Information Sciences,(2017), pp. 1-21.
5. Vukovic D., “ Forexpredicton with neural network: usd/eur currency pair”, Vol. 10,(2013), pp. 251-261.
6. Soni S., “Applications of ANNs in Stock Market Prediction: A Survey”, 2005.
7. Eskandar H., Sadollah A., Bahreininejad A., Hamdi M., “Water cycle algorithm – A novel metaheuristic optimization method for
solving constrained engineering optimization problems”, Computers and Structures,Vol. 110–111, (2012), pp. 151–166.
8. Todor B., Iliyan Z, Nina D, “Time Series Prediction by Artificial Neural Networks and Differential Evolution in Distributed
Environment”, Large scale scientific computing, 8th international comference,( 2011), pp. 198-205.
9. Naik R. L., Ramesh D., Manjula1 B. ,Govardhan A., “ Soft computing hybrids for FOREX rate prediction: A comprehensive review”,
Computer Engineering and Intelligent Systems,Vol 3, No.7,(2012).
10. Hoag A.J. , Hoag, J.H., Introductory Economics. World Scientific, 2002 .

Authors: Rajashekar Kunabeva, Manjunatha P, NarendraVG


Adaptive Best Mother Wavelet Based Compressive Sensing Algorithm for Energy Efficient ECG
Paper Title:
Signal Compression in WBAN Node
Abstract: In ambulatory ECG monitoring application energy efficient signal acquisition plays significant role
in ensuring the lifetime of resource constrained WBAN node . Most of the Compressive Sensing (CS)
algorithms employ fixed mother wavelet choice for decomposition phase, resulting in incorrect block-wise data
representation thus yielding higher PRD, lower CR and subsequent faster energy consumption rate. To overcome
this design issue a novel minimum PRD based adaptive best mother wavelet (ABMW) selection algorithm has
been proposed individually for each block and tested for compression of ECG signals in emergent CS paradigm
over three datasets. Performance metrics illustrate that the proposed algorithm supports true representation of the
physiological events, is energy efficient and faster than its predecessors and has an average execution delay of
1.7 seconds for compression and recovery of 10 seconds ECG data. Simulation results show that proposed
algorithm achieved average PRD of 1.141733, CR of 63.77417 and SNR of 40.63878. The proposed algorithm
achieved average PRD of 3.59 , execution speed of 2.09 seconds ,CR of 62.32, SNR of 29.5dB and energy
consumption is around 1.64E-04 which is very near to average energy consumption values for both MIT-BIH
,PTB datasets and 24-bit acquired ECG data.

Keywords: Adaptive mother wavelet selection, Energy efficiency , Compressive Sensing, Sparse
representation, WBAN.

References:

1. Non-communicable Diseases (NCD) Country Profiles-[online] www.who.int- World Health Organization –accessed on 26.10.2018.
115. 2. Movassaghi et al., “Wireless body are networks: A Survey”, IEEE communications surveys and Tutorials, Vol. 16, No. 3, Third
Quarter 2014.
3. “Arrhythmias”, Heart foundation, 2014. 685-692
4. “BioPatch Wireless Device” - Zephyr Technology Corporation [online] http://zephyranywhere.com/products/biopatch/ - accessed
07/08/2015.
5. D. L. Donoho, “Compressed sensing”, IEEE Trans. on Inform. Theory, vol. 52, no. 4, pp. 1289–1306, Apr. 2006.
6. S. M. S. Jalaleddine, C. G. Hutchens, R. D. Stranttan, and W. A. Coberly,“ ECG data compression techniques : A unified
approach”, IEEE Trans.Biomed. Eng., vol. 37, no. 4, pp. 329–343, Apr. 1990.
7. 7. Emmanuel J. Candès, Michael B. Wakin , “An Introduction to Compressive Sampling”, IEEE signal processing magazine, March
2008, pp:21-30
8. Andrianiaina Ravelomanantsoa, “Simple and Efficient Compressed Sensing Encoder for Wireless Body Area Network”,IEEE
Transactions on Instrumentation and Measurement ,Vol.63, NO.12, December 2014, pp: 2973-2982
9. DarrenCraven et.al., “Energy-efficient Compressed Sensing for ambulatory ECG monitoring”, Computers in Biology and
Medicine”, Elsevier, 2016, pp:1–13.
10. Mamaghanian et al.,“Compressed Sensing For Real-Time Energy-Efficient ECG Compression On Wbsn”, IEEE transactions on
biomedical engineering, vol. 58, no. 9, september 2011.
11. Jun Zhang, Liang Yuand Yuanqing Li, “Energy-Efficient ECG Compression on Wireless Biosensors via Minimal Coherence
Sensing and Weighted l1 Minimization Reconstruction”, IEEE Journal Of Biomedical And Health Informatics, vol. 19,issue 2,march
2015.
12. JiaLi Ma, TanTan Zhang, and MingChui Dong, “A Novel ECG Data Compression Method Using Adaptive Fourier Decomposition
With Security Guarantee in e-Health Applications”, IEEE Journal Of Biomedical And Health Informatics, vol. 19, issue 3, may
2015.
13. Laurent Brechet, Marie-Françoise Lucas, Christian Doncarli, and Dario Farina, “Compression of Biomedical Signals With Mother
Wavelet Optimization and Best-Basis Wavelet Packet Selection”, IEEE Transactions On Biomedical Engineering, vol. 54, issue 12,
December 2007.
14. Veer Amol Motinath, Chandan Kumar Jha, Maheshkumar H. Kolekar, “A Novel ECG Data Compression Algorithm using Best
Mother Wavelet Selection”, IEEE Intl. Conference on Advances in Computing, Communications and Informatics (ICACCI), Sept.
21-24, 2016, Jaipur, India.
15. Rakesh Kumar & Indu Saini, “Empirical Wavelet Transform Based ECG Signal Compression”, IETE Journal of Research, 60:6,423-
431.
16. Jeevan K. Pant and Sridhar Krishnan, “Efficient Compressive Sensing of ECG Segments Based on Machine Learning for QRS-Based
Arrhythmia Detection”, IEEE ,2016.
17. Gabriel Peyr_e., “Best Basis Compressed Sensing.”, IEEE Transactions on Signal Processing, Institute of Electrical and Electronics
Engineers, 2010, volume 58 issue 5, pp.2613 -2622.
18. Dapeng Wu,Boran Yang,Honggang Wang,Dalei Wu And Ruyan Wang, “An Energy-Efficient Data Forwarding Strategy for
Heterogeneous WBANs”,IEEE access, Volume 4, 2016.
19. E.vanden Berg and M. P. Friedlander, “SPGL1: A solver for large-scale sparse reconstruction,” April 2015.
20. http://www.cs.ubc.ca/labs/scl/spgl1.
21. MIT-BIH arrhythmia database [online], www.physionet.org/mitdb/- last accessed on 14/09/2017.
22. PTB database [online] ,www.physionet.org/ptb/ - last accessed on
14/09/2017.
23. Ads 1293 Evm Data Sheet,[online], www.ti.com, November 2012. Razzaque, Mohammad, and Simon Dobson, "Energy-Efficient
Sensing in Wireless Sensor Networks Using Compressed Sensing", Sensors, 2014.
24. Zhang, Zheng, Yong Xu, Jian Yang, Xuelong Li, and David Zhang, "A Survey of Sparse Representation: Algorithms and
Applications",IEEE Access, 2015.

Authors: Yogesh Y. Katdare, Pranita Chavan, Dhananjay Borse


Efficient Perturb and Observe Algorithm for Photovoltaic Maximum Power Point Tracking and
Paper Title:
Drift Avoidance using SEPIC Converter
Abstract: Maximum power point tracking is a commonly used technique for extracting maximum possible
power from solar photovoltaic (PV) systems under all conditions. Various methods used for implementation of
MPPT algorithm, out of those methods, perturb and observe (P&O) is very popular and commonly using method
owing to its simplicity, easy implementation and highly efficient nature. However, P&O algorithm has
disadvantage that it suffers from drift phenomenon in which during sudden change in atmospheric conditions,
the algorithm drifts away from the maximum power point (MPP). This paper proposes modifications in the
conventional P&O algorithm to overcome the drifting of MPP during suddenly changing atmospheric
conditions. This algorithm takes change in current into consideration along with change in voltage and power
and is verified using MATLAB/Simulink. DC/DC control is achieved using SEPIC converter and simulation
results of the proposed algorithm show that the system can track the MPP in transient whether conditions and
drifting is avoided.

Keywords: Maximum Power Point Tracking (MPPT), Perturb and Observe (P&O), PV, drift phenomenon,
SEPIC Converter, MATLAB/Simulink.

References:
116.
1. Muralidhar Killi, Susovon Samanta, , “Modified Perturb & Observe MPPT algorithm for drift avoidance in Photovoltaic systems” 2015
IEEE
693-696
2. Dezso Sera, Remus Teodorescu, Jochen Hantschel, Michael Knoll, “optimized maximum power point tracker for fast changing
environmental conditions,” IEEE, July 2008
3. Mohammed A. Elgendy, Bashar Zahavi, David J. Atkinson, “Assessment of perturb and observe MPPT algorithm implementation
techniques for PV pumping applications”, IEEE, January 2012
4. Nicola Femia, Giovanni Petrone, Giovanni Spagnuolo, Massimo Vitelli, “Optimization of Perturb and observe maximum power point
tracking method,” IEEE, July 2005
5. BOC Group, Operngasse 20b, Vienna, Austria, “An improved perturb & observe MPPT algorithm with variable step”, Scientific
Bulletin of the Electrical Engineering faculty, ISSN 2286-2455, [2017]
6. M. Quamruzzaman& K. M. Rahman, “A modified P&O MPPT technique for single stage grid connected PV inverter”, WSEAS
TRANSACTIONS on POWER SYSTEMS, E-ISSN: 2224-350X, Volume 9, [2014]
7. Luigi Piegari, Renato Rizzo, Ivan Spina, Pietro Tricoli “An optimized adaptive perturb and observe maximum power point tracking
control for PV generation”, Energies 2015, 8, 3418-3436, ISSN 1996-1073 [2015]
8. Jehun Hahm, Euntai Kim, Heejin Lee, Changyong Yoon, “A modified Perturb and Observe sliding mode Maximum Power Point
Tracking method for PV system under partially shaded condition”, International Journal of Fuzzy Logic & Intelligent Systems,
December 2016
9. Syafaruddin, E. Karatepe, T. Hiyama, “Artificial neural network-polar coordinated fuzzy controller based maximum power point
tracking control under partially shaded conditions”, IET Renewable Power Generation, October 2008
10. Xuan Hieu Nguyen and Minh Phuong Nguyen, “Mathematical modeling of photovoltaic cell/module/arrays with tags in
Matlab/Simulink”, Environmental Systems Research, vol.4, no.1, Dec. 2015.
11. E. Mamarelis, G. Petrone, and G. Spagnuolo, “Design of a sliding mode controlled sepic for PV mppt applications,” IEEE Trans. Ind.
Electron., vol. 61, no. 7, pp. 3387-3398, Jul. 2014.

Authors: R.Sakthi, V.Vidhya

Paper Title: Computational Performance of a Single Server State Dependent Queue


Abstract: In this article we consider a single server state dependent queuing system with the service rate
varying according to types of customers like normal, tagged and heavy tailed. We develop a state dependent
queuing model in which the service rate depends on customer type arrive to the system with quasi-birth-death
environment structure and using matrix geometric method we develop the system performance measures. Also,
we use these performance measures by utilizing the maximum potential of server and perform sensitivity
analysis with numerical illustrations.

Keywords: Quasi-birth-death process, state dependent, stationary probability, tagged customer. AMS Subject
Classification: 60K25, 90B22, 68M20.

References:
1. R.J. Batt, and Terwiesch, Early Task Initiation and Other LoadAdaptive Mechanisms in the Emergency Department, Management
Science, 2016.
2. R. Bekker , S.C. Borst, O.J. Boxma, and O.Kella, Queues with workloaddependent arrival and service rates, Queueing Systems, 46,3-4,
2004, pp.537– 556.
3. R. Bekker, G. Koole, B.F. Nielsen, and T.B.Nielsen, Queues with waiting time dependent service,Queueing Systems, 68(1), 2011, pp.1--
78, 2011.
4. M. Delasay, A. Ingolfsson, and B. Kolfal, Modeling load and overwork effects in queuing systems with adaptive service rates,
Operations Research, 2016, pp.1–19.
5. A. EI-Ata, The state-dependent queue: M/M/1/N with reneging and general balk functions. Microelectronic and Reliability 31,1991, pp.
1001–1007.
6. F.F. Fadiloglu, Models of Production Lines as Quasi-Birth-Death Processes, Mathematical and Computer Modelling, 35, 2002, pp. 913–
930.
117. 7. C.M. George, and J.M. Harrison, Dynamic control of a queue with adjustable service rate, Operations Research, 49, (5), 2001, pp. 720–
731.
8. W.J. Hopp, S.M. Iravani, and Y.G. Yuen, Operations systems with discretionary task completion, Management Science, 53 (1), 2007, 697-700
pp.61–77.
9. M. Jain, G.C. Sharma, and R. Sharma, Performance modeling of state dependent system with mixed standbys and two modes of failure,
Applied Mathematical Modelling, 32(5), 2008, pp.712—721.
10. R.Kalyanaraman, and P.S.B. Raman, A single server state dependent finite queueing system, International Journal of Computational
Cognition,8(4), 2010, pp.38—43.
11. Knessl C, B.J. Matkowsky, Z. Schuss, and C. Tier, Asymptotic analysis of a state-dependent M/G/1 Queuing system, SIAM Journal of
Applied Mathematics, 46 (3),1986,pp.483–505.
12. C. Knessl, C Tier, B.J. Matkowsky, and Z. Schuss, A State dependent GI/G/1 queue, European Journal of Applied Mathematics, 5 (2),
1994, pp.217– 241.
13. G. Latouche, and V. Ramaswami, Introduction to Matrix Analytic Methods in Stochastic Modellling, Philadelphia:ASA-SIAM,1999.
14. J.S.H. van Leeuwaarden, and E.M.M. Winands, Quasi-birth-and-death processes with an explicit rate matrix, Stochastic Models, vol. 22
(1),2006,pp.77–98.
15. M.F. Neuts, Matrix Geometric Solutions in Stochastic Models: An Algorithmic Approach, John Hopkins University Press, Baltimore,
1981.
16. D. Yue, C. Li, and W. Yue, The Matrix-Geometric solution of the Queue with Balking and State-Dependent Service, Nonlinear
Dynamics and System Theory, 6 (3), 2006, pp.295–308.

Authors: Rashmi Mishra, Pooja Saharan, Amrita Jyoti

Paper Title: Heart Disease Risk Predictor


Abstract: Cardiovascular disease is one of the focused areas is medical area because its origins sickness and
death amongst the population of the entire world. Data mining techniques play an important role to convert the
large amount of raw data into meaningful information which will help in prediction and decision of
Cardiovascular disease. The prediction models were technologically advanced using diverse amalgamation
structures and sorting techniques such as k-NN, Naive Bayes, LR, SVM, Neural Network, Decision Tree. It is
very necessary for the recital of the prediction models to choose the exact amalgamation of momentous features.
The main Aim of the propose System is to develop an develop an Intelligent System using data mining modeling
technique. The proposed system retrieves the data set and compare the data set with the predefined trained data
set. The existing decision support system cannot predict the complex question for diagnosing the heart disease
but the proposed system predicts the complex queries which will help and assist the healthcare practitioners to
take appropriate decisions. This proposed system aims to provide a web platform to predict the occurrences of
118. disease on the basis of various symptoms. The user can select various symptoms and can find the diseases with
their probabilistic figures.
701-705
Keywords: Naive Bayes, Heart disease, Data Mining, JDK, Thal.

References:

1. Sana S, Sawant A, Paradkar S, Patil K,2015, Electronic Recording System- Heart Disease Prediction System, International Conference
on Technologies for Sustainable Development, Feb. 04 – 06.
2. Sellappan P, Rafiah A, Intelligent Heart Disease Prediction System Using Data Mining Techniques, IJCSNS International Journal of
Computer Science and Network Security, Vol.8 No.8, August 2015.
3. Tomar D, Agarwal S, Feature selection based least square twin support vector machine for diagnosis of heart disease. Int. J. Bio-Sci.
Bio-Technol. 6 (2), 69–82, 2014.
4. Verma, L., Srivastava, S., Negi, P.C , A hybrid data mining model to predict coronary artery disease cases using non-invasive clinical
data, J. Med. Syst. 40(7), 1–7,2016.
5. Wiharto W, Kusnanto H, Herianto H, Hybrid system of tiered multivariate analysis and artificial neural network for coronary heart
disease diagnosis. Int. J. Electr. Computer. Eng. (IJECE) 7 (2), 1023–1031, 2017.

Authors: Microarray Gene Expression Data Classification using a Hybrid Algorithm: MRMRAGA

Paper Title: Rabindra Kumar Singh, M. Sivabalakrishnan


Abstract: In the field of microarray gene expression research, the high dimension of the features with a
comparatively small sample size of these data became necessary for the development of a robust and efficient
feature selection method in order to perform classification task more precisely on gene expression data. We
119. propose the hybrid feature selection (mRMRAGA) approach in this paper, which combines the minimum
redundancy and maximum relevance (mRMR) with the adaptive genetic algorithm (AGA). The mRMR method
706-713
is frequently used to identify the characteristics more accurately for gene and its phenotypes. Then their
relevance is narrowed down which is described in pairing with its relevant feature selection. This approach is
known as Minimum Redundancy and Maximum Relevance. The Genetic Algorithm (GA) has been propelled
with the procedure of natural selection and it is based on heuristic search method. And the adaptive genetic
algorithm is improvised one which gives better performance. We have conducted an experiment on four
benchmarked dataset using our proposed approach and then classified using four well-known classification
approaches. The accuracy was measured and observed that it gives better performance compared to the other
conventional feature selection methods.

Keywords: Feature selection, classification, mRMR, AGA, hybrid feature selection.

References:

1. Heller, Michael J. "DNA microarray technology: devices, systems, and applications." Annual review of biomedical engineering 4.1
(2002): 129-153.
2. Li, Shaoguang, and Dongguang Li. DNA microarray technology and data analysis in cancer research. World Scientific, 2008.
3. Cosma, Georgina, et al. "A survey on computational intelligence approaches for predictive modeling in prostate cancer." Expert
systems with applications 70 (2017): 1-19.
4. Rabindra Kumar Singh, and M. Sivabalakrishnan. "Feature selection of gene expression data for cancer classification: a
review." Procedia Computer Science 50 (2015): 52-57.
5. Wang, Lipo. "Feature selection in bioinformatics." Independent Component Analyses, Compressive Sampling, Wavelets, Neural Net,
Biosystems, and Nanoengineering X. Vol. 8401. International Society for Optics and Photonics, 2012.
6. Song, Qinbao, Jingjie Ni, and Guangtao Wang. "A fast clustering-based feature subset selection algorithm for high-dimensional
data." IEEE transactions on knowledge and data engineering 25.1 (2011): 1-14.
7. Liu, Shenghui, et al. "Feature selection of gene expression data for Cancer classification using double RBF-kernels." BMC
bioinformatics 19.1 (2018): 396.
8. Saeys, Yvan, IñakiInza, and Pedro Larrañaga. "A review of feature selection techniques in bioinformatics." bioinformatics23.19 (2007):
2507-2517.
9. Hira, Zena M., and Duncan F. Gillies. "A review of feature selection and feature extraction methods applied on microarray
data." Advances in bioinformatics 2015 (2015).
10. Lazar, Cosmin, et al. "A survey on filter techniques for feature selection in gene expression microarray analysis." IEEE/ACM
Transactions on Computational Biology and Bioinformatics (TCBB) 9.4 (2012): 1106-1119.
11. Hameed, Shilan S., et al. "Filter-Wrapper Combination and Embedded Feature Selection for Gene Expression Data." Int. J. Advance
Soft Compu. Appl 10.1 (2018).
12. Saeys, Yvan, IñakiInza, and Pedro Larrañaga. "A review of feature selection techniques in bioinformatics." bioinformatics23.19 (2007):
2507-2517.
13. Xiong, Momiao, Xiangzhong Fang, and Jinying Zhao. "Biomarker identification by feature wrappers." Genome Research 11.11 (2001):
1878-1887.
14. Santana, Laura Emmanuella A. dos S., and Anne M. de Paula Canuto. "Filter-based optimization techniques for selection of feature
subsets in ensemble systems." Expert Systems with Applications 41.4 (2014): 1622-1631.
15. Bolón-Canedo, Verónica, et al. "A review of microarray datasets and applied feature selection methods." Information Sciences 282
(2014): 111-135.
16. Ding, Chris, and Hanchuan Peng. "Minimum redundancy feature selection from microarray gene expression data." Journal of
bioinformatics and computational biology 3.02 (2005): 185-205.
17. Hoque, Nazrul, Dhruba K. Bhattacharyya, and Jugal K. Kalita. "MIFS-ND: A mutual information-based feature selection
method." Expert Systems with Applications 41.14 (2014): 6371-6385.
18. Deb, Kalyanmoy, et al. "A fast elitist non-dominated sorting genetic algorithm for multi-objective optimization: NSGA-
II." International conference on parallel problem solving from nature. Springer, Berlin, Heidelberg, 2000.
19. Ghalwash, Mohamed F., et al. "Structured feature selection using coordinate descent optimization." BMC bioinformatics17.1 (2016):
158.
20. Jakobović, Domagoj, and Marin Golub. "Adaptive genetic algorithm." Journal of computing and information technology7.3 (1999):
229-235.
21. Cover, Thomas M., and Joy A. Thomas. "Entropy, relative entropy and mutual information." Elements of information theory 2 (1991):
1-55.
22. Battiti, Roberto. "Using mutual information for selecting features in supervised neural net learning." IEEE Transactions on neural
networks 5.4 (1994): 537-550.
23. Paul, Topon Kumar, and Hitoshi Iba. "Extraction of informative genes from microarray data." Proceedings of the 7th annual conference
on Genetic and evolutionary computation. ACM, 2005.
24. Montana, David J., and Lawrence Davis. "Training Feedforward Neural Networks Using Genetic Algorithms." IJCAI. Vol. 89. 1989.
25. Zhu, Zexuan, Yew-Soon Ong, and Manoranjan Dash. "Markov blanket-embedded genetic algorithm for gene selection." Pattern
Recognition 40.11 (2007): 3236-3248.
26. Dettling, Marcel, and Peter Bühlmann. "Supervised clustering of genes." Genome biology 3.12 (2002): research0069-1.
27. Díaz-Uriarte, Ramón, and Sara Alvarez De Andres. "Gene selection and classification of microarray data using random forest." BMC
bioinformatics 7.1 (2006): 3.
Authors: Rubin Thottupurathu Jose, Sojan Lal Poulose

Paper Title: Statistics Based Optimization Technique for Query Processing


Abstract: Semantic web consists of the data in the structure manner and query searching methods can access
these structured data to provide effective search result. The query recommendation in the semantic web
relevance is needed to be improved based on the user input query. Many existing methods are used to improve
the query recommendation efficiency using the optimization technique such as Particle Swarm Optimization
(PSO), Ant Colony Optimization (ACO). These methods involve in the use of many features which are selected
from the user query. This in-turn increases the cost of a query in the semantic web. In this research, the query
120. optimization was carried out by using the statistics method. The statistics based optimization method requires
fewer features such as triple pattern and node priority etc., for finding the relevant results. The LUBM dataset
714-718
contains the semantic queries and this dataset is used to measure the efficiency of the proposed Statistical based
optimization method. The SPARQL queries are used to plot the query graph and triple scores are extracted from
the graph. The cost value of the triple scores is measured and given as input to the proposed statistics method.
The execution time of the statistics based optimization method for the query is 35 ms while the existing method
has 48 ms.

Keywords: LUBM dataset, Semantic web query, SPARQL, statistics based optimization and triple scores.
References:

1. C. Nikolaou, and M. Koubarakis, (2016). Querying incomplete information in RDF with SPARQL. Artificial Intelligence, 237, pp. 138-
171.
2. Z. Gu, S. Zhang, and C. Cao, (2019). Reasoning and querying web-scale open data based on DL-LiteA in a divide-and-conquer way.
Journal of Web Semantics, 55, pp. 122-144.
3. M. Acosta, E. Simperl, F. Flöck, and M. E. Vidal, (2017). Enhancing answer completeness of SPARQL queries via crowdsourcing.
Journal of Web Semantics, 45, pp. 41-62.
4. J. Van Herwegen, R. Verborgh, E. Mannens, and R. Van de Walle, (2015). Query execution optimization for clients of triple pattern
fragments. In European Semantic Web Conference, pp. 302-318. Springer, Cham.
5. G. Montoya, H. Skaf-Molli, and K. Hose. (2017). The Odyssey approach for optimizing federated SPARQL queries. In International
Semantic Web Conference Springer, pp. 471-489.
6. Z. Chouiref, A. Belkhir, K. Benouaret, and A. Hadjali, (2016). A fuzzy framework for efficient user-centric Web service selection.
Applied Soft Computing, 41, pp. 51-65.
7. D. Janke, S. Staab, and M. Thimm, (2018). Impact analysis of data placement strategies on query efforts in distributed rdf stores. Journal
of Web Semantics, 50, pp. 21-48.
8. J. M. Almendros-Jimenez, A. Becerra-Terón, and G. Moreno, (2018). Fuzzy queries of social networks with FSA-SPARQL. Expert
Systems with Applications, 113, pp.128-146.
9. E. G. Kalayci, T. E. Kalayci, and D. Birant, (2015). An ant colony optimisation approach for optimising SPARQL queries by reordering
triple patterns. Information Systems, 50, pp.51-68.
10. J. Schoenfisch, and H. Stuckenschmidt, (2017). Analyzing real-world SPARQL queries and ontology-based data access in the context of
probabilistic data. International Journal of Approximate Reasoning, 90, pp. 374-388.
11. F. Michel, C. Faron-Zucker, and J. Montagnat, (2019). Bridging the Semantic Web and NoSQL Worlds: Generic SPARQL Query
Translation and Application to MongoDB. In Transactions on Large-Scale Data-and Knowledge-Centered Systems XL, Springer, pp.
125-165.
12. G. De Giacomo, D. Lembo, M. Lenzerini, A. Poggi, and R. Rosati, (2018). Using ontologies for semantic data integration. In A
Comprehensive Guide Through the Italian Database Research Over the Last 25 Years, Springer, pp. 187-202.
13. P. Peng, L. Zou, M. T. Özsu, L. Chen, and D. Zhao. (2016). Processing SPARQL queries over distributed RDF graphs. The VLDB
Journal—The International Journal on Very Large Data Bases, 25(2), pp. 243-268.
14. M. D. Pham, and P. Boncz, (2016). Exploiting emergent schemas to make RDF systems more efficient. In International Semantic Web
Conference, Springer, pp. 463-479.
15. D. Ibragimov, K. Hose, T. B. Pedersen, and E. Zimányi, (2016). Optimizing aggregate SPARQL queries using materialized RDF views.
In International Semantic Web Conference). Springer, pp. 341-359.
16. Y. Guo, Z. Pan, and J. Heflin, (2005). LUBM: A benchmark for OWL knowledge base systems. Web Semantics: Science, Services and
Agents on the World Wide Web, 3(2-3), pp. 158-182.
17. M. D. Pham, and P. Boncz, (2016). Exploiting emergent schemas to make RDF systems more efficient. In International Semantic Web
Conference, Springer, pp. 463-479.

Authors: Abhijitsinh Parmar, Vikram M. Patel, A. P. Singh

Paper Title: Seismic Vulnerability Assessment of Buildings in Surat City of western India
Abstract: In Surat city, the second largest city of Gujarat, 6930 buildings had been rapidly screened (RVS).
RVS is known as a sidewalk evaluation, in which a skilled screener inspect a structure visually in order to
recognize characteristics that influence the building's seismic output, for example the construction type, seismic
zones, soil, and irregularities, etc. This study of RVS is based on the checklists in a RCC and Masonry Performa.
Other significant structure information, including building occupancy and possible structural risks, are also
collected during the screening. A performance score of the structure is calculated based on RVS values that
correspond to these characteristics. In comparison with a cuts-off rating, the structure rating determines if a
construction has possible vulnerabilities to be evaluated by a skilled engineer. We applied the Gaussian
distribution methodology for cut off score in this study. The Gaussian distribution is also commonly called the
normal distribution. Though, there are varied constructions practices, 74% constructions are RCC and 26%
masonry structures. The performance results of surveyed buildings show that about 80 percent of both structures
have high quality because they have a performance rating > 60. The survey’s results also indicate that buildings
practice have been changed from masonry to RCC after 2001 Bhuj earthquake (M7.7). Due to design, RCC
buildings will have more shear capacity to tolerate the seismic shaking in comparison to the masonry buildings.

121. Keywords: Rapid Visual Survey; Vulnerability assessment; seismic hazard; buildings; Performance score.

References: 719-723

1. Rastogi, B. K., Gupta, H. K., Mandal, P., Satyanarayana, H. V. S., Kousalya, M., Raghavan, R., & Satyamurty, C. (2001). The
deadliest stable continental region earthquake occurred near Bhuj on 26 January 2001. Journal of Seismology, 5(4): 609-615
2. Singh, A. P., Mishra, O. P., Rastogi, B. K., & Kumar, S. (2013). Crustal heterogeneities beneath the 2011 Talala, Saurashtra
earthquake, Gujarat, India source zone: seismological evidence for neo-tectonics. Journal of Asian Earth Sciences, 62: 672-684.
3. Singh, A. P., Mishra, O. P., Yadav, R. B. S., & Kumar, D. (2012). A new insight into crustal heterogeneity beneath the 2001 Bhuj
earthquake region of Northwest India and its implications for rupture initiations. Journal of Asian Earth Sciences, 48: 31-42.
4. Ramancharla, P. K., Chenna, R., Goud, S. S., Sreerama, A. K., Vignesh, G., Sattar, B., ... & Babu, K. (2014). Rapid Visual Screening
for Seismic Evaluation of Existing Buildings in Himachal Pradesh. Technical Report No. 01-2014, Volume-I
5. Jain, S. K. (2016). Earthquake safety in India: achievements, challenges and opportunities. Bulletin of Earthquake Engineering, 14(5):
1337-1436.
6. ASC :: 26 January 2001, M7.7 Bhuj Earthquake/Gujarat Earthquake (Gujarat), India
7. Sinvhal, A., Bose, P. R., Prakash, V., Bose, A., Saraf, A. K., & Sinvhal, H. (2003). Isoseismals for the Kutch earthquake of 26th
January 2001. Journal of Earth System Science, 112(3): 375-383.
8. Chopra, S., Kumar, D., Rastogi, B. K., Choudhury, P., & Yadav, R. B. S. (2012). Deterministic seismic scenario for Gujarat region,
India. Natural hazards, 60(2): 517-540.
9. Thaker, T. P., Rao, K. S., & Gupta, K. K. (2010, December). “Seismic hazard analysis for Surat City and its surrounding region,
Gujarat. In Indian Geotechnical Conference (pp. 163-166).
10. Jaiswal, K., & Sinha, R. (2008). Spatial-temporal variability of seismic hazard in peninsular India. Journal of earth system science,
117(2): 707-718.
11. Srikanth, T., Singh, A. P., Kumar, S., Ramancharla, P. K., & Rastogi, B. K. (2011). Rapid Visual Survey of Existing Buildings in
Gandhidham and Adipur Cities, Kachchh, Gujarat. European Journal of Scientific Research, 41(3): 336-353.
12. J. Visuvasam, J. Simon, R. Chandrasekar, “Seismic Vulnerability Assessment of Existing Residential Building at Vellore”,
International Journal of Civil Engineering and Technology (IJCIET), Volume 8, Issue 4, April 2017, pp. 604–610.

Authors: Tulasi vitta, Shaik saheb basha


Automatic Eye Screening Method Based on a Multi-Anatomical Retinal System Segmentation with
Paper Title:
the Help of Morphology & Fuzzy Logic
Abstract: Eye examination is used to determine Retinal problems at an early stage. Retina screening can be
used to detect various hidden retinal problems including pre-diabetes and diabetes. The doctors will depend on
segmentation results of retinal structures to determine the abnormalities in the eye. A novel algorithm for instant
identification and segmentation of the optic disk (OD) and detection of exudates in human retinal images is
described in this document. The proposed technique uses segmentation methodology for automatically detecting
of these structures. This methodology uses morphology theories and fuzzy techniques to detect the structures
even in pathological images. The performance is evaluated using two datasets that is DRISHI-GS (optic disc)
and DIARETD1 (exudates). Present methods have accuracy and efficiency is less, but in the proposed new
novel method i.e morphology based fuzzy logic, we achieved an accuracy 92.91% and PPV (positive predictive
value) is 89.54% in optic disc. specificity and F-score also trained with help of subjected method 99% and
93.17% in exudates.

Keywords: Retinal structures, optic disc, exudates, morphological theory, fuzzy logic, fuzzy c-means, convex
hull transform.

References:

1. J.Almotiri “A multi-anatomical retinal structure segm- entation system for automatic eye screening using Morphology adaptive fuzzy
thresholding”opthalmology Vol6 may 2018.
2. M. S. Haleem, L. Han, J. van Hemert, B. Li, and A. Fleming "Retinal area detector from Scanning Laser Ophthalmoscope (SLO) images
for diagnosing retinal diseases," IEEE journal of biomedical and health informatics, vol. 19, pp. 1472-1482, 2015.
122. 3. H. Kolb, "Simple anatomy of the retina," 2012.
4. B. Harangi and A. Hajdu, ``Automatic exudate . detection by fusing multiple active contours and regionwiseclassi_cation,'' Comput.
Biol. Med.,vol. 54, pp. 156_171, Nov. 2014.
5. M. S. Haleem, L. Han, J. van Hemert, B. Li, and A. Fleming "Retinal area detector from Scanning Laser Ophthalmoscope (SLO) images
724-729
for diagnosing retinal diseases," IEEE journal of biomedical and health informatics, vol. 19, pp. 1472-1482, 2015
6. J. Cheng et al., ``Superpixelclassi_cation based optic Disc and optic cup segmentation for glaucoma screening,'' IEEE Trans. Med.
Imag., vol. 32,no. 6, pp. 1019_1032, Jun. 2013.
7. S. Bharkad, ``Automatic segmentation of optic disk in retinalimages,''Biomed. Signal Process. Control, vol. 31, pp. 483_498, Jan. 2017.
8. C. A. Lupascu, D. Tegolo, and L. Di Rosa, ``Automated detection of opticdisc location in retinal images,'' in Proc. 21st IEEE Int. Symp.
Comput. Based Med. Syst. (CBMS), Jun. 2008, pp. 17_22.
9. A. Sopharak, B. Uyyanonvara, and S. Barman, ``Automatic exudate detection from non-dilated diabetic retinopathy retinal images using
fuzzy C-means clustering,'' Sensors, vol. 9, no. 3, pp. 2148_2161, 2009.
10. M. M. Fraz, W. Jahangir, S. Zahid, M. M. Hamayun, and S. A. Barman,``Multiscale segmentation of exudates in retinal images using
contextual cues and ensembleclassi_cation,'' Biomed. Signal Process. Control,vol. 35, pp. 50_62, May 2017.
11. T. Yedidya and R. Hartley, "Tracking of Blood Vessels in Retinal Images Using Kalman Filter," in 2008 Digital Image Computing:
Techniques and Applications, 2008, pp. 52-58.
12. D. W. K. Wong et al., ``Level-set based automatic cup-to- discratiodetermination using retinal fundus images in ARGALI,'' in Proc.
30thAnnu. Int. Conf. IEEE Eng. Med. Biol. Soc. (EMBS), Aug. 2008,pp. 2266_2269
13. M. U. Akram, S. Khalid, A. Tariq, S. A. Khan, and F. Azam, ``Detection and classi_cation of retinal lesions for grading of diabetic
retinopathy,''Comput. Biol. Med., vol. 45, pp. 161_171, Feb. 2014.
14. D. Welfer, J. Scharcanski, and D. R. Marinho, ``A coarse- to-_ne strategy for automatically detecting exudates in color eye fundus
images,'' Comput.Med. Imag. Graph., vol. 34, pp. 228_235, 2010.
15. T. Mapayi and J.-R. Tapamo, ``Difference image and fuzzy C-means for detection of retinal vessels,'' in Proc. IEEE Southwest Symp.
Image Anal.Interpretation (SSIAI), Mar. 2016, pp. 169_172.
16. V. R. P. Borges, D. J. dos Santos, B. Popovic, and D. F. Cordeiro, ``Segmentation of blood vessels in retinal images based on nonlinear
_ltering,'' in Proc. IEEE 28th Int. Symp. Comput.-Based Med. Syst., Jun. 2015,pp. 95_96.
17. R. GeethaRamani and L. Balasubramanian, ``Retinal blood vessel segmentationemploying image processing and data mining techniques
for computerized retinal image analysis,'' Biocybernetics Biomed. Eng., vol. 36 no. 1, pp. 102_118, 2016.
18. S.SahebBaha and Dr.K.Satya Prasad, “Automatic Detectionof Hard Exudates in Diabetic Retinopathy Using Morphological
Segmentation and FuzzyLogic,” IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.12, December
2008.
Nurul Uyun Abd Aziz, Noorzaliza Osman, Noor Aiwa Rosman, Nur Khairunisa Abu Talip,
Authors:
Chamnan Chinnasee, Ali Md Nadzalan
Paper Title: The Effects of Elbow Flexion Angles on Handgrip Force Production among Trained Women
Abstract: The objective of this study was to determine the effects of elbow flexion angles on handgrip force
production. 200 women involved voluntarily as participants in this study. Participants were required to perform
handgrip dynamometer strength test in three elbow flexion angle conditions; i) 0˚ (full extension), ii) 90˚ and iii)
full degrees. Participants were given three trials for each side (dominant and non-dominant) in all three elbow
123. flexion angles. Results showed that in all elbow flexion angles, dominant handgrip force were higher compared
to the non-dominant side. Besides that, performing handgrip with 0˚ elbow flexion produced greatest force 730-732
followed by 90˚ and full elbow flexion. To conclude, testers need to standardize the handgrip strength test
procedures as different in elbow flexion angles and the use of dominant/non-dominant sides were shown to
significantly affect the force production.

Keywords: Elbow flexion, Angle, Force production, Asymmetries, Handgrip.


References:
1. McGinnis, P.M., Biomechanics of sport and exercise. 2013: Human Kinetics.
2. Bohannon, R.W., Muscle strength: clinical and prognostic value of hand-grip dynamometry. Current Opinion in Clinical Nutrition &
Metabolic Care, 2015. 18(5): p. 465-470.
3. Gerodimos, V., Reliability of handgrip strength test in basketball players. Journal of Human Kinetics, 2012. 31: p. 25-36.
4. Dias, F.M., et al., Functional capacity of oldest old living in a long-stay institution in Rio De Janeiro, Brazil. Journal of Physical
Therapy Science, 2014. 26(7): p. 1097-1105.
5. Kumar, A.S., et al., A study of grip endurance and strengh in different elbow positions. Journal of Orthopaedics and Traumatology,
2008. 9(4): p. 209-211.
6. Schmidt, R.T. and J. Toews, Grip strength as measured by the Jamar dynamometer. Archives of Physical Medicine and
Rehabilitation, 1970. 51(6): p. 321.
7. Kenney, W.L., J.H. Wilmore, and D.L. Costill, Physiology of sport and exercise. 2015: Human Kinetics.
8. Kaltenborn, F.M., O. Evjenth, and W. Hinsen, Mobilization of the extremity joints. 1980: Olaf Norlis Bokhandel.
9. Josephson, R.K., Extensive and intensive factors determining the performance of striated muscle. Journal of Experimental Zoology,
1975. 194(1): p. 135-153.
10. Zierler, K.L., Mechanism of muscle contraction and its energetics. Medical Physiology, 1974. 1: p. 84.
11. Fugl‐Meyer, A.R., et al., Is muscle structure influenced by genetical or functional factors? A study of three forearm muscles. Acta
Physiologica Scandinavica, 1982. 114(2): p. 277-281.
12. Chinnasee, C., et al. Kinematics analysis of dominant and non-dominant lower limb during knee strike among MuayThai beginners. in
Journal of Physics: Conference Series. 2018. IOP Publishing.
13. Bechtol, C.O., Grip test: the use of a dynamometer with adjustable handle spacings. JBJS, 1954. 36(4): p. 820-832.
14. Nadzalan, A.M., The effects of forearm position on handgrip strength. Jurnal Sains Sukan dan Pendidikan Jasmani, 2013. 2(1): p. 1-8.

Authors: Gunjan V. Keswani


Ensure Security for Mapreduce-Hadoop Distributed File System using Encryption Method Over
Paper Title:
Big Data
Abstract: Big data security is the most focused research issue nowadays due to their increased size and the
complexity involved in handling of large volume of data. It is more difficult to ensure security on big data
handling due to its characteristics 4V’s. With the aim of ensuring security and flexible encryption computation
on big data with reduced computation overhead in this work, framework with encryption (MRS) is presented
with Hadoop Distributed file System (HDFS). Development of the MapReduce paradigm needs networked
attached storage in addition to parallel processing. For storing as well as handling big data, HDFS are
extensively utilized. This proposed method creates a framework for obtaining data from client and after that
examining the received data, excerpt privacy policy and after that find the sensitive data. The security is
guaranteed in this framework using key rotation algorithm which is an efficient encryption and decryption
technique for safeguarding the data over big data. Data encryption is a means to protect data in storage with
containing a key encryption saved and accessible to reuse the data while required. The outcome shows that the
research method guarantees greater security for enormous amount of data and gives beneficial info to related
clients. Therefore the outcome concluded that the proposed method is superior to the previous method. Finally,
this research can be applied effectively on the various domains such as health care domains, educational
domains, social networking domains, etc which require more security and increased volume of data.

Keywords: Big data, security, Hadoop, MapReduce, encryption.

References:
124. 1. Y. Li, et al., “Big Data Model of Security Sharing Based on Blockchain”, Big Data Computing and Communications (BIGCOM), 2017
3rd International Conference, IEEE, 2017.
2. N. Miloslavskaya, “Security Intelligence Centers for Big Data Processing”, Future Internet of Things and Cloud Workshops 733-740
(FiCloudW), 2017, 5th International Conference, IEEE, 2017.
3. L. Qilian, et al, “Security in big data”, Security and Communication Networks, vol. 8(14), 2015, pp. 2383-2385.
4. W. T. Yein, H. Tianfield, and Q. Mair, “Big Data Based Security Analytics for Protecting Virtualized Infrastructures in Cloud
Computing”, IEEE Transactions on Big Data, 2017.
5. A. Bikash, et al., “SD-HDFS: Secure Deletion in Hadoop Distributed File System”, Big Data (BigData Congress), 2016, IEEE
International Congress, 2016.
6. J. Dittrich, and J. Arnulfo and Q. Ruiz, “Efficient big data processing in Hadoop MapReduce”, Proceedings of the VLDB Endowment,
vol. 5(12), 2012, pp. 2014-2015.
7. A. A. Suliman, “A space-and-time efficient technique for big data security analytics”, Information Technology (Big Data Analysis)
(KACSTIT), Saudi International Conference, IEEE, 2016.
8. R.A. Achana, S. Ravindra, S. Hegadi, and T. N. Manjunath, “A novel data security framework using E-MOD for big data”, Electrical
and Computer Engineering (WIECON-ECE), 2015, IEEE International WIE Conference, 2015.
9. T.W. Arthur and I.D Dinov, “Sharing big biomedical data”, Journal of big data, vol. 2(1), 2015, pp.7.
10. L. Chang, et al., “Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates”, IEEE
Transactions on Parallel and Distributed Systems, vol. 25(9), 2014, pp. 2234-2244.
11. R Farah Sayeed, S Princey, S Priyanka, “Deployment of Multicloud Environment with Avoidance of DDOS Attack and Secured Data
Privacy”, International Journal of Applied Engineering Research, Vol 10 (9), 8121-8124.
12. G. Vijay, et al., “Computing on masked data to improve the security of big data”, Technologies for Homeland Security (HST), 2015
IEEE International Symposium.
13. Islam, Md Rafiqul, and Md Ezazul Islam, “An approach to provide security to unstructured Big Data”, Software, Knowledge,
Information Management and Applications (SKIMA), 2014 8th International Conference (IEEE).
14. S. Sehrish, G. Mackey, P. Shang, J. Wang, and J. Bent, “Supporting HPC analytics applications with access patterns using data
restructuring and data-centric scheduling techniques in MapReduce”, IEEE Transactions on Parallel and Distributed Systems, vol.
24(1), 2013, pp.158-168.
15. W. Wang, Y. Tan, Q. Wu, Q and Y. Zhang, “micMR: An efficient MapReduce framework for CPU–MIC heterogeneous architecture”,
Journal of Parallel and Distributed Computing, vol. 93, 2016, pp. 120-131.

Authors: M. Rajasekar, A. Udhayakumar


Paper Title: Advanced Tamil POS Tagger for Language Learners
Abstract: In the emerging technology Natural Language Processing, machine translation is one of the
important roles. The machine translation is translation of text in one language to another with the
implementation of Machines. The research topic POS Tagging is one of the most basic and important work in
Machine translation. POS tagging simply, we say that to assign the Parts of speech identification for each word
in the given sentence. In my research work, I tried the POS Tagging for Tamil language. There may be some
numerous research were done in the same topic. I have viewed this in different and very detailed
implementation. Most of the detailed grammatical identifications are made for this proposed research. It is very
useful to know the basic grammar in Tamil language.

125. Keywords: Natural Language Processing, Machine Translation, Parts of Speech Tagging, POS Tagger for
Tamil. 741-745

References:

1. Dhanalakshmi V, Anandkumar M, Shivapratap G, Soman, K P, Rajendran S, Tamil POS Tagging using Linear Programming, In
International Journal of Recent Trends inEngineering, May 2009, 1(2):166-169.
2. Arulmozhi et al , A rule based POS tagger for Tamil, 2004.
3. R. Akilan, E.R. Naganathan , POS Tagging for Classical Tamil Texts, International Journal of Business Intelligent, Vol: 1 No.1,
January-June 2012.
4. Dhanakshmi V et al, POS Tagger and Chunker for Tamil Language, 2013.
5. Arulmozhi P and Sobha L, A hybrid POS tagger for Tamil using HMM technique and a rulebased system, 2006.
6. Nithish Chandra, Sudhakar Kumawat and Vinayak Srivastava, Various Tagsets for Indian Languages and their performance in POS
Tagging, Proceedings of 5th IRF Conference, Chennai, 23rd March 2014.
Authors: Anitha N, Srividya P

Paper Title: Balanced XOR/XNOR Circuits using CNTFET


Abstract: In this work, a standard design methodology in different logic styles using Carbon Nano Tube field
effect transistor is proposed to construct Balanced XOR/XNOR circuit. The Proposed methodology is build on
different basic cells to optimize area, power dissipation and delay. The circuits for Balanced XOR/XNOR can be
designed with selecting a Elementary basic cell including two independent inputs and two complementary
outputs. The basic cell is then combined with various correction and optimization techniques to build a perfect
XOR/XNOR circuit to avoid weak zero and week one at the output. Simulation results of the proposed circuits
shows better performances in terms of delay, power and PDP. The proposed circuits are evaluated using cadence
virtouso.

Keywords: CNTFET, Adder Circuits, Balanced XOR/XNOR Circuits, Low Power, Delay, power delay
product.
126.
References:
746-751
1. C.-H.Chang, J.Gu, and M.Zhang, A review of 0.18- m full adder performances for tree structured arithmetic circuits. IEEE Trans. Very
Large Scale Integr. (VLSI) Syst. 13, 686 (2005).
2. S.Goel, M.A.Elgamel, M.A.Bayoumi, and Y.Hanafy, Design methodologies for high–performance noise-tolerant XOR– XNOR
circuits. IEEE Trans. Circuits yst. I: Reg. Papers 53, 867 (2006).
3. Tooraj Nikoubin, Amirali Baniasadi, Fatemeh Eslami, Keivan Navi , A new cell design methodology for balanced XOR/XNOR
circuits for hybrid CMOS logic. Journal of Low Power Electronics • December 2009.
4. Felix Obitea,b , Geoffrey Ijeomahc and Joseph Stephen Bassia, Carbon nanotube field effect transistors: toward future nanoscale
electronics, International Journal of Computers and Applications, 2018.
5. Atheer Al-Shaggah, Mohammed Khasawneh, and Abdoul Rjoub, Carbon Nano Tube Field Effect Inverter: Delay Time & Power
Consumption Analysis, Conference Paper • December 2015 DOI: 10.1109/JIEEEC.2015.7470750.
6. Anitha, N. and Dr. Srividya, P, “Comparative study of different Technologies to replace CMOS Technology”. International Journal of
current research. Sep 2017.
7. Atheer Al-Shaggah, Abdoul Rjoub, Mohammed Khasawneh, Carbon Nanotube Field effect Transistor Models performance and
Evaluation, 2013 IEEE Jordan Conference on Applied Electrical Engineering and Computin Technologies (AEECT).K. Elissa, “Title
of paper if known,” unpublished.

Authors: P. Balaji, S. Sreenivasa Murthy

Paper Title: Web 2.0: An Evaluation of Social Media Networking Sites


Abstract: Purpose of This Paper: This research was conducted to understand the socio-economic conditions
of the peoples in the Chennai city. To examine the preference of employed youth with respect to social media
networking sites and to categorise the selected social media networking sites based on the Importance cum
Performance perception analysis of customers in Chennai city of Tamil Nadu. The empirical and exploratory
research design was adopted by employing survey method to collect responses from target population through
convenient non-probability sampling method. The primary data collected were subjected to analysis using SPSS
version 23.0 and the statistical tools such as, percentage analysis, descriptive statistics, reversed weighed average
mean ranking and Multi-Dimensional Scale Approach was adopted to draw meaningful answers to research
objectives. The employed youth were classified into two categories based on the social media usage namely,
highest users and high users. The Elucidean scaling map reveals the relative positions of the different social
media networking sites in different quadrants and it was categorised namely, Excellent Performance / Extremely
Important, Excellent Performance/Slightly Important, Extremely Important/Fair Performance and Slightly
Important/Fair Performance. This study concluded that digital marketers are advised to market their products
127. and services in the Whatsapp, Facebook, YouTube and Instagram social media networking sites. Since, these
sites are highly preferred by the employed youth in the study area for the purpose devising the effective social
media marketing strategies. Snapchat and Pinterest are the two least preferred social media networking sites
among the employed youth. Finally, the employed youth are suggested to use the social media networking sites 752-759
actively, intelligently and efficiently rather, burning their valuable time of routine life. This research paper aimed
to explore the usage and preference of employed youth towards selected social media networking sites. The
Multi-Dimensional Scaling (MDS) approach was adopted to find the relative positions of the different social
media networking sites in different quadrants.

Keywords: Social Media, Web 2.0, Employed Youth, Importance and Performance.

References:

1. Benson, V., & Morgan, S. (2018). Measuring the social impact: how social media affects higher education institutions. In Social Media
Marketing: Breakthroughs in Research and Practice (pp. 1167-1184). IGI Global.
2. Bianchi, C., & Andrews, L. (2015). Investigating marketing managers' perspectives on social media in Chile. Journal of Business
Research, 68(12), 2552-2559.
3. Borg, I., &Groenen, P. (2003). Modern multidimensional scaling: theory and applications. Journal of Educational Measurement, 40(3),
277-280.
4. Carroll, J. D., & Chang, J. J. (1970). Analysis of individual differences in multidimensional scaling via an N-way generalization of
“Eckart-Young” decomposition. Psychometrika, 35(3), 283-319.
5. Chen, X., & Tao, J. (2012, November). The Impact of Users' Participation on EWoM on Social Commerce Sites: An Empirical
Analysis Based on Meilishuo. com. In Multimedia Information Networking and Security (MINES), 2012 Fourth International
Conference on (pp. 810-815). IEEE.
6. Cox, T. F., & Cox, M. A. (2000). Multidimensional scaling. Chapman and hall/CRC.
7. Cronbach, L. J. (1951). Coefficient alpha and the internal structure of tests. Psychometrika, 16(3), 297-334.
8. Cross, K. (2018). From Visual Discipline to Love-Work: The Feminising of Photographic Expertise in the Age of Social Media. In The
New Normal of Working Lives (pp. 65-85). Palgrave Macmillan, Cham.
9. Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly. 13
319-339.
10. Davison, M. L. (1992). Multidimensional scaling. Malabar, FL: Krieger Original edition, New York: Wiley, 198
11. Day, G. S., &Wensley, R. (1988). Assessing advantage: a framework for diagnosing competitive superiority. Journal of marketing,
52(2), 1-20.
12. Dwyer, Catherine., Hiltz, S. R., & Widmeyer, G. (2008, January). Understanding development and usage of social networking sites:
The social software performance model. In Hawaii International Conference on System Sciences, Proceedings of the 41st Annual (pp.
292-292). IEEE.
13. El Ouirdi, A., El Ouirdi, M., Segers, J., &Henderickx, E. (2015). Employees' use of social media technologies: a methodological and
thematic review. Behaviour & Information Technology, 34(5), 454-464.
14. Ellison, N. B., Steinfield, C., & Lampe, C. (2007). The benefits of Facebook “friends:” Social capital and college students’ use of
online social network sites. Journal of computer-mediated communication, 12(4), 1143-1168.
15. Enright, M. J., & Newton, J. (2004). Tourism destination competitiveness: a quantitative approach. Tourism management, 25(6), 777-
788.
16. Giguère, G. (2006). Collecting and analyzing data in multidimensional scaling experiments: A guide for psychologists using SPSS.
Tutorials in Quantitative Methods for Psychology, 2(1), 27-38.
17. Gosling, S. D., Augustine, A. A., Vazire, S., Holtzman, N., & Gaddis, S. (2011). Manifestations of personality in online social
networks: Self-reported Facebook-related behaviors and observable profile information. Cyberpsychology, Behavior, and Social
Networking, 14(9), 483-488.
18. Heinonen, K. (2011). Consumer activity in social media: Managerial approaches to consumers' social media behavior. Journal of
Consumer Behaviour, 10(6), 356-364.
19. Ifinedo, P. (2016). Applying uses and gratifications theory and social influence processes to understand students' pervasive adoption of
social networking sites: Perspectives from the Americas. International Journal of Information Management, 36(2), 192-206.
20. IpekOzera,*, Aryn C. Karpinskia Paul A. Kirschner. (2014). A cross-cultural qualitative examination of social-networking sites and
academic performance. International Conference on Education & Educational Psychology 2013 (ICEEPSY 2013). Procedia - Social
and Behavioral Sciences 112, 873 – 881.
21. Kamel Boulos, M. N., & Wheeler, S. (2007). The emerging Web 2.0 social software: an enabling suite of sociable technologies in
health and health care education. Health Information & Libraries Journal, 24(1), 2-23.
22. Kaplan, A. M., &Haenlein, M. (2010). Users of the world, unite! The challenges and opportunities of Social Media. Business horizons,
53(1), 59-68.
23. Khurana, N. (2015). The impact of social networking sites on the youth. J Mass Communicat Journalism, 5(12), 1-4.
24. Kucukemiroglu, S., & Kara, A. (2015). Online word-of-mouth communication on social networking sites: An empirical study of
Facebook users. International journal of commerce and management, 25(1), 2-20.
25. Kwon, Ohbyung., & Wen, Yixing. (2010). An empirical study of the factors affecting social network service use. Computers in human
behavior, 26(2), 254-263.
26. Leftheriotis, I., & Giannakos, M. N. (2014). Using social media for work: Losing your time or improving your work?. Computers in
Human Behavior, 31, 134-142.
27. Livingstone, S. (2008). Taking risky opportunities in youthful content creation: teenagers' use of social networking sites for intimacy,
privacy and self-expression. New media & society, 10(3), 393-411.
28. Luttrell, R. (2018). Social media: How to engage, share, and connect. Rowman & Littlefield.
29. Maier, C., Laumer, S., Eckhardt, A., & Weitzel, T. (2015). Giving too much social support: social overload on social networking sites.
European Journal of Information Systems, 24(5), 447-464.
30. Malhotra, A., Sharma, R., Srinivasan, R., & Mathew, N. (2018). Widening the arc of indigenous communication: Examining potential
for use of ICT in strengthening social and behavior change communication efforts with marginalized communities in India. The
Electronic Journal of Information Systems in Developing Countries, e12032.
31. Malhotra, N. K. & Dash, S.,(2011). Marketing Research: An applied Orientation (6th ed.). NJ: Pearson Education.
32. Martilla, J. A., & James, J. C. (1977). Importance-performance analysis. The journal of marketing, 77-79.
33. Matur, Amani. (2018, February). The impact of social networking sites on employees' performance. In Learning and Technology
Conference (L&T), 2018 15th (pp. 14-19). IEEE.
34. McCombs, M. (2018). Setting the agenda: Mass media and public opinion. John Wiley & Sons.
35. McLoughlin, C., & Lee, M. (2007). Social software and participatory learning: Pedagogical choices with technology affordances in the
Web 2.0 era.
36. Mishra, A., Maheswarappa, S. S., Maity, M., &Samu, S. (2018). Adolescent's eWOM intentions: An investigation into the roles of
peers, the Internet and gender. Journal of Business Research, 86, 394-405.
37. Moqbel, M., & Aftab, F. (2015). Employees’ social networking site use impact on job He also contributed many empirical research
articles to various eminent national and international level journals in the field of commerce and management.performance: evidence
from Pakistan. AIS Trans. Replication Res, 1(6), 1-10.
38. Moran, G., Muzellec, L., & Nolan, E. (2014). Consumer moments of truth in the digital context: How “search” and “e-word of mouth”
can fuel consumer decision making. Journal of Advertising Research, 54(2), 200-204.
39. Park, E., Rishika, R., Janakiraman, R., Houston, M. B., &Yoo, B. (2018). Social dollars in online communities: The effect of product,
user, and network characteristics. Journal of Marketing, 82(1), 93-114.
40. Parvathy, J., &Suchithra, R. (2015). Impact of Usage of Social Networking Sites on Youth. International Journal of Computer
Applications, 129(3), 33-34.
41. Perreault, M. C., & Mosconi, E. (2018, January). Social media engagement: Content strategy and metrics research opportunities. In
Proceedings of the 51st Hawaii International Conference on System Sciences.
42. Quan-Haase, A., & Young, A. L. (2010). Uses and gratifications of social media: A comparison of Facebook and instant messaging.
Bulletin of Science, Technology & Society, 30(5), 350-361.
43. Ryan, D. (2015). Understanding social media: how to create a plan for your business that works. Kogan Page Publishers.
44. Sauti, G. (2012). Anthropology in the digital age: An analysis of social interaction on networking sites (Doctoral dissertation).
45. Shi, J., Hu, P., Lai, K. K., & Chen, G. (2018). Determinants of users’ information dissemination behavior on social networking sites:
An elaboration likelihood model perspective. Internet Research, 28(2), 393-418.
46. Srivastava, D. K., Roychoudhury, B., &Samalia, H. V. (2018, January). Importance of User's Profile Attributes in Identity Matching
Across Multiple Online Social Networking Sites. In 2018 8th International Conference on Cloud Computing, Data Science &
Engineering (Confluence) (pp. 14-15). IEEE.
47. Statista (2018) Retreived from Online: https://www.statista.com/statistics/278407/number-of-social-network-users-in-india/
48. Tontini, G. (2016). Identifying opportunities for improvement in online shopping sites. Journal of Retailing and Consumer Services,
31, 228-238.
49. Valenzuela, S., Park, N., & Kee, K. F. (2009). Is there social capital in a social network site?: Facebook use and college students' life
satisfaction, trust, and participation. Journal of computer-mediated communication, 14(4), 875-901.
50. Valkenburg, P. M., Peter, J., & Schouten, A. P. (2006). Friend networking sites and their relationship to adolescents' well-being and
social self-esteem. Cyber Psychology &Behavior, 9(5), 584-590.
51. Vaterlaus, J. M., Patten, E. V., Roche, C., & Young, J. A. (2015). # Gettinghealthy: The perceived influence of social media on young
adult health behaviors. Computers in Human Behavior, 45, 151-157.
52. Veale, H. J., Sacks-Davis, R., Weaver, E. R., Pedrana, A. E., Stoové, M. A., &Hellard, M. E. (2015). The use of social networking
platforms for sexual health promotion: identifying key strategies for successful user engagement. BMC public health, 15(1), 85.
53. Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies.
Management science, 46(2), 186-204.
54. Young, E W., & Harris, D. E (1993). Multidimensional scaling. In M. J. Noursis (Ed.). SPSS for windows: Professional statistics
(computer manual, version 6.0) (pp. 155-222). Chi- cago: SPSS.
55. Young, F. W. (2013). Multidimensional scaling: History, theory, and applications. Psychology Press.
56. Yu, L., Cao, X., Liu, Z., & Wang, J. (2018). Excessive social media use at work: Exploring the effects of social media overload on job
performance. Information Technology & People, 31(6), 1091-1112.

Authors: Amit Kr. Uniyal, Anil Kr. Dixit, Pooja Kanojia


Effects of Stress among the Faculty Working in Private Universities and Colleges with Special
Paper Title:
Reference to Uttarakhand (India)
Abstract: The faculty plays a vital role in the higher education industry, in business and social environment in
India, which is changing very drastically in achieving the organizational visions. The aim was to focus and
analyze the level and the impact of stress among academies of the private Universities and colleges in
Uttarakhand and also to analyze the factors responsible for stress on them in academics in today’s scenario. The
after effects and the repercussions which may be burnout of the individuals in the education industry due to
stress, is also tried to be covered. These are very evident now days.For this purpose the privately owned
Universities and colleges are covered. The observation shows that the faculties are in a stress due to certain
different reasons. Occupational stress index was used to measure the level of the stress and its impact on the
faculties. The empirical analysis on the basis of the data collected shows that factors like role overload, role
ambiguity, role conflict are reasons for stress among females faculties. But the factors like political pressure are
responsible for creating the stress in both. The research shows that there are different factors causing stress on at
different age groups, some cause stress approximately at similar level on both. It can be restricted by reducing
the role conflict, role ambiguity and putting a check on the factors like organizational politics.
128. Keywords: Occupational Stress, Role Ambiguity, Strenuous Working Condition.
760-766
References:

1. K.Soundarapandiyan, T.Praveen Kumar & M.Kirupa Priyadarshin, Effects Of Workplace Fun On Employee Behaviors: An Emprical
study,International Journal of Mechanical and Production Engineering and Development, (IJMPERD) ,ISSN (P): 2249-6890; ISSN
(E): 2249-8001 Vol. 8, Special Issue 3, Dec 2018, 1040-1050 .
2. Kalyanasundaram, Priya. An Effect of Stress among Medical Representatives Working in Coimbatore City, Tamil Nadu, India
European Journal of Social Sciences ISSN 1450-2267 Vol. 55 No 4 December, 2017, pp.452-461.
3. Armstrong M. (2001) A Handbook Of Human Resource Management, Great Britain: Kogan.2001
4. Borg, M.G. Riding, R.J. Occupational Stress and satisfaction in teaching. British Educational Research Journal. 1991, 17(3), pp. 263-
281.
5. Johnson, S., Cooper, C., Cartwright, S., Donald, I., Taylor, P. & Millet, C. (2006).The experience of work related stress across
occupations. Journal of Managerial Psychology, 20, 178-187
6. Cooper, C., Dewe, P. J., & O'Driscoll, M. P. (2001). Organizational stress: A review and critique of theory, research, and
applications. Thousand Oaks, CA: Sage
7. References Boyle, G. J., Borg, M. G., Falzon, J. M. & Baglioni, J. A. (1995). A structural model of the dimensions
8. Gillespie, N. A., Walsh, M. J., Winefield, A. H., Stough, C. K., & Dua, J. K. (2000). Occupational stress within Australian
universities: Staff perceptions of the determinants, consequences ``and moderators of work stress. 35th Annual Conference of the
``Australian Psychological Society, Canberra.
9. Winefield, A. H. (2000). Stress in academe: Some recent research findings. In D. T. Kenny, J. G. Carlson, F. J. McGuigan, & J. L.
Sheppard (Eds.), Stress and health (pp. 437–446). Amsterdam: Harwood Academic Publishers.
10. WATTS, W. D. and SHORT, A. P. (1990). 'Teacher drug use: a response to occupational stress', Journal of Drug Education, 20,1, 47-
65
11. Agarwal, S., Durga P., Sayal, A., (2016).A Comparative Study of Work Related Stress among Government an Private College Faculty
in Uttarakhand State, The International Journal of Business and Management , 4, 5, pp. 85-94.
12. Ahsan, N., Abdullah, Z., Fie, D.Y.G. and Alam , S.S. (2009) A study of job stress on job satisfaction among university staff in
Malaysia: Empirical Study. European Journal of Social Sciences, 8, 121-131.
13. Pandey Rakesh and Tripathi Seema , (2001), Occupational Stress and Burnout in Engineering College Teachers, Journal of the Indian
Academy of Applied Psychology, 2001, 27, 1-2, 67-73.
14. Arlene Gray Blix et. al, (1994) Occupational stress among university teachers, Educational Research 36, 2, Summer.
15. Kumar Shiva and Mohammad, Dr. Siddique, (2011) A Study on Occupational Stress Among IT Professionals Chennai. International
Journal of management Research and Review.1, 5, 210-215.

Authors: P. Gomathi, S. Gowri, A. Viswanathan, T. A. Selvan, S. Madhankumar


Mathematical Analysis and Mechanical Modeling of an Inoculation System on Feeder Control for
Paper Title:
Pouring Unit in a Foundry Station
Abstract: This paper presents on feeder control; the inoculation device has been designed to automatically add
inoculating powder to metal stream working with an automatic pouring unit. This system applies a constant
dosage of inoculant easily modified by the control unit, with precise repeatability of the process. It incorporates a
system of the instant direction of faults at all times, to ensure proper operation. In this project, the human effort
is reduced by automating the inoculant feeding mechanism performed in a foundry. By doing pouring in manual
manner, it ends up in reducing the rejection of production 2% owing to poor inoculation which disturbs the
company's production. This system is used to feed the inoculant to the molten metal in a highly precise amount
as per the requirements. After researching various feeding mechanisms, concluded with feeding machine with
the help of screw which is more adoptable for desirable number of inoculants to be transferred. The
mathematical analysis has been done and it is proven that satisfies the design criterions for modeling of the
proposed system. The mechanical modeling is designed in such a way that inoculant occupies in two class of
separate hoppers.

Keywords: Inoculation, mathematical analysis, pouring unit, foundry and screw feeding.

129. References:

1. Fengzhang REN, Fengjun LI, Weiming LIU, Zhanhong MA and Baohong TIAN, “Effect of inoculating addition on machinability of 767-770
gray cast iron”, Journal of Rare Earths, Volume 27, Issue 2, April 2009, Pages 294-299.
2. JinpeiYan, QiLin, ShuhuiZhao and LiqiChen, “Effect of seed nuclei combined with acoustic field on fine particles removal”, Powder
Technology, Volume 340, December 2018, Pages 8-16.
3. Haozhen Zhang, Cheng Zhou and Chunxiao Wei, “Mathematical and physical modeling of metal delivery system during top side-
pouring twin-roll casting”, Journal of Materials Processing Technology, Volume 254, April 2018, Pages 1-12.
4. Biba Nebbad-Lechani, Aurelie Emirian, Fabienne Maillebuau, Nadia Mahjoub, Vincent Fihman, Patrick Legrand and Jean-
WinocDecousser, “New procedure to reduce the time and cost of broncho-pulmonary specimen management using the Previ Isola®
automated inoculation system”, Journal of Microbiological Methods, Volume 95, Issue 3, December 2013, Pages 384-388.
5. Yijiang Xu, Daniele Casari, RagnvaldH.Mathiesenand Yanjun Li, “Revealing the heterogeneous nucleation behavior of equiaxed
grains of inoculated Al alloys during directional solidification”, Acta Materialia, Volume 149, 1 May 2018, Pages 312-325.
6. Giovani Aud Lourenco, Thais LogettoCaetite Gomes, Claudio Roberto Duarte and Carlos Henrique Ataide, “Experimental study of
efficiency in pneumatic conveying system's feeding rate”, Powder Technology, Volume 343, 1 February 2019, Pages 262-269.
7. Tengfei Wang, Jiankun Liu, Bowen Tai, Chuanzhen Zang and Zhichun Zhang, “Frost jacking characteristics of screw piles in
seasonally frozen regions based on thermo-mechanical simulations”, Computers and Geotechnics, Volume 91, November 2017, Pages
27-38.
8. S. Madhankumar, M. Jishnu, J. Karthick Prithiv, S. Gowrishankar, S. Rajesh and R. Balamurugan, “Design and Modelling of Disaster
Relief Vehicle using Rocker Bogie Mechanism”, International Journal of Innovative Technology and Exploring Engineering (IJITEE),
Volume-8, Issue-6, April 2019, Pages 1274-1276.
9. T. A. Selvan, A. Viswanathan, S. Madhankumar and S. Sneha, “Design and Fabrication of Automated Powder Coating System”,
International Journal of Engineering and Advanced Technology (IJEAT), Volume-8 Issue-5, June 2019, Pages 899-902.
10. Text book, “Design Data”, PSG College of Technology, Kalai kathir Achagam, ISBN-13 9788192735504.
Authors: Ashok K Patil, Siddanagouda S Patil, M Prabhakar
Optimal Classification of Lung Cancer Related Genes using Enhanced reliefF Algorithm and
Paper Title:
Multiclass Support Vector Machine
Abstract: Currently, the automatic lung cancer classification remains a challenging issue for the researchers,
due to noisy gene expression data, high dimensional data, and the small sample size. To address these problems,
an enhanced gene selection algorithm and multiclass classifier are developed. In this research, the lung cancer-
related genes (GEO IDs: GSE10245, GSE19804, GSE7670, GSE10072, and GSE6044) were collected from
Gene Expression Omnibus (GEO) dataset. After acquiring the lung cancer-related genes, gene selection was
carried out by using enhanced reliefF algorithm for selecting the optimal genes. In enhanced reliefF gene
130. selection algorithm, earthmover distance measure and firefly optimizer were used instead of Manhattan distance
measure for identifying the nearest miss and nearest hit instances, which significantly lessens the “curse of
771-778
dimensionality” issue. These optimal genes were given as the input for Multiclass Support Vector Machine
(MSVM) classifier for classifying the sub-classes of lung cancer. The experimental section showed that the
proposed system improved the classification accuracy up to 3-10% related to the existing systems in light of
accuracy, False Positive Rate (FPR), error rate, and True Positive Rate (TPR).

Keywords: Enhanced reliefF algorithm, firefly optimizer, gene selection, microarray gene expression,
multiclass support vector machine.
References:

1. Y. Liang, C. Liu, X.Z. Luan, K.S. Leung, T.M. Chan, Z.B. Xu, and H. Zhang. (2013). Sparse logistic regression with a L1/2 penalty for
gene selection in cancer classification. BMC bioinformatics, 14(1), pp. 198.
2. S. Sayed, M. Nassef, A. Badr and I. Farag. (2019). A Nested Genetic Algorithm for feature selection in high-dimensional cancer
Microarray datasets. Expert Systems with Applications, 121, pp. 233-243.
3. P. He, B. Fan, X. Xu, J. Ding, Y. Liang, Y. Lou, Z. Zhang, and X. Chang. (2019). Group K-SVD for the classification of gene
expression data. Computers & Electrical Engineering, 76, pp. 143-153.
4. H. Salem, G. Attiya, and N. El-Fishawy. (2017). Classification of human cancer diseases by gene expression profiles. Applied Soft
Computing, 50, pp. 124-134, 2017.
5. L. Gao, M. Ye, X. Lu, and D. Huang. (2017). Hybrid method based on information gain and support vector machine for gene selection
in cancer classification. Genomics, proteomics & bioinformatics, 15(6), pp. 389-395, 2017.
6. A. K. Shukla, P. Singh, and M. Vardhan. (2018). A two-stage gene selection method for biomarker discovery from microarray data for
cancer classification. Chemometrics and Intelligent Laboratory Systems, 183, pp. 47-58.
7. Z. Y. Algamal, R. Alhamzawi, and H. T. M. Ali. (2018). Gene selection for microarray gene expression classification using Bayesian
Lasso quantile regression. Computers in biology and medicine, 97, pp. 145-152, 2018.
8. H. Motieghader, A. Najafi, B. Sadeghi, and A. Masoudi-Nejad. (2017). A hybrid gene selection algorithm for microarray cancer
classification using genetic algorithm and learning automata. Informatics in Medicine Unlocked, 9, pp. 246-254.
9. Y. He, J. Zhou, Y. Lin, and T. Zhu. (2019). A class imbalance-aware Relief algorithm for the classification of tumors using microarray
gene expression data. Computational Biology and Chemistry.
10. C. Arunkumar, and S. Ramakrishnan. (2018). Attribute selection using fuzzy roughset based customized similarity measure for lung
cancer microarray gene expression data. Future Computing and Informatics Journal, 3(1), pp. 131-142.
11. R. Alanni, J. Hou, H. Azzawi and Y. Xiang. A novel gene selection algorithm for cancer classification using microarray datasets. BMC
medical genomics, 12(1), pp. 10.
12. S. Wu, H. Jiang, H. Shen, and Z. Yang. (2018). Gene Selection in Cancer Classification Using Sparse Logistic Regression with L1/2
Regularization. Applied Sciences, 8(9), pp. 1569, 2018.
13. H. Azzawi, J. Hou, R. Alanni, Y. Xiang, R. Abdu-Aljabar and A. Azzawi. (2017). Multiclass lung cancer diagnosis by gene expression
programming and microarray datasets, In International Conference on Advanced Data Mining and Applications, pp. 541-553, 2017.
14. M. Sun, K. Liu, Q. Wu, Q. Hong, B. Wang and H. Zhang. (2017). A novel ECOC algorithm for multiclass microarray data
classification based on data complexity analysis. Pattern Recognition, 90, pp. 346-362.
15. R. Al-Anni, J. Hou, R. D. A Abdu-aljabar and Y. Xiang. (2017). Prediction of NSCLC recurrence from microarray data with GEP”,
IET systems biology, 11(3), pp. 77-85.
16. H. Azzawi, J. Hou, Y. Xiang, and R. Alanni. (2016). Lung cancer prediction from microarray data by gene expression programming.
IET systems biology, 10(5), pp. 168-178.

Authors: Ramya C, Shreedhara K S


A Bio-inspired Modified PSO Strategy for Effective Web Information Retrieval using RCV1
Paper Title:
Datasets
Abstract: Information retrieval is a key technology in accessing the vast amount of data present on today’s
World Wide Web. Numerous challenges arise at various stages of information retrieval from the web, such as
missing of plenteous relevant documents, static user queries, ever changing and tremendous amount of document
collection and so forth. Therefore, more powerful strategies are required to search for relevant documents. In this
paper, a PSO methodology is proposed which is hybridized with Simulated Annealing with the aim of
optimizing Web Information Retrieval (WIR) process. Hybridized PSO has a high impact on reducing the query
response time of the system and hence subsidizes the system efficiency. A novel similarity measure called
SMDR acts as a fitness function in the hybridized PSO-SA algorithm. Evaluations measures such as accuracy,
MRR, MAP, DCG, IDCG, F-measure and specificity are used to measure the effectiveness of the proposed
system and to compare it with existing system as well. Ultimately, experiments are extensively carried out on a
huge RCV1 collections. Achieved precision-recall rates demonstrate the considerably improved effectiveness of
the proposed system than that of existing one.

Keywords: Information Retrieval Systems, Web Information Retrieval, Particle Swarm Optimization,
Similarity Functions, Documents Collection.

131. References:

1. Habiba Drias, “Web Information Retrieval using using particle Swarm Optimization Approaches”, in proceedings of International 779-785
Conference on Web Intelligence and Intelligent Aget Technology, 2011, pp. 37-39.
2. Xiaoyu Song, Yang Cao and Chunguang Chang. “A Hybrid Algorithm of PSO and SA for Solving JSP”. Fifth IEEE International
Conference on Fuzzy Systems and Knowledge Discovery. 2008, Pp. 111-115. DOI 10.1109/FSKD.2008.430
3. S. A. Ethni, B. Zahawi, D. Giaouris and P. P. Acarnley. “Comparison of Particle Swarm and Simulated Annealing Algorithms for
Induction Motor Fault Identification”. 7th IEEE International Conference on Industrial Informatics (INDIN 2009). 2009, pp. 470-474.
DOI: 10.1109/INDIN.2009.5195849
4. Horng-Lin Shieh, Cheng-Chien Kuo and Chin-Ming Chiang. “Modified particle swarm optimization algorithm with simulated.
annealing behavior and its numerical verification”. Applied Mathematics and Computation 218, 2011, pp. 4365–4383.
doi:10.1016/j.amc.2011.10.012
5. Yan Zichao and Luo Yangshen. “A Particle Swarm Optimization Algorithm Based on Simulated Annealing”. Advanced Materials
Research Vols. 989-994. 2014, pp. 2301-2305. doi:10.4028/www.scientific.net/AMR.989-994.2301.
6. Xingang Wang and Qi Sun. “The Study of K-Means Based on Hybrid SA-PSO Algorithm”. 9th IEEE International Symposium on
Computational Intelligence and Design. 2016, Pp. 211-214. DOI 10.1109/ISCID.2016.162
7. Nadjat Meziani, Mourad Boudhar and Ammar Oulamara. “PSO and simulated annealing for the two-machine flowshop scheduling
problem with coupled-operations”. European J. Industrial Engineering, Vol. 12, No. 1. 2018, Pp. 43-66. DOI:
10.1504/EJIE.2018.089877
8. Anna Huang. “Similarity Measures for Text Document Clustering”. Proceedings of the New Zealand Computer Science Research
Student Conference. 2018, pp. 49-56. doi=10.1.1.332.4480
9. Anuradha D. Thakare and C.A. Dhote. “An Improved Matching Functions for Information Retrieval Using Genetic Algorithm”. IEEE
International Conference on Advances in Computing, Communications and Informatics (ICACCI). 2013, pp. 770-774.
10. G. SureshReddy, T.V.Rajinikanth and A. Ananda Rao. “Design and Analysis of Novel Similarity Measure for Clustering and
Classification of High Dimensional Text Documents”. International Conference on Computer Systems and Technologies -
CompSysTech’14, Ruse, Bulgaria. 2014, pp. 194-201. http://dx.doi.org/10.1145/2659532.2659615.
11. Komal Maher and Madhuri S. Joshi. “Effectiveness of Different Similarity Measures for Text Classification and Clustering”.
International Journal of Computer Science and Information Technologies, Vol. 7 (4). 2016, pp. 1715-1720.

Authors: Onur Deryahanoglu, Batuhan Kocaoglu


Applications of RFID Systems in Healthcare Management: A Simulation for Emergency
Paper Title:
Department
Abstract: Emergency Departments are the most complex and busiest locations for patient flow in hospitals.
Treatment of acute diseases, accidental injuries, heart attacks or different medical applications are performed in
these centers. At this point, patients should receive effective treatments as soon as possible. Additionally, they
can include in medical procedures such as triage, registration, treatment, transfer or hospitalization when they
apply of this departments. There are many problems in these services due to their complex structure. For
instance; long waiting times, leaving the hospital without excuse or without payment, lack of bed or medical
staff, long staying times. For these reasons, patient cares and treatments will be affected. It is thought that using
of RFID Technology will be expanded in the Emergency Departments that it may decrease long waiting times,
improve the quality of treatment processes and increase patient satisfaction also. In this study, it is aimed to
improve patient safety and quality with sustainable tracking system. In addition, a real-time warning mechanism
will be created by determining the number of optimum medical staff due to this technology. As a result, length
of stay of the patients will be reduced and patient satisfaction will be increased in Emergency Departments.

Keywords: RFID Systems, Healthcare Management, Simulation, Patient Safety.


132.
References:
786-792
1. C. L. Yeung, S. K. (2011). An Investigation of an RFID Based Patient Tracking and Mobile Alert System. International Journal of
Engineering Business Management; Vol: 3, No:1, 50-56.
2. Yen Chieh Huang, C. P. (2010). RFID Applications in Hospitals - A Case Study for Emergency Department. Proceedings of the 16th
International Conference on Distributed Multimedia Systems. Oak Brook, Illinois, USA: ResearchGate.
3. Shivaram P. Arunachalam, A. S. (2017). Optimizing Emergency Department Workflow Using Radio Frequency Identification Device
(RFID) Data Analytics. Proceedings of the 2017 Design of Medical Devices Conference DMD2017-3402. Minneapolis, Minnesota,
USA: ResearchGate.
4. Anastasis C. Polycarpou, G. G. (2011). A Healthcare Application Based on Passive UHF RFID Technology. EU CAP (pp. 2814-2818).
ResearchGate.
5. Aliyu Isah Aliyu, T. A. (2015). Modeling and Simulation Analysis of Healthcare Appointment System Using ARENA. International
Journal of Science and Advanced Information Technology, 1-7.
6. Worthington, D. J. (1987). Queueing Models for Hospital Waiting Lists. Operational Research Society, 413-422.
7. Sima Ajami, A. R. (2013). Radio Frequency Identification (RFID) Technology and Patient Safety. Journal of Research in Medical
Sciences, 809-813.
8. Chia Chen Chen, Y. F. (2012). Smart Healthcare Environment: Design with RFID Technology and Performance Evaluation. Journal of
Medical and Biological Engineering, 427-432.
9. Suhaiza Zailani, M. I. (2014). Determinants of RFID Adoption in Malaysia’s Healthcare Industry: Occupational Level as a Moderator.
Journal of Medical Systems, 39-172.
10. Tao Wang, A. G. (2007). Modeling and Simulation of Emergency Services with ARIS and Arena – Case study: The Emergency
Department of Saint Joseph and Saint Luc Hospital. Production Planning & Control, 1-27.

Authors: Neeraj,Major Singh Goraya, Damanpreet Singh

Paper Title: A Ranking Based Model for Selecting Optimum Cloud Geographical Region
Abstract: Cloud computing has become a dominant service computing model where the services such as
software, platform, infrastructure are provided to the cloud consumers on demand basis using pay as you go
model. Every cloud consumer requires high performance service in minimal cost. The performance of service in
cloudis measured by the parameters availability, agility, cost, and security etc. The service performance and cost
are very much dependent on the cloud geographical region (CGR) where these are deployed. The services
offered by the cloud service provider are installed on multiple data centers located at different CGR. In cloud
environment, the selection of a service installed on the optimum CGR within the limited time overhead is a
challenging and interesting problem. In this paper, the multi criteria decision making method, PROMETHEE II
and objective weighting method Shannon’s Entropy,based ranking model is proposed for solving the optimum
CGR selection problem. The CGR dataset of Amazon Web Service is used for the numerical analysis. The
133. sensitivity analysis is performed for validating the stability of the proposed model and getting the most sensitive
parameter. The applicability and usefulness of the service selection process is validated through the experimental
results on synthetic dataset. Results show that the service selection process is achieved withlimited time 793-797
overhead and hence suitable for online selection process in cloud.

Keywords: Cloud computing, PROMETHEE,Performance, Service selection.

References:

1. Garg. S.K., Versteeg. Buyya. R. S., “A framework for ranking of cloud computing services”, Futur. Gener. Comput. Syst. 29 1012–
1023, 2013.
2. Somu, N., M.R., G. R., Kirthivasan, K., & V.S., S. S., “A trust centric optimal service ranking approach for cloud service
selection”, Future Generation Computer Systems, 86, 234-252, 2018.
3. Garg, N., & Goraya M.S., “Task Deadline-Aware Energy-Efficient Scheduling Model for a Virtualized Cloud”,. Arabian Journal for
Science and Engineering. 43(2), 829-841, 2018.
4. Garg, N., Singh D., & Goraya M. S., Energy-Aware Hardware and Software Approach in Cloud Environment. International Journal of
Computer Science & Communication Networks. 7(3), 66-69, 2017.
5. Garg, N., & Goraya M.S., A Survey on Energy-Aware Scheduling Techniques in Cloud Computing Environment. International Journal
of Computer Science and Information Security (IJCSIS). 14(10), 523-528, 2016.
6. Hasan, M., & Goraya, M. S., Fault tolerance in cloud computing environment: A systematic survey. Computers in Industry, 99, 156-
172, 2018.
7. Thakur, A., & Goraya, M. S., A taxonomic survey on load balancing in cloud. Journal of Network and Computer Applications, 98, 43-
57, 2017.
8. Yadav N., & Goraya. M.S., Two-way Ranking Based Service Mapping in Cloud Environment, Futur. Gener. Comput. Syst. 81 53–66,
2018.
9. Yadav, N., Singh, M., & Singh, D., Mutual Reputation Based Service Mapping in Cloud Environment. Seventh International
Conference on Advances in Computing Electronics and Communication ACEC2018, 2018.
10. The cloud service measurement initiative consortium, service measurement index (SMI), Carnegie Mellon, Silicon Valley,
http://www.cloudcommons.com/ about-smi.
11. RĂDULESCU, C. Z., & RĂDULESCU, I. C., An Extended TOPSIS Approach for Ranking Cloud Service Providers. Studies in
Informatics and Control, 26(2), 2017.
12. Lin, C. K., Chen, Y. S., & Chuang, H. M. (2017). Optimisation of implement performance of cloud information systems by Delphi-
VIKOR. International Journal of Applied Systemic Studies, 7(4), 282.
13. Silas, S., Rajsingh, E. B., & Ezra, K, Efficient Service Selection Middleware using ELECTRE Methodology for Cloud
Environments. Information Technology Journal, 11(7), 868-875, 2012.
14. Zhaoxu, S., & Min, H, Multi-criteria Decision Making Based on PROMETHEE Method. 2010 International Conference on Computing,
Control and Industrial Engineering, 2010.
15. Global Sensitivity Analysis for Importance Assessment. (n.d.). Sensitivity Analysis in Practice, 31-61. doi:10.1002/0470870958.ch2.
16. Regions and Availability Zones. (n.d.). Retrieved from https://docs.aws.amazon.com/AWSEC2/latest/Cloud consumerGuide/using-
regions-availability-zones.html
17. Yadav, N, Singh, M., & Singh, D., Mutual Reputation Based Service Mapping in Cloud Environment. Seventh International
Conference on Advances in Computing Electronics and Communication ACEC2018, 2018.
Authors: Gajanan Choudhari, Rajesh Mehra, Shallu

Paper Title: Multi-modal Iris Recognition System based on Convolution Neural Network
Abstract: Iris is most promising bio-metric trait for identification or authentication. Iris consists of patterns
that are unique and highly random in nature .The discriminative property of iris pattern has attracted many
researchers attention. The unimodal system, which uses only one bio-metric trait, suffers from limitation such as
inter-class variation, intra-class variation and non-universality. The multi-modal bio-metric system has ability to
overcome these drawbacks by fusing multiple biometric traits. In this paper, a multi-modal iris recognition
system is proposed. The features are extracted using convolutional neural network and softmax classifier is used
for multi-class classification. Finally, rank level fusion method is used to fuse right and left iris in order to
improve the confidence level of identification. This method is tested on two data sets namely IITD and CASIA-
Iris-V3.

Keywords: Convolutional Neural Network, Softmax classifier, Iris Recognition, Bio-metric.

References:

1. R. Gupta and P. Sehgal, Priti ,“Non ‑ deterministic approach to allay replay attack on iris biometric,” Pattern Analysis and
Applications,Springer, pp. 1-13, 2018.
2. A. S. Al-waisy, R. Qahwaji, S. Ipson, and S. Al-fahdawi, Shumoos and Nagem, Tarek AM “A Multi-biometric Iris Recognition System
based on a Deep Learning Approach,” Pattern Analysis and Applications,Springer, Vol-21, No. 3, pp. 783–802, August 2018.
3. Saiyed Umer, Bibhas Chandra Dhara, Bhabatosh Chanda “Texture Code Matrix-based Multi-Instance Iris Recognition,” Pattern
Analysis and Application,Springer, Vol.19, No.1, pp. 283-295, 2016.
4. Mahmoud Elgamal, Nasser Al-Biqami, “An Efficient Feature Extraction Method for Iris Recognition Based on Wavelet
Transformation,” International Journal of Computer and Information Technology ,Vol. 02, No. 03, pp. 521–527, 2013.
134. 5. Shervin Minaee, AmirAli Abdolrashidi, and Yao Wang, “Iris Recognition Using Scattering Transform And Textural Features ",IEEE
Signal Processing and Signal Processing Education Workshop, pp. 37–42, 2015. 798-803
6. Rathgeb, C and Wagner, J and Busch, C, “SIFT-based Iris Recognition Revisited : Prerequisites , Advantages and Improvements,”
Pattern Analysis and Applications , Springer,pp.1-18, 2018.
7. Abhiram M.H, Chetan Sadhu, K. Manikantan, S. Ramachandran “Novel DCT Based Feature Extraction for Enhanced Iris
Recognition,” IEEE, International Conference on Communication, Information & Computing Technology,2012, pp. 1–6.
8. M. G Alaslani and L. A. Elrefaei, “Convolutional Neural Network Based Feature Extraction for IRIS Recognition,” International
Journal of Computer Science Informatics Technology, Vol. 10, No. 2, pp. 65–78, 2018..
9. J. G. Daugman, “High Confidence Visual Recognition of Persons by a Test of Statistical Independence,” vol. 15, no. 11, 1993.
10. K. Roy, P. Bhattacharya, and C. Y. Suen, “Iris Recognition using Shape-Guided Approach and Game theory,” Pattern Analysis and
Applications ,Springer,Vol.14, No.4, pp. 329–348, 2011.
11. S. S. Dhage, S. S. Hegde, K. Manikantan, and S. Ramachandran, "DWT-based Feature Extraction and Radon Transform based
Contrast Enhancement for Improved Iris ecognition,"International conference on Advanced Computing technology and applications,
Elsevier/Procedia Computer Science, Vol. 45, pp. 256-265, 2015.
12. A. S. Al-waisy, R. Qahwaji, S. Ipson, and S. Al-fahdawi, “A Multimodal Biometric System for Personal Identification Based on Deep
Learning Approaches,” pp. 163–168, 2017.
13. Alaa S. Al-Waisy, Rami Qahwaji, Stanley Ipson, Shumoos Al-Fahdawi,“ A fast and accurate iris localization technique for healthcare
security system” IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and
Communications,pp.1028-1034,2015.
14. Nitish Srivastava, Geoffrey Hinton, Alex Krizhevsky, Ilya Sutskever, Ruslan Salakhutdinov,”Dropout: a simple way to prevent neural
networks from overfitting”, The Journal of Machine Learning Research,Vol. 15,No. 01, pp.1929-1958, 2014.
15. A. Czajka, S. Member, K. W. Bowyer, M. Krumdick, and R. G. Vidalmata, “Recognition of image-orientation-based iris spoofing,”
vol. 6013, no. c, pp. 1–13, 2017.
16. Rui Zeng, Jiasong Wu, Zhuhong Shao, Lotfi Senhadji and
Huazhong Shu ,”Quaternion softmax classifier”, IET Electronics Letters, Vol. 50, No. 25, pp-1929-1931, 2014.
17. Rajesh Mehra , Shallu ,” Breast cancer histology images classification: Training from scratch or transfer learning?”, ICT Express,
Elsevier, Vol.4, No.4, pp-247-254 , 2018.
18. Md. Maruf Monwar, Marina Gavrilova , “Markov chain model for multimodal biometric rank fusion”, Signal, Image and Video
Processing, Springer,Vol.7 ,No.1, pp.137-149,2013.
19. David Menotti , Allan Pinto , William Robson Schwartz , Helio Pedrini , Alexandre Xavier Falcao , Anderson Rocha ,”Deep
representations for iris, face, and fingerprint spoofing detection”, IEEE Transactions on Information Forensics and Security,Vol.10,
No.4, pp. 864-879, 2015.
20. Tze Weng Ng, Thien Lang Tay, Siak Wang Khor, “ Iris Recognition Using Rapid Haar Wavelet Decomposition,” IEEE, International
Conference on Signal Processing Systems (ICSPS) ,2010, pp. 820–823.
21. A. Kumar and A. Passi, “Comparison and combination of iris matchers for reliable personal authentication,” Pattern Recognit., vol. 43,
no. 3, pp. 1016–1026, 2010.
22. Saiyed Umer, Bibhas Chandra Dhara, Bhabatosh Chanda “Texture Code Matrix-based Multi-Instance Iris Recognition,” Pattern
Analysis and Application,Springer, Vol.19, No.1, pp. 283-295, 2016.
23. M. Vatsa, S. Member, R. Singh, S. Member, and A. Noore, “Improving Iris Recognition Performance Using Segmentation , Quality
Enhancement , Match Score Fusion , and Indexing,” IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), Vol.
38, No. 4, pp. 1021–1035, 2008.

Authors: Rajalaxmi Hegde, Sandeepkumar Hegde


Deep Recurrent Network Based Feature Selection using Single Matrix Normalization and Eigen
Paper Title:
Vectors for Analyzing Sentiments
Abstract: Sentiment analysis plays a major role in e-commerce and social media these days. Due to the
increasing growth of social media, a huge number of peoples and users send their reviews through the Internet
and several other sources. Analyzing this data is challenging in today's life. In this paper new normalization
based feature selection method is proposed and the topic of interest here is to select the relevant features and
perform the classification of the data and find the accuracy. Stability of the data is considered as the most
important challenge in analyzing the sentiments. In this paper investigating the sentiments and selecting the
relevant features from the data set places a major role. The aim is to work with the vector-based feature selection
and check the classification performance using recurrent networks. In this paper, text mining depends on feature
retrieval methods to improve accuracy and propose a single matrix normalization method to reduce the
dimensions. The proposed method performs data preprocessing or sentiment classification and features reduction
to improve accuracy. The proposed method achieves better accuracy than the N-gram feature selection method.
The experimental results show that the proposed method has better accuracy than other traditional feature
selection approaches and that the proposed method can decrease the implementation time.

Keywords: Features, Classifier, Sentiment, Normalization, Recurrent Networks, Covariance Matrix, Cosine
similarity.

References:

1. Catal, Cagatay, and Mehmet Nangir. "A sentiment classification model based on multiple classifiers." Applied Soft Computing 50
(2017): 135-141.
2. Boiy, Erik, et al. "Automatic Sentiment Analysis in On-line Text." ELPUB. 2007.
135. 3. Annett, Michelle, and Grzegorz Kondrak. "A comparison of sentiment analysis techniques: Polarizing movie blogs." Conference of the
Canadian Society for Computational Studies of Intelligence. Springer, Berlin, Heidelberg, 2008.
4. Ye, Qiang, Ziqiong Zhang, and Rob Law. "Sentiment classification of online reviews to travel destinations by supervised machine 804-809
learning approaches." Expert systems with applications 36.3 (2009): 6527-6535.
5. Manek, Asha S., et al. "Aspect term extraction for sentiment analysis in large movie reviews using Gini Index feature selection method
and SVM classifier." World wide web 20.2 (2017): 135-154.
6. Whitehead, Matthew, and Larry Yaeger. "Sentiment mining using ensemble classification models." Innovations and advances in
computer sciences and engineering. Springer, Dordrecht, 2010. 509-514.
7. Narayanan, Vivek, Ishan Arora, and Arjun Bhatia. "Fast and accurate sentiment classification using an enhanced Naive Bayes model."
International Conference on Intelligent Data Engineering and Automated Learning. Springer, Berlin, Heidelberg, 2013.
8. Agarwal, Basant, and Namita Mittal. "Sentiment classification using rough set based hybrid feature selection." Proceedings of the 4th
Workshop on Computational Approaches to Subjectivity, Sentiment and Social Media Analysis. 2013.
9. Kolog, Emmanuel Awuni, Calkin Suero Montero, and Tapani Toivonen. "Using machine learning for sentiment and social influence
analysis in the text." International Conference on Information Theoretic Security. Springer, Cham, 2018.
10. Mouthami, K., K. Nirmala Devi, and V. Murali Bhaskaran. "Sentiment analysis and classification based on textual reviews." 2013
international conference on Information communication and embedded systems (ICICES). IEEE, 2013.
11. Adel, Aisha, Nazlia Omar, and Adel Al-Shabi. "A Comparative Study Of Combined Feature Selection Methods For Arabic Text
Classification." JCS 10.11 (2014): 2232-2239.
12. Collomb, Anaıs, et al. "A study and comparison of sentiment analysis methods for reputation evaluation." Rapport de recherche RR-
LIRIS-2014-002 (2014)
13. Arora, Monika, and Vineet Kansal. "Character level embedding with deep convolutional neural network for text normalization of
unstructured data for Twitter sentiment analysis." Social Network Analysis and Mining 9.1 (2019): 12.
14. Xie, Xin, et al. "An improved algorithm for sentiment analysis based on maximum entropy." Soft Computing 23.2 (2019): 599-611.
15. Kang, Mangi, Jaelim Ahn, and Kichun Lee. "Opinion mining using ensemble text hidden Markov models for text classification."
Expert Systems with Applications 94 (2018): 218-227.
16. Bahassine, Said, et al. "Feature selection using an improved Chi-square for Arabic text classification." Journal of King Saud
University-Computer and Information Sciences (2018).
17. Zhiyuan Chen, Nianzu Ma and Bing Liu. (2018). Lifelong Learning for Sentiment Classification, p1-8..
18. Navonil Majumder, Soujanya Poria, Alexander Gelbukh and Erik Cambria . (2017). Deep Learning-Based Document Modeling for
Personality Detection from Text.iEEE iNTElliGENT SYSTEmS, p74-79.
19. Mehdi Allahyari. (2017). A Brief Survey of Text Mining Classification, Clustering and Extraction Techniques.KDD Bigdas, p1-13.

Authors: Akansha Sharma, R.S Thakur, Shailesh Jaloree

Paper Title: Computational Analysis of Distance based Phylogenetic Tree for Azotobacter Species
Abstract: Phylogenetic tree is a pictorial representation of evolutionary relationships between organisms. It is
important method to analyze the biological data. Phylogenetic trees are based on two methods : Distance based
and Character based. Phylogenetic tree are used comparative analysis of any organism like human Beings,
Animals, Bacteria, Viruses and Fungi’s etc. In this paper we compare 12 different nucleotide sequences of
Azotobacter species having linear DNA of 999 BP as maximum size using substitution model and phylogenetic
model. In this study two different models name P-Distance and Jukes cantor model are used and helped in
finding UPGMA or Neighbour joining method efficiency in evaluating the similarity and dissimilarity of
bacterial species. This paper gives influence in reconciliation of Azotobacter species to produce phylogram with
informative branch lengths. This further leads to analyze and understand various expressive characters of
Azotobacter in agriculture field.

Keywords: Phylogenetic tree, UPGMA, Neighbour joining, P-Distance, Jukes cantor.

References:

136. 1. J.Rizzo, E.C.Rouchka,”Review of phylogenetic tree construction”, Bioinformatics laboratory technical report series,pp.1-7,2007.
2. Krause,N.N.Diaz,A.Goesmann,S.Kelley,T.W.Nattkemper,”Phylogenetic classification of short environmental DNA fragments”,
Nucleic acids Res,Vol.36, pp. 2230-2239, 2008
3. J.Felsenstein, “Confidance limits on phylogenies: an approach using bootstrap”, Evolution,Vol.39, pp. 368-376, 1981. 810-814
4. G.Mahapatro,D.Mishra,k.Shaw,S.Mishra, T.Jena,”Phylogenetic tree construction for DNA Sequences using clustering methods”, In the
proceedings of 2012, International conference on modeling optimization and computing,
5. A.stamatkis, “Phylogenetics:applications,software and challenges”, Cancer genomics and proteomics, vol.2, pp. 301-306, 2005.
6. V.K.Sohpal, A.Dey, A. Singh ,“Computational analysis of distance and character based phylogenetic tree for capsid proteins of human
herpes virus”, Data mining in Genomics & Proteomics, Vol.4,pp. ,2013.
7. S.Kumar, G.Stecher, K.Tamura, “MEGA7: molecular evolutionary genetics analysis version 7.0 for bigger datasets”, Molecular
biology and evolution, Vol.33, pp. 1870-1874, 2016.
8. S.Hussain,”Survey on current trends and techniques of data mining research”, Londan journal press, Vol.17, Issue.1 ,2017.
9. S.Sahu,S.Sharma,S.Gondhalkat, “A brief overview on data mining survey”, IJCTEE, Vol.1, Issue.3, pp. 114-119, 2011.
10. D.Patel, R.Modi, K. Sarvakar, ”A comaritive study of clustering data mining:Techniques and research challenges”, IJLTEMAS, Vol.3,
Issue.9,2014.
11. F.P.Martins,O.S.Paula, “NCBI mass sequence downloader large dataset downloading made easy”, SoftwareX, Vol.5, pp. 80-83, 2016.
12. K.Tamura, D.Peterson, N.Peterson,G.stecher, M.Nei, S.Kumar, “MEGA 5:Molecular evolutionary genetics using maximum
likelihood,evolutionary distance,and maximum parsimony methods”, Mol.Biol.Evol.,vol-28,issue-10,pp.2731-2739,2011.

Authors: Abhinav Bhargava, Poonam Sinha

Paper Title: Wide Band Microstrip Patch Antenna for S & C Band Applications
Abstract: A fractal is a repeated or similar structure having a fractional dimension. This type of shape having
repetitive structure so the electrical length can be increased with introducing multiple slots. That we can get fine
edge length structure. By recursive nature multiple objectives can be achieved. Size of the antenna is
continuously decreasing with the development of patch antenna. In this paper a square shaped square slotted
antenna is investigated, which is compact printed wide band antenna. A rectangular microstrip patch antenna
chosen with three slots for wide band application. When ground is modified it is called defected ground structure
by which bandwidth can be further increased, and overall a wideband antenna is simulated using HFSS
simulation software. So this antenna is useful for many applications in S & C band, the size of the antenna is
reduces. This paper represents the combination of rectangular antenna with rectangular slots. Proposed design
has resonant frequency of 4.7GHz with the operating range from 3.2GHz to 14.3GHz with bandwidth of
11.1GHz. Using proposed antenna design and micro strip feeding at proper position acceptable resultant
frequency, return loss, VSWR and bandwidth is achieved. For the design of the micro strip antenna we have
used FR-4substrate which has permittivity of 4.4 and thickness 1.6, loss tangent is 0.02. HFSS simulation
software is used for designing and analysis. We have observed that using slotted patch antenna and using micro
strip at proper location we can get better return loss, VSWR, and wideband.
137.
Keywords: Wideband, fractal micro-strip patch-antenna, return loss, VSWR, radiation pattern.
815-817
References:

1. Dual-Band Microstrip RFID Antenna With Tree-LikeFractal Structure Guo Liu, Liang Xu, and Zhensen Wu “ Dual-Band Microstrip
RFID Antenna With Tree-Like Fractal Structure” ieee antennas and wireless propagation letters, vol. 12, 2013.
2. G.Papitha, V. Thyagarajan and AyshathulFouzia,”Design and Simulation of Stacked Fractal Patch Antenna using IE3D” . International
Conference on Computing and Control Engineering (ICCCE), 12 and 13 April 2012.
3. Douglas H. Werner' and Suman Gangul, “An Overview' of Fractal Antenna Engineering Research”, IEEEAnlennasand Propagation
Magazine. Vol. 45, NO. I , February 2003.
4. Davoud Zarifi, Mohammad Soleimani, Vahid Nayyeri, Student Member, IEEE, and Jalil Rashed-Mohassel, Senior Member, IEEE,
“On the Miniaturization of Semiplanar Chiral”.
5. Chin-Lung Yang, Member, IEEE, Chi-Lin Tsai, Student Member, IEEE, and Sheng-Hao Chen, Implantable High-Gain Dental
Antennas for Minimally Invasive Biomedical Devices, ieee transactions on antennas and propagation, vol. 61, no. 5, may 2013.
6. Metamaterial Structures, IEEE transactions on antennas and propagation, vol. 60, no. 12, december 2012.
7. John D Kraus, Ronald J Marhefka, Ahmed S Khan,” Antennas and Wave Propagation”. Tata McGraw Hill Education Private Limited
New Delhi 2010.
8. R. Garg and P. Bhartia, “Micro-strip Antenna handbook”. Boston Artech House 2001
9. R.Q. Lee, K.F. Lee and J.Bobinchak,”Characterstics of a two layer electromagnetically coupled rectangular patch antenna”, Electron
Lett. Vol. 23 no 20, pp 1070-1072, 1987
10. Binu Paul, S. Mridula, C.K. Aanandan and P. Mohan. Microwave and optical technology letters/ vol33, no4, 4 may2002.
11. Constantine A. Balanis”Antenna Theory: Analysis Design” Third edition John Wiley & Sons, Inc 2005.
Authors: R.Raja Kumar, R.Pandian, P.Indumathi, Sheik Mohammed Shoaib

Paper Title: Detection of Traffic Congestion and Marine Border Intrusion using Vehicular ad-hoc Networks
Abstract: The Vehicular Ad-hoc network, or VANET, is for sharing of emergency and safety information
among vehicles to ensure safe travelling of users in road. It is the technology that considers moving cars as
nodes to create a mobile network. VANET turns every participating car into wireless router or node, allowing
cars to establish communication. Vehicles can communicate within themselves (V2V) and also with the road
side units (V2I). Vehicles communicating with other vehicles are likely to enhance the driving experience,
awareness, situation perception and thus safety. In response to the problem of drastically increasing road
accidents and climatic disasters like smoke, fog etc., we have designed and tested in various traffic scenarios of
Kathipara(area in Chennai Tamilnadu), T.Nagar(area in Chennai, Tamilnadu), highway and a village . Each
scenario is very different from each other; like Kathipara having moderate real time traffic, T.Nagar having
extensive dense traffic, highways with irregular traffic and villages which having very few vehicles for most
time. We designed the placement of RSUs(Road Side Units) in each scenario and we analyzed the delay and
packet delivery ratios(PDR) in each scenario. These results would guarantee the use of VANET in real time. Yet
another traffic scenario we have considered is what happens in marine environment. Unintentional International
border crossing by fishermen and hardships encountered by fishermen due to extreme weather conditions are the
138. motivation behind our conceptualizing a network for communication among boats which can be called a 818-825
BANET (Boat Adhoc Vehicular Network).

Keywords: VANET, V2V, V2I, BANET.

References:

1. M. Shahzamal, M. F. Pervez, “Mobility Modelling Of Marine Fishing Boats For Communication Network Simulation,” In Informatics
Electronics and Vision (ICIEV), India, May. 122-128, 2016.
2. C. S. Evangeline and S.Appu, “An Efficient Data Transmission in VANET Using Clustering Method”, Intl. Journal of Electronics and
Telecommunications, vol. 63, 2017, pp. 303-319.
3. D. Singh, S. Kimbahune and V.V. Singh, “Strategy for Deep Sea Communication or Safe Fisheries,” Journal of ICT Standardization,
vol. 4, 2017, pp. 199-204.
4. G. Singh, N. Chakrabarty, K. Gupta, “Traffic Congestion Detection and Management Using Vehicular Ad-Hoc Networks (VANETs)
In India,”, International Journal of Advanced Computer Technology (IJACT), Vol. 3, 2014.
5. J. Jain, N. Chahal, “A Review on Vanet, Types, Characteristics and Various Approaches”, International Journal of Engineering
Sciences &Research Technology, ISSN: 2277-9655, 2016.

Authors: Phan Thi Ha, Trinh Thi Van Anh

Paper Title: Building a Retail Sysem Based on Distributed Databases Model


Abstract: In recent years, distributed databases have become an important field of processing information,
overcoming some limitations of centralized database such as overloading, bottlenecking while accessing,
availability/ reliability of low fault tolerance. Our article proposes to build a distributed system (functions and
databases) for POS (point of sale) retailers, data will be distributed across different locations but can still be
linked together when required. At each location retailers can sell directly on the system (online or offline) so
they can administer local databases and execute their local applications (business). Here we deploy the system
on the distributed database management system based on Client-Server model. Therefore, aside from local
management of data at clients (POS), there is also a server (manager) that stores data, manages and controls the
139. entire system.

Keywords: reactjs, Progressive Web App, Magento, commerce, Distributed Databases, Distributed System. 826-829

References:

1. B. Ajzele, Magento 2 Developer's Guide, 2015.


2. K. Edition, The Road to learn React, 2017.
3. D. A. Hume, Progressive Web Apps, MANNING, 2017.
4. https://www.bigcommerce.com/blog/ecommerce-trends/, 2018
5. http://devdocs.magento.com, 2018
6. https://reactjs.org, 2018
7. http://stackoverflow.com, 2018
8. https://www.magestore.com, 2018

Authors: Pranesh Krishnan, Sazali Yaacob

Paper Title: Drowsiness Detection using Band Power and log Energy Entropy Features Based on EEG Signals
Abstract: Sleeping on the wheels due to drowsiness is one of the significant causes of death tolls all over the
world. The primary reason for the sleepiness is due to lack of sleep and irregular sleep patterns. Several methods
such as unobtrusive sensors, vehicle dynamics and obtrusive physiology sensors are used to diagnose drowsiness
in drivers. However, the unobtrusive sensors detect drowsiness in the later stage. Whereas the physiological
140.
methods use obtrusive sensors such as electro-ocular, electro-myo and electro-encephalograms produce high
accuracy in the early detection of drowsiness, which makes them a preferable solution. The objective of this 830-836
research article is to classify drowsiness with alertness based on the electroencephalographic (EEG) signals
using band power and log energy entropy features. A publicly available ULg DROZY database used in this
research. The raw multimodal signal is processed to extract the five EEG channels. A passband filter with the cut
off frequencies of 0.1 Hz and 50 Hz attenuates the high-frequency components. Another bandpass filter bank is
designed to slice the raw signals into eight sub-bands, namely delta, theta, low alpha, high alpha, low beta, mid-
beta, high beta and gamma. The preprocessed signals are segmented into an equal number of frames with a
frame duration of 2 seconds using a rectangular time windowing approach with an overlap of 50%. Frequency
domain features such as log energy entropy and band power were extracted. The extracted feature sets were
further normalised between 0 and 1 and labelled as drowsy and alert and then combined to form the final dataset.
The K-fold cross-validation method is used to divide the dataset into training and testing sets. The processed
dataset is then trained using Discriminant analysis, k-nearest neighbour network, Binary decision tree, ensemble,
Naive Bayes and support vector machine classifiers and the results are compared with the literature. The kNN
classifier produces 95% classification accuracy. The developed model can provide a tool for drowsiness
detection in drivers.

Keywords: band power, DROZY database, drowsiness, log energy entropy, polysomnography.

References:

1. Organização Mundial da Saúde, “Global Status Report on Road Safety 2018: Summary,” World Heal. Organ., p. 20, 2018.
2. U. Ha and H. J. Yoo, “A multimodal drowsiness monitoring ear-module system with closed-loop real-time alarm,” Proc. - 2016 IEEE
Biomed. Circuits Syst. Conf. BioCAS, 2016, pp. 536–539, 2016.
3. J. W. W. Jane C. Stutts, B. V Vaughn, J. C. Stutts, J. W. Wilkins, and B. V Vaughn, “Why do people have drowsy driving crashes:
input from those who just did,” no. November, pp. 1–81, 1999.
4. E. Leefeldt, “Losing an hour of sleep can heighten car crash risk : AAA warns,” CBC News, 2019. [Online]. Available:
https://www.cbsnews.com/news/daylight-saving-time-losing-an-hour-of-sleep-can-heighten-your-car-crash-risk-aaa-says/. [Accessed:
28-Jun-2019].
5. W. Li, Q. C. He, X. M. Fan, and Z. M. Fei, “Evaluation of driver fatigue on two channels of EEG data,” Neurosci. Lett., vol. 506, no.
2, pp. 235–239, 2012.
6. H. Pranoto, A. M. Leman, D. Sukmajati, B. Hanum, and I. Baba, “Drivers Drowsiness Detection with Speed Limiter Integrated
Fatigue Analyzer (SLIFA) on Fuel Tank Truck,” Int. J. Integr. Eng., vol. 10, no. 2, pp. 66–70, 2018.
7. D. Ribeiro, A. Cardoso, and C. Teixeira, “Online demonstration of an EEG-based drowsiness detector,” Proc. 2017 4th Exp. Int. Conf.
Online Exp. exp.at, 2017, pp. 93–94, 2017.
8. D. Ribeiro, C. Teixeira, and A. Cardoso, “EEG-based drowsiness detection platform to compare different methodologies,” Proc. 2017
4th Exp. Int. Conf. Online Exp. exp.at, 2017, pp. 318–322, 2017.
9. H. Albalawi and X. Li, “Single-Channel Real-Time Drowsiness Detection Based on Electroencephalography,” in Proceedings of the
Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS, 2018, vol. 2018-July, pp. 98–
101.
10. H. Albalawi and X. Li, “Single-Channel Real-Time Drowsiness Detection Based on Electroencephalography,” Proc. Annu. Int. Conf.
IEEE Eng. Med. Biol. Soc. EMBS, vol. 2018-July, pp. 98–101, 2018.
11. D. Leger et al., “In-Flight Automatic Detection of Vigilance States Using a Single EEG Channel,” IEEE Trans. Biomed. Eng., vol. 61,
no. 12, pp. 2840–2847, 2014.
12. M. Pathak and A. K. Jayanthy, “Designing of a single channel EEG acquisition system for detection of drowsiness,” in 2017
International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), 2017, pp. 1364–1368.
13. M. Pathak and A. K. Jayanthy, “Development of a Real-Time Single Channel Brain-Computer Interface System for Detection of
Drowsiness,” Biomed. Eng. Appl. Basis Commun., vol. 29, no. 03, p. 1750019, 2017.
14. T. L. T. T. Da Silveira, A. J. Kozakevicius, and C. R. Rodrigues, “Automated drowsiness detection through wavelet packet analysis of
a single EEG channel,” Expert Syst. Appl., vol. 55, pp. 559–565, 2016.
15. A. Picot, S. Charbonnier, and A. Caplier, “On-line detection of drowsiness using brain and visual information,” IEEE Trans. Syst.
Man, Cybern. Part ASystems Humans, vol. 42, no. 3, pp. 764–775, 2012.
16. A. Picot, S. Charbonnier, and A. Caplier, “On-line automatic detection of driver drowsiness using a single electroencephalographic
channel,” 2008 30th Annu. Int. Conf. IEEE Eng. Med. Biol. Soc., pp. 3864–3867, 2008.
17. M. Ogino and Y. Mitsukura, “Portable drowsiness detection through the use of a prefrontal single-channel electroencephalogram,”
Sensors (Switzerland), vol. 18, no. 12, pp. 1–19, 2018.
18. J. Hu, “Comparison of different features and classifiers for driver fatigue detection based on a single EEG channel,” Comput. Math.
Methods Med., vol. 2017, 2017.
19. A. Mehreen, S. M. Anwar, M. Haseeb, M. Majid, and M. O. Ullah, “A Hybrid Scheme for Drowsiness Detection using Wearable
Sensors,” IEEE Sens. J., vol. 19, no. 13, pp. 1–1, 2019.
20. S. K. Alluhaibi, M. S. N. Al-Din, and A. Moyaid, “Driver Behavior Detection Techniques: A survey,” 2018.
21. Z. Mu, J. Hu, and J. Min, “Driver Fatigue Detection System Using Electroencephalography Signals Based on Combined Entropy
Features,” Appl. Sci., vol. 7, no. 2, p. 150, 2017.
22. I. Belakhdar, W. Kaaniche, R. Djmel, and B. Ouni, “Detecting driver drowsiness based on single electroencephalography channel,”
13th Int. Multi-Conference Syst. Signals Devices, SSD 2016, pp. 16–21, 2016.
23. I. Belakhdar, W. Kaaniche, R. Djmel, and B. Ouni, “A comparison between ANN and SVM classifier for drowsiness detection based
on single EEG channel,” 2nd Int. Conf. Adv. Technol. Signal Image Process. ATSIP, 2016, pp. 443–446, 2016.
24. I. Belakhdar, W. Kaaniche, R. Djemal, and B. Ouni, “Single-channel-based automatic drowsiness detection architecture with a
reduced number of EEG features,” Microprocess. Microsyst., vol. 58, pp. 13–23, 2018.
25. A. G. Correa and E. L. Leber, “An automatic detector of drowsiness based on spectral analysis and wavelet decomposition of EEG
records,” 2010 Annu. Int. Conf. IEEE Eng. Med. Biol. Soc. EMBC’10, pp. 1405–1408, 2010.
26. A. Garcés Correa, L. Orosco, and E. Laciar, “Automatic detection of drowsiness in EEG records based on multimodal analysis,” Med.
Eng. Phys., vol. 36, no. 2, pp. 244–249, 2014.
27. N. K. Kasabov, Time-Space, Spiking Neural Networks and Brain-Inspired Artificial Intelligence. 2019.
28. U. Ha and H. J. Yoo, “An EEG-NIRS ear-module SoC for wearable drowsiness monitoring system,” 2016 IEEE Asian Solid-State
Circuits Conf. A-SSCC 2016 - Proc., pp. 193–196, 2017.
29. H. Göksu, “BCI oriented EEG analysis using log energy entropy of wavelet packets,” Biomed. Signal Process. Control, vol. 44, pp.
101–109, 2018.
30. S. AydIn, H. M. Saraoǧlu, and S. Kara, “Log energy entropy-Based EEG classification with multilayer neural networks in seizure,”
Ann. Biomed. Eng., vol. 37, no. 12, pp. 2626–2630, 2009.
31. R. Foong, K. K. Ang, C. Quek, C. Guan, and A. A. Phyo Wai, “An analysis on driver drowsiness based on reaction time and EEG
band power,” Proc. Annu. Int. Conf. IEEE Eng. Med. Biol. Soc. EMBS, vol. 2015-Novem, pp. 7982–7985, 2015.
32. L. A., R. J. A. Horne, “Falling asleep while driving : are drivers aware of prior sleepiness ” vol. 44, pp. 120–121, 1998.
33. J. Horne and L. Reyner, “Vehicle accidents related to sleep: A review,” Occupational and Environmental Medicine. 1999.
34. S. Nordbakke and F. Sagberg, “Sleepy at the wheel: Knowledge, symptoms and behaviour among car drivers,” Transp. Res. Part F
Traffic Psychol. Behav., vol. 10, no. 1, pp. 1–10, 2007.
35. A. Williamson, R. Friswell, J. Olivier, and R. Grzebieta, “Are drivers aware of sleepiness and increasing crash risk while driving?”
Accid. Anal. Prev., vol. 70, pp. 225–234, 2014.
36. S. S. Hashemi Nazari, A. Moradi, and K. Rahmani, “A systematic review of the effect of various interventions on reducing fatigue
and sleepiness while driving,” Chinese J. Traumatol. - English Ed., vol. 20, no. 5, pp. 249–258, 2017.
37. G. R. Poudel, C. R. H. Innes, P. J. Bones, R. Watts, and R. D. Jones, “Losing the struggle to stay awake: Divergent thalamic and
cortical activity during microsleeps,” Hum. Brain Mapp., vol. 35, no. 1, pp. 257–269, 2014.

Authors: Shivanna K, Prabhudeva S

Paper Title: Ensure Data Protection in Cloud Computing using ASCII Based Encryption Technique
Abstract: Cloud computing is an engineering discipline which is concerned with all aspect of storing and
sharing useful data. Today, millions of users are able to upload and download useful information on cloud
environment from anywhere at any time. Recently, many security issues are encountered in real time
applications with a great loss of data and information. Subsequently, many research works have been done to
highjack the security issues of cloud computing. Still, all feasible solutions may not applicable at all time and
some practical situations. In this paper, we designed and implemented an ASCII based encryption technique that
securely uploads, sharing the data on cloud framework with a minimum computational overhead and entropy.
The proposed technique will increase the throughput of the system and it can be deployed on a cloud
environment for sharing and securing useful data information.

Keywords: Cloud Storage, Confidentiality, Encryption, One Time Secret Key.

References:

1. R. Sugumar and S. B. S. Imam, “Symmetric encryption algorithm to secure outsourced data in public cloud storage,” Indian Journal of
Science and Technology, vol. 8, no. 23, 2015.
2. M. F. Mushtaq, S. Jamel, A. H. Disina, Z. A. Pindar, N. S. Ahmad, and M. M. D. Shakir, “A survey on the cryptographic encryption
algorithms,” Proceeding of (IJACSA) International Journal of Advanced Computer Science and Applications, vol. 8, no. 11, 2017.
3. S. Aldossary and W. Allen, “Data security, privacy, availability and integrity in cloud computing: issues and current solutions,”
141. International Journal of Advanced Computer Science and Applications, vol. 7, no. 4, pp. 485–498, 2016.
4. B. Feng, X. Ma, C. Guo, H. Shi, Z. Fu, and T. Qiu, “An efficient protocol with bidirectional verification for storage security in cloud
computing,” IEEE Access, vol. 4, pp. 7899–7911, 2016. 837-842
5. A. Sachdev and M. Bhansali, “Enhancing cloud computing security using aes algorithm,” International Journal of Computer
Applications, vol. 67, no. 9, 2013.
6. C. Kaur and E. G. S. Bhathal, “Data security algorithms in cloud computing: A.”
7. Z. Xiao and Y. Xiao, “Security and privacy in cloud computing,” IEEE Communications Surveys & Tutorials, vol. 15, no. 2, pp. 843–
859, 2013.
8. M. G. Durga et al., “Study on data security mechanism in cloud computing,” in Current Trends in Engineering and Technology
(ICCTET), 2014 2nd International Conference on. IEEE, 2014, pp. 13–17.
9. M. Ali, R. Dhamotharan, E. Khan, S. U. Khan, A. V. Vasilakos, K. Li, and A. Y. Zomaya, “Sedasc: secure data sharing in clouds,”
IEEE Systems Journal, vol. 11, no. 2, pp. 395–404, 2017.
10. P. Patil, P. Narayankar, D. Narayan, and S. M. Meena, “A comprehensive evaluation of cryptographic algorithms: Des, 3des, aes, rsa
and blowfish,” Procedia Computer Science, vol. 78, pp. 617–624, 2016.
11. F. Maqsood, M. M. Ali, M. Ahmed, and M. A. Shah, “Cryptography: A comparative analysis for modern techniques,” International
Journal of Advanced Computer Science and Applications, vol. 8, no. 6, pp. 442– 448, 2017.
12. M. Ebrahim, S. Khan, and U. B. Khalid, “Symmetric algorithm survey: a comparative analysis,” arXiv preprint arXiv:1405.0398, 2014.
13. M. F. Mushtaq, S. Jamel, K. M. Mohamad, S. K. A. Khalid, and M. M. Deris, “Key generation technique based on triangular
coordinate extraction for hybrid cubes,” Journal of Telecommunication, Electronic and Computer Engineering (JTEC), vol. 9, no. 3-4,
pp. 195–200, 2017.
14. M. R. Baharon, Q. Shi, M. F. Abdollah, S. W. M. S. Yassin, and A. Idris, “An improved fully homomorphic encryption scheme for
cloud computing,” International Journal of Communication Networks and Information Security, vol. 10, no. 3, p. 502, 2018.
15. K.-K. R. Choo, O. F. Rana, and M. Rajarajan, “Cloud security engineering: Theory, practice and future research,” IEEE Transactions
on Cloud Computing, no. 3, pp. 372–374, 2017.
16. S. Singh and A. Sharma, “Analysis of endecloudreports for encrypting and decrypting data in cloud,” International Journal of
Computer Applications, vol. 136, no. 12, 2016.
17. H. Chen, F. Z. Wang, and N. Helian, “Entropy4cloud: Using entropy-based complexity to optimize cloud service resource
management,” IEEE Transactions on Emerging Topics in Computational Intelligence, vol. 2, no. 1, pp. 13–24, 2018.

Authors: K. Balachander

Paper Title: Design and Hardware Implementation of Portable Generator using TEG
Abstract: Electrical energy has become a part of all human beings, the claim for electricity has been very high
in the current days and hence electricity generated by usual means is not plenty. Nowadays solar, wind and
thermal power station are mostly used to generate electricity. But by using this more amount of space can be
occupied, fuel cost is increasing day by day, and also power consumption rate is very high in commercial
sectors. So avoid these problems by using Thermo Electric power Generator (TEG). It is in the form of peltier
coolers and TE generators. TE generator produces electrical energy from waste heat. It works based on principle
142. of SEEBECK effect. It is named after the Baltic German physicist Thomas Johann seebeck. This paper
proposed an idea of Design and Hardware implementation of Portable Generator using TEG. Hardware model
was implemented and tested. 843-846

Keywords: Power Generator, Thermo Electric power Generator, TEG, Seebeck effect.

References:

1. J. P. Carmo, I. M. Goncalves, and J. H. Corrreia, “Thermoelectric Micro Converter for Energy Harvesting Systems,” IEEE trans. Ind.
Electron., Vol.57, no.3, Mar 2010.
2. C. Junior, C. Richter, W. Tegethoff, N. Lemke, J. Köhler, “Modeling and simulation of a thermoelectric heat exchanger using the
object-oriented library TIL,” in Procee. 6th Inte. Modelica Confe., 2008, pp. 437–445.
3. D. Cao and F. Z. Peng, “Multiphase multilevel modular dc–dc converter for high-current high-gain TEG application,” IEEE Trans.
Ind. Appl., vol. 47, no. 3, pp. 1400–1408, 2011.
4. Zhao, L.; Lo, S.H.; Zhang, Y.; Sun, H.; Tan, G.; Uher, C.; Wolverton, C.; Dravid, V.P.; Kanatzidis, M.G. Ultralow thermal
conductivity and high thermoelectric figure of merit in SnSe crystals. Nature 2014, 508, 373–377.
5. Nuwayhid, R. Y.; Rowe, D. M.; Min, G. Low cost stove-top thermoelectric generator for regions with unreliable electricity supply.
Renewa. Energy 2003, 28, 205–222.
6. Nuwayhid, R. Y.; Shihadeh, A.; Ghaddar, N. Development & testing of a domestic woodstove thermoelectric generator with natural
convection cooling. Energy Conversation Manag. 2005, 46, 1631–1643. .
7. Kim, T. Y.; Kwak, J.; Kim, B. W. Energy harvesting performance of hexagonal shaped thermoelectric generator for passenger vehicle
applications: An experimental approach. Energy Conversation Management, 160, 14–21, 2018.
8. Energy Environmental Science 2018, 11, 23–44.
9. Remeli, M.F.; Date, A.; Orr, B.; Ding, L.C.; Singh, B.; Dalila, N.; Affandi, N.; Akbarzadeh, A. Experimental investigation of
combined heat recovery and power generation using a heat pipe assisted thermoelectric generator system. Energy Conversation
Management, 11, 147–157, 2016.
10. Zhao, L.; Tan, G.; Hao, S.; He, J.; Pei, Y.; Chi, H.; Wang, H.; Gong, S.; Xu, H.; Dravid, V.P.; Uher, C.; Snyder, G.J.; Wolverton, C.;
Kanatzidis, M.G. Ultrahigh power factor and thermoelectric performance in hole-doped single-crystal SnSe. Science 2016, 351, 141–
144. Liu, Z.; Mao, J.; Sui, J.; Ren, Z. High thermoelectric performance of α-Mg Ag Sb for power generation.
11. Barma, M. C.; Riaz, M.; Saidur, R.; Long, B.D. Estimation of thermoelectric power generation by recovering waste heat from
biomass fired thermal oil heater. Energy Conversation Management, 98, 303–313, 2015.
12. Ma, H.K.; Lin, C.P.; Wu, H.P.; Peng, C.H.; Hsu, C.C. Waste heat recovery using a thermoelectric power generation system in a
biomass gasifier. Applied Thermal Engineering, 2015, 88, 274–275.
13. Raman, P.; Ram, N. K.; Gupta, R. Development, design and performance analysis of a forced draft clean combustion cook stove by a
thermo electric generator with multi-utility options. Energy’2014, 69, 813–825.
14. Felix Felger, IEEE Member, Lukas Excel, Marco Nesarajah, Georg Frey, IEEE Member, “Component-Oriented Modelling of
Thermoelectric Devices for Energy System Design” in IEEE Transa. on Indus. Electronics, vol. 61(03), 2014.
15. P. Nenninger, M. Ulrich,”Feasibility of Energy Harvesting in Industrial Automation Wireless Networks”, in Proceedings 18 th IFAC
World Conger., pp.13888-13892, 2011.
16. Lertsatitthanakorn, C. Electrical performance analysis and economic evaluation of combined biomass cook stove thermoelectric
(BITE) generator. Bio resours. Technol. 2007, 98, 1670–1674.
17. K. T. Zorbas, E. Hatzikraniotis, K. M. Praskevopoulos, “Power and efficiency calculation in commercial TEG and application in
wasted heat recovery in automobile,” at the 5th Euro. Confer. Thermo electrics, Odessa, Ukraine, 2007, Paper 30.

Authors: Balasubramanian Prabhu Kavin, Sannasi Ganapathy

Paper Title: A Novel M-Commerce Data Security Mechanism using Elliptic Curve Cryptography
Abstract: Cryptography is a mathematical science which permits only the authorized users to access the data.
Today, it is necessary for our routine life to safeguard online data like credit card numbers, bank transactions,
etc. Many cryptographic algorithm-based data security mechanisms have been introduced by various researchers
for protecting the online / M-Commerce data. Even though, no data security algorithms achieved the required
security level with less time. For overcoming these issues, we propose a new data security algorithm called
Elliptic-Curve Cryptography and Diffie-Hellman based data security algorithm for securing the M-Commerce
data. Here, the key size of the Elliptic Curve Cryptography is less than RSA that will be helpful to improve the
efficiency and reduce the storage space. This algorithm is able to establish a secure session key through a server
over an insecure channel and also handle various illegitimate users. In addition, this new algorithm is more
secure, efficient and suitable for mobile commerce environments than existing data security algorithms. For
evaluating the data security mechanism, many experiments conducted with M-Commerce data that are collected
from the Internet which are freely available and also proved the efficiency of the data security algorithm.

Keywords: Cryptography, Encryption, Decryption, Elliptic Curve Cryptography (ECC), Diffie-Hellman,


Private Key, Public Key.

References:
143.
1. Deepak Kumar, Nivesh Goyal, “Security Issues In M-Commerce for Online Transactions”, IEEE, pp.1-6, 2016.
2. Nan li,” Research on Diffie-Hellman Key Exchange Protocol”, IEEE, pp.1-4, 2016. 847-851
3. Himja Agrawal, P.R.Badadapure, “A Survey on Elliptic Curve Cryptography”, International Research Journal of Engineering and
Technology 3, pp.1-5, 2016.
4. Christina Thomas et al, “A Survey on Various Algorithms Used for Elliptic Curve Cryptography “, International Journal of Computer
Science and Information Technologies 5(6), pp.1-8, 2014.
5. Deepika Kamboj et al,”Efficient Scalar Multiplication Over elliptic curve” International Journal of Computer Networks and
Information Security 4, pp.56-61 (2016).
6. Khaleel Ahmad and Shoaib Alam,” Ecommerce Security through ECC”, Sciencedirect.com, pp.1-7, 2016.
7. R Susantio and I Muchtadi-Alamsyah,” Implementation of Elliptic Curve Cryptography in Binary Field”,, Journal of physics 4, pp.1-10
(2016).
8. Bhattacharya et al, “Improving the Diffie-Hellman Secure Key”, IEEE, pp.1-5, 2015.
9. Preetika Joshi et al, “Secure Authentication Approach Using Diffie-Hellman Key Exchange Algorithm for WSN’, IEEE, pp.1-6, 2015.
10. Xiuhua LIU,”The Study on E-Commerce based on ECC and SET”, IEEE, pp.1-3, 2011.
11. Gayoso Martinez And L. Hernandez Encinas,” Implementing Ecc With Java Standard Edition 7”, International Journal of Computer
Science and Artificial Intelligence 3(4), pp.1-9, 2013.
12. Samaneh Jafari, Leila Khatibzadeh, Zarrin taj Bornaee, "A Multi-Factor Trust Management System based on Confidence in M-
Commerce Environment", Second International Con-gress on Technology, Communication and Knowledge (ICTCK 2015) November,
11-12, 2015 - Mashhad Branch, Islamic Azad University, Mashhad, Iran, pp. 524-529, 2015.
13. Subbulakshmi Padmanabhan, V. Sumathi, S. Ganapathy, "Cloud based POS System for Secured Smart Shopping CART using RFID",
Journal of Advanced Research in Dynamical and Control Systems 9(Sp.14), pp.2764-2777, 2017.
14. Argyris Constantinides, Marios Belk, Panagiotis Germanakos, George Samaras, "The Per-sonaCheck System for Personalizing M-
Commerce Checkout Processes", 2015 16th IEEE International Conference on Mobile Data Management, pp. 303-306, 2015.
15. Balasubramanian Prabhu Kavin, Sannasi Ganapathy, Arputharaj Kannan, "An Intelligent Task Scheduling Approach for Cloud Using
IPSO and A* Search Algorithm", 2018 Eleventh International Conference on Contemporary Computing (IC3), pp.1-5, 2018.
16. Md Shoaib Alam, "Secure M-Commerce Data using Quantum Cryptography", IEEE Inter-national Conference on Power, Control,
Signals and Instrumentation Engineering (ICPCSI-2017), pp. 649-654, 2017.
17. Balasubramanian Prabhu kavin, Sannasi Ganapathy, "A secured storage and privacy-preserving model using CRT for providing
security on cloud and IoT-based applications", Computer Networks 151, pp.181–190, 2019.
18. S.Muthurajkumar, S.Ganapathy, M.Vijayalakshmi, A.Kannana, "Secured Temporal Log Management Techniques for Cloud", Procedia
Computer Science, Elsevier, Vol.46, pp.589-595, 2015.
19. S. Muthurajkumar, M. Vijayalakshmi, S. Ganapathy and A. Kannan, "Agent based intelligent approach for the malware detection for
infected cloud data storage files", Seventh International Conference on Advanced Computing (ICoAC), pp.1-5, 2015.
20. S Muthurajkumar, S Ganapathy, M Vijayalakshmi, A Kannan, "An Effective Intrusion Detection on Cloud Virtual Machines Using
Hybrid Feature Selection and Multiclass Classifier", Australian Journal of Basic and Applied Sciences, Vol.9, No.6, pp.38-41, 2015.
21. S Muthurajkumar, M Vijayalakshmi, A Kannan, S Ganapathy, "Optimal and Energy Efficient Scheduling Techniques for Resource
Management in Public Cloud Networks", National Academy Science Letters, Springer, Vol.41, No.4, pp.219-223, 2018.
22. Subbulakshmi Padmanabhan, V. Sumathi, S. Ganapathy, "Cloud based POS System for Secured Smart Shopping CART using RFID",
Journal of Advanced Research in Dynamical and Control Systems, Vol.9, No.14, pp.2764-2777, 2017.
23. Thangaramya Kalidoss, Ganapathy Sannasi, Sairamesh Lakshmanan, Kulothungan Kanagasabai, Arputharaj Kannan, "Data
anonymisation of vertically partitioned data using Map Reduce techniques on cloud", International Journal of Communication
Networks and Distributed Systems, Inderscience Publishers, Vol.20, No.4, pp.519-531, 2018.
24. R.Jayanthi, K.John Singh, "Image encryption techniques for data transmission in networks: a survey", International Journal of
Advanced Intelligence Paradigms, Inderscience, Vol.12, No.1-2, pp. 178–191, 2019.
25. R.Jayanthi, K.John Singh, "Encrypted image-based data hiding technique using elliptic curve ElGamal cryptography", International
Journal of Reasoning-based Intelligent Systems, Inderscience, Vol.10, No.3-4, pp.279–285, 2018.
26. R.Jayanthi, K.John Singh, " A Public Key based Encryption and Signature Verification Model for Secured Image Transmission in
Network ", International Journal of Internet Technology and Secured Transactions, Inderscience,2018(In press).

Authors: Ansiya Eshack, S. Krishnakumar

Paper Title: Low Power 32 x 32 – bit Reversible Vedic Multiplier


Abstract: Recently, low-power consuming devices are gaining demand due to excessive use and requirement
of hand-held & portable electronic gadgets. The quest for designing better options to lower the power
consumption of a device is in high-swing. The paper proposes two 32 x 32 – bit multipliers. The first design is
based only on the Urdhava Tiryakbhyam Sutra of Vedic Mathematics. The use of this sutra has created a
multiplier with higher throughput and lesser power utilization than conventional 32 x 32 – bit multipliers. The
second design incorporates the reversible logic into the first design, which further reduces the power
consumption of the system. Thus bringing together Vedic sutra for multiplication and reversible gates has led to
the development of a Reversible Vedic Multiplier which has both the advantages of high-speed and low-power
consumption.

Keywords: FPGA, High speed, Low power, Reversible Gates, Urdhava Tiryakbhyam Sutra, Vedic Multiplier.

References:

1. A. P. Chavan, R. Verma and N. S. Bhat, "High Speed 32-bit Vedic Multiplier for DSP Applications, " International Journal of
Computer Applications, vol. 135, no. 7, Feb. 2016, pp. 35-38
2. P. Mehta and D. Gawali, "Conventional versus Vedic mathematical method for Hardware implementation of a multiplier"2009
International Conference on Advances in Computing, Control, and Telecommunication Technologies, Trivandrum, Kerala, 2009, pp.
640-642.
3. L. Sriraman, K. S. Kumar and T. N. Prabakar, "Design and FPGA implementation of binary squarer using Vedic mathematics," 2013
Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), Tiruchengode, 2013, pp.
144. 1-5.
4. A. P. Nicholas, K. R. Williams and J. Pickles, Vertically and Crosswise: Applications of the Vedic Mathematics Sutra, Motilal 852-856
Banarsidass Publishers, 2003, ch 1.
5. M. Ramalatha, K. D. Dayalan, P. Dharani and S. D. Priya, "High speed energy efficient ALU design using Vedic multiplication
techniques," 2009 International Conference on Advances in Computational Tools for Engineering Applications, Zouk Mosbeh, 2009,
pp. 600-603.
6. A. E. Vijayan, A. John and D. Sen, "Efficient implementation of 8-bit vedic multipliers for image processing application," 2014
International Conference on Contemporary Computing and Informatics (IC3I), Mysore, 2014, pp. 544-552.
7. V. Kunchigi, L. Kulkarni and S. Kulkarni, "High speed and area efficient vedic multiplier," 2012 International Conference on Devices,
Circuits and Systems (ICDCS), Coimbatore, 2012, pp. 360-364.
8. J. V. Suman, "Design and Performance Evaluation of Hybrid Vedic Multipliers, " International Journal of Innovative Technology and
Exploring Engineering, vol. 8, issue. 8, June 2019, pp. 1622-1626
9. S. Prema, Ramanan S. V, R. Arun Sekar and R. Cristin, "High Performance Reversible Vedic Multiplier Using Cadence 45nm
Technology," International Journal of Innovative Technology and Exploring Engineering, vol. 8, issue. 7, May 2019, pp. 47-52
10. A. K. Thakre, S. S. Chiwande and S. D. Chafale, "Design of low power multiplier using reversible logic gate," 2014 International
Conference on Green Computing Communication and Electrical Engineering (ICGCCEE), Coimbatore, 2014, pp. 1-6.
11. N. Abdessaied and R. Drechsler, Reversible and Quantum Circuits : Optimization and Complexity Analysis, Springer International
Publishing, 2016, ch. 2.
12. A. Eshack and S. Krishnakumar, “Implementation of Pipelined Low Power Vedic Multiplier,” 2018 2nd International Conference on
Trends in Electronics and Informatics (ICOEI), Tirunelveli, India, 2018, pp. 171-174.
13. F. Naderpour and A. Vafaei, "Reversible multipliers: Decreasing the depth of the circuit," 2008 International Conference on Electrical
and Computer Engineering, Dhaka, 2008, pp. 306-310.
14. K. Morita, "Reversible Computing Systems, Logic Circuits, and Cellular Automata," 2012 Third International Conference on
Networking and Computing, Okinawa, 2012, pp. 1-8.
15. U. Kumar, L. Sahu and U. Sharma, "Performance evaluation of reversible logic gates," 2016 International Conference on ICT in
Business Industry & Government (ICTBIG), Indore, 2016, pp. 1-4.
16. A. Eshack and S. Krishnakumar, "Reversible Logic in Pipelined Low Power Vedic Multiplier," Indonesian Journal of Electrical
Engineering and Computer Science, vol. 16, no. 3, Dec 2019 (to be published).

Authors: Amit Kumar Bajpai, Rajiv Pandey, S P Tripathi

Paper Title: Mapping Provenance Model to e-learning Ontology


Abstract: The Semantic Web (SW) may be represented as it is advancement of the web; it is specifically
conspired to describe information in a specific manner, which machine can understand easily. In this context the
‘object’ or “resource” derived from web must be a unique as Uniform Resource Identifier (URI). Ontologies are
used to establish the relationships between objects. Trust or provenance plays important role in the semantic
web. Trust defines the merit by which a user considers authenticity of the documents. Semantic web refers the
credibility, reliability and tustability of the data in the given context. It is necessary to observe and differentiate
trusted data points from entrusted ones. [8]. User has to take decision regarding selection of the documents based
on considering all the parameters of trust, whether given information is reliable or not. The documents available
in the web in which users put a new set of problems every time and need to obtain the solution exactly
trustworthy.

Keywords:

References:

1. Md. Anwar Hossain Masud, Xiaodi Huang “An E-learning System Architecture based on Cloud Computing. (World academy of
science, engineering and technology 62 2012)
2. www.ignou.ac.in an official web site of Indira Gandhi National Open University, New Delhi (A Central Open University under
Ministry of HRD).
3. Shyshkina Mariya, Institute of information technologies and learning tools “Cloud Computing – an advanced e-learning platform of
school education?” 978-1-4577.1747-5/11/2011 IEEE.
4. T.R.Gruber, “towards principle for the design of ontologies used for knowledge sharing”, International journal of human and computer
studies, Vol.43, 1995.
5. Rajib Hasan, Radu Sion, Marianne Winslett “ Introducing secure provenance: Problem and Challenges”.59593-891-
6/07/0010/2007.
6. Ana corolina Almeida-Sergio Lifschitz-kavin Brietman “A Knowledge Representation and data Provenance model to self tuning
Database System”, 001 10.1.109/SE W. 2009.25/IEEE.
7. WWW.W3.ORG/TR/POV-Primer, PROV model Primer W3C Working Note 30 April 2013.
8. Mojtaba katebi and S.D. Katebi, School of Computing Research, Liverpool Hope University, Liverpool, UK. “Trust Models Analysis
for the Semantic Web” 978-0-7695-3912-6/09 © 2009 IEEE
9. Omer Mahmood School of Information Technology Charles Darwin University, Darwin, NT, Australia “Developing Web Applications
for Semantic Web of Trust” International Conference on Information Technology (ITNG'07) 0-7695-2776-0/07.
10. JIAN-PING QIU Institute of Computer Science Taiyuan University of science and technology Taiyuan, China and LI-CHAO CHEN
Institute of Computer Science Taiyuan University of science and technology Taiyuan, China “Trust Management for Semantic Web”
978-0-7695-3336-0/08, 2008 IEEE DOI 10.1109/CSSE.2008.617
11. Leila Ismail, Mohamed Adel Serhani, College of I 0-7695-2581-4/06 $20.00 © 2006 IEEET UAE University, UAE “Semantic Grid-
Based E-learning Architecture”, 0-7695-3007-9/07 © 2007 IEEE.
12. G.Malini, Dr.T.Mala , A.Karuppaiah,, Assitant professor “SEMANTIC BASED FOR E-LEARNING CONTENT STORAGE ON
145. CLOUD” 857-863
13. Wenying Guo1 and Deren Chen2 1College of Computer Science, Zhejiang University, Hangzhou, 310027, “Semantic Approach for e-
learning System” 0-7695-2581-4/06 © 2006 IEEE.
14. Gulshan Shrivastava, Department of Information Technology, Dronacharya College of Engineering, “A New Framework Semantic
Web Technology Based E-Learning” 978-1-4577-1829-8/12 ©2012 IEEE.
15. Jianguo Pan1,2, Bofeng Zhang1, Shufeng Wang1, Gengfeng Wu1 “A Personalized Semantic Search Method for Intelligent e-
Learning” 0-7695-3006-0/07 © 2007 IEEE , DOI 10.1109/IPC.
16. Saman Shishehchi, Seyed Yashar Banihashem, Nor Azan Mat Zin “Proposed Semantic Recommendation System for- Rule and
Ontology Based E-learning Recommendation System”, 978-1-4244-6716-7/10, ©2010 IEEE
17. Jamuna Rani S Department of Computer Science, Pondicherry University, “Adaptive Content for Personalized E-Learning using Web
Service and Semantic Web” 978-1-4244-4711-4/09/ ©2009 IEEE.
18. Robert E. Eek Defense Network and System Solutions Operation “An Open-World Model for Data Provenance Supporting Security
and Trust” 978-1-4673-0081-0/11- 2011 IEEE.
19. Guoyan Xu College of Computer and Information, “Data Provenance Architecture Based on Semantic Web Services”, 978-0-7695-
4081-8/10 © 2010 IEEE DOI 10.1109/SOSE.2010.
20. Robert E. Eek, Defense Network and System Solutions Operation, Science Applications International Corporation “Agent-Based
Provenance Architecture An Open-World Model for Data Provenance Supporting Security and Trust”, 978-1-4673-0081, 2011-IEEE.
21. Guoyan Xu College of Computer and Information HoHai University “Data Provenance Architecture Based on Semantic Web
Services”, 978-0-7695-4081-8/10, © 2010 IEEE DOI 10.1109/SOSE.2010.
22. Bhavani Thuraisingham “Confidentiality, Privacy and Trust Policy Enforcement for the Semantic Web” Eighth IEEE International
Workshop on 0-7695-2767-1/07, 2007 IEEE.
23. Peng, Chen School of Informatics and Computing, Indiana University “Dependency Provenance in Agent Based Modeling, 2013 IEEE
9th International Conference on e-Science.
24. Prof. Vibhavari Rambhau Pandit “e-learning System based on semantic Web” 978-0-7695-4246-1/10 , 2010 IEEE.
25. ZHANG Bo School of Electronic Information and Engineering Tongji University Shanghai China “Integrated Trust Computation in
Semantic_ Web” 1-4244-1092-IEEE.
26. Miklos Nagy1, Maria Vargas-Vera2 “Multi Agent Trust for Belief Combination on the Semantic Web” 978-1-4244-2673-7/08/IEEE.
27. Chintan Patel, Kaustubh Supekar, Yugyung Lee, E.K. Park School of Computing and Engineering University of Missouri-Kansas City
“A Semantic Web Portal for Ontology Searching,Ranking and Classification”
28. Rajesh Thiagarajan and Markus Stumptner Advanced Computing Research Centre University of South Australia “A Native Ontology
Approach for Semantic Service Descriptions”
29. Moussa A. Ehsan Sharif Network Security Center (NSC) Department of Computer Engineering Sharif University of Technology
Tehran, Iran “A Semantic-based Access Control Mechanism Using Semantic Technologies”
30. Mojtaba katebi, and S.D. Katebi, School of Computing Research, Liverpool Hope University, Liverpool, UK. “Trust Models Analysis
for the Semantic Web” 2009 Second International Conference on Developments in e-Systems Engineering.
31. James Cheney, University of dinburgh, jcheney@inf.ed.ac.uk, OOPSLA 2009, October 25–29, 2009, Orlando, Florida, USA.
32. Agents and Knowledge Interoperability in the Semantic Web Era Nick Bassiliades, Dept. of Informatics Aristotle University of
Thessaloniki,
33. Greece. WIMS’12, June 13-15, 2012, Craiova, Romania
34. The Semantic Web 10th Year Update James Hendler, Tetherless
35. World Chair Dept of Computer Science, Rensselaer Polytechnic
36. Institute, Troy, NY 12180
37. Data Provenance Architecture Based on Semantic Web Services Guoyan Xu College of Computer and Information HoHai University,
NanJin, China,
38. e-Mail:gy_xu@126.com
39. 2010 Fifth IEEE International Symposium on Service Oriented System Engineering
40. Dependency Provenance in Agent Based Modeling, Peng Chen School of Informatics and Computing, Indiana University,
chenpeng@cs.indiana.edu, 2013 IEEE 9th International Conference on e-Science.Randy Goebel 1, , Sandra Zilles 1,
41. Knowledge Management Research German Research Centre for Artificial Intelligence D-67663 Kaiserslautern, Germany
{Andreas.Dengel, Gunnar.Grimnes}@dfki.de

Authors: Vishal Shah, Shridevi S

Paper Title: Health Insurance Data Processing using Linked Data


Abstract: The data in the organization is distributed among multiple structured databases. The large database
makes the process of risk analysis difficult, as data is distributed in the organization. Information gathering for
Risk analysis is more subjective and therefore, processing incomplete information over distributed databases
increase more fault in risk analysis. Linked Data representation helps to make structured, distributed data more
related, combined and ready to be processed. Linked Data approach makes data interlinked and semantically
rich, extracting meaning with the use of machines and eliminating the human subjectivity factor in assessing
insurance risk. Using Linked data, information retrieval process can be easier as data or databases interlinked
semantically. The proposed technique uses a linked data approach for risk analysis and related information
retrieval methods over structured data. The work efficiency is also tested and found to be good.

Keywords: Linked Data Analysis, Semantic-web, Ontology, Information retrieval and Gathering.

References:

1. Risk Factors in Life Insurance https://www.finder.com/risk-factors-in-life-insurance


2. T. Berners-Lee. (2006, Jul.). Linked Data [Online]. Available: http://www.w3.org/designissues/linkeddata.html
3. C. Bizer, T. Heath, K. Idehen, and T. Berners-Lee, “Linked Data on The Web (Ldow2008),” In Proc. Www 2008, Pp. 1265–1266.
4. National Audit Office (Nao), "Staying the Course: The Retention of Students in Higher Education," London, 2007.
146. 5. F. Sarker, H. Davis, and T. Tiropanis, "A Review of Higher Education Challenges and Data Infrastructure Responses," in Proceedings
of International Conference for Education Research and Innovation (ICERI2010), Madrid, Spain, 2010. 864-869
6. V. Tinto, "Dropout From Higher Education: A Theoretical synthesis Of Recent Research," Review of Educational Research, Vol. 45,
Pp. 89- 125, 1975.
7. V. Tinto, "Leaving College: Rethinking The Causes And Cures Of Student Attrition", Contemporary Sociology, 17(3).
8. K. E. Arnold. "Signals: Applying Academic Analytics", Educause Quarterly (EQ) Magazine, 2010.
9. Farhana Sarkar et al., “Linked Data, Data Mining And External Open Data for Better Prediction of At-Risk Students”, 2014
International Conference on Control, Decision and Information Technologies (CoDIT), DOI: 10.1109/CoDIT.2014.6996973.
10. V. Rawte And G. Anuradha, “Fraud Detection Using Data Mining Techniques,” 2015, Vol. 4, No. 1, Pp. 304–312.
11. Framework For The Identification Of Fraudulent Health Insurance Claims Using Association Rule Mining
12. Dumbill, Edd. What Is Big Data? An Introduction To The Big Data Langscape. [Online] January 11, 2012.
Http://Strata.Oreilly.Com/2012/01/What-­‐Is-­‐Big-­‐Data.Html.
13. James Manyika, Michael Chui, Brad Borwn, Jacques Bughin, Richard Dobbs, Charles Roxburgh, Angela Hung Byers. Big Data: The
Next Frontier For Innovation, Competition, And Productivity. S.L.: Mckinsey Global Institute,2011.
Http://Www.Mckinsey.Com/Insights/Mgi/Research/Technology_And_Innovation/Big_Data_The_Next_Frontier_For_Innovation.
14. Lishan Zhang, “How Structured Data (Linked Data) In Help in Big Data Analysis -- Expand Patent Data With Linked Data Cloud”.
15. Jie Yuan et al., “A Linked Data Approach For Geospatial Data Provenance”, IEEE Transactions on Geoscience and Remote Sensing,
Vol. 51, Issue. 11, Pp. 5105-5112.
16. P. Yue, Y. Wei, L. Di, L. He, J. Gong, And L. Zhang, “Sharing Geospatial Provenance In A Service-Oriented Environment,” Comput.,
Environ. Urban Syst., Vol. 35, No. 2, Pp. 333–343, 2011.
17. Raghu. (2018, April). Insurance, Version 1, Retrieved: August 20, 2019 From: https://www.kaggle.com/raghupalem/insurance
18. A. R. Cai Et Al., “Identification Of Adverse Interactions Through Causal Association Rule Discovery From Spontaneous Adverse
Event Reports,” Artif. Intell. Med.,2017.
19. D2R Server: A Semantic Web Front-End To Existing Relational Databases Richard Cyganiak And Christian Bizer Freie Universitat
Berlin ¨ Richard@Cyganiak.De, Chris@Bizer.De

Authors: Bharath Kumara, S. Anantha Padmanabhan

Paper Title: Optimized Data Collection and Computation using Internet of Things (IoT)
Abstract: IOT is one of the standard data transfer technique used in day today applications like health
monitoring, industrial data collection and in home security system. Security in data transmission is one of the
major concerned research area in IOT. The existing methodologies is secure data transmission is not provided
full fledge privacy for data collection and transmission. Hence, this paper proposed a new methodology to
compute and secure the valuable data. The methodology to optimize the data collection is achieved in two
different steps. The noise is added to original data in the first step to secure the original data. In second step
different nodes in the network/clustered average data will be computed. Later the research methods is
147.
implementing to minimize the data loss. To show the performance of the optimal data collection and secure
transmission we simulate different constraints of the network parameters and compared with existing methods. 870-873
The developed algorithm proved that it is one of the better data collection technique.

Keywords: IoT, Security, Data Collection, Throughput.

References:

1. B. Dorsemain, J. Gaulier “Internet of Things: A Definition & Taxonomy” 9th, International conference on NGMAST, Cambridge, 2015,
pp: 72-77.
2. G. Davis, “2020: life with 50 billion connected devices”, ICCE, las vegas, NV-2018, pp: 1-2.
3. A. A. Abed, “Internet of Things (IoT): Architecture and design," Al-Sadeq AIC-MITCSA, Baghdad, 2016, pp: 1-3.
4. P. V. Dudhe, N. V. Kadam, R. M. Hushangabade and M. S. Deshmukh, "Internet of Things (IOT): An overview and its applications,"
ICECDS, Chennai, 2017, pp: 2650-2653.
5. L. Krishnamachari, D. Estrin and S. Wicker, "The impact of data aggregation in wireless sensor networks," Proceedings 22nd
International Conference on Distributed Computing Systems Workshops, Vienna, Austria, 2002, pp. 575-578.
6. R. Neisse, G. Steri and G. Baldini, "Enforcement of security policy rules for the Internet of Things," 2014 IEEE 10th International
Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Larnaca, 2014, pp. 165-172.
7. Z. Ling, K. Liu, Y. Xu, Y. Jin and X. Fu, "An End-to-End View of IoT Security and Privacy," GLOBECOM 2017, Singapore, 2017, pp:
1-7.
8. B. Yu, J. Wright, S. Nepal, L. Zhu, J. Liu and R. Ranjan, "IoT Chain: Establishing Trust in the Internet of Things Ecosystem Using
Block chain," in IEEE Cloud Computing, vol. 5, pp. 12-23, Jul./Aug. 2018.
9. M. Alramadhan and K. Sha, "An Overview of Access Control Mechanisms for Internet of Things," 2017 26th ICCCN, Vancouver, BC,
2017, pp: 1-6.
10. Y. Sharaf-Dabbagh and W. Saad, "On the authentication of devices in the Internet of things," 2016 IEEE 17th International Symposium
on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), Coimbra, 2016, pp. 1-3.
11. O. Arias, J. Wurm, K. Hoang and Y. Jin, "Privacy and Security in Internet of Things and Wearable Devices," in IEEE Transactions on
Multi-Scale Computing Systems, vol. 1, no. 2, pp. 99-109, 1 April-June 2015.
12. D. Díaz-Sánchez, R. S. Sherratt, F. Almenarez, P. Arias and A. Marín, "Secure store and forward proxy for dynamic IoT applications
over M2M networks," in IEEE Transactions on Consumer Electronics, vol. 62, no. 4, pp. 389-397.
13. N. Li, D. Liu and S. Nepal, "Lightweight Mutual Authentication for IoT and Its Applications," in IEEE Transactions on Sustainable
Computing, vol. 2, no. 4, pp. 359-370, 1 Oct.-Dec. 2017.
14. L. Zhang, Y. Zhang, S. Tang and H. Luo, "Privacy Protection for E-Health Systems by Means of Dynamic Authentication and Three-
Factor Key Agreement," in IEEE Transactions on Industrial Electronics, vol. 65, no. 3, pp. 2795-2805, March 2018.
15. Fan Wu, Lili Xu, Saru Kumari, Xiong Li, Jian Shen, Kim-Kwang Raymond Choo, Mohammad Wazid, Ashok Kumar Das, An efficient
authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment, Journal of Network and
Computer Applications, Volume 89, 2017, Pages 72-85,ISSN 1084-8045.
16. C. Liu et al., "Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates," in
IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 9, pp. 2234-2244, Sept. 2014.
17. J. Baek, Q. H. Vu, J. K. Liu, X. Huang and Y. Xiang, "A Secure Cloud Computing Based Framework for Big Data Information
Management of Smart Grid," in IEEE Transactions on Cloud Computing, vol. 3, no. 2, pp. 233-244, 1 April-June 2015.
18. C. Liu, R. Ranjan, C. Yang, X. Zhang, L. Wang and J. Chen, "MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based
Secure Public Auditing for Dynamic Big Data Storage on Cloud," in IEEE Transactions on Computers, vol. 64, no. 9, pp. 2609-2622, 1
Sept. 2015.
19. Z. Yan, W. Ding, X. Yu, H. Zhu and R. H. Deng, "Deduplication on Encrypted Big Data in Cloud," in IEEE Transactions on Big Data,
vol. 2, no. 2, pp. 138-150, 1 June 2016.
20. Goyal, Vipul & Pandey, Omkant & Sahai, Amit & Waters, Brent. (2006). Attribute-based encryption for fine-grained access control of
encrypted data. Proceedings of the ACM Conference on Computer and Communications Security. 89-98. 89-98.
10.1145/1180405.1180418.
21. Y. Yang, X. Liu and R. H. Deng, "Lightweight Break-Glass Access Control System for Healthcare Internet-of-Things," in IEEE
Transactions on Industrial Informatics, vol. 14, no. 8, pp. 3610-3617, Aug. 2018.
22. K. Yang, X. Jia and K. Ren, "Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud," in IEEE
Transactions on Parallel and Distributed Systems, vol. 26, no. 12, pp. 3461-3470, 1 Dec. 2015.
23. Y. Miao, J. Ma, X. Liu, X. Li, Q. Jiang and J. Zhang, "Attribute-Based Keyword Search over Hierarchical Data in Cloud Computing,"
in IEEE Transactions on Services Computing.
24. P. Xu, H. Jin, Q. Wu and W. Wang, "Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword
Guessing Attack," in IEEE Transactions on Computers, vol. 62, no. 11, pp. 2266-2277, Nov. 2013.
25. Keshav, S. padmanabhan “An overview of IoT, and services” national conference on IoT technologies, 2019, Hassan, PP: 20-24.

Authors: Qistina Donna Lee Abdullah, Khashini Devi R. Varatharajoo

Paper Title: Schematic Representation of Bridging Artistic Skills and Leadership Styles
Abstract: Leadership in this digital era is currently gaining lots of attention from all over the world including
Malaysia. It is like a life to all organizations as it is merely impossible to move forward without leadership. This
21st century world and generation demand for a more different leadership practice which is more flexible.
Basically, it all lies in the hands of a leader on how strategic the leadership is going to be and how well a team’s
talent can be extracted. This paper presents a conceptual framework that studies the artistic skills and leadership
characteristics to be included in the leadership styles. This paper also addresses the independent variables and
the dependent variables which formed the whole framework. Systematic review methodology is employed
whereby data are obtained from evidenced literatures. The justification behind choosing each and every
variables are provided based on valid literature sources. Art is being bridged into leadership for a newer change
and experience. Explanations are also provided on how this framework actually works. This framework serves
as guideline which is applicable to all organizations in the country. The main aim of this paper is to suggest a
148. newer practice of leadership to bring a new and better change to the organization and country.

Keywords: Artistic skills, Behaviours, Leadership, Traits. 874-878

References:

1. Aalateeg, S. (2017). Literature review on leadership theories. Journal of Business and Management, 19(11), 35-43.
2. Adler, N. (2006). The arts and leadership: Now that we can do anything, what will we do? Academy of Management Learning and
Education, 5 (4), 486-499.
3. Adom, D., Hussein, E. K., & Agyem, J. A. (2018). Theoretical and conceptual framework: Mandatory ingredients of a quality research.
International Journal of Scientific Research, 7(1), 438-441.
4. Ahmed, A. D., & Bach, C. (2014). Major traits/qualities of leadership. International Journal of Innovation and Scientific Research,
3(1), 47-53.
5. Alkahtani, A. H. (2016). The influence of leadership styles on organizational commitment: The moderating effectof emotional
intelligence. Business and Management Studies, 2(1), 23-34.
6. Bass, B. M., & Avolio, B. J. (1994). Improving organizational effectiveness: Through transformational leadership. Oaks, CA: Sage.
7. Bahadur, W., Bano, A., & Waheed, Z. (2017). Leadership behaviour in high-performing government boys secondary schools in Quetta:
A grounded theory analysis. Journal of Education and Educational Department, 153-176.
8. Crowther, M., Lim, W., & Crowther, M. A. (2010). Systematic review and meta-analysis methodology. Blood, 116(17), 3140-3146.
9. Daft, R. L. (2011). The leadership experience. Mason, USA: South-Weatern Cengage Learning.
10. Deleuze, G., & Guattari, F. (1991). What is philosophy? New York, NY: Columbia University Press.
11. Derue, D. S., Nahrgang, J. D., Wellman, N., & Humphrey, S. E. (2011). Trait and behavioural theories of leadership: An integration
and meta-analytic test of their relative validity. Personnel Psychology, 64(1), 7-52.
12. English Oxford Living Dictionary. (2018). Retrieved from Oxford University Press:
https://en.oxforddictionaries.com/definition/behaviour
13. Gamache, G. (2016, October 8). Leaderonomics.com. Retrieved from https://leaderonomics.com/pdf/MSJ-161008-08.pdf
14. George, B. (2003). Authentic leadership. San Fransisco, CA: Jossey-Bass.
15. Hossain, K. A. (2015). Leadership qualities for 21st century leaders. Pearl Journal of Management, Social Sciences and Humanities,
1(1), 18-29.
16. Imenda, S. (2014). Is there a conceptual difference between theoretical and conceptual frameworks? Journal of Social Sciences, 38(2),
185-195.
17. Jabareen, Y. (2009). Biulding a conceptual framework: Philosophy, definitions and procedure. International Journal of Qualitative
Methods, 8(4), 49-62.
18. Martin, C. (2005). From high maintenance to high productivity: What managers need to know about Generation Y. Industrial and
Commercial Training, 37(1), 39-44.
19. Maxwell, J. (2005). Qualitative research design. Thousand Oaks, CA: Sage.
20. Northouse, P. G. (2015). Leadership: Theory and practice. Thousand Oaks, CA: Sage Publications.
21. Sharkawi, S., Mohamad, S. S., & Roslin, R. (2016). Exploring the leadership preference of Malaysian generation Y employees: A
conceptual paper. International Journal of Business and Management, 11(8), 152-161.
22. Tamene, H. E. (2016). Theorizing conceptual framework. Asian Journal of Educational Research, 4(2), 50-56.
23. Tolstoy, L. (1986). What is Art? Retrieved from Minnesota State University Moorhead:
http://web.mnstate.edu/gracyk/courses/phil%20of%20art/printer-friendly/Tolstoy_on_Art_TWO_COLUMNS.pdf
24. Wakabi, B. M. (2016). Leadership style and staff retention in organisations. International Journal of Science and Research, 5(1), 412-
416.

Authors: Raghavaraju Aradhyula, T V Rama Krishna, B T P Madhav


Electromagnetic Bandgap Structured CPW Fed Circular Monopole Antenna with Bandwidth
Paper Title:
Enhancement for Wideband Applications
Abstract: A circular monopole antenna with coplanar wave guide feeding is constructed with the combination
of Electromagnetic Band Gap structure for the improvement of bandwidth. A plus shaped defected ground is
etched on the ground plane to obtain the EBG characteristics in the proposed antenna model. A complete
analysis with respect to reflection coefficient, VSWR, impedance, radiation pattern, current distribution, gain
and efficiency are presented in this work. The proposed model occupying the dimension of 50X50X1.6 mm on
FR4 substrate with dielectric constant of 4.3. Antenna operating in the dual band of 1.5-3.6 GHz (GPS, LTE,
Bluetooth and Wi-Fi applications) and 4.8-15 GHz (WLAN, X-Band and Satellite communication applications)
with bandwidth of 2.1 and 10.2 GHz respectively. A peak realized gain of 4.8 dB and peak efficiency more than
80% are the key features of the current design.

Keywords: Bandwidth Enhancement, Coplanar Waveguide Feeding (CPW), Electromagnetic Bandgap (EBG),
Monopole, Wideband.

References:

1. Krishnam Naidu Yedla, G.S., Kumar, K.V.V., Rahul, R., , “Fractal aperture EBG ground structured dual band planar slot antenna”,
149. International Journal of Applied Engineering Research, ISSN 0973-4562, Volume 9, Number 5, (2014), pp 515-524.
2. VGKM Pisipati, Habibulla Khan, D Ujwala, “ Fractal shaped Sierpinski on EBG structured ground plane”, Leonardo Electronic
Journal of Practices and Technologies, ISSN 1583-1078, Issue 25, (2014), pp 26-35. 879-882
3. M S S S Srinivas, T V Ramakrishna, N Bhagyalakshmi, S Madhavi, K Venkateswarulu, “A Novel Compact CPW Fed Slot Antenna
with EBG Structure”, ARPN Journal of Engineering and Applied Sciences, ISSN 1819-6608, Vol. 10, No. 2, (2015), pp 835-841.
4. D. Naga Vaishnavi, G. Vanaja, G. Jayasree and S. Mounika, Design and analysis of metamaterial antenna with EBG loading, Far East
Journal of Electronics and Communications, ISSN: 0973-7006, Vol 14, No 2, (2015), pp 127-136.
http://dx.doi.org/10.17654/FJECJun2015_127_136.
5. Mounika Sanikommu, M. N. V. S. Pranoop, K. S. N. Manikanta Chandra Bose and B. Sriram Kumar, CPW Fed Antenna for
Wideband Applications based on Tapered Step Ground and EBG Structure, Indian Journal of Science and Technology, ISSN: 0974-
6846, Vol 8, Issue 9, (2015), pp 119-127.
6. Yalavarthi Usha Devi, Mulpuri S. S. Rukmini, A Compact Conformal Printed Dipole Antenna for 5G Based Vehicular
Communication Applications, Progress in Electromagnetics Research C, Vol. 85, (2018), pp 191–208.
7. B T P Madhav, T Anil Kumar, Design and study of multiband planar wheel-like fractal antenna for vehicular communication
applications, Microwave and Optical Technology Letters, Vol 60, (2018), pp 1985-1993, DOI: 10.1002/mop.31290.
8. B T P Madhav, T. Anilkumar, Sarat K. Kotamraju, Transparent and conformal wheel-shaped fractal antenna for vehicular
communication applications, AEU-International Journal of Electronics and Communications, ISSN: 1434-8411, Vol 91, (2018), pp 1-
10.
9. B Sreekanth Deepak, V S V Prabhakar, Lakshman P, T Anilkumar, M Venkateswararao, Design and Analysis of Hetero Triangle
Linked Hybrid Web Fractal Antenna for Wide Band Applications, Progress in Electromagnetics Research C, Vol 83, (2018), pp 147-
159.
10. M Purna Kishore, Bandwidth Enhancement of CPW-Fed Elliptical Curved Antenna with Square SRR, International Journal of
Intelligent Engineering and Systems, Vol 11, No 2, (2018), pp 68-75.
11. B T P Madhav, M Purna Kishore, Bandwidth enhanced CPW fed elliptical wideband antenna with slotted defected ground structure,
International Journal of Engineering and Technology, Vol 7, Issue 2.8, (2018), pp 365-3.
Authors: G.Kirubakaran, D.Dineshkumar, R.Varun Prakash

Paper Title: A 10-bit 150MS/s Pipelined ADC with 2.5bit Gain Stage for High Frequency Applications
Abstract: This paper proposes a 10-bit pipelined Analog to Digital Converter (ADC) which incorporates
various techniques for lesser power and higher performance. The proposed method reduces the computational
burden while comparing to the modified Monte-Carlo (MC) method. Pipelined ADC has N number of stages, it
has higher resolution and higher frequency of conversion while comparing to other ADCs. The proposed ADC
employs five 2.5bit gain stages; instead of 1.5bit gain stages for high accuracy. This method is implemented in
the Tanner Software with the Generic 250nm library at a maximum power supply of 5V. The maximum
frequency attained is 150MHz; and the ADC exhibits a SNR of 61.96dB. It also attains a 10bits as effective
number of bits at the maximum sampling rate.

150. Keywords: Evolutionary algorithm, Monte-Carlo (MC), Pipelined ADC, 2.5bit gain stage, 10-bit ADC. 883-886

References:

1. E.O.Blair et al (Aug. 2017), “Improving the yield and lifetime of micro fabricated sensors for harsh environments,” IEEE Trans.
Semicond. Manuf., vol. 30, no. 3, pp. 192–200.
2. Jung.S, Lee.J, and Kim.J (Oct. 2014), “Yield-aware Pareto front extraction for discrete hierarchical optimization of analog circuits,”
IEEE Trans. Computer-Aided Design Integr. Circuits Syst., vol. 33, no. 10, pp. 1437–1449.
3. Lan.F, Pan.Y, and Cheng.K-T.T (Mar. 2016), “An efficient network-on-chip yield estimation approach based on gibbs sampling,”
IEEE Trans.Comput.-Aided Design Integr. Circuits Syst., vol. 35, no. 3, pp. 447–457.
4. Liu.B, Fernández. F.V, and Gielen G.G.E (Jun. 2011), “Efficient and accurate statistical analog yield optimization and variation-aware
circuit sizing based on computational intelligence techniques,” IEEE Trans. Comput. -Aided Design Integr. Circuits Syst., vol. 30, no.
6, pp. 793–805.
5. Nakazawa. T, Kulkarni D.V, and O. A. Martin (Aug. 2016), “IC substrate package yield prediction model and layer level risk
assessment by design analysis,” IEEE Trans. Semicond. Manuf., vol. 29, no. 3, pp. 257–262.
6. Milor.L (May 2013), “A survey of yield modeling and yield enhancement methods,” IEEE Trans. Semicond. Manuf., vol. 26, no. 2,
pp. 196–213.
7. ChenY-L, Wu. W-R, C.-N. J. Liu, and J. C.-M. Li (Jan. 2014), “Simultaneous optimization of analog circuits with reliability and
variability for applications on flexible electronics,” IEEE Trans. Comput.-Aided Design Integr.Circuits Syst., vol. 33, no. 1, pp. 24–35.
8. Tao.S, Abbe.E, and Verma.E (Jun. 2015), “Statistical ADC enhanced by pipelining and subranging,” IEEE Trans. Circuits Syst. II,
Exp. Briefs, vol. 62, no.6, pp. 538–542
9. Chiu.Y, Gray.P.R, and Nikolic.B (Dec. 2004), “A 14-b 12-MS/s CMOS pipeline ADC with over 100-dB SFDR,” IEEE J. Solid-State
Circuits, vol. 39, no. 12, pp. 2139–2151.
10. Sehgal.R, van der Goes.F, and Bult.K (Jul. 2015), “A 12 b 53 mW 195 MS/s pipeline ADC with 82 dB SFDR using split-ADC
calibration,” IEEEJ. Solid-State Circuits, vol. 50, no. 7, pp. 1592–1603.
11. Myonglae Chu, Byoungho Kim, Byung-Geun Lee (Nov. 2015), “A 10-bit 200-MS/s zero-crossing-based pipeline ADC in 0.13-μm
CMOS technology,” IEEE Trans. Very Large Scale Integr.(VLSI) Syst., vol. 23, no. 11, pp. 2671–2675.
12. Ruiz-Amaya.J, Delgado-Restituto.M, and Rodriguez-Vázquez.A (Dec. 2011), “Transistor-level synthesis of pipeline analog-to-digital
converters using a design-space reduction algorithm,” IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 58, no. 12, pp. 2816–2828.
13. D.W.Cline and Paul R.Gray (May 1995), “A power optimized 13-bit 5M samples/s pipelined analog to digital converter in 1.2μm
CMOS”, Proceedings of the IEEE 1995 Custom Integrated Circuits Conference,
14. T.B. Cho and P.R. Gray (May 1994), “A 10-bit, 20-MS/s, 35-mW pipeline A/D converter”, Proceedings of IEEE Custom Integrated
Circuits Conference,
15. Mirzaie, N., Shamsi, H. & Byun. GS, “Resilient design of current steering DACs using a transistor level approach”, Analog Integr
Circ Sig Process (2017) 90: 29.
16. The International Roadmap for Semiconductors (ITRS) 2.0. [Online], 2015 Available: http://www.itrs2.net

Authors: Shubham Dhokale, Sanjay Bahulikar, Vishal Hemke

Paper Title: Effect of Helix Angle on the Gear Design Parameters in Helical Gears
Abstract: Screw compressor demands quite operation. For getting lower noise it is important to have higher
contact ratio. Contact ratio can be increased by increasing the Helix angle i .e. indirectly increasing overlap ratio.
The paper represents the effect of change in design parameters with respect to helix angle with the keeping same
module and same centre distance. Higher helix angle leads lower bending and contact stresses. The study was
conducted for screw electrical compressor. Gear was design for fixed parameters except helix angle. Also the
contact stresses are analyzed (FEA) on ANSYS. The result from the calculation and FEA are compared for
contact stress as well as bending stress.

Keywords: contact ratio, contact stress, FEA, overlap ratio.


References:
151.
1. Mats Åkerblom “Gear Noise And Vibration– A Literature Survey”
2. Yoon K. Purdue. University,Doctoral Thesis, 1993.”Analysis of Gear Noise and Design for Gear Noise Reduction” 887-890
3. A. Kahraman, G.W. Blankenship, Transactions of ASME, Journal of Mechanical Design, vol. 121, pp. 112-118, March 1999. “Effect
of Involute Contact Ratio on Spur Gear Dynamics”.
4. H.H. Lin, J. Wang, F. Oswald, J.J. Coy, Gear Technology, pp. 18-25, July/August 1994. “Effect of Extended Tooth Contact on the
Modeling of Spur Gear Transmissions”.
5. V.I. Nikolayev, E.I. Podzharov, SU Patent 1320568, February 12, 1986. “Involute Spur Gear”.
6. E.B. Vulgakov, Moscow: Mashinostroenie,1974. “Gears with Better Properties”.
7. W.S. Rouverol, Y. Watanabe, in International Symposium on Gearing and Power Transmissions, Tokyo, 1981, pp. 103-108.
“Maximum-Conjugacy Gearing. –Part 1. Theory”.
8. Y. Watanabe, W.S. Rouverol, in International Symposium on Gearing and Power Transmissions, Tokyo, 1981, pp. 109-114.
“Maximum-Conjugacy Gearing. –Part 2. Test Results
9. Smith J. D. C08293 IMechE 1994 “Helical Gear Vibration Excitation with Misalignment”.
10. Iwase Y., Miyasaka K. JSAE Review 17 (1996) pp 191-193. ”Proposal of Modified Tooth Surface with Minimized Transmission Error
of Helical Gears”.
11. Drago R. J. Machine Design, Dec. 1980.”How to Design Quiet Transmissions”.
12. Masuda T., Abe T., Hattori K. Journal of Vibration, Acoustics, Stress and Reliability in Design, Vol. 108, Jan. 1986 pp 95-100.
”Prediction Method of Gear Noise Considering the Influence of the Tooth Flank Finishing Method”.

Authors: B.Selvalakshmi, M.Subramaniam


Hierarchical Semantic Relational Coverage Measure Based Web Document Clustering Using
Paper Title:
Semantic Ontology
Abstract: The problem of web document clustering has been well studied. Web documents has been grouped
based various features like textual, topical and semantic features. Number of approaches has been discussed
earlier for the clustering of web documents. However the method does not produce promising results towards
web document clustering. To overcome this, an efficient hierarchical semantic relational coverage based
approach is presented in this paper. The method extracts the features of web document by preprocessing the
document. The features extracted have been used to measure the semantic relational coverage measure in
different levels. As the documents are grouped in a hierarchical manner, the method estimates the relational
coverage measure in each level of the cluster. Based on the semantic relational measure at different level, the
method estimates the topical semantic support measure. Using these two, the method computes the class weight.
The estimated class weight has been used to perform document clustering. The proposed method improves the
performance of document clustering and reduces the false classification ratio.

Keywords: Web Semantics, Semantic Ontology, Clustering, Hierarchical Clustering. SRC, TSS.

References:

1. Vajenti Mala ; D. K. Lobiyal, Semantic and keyword based web techniques in information retrieval, Computing, Communication and
Automation (ICCCA), 2016
2. Weiguang Fang ; Yu Guo ; Wenhe Liao,Ontology-based indexing method for engineering documents retrieval, (ICKEA),2017.
3. Avani Chandurkar ; Ajay Bansal ,Information Retrieval from a Structured KnowledgeBase, ICSC, 2017
4. Sanjib Kumar Sahu ; D. P. Mahapatra ; R. C. Balabantaray, Analytical study on intelligent information retrieval system using
semantic network, Computing, ICCCA, 2016. 891-896
5. Thaer SamarMyriam C. TraubJacco van OssenbruggenLynda HardmanArjen P. de Vries, Quantifying retrieval bias in Web archive
search, Springer, International Journal on Digital Libraries, Vol 19, Issue 1, pp 57–75,2018.
6. Bashir, S., Rauber, A.: On the relationship between query characteristics and IR functions retrieval bias. J. Am. Soc. Inf. Sci.
152.
Technol. 62(8), 1515–1532 (2011)
7. Klein, M., Nelson, M.L.: Moved but not gone: an evaluation of real-time methods for discovering replacement web pages. Int. J. Digit.
Libr. 14(1–2), 17–38 (2014)
8. Traub, M.C., Samar, T., van Ossenbruggen, J., He, J., de Vries, A., Hardman, L.: Querylog-based assessment of retrieve-ability bias in
a large newspaper corpus. In: Proceedings of the 16th ACM/IEEE-CS on Joint Conference on Digital Libraries, pp. 7–16. ACM (2016)
9. Azadeh Mohebi, Subject-based retrieval of scientific documents, case study: Retrieval of Information Technology scientific articles,
Library Review, Vol. 66 Issue: 6/7, pp.549-569.
10. Hany M Harb, Khaled M. Fouad , Nagdy M. Nagdy, Semantic Retrieval Approach for Web Documents, International Journal of
Advanced Computer Science and Applications(IJACSA), Volume 2 Issue 9, 2011.
11. Yanti Idaya Aspura M.K., Shahrul Azman Mohd Noah, (2017) "Semantic text-based image retrieval with multi-modality ontology and
DBpedia", The Electronic Library, Vol. 35 Issue: 6, pp.1191-1214.
12. Wen Lou, Junping Qiu, (2014) "Semantic information retrieval research based on co-occurrence analysis", Online Information
Review, Vol. 38 Issue: 1, pp.4-23.
13. Shengtao Sun, Semantic analysis and retrieval of spatial data based on the uncertain ontology model in Digital Earth, International
Journal of Digital Earth Volume 8, 2015 - Issue 1.
14. Mohamed Marouf Z. Oshaiba, Enas M. F. El Houby, and Akram Salah, Semantic Annotation for Biological Information Retrieval
System, Hindawi, Advances in Bioinformatics Volume 2015 (2015).
15. M. Uma Devi and G. Meera Gandhi, Wordnet and Ontology Based Query Expansion for Semantic Information Retrieval in Sports
Domain, Journal of Computer Science, 2015.
16. Kara, Soner, et al. "An ontology-based retrieval system using semantic indexing." Information Systems 37.4 (2012): 294-305.

Authors: Indra Ranggadara

Paper Title: Fuzzy Tsukamoto and ITIL for Improvement Strategy on Incident Ticket Services
Abstract: Ticket Incident is a service provided to clients who work with Meraki Digital Indonesia. At present
Ticket incident is a significant problem in terms of service, especially in handling correction software that has
the highest number of tickets, because the software development planning is not optimal because the client needs
software that is built because of the large number of ticket incidents that occur, so it is necessary to improve
service to clients. So we need a way to improve incident ticket service using the ITIL method. This improvement
method is following the purpose of assessment in each area service operation by using questionnaires, then to
correct this problem another approach is needed with Fuzzy Tsukamoto to measure how many tickets need to be
153. completed to improve the services provided. The results of this study based on the assessment using ITIL found
Service Operation Processes and Organizing Service Operations as a weakness, and from the results of Fuzzy
Tsukamoto with the calculation of 162 tickets that need to be appropriately resolved so that it becomes a 897-903
reference for developing and improving services provided to clients.

Keywords: Fuzzy Tsukamoto, ITIL, Service Operation, Ticket Incident.

References:

1. R. Yulistyo and N. R. Kurnianda, “Analysis and Design of Information System for Social Services Administrative of ‘Semut
Adventure’ Natural Lover Community in Kembangan Utara Country State with Web Based Method,” International Journal of
Computer Science and Mobile Computing, vol. 7, no. 7, pp. 11–19, 2018.
2. M. D. S. Asyari and Y. S. Triana, “Credit Analysis Tool System Application Using Cobit 4.1 Method Approach,” International Journal
of Computer Science and Mobile Computing, vol. 7, no. 4, pp. 153–165, 2018.
3. S. I. Dugguh, I. Aki, and S. O. Isaac, “Impact of Growth Strategies on Business Profit A Study of Ashakacem Plc, Gombe-Nigeria,”
IOSR Journal of Business and Management, vol. 20, no. 2, pp. 23–29, 2018.
4. A. Berisha Shaqiri, “Impact of Information Technology and Internet in Businesses,” Academic Journal of Business, Administration,
Law and Social Sciences, vol. 1, no. 1, pp. 73–79, 2015.
5. I. S. Jalham and W. T. Abdelkader, “Improvement of organizational efficiency and effectiveness by developing a manufacturing
strategy decision support system,” Business Process Management Journal, vol. no. 5, pp. 588–607, Sep. 2006.
6. [6] D. Cannon and D. Wheeldon, ITIL V3 - Service Operation. Buckinghamshire: Office Governance of Commerce, 2007.
7. G. N. Kumar and C. R. S. Reddy, “Electronic Support Ticket Management System,” International Journal of Engineering Research &
Technology, vol. 2, no. 9, pp. 1544–1547, 2013.
8. J. Iden and T. R. Eikebrokk, “Implementing IT Service Management: A systematic literature review,” International Journal of
Information Management, vol. 33, no. 3, pp. 512– 523, 2013.
9. H. M. Solehah and S. P. Hadi, “STRATEGI IMPLEMENTASI CONTINUAL SERVICE IMPROVEMENT MENGGUNAKAN
FRAMEWORK ITIL V.3,” in Seminar Nasional Teknologi Informasi dan Komunikasi, 2014, pp. 579–587.
10. K. Sani, W. W. Winarno, and S. Fauziati, “STRATEGI Peningkatan Model Layanan Sistem Informasiakademik Mahasiswa
Menggunakanframeworkitilv.3 Dancobit 4.1 Di Universitas Ahmad Dahlan Yogyakarta,” in Seminar Nasional Teknologi Informasi
dan Multimedia, 2015, pp. 25–30.
11. M. M. AlShamy, E. Elfakharany, and M. A. ElAziem, “Information Technology Service Management (ITSM) Implementation
Methodology Based on Information Technology Infrastructure Library Ver.3 (ITIL V3),” International Journal of Business Research
and Management, vol. 3, no. 3, pp. 113–132, 2012.
12. A. Cartlidge, A. Hanna, C. Rudd, I. Macfarlane, J. Windebank, and S. Rance, An Introductory Overview of ITIL. Norwich: itSMF Ltd,
2007.
13. M. Alojail, A. C. Rouse, and B. J. Corbitt, “The impact of ITIL (information technology infrastructure library) recommended practices
on the IT outsourcing relationship,” in 23rd Australasian Conference on Information Systems, 2012, pp. 1–10.
14. H. B. Kusumo, D. Remawati, and Y. R. W. Utami, “SISTEM PENDUKUNG KEPUTUSAN PENANGANAN GIZI BALITA
DENGAN METODE FUZZY MAMDANI,” Jurnal Ilmiah SINUS, vol. 16, no. 1, pp. 51–64, 2018.
15. M. Sholihin, N. Fuad, and N. Khamiliyah, “Sistem Pendukung Keputusan Penentuan Warga Penerima Jamkesmas Dengan Metode
Fuzzy Tsukamoto,” Jurnal Teknika, vol. 5, no. 2, pp. 501–506, 2013.
16. S. Rouhani and A. Z. Ravasan, “A Fuzzy TOPSIS based Approach for ITSM Software Selection,” International Journal of IT/Business
Alignment and Governance, vol. 5, no. 2, pp. 1–26, 2014.
17. H. Zarrazvand and M. Shojafar, “The Use of Fuzzy Cognitive Maps in Analyzing and Implementation of ITIL Processes,”
International Journal of Computer Science, vol. 9, no. 3, pp. 511–524, 2012.
18. A. Z. Ravasan, T. Mansouri, M. M. Mohammadi, and S. Rouhani, “Supporting the Module Sequencing Decision in ITIL Solution
Implementation,” International Journal of Information Technologies and Systems Approach, vol. 7, no. 2, pp. 41–60, Jul. 2014.
19. S. Rouhani, “A fuzzy superiority and inferiority ranking based approach for IT service management software selection,” Kybernetes,
vol. 46, no. 4, pp. 728–746, Apr. 2017.
20. Sugiyono, Metode Penelitian Kuantitatif Kualitatif dan R&D. Bandung: Alfabeta, 2016.
21. K. Sri and H. Purnomo, Aplikasi Logika Fuzzy untuk Pendukung Keputusan. Yogyakarta: Graha Ilmu, 2010.

Authors: P.Yogapriya, P.Geetha


Paper Title: Dengue Disease Detection using K- Means, Hierarchical, Kohonen- SOM Clustering
Abstract: Data Mining is the process of extracting useful information. Data Mining is about finding new
information from pre-existing databases. It is the procedure of mining facts from data and deals with the kind of
patterns that can be mined. Therefore, this proposed work is to detect and categorize the illness of people who
are affected by Dengue through Data Mining techniques mainly as the Clustering method. Clustering is the
method of finding related groups of data in a dataset and used to split the related data into a group of sub-classes.
So, in this research work clustering method is used to categorize the age group of people those who are affected
by mosquito-borne viral infection using K-Means and Hierarchical Clustering algorithm and Kohonen-SOM
algorithm has been implemented in Tanagra tool. The scientists use the data mining algorithm for preventing and
defending different diseases like Dengue disease. This paper helps to apply the algorithm for clustering of
Dengue fever in Tanagra tool to detect the best results from those algorithms.

Keywords: Clustering,DataMining,Dengue,Hierarchical,K-Means,Kohonen-SOM,Tanagra.

References:

154. 1. Ritu Chauhan et al., “ Data Clustering method for Discovering Clusters in spatial cancer Databases”, International Journal of
Computer Applications, volume.10, Special Issues. 6, November 2010.
2. P.Manivannan, P. Isakki Devi., “Dengue fever prediction using K-Medoid Clustering Algorithm”, International Journal of Innovative 904-907
Research in Computer and Communication Engineering, volume.5, Special Issue.1, March 2017.
3. Sahanaa C.*, Amit Kumar Mishra, Joy Bazroy., “Trend of Morbidity and Mortality of Dengue in Tamil Nadu and Puducherry, South
India”, International Journal of Community Medicine and Public Health, volume.5, Special Issue.1, January 2018.
4. Kamran Shaukat et al., “Dengue Fever in Perspective of Clustering Algorithms”, International Journal of Data Mining in Genomics
and Proteomics, volume.6, Special Issue.3, 2015.
5. P.Sathya, Mrs.A.Sumathi.,” Predicting Dengue Fever Using Data Mining Techniques”, International Journal of Computer Science and
Technology, volume.6, Special Issue.2, March-April 2018.
6. Rao, K, K, N., Varma, S, P, G., and Rao, V, N., “Classification Rules using Decision Tree for Dengue Disease”, International Journal
of Research in Computer and Communication Technology, volume.3, Special Issue.3, March 2014.
7. S.Muthukumaran, E.Ramaraj., “A Multilayered Backpropagation Algorithm to Predict Significant Attributes of UG Pursuing Students
Absenteeism at Rural Educational Institution”, International Journal of Computer Science and Engineering, volume.6, Issue.3,
December 2018.
8. P.Manivannan, P.Isakki Devi., “Dengue Fever Prediction using K-Means Clustering Algorithm”, International Conference Techniques
in Control, Optimization and Signal Processing, volume.5, Special Issue.1, March 2017.
9. KR.Sivabalan, E.Ramaraj., “Remote Sensing Satellites and its agricultural development technical aspects”, International Journal of
Computer Science and Engineering, volume.6, Special Issue.9, September 2018.
10. Mohammed Shahadat Hossain, Ishrat Binteh Habib, Karl Andersson, “A Belief Rule-Based Expert System to Diagnose Dengue Fever
under Uncertainty”, IEEE Computing Conference, volume.1, Special Issue.5, July 2017.
11. Shamimul Hasan, Sami Faisal Jamdar et al., “Dengue Virus: A global human threat: Review of Literature”, Journal of International
Society of Preventive and Community Dentistry, volume.6, Special Issue.1, Jan-Feb 2016.
12. N.K. Kameswara Rao, Dr. G.P.Saradhi Varma, Dr. M. Nagabhushana, “Classification rules using Decision Tree for Dengue Disease”,
International Journal of Research in Computer and Communication Technology, volume.3, Issue.3, March 2014.
13. R.Karthikeyan, Dr. P. Geetha, Dr. E. Ramaraj, “ Rule-Based System for Better Prediction Of Diabetes”, IEEE Third International
Technology Conference on Computing and Communication, volume.1, Issue.1, 2019.

Authors: G. Karuna, I. Rama Krishna, G.Venkata Rami Reddy

Paper Title: An Efficient Parallel and Distributed Algorithm on Top of MapReduce


Abstract: The undertaking of subspace bunching is for discover concealed groups present in various
subspaces inside of dataset. Lately, through the accumulate development of information extent as well as
information measurements, conventional subspace grouping calculations convert wasteful just as ineffectual
whereas extricating learning in the huge information condition, bringing about a rising need to structure
productive parallel circulated subspace bunching calculations to deal with huge multi- dimensional information
by an adequate calculus expense. This article provides MapReduce-dependent calculation of a parallel mafia
subspace bunching. The calculation exploits MapReduce's information apportioning in addition undertaking
parallelism and accomplishes decent tradeoff amongst the expense for plate gets to besides correspondence fare.
The exploratory results indicate near immediate accelerations and demonstrate the elevated adaptability and
incredible opportunities for implementation of the suggested calculation.

Keywords: MapReduce, Parallelism, Subspace bunching.

References:

1. XIA Ying, LI Ke-fei2,”Subspace search algorithm based on attribute relativity analysis”, Journal of Chongqing University of Posts and
155. Telecommunications(Natural Science Edition);2009-04
2. YAN Xiao-long,SHEN Hong(Department of Computer Science and Technology,University of Science and Technology of China,Hefei
Anhui 230027,China),Subspace clustering method for high dimensional data stream, Journal of Computer Applications;2007-07 908-911
3. C. C. Aggarwal, J. L. Wolf, P. S. Yu, C. Procopiuc, and J. S. Park, "Fast algorithms for projected clustering," Proceedings of the 1999
ACM SIGMOD international conference on Management of data, pp. 61–72,1999.
4. S. Goil, H. Nagesh, and A. Choudhary, "Mafia: Efficient and scalable subspace clustering for very large data sets," Technical Report
CPDC-TR- 9906-010, Northwestern University, June 1999.
5. Jianwei Li, Ying Liu, Wei-keng Liao, and Alok Choudhary, "Parallel Data Mining Algorithms for Association Rules and Clustering,"
Handbook of Parallel Computing: Models, Algorithms and Applications. Sanguthevar Rajasekaran and John Reif, ed., CRC Press,
2007.
6. Jeffrey Dean, Sanjay Ghemawat, "MapReduce: Simplified Data Processing on Large Clusters," Communications of the ACM, vol.51,
no. 1, pp. 107- 113, January 2008.
7. E. Muller, S. Gunnemann, I. Assent, and T. Seidl, ¨Evaluating clustering in subspace projections of high dimensional data," PVLDB,
vol. 2, no. 1, pp.1270–1281, 2009.
8. Weizhong Zhao, Huifang Ma, and Qing He, "Parallel k-means clustering based on MapReduce," SpringerVerlag Berlin Heidelberg,
LNCS 5931, pp. 674–679, 2009.
9. Ferreira Cordeiro, Robson Leonardo, et al, "Clustering very large multidimensional datasets with mapreduce," Proceedings of the 17th
ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 690-698, 2011.
10. Liu X, Wang X, Matwin S and Nathalie J, "Meta-mapreduce for scalable data mining," Journal of Big Data, vol. 2, no. 1, pp. 1-21,
2015.
11. Tsourakakis, Charalampos E, "Data Mining with MAPREDUCE: Graph and Tensor Algorithms with Applications," Diss. Master’s
thesis, Carnegie Mellon University, 2010.
12. Nandakumar, D. R. A. N., and Nandita Yambem, "A Survey on Data Mining Algorithms on Apache Hadoop Platform," International
Journal of Emerging Technology and Advanced Engineering, vol. 4, no.1, pp. 563-565, 2014.
13. https://ja.wikipedia.org/wiki/MapReduce.
Authors: Ankur Goyal, Vivek Kumar Sharma

Paper Title: Modifying the MANET Routing algorithm by GBR CNR-Efficient Neighbor Selection Algorithm
Abstract: In today’s worlds, Mobile Ad-Hoc Network (MANET) plays most important role in the field
networks technology in the world. The MANET has been rapidly rising and becoming significant from the last
decade. A MANET is a kind of wireless network which has been set-up without requirement of fixed
infrastructure where mobile nodes are connected over wireless link. Due to moving nature of the devices, the
network topology is unstable and will change dynamically. That’s why stable routing in MANET cannot work
properly. In this research paper, a new routing algorithm is proposed to get better routing performance in the
MANET. The proposed algorithm designed based on the number of neighbors in the network. Planned algorithm
is the improvement of GBR-CNR-LN (GBR-CNR with less neighbors) by calculating the stay time between the
selected neighbor nodes and the transmission nodes. If the stay time of sender node is more than the packet
156. transmission time then the selected node is the efficient neighbor selection. The algorithm is implemented and
results are analyzed. The results of this paper show the usefulness of the proposed algorithm. The Evaluation of
AODV protocol was carried out using Python and outcome of this evaluation showed that proposed Algorithm 912-917
gave better results than GBR-CNR with less neighbor in terms of End-to-End delay, Number of control message
transferred(Routing Overhead) and Network Load. The proposed Algorithm (GC-ENS) decrease Average End-
to-End delay 52.54 %, reduce Average Routing Overhead 60.54% and decline the Average load on Network
61.17%.

Keywords: MANET,AODV, GBR, GBR-CNR, GBR-CNR-LN, GC-ENS algorithm.

References:

1. Dhirendra Kumar Sharma, Amar NathPatra, Chiranjeev Kumar: An improvement in the performance of mobile ad hoc networks using
modified route maintenance, Computers and Electrical Engineering 56 (2016) 300–312
2. Gabriel Mujica, Jorge Portilla, Teresa Riesgo: Performance evaluation of an AODV-based routing protocol implementation by using a
novel in-field WSN diagnosis tool, Microprocessors and Microsystems 39(2015) 920-938.
3. J. Kaur, G.Singh: MANET Routing Protocols: A Review, International Journal of Computer Sciences and Engineering, Volume-5,
Issue-3, (2017).
4. Wilder E.Castel lanos, Juan C. Guerri, Pau Arce: QoS-aware routing protocol with adaptive feedback scheme for video streaming for
mobile networks, Computer Communications 77, 10–25 (2016).
5. ShobhaTyagi, Subhranil Som, Q. P. Rana: A Reliability-Based Variant of AODV In MANETs: Proposal, Analysis, And Comparison,
7th International Conference on Communication, Computing and Virtualization 2016, Procedia Computer Science 79, 903 – 91 (2016).
6. Jegan Govindasamy, Samundiswary Punniakody , A comparative study of reactive, proactive and hybrid routing protocol in wireless
sensor network Under wormhole attack, , Journal of Electrical Systems and Information Technology 163 (2017).
7. Chavan, Prof. D. S. Kurule, Prof. P. U. Dere, Performance Analysis of AODV and DSDV Routing Protocol in MANET and
Modifications in AODV against Black Hole Attack, Procedia Computer Science 79 (2016),835-844.
8. Joydeep Tripathi, Jaudelice C. de Oliveira, J.P. Vasseur, Proactive versus reactive routing in low power and lossy networks:
Performance analysis and Scalability improvements, Ad Hoc Networks 23(2014) 121-144.
9. G. Ravi & K.R. Kashwan, Performance analysis of an energy-aware zone routing protocol using Span, International Journal Of
computer and Applications, ISSN: 1206-212X (Print) 1925-(Online), November 2017.
10. Esubalew Yitayal, Jean-Marc Pierson, Dejene Ejigu: A Balanced Battery Usage Routing Protocol to Maximize Network Lifetime of
MANET Based on AODV, Springer. 7th Conference on Internet of Things and Smart Spaces (ruSMART 2014) co-located with 15th
International Conference on Next Generation Wired/Wireless Advanced Networks and System NEW2AN, Aug 2014, St. Petersbourg,
Russia. Lecture Notes in Computer Science, pp.266-279 (2014).
11. Bal Krishna Saraswat, Manish Bhardwaj, Analp Pathak, Optimum Experimental Results of AODV, DSDV & DSR Routing Protocol in
Grid Environment, Procedia Computer Science 57 (2015),1359-1366.
12. Jegan Govindasamy, Samundiswary Punniakody: A comparative study of reactive,proactive and hybrid routing in wireless sensor
network under wormhole attack,Journal of Electrical systems and information technology(2017).
13. K. Sumathia, A. Priyadharshini: Energy Optimization in MANETs using On-Demand Routing Protocol, Procedia Computer Science 47,
460 – 470 (2015).
14. Farkhana Muchtar, Abdul Hanan Abdullah, Suhaidi Hassan, FarhanMasud: Energy conservation strategies in Host Centric Networking
based MANET: A review, Journal of Network and Computer Applications 111 (2018) 77-98.
15. Pathak S., Jain S. (2013), “A Survey: On Unicast Routing Protocols for Mobile Ad Hoc Network”, International Journal of Emerging
Technology and Advanced Engineering, V-3, No-1, pp 2250-2459. ISSN: 2250-2459.
16. S.-Y. Pyun, D.-H. Cho: Interference-aware topology control in wireless mobile ad-hoc networks, in Consumer Communications and
Networking Conference (CCNC), IEEE, 2012, pp. 376–377 (2012).
17. F. De Rango, F. Veltri, P. Fazio: Interference aware-based ad-hoc on-demand distance vector (IA-AODV) ultra-wideband system
routing protocol, Comput. Commun., 34 (12), 1475–1483 (2011).
18. C. Gu, Q. Zhu: Interference aware routing for mobile ad hoc networks based on node’s sending and receiving capabilities, J. China
Univ. Posts Telecommunication., 20(4), 73–79 (2013).
19. M. Khabbazian, S. Durocher, A. Haghnegahdar: Bounding interference in wireless ad hoc networks with nodes in random position, in G.
Even, M.M. Halldórsson (Eds.), Structural Information and Communication Complexity, in Lecture Notes in Computer Science, vol.
7355, Springer, Berlin, Heidelberg, pp. 85–98 (2012).
20. R. Hekmat, P. Van Mieghem: Interference in wireless multi-hop ad-hoc networks and its effect on network capacity, Wireless Network,
10 (4), 389–399 (2004).
21. Y. Zhou, X.-Y. Li, M. Liu, X. Mao, S. Tang, Z. Li: Throughput optimizing localized link scheduling for multihop wireless networks
under the physical interference model, IEEE Trans. Parallel Distrib. A system, 25 (10), 2708–2720 (2014).
22. W. Yang, X. Yang, S. Yang, D. Yang: A greedy-based stable multi-path routing protocol in mobile ad hoc networks, Ad Hoc Networks
9, 662–674 (2011).
23. A. Zadin, T. Fevens: Stable connections using multi-paths and conservative neighborhood ranges in mobile ad hoc networks, in 26th
Annual IEEE Canadian Conference on Electrical and Computer Engineering, CCECE, 2013, pp. 1–4 (2013).
24. Ankur Goyal,Dr. Vivek Sharma: Study of position based Greedy routing algorithm with interference in the MANET, in 2 nd international
conference on emerging trends in Engineering and Applied Science (ICETEAS,19),ISSN:2454-4248,pp 04-06(2019).
25. A. Zadin, T. Fevens: Neighborhood based interference minimization for stable position based routing in mobile ad hoc network, future
generation computer systems 64(2016) 88-97.
26. Pathak, S. & Jain, S., ‘Comparative Study of Clustering Algorithms for MANETs ‘, Journal of Statistics and Management Systems
(JSMS), Taylor Francis (2019) Vol.22 No 4, pp. 653–664. DOI: 10.1080/09720510.2019.1609723.
27. Pathak, S. and Jain, S.(2019) ‘A priority-based weighted clustering algorithm for mobile ad hoc network’, International Journal of
Communication Networks and Distributed Systems, 2019 Vol.22 No.3, pp.313 – 328. DOI: 10.1504/IJCNDS.2019.098872.
28. Pathak, S. & Jain, S., ‘An optimized stable clustering algorithm for mobile ad hoc networks‘, EURASIP Journal on Wireless
Communications and Networking, Springer Link, 2017: 51. DOI: 10.1186/s13638-017-0832-4.
29. Pathak S, Jain S, “A novel weight based clustering algorithm for routing in MANET”, Wireless Networks-The Journal of Mobile
Communication, Computation and Information, Springer Link, November 2016, Volume 22, Issue-8, pp 2695–2704. DOI:
10.1007/s11276-015-1124-8.

Authors: Shilpi Harnal, R.K. Chauhan

Paper Title: Hybrid Cryptography based E2EE for Integrity & Confidentiality in Multimedia Cloud Computing
Abstract: Cloud Computing has become a desirable state for the mobile users by providing anytime and
anywhere access to various services and resources. Likewisemultimedia data such as audio, images, video and
gif files covers the maximum part of the network traffic, as most of the data shared, produced, processed and
stored through numerous sources such as smart phones, computers, sensor networks, satellites, medical records
etc. is of multimedia type. Such form of data requires huge computing power and storage capacities along with
the major security constraints. Mobile devices with limited configuration and low computing powers are not able
157. to match with the high level computing and manipulations required by costly multimedia softwares. That’s why
demand for the Multimedia Cloud Computing came into frames. As multimedia data has distinct computing,
918-924
storage and security constraints, this field has become anemerging and latest area of research. Many researches
have also proposed separate architectures for Multimedia Cloud Computing. Security, integrity and
confidentiality of private and secret media files is always a matter of stake for cloud users as well as for cloud
providers. For multimedia cloud security concerns, cryptography is a guaranteed solution.This paper has
discussed about the various needs and challenges faced by the multimedia cloud providers. This work has also
proposed a hybrid cryptography algorithm based end-to-end encryption (E2EE) approach to maintain integrity
and confidentiality in multimedia cloud computing environment. The second last section provides a performance
analysis for the algorithm in terms of tables and graphs to justify the results.
Keywords: Multimedia Cloud, Encryption algorithm, Integrity, Confidentiality, Security, Multimedia data,
End-to-end encryption.

References:

1. Peter Mell, Timothy Grance, “The NIST Definition of Cloud Computing”, NIST Special Publication, September 2011.
2. Shilpi Harnal, R.K. Chauhan, “Multimedia Support from Cloud Computing: A Review”, International Conference on Microcom-2016,
IEEE, NIT, Durgapur, Jan, 2016
3. R. Buyya, C. S. Yeo, and S. Venugopal, “Market-oriented cloud computing: Vision, hype, and reality for delivering it services as
computing utilities,” in Proc.10th IEEE Int. Conf. High Performance Computing and Communications, pp. 5–13, DOI:
10.1109/HPCC.2008.172, 2008.
4. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R.Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica and M. EECS Dept.,
Univ. California, Berkeley, No. UCB/EECS-2009-28, 10 Feb, 2009 [Online]. Available: http://radlab.cs.berkeley.edu/
5. Sheetal Deshpande, Deepali D. Gatade, “A Survey and Analysis for Accountability and Privacy of Shared Data in the Cloud”, National
Conference on Innovative Paradigms in Engineering & Technology (NCIPET-2013), International Journal of Computer Applications
(IJCA), pp. 22-27, 2013.
6. Shilpi Harnal, R.K. Chauhan, “Hybrid Cryptography to Maintain Integrity of Data in Multimedia Cloud Environment”, International
Journal of Emerging Technology and Advanced Engineering, Vol. 7(9), Sep. 2017, Pg 669-675.
7. ABI Research, Mobile cloud computing [Online]. Available: http://www.abiresearch.com/research/1003385-
Mobile+Cloud+Computing, July, 2009.
8. Q. Zhang, Z. Ji, W. Zhu, and Y.-Q. Zhang, “Power-minimized bit allocation for video communication over wireless channels” , IEEE
Trans. Circuits Syst. Video Technol., Vol. 12, No. 6, pp. 398–410, June 2002.
9. K. Kilkki, “Quality of experience in communications ecosystem”, J. Universal Computer Sci., Vol. 14, No. 5, pp. 615–624, 2008.
10. J. Flinn, Cyber Foraging: Bridging Mobile and Cloud Computing via Opportunistic Offload. Morgan & Claypool Publishers, 2012.
11. Reza Farahbakhsh, Angel Cuevas, Ruben Cuevas et al., “Understanding the evolution of multimedia content in the Internet through
BitTorrent glasses”, IEEE Network, November-December 2013, Vol. 27, pp. 80-87, DOI: 10.1109/MNET.2013.6678931.
12. Chun-Ting Huang, Zhongyuan Qin, C.-C. Jay Kuo, “Multimedia Storage Security in Cloud Computing: An Overview”, Multimedia
Signal Processing (MMSP), IEEE 13th International Workshop on multimedia signal procevving, pp. 1 - 6, DOI:
10.1109/MMSP.2011.6093775, 17-19 Oct. 2011.
13. Edney, “Real 802.11 Security: Wi-Fi Protected Access and 802.11i”, Addison Wesley, 2003.
14. Hardjono, “Security in Wireless LANS and MANS”, Artech House Publishers, 2005.
15. https://www.preveil.com/blog/cloud-services-vulnerable-without-end-end-encryption/
16. Youngbae Song, Hyoungshick Kim et al., “A PrivateWalk in the Clouds: Using End-to-EndEncryption between Cloud Applications in
a Personal Domain”, C. Eckert et al. (Eds.): TrustBus 2014, LNCS 8647, pp. 72–82, Springer International Publishing Switzerland
2014.
17. Wenwu Zhu, Chong Luo, Jianfeng Wang, and Shipeng Li, “Multimedia cloud computing”, IEEE SIGNAL PROCESSING
MAGAZINE, vol. 28, Issue. 3, pp. 59-69, DOI: 10.1109/MSP.2011.940269, MAY 2011
18. Abdel-Karim Al Tamimi, Yarmouk University, “Performance Analysis of Data Encryption
Algorithms”,http://www.cse.wustl.edu/~jain/cse567- 06/ftp/encryption_perf/index.html
19. Bruce Schneier, "Applied Cryptography”, John Wiley & Sons, Inc 1996.
20. Aamer Nadeem et al., “A Performance Comparison of Data Encryption Algorithms”, IEEE, 2005.
21. Shraddha More & Rajesh Bansode, “Implementation of AES with Time Complexity Measurement for Various Input”, Global Journal
of Computer Science and Technology: E Network, Web & Security, Publisher: Global Journals Inc. (USA), Vol. 15, Issue 4, Version
1.0, 2015, ISSN: 0975-4172.

Authors: K.VinayaLaxmi, P. Vijaya Kumar, M.S. Narayana


An Empirical Evaluation on Customer Satisfaction in Retail Banking Services of Sbi Bank in
Paper Title:
Hyderabad District
Abstract: The main drive to write this paper is to analyse the most inducing factors impacting the customer
satisfaction of Indian banking specifically SBI through factor analysis and regression analysis.A 24 itemed
questionnaire was constructed through the literature survey and need based analysis of the customer view point
in Indian banks. 250 questionnaires were distributed among the bank customers of SBI in Hyderabad west
region among which 195 were returned back and among which only 150 were accurate and completely filled.
The 24 itemed instruments have been tested empirically for reliability, uni dimensionality and validity through
the statistical tools.The internal consistency and multivariate normality is in more acceptances with the data and
further factor analyses has resulted with the six variable dimension factors enabling the customer satisfaction in
the specific SBI branches. The service quality studied are proposed to offer the satisfaction level in retail
services in banks with specific magnitudes which lends the bankers to overlay on improved strategic planning
for the provisions and retention of customers in the long run for achieving lucrative measures and improving
158. better client relationships. The results from the analysis of the current study are very vital, where scale
development was evidenced from the previous studies which is most familiar to the SERVQUAL, the
continuous growing market requirements and the customer needs increases the scope of self-assessment in due 925-931
course to improve the service quality dimensions and even it permeates the academic research and prioritisation
of quality up gradation in service orientation by bankers.

Keywords: Customer Satisfaction, Perception, Serviceability, Service quality, Factors Influencing the
Serviceability, Customer retention.

References:

1. Aayushi Gupta and Santhosh Dev, “Client Satisfaction in Indian banks an empirical study”, Management Research Review,2012, vol.
35 Iss 7 pp . 617 – 636.
2. Babakus, E., Boller, G.W., An empirical assessment of the servqual scale. Journal of Business Research 24 (3), 1992., pp. 253-268.
3. Bahia, K., & Nantel, J. “A reliable and valid measurement scale for the perceived service quality of banks. The International Journal of
Bank Marketing,(2000),8(2),84-98. [Online] Available: http://www.emeraldinsight.com/journals.htm?articleid=855004
4. Beatty et al., Beatty, S.E., Mayer, M., Coleman, J.E., Reynolds, K.E. & Lee, J, Customer-sales associate retail relationships. Journal of
Retailing 1996, 72(3), 223-247.
5. Bitner, M.J. and Hubbert, A.R, “Encounter satisfaction versus overall satisfaction versus service quality: the consumer’s voice”, in Rust,
R.T. and Oliver, R.L. (Eds), Service Quality: New Directions in . (1994)
6. Beatty et al., Beatty, S.E., Mayer, M., Coleman, J.E., Reynolds, K.E. & Lee, J, Customer-sales associate retail relationships. Journal of
Retailing 1996, 72(3), 223-247.
7. Choudhury, K. , “Service quality: insights from the Indian banking scenario”, Australasian Marketing Journal, 2008, Vol. 16 No. 1, pp.
48-61
8. Cronin, J. Jr and Taylor, S.A. (1992), “Measuring service quality: a reexamination and extension”, Journal of Marketing Research, 1992,
Vol. 56, July, pp. 55-68.
9. Cui, C.C., Lewis, B.R. and Park, W., “Service quality measurement in the banking sector in South Korea”, International Journal of Bank
Marketing, 2003,Vol. 21 No. 4, pp. 191-201.
10. Giese and cote , Giese, J.L. and Cote, J.A. Defining Consumer Satisfaction. Academy of Marketing Science Review, 1998, 1, 1-27.
11. Gee, R., Coates, G. and Nicholson, M, “Understanding and profitably managing customer loyalty”, Marketing Intelligence & Planning,
2008, Vol. 26 No. 4, pp. 359-74.
12. Gil, I., Berenguer, G. and Cervera, A., “The roles of service encounters, service value, and job satisfaction in achieving customer
satisfaction in business relationships”, Industrial Marketing Management, 2007,Vol. 37 No. 8, pp. 921-39.
13. Gilmore, A., Services, Marketing and Management, Sage, London, 2003.
14. Gounaris, S.P., Stathakopoulos, V. and Athanassopoulos, A.D., “Antecedents to perceived service quality: an exploratory study in the
banking industry”, The International Journal of Bank Marketing, 2003, Vol. 21 Nos 4/5, pp. 168-90.
15. Gronroos, C., “Quo vadis, marketing? Towards a relationship marketing paradigm”, Journal of Marketing Management, 1994, Vol. 10,
pp. 347-60
16. Guo, X., Duff, A. and Hair, M.,“Service quality measurement in the Chinese corporate banking market”, International Journal of Bank
Marketing, 2008, Vol. 26 No. 5, pp. 305-27.
17. Jamal, A., “Retail banking and customer behaviour: a study of self-concept, satisfaction and technology usage”, International Review of
Retailing, Distribution and Consumer Research, Vol. 14 No. 3, pp. 357-79.
18. Oliver, R.L., ognitive model of the antecedents and consequences of satisfaction decisions. Journal of Marketing Research, 1980, 460-9.
http://dx.doi.org/10.2307/3150499.
19. Parsuraman, A., Zeithaml, V., Berry, L.L., Reassessment of expectations as a comparison standard in measuring service quality:
implications for future research. Journal of Marketing, 1994,Vol. 58, January, pp. 111-124.

Authors: Kshitij Wahurwagh, Shruti Danve

Paper Title: Implementation of Low Power Memory on FPGA


Abstract: Clock gating is a prominent and an efficacious methodology adopted to decrease the dynamic
power (clock power) utilization in complementary metal oxide semiconductor (CMOS) based circuits. The sole
intent of gating a clock signal is to minimize its switching activity and thereby reduce significant amount of
power utilization of the clock signal. Memories or storage elements are the integral part of the complex designs
used in the modern day devices enabling storage of exhaustive and crucial values being processed. In this paper,
we present the design and implementation of Random Access Memory (RAM) with reduced power consumption
using clock gating technique on a Field Programmable Gate Array (FPGA). These memory elements can be
either of synchronous or asynchronous nature. The memories discussed in the proposed work are synchronous in
nature and hence reading and writing operations take place on the positive or rising edge of the clock. A gating
logic is applied to lessen the superfluous transitions of the clock signal propagating along the clock network of
the circuit. The target device (FPGA) for this work is Xilinx Spartan 6 and the design tool is Xilinx ISE 14.7
with the memories being modelled in Verilog HDL and simulation outputs shown in ISim.

Keywords: Clock gating, dynamic power, power consumption, Random Access Memory (RAM.)

159. References:

1. Jagrit Kathuria, M.Ayoubkhan, Arti Noor, “A review of Clock gating techniques”, MIT International Journal of Electronics and 932-936
Communication Engineering, Vol.1 No.2, August, 2011, pp 106-114.
2. Abhishek Sharma, Ekta Jolly, “A Comparative Study and Review of Different Clock Gating Techniques and their Application”,
International Journal of Science and Research (IJSR), Volume 4 Issue 4, April 2015.
3. B. Pandey; M. Pattanaik, “Clock Gating Aware Low Power ALU Design and Implementation on FPGA”, International Journal of
Future Computer and Communication (IJFCC), Vol.3, ISSN: 2010-3751, 2013.
4. Mukhraj Bana, Vipin Gupta, “Power Optimized Memory Organization Using Clock Gating”, International Journal of Engineering
Research & Technology (IJERT), Vol. 3 Issue 4, April – 2014
5. Hubert Kaeslin, ETH Zurich, Digital Integrated Circuit Design from VLSI Architectures to CMOS Fabrication, Cambridge University
Press, 2008.
6. Luca Benini, Alessandro Bogliolo, Giovanni De Micheli, “A Survey of Design Techniques for System-Level Dynamic Power
Management”, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol. 8, No. 3, June 2000
7. Himanshu Chaudhary,Nitish Goyal, Nagendra Sah,” Dynamic Power Reduction Using Clock Gating: A Review”, International Journal
of Electronics & Communication Technology, Vol. 6, Issue 1, Jan - March 2015
8. J. Shinde, and S. S. Salankar, “Clock gating-A power optimizing technique for VLSI circuits”, Annual IEEE India Conference
(INDICON), pp. 1-4, 2011.
9. Bishwajeet Pandey, Deepa Singh, Deepak Baghel, Manisha Pattanaik, “Clock Gated Low Power Memory Implementation on Virtex-6
FPGA” , International Conference on Computational Intelligence and Communication Networks, vol., no., pp.409-412,2013
10. Frank Emnett, MarkBiegel, Power Reduction through RTL Clock Gating, SNUG San Jose, 2000
11. N. H. E. Weste and D. Harris, CMOS VLSI Design. Reading, MA: Pearson Education, Inc., 2005.
12. Frederic Rivoallon, Jagadeesh Balasubramanian, “Reducing Switching Powers with Intelligent Clock Gating”, WP370, Xilinx, August
29, 2013.
Authors: Hai-Viet Le, Quoc-Dung Ngo, Van-Hoang Le

Paper Title: Iot Botnet Detection Using System Call Graphs and One-Class CNN Classification
Abstract: With the rapid development of IoT devices, security risks become clearer in smart houses with the
emergence of more types of IoT Botnet. With the development of machine learning technology applied to
dynamic analysis methods, the automatic detection of variations of IoT Botnet has many achievements.
However, there are still some difficulties such as building Sandbox suitable for IoT Botnet with specific chip
architectures, collecting full of malicious behavior, imbalance in dataset,... affecting the accuracy of the learning
model. In this paper, the authors introduce method of detecting IoT Botnet through system call of executable file
to address some difficulties mentioned above. We edit sandbox environment based on QEMU to collect more
monitoring data and focus to system calls behavior of malware. By using the CNN network architecture
combined with One-class classification and features extracted from the system call graph, the authors have built
a IoT Botnet detection model with an accuracy of up to 97% and F-measure 98.33%.

Keywords: IoT Botnet; One-class CNN classification; System call graph.

References:

1. D. Evans, “The internet of things: How the next evolution of the internet is changing everything,” CISCO white paper, vol. 1, no. 2011,
pp. 1–11, 2011.
2. K. Angrishi, “Turning internet of things (iot) into internet of vulnerabilities (iov): Iot botnets,” arXiv preprint arXiv:1702.03681, 2017.
3. E. Bertino and N. Islam, “Botnets and Internet of Things Security,” Computer, vol. 50, no. 2, pp. 76–79, Feb. 2017.
4. C. Kruegel and Y. Shoshitaishvili, “Using Static Binary Analysis To Find Vulnerabilities And Backdoors In Firmware,” Black Hat USA,
2015.
5. P. Celeda, R. Krejci, J. Vykopal, and M. Drasar, “Embedded malware-an analysis of the chuck norris botnet,” presented at the Computer
Network Defense (EC2ND), 2010 European Conference on, 2010, pp. 3–10.
6. Pavel Celeda, Radek Krejci, and Vojtech Krmicek, “Revealing and analysing modem malware,” IEEE International Conference on
Communications (ICC), pp. 971–975, 2012.
7. D. Davidson, B. Moench, S. Jha, and T. Ristenpart, “FIE on Firmware, Finding vulnerabilities in embedded systems using symbolic
execution.” Proceedings of the 22nd USENIX Security Symposium, 2013.
160. 8. Andrei Costin, Jonas Zaddach, Aur´elien Francillon, and Davide Balzarotti, “A Large-Scale Analysis of the Security of Embedded
Firmwares,” EURECOM, Sophia-Antipolis, Biot, France, 2014. 937-942
9. D. D. Chen, M. Egele, M. Woo, and D. Brumley, “Towards Automated Dynamic Analysis for Linux-based Embedded Firmware,” 2016.
10. Jonas Zaddach, Luca Bruno, Aurélien Francillon, and Davide Balzarotti, “Avatar: A Framework to Support Dynamic Security Analysis
of Embedded Systems Firmwares,” Blackhat, 2014.
11. T. Ronghua, “An Integrated Malware Detection and Classification System,” MEng Chongqing Univ. BEngChangchun Univ. Sci.
Technol., vol. Doctor of Philosophy, Aug. 2011.
12. Andreas Moser, Christopher Kruegel, and Engin Kirda, “Limits of Static Analysis for Malware Detection,” 23rd Annual Computer
Security Applications Conference, 2007.
13. Konrad Rieck, Thorsten Holz, Carsten Willems, Patrick Düssel, and Pavel Laskov, “Learning and Classification of Malware Behavior.”
Lecture Notes in Computer Science, vol 5137, 2008.
14. S. S. Khan and M. G. Madden, “A survey of recent trends in one class classification,” presented at the Irish conference on artificial
intelligence and cognitive science, 2009, pp. 188–197.
15. J. Sahs and L. Khan, “A machine learning approach to android malware detection,” presented at the 2012 European Intelligence and
Security Informatics Conference, 2012, pp. 141–147.
16. P. Laskov, C. Schäfer, I. Kotenko, and K.-R. Müller, “Intrusion detection in unlabeled data with quarter-sphere support vector
machines,” Praxis der Informationsverarbeitung und Kommunikation, vol. 27, no. 4, pp. 228–236, 2004.
17. J. Song, H. Takakura, Y. Okabe, and Y. Kwon, “Unsupervised anomaly detection based on clustering and multiple one-class SVM,”
IEICE transactions on communications, vol. 92, no. 6, pp. 1981–1990, 2009.
18. Q. Miao, J. Liu, Y. Cao, and J. Song, “Malware detection using bilayer behavior abstraction and improved one-class support vector
machines,” International Journal of Information Security, vol. 15, no. 4, pp. 361–379, 2016.
19. E. Burnaev and D. Smolyakov, “One-class SVM with privileged information and its application to malware detection,” presented at the
2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW), 2016, pp. 273–280.
20. “QEMU.” [Online]. Available: https://www.qemu.org/. [Accessed: 28-May-2019].
21. “Debian Squeeze and Wheezy armel images for QEMU.” [Online]. Available: https://people.debian.org/~aurel32/qemu/armel/.
[Accessed: 28-May-2019].
22. “Strace - linux syscall tracer.” [Online]. Available: https://strace.io/. [Accessed: 16-Jan-2019].
23. P. Perera and V. M. Patel, “Learning deep features for one-class classification,” arXiv preprint arXiv:1801.05365, 2018.
24. P.-T. De Boer, D. P. Kroese, S. Mannor, and R. Y. Rubinstein, “A tutorial on the cross-entropy method,” Annals of operations research,
vol. 134, no. 1, pp. 19–67, 2005.
25. Y. M. P. Pa, S. Suzuki, K. Yoshioka, T. Matsumoto, T. Kasama, and C. Rossow, “Iotpot: A novel honeypot for revealing current iot
threats,” Journal of Information Processing, vol. 24, no. 3, pp. 522–533, 2016.

Authors: Ramachandran N, Neelesh kumar N , Rajeshwaran S K , Jeyaseelan R, Sree Harrish S

Paper Title: Design And Fabrication Of Semi-Automated Lawn Mower


Abstract: Evolution of early period to the modern period is mainly due to the advancement in technologies.
Every field has its own development in their innovations. Agriculture is the major field, where technological
advancement is required for the development. Major purpose of our paper is to establish a new kind of
Lawnmower. Here we have developed a semi-automated lawnmower which may be a replacement for
161. commercial manual lawnmower that is being used widely .This device doesn’t require any manpower for their
operation, it can be operated by an android device. Commercial lawnmowers are bulkier and are not compatible,
but this device is compatible and light-weight. Since it is made up of UPVC(Un-plasticized polyvinyl 943-946
chloride).Generally alternating current or fuels are used as a power source for commercial lawnmowers whereas
this device can be operated by means of battery or solar source.

Keywords: Grass cutting, Android controlled.

References:
1. Evaluation of lawn tractor noise using acoustic and psychoacoustic descriptors Engineering in Agriculture, Environment and
Food, Volume 9, Issue 1, January 2016, , Majid Lashgari, Ali Maleki.
2. Fatigue testing of UPVC pressure pipe International Journal of Fatigue, Volume 6, Issue 2, April 1984 . A. Christie, B. Phelps.
3. Study on additives for UPVC Additives for Polymers, Volume 1993, Issue 11, November 1993, No authors available.
4. Strip-tillage using rotating straight blades: Effect of cutting edge geometry on furrow parameters Soil and Tillage Research, Volume
155, January 2016. A. Matin, J. M. A. Desbiolles, J. M. Fielke.
5. Hollis, Scott. “Cordless electric lawn mowers: these battery-powered machines are clean, quiet and easy to maintain” Mother Earth
News 209 (April–May 2005): 67(4). General Reference Center Gold. Gale. Fairfax County Public Library. 7 Apr. 2009.
6. “The History of the Lawn-Mower”. backyardrefuge.com. Retrieved 2018-11-19.
7. “Arduino-Arduino Uno SMD” . www.arduino.cc. Retrieved 20 February 2018.
8. “The Arduino Foundation: What's Up?” . Hackaday. 2017-06-19. Retrieved 2017-12-22.
9. Handbook of Plastics, Elastomers, and Composites, Fourth Edition, 2002 by The McGraw-Hill, Charles A. Harper Editor-in-Chief.
ISBN 0-07-138476-6.
10. “Universal motor”, Construction and working characteristics, Retrieved on 27 April 2015.
11. Battery Types and Characteristics for HEV Archived 20 May 2015 at the Wayback Machine ThermoAnalytics, Inc., 2007. Retrieved
11 June 2010.
12. Davis Jr., Robert D.; et al. (July 8, 1997). “Steering control for zero turn radius mower - Robert D. Davis et al - Google Patent Search”.
USPTO via Google. Retrieved 2010-07-17.
Authors: S.Sathees Kumar

Paper Title: Tribological Characteristics of Natural Fiber Reinforced Polyester Hybrid Composites
Abstract: In order to investigate the wear behavior and tooth damage of Madar and Bauhinia Racemosa fibers
reinforced polyester, the composite gears were fabricated with varying the fiber weight percentages of 5%, 10%,
15% and 20%. This paper explores the rolling and sliding of the composite gears running against nylon gear
with a simplified method of analyzing and understanding the wear and tooth damage. Tests were conducted
without external lubrication over a range of loads 4Nm, 8Nm,12Nm and 16Nm using a gear test rig. The test
results of composite gears are compared with unreinforced polyester gear (URPE). It was found that the surface
temperature was the primary factor affecting the wear rate and an initial relationship between gear surface
temperature and load capacity. This composite can be useful for automobile and industrial applications.

Keywords: Bauhinia Racemosa fiber, gear, Madar fiber, polyester.

162. References:

1. Wang Y , Chen KS, Mishler J, Cho SC, Adroher XC, Appl. Energy , Vol 88, pp 981–1007, 2011.
947-952
2. Li W, Wood A, Weidig R, Mao K, “An investigation on the wear behaviour of dissimilar polymer gear engagements”. Wear , Vol
271,pp2176-2183,2011.
3. Gauvin R, Yelle H, Safah F, “Experimental investigation of the load cycle in a plastic gear mesh, in: International Symposium On
Gearing and Power Transmission, Tokyo, pp473–478 , 1981
4. Tsukamoto N, “Investigation about load capacity of nylon gears”, Bulletin of JSME 27 Vol 229, 1984.
5. Hachman H,Strickle E, “Nylon gears”, Konstruktion, Vol 3, Issue 18, pp81–94, 1966.
6. Chen JH, Juarbe FM, “How lubrication affects MoS2 filled nylon gears”, Power Transmission Design, pp34–40 1982..
7. Mao K, Li W, Hooke CJ, Walton D , “Friction and wear behaviour of acetal and nylon gears”, Wear, Vol 267 pp639–645, 2009.
8. Hoskins TJ , Dearn KD , Chen YK, Kukureka SN,”The wear of PEEK in rolling–sliding contact – Simulation of polymer gear
applications” , Wear , Vol 309,pp35–42. 2014.
9. Senthilvelan S, Gnanamoorthy, “Damage mechanisms in injection molded unreinforced, glass and carbon reinforced nylon 66 spur
gears”, Applied Composite Materials, Vol 11, pp337- 397, 2004.
10. K. Mao, A new approach for polymer composite gear design, Wear 262 (2007) 432-441.
11. Sathees Kumar S, Kanagaraj G, “Evaluation of mechanical properties and characterization of SiC reinforced PA6 polymer composites
and its engineering applications”, International Journal of Polymer Analysis and Characterization. Vol 21,Issue 5, pp378-386, 2016.

Authors: Le Thi Thu Hien


Simulating Hydraulic Characteristics and Enhance Design of My Lam Spillway-Stilling
Paper Title:
Basin,Vietnam
Abstract: The purpose of this paper is to use a hydrodynamic 3D model to simulate steady flow over spillway-
stilling basin of Mylam, Vietnam. A robust and effective tool of Flow 3D software in simulating many
complicated phenomena of fluid flow is selected. This model uses Volume of Fluid Method to solve Navier-
Stokes equations. The computed water surface elevation at gauges along centerline of weir and chute channel are
compared with experimental ones in four working conditions. The reasonable agreement between them are
observed. Besides, the detail hydraulic features in each segment is indicated such as: oblique wave on spillway
chute; separated flow at curve and enlarge segment and the specific hydraulic energy dissipation in stilling basin
of design is carried out. The insufficient construction of dissipated obstacles in stilling basin design is shown.
163. Therefore, a proper design is proposed.

Keywords: spillway, stilling basin, hydraulic characteristics, Flow 3D. 953-957

References:

1. Serfe Yurdagul Kumcu. Investigation of flow over spillway modeling and comparison between experimental data and cfd analysis.
KSCE Journal of Civil Engineering. 21(3). 994-1003. (2016).
2. G. Li, X. Li, J. Ning, Y. Deng. Numerical simulation and Engineering Application of a Dovetail-Shaped Bucket. Water, 11, 242;
doi:10.3390/w11020242. (2019).
3. Getnet Kebede Demeke, Dereje Hailu Asfaw and Yilma Seleshi Shiferaw. 3D Hydrodynamic Modelling Enhances the Design of
Tendaho Dam Spillway, Ethiopia. Water, 11, 82. (2019).
4. Mehmet Salih Kirkgoz , Mevlut Sami Akoz & Ahmet Alper Oner Numerical modeling of flow over a chute spillway, Journal of
Hydraulic Research, 47(6), 790-797. (2009)
5. Farzin Salmasi; Aylar Samadi. Experimental and numerical simulation of flow over stepped spillway. Applied Water Science.
https://doi.org/10.1007/s13201-018-0877-5, (2018).
6. Babaali, H.; Shamsai, A.; Vosoughifar, H. Copmutational Modeling of Hydraulic Jump in Stilling Basin with Convergence Wall Using
CFD Cods. Arab. J. Sci. Eng., 40, 381–395 (2015).
7. Dargahi, B. Experimental study and 3D numerical simulations for a free-overow spillway", J. of Hydraul. Eng., ASCE, 132(9), pp.
899-907 (2006).
8. Zhenwei, M., Zhiyan, Z. and Tao, Z. Numerical simulation of 3-D flow field of spillway based on VOF method . Procedia Engineering,
28, pp. 808-812, (2012).
9. Le Thi Thu Hien, Do Xuan Khanh. 2D and 3D numerical evaluation of dam-break wave on an obstacle. Journal of water resources &
Environmental Engineering. 62. 105-111. (2018).
10. Flow-3D User’s Manual (2012). Flow science, Inc., Santa Fe, N.M.

Authors: Swarna M, Godhavari T

Paper Title: Coap Based Congestion Control Mechanism For Low Power Iot Networks
Abstract: Internet of Things has billions of connected devices into internet. CoAP is a Constrained Protocol
used in application layer of IoT Protocol Stack. CoAP is running on top of User Datagram Protocol (UDP),
which means that, there is no possibility of congestion control in it, so CoAP is responsible for Congestion
control mechanism. UDP has no knowledge on congestion control. IoT has significant resource constraint, due
to this there are lots of design challenges in IoT network. This paper proposes a simple change in the CoAP
protocol named CoCoA (CoAP Simple Congestion Control / Advance). CoCoA introduces novel Round Trip
Time (RTT), VBF (Variable Back off Factor) and aging mechanism to calculate the dynamic and controlled
Retransmission Time Out (RTO) for IoT Networks. This paper compared with the existing all the congestion
control mechanism and the implementation result shows that the proposed mechanism is better than the existing
mechanism in terms of throughput, power consumption, memory foot print and fairness index.

Keywords: IoT Network, CoAP, Congestion Control, CoCoA, Low power Communication.

References:
164.
1. Betzler, C. Gomez, I. Demirkol, and J. Paradells, “CoCoA+: An advanced congestion control mechanism for CoAP,” Ad Hoc
Networks, vol. 33, pp. 126 – 139, 2015. 958-962
2. C. Bormann, A. P. Castellani, and Z. Shelby, “CoAP: An Application Protocol for Billions of Tiny Internet Nodes,” IEEE Internet
Computing, vol. 16, no. 2, pp. 62–67, Mar. 2012.
3. A. Betzler, C. Gomez, and I. Demirkol, “Evaluation of Advanced Congestion Control Mechanisms for Unreliable CoAP
Communications,” in Proceedings of the 12th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous
Networks, PE-WASUN 2015, Cancun, Mexico, November 2-6, 2015, 2015, pp. 63–70.
4. H. Ekstrom and R. Ludwig, “The peak-hopper: a new end-to-end retransmission timer for reliable unicast transport,” in INFOCOM
2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies, vol. 4, March 2004, pp. 2502–2513
vol.4.
5. P. Sarolahti and A. Kuznetsov, “Congestion Control in Linux TCP,” in Proceedings of the FREENIX Track: 2002 USENIX Annual
Technical Conference. Berkeley, CA, USA: USENIX Association, 2002, pp. 49–62.
6. M. Kovatsch, M. Lanter, and Z. Shelby, “Californium: Scalable cloud services for the internet of things with coap,” in Internet of
Things (IOT), 2014 International Conference on the, Oct 2014, pp. 1–6.
7. Swarna, M., S. Ravi, and M. Anand. "Adaptive Backoff Algorithm for Congestion Control in IoT." (2016): 205-214.
8. Swarna, M., S. Ravi, and M. Anand. "Leaky bucket algorithm for congestion control." International Journal of Applied Engineering
Research 11.5 (2016): 3155-3159.
9. R. Lim, F. Ferrari, M. Zimmerling, C. Walser, P. Sommer, and J. Beutel, “Flocklab: A testbed for distributed, synchronized tracing and
profiling of wireless embedded systems,” in Information Processing in Sensor Networks (IPSN), 2013 ACM/IEEE International
Conference on, April 2013, pp. 153–165.
10. Kumar, Shanmuga, and Noor Mahammad Sk. "High precision and high speed handheld scientific calculator design using hardware
based CORDIC algorithm." Procedia Engineering 64 (2013): 56-64.

Authors: R.Nanthini, P.Pandi Selvi

Paper Title: Heart Disease Prediction System Using Linear Regression, Smoreg, And Rep Trees Algorithms
Abstract: The broad area of data mining covers most of the fields of research. Its role in medical diagnosis is
very motivative to the researchers. It is very easy for the medical practitioners to analyze and treat the disease of
the patients at an early stage. The proposed work deals with predicting heart disease of the patients at an early
stage. The method was organized in three stages, Data collection, Data preprocessing and Data classification.
The dataset for the work was collected from UCI repository. The collected sample was first preprocessed to
clean unwanted information from the dataset. Classification operation is then performed on the preprocessed
data. Classification is carried out with three different techniques, Linear regression model, SMOreg and REP
trees. The results of the three methods were compared based on Root mean squared error and the Absolute error
165. and are tabulated.
963-965
Keywords: Data Mining, Predictive Data Mining,Linear Regression model, SMOreg, REP trees.

References:

1. M.Akhil jabbar, Dr.Priti Chandra, Dr.B.L Deekshatulu,” Heart Disease Prediction System using Associative Classification and Genetic
Algorithm”. International Conference on Emerging Trends in Electrical, Electronics and Communication Technologies-ICECIT, 2012
2. Ch.Sai Chaitanya1 | Ch.Nagur Vali2 | V.Sai Vikas3 | K.Sowmya, “Heart Anomaly Forecasting Applying a Series of Data Mining
Methods”. Proceedings of National Conference on Computing & Information Technology (NCCIT-2017). International Journal for
Modern Trends in Science and Technology, Volume: 03, Special Issue No: 02 March 2017. ISSN: 2455-3778. http://www.ijmtst.com
3. Jason Brownie,” How to use regression machine learning algorithms in weka Support vector regression”. Published on July 22, 2016,
in Weka Machine Learning. https://machinelearningmastery.com/use-regression-machine-learning-algorithms-weka/
4. Jason Browinlee, “How to use ensemble Machine Learning Algorithms in Weka”. Published on July 27, 2016in Weka Machine
Learning. https://machinelearningmastery.com/use-ensemble-machine-learning-algorithms-weka/
5. Jaymin Patel, Prof.TejalUpadhyay, Dr. Samir Patel, “Heart Disease Prediction Using Machine learning and Data Mining Technique”.
IJCSC ISSN:0973-7391. Volume 7, Number4 1 Sep 2015-March 2016 pp.129-137. DOI: 10.090592/IJCSC.2016.018. Available online
at www.csjournalss.com
6. S. Kiruthika Devi, S. Krishnapriya and Dristipona Kalita, ” Prediction of Heart Disease using Data Mining Techniques”. Indian
Journal of Science and Technology, Vol 9(39), DOI: 10.17485/ijst/2016/v9i39/102078, October 2016. ISSN (Print): 0974-6846, ISSN
(Online): 0974-5645
7. A. Malarvizhi, Dr. S. Ravichandran, “Data Mining’s Role in Mining Medical Datasets for Disease Assessments – a Case Study”.
International Journal of Pure and Applied Mathematics. Volume 119 No. 12 2018, 16255-16260, ISSN: 1314-3395 (on-line version).
url: http://www.ijpam.eu. Special Issue
8. Mamta Sharma, Farheen Khan, Vishnupriya Ravichandran,” Comparing Data Mining Techniques Used For Heart Disease Prediction”.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017
www.irjet.net p-ISSN: 2395-0072
9. Michael Abernethy,”Introduction and regression, Data mining with WEKA, Part 1. Updated April 28, 2010 – Published April 27,
2010. https://developer.ibm.com/articles/os-weka1/
10. ] R.Nanthini, Dr.P.Pandi Selvi, A survey on Data Mining Techniques for Heart Disease Prediction, 2018 IJRAR December 2018,
Volume 5, Issue 4 www.ijrar.org (E-ISSN 2348-1269, P- ISSN 2349-5138), IJRAR1944683 International Journal of Research and
Analytical Reviews (IJRAR) www.ijrar.org.
11. Neha Chauhan and Nisha Gautam “An Overview of heart disease prediction using data mining techniques”. https://docgo.net/health-9.
12. Ramin Assari, Parham Azimi and Mohammad Reza Taghva, “InternatiHeart Disease Diagnosis Using Data Mining Techniques”.
International Journal of Economics & Management Sciences. DOI: 10.4172/2162-6359.1000415. Int J Econ Manag Sci, an open access
journal Volume 6 • Issue 3 • 1000415 ISSN: 2162-6359, 2017.
13. G.Rasitha Banu, J.H.Bousal Jamala,” HEART ATTACK PREDICTION USING DATAMINING TECHNIQUE”. International Journal
of Modern trends in Engineering and research (IJMTER). ISSN (online): 2349-9745, ISSN(PRINT):2393- 8161, 2015.
https://www.researchgate.net/publication/312188365_Heart_Attack_prediction_using_Data_Mining_technique
14. Shafquat Perween, Suraiya Parveen, ” Analysis of Heart Disease Prediction Techniques”. International Journal of Scientific Research
Engineering & Technology (IJSRET), ISSN 2278 – 0882 Volume 7, Issue 4, April 2018. www.ijsret.org.
15. Shakuntala Jatav and Vivek Sharma, “An Algorithm for Predictive Data Mining Approach In Medical Diagnosis”. International
Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 1, February 2018. DOI:10.5121/ijcsit.2018.10102.
https://www.researchgate.net/publication/327722009_A_Review_on_Heart_Disease_Prediction_using_Machine_learning_and_Data_
Analytics_Approach.
16. ] Sujata Joshi and Mydhili K.Nair,”Prediction of Heart Disease Using Classification Based Data Mining Techniques”, Springer India
2015, volume 2. https://link.springer.com/chapter/10.1007/978-81-322-2208-8_46.
17. Uma N Dulhare,” Prediction system for heart disease using Naive Bayes and particle swarm Optimization”. Biomedical Research
2018; 29 (12): 2646-2649ISSN 0970-938X. www.biomedres.info
18. University of Waikato,New Zealand. CC Creative Commons Attribution 4.0 International License.
https://www.futurelearn.com/courses/data-mining-with-weka/0/steps/25396.

Authors: Manish Mahajan, Santosh Kumar, Bhasker Pant

Paper Title: Outlier Detection in Climatology Time Series with Sliding Window Prediction
Abstract: It is important to identify outliers for climatology series data. With better quality of data decision
capability will improve which in turn will improve the complete operation. An algorithm utilising the sliding
window prediction method is being proposed to improve the data decision capability in this paper. The time
series are parted in accordance with the size of sliding window. Thereafter a prediction model is rooted with the
help of historical data to forecast the new values. There is a pre decided threshold value which will be compared
to the difference of predicted and measured value. If the difference is greater than a predefined threshold then
the specific point will be treated as an outlier. Results from experiment are showing that the algorithm is
identifying the outliers in climatology time series data and also remodeling the correction efficiency.

Keywords: climatology data, forecast model, Outliers, sliding window, time series.

References:

1. Campos, G.O.; Zimek, A.; Sander, J. et al.;, On the evaluation of unsupervised outlier detection., Data Min Knowl Disc (2016) 30: 891
2. Nikolay L.; Saeed A.;Flint I. 2015. Generic and Scalable Framework for Automated Time-series Anomaly Detection. In Proceedings
166. of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '15). ACM, New York, NY,
USA,
3. Hawkins, D.M. Identification of Outliers. Biometrics 1980, 37, 860. 966-970
4. Aggarwal C. (2015) Outlier Analysis. In: Data Mining. Springer, Cham
5. Jiang, F.; Liu, G.; Du, J.; Sui, Y. Initialization of K-modes clustering using outlier detection techniques. Inf. Sci. 2016, 332, 167–183.
6. Jobe, J.M.; Pokojovy, M. A Cluster-Based Outlier Detection Scheme for Multivariate Data. J. Am. Stat. Assoc. 2015, 110, 1543–1551.
7. Liu, J.; Deng, H.F. Outlier detection on uncertain data based on local information. Knowl.-Based Syst. 2013, 51, 60–71.
8. Cassisi, C.; Ferro, A.; Giugno, R.; Pigola, G.; Pulvirenti, A. Enhancing density-based clustering: Parameter reduction and outlier
detection. Inf. Syst. 2013, 38, 317–330.
9. Akoglu, L.; Tong, H.; Koutra, D., Graph Based anomaly detection and description: a survey, Data Min Knowl Disc (2015) 29: 626.
10. Titouna, C.; Aliouat, M.; Gueroui, M.;, Outlier detection approach using Bayes classifiers Wireless Pers Commun (2015) 85: 1009.
11. Zhang L; Lin J.; Karim,R.; Sliding Window-Based Fault Detection From High-Dimensional Data Streams, in IEEE Transactions on
Systems, Man, and Cybernetics: Systems, vol. 47, no. 2, pp. 289-303, Feb. 2017.
12. ]Knorr, E.M. ; Ng, R.T. Algorithms for mining distance –based outliers in large datasets. In Proc. 24th Int. Conf. Very large Data
Bases, VLDB Pg. 392-403, 1998
13. Ramaswamy, S; Rastogi, R; Shim, K. Efficient algorithms for mining outliers from large data sets. Proc. Of ACM SIGMOD Int. Conf.
on Management of Data, 2000, Pg. 427 – 438
14. Flexer A, An Empirical Analysis of Hubness in Unsupervised Distance-Based Outlier Detection, 2016 IEEE 16th International
Conference on Data Mining Workshops (ICDMW), Barcelona, Spain, 2017, pp. 716-723.
15. Ferrari, D.G.; Castro, L.N.; Clustering algorithm selection by meta-learning systems: A new distance-based problem characterization
and ranking combination methods, Information Sciences, Vol 31, April 2015, Pg 181-194
16. Zhao, N.; Yu, F.R.; Sun, H.; Yin, H.; Nallanathan, A.; Wang, G. Interference alignment with delayed channel state information and
dynamic AR-model channel prediction in wireless networks. Wirel. Netw. 2015, 21, 1227–1242.
17. Mahajan M., Kumar S., Pant B. (2019) A Novel Cluster Based Algorithm for Outlier Detection. In: Iyer B., Nalbalwar S., Pathak N.
(eds) Computing, Communication and Signal Processing. Advances in Intelligent Systems and Computing, vol 810. Springer,
Singapore
18. Kant N., Mahajan M. (2019) Time-Series Outlier Detection Using Enhanced K-Means in Combination with PSO Algorithm. In: Ray
K., Sharan S., Rawat S., Jain S., Srivastava S., Bandyopadhyay A. (eds) Engineering Vibration, Communication and Information
Processing. Lecture Notes in Electrical Engineering, vol 478. Springer, Singapore.

Authors: Yaman Sokienah

Paper Title: Globalization’s Impact on the Usages of Imported and Local Building Materials in Jordan
Abstract: The process of choosing building materials is an essential part of the design process. Whenever
architects and interior designers start to think about a project, one of the first things they consider is the materials
that will be used in the production of the project. There is little research exploring the impact of globalization on
the level of using imported and local building materials in Jordan. Therefore, it is necessary to examine the
impact of globalization on the level of using imported and local building materials in Jordan and explore the
impact of using imported building materials on the level of using local building materials in Jordan.For the
purpose of this study, data gathered about the usage of imported building materials in Jordan and analyzed to
observe any drops of rises of using specific building materials. Also, this data was used to understand the most
common imported building materials used. This study requires a total understanding of the relationship between
globalization and building materials and their impact on the economy and the usage of imported and local
building materials. comprehension of this relationship will make it possible to find solutions to integrate the use
of imported building materials and local materials. Globalization impact can be observed in other sectors in
Jordan. The building materials market is being affected by the phenomenon of globalization. It was found that
there is a noticeable increase in imported building materials or raw materials that are needed to manufacture
building materials.If the attitude toward the usage of local building materials in Jordan keep decreases and
relying on imported building materials in the construction section, there will be a recession in the local building
materials in Jordan. Having this recession will have a greater impact on the building materials and local factories
in the long term.

Keywords: Architecture, Building Materials, Globalization, Imports, Interior Design.

References:

1. Abdali Investment & Development. Project fact sheet. Retrieved from www.abdali.jo
2. Al-Nimry, H. S. (2012, September). Seismic vulnerability of residential buildings in Jordan and its locality. 15th World Conference on
Earthquake Engineering. Lisbon, Portugal. 2006.
3. Alsubeh, M. A., & Al-Rawashdeh, T. Architectural and heritage elements and formation characteristics of traditional houses
interfaces. Arts and Design Studies, 12, 201, pp. 9-21.
4. Arab Building Materials. (2009). Arab Building Materials. Retrieved from http://www.abmcdxb.com/
167. 5. Agarwal, A. Mud as a traditional building material. Paper presented at The Global Review of Human Settlements: UN Conference on
Human Settlements. Vancouver: Canada. 1976.
6. Ayna, A. In the scale of globalization: Think globally, act locally, and change individually in the 21st century (Doctoral dissertation). 971-975
Retrieved from: http://konference.osu.cz/. 2011.
7. Balsvik, R., Jensen, S., & Salvanes G. Made in China, sold in Norway: Local labor market effects of an import shock (Discussion Paper
No. 8324). Bonn, Germany: Journal of Public Economics. Doi: 10.1016/j.jpubeco.2014.08.006. 2014.
8. Company list. (2015). List of construction & real estate companies in Jordan. Retrieved from https://companylist.org
9. Danso, H. Building houses with locally available materials in Ghana: Benefits and problems. International Journal of Science and
Technology, 2(2), 2013, pp. 225-231.
10. Department of Statistics. (2014). The "External Trade" Module of the Statistical Databank. Retrieved from http://www.dos.gov.jo/
11. Dreher, A. Does globalization affect growth? Empirical evidence from a new index, Applied Economics 38(10), 201, pp. 1091-1110.
12. Eldemery, I. M. Globalization challenges in architecture. Journal of Architectural and Planning Research, 26(4), 2009, pp. 343-354.
13. Elshahed, M. Spaces of global cultures: architecture, urbanism, identity, and urbanism, imported or exported? Native Aspirations and
Foreign Plans. Journal of Architectural Education, 63(2), 2010, pp. 169-171. Doi:10.1111/j.1531-314X.2010.01083.x
14. Foster and partners. (2000). Hearst Tower. Retrieved from http://www.fosterandpartners.com/
15. Guesmi, S., Youcefi, R., & Benbouziane, M. The impact of financial globalization on the Jordanian banking performance (1986-
2010). International Journal of Arts and Commerce, 1(6), 2012, pp. 250-261.
16. Harrison, D. J. Industrial minerals laboratory manual: Limestone (Report No. WG/92/29). Nottingham, England: Natural Environment
Research Council. 1993.
17. Harvey, K. Fundamental building materials. Mosman, Australia: Sakoga. 1984.
18. International Monetary Fund. meeting the challenges of globalization in the advanced economies, A survey by the staff of the
International Monetary Fund (pp. 45-71). Washington, DC: International Monetary Fund. 1998.
19. Johansson, E., Ouahrani, D., Shaker A., H., Awadallah, T., Blomsterberg, A., Hakansson, H., Hellström, B., and Kvist, H. Climate
conscious architecture and urban design in Jordan. In Report Housing Development & Management, Lund, Sweden: Lund University.
2009.
20. Kellner, D. Theorizing globalization. Sociological Theory, 20(3), 2002, pp. 285-305.
21. Khajuria, A., & Salhotra, S. Design and Development of Sustainable Wall. International Journal of Innovative Technology and
Exploring Engineering, 8(9), 2019, pp. 844-848.
22. Khammash, A., & Rees, K. Notes on village architecture in Jordan. Lafayette, La: University Art Museum, University of Southwestern
Louisiana. 1995.
23. Kheir, A., Mir M., A., & Tingwei, Z. Importing urban giants: re-imaging Shanghai and Dubai with skyscrapers. Archnet-IJAR, 7(2),
2013, pp. 22-42.
24. Kim, J., Rigdon, B., & Graves, J. Sustainable architecture module: Qualities, use, and examples of sustainable building materials. Ann
Arbor, MI: National Pollution Prevention Center for Higher Education. 1998.
25. Mahgoub, Y. Globalization and the built environment in Kuwait. Habitat International, 28(4), 2004, pp. 505-519.
26. MIT (2015). Products imported by Jordan (2012) [Data file]. Retrieved
fromhttp://atlas.media.mit.edu/explore/tree_map/sitc/import/jor/all/show/2012/
27. Moh'd, B. K. Characterization of the secondary porosity of stone Cretaceous-Recent Jordanian building limestone. Journal of Applied
Sciences, 7(3), 2007, pp. 368-373.
28. Morel, J. C., Mesbah, A., Oggero, M., & Walker, P. Building houses with local materials: Means to drastically reduce the
environmental impact of construction. Building and Environment, 36, 2001, pp. 1119–1126.
29. Naghoj, N. M., Nafi, A. R. Y., & Maaitah, O. N. Mechanical properties of natural building stone: Jordanian building limestone as an
example. Jordan Journal of Earth and Environmental Sciences, 3(1), 2010, pp. 37- 48.
30. Nayef R.F. Al-Rodhan, & Stoudmann, G. Definitions of globalization: A comprehensive overview and a proposed
definition. International relations and security network. Geneva Centre for Security Policy. Geneva, Switzerland. 2006, June.
31. Ofori, G. Challenges of construction industries in developing countries: Lessons from various countries. Unpublished manuscript,
Department of Building, National University of Singapore, Singapore. 2000.
32. Ogunkah, I., & Yang, J. Investigating factors affecting material selection: The impacts on green vernacular building materials in the
design-decision making process. Buildings: An Open Access Journal for the Built Environment, 2(1), 2012, pp. 1-32. Doi:
10.3390/buildings2010001
33. Pagnotta, B. (2013). AD Classics: The Guggenheim Museum Bilbao. Retrieved from http://www.archdaily.com/
34. Raftery, J., Pasadilla, B., Chiang, Y. H., Hui, E. C., & Tang, B. S. Globalization and construction industry development: implications of
recent developments in the construction sector in Asia. Construction Management & Economics, 16(6), 1998, pp. 729-737.
35. Robinson, J., & Associates, I. Growth, efficiency, and modernism: GSA buildings of the 1950s, 60s, and 70s. Washington, D.C.:
U.S. General Services Administration, Office of the Chief Architect, Center for Historic Buildings. 2003.
36. Rowe, P. G., & Kuan, S. Architectural encounters with essence and form in modern China. Cambridge, MA: The MIT Press. 2002.
37. Riley, G., A. Traditional building materials and the sustainability of the Cheyenne and Arapaho Tribal College design (Master’s thesis).
Retrieved from: http://lib.dr.iastate.edu/. 2011.
38. Stiglitz, J. Globalization and its discontents. London, England: Penguin Books.
39. The Statistics Portal. (2015). Building material and supplies dealer sales in the U.S. 1992-2013. Retrieved from
http://www.statista.com/ 2002.
40. This Day Live. Building materials import can't grow Nigeria's economy. This Day Live, Retrieved from http://www.thisdaylive.com.
2013, January 08
41. M. Young, The Techincal Writers Handbook. Mill Valley, CA: University Science, 1989.
42. (Basic Book/Monograph Online Sources) J. K. Author. (year, month, day). Title (edition) [Type of medium]. Volume(issue).
Available: http://www.(URL)
43. J. Jones. (1991, May 10). Networks (2nd ed.) [Online]. Available: http://www.atm.com
44. (Journal Online Sources style) K. Author. (year, month). Title. Journal [Type of medium]. Volume(issue), paging if given.
Available: http://www.(URL)
45. R. J. Vidmar.. On the use of atmospheric plasmas as electromagnetic reflectors. IEEE Trans. Plasma Sci. [Online]. 21(3). 1992, August,
pp. 876—880Available: http://www.halcyon.com/pub/journals/21ps03-vidmar
Authors: Naveen Pothineni, Praveen Kumar Kollu, Suvarna Vani Koneru
Automatic Road Segmentation from High Resolution Satellite Images Using Encoder-Decoder
Paper Title:
Network
Abstract: Road network segmentation from high resolution satellite imagery have profound applications in
remote sensing. They facilitate for transportation, GPS navigation and digital cartography. Most recent advances
in automatic road segmentation leverage the power of networks such as fully convolutional networks and
encoder-decoder networks. The main disadvantage with these networks is that they contain deep architectures
with large number of hidden layers to account for the lost spatial and localization features. This will add a
significant computational overhead. It is also difficult to segment roads from other road-like features. In this
paper, we propose a road segmentation architecture with an encoder and two path decoder modules. One path of
the decode module approximates the coarse spatial features using upsampling network. The other path uses
Atrous spatial pyramid pooling module to extract multi scale context information. Both the decoder paths are
combined to fine tune the segmented road network. The experiments on the Massachusetts roads dataset show
that our proposed model can produce precise segmentation results than other state-of-the-art models without
being computationally expensive.
168.
Keywords: Convolutional networks, Encoder-Decoder, Road Network, Segmentation.
976-980
References:

1. Mnih, Volodymyr & E. Hinton, Geoffrey. 2010. ``Learning to Detect Roads in High-Resolution Aerial Images.'' European Conference
on Computer Vision. Lecture Notes in Computer Science. Berlin, Heidelberg.
2. Alshehhi. Rasha , Prashanth Reddy Marpu, Wei Lee Woon, Mauro Dalla Murai. 2017. ``Simultaneous extraction of roads and
buildings in remote sensing imagery with convolutional neural networks.'' ISPRS Journal of Photogrammetry and Remote Sensing. 130
: 139--149.
3. Buslaev, Alexander V., Selim S. Seferbekov, Vladimir I. Iglovikov and Alexey A. Shvets. 2018. ``Fully Convolutional Network for
Automatic Road Extraction from Satellite Imagery.' 'IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops
(CVPRW). Salt Lake City, USA. June 18–22.
4. Constantin, A, J. Ding and Y. Lee. 2018 ``Accurate Road Detection from Satellite Images Using Modified U-net.'' IEEE Asia Pacific
Conference on Circuits and Systems (APCCAS). Chengdu: 423-426.
5. Ronneberger, O., P. Fischer, and T. Brox. 2015. ``U-Net: Convolutional Networks for Biomedical Image Segmentation.'' International
Conference on Medical Image Computing and Computer-Assisted Intervention. Munich, Germany. October 5–9.
6. Z Zhang, Q. Liu and Y. Wang. 2018. ``Road Extraction by Deep Residual U-Net.'' IEEE Geoscience and Remote Sensing Letters. 15
(5): 749-753.

Authors: Kamal Kumar, Hardeep Singh Saini

Paper Title: Performance Evaluation of Mimo System with Massive Antenna Arrays
Abstract: In the ground of digital word, wireless communication system has widespread functions. The
169. demand for wireless communication is growing day by day. All users want better quality service in scope of
wireless communication. Due to high bit error rate (BER), low signal to noise ratio (SNR), limited bandwidth
981-984
and high standard deviation (SD) of phase error conventional wireless communiqué systems like SISO, SIMO
and MISO flops to gather the mounting demand of users. Therefore a new technique MIMO system is realized
whose performance is evaluated by parameters BER, SNR and SD of Phase Error. Latest approach for increasing
the performance of virtual MIMO communications within peers by ill-treatment situation with giant antenna
arrays is developed. MIMO provides low BER and low SD of Phase Error with increased SNR, which forms a
good feature for wireless communication system. In this paper, performance of MIMO is assessed under
Nakagami-m and Rayleigh fading channels. For a wireless system BER and SD of phase error should be
minimum, which is achieved in MIMO system.

Keywords: Signal to Noise Ratio, Bit Error Rate, Multiple-In Multiple-Out, Standard Deviation, Distributed
Antenna System.

References:

1. UgljesaUrosevic, ZoranVeljovic, ”Distributed MIMO solutions for Peer-to-Peer Communications in Future Wireless Systems”, 24th
Telecommunications forum TELFOR 2016 Serbia, Belgrade, November 22-23, 2016.
2. Chunlong He, Geoffrey Ye Li, Fu-Chun Zheng , and Xiaohu You, National Mobile Communication Research Laboratory, Southeast
University, Nanjing, China,” Energy Efficiency of Distributed MIMO Systems”, 2014:
3. Athanasios S. Lioumpas, Petros S. Bithas, ”Partitioning of Distributed MIMO Systems Based on Overhead Considerations”, IEEE
WIRELESS COMMUNICATIONS, 2013
4. N.R. Raajan, A. Jenifer Philomina ”Performance Evaluation of MIMO-OFDM Modeling for UMTS-Long Term Evaluation Downlink
System, ICMOC 2012
5. Zhiyang Liu, “On the Scaling Behavior of the Average Rate Performance of Large-Scale Distributed MIMO Systems, IEEE 2016
6. Thushara D. Abhayapala, “Performance analysis of spatially distributed MIMO systems”, Research School of Engineering, Australian
National University, Canberra 0200 ACT, Australia,2017
7. Ramya Ranjan Choudhury, Trident Academy of Technology, Bhubaneswar, Odisha, India, A Network Overview of Massive MIMO
for 5G Wireless Cellular: System Model and Potentials, 2014
8. Maninder Singh and Hardeep Singh Saini, MIMO-OFDM System in Rayleigh Fadding Channel, International Journal of Electrical &
Electronics Engineering (IJEEE), e-ISSN: 1694-2310 | p-ISSN: 1694-2426, Vol. 1, Issue 2, pp.4-9, April 2014
9. Maninder Singh, Hardeep Singh Saini and Amit Wason, “Ergodic capacity enhancement of communication system using ASTC and
MMSE coding”, 11th IEEE India Conference INDICON 2014 Emerging Trends and Innovation in Technology, 11th-13th December
2014, yashada, Pune, India. doi: 10.1109/INDICON.2014.7030548
10. Maninder Singh, Hardeep Singh Saini and Dinesh Arora, “Bit error rate minimization in OFDM-MIMO system”,2015 IEEE
International Conference on Electrical, Computer and Communication Technologies (ICECCT), held on 5-7 March 2015,Coimbatore,
Tamilnadhu-India. doi. 10.1109/ICECCT.2015.7226140
11. Maninder Singh and Hardeep Singh Saini, “Capsulization of Existing Space Time Techniques”, National Conference on
Advancements in Computing & Communication Technologies (ACCT-2014) at Indo Global College of Engineering, Abhipur, Mohali
(India), March.2014, Published with e-ISSN: 1694-2310, p-ISSN: 1694-2426, IJEEE, Vol. 1, Spl. Issue 1 (March 2014), pp.29-35.
Authors: R. Ravi Chakravarthi, E. Chandra
Kernel Based K-Nearest Neighbor Method to Enhance the Performance and Accuracy of Online
Paper Title:
Signature Recognition
Abstract: Signature recognition is a significant among the most fundamental biometrics recognition
techniques, is a key bit of current business works out, and is considered a noninvasive and non-undermining
process. For online signature recognition, numerous methods had been displayed previously. In any case,
accuracy of the recognition framework is further to be enhanced and furthermore equal error rate is further to be
decreased. To take care of these issues, a novel order method must be proposed. In this paper, Kernel Based k-
Nearest Neighbor (K-kNN) is presented for online signature recognition. For experimental analysis, two datasets
are utilized that are ICDAR Deutsche and ACT college dataset. Simulation results show that, the performance of
the proposed recognition technique than that of the existing techniques in terms of accuracy and equal error rate.

Keywords: Online signature recognition, Kernel Based k-Nearest Neighbor (K-kNN), accuracy, equal error
rate.

References:

1. Y. Chen, J. Yang, C. Wang and N. Liu, "Multimodal biometrics recognition based on local fusion visual features and variational
170. Bayesian extreme learning machine", Expert Systems with Applications, vol. 64, pp. 93-103, 2016. Available:
10.1016/j.eswa.2016.07.009 [Accessed 23 December 2018].
2. W. Kang, X. Chen and Q. Wu, "The biometric recognition on contactless multi-spectrum finger images", Infrared Physics & 985-992
Technology, vol. 68, pp. 19-27, 2015. Available: 10.1016/j.infrared.2014.10.007 [Accessed 23 December 2018].
3. K. Reshmi, P. Muhammed, V. Priya and V. Akhila, "A Novel Approach to Brain Biometric User Recognition", Procedia Technology,
vol. 25, pp. 240-247, 2016. Available: 10.1016/j.protcy.2016.08.103 [Accessed 23 December 2018].
4. C. YOU and B. MA, "Spectral-domain speech enhancement for speech recognition", Speech Communication, vol. 94, pp. 30-41, 2017.
Available: 10.1016/j.specom.2017.08.007 [Accessed 23 December 2018].
5. T. Davis, D. Grantham and R. Gifford, "Effect of motion on speech recognition", Hearing Research, vol. 337, pp. 80-88, 2016.
Available: 10.1016/j.heares.2016.05.011 [Accessed 23 December 2018].
6. C. Vivaracho-Pascual, A. Simon-Hurtado and E. Manso-Martinez, "Using the score ratio with distance-based classifiers: A theoretical
and practical study in biometric signature recognition", Neurocomputing, vol. 248, pp. 57-66, 2017. Available:
10.1016/j.neucom.2016.11.080 [Accessed 23 December 2018].
7. A. Soleimani, B. Araabi and K. Fouladi, "Deep Multitask Metric Learning for Offline Signature Verification", Pattern Recognition
Letters, vol. 80, pp. 84-90, 2016. Available: 10.1016/j.patrec.2016.05.023 [Accessed 23 December 2018].
8. J. Galbally, M. Diaz-Cabrera, M. Ferrer, M. Gomez-Barrero, A. Morales and J. Fierrez, "On-line signature recognition through the
combination of real dynamic data and synthetically generated static data", Pattern Recognition, vol. 48, no. 9, pp. 2921-2934, 2015.
Available: 10.1016/j.patcog.2015.03.019 [Accessed 23 December 2018].
9. R. Doroz, P. Porwik and T. Orczyk, "Dynamic signature verification method based on association of features with similarity
measures", Neurocomputing, vol. 171, pp. 921-931, 2016. Available: 10.1016/j.neucom.2015.07.026 [Accessed 23 December 2018].
10. A. Sharma and S. Sundaram, "An enhanced contextual DTW based system for online signature verification using Vector
Quantization", 2018.
11. M. Razzak and B. Alhaqbani, "Multilevel fusion for fast online signature recognition using multi-section VQ and time modelling",
Neural Computing and Applications, vol. 26, no. 5, pp. 1117-1127, 2014. Available: 10.1007/s00521-014-1779-6 [Accessed 23
December 2018].
12. R. Ghosh, P. Kumar and P. Roy, "A Dempster–Shafer theory based classifier combination for online Signature recognition and
verification systems", International Journal of Machine Learning and Cybernetics, 2018. Available: 10.1007/s13042-018-0883-9
[Accessed 23 December 2018].
13. M. Durrani, S. Khan and S. Khalid, "VerSig: a new approach for online signature verification", Cluster Computing, 2017. Available:
10.1007/s10586-017-1129-4 [Accessed 23 December 2018].
14. L. Yang, Y. Cheng, X. Wang and Q. Liu, "Online handwritten signature verification using feature weighting algorithm relief", Soft
Computing, vol. 22, no. 23, pp. 7811-7823, 2018. Available: 10.1007/s00500-018-3477-2 [Accessed 23 December 2018].
15. S. Rohilla and A. Sharma, "SVM Based Online Signature Verification Technique Using Reference Feature Vector", Proceedings of the
National Academy of Sciences, India Section A: Physical Sciences, vol. 87, no. 1, pp. 125-136, 2016. Available: 10.1007/s40010-016-
0293-x [Accessed 23 December 2018].S

Authors: K. Narmada, G. Prabakaran, S. Mohan

Paper Title: Classification and Stage Prediction of Lung Cancer using Convolutional Neural Networks
Abstract: In recent years, digital image processing is widely used for the medical treatment classification and
diagnosis. Lung cancer is the most leading cause of death in all over the world nowadays. Based on the signs and
symptoms it can’t be diagnosis and treatment classified at the early stage. However it can be identified through
the symptoms like coughing up blood and chest pain, the stages and risk factors of the cancer cannot be
identified through the symptoms. The CT scanned lung images should be involved in image classification
processing for earlier prediction of stages and treatment diagnosis. In existing, machine learning treatment
classification can be done through the SVM classification. In case of large set of training samples, this will not
be in accurate manner and it has less accuracy because of improper feature extraction techniques. Thus the
performance of the classification based on the segmented features obtained in preceding sections. The extracted
fine-grained training data through deep learning are utilized for the classification using Convolution Neural
Network (CNN). In this paper, we propose a novel framework to classify both small cell and large cell lung
cancer and predict its type and treatment using CNN. It is also concentrates on the preprocessing and
segmentation processes to accomplish the accuracy in prediction. The experiment results in Python -
171. TensorFlow with Kaggle image dataset show that compared to state of the art of classification and prediction
methods, the proposed scheme can obtain much higher accuracy in type prediction and treatment diagnosis.
993-998
Keywords: SVM classification, Convolution Neural Network, Deep learning.

References:

1. Taher F., & Sammouda R., “Lung cancer detection by using artificial neural network and fuzzy clustering methods”, 2011 IEEE GCC
Conference and Exhibition (GCC), 2011, Arab Emirates, pp.294-298.
2. Cabrera J., Dionisio A., & Solano G., “Lung cancer classification tool using microarray data and support vector machines”, 2015 6th
International Conference on Information, Intelligence, Systems and Applications (IISA), 2015, Greece.
3. Werghi N., Donner C., Taher F., & Al-Ahmad H., “Detection and segmentation of sputum cell for early lung cancer detection”, 19th
IEEE International Conference on Image Processing, 2012, USA, pp.2813-2819.
4. Kanitkar S. S., Thombare N. D., & Lokhande S. S., “Detection of lung cancer using marker-controlled watershed transform”, 2015
International Conference on Pervasive Computing (ICPC), 2015, Pune.
5. Punithavathy K., Ramya M. M., & Poobal S., “Analysis of statistical texture features for automatic lung cancer detection in PET/CT
images”, 2015 International Conference on Robotics, Automation, Control and Embedded Systems (RACE), 2015, India.
6. Riti Y. F., Nugroho H. A., Wibirama S., Windarta B., & Choridah L., “Feature extraction for lesion margin characteristic classification
from CT Scan lungs image”, 2016 1st International Conference on Information Technology, Information Systems and Electrical
Engineering (ICITISEE), 2016, Indonesia, pp.54-58.

Authors: P. Srinivasa Rao, G. Hemanth Kumar, K. S. Chakradhar

Paper Title: Stabilize Nonlinear Interactive Process By Predictive Method On Receding Horizon
Abstract: In this concept, analyze two processes model with certain tuning conditions. Design process with
nonlinear conditions, disturbance and unstable position along with mutually interaction. Most of the processes
are dynamic only w.r.t manipulated variable, disturbances and other unexpected conditions. Two models are
resembled as interactive and mutual controlled process through sensors. Compare both processes with and
without nonlinearity along with disturbance with tuning condition upto reach set point. Estimate prediction
horizon, control horizon, weighted input, weighted rate of input, weighted output and desire trajectory are
imposed for both processes by nonlinear predictive control. The main intense to regulate pressure and get desire
level with impact of disturbances as temperature, added impurities etc… In this work, can be extended
172. interaction of process with NMPC by adding more complexity and stabilize with certain tuning methods. NMPC
is advance method to predictive input as well as output with respected sample time based on prediction horizon 999-
and control horizon on receding horizon of axis. 100
4
Keywords: Control horizon, NMPC, nonlinearity, prediction horizon, unstable.

References:

1. Eranda Harinath, L.T. Biegler and Guy A. Dumont “Predictive optimal control for thermo-mechanical pulping processes with multi-
stage low consistency refining” Journal of Process Control, vol.23, 2013, pp.1001– 1011.
2. Ying Ding, Liang Wang, Yongwei Li and Daoliang L “Model predictive control and its application in agriculture: A review” “Journal
of Computers and Electronics in Agriculture” vol. 151, June 2018, pp.104–117.
3. John ESPINOZA at all “Real-Time Implementation of Model Predictive Control in a Low-Cost Embedded Device” “Proceedings of
the 9th International Multi-Conference on Complexity, Informatics and Cybernetics” ,IMCIC 2018, pp.106-111
4. Mujtaba Jaffery, Sohaib Aslam, Moinuddin Ghauri, M. Shahzad Khuram, SikandarRafiq and Subhan Khan “Real-time
implementation of model predictive control on a 16-bit microcontroller for speed control of a dc motor” “Journal of Engineering
Technology”, vol. 6, Jan 2018, pp.415-434.
5. P. Srinivasa Rao and K.S.Chakradhar “Tuning and Stabilize of Nonlinear Interactive Loop Process by Nonlinear Model Predictive
Control” “International Journal of Control Theory and Applications”, vol.10, Aug 2017, pp.223-235.
6. P. Srinivasa Rao and Dr.P.Subbhai “Tuning and Analysis of Multiple Interactive Loop Process by Model Predictive Control”,
“International Journal of Engineering and Technology” vol.6, Mar 2014, pp.212-226.
7. P. Srinivasa Rao and Dr.P.Subbhai “Tuning of Nonlinear Model Predictive Control for Quadruple Tank Process”, “Journal of
Theoretical and Applied Information Technology” vol. 67, September 2014, pp.316-326.
8. Mengfei Zhou at all “Integration of Process Design and Control Using Hierarchical Control Structure”, “Science Direct, preparation of
Process Design and Control Using Hierarchical Control” vol.48 2015, pp.188–192.
9. Qidan Zhu, Yu Han , Chengtao Cai, and Yao Xiao “Robust Optimal Navigation Using Nonlinear Model Predictive Control Method
Combined with Recurrent Fuzzy Neural Network”, Hindawi Mathematical Problems in Engineering Aug 2018, pp. 801401 1-
8014019.
10. Hajer Degachi ,Bechir Naffeti, Wassila Chagra, and Moufida Ksouri “Filled Function Method for Nonlinear Model Predictive
Control”, “Hindawi Mathematical Problems in Engineering”, vol.94 ,2018, pp.97611-97618.

Authors: G. Mervin George, B. Dhanalakshmi, N.R.P. Nivetha, M. Sundarrajan, J. Akshya

Paper Title: Advanced Vehicle Management with Cyber-Physical System and Vehicular Cloud Computing
Abstract: Vehicular cloud computing is a perpetual developing paradigm where the automobiles
communicate with each other by retrieving the data, processing it, and sharing it among them even in remote
locations through the cloud computing network. This is a developing research platform with innumerable
applications both direct and indirect. In other words, it’s the way in which not indifferent automobile vehicles
interact with one other. There are a lot of applications for vehicular cloud computing in the automobile industry
in assisting with people’s day-to-day life it includes both direct and indirect applications. This platform has
proved its way to aid in multiple fields with innovation and update. Cyber-physical vehicle systems are a
fraction of vehicular cloud computing network with budding applications. These computer-based algorithms will
eventfully aggregate with the automobiles and facilitate them to correlate and communicate with one other. The
existing schemes include vehicular cloud computing in conjunction with Ad Hoc Networks where it has
improved its efficiency and faced many technical challenges. There also was the implication of sensor
technology where sensor incorporated automobiles interact with the network to assist automation. The proposed
system involves controlling vehicles efficiently using VCC in cyber-physical systems. It is an advanced vehicle
management system with individual connected and an automated vehicle that communicates with one another
via cloud computing. The simulated results showed much higher efficiency, management accuracy,
communication speed, and information sharing levels between the vehicles.

Keywords: Cloud Computing, Vehicular Cloud Computing, Vehicle Automation, Cyber-physical System.
173.
1005-
References: 100
9
1. Feng, Y., Hu, B., Hao, H., Gao, Y., Li, Z., & Tan, J. (2018). Design of distributed cyber-physical systems for connected and automated
vehicles with implementing methodologies. IEEE Transactions on Industrial Informatics, 14(9), 4200-4211.
2. Whaiduzzaman, M., Sookhak, M., Gani, A., & Buyya, R. (2014). A survey on vehicular cloud computing. Journal of Network and
Computer Applications, 40, 325-344.
3. Ahmed, B., Malik, A. W., Hafeez, T., & Ahmed, N. (2019). Services and simulation frameworks for vehicular cloud computing: a
contemporary survey. EURASIP Journal on Wireless Communications and Networking, 2019(1), 4.
4. Agarwal, Y., Jain, K., & Karabasoglu, O. (2018). Smart vehicle monitoring and assistance using cloud computing in Vehicular Ad Hoc
networks. International Journal of Transportation Science and Technology, 7(1), 60-73.
5. Sasaki, K., Suzuki, N., Makido, S., & Nakao, A. (2016, September). Vehicle control system coordinated between cloud and mobile
edge computing. In 2016 55th Annual Conference of the Society of Instrument and Control Engineers of Japan (SICE) (pp. 1122-
1127). IEEE.
6. Damacharla, P., Mehta, D., Javaid, A. Y., & Devabhaktuni, V. K. (2019, April). Study on State-of-the-art Cloud Services Integration
Capabilities with Autonomous Ground Vehicles. In 2018 IEEE 88th Vehicular Technology Conference (VTC-Fall)(pp. 1-5). IEEE.
7. Qureshi, K. N., Bashir, F., & Iqbal, S. (2018, October). Cloud Computing Model for Vehicular Ad hoc Networks. In 2018 IEEE 7th
International Conference on Cloud Networking (CloudNet) (pp. 1-3). IEEE.
8. Bousselham, M., Abdellaoui, A., & Chaoui, H. (2017, December). Security against a malicious node in the vehicular cloud computing
using a software-defined networking architecture. In 2017 International Conference on Soft Computing and its Engineering
Applications(icSoftComp) (pp. 1-5). IEEE.
9. Iyer, V., Kumari, R., & Selvi, T. (2015, March). Deterministic approach for performance efficiency in Vehicular Cloud Computing.
In 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom)(pp. 78-82). IEEE.
10. Sharma, M. K., & Kaur, A. (2015, September). A survey on vehicular cloud computing and its security. In 2015 1st International
Conference on Next Generation Computing Technologies (NGCT) (pp. 67-71). IEEE.
11. Chen, X., & Wang, L. (2017). A cloud-based trust management framework for vehicular social networks. IEEE Access, 5, 2967-2980.

Authors: Angel C, Asha S

Paper Title: Creating a Smart Agricultural Environment using Ambient Intelligent Technique
Abstract: Almost in all the fields, the world is moving towards digitally. Automation, smart environments and
precision activities are still spread its wings to make the human life easier. Ambient Intelligence (AmI) aims to
create a smart electronic environment which is more responsive to the presence and interaction of the people.
Using this intelligent technique, a novel approach for the cultivation of paddy is introduced in this paper.
Developing a smart environment for the paddy cultivation helps the farmer a lot to increase the productivity.
Technology involved in AmI, its corresponding architecture, prototype are discussed in this paper.

Keywords: Ambient Intelligence, Smart Environment, Automation, Smart Farming Practice, Intelligent
Computing.

References:

1. X. Chen, A. Shrivastava, and A. Gupta. Neil, “Extracting visual knowledge from web data”, In ICCV, 2013. 1 ,
174. DOI: 10.1109/ICCV.2013.178
2. R.Ho, K.W.Mai, and M.A.Horowitz, “The future of wires,” Proc. IEEE, vol. 89, no 4, 2001, pp. 490-504.
1010-
3. H.B. Bakoglu, and J.D. Meindl, “Optimal interconnection circuits for VLSI,” IEEE Trans. Electron Devices ED-32 (5), 1985, pp. 903– 101
909. 5
4. C.J. Alpert, A. Devgan, J.P. Fishburn, and S.T. Quay, “Interconnect synthesis without wire tapering, ” IEEE Trans. Computer-Aided
Design Integrated Circuits and Systems 20 (1), 2001, pp. 90–104.
5. Jinn-Shyan Wang et. al, “Design of Subthreshold SRAMs for Energy -EfficientQuality-Scalable Video Applications ”IEEE Trans
onEmerging and Selected Topics in Circuits and Systems, vol. 1, no. 2,pp 183-192, June 2011.
6. Semiconductor Industry Association (SIA), International Technology Roadmap for Semiconductors 2011.
Edition.[Online].available:http://www.itrs.net/Links/2011ITRS/Home2011.htm accessed on 22/08/2015.
7. Chetan Dwarkani M, Ganesh Ram R, Jagannathan S, Priya R, “ Smart Farming System Using Sensors for Agricultural Task
Automation”, IEEE, TIAR, 2015.
8. Zoya Parvez S, Fareduddin Ahmed, Shafreen, Gadilingappa K, “Arm Based Automated Wireless Greenhouse Climate Management
System using ZigBee Technology”, IOSR Journal of Electronics and Communication Engineering, Vol 9,Iss 3, 55-62, 2014.
9. Mushtaq, Shaima Sani, Hamed, Amjad, “Automatic Agricultural Land Irrigation System by Fuzzy Logic”, IEEE, ICISCE, 2016.
10. Jing-Lei Tang, Xiao-Qian Chen, Rong-Hui, Dong Wang, “Weed Detection using image processing under different illumination for
site-specific areas spraying”, Elsevier, Computer and Electronics in Agriculture 122(2016) 103-111.

Authors: T .Venkata Deepthi, K.Ramakotaiah, K.Krishnaveni


Research on Performance of Multi-Skilled Workers for Sustainable Production Planning In Seru
Paper Title:
Production Systems
Abstract: A Thriving demand of manufacturing industries causes the escalation in carbon emission and
worsening the environmental conditions, to ameliorate such scenario sustainable development has attracted by
countries policy makers, academia, manufacturing industry, and service industry. The primary consumers of
energy i.e., production systems are the major contributors of carbon emissions and to mitigate environmental
hazards sustainability factors taking part in their concerns. This paper investigates the benefits of switching to
Seru production system (Cell manufacturing system) in terms of both the economic and ecological performance.
A mathematical model was developed with the objectives of minimizing the total training cost of the workers
which in turn will decrease the processing time and energy utilization leading to control the carbon footprint of
the company. The effective scheduling of skillful workers to serus ensures the significant result on achieving the
goals of the model, for this a two-stage heuristic and modified moth flame algorithm are deployed. The proposed
model yields a set of alternative Pareto optimal solutions with the minimal carbon footprint on several numerical
instances. The computed results will garner a sustainable manufacturing system and assure the efficacy of the
suggested algorithm.

Keywords: Seru system; sustainable manufacturing; ecological; training cost; Heuristic algorithm.

References:

1. Dormer, A., Finn, D. P.,Ward, P. Cullen, J. (2013).“ Carbon footprint analysis in plastics manufacturing Research article”, Journal
of Cleaner Production,51,p.p133-141.
2. Giret, A., Trentesaux, D., Salido, M.A., Garcia, E. (2017). “A holonic multi-agent methodology to design sustainable intelligent
175. manufacturing control systems”, Journal of Cleaner Production, 167, p.p1370-1386.
3. Gimenez, C., Sierra, V., Rodon, J. (2012). “ Sustainable operations: their impact on the triple bottom line”, Int. J. Prod. Econ, 1016-
140,p.p 149-159. 102
4. Latif, H. H., Gopalakrishnan, B., Nimbart , A., Currie, K.(2017). “Sustainability index development for manufacturing
industry”,Procedia Manufacturing, 24,p.p 82-95. 8
5. He, Y., Liu, F.(2010). “Methods for integrating energy consumption and environmental impact considerations into the production
operation of machining processes”, Chin. J. Mech. Eng,23(4),p.p428-435.
6. Isa, K., Tsuru, T.(2002). “Cell production innovation in Japan: toward a new model for Japanese manufacturing? ”41,p.p 548-578.
7. Shankar, K. M., Kannan, D., Kumar, P.U.(2017). “Analyzing sustainable manufacturing practices – A case study in Indian context”,
Journal of Cleaner Production, 164,p.p1332-1343.
8. Karthik, T., Murugan, R.(2017). “Carbon footprint in denim manufacturing”, Book chapter, Sustainability in Denim, p.p125-159.
9. Liu, C.G., Li, W.J., Lian, J., Yin, Y.(2012). “Reconfiguration of assembly systems: from conveyor assembly line to serus”, J. Manuf.
Syst, 31,p.p312-325.
10. Liu, C. G., Lian, J., Yin, Y., Li, W.J.(2010). “Seru seisan an innovation of the production\ management model in Japan”, Asian J.
Technol. Innov, 18,p.p 89-113.
11. Liu, C.G., Stecke, K.E., Lian, J., Yin, Y.(2014). “An implementation framework for seru production”, Int. Trans. Oper. Res,21,p.p 1-
19.
12. Jin, M., Tang, R., Ji, Y., Liu, F., Gao, L., Huisingh, D. (2017). “Impact of advanced manufacturing on sustainability: An overview of
the special volume on advanced manufacturing for sustainability and low fossil carbon emissions”, Journal of Cleaner Production,
161,p.p69-74.
13. Mouzon, G., Yildirim, M.B., Twomey, J.(2007).“ Operational methods for minimization of energy consumption of manufacturing
equipment”, Int. J. Prod. Res, 45, p.p4247-4271.
14. Mouzon, G.C., Yildirim, M.B., 2008. “A framework to minimize total energy consumption and total tardiness on a single machine”,
Int. J. Sustain,1,p.p105-116.
15. Sakikawa, T.( 2005). “HRM practices and operational/financial performance: evidence from cell production at Japanese electronics
manufacturers”, Ann Rep Econ, Nigata University,29,p.p17-45.
16. Sakikawa , T.(2006).“ HRM practices for Japanese cell production”, Ann Rep Econ, Nigata University,30,p.p1-29.
17. Shirai, K.(2001). “Cell production and managing human resources. In: Tsuru, T (ed) Innovation and evolution of production
systems: diffusion of cell production among Japanese firms”,p.p 87-121.
18. Smith, L., Ball, P.(2012).“ Steps towards sustainable manufacturing through modelling material, energy and waste flows”, Int. J. Prod.
Econ, 140 ,p.p227-238.
19. Stecke, K.E., Yin, Y., Kaku, I., Murase, Y.(2012).“ Seru: the organizational extension of JIT for a super-talent factory”, Int J Strateg
Decis Sci, 3(1),p.p106-119.
20. Yang,M.G.M.,Hong, P., Modi, S.B.(2011). “Impact of lean manufacturing and environmental management on business performance:
an empirical study of manufacturing firms”, Int. J. Prod. Econ, 129,p.p251-261.
21. Zhang, X.F., Zhang, S.Y., Hu, Z.Y., Yu, G., Pei, C.H., Sa, R.N.(2012). “Identification of connection units with high GHG emissions
for low-carbon product structure design”, J. Clean. Prod,27,p.p118-125.
22. Iwamuro, H. ( 2002),“ Cell Manufacturing System. Nikkan Kogyo Shimbun Tokyo (in Japanese)”.

Authors: Nagendran K, Adithyan A, Chethana R, Camillus P, Bala Sri Varshini K B

Paper Title: Web Application Penetration Testing


Abstract: This paper describes the in-depth technical approach to perform manual penetration test in web
applications for testing the integrity and security of the application and also serves as a guide to test OWASP top
10 security vulnerabilities. The paper is more focused on providing detailed knowledge about manual web
application penetration testing methodologies in order to secure them from malicious black hat hackers.

Keywords: Web pentesting, Website Hacking, OWASP testing guide, web vulnerability scanning, bug hunting.

References:
176. 1. M. Howard And D.E. Leblanc, Writing Secure Code, Micro- Soft Press, 2002. 1029-
2. M. Khari, Sonam, Vaishali And M. Kumar, "Comprehensive Study Of Web Application Attacks And Classification," 2016 3rd
International Conference On Computing For Sustainable Global Development (Indiacom), New Delhi, 2016, Pp. 2159-2164.
103
3. Jose Fonseca, Marco Vieira, And Henrique Madeira, "Evaluation Of Web Security Mechanisms Using Vulnerability & Attack 5
Injection", Dependable And Secure Computing, Ieee Transactions (Volume:11, Issue: 5)
4. Https://Simplysecure.Blog/2017/07/05/Five-Phases-Of-Penetration-Testing/
5. K. Nirmal, B. Janet And R. Kumar, "Web Application Vulnerabilities - The Hacker's Treasure," 2018 International Conference On
Inventive Research In Computing Applications (Icirca), Coimbatore, India, 2018, Pp. 58-62.
6. Padmaja K,"A Study On Web Application And Protection Against Vulnerability", In International Journal Of Engineering Research
And Application, (Ijera),2012, Pp.001-006.
7. "Security Code Review-Identifying Web Vulnerabilities", By Kiran Maraju.
8. M.Khari And N.Kumar, "User Authentication Method Against Sql Injection Attack", International Journal Of Scientific And
Engineering Research,2013, Pp. 1649-1653.
9. Http://Www.Thespanner.Co.Uk/2014/05/06/Mxss/
10. Https://Hackernoon.Com/Timing-Based-Blind-Sql-Attacks-Bd276dc618dd

Authors: Chethan L S, Manjunatha P


A Spatial Correlation Based Power Aware Event Driven Image Stitching In Wireless Multimedia
Paper Title:
Sensor Network
Abstract: Wireless multimedia sensor network(WMSN) is an image sensor which is attached to sensor node
to capture information within the field of view (FOV). Due random deployment of multimedia sensor nodes
there exist overlapped FOV between multimedia sensor nodes. Overlapped FOV causes redundant data
transmission which leads to increased power consumption and reduced life time of a node. Another factor which
may reduce the energy consumption is to capture image continuously. To escalate these issues we have designed
event driven spatial correlation based image stitching algorithm. There are two modules in this scheme, first
event detection module capture the image only when event is detected and second module perform image
stitching when the cameras capture information. Experimental results shows there is a considerable
improvements in terms of reduction in data processed.

Keywords: WMSN, FOV, ECC.

References:

1. J. Yick, B. Mukherjee and D.Ghosal, ”Wireless sensor network survey,” Computer Network, Elsevier, vol.52, pp. 2292–2330, 2008.
177. 2. Mohammad Alaei and Jose M. Barcelo-Ordinas, “Node Clustering Based on Overlapping FoVs for Wireless Multimedia Sensor
Networks,” IEEE Wireless Communication and Networking Conference, 2010. 1036-
3. Fu Xiao,et.al, “Research on Image Compression and Transmission Mechanism for Wireless Multimedia Sensor Networks,” IEEE, 104
pp.788-791, 2011. 1
4. Nirali Patel and Jayesh Chaudhary, “Enhancing Multimedia Compression and Transmission Technique to Aid Energy Efficient
Wireless Multimedia Sensor Network”, ICACCT,pp.378-383,2018.
5. Lecuire, Vincent & Makkaoui, Leila & Moureaux, J.-M. “Fast zonal DCT for energy conservation in wireless image sensor networks.,”
Electronics Letters. 48. Pp.125-127. 2012.
6. B. Heyne, C. Sun and J. Goetze, “A computationally efficient high quality cordic based DCT,” IEEE 14th European Signal Processing
Conference, pp. 1 – 5, 2015.
7. A. Mittal, C. Kundu, R. Bose and R. Shevgaonkar, ”Entropy based image segmentatio with wavelete compression for energy efficient
LTE systems,” IEEE 23 International Conference on Telecommunications (ICT), pp. 1-6,2016.
8. Arvind Yedla,et.al, “Universality for the noisy Slepian-Wolf problem via spatial coupling,” IEEE International Symposium on
Information Theory Proceedings, 2011.
9. Shirin Jalali,et.al, “A Universal Scheme for Wyner–Ziv Coding of Discrete Sources,” IEEE TRANSACTIONS ON INFORMATION
THEORY, VOL. 56, NO. 4, pp.1737-1750,2010.
10. Wai Chong Chia,et.al, “Multiview Image Compression for Wireless Multimedia Sensor Network using Image Stitching and SPIHT
Coding with EZW Tree Structure,” International Conference on Intelligent Human-Machine Systems and Cybernetics,pp.298-
301,2009.
11. Fatma Salih and S.A. Mysoon Omer, “Raspberry pi as a Video Server,” (ICCCEEE), 2018.
12. Edward Shen and Richard Hornsey,” Local image quality metric for a distributed smart camera network with overlapping FOVs,” Fifth
ACM/IEEE International Conference on Distributed Smart Cameras, 2011.
13. David Minnen,et,al.,” Image-Dependent Local Entropy Models for Learned Image Compression,” ICIP, 2018.
14. G. Hong,et,al,.” Joint entropy and multiband prediction for lossless image compression,” Fifth International Conference on Image
Processing and its Applications, 1995.

Authors: K. Kavitha, D. Catherine Rexy, D. Anuradha

Paper Title: Testing the Sensitivity and Specificity of ICU Patients and Diagnose Statistics Hypothetical Errors
Abstract: Statistical performance especially for certain information based on data analyse and incorporate
clinical trial incomplete observation. The handling statistical hypothesis measure to regulate, type one error and
type two errors is related to the assessment of sensitivity and specificity in clinical trial test and experimental
data. A theoretical concept is considered two types of errors has been made and measure to find out of False
positive, False Negative, True Positive and True Negative. The study presumed to analyse the ICU patient’s
condition based on who have admitted in elective or emergency. We are conclude that there is association
between types of admission and patient’s status.

Keywords: sensitivity, specificity, Type I and Type II error, chi-square Test, ICU Patients.

References:

1. D.A. Bloch, “Comparing Two Diagnostic Tests against the Same "Gold Standard" in the Same Sample”, Biometrics, 53,
1997, pp. 73-85.
2. S.S. Greenhouse and N. Mantel, “The evaluation of diagnostic tests”, Biometrics, 6, 1950, pp. 399-412.
178. 3. K. Linnet, “Comparison of quantitative diagnostic tests: Type 1 error, power, and sample size”, Statistics in Medicine, 6,
1987, pp. 147-158. 1042-
4. J.A. Hanley, and B.J. McNeil, “A method of comparing the areas under receiver operating characteristics curves derived 104
from the same cases”, Radiology, 148, 1983, pp. 839-843. 5
5. E.R. Delong, D.M. Delong and D.L. Clarke-Pearson, “Comparing the areas under two or more correlated receiver
operating characteristics curves: A nonparametric approach”, Biometrics, 44, 1988, pp. 837-845.
6. S. Wieand, M.H. Gail, B.R James, K.L. James, “A family of nonparametric statistics for comparing diagnostic markers
with paired or unpaired data”, Biometrika, 76, 1989, pp. 585-592.
7. G. Campbell, “General methodology I advances in statistical methodology for the evaluation of diagnostic and laboratory
tests”, Statistics in Medicine, 13, 1994, pp. 499-508.
8. M.B. Bennet, On Comparisons of Sensitivity, Specificity and Predictive Value of a Number of Diagnostic Procedures.
Biometrics, 28, 1972, pp. 793-800.
9. G.M. Gaddis and M.L. Gaddis, “An Introduction to Biostatistics Part 3: Sensitivity, Specificity, Predictive Value and
Hypothesis Testing” Annals of Emergency Medicine, 19, 1990, pp.591-597.
10. Emmanuel de-Graft Johnson Owusu-Ansah, Angelina Sampson, Amponsah K. Samuel, and Abaidoo Robert. “Sensitivity
and Specificity Analysis Relation to Statistical Hypothesis Testing and Its Errors: Application to Cryptosporidium
Detection Techniques”, Open Journal of Applied Sciences, 6, 2016, pp. 209-216.
11. Wen Zhu, Nancy Zeng, Ning Wang, “Sensitivity, Specificity, Accuracy, Associated Confidence Interval and ROC
Analysis with Practical SAS® Implementations”, HealthCare and Life Sciences, 2010, pp. 1-9.
12. Robert Trevethan, “Sensitivity, Specificity and Predictive Values: Foundations, Pliabilities, and Pitfalls in Research and
Practice”, Frontiers in Public Health, 5, 2017, pp. 1-7.
13. NJ Gogtay, UM Thatte, “Statistical Evaluation of Diagnostic Tests (Part 1): Sensitivity, Specificity, Positive and
Negative Predictive Values”, Journal of the Association of Physicians of India, 65, 2017, pp. 80-84.

Authors: Shelke Poonam Uttam, Parul S. Arora, D.A. Jadhav

Paper Title: Road Detection & Extraction for Autonomous vehicles Using Satellite Images
Abstract: Good roads play important role in positive growth of our civilization. They revolutionize and
increase the life style of us and directly affect all our activities. Having record of up-to-date roads helps in taking
quick decisions and pre-planning for various occasions like road trip or life critical situations like disasters. . It
also helps in making maps for city planning and keeping track of expansion of city. Here, we have adopted
morphological operations based techniques. All the images are resized to have same dimensions as they are from
different sources. Comparison with ground truth images (manually extracted) is done to examine the
performance of the algorithm. As this method is solely based on intensity of road pixels, the effect of different
road structures and lane markings is absent. The algorithm has achieved 89% F1-score and 94% accuracy.
Further improvement is required in algorithm to detect roads where the intensity of non-road parts (urban area,
mowed agricultural land and other similar intensity structures) is similar to road pixels.

179. Keywords: Satellite images, image processing, road detection, Road extraction, morphological operations,
feature extraction, edge detection. 1046-
105
References: 0

1. Zihan Chen, Aixia Dou, “Road damage extraction from post-earthquake UAV images assisted by vector data”, The international
archives of the photogrammetry, remote sensing and spatial information sciences, Volume XLII, 2018
2. Hamid Reza Riahi Bakhtiari, Abolfazl Abdollahi, Hani Rezaeian, “Semi automatic road extraction from digital images”,Egypt J.
Remote Sensing Space Sci. , 2017
3. Kirsi Karila, Leena Matikainen, Eetu Puttonen, and Juha Hyyppa, “Feasibility of multispectral airborne laser scanning data for road
mapping”, IEEE Geoscience and remote sensing letters, Vol 14, No 3, March 2017
4. Ke Sun and Junping Zhang, “Road extraction from high resolution remote sensing images based on multi-features and multi-stages”,
Journal of information hiding and multimedia signal processing, Vol 8, number 1, January 2017
5. Jianhua Wang, Qiming Qin, Zhongling Gao, Jianghua Zhao and Xin Ye, “A new approach to urban road extraction using high-
resolution aerial image”, International journal of Geo-Information, 2016
6. Abdur Raziq, Aigong Xu and Yu Li, “Automatic extraction of urban road centerlines from high-resolution satellite imagery using
automatic thresholding and morphological operation method”, Journal of geographic information system, 8, 517-525, 2016
7. Mehdi Maboudi, Jalal Amini, Michael Hahn and Mehdi Saati, “Road network extraction from VHR satellite images using context
aware object feature integration and tensor voting”,Remote sensing, 8,637,2016
8. Jose Hormese, Dr. C. Saravanan, “Automated road extraction from high resolution satellite images”, Procedia Technology 24, 1460-
1467, ICETEST, 2015
9. Teng Xinpeng, Song Shunlin and Zhan Yongzhao, “A novel road extraction algorithm for high resolution remote sensing images”,
Appl. Math. Inf. Sci. 8, No.3, 1435-1443 , 2014
10. K. Madhan Kumar and R. Kanthavel, “An efficient road tracking from aerial images by means of filter methods”, JATIT, Vol 62,
No.2, April 2014
11. Poonam Uttam Shelke, Dr. Parul Arora, “Semi-automatic road detection for autonomous vehicles”, e-PGPEX-2019, SPPU, Pune,
submitted for publication.
12. Poonam Utttam Shelke, Dr. Parul S. Arora, “Survey of various road detection and extraction techniques for autonomous vehicles”,
IJRAR, Vol6,March2019.

Authors: K.K.Deepika, J. Vijaya Kumar, G. Kesava Rao, Seelam Chaitanya

Paper Title: Adaptive PI control of Electric Springs For Voltage Regulation Under Dynamic Load Changes
Abstract: Due to continuous distributed generation development technology, the accessibility of wind, solar
and also the renewable energy sources tends to intensify. To suppress the voltage fluctuation caused by the
distributed generation electric springs had been developed. In this article an adaptive control of Electric spring is
proposed, in which the gains of the PI controller are optimised by TLBO to maintain constant voltage across
critical load. The proposed strategy is tested for dynamic changes in the non-critical load. Simulation results
show that, for voltage fluctuations caused by the DGs and also with the dynamic load changes, ES with adaptive
controller stabilize the bus voltage effectively, over ES with Fuzzy Logic Control and traditional PI control.

Keywords: Electric Spring, TLBO, Tuning of PI controller.

References:

1. Cheng M, Wang QS, Zhag JZ. Theoretical analysis and controller design of electric springs. Proceedings CSEE 2015;35(10):2436–44.
2. K. Lee, S. C. Tan, F. F. Wu, S. Y. R. Hui, and B. Chaudhuri, “Use of hooke’s law for stabilizing future smart grid - the electric spring
concept,” IEEE Energy Conversion Congress and Exposition, September 2013, pp. 5253–5257.
3. Chen, Yixi & Ma, Gang & Wang, Ying & Xu, Guchao, “An adaptive voltage-regulation control strategy of an electric spring based on
output current feedback: Adaptive Voltage-Regulation Control Strategy of Electric Spring”, IEE Journal Transactions on Electrical and
Electronic Engineering, 2018.
180. 4. Chen, Yixi & Ma, Gang & Xu, Guchao & Chen, Huaiyi & Zhang, Hang. (2018). Restraining the Demand Side Power Fluctuation of 1051-
Active Distribution Network Using 0 ° / 180 ° Phase Controlled Electric Spring. Journal of Electrical and Computer Engineering. 2018.
5. Akhtar, Zohaib & Alavi, Seyed Amir & Mehran, Kamyar. (2018). Voltage Control in LV Networks Using Electric Springs with 105
Coordination. 6
6. M. H. T. Omar, W. M. Ali, M. Z. Mostafa,” Auto Tuning of PID Controller Using Swarm Intelligence”, International Review of
Automatic Control (I.RE.A.CO.), Vol. 4, N. 3 May 2011.
7. Nayak, M., Kasturi, K., Rout, P., Optimal Placement and Sizing of Multiple Capacitors in Radial Distribution Systems Using Modified
TLBO Algorithm, (2013) International Review of Automatic Control (IREACO), 6 (6), pp. 701-713.
8. Taki El-Deen, A., Mahmoud, A., R. El-Sawi, A., Optimal PID Tuning for DC Motor Speed Controller Based on Genetic Algorithm,
(2015) International Review of Automatic Control (IREACO), 8 (1), pp. 80-85.doi:https://doi.org/10.15866/ireaco.v8i1.4839.
9. Sadek, M., Elkholy, M., Metwally, H., Efficient Operation of Wind Turbine with Doubly Fed Induction Generator Using TLBO
Algorithm and Artificial Neural Networks, (2016) International Review on Modelling and Simulations (IREMOS), 9 (6), pp. 464-472.
doi:https://doi.org/10.15866/iremos.v9i6.10309.
10. S. Yan, S. C. Tan, C. K. Lee, and S. Y. R. Hui, “Electric spring for power quality improvement,” in Proc. IEEE APEC, 2014, pp.
2140–2147.
11. K. Lee and S. Y. .Hui, “Reduction of energy storage requirements in future smart grid using electric springs,” IEEE Transactions on
Smart Grid, vol. 4, no. 3, pp. 1282–1288, Sept 2013.
12. Y. Shuo, S. C. Tan, C. K. Lee, and S. Y. R. Hui, “Electric spring for power quality improvement,” in 2014 IEEE Applied Power
Electronics Conference and Exposition - APEC 2014, March 2014, pp. 2140–2147.
13. Lee CK, Chaudhuri B, Hui SYR. Hardware and control implementation of electric springs for stabilizing future smart grid with
intermittent renewable energy sources. IEEE Journal of Emerging Sel Top Power Electronics 2013.
14. R.V. Rao, V.J. Savsani, D.P. Vakharia, “Teaching–learning-based optimization: A novel method for constrained mechanical design
optimization problems”, Computer-Aided Design 43 (2011) 303–315.
15. S. C. Tan, C. K. Lee, and S. Y. Hui, “General steady-state analysis and control principle of electric springs with active and reactive
power compensations,” IEEE Transactions on Power Electronics, vol. 28, no. 8, pp. 3958–3969, Aug 2013.

Authors: Revathi K, Samydurai A


Exploiting the Interdependence of Electrocardiography (ECG) with Other Physiological
Paper Title:
Parameters of Human Body in Remote Monitoring System
Abstract: Human body holds physiological parameters like heart rate (HR), respiration rate (RR), temperature,
blood glucose level and blood pressure (BP) that indicates the health state. Monitoring these vital signs detect
early signs of significant diseases like cardio-vascular and pulmonary which increase the death ratio as 70% of
global death and in India it was attributed to 61% as per World Health Organization (WHO) report. With
advancement in modern technologies health monitoring is achievable without affecting their regular activities
181. and by making people to be at anywhere, not to be in hospital for long stay. In this paper the relevance between
electrocardiography (ECG) and remaining other physiological measures is highlighted which will be 1057-
incorporated in the design of health monitoring device in near future by revealing its complexity and ensures the 106
2
high comfortability in accessing the device.

Keywords: Physiological parameters, cardio-vascular disease (CVD), electrocardiography (ECG), health


monitoring.

References:
1. Ravikirti, “Early Warning Scoring System for Early Recognition of and Timely Intervention in Deteriorating Patients in the Hospital”,
Journal of The Association of Physicians of India, Vol. 64, May 2016, pp: 59-61
2. Martin R Cowie, Stefan D Anker, John GF Cleland, G Michael Felker, Gerasimos Filippatos, Tiny Jaarsma, Patrick Jourdain, Eve
Knight, Barry Massie, Piotr Ponikowski and Jose Lopez-Sendon, “Improving care for patients with acute heart failure”, Text Book,
Oxford Pharma Genesis™ Ltd, 2014, pp: 1-59
3. A. Dosinas, M. Vaitkunas and J. Daunoras, “Measurement of Human Physiological Parameters in the Systems of Active Clothing and
Wearable Technologies”, Electronics and Electrical Engineering, Vol. 7, No.71, 2006, pp: 77-82
4. Lakmini P. Malasinghe, Naeem Ramzan and Keshav Daha, “Remote patient monitoring: a comprehensive study”, Journal of Ambient
Intelligence and Humanized Computing, Springer, October 2017, pp : 1-20
5. Sarvesh Kumar and Shahanaz Ayub, “Estimation of Blood Pressure by Using Electrocardiogram(ECG) and
Photoplethysmogram(PPG)”, 2015 Fifth International Conference on Communication Systems and Network Technologies, IEEE,
India, 2015, pp:521-524
6. Li Yibin, Gao Yangyu, Li Shenlong, Li Hongyang, Zhang Yang and Deng Ning, “Pressure Dominated PTT Calculation and Its
Relation with BP”, The 15th International Conference on Biomedical Engineering (IFMBE), Springer International Publishing,
Switzerland, 2014, pp: 842-844
7. Alair Dias Junior, Srinivasan Murali, Francisco Rincon and David Atienza, “Estimation of Blood Pressure and Pulse Transit Time
Using Your Smartphone”, Euro micro Conference on Digital System Design, IEEE, Portugal, 2015, pp:173-180
8. Soo-young Ye, Gi-Ryon Kim, Dong-Keun Jung, Seong-wan Baik and Gye-rok Jeon, “Estimation of Systolic and Diastolic Pressure
using the Pulse Transit Time”, International Journal of Biomedical and Biological Engineering, Vol:4, No:7, 2010, pp: 303-308
9. M. K. Ali Hassan, M. Y. Mashor, N. F. Mohd Nasir and S. Mohamed, “Measuring of Systolic Blood Pressure Based On Heart Rate”,
Biomed Proceedings, Springer-Verlag Berlin Heidelberg, 2008, pp. 595–598
10. R. Ruangsuwana, G. Velikic and M. Bocko, “Methods to Extract Respiration Information from ECG Signals”, IEEE International
Conference on Acoustics, Speech and Signal Processing (ICASSP), 2010, pp; 570-573
11. Peter H. Charlton, Timothy Bonnici, Lionel Tarassenko, Jordi Alastruey, David A. Clifton, Richard Beale and Peter J.
Watkinson, “Extraction of respiratory signals from the electrocardiogram and photoplethysmogram: technical and physiological
determinants”, IOP Publishing- Physiological Measurement, Vol.38, 2017, pp: 669–690.
12. A. Vehkaoja, M. Peltokangas and J. Lekkala, “Extracting the respiration cycle lengths from ECG signal recorded with bed sheet
electrodes”, IOP Publishing - Journal of Physics: Conference Series, Vol. 459, 2013, pp: 1-6
13. Jensen and Brabrand, “The relationship between body temperature, heart rate and respiratory rate in acute patients at admission to a
medical care unit”, Scandinavian Journal of Trauma, Resuscitation and Emergency Medicine, Vol.23, July 2015, pp: 1
Authors: M.Ijasahmed, Ramesh Krishnan.L, Gangadhara Kiran Kumar.L

Paper Title: Modeling and Simulation of a Building towards Energy Efficiency


Abstract: Residential buildings are the significant energy consumer of the India which is about 24% of the
total energy consumption. Energy efficient buildings are the ideal solution to reduce energy consumption in the
building sector. The energy efficient buildings can be achieved by incorporating passive features or renewable
energy systems or both. The current work aims to perform a retrofitting analysis of an existing building into an
energy efficient building. For performing the energy analysis REVIT 2017 tool is used. Using the REVIT 2017
tool building model is developed, building information are loaded and energy analyses are performed. The
building is analyzed as two cases. The first case is to estimate energy performance of the existing building. The
second case is to incorporate passive features and renewable energy system to the building and evaluate the
energy performance. Existing building Energy Usage Intensity (EUI) was 193 kWh/m2/year. When passive
features (Insulation, additional window glazing and efficient air conditioning systems) alone incorporated to the
building the building EUI is reduced to 138 kWh/m2/year. Along with Passive features Photovoltaic modules
with different efficiencies 16%, 18% and 20% are considered for renewable energy generation. The energy
generation for the different PV modules for three different roof area (40%, 60% and 70% of total roof area) is
evaluated. The energy usage intensity varies from 11.4 from -150 kWh/m2/year for the combination of different
efficiency of PV module and the different % of roof area covered. The negative sign indicates the energy
generation after the required energy usage. The payback period for only incorporating passive features is 6.3
years and while incorporating PV system with passive features is 9 years.
182.
Keywords: Energy efficient building, Energy analysis, Retrofitting, Passive features for thermal comfort, 1063-
Renewable energy. 107
3
References:

1. P. Torcellini, S. Pless, and M. Deru, “Zero Energy Buildings : A Critical Look at the Definition Preprint,” ACEE Summer studay, vol.
2, p. 15, 2006.
2. I. Oropeza-Perez and P. A. Østergaard, “Active and passive cooling methods for dwellings: A review,” Renew. Sustain. Energy Rev.,
vol. 82, no. September 2017, pp. 531–544, 2018.
3. L. G. Valladares-Rendón, G. Schmid, and S. L. Lo, “Review on energy savings by solar control techniques and optimal building
orientation for the strategic placement of façade shading systems,” Energy Build., vol. 140, no. 71, pp. 458–479, 2017.
4. Y. Fan and X. Xia, “A multi-objective optimization model for energy-efficiency building envelope retrofitting plan with rooftop PV
system installation and maintenance,” Appl. Energy, vol. 189, pp. 327–335, Mar. 2017.
5. S. Charisi, “The Role of the Building Envelope in Achieving Nearly-zero Energy Buildings (nZEBs),” Procedia Environ. Sci., vol. 38,
pp. 115–120, Jan. 2017.
6. P. Samani, V. Leal, A. Mendes, and N. Correia, “Comparison of passive cooling techniques in improving thermal comfort of occupants
of a pre-fabricated building,” Energy Build., vol. 120, pp. 30–44, May 2016.
7. X. Sun, Z. Gou, and S. S.-Y. Lau, “Cost-effectiveness of active and passive design strategies for existing building retrofits in tropical
climate: Case study of a zero energy building,” J. Clean. Prod., vol. 183, pp. 35–45, May 2018.
8. A. Chel and G. Kaushik, “Renewable energy technologies for sustainable development of energy efficient building,” Alexandria Eng.
J., 2017.
9. A. K. Shukla, K. Sudhakar, and P. Baredar, “Simulation and performance analysis of 110 kWpgrid-connected photovoltaic system for
residential building in India: A comparative analysis of various PV technology,” Energy Reports, vol. 2, pp. 82–88, 2016.
10. G. K. Kumar, S. Saboor, and T. P. A. Babu, “Experimental and Theoretical Studies of Window Glazing Materials of Green Energy
Building in Indian Climatic Zones,” Energy Procedia, vol. 109, no. November 2016, pp. 306–313, 2017.
11. R. Joshi, M. Pathak, and A. K. Singh, “Designing Self-Energy Sufficient Buildings in India,” Energy Procedia, vol. 57, pp. 3110–
3119, 2014.
12. A. Ghosh and S. Neogi, “E ff ect of fenestration geometrical factors on building energy consumption and performance evaluation of a
new external solar shading device in warm and humid climatic condition,” Sol. Energy, vol. 169, no. March 2017, pp. 94–104, 2018.
13. N. N. Kale, D. Joshi, and R. Menon, “Life cycle cost analysis of commercial buildings with energy efficient approach,” Perspect. Sci.,
vol. 8, pp. 452–454, 2016.
14. F.H. Abanda L. Byers, “An investigation of the impact of building orientation on energy consumption in a domestic building using
emerging BIM (Building Information Modelling),” Energy, vol. 97, 2016.
15. R. M. S. F. A. Luís Sanhudo, Nuno M.M. Ramos, “Building information modeling for energy retrofitting – A review,” Renew.
Sustain. Energy Rev., vol. 89, pp. 249–260, 2018.
16. P. Fitriaty and Z. Shen, “Predicting energy generation from residential building attached Photovoltaic Cells in a tropical area using 3D
modeling analysis,” J. Clean. Prod., vol. 195, pp. 1422–1436, Sep. 2018.
17. C.-C. C. Hang-Jung Kuo, Shang-Hsien Hsieh, Rong-Chin Guo, “A verification study for energy analysis of BIPV buildings with
BIM,” Energy Build., vol. 130, pp. 676–691, 2016.
18. C. K. Mytafides, A. Dimoudi, and S. Zoras, “Transformation of a university building into a zero energy building in Mediterranean
climate,” Energy Build., vol. 155, pp. 98–114, Nov. 2017.
19. ASHRAE, “2001 ASHRAE Handbook Fundamentals,” ASHRAE Stand Stand., vol. 53, no. 9, pp. 733–745, 2001.

Authors: Karthika S, Vanitha U, Rejina Parvin J, Supraja Arasu T, Sampritha R V, Srinithi K

Paper Title: Toxic Gas Detection using Low Power Controller with Alert System
Abstract: The main idea of gas leakage detection is to implement the security system for detection of gas
leakage in closed environment. In present scenario, there are many criteria which are related to gas leakage
which affects an innocent people lives and property damage. Implementation of this alert system can be useful
for companies, houses, which can save lives of people. In this work, SIM900 (GSM module) is used to perform
the chosen task by interfacing Gas sensor (MQ5), Buzzer, Arduino UNO, Stepper Motor(5V) and LCD to
display. Initially when there is a leak, the Gas sensor detects it using MQ5 and sound alarm is produced
automatically and the leakage of gas is controlled. Also, an SMS based system is setup using GSM Module
which sends 3 alerts (messages) to the specified mobile number. Not only detection of gas leakage but also
stopping the leakage is equally essential to detection. This project provides an effective in cost and highly
accuracy, which not only detect gas leakage but also alerting the people (sound alarm) and turn off main power
and gas supplies, and send an SMS. In despite to provide high accuracy, gas sensor MQ-5 has been used and this
can be used in application of chemical and hazardous industries where there is a consecutive monitoring of gas
leaks. By using different types of gas sensors for various gas, used to identify leaks for every kind of gases.
Thus, on designing this project our ultimate aim is to automatically detect and stop leakage in vulnerable
183. premises.
1074-
107
Keywords: Arduino Uno, Gas Sensor, MQ5.
9
References:

1. Al-Hindawi, A. M., & Talib, I, “Experimentally Evaluation of GPS/GSM Based System Design”, Journal of Electronic Systems vol. 2,
no. 2, pp. 67, 2012.
2. Chen Peijiang, Jiang Xuehua, “Design and Implementation of Remote monitoring system based on GSM,” vol.42, pp.167-175, 2008.
3. Wilcher, D, “Learn electronics with Arduino”, Apress, 2012.
4. Blum J, “Exploring Arduino: tools and techniques for engineering wizardry”, John Wiley & Sons, 2013.
5. Yamazoe N, “Toward innovations of gas sensor technology”, Sensors and Actuators Chemical, vol. 108, pp. 2-14, 2005.
6. Bahrudin, M. S. B., Kassim, R. A., & Buniyamin, N, “Development of fire alarm system using raspberry pi and arduino uno”, IEEE
International Conference on Electrical, Electronics and System Engineering (ICEESE), pp. 43-48, 2013.
7. Yan, H. H., & Rahayu, Y, “Design and development of gas leakage monitoring system using arduino and zigbee”, Proceeding Of The
Electrical Engineering Computer Science And Informatics, vol.1, no. 1, pp. 207-212, 2014.
8. Macker, A., Shukla, A. K., Dey, S., & Agarwal, J, “ARDUINO Based LPG Gas Monitoring Automatic Cylinder Booking with Alert
System”, 2nd IEEE International Conference on Trends in Electronics and Informatics (ICOEI), pp. 1209-1212, 2018.
9. Mujawar, T. H., Bachuwar, V. D., Kasbe, M. S., Shaligram, A. D., & Deshmukh, L. P, “Development of wireless sensor network
system for LPG gas leakage detection System”, International Journal of Scientific & Engineering Research, vol. 6, no. 4, pp. 558-563,
2015
Authors: Bhuvaneshwari K V, Poornima B
Cervical Cancer Cell Identification & Detection Using Fuzzy C Mean and K nearest Neighbor
Paper Title:
Techniques
Abstract: Across the globe, woman has been diagnosed two major forms of cancer, in which one is identified
as cervical cancer and its micro classification. Morphology changes in cells or dead nucleus in the cervix causes
cervical cancer. These cells are characterized with multiple nucleuses, faulty & lack of cytoplasm and so on.
Detection of cervical cancer using smear test is extremely challenging because such cells does not offer texture
variations or any significant color from the normal cells. Therefore for identification in abnormality of cells we
184. required high level Digital image processing technique which compromises an automated, comprehensive
1080-
machine learning skills. An advanced Fuzzy based technique has been implied to separate nucleus and
108
cytoplasm from the cell. KNN is instructed with the color features and shape features of the segmented units of
4
the cell and then an unknown cervix cell samples are classified by this technique. The proposed technique gives
shape and color features of nucleus and cytoplasm of the cervix cell.

Keywords: KNN, Fuzzy C mean (FCM), Gustafson-Kessel (GK) Clustering, Gray Level Co-Event
Matrix(GLCM).
References:

1. Ling Zhang, LeeLu,IsabellaNogues,Ronald M Summers,Shaoxiong Liu and jianhua Yao, DeepPap:Deep Convolutional Networks for
Cervical Cell Classification , IEEE Journal of Biomedical and Health Informatics, vol 21,no 6,November 2017.
2. Dana Bazazehand RaedShubair,Comparative Study of Machine Learning Algorithms for Breast Cancer Detection and Diagnosis,978-
1-5090-5306-3/16/$31.00 c2016 IEEE.
3. NingGuo,Ruoh-Fang Yen,Georges EI Fakhri and QuanzhengLi,SVM Based Lung Cancer Diagnosis Using Multiple Image Features in
PET/CT,978-1-4673-9862-6/15/$31.00 c2015 IEEE.
4. JonghwanHyeon,Ho-Jin Choi,Byung Doo Lee,Kap No Lee,Diagnosing Cervical Cell Images Using Pre-trained Convolutional Neural
Network as Feature Extractor,978-1-5090-3015-6/17/$31.00 c2017 IEEE.
5. P.Ramachandran, N.Girija, T.Bhuvaneswari, Ph.D,Early Detection and Prevention of Cancer using Data Mining Techniques,
International Journal of Computer Applications (0975 – 8887) Volume 97– No.13, July 2014.
6. Sunny Sharma,Cervical Cancer stage prediction using Decision Tree approach of Machine Learning, International Journal of Advanced
Research in Computer and Communication Engineering Vol. 5, Issue 4, April 2016.
7. Vikas Chaurasia1, Saurabh Pal2,A Novel Approach for Breast Cancer Detection using Data Mining Techniques, International Journal
of Innovative Research in Computer and Communication Engineering, Vol. 2, Issue 1, January 2014
8. Jiban K Pal ,Annals of library and Information studies,Usefulness and application of data mining in extracting information from
different prespectives. Vol 58,March 2011
9. M. Durairaj, V. Ranjani ,Data Mining Applications In Healthcare Sector: A Study, international journal of scientific & technology
research volume 2, issue 10, october 2013
10. Neha Sharma1 and Hari Om,Framework for early detection and prevention of oral cancer using data mining, International Journal of
Advances in Engineering & Technology, Sept 2012
11. P.Ramachandran1, Dr.N.Girija2, Dr.T.Bhuvaneswari ,Cancer Spread Pattern – an Analysis using Classification and Prediction
Techniques,International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 6, June2013
12. G. Battista, C. Sassi, M. Zompatori, D. Palmarini, and R. Canini, Ground-glass opacity: Interpretation of high resolution CT findings,
LaRadiolo-giaMedica , vol. 106, pp. 425–442, 2003.
13. Z. G. Yang, S. Song, and S. Talcashima, High-resolution CT analysis ofsmall lung adenocarcinoma revealed on screening helical CT,
Amer. J.Roentgenol. , vol. 176, no. 6, pp. 1399–1407, 2001.
14. T. Aoki, Y. Tomoda, H. Watanabe, H. Nakata, T. Kasai, H. Hashimoto, M.Kodate, T. Osaki, and K. Yasumoto, Peripheral lung
adenocarcinoma:Correlation of thin-section findings with histologic factors and survival, Radiology, vol. 220, pp. 803–809, 2001.
15. J. J. T. Owen, D. E. McLoughlin, R. K.Suniara, and E. J. Jenkinson, Therole of mesenchyme in thymus development, Current Topics
Microbiol.Immunol. , vol. 251, pp. 133–137, 2000.
16. M. R. Melamed, B. J. Flehinger, M. B. Zaman, R. T. Heelan, W. A.Perchick, and N. Martini, Screening for lung cancer: Results of the
memo-rialsloan-kttering study in New York, Chest, vol. 86, no. 1, pp. 44–53,1984.
17. C. V. Zwirewich, S. Vedal, R. R. Miller, and N. L. M ¨uller, Solitarypulmonary nodule: High-resolution CT and radiologic-pathologic
corre-lation, Radiology, vol. 179, no. 2, pp, 469–476, 1991.
18. S. F. Huang, R. F. Chang, D. R. Chen, and W. K. Moon, Characterizationofspiculation on ultrasound lesions, IEEE Trans. Med. Imag.
, vol. 23,no. 1, pp. 111–121, Jan. 2004.
19. M. Noguchi and Y. Shimosato, The development and progression ofadenocarcinoma of the lung, Cancer Treatment Res., vol. 72, pp.
131–142, 1995.
20. T. V. Colby and C. Lombard. Histiocytosis X in the lung, Human Pathol. ,vol. 14, no. 10, pp. 847–856, 1983.
21. Geert Litjens,ThijsKooi, A survey on deep learning in medical image analysis,ELSEVIER,2017
22. M. Anousouya Devi, S. Ravi, Classification of Cervical Cancer using Artificial Neural Networks, Twelfth International Multi-
Conference on Information Processing-2016.

Authors: Giulia Lisco, Stefano Pastorelli, Laura Gastaldi

Paper Title: Functional Method for Joints Parameters Assessment in Human Body Modeling
Abstract: The integration of proper algorithms and computer graphics-based systems seems promising for the
design of biomechanical models and the relative motion analysis. Thus, consequences on research fields as gait
analysis are gathered, focusing on joints kinematics. Human motion patterns are indeed directly influenced from
human model and associated joints parameters, such as centers and axes of rotation. These, as a matter of fact,
determine the body segments coordinates systems. Joints parameters are estimated with several methods. The
aim of this research is to evaluate the consistency of a functional approach versus a the predictive one. A
validation of the algorithm used to estimate the lower limbs joints centers in gait analysis is provided with a
proper subject-specific multibody model implemented in OpenSim space. Joints angles are estimated using a
global optimization method and a comparison with the gold standard technique is also discussed. Overall the
obtained results are consistent for the two different methodologies. The correlation of the curves is excellent in
the sagittal plane, and very good in the coronal and transversal plane.

185. Keywords: biomechanics, functional methods, gait analysis, motion analysis, global optimization method,
joints. 1085-
108
References: 9

1. Cappozzo, A., Della Croce, U., Leardini, A., Chiari, L.: Human movement analysis using stereophotogrammetry. Part 1: theoretical
background. Gait Posture. 21, 186–196 (2005).
2. Della Croce, U., Leardini, A., Chiari, L., Cappozzo, A.: Human movement analysis using stereophotogrammetry. Part 4: assessment of
anatomical landmark misplacement and its effects on joint kinematics. Gait Posture. 21, 226–237 (2005).
3. Terzini, M., Zanetti, E.M., Audenino, A.L., Putame, G., Gastaldi, L., Pastorelli, S., Panero, E., Sard, A., Bignardi, C.: Multibody
modelling of ligamentous and bony stabilizers in the human elbow. Muscles. Ligaments Tendons J. 7, 493–502 (2017).
4. Gastaldi, L., Pastorelli, S., Caramella, M., Dimanico, U.: Indoor motion analysis of a subject wearing prosthesis for adaptive
snowboarding. In: WIT Transactions on Biomedicine and Health. pp. 361–372 (2011).
5. Agostini, V., Gastaldi, L., Rosso, V., Knaflitz, M., Tadano, S.: A Wearable Magneto-Inertial System for Gait Analysis (H-Gait):
Validation on Normal Weight and Overweight/Obese Young Healthy Adults. Sensors. 17, 2406 (2017).
6. Cappozzo, A., Catani, F., Leardini, A., Benedetti, M., Della Croce, U.: Position and orientation in space of bones during movement:
experimental artefacts. Clin. Biomech. 11, 90–100 (1996).
7. Leardini, A., Chiari, L., Croce, U. Della, Cappozzo, A.: Human movement analysis using stereophotogrammetry. Part 3. Soft tissue
artifact assessment and compensation. Gait Posture. 21, 212–225 (2005).
8. Kadaba, M.P., Ramakrishnan, H.K., Wootten, M.E.: Measurement of lower extremity kinematics during level walking. J. Orthop. Res.
8, 383–392 (1990).
9. Seidel, G.K., Marchinda, D.M., Dijkers, M., Soutas-Little, R.W.: Hip joint center location from palpable bony landmarks—A cadaver
study. J. Biomech. 28, 995–998 (1995).
10. Rácz, K., Nagymáté, G., Kovács, T., Bodzay, T., Kiss, R.M.: Accuracy of anatomical landmark placement methods for gait analysis.
Int. J. Mech. Control. 19, 3–10 (2018).
11. Piazza, S.J., Okita, N., Cavanagh, P.R.: Accuracy of the functional method of hip joint center location: effects of limited motion and
varied implementation. J. Biomech. 34, 967–973 (2001).
12. Halvorsen, K., Lesser, M., Lundberg, A.: A new method for estimating the axis of rotation and the center of rotation. J. Biomech. 32,
1221–1227 (1999).
13. Gamage, S.S.H.U., Lasenby, J.: New least squares solutions for estimating the average centre of rotation and the axis of rotation. J.
Biomech. 35, 87–93 (2002).
14. Woltring, H.J., Huiskes, R., de Lange, A., Veldpaus, F.E.: Finite centroid and helical axis estimation from noisy landmark
measurements in the study of human joint kinematics. J. Biomech. 18, 379–89 (1985).
15. Ehrig, R.M., Taylor, W.R., Duda, G.N., Heller, M.O.: A survey of formal methods for determining the centre of rotation of ball joints.
J. Biomech. 39, 2798–2809 (2006).
16. Ehrig, R.M., Taylor, W.R., Duda, G.N., Heller, M.O.: A survey of formal methods for determining functional joint axes. J. Biomech.
40, 2150–2157 (2007).
17. Galetto, M., Gastaldi, L., Lisco, G., Mastrogiacomo, L., Pastorelli, S.: Accuracy evaluation of a new stereophotogrammetry-based
functional method for joint kinematic analysis in biomechanics. Proc. Inst. Mech. Eng. Part H J. Eng. Med. 228, 1183–1192 (2014).
18. Gastaldi, L., Lisco, G., Pastorelli, S.: Evaluation of functional methods for human movement modelling. Acta Bioeng. Biomech. 17,
31–38 (2015).
19. Davis, R.B., Õunpuu, S., Tyburski, D., Gage, J.R.: A gait analysis data collection and reduction technique. Hum. Mov. Sci. 10, 575–
587 (1991).
20. Delp, S.L., Anderson, F.C., Arnold, A.S., Loan, P., Habib, A., John, C.T., Guendelman, E., Thelen, D.G.: OpenSim: open-source
software to create and analyze dynamic simulations of movement. IEEE Trans. Biomed. Eng. 54, 1940–50 (2007).
21. Lewis, J.L., Lew, W.D.: A note on the description of articulating joint motion. J. Biomech. 10, 675–678 (1977).
22. Lu, T.-W., O’Connor, J.J.: Bone position estimation from skin marker co-ordinates using global optimisation with joint constraints. J.
Biomech. 32, 129–134 (1999).

Authors: Shaily Sharma, Prakriti Trivedi

Paper Title: Software Project Management Training through game like simulation and Virtual Reality
Abstract: Presently, we have observed that we are lacking with tools for teaching and assessing Software
Project Management. We need to develop some tools to educate capacity of Software Project Management and
to allow learners to check their skills and involve the required educational purpose in safe surroundings by using
a gamification like methodology. In this paper, an Interactive Gaming System to enrich the fundamentals of
Software Project Management using a gamut of techniques & technologies is designed with Gesture Recognition
to increase player indulgence in the game. The proposed game also involves multiplayer participation for a
common objective over TCP/IP or Internet resulting in increasing team effort. The proposed game is
implemented in MATLAB.

Keywords: game, gesture, simulation, TCP/IP.

References:

1. Calderon and Mercedes Ruiz. Bringing Real-Life Practice in Software Project Management Training through a Simulation-based
Serious Game. CSEDU 2014 6th International Conference on Computer Supported Education
2. Amir Zeid. Using Simulation Games to teach Global Software Engineering Courses. IEEE 2015.
3. Carpes Jones. Software Project Management Practices: Failure Versus Success. The journal of defense software engineering.
186. 4. A. I.Wang and B.Wu, “An application of a game development framework in higher education,” International Journal of Computer 1090-
Games Technology, vol. 2009, Article ID 693267, 12 pages, 2009.
5. Jorge Marques Prates. Teaching and Learning Software Project Management: a hands-on approach. 2015 IEEE Conference Paper.
109
6. Emily Navarro. SimSE: A Software Engineering Simulation Environment for Software Process Education. Dissertation Report, 4
University of California, Irvine.
7. Emily Oh, Andre Van Der Hoek. Towards Game based Simulation as a method of teaching Software Engineering. 32nd IEEE Frontiers
in Education Conference.
8. Alexander Nassal. A General Framework for Software Project Management Simulation Games. IEEE Conference Paper 2014.
9. M. Prensky, “Digital game-based learning,” Computers in Entertainment, vol. 1, no. 1, pp. 21–24, 2003.
10. J. Blow, “Game development: harder than you think,” Queue, vol. 1, no. 10, pp. 28–37, 2004.
11. B. A. Foss and T. I. Eikaas, “Game play in engineering education—concept and experimental results,” International Journal of
Engineering Education, vol. 22, no. 5, pp. 1043–1052, 2006.
12. A. I. Wang, T. Øfsdahl, and O. K. Mørch-Storstein, “Lecture quiz—a mobile game concept for lectures,” in Proceedings of the 11th
IASTED International Conference on Software Engineering and Application (SEA ’07), pp. 305–310, 2007.
13. A. I. Wang, T. Øfsdahl, and O. K. Mørch-Storstein-Storstein, “An evaluation of a mobile game concept for lectures,” in Proceedings of
the IEEE 21st Conference on Software Engineering Education and Training, pp. 197–204, 2008.
14. M. S. El-Nasr and B. K. Smith, “Learning through game modding,” Computers in Entertainment, vol. 4, no. 1, pp. 45–64, 2006.
15. J. Kirriemuir and A. McFarlane, “Literature review in games and learning,” Tech. Rep. 8, 2004.
16. A. Baker, E. O. Navarro, and A. van der Hoek, “Problems and programmers: an educational software engineering card game,” in
Proceedings of the 25th International Conference on Software Engineering, pp. 614–619, May 2003.
17. F. McCown, “Teaching a game programming class for the first time: tutorial presentation,” Journal of Computing Sciences in Colleges,
vol. 25, no. 5, pp. 131–132, 2010.
18. Bian Wu and Alf Inge Wang, “A Guideline for Game Development-Based Learning: A Literature Review,” International Journal of
Computer Games Technology, Vol 2012, Article 103710.

Authors: M. Sobhitha, C. Shoba Bindu, E. Sudheer Kumar

Paper Title: Multi-Focus Fused Image using Inception-Resnet V2


Abstract: Multi-focus image fusion is the process of integration of pictures of the equivalent view and having
various targets into one image. The direct capturing of a 3D scene image is challenging, many multi-focus image 1095-
fusion techniques are involved in generating it from some images focusing at diverse depths. The two important 109
factors for image fusion is activity level information and fusion rule. The necessity of designing local filters for 9
extracting high-frequency details the activity level information is being implemented, and then by using various
187.
elaborated designed rules we consider clarity information of different source images which can obtain a
clarity/focus map. However, earlier fusion algorithms will excerpt high-frequency facts by considering
neighboring filters and by adopting various fusion conventions to achieve the fused image. However, the
performance of the prevailing techniques is hardly adequate. Convolutional neural networks have recently used
to solve the problem of multi-focus image fusion. By considering the deep neural network a two-stage boundary
aware is proposed to address the issue in this paper. They are: (1) for extracting the entire defocus info of the
two basis images deep network is suggested. (2) To handle the patches information extreme away from and close
to the focused/defocused boundary, we use Inception ResNet v2. The results illustrate that the approach
specified in this paper will result in an agreeable fusion image, which is superior to some of the advanced fusion
algorithms in comparison with both the graphical and objective evaluations.

Keywords: Multi-Focus, Image Fusion, Fused Image, Convolution Neural Network.

References:

1. J. J. Lewis et.al, “Pixel- and region-based image fusion with complex wavelets,” Information Fusion, vol. 8, pp. 119–130, 2007.
2. M. Li,W. Cai, and Z. Tan, “A region-based multi-sensor image fusion scheme using pulse-coupled neural network,” Pattern
Recognition Letters, vol. 27, no. 16, pp. 1948–1956, 2006.
3. Yu Liu et.al, “Multi-focus image fusion with a deep convolutional neural network,” Information Fusion, vol. 36, 2017.
4. Han Tang et.al, “Pixel convolutional neural network for multi-focus image fusion,” Inf. Sciences, vol. 433-434, pp. 125–141, 2018.
5. W. Huang et.al, “A new pan-sharpening method with deep neural networks,” IEEE Geosc and Rem Sens Lettrs, vol. 12, pp. 1037–
1041, 2015.
6. S. Li, J. Kwok, Y. Wang, Multifocus image fusion using artificial neural networks, Pattern Recognit. Lett. 23 (8) (2002) 985–997.
7. C. Du et.al, Image segmentation-based multi-focus image fusion through multi-scale CNN, IEEE Access 2017.
8. K.R. Prabhakar et.al, DeepFuse: a deep unsupervised approach for exposure fusion with extreme exposure image pairs, IEEE
International Conference on Computer Vision 2017, pp. 4714–4722.
9. L. Zhao et.al, “Multiple description convolutional neural networks for image compression,” IEEE Transactions on Circuits and
Systems for Video Technology, 2018.
10. E. Kang and J. C. Ye, “Wavelet domain residual network (WavResNet) for low-dose X-ray CT reconstruction,” 2017.
11. H. Huang, R. He, Z. Sun, and T. Tan, “Wavelet-srnet: a wavelet-based cnn for multi-scale face super resolution,” in Proceedings of
IEEE Conference on Computer Vision and Pattern Recognition, pp. 1689–1697, Honolulu, HI, USA, July 2017.
12. S. Zagoruyko and N. Komodakis, “Learning to compare image patches via convolutional neural networks,” in CVPR, 2015, pp.
4353–4361.
13. C. Rhemann et.al, “A perceptually motivated online benchmark for image matting,” in CVPR, 2009, pp. 1826–1833.
14. Tsung-Yi Lin et.al, “Microsoft coco: Common objects in context,” in ECCV, 2014, pp. 740–755.
15. A. Mittal, A. K. Moorthy and A. C. Bovik, "No-Reference Image Quality Assessment in the Spatial Domain," in IEEE Transactions
on Image Processing, vol. 21, no. 12, pp. 4695-4708, Dec. 2012. doi: 10.1109/TIP.2012.2214050.
16. Talebi, H., & Milanfar, P. (2018). NIMA: Neural Image Assessment. IEEE Transactions on Image Processing, 27, 3998-4011.
17. Qiang Zhang and Bao long Guo, “Multifocus image fusion using the nonsubsampled contourlet transform,” Sig Proc, vol. 89, no. 7,
pp. 1334 – 1346, 2009.
18. B. Yang and S. T. Li, “Multifocus image fusion and restoration with sparse representation,” IEEE Transactions on Instrumentation
and Measurement, vol. 59, no. 4, pp. 884–892, 2010.
19. Y. Liu et.al, “Multi-focus image fusion with dense sift,” Inf. Fusion, vol. 23, pp. 139–155, 2015.
20. Ma, Haoyu et.al. (2019). Boundary Aware Multi-Focus Image Fusion Using Deep Neural Network. arXiv:1904.00198.
Authors: Niteesha Sharma, A. Sriram, K. S. Reddy

Paper Title: Big Data Analytics With Reference To Wide Variety of Domains
Abstract: In the current day scenario, a huge amount of data is been generated from various heterogeneous
sources like social networks, business apps, government sector, marketing, health care system, sensors, machine
log data which is created at such a high speed and other sources. Big Data is chosen as one among the upcoming
area of research by several industries. In this paper, the author presents wide collection of literature that has been
reviewed and analyzed. This paper emphasizes on Big Data Technologies, Application & Challenges, a
comparative study on architectures, methodologies, tools, and survey results proposed by various researchers are
presented.

Keywords: Big Data; Big Data Technologies.


188.
References: 1100-
110
1. C. L. Philip Chen, C. Y. Zhang, Data Intensive applications, challenges, techniques and technologies: A survey on Big Data”, SCI 4
(2014).
2. Data science: A comprehensive overview. ACM Comput. Surv. 50, 3, Article 43 (June 2017), DOI: http://dx.doi.org/10.1145/3076253
3. M. M. Rathore, A. Ahmad, A. Paul and S. Rho, "Urban planning and building smart cities based on the Internet of Things using Big
Data analytics", Computer Networks, 2016.
4. Xindong Wu, Xingquan Zhu, Gong-Qing Wu and Wei Ding, “Data Mining with Big Data”, IEEE transactions on Knowledge and data
engineering, Vol.26, January 2014.
5. Longbing CAO, “Data Science: A Comprehensive Review”, ACM Computer Survey 50, 3, Article 43, June 2017.
6. Ivan Kholod, Mikhail Kuprianov, Ilya Petukhov, “Distributed Data Mining Based on Actors for Internet of Things”, MECO 2016.
7. Albert M. C. Souza and J. R. A. Amazonas, "An Outlier Detect Algorithm using Big Data Processing and Internet of Things
Architecture," Procedia Computer Science, vol. 25, 2015.
8. P.M. Kumar, U. Devi Gandhi, A novel three-tier Internet of Things architecture with machine learning algorithm for early detection of
heart diseases, Computers and Electrical Engineering (2017), http://dx.doi.org/10.1016/j.compeleceng.2017.09.001
9. The-Hien Dang-Ha, Davide Roverso, Roland Olsson, Graph of Virtual Actors (GOVA): a Big Data Analytics Architecture for IoT,
International Conference on Big Data and Smart Computing, IEEE, 2017.

Authors: Savita Kumari, Brahmjit Singh

Paper Title: Minimization of NCL in Dense Femtocellular Networks


Abstract: Dense femtocells are the ultimate objective of the femtocellular network deployment. Handover in a
mobile cellular communication will turn into an increasingly critical issue as cell size reduces. The suitable
neighbor cell list is the key component for successful handover in these handover cases. In this paper, we
introduce an algorithm for femtocell-to-femtocell handover to make the suitable number of neighbor cell list. In
the proposed scheme, the nearby same frequency cells are identified and removed from the Neighbor cell list.
The hidden femtocells constituting the nearby femtocells are enhanced in the Neighbor cell list. The simulation
results demonstrate that the proposed scheme yields the least number of neighbor cell list.

Keywords: Femtocell, Macrocell, Handover, Neighbor Cell List.

References:
1. Y. Xu, R. Yin, F. Qu, and G. Yu, “Interference coordination strategy based on Nash bargaining for small-cell networks,” IET
Communications, Sept. 2015, vol. 9, no. 13, pp. 1583–1590.
2. K. Aghababaiyan and B. Maham, “QoS-aware downlink radio resource management in OFDMA-based small cells networks,” IET
Communications, Mar. 2018, vol. 12, no. 4, pp. 441–448.
3. S. Wu, Z. Zeng, and H. Xia, “Coalition-based sleep mode and power allocation for energy efficiency in dense small cell networks,” IET
Communications, Aug. 2017, vol. 11, no. 11, pp. 1662–1670.
4. M. Yassin, S. Lahoud, M. Ibrahim, K. Khawam, D. Mezher, and B. Cousin, “Cooperative resource management and power allocation for
189. multiuser OFDMA networks,” IET Communications, Nov. 2017, vol. 11, no. 16, pp. 2552–2559.
5. K. Aghababaiyan and B. Maham, “Downlink radio resource allocation in OFDMA-based small cells networks,” in 2017 IEEE 1105-
International Black Sea Conference on Communications and Networking (BlackSeaCom), Istanbul, 2017, pp. 1–5. 111
6. M. Z. Chowdhury, Y. M. Jang, and Z. J. Haas, “Network Evolution and QOS Provisioning for Integrated Femtocell / Macrocell
Networks,” International Journal, 2010, vol. 2, no. 3, pp. 1-16.
2
7. M. Z. Chowdhury, Y. M. Jang, and Z. J. Haas, “Cost-effective frequency planning for capacity enhancement of femtocellular networks,”
Wireless Personal Communications, 2011, vol. 60, no. 1, pp. 83–104.
8. D. Xenakis, N. Passas, L. Merakos, and C. Verikoukis, “Handover decision for small cells: Algorithms, lessons learned and simulation
study,” Computer Networks, 2016, vol. 100, pp. 64–74.
9. Y. Song, P. Y. Kong, and Y. Han, “Potential of Network Energy Saving Through Handover in HetNets,” IEEE Transactions on
Vehicular Technology, 2016, vol. 65, no. 12, pp. 10198–10204.
10. S. J. Wu, “A new handover strategy between femtocell and macrocell for LTE-based network,” Proceedings - 4th International
Conference on Ubi-Media Computing, U-Media, 2011, pp. 203–208.
11. M. Z. Chowdhury, M. T. Bui, and Y. M. Jang, “Neighbor cell list optimization for femtocell-to-femtocell Handover in dense
femtocellular networks,” ICUFN 2011 - 3rd International Conference on Ubiquitous and Future Networks, 2011, pp. 241–245.
12. B. Jeong, S. Shin, I. Jang, N. W. Sung, and H. Yoon, “A smart handover decision algorithm using location prediction for hierarchical
macro/femto-cell networks,” IEEE Vehicular Technology Conference, 2011, pp. 1–5.
13. G. Yang, X. Wang, and X. Chen, “Handover control for LTE femtocell networks,” 2011 International Conference on Electronics,
Communications and Control, ICECC 2011 - Proceedings, 2011, pp. 2670–2673.
14. M. Z. Chowdhury and Y. M. Jang, “Handover management in high-dense femtocellular networks,” EURASIP Journal on Wireless
Communications and Networking, 2013, no. 1, pp. 1-21.
15. F. A. Al-Shahin, “Femtocell-to-Femtocell Handoff Management in Dense Femtocellular Networks,” International Journal of Computer
and Communication Engineering, 2015, vol. 4, no. 5, pp. 346–353.
16. M. Rajabizadeh and J. Abouei, “An efficient femtocell-to-femtocell handover decision algorithm in LTE femtocell networks,” ICEE
2015 - Proceedings of the 23rd Iranian Conference on Electrical Engineering, 2015, vol. 10, pp. 213–218.
17. V. M. Nguyen and H. Claussen, “Efficient self-optimization of neighbour cell lists in macrocellular networks,” IEEE International
Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, 2010, pp. 1923–1928.
Authors: Divya Narula, Manish Mahajan, Kamalinder Kaur

Paper Title: Automated Car Number Plate Recognition System using K-Nearest Neighbor
Abstract: The Automatic number plate recognition (ANPR) is a mass reconnaissance strategy that utilizations
optical character recognition on images to peruse the license plates on vehicles. The car number plate detection
has the various phases like pre-processing, segmentation and classification. In the previous work, the
morphological operation is applied for the car number plate detection. The morphological operation has the low
accuracy for the car number plate detection. In the proposed work, the region based segmentation and K-nearest
neighbor classification is applied for the character recognition. The proposed is implemented in MATLAB and
results are analyzed in terms of accuracy.

190. Keywords: Number Plate Detection, KNN, K-mean, Morphological Operation.


1113-
111
References:
7
1. Bhawna Tiwari, Archana Sharma, Malti Gautam Singh, Bhawana Rathi, “Automatic Vehicle Number Plate Recognition System using
Matlab”, 2016, IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
2. ASAD ALI SAFI, MUHAMMAD AZAM, SHAHBAZ KIANI, NADEEM DAUDPOTA, “Online Vehicles License Plate Detection
and Recognition System using Image Processing Techniques”,2006, 5th WSEAS International Conference on Applied Computer
Science.
3. Namrata Shirodkar, Preksha Uchil, “Number Plate Detection using Image Processing for Automated Toll Collection to prevent
fraudulent behaviour”,2015, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
4. P. Surekha, Pavan Gurudath, R. Prithvi and V.G. Ritesh Ananth, “AUTOMATIC LICENSE PLATE RECOGNITION USING IMAGE
PROCESSING AND NEURAL NETWORK”,2018, AUTOMATIC LICENSE PLATE RECOGNITION USING IMAGE
PROCESSING AND NEURAL NETWORK.
5. Rana Gill, Navneet Kaur, “Indian Vehicle Number Plate Detection by Image Processing Technique in MATLAB”, JCST Vol. 3, Issue
2, April - June 2012.
6. Abhay Singh, Anand Kumar Gupta, Anmol Singh, Anuj Gupta4, Sherish Johri, “VEHICLE NUMBER PLATE DETECTION USING
IMAGE PROCESSING”,2018, International Research Journal of Engineering and Technology (IRJET)
7. Junaid Ali Khan, Munam Ali Shah, Abdul Wahid, Muhammad Hassam Khan, Muhammad Bilal Shahid, “Enhanced car number plate
recognition (ECNPR) system by improving efficiency in preprocessing steps”, 2017 International Conference on Communication
Technologies (ComTech).
8. Isaias Tesfu Negassi, Ghebrehiwet Goitom Araya, Moath Awawdeh, Tarig Faisal, “Smart Car plate Recognition System”, 2018 1st
International Conference on Advanced Research in Engineering Sciences (ARES)
9. Madhusree Mondal, Parmita Mondal, Nilendu Saha, Paramita Chattopadhyay, “Automatic number plate recognition using CNN based
self synthesized feature learning”, 2017 IEEE Calcutta Conference (CALCON)
10. Hussni Mubarak, Ashraf Osman Ibrahim, Amna Elwasila, Sara Bushra, “Sudanese license plate identification using automatic number
plate recognition”, 2017 Joint International Conference on Information and Communication Technologies for Education and Training
and International Conference on Computing in Arabic (ICCA-TICET)
11. Junaid Ali Khan ; Munam Ali Shah, “Car Number Plate Recognition (CNPR) system using multiple template matching”, 2016 22nd
International Conference on Automation and Computing (ICAC).
12. Binay Binod Kumar, Mohit Bansal, Puneet Verma, “Designing of Licensed Number Plate Recognition system using hybrid technique
from neural network & template matching”, 2015 International Conference on Computing, Communication and Security (ICCCS).

Authors: Sumathi Doraikannan, Prabha Selvaraj, Vijay Kumar Burugari


Principal Component Analysis For Dimensionality Reduction For Animal Classification Based On
Paper Title:
LR
Abstract: Nowadays, data generation is huge in nature and there is a need for analysis, visualization and
prediction. Data scientists find many difficulties in processing the data at once due to its massive nature,
unstructured or raw. Thus, feature extraction plays a vital role in many applications of machine learning
algorithms. The process of decreasing the dimensions of the feature space by considering the prime features is
defined as the dimensionality reduction. It is understood that with the dimensionality reduction techniques,
redundancy could be removed and the computation time is decreased. This work gives a detailed comparison of
the existing dimension reduction techniques and in addition, the importance of Principal Component Analysis is
also investigated by implementing on the animal classification. In the present work, as the first phase the
important features are extracted and then the logistic regression (LR) is implemented to classify the animals.

Keywords: Dimensionality Reduction, Feature Extractiion, Classification, Logistic Regression, PCA.

References:

1. Available: http://www.halcyon.com/pub/journals/21ps03-vidmar
2. B.-Y. Ricardo and R.-N. Berthier, Modern Information Retrieval. Addison Wesley Longman, 1999.
3. M. Spitters, “Comparing Feature Sets for Learning Text Categorization,” Proc. Int’l Conf. Computer-Assisted Information Retrieval, pp.
233-251, 2000.
4. D.D. Lewis, “Feature Selection and Feature Extraction for Text Categorization,” Proc. Workshop Speech and Natural Language, pp.
212-217, 1992.
5. H. Li, T. Jiang, and K. Zhang, “Efficient and Robust Feature Extraction by Maximum Margin Criterion,” Proc. Conf. Advances in
Neural Information Processing Systems, pp. 97-104, 2004.
6. Jović , K. Brkić and N. Bogunović, “A review of feature selection methods with applications”,
191. https://bib.irb.hr/datoteka/763354.MIPRO_2015_JovicBrkicBogunovic.pdf
7. Quanquan Gu, Zhenhui Li and Jiawei Han, Linear Discriminant Dimensionality Reduction, in Proc of the 21st European Conference on 1118-
Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML/PKDD’11), Athens, Greece, pp.549-564, 112
2011.
8. Haim Avron, Christos Boutsidis, Sivan Toledo, Anastasios Zouzias: Efficient Dimensionality Reduction for Canonical Correlation 3
Analysis. SIAM J. Scientific Computing 36(5) (2014).
9. Chelsea Boling, Kumar Das , “Reducing Dimensionality of Text Documents using Latent Semantic Analysis”, International Journal of
Computer Applications (0975 – 8887) Volume 112 – No. 5, February 2015.
10. Person, K. (1901) On Lines and Planes of Closest Fit to System of Points in Space. Philiosophical Magazine, 2, 559-572.
http://dx.doi.org/10.1080/14786440109462720
11. Jing Wang, Chein-I Chang,” Independent Component Analysis-Based Dimensionality Reduction With Applications in Hyperspectral
Image Analysis”, IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, VOL. 44, NO. 6, JUNE 2006.
12. Elena Shchurenkova, “Dimension reduction using Independent Component Analysis with an application in business psychology”,
https://open.library.ubc.ca › Browse Collections › UBC Theses and Dissertations.
13. Jenkins, O.C. and Mataric, M.J. (2002) Deriving Acion and Behavior Primitives from Human Motion Data. International Conference n
Robots and Systems, 3, 2551-2556.
14. Jain, A.K. and Dubes, R.C. (1962) Algorithms for Clastering Data. Prentice Hall, Upper Saddle River.
15. Fukunaga, K. (1982) Intrinsic Dimensionality Extraction, in Classification, Pattern Recognition and Reduction of Dimensionality, Vol. 2
of Handbook of Statistics, North Holland, 347-362.
16. Daniela Brauckhoff, Kavé Salamatian, Martin May. Applying PCA for Traffic Anomaly Detection: Problems and Solutions. Proceeding
of IEEE INFOCOM 2009„ Apr 2009, Rio de Janeiro, Brazil. pp.2866-2870, ff10.1109/INFCOM.2009.5062248ff. ffhal-00620090
17. Ghodsi, Ali. (2006). Dimensionality Reduction A Short Tutorial.
18. Y. Li, L. Xu, J. Morphett, and R. Jacobs, “An Integrated Algorithm of Incremental and Robust PCA,” Proc. Int’l Conf. Image
Processing, pp. 245-248, 2003.
19. Ringberg, H., et al., 2007. Sensitivity of PCA for traffic anomaly detection. ACM SIGMETRICS Perform. Eval. Rev. 35 (1).
http://www.unb.ca/research/iscx/dataset/iscx-IDS-dataset.html (18.02.16)
Issariyapat, C., Kensuke, F., 2009. Anomaly detection in IP networks with Principal Component Analysis. In: Communications and
Information Technology, IEEE. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
20. Daniela Brauckhoff, Kavé Salamatian, Martin May. Applying PCA for Traffic Anomaly Detection: Problems and Solutions. Proceeding
of IEEE INFOCOM 2009„ Apr 2009, Rio de Janeiro, Brazil. pp.2866-2870, ff10.1109/INFCOM.2009.5062248ff. ffhal-00620090f
21. Sam T. Roweis and Lawrence K. Saul,” Nonlinear Dimensionality Reduction by Locally Linear Embedding”,
http://www.robots.ox.ac.uk/~az/lectures/ml/lle.pdf.

Authors: R. Tamilselvi, P. Balaji


Paper Title: The Key Determinants of Behavioural Intention Towards Mobile Banking Adoption
Abstract: This research was conducted to understand the customer behaviour in mobile banking usage intention
and adoption with the primary objective to explore the factors determining the behavioural intention of mobile
banking adoption practices among the bank customers in the study area. The empirical research design was
adopted by employing survey method to collect responses from target population through convenient non-
probability sampling method. The primary data collected were subjected to analysis using SPSS Version 17.0 and
the statistical tools such as, percentage analysis, descriptive statistics, Independent sample t test, Analysis of
Variance and multiple regression analysis. The empirical evidences reveal that Performance Expectancy, Effort
Expectancy, Habit and Trust are significant and positively influencing the Behavioural Intention of the Mobile
Banking whereas, Hedonic Motivation has significant and negative influence on Behavioural Intention of the
Mobile Banking. This study concluded that banks should advertise and promote mobile banking through handsets
and live demonstration counters at selected branches manned by a dedicated staff to adopt various promotional
activities for enhancement in digital literacy and financial inclusion with other government schemes. Banks must
extensively engage in the promotion of all Digital based initiatives launched by the Government of India and
engage its customers to install banking Apps like BHIM, PhonePe, Payment Banks, etc. to facility effortless
banking on their own palms. This research paper aims in exploring various insights related to behavioural
intention towards the adoption of mobile banking especially among youth in the Chennai city and Hyderabad city.
This study also aims to explore the key determinants of mobile banking adoption among customers of public and
private sector bank customers.

Keywords: Mobile Banking, Behavioural Intention, Hedonic Motivation, Performance Expectancy and Risk.

References:

1. Abadi, H. R. D., Ranjbarian, B., &Zade, F. K. (2012). Investigate the customers' behavioral intention to use mobile banking based on
TPB, TAM and perceived risk (a case study in Meli Bank). International Journal of Academic Research in Business and Social Sciences,
2(10), 312.
192. 2. Amutha, D. (2016). A study of consumer awareness towards e-banking. International Journal of Economics and Management Sciences,
5(4), 350-353. 1124-
3. Anbalagan, D. G. (2017). New Technological Changes In Indian Banking Sector. International Journal of Scientific Research and 11
Management. doi:10.18535/ijsrm/v5i9.11
4. Arnold, D. (n.d.). The digital disruption of banking and payment services. Research Handbook on Digital Transformations, 103–120.
30
doi:10.4337/9781784717766.00012
5. Goode, A. (2018). Biometrics for banking: best practices and barriers to adoption. Biometric Technology Today, 2018(10), 5–7.
doi:10.1016/s0969-4765(18)30156-5
6. Gupta, S. (2013). The mobile banking and payment revolution. European Financial Review, 2(36), 215254.
7. Kavitha, K. (2015). Mobile Banking Supervising System-Issues, Challenges and Suggestions to improve Mobile Banking Services.
Advances in Computer Science: an International Journal, 4(4), 65-67.
8. Kazi, A. K. (2013). An empirical study of factors influencing adoption of Internet banking among students of higher education:
Evidence from Pakistan.
9. Kazi, A. K., & Mannan, M. A. (2013). Factors affecting adoption of mobile banking in Pakistan: Empirical Evidence.
10. Keeton, W. R. (2001). The transformation of banking and its impact on consumers and small businesses. Economic Review-Federal
Reserve Bank of Kansas City, 86(1), 25-54.
11. Khan, D. (2017). India’s internet user base to reach 450-465 million by June 2017: IAMAI-IMRB report. The Economic Times.
12. Makinde, H. O. (2016). Effects of banks consolidation on economic growth in Nigeria (2004-2015). Journal of Emerging Trends in
Economics and Management Sciences, 7(3), 184-196.
13. Malik, S. (2014). Technological innovations in Indian banking sector: changed face of banking. International Journal, 2(6).
14. Malini, A., & Menon, D. G. (2017). Technological innovations in the banking sector in India: An analysis. 2017 International
Conference on Technological Advancements in Power and Energy ( TAP Energy). doi:10.1109/tapenergy.2017.8397342
15. Meghani, M. N., &Gokhru, A. (2017). The Impact of Demonetization on frequency of using Internet Banking Services with reference to
selected cities of Gujarat. Pacific Business Review International, 10(2), 64-72.
16. Mishra, S. K., & Sahoo, D. P. (2013). Mobile banking adoption and benefits towards customers service. International Journal on
Advanced Computer Theory and Engineering, 2(1), 78-83.
17. Roumeliotis, P. (2019). Digitisation and technological challenges of the banking industry. Homo Virtualis, 2(1), 2.
doi:10.12681/homvir.20187
18. Rumanyika, J. D. (2015). Obstacles towards adoption of mobile banking in Tanzania: a review. International Journal of Information,
35(1).
19. Rusu, R., & Shen, K. (2011). An Empirical Study on E-banking Acceptance in the United Arab Emirates (UAE). Journal of Electronic
Banking Systems, 1–9. doi:10.5171/2011.462904
20. Sentosa, I., Ming, C. W., Soebyakto, B. B., & Nik Mat, N. K. (2012). A structural equation modeling of internet banking usage in
Malaysia. Researchers World, 3(1), 75-86.
21. Stepanova, S. V., & Karakchieva, V. L. (2018). Changes in Banking Business Models Driven by Technological Innovations. 2018 XIV
International Scientific-Technical Conference on Actual Problems of Electronics Instrument Engineering (APEIE).
doi:10.1109/apeie.2018.8545543.

Authors: Rahul Kumar Jadon, Nakul Gupta


Effect of Various Coarse Aggregate Sizes and Different Marble Chips Proportions on Properties of
Paper Title:
Pervious Concrete
Abstract: With the increase in modernization. It has been found that their no more uncovered area left for
193. serving the purpose of infiltration and further there is huge amount of depletion been noticed in the underground
reservoirs as well. This problem could be resolved my using pervious concrete or environment friendly concrete 1131-
or we can call it green concrete as well. So the experimental tests were performed on cube specimens of size 113
150*150*150 mm the cylinders of size 150mm diameter and 300mm height and .This paper shows the effect of 4
various kinds of aggregates & marble chips on the pervious concrete. And study of 7, 28 days is conducted to
determine the compressive strength and the split tensile strength of the specimen. The experiments are
performed with a constant water cement ratio of (.40) & Aggregate ratio. And result resembles that strength of
the concrete is proportional to its permeability but which could be further modified by introducing the different
proportions or marble chips.

Keywords: Pervious Concrete, Permeability, Compressive Strength.

References:

1. UN World Urbanization Prospects report (2007)


2. A thirsty world, http://www.unesco.org/courier/2001_10/uk/doss02.htm, retrieved on July 8th 2008.
3. ACI Committee 522, Specifications for pervious concrete pavement (ACI 522.1-08), American Concrete Institute, Farmington Hills,
MI, 2008, pp. 7.
4. ACI Committee 522, Pervious Concrete (ACI 522R-06), American concrete Institute, Farmington Hills, MI, 2006, pp. 25.
5. Ashley, E., Using pervious concrete to achieve LEED points, Concrete InFocus, 2008, A Publication of NRMCA.
6. Brown, H.J., Pervious concrete research compilation: Past, present and future, Concrete Industry Management Program, 2008, RMC
Research & Education Foundation, Middle Tennessee State University, pp. 34,
http://www.rmcfoundation.org/newsite/images/PCRC%20F inal%206-08.pdf
7. Chusid, M., and Paris, N., Decorative applications for pervious concrete, Concrete Decor, December-January 2006, Vol. 5, No. 6, pp.
3. http://www. concretedecor.net/All Access/506/CD506- New_Technology.cfm
8. Chusid, M. and Miller, H.S., Controlling runoff beautifully, CE News, July 2008, Vol. 20, No. 6, pp. 33-35.
9. Color and texture in architectural concrete, Portland Cement Association1995, Skokie, IL.
10. EPA 2000.

Authors: R Maruthi, N.Siva Sankari

Paper Title: Power Management in Server Farms


Abstract: With developing utilization of web and exponential development in measure of information to be
handled, the extent of server farms has enormously expanded. This, in any case, has brought about huge
increment in the power utilization of the server farms. Hence, overseeing power utilization of server farms has
moved toward becoming fundamental. In this paper, the need of accomplishing vitality productivity in server
farms and overview a few later structural procedures intended for power the executives of server farms is
featured. Additionally an order of these methods dependent on their qualities is presented. This paper expects to
explore into the methods to improving vitality effectiveness of server farms and urge the necessity to create
novel answers for dealing with the huge control dissemination of server farms.

Keywords: Data Centres, Significance, Power Management, Low-power Design, Energy Efficiency, Green
Computing, DVFS, Server Consolidation.

References:

1. R. Brown et al., “Report to congress on server and data center energy efficiency: Public law 109- 431,” 2018.
2. A. Greenberg, J. Hamilton, D. A. Maltz, and P. Patel, “The cost of a cloud: research problems in data center networks,” ACM
SIGCOMM Computer Communication Review, vol. 39, no. 1, pp. 68–73, 2018.
3. C. Patel and P. Ranganathan, “Enterprise power and cooling,” ASPLOS Tutorial, 2016.
194. 4. R. A. Bergamaschi, L. Piga, S. Rigo, R. Azevedo, and G. Ara´ujo, “Data center power and performance optimization through global 1135-
selection of p-states and utilization rates,” Sustainable Computing: Informatics and Systems, vol. 2, no. 4, pp. 198–208, 2012. 113
5. G. Cabusao, M. Mochizuki, K. Mashiko, T. Kobayashi, R. Singh, T. Nguyen, and X. P. Wu, “Data center energy conservation utilizing
a heat pipe based ice storage system,” in CPMT Symposium Japan, 2010 IEEE, 2014, pp. 1–4. 9
6. J. Chang, J. Meza, P. Ranganathan, A. Shah, R. Shih, and C. Bash, “Totally green: evaluating and designing servers for lifecycle
environmental impact,” in ACM SIGARCH Computer Architecture News, vol. 40, no. 1, 2012, pp. 25–36.
7. H. Chen, Y. Li, and W. Shi, “Fine-grained power management using process-level profiling,” Sustainable Computing: Informatics and
Systems, vol. 2, no. 1, pp. 33–42, 2012.
8. G. L. T. Chetsa, L. Lefevre, J. Pierson, P. Stolf, and G. Da Costa, “Beyond cpu frequency scaling for a fine-grained energy control of
hpc systems,” in Computer Architecture and High Performance Computing (SBAC-PAD), 2012 IEEE 24th International Symposium
on. IEEE, 2012, pp. 132–138.
9. A. Hepburn, “Facebook statistics, stats & facts for 2011,” Digital Buzz, 2011.
10. S. Mittal, S. Gupta, and A. Mittal, “BioinQA: metadata–based multi–document QA system for addressing the issues in biomedical
domain,” International Journal of Data Mining, Modelling and Management, vol. 5, no. 1, pp. 37–56, 2013.
11. S. Mittal and A. Mittal, “Versatile question answering systems: seeing in synthesis,” International Journal of Intelligent Information
and Database Systems, vol. 5, no. 2, pp. 119–142, 2011.
12. Mittal, “A survey of architectural techniques for dram power management,” International Journal of High Performance Systems
Architecture, vol. 4, no. 2, pp. 110–119, 2012.
13. Y. Zhang and N. Ansari, “Green data centers,” Handbook of Green Information and Communication Systems, p. 331, 2012.
14. S. Mittal, Z. Zhang, and Y. Cao, “CASHIER: A Cache Energy Saving Technique for QoS Systems,” 26th International Conference on
VLSI Design(VLSID), pp. 43–48, 2013.
15. S. Ghosh, M. Redekopp, and M. Annavaram, “Knightshift: shifting the i/o burden in datacenters to management processor for energy
efficiency,” in Computer Architecture. Springer, 2012, pp. 183–197.
16. L. Liu, H. Wang, X. Liu, X. Jin, W. B. He, Q. B. Wang, and Y. Chen, “GreenCloud: a new architecture for green data center,” in 6th
international conference industry session on Autonomic computing and communications industry session. ACM, 2017, pp. 29–38.

Authors: Mahesh.V.J., Uma Rani.P

Paper Title: Impact of Promotional Strategies on Viewers of Kollywood Movies


195. Abstract: Indian Movie Industry had so many ups and downs since 19th century. Industry had movies with
1140-
great success along with high box office collection records, while some were not even noticed by the viewers.
114
Tempting all of them to movie theatre need well planned strategies. In order to determine the impact of
4
promotional strategy the researcher has created some constructs namely TV advertisements, movie trailers,
posters and print advertisements, social networking sites, in-house movie theatre advertisements, word-of-
mouth/e- wom, movie attributes, road shows and flash mobs, you tube viral videos, video games, mobile apps,
product placements, reality shows, audio launch, making videos. It is concluded from the present study that
promotional strategies being followed in Kollywood movies creating great impact on movie watchers. Out of the
major promotional strategies considered for this study, the most preferred promotional factors that influence the
respondents to watch movies are movie attribute, movie trailers and social networking sites, where movie
watchers are most aware on the creative aspects of product placements, you tube viral videos, and reality shows.

Keywords: Movie industry, promotional strategy, Social networking, movie trailers, reality shows.

References:

1. MaríaPilar Martínez-Ruiz1, Ana Isabel Jiménez-Zarco and Agustín Alvarez-Herranz (2011). Film Festivals: A holistic communication
tool for the film industry. African Journal of Business Management, Vol. 5(5), pp. 1951-1957.
2. Dinesh K.Gauri, Brain Ratchford, Joseph Pancras, Debabrata Talukdar. An empirical analysis of the impact of promotional discounts
on store performance. Journal of retailing. Vol:93 (3), pp. 283-303.
3. Sangkil Moon, Junhee Kim, Barry L. Bayus, Youjae Yi, (2015). Consumers pre-launch awareness and preference on movie sales.
European Journal of Marketing, Vol:50 (5/6), pp.1024-1046.
4. Harminderjit Kaur, Bikramjit Singh Hundal (2017). Impact of advertising strategies on the cognitive and behavioral component of
attitude of women consumers. Journal of Asia Business Studies. Vol: 11(4), pp.413-433.
5. Samir Sankar, M K Chowdhury (2017). Measuring the attitude of individual towards print media advertisement. The IUP Journal of
Marketing Management. Vol: 16(1)pp. 7-23.
6. Sehwan Oh, HyunmiBaek, JoongHoAhn (2017). Predictive Value of Video-sharing behavior: Sharing of movie trailers and box-office
revenue. Internet Research, Vol: 27(3), pp.691-708.
7. Madhumita Nanda, ChinmayPattnaik, Qiang (Steven) Lu, (2018). Innovation in Social Media strategy for movie success: A Study of
the Bollywood movie Industry. Management Decision. Vol:56 (1), pp.223-251.
8. VinayBohra, AdityaSinha, Abhishek Ajith (2016). A study on the promotional strategies used by Red Chillies Entertainment Pvt. Ltd.
With Special reference to Ra.One, Chennai Express, Happy New Year and Dilwale. Abhinav, National monthly referred journal of
Research in Commerce and Management. Vol:5(2).
9. Mahesh & Dr.Umarani (2013). Techniques to Fascinate Film Fraternity – Promotional Activities in Movie Marketing. Pezzottaite
Journals. Vol:2(4), pp. 487-491, (ISSN- 23199032).
10. Mahesh & Dr. Umarani (2014). Marketing Lessons from Bollywood – An outlook on movie promotion tactics in a National conference
on Future challenges and innovative trends in Global Business Environment, (ISBN: 978-93-82570-41-7).
11. ElifUlker-Demirel, AyseAkyol, Simsek (2017). Marketing and Consumption of art products: The movie Industry. Journal of Arts and
Science.
12. Haricharan Pudipeddi (2013) Innovative Marketing took centre stage in Tamil Cinema (2013 in retrospect) Business Standard.
13. Jackie Young (2014). A study of print and computer based reading to measure and compare rates of comprehension and retention. New
library world. Vol:115 (7/8), pp. 376-393.
14. Perianayagam Jesudoss, Tamil Cinema, published by Communication Research Trends, Vol: 28 no. 4 pp.1-44, ISSN01444646.
15. Peter Hulten, Vladimir Vanyushyn, (2014). Promotion and Shoppers impulse purchase: the example of clothes. Journal of Consumer
marketing. Vol: 31(2), pp.94-102.
16. Philip Kotler & Kevin Lane Keller, Marketing Management, 12 th Edition, Pearson Education.
17. Sehwan Oh, HyunmiBaek, JoongHoAhn (2017). Predictive Value of Video-sharing behavior: Sharing of movie trailers and box-office
revenue. Internet Research, Vol: 27(3), pp.691-708.
18. Sharda Haryani, Bharti Motwani (2016) Discriminant model for online viral marketing influencing consumers’ behavioral intention.
Pacific science review B:Humanities and social sciences, vol:1, pp.49-56.
19. Tamil leads as India tops film production. Times of India. Retrieved 25 March 2015.
20. V.S Ramaswamy & S.Namakumari, Marketing Management, Global Perspective, 4th edition, Macmillan Publishers India Ltd.
21. Varadarajan PR, Clark T (1994). Delineating the Scope of corporate, business and marketing strategy. Journal of Business Research,
Vol:3 (1), pp. 93-105
22. Yiannakoulias.et.all (2017). Celebrity over science? An analysis of Lyme disease video content on youtube. Social Science and
Medicine, Vol:191, pp. 57-60.
23. Zufryden, Fred (2000). New Film website promotion and box-office performance. Journal of Advertising Research. Vol:40 (1/2),
pp.55-65.

Authors: Niteesha Sharma, A. V. Krishna Prasad, V. Kakulapati

Paper Title: Data Deduplication Techniques for Big Data Storage Systems
Abstract: The enormous growth of digital data, especially the data in unstructured format has brought a
tremendous challenge on data analysis as well as the data storage systems which are essentially increasing the
cost and performance of the backup systems. The traditional systems do not provide any optimization techniques
to keep the duplicated data from being backed up. Deduplication of data has become an essential and financial
way of the capacity optimization technique which replaces the redundant data. The following paper reviews the
deduplication process, types of deduplication and techniques available for data deduplication. Also, many
approaches proposed by various researchers on deduplication in Big data storage systems are studied and
196. compared.
1145-
Keywords: Big data, storage, deduplication, redundancy, process. 115
0
References:

1. D. Reinsel, J. Gantz, and J. Rydning, “The Digitization of the World From Edge to Core Mankind is on a quest to digitize the world,”
no. November, 2018.
2. S. Singh and R. Singh, “A Viewpoint on Different Data Deduplication Systems and Allied Issues,” pp. 385–393, 2018.
3. G. Zhu, X. Zhang, L. Wang, Y. Zhu, and X. Dong, “An Intelligent Data De-duplication Based Backup System,” 2012.
4. G. Sun, Y. Dong, D. Chen, and J. Wei, “Data backup and recovery based on data de-duplication,” 2010.
5. R. Zhou, M. Liu, and T. Li, “Characterizing the efficiency of data deduplication for big data storage management,” Proc. - 2013 IEEE
Int. Symp. Workload Charact. IISWC 2013, pp. 98–108, 2013.
6. G. Wang, Y. Zhao, X. Xie, and L. Liu, “Research on a clustering data de-duplication mechanism based on Bloom Filter,” 2010 Int.
Conf. Multimed. Technol. ICMT 2010, no. 60573145, pp. 0–4, 2010.
7. X. Zhang and J. Zhang, “Data deduplication cluster based on similarity-locality approach,” Proc. - 2013 IEEE Int. Conf. Green
Comput. Commun. IEEE Internet Things IEEE Cyber, Phys. Soc. Comput. GreenCom-iThings-CPSCom 2013, pp. 2168–2172, 2013.
8. R. S. Chang, C. S. Liao, K. Z. Fan, and C. M. Wu, “Dynamic deduplication decision in a hadoop distributed file system,” Int. J. Distrib.
Sens. Networks, vol. 2014, 2014.
9. N. Kumar, R. Rawat, and S. C. Jain, “Bucket Based Data Deduplication Technique for Big Data Storage System,” pp. 267–271, 2016.
10. Q. Liu, Y. Fu, G. Ni, and R. Hou, “Hadoop Based Scalable Cluster Deduplication for Big Data,” Proc. - 2016 IEEE 36th Int. Conf.
Distrib. Comput. Syst. Work. ICDCSW 2016, pp. 98–105, 2016.
11. S. Ranjitha, P. Sudhakar, and K. S. Seetharaman, “A Novel and Efficient De-duplication System for HDFS,” Procedia Comput. Sci.,
vol. 92, pp. 498–505, 2016.
12. N. Kumar, S. Antwal, G. Samarthyam, and S. C. Jain, “Genetic optimized data deduplication for distributed big data storage systems,”
4th IEEE Int. Conf. Signal Process. Comput. Control. ISPCC 2017, vol. 2017–January, pp. 7–15, 2017.
13. D. Zhang, C. Liao, W. Yan, R. Tao, and W. Zheng, “Data Deduplication based on Hadoop,” 2017.
14. N. A. Academy, “AR-Dedupe : An Efficient Deduplication Approach for,” vol. 20, no. 1, pp. 76–81, 2015.
15. N. Kumar, P. Malik, S. Bhardwaj, and S. C. Jain, “E n h a n c i n g S t o r a g e E f f i c i e n c y U s i n g D i s t r i b u t e d D e - d u p l
i c a t i o n f o r B i g D a t a S t o r a g e S y s t e m s,” no. June, pp. 96–108, 2017.
16. S. Garg, “Semantic Analysis of Big Data by Applying De-duplication techniques.”
17. L. Wang, Z. Zhu, X. Zhang, X. Dong, and Y. Wang, “DOMe : A deduplication optimization method for the NewSQL database
backups,” vol. i, pp. 1–17, 2017.
18. R. Sheu, S. Yuan, W. Lo, and C. Ku, “Design and Implementation of File Deduplication Framework on HDFS,” vol. 2014, 2014.
19. Y. Won, K. Lim, and J. Min, “MUCH : Multithreaded Content-Based File Chunking,” vol. 64, no. 5, pp. 1375–1388, 2015.
20. K. Ma, F. Dong, and B. Yang, “Large-Scale Schema-Free Data Deduplication Approach with Adaptive Sliding Window Using
MapReduce,” 2015.
21. S. More and K. Devadkar, “EFFICIENT DATA SEARCHING AND RETRIEVAL USING BLOCK,” pp. 14–18, 2018.
22. L. Song, Y. Deng, and J. Xie, “Exploiting Fingerprint Prefetching to Improve the Performance of Data Deduplication,” pp. 849–856,
2013.
23. J. Zhang, S. Zhang, Y. Lu, and X. Zhang, “Hierarchical Data Deduplication Technology Based on Bloom Filter Array,” pp. 725–732.
24. S. Singh, “Next Level Approach of Data Deduplication in the Era of Big Data,” vol. 8, no. 4, pp. 71–74, 2017.
25. N. Kumar, “Secure Data Deduplication in Hadoop Distributed File Storage System,” vol. 7, no. 9, pp. 10–13, 2017.

Authors: Manisha Devi, Nidhi Bhatla, Harinder Kaur


Optimized Multi-layer Machine Learning Technique for Movement Detection and Tracking in
Paper Title:
Video Data Stream
Abstract: With the advent in technology, security and authentication has become the main aspect in computer
vision approach. Moving object detection is an efficient system with the goal of preserving the perceptible and
principal source in a group. Surveillance is one of the most crucial requirements and carried out to monitor
various kinds of activities. The detection and tracking of moving objects are the fundamental concept that comes
under the surveillance systems. Moving object recognition is challenging approach in the field of digital image
processing. Moving object detection relies on few of the applications which are Human Machine Interaction
(HMI), Safety and video Surveillance, Augmented Realism, Transportation Monitoring on Roads, Medical
Imaging etc. The main goal of this research is the detection and tracking moving object. In proposed approach,
based on the pre-processing method in which there is extraction of the frames with reduction of dimension. It
applies the morphological methods to clean the foreground image in the moving objects and texture based
feature extract using component analysis method. After that, design a novel method which is optimized
multilayer perceptron neural network. It used the optimized layers based on the Pbest and Gbest particle position
in the objects. It finds the fitness values which is binary values (x_update, y_update) of swarm or object
positions. Method and output achieved final frame creation of the moving objects in the video using BLOB
ANALYSER In this research , an application is designed using MATLAB VERSION 2016a In activation
function to re-filter the given input and final output calculated with the help of pre-defined sigmoid. In proposed
methods to find the clear detection and tracking in the given dataset MOT, FOOTBALL, INDOOR and
197. OUTDOOR datasets. To improve the detection accuracy rate, recall rate and reduce the error rates, False
Positive and Negative rate and compare with the various classifiers such as KNN, MLPNN and J48 decision 1151-
Tree. 115
9
Keywords: Digital image processing, Human Machine Interaction, Moving object recognition, Authentication.

References:

1. Jadhav, M. J. J., & Jyoti, J. (2014). Moving Object Detection and Tracking for Video Survelliance. International Journal of Engineering
Research and General Science, 2(4), 372-378.
2. Piccardi, M. (2004, October). Background subtraction techniques: a review. In 2004 IEEE International Conference on Systems, Man
and Cybernetics (IEEE Cat. No. 04CH37583) (Vol. 4, pp. 3099-3104). IEEE.
3. Zhang, D., & Lu, G. (2001). Segmentation of moving objects in image sequence: A review. Circuits, Systems and Signal
Processing, 20(2), 143-183.
4. Benezeth, Y., Jodoin, P. M., Emile, B., Laurent, H., & Rosenberger, C. (2008, December). Review and evaluation of commonly-
implemented background subtraction algorithms. In 2008 19th International Conference on Pattern Recognition(pp. 1-4). IEEE.
5. Joshi, K. A., & Thakore, D. G. (2012). A survey on moving object detection and tracking in video surveillance system. International
Journal of Soft Computing and Engineering, 2(3), 44-48.
6. Karasulu, B. (2010). Review and evaluation of well-known methods for moving object detection and tracking in videos. Journal of
aeronautics and space technologies, 4(4), 11-22.
7. Yuan, G., Sun, P., Zhao, J., Li, D., & Wang, C. (2017). A review of moving object trajectory clustering algorithms. Artificial
Intelligence Review, 47(1), 123-144.
8. Idris, F., & Panchanathan, S. (1997). Review of image and video indexing techniques. Journal of visual communication and image
representation, 8(2), 146-166.
9. Irani, M., & Anandan, P. (1998). A unified approach to moving object detection in 2D and 3D scenes. IEEE transactions on pattern
analysis and machine intelligence, 20(6), 577-589.
10. Cucchiara, R., Grana, C., Piccardi, M., Prati, A., & Sirotti, S. (2001). Improving shadow suppression in moving object detection with
HSV color information. In ITSC 2001. 2001 IEEE Intelligent Transportation Systems. Proceedings (Cat. No. 01TH8585) (pp. 334-
339). IEEE.
11. Shih, M. Y., & Chao, Y. Y. (2011). U.S. Patent No. 8,000,498. Washington, DC: U.S. Patent and Trademark Office.
12. Oreifej, O., Li, X., & Shah, M. (2012). Simultaneous video stabilization and moving object detection in turbulence. IEEE transactions
on pattern analysis and machine intelligence, 35(2), 450-462.
13. Wu, Y., & Wang, H. (2018, June). The Behavior Understanding of Moving Objects Based on Vision. In 2018 IEEE 3rd International
Conference on Image, Vision and Computing (ICIVC) (pp. 982-989). IEEE.
14. Yokoyama, M., & Poggio, T. (2005, October). A contour-based moving object detection and tracking. In 2005 IEEE International
Workshop on Visual Surveillance and Performance Evaluation of Tracking and Surveillance (pp. 271-276). IEEE.
15. Khosla, D., Chen, Y., & Kim, K. (2014). A neuromorphic system for video object recognition. Frontiers in computational
neuroscience, 8, 147.
16. ElTantawy, A., & Shehata, M. S. (2015, September). Moving object detection from moving platforms using Lagrange multiplier.
In 2015 IEEE International Conference on Image Processing (ICIP) (pp. 2586-2590). IEEE.
17. Hashmi, M. F., Pal, R., Saxena, R., & Keskar, A. G. (2016). A new approach for real time object detection and tracking on high
resolution and multi-camera surveillance videos using GPU. Journal of Central South University, 23(1), 130-144.
18. Heo, B., Yun, K., & Choi, J. Y. (2017, September). Appearance and motion based deep learning architecture for moving object
detection in moving camera. In 2017 IEEE International Conference on Image Processing (ICIP) (pp. 1827-1831). IEEE.
19. Yang, Y., Zhang, Q., Wang, P., Hu, X., & Wu, N. (2017). Moving object detection for dynamic background scenes based on
spatiotemporal model. Advances in Multimedia, 2017.
20. Kim, J., Koo, Y., & Kim, S. (2018, January). MOD: Multi-camera Based Local Position Estimation for Moving Objects Detection.
In 2018 IEEE International Conference on Big Data and Smart Computing (BigComp) (pp. 642-643). IEEE.
21. Zhu, M., & Wang, H. (2017, October). Fast detection of moving object based on improved frame-difference method. In 2017 6th
International Conference on Computer Science and Network Technology (ICCSNT) (pp. 299-303). IEEE.
22. Liu, T., Chi, H. H., Hong, C., and Zhao, M. S. (2014, July). Moving object detection in dynamic background. In Control Conference
(CCC), 2014 33rd Chinese (pp. 4914-4919). IEEE.
23. Luo, J., and Zhu, J. (2010, June). Adaptive gaussian mixture model based on feedback mechanism. In Computer Design and
Applications (ICCDA), 2010 International Conference on(Vol. 2, pp. V2-177). IEEE.
24. Mahalingam, T., and Subramoniam, M. (2018). A robust single and multiple moving object detection, tracking and
classification. Applied Computing and Informatics.
25. Jia, T., Sun, N. L., and Cao, M. Y. (2008, September). Moving object detection based on blob analysis. In Automation and Logistics,
2008. ICAL 2008. IEEE International Conference on (pp. 322-325). IEEE.
Authors: S.Muthukumaran, P.Geetha, E.Ramaraj
Inquiry of Personal Intelligence Of Adolescence and Early Adulthood College Students of
Paper Title:
Tamilnadu using Id3 Algorithm
Abstract: Educational Data Mining is an Emerging research domain which focus on extracting knowledge
from educational databases to promote the learning environment. Educational psychology helps to understand
the differences in learning process of a person from cognitive and behavioral perspective. This research aims to
predict the personal intelligence of adolescence and early adulthood who are studying under graduate and post
graduate courses in educational institution. Adolescence plays a very import role in the development of
personality to new dimensions in human life. The Adolescence physical, mental, social, moral and spiritual
outlooks undergo revolutionary changes. Many teachers and parents fail to asses these changes and they do not
like to slacken their control over them. Psychologist has stressed to properly channelize the behavior of
adolescence and give them adequate education. In this paper machine learning technique with decision tree
induction algorithm was used to analyze the personal intelligence of college students. To construct the decision
tree, Entropy and Information Gain are used as attribute selection measures in ID3 algorithm. Applying data
mining techniques in the field of Educational Psychology is a new method and the rules generated from the
decision tree helps to identify the personal intelligence of the students. This result helps the Educators to
198. improve the learning environment better for Adolescence.
1160-
Keywords: Educational Psychology, Educational Data Mining, Decision Tree Induction Algorithm. 116
5
References:

1. S.P. Chaube, “Psychology of Adolescents in India”, Concept Publishing Company, New Delhi, 2002.
2. Dr.M.Manivannan, “Psychology of Learning and Human Development”, Neelkamal Publishing, 2012.
3. Talaie, A., et al. "Application of an engineering algorithm with software code (C4. 5) for specific ion detection in the chemical
industries." Advances in Engineering Software, Volume -30, Issue-1, pp:13-19, 1999.
4. Butchart, Catherine, et al. "Identification of possible determinants of inpatient mortality using Classification and Regression Tree
(CART) analysis in hospitalized oldest old patients." Archives of gerontology and geriatrics, Volume-56, Issue-1, pp: 188-191, 2013.
5. Maricel Cabiling-Ramos, ”Assessment on the Behavior and Attitude of the Preschoolers of La Consolacion University Philippines as
Perceived by their Teachers”, International Journal of Scientific & Engineering Research, Volume 9, Issue 1, January-2018.
6. K.Jamberi, E.Ramaraj, “Multilevel Classification Algorithm using Diagnosis and Prognosis of Breast Cancer”, International Journal of
Data Mining Techniques and Applications, Volume: 06, Issue: 02, December 2017, Page No.56-58.
7. L.R.Aravind Babu, “Effect of Artificial Neural Network Approach in Load Forecasting Methods”, International Journal of Innovative
Technology and Exploring Engineering ,Volume-8, Issue-8s, pp:38-41, 2019
8. Ravi Ranjan,D. Priyanka Sruti,S. Delfin, Aditya Kesharwa, “Selecting Board Directors using Machine Learning”, International Journal
of Innovative Technology and Exploring Engineering ,Volume-8, Issue-7C2, pp:39-41, 2019.

Authors: Saradha Devi R, R.Seyezhai, Mrudhulaa P V, Priyadharshini K

Paper Title: Mitigation of Harmonics in a Grid Connected Photovoltaic Inverter


Abstract: Photovoltaic energy generation is one of the potential sources of renewable green energy because it
is dirt free, unlimited source and requires less maintenance. Implementation of solar PV has been increasingly
preferred for both commercial and residential purposes. The power quality issues are very common during the
developing and integrating stages of solar PV. Inverters are considered as the main medium which enables the
integration of solar PV into the grid. Due to the widespread use of inverters, harmonics are introduced into the
system. These harmonics result in the degradation of power quality at the output. This research work is
concerned with power quality when grid-connected systems are used. This paper proposes a new passive filter
topology for a unipolar pulse width modulated single-phase inverter interfaced with the PV source and the grid.
As a source for the system, a 25W photovoltaic panel is chosen. The panel is integrated with the proposed
199. inverter and filter design. A hardware prototype was developed and suitable results were obtained and verified.

Keywords: Photovoltaic energy, Shunt-less filters, PWM, THD. 1166-


117
References: 2

1. Ahmad Khan, Frede Blaabjerg, “Novel Shunt-less Filters for Grid-Connected Transformer-less Photovoltaic Applications”, IEEE 12th
International Conference on Compatibility, Power and Power Engineering (CPE-POWERENG), 2018.
2. Fei Li, Xing Zhang et al. “An LCL-LC Filter for Grid-Connected Converter: Topology, Parameter, and Analysis”, IEEE transactions
on power electronics, vol. 30, no. 9, September 2015.
3. Yew Weng Kean, Pang Siew Yong “Comparison of the effect of filter designs on the total harmonic distortion in three-phase stand-
alone photovoltaic systems”, ARPN Journal of Engineering and Applied Sciences.
4. M. Sudhakaran, R. Seyezhai, “Modeling and Analysis of Variable Frequency Inverted Sine PWM Technique for a Hybrid Cascaded
Multilevel Inverter”, Scientific Research Publishing Inc.
5. S Dharani and R.Seyezhai, “Performance investigation of asymmetric multilevel inverter with reduced switch count for fuel cells”,
Electrical & Computer Engineering: An International Journal (ECIJ) Volume 4, Number 2, June 2015.
6. Anuja Namboodiri, Harshal S. Wani, “Unipolar and Bipolar PWM Inverter”, IJIRST –International Journal for Innovative Research in
Science & Technology, Volume 1, Issue 7, December 2014.

Authors: B. Gokul, M. Padmaja

Paper Title: Design of Fast Efficient Radix-16 Sequential Multiplier


Abstract: Multiplication is an important function in computer arithmetic operations. The multiplication
process will be done by the shift-and-add sequential multiplication procedure. Radix-16 sequential multiplier
design generates the radix-16 partial products as two low (L) and high (H) components. In order to reduce cycle
time, Brent-Kung adder and two radix 16 carry-save adders are used to generate radix-16 partial products. The
proposed design of radix-16 sequential multiplier is efficient over previous designs and comparison depicts ADP
and PDP of existing method are 11.22% and 8.45% than proposed method. However, the Excess area-Delay
product and Excess-power-Delay product is also lowered. The design is carried out in Xilinx ISE 14.5 software
and cadence tool for simulation and synthesis results. Fast efficient radix-16 sequential multiplier can be used in
many digital signal processing applications.

Keywords: Radix-16 Sequential Multiplier, Radix-16 Carry-save Adder, Brent-Kung adder, Excess Area Delay
product (EADP), Excess power Delay Product (EPDP).

References:

1. Amanollahi, S., & Jaberipur, G. (2017). Fast Energy Efficient Radix-16 Sequential Multiplier. IEEE Embedded Systems Letters, 9, 73-
200. 76.
2. R. Brent and H. Kung, "A regular layout for parallel adders", IEEE Transaction on Computers, vol. C-31,n o.3,p p. 260-264,M arch
1173-
1982. 117
3. Gundi, N. D. (2015). Implementation of 32 bit Brent Kung Adder using complementary pass transistor logic (Doctoral dissertation, 7
Oklahoma State University).
4. S.Amanollahi and G.Jaberipur, "Architecture-Level Design Space Exploration for Radix-16 Sequential Multipliers", The CSI Journal
on Computer Science and Engineering, vol. 13, no. 1, 2015.
5. Baran, D., Aktan, M., & Oklobdzija, V. G. (2011, May). Multiplier structures for low power applications in deep-CMOS. In 2011
IEEE International Symposium of Circuits and Systems (ISCAS) (pp. 1061-1064). IEEE.
6. M.D.Ercegovac, and T. Lang, "Fast Multiplication without Carry- Propagate Addition" IEEE Transactions on Computer, vol. 39, no.
11, 1385-1390, 1990.
7. N.Honarmand,M.R.Javaheri, N.Sedaghati-Mokhtari and A.Afzali-Kusha, "Power Efficient Sequential Multiplication Using Pre-
computation" Proceedings of IEEE International Symposium on Circuits and Systems, 2006, pp. 270 9-2712.2
8. M. Mottaghi- Dastjerdi, A. Afzali-Kusha, and M. Pedram, "BZ-FAD: A Low-Power Low-Area Multiplier based on Shift-and-Add
Architecture," IEEE Transactions on Very Large Scale Integration (VLSI ) Systems, vol. 17, no. 2, pp. 302 -306, 2009
9. Abid, Z., El-Razouk, H., El-Dib, D.A. ‘Low power multipliers based on new hybrid full adders’, Microelectron. J., 2008, 39, pp. 1509–
1515.
10. Antelo, E., Montuschi, P., and Nannarelli, A. Improved 64-bit Radix-16 Booth Multiplier Based on Partial Product Array Height
Reduction. IEEE Transactions on Circuits and Systems I: Regular Papers, 64(2), 409–418.
11. Yezerla, S. K., and Rajendra Naik, B. Design and estimation of delay, power and area for Parallel prefix adders. 2014 Recent Advances
in Engineering and Computational Sciences (RAECS).
12. Saxena, P. Design of low power and high speed Carry Select Adder using Brent Kung adder. 2015 International Conference on VLSI
Systems, Architecture, Technology and Applications (VLSI-SATA).
13. Lynch, T., and Swartzlander, E. A spanning tree carry look ahead adder. IEEE Transactions on Computers, 41(8), 931–939.

Authors: Medha B.Patil, S.V.Phakade

Paper Title: Adaptive Head Light System using Image Processing


201. Abstract: The project introduce a prototype of an adaptive head light system using image processing. This
1178-
system is focused on the lighting angle of low beam in the headlights with its light moved horizontally. The
118
controller in head light is based on image processing from a camera mounted front side of the car. This system
0
decrease the ‘glare’ effect of the headlights and increase the drivers visibility based on survey.
Keywords: Adaptive head light system, headlights.

References:

1. Mr.S.V.Phakade and Patil Medha B, “Adaptive Head Light System using Image Processing”, International Journal of Electronics
Engineering ISSN: 0973-7383, Volume-11, Issue-1,Jan-June-2019
2. Priyanka M Dubal, Dr.Alam N. Shaikh,”Adaptive Head-Light System for Vehicle”, International Journal of Engineering Research in
Computer Science and Engineering,Vol 5,Issu 2,February 2018.
3. Snehal G. Magar Dept. of E&TC Engineering JSCOE, Hadapsarpune,India, ”Adaptive Front Light System of Vehicle for Road
Safety”2015IEEE.
4. Shreyas S, KrithanaaRaghuraman, Padmavathy AP, S.Arun Prasad, G.Devaradjane, Madras Institude of Technology, Anna University
Chennai,India,”Adaptive Headlight System for Accident Prevention”,2014IEEE.
5. FengqunGuo,HuiXiao,Shouzhi Tang, College of Electronic and Information Engineering,TongiUniversity,shanghai
201804,China,”Research of Modeling and Simulation on Adaptive Front-Lighting system for Corner Based on CCD”2013IEEE.
6. T.Hacibekir, S.Karaman, E.S.Oztirk, M.Demirci and B.AksumGuvenc”Adaptive Headlight System Design Using Hardware-In-Loop
Simulation”,2006IEEE.
7. DubalPriyankaM,Nanaware J.D,”Modeling and simulation on Adaptive Front Lighting System for Vehicle Based on Camera”,
International Journal of Engineering Research-Online,Vol.3.,Issue.4.,2015.

Authors: Kapil Aggarwal, Santosh Kumar Yadav


Dynamic Key Switching Integrated Scenarios for Performance Aware Implementations in Cloud
Paper Title:
and Integrated Internet of Things
Abstract: With the adoption and wide usage of smart gadgets and devices for multiple applications, the
association of advanced technologies is quite prominence and needs higher degree of accuracy and performance.
These are legitimately connected with the advanced innovations including Internet of Things, Internet of
Everything, Internet of Vehicles, Internet of Cloud Apps and numerous others. This original copy is therefore
displaying the enormous issues and research focuses in this area with the associated streams so the different
elements of IoT, IoE, IoX, IoV and others can be broke down with the examination openings and the portions for
various streams. In the present situation, the IoT based coordination of digital forms of money is very
unmistakable whereby the distributed system is pursued and it goes under the innovation of blockchain. The
blockchain innovation is likewise connected with the shrewd advances. In the present period, Blockchain
Technology is one of the key territories of research just as execution explicitly in the space of cryptocurrency.
Presently days, various computerized cryptographic forms of money are very conspicuous and shared all through
the world in spite of tremendous analysis and discussions. Other than these purposes of research, the vehicular
mix of IoT is very conspicuous that is tended to utilizing IoV that is Internet of Vehicles in the keen traffic
observing and brilliant transportation. Presently days, the IoT is moving towards IoE or IoX which alludes to
Internet of Everything and this is additionally tended to in this composition. The manuscript is presenting the
scenarios for the implementation patterns associated with the security and dynamic key based environment.

Keywords: Cloud Security, Dynamic Security, IoT Security, Network Security.


202.
References: 1181-
118
1. Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing and internet of things: a survey. Future 4
generation computer systems, 56, 684-700.
2. Hassanalieragh, M., Page, A., Soyata, T., Sharma, G., Aktas, M., Mateos, G. & Andreescu, S. (2015, June). Health monitoring and
management using Internet-of-Things (IoT) sensing with cloud-based processing: Opportunities and challenges. In 2015 IEEE
International Conference on Services Computing (pp. 285-292). IEEE.
3. Hossain, M. S., & Muhammad, G. (2016). Cloud-assisted industrial internet of things (iiot)–enabled framework for health monitoring.
Computer Networks, 101, 192-202.
4. Díaz, M., Martín, C., & Rubio, B. (2016). State-of-the-art, challenges, and open issues in the integration of Internet of things and cloud
computing. Journal of Network and Computer applications, 67, 99-117.
5. Zhu, C., Leung, V. C., Shu, L., & Ngai, E. C. H. (2015). Green internet of things for smart world. IEEE Access, 3, 2151-2162.
6. Singh, J., Pasquier, T., Bacon, J., Ko, H., & Eyers, D. (2015). Twenty security considerations for cloud-supported Internet of Things.
IEEE Internet of things Journal, 3(3), 269-284.
7. Hou, L., Zhao, S., Xiong, X., Zheng, K., Chatzimisios, P., Hossain, M. S., & Xiang, W. (2016). Internet of things cloud: Architecture
and implementation. IEEE Communications Magazine, 54(12), 32-39.
8. Yang, J., He, S., Lin, Y., & Lv, Z. (2017). Multimedia cloud transmission and storage system based on internet of things. Multimedia
Tools and Applications, 76(17), 17735-17750.
9. Henze, M., Hermerschmidt, L., Kerpen, D., Häußling, R., Rumpe, B., & Wehrle, K. (2016). A comprehensive approach to privacy in
the cloud-based Internet of Things. Future Generation Computer Systems, 56, 701-718.
10. Pham, T. N., Tsai, M. F., Nguyen, D. B., Dow, C. R., & Deng, D. J. (2015). A cloud-based smart-parking system based on Internet-of-
Things technologies. IEEE Access, 3, 1581-1591.
11. Guan, Z., Li, J., Wu, L., Zhang, Y., Wu, J., & Du, X. (2017). Achieving efficient and secure data acquisition for cloud-supported
internet of things in smart grid. IEEE Internet of Things Journal, 4(6), 1934-1944.
12. Bagula, B. A., & Erasmus, Z. (2015, March). Iot emulation with cooja. In ICTP-IoT workshop.
13. Velinov, A., & Mileva, A. (2016). Running and testing applications for Contiki OS using Cooja simulator.

Authors: Rucha S. Dabholkar, S. V. Phakade

Paper Title: Revolution by using Optical Character Recognition Technique to Identify Registered Number Plate
203. Abstract: From past few years, the most interesting research topic is ANPR which registration of vehicles by
1185-
their number plates. The purpose of this system is used for identifying number plate of numerous automobile.
118
From automobile images, only number plate is extracted using binary mask method. And Optical Character
8
Recognition (OCR) technique will be done with segmentation method. In segmentation, the numbers or
characters on number plate are separated into small parts which is used to recognize using template matching in
optical character recognition algorithm. As a result, the recognized number plate will be displayed. Also the
result of this number plate is registered or not registered number plate will be displayed as a result.

Keywords: Car images; NPR; Character Separation; OCR.

References:

1. Miss. Rucha S. Dabholkar and Prof. S.V. Phakade, “Automatic Number Plate recognition system on vehicle images using Optical
Character Recognition Technique”, International Journal of Electronics Engineering (IJEE) ISSN: 0973-7383, Volume-11, Issue-01,
pp. 806-811 Jan 2019-June 2019.
2. ThanongsakSirithinaphong and KosinChamnongthai, “The Recognition of Car License Plate for Automatic Parking System”, Fifth
International Symposium on Signal Processing and its Applications, ISSPA '99, Brisbane, Australia, 22-25 August, 1999.
3. Muhammad Tahir Qadri and Muhammad Asif,” Automatic Number Plate Recognition System for Vehicle Identification using Optical
Character Recognition”,2009 International Conference on Education Technology and Computer.
4. Kartikeya Jain, Tanupriya Choudhury and NirbhayKashyap,”Smart Vehicle Identification System using OCR”, 3rd IEEE International
Conference on "Computational Intelligence and Communication Technology" (IEEE-CICT 2017).
5. Ketan S. Shevale,” Automated License Plate Recognition for Toll Booth Application”,Int. Journal of Engineering Research and
Applications,ISSN : 2248-9622, Vol. 4, Issue10( Part - 5), October 2014, pp.72-76.
6. HakobSarukhanyan, SourenAlaverdyan, and GrigorPetrosyan,” Automatic Number Plate Recognition System”, Institute for
Informatics and Automation Problems of NASRA, Yerevan, Armenia.
7. Vandini Sharma, Prakash C. Mathpal, Akanksha Kaushik,”Automatic license plate recognition using optical character recognition and
template matching on yellow color license plate”,International Journal of Innovative Research in Science, Engineering and
Technology,ISSN: 2319-8753 Vol. 3, Issue 5, May 2014.
8. Er. Kavneet Kaur, Vijay Kumar Banga,”Number Plate Recognition using OCR Technique”, International Journal of Research in
Engineering and Technology, eISSN: 2319-1163, pISSN: 2321-7308, Volume: 02 Issue: 09, Sep-2013.
9. S. R. Aher, Prof. N. D. Kapale,”Automatic Number Plate Recognition System for Vehicle Identification using Optical Character
Recognition”, International Research Journal of Engineering and Technology (IRJET), e-ISSN:2395-005, p-ISSN: 2395-0072,Volume:
04 Issue: 06, June -2017.
10. Mr. G. T. Sutar and Prof. Mr. A.V. Shah, “Number Plate Recognition Using an Improved Segmentation”, International Journal of
Innovative Research in Science, Engineering and Technology (An ISO 3297: 2007 Certified Organization), ISSN: 2319-8753, Vol. 3,
Issue 5, May 2014.
11. M. M. Shidore and S. P. Narote, “Number Plate Recognition for Indian Vehicles”, IJCSNS International Journal of Computer Science
and Network Security, VOL.11 No.2, Feb. 2011.
12. Ragini Bhat and Bijender Mehandia, “Recognition of vehicle number plate using MATLAB”, International Journal of Innovative
Research in electrical, electronics, instrumentation and control engineering, issn (Online) 2321 – 2004, ISSN (Print) 2321 – 5526 Vol.
2, Issue 8, August 2014.
13. Ms. Sushama H. .Bailmare and Prof. A. B. Gadicha, “ A Review paper on Vehicle Number Plate Recognition(VNPR) Using Improved
Character Segmentation Method”, International Journal of Scientific and Research Publications, Volume 3, Issue 12, December 2013
1 ISSN 2250-3153.
Authors: Inderjit Kaur, Vijay Bhardwaj
K-Anonymity Enhancement for Privacy Preservation with Hybridization of Cuckoo Search and
Paper Title:
Neural Network using Clustering
Abstract: Expansion of social network and the publication of its data have directed the risk of disclosure of
individuals’ confidential information. Privacy preservation is a must thing before service providers publish the
network data. In recent years, privacy in social network data has become the most concerned issue as it has
gripped our lives in a dramatic manner. Numerous anonymization methods are there that assists in privacy
preservation of social networking and among all, k-anonymity is the utmost one that helps in providing the
security by developing graph and nodes degree. In this manuscript, the enhancement of K-anonymity has been
addressed with major changes in node editing methodology. The clusters are developed with the integration of
the same degree in one group and the procedure is iterated till the identification of noisy data. An advanced
Cuckoo Search is commenced for minimizing the node miss placement in groups. The results of the Cuckoo
Search are integrated with Feed Forward Back Propagation Neural Networks to cross-check the structure and to
reduce the node miss placement in groups. Average Path Length (APL) and Information parameters are
measured for the evaluation and comparative analysis and the effectiveness of the research has been checked by
comparing the results of Aanchal Sharma and P. R. Bhaladhare. There is a diminution of 14.6% while
204. comparing APL with Aanchal Sharma and 8.61% and 10.38% of reduction is shown with Aanchal Sharma and
P. R. Bhaladhare for Information loss. 1189-
119
Keywords: Preservation, K-anonymity, Clustering, Cuckoo search, Neural network, APL, Information loss 6

References:

1. A. Kaur, “A hybrid approach of privacy preserving data mining using suppression and perturbation techniques”, In International
Conference on Innovative Mechanisms for Industry Applications (ICIMIA), Bangalore, pp. 306-311,2017.
2. D. Patel and R. Kotecha, “Privacy Preserving Data Mining: A Parametric Analysis”, In Proceedings of the 5th International Conference
on Frontiers in Intelligent Computing: Theory and Applications, Advance in Intelligent Systems and Computing, Vol. 516, pp. 139-149,
2017.
3. P. Mohana Chelvan and K. Perumal, “Stable Feature Selection with Privacy Preserving Data Mining Algorithm”, Advanced Informatics
for Computing Research. Communications in Computer and Information Science, Springer. Singapore, Vol. 712, pp 227-237, 2017.
4. Y. Song, P. Karras, Q. Xiao and S. Bressan, “Sensitive Label Privacy Protection on Social Network Data”, IEEE transactions on
knowledge and data engineering, Vol.25, No.3, pp 562-571, 2013.
5. Zhou and J. Pei, “The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks”,
Knowledge and Information Systems, Vol.28, No.1, pp 47–77, 2010.
6. K. Ilavarasi and B. Sathiyabhama, “An evolutionary feature set decomposition based anonymization for classification workloads:
Privacy Preserving Data Mining”, Cluster Computing, Vol. 20, No. 4, pp 3515–3525, 2017.
7. G. Priyanka, P. Darshana and Kotecha Radhika, “Privacy-Preserving Associative Classification”, In International Conference on
Information and Communication Technology for Intelligent Systems. Smart Innovation, Systems and Technologies, Springer, Cham,
Vol. 2, pp.245-251, 2017.
8. X. Wu, X.Ying, K. Liu and L. Chen, “A survey of privacy-preservation of graphs and social networks”, In Managing and mining graph
data, Springer, Boston, MA, pp. 421-453, 2010.
9. K. LeFevre, D. J. DeWitt and R. Ramakrishnan, “Mondrian Multidimensional K Anonymity”, In IEEE International Conference of Data
Engineering, Vol. 25, pp.1-11,2006.
10. B. C. M. Fung, Y. Jin and J. Li, “Preserving privacy and frequent sharing patterns for social network data publishing”. In IEEE/ACM
International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013), Niagara Falls, ON, pp. 479-485, 2013.
11. Mingxuan Yuan and Lei Chen, “Protecting Sensitive Labels in Social Network Data Anonymization”, IEEE transactions on knowledge
and data engineering, Vol. 25, No. 3, 2013.
12. Narayanan and V. Shmatikov, “De-Anonymizing Social Networks”, Proc. IEEE 30th Symp. Security and Privacy, pp. 173-187, 2009.
13. Z. He, Z. Cai and J. Yu, “Latent-Data Privacy Preserving With Customized Data Utility for Social Network Data”, In IEEE Transactions
on Vehicular Technology, Vol. 67, No. 1, pp. 665-673, Jan. 2018.
14. D. Yin, Y. Shen and C. Liu, “Attribute Couplet Attacks and Privacy Preservation in Social Networks”, in IEEE Access, Vol. 5, pp.
25295-25305, 2017.
15. Q. Wang, Y. Zhang, X. Lu, Z. Wang, Z. Qin and K. Ren, “Real-Time and Spatio-Temporal Crowd-Sourced Social Network Data
Publishing with Differential Privacy”, In IEEE Transactions on Dependable and Secure Computing, Vol. 15, No. 4, pp. 591-606, 2018.
16. W. Feng, Z. Yan and H. Xie, “Anonymous Authentication on Trust in Pervasive Social Networking Based on Group Signature”,
In IEEE Access, Vol. 5, pp. 6236-6246, 2017.
17. M. Siddula, L. Li and Y. Li, “An Empirical Study on the Privacy Preservation of Online Social Networks”, In IEEE Access, Vol. 6, pp.
19912-19922, 2018.
18. S. Du , X. Li , J. Zhong , L. Zhou , M. Xue and H. Zhu, “Modeling Privacy Leakage Risks in Large-Scale Social Networks”, in IEEE
Access, Vol. 6, pp. 17653-17665, 2018.
19. Aanchal Sharma and Sudhir Pathak, “Enhancement of k-anonymity algorithm for privacy preservation in social media”, International
Journal of Engineering & Technology, Vol. 7, No. 2.27, pp.40-45, 2018.
20. Amir Hossein Gandomi, Xin-She Yang and Amir Hossein Alavi, “Cuckoo search algorithm: a metaheuristic approach to solve structural
optimization problems”, Engineering with Computers, Vol. 29, No.1, pp 17–3, 2013.
21. Nikita Sinha and B. Annappa, “Cuckoo Search for Influence Maximization in Social Networks”, In Proceedings of 3rd International
Conference on Advanced Computing, Networking and Informatics, Springer, New Delhi, Vol 44. pp 51-61, 2016.
22. Weibo Liu,Zidong Wanga, Xiaohui Liu, Nianyin Zeng, Yurong Liu andFuad E.Alsaadi, “A survey of deep neural network architectures
and their applications”, Neurocomputing, Vol. 234, No.19, pp.11-26,2017.
23. P. R. Bhaladhare and D. C. Jinwala, “Novel Approaches for Privacy Preserving Data Mining in k-Anonymity Model”, Journal of
Information Science and Engineering”, Vol. 32, No.1, pp. 63-78, 2016.

Authors: Sergiy S. Bulavka

Paper Title: The Combined Power Generation in Pre-Start Thermostating Systems


Abstract: Modern requirements to the operational parameters of pre-start thermostating systems require a
new approach to their creation or upgrading. Therefore, there is a need to consider the possibilities of using the
combined power generation in pre-start thermostating systems. Launch vehicles include the equipment that
requires certain temperature conditions for operation, which modifies its characteristics and disrupts normal
functioning. The temperature also determines the characteristics of onboard power supplies, the reliability of the
engine units and pre-start thermostating systems. For the normal functioning of pre-start thermostating systems,
it is necessary to supply various combinations of power for the spacecraft. The recent open access publications
were considered, including the combined types of power generation in pre-start thermostating systems. The
thermostating systems of spacecrafts should have several sources of power, i.e. the combined power generation
in pre-start thermostating systems has not been considered yet. The examination of the possibilities of using the
combined power generation in pre-start thermostating systems. The thermostatic systems for performing the
functions of pre-start thermostating systems are to have several sources of energy that will increase the reliability
of their operation. Energy can also be supplied from an external source, which is essential for pre-start
thermostating systems, especially in launch units. The possibilities of using the combined power generation in
pre-start thermostating systems are considered, providing the reliability increase of their functioning. The
application of mechanical, thermal, electrochemical and solar power plants, as well as the use of nuclear isotope
205. and reactor power plants is suggested.
1197-
Keywords: Pre-start thermostating systems, combined power generation, spacecraft, power plants. 120
1
References:

1. A. M. Swanger, K. M. Jumper, J. E. Fesmire, and W. U. Notardonato, “Modification of a liquid hydrogen tank for integrated
refrigeration and storage,” IOP Conference Series: Materials Science and Engineering, 101, 2015, 012080. doi: 10.1088/1757-
899x/101/1/012080.
2. D. A. Baranov, and V. D. Yelenev, “Determination of mass-power propertions for parametric range of launch vehicle modifications,”
Vestnik of Samara University. Aerospace and Mechanical Engineering, 6, 2011, pp. 54-63.
3. V. K. Serdyuk, Designing means of launching spacecraft: studies. manual for universities. Moscow: Mashinostroenie, 2009.
4. G. A. Gorbenko, D. V. Chaika, N. I. Ivanenko, “Starting temperature control system of a space rocket complex based on freon
chillers,” Bulletin of the National Technical University “Kharkiv Polytechnic Institute” series: “Power and heat engineering processes
and equipment”, 6, 2008, pp. 173-177.
5. J. E. Fesmire, T. M. Tomsik, T. Bonner, J. M. Oliveira, H. J. Conyers, W. L. Johnson, and W. U. Notardonato, “Integrated heat
exchanger design for a cryogenic storage tank,” Advances in Cryogenic Engineering AIP Conf. Proc, 1573, 2014, pp. 1365-1372. doi:
10.1063/1.4860865.
6. T. Ramesh, and K. Thyagarajan, “Investigation studies on sub-cooling of cryogenic liquids using helium injection method,” American
Journal of Applied Sciences, 11(5), 2014, pp. 707-716. doi: 10.3844/ajassp.2014.707.716
7. T. Ramesh, and K. Thyagarajan, “Performance Studies on Sub-cooling of Cryogenic Liquids Used for Rocket Propulsion Using
Helium Bubbling,” International Journal of Engineering and Technology, 6(1), 2014, pp. 58-65.
8. A. G. Galeev, and A. A. Zolotov, Operation of launch complexes of space rocket systems. Moscow: Publishing House of MAI, 2007.
9. A. S. Koroteev, “A new stage in the use of nuclear energy in space,” Nuclear power, 108(3), 2010, pp. 135-138.
10. A. G. Galeev, “Methods to improve the safety of rocket engine tests related to hydrogen emissions,” Alternative energy and ecology,
2(22), 2005, pp. 9-14.
11. A. G. Galeev, “Problems of ensuring the safety of bench tests of propulsion and power plants using hydrogen fuel,” Alternative energy
and ecology, 11(42), 2006, pp.14-19.
12. A. N. Perminov, “Hydrogen energy and cosmonautics,” Alternative energy and ecology, 5(37), 2006, p. 101.
13. M. V. Dobrovolsky, Liquid rocket engine. Design Basics: textbook. Moscow: Bauman Moscow State Technical University Publ., 2005.

Authors: Ranjith Kumar S, Ramachandran N, Arvind M, Divaakar D, Dineskumar P, Adhith S


Effect on the Mechanical Properties of Za-27/Graphite Reinforced Composites when Routed
Paper Title:
Through a Squeeze Casting Process
Abstract: Zinc Aluminium Alloy with a presence of the alloy number of 27 is widely being used in the
production as well as in the manufacturing of roller bearing and bushes mostly in the auto industry by replacing
the bronze made bearings due to its low cost value along with the utmost best performance. And as an add-on,
Zinc Aluminium Alloy 27 is a highly strengthened alloy with best metallurgical characters which is somewhat
on the high side in the graph when relating it with other types of commonly utilized cast aluminium alloys. The
current research work deals purely with increasing the mechanical characteristics of ZA 27 alloy and also to
identify the characteristics of the similar alloy when it combines with a metal matrix composites that has been
reinforced with the graphite which is purely produced by squeeze casting technique. With respect to this, the
reinforced graphite and the Za 27 mixture increases the heat expansion and expands the autonomous lubrication
property. The result of this research reveals about the input process parameter increase and then there will be a
relevant improvement in its ductile character but with response to the rise in mass of the graphite particles,
which will lead to the decrease in the mechanical property such as hardness.

Keywords: Squeeze casting process; Zinc Aluminium-27 alloy; graphite particulate reinforcement; Mechanical
characters.

References:
206.
1. Seun Samuel Owoeye,Davies Oladayo Folorunso,Babatunde Oji,Sunday Gbenga Borisade.Zinc-aluminum (ZA-27)-based metal matrix 1202-
composites: a review article of synthesis, reinforcement, micro structural, mechanical, and corrosion characteristics. Int. Journal of 120
Advanced Mfg. and Tech.2019;vol 100,pp. 373-380. 4
2. Run-xia, LI Rong-de, BAI Yan-hua, QU Ying-dong, YUAN Xiao-guang.Effect of specific pressure on microstructure and mechanical
properties of squeeze casting ZA27 alloy. Trans, non-ferrous Met Soc china.2009; 20 (P59-63).
3. Chinnarut Panpun,Thawatchai Plookphol, Somjai Janudom.Creep of Slurry Squeeze-Cast ZA-27 Zinc Alloy with Different Solid
Fractions at 140 °C.Materials Science Forum.2018; vol 928, pp194-199.
4. Dharmalingam, S, Marimuthu, P, Raja, K, Nithyapathi, C, Babu, B & Siva, M.Experimental investigation on electrochemical micro
machining of Al-10%wt SiCp based on Taguchi design of experiments. Int. Journal Review of Mechanical Engineering.2014;vol. 8, no.
1, pp. 80 – 88.
5. Dharmalingam, S, Marimuthu, P, Raja, K, Pandyrajan, R &Surendar S.Optimization of process parameters on MRR and overcut in
electrochemical micro machining on metal matrix composites using grey relational analysis.International Journal of Engineering and
Technology.2014;vol. 6, no. 2, pp. 519-529.
6. Sharma, S.C., ShantaSastryb, M. Krishna.Effect of aging parameters on the micro structure and properties of ZA-27/aluminite metal
matrix composites.Journal of Alloys and Compounds.2002;346: 292-301.
7. Bobic, I., M.T. Jovanovic, N. Ilic.Microstructure and strength of ZA-27-based composites reinforced with Al2o3 particles.Materials
Letters ltd.2003;57: 1683-1688.
8. K.H.W.SeahS.C.SharmaB.M.Girish.Mechanical properties of cast ZA-27/graphite particulate composites.Materials and Design;vol
16,Issue 5,1995.pp271-275.
9. ShantaSastry,MKrishna,JayagopalUchil.A study on damping behaviour of aluminite particulate reinforced ZA-27 alloy metal matrix
composites. Journal of Alloys and Compounds.vol 314,Issue 1-2,2001;pp268-274.
10. H.LeHuy,G.L’esp’erance. Ageing characteristics of dendritic and non-dendritic (stir-cast) Zn-Al alloy (ZA-27). Journal of Materials
Science.vol 26, Issue 2.1991;pp 559-568.
11. M.A.Savas,S.Altintas. The microstructural control of cast and mechanical properties of zinc-aluminium alloys.vol28 Issue7,1993.pp
1775-1780.

Authors: Malaya Kumar Hota

Paper Title: A DSP Technique for Prediction of Cancer Cell


Abstract: At present cancer is an alarmed disease. According to medical research, central cause of cancer is
due to the genetic abnormality. Most cancers are generated due to permanent change in the deoxyribonucleic
acid (DNA). For the past two decades, genomic signal processing (GSP) is a vital area of research. It has
engrossed the consideration of digital signal processing (DSP) researchers for the massive amount of data
accessible in the public data base. By finding out the DNA sequence for cancer cells & normal cells of human
beings & applying some digital signal processing (DSP) approaches on both, difference between them can be
207. found. Previously, discrete Fourier transform (DFT) power spectrum was used to predict cancer cells of a DNA
sequence. In this paper, discrete cosine transform (DCT) and discrete sine transform (DST) approaches are 1205-
presented as an alternative to analyze the spectral characteristics of cancer cells and normal cells. Further, post- 120
processing is done using digital IIR low pass filter to improve the discrepancy between cancer and normal cells. 9
The proposed method is tested for a number of data sets available in Gene Bank.

Keywords: Digital Signal Processing (DSP), Digital IIR low pass filter, Discrete Cosine Transform (DCT),
Discrete Sine Transform (DST).

References:
1. Q. Peng, Z.J. Wang, and K.J.R. Liu, “Genomic processing for cancer classification and prediction — a broad review of the recent
advances in model-based genomic and proteomic signal processing for cancer detection,” IEEE Signal Processing Magazine, Vol. 24,
No. 1, 2007, pp. 100-110.
2. M. Akhtar, E. Ambikairajah, and J. Epps, “Signal Processing in Sequence Analysis: Advances in Eukaryotic Gene Prediction,” IEEE
Journal of selected topics in signal processing, Vol. 2, No.3, 2008, pp. 310-321.
3. J. Tuqan, and A. Rushdi, “A DSP based approach for finding the codon bias in DNA sequences,” IEEE Journal of Selected Topics in
signal processing, Vol. 2, No. 3, 2008, pp. 343-356.
4. M.K. Hota, and V.K. Srivastav, “Identification of protein coding regions using anti-notch filters,” Digital signal processing, Elsevier,
Vol. 22, No. 6, 2012, pp. 869-877.
5. S. Barman, M. Roy, S. Biswas, and S. Saha, “Prediction of Cancer Cell Using Digital Signal Processing,” International Journal of
Engineering, Vol. 9, No. 3, 2011, pp. 91-95.
6. T. Meng, A. T. Soliman, and M.-L. Shyu et al., “Wavelet analysis in current cancer genome research: a survey,” IEEE/ACM
Transactions on Computational Biology and Bioinformatics, Vol. 10, No. 6, 2013, pp. 1442–1459.

Authors: Ramya Ramaswamy, R. Raja Prabu, V. Gowrisree

Paper Title: Electric field Analysis of Water Electrodes for Noninvasive Pulsed Electric field Applications
Abstract: Electroporation is an effective phenomenon of inactivating viable pathogens present in the liquid
food for pulsed electric field (PEF) applications. It is a technique which depends on applied electric field
strength for causing pores on cell plasma membrane. The various parameters which affect the electroporation
efficacy are, the electric field intensity, pulse width, number of pulses, pulse interval and the electrode. The
electrode provides a contact between the high voltage pulse generator and the liquid food, and it plays an
important role in getting the required inactivation outcome. The electric field distribution varies based on
electrode designs. Parallel plate electrodes are generally used due to the uniform electric field it delivers in the
inactivation area, where high possibility of microbial inactivation will occur. This paper analyses the
effectiveness of round edged parallel plate electrodes immersed in water which provides uniform electric field
distribution in the inactivation area. Analyses have been performed on electric field distribution through four
kinds of materials such as glass, alumina, quartz and plexiglass, which contains these electrodes in the center
filled with sterile water. The electrodes are circular, and edge smoothened and hence the field distribution is also
analyzed on electrode edges. The distance between the electrodes including the surface material is kept at 5 mm.
The diameter of the electrodes are 40 mm and the electric field simulations are implemented in ANSYS
MAXWELL v 15.0. Based on results it is reported that alumina required less peak voltage for generating 20
kV/cm field strength (nominal field required for bacterial inactivation) when compared with other materials.
Also alumina exhibited less reduction of field travelling through it, and resulted in 82% of field application in
the inactivation area which is comparatively higher than other materials. The results indicate that alumina is
highly recommended for future noninvasive pulsed electric field applications.

Keywords: Noninvasive PEF applications, pulsed electric field, Surface materials, Water electrodes.

208. References:
1210-
1. G.V. Barbosa Canovas, M.M.G. Nieto, U.R. Pothakamury, B.G. Swanson, “Fundamentals of high intensity pulsed electric fields,” in 121
Preservation of foods with pulsed electric fields, San Diego, CA: Academic Press, 1999, pp. 1-2. 4
2. J. C. Weaver, "Electroporation of cells and tissues," IEEE Transactions on Plasma Science, vol. 28, no. 1, pp. 24-33, Feb. 2000.
DOI: 10.1109/27.842820.
3. C. Schultheiss, H. Bluhm, H.G. Mayer, M. Kern, T. Michelberger, G. Witte, "Processing of sugar beets with pulsed-electric fields,"
IEEE Transactions on Plasma Science, vol. 30, no. 4, pp. 1547-1551, Aug. 2002. DOI: 10.1109/TPS.2002.804212
4. A. Gad and S. H. Jayaram, “Effect of electric pulse parameters on releasing metallic particles from stainless steel electrodes during PEF
processing of milk,” IEEE Transactions on Industry Applications, vol. 50, no. 2, pp. 1402–1409, Mar./Apr. 2014. DOI:
10.1109/TIA.2013.2278424
5. S. Qin et al., "Pulsed electric field treatment of saccharomyces cerevisiae using different waveforms," in IEEE Transactions on
Dielectrics and Electrical Insulation, vol. 22, no. 4, pp. 1841-1848, August 2015. DOI: 10.1109/TDEI.2015.005152
6. Bai-Lin Qin, Qinghua Zhang, G. V. Barbosa-Canovas, B. G. Swanson and P. D. Pedrow, "Inactivation of microorganisms by pulsed
electric fields of different voltage waveforms," in IEEE Transactions on Dielectrics and Electrical Insulation, vol. 1, no. 6, pp. 1047-
1057, Dec. 1994. DOI: 10.1109/94.368658
7. B. M. Novac et al., "Non-invasive pulsed electric field food processing: Proof-of-principle experiments," 2012 IEEE International
Power Modulator and High Voltage Conference (IPMHVC), San Diego, CA, 2012, pp. 528-531.
8. A. Gad, S. H. Jayaram and M. Pritzker, "Performance of Electrode Materials During Food Processing by Pulsed Electric Fields,"
in IEEE Transactions on Plasma Science, vol. 42, no. 10, pp. 3161-3166, Oct. 2014. DOI: 10.1109/TPS.2014.2312711
9. K. H. Schoenbach, R. P. Joshi, R. H. Stark, F. C. Dobbs and S. J. Beebe, "Bacterial decontamination of liquids with pulsed electric
fields," in IEEE Transactions on Dielectrics and Electrical Insulation, vol. 7, no. 5, pp. 637-645, Oct. 2000. DOI: 10.1109/94.879359
10. Y. Oka, Y. Muramoto, N. Shimizu and S. Ichihara, "Sterilization of liquid by high electric field pulse," 2009 IEEE Conference on
Electrical Insulation and Dielectric Phenomena, Virginia Beach, VA, 2009, pp. 466-469. DOI: 10.1109/CEIDP.2009.5377796
11. G.V. Barbosa Canovas, M.M.G. Nieto, U.R. Pothakamury, B.G. Swanson, “Fundamentals of high intensity pulsed electric fields,” in
Preservation of foods with pulsed electric fields, San Diego, CA: Academic Press, 1999, pp. 7.
12. https://www.ansys.com/en-in/products/electronics/ansys-maxwell
13. J.R. Davis, “Introduction to stainless steels,” in Stainless Steels, OH: ASM International, 1994, pp 10.
14. P.A. Sarafis, A.G. Nassiopoulou, “Dielectric properties of porous silicon for use as a substrate for the on-chip integration of millimeter-
wave devices in the frequency range 140 to 210 GHz,” Nanoscale Research Letters, 2014. DOI: 4022. 10.1186/1556-276X-9-418.
15. Catalogue, “Metals, Alloys, Compounds, Ceramics, Polymers, Composites,” Goodfellow Cambridge Ltd, 1993/94.
16. Graham Brodie, Mohan V. Jacob and Peter Farrell, “Techniques for measuring dielectric properties,” in Microwave and Radio-
Frequency Technologies in Agriculture, Berlin: De Gruyter open Ltd, 2015, pp 73-74.

Authors: Dr. Sumit Gupta, M. Sai Krishna, N. Poojitha chowdary, B. Pavithra reddy, M. Sandeep

Paper Title: Effective Avoidance of Queuing in Super Market using Li-Fi Technology
Abstract: In extensive general stores, clients feel awkward to remain in long line for charging the obtained
items. This will deteriorate at the season of celebration or regular deal. This paper gives an awesome answer for
every one of these issues utilizing Li-Fi innovation. Li-Fi is another rising innovation in pattern which
employments light waves to exchange information. In this paper, we propose a programmed charging framework
which is not just time compelling additionally diminishes human exertion. This framework utilizes Li-Fi
innovation to exchange information rapidly. The free accessible android application is conveyed in versatile
utilizing which we get the item subtle elements and the installment is prepared in the versatile itself. For
security, the items are confirmed in the door area by checking the items in the trolley. The fundamental target of
this paper is to maintain a strategic distance from lines in grocery stores and shopping centers.

Keywords: Li-Fi, Visible light communication, android application, payment.


1215-
209. References: 121
9
1. H. Aida, S. Aoki, J. Nakazawa and H. Tokuda, "Real-time information distribution at a shopping mall using android phones," Wireless
Communications and Mobile Computing Conference (IWCMC), 2011 7th International, Istanbul, 2011, pp. 1923-1928.
2. Rupanagudi, S.R.; Jabeen, F.; Savarni K R, V.R.; Adinarayana, S.; Bharadwaj, V.K.; Karishma, R.; Bhat, V.G., "A novel video
processing based cost effective smart trolley system for supermarkets using FPGA," 2015 International Conference on Communication,
Information & Computing Technology (ICCICT),, vol., no., pp.1-6, 15- 17 Jan. 2015.
3. Amrutha.S, Ansu Mathew, Rajasree.R, Swathy Sugathan, Aravind.S “A visible light communication system for indoor application”,
International Journal of Engineering and Innovative Technology. 2014 Vol 3 pp.40-42.
4. Mr.P. Chandrasekar, Ms.T. Sangeetha “Smart Shopping Cart with Automatic Billing System through RFID and ZigBee” in
Information Communication and Embedded Systems (ICICES), 2014 International - 27-28 Feb. 2014.
5. N. D. Lane, E. Miluzzo, H. Lu, D. Peebles, T. Choudhury, and A. T. Campbell, “A survey of mobile phone sensing,” Commun. Mag.,
vol. 48, no. 9, pp. 140–150, Sep. 2010.
6. K. K. Rachuri and M. E. Musolesi, “Emotionsense: A mobile phones based adaptive platform for experimental social psychology
research,” in Proc. 12th ACM Int. Conf. Ubiquitous Comput., 2010, pp. 281–290.
7. E. C. E. Larson, “Accurate and privacy preserving cough sensing using a low-cost microphone,” in Proc. 13th Int. Conf. Ubiquitous
Comput., 2011, pp. 375–384.
8. Y. Jiang and K. E. Li, “Maqs: A mobile sensing system for indoor air quality,” in Proc. Int. Conf. Ubiquitous Comput., 2011, pp. 493–
494.
9. J. Lester, T. Choudhury, and G. Borriello, “A practical approach to recognizing physical activities,” in Pervasive Computing. Berlin,
Germany: Springer, 2006, vol. 3968, pp. 1–16.
10. K. Lewin and D. Cartwright, Field Theory in Social Science: Selected Theoretical Papers. London: U.K.: Tavistock, 1952.

Authors: S. Selvakani, K. Vasumathi, M. Harikaran

Paper Title: Web Based Online Crime Reporting System using Asp.Net
Abstract: Crime is a piece of human exercises and should be overseen. No human culture has ever been
absolutely free of degenerates and it is impossible that society will ever be. The more populated and complex, a
general public turns into the more extensive the scope of solitary directs that must be constrained by the
legislature through the military and different organizations particularly the Police Power. At long last, a model
crime reporting system was structured that depends on four detailing shapes: a grievance or dispatch revealing
structure, a crime occasion report structure, follow-up examination report structure, and a capture report
structure. The framework comprises of three useful modules: an information catch module, a report the board
and control module, and an information usage module. Future work on crime revealing framework can be
custom-made towards availability (portable rendition), mindfulness and enhancement for the utilization.

Keywords: Crime reporting, incident-based, victims, criminals.


210.
1220-
References:
122
1. World Bank’s Website, Definition of E-Government; http://www.web.worldbank.org › ... › Information & Communication E- 4
Government
2. Harlow (1985), Reporting Crimes to the Police: Bureau of Justice Statistics Special Report NCJ-99432, US Government Printing
Office, Washington DC.
3. Boba, R. (2005). Crime Analysis and Crime Mapping
4. Skogan (1984), “Reporting crimes to the police: The status of world research”, Journal of Research in Crime and Delinquency, vol. 21,
pp. 113-37.
5. Robert D. Crutchfield, George S. Bridges, and Susan R. Pitchford, “Analytical and Aggregation Biases in Analyses of Imprisonment:
Reconciling Discrepancies in Studies of Racial Disparity,”
6. Toshinobu Yasuhira, “Fundamental Upgrade of the Internal Network System within the National Police Agency of Japan”, 43rd
Annual 2009 International Carnahan Conference on Security Technology, 2009.pp.100-106
7. Lyon (2005), “Global Positioning System” Location Tracker
8. The Nigeria Dailies, (2009), “The Historical Background of Nigerian Police”
9. Allen (2002), “Meaning of Crimes”, Crime Management
10. Black (1984), “Crime as social control”, in Toward a General Theory of Social Control, vol. 2, Selected Problems, ed.

Authors: Amaresh. C, Anand Jatti

Paper Title: An Evaluation of Current Status of Renewable Energy Sources in India

211. Abstract: Proceedings with advances in semiconductor innovation, combined with an expanding worry for
vitality effectiveness, have prompted an industry-wide move in center towards particular structures that 1225-
influence parallelism so as to meet execution objectives. Network on-Chip (NoCs) are generally viewed as a 123
promising methodology for tending to the correspondence issues related to chip multi-processors for future 3
applications, even with further increments in incorporation thickness. In the present work, is research the usage
perspectives and configuration exchange offs with regards to switches for NoC solicitations. Specifically, our
emphasis is on creating effective control rationale for superior switch usage. Utilizing parameterized RTL usage,
the main assess delegate Virtual Channel (VC) and switch allocator designs as far as coordinating quality,
postponement, zone and power. The proposed work is additionally researched the affectability of these
properties to key system parameters, just as the effect of distribution on by and large system execution. In light
of the consequences of this examination, the propose microarchitectural changes that improve postponement,
region and vitality effectiveness: Sparse VC designation diminishes the multifaceted nature of VC allocators by
abusing confinements on advances between bundle classes. Two improved plans for theoretical switch
assignment improve deferral and cost while keeping up the basic inactivity upgrades at low to medium burden;
this is accomplished by bringing about a negligible misfortune in throughput close to the immersion point. It
additionally explore a commonsense execution of joined VC and switch distribution and its effect on system cost
and execution. The second piece of the proposed work centers on switch input cradle the executives. Investigate
the plan exchange offs engaged with picking a cushion association, and we assess reasonable static and dynamic
cradle the executives plans and their effect on system execution and cost. These works moreover demonstrate
that cushion sharing can prompt extreme execution corruption within the sight of clog. An epic plan that
improves the use of powerfully overseen switch input cushions by shifting the firmness of the stream control
criticism circle dependent on downstream clog. By hindering inefficient cushion inhabitance, this mitigates
undesired obstruction impacts between remaining tasks at hand with varying execution attributes. Finally the
4x4 NoC design is shown the better results in terms of Area, delay, speed, latency and throughput as compared
to counterpart work.

Keywords: NoC, Topology, Switching, Routing, Round Robin and FPGA.

References:

1. P. Guerrier and A. Greiner, "A nonexclusive design for on-chip parcel exchanged interconnections," in DATE, Mar. 2000, pp. 250–
256.
2. W. J. Falter and B. Towles, "Course bundles, not wires: on-chip interconnection systems," in Proc.Des. Autom. Conf., 2001, pp. 684–
689.
3. L. Benini and G. D. Micheli, "Systems on chips: another soc worldview," IEEE Comput., vol. 35, no. 1, pp. 70– 78, Jan. 2002.
4. Salminen ET AL., "Study Of Network-On-Chip Proposals", White Paper, ©OCP-IP, and March 2008.
5. F. G. Moraes, N. Calazans, A. Mello, L. Mller, and L. Ost, "HERMES: A foundation for low zone overhead bundle exchanging
systems on chip," Integration. VLSI J., vol. 38, no. 1, pp. 69– 93, 2004
6. Marta Ortín-Obón ,DaríoSuárez-Gracia,"Analysis of system on-chip topologies for cost-proficient chip
multiprocessors",microprocessors and Microsystems,5 feb 2016,pp:1-13.
7. D. Wiklund and D. Liu, SoCBUS: exchanged system on chip for hard constant inserted frameworks. IEEE Computer Society, 2003,
p8-16.
8. K. Goossens, J. Dielissen, and A. Radulescu, "Æthereal arrange on chip: Concepts, models, and usage," IEEE Des. Test Comput., vol.
22, no. 5, pp. 414– 421, May 2005
9. C. Bobda and A. Ahmadinia, "Dynamic interconnection of reconfigurable modules on reconfigurable gadgets," IEEE Des. Test
Comput., vol. 22, no. 5, pp. 443– 451, May 2005.
10. L. Benini and D. Bertozzi, "Xpipes: A system on-chip design for gigascale frameworks on-chip," IEEE Circuits Syst. Mag., vol. 4, no.
2, pp. 18– 31, Sep. 2005.
11. K. Lusala and J.- D. Legat, "A sdm-tdm put together circuit-exchanged switch for with respect to chip systems," in Proc.
Reconfigurable Commun.- driven Systems-on-Chip sixth Int. Workshop, Jun. 2011, pp. 1– 8.
12. Jara-Berrocal and A. Gordon-Ross, "SCORES: An adaptable and parametric streams-based correspondence design for secluded
reconfigurable frameworks," in Proc. Des., Autom. Test Eur. Conf., 2009, pp. 268– 273.
13. J. Lin and X. Lin, "Express circuit exchanging: Improving the execution of bufferless systems
14. on-chip," in Proc. IEEE First Int. Conf. System Comput., Nov. 2010, pp. 162– 166.
15. WeiweiJiang ,KshitijBhardwaj ,"A Lightweight Early Arbitration Method for Low-Latency Asynchronous 2D-Mesh NoC's", ACM
978-1-4503-3520-1/15/06,2015.
16. RiteshRampal, RajeevanChandel, Philemon Daniel,"A Network-on-Chip Router for Deadlock-Free Multicast Mesh Routing," 978-1-
4799-9985-9/15. ©2015 IEEE
17. FatemehNasiri , Hamid Sarbazi-azad, Ahmad Khademzadeh," Reconfigurable multicast steering for Networks on Chip",
Microprocessors and Microsystems 42 (2016) 180– 189.
18. Akram Ben Ahmed, Abderazek Ben Abdallah," Adaptive Fault-Tolerant Architecture and Routing Algorithm for Reliable Many-Core
3D-NoC frameworks", J. Parallel Distrib. Comput. (2016).
19. PooriaM.Yaghini, AshkanEghbal, Nader Bagherzadeh," On the Design of Hybrid Routing Mechanism for Mesh-put together Network-
with respect to Chip", INTEGRATION, the VLSI diary, S0167-9260(14)00092-3.
20. Marcus Eggenberger, Manuel Strobel, Martin Radetzki,"Globally Asynchronous LocallySynchronous Simulation of NoCs on Many-
Core Architectures", 2016 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing.
21. R. Akbar , F. Safaei ,"An epic power proficient versatile RED-based stream control instrument for systems on-chip", 0045-7906/©
2015 Elsevier.
22. N. Teimouri, M. Modarressi, and H. Sarbazi-Azad, "Power and execution effective fractional circuits in bundle exchanged systems on-
chip," in Proc. IEEE 21st Euromicro Int. Conf. Parallel,Distrib. Netw. Procedure, Feb. 2013, pp. 509– 513.
23. Rohit Kumar and Ann Gordon-Ross, "Macintoshes: A Highly Customizable Low-Latency Communication Architecture", IEEE
Transactions on Parallel and Distributed Systems, VOL. 27,NO. 1, January 2016, PP-237-249.
24. J. Kim et al., "A low inactivity switch supporting adaptively for on-chip interconnects," in DAC, Jun. 2005, pp. 559– 564
25. RimpyBishnoi , Vijay Laxmi , Manoj Singh Gaur , Mark Zwolinski," Resilient directing execution in 2D work NoC", Microelectronics
Reliability 56 (2016) 189– 201.
26. Edson I. Moreno,cesar.a.m.marcon,"arbitration and steering sway on NoC design",978-1-4577-0660-8/11 ©2011 IEEE.
27. H.- C. Chi and J.- H. Chen, "Structure and usage of a directing switch for on-chip interconnection systems," in AP-ASIC, Aug. 2004,
pp. 392– 395.
28. A. I. A. Jabbar, Noor .Th. AL Malah," Design and Implementation of a Network on Chip UsingFPGA", Al-Rafidain Engineering
Vol.21 No. 1 February 2013, pp: 91-100.
29. Lu Wang, Sheng Ma," A High Performance Reliable NoC Router," 978-1-4673-9569-4/16-©2016 IEEE.
30. ParthaPratimPande , Andre' Ivanov "Execution assessment and configuration exchange offs for system on-chip interconnect
structures," IEEE Trans. PCs, vol. 54, no. 8, pp. 1025– 1040, Aug. 2005.
31. J. Henkel, W. Wolf, and S. Chakradhar, "On-chip arranges: a versatile, correspondence driven implanted framework structure
worldview," in VLSI, Jan. 2004, pp. 845– 851.
32. LudovicDevaux, SebastienPillement, Daniel Chillet, Didier Demigny. "R2NoC: powerfully Reconfigurable Routers for adaptable
Networks on Chip". 2010 International Conference on Reconfigurable Computing.

Authors: Sunil Kumar, Manish Kumar Rawat, Sanjeev Gupta

Paper Title: An Evaluation of Current Status of Renewable Energy Sources in India


Abstract: Many people in rural society of India does not have access to natural energy resources like LPG ,
electricity as there is no facilitation of grid erection. Hence it becomes imperative for country like India to go
for renewable energy resources as alternative to conventional energy resources. This paper evaluations the
potential of different sources of renewable energy in India. It also highlights the trends in the growth of
renewable energy sector, although at the same time shows that there is need of a hybrid renewable energy model
for rural electrification in India. Paper also shows the scope in using the agriculture waste as bio fuel which
burned otherwise and prompt health hazards besides environmental pollution, also describing many
technologies which are in the demonstration stage like Tidal, OTEC, Solar thermal power plants. Many
constraints put development in the field of solar and wind sector, on hold like availability of solar rays
throughout the year . The main aim of the paper is to evaluation all possible options in renewable energy sector
so that large segment of rural population can have access to electricity and to meet their basic energy needs.

Keywords: Renewable energy, Tidal energy, hybrid renewable energy, bio fuels etc.

References:

1. Azadian F, Radzi MAM. A general outlook toward building integrated photo voltaic systems and its implementation barriers: a
evaluation. Renew Sustain Energy Rev 2013; 22:527–38. [11]
2. A Sustainable Development Frame work for India's Climate Policy, interim report, Center of Science Technology and Policy; January,
2015.
3. CEA, load Generation Balance report 2014 – 15.
4. Energy Statistics 2014, Central statistics office. New Delhi, India: Ministry of Statistics and Programme Implementation; 2014 [6]
5. Garg P. Energy Scenario and Vision 2020 in India. J Sustain Energy Environment 2012; 3:7–17. [3]
6. http://www.mnre.gov.in/; Ministry of new and renewable energy, 2015 [accessed on 29.6.2015].
7. IEA. Renewable information. Paris: International Energy Agency; 2013[15]
8. Indian Electricity Scenario 2015, Ministry of Power, Govt. of India, Available <http://www.powermin.nic.in> [accessed 28.07.15].
9. Indian petroleum and natural gas statistics 2013–14.Government of India, Ministry of Petroleum and Natural Gas Economics and
Statistics Division, New Delhi. [21
10. Indian Renewable Energy and Energy Efficiency Database (IREED). Ministry of New and Renewable Energy, Government of India;
Accessed on October 06, 2015.
11. India Solar Handbook, Bridge to India, April 2016
12. Jain SV, Patel RN. Inspections on pump running in turbine mode: are view of the state of the art. Renew Sustain Energy Rev 2014;
30:841-68. [24]
212. 13. Kannan Govindan, Madan Shankar (2016),"Evaluating the essential barrier to off-shore wind energy an Indian perspective", 1234-
International Journal of Energy Sector Management, Vol. 10 Iss 2 pp. 266 -282.
14. Kumar A, Kumar K, Kaushik N, Sharma S, Mishra S. Renewable energy in India: current status and future potentials. Renew Sustain 123
Energy Rev 2010; 14: 2434–42. [13] 9
15. Kumar D, Katoch SS. Sustainability indicators for run of the river (RoR) hydro power projects in hydro rich regions of India. Renew
Sustain Energy Rev 2014; 35:101-8. [25]
16. Ministry of New & Renewable Energy, GOI. Jawahar Lal Nehru National Solar Mission Phase II-Policy Document; December 2012.
[30]
17. Mirza UK, Maroto – Valer MM, Ahmad N. Status and outlook of solar energy use in Pakistan. Renew Sustain Energy Rev 2003; 7:
501-14. [4]
18. Muneer T, Asif M, Munawwar S. Sustainable production of solar electricity with particular reference to the Indian economy. Renew
Sustain Energy Rev 2005; 9(5): 444.
19. Natural gas as a pillar of growth: domestic production and import vulnerabilities, Council on Energy, Environment and Water, New
Delhi; India, 2014: <http://ceew.in/pdf/CEEW-Natural-Gas % 28 India %29-Fact-Sheet-6June14.pdf>.
20. NSSO—Energy Statistics 2013, Central Statistics Office, Ministry Of Statistics And Programme Implementation (MOSPI),
Government Of India, New Delhi, www.mopsi.nic.in,
21. Obernberger I, Thek G. Physical characterization and chemical composition of densified biomass fuels with regard to their combustion
behavior. Biomass Bio energy 2004; 27(6):653–69.
22. Owusu & Asumadu-Sarkodie, Cogent Engineering (2016), 3: 1167990
23. Panwar, N. L., Kaushik, S. C., & Kothari, S. (2011). Role of renewable energy sources in environmental protection: A evaluation.
Renewable and Sustainable Energy Evaluations, 15(3), 1513–1524.
24. Pegels A. Renewable energy in South Africa: Potentials, barriers and options for support. Energy Policy 2010; 38: 4945-54. [16]
25. Renewable energy sources and climate change mitigation: Special report of the intergovernmental panel on climate change by
O Edenhofer, R Pichs-Madruga, Y Sokona, K Seyboth (2011).
26. Sahoo SK. Renewable and sustainable energy evaluations solar photo voltaic energy progress in India: are view. Renew Sustain Energy
Rev 2016; 59: 927-39. [1]
27. Sanjeev H. Kulkarni, Bhairu J. Jirage & T.R. Anil (2017) Alternative Energy Options for India -A Multi-criteria Decision exploration
to Rank Energy Alternatives using Analytic Hierarchy Process and Fuzzy Logic with an Emphasis to Distributed Generation,
Distributed Generation & Alternative Energy Journal, 32:2, 29-55
28. Sarkar P, Sharma B, Malik U. Energy generation from grey water in high raised buildings: the case of India. Renew Energy 2014;
69:284-9. [23]
29. Timilsina GR, Kurdgelashvili L, Narbel PA. A evaluation of solar energy: markets, economics and policies, vol. 2011, World Bank
Policy Research Working Paper Series; 2011 [17]
30. U.S Department of Energy. Open data catalog; 2016. Available from:<http://en.openei.org/doe-opendata/dataset/solar-resources-by-
class-and-country/resource/3e72f32a-7de1-4e5d-a25a 76928769625f>. [Last accessed 24 September 2016].
31. Vassilev SV, Baxter D, Andersen LK, Vassileva CG, Morgan TJ. An outline of the organic and inorganic phase composition of
biomass. Fuel 2012; 94:1-33.
32. Veeraboina P, Ratnam GY. Exploration of the opportunities and challenges of solar water heating system (SWHS) in India: estimates
from the energy audit & evaluation. Renew Sustain Energy Rev 2012; 16:668–76. [12]
33. Wee H-M, Yang W-H, Chou C-W, Padilan MV. Renewable energy supply chains, performance, application barriers, and strategies for
further development, Renew Sustain Energy Rev 2012; 16:54, 51-65.
Authors: L.Iu. Iuferev, D.V. Ermolenko, O.A. Roshchin

Paper Title: Electrical Energy Transmission Systems at Elevated Frequency


Abstract: The article presents information about the composition of the equipment of resonant power
transmission systems. The resonant systems of electrical energy transmission by single-wire cable or overhead
lines at elevated frequency include frequency conversion devices, power transmission lines, and devices for the
reverse transformation of electrical energy to the voltage required by the consumer. In contrast to traditional
systems of electrical power transmission, resonant systems are being operated on an elevated frequency of 5-15
kHz, a power transmission line voltage is 1-10 kV. In this case resonant transformers are used. The frequency of
the power transmission system is set by the resonant transmitting transformer; the receiving transformer is a
wideband step-down one.The main components of the resonant transmitting transformer are a power resonant
circuit and a step-up/step-down winding. The maximum output power of the converter depends on the voltage
supplied to the circuit, circuit voltage, circuit capacitance, frequency, and other parameters. One can change the
transmitted power by changing the transmission frequency, for example, for lighting systems.Due to the fact that
resonant power transmission systems operating at elevated frequency are less demanding on the grounding
quality, they are more efficient compared to single wire ground return line operating at a constant current and an
alternating current of commercial frequency.
213.
Keywords: resonant single-wire system, electrical power transmission, frequency converter, resonant circuit. 1240-
124
References: 3
1. L.Yu. Yuferev, D.S. Strebkov, and O.A. Roshchin, “Eksperimental'nye modeli rezonansnyh sistem elektricheskoj energii”
[“Experimental models of resonant electrical energy systems”]. Moscow: All-Russian Institute of Electrification of Agriculture, 2010.
2. L.Yu. Yuferev, “Povyshenie effektivnosti rezonansnyh sistem osveshcheniya i oblucheniya” [“Improving the efficiency of the resonant
illumination and radiation systems”]. Bulletin of All-Russian Institute of Electrification of Agriculture, vol. 3(12), 2013, pp. 55-58.
3. L.Yu. Yuferev, and D.S. Strebkov, “Sposob i ustrojstvo peredachi elektricheskoj energii (varianty)” [“Method and device for electric
energy transmission (options)”]. Patent of the Russian Federation 2, 423 772 MPK H02J 17/00. Published: 10.07.2011 Bulletin 19,
2011.
4. Wikipedia. “Single-wire earth return”. [online]. Available: http://en.wikipedia.org/wiki/Single-wire_earth_return
5. S.G. Kalashnikov, Elektrichestvo, “Zazemlenie v liniyah svyazi” [“Electricity, grounding in communication lines”]. Moscow:
Fizmatlit, 2004.
6. D.A. Alexandrov, and L.Yu. Yuferev, “Vozmozhnost' primeneniya rezonansnoj sistemy elektropitaniya dlya katodnoj zashchity”
[“Applicability of resonant power supply system for cathodic protection”]. Innovations in Agriculture, vol. 2(2), 2012, pp. 46-53.
7. L.Yu. Yuferev, O.A. Roshchin, and D.A. Alexandrov, “Osnovnye problemy i ih ustranenie pri proektirovanii ROS” [“Main problems
and their elimination when designing resonant single-wire system”]. Innovation in Agriculture, vol. 1(3), 2013, pp. 18-24.
8. D.S. Strebkov, L.Yu. Yuferev, and O.A. Roshchin, “Odnoprovodnikovye sistemy elektricheskogo snabzheniya (osveshcheniya).
[“Single-wire electrical supply (lighting) systems”]. Specializirovannaya vystavka «Izdeliya i tekhnologii dvojnogo naznacheniya»”
[Specialized exhibition "Dual-use products and technologies. Diversification of the defense industry"]. Collection of scientific papers
and engineering developments. Moscow, 2008, pp. 358-362.
Authors: D. Anand Joseph Daniel, M. Janaki Meena

Paper Title: A Systematic Learning on Variety of Recommender Systems for Online Commodities
Abstract: In a sophisticated high-end product market, all firms often come up with a vast number of goods to
partake the market shares. Owing to the availability of enough information of various products that enters the
market or due to lack of right information, customers are prone to the state of dilemma in comparing and
choosing the most appropriate ones. In most of the cases, the product specifications are mentioned, still whether
these features suit the customers need is a concern. Online reviews tend to benefit the consumers and the goods
developers. Here again, finding out the more supportive reviews become a challenge. Considering these factors,
this article intends to be particular in reviewing the existing evaluation strategies and recommender systems that
have grown progressively favorable in present era and are employed widely for casual to commercial items.

Keywords: High-end products, Online reviews, Customer needs, Evaluation strategies, Recommender system.

References:
214.
1244-
1. Amin Shahmohammadi, EhsanKhadangi and AlirezaBagheri, Presenting New Collaborative Link Prediction Methods for Activity
Recommendation in Facebook Neurocomputing, Vol. 210, 2016, pp. 217–226, http://dx.doi.org/10.1016/j.neucom.2016.06.024.
125
2. Nikos Tsirakis, VasilisPoulopoulos, PanagiotisTsantilas and IraklisVarlamis, Large Scale Opinion Mining for Social, News and Blog 2
Data, Journal of Systems and Software, Vol. 127, 2017, pp. 237–248, http://dx.doi.org/10.1016/j.jss.2016.06.012.
3. Chia-Lin Hsu, Li-Chen Yu and Kuo-Chien Chang, Exploring the Effects of Online Customer Reviews, Regulatory Focus, and Product
Type on Purchase Intention: Perceived Justice as a Moderator, Computers in Human Behavior, Vol. 69, 2017, pp. 335–346,
http://dx.doi.org/10.1016/j.chb.2016.12.056.
4. NecmiyeGenc-Nayebi and Alain Abran, A Systematic Literature Review: Opinion Mining Studies from Mobile App Store User
Reviews, Journal of Systems and Software, Vol. 125, 2017, pp.207–219, http://dx.doi.org/10.1016/j.jss.2016.11.027.
5. M.Thangamani and V.Ravindra Krishna Chandar, Adverse Drug Reactions using Data Mining Technique, Journal of Excellence in
Computer Science and Engineering, Vol. 1, No. 1, 2015, pp.11- 14, http://dx.doi.org/10.18831/djcse.in/2015011002.
6. Ying Liu, Jian Jin, Ping Ji, Jenny A.Harding and Richard Y.K.Fung, Identifying Helpful Online Reviews: A Product Designer’s
Perspective, Computer-Aided Design, Vol. 45, No. 2, 2013, pp. 180–194, http://dx.doi.org/10.1016/j.cad.2012.07.008.
7. CharuC.Aggarwal, Recommender Systems, Springer International Publishing, Switzerland, 2016.
8. Shiliang Sun, Chen Luo and Junyu Chen, A Review of Natural Language Processing Techniques for Opinion Mining Systems,
Information Fusion, Vol. 36, 2017, pp. 10–25, http://dx.doi.org/10.1016/j.inffus.2016.10.004.
9. JyotiS.Deshmukh and Amiya Kumar Tripathy, Entropy based Classifier for Cross-Domain Opinion Mining, Applied Computing and
Informatics, 2017, http://dx.doi.org/10.1016/j.aci.2017.03.001.
10. Zheng Yan, Xuyang Jing and WitoldPedrycz, Fusing and Mining Opinions for Reputation Generation, Information Fusion, Vol. 36,
2017, pp. 172–184, http://dx.doi.org/10.1016/j.inffus.2016.11.011.
11. Carolin Kaiser, Sabine Schlick and FreimutBodendorf, Warning System for Online Market Research – Identifying Critical Situations in
Online Opinion Formation, Knowledge-Based Systems, Vol. 24, No. 6, 2011, pp. 824–836,
http://dx.doi.org/10.1016/j.knosys.2011.03.004.
12. Y.Vidya and B.Shemimol, Secured Friending in Proximity based Mobile Social Network, Journal of Excellence in Computer Science
and Engineering, Vol. 1, No. 2, 2015, pp. 1-10, https://dx.doi.org/10.18831/djcse.in/2015021001.
13. LinglingZhanga, CaifengHua, Quan Chena, Yibing Chena and Yong Shi, Domain Knowledge Based Personalized Recommendation
Model and its Application in Cross-selling, International Conference on Computational Science, Omaha, 2012, 1314-1323.
14. DietmarJannach, Markus Zanker, Alexander Felfernig and Gerhard Friedrich, Recommender Systems: An Introduction, Cambridge
University Press, USA, 2011.
15. Olga C.Santos and Jesus G.Boticario, Modeling Recommendations for the Educational Domain, 1st Workshop on Recommender
Systems for Technology Enhanced Learning, Vol. 1, No. 2, 2010, pp. 2793-2800, https://dx.doi.org/10.1016/j.procs.2010.08.004.
16. J.Song, H.Zhan, J.Yu, Qi Zhang and Y.Wu, Enterprise Knowledge Recommendation Approach Based on Context-aware of Time-
sequence Relationship, Procedia Computer Science, Vol. 107, 2017, pp. 285–290, http://dx.doi.org/10.1016/j.procs.2017.03.104.
17. Haoyi Wang, XiaohuiGuo,Yushun Fan and Jing Bi, Extended Access Control and Recommendation Methods for Enterprise
Knowledge Management System, IERI Procedia, Vol. 10, 2014, pp. 224-230, http://dx.doi.org/10.1016/j.ieri.2014.09.081.
18. Jose Aguilar, PriscilaV.Diaz and Guido Riofrio, A General Framework for Intelligent Recommender Systems, Applied Computing and
Informatics, 2016, http://dx.doi.org/10.1016/j.aci.2016.08.002.
19. Dongsheng Li, Qin Lv, Xing Xie, Li Shang, Huanhuan Xia, Tun Lu and NingGu, Interest-Based Real-Time Content Recommendation
in Online Social Communities, Knowledge-Based Systems, Vol. 28, 2012, pp. 1–12, http://dx.doi.org/10.1016/j.knosys.2011.09.019.
20. F.O.Isinkaye, Y.O.Folajimi and B.A.Ojokoh, Recommendation Systems: Principles, Methods and Evaluation, Egyptian Informatics
Journal, Vol. 16, No. 3, 2015, pp. 261–273, http://dx.doi.org/10.1016/j.eij.2015.06.005.
21. Hongyan Liu, Jun He, Tingting Wang, Wenting Song and Xiaoyang Du, Combining User Preferences and User Opinions for Accurate
Recommendation, Electronic Commerce Research and Applications, Vol. 12, No. 1, 2013, pp. 14–23,
http://dx.doi.org/10.1016/j.elerap.2012.05.002.
22. Jia Chen and Gang Kou, How Online Review Valance Affect on Consumer Opinion Evaluation?,Procedia Computer Science, Vol.
91, 2016, pp. 635-641, http://dx.doi.org/10.1016/j.procs.2016.07.159.
23. W.Xin Zhao, Sui Li Y.HeL.W.Wen and Xiaoming Li, Exploring Demographic Information in Social Media for Product
Recommendation, Knowledge and Information Systems, 2016, Vol. 49, No. 1, pp. 61–89, http://dx.doi.org/10.1007/s10115-015-0897-
5.
24. A.Mitra, S.Ghosh, P.Basuchowdhuri, M.K.Shekhawat and S.K.Saha, Recommendation System based on Product Purchase Analysis,
Innovations in Systems and Software Engineering, Vol. 12, No. 3, 2016, pp. 177–192, http://dx.doi.org/10.1007/s11334-016-0274-x.
25. AnisioLacerda, Multi-Objective Ranked Bandits for Recommender Systems, Neurocomputing, 2017,
http://dx.doi.org/10.1016/j.neucom.2016.12.076.
26. Pei Wu and Zi-Ke Zhang, Enhancing Personalized Recommendations on Weighted Social Tagging Networks, Physics Procedia, Vol.
3, No. 5, 2010, pp. 1877-1885, http://dx.doi.org/10.1016/j.phpro.2010.07.032.
27. C.Rana and S.K.Jain, An Evolutionary Clustering Algorithm based on Temporal Features for Dynamic Recommender Systems, Swarm
and Evolutionary Computation, Vol. 14, 2014, pp. 21–30, http://dx.doi.org/10.1016/j.swevo.2013.08.003.
28. 28. Pavlos Kefalas and YannisManolopoulos, A Time-Aware Spatio-Textual Recommender System, Expert Systems with
Applications, Vol. 78, 2017, pp. 396–406, http://dx.doi.org/10.1016/j.eswa.2017.01.060.
29. Laizhong Cui, PengOu, Xianghua Fu, Zhenkun Wen and Nan Lu, A Novel Multi-Objective Evolutionary Algorithm for
Recommendation Systems, Journal of Parallel and Distributed Computing, Vol. 103, 2017, pp. 53–63,
http://dx.doi.org/10.1016/j.jpdc.2016.10.014.
30. EdjalmaQ.Silva, CelsoG.Junior, LuizM.L.Pascoal and ThiersonC.Rosa, An Evolutionary Approach for Combining Results of
Recommender Systems Techniques based on Collaborative Filtering, Expert Systems with Applications, Vol. 53, 2016, pp.204–218,
http://dx.doi.org/10.1016/j.eswa.2015.12.050.
31. Rahul Katarya and Om PrakashVerma, An Effective Collaborative Movie Recommender System with Cuckoo Search, Egyptian
Informatics Journal, 2016, http://dx.doi.org/10.1016/j.eij.2016.10.002.
32. John K.Tarus, ZhendongNiu and AbdallahYousif, A Hybrid Knowledge-Based Recommender System for E-Learning Based on
Ontology and Sequential Pattern Mining, Future Generation Computer Systems, Vol. 72, 2017, pp. 37–48,
http://dx.doi.org/10.1016/j.future.2017.02.049.
33. N.R.Kermany and S.H.Alizadeh, A Hybrid Multi-Criteria Recommender System using Ontology and Neuro-Fuzzy Techniques,
Electronic Commerce Research and Applications, Vol. 21, 2017, pp. 50–64, http://dx.doi.org/10.1016/j.elerap.2016.12.005.
34. Ahmad A.Kardan and MahnazEbrahimi, A Novel Approach to Hybrid Recommendation Systems based on Association Rules Mining
for Content Recommendation in Asynchronous Discussion Groups, Information Sciences, Vol. 219, 2013, pp. 93–110,
http://dx.doi.org/10.1016/j.ins.2012.07.011.
35. Y.Li, Dong Wang, H.He, L.Jiao and Yu Xue, Mining Intrinsic Information by Matrix Factorization-Based Approaches for
Collaborative Filtering in Recommender Systems, Neurocomputing, 2017, http://dx.doi.org/10.1016/j.neucom.2017.03.002.
36. Jonathan Gemmell, Thomas Schimoler, BamshadMobasher and Robin Burke, Resource Recommendation in Social Annotation
Systems: A linear-Weighted Hybrid Approach, Journal of Computer and System Sciences, Vol. 78, No. 4, 2012, pp. 1160-1174,
http://dx.doi.org/10.1016/j.jcss.2011.10.006.

Authors: Almas Begum, Cyrilraj

Paper Title: Architecture Evaluation of Mobile Application: Whatsapp


Abstract: Software become an unavoidable in every once life. Quality of the software is an import aspect in
the software development life cycle. Quality for a software is represented in terms of functional and non-
functional requirement. Software architecture is used to represent the using set of components and is
connectivity as a relationship between these components. To assure the development process meet the
requirement given by the user, the Software Evaluation is used. Early detection of error protect the software
215. development producing the defect software. ATAM is the one of the method used to detect the risk, non-risk,
1253-
scenarios and tradeoff in the earlier stage of development life cycle. Here in this paper security scenarios for
125
mobile application has been elicited and compared with the scenarios extracted from the whatsapp application.
6
Comparison shows few scenarios need to added with existing scenarios in order to improve / ensure full security
for the metadata.

Keywords: ATAM, Software Evaluation, Whatsapp;

References:
1. Nidhi Rastogi and James Hendler, “WhatsApp security and role of metadata in preserving privacy”
2. “WhatsApp Encryption Overview” Technical white paper
3. Umesh Gupta, “An Overview on the Architecture of Whatsapp”, International Journal of Computer Science & Engineering Technology
(IJCSET), Vol. 7 No. 07 Jul 2016, pp 335-337
4. Ronan Fitzpatrick, “Software Quality: Definitions and Strategic Issues”, Staffordshire University, School of Computing Report, April
1996.
5. Almas Begum and V. Cyrilraj, “Architectural Analysis for Improving Security using LBS with ATAM” IJAER, ISSN 0973-4562
Volume 10, Number 8 (2015) pp. 19967-19975.
6. Rich Hilliard, “Using the UML for Architectural Description” Lecture Notes in Computer Science, volume 1723, Springer
7. ios security guide – “https://www.apple.com/business/docs/iOS_Security_Guide.pdf”
8. https://msdn.microsoft.com/en-in/library/ee658108.aspx

Authors: Yedavalli Venkata RaghavaRao, Kuthadi Venu Madhav, Selvaraj Rajalakshmi

Paper Title: Enhanced Deep Learning with featured transfer learning in Identifying Disguised Faces
Abstract: Paper The objective of face recognition is, given an image of a human face identify the class to
which the face belongs to. Face classification is one of the useful task and can be used as a base for many real-
time applications like authentication, tracking, fraud detection etc. Given a photo of a person, we humans can
easily identify who the person is without any effort. But manual systems are biased and involves lot of effort and
expensive. Automatic face recognition has been an important research topic due to its importance in real-time
applications. The recent advance in GPU has taken many applications like image classification, hand written
digit recognition and object recognition to the next level. According to the literature Deep CNN (Convolution
neural network) features can effectively represent the image. In this paper we propose to use deep CNN based
features for face recognition task. In this work we also investigate the effectiveness of different Deep CNN
models for the task of face recognition. Initially facial features are extracted from pretrained CNN model like
VGG16, VGG19, ResNet50 and Inception V3. Then a deep Neural network is used for the classification task. To
show the effectiveness of the proposed model, ORL dataset is used for our experimental studies. Based on the
experimental results we claim that deep CNN based features give better performance than existing hand crafted
features. We also observe that the among all the pretrained CNN models we used, ResNet scores highest
performance.

Keywords: pre-training, Deep CNN features, CNN, DNN, transfer learning.

References:

1. Sukhija, Pratibha, Sunny Behal, and Pritpal Sing, "Face recognition system using genetic algorithm", Procedia Computer Science 85
(2016), 410-417.
2. Zhao, Wenyi, et al, "Face recognition: A literature survey", ACM computing surveys (CSUR) 35.4 (2003): 399-458.
3. Perlibakas, Vytautas, "Distance measures for PCA-based face recognition", Pattern recognition letters 25.6 (2004): 711-724.
216. 4. N. Cristiana, T. Shawe, “An Introduction to Support Vector Machine, Cambridge University Press”, 2000.
5. Pantic, Maja, and Leon JM Rothkrantz. "Toward an affect-sensitive multimodal human-computer interaction" Proceedings of the IEEE 1257-
91.9 (2003): 1370-1390. 126
6. Yang, Jian, et al. "Two-dimensional PCA: a new approach to appearance-based face representation and recognition." IEEE 0
transactions on pattern analysis and machine intelligence(2004).
7. Guo, Guodong, Stan Z. Li, and Kap Luk Chan. "Support vector machines for face recognition." Image and Vision computing19.9-10
(2001): 631-638.
8. Xiong, Huilin, M. N. S. Swamy, and M. Omair Ahmad. "Two-dimensional FLD for face recognition." Pattern Recognition38.7
(2005): 1121-1124.
9. Zhang, Daoqiang, and Zhi-Hua Zhou. "(2D) 2PCA: Two-directional two-dimensional PCA for efficient face representation and
recognition." Neurocomputing 69.1-3 (2005): 224-231.
10. Chien, Jen-Tzung, and Chia-Chen Wu. "Discriminant waveletfaces and nearest feature classifiers for face recognition." IEEE
Transactions on Pattern Analysis & Machine Intelligence 12 (2002): 1644-1649.
11. Liu, Chengjun, and Harry Wechsler. "Independent component analysis of Gabor features for face recognition." IEEE transactions on
Neural Networks 14.4 (2003): 919-928.
12. Cai, Deng, et al. "Orthogonal laplacianfaces for face recognition." IEEE transactions on image processing 15.11 (2006): 3608-3614.
13. Liao, Shu, and Albert CS Chung. "Face recognition by using elongated local binary patterns with average maximum distance gradient
magnitude." Asian conference on computer vision. Springer, Berlin, Heidelberg, 2007.
14. Geng, Cong, and Xudong Jiang. "Face recognition using sift features." 2009 16th IEEE international conference on image processing
(ICIP). IEEE, 2009.
15. Johnson, Justin, Andrej Karpathy, and Li Fei-Fei. "Densecap: Fully convolutional localization networks for dense captioning."
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2016.
16. Zhao, Guoying, and Matti Pietikäinen. "Boosted multi-resolution spatiotemporal descriptors for facial expression recognition." Pattern
recognition letters 30.12 (2009): 1117-1127.
17. Zhang, Ligang, Dian Tjondronegoro, and Vinod Chandran. "Random Gabor based templates for facial expression recognition in
images with facial occlusion." Neurocomputing145 (2014): 451-464.
18. Krizhevsky, Alex, Ilya Sutskever, and Geoffrey E. Hinton. "Imagenet classification with deep convolutional neural networks."
Advances in neural information processing systems. 2012.
19. Johnson, Justin, Andrej Karpathy, and Li Fei-Fei. "Densecap: Fully convolutional localization networks for dense captioning."
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2016.
20. Douze, Matthijs, et al. "Evaluation of gist descriptors for web-scale image search." Proceedings of the ACM International Conference
on Image and Video Retrieval. ACM, 2009.
21. Gupta, Sheifali, et al. "A new optimized approach to face recognition using eigenfaces." Global Journal of Computer Science and
Technology 10.1 (2010).

Authors: Neil P. Balba, Favis Joseph C. Balinado, Rio Aguilar-Escanilla, Terrence Lim, Elvin F. Gaac
Design and Development of a Home-based Uric Acid/ pH Level Analysis Device for Gout Patients:
Paper Title:
A Health Information Technology Application (HIT)
Abstract: Nowadays, technology affects every distinct aspect of modern society. Hi-tech revolution invades
the way people live in this technological era. As the Philippine healthcare industry crosses the threshold of
digital age, the needs for a health information technology device challenges the proponents to make a possible
solution in creating a system related in health care. The proponents come up with the idea of creating a device
that will analyze the urine pH of a gout patient and correlate it to the uric acid level. The proponents designed
and developed a home-based uric acid/ pH level analysis device for gout patients that is capable of measuring
the urine pH of the user and correlate it to the uric acid level. This study is divided into two parts; the first part is
the hardware part wherein the proponents used Arduino Microcontroller, Bluetooth module, pH sensor kit and
power boost converter. On the other hand is the software part, which includes the Arduino IDE and B4A
software. This device uses an android application in order to display the result of the test and the medical status
and profile of the user. The android application has a purpose for doctor and patient interaction for the doctor’s
clinical recommendation. The proponents are able to build a device that measures the pH/uric acid level of a
gout patient using the pH sensor and the Arduino micro controller.

Keywords: Uric Acid Level, Arduino Microcontroller, HIT, B4A, pH sensor, Android.
217. 1261-
References: 126
4
1. Akyilmaz, E.; Sezgintürk, M.K.; Dinckaya, E. A biosensor based on urate oxidase-peroxidase coupled enzyme system for uric acid
determination in urine. Talanta 2003, 61, 73–79.
2. Lindsay K, Gow P, Vanderpyl J, Logo P, Dalbeth N. The Experience and Impact of Living With Gout: A Study of Men With Chronic
Gout Using a Qualitative Grounded Theory Approach. J Clin Rheumatol. 2011;17(1):1-6 2.
3. Brook R, Forsythe A, Smeeding J, Lawrence E. Chronic gout: epidemiology, disease progression, treatment and disease burden. Curr
Med Res Opin. 2010;26(12):2813-21.
4. Wanda Lockwood, R. B. (2015, December). The Complete Urinalysis and Urine Tests. Retrieved from course material:
http://www.rn.org/courses/coursematerial-265.pdf
5. Agency for Healthcare Research and Quality, R. M. (2015). Health Information Technology Integration. http:// www.ahrq.gov/
professionals /prevention-chronic care/improve/health-it/index.html.
6. B_E_N. (2014). What is an Arduino? https://learn.sparkfun.com/tutorials/what-is- an-arduino.
7. NIAMS. (2014). What Is Gout? https://www. niams.nih. gov/ health_info/gout/gout_ff.pdf.
8. Tidy, D. C. (2017). Gout. https://patient.info/health/gout-leaflet. https:// www.arduino.cc/en/Guide/Introduction
9. R.A Crusinberry , M.D et.al. (n.d.). Uric Acid Stones. UROLOGY, P.C. (pp. 1-2). 5500 Pine Lake Road: Linconurologypc. UPC.
10. Felix GrasesEmail authorAdrian RodriguezFrancisco BergaAntonia Costa-BauzaRafael Maria PrietoIsabel BurdalloAlfredo
CadarsoCecilia Jimenez-JorqueraAntonio BaldiRosendo Garganta. (2014). A new device for simple and accurate urinary pH testing by
the Stone-former patient. Springer Plus.

Authors: Neil P. Balba, Nova Marie F. Rosas PJ Zeder Drilon, Sarah Jane F. Fallaria, Julie F. Fallaria
ISAKAY: Android Based Booking System for Tri-Bike Operators and Drivers Association with
Paper Title:
Cloud-Based Data Analytics
Abstract: Convenient routine of riding in a public transport is by at large, a primary concern of the commuters
as they conform on their safety while reaching such destinations. Vital to this, transportation resembles a big
role in our modern society specifically when reaching any destination while carrying goods and service not only
for convenience but also safety. Since the earliest days of the industrial revolution, transportation has smoothed
economic development by moving materials, resources, products, and people. Rural areas in the Philippines are
known in the use of “Trikes” or Tri-bike, a motorcycle attached to a side car, in transporting from one place to
another. “iSakay” is a Filipino word meaning “ride” or “to book for a ride”. Due to the increasing needs of the
commuters in the rural areas, ineffectiveness in communication with the drivers have still experienced and
mostly, the difficulty in acquiring a ride in tri-bike becomes a problem. The researchers came up with an idea of
designing and developing an Android-Based booking system that centralizes the transport management of the
tri-bikes in the rural areas around the Philippines. The centralized booking system can massively produce a
dashboard by means of showing data analytics via “cloud” as input and guide for the future enhancement and
development of the tri-bike management system. The researchers utilized waterfall model in the development of
the said software which in turns led to emanate beneficial solution to the commuters. The systems’ functionality,
reliability and accuracy are tested and evaluated which in turns gives a very simple yet important
218.
recommendation easing the normal problems faced by those rural areas in the Philippines. 1265-
126
Keywords: online commuters, booking system, tricycle, tribike, transportation, waterfall model, cloud, data 9
analytics.

References:

1. PhilAtlas Contributor. (2018). Odiongan, Romblon. Retrieved October 11, 2018, from PhilAtlas:
https://www.philatlas.com/luzon/mimaropa/romblon/odiongan.html
2. Fos, P. (2017, May 12). Mga Tribike na walang prangkisa hanggang May 31 nalang pwede bumiyahe. Retrieved from Romblon News
Network: www.romblonnews.net/index.php/local/28-odiongan/2032-mga-tribike-na-walang-prankisa-hanggang-May-31-nalang-
pwedeng-bumiyahe
3. Batty, M. (2007). Cities and complexity: understanding cities with cellular automata, agent-based models, and fractals. The MIT Press.
4. Rehrl, K., Goll, N., Leitinger, S., & Bruntsch, S. (2005). The vehicle framework involves transport foundation, vehicles,. 3rd
Sympsium on LBS & TeleCartography, (pp. 235-239).
5. Kenyon, S., & Lyons, G. (2003). The value of integrated multimodal traeller information and its potential contribution to modal
change. Transportation Research Part F, 1-21.
6. Harriet, T et al. (2013). An Assessment of Traffic Congestion and Its Effect on Productivity in Urban Ghana. International Journal of
Business and Social Science Vol. 4 No. 3; March 2013
7. Vasconcellos, E. A. (2014). Urban Transport Environment and Equity: The case for developing countries. Routledge.
8. FFE PKM Staff. (2016, December 29). Filipino Icon: Tricycle and Pedicab. Retrieved from For Filipinos in Europe:
http://ffemagazine.com/filipino-icon-tricycle-pedicab/
9. Agustin, C. P., & Costales, N. A. (2018). International Journal of Advanced Research in Management and Social Sciences, 211-236.
10. Sustainable Urban Transport Project Contributors. (2009, June). Sustainable Transport: A Sourcebook for Policy-makers in Developing
Cities. Retrieved from http://www.sutp.org
11. Boquet, Y. (2017). Transportation in the Philippines. The Philippine Archipelago. Springer, Cham, 465-519.
12. Eboli, L. (2015, March 31). Service Quality Attributes Affecting Customer Satisfaction for Bus Transit. Retrieved from Journal of
Public Transportation: https://scholarcommons.usf.edu/jpt/vol10/iss3/2/
13. Orellana, F. (2018, June 11). Grab Head Welcomes LTFRB regulation of ride-hailing firms. Retrieved from Inquirer:
https://newsinfo.inquirer.net/999719/grab-philippines-brian-cu-ltfrb-regulation-of-tncs
14. Tulio, J. (2017, July 21). How Important are Grab and Uber to Filipinos. Retrieved from Top Gear:
https://www.topgear.com.ph/features/feature-articles/uber-grab-stories-filipinos-a00187-20170721?ref=article_tag.

Authors: Mirafe R. Prospero, Bryan G. Dadiz


Analysing the Quality of Phaseolus Vulgaris Family of Legumes using Artificial Neural Network
Paper Title:
and “Bag of Features” Techniques
Abstract: The Philippine Council for Agriculture, Forestry and National Resources Research and
Development-Department of Science and Technology (PCAARRD-DOST) have recognized the importance of
cultivating legumes as priority crop among others in the vegetable industry under the National Vegetable
Research & Development Program. They have further emphasized the need for innovating the methods to
improve the processes in terms of producing better quality of products. The study developed a prototype
compiled application based on the trained and validated dataset using ANN (Artificial Neural Network)
machine. The BoF (Bag of Features) technique was utilized for image features extraction in the SVM (Support
Vector Machine) environment for quality classification of Phaseolus Vulgaris family of legumes. These are
commonly cultivated in the Philippines. The combined methods yielded an accuracy of 90.2%.

Keywords: ANN, Bag of Features, compiled application, digital image processing, SVM.

References:

1. B. Asaff, "List of Legumes", Vegetarian.lovetoknow.com, 2018. [Online].Available:


https://vegetarian.lovetoknow.com/List_of_Legumes. [Accessed: 07- Mar- 2019]
2. "Developing High-Yielding Pole Sitao Cultivars for Organic Production", Businessdiary.com.ph, 2018. [Online]. Available:
https://businessdiary.com.ph/9925/developing-high-yielding-pole-sitao-cultivars-for-organic-production/. [Accessed: 08- Jan- 2019].
3. R. Al-falluji, "Color, Shape, and Texture-based Fruit Recognition System ", International Journal of Advanced Research in Computer
219. Engineering & Technology (IJARCET), Volume 5, Issue 7, International Journal of Advanced Research in Computer Engineering &
Technology (IJARCET). 5. 2108-2112, July 2016. 1270-
4. D. Barrett, J. Beaulieu and R. Shewfelt, "Color, Flavor, Texture, and Nutritional Quality of Fresh-Cut Fruits and Vegetables: Desirable 127
Levels, Instrumental and Sensory Measurement, and the Effects of Processing", Critical Reviews in Food Science and Nutrition, vol. 4
50, no. 5, pp. 369-389, 2016. Available: 10.1080/10408391003626322 [Accessed 11 January 2019].
5. R. Mahendran, GC. Jayashree, K. Alagusundaram, “Application of Computer-aided Technique on Sorting and Grading of Fruits and
Vegetables”, J. Food Process Technology. S1-001. doi:10.4172/2157-7110.S1-001,2012.
6. D. Sun, "Inspecting pizza topping percentage and distribution by a computer-aided method", Journal of Food Engineering, vol. 44, no.
4, pp. 245-249, 2000. Available: 10.1016/s0260-8774(00)00024-8.
7. R. Bhole and S. Patil, "International Journal of Engineering Sciences Research Technology - ISSN: 2277-9655", Journaldatabase.info,
2019. [Online]. Available: http://journaldatabase.info/journal/issn2277-9655. [Accessed: 07- Jan- 2019].
8. "What Is a Neural Network?", Mathworks.com, 2019. [Online].Available:https://www.mathworks.com/discovery/neural-network.html.
[Accessed: 06- Nov- 2018].
9. C. Hiba, Z. Hamid and A. Omar, "Bag of Features Model Using the New Approaches: A Comprehensive Study", International Journal
of Advanced Computer Science and Applications, vol. 7, no. 1, 2016. Available: 10.14569/ijacsa.2016.070132 [Accessed 8 January
2019].
10. L. Thai, T. Hai, and N. Thuy, "Image Classification using Support Vector Machine and Artificial Neural Network", International
Journal of Information Technology and Computer Science, vol. 4, no. 5, pp. 32-38, 2012. Available: 10.5815/ijitcs.2012.05.05.
11. K. Kuzniar, K. Stec, and T. Tatara, "Approximate classification of mining tremors harmfulness based on free-field and building
foundation vibrations", E3S Web of Conferences, vol. 36, p. 01006, 2018. Available: 10.1051/e3sconf/20183601006.
12. T. Shukla, N. Mishra and S. Sharma, "Automatic Image Annotation using SURF Features", International Journal of Computer
Applications, vol. 68, no. 4, pp. 17-24, 2013. Available: 10.5120/11567-6868 [Accessed 10 January 2019]
a. Bhargava and A. Bansal, "Fruits and vegetables quality evaluation using computer-aided: A review", Journal of King Saud University -
Computer and Information Sciences, 2018. Available: 10.1016/j.jksuci.2018.06.002 [Accessed 12 January 2018].
13. D. Xiao, J. Feng, T. Lin, C. Pang, and Y. Ye, "Classification and recognition scheme for vegetable pests based on the BOF-SVM
model", International Journal of Agricultural and Biological Engineering, vol. 11, no. 3, pp. 190-196, 2018. Available:
10.25165/j.ijabe.20181103.3477.

Authors: Mirafe R. Prospero, Neil P. Balba, Ricky V. Bustamante, Gerby R. Muya


Solar Energy Harnessing Optimization Algorithm in a Robotic Solar Tracker with
Paper Title:
Arduino Based Monitoring System
Abstract: Solar power although an abundant source of renewable energy must be utilized properly. One of the
main factors to optimize its benefits is the capacity of the consumers to efficiently channel its power. The
motivational factor of this endeavor is creating a robotic sunlight tracker system in harnessing solar radiant to its
220. optimum potential in the Philippine setting, where sun’s insolation is low on the average due to the factors
affecting climate conditions (like temperature, rainfall, storminess, winds, etc.).The study developed a prototype 1275-
robotic sun tracker that is operated by a microcontroller using the sun’s perpendicularity and shadowing 127
techniques in the design of the mechanism that injected an intelligent comparator algorithm. A motor control 9
method was used to execute the best turn to harness the optimum solar energy with an Arduino based monitoring
system that measured the voltages obtained from each of the set-ups. The result was a 29% improvement in
generating electricity using the robotic sun tracker system versus static panel installation.
Keywords: Arduino based monitoring system, microcontroller, robotic sun tracker, shadowing technique, solar
radiant.

References:

1. "Here Are 11 Ways to Shift to Renewable Energy", Climate Reality, 2019. [Online]. Available:
https://www.climaterealityproject.org/blog/follow-leader-how-11-countries-are-shifting-renewable-energy. [Accessed: 03- Mar- 2019].
2. R. Cabato, "Paris Agreement effective in PH on Earth Day 2017", CNN, 2019. [Online]. Available:
http://cnnphilippines.com/news/2017/04/20/paris-agreement-effective-earth-day.html. [Accessed: 30- Aug- 2018].
3. "Fossil fuel- dependence puts at risk Philippines' economic growth prospects - Greenergy", Greenergy, 2017. [Online]. Available:
http://greenergydev.net/fossil-fuel-dependence-puts-at-risk-Philippines-economic-growth-prospects/. [Accessed: 26- Aug- 2018].
4. B. Dunbar, "NASA - SOLAR IRRADIANCE", Nasa.gov. [Online]. Available: https://www.nasa.gov/mission_pages/sdo/science/Solar
Irradiance.html. [Accessed: 25- Aug- 2018].
5. "Global Solar Atlas", Globalsolaratlas.info, 2016. [Online]. Available: http://globalsolaratlas.info/knowledge-base/introduction.
[Accessed: 25- Aug- 2018].
6. C. Hargreaves, "The Worldwide Distribution of Solar Resources by Nation.", Australia, 2018.
7. R. Lee Jin Yu, T. Lee Ji, Y. Hao Lim, H. Guang Lim Ghim, A. Lim ShuEn, and K. Lim Wee, Math.nus.edu.sg. [Online]. Available:
http://www.math.nus.edu.sg/~mathelmr/gem-projects/hm/0304-1-66-sun_and_architecture.pdf. [Accessed: 27- Aug- 2018].
8. Rosario, R. Gustilo and E. Dadios, "Optimization of A Small Scale Dual-Axis Solar Tracking System Using Nanowatt Technology",
Journal of Automation and Control Engineering, vol. 2, no. 2, pp. 134-137, 2014. Available: 10.12720/joace.2.2.134-137 [Accessed 14
August 2018].
9. Bione, O. Vilela and N. Fraidenraich, "Comparison of the performance of PV water pumping systems driven by fixed, tracking and V-
trough generators", Solar Energy, vol. 76, no. 6, pp. 703-711, 2004. Available: 10.1016/j.solener.2004.01.003.
10. "How is system efficacy calculated for PV lighting systems using various light sources? | Photovoltaic Lighting | Lighting Answers |
NLPIP", Lrc.rpi.edu. [Online]. Available: https://www.lrc.rpi.edu/programs/nlpip/lightingAnswers/photovoltaic/15-photovoltaic-
efficacy.asp. [Accessed: 02- Sep- 2018].
11. "How an LDR (Light Dependent Resistor) Works", Kitronik. [Online]. Available: https://www.kitronik.co.uk/blog/how-an-ldr-light-
dependent-resistor-works/. [Accessed: 19- Sep- 2018].
12. M. Shinya, Y. Dobashi, K. Iwasaki, M. Shiraishi, and T. Nishita, "A Simplified Plane-parallel Scattering Model for Rendering Densely
Distributed Objects such as Foliage", Journal of Information Processing, vol. 21, no. 2, pp. 349-357, 2013. Available:
10.2197/ipsjjip.21.349.
13. "How Actuators Work - Basic Actuators for Motion Control", Tigertek.com. [Online]. Available: http://www.tigertek.com/servo-
motor-resources/how-actuators-work-in-motion-control.html. [Accessed: 30- Mar- 2019].
14. "Ohms Law Tutorial and Power in Electrical Circuits.". [Online]. Available: https://www.electronics-
tutorials.ws/dccircuits/dcp_2.html. [Accessed: 20- Sep- 2018].
15. S. Ahmadi, "Shadowing, ergodic shadowing, and uniform spaces", Filomat, vol. 31, no. 16, pp. 5117-5124, 2017. Available:
10.2298/fil1716117a [Accessed 9 October 2018].
16. "Pulse Width Modulation - MicroController Electronics", MicroController Electronics. [Online]. Available:
https://microcontrollerelectronics.com/pulse-width-modulation/. [Accessed: 18- Sep- 2018].
17. "Renewable energy sources and climate change mitigation: special report of the Intergovernmental Panel on Climate Change", Choice
Reviews Online, vol. 49, no. 11, pp. 49-6309-49-6309, 2012. Available: 10.5860/choice.49-6309 [Accessed 10 November 2018].

Authors: Ratnesh Mishra, Ravi Shanker Shukla, Rajesh K. Shukla, R.R. Tewari
Energy Optimization on Symmetric Key Encryption and Decryption Algorithm using Genetic
Paper Title:
Algorithm
Abstract: In this paper we have proposed energy optimization on symmetric key encryption and decryption
algorithm are using genetic algorithm where we have used symmetric key for encryption & decryption algorithm
that optimize the energy in terms of power consumption related to the laptop battery. This method combines the
concept of a genetic algorithms and cryptography in very different ways. The algorithm uses deterministic way
to generate pseudo random number and applied crossover & mutation deterministically. The algorithm exploits
the features of the GA deterministically because GA is fast. Finally we got the actual message of ASCII code by
using decrypted algorithms minimises power consumption relatively.

Keywords: ASCII, GA, Encryption, Decryption, Cryptography, Crossover, Mutation.

References:

1. J. Toldinas, V. Stuikys, R. Damasevicius, G. Ziberkas, M. Banionis,2011, “Energy Efficiency Comparison with Cipher Strength of
221. AES and Rijndael Cryptographic Algorithms in Mobile Devices” ISSN 1392 – 1215, ELECTRONICS AND ELECTRICAL
ENGINEERING, SISTEMŲ INŽINERIJA, KOMPIUTERINĖS TECHNOLOGIJOS, No. 2(108). 1280-
2. Rakesh V, Sarala S M, May-June, 2015,” Energy Optimization In Wireless Sensor Network
3. Using Different Compression And Encrytion Techniques” International Journal of Engineering Research and General Science Volume 129
3, Issue 3, Part-2 , May-June, 2015 ISSN 2091-2730. 1
4. Yousef Bani Awwad and Mohammad Shkoukan, March 2017”.The Affect ofGenetic Algorithmson Blowfish Symmetric Algorithm”
IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.3.
5. Amorn Wongsarnpigoon and Warren M Grill, 23 June 2010,” Energy-efficient waveform shapes for neural stimulation revealed with a
genetic algorithm” IOP Publishing Ltd,Journal of Neural Engineering, Volume 7, Number 4
6. Sindhuja K , Pramela Devi S, 2014, “A Symmetric Key Encryption Technique UsingGenetic Algorithm” Sindhuja K et al, / (IJCSIT)
International Journal of Computer Science and Information Technologies, Vol. 5 (1),ISSN:0975-9646
7. C.E. Shannon ,”Communication Theory of security system “,Bell system Technical Journal ,28 ,1949.
8. National Bureau Standards, “Data Encryption Standard (DES),” FIPS Publication 46; 1977.
9. [8]Spillman R, “Cryptanalysis of Knapsack Ciphers using Genetic Algorithms,” Cryptologia, Vol.17, No.4, pp. 367-377, 1993.
10. Methew, R.A.J., “The use of genetic algorithms in cryptanalysis,” Cryptologia, 7(4),187-201, April1993.
11. Garg Poonam “Genetic algorithm Attack on Simplified Data Encryption Standard algorithm,” International journal Research in
Computing Science, ISSN1870-4069, 2006
12. Nalini, Cryptanalysis of Simplified data encryption standard via Optimization heuristics, International Journal of Computer Sciences
and network security, vol 6, No 1B, Jan 2006
13. A.J Paul, P.Varghese,P. Mythilli, “Matrix Array Symmetric Key Encryption”, Journal of Computer Society of India, Vol.37,Issue
No.1,Jan-March 2007,pp 48-53.
14. Garg Poonam, “Memetic Algorithm Attack on Simplified Data Encryption Standard Algorithm,” proceeding of International
Conference on Data Management, February 2008, pg 1097-1108.
15. Ankita Agarwal, “Secret Key Encryption Algorithm Using Genetic Algorithm,” International Journal of Advanced Research in
Computer Science and Software Engineering, Volume 2, Issue 4, pp. (216 -218), April 2012.
16. M.Najaftorkaman, N. S Kazazi,”A method to encrypt information with DNA based cryptography”, International Journal of Cyber-
Security and Digital Forensics(IJCSDF),4(3):417-426,2015.
17. H.M Mousa, “DNA-Genetic Encryption Technique”, International Journal of Computer Network and Information Security,2016,7,1-9.
18. W. Stallings, Cryptography and Network, Security, Principles and Practices, Fourth Edition,Prentice Hall,November 2005
19. Kelsey J., Lucks S., Schneier B., Stay M., Wagner D.,Whiting D. Improved Cryptanalysis of Rijndael // Fast Software Encryption,
2000. – P. 213–230.
20. Biryukov A., Keller N., Khovratovich D., Shamir A. Key recovery attacks of practical complexity on AES-256 variants with up to 10
rounds // Advances in Cryptology – Eurocrypt 2010, 29th Int. Conf. on the Theory and Applications of Cryptographic Techniques,
Lecture Notes in Computer Science, 2010. – Vol. 6110. – P. 299–319.
21. Toemeh R., Arumugam S. Breaking Transposition Cipher with Genetic Algorithm // Electronics and Electrical Engineering. – Kaunas:
Technologija, 2007. – No. 7(79). – P.75–78.

Authors: Harsha R. Vyawahare, Pravin P. Karde, Vilas M. Thakare

Paper Title: An Efficient Graph Database Model


Abstract: Relational databases are holding the maximum amount of data underpinning the web. They show
excellent record of convenience and efficiency in repository, optimized query execution, scalability, security and
accuracy. Recently graph databases are seen as an good replacement for relational database. When compared to
the relational data model, graph data model is more vivid, strong and data expressed in it models relationships
among data properly. An important requirement is to increase the vast quantities of data stored in RDB into web.
In this situation, migration from relational to graph format is very advantageous. Both databases have
advantages and limitations depending on the form of queries. Thus, this paper converts relational to graph
database by utilizing the schema in order to develop a dual database system through migration, which merges the
capability of both relational db and graph db. The experimental results are provided to demonstrate the
practicability of the method and query response time over the target database. The proposed concept is proved
by implementing it on MySQL and Neo4j.

Keywords: Graph Database, Migration, Neo4j, Relational Database.

References:

1. N. Spyratos and T. Sugibuchi, “Proper-a graph data model based on property graphs”, International Workshop on Information Search,
Integration, and Personalization, (ISIP 2015), Communications in Computer and Information Science, vol 622, pp. 23-45, Springer,
Champp. , 2015.
2. R. Ettrup and L. Nielsen, “Bridge-DB- Query Optimization in a Multi-Database System”, Master’s Thesis, Software Mater, Aalborg
University, June 2015.
3. R. D. Virgilio, A. Maccioni and R. Torlone, “Converting Relational to Graph Databases”, Proc. ACM First International Workshop on
Graph Data Management Experience and Systems, Article No.: 1, pp. 1-6, June 2013
doi:http://doi.acm.org/10.1145/2484425.2484426.
4. M. Gupta, “A Novel Approach to Transform Relational Database into Graph Database using Neo4j”, Master’s thesis, Thapar
222. University, June 2014
5. L. Rocha, F. Vale, E. Cirilo, D. Barbosa and F. Mourao, “A framework for migrating relational datasets to NoSQL” Procedia 1292-
Computer Science, vol 51, pp. 2593-2602, 2015. 129
6. M. Singh and K. Kaur, “SQL2Neo: Moving health-care data from relational to graph databases”, In EEE International Advance 5
Computing Conference (IACC), pp. 721-725, doi: 10.1109/IADCC.2015.7154801, 2015.
7. O .Orel, S. Zakosek and Prof. M. Baranovic, “Property Oriented Relational-To-Graph Database Conversion,” Automatika, vol. 57, no.
3, pp. 836– 845, 2016.
8. M. Hunger, R. Boyd and W. Lyon, “The Definitive Guide to Graph Databases for the RDBMS Developer”, Ebook Neo4j, 2016.
9. D. Gaspar, M. Mabic and T. Krtalic, “Integrating Two Worlds: Relational and NoSQL”, In Proceedings of the Central European
Conference on Information and Intelligent System, pp. 11-18, Sept. 2017.
10. Y.Unal and H. Oguztuzun, “Migration of data from relational database to graph database”,Proceedings of the 8th International
Conference on Information Systems and Technologies, Article No. 6, ACM, March 2018.
11. J. Pokorny, “Integration of Relational and NoSQL Databases”, In: Ngoc Thanh Ngu-yen, et al (eds), ACIIDS (2), LNCS, vol. 10752,
pp. 35-45. Springer 2018 https://doi.org/10.1007/978-3-319-75420-8_4.
12. Y. A. Megid, N. El-Tazi and A. Fahmy, “Using Functional Dependencies in Conversion of Relational Databases to Graph Databases”,
International Conference on Database and Expert Systems Applications DEXA, Lecture Notes in Computer Science, vol 11030, pp.
350-357, Springer, Cham, August 2018.
13. L. Liu and M. T. Ozsu, “Encyclopedia of Database Systems”, Springer Nature 2018 https://doi.org/10.1007/978-1-4614-8265-9.
14. Y. Khan, A. Zimmermann, A. Jha, V. Gadepally, M. D’Aquin and R. Sahay, “One Size Does Not Fit All: Querying Web Polystores”,
In IEEE Access, vol. 7, pp. 9598-9617, 2019.
15. M. Hunger, “From Relational to Graph: A Developer’S Guide”, Neo4j White Paper, Dzone Refcardz
16. H. R.Vyawahare, Dr P. P. Karde “An Overview on Gaph Database Model ”, International Journal of Innovative Research in Computer
and Communication Engineering (IJIRCCE) ISSN(Online): 2320-9801, Vol 3, Issue 8, Page No 7455-7457, August 2015 DOI:
10.15680/IJIRCCE.2015. 0308071 .
17. H. R.Vyawahare, Dr P. P. Karde “A Short Survey on Graphical Database”, Indian Journal of Computer Science and Engineering
(IJCSE) ISSN : 0976-5166, Vol 6, Issue 4, Page No 142-146, Aug-Sept 2015.
18. H. R.Vyawahare, Dr P. P. Karde, Dr V. M. Thakare, “Graph Database:The Next Frontier in managing relationships”, Journal of
Applied Science and Computations”,Issn no:1076-5131, Vol.5,Issue 10 , pp562-569,Octomber 2018.
19. H. R.Vyawahare, Dr P. P. Karde, Dr V. M. Thakare, “ Survey On Comparison of Graph Database Model”, In International Journal of
Research and Analytical Reviews, Volume 6, Issue 1, pp 1600-1608, February 2019.
20. H.R. Vyawahare, P.P. Karde, V.M. Thakare , “Graph Database: An Alternative for Relational Database”, International Journal of
Computer Sciences and Engineering, Vol.7, Issue.2, pp.685-691, Feb 2019.
21. H. R.Vyawahare, Dr P. P. Karde, Dr V. M. Thakare, “Hybrid Database Model For Efficient Performance”, In Elsevier International
Conference On Pervasive Computing Advances & Applications(PerCAA), January 2019.

Authors: C. P. Dhanakarna, R. Jayakarthik


Examination and Assessment of Different Cryptographic Technique Based On a Variety of
Paper Title:
Features
Abstract: Cloud computing provides an administrations such as programming bundle stockpiling, internetwork
and equipment these assortments of administrations are given to client. Cloud storage is certainly get to
wherever whenever of the information because of cloud is figure in remote area. It utilizes the capacity
administration given by the cloud provider. Data isn't verify inside the cloud because of the unapproved client
will endeavor to utilization of the non-open information. Along these lines, giving the information security it
utilizes the various encryption strategies to protect the information. so inside the anticipated investigation it
utilizes the development encryption rule. Inside the development encryption it consolidates 2 very surprising
calculations for giving the higher security.

Keywords: Cloud Computing, Security issues, Cryptography framework, Security goals.

References:

1. Sandip S. Dabre1 , Mangesh S and Shegokar2 2015, " Mechanism for secure Big information put away inside distributed storage by
utilizing distributed computing (Secure distributed storage)" , International Journal Of Engineering And Computer Science ISSN:2319-
7242 Volume 4 Issue 4 April , Page No. 11306-11309.
2. Giuseppe Ateniese, Kevin Fu, Matthew Green, and Susan Hohenberger 2005, "Improved Proxy Re-encryption Schemes with
Applications to Secure Distributed Storage", Proceedings of the twelfth Annual Network and Distributed System Security Symposium.
3. Sunia Rani and AmbrishGangal 2012, "Cloud Security with Encryption utilizing Hybrid Algorithm" International Journal of Computer
Science and Information Technologies, vol. 3(3), ISSN: 0975-9646.
4. G. Clarke, Microsoft's Azure Cloud Suffers First Crash, The Register, March 16, 2009, [online] http://www.theregister.co.uk/
5. Hassan Takabi , James B.D. Joshi and Gail Joon Ahn 2010, "Distributed computing Security and Privacy Challenges in Cloud
Computing Environments ", COPUBLISHED BY THE IEEE COMPUTER AND RELIABILITY SOCIETIES,1540-7993.
6. Australian government division of safeguard, "Distributed computing Security Considerations", CYBER SECURITY OPERATIONS
Center ,2012. 1296-
223. 7. Rohit S. Bhore, Sejal B. Bharkhada, Ashwini N. Malik and Anuja K Pande 2013, "Cryptographic Cloud Storage &Networking ",
International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 12, December ISSN:
130
2277 128X Available online at: www.ijarcsse.com. 1
8. SenyKamara and Kristin Lauter 2010, "Cryptographic Cloud Storage", Financial Cryptography and Data Security Volume 6054, pp
136-149.
9. Richard Chow, Philippe Golle, Markus Jakobsson, Elaine Shi, Jessica Staddon, RyusukeMasuoka, and Jesus Molina 2009, “
Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control”, ACM workshop on Cloud processing security,
CCSW, pages 85– 90, New York, NY, USA, ACM.
10. NiranjanamurthyM ,Charan Raj U , Raghavendra E , Sowmya R and Suhas Jadhav J 2014, "Near Study on Cloud Computing (CC)
and Mobile Cloud Computing (MCC)", International Journal of Computer Science and Mobile Computing, Vol.3 Issue.10, October,
pg. 280-290.
11. Tsz Hon Yuen, Ye Zhang, Siu Ming Yiu, and Joseph K. Liu 2014, "Character based Encryption with Post-Challenge Auxiliary Inputs
for Secure Cloud Applications and Sensor Networks", Proc. nineteenth Eur. Symp. Res. Comput. Secur., vol. 8712. Sep., pp. 130– 147.
12. K. Liang et al. 2014, "A DFA-based practical intermediary re-encryption plot for secure open cloud information sharing," IEEE Trans.
Inf. Crime scene investigation Security, vol. 9, no. 10, pp. 1667– 1680, October.
13. J. K. Liu, M. H. Au, X. Huang, R. Lu, and J. Li 2016, "Fine-grained two factor get to control for Web-based distributed computing
administrations," IEEE Trans. Inf. Crime scene investigation Security, vol. 11, no. 3, pp. 484– 497, March.
14. KajalChachapara and Sunny Bhadlawala 2013, "Secure imparting to cryptography in distributed computing", 978-1-4799-0727-4/13.
15. Tarun Soni and Piyush Singh 2014, "Audit on Storage and Prevention in Cloud Computing ", International Journal of Computer
Science and Information Technologies, Vol. (5), 6819-6823
16. Eliseu Castelo Branco, Javam de Castro Machado and José Maria da Silva Monteiro Filho 2014, "A procedure to save information
privacy in distributed storage administrations", 29th SBBD – WTDBD – ISSN 2316-5170 October 6-9.
17. Babitha.M.P and K.R. RemeshBabu 2016, “Secure Cloud Storage Using AES Encryption,” 978-1-5090-2080-5/16.
18. Juan M. Marın Perez, Gregorio Martınez Perez and Antonio F. Skarmeta Gomez 2016, &quot;SecRBAC: Secure information in the
Clouds&quot; , DOI 10.1109/TSC.2016.2553668, IEEE.
19. Noorul Hussain UbaidurRahman, ChithralekhaBalamurugan and RajapandianMariappan 2015, &quot;A Novel DNA Computing
based Encryption and Decryption Algorithm&quot;, International Conference on Information and Communication Technologies
(ICICT 2014),Procedia ComputerScience 46, 463 – 475.
20. Neha A Puri, Ajay R Karare and Rajesh. C. Dharmik 2014, “Sending of Application on Cloud and Enhanced Data Security in Cloud
Computing utilizing ECC Algorithm,” ISBN No. 978-1-4799-3914-5/14.

Authors: Achintaya Saha, S.Suresh kumar

Paper Title: Efficient User Revocation for Shared Data in the Public Cloud
Abstract: In cloud computing user can easily share and modify data inside group. Here data integrity can be
easily ensured by using the public signature of existing users in the cloud group. By using data sharing services
in cloud user can able modify data as a group on cloud. Integrity of these services can be improved using
signature of public existing users on group. Shared data is divided into blocks. All users are responsible for
modifying data on different blocks. When any user shows malicious activity in group then that user must be
revoked for security purpose. So the block modified by that user must be re-signing by existing users in group.
224. Traditional way to re-sign this is to down load part of data and re-sign it at the time of revocation of user. But 1302-
this approach is not efficient for large amount of data being shared. This paper gives novel method for auditing 130
integrity of shared data and provides effective way for user revocation. It uses the concept of proxy re-signature 7
to avoid the downloading of re-signed block by existing user.

Keywords: Public auditing, shared data, user revocation, cloud computing.

References:

1. Boyang Wang, Baochun Li, Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud
2. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee,A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia,
―A View of Cloud Computing, Communications of the ACM, vol. 53, no. 4, pp. 50–58, Apirl 2010.
3. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, ―Provable Data Possession at Untrusted Stores,
―in the Proceedings of ACM CCS 2007, 2007, pp. 598–610.
4. H. Shacham and B. Waters, ―Compact Proofs of Retrievability, in the Proceedings of ASIACRYPT 2008. Springer-Verlag, 2008,pp.
90–107.
5. C. Wang, Q. Wang, K. Ren, and W. Lou, ―Ensuring Data Storage Security in Cloud Computing, in the Proceedings of ACM/IEEE
IWQoS 2009, 2009, pp. 1–9.
6. C. Wang, Q. Wang, K. Ren, and W. Lou, ―Privacy- Preserving Public Auditing for Data Storage Security in Cloud Computing, ―in
the Proceedings of IEEE INFOCOM 2010, 2010, pp. 525–533.
7. Y. Zhu, H.Wang, Z. Hu, G.-J. Ahn, H. Hu, and S. S. Yau, ―Dynamic Audit Services For Integrity Verification of Outsourced Storage
in Clouds, in the Proceedings of ACM SAC 2011, 2011, pp. 1550–1557
8. C. Wang, Q. Wang, K. Ren, and W. Lou, ―Towards Secure and Dependable Storage Services in Cloud Computing, IEEE
Transactions on Services Computing, vol. 5, no. 2, pp. 220–232, 2011.
9. Y. Zhu, G.-J. Ahn, H. Hu, S. S. Yau, H. G. An, and S. Chen, ―Dynamic Audit Services For Outsourced Storage in Clouds, IEEE
Transactions on Services Computing, accepted.

Authors: Mogaligunta Sankaraiah, S Suresh Reddy, M Vijaya Kumar


PSO Based Reactive Power Coordination of Multiple Dispatchable Distributed Generations &
Paper Title:
Voltage Controlled Devices
Abstract: The presence of multiple distributed generations on radial distribution system increases switching
operations of voltage controlled devices (VCDs). Reduction of switching operations (SOs) of VCDs in the
presence of multiple dispatchable distributed generations (MDDGs) is a demanding research area now a days.
This paper proposes a novel method for the reduction of SOs of VCDs together with system power loss, in
which we estimated the load one day in advance which makes MDDGs to dispatch the reactive power
cooperatively with VCDs and particle swarm optimization (PSO) method used for solving multiple objective
function. Multiple objective function (MOF) is formulated with cost of power loss and cost of SOs. The
proposed method is tested on 16 nodes practical system under different operating output patterns and locations
considering under load tap changers (ULTCs) and shunt capacitors (SCs) as VCDs. Simulation results clearly
depicts that this method is effectively achieved the goals compared with existing conventional optimization
techniques.

Keywords: Particle swarm optimization (PSO), Under load tap changers (ULTCs), Shunt capacitors (SCs);
Voltage Controlled Devices (VCDs), Dispatchable distributed generation (DDG).

References:

1. H Jiayi, J Chuanwen, X Rong. “A review on distributed energy resources and micro grid”. Renew. Sustain. Energy Rev. 2008; 12(1):
2472-2483.
2. A K Arani. “Optimal placement and sizing of distributed generation units using Co-Evolutionary particle swarm optimization
algorithms”. TELKOMNIKA Indonesian Journal of Electrical Engineering. 2015; 13(2): 247-256.
3. P S Meera, S Hemamalini. “Optimal siting of distributed generators in a distribution network using Artificial Immune System”.
International Journal of Electrical and Computer Engineering. 2017; 7(2): 641-649.
4. N Manoj Kumar, V K Sethi. “Optimal location of distributed generation and its impacts on voltage stability”. International Journal of
225. Electrical and Computer Engineering. 2016; 6(2): 501-511.
5. J O Petinrin, J O Agdolade, M Shaaban. “Voltage regulation in a Microgrid with hybrid PV/Wind energy”. TELKOMNIKA 1308-
Indonesian Journal of Electrical Engineering. 2015; 14(3): 402-409. 131
6. Ruey Hsun, L Chen Kuo. “Dispatch of main transformer ULTC and capacitors in a distribution system”. IEEE Transactions on Power 3
Delivery. 2001; 16(4): 625-630.
7. J O Donnel. “Voltage management of networks with distributed generation”. PhD thesis. Edinburgh & U.K.; 2007.
8. F A Vivan. “Voltage control and voltage stability of power distribution systems in the presence of distributed generation”. PhD thesis.
Sweden & U.T.; 2008.
9. F C Lu, Y Y Hsu. “Reactive power/voltage control in a distribution substation using dynamic programming”. Proc. Inst. Elect. Eng.,
Gen., Trans., Dist.1995; 142(6): 639-645.
10. F A Vivan, D Karlsson. “Combined local and remote voltage and reactive power control in the presence of induction machine
distributed generation”. IEEE Transactions on Power Systems. 2007; 22(4): 2003-2012.
11. F A Vivan, D Karlsson. “Voltage and reactive power control in systems with synchronous machine based distributed generation”.
IEEE Transactions on Power Delivery. 2008; 23(2): 1079-1087.
12. C J Dent, L F Ochoa, G P Harrison. “Network distributed generation capacity analysis using OPF with voltage step constraints”. IEEE
Transactions on Power Systems. 2010; 25(1): 296-304.
13. A R Ahmadi, T C Green. “Optimal power flow for autonomous regional active network management system”. IEEE Power & Energy
Society General Meeting. 2009; 1-7.
14. W Sheng, K Y Liu, Y S Cheng. “A trust region SQP method for coordinated voltage control in smart distribution system”. IEEE
Transactions on Smart Grid. 2015; 7(1): 381-391.
15. H Li, F Li, Y Xu, D T Riyaz, J D Kueck. “Adaptive voltage control with distributed energy sources: Algorithm, theoretical analysis,
simulation, and field test verification”. IEEE Transactions on Power Systems. 2010; 25(3): 1638-1647.
16. Y J Kim, S J Ahn, P I Hwang, P G Chan, S I Moon. “Coordinated control of a DG and voltage controlled devices using a dynamic
programming algorithm”. IEEE Transactions on Power Systems. 2013; 28(1): 42-51.
17. W Sheng, K Y Liu, Y Liu, X Ye, H Kaiyuan. “A reactive power coordination optimization method with renewable distributed
generation based on improved harmony search”. IET Generation, Transmission & Distribution. 2016; 10(13): 3152-3162.
18. M Sankaraiah, S Suresh reddy, M Vijaya kumar. Particle swarm optimization based reactive power coordinated control of distributed
generation and voltage controlled devices. The Journal of CPRI. 2017; 13(3): 447-454.
19. T. Niknam, M. R. Narimani, J. Aghaei, and R. Azizipanah-Abarghooee,Improved “particle swarm optimisation for multi-objective
optimal power flow considering the cost, loss, emission and voltage stability index”,IET Gener. Transm. Distrib., vol. 6, no. 6, pp.
515–527,Jun. 2012.
20. Z.-L. Gaing, “Particle swarm optimization to solving the economic dispatch considering the generator constraints”, IEEE Trans. Power
Syst.,vol. 18, no. 3, pp. 1187–1195, Aug. 2003.

Authors: Santhia Nadesan, Choo Wou Onn, Shahryar Sorooshian


Paper Title: Exploring Challenges of Web-Based Purchasing
Abstract: The main goal of the current article was to review challenges of online purchasing. Theoretically,
this research has few benefits and has importance which the findings of this study will listing the crucial
challenges that need to be addressed and tackled to achieve the success of E-commerce (and precisely electronic-
shopping) in companies. It encourages additional utilization of technologies of Electronic-Commerce, styles the
e-transaction practice at ease, boosts the amount of acknowledgement and adoption of this online technology,
results in advancement of online customer responsibility, presents the loyalty concept, raise customer
satisfaction, sustains longer-term relationship with clienteles and contributions to obtaining of competitive
advantages.

Keywords: Challenges, Online Shopping, Web, Literature Review.

References:

1. Ling,sK. C., Chai, L.sT., & Piew, T. H. (2010). sEffectssofsShopping Orientations,sonline trustsandspriorsonlinespurchasesexperience.
International BusinesssResearch, 3(3), 63–76s
2. Awoyelu,sI.Os&sTangba,sO.s(2010).DevelopmentsofsOn-linesShopping Mart Systemsfor DevelopingsCountries. 3(3), s164–173s
3. Perea y Monsuwé, T., Dellaert, sB. G. C., & de Ruyter, K.s(2004). Whatsdrivessconsumersstosshopsonline?sAsliteraturesreview.
InternationalsJournalsofsServicesIndustrysManagement, 15(1), 102–121.doi:10.1108/09564230410523358s
4. Rowley, J. (1996). Retailingsandsshopping. 24(3),s26–37.
5. Harn, A. C. P.,sKhatibi, A., &sIsmail, H. bin. (2006). sE-Commerce: A StudysonsOnline Shoppingsin Malaysia. JournalsofsSocial
Sciences, 13(3),s231–242. https://doi.org/10.1080/09718923.2006.11892554
6. Yazdanifard, R.s(2011).sSecurity and Privacy IssuessassasPotential RisksforsFurthersE- commercesSecurity and PrivacysIssuessas a
Potential Risk forsFurthersE-scommercesDevelopment. (June).
7. Salam,sA. F., Rao,sH.R.,s& Pegels, C. sC. (2003).sConsumer-perceived risksinsecommercestransactions.
CommunicationssofsthesACM, 46(12), s325–331s
8. Jones, S., sWilikens, M., Morris, P. andsMasera, M. (2000),s“Trust requirements inse-business”, sCommunicationssof the ACM,sVol.
43 No. 2, pp. s81-7.
9. Niranjanamurthy,sM. and Chahar, D. (2013). ThesStudysofsE -CommercesSecuritysIssues and Solutions. InternationalsJournal of
AdvancedsResearchsin Computer andsCommunicationsEngineering, 2(7)s
10. Turban.sE., King.sD., Lee. J. K., Liang, T.sP., and Turban, D.C., (2015), ElectronicsCommerce: A Managerialsand Social Networks
Perspective.s8th Ed.
11. Rogers, E. M.s(1995). sDiffusion of innovationss (4th ed.). New York: The Free Presss
226. 12. Suki. N., Ahmad, I., & Thyagarajan, V. (2002). Motivationsand concern factors forsinternet shopping: AsMalaysian perspective.sThe
Electronic Journal forsE-commerce Tools and Applications. 1,s1-18.
13. Al-Fadhli, S.s[2011]. Critical successsfactorssinfluencing e-commercesin Kuwait.sJournal of InternetsBankingsandsCommerce, 16(1).
1-7.
14. Fleenor,sA. C. & Raven, sP. [2003]. Barriers toseffectivese-business in developingscountries. sInternational Businesss&sEconomics
Research Journal,s1(4), 39-48s 1314-
15. Nizamuddin, S., & Khalid, R. [2001]. Pakistan sustained effortsin IT sectorsneeded. Proceedings ofsDawnsConf. onsIT:sThe future of 131
Pakistan,sKarachi. Special sSpplements 7
16. Efendioglu,sA. M., Yip, V. F., & Murray, sW. L. [2009]. E-commerce in developingscountries: Issues and influences.sSan Francisco:
University of SansFrancisco Presss
17. Park, C.sH., & Kim, Y. G. (2003). sIdentifyingskeysfactorssaffecting consumerspurchase behaviorsin ansonline shoppingscontext.
InternationalsJournal of Retails& DistributionsManagements, 31(1), 16–29. https://doi.org/10.1108/09590550310457818s
18. Tan, F. B.,sTung, L., & Xu, Y.s(2009). A studysofsweb-designers' criteria forseffective business-to-customer (B2C)swebsites using the
repertory gridstechnique. JournalsofsE-commercesResearch, 10(3), 155–177s
19. Cyr, D.s (2008). Modelingswebsitesdesign acrossscultures: Relationships to trust,ssatisfactionsandse-loyalty.sJournal of Management
InformationsSystems,s24(4), 47–72
20. Farag, S., Schwanen, T., Dijst, M., & Faber, sJ. (2007). Shopping online and/orsin-store? A structuralsequationsmodel of the
relationships betweense-shopping andsin-store shopping. sTransportation Research PartsA: PolicysandsPractice,s41(2), 125–141.
https://doi.org/10.1016/j.tra.2006.02.003s
21. Tan,sSoosJiuan (1999),s"Strategies forsreducingsconsumers’ risk aversionsinsInternetsshopping," JournalsofsConsumersMarketing, 16
(2), 163s- 80.
22. Donthu,sNaveen and AdrianasGarcia (1999), "The Internet Shopper," Journalsof AdvertisingsResearch,s39 (3), 52-58.
23. Bhatnagar, A., & Misra, S. (2014).sOn Risk , Convenience , andsInternet ShoppingsBehavior.
(May).shttps://doi.org/10.1145/353360.353371
24. Tian, R. G. (2000)s.Thesimplicationssofsrights tosculture in trans-national marketing:sAn anthropologicalsperspective.sHigh Plains
Applied Anthropologist,s2(20), Fall.
25. Aminu, S. A. (2013).sChallenges Militating againstsAdoption ofsOnline ShoppingsinsRetailsIndustrysinsNigeria.sJournal of
Marketing Management,s1(1),s23–33.
26. Delafrooz,sN., Paim, L. H., &sKhatibi, A. (2011). Understanding Consumer’ssInternet PurchasesIntentionsinsMalaysia. African
Journal ofsBusinesssManagement,s5(3),s2837–2846. https://doi.org/10.5897/AJBM10.1266
27. Rushinek, A.,s& Rushinek, S. (2009).sE-commercessecurity measures.
Ubiquity,s2002(November),s1.shttps://doi.org/10.1145/763948.763945
28. Fernandez,sA., & Miyazaki, A.s(2001). ConsumersPerceptions of PrivacysandsSecuritysRiskssforsOnlinesShopping.sJournalsofs
ConsumersAffairs,s35(1), 27–44.sRetrieved from http://www.sciencedirect.com/science/article/B6VG3-475RJF6-
1/2/1b644a64d596b015dfdbcb4e32b881ces
29. Chang,sM. K., Cheung, W., & Lai,sV. S. (2005). Literaturesderived referencesmodelssforsthesadoptionsofsonline shopping.
InformationsandsManagement,s42(4),s543–559. shttps://doi.org/10.1016/S03787206(04)00051-5s
30. Forsythe, S. sM., & Shi, B. (2003).Consumerspatronagesandsrisks perceptionssinsInternetsshopping.sJournals
ofsBusinesssResearch,s56(11),s867–875. s https://doi.org/10.1016/S0148-2963(01)00273-9s
31. Ling, K. C., Chai, L. T., & Piew, T.sH. (2010).sEffectssofsShopping Orientations,sonline trustsandspriorsonlinespurchasesexperience.
InternationalsBusiness Research,s3(3),s63–76. https://doi.org/10.5539/ibr.v3n3p63s
32. Kim, L.sH., Qu, H., & Kim, D. J.s(2009). Asstudy ofsperceived risk and risk reductionsof purchasingsair-tickets online. sJournal
ofsTravel and TourismsMarketing,s26(3),s203–224s. s https://doi.org/10.1080/10548400902925031s
33. Moore, S., s& Mathews, S. (2006). An explorationsofsonline shopping cartsabandonment syndrome - Asmatter of risksandsreputation.
sJournalsof WebsitesPromotion,s2(1–2),s71–88. https://doi.org/10.1080/15533610802104141ss
34. Almousa, sM. (2013). Barriers to E-CommercesAdoption:sConsumers’ Perspectivessfrom a Developing Country.sIBusiness,
05(02),s65–71. https://doi.org/10.4236/ib.2013.52008s
35. Visser,sE., &sLanzendorf,sM. (2004). E-Commerce :sA Literture Review. Tidjdschrift Voor Economische EnsSociale Geografie,
95(2), 189–205. https://doi.org/10.1111/j.0040-747X.2004.00300.xs
36. Kalia,sP., Kaur,sN., &sSingh, T. (2016). E-CommercesinsIndia: Evolution andsRevolutionsofsOnline Retail.sE-RetailingsChallenges
andsOpportunities in the Global Marketplace, i, 99–120. s
37. Wolfinbarger, M., Gilly, M. C., Wolfinbarger, M., &sGilly, M. C. (2001). shoppingsonline forsfreedomsandsFun.
CaliforniasMnagement Review, 43(2) s
38. Siu, sN. Y.-M.,s& Cheng, M.sM.-S. (2001). A Studysof the Expected Adoption ofsOnline Shopping—The Case of HongsKong.
Journal of InternationalsConsumersMarketing,s13(3),s87–106. doi:10.1300/j046v13n03_06s
39. Kolesar, M. B., & Galbraith,sR. W. (2000). Asservices-marketing perspectivesonse-retailing:sImplications forse-retailerssand
directions forsfurthersresearch.sInternet Research,s10(5),s424–438. https://doi.org/10.1108/10662240010349444.s

Authors: S.Sivakumar, K.Siddappa Naidu, K.Karunanithi

Paper Title: IOT based Energy Management System for an Autonomous Hybrid Micro-Grid
Abstract: Raising rate and require of power has led a lot of organizations to discover elegant ways for
monitoring, controlling and reduction energy. To create an innovative idea to reduce the rate of energy
consumption smart EMS (Energy Management System) is proposed in this paper. To develop IoT technologies
and Big Data is used to improved hold energy utilization in commercial, housing and industrial sectors. An EMS
is used to build smart homes is proposed for he developed cities. In this system, every residence tool is
interfaced with a data attainment module that is an IoT object with an exclusive IP address ensuing in a huge
mesh wireless network of devices. The data gaining SoC (System on Chip) module collects energy utilization
data from every device of every stylish residence and send data to a centralized server for supplementary
handing out and study. This information from all housing areas accumulates in the utility’s server as Big Data.
EMS consumes off-the-shelf BI (Business Intelligence) and Big Data surveys software packages which
improves the energy usages also to assemble user order. While air conditioning gives to 60% of power use in
American countries, HVAC (Ventilation, Air Conditioning and Heating) are in use as a research to approve the
proposed system.

Keywords: Conditions, Cyber Security, Labview IOT (Gmail), GSM, Data Monitoring.

References:

1. Y. Lee et al., “A modular 1 mm 3 die-stacked sensing platform with low power I2C inter-die communication and multi-modal energy
harvesting”, IEEE J. Solid-State Circuits, vol. 48, no. 1, pp. 229–243, Jan. 2013.
2. Y. Zhang et al., “A battery less 19 µW MICS/ISM-band energy harvesting body sensor node SoC for ExG applications,” IEEE J. Solid-
State Circuits, vol. 48, no. 1, pp. 199–213, Jan. 2013.
3. S. Bandyopadhyay and A. P. Chandrakasan, “Platform architecture for solar, thermal, and vibration energy combining with MPPT and
single inductor,” IEEE J. Solid-State Circuits, vol. 47, no. 9, pp. 2199–2215,Sep. 2012.
227. 4. S. Bandyopadhyay, P. P. Mercier, A. C. Lysaght, K. M. Stankovic, and A. P. Chandrakasan, “A 1.1 nW energy-harvesting system with
544 pW quiescent power for next-generation implants,” IEEE J. Solid-State Circuits, vol. 49, no. 12, pp. 2812–2824, Dec. 2014. 1318-
5. Y. K. Teh and P. K. T. Mok, “Design of transformer-based boost converter for high internal resistance energy harvesting sources with
21 mV self-startup voltage and 74% power efficiency,” IEEE J. Solid-State Circuits, vol. 49, no. 11, pp. 2694–2704, Nov. 2014. 132
6. W. Jung et al., “An ultra-low power fully integrated energy harvester based on self-oscillating switched-capacitor voltage doubler”, 3
IEEE Solid-State Circuits, vol. 49, no. 12, pp. 2800–2811, Dec. 2014.
7. Bosch BMP180 Digital Pressure Sensor, 2015,http://aebst.resource.bosch.com/media/products/dokumente/bmp180/BST-BMP180-
DS000-12~1.pdf.
8. CAT34TS00 1.8 V Digital Temperature Sensor, On Semiconductor 2014,
9. Data Sheet, SHTC1 Humidity and Temperature Sensor IC, ver. 4, Sensirion Aug. 2015,
10. http://www.sensirion.com/fileadmin/user_upload/customers/sensirion/Dokumente/Humidity/Sensirion_Humidity_SHTC1_Datasheet_
V3.pdf
11. “What the Internet of Things (IoT) Needs to Become Reality,” Free scale Semiconductor/ARM, Inc. White Paper, 2012–2014.
12. R. Yu and T. Watteyne, “Reliable, low power wireless sensor networks for the internet of things: Making wireless sensors as accessible
as webservers,” http://cds.linear.com/docs/en/white-paper/wp003.pdf.
13. G. Palumbo and D. Pappalardo, “Charge pump circuits: An overview on design strategies and topologies,” IEEE Circuits Syst. Mag.,
vol.10,no.1, pp. 31–45, 2010.
14. E. J. Carlson, K. Strunz, and B. P. Otis, “A 20 mV input boost converter with efficient digital control for thermoelectric energy
harvesting,” IEEEJ. Solid-State Circuits, vol. 45, no. 4, pp. 741–750, Apr. 2010.
15. P. S. Weng, H. Y. Tang, P. C. Ku, and L. H. Lu, “50 mV-input battery-less boost converter for thermal energy harvesting,” IEEE J.
Solid-State Circuits, vol. 48, no. 4, pp. 1031–1041, Apr. 2013.
16. Y.-C. Shih and B. P. Otis, “An inductor less DC-DC converter for energy harvesting with a 1.2 µW bandgap-referenced output
controller,” IEEE Trans. Circuits Syst. II, Exp. Briefs, vol. 58, no. 12, pp. 832–836, Dec.2011.
17. J. Zarate Roldan, S. Carreon Bautista, A. Costilla Reyes and E. Sanchez Sinencio “ An Ultra-Low power management unit with -40dB
switching noise suppression for a 3x3 thermoelectric generator array with 57% maximum end to end efficiency”, Proc. IEEE custom
integrated circuits conference, San Jose, California, US, 2014, pp. 1-4.
I. Doms, P. Merken, C. Van Hoof, and R. P. Mertens, “Capacitive power management circuit for micro power thermoelectric generators
with a 1.4 µA controller,” IEEE J. Solid-State Circuits, vol. 44, no. 10,pp. 2824–2833, Oct. 2009.
18. Y. H. Lee et al., “A low quiescent current asynchronous digital-LDO with PLL-modulated fast-DVS power management in 40 nm SoC
for MIPS performance improvement,” IEEE J. Solid-State Circuits, vol. 48, no. 4,pp. 1018–1030, Apr. 2013.
19. S. Gangopadhyay, D. Somasekhar, J. W. Tschanzand and A. Raychowdhury, “A 32nm embedded fully-digital, phase-locked low drop
out regulator for fine grained power management in digital circuits,” IEEE J. Solid-State Circuits, vol. 49, no. 11, pp. 2684–2693, Nov.
2014.
20. Yaghmaee Moghaddam, M. H., & Leon-Garcia, A. (2018). A Fog-Based Internet of Energy Architecture for Transactive Energy
Management Systems. IEEE Internet of Things Journal, 5(2), 1055–1069. doi:10.1109/jiot.2018.2805899.
Authors: Laxmi Devindrappa, N. B. Naduvinamani, G.C Shit
Peristaltically Induced Electroosmotic Flow of Jeffrey Fluid with Zeta Potential and Navier-Slip at
Paper Title:
the Wall
Abstract: This paper concern with the electro-osmotically modulated peristaltic of Jeffrey fluid with zeta
potential and Navier-slip boundary condition at the channel wall. The Poisson-Boltzmann equation for electrical
potential distribution is assumed to accommodate the electrical double layer. Poisson-Boltzmann equations are
simplified by using Debye-Huckel linearization approximation. The closed form analytical solutions are
calculated by using low Reynolds number and long wavelength assumptions. Influence of various parameters
like electro-osmotic, Jeffrey fluid parameter, Slip parameter and Zeta potential on the flow are discussed through 1324-
228.
the nature of graphs. 132
9
Keywords: Jeffrey fluid model, Peristaltic transport, Slip Velocity and Zeta Potential.

Reference:

1. Latham, T.W.: M. Sc. Thesis. MIT. Cambridge. M. A (1966).


2. Devakar, M., Ramesh, K., Sagar Chouhan., Ankush Raje.: Journal of the association of Arab Universities for basic and applied sciences.
23, 66-74 (2017).
3. Kothandapani, M., Srinivas, S.: Int. J. Non-Linear Mech. 43, 915–924 (2008).
4. Qayyum, A., Awais, M., Alsaedi, A., Hayat, T.: Chin. Phys. Lett. 29 (3), 034701 (2012).
5. Akbar, N.S., Nadeem, S.: Commun. Theor. Phys. 57, 133–140 (2012).
6. Xiaoyi Guo., Haitao, Qi.: Micromachines. 8, 341 (2017).
7. Bhatti, M. M., Zeeshan, A., Ellahi,R.: Microvascular Research, 110, 32–42 (2017).
8. Goswami, P., Chakraborty, J., Bandopadhyay, A., Chakraborty, S.: Microvasc. Res. 103, 41–54 (2016).
9. AshuYadav., ShashiBhushan., DharmendraTripathi.: MATEC Web of Conferences. 192, 02043 (2018).
10. DharmendraTripathi., ShashiBhushan.: Anwar Beg, O.: Alexandria Engineering Journal. 2017.
11. Ranjit, N. K., Shit, G.C.: Physica A. 482, 458-476 (2017).
12. Ranjit, N.K., Shit, G. C., Tripathi, D.: International Journal of Mechanical Sciences. 153–154 (2019) 430–444.
13. Mondal, A., Shit, G. C.: Fluid Dynamics Research. 50, 065502 (2018).
14. Ranjit, N., Shit, G. C.: European Journal of Mechanics / B Fluids. 77, 135–147 (2019).

Authors: V. Pavalan, R. Sivagamasundari

Paper Title: Bond Performance of Sand-Coated BFRP Bars to Concrete


Abstract: This paper presents an experimental study on the bond behaviour of sand-coated basalt fibre
reinforced polymer (BFRP) bars and conventional steel bars of 10mm- diameter. specimens consisted of BFRP
bars embedded in concrete cubes (200mm on each side) with the compressive strength of 40MPa were
constructed. The pullout test results contain the bond failure mode, the average bond strength , the slip at the free
and loaded end, and the bond stress-slip relationship curves.The test results showed that the bond strength of
sand-coated BFRP bars was about 70% that of the steel bars.

Keywords: ASTM standards, BFRP bars, steel bars, BPE model, pullout test.

References:

1. Adhikari, S. (2009), “Mechanical properties and flexural Applications of BFRP bars”, akron1259635900, Department of Civil
Engineering, University of Akron, Ohio, USA.
229. 2. ASTM D7205/D7205M (2011), Standard test method for tensile properties of fiber-reinforced polymer matrix composite bars,
American Society for Testing and Materials, , USA.
1330-
3. ASTM: D7913/D7913M (2014), Standard test method for bond strength of fiber-reinforced polymer matrix composite bars to 133
concrete by pull out testing, American Society for Testing and Materials, USA. 5
4. Baena M., Torres, Ll., Turon, A., and Barris C. (2009), “Experimental study of bond behaviour between concrete and FRP bars
using a pull-out test.” J.Compos. B , 40(8),784–797.
5. Eligehausen, R., Popov, E.P., and Berteo,V.V. (1983), “Local bond stress- slip relationships of deformed bars under generalized
excitations: Experimental and analytical model”,University of california, Berkeley, USA.
6. Li, C., Gao, D., Wang, Y., and Tang, J. (2017), “Effect of high temperature on the bond performance between basalt fibre reinforced
polymer (BFRP) bars and concrete”, J. Construct. Build. Mater., 141,44-51.
7. Meng, W., Liu, H., Kong, X., and Wang,X. (2015), “Bond-slip constitutive relation between BFRP bar and Basalt fiber recycled-
aggregate concrete”, KSCE J .Civil Eng.,2,1-11.
8. Refai, EI., Ammar, M.A., and Masmoudi, R. (2014), “Bond performance of BFRP bars to concrete”, ASCE J.Compos.Constr.,
19(3),04014050 1-12.
9. Wang, H., Sun, X., Peng, G., Lao, Y., Ying, Q. (2015), “Experimental study on bond behaviour between BFRP bar and engineered
cementitious composite”, J. Construct. Build. Mater., 95,448-456.
10. Xiaoshan, L. and Zhang, Y.X. (2014), “ Evaluation of bond stress-slip models for FRP reinforcing bars in concrete”, Compos.
struct,107,131-141.
11. Yang, Y., Li, Z., Zhang, T., Wei and, J., yu. Q. (2017) “Bond-Slip behaviour of BFRP bar in concrete subjected to simulated marine
environment: Effects of BFRP bar size, Corrosion age and concrete strength”, Int. J. Polym. Sci.,1, 1-9.

Authors: Sonia Singla, Aswath S., Dhirendra Kumar, Satish Thatavarti, Veeramalai, G

Paper Title: Role of Yoga for People Suffering from Schizophrenia in India
Abstract: Schizophrenia is a serious long-haul emotional wellness condition. It causes a scope of various
mental manifestations. It is a genuine dysfunctional behavior influencing diverse districts of the cerebrum, which
causes indications, for example, fantasies and hallucinations. Urban areas are more effected with Schizophrenia
230. then rural regions. Yoga can play an important role in treating anxiety and depression among patients suffering
1336-
from Schizophrenia. It lessens tension, discouragement and pregnancy related awkward encounters. AI can be
134
used to learn more about Schizophrenia. The focus of research was to show awareness among people suffering
0
from Schizophrenia in India.

Keywords: Schizophrenia, mental-disorder, yoga, medication, anxiety, depression, India


References:

1. Vancampfort D, Probst M, Helvik Skjaerven L, Catalán-Matamoros D, Lundvik-Gyllensten A, Gómez-Conesa A, et al. Systematic


review of the benefits of physical therapy within a multidisciplinary care approach for people with schizophrenia. Phys Ther. 2012
Jan;92(1):11–23
2. Lederbogen F, Haddad L, Meyer-Lindenberg A. Urban social stress--risk factor for mental disorders. The case of schizophrenia.
Environ Pollut. 2013 Dec; 183:2–6.
3. Krabbendam L, van Os J. Schizophrenia and urbanicity: a major environmental influence--conditional on genetic risk. Schizophr Bull.
2005 Oct;31(4):795–9.
4. Wan K-F, Wong MMC. Stress and burden faced by family caregivers of people with schizophrenia and early psychosis in Hong Kong.
Intern Med J. 2019 Mar;49 Suppl 1:9–15.
5. Mooventhan A, Nivethitha L. Evidence based effects of yoga practice on various health related problems of elderly people: A review. J
Bodyw Mov Ther. 2017 Oct;21(4):1028–32.
6. Bressington D, Mui J, Yu C, Leung SF, Cheung K, Wu CST, et al. Feasibility of a group-based laughter yoga intervention as an
adjunctive treatment for residual symptoms of depression, anxiety and stress in people with depression. J Affect Disord. 2019 Apr
1;248:42–51.
7. Sathyanarayanan G, Vengadavaradan A, Bharadwaj B. Role of yoga and mindfulness in severe mental illnesses: A narrative review. Int
J Yoga. 2019 Apr;12(1):3–28.
8. Rode S, Salankar H, Verma P, Sinha U, Ajagallay R. Pharmacoepidemiological survey of schizophrenia in Central India. Int J Res Med
Sci. 2014;2(3):1058
9. Nath S, Rehman S, Kalita KN, Baruah A. Aripiprazole-induced skin rash. Ind Psychiatry J. 2016 Dec;25(2):225–7
10. Avasthi, Ajit & Singh, Gagandeep. (2004). Schizophrenia Research: Indian Scene in Last Decade. Indian journal of psychiatry. 46.
115-24.
11. http://indianmhs.nimhans.ac.in/Docs/Summary.pdf [Internet]. [cited 2019 Mar 29]. Available from:
http://indianmhs.nimhans.ac.in/Docs/Summary.pdf
12. Mohammadzadeh A, Azadi S, King S, Khosravani V, Sharifi Bastan F. Childhood trauma and the likelihood of increased suicidal risk
in schizophrenia. Psychiatry Res. 2019 Mar 14;275:100–7.
13. Schizophrenia - NHS [Internet]. [cited 2019 Mar 29]. Available from: https://www.nhs.uk/conditions/Schizophrenia/
14. Chatterjee I. Mean deviation based identification of activated voxels from time-series fMRI data of schizophrenia patients. [version 2;
peer review: 2 approved]. F1000Res. 2018 Oct 8;7:1615.
15. Zaheer J, Jacob B, de Oliveira C, Rudoler D, Juda A, Kurdyak P. Service utilization and suicide among people with schizophrenia
spectrum disorders. Schizophr Res. 2018 Dec;202:347–53
16. Schizophrenia Symptoms, Patterns and Statistics and Patterns [Internet]. [cited 2019 Mar 29]. Available from:
https://www.mentalhelp.net/articles/schizophrenia-symptoms-patterns-and-statistics-and-patterns.
17. WHO | Schizophrenia [Internet] [cited 2019 Mar 29] Available from:https://www.who.int/mental_health/management/schizophrenia/en

Authors: Ramesh Ragala, G. Bharadwaja Kumar

Paper Title: Rank Based Pseudoinverse Computation in Extreme Learning Machine for large Datasets
Abstract: Extreme Learning Machine (ELM) is an efficient and effective least-square-based learning
algorithm for classification, regression problems based on single hidden layer feed-forward neural network
(SLFN). It has been shown in the literature that it has faster convergence and good generalization ability for
moderate datasets. But, there is great deal of challenge involved in computing the pseudoinverse when there are
large numbers of hidden nodes or for large number of instances to train complex pattern recognition problems.
To address this problem, a few approaches such as EM-ELM, DF-ELM have been proposed in the literature. In
this paper, a new rank-based matrix decomposition of the hidden layer matrix is introduced to have the optimal
training time and reduce the computational complexity for a large number of hidden nodes in the hidden layer.
The results show that it has constant training time which is closer towards the minimal training time and very far
from worst-case training time of the DF-ELM algorithm that has been shown efficient in the recent literature.

Keywords: Extreme Learning Machine, Moore-Penrose Matrix, Machine Learning, Classification, Matrix
Decomposition.

References:
231.
1. G B Kumar, “An Encyclopedic Overview of ‘Big Data’ Analytics”, International Journal of Applied Engineering Research, vol. 10, no. 1341-
3, pp. 5681-5705, 2015.
2. Enmei Tu et.al, “A theoretical study of the relationship between an ELM network and its subnetworks”, Proceedings of International 134
Joint Conference in Neural Networks. pp. 1794-1801, 2017 6
3. A. Fu , C. Dong and L. Wang, “An experimental study on stability and generalization of extreme learning machine”, International
Journal of Machine Learning and Cybernetics, Vol.6, pp.129-135, 2015
4. H. Jaeger, “A tutorial on training recurrent neural networks, covering BPPT, RTRL, EKF and the ‘echo state network’ approach,”
German Nat. Res. Cntr. Inf. Technol., Sankt Augustin, Germany, GMD, Report 159, 2002.
5. Guorui Feng et.al, “Error minimized extreme learning machine with growth of hidden nodes and incremental learning,” IEEE
Transactions on Neural Networks, vol. 20, no. 8, pp. 1352–1357, August. 2009.
6. https://en.wikipedia.org/wiki/Backpropagation
7. Goodfellow Ian, Bengio Yoshua, and Courville, Aaaron, “Deep Learning”, MIT Press, 2016, pp. 196,
8. G.-B.Huang, Q.Y. Zhu, and C.-K. Siew, “Extreme learning machine: Theory and applications,” Neurocomputing, vol. 70, pp. 489–501,
2006.
9. G-B.Huang, Q-Y.Zhu, C-K.Siew, “Extreme Learning Machine: A new Learning scheme of feedforward neural networks”, Proceedings
of International Joint Conference on Neural Networks (IJCNN2004), Budapest, Hungary, pp. 25-29, 2004.
10. G.B.Huang, L.Chen, and C.K. Siew, “Universal approximation using incremental constructive feedforward networks with random
hidden nodes,” IEEE Transactions on Neural Networks, vol. 17, no. 4, pp. 879-892, July 2006.
11. B.Y. Qu, B.F. Lang, J.J. Liang, A.K. Qin, O.D. Crisalle, “Two-hidden-layer extreme learning machine for regression and classification”,
Neurocomputing, vol. 175, pp. 826-834, 2016.
12. G.B. Huang et.al, “Incremental extreme learning machine with fully complex hidden nodes”, Neurocomputing, Vol.71, pp.576-583,
2008.
13. Nan-Ying Liang et.al, “A Fast and Accurate Online Sequential Learning Algorithm for Feedforward Networks”, IEEE Transactions on
Neural Networks, vol. 17, no. 6, pp. 1411-1423, Nov. 2006.
14. P.H. Kassani and Kim E, “Pseudoinverse matrix decomposition based incremental extreme learning machine with growth of hidden
nodes”, International Journal of Fuzzy Logic Intelligence System, vol.16, no.2, pp. 125-130, 2016.
15. Y.Ye and Y.Qin, “QR factorization based incremental extreme learning machine with growth of hidden nodes,” Pattern Recognition
Letters, vol. 65, pp. 177-183, 2015.
16. S.X. Lu, X.Z. Wang, G.Q. Zhang, and X. Zhou, “Effective algorithms of the Moore–Penrose inverse matrices for extreme learning
machine”, Intelligence Data Analysis, vol. 19, pp. 743-760, 2015.
17. A. Ben-Israel and T.N.E. Grenville, “Generalized inverses: Theory and applications”, Springer-Verlag. Berlin, 2002.
18. V.N. Katsikis and D. Pappas, “Fast computing of the moore-penrose inverse matrix”, Electronic Journal of Linear Algebra, vol. 17,pp:
637-650, 2008.
19. P. Courrieu, “Fast computation of moore-penrose inverse matrices”, Neural Information Processing – Letters and Reviews, vol.8,
issue.2, pp: 25-29, 2005
20. F. Toutounian and A. Ataei, “A new method for computing moore-penrose inverse matrices”, Journal of Computational and Applied
Mathematics, vol.228, issue.1, pp. 412-417,2009.
21. Junpeng Li et al, “A fast training algorithm for extreme learning machine based on matrix decomposition”, Neurocomputing, vol.173,
pp:1951-1958, 2016.
22. https://www.openml.org
23. https://archive.ics.uci.edu/ml/index.php

Authors: Bharath Subramani, Selvapandian Arumugam, Balakumaresan Ragupathy

Paper Title: Computer Aided Classification and Detection of Leaf Disease using ANN
Abstract: The contribution of a plant is highly important for both human life and environment. Diseases will
affect plant, like all humans and animals. Various diseases may affect plant which disturbs the plants normal
growth. Leaf, stem, fruit, root, and flower of the plant may get affected by these diseases. Without proper care
the plant may die or its leaves, flowers, and fruits drop. Finding of such infections is required for exact
distinguishing proof and treatment of plant sicknesses. The current technique for plant malady discovery utilizes
human contribution for distinguishing proof and characterization of illnesses and these strategies endure with
time-unpredictability. PC supported programmed division of illnesses from plant leaf utilizing delicate
registering can be fundamentally valuable than the current techniques. In this paper, we proposed a method using
Artificial neural network (ANN) for identification, classification and segmentation of diseases in plant leaf
automatically. In the proposed system capturing the leaf images is done first and then contrast of the image is
improved by using Contrast Limited Adaptive Histogram Equalization(CLAHE) method. Then, color and
texture features are extracted from the segmented outputs and the ANN classifier is then trained by using that
features and it could able to separate the healthy and diseased leaf samples properly. Exploratory outcomes
demonstrate that the arrangement execution by ANN taking list of capabilities is better with an exactness of
98%.

Keywords: Equalization, classification, segmentation, artificial neural network and accuracy.


232.
References: 1347-
135
1. Y. Lu, S. Yi, N. Zeng, Y. Liu, and Y. Zhang, ``Identi_cation of rice diseases using deep convolutional neural networks,'' 3
Neurocomputing, vol. 267, pp. 378_384, Dec. 2017, doi: 10.1016/j.neucom.2017.06.023.
2. V. Singh and A. K. Misra, ``Detection of plant leaf diseases using image segmentation and soft computing techniques,'' Inf. Process.
Agricult.,vol. 4, pp. 41_49, Mar. 2017, doi: 0.1016/j.inpa.2016.10.005.
3. P. B. Padol and A. A. Yadav, ``SVM classi_er based grape leaf disease detection,'' in Proc. Conf. Adv. Signal Process. (CASP), Jun.
2016, pp. 175_179, doi: 10.1109/CASP.2016.7746160.
4. J. G. A. Barbedo, L. V. Koenigkan, and T. T. Santos, ``Identifying multiple plant diseases using digital image processing,'' Biosyst.
Eng., vol. 147, pp. 104_116, Jul. 2016, doi: 10.1016/j.biosystemseng.2016.03.012.
5. J. K. Patil and R. Kumar, ``Analysis of content based image retrieval for plant leaf diseases using color, shape and texture features,''
Eng.Agricult., Environ. Food, vol. 10, pp. 69_78, Apr. 2016, doi: 10.1016/j.eaef.2016.11.004.
6. M. Ramakrishnan and A. S. A. Nisha, ``Groundnut leaf disease detection and classi_cation by using back probagation algorithm,'' in
Proc. IEE ICCSP Conf., Apr. 2015, pp. 964_968, doi: 10.1109/ICCSP.2015.7322641.
7. Y. Lu, S. Yi, N. Zeng, Y. Liu, and Y. Zhang, ``Identification of rice diseases using deep convolutional neural networks,''
Neurocomputing, vol. 267,pp. 378_384, Dec. 2017, doi: 10.1016/j.neucom.2017.06.023.
8. M. Neumann, L. Hallau, B. Klatt, K.Kersting, and C. Bauckhage, ``Erosion band features for cell phone image based plant disease
classi_cation,'' inProc. 22nd IEEE Int. Conf. Pattern Recognit., Aug. 2014, pp. 3315_3320,doi: 10.1109/ICPR.2014.571.
9. I. Kaur, G. Aggarwal, and A. Verma, ``Detection and classication of disease affected region of plant leaves using image processing
technique,'' Indian J. Sci. Technol., vol. 9, no. 48, pp. 1_13, 2016,doi: 10.17485/ijst/2016/v9i48/104765.
10. L. Yuan, Z. Bao, H. Zhang, Y. Zhang, and X. Liang, ``Habitat monitoring to evaluate crop disease and pest distributions based on
multi-source satellite remote sensing imagery,'' Optik_Int. J. Light Electron Opt., vol. 145,pp. 66_73, Sep. 2017, doi:
10.1016/j.ijleo.2017.06.071.
11. A. Camargo and J. S. Smith, ``Image pattern classification for the identi-_cation of disease-causing agents in plants,'' Comput.
Electron. Agricult.,vol. 66, no. 2, pp. 121_125, 2009, doi: 10.1016/j.compag.2009.01.003.

Authors: Melda Rumia Rosmery Simorangkir


Emprovement Efforts Iii Through Content Control Services With Role Playing Techniques In Fkip
Paper Title:
Products and Counseling Christian University Of Indonesia
Abstract: Low self-confidence is still a problem that is quite alarming among early adult Indonesian women.
There are still many early adults who make beauty the root of their anxiety, not a source of self-confidence.
233. Dove Girl Beauty Confidence Report in kompas.com shows that 54 percent of early adult women in the world
1354-
do not have high self-confidence. In fact, 7 out of 10 of them in Indonesia withdraw from important activities
135
not confident. The Assistant Deputy for the Fulfillment of the Rights of the Child for Education, Creativity and
7
Culture of the Ministry of Women's Empowerment and Child Protection, Elvi Hendrani, improper parenting
from parents also has a major influence in reducing children's self-confidence. for early adults. However, more
important recognition from parents and teachers. The results of the research on the provision of content mastery
services with the role playing technique for early adult students can be concluded: (1) the confidence of early
adult students before joining the content mastery service with role playing techniques is in the low category.
This is indicated by the indicators of student self-confidence on average in the low category; (2) self-confidence
of early adult students after participating in content mastery services with role playing techniques in the high
category. This is indicated by the indicators of student self-confidence on average in the high category; (3)
student self-confidence has increased after getting treatment in the form of content mastery services with role
playing techniques. A significant increase was seen from the Wilcoxon test results. The Wilcoxon test results
show that Z count is smaller than Z table so the hypothesis is accepted. The indicator that experienced the
highest increase was an indicator of optimism during the period of body changes.

Keywords: Self-confidence, Content Mastery Service, Role Play Technique.

References:

1. Fitri, E., Zola, N., & Ifdil, I. (2018). Profil Kepercayaan Diri Remaja serta Faktor-Faktor yang Mempengaruhi. JPPI (Jurnal Penelitian
Pendidikan Indonesia), 4(1), 1-5.
2. Kushartanti, A. (2009). Perilaku menyontek ditinjau dari kepercayaan diri. Indigenous: Jurnal Ilmiah Psikologi, 11(2).
3. Numri, M. Z. (2015). Meningkatkan Kemandirian Belajar Melalui Layanan Penguasaan Konten dengan Teknik Latihan Saya
Bertanggungjawab. Jurnal Penelitian Tindakan Bimbingan & Konseling, 1(1).
4. Ilahi, R., Syahniar, S., & Ibrahim, I. (2013). Faktor yang Mempengaruhi Pelanggaran Disiplin Siswa dan Implikasinya Terhadap
Layanan Bimbingan & Konseling. Konselor, 2(2).
5. Baroroh, K. (2011). Upaya meningkatkan nilai-nilai karakter peserta didik melalui penerapan metode role playing. Jurnal Ekonomi dan
Pendidikan, 8(2).
6. Awlawi, A. H. (2013). Teknik Bermain Peran pada Layanan Bimbingan Kelompok untuk Meningkatkan Self-Esteem. Konselor, 2(1).
7. Hurlock, E.B. 2013. Edisi ke Enam Perkembangan Anak (Jilid 1). Jakarta :Erlangga. 2012. Psikologi Perkembangan. Jakart:Erlangga
8. Jarvis, Lori dkk. 2002. Role-Playing as a Teaching Strategy. Journal. Strategies for Application and Presentation Staff Development
and Presentation.
9. Sandtrock. J. W. 2003. Adolesence. Jakarta : Erlangga. 2010. Life-Span Development (Perkembangan Masa Hidup) Jilid 1. Jakarta :
Erlangga
10. Sukardi, D.K. 2008. Pengantar Pelaksanaan Program Bimbingan dan Konseling di Sekolah. Jakarta: Rineka Cipta.
11. Tohirin, M. 2008. Bimbingan dan Konseling di Sekolah dan Madrasah Berbasis Integrasi. Jakarta: Rajawali Press.
12. Prayitno. 2004. Layanan Bimbingan dan Konseling (L4). Jurusan Bimbingan dan Konseling Fakultas Ilmu Pendidikan Universitas
Padang.
Authors: Priya R. Swaminarayan, Ronak Panchal
Semantic Web Enabled GUI SPARQL CRUD operation on VPS with Integration of Apache Jena
Paper Title:
Fuseki Server
Abstract: The most important affecting factors to World economy include knowledge, proficiency and
inventiveness of people. Education is allied with improved skills, and better human capacity to progress the
quality of life. The development of country depends on the status of higher education in country. Every year,
MHRD, India collects details about Higher Education from universities using AISHE Portal to plan National
Policy on Education but in the existing AISHE system, user interface is not provided to the users; they are
downloading PDF file from Portal and then after entering necessary details in PDF file offline they upload PDF
file on portal. Here we have implemented Semantic Web Enabled System on Apache Jena Fuseki Server using
Virtual Private Server (VPS). Researchers provide knowledge based AISHE user friendly system with GUI
interface & implemented CRUD operation on VPS. Proposed AISHE system provides benefits of SW such as
machine understandability, reusability, interoperability, inference of new knowledge, reduces development time
etc; as Ontology is used for development.

Keywords: Semantic Web, AISHE, Virtual Private Server, Apache Jena Fuseki Server, CRUD Operations.

234. References:
1358-
1. MHRD. (2018). AISHE_home. Delhi: NIC. Retrieved from http://aishe.nic.in/aishe/home 136
2. AISHE_MHRD_Wikipedia. (2011). All India Survey of Higher Education - Wikipedia. wikipedia. Retrievedfrom 3
https://en.wikipedia.org/wiki/All_India_Survey_ of_Higher_Education
3. SWAMINARAYANA PRIYA RAMESHBHAI (2012) “Study of an University System and its Ontology Development from the
Semantic Web perspective” retrieved from http://hdl.handle.net/10603/39524
4. protegewiki.stanford.edu/wiki/Main_Page. (2015). Protege Wiki. USA: wiki. Retrieved from http://protegewiki.stanford.edu/wiki/
5. Prof. Ronak Panchal, Dr.Priya R.Swaminarayan (2017) “Execution of SPARQL Query using Apache Jena Fuseki Server in AISHE
Domain”, International Journal of Advance Engineering and Research Development Volume 4, Issue 9, September -2017
6. Stanford University. (2009). Protege - Semantic Web Standards. Http://Protege.Stanford.Edu/. Retrieved from
https://www.w3.org/2001/sw/wiki/Protege
7. Humfrey, N. (2018). EasyRdf - RDF Library for PHP. Retrieved from http://www.easyrdf.org/
8. SSH_Wikipedia. (2018). Secure Shell. Wikipedia.Org. Retrieved from http://en.wikipedia.org/wiki/Secure_Shell
9. StackOverflow. (2018). Downloading Java JDK on Linux via wget is shown license page instead-Stack Overflow
10. LAMP_setup_on_VPS. (2018). How to setup a web server on a virtual private server — Veesp. Retrieved from
https://veesp.com/en/blog/how- to-setup-web-server-on-virtual-server
11. Apache_Software_Foundation. (2018). Apache Jena - Security in Fuseki2.
12. Kaye, R. (2016). Fuseki Server Installation. Drug Disease Model Resources, 1(1.0), 1–11. Retrieved from
http://www.ddmore.eu/sites/ddmore/files/Fuseki_Server_Installation_0.pdf
13. Apache_Jena_Feseki. (2018). Apache Jena - Fuseki_ serving RDF data over HTTP.
14. Anandavala. (2013). Simple example of manipulating graph data using SPARQL Update_ anandavala. Retrieved from
https://anandavala.wordpress.com/2013/06/02/s parql-update-example-code-for-create-insert- delete-edit/

Authors: Sachin S. Ingole, Satish G. Bahaley, Sumit S. Kalmegh, Sumit S. Jamkar


“Qualitative Analysis to Assess the Best Renewable Energy Scenario for Sustainable Energy
Paper Title:
Planning”
Abstract: Rural population in developing nation is having limited access to the clean and modern energy
sources. Rural poor in India are mostly dependent on electricity, fire wood, dung, and biomass for their domestic
energy need. Due to the dependence on conventional energy sources pollution and rural health are the issue of
concern which directly affect on the national productivity. Ministry of New and Renewable Energy of the
Government of India giving stress to intensify the energy supply and modern sources of energy to rural area up
to normal consumption level through renewable energy sources The aim of the present study is to determine the
best renewable energy scenario for sustainable development of rural area. For this aim, author used both
quantitative and qualitative analysis technique to determine the best energy scenario for application. For
quantitative analysis multi objective goal programming model is used and the result obtained by it validated with
multi-attribute decision making approach. The present work specifically focused on Analytic Hierarchy Process
(AHP) methodology. In the proposed method, the weights of the selection criteria are determined by pair-wise
comparison matrices of the AHP. Results indicate that Cost Employment Generation Scenario (CEGS) is the
most appropriate renewable energy option.

Keywords: AHP; Multi-Criteria Decision Making, Renewable Energy; Sustainable Energy Planning; Scenario.

References:
1364-
235. 1. Ozgur, M.A., (2013) “Review of Turkey’s Renewable Energy Potential, Renewable Energy”, Vol. 33, pp. 2345-2356. 137
2. Zadeh, L. (1965), Fuzzy sets, Information Control, 8, 338-353. 0
3. Mahdi Saeedpoor, Amin Vafadarnikjoo, (2010) “Multi-criteria renewable energy planning using an integrated fuzzy VIKOR & AHP
methodology the case of Istanbul”, Energy. 35(6), pp: 2517-2527
4. Evangelos Triantaphyllou et al. (1998) “Multi-criteria decision making: an operations research approach” Journal Encyclopedia of
electrical and electronics engineering Volume 15 pp: 175-186
5. J. P. Huang et al., (1995) “Decision Analysis in Energy & Environment Modeling”. Energy (20) 9, pp. 843-855
6. Zhu and Chow, (1997) A review of Emerging Technique on Generation Expansion Planning [j] IEEE Trans on Power Systems, 12
(4), pp: 1722-1788.
7. T. L. Saaty. The Analytic Hierarchy Process, Planning, Piority Setting, Resource Allocation. USA: McGraw-Hill International Book
Company, New York, 1980.
8. Saaty, T .L. & Kearns K. (1985) Analytical Planning; The Organization of Systems, Oxford: Pergamon Press.
9. Samir J. Deshmukh et. al. (2014) “DSS for rural domestic energy planning – case study of a block in central India” International
Journal of Energy Sector Management Vol. 8 No. 1, 2014 pp. 27-55
10. United Nations Department of Economic and Social Affairs (UNDESA) Division for Sustainable Development: Energy Indicators for
Sustainable Development: Country Studies on Brazil, Cuba, Lithuania, Mexico, Russian Federation, Slovakia and Thailand, (2007),
http://www.un.org/esa/sustdev/publications/energy_indicators (11.02.2013).
11. Soma, K., (2003) How to involve stakeholders in fisheries management—a country case study in Trinidad and Tobago. Marine Policy,
27, pp: 47-58.
12. Habibe Yelda Şener., (2014) “ Determining New Markets Using Analytic Hierarchy Process: Case Study in Güral Porcelain,”
International Journal of Marketing Studies; Vol. 6, No. 5;
13. Kaya, T. and Kahraman C. (2010), Multi-criteria renewable energy planning using an integrated fuzzy VIKOR & AHP methodology:
The case of Istanbul, Energy 35, 2517-2527.
Authors: Hamdan Abderrahim, Maria Mouden, Chaouch Abdelaziz

Paper Title: Physicochemical Quality of the water Table of Temara the Salted Rabat Region Kenitra, Morocco
Abstract: Water is a vital element for the development and maintenance of life on our planet, for which it is
necessary to preserve and ensure the continual persistence of water, not only to provide man with a sufficient
quantity for these needs but to assure him an ir upright quality of this water. The main objective of this work is
to evaluate the physicochemical quality of the water of the Temara water and the comparison of this quality with
Moroccan and international standards. Physico-chemical analyzes showed true variations in the different
parameters studied, related to the impact of agricultural activities. The physicochemical characterization of the
samples revealed a pH close to neutrality and relatively high salt contents. The chloride content was between
14.20 and 958.5 mg / l. For nitrate and nitrite load varies and 0.5 mg/L and 5.7 mg / L. These parameters of
pollution were relatively high , compared to the average concentrations usually met for Moroccan drinking .The
results obtained clearly exceed the standards of WHO (World Health Organization). Effluents therefore
constitute a health risk. In conclusion, the pretreatment of these waters is strongly recommended.
236.
1371-
Keywords: Groundwater - Water pollution - Physico-chemical Characteristics-Morocco. 137
4
References:

1. Habets, F., Ducrocq, V., & Noilhan, J. (2005). Prévisions hydrologiques et échelles spatiales : l’exemple des modèles opérationnels de
Météo-France. Comptes Rendus Geoscience, 337(1-2), 181–192.doi:10.1016/j.crte.2004.08.009
2. BOULAL M. (2002). Recherches phréatobiologiques dans le Souss et les régions voisines du Maroc occidental : Qualité de l’eau,
Biodiversité, Écologie et Biogéographie Historique des espèces stygobies. Thèse de doctorat d’État, Université Cadi Ayyad, Fac. Sci.
Semlalia, Marrakech, 443p.
3. Akchour. Physicochemical quality of drinking water and the solubility of certain drugs used in poultry. Veterinary doctoral thesis IAV
Hassan II. Rabat (Morocco), 2003, p. 173.
4. L.G Bellucci, M. Frignani, D. Paolucci , M. Ravanelli. The distribution of heavy metals in sediments of the Venice Lagoon: the role
of the industrial area. Science of the total Environment, 2002, 295 (1-3), 35-49.
5. D. Bengoumi, R. EL Moustaine , A. Chahlaoui. Variation of groundwater quality in poultry farming using cluster and multivariate
factor analysis: a case study from middle atlas area, Morocco. International Journal of Biosciences (IJB), 2014, 3 (11), 1-8.
6. S. Bricha , 2007. Study of the physicochemical and bacteriological quality of the water table M ' nasra (Morocco). Africa Science
Review, 2007, 3 (3), 391-404.
7. D. Belghiti, A. Chahlaoui, D. Bengoumi, R. EL Moustaine. Effect of climatic and anthropic conditions on the variation of the water
quality of certain wells in rural areas, the case of the water table of the Meknes plateau (Morocco). Science Lib Editions Mersenne.
2013, 5, 2111-4706.
8. Mina Elmarkhi, Sanae Sadek, Khadija Elkharrim, Fatima Benelharkati, and Driss Belghyti, The impact of leachate on well water (city
dump of Kenitra, Morocco). International Journal of Innovation and Applied Studies ISSN 2028-9324 Vol. 8 No. 2 Sep. 2014, pp. 705-
716 © 2014 Innovative Space of Scientific Research Journals http://www.ijias.issr-journals.org/.
9. J. Burkholde, D. Anderson, W. Cochlan, W. Dennison, Q. Dortch , C. Gobler , C. Heil, E. Humphries, A. Lewitus, R. Magnien , H.
Marshall , K. Sellner , D. Stockwell , D. Stoecker , M. Suddleson. Eutrophication and harmful algal blooms:
a scientific consensus. Harmful Algae. 2007, 8, 3-13.
10. A. Carter and R. E. Snee. Drinking water quality for poultry. PS and T Guide No. 42, Poultry Science Extension, North Carolina State
University, Raleigh, NC. 1987
11. D. Chapman , V. Kimstach. Selection of water quality variables. water quality assessments: a guide to the use of biota, sediments and
water in environment monitoring, Chapman edition, 2nd ed. E & FN Spon , London , 1996, pp.59-126.
12. J. Chen, D. Belnave. The impact of drinking water Containing sodium chloride is performance and eggshell quality of a modern,
colored layer strain. 2001 Poultry Science Association Inc. Oxford Journals , Science and Mathematics Poultry Science. 2001, 80
(1). 91-94.
13. Coulibal, Water quality and use of veterinary drugs in poultry farming. Veterinary doctoral thesis IAV Hassan II. Rabat. Morocco,
2000, pp. 91.
14. A. Czarnowski, B. Musielak. Observations on toxicity of nitrates and nitrites for broiler fowl. Medycina waterynaryjna , 1973, 29 (10),
p : 617-619.
15. Fulbert and Alexandre. Water: a global approach to catchment at the watering place. Inter professional Meetings of Avian
Pathology. Rennes June 2008, 12, 83
16. HCEFLCD. is the national entity responsible for developing and implementing government policy on sustainable forest resource
development. 2006,
17. E. Humbert, P. Pommier. L'eau, La qualité de l'eau en aviculture. Revue du Syndicat National des Vétérinaires Inspecteurs du
Ministère de l`Agriculture français, 1988, (100 à103): 369-374.
18. Itavi (AVIculture Technical Institute, 2006. Factors influencing the bacteriological quality of water in turkey farming, 2006 study
19. E.H. Jaster, I. D. Schuh, T.N. Wegner. Physiological effects of saline drinking water on high producing dairy cows. Journal of
Dairy Science. 1978, 61(1), 66-71.
20. 20-P. Levallois, D. Phaneuf. Utilities and limitations of microbiological indicators of drinking water quality. In Indoor Air and
Drinking Water, under the direction of Pierre Lajoie and Patrick Levallois, Presses de l'Université Laval, 1994, pp. 179-193.
21. E. Lichtenberg, L.K. Shapiro. Agriculture and nitrate concentrations in Maryland wells community water system wells. Journal of
Environmental Quality Abstract 1997, 26 ( 1), 145-153.
22. Levallois P., Phaneuf D., 1994, La contamination de l’eau potable par les nitrates : analyse des risques à la santé. Rev. Can. santé
publique, 85, 192-196.
23. 23- A. A. Olkowski. The quality of livestock watering water ; Field Guide for Cattle, Horses, Poultry and Pigs. Andrew
A. Olkowski, Ph.D., DVM, MSc, B.Sc. (Biochemistry), University of Saskatchewan, CANADA, ISBN 978-1-100-12443-8, Cat. No .:
A22-483 / 2009 E , First Edition: May 2009 .
24. 24- Aissata Boubakar Hassane. AQUIFERES SUPERFICIELS ET PROFONDS ET POLLUTION URBAINE EN AFRIQUE : Cas
de la communauté urbaine de Niamey (NIGER). Hydrologie. Université Abdou Moumouni, 2010. Français.
25. 25- D. Belghiti, A. Chahlaoui, D. Bengoumi, R. EL Moustaine. Study of the physico quality, chemical and bacteriological
groundwater of the plio- quaternary aquifer in the region of Meknes (Morocco). Larhyss Journal, 2013, 14, 21-36.
26. 26- D. Venne biosecurity : water quality and importance of biofilm control on chick performance. Bulletin
Académie Vétérinaire France. 2009, 162 (3), 23-26.
27. 27- M. Virgilio, N. Baroncini, C. Trombini, M. Abbiati. Relationships between sediments and tissue contamination and allozymic
patterns in Hediste diversicolor (Polychaeta Nereididae) in the Pialassa lagoons (north Adriatic Sea). Oceanogica Acta , 2003, 26 (1),
85-92.
28. 28- T.S. Whiting, L.D. Andrews, L. Stamps. Effects of sodium bicarbonate and potassium chloride drinking water supplementation.
Performance and exterior carcass quality of broilers grown under thermoneutral or cyclic heat-stress conditions. Poultry Science,
1991, 70, 53-59.

Authors: Ganesh H.Wani, D.K.Shedge

Paper Title: Design and Development of Microcontroller Based Multilevel Inverter


Abstract: Now a day mostly we produce power from non conventional energy sources and power hassle
increases day by day. To diminish this power demand we need to emphasize power infusion methods. Multi-
level inverter is accommodating to infuse power from distinct renewable sources like solar, wind-power. It
generates the alternating output level of voltage from different DC level sources. This inverter uses ‘m’ H-
bridges and several DC sources to obtain (2m+1) level of output voltage. This paper focuses on improvement of
quality of desired output voltage waveforms with less number of switching devices.

Keywords: Cascade H-bridge Multi-level Inverter (CHBMLI), Total harmonic Distortion (THD), Pulse Width
Modulation (PWM).
237.
References: 1375-
137
1. Wahyn Mulyo Utomo, Afarulrazi abu Bakar, Suhaila Alias "Modeling of A Single Phase 7-Level Cascaded H-Bbridge Multilevel 8
Inverter",(2.6) 2018 327-330 International Journal of Engineering & Technology
2. J. I. Leon, S. Vazquez, S. Kouro, L. G. Franquelo, J. M. Carrasco, and J. Rodriguez, “Unidimensional Modulation Technique for
Cascaded Multilevel Converters,” IEEE Transactions on Industrial Electronics, vol. 56, no. 8, pp. 981–2986, Aug. 2009
3. V.S. Kirthika Devi, and S. G. Srivani. "Performance assessment of PV energy conversion system with Buck-Boost and Cuk converter
for cascaded H-Bridge inverter." 2016 Biennial International Conference on Power and Energy Systems: Towards Sustainable Energy
(PESTSE). IEEE, 2016.
4. V.S.Kirthika Devi,Dr.S.G.Srivani Iyengar ‘‘A New PWM Technique For symmetric and Asymmetric Seven Level Multilevel Inverter
Topology with reduced number of DC sources’’ International Journal of Applied Engineering Research(IJAER),ISSN 0973-4562
Volume 10, Number 9, pp. 22299-22311, June (2015).
5. S. Mekhilef, M. N. Abdul Kadir, and Z. Salam, “Digital control of three phase three-stage hybrid multilevel inverter,” IEEE Trans. Ind.
Informat., vol. 9, no. 2, pp. 719–727, May 2013.
6. K. Ding, K.W. E. Cheng, and Y. P. Zou, “Analysis, of an asymmetric modulation methods for cascaded multilevel inverters,” IET
Power Electron.,vol. 5, no. 1, pp. 74–85, Jan. 2012.
Authors: Jyoti Rana, Gyanendra Goindi, Navneet Kaur

Paper Title: Potential of Cellulose Acetate for the Removal of Methylene Blue Dye from Aqueous Streams
Abstract: In present study adsorption behavior of Cellulose Acetate for removal of Methylene blue has been
studied in a batch wise mode. Adsorption experiments were conducted using 100 ml of dye solution (10ppm),
pH (2-9) and adsorbent dose (0.5-2.0 g) at 150 rpm at 25oC. Rate of decolonization was estimated from residual
concentration spectrophotometrically. The experimental results indicated that cellulose Acetate can effectively
remove 60% dye from aqueous streams. The high decolorizing efficiency was obtained with 1.0 g/l of adsorbent
dose. Cellulose Acetate was characterized by using FTIR Fourier transform infrared spectroscopy analysis and
SEM Scanning electron microscopy analysis.

Keywords: Cellulose Acetate, Methylene Blue, Adsorption, Adsorption isotherms.

References:

1. Padhi, B.S., 2012. Pollution due to synthetic dyes toxicity & carcinogenicity studies and remediation. International Journal of
Environmental Sciences, 3(3), p.940.
2. Terinte, N., Manda, B.M.K., Taylor, J., Schuster, K.C. and Patel, M.K., 2014. Environmental assessment of coloured fabrics and
opportunities for value creation: spin-dyeing versus conventional dyeing of modal fabrics. Journal of cleaner production, 72, pp.127-
138.
3. Anliker, R., Duerig, G., Steinle, D. and Moriconi, E.J., 1988. List of colorants to be classified as toxic. Journal of the Society of Dyers
and Colourists, 104(5‐6), pp.223-225.
4. Ghosh, D., & Bhattacharyya, K. G. (2002). Adsorption of methylene blue on kaolinite. Applied Clay Science, 20(6), 295–300.
5. Lee, J.W., Choi, S.P., Thiruvenkatachari, R., Shim, W.G. and Moon, H., 2006. Evaluation of the performance of adsorption and
238. coagulation processes for the maximum removal of reactive dyes. Dyes and pigments, 69(3), pp.196-203. 1379-
6. Malik, P.K. and Saha, S.K., 2003. Oxidation of direct dyes with hydrogen peroxide using ferrous ion as catalyst. Separation and
purification technology, 31(3), pp.241-250. 138
7. Koch, M., Yediler, A., Lienert, D., Insel, G. and Kettrup, A., 2002. Ozonation of hydrolyzed azo dye reactive yellow 84 (CI). 2
Chemosphere, 46(1), pp.109-113.
8. Pearce, C.I., Lloyd, J.R. and Guthrie, J.T., 2003. The removal of colour from textile wastewater using whole bacterial cells: a review.
Dyes and pigments, 58(3), pp.179-196.
9. Fu, Y. and Viraraghavan, T., 2002. Removal of Congo Red from an aqueous solution by fungus Aspergillus niger. Advances in
Environmental Research, 7(1), pp.239-247.
10. Wong, Y. C., Ranjini, K. N., and Wan-Nurdiyana, W. A., 2014. Removal of Congo Red and Acid Yellow 36 Dye Using Orange Peel
and Rice Husk as Absorbent. Oriental Journal of Chemistry, 30(2), 529-539..
11. Gupta, V.K. and Imran, A., 2015. Water treatment: low-cost alternatives to carbon adsorbents. In Encyclopedia of Surface and Colloid
Science (pp. 7618-7652). CRC Press.
12. Crini, G. (2006). Non-conventional low-cost adsorbents for dye removal: a review. Bioresource technology, 97(9), 1061-1085.
13. Bhatnagar, A., Hogland, W., Marques, M. and Sillanpää, M., 2013. An overview of the modification methods of activated carbon for
its water treatment applications. Chemical Engineering Journal, 219, pp.499-511.
14. Choy KKH, McKay G, Porter JF (1999) Sorption of acid dyes from effluents using activated carbon. Resour Conserv Recycl 27:57–71
15. Hubbe, M.A., Hasan, S.H. and Ducoste, J.J., 2011. Cellulosic substrates for removal of pollutants from aqueous systems: A review. 1.
Metals. BioResources, 6(2), pp.2161-2287.
16. Vakili, M., Rafatullah, M., Salamatinia, B., Abdullah, A.Z., Ibrahim, M.H., Tan, K.B., Gholami, Z. and Amouzgar, P., 2014.
Application of chitosan and its derivatives as adsorbents for dye removal from water and wastewater: A review. Carbohydrate
polymers, 113, pp.115-130.
17. Hokkanen, S., Bhatnagar, A. and Sillanpää, M., 2016. A review on modification methods to cellulose-based adsorbents to improve
adsorption capacity. Water research, 91, pp.156-173.
18. Batmaz, R., Mohammed, N., Zaman, M., Minhas, G., Berry, R.M. and Tam, K.C., 2014. Cellulose nanocrystals as promising
adsorbents for the removal of cationic dyes. Cellulose, 21(3), pp.1655-1665.
19. Kanagaraj, P., Nagendran, A., Rana, D. and Matsuura, T., 2016. Separation of macromolecular proteins and removal of humic acid by
cellulose acetate modified UF membranes. International journal of biological macromolecules, 89, pp.81-88.

Authors: T. Niruban Projoth, R. Rohith Renish, K. Arun Kumar, P. Jeyaraman

Paper Title: Application of Lean Concepts in Process Industry


Abstract: In any process industry, there will be a chance to increase the efficiency of the process. There is a
less possibility of achieving complete efficiency in any system but there are certain concepts to make it possible.
One such concept is lean manufacturing. In this paper, bakery is taken as the industry and its process is studied.
It has been analyzed that there are certain possibilities to make the process efficient. For that, the concept 5s, a
Japanese concept is been implemented in the bakery and the efficiency of the process is increased. Also, process
flow chart and Two handed process chart is has been worked out for the system and thus the productivity of the
bakery is increased by eliminating the wastes.
239.
Keywords: Lean, six sigma, 5s, process chart, two handed process chart, process industry, bakery, efficiency, 1383-
productivity. 138
6
References:

1. R. Forrester, “Implications of lean manufacturing for human resource strategy”, Work Study, Vol. 44, No. 3, pp. 20-24, 1995.
2. P. Dennis, “Lean Production Simplified”, Taylor & Francis, Inc., 2002.
3. D. Lathin, “Learning from mistakes”, Quality Progress, Vol. 34, No. 6, pp.30-45, 2001.
4. N. Gaither, “Production and Operations Management”, sixth edition, The Dryden Press, Orlando, New York, 1994.
5. H. J. Harrington, “The complete benchmarking implementation guide: total benchmarking management”, New York : McGraw-Hill,
1996.
6. Womack and Jones, “The Machine that Changed the World: The Story of Lean Production”, MIT Press, 1996.
7. L. Wilson, “How to Implement Lean Manufacturing”, New York: McGraw-Hill Professional Publishing, pp. 29- 214, 2009.
8. A. M. Nash, S. R. Poling, and S. Ward, “Using Lean for Faster Six Sigma”, 2006.
9. M. Holweg, “The genealogy of Lean production”, Journal of Operations Management, Vol. 25, No.2, pp. 420-437, 2007.
10. M. W. Fled, “Lean Manufacturing: Tools, Techniques, and how to use them”, Boca Raton, London: The St. Lucie Press, 2000.
11. T. Mintz, “Lean Manufacturing: Processing Buzzword or Operational Lifesaver?” Engineered Wood Journal, Vol. 6, No.1, pp. 12-15,
2003.
12. M. Rother, and J. Shook, “Learning to See: value-stream mapping to create value and eliminate muda. Brookline”, MA: Lean
Enterprise Institute, 2003. ISBN 0-9667843-0-8 .

Authors: Minakshee R. Shinde , Umesh S.Chavan, Kishor P. Deshmukh

Paper Title: Failure Analysis of Strap Joint


Abstract: In Exhaust after treatment system strap joint is used for mounting sensor table on which DP, NOx,
EGTS, PIN sensors are mounted. While, assembling the sensor table on exhaust system using strap joint
multiple issues raised. In which, Strap Bolt Loosening Issue during Vibration Test, Plastic Deformation of Heat
shield (outer body) and Bottoming Out of the strap. Under Strap contact area plastic deformation of heat shield
is due to increasing contact pressure so that needs to check the recommended value of torque to avoid failures.
The basic design assembly of straps consists of T bolt, nut, and trunnion with the strap. In this paper analysis and
calculations for torque and parameters affecting the system function have been done to minimize the issues. To
reduce plastic deformation internal stand support provided which increase the stiffness of heat shield and
observed results showing Bridge strap design concept can be helpful to avoid localized plastic deformation near
T-bolt. Calculations at assembly load showing maximum stress and contact pressure near the T bolt. Also effect
of inertia load described to check slippage of the strap and after treatment system.
240. Keywords: Strap joint; Sensor table, after treatment system, FEA, Distortion, Heat shield. 1387-
139
References: 2
1. Julian A. Imes, John T. Herman, James P. Shields, “Exhaust system clamp” United States Patent, US 6,305,054 B1, Oct. 23, 2001.
2. K Shoghi*, H V Rao and S M Barrans, “Stress in flat section band clamp” Volume: 217 issue: 7, page(s): 821-830, Issue
published: July 1, 2003
3. John s. Fristkey, Nilola A. Antonelli, “Band clamp” United States Patent, US 9,032, 592 B2, May 19, 2015
4. Erwin Schaub, “T- Bolt hose clamp” United States Patent, US 6,584,654 B1, Jul. 1, 2003
5. K Shoghi*, H V Rao and S M Barrans, “Plastic deformation in flat-section band clamps” Issue published: October 22, 2004
6. Alexander Shchukin1, Petr Zabirokhin2, Frank Barutzki3, “Steel pipe clamps – stress and friction capacity analysis” Division III,
Paper ID 552
7. Transactions, SMiRT-23 Manchester, United Kingdom - August 10-14, 2015
8. Z.Y. Qin, S.Z. Yan, F.L. Chu, “Analytical modeling of clamp band joint under external bending moment” Contents lists available at
SciVerse ScienceDirect, Accepted 5 December 2011
9. Dudley D Fuller. 2d. Coefficient of friction, Columbia University
10. https://support.ansys.com/portal/site/AnsysCustomerPortal
11. http://www.engineershandbook.com/Tables/frictioncoefficients.htm

Authors: Bharath Subramani, Deepika SP

Paper Title: A Robust Artificial Intelligence: Smart Indoor Positioning System


Abstract: Over the previous few centuries, technology has converted massively from being a desktop personal
computer to handheld mobile phones, with lower energy consumption of raw computing power. This
computability is now incorporated with other systems as well as isolated to a single device. This paradigm was
first noted in cyber-physical systems with the introduction of cloud services. The evolution of Artificial
Intelligence(AI) with cloud computing and the importance of this field in human life, induce us to make simple
and efficient talkative assistant robot for indoor navigation. The navigation system in outdoor typically rely upon
Global Positioning System (GPS) but the indoor navigation systems have to rely on different technologies, as
GPS signals cannot be received indoors. Thus, several technologies have been proposed and implemented over
the past decade to improve navigation in indoors. But they were costly and less effective. Therefore, we have
proposed a system that assists humans to find their location in a conversational manner. The suggested system
was constructed by introducing the advantages of a personal assistant device, Amazon Alexa, the cloud services
241. of Amazon and its voice services for indoor navigation. A Raspberry Pi 3 Model B is used as the element of the
hardware to provide our system with intelligent characteristics. You can trigger the speech service using the 1393-
"Alexa" keyword. Using the voice command, the skill / application we created can be initiated. It operates a 139
script on the cloud once Alexa is enabled, which runs a subroutine on the Raspberry Pi 3 in-turn to provide a 8
path for that specific place. Once the Raspberry Pi calculation is finished, it sends the message back to Alexa.
Alexa transforms the text into a voice and informs the user path.

Keywords: Artificial Intelligence, Global Positioning System, Raspberry Pi, Voice command.

References:

1. Wong Joanne, Sanna Taking, Nazrin Isa and Kok Chao, Indoor Navigation and Localisation Application System, 2016 3rd International
Conference on Electronic Design (ICED), August 11-12, 2016, Phuket, Thailand,pp:327-331.
2. Seema Rawat, Parv Gupta and Praveen Kumar, Digital Life Assistant using Automated Speech Recognition, International Conference
on Innovative Applications of Computational Intelligence on Power, Energy and Controls with their Impact on
Humanity(CIPECH14),28 & 29 November 2014, Page no: 43-47.
3. Abhiram T.S, Arya A.R, Aswin R.S and Jeena John, Home Automation using Artificial Intelligence, International Journal of Advanced
Scientific Technologies, Engineering and Management Sciences (IJASTEMS), Volume 3, Special Issue 1, April 2017, Page no: 274-
277.
4. Raghvendra Priyam, Rashmi Kumari, and Dr. Prof Videh Kishori Thakur, Artificial Intelligence Applications for Speech Recognition,
Conference on Advances in Communication and Control Systems 2013 (CAC2S 2013), Page No: 473-476.
5. A.Ramya and T.Srihari, Raspberry Pi (Model B) Based Interactive Home Automation System, International Journal of Trend in
Research and Development, Volume 3(1), Page no: 438-440.
6. Jatin Borano, Applications of Artificial Intelligence and Associated Technologies, International Conference on Emerging Technologies
in Engineering, Biomedical and Science (ETEBMS-2016),5-6 March 2016, Page no: 64-67.

Authors: Lavanya Devi. N, P.Thirumurugan


Paper Title: Automated Detection of Cervical Cancer
Abstract: Cervical Cancer is an abnormal growth in the cervix - the lower part of the uterus which joins to the
vagina. Human Papilloma Virus (HPV) is identified as the main cause for cervical cancer. Cervical cancer is
the second most deadly disease among women next to breast cancer in developing countries. However, it is
considered to be the most preventable female cancer if identified at an early stage. The cancerous cells may
spread to other parts of the body if not identified at an early stage. Pap Smear test and acetic acid test are usually
done for cancer screening. In pap test cells are taken from the vagina and cervix and are examined under a
microscope for the presence of an abnormal cell. In acetic acid test, the change in features after and before the
application of acetic acid is analyzed to find the existence of abnormal cell. Automated screening is becoming
most common than manual screening because the latter is erroneous. This paper surveys the different automated
methods available for screening the abnormal cells in pap images.

Keywords: Human Papilloma Virus (HPV), Pap Smear test, vagina, cervix.

References:

1. Jun Liu, Yun Peng, and Yingchun Zhang, “ A Fuzzy Reasoning Model for Cervical Intraepithelial Neoplasia Classification using
Temporal Grayscale Change and Textures of Cervical Images during Acetic Acid Tests “, Published by IEEE, 2019, Vol.7, pp. 13536 -
13536.
2. Yiming Liu, Pengcheng Zhang, Qingche Song, Andi Li, Peng Zhang and Zhiguo Gui, “Automatic Segmentation of Cervical Nuclei
Based on Deep Learning and a Conditional Random Field”, IEEE 2018, Vol.6,pp.53709-53721.
242. 3. Afaf Tareef , Yang Song, Heng Huang, Dagan Feng, Mei Chen, Yue Wang and Weidong Cai, Member, “Multi-Pass Fast Watershed
for Accurate Segmentation of Overlapping Cervical Cells’, IEEE Transactions on Medical Imaging, Vol. 37, no. 9, 2018,pp. 2044-
1399-
2059. 140
4. Jie Song, Liang Xiao and Zhichao Lian, “Contour-Seed Pairs Learning-Based Framework for Simultaneously Detecting and 1
Segmenting Various Overlapping Cells/Nuclei in Microscopy Images”, IEEE Transactions on image processing, Vol. 27, no. 12, 2018,
pp. 5759-5774.
5. Mithlesh Arya, Namita Mittal, Girdhari Singh, “Texture-based feature extraction of smear images for the detection of cervical cancer”,
IET Research Journal, to be published, doi: 10.1049/iet-cvi.2018.5349
6. Bastien Rigaud et al., “Statistical shape model to generate a planning library for cervical adaptive radiotherapy”, IEEE Transactions on
Medical Imaging, to be published, doi: 10.1109/TMI.2018.2865547
7. Kelwin Fernandes, “Automated Methods for the Decision Support of Cervical Cancer Screening Using Digital Colposcopies”, IEEE, to
be published, doi: 10.1109/ACCESS.2018.2839338
8. Mercy Nyamewaa Asiedu et al., “Development of Algorithms for Automated Detection of Cervical Pre-Cancers With a Low-Cost,
Point-of-Care, Pocket Colposcope”, IEEE Transactions on Biomedical Engineering, Vol. 66, no. 8, 2019, pp.2306-2318.
9. Sherif fayz, Mohamed Abo rizka and Fahima Maghraby , “ Cervical Cancer Diagnosis using Random Forest Classifier with SMOTE
and Feature Reduction Techniques”, IEEE, to be published, doi: 10.1109/ACCESS.2018.2874063.
10. Qi Zhang, Yue Liu, Hong Han, Jun Shi1, Wenping Wang, “ Artificial intelligence based diagnosis for cervical lymph node malignancy
using the point-wise gated Boltzmann machine”, IEEE, to be published, doi:10.1109/ACCESS.2018.2873043
11. Chen Li et al., “Cervical Histopathology Image Classification Using Multilayer Hidden Conditional RandomFields and Weakly
Supervised Learning”,IEEE 2019, Vol.7,pp. 90378-90397.
12. Nesrine Bnouni, Islem Rekik, Mohamed Salah Rhim, and Najoua Essoukri Ben Amara, “Cross-View Self-Similarity Using Shared
Dictionary Learning for Cervical Cancer Staging”, IEEE, to be published, doi: 10.1109/ACCESS.2019.2902654
13. Magudeeswaran Veluchamy, Karthikeyan Perumal, Thirumurugan Ponuchamy, “Feature extraction and classification of blood cells
using artificial neural network”, American journal of applied sciences, 2012,Vol.9,pp.615.
14. P. Thirumurugan and P. Shanthakumar, “Brain tumor detection and diagnosis using ANFIS classifier”, International Journal of
Imaging Systems and Technology, 2016, Vol.26, pp.157-162.
15. N.Lavanya Devi, SP.Priya and K.Krishanthana,” Performance Analysis of Face Matching and Retrieval in Forensic Applications “,
International Journal of Advanced Electrical and Electronics Engineering. pp no.100-104,Vol-2,Issue-2,2013.

Authors: T.Muthukumari, P.Selvaraj, L.Pattathu rani, Prajith Prabhakar

Paper Title: Design of Z Source Inverter based VSWECS with Improved PWM Control
Abstract: With rapid development in Wind Energy Conversion Systems (WECS), various methods have been
used to increase power generation from wind. In order to reach voltage gain as maximum in a variable speed
WECS, an improved PWM method through varying shoot through time for Impedance source inverter is
implemented in this paper. For a given modulation index, the correlation of voltage gain with capacitor voltage,
243. and the device stress are analyzed in detail. For ‘various shoot through time ,the simulation results of voltage
1402-
across capacitor, current through inductor ,output current and output voltage are obtained by using Simpower
140
system tool in MATLAB/ Simulink and compared. The results have been confirmed for the developed
7
experimental model.

Keywords: Z source inverter, wind Energy conversion systems, voltage Boost, Pulse width Modulations.

References:
1. F. Z. Peng, “Z-Source Inverter,” IEEE Transactions on Industrial Applications, vol. 39, no. 2, pp. 504–510, 2003.
2. F. Z. Peng, M. Shen, and Z. Qian, “Maximum Boost Control of the Z-Source Inverter,” IEEE Transactions Power Electronics., vol. 20,
no. 4, pp. 833–838, Jul. 2005.
3. S. M. Dehghan, M. Mohamadian, and A. Y. Varjani, “A New Variable-Speed Wind Energy Conversion System Using Permanent-
Magnet Synchronous Generator and Z-Source Inverter,” IEEE Transactions on Energy Conversion, vol. 24, no. 3, pp. 714–724, Sep.
2009.
4. Miaosen Shen, Jin Wang, A. Joseph, Fang Zheng Peng, L. M. Tolbert, and D. J. Adams, “Constant boost control of the Z-source
inverter to minimize current ripple and voltage stress,” IEEE Transactions on Industrial Applications, vol. 42, no. 3, pp. 770–778, May
2006.
5. F. Z. Peng et al., “Z-Source Inverter for Motor Drives,” IEEE Transactions on Power Electronics, vol. 20, no. 4, pp. 857–863, Jul.
2005.
6. M. Shen, A. Joseph, J. Wang, F. Z. Peng, and D. J. Adams, “Comparison of Traditional Inverters and Z-Source Inverter,” in IEEE 36th
Conference on Power Electronics Specialists, 2005., 2005, pp. 1692–1698.
7. E. Spooner and A. C. Williamson, “Direct coupled, permanent magnet generators for wind turbine applications,” IEE Proc. - Electr.
Power Appl., vol. 143, no. 1, pp. 1–8, 1996.
8. N. Yamamura, M. Ishida, and T. Hori, “A simple wind power generating system with permanent magnet type synchronous generator,”
in Proceedings of the IEEE 1999 International Conference on Power Electronics and Drive Systems. PEDS’99 (Cat. No.99TH8475),
1999, pp. 849–854.
9. Seung-Ho Song, Shin-il Kang, and Nyeon-kun Hahm, “Implementation and control of grid connected AC-DC-AC power converter for
variable speed wind energy conversion system,” in Eighteenth Annual IEEE Applied Power Electronics Conference and Exposition,
2003. APEC ’03, 2003, vol. 1, pp. 154–158.
10. A.M. Knight and G. E. Peters, “Simple Wind Energy Controller for an Expanded Operating Range,” IEEE Transactions on Energy
Conversion, vol. 20, no. 2, pp. 459–466, Jun. 2005.
11. Gajanayake et al, “Z-Source-Inverter-Based Flexible Distributed Generation System Solution for Grid Power Quality Improvement”,
IEEE transactions on energy Conversion, Vol. 24, No. 3, September 2009.
12. Siwakoti et al, “Impedance-Source Networks for Electric Power Conversion Part I: A Topological Review”, IEEE transactions on
power electronics, Vol.30, No.2,February 2015
13. A. Florescu, O. Stocklosa, M. Teodorescu, C. Radoi, D.A. Stoichescu and S. Rosu, “The Advantages, Limitations and Disadvantages of
Z-source inverter”, in IEEE Semiconductor Conference (CAS), vol. 2, 13 Oct. 2010, pp. 483–486.
14. Miaosen Shen, Alan Joseph, Jin Wang, Fang Z. Peng and Donald J. Adams, “Comparison of Traditional inverters and Z-source
inverter”, in IEEE Power Electronics Specialists Conference (PESC), no. 36, 16 June 2005, pp. 1692–1698.
15. Miaosen Shen and Fang Z. Peng, “Operation Modes and Characteristics of the Z-source inverter with Small Inductance”, in IEEE
Conference on Industry Applications, 2005, no. 2, 2-6 Oct. 2005, pp. 1253–1260.
16. PohChaiang Loh, D.Mahinda Vilathgauwa, YueSen Lai Geok Tin Chua and Yunwei Li, “Pulse-Width Modulation of Z-source
inverters”, in IEEE Conference on Industry Applications, vol. 1, no. 39, 3-7 Oct. 2004, pp. 148–155.
17. Jingbo Liu, Jiangang Hu and LongyaXu, “Dynamic Modeling and Analysis of Z Source Converter- Derivation of AC Small Signal
Model and Design-Oriented Analysis” in IEEE Transactions on Power Electronics, vol. 22, no. 5, Sept 2007, pp. 1786–1796.
18. Meera Murali, N. Gopalakrishnan, V.N. Pande, “Z-Sourced Unified Power Flow Controller”, in 6th IET International Conference on
Power Electronics, Machines and Drives, 2012, pp. 1–7.
19. Xinping Ding, Zhaoming Qian, Shuitao Yang, Bin Cui and Fang Z Peng, “A Review of Single-Phase Grid-Connected inverters for
Photovoltaic Modules” in IEEE Transactions on Industry Applications, vol. 41, no. 5, Sept-Oct 2005, pp. 2327–2332.
20. Mostafa Mosa; Haitham Abu-Rub; Jose Rodriguez, "High performance predictive control applied to three phase grid connected Quasi-
Z-Source Inverter", in IEEE Industrial Electronics Society, (IECON 2013) pp. 5812–5817, 10-13 Nov. 2013.
21. MarekAdamowicz, "LCCT-Z-source inverters", in 10th International Conference on Environment and Electrical Engineering (EEEIC),
2011.
22. Yam P. Siwakoti, F. Blaabjerg and P. C. Loh, “New Magnetically Coupled Impedance (Z-) Source Networks,” IEEE Trans. Power
Electronics., DOI: 10.1109/TPEL.2015.2459233, June 2015.
Authors: V. V. Naga Deepthi, K. GovindaRajulu
Optimization of Inlet and Exhaust Manifold on a Single Cylinder Diesel Engine to Enhance the
Paper Title:
Combustion
Abstract: In the internal combustion Diesel engines the most important subsystem is Intake manifold and
Exhaust manifold. In the intake manifold which supplies fresh air –fuel mixture in to the cylinders where
combustion takes place at high temperature and high pressure. After exhaust gases scavenged through valves
from the cylinders, these gases past exhaust manifold an outlet, through which the gases flow into exhaust pipes
from there to the emission control equipment of engine which consists of catalytic and thermal converters. The
development of swirl can be enhanced by re-designing of inlet port of an Engine. There is further development
in the swirl due to combustion process to another maximum part way in to the power stroke. Swirl can promotes
the combustion process in a better way and causes efficiency increase. Better mixing of air – fuel there is a little
bit changing the inlet and exhaust valve. Valve stem diameter is 9.5mm, Inlet valve diameter is 36mm, Exhaust
Valve diameter is 28mm by varying the pitch 1.0mm to 2mm and thread depth of cut as 4mm and three thread
per inch from this arrangement to investigate the performance by enhancing the swirl of air flow to get
244.
betterment in the performance and decrease in emissions in a (DI) direct injection diesel engine with single 1408-
cylinder when compared with normal engine. 141
1
Keywords: Diesel Engine, Inlet Manifold, Exhaust Manifold, Swirl motion.

References:

1. Yuvraj K Lavhale, Prof. Jeevan Salunke ,Overview of failure trend of inlet and exhaust valve.International Journal of Mechanical
Engineering and Technology (IJMET), ISSN 0976 – 6340(Print), ISSN 0976 – 6359(Online), Volume 5, Issue 3, March (2014), pp.
104-113, © IAEME
2. Nurten Vardar, Ahmet Ekerim, “Investigation of Exhaust Valve Failure in Heavy – duty Diesel Engine,” Gazi University Journal of
Science 23(4):493-499 (2010).
3. Ram M S , SASTRA University Design Modification in Engine Exhaust International Journal of Scientific & Engineering Research
Volume 2, Issue 12, December-2011 1 ISSN 2229-5518.
4. Ramalingam K K, “Internal Combustion Engines”, Scitech
5. John B Heywood, “Internal Combustion Engines Fundamentals”, McGraw Hill Book Company.
6. Rajput R K, ”Thermal Engineering”, Laxmi Publications
7. Gary L.Borman& Kenneth W. Ragland, “Combustion Engineering”, McGraw Hill International Editions- Mechanical Series.

Authors: A.Kishore Reddy, Rajesh Banala

Paper Title: Adaptive Traffic Management in Heterogeneous Wireless Networks


Abstract: The adoption of wireless technologies is due to user requirement, small size of devices with
multiple networking interfaces. The current issues which are perform major role of mobility, reassembly,
routing, and security. Consistent mobility is one of the main challenges in the existing and future heterogeneous
wireless networks. Consistent mobility in heterogeneous wireless network needs integration of different network
technologies. Most of currently available communication and computing systems uses more system time for
completing the job. Processing power and time limit for processing a task/query, a system is required that offers
device mobility (BS mobility) and computational mobility as per the requirement of the applications. We have
evaluated the MAC-SF for network selection, traffic management, load balancing, and network delay.
245.
Keywords: MAC-SF, WSN, NS2. 1412-
141
References: 5

1. Abid, A., Hussain, M. heterogeneous sensor networks. 12th International Conference on Network-Based Information Systems, IEEE,
19-21, Aug. pp. 316-320.
2. Ahmed, A., Merghem-Boulahia, L. and Gaiti, D., 2010. Cooperative agent based vertical handover scheme for heterogeneous networks.
Sixth Advanced International Conference on Telecommunications (AICT), IEEE, Barcelona, Spain, 9-15 May, pp. 410-415
3. Ahmed, T., Kyamakya, K. and Ludwig, M., 2006. Design and implementation of a context-aware decision algorithm for heterogeneous
networks. In Proceedings of the 2006 ACM symposium on Applied computing, ACM, 23-27 April, pp. 1134-1138.
4. Akbani, R., Korkmaz, T. and Raju, G.V.S. 2008. HEAP: A packet authentication scheme for mobile ad hoc networks. Ad Hoc
Networks, 6(7):1134-1150.
5. Akyildiz, I.F., Mcnair, J., Ho, J.S., Uzunalioglu, H. and Wang, W., 1999. Mobility management in next-generation wireless systems.
Proceedings of the IEEE, 87(8), pp.1347-1384.
Authors: N. S. Senthur, H. Imamul Hasan, S. Shafquath ibn sulthan, S.Balamurugan, M. Maheshkumar

Paper Title: Experimental on Eucalyptus Oil with Additives Blend as A Fuel for Diesel Engine
Abstract: Oils extracted from vegetables exist as future fuel full or partial alternate diesel fuels. Experiments
have been done on using ethanol and diethyl ether as additives of eucalyptus ester to find out the impact of the
fuel on the release of toxic gas, and engine effectiveness of using fuel directly in the engine without altering.
Varied proportions of eucalyptus composition have been used as fuel. The proportion of the fuel in B20 has 20%
of eucalyptus ester fuel and 80% of diesel,. The second 90% of B20 and 10% mass of ethanol is B20+E10
whereas B20+D10 has 90% of B20 and 10% mass of diethyl ether. Experiments has been carried out using
varied composition of eucalyptus oil to find the impact on the engine feature such as engine power, brake
specific fuel consumption, brake thermal efficiency, exhaust gas temperature, has been determined with the help
of performance tests. The impact on the smoke opacity has also been done to find out the release of toxic gas
such as CO, CO2, HC and NO. The outcome of such tests show that using B20 fuel lessens release 10% of
diethyl specifically release of NO lessens by 51% in contrast to diesel. Mixture of B20+D10 offers enhanced
engine effectiveness and lesser release of toxic gas in contrast to B20+E10 and B20 blends.

Keywords: Green fuel, Eucalyptus oil, Emissions, Ethanol, Diethyl ether.

References:
246.
1416-
1. A.E. Atabani, I.A. Badruddin, H.H. Masjuki, W.T. Chong, T.M.I. Mahlia, K.T. Lee, Investigation of physical and chemical properties
of potential edible and non edible feed stocks for green fuel production, Renewable Sustainable Energy Rev. 21 (2013) 749–755.
141
2. A.M. Ashraful, H.H. Masjuki, M.A. Kalam, I.M. Rijwanul Fattah, S.A. Sahir, H.M. Mobarak, Production and comparison of fuel 9
properties, engine performance and emission characteristics of green fuel from various non edible vegetable oil: a review, Energy
Conserv. Manage. 80 (2014) 202–228.
3. Puhan, S., Vedaraman, N., Ram, B.V.B., Sankarnarayanan, G., Jeychandran, K., 2005. Mahua oil (Madhuca Indica seed oil)
methyl ester as green fuel-preparation and emission characterstics. Biomass Bioenergy 28, 87–93.
4. Raheman, H., Ghadge, S.V., 2007. Performance of compression ignition engine with mahua (Madhuca indica) green fuel. Fuel 86,
2568–2573
5. Saravanan, N., Nagarajan, G., Puhan, S., 2010. Experimental investigation on a DI diesel engine fuelled with Madhuca Indica ester and
diesel blend. Biomass Bioenergy 34, 838–843.
6. Sarin, A., Arora, R., Singh, N.P., Sarin, R., Malhotra, R.K., 2010. Blends of green fuels synthesized from non-edible and edible oils:
Influence on the OS (oxidation stability). Energy 35, 3449–3453.
7. Shahabuddin, M., Kalam, M.A., Masjuki, H.H., Bhuiya, M.M.K., Mofijur, M., 2012. An experimental investigation into green fuel
stability by means of oxidation and property determination. Energy 44, 616–622.
8. Srithar, K., Arun Balasubramanian, K., Pavendan, V., Ashok Kumar, B., 2017. Experimental investigations on mixing of two green
fuels blended with diesel as alternative fuel for diesel engines. J. King Saud Univ. – Eng. Sci. 29, 50–56.
9. G. Karavalakis, S. Stournas, E. Bakeas, Light vehicle regulated and unregulated emissions from different green fuels, Sci. Total
Environ. 407 (2009) 3338–3346.
10. A.M. Liaquat, M.A. Kalam, H.H. Masjuki, M.H. Javed, Potential emissions reduction in road transport sector using biofuel in
developing countries, Atm. En. 44 (2010) 3869–3877.
11. S.A. Basha, K. Raja Gopal, A review of the effects pf catalyst and additive on green fuel production, performance, combustion and
emission characteristics, Renew. Sustain. Energy Rev. 16 (2012) 711–717.

Authors: Shafiya. Shaik, K. Sujatha, M. Kumaresan, V.Srividhya


Paper Title: Histogram Equalization Based Defogging of Fogged Image
Abstract: Foggy images causes contrast loss and color distortion and fog changes the visibility of scene. Fog
removal algorithm used in tracking and navigation, consumer electronics, and entertainment industries. Many
algorithms are proposed for efficient fog removal. Existing defogging methods cannot produce accurate scene
transmission in removable of their unpleasing distortion and it is high complexity. In this paper, fog removal
algorithms/techniques are represented for image processing. The overall objective of this paper is to explore
images from fogged image by using histogram equalization. In the end, the proposed method is tested on several
foggy images.

Keywords: Histogram equalization, colour distortion, defogging.


References:

1. N. Hautiere, J.-P. Tarel, H. Halmaoui, R. Br ` emond, and D. ´ Aubert, “Enhanced fog detection and free-space segmentation for car
navigation,” Machine Vision and Applications, vol. 25, no. 3, pp. 667–679, 2014.
2. H. Liu, J. Yang, Z. Wu, and Q. Zhang, “Fast single image dehazing based on image fusion,” Journal of Electronic Imaging, vol. 24, no.
1, Article ID 013020, 2015.
3. J.-G. Wang, S.-C. Tai, and C.-J. Lin, “Image haze removal using a hybrid of fuzzy inference system and weighted estimation,” Journal
of Electronic Imaging, vol. 24, no. 3, Article ID 033027, pp. 1–14, 2015.
4. Y. Y. Schechner, S. G. Narasimhan, and S. K. Nayar, “Instant dehazing of images using polarization,” in Proceedings of the 2001 IEEE
Computer Society Conference on Computer Vision and Pattern Recognition, pp. I325–I332, December 2001. 1420-
5. Y. Lee, K. B. Gibson, Z. Lee, and T. Q. Nguyen, “Stereo image defogging,” in Proceedings of the IEEE International Conference on 142
247. Image Processing (ICIP ’14), pp. 5427–5431, Paris, France, October 2014. 2
6. S. Arigela and V. K. Asari, “Enhancement of hazy color images using a self-tunable transformation function,” in Advances in Visual
Computing, G. Bebis, R. Boyle, B. Parvin et al., Eds., vol. 8888 of Lecture Notes in Computer Science, pp. 578–587, Springer, New
York, NY, USA, 2014.
7. Q. Liu, M. Y. Chen, and D. H. Zhou, “Single image haze removal via depth-based contrast stretching transform,” Science China
Information Sciences, vol. 58, no. 1, pp. 1–17, 2015.
8. H. K. Ranota and P. Kaur, “A new single image dehazing approach using modified dark channel prior,” Advances in Intelligent
Systems and Computing, vol. 320, pp. 77–85, 2015.
9. Yuk et al., “Visibility imp rove in bad weather from a single image”, I EEE Conference on Computer Vision and Pattern Recognition,
pp. 18, 2013.
10. Tare et al., “Vision enhancement in homo generous and heterogeneous fog Intelligent Transportation Systems”, IEEE Transaction on
Image Processing, vol.4, no.2, pp. 6-20, 2012.
11. Yeh, et al., “ Efficient image/video dehazing through haze density analysis based on pixel-based dark channel International Journal of
Pure and Applied Mathematics Special Issue prior”, IEEE International Conference on Information Security and Intelligence Control,
2012.
12. 12.Tripathi, et al.,“ Single image fog removal using trilateral filter”, I EEE International Conference on Signal Processing, Computing
and Control,2012.
13. Yu, Jing, and Qingmin Liao (2011) Fast single image fog removal using edge-preserving smoothing IEEE International Conference on
Acoustics, Speech and Signal Processing. IEEE.
14. Shiau, Y-H., P-Y. Chen, H-Y. Yang, C-H. Chen, and S-S. Wang (2014)Weighted haze removal method with halo prevention Journal of
Visual Communication and Image Representation 25, no. 2: 445-453
15. Yuk, Jacky Shun-Cho, and Kwan-Yee Kenneth Wong (2013) Adaptive background defogging with foreground decremental
preconditioned conjugate gradient Computer Vision–ACCV 2012. Springer Berlin Heidelberg. 602-614.

Authors: Sai Krishna. Parachoori, K. Sujatha, M. Anand, T. Godhavari, S. Jayalakshmi

Paper Title: Detection of Vehicular Traffic Using Convolutional Neural Networks


Abstract: In present generation the detection of vehicle using aerial images plays an important role and mot
challenging. The video understanding, border security are the applications of aerial images. To improve the
performance of the system different detection methods are introduced. But these methods take more time in
detection process. To overcome these convolutional neural network are introduced which will produce the
successful design system. the main intent of this paper is to present the recognition system for aerial images
using convolutional neural network. The proposed method improves the accuracy and speed after the detection
process. At last aerial image is obtained by matching the image and textual description of classes.

Keywords: vehicle detection; convolutional neural network; aerial image.

248. References:
1423-
1. S. Antol, A. Agrawal, J. Lu, M. Mitchell, D. Batra, C. Lawrence Zitnick, and D. Parikh, “Vqa: Visual question answering,” in 142
Proceedings of the IEEE International Conference on Computer Vision, 2015, pp. 2425– 2433. 6
2. A. Soleimani and N. Nasrabadi, “Convolutional neural networks for aerial multi-label pedestrian detection,” in 21st International
Conference on Information Fusion, 2018.
3. W. Liu, D. Anguelov, D. Erhan, C. Szegedy, S. Reed, C.-Y. Fu, and A. C. Berg, “Ssd: Single shot multibox detector,” in European
conference on computer vision. Springer, 2016, pp. 21–37.
4. N. Dalal and B. Triggs, “Histograms of oriented gradients for human detection,” in Computer Vision and Pattern Recognition, 2005.
CVPR 2005. IEEE Computer Society Conference on, vol. 1. IEEE, 2005, pp. 886–893.
5. D. G. Lowe, “Distinctive image features from scale-invariant keypoints,” International journal of computer vision, vol. 60, no. 2, pp.
91–110, 2004.
6. C. Cortes and V. Vapnik, “Support-vector networks,” Machine learning, vol. 20, no. 3, pp. 273–297, 1995.
7. M. Everingham, L. Van Gool, C. K. Williams, J. Winn, and A. Zisserman, “The pascal visual object classes (voc) challenge,”
International journal of computer vision, vol. 88, no. 2, pp. 303–338, 2010.
8. J. Deng, W. Dong, R. Socher, L.-J. Li, K. Li, and L. Fei-Fei, “Imagenet: A large-scale hierarchical image database,” in Computer
Vision and Pattern Recognition, 2009. CVPR 2009. IEEE Conference on. IEEE, 2009, pp. 248–255.
9. Y. LeCun, L. Bottou, Y. Bengio, and P. Haffner, “Gradient-based learning applied to document recognition,” Proceedings of the IEEE,
vol. 86, no. 11, pp. 2278–2324, 1998.
10. A. Krizhevsky, I. Sutskever, and G. E. Hinton, “Imagenet classification with deep convolutional neural networks,” in Advances in
neural information processing systems, 2012, pp. 1097–1105.
11. R. Girshick, J. Donahue, T. Darrell, and J. Malik, “Rich feature hierarchies for accurate object detection and semantic segmentation,” in
Proceedings of the IEEE conference on computer vision and pattern recognition, 2014, pp. 580–587.
12. J. R. Uijlings, K. E. Van De Sande, T. Gevers, and A. W. Smeulders, “Selective search for object recognition,” International journal of
computer vision, vol. 104, no. 2, pp. 154–171, 2013. R. Girshick, “Fast r-cnn,” in Proceedings of the IEEE international conference on
computer vision, 2015, pp. 1440–1448.
13. S. Ren, K. He, R. Girshick, and J. Sun, “Faster r-cnn: Towards real-time object detection with region proposal networks,” in Advances
in neural information processing systems, 2015, pp. 91–99.
14. J. Redmon, S. Divvala, R. Girshick, and A. Farhadi, “You only look once: Unified, real-time object detection,” in Proceedings of the
IEEE conference on computer vision and pattern recognition, 2016, pp. 779– 788.

Authors: Sugunadevi, K. Jayshree Natchiyar, J. Dhivya, A.S Arshavardhini


Experimental Research on the Behaviour of Concrete Containing Waste Plastic Granules as a Fine
Paper Title:
Aggregate Replacement
Abstract: with the tremendous increase in population and changing lifestyle of people, plastic has inevitably
become a part of human life. In India about 5.6 million tonnes is generated as plastic waste per annum which
leads to 15,342 TPD (tonnes per day). About 70% of plastic consumed is discarded as waste. Plastics have
already started showing its alarming signs such as land pollution, ocean pollution, release of poisonous gases,
soil infertility, immune disorder in birds etc. A prospective appeal to this is usage of plastic granules which are
produced from low density polyethylene and high density polyethylene in concrete as a replacement of fine
aggregate. The aim of this research is to compare the strength characteristics of conventional concrete of grade
M20 with the plastic concrete. A potential application of plastic concrete is pavement base, sub base and
lightweight concrete construction.
249.
Keywords: plastic concrete, granules, aggregate, strength. 1427-
143
References: 0
1. Chien-chung Chen, Nathan Jaffe, Matt Oppitz, Wesley Weimer and Albert Polocoser, “Concrete mixture with plastic as fine aggregate
replacement”, Volume-2, Issue-4, International Journal of Advances in Mechanical and Civil Engineering, ISSN: 2394-2827, 2015.
2. Youcef ghernouti, Bahia Rabehi, Brahim Safi and Rabah Chaid, “Use of recycled plastic bag waste in the concrete”, Volume 8, ISSN
1314-7269 (Online), Published at: http://www.scientific-publications.net, Journal of International Scientific Publications: Materials,
Methods and Technologies.
3. T.Subramani and V.K.Pugal, “Experimental Study On Plastic Waste As A Coarse Aggregate For Structural concrete”, Volume 4, Issue
5, International Journal of Application or Innovation in Engineering & Management, May-2015.
4. Osagie Ibhadode, “ Use of waste plastics in cement based composite for lightweight concrete production”, The research gate.net ,
October -2015.
5. IS:10262-1982. Recommended guidelines for concrete mix design. New Delhi,India: Bureau of Indian Standard.
6. IS:1199-1959. Methods of sampling and analysis of concrete, New Delhi, India: Bureau of Indian Standard.
7. IS 516:1959. Methods of tests for strength of concrete, New Delhi, India: bureau of Indian Standard.

Authors: V.Yogeshwaran, Thamilselvan R.P, Divya Dharshini V.M, Vignathirishaa T.S

Paper Title: Membrane process and Graphene nano-particles in Water treatment


Abstract: The suspended and dissolved particles presented in the water and wastewater in the size of 1-1000
nm which is more toxic and it causes severe effects to the aquatic life and living organisms. Nanotechnology is
the method, which is newly developed in this world, to remove the very tiny particles presents in the water as
well as wastewater with the help of nano-particles. Many nano-particles were used to remove the toxic contents
presented in water and wastewater such as heavy metal concentration, dyes and some of the virus and bacteria
etc. Compared to various nano-materials, Graphene is the type of smart material which is derived from the
graphite, most widely used in all industrial sectors for various purposes. This review paper discussed about the
importance of graphene usage in water and wastewater treatment technologies in recent days.

Keywords: Graphene, Membrane Technology, Water Treatment.

References:
250.
1431-
1. Vivek Dhand, Kyong Yup Rhee, Hyun Ju Kim and Dong Ho Jung. “A comprehensive Review of Graphene Nanocomposites: Research
status and Trends”. Journal of Nanomaterials, 2013, Vol. 06, Pg No 76 - 81
143
2. Md.Sajibul Alam Bhuyan, Md.Nizam Uddin, Md. Maksudul Islam, Ferdaushi Alam Bipasha and Sayed Shafayat Hossain. “Synthesis 5
of Graphene”, International NanoLetter, 2016, Vol. 06, Pg No 65 – 83
3. Avijit Mondal and Nikhil R.Jana. “Graphene nano-particle composites and their applications in Energy, Environmental and Biomedical
Science”. Reviews in Nanoscience and Nanotechnology, 2014, Vol. 03, Pg No. 177 – 192
4. K.C.Khulbe and T.Matsuura. “Removal of Heavy metals and pollutants by membrane adsorption techniques. Applied Water Science
and Technology, 2018. Vol 8; Issue 19
5. Yongchen Liu. “Application of Graphene oxide in wastewater treatment”. Earth and Environmental Science, 2017; Vol. 94
6. Somnath Bharech and Richa Kumar. “A review on the Properties and Applications of Graphene”. Journal of Material Science and
Mechanical Engineering, 2015, Vol.10, Issue 10, Pg No. 70 – 73
7. ShahinHomaeihohar and Mady Elbahri. “Graphhene Membranes for water desalination”. NPG Asia Materials, 2017; Vol. 09
8. Sungin Park and Rodney S.Ruoff. “Chemical methods for the production of Graphenes”. Nature Nanotechnology, 2009; DOI:
10.1038/nnano.2009.58
9. V.Yogeshwaran and A.K.Priya. “Removal of heavy metals using nanoparticles – a review”. Indian Journal of Environmental
Protection, 2019, Vol. 39
10. V.Yogeshwaran and A.K.Priya. “Remval of Hexavalent Chromium (Cr 6+) using natural adsorbents – a review”. Journal of
chromatography and separation techniques, 2018, Vol. 08, Issue 06
11. I.J. El Saliby, H.K. Shon, J.Kandasamy and S.Vigneswaran. “Nanotechnology for wastewater treatment: in brief”. Water and
wastewater treatment technologies
12. Diana Vilea, Jemish Parmar, Yongfei Zeng, Yanli Zhao and Samuel Sanchez. “Graphene based microbots for toxic heavy metal
removal and recovery from water”. Nano letters, 2016, Vol.16, Pg.No 2860 – 2866
13. Na Song, Xueli Gao, Zhun Ma, Xiaojuan Wang, Yi Wei and Congjie Gao. “A review of Graphene – based separation membrane:
Materials, Characteristics, Preparation and applications”. Desalination, 2018, Vol. 437, Pg No. 59 – 72
14. V. Yogeshwaran & A.K.Priya. “Removal of Hexavalent Chromium (Cr 6+) using different natural adsorbents – A review”. Journal of
Chromatography Separation Techniques, Vol. 06, No: 06, 2017
15. V. Yogeshwaran & A.K.Priya. “Removal of Hexavalent chromium by adsorption using natural wastes – A review”. Advances in
Recycling and Waste Management, Vol. 02, No:03, 2017
16. Priya A K, Nagan S, 2017, “Bioremediation of color and COD from dye effluent using indigenous and exogenous microbes”,
Desalination and Water Treatment, Vol 59, pp. 243–247.
17. Priya AK, Nagan S, Nithya M, Priyanka PM and Rajeswari M, 2016, “Assessment of Tendu Leaf Refuses for the HeavyMetal Removal
from Electroplating Effluent”, Journal of Pure and Applied Microbiology Vol.10, no.1, pp. 585-591.
18. Priya AK & Nagan S, 2015, “Remediation of Heavy Metals from Electroplating Effluent using bacterial Strains in Up flow
Immobilized Column Reactor”, Journal of Pure and Applied Microbiology, vol.9, no.2, pp. 1411-1416.
19. Priya AK & Nagan S, 2015, “Bioremediation of Dye Effluent and Metal Contaminated Soil: Low-Cost Method for Environmental
Clean up by Microbes”, J Environ. Science & Engg. Vol. 57, No. 2, p. 109-119.
20. Dhaarani S, Priya AK, Rajan TV, Kartic DN, 2012, Degradation of various Dyes using Laccase Enzyme, Journal of Environmental
Science and Engineering, Vol.54, No 4, pp:489-94.

Authors: R.Viswanathan
Pursuance for Identity and Self Love in the Leema Dhar’s Novel “You Touched My Heart” (echoes
Paper Title:
of love and a nightmare)
Abstract: The present study deals with the finding and searching of herself which brings he satisfaction of
knowing her self-identity in her life. They discuss their life that she lived in the past and she left her house in
order to find herself at the end of the novel, she finds that these are the once who makes her individuality from
the birth of her in this world. The purpose of the study is to explain how her parents are helping the daughter,
Leema to find her identity in this novel but beginning of the novel she blames her parents and finally they are the
once who show more care towards her. This study mostly tells about the problems of the author how she
struggles to find herself in the world she meets an old artist; he is the one who explained about the reality of the
life. He is a murderer but she understands that every budding person starts with a dark past. Then she meets Cruz
and Laine, during this time she rejoice herself in the quest of love. She wants his love towards her but in reality,
251. Cruz loves Laine finally they died of an accident made by their fathers. This incident makes a major impact in
self she finds her answer for the web of mystery by herself with the help of old artist. Finally, she gets to know 1436-
that for all her behaviors make her as a mature person only because of the guidance of her parents. In this novel 143
they did not talk much about the Importance of parents but this research paper deals with the importance of the 8
parents how they project the world to their children. Leema leaves home to finds her identity but she returns with
her father’s identity because old artist is her grandfather. This research paper concludes that ever single
happenings of life will be connected with their family’s identity and also once fate.

Keywords: Self-identity, Individuality, Quest, Paternal relation, Political game.

References:
1. Dhar, Leema. You Touched My Heart: Echoes Of Love And A Nightmare. Ed.Manju Gupta.General press. New Delhi.2013.print
2. R.K.Narayan’s Indian Myth and Reality.Ed.Bhagwat S. Goyal .Sarup&Sons.Preethi Printers. New Delhi.(97).1993.print.
3. Pante, Amit. Fragrance: An Interview with Leema Dhar. Fragrance of writing. Blog spot.web.2015 Feb. 2.
Authors: Lava Kumar Reddy Palle, Arti Sudam, Madhav Madhira

Paper Title: Estimating Optimal Geotextile Type for Controlling Soil Erosion
Abstract: One of the major functions of geotextiles is to control soil erosion. Apparent opening size and
permeability of non-woven geotextiles are properties that control erosion. In this manuscript, soil taken from an
eroded pond is considered for the study. Filtration and clogging behavior of the several geotextiles are studied
under laminar flow conditions and at three different hydraulic gradients. Results facilitate selecting the
appropriate geotextile based on permeability, filtration and clogging for use as erosion control.

Keywords: Clogging, Erosion control, Filtration, Geotextile and Permeability.

References:
252.
1439-
1. Aydilek, A.H. and Edil, T.B.(2003). Long-term Filtration Performance of Nonwoven Geotextile-Sludge Systems. Geosynthetics 144
International, 10(4), 110-123.
2. Ayuba, K. and Olorunnaiye, E.S. (2014). Application of Geotextile materials in Soil Erosion Control. Jorind, 12 (2), 264-271. 2
3. Datta, U. (2007). Application of Jute Geotextiles. Journal of Natural Fibers, 4(3), 67-82.
4. Gabr, M.A. and Akram, M.H. (1996). Clogging and Piping criteria for Geotextile Filters for Fly-ash. Proceedings of the 3rd
International Symposium on Environmental Technology. 22, 12-27.
5. Giroud, J.P. (2010). Development of criteria for Geotextiles and Granular Filters. Proc9thInternational Conference on Geosynthetics, 1,
45-64.
6. Liu, L.F. and Chu, C.Y. (2006). Modeling the Slurry Filtration performance of Nonwoven Geotextiles. Geotextiles and Geomembranes,
24(5), 325-330.
7. Maheshwari, B.K.E. and Deepak A.G. (2008). Filtration and Clogging Behavior of Geotextiles with Roorkee Soils. Geotechnical and
Geological Engrg.,26,101–107.
8. Mitchell, D.J., Barton, A.P., Fullen, M.,Hocking, T.J. andZheng, Y.(2003). Field Studies of the effects of Jute Geotextiles on Runoff
and Erosion in Shropshire, UK. Soil use and Management, 19(2),182-184.
9. Puttitorn, S. and Claude, E.B.(2014). Evaluation of Porous Geotextile Liners for Erosion Control. North American Journal of
Aquaculture,76, 369–374.
10. Rawal, A. and Sayeed, M.M.A.(2013). Mechanical Properties and Damage Analysis ofJute/Polypropylene Hybrid Nonwoven
Geotextiles. Geotextiles and Geomembranes, 37, 54-60.
11. Rawal, A. and Harshvardhan, S. (2011). Pore size distribution of Hybrid Nonwoven Geotextiles. Geotextiles and Geomembranes,
29(3), 363-367.
12. Rollin, A. and Gérard, L. (1988). Mechanisms affecting long-term Filtration behavior of Geotextiles. Geotextiles and Geomembranes,
7(1), 119-145.
13. Sabiri, N.E.,Caylet, A., Montillet, A., and Laurence, L.C.(2017). Performance of Nonwoven Geotextiles on Soil Drainage and
Filtration. European Journal of Environmental and Civil Engineering, 21, 1-19.
14. Theisen, M.S. (2013). The Role of Geosynthetics in Erosion and Sediment control. Geosynthetics in Filtration. Drainage and Erosion
Control, 11, 535-550.
15. Veylon, G., Stoltz, G., Mériaux, P., Faure, Y.H. and Foltz, N.T. (2016). Performance of Geotextile Filters after 18 years' service in
Drainage Trenches. Geotextiles and Geomembranes, 44(4), 515-533.

Authors: Viswanatha Reddy, Allugunti1, Elango NM, Kishor Kumar Reddy C

Paper Title: Internet of Things Based Early Detection of Diabetes Using Machine Learning Algorithms: Dpas
Abstract: This paper introduces a new decision tree algorithm Diabetes Prediction Algorithm (DPA), for the
early prediction of diabetes based on the datasets. The datasets are collected by using Internet of Things (IOT)
Diabetes Sensors, comprises of 15000 records, out of which 11250 records are used for training purpose and
3750 are used for testing purpose. The proposed algorithm DPA yielded an accuracy of 90.02 %, specificity of
92.60 %, and precision of 89.17% and error rate of 9.98%. further, the proposed algorithm is compared with
existing approaches. Currently there are numerous algorithms available which are not complete accurate and
DPA helps.

Keywords: Accuracy, Decision Trees, Error Rate, Kaggle, Machine Learning, Specificity, IoT .

References:

1. Akolekar, Ranjit, ArgyroSyngelaki, Rita Sarquis, Mona Zvanca, and Kypros H. Nicolaides. "Prediction of early, intermediate and late
pre‐eclampsia from maternal factors, biophysical and biochemical markers at 11–13 weeks."Prenatal diagnosis 31, no. 1 (2011): 66-74.
253. 2. Alssema, M., D. Vistisen, M. W. Heymans, G. Nijpels, C. Glümer, P. Z. Zimmet, J. E. Shaw et al. "The Evaluation of Screening and
Early Detection Strategies for Type 2 Diabetes and Impaired Glucose Tolerance (DETECT-2) update of the Finnish diabetes risk score 1443-
for prediction of incident type 2 diabetes." Diabetologia 54, no. 5 (2011): 1004-1012.
3. Farran, Bassam, Arshad Mohamed Channanath, KazemBehbehani, and Thangavel Alphonse Thanaraj. "Predictive models to assess risk
144
of type 2 diabetes, hypertension and comorbidity: machine- learning algorithms and validation using national health data from 7
Kuwait—a cohort study." BMJ open 3, no. 5 (2013): e002457.
4. Faust, Oliver, Rajendra Acharya, Eddie Yin-Kwee Ng, Kwan-Hoong Ng, and Jasjit S. Suri. "Algorithms for the automated detection of
diabetic retinopathy using digital fundus images: a review." Journal of medical systems 36, no. 1 (2012): 145-157
5. Huang, Guang-Bin, Hongming Zhou, Xiaojian Ding, and Rui Zhang. "Extreme learning machine for regression and multiclass
classification." Systems,Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on 42, no. 2 (2012): 513-529
6. Jensen, Morten Hasselstrøm, ZeinabMahmoudi, Toke Folke Christensen, Lise Tarnow, Edmund Seto, MetteDencker Johansen, and Ole
Kristian Hejlesen. "Evaluation of an algorithm for retrospective hypoglycemia detection using professional continuous glucose
monitoring data." Journal of diabetes science and technology 8, no. 1 (2014): 117-122.
7. Kalaiselvi, C., and G. M. Nasira. "Classification and Prediction of Heart Disease from Diabetes Patients using Hybrid Particle Swarm
Optimization and Library Support Vector Machine Algorithm."
8. Karthikeyan, T., and K. Vembandasamy. "A Novel Algorithm to Diagnosis Type II Diabetes Mellitus Based on Association Rule
Mining Using MPSO- LSSVM with Outlier Detection Method." Indian Journal of Science and Technology 8, no. S8 (2015): 310-320.
9. Karthikeyan, T., and K. Vembandasamy. "A Refined Continuous Ant Colony Optimization Based FP- Growth Association Rule
Technique on Type 2 Diabetes." International Review on Computers and Software (IRECOS) 9, no. 8 (2014): 1476-1483.
10. Kuo, R. J., S. Y. Lin, and C. W. Shih. "Mining association rules through integration of clustering analysis and ant colony system for
health insurance database in Taiwan." Expert Systems with Applications 33, no. 3 (2007): 794-808.
11. Nahar, Jesmin, Tasadduq Imam, Kevin S. Tickle, and Yi-Ping Phoebe Chen. "Association rule mining to detect factors which
contribute to heart disease in males and females." Expert Systems with Applications 40, no. 4 (2013): 1086-1093.

Authors: V. Mallikharjuna Rao, M. Satya Sai Ram, M N Giriprasad

Paper Title: Power Saving Scheduling For Iot Based Garbage Monitoring System
Abstract: Now a days to protect our self from the environment pollution is very important because the
environment was polluted by the different things in different ways. One of the common biggest challenges is
garbage which was produced by the human things negligence or by external factors. To minimize this problem
many authors proposed their own solutions which are useful to garbage collectors during the garbage collection
process. These proposed solutions are so efficient but they are not giving maximum performance due to their
internal designing problems, like software hanging, reliability, battery backup etc. One of the biggest problem is
254. battery backup; due to lack of battery backup these garbage collection systems are not sending the garbage
information to the garbage collectors, so these collectors are not collecting the garbage in time. To solve this 1448-
problem the current research is proposing the concept about energy management for the garbage collection 145
system. 4

Keywords: Energy efficiency, Garbage, Garbage collectors, Scheduling, Environment, Pollution.

References:

1. Buyya R, Gubbi J, Marusic S, Palaniswami M. “Internet of Things (IoT) - A vision, architectural elements, and future directions”. 2013
Sep 1;29(7):1645-60.
2. Caceres R, Friday A. “Ubicomp systems at 20, Progress, opportunities, and challenges”, 2012 Jan;11(1):14-21.
3. Sachan VK, Imam SA, Beg MT. “Energy efficient communication methods in wireless sensor networks”, “A critical review”,
International Journal of Computer Applications. 2012 Feb 29;39(17):35-48.
4. Liu X, Ansari N. “Energy Solutions and Key Challenges”, IEEE Communications Magazine. 2019 Mar;57(3):104-10.
5. Stojkoska BL, Trivodaliev KV. “A review of Internet of Things for smart home Challenges and solutions. Journal of Cleaner
Production” . 2017 Jan 1;140:1454-64.
6. Odelu V, Das AK, Khan MK, Choo KK, Jo M. “Expressive CP-ABE scheme for mobile devices in IoT satisfying constant-size keys
and cipher texts”, IEEE Access. 2017;5:3273-83.
7. Ab Malek MS, Ahmadon MA, Yamaguchi S, Gupta BB, “On privacy verification in the IoT service based on PN 2”, In2016 IEEE 5th
Global Conference on Consumer Electronics 2016 Oct 11 . IEEE.
8. Vuorinen J, Tetri P, “Paradoxes in information security”, IEEE Potentials. 2016 Sep;35.
9. Atzori L, Iera A, Morabito G. “The internet of things”, 2010 Oct 28;54(15):2787-805.
10. Vestburg H. Ceo to shareholders 50 billion connections 2020. Ericsson, April. 2010 Apr 13;13.
11. Evans D, “The internet of things How the next evolution of the internet is changing everything”, CISCO white paper. 2011 Apr
1;1(2011):1-1.
12. Chen CP, Zhang CY, “Data-intensive applications, challenges, techniques and technologies”, “A survey on Big Data. Information
sciences”, 2014 Aug 10;275:314-47.
13. Iwata J. Making markets: Smarter planet. Online. Disponible https://www. ibm.
com/investor/events/investor0512/presentation/05_Smarter_Planet, 2012.
14. Minoli D, Sohraby K, Occhiogrosso B. “IoT considerations, requirements, and architectures for smart buildings Energy optimization
and next generation building management systems”, 2017 Feb.
15. Park J, Cha H. “Aggressive voltage and temperature control for power saving in mobile application processors”. IEEE Transactions on
Mobile Computing. 2018.
16. Bi Z, Da Xu L, Wang C. “Internet of things for enterprise systems of modern manufacturing”, IEEE Transactions on industrial
informatics. 2014 May;10(2):1537-46.
17. Campioni F, Choudhury S, Al-Turjman F. “Scheduling RFID networks in the IoT and smart health era”, “Journal of Ambient
Intelligence and Humanized Computing”, 2019:1-5.
18. Fang S, Da Xu L, Zhu Y, Ahati J, Pei H, Yan J, Liu Z. “An integrated system for regional environmental monitoring and management
based on internet of things”, IEEE Transactions on Industrial Informatics. 2014 May;10(2):1596-605.
19. Da Xu L, He W, Li S. “Internet of things in industries”, “IEEE Transactions on industrial informatics”,2014 Nov;10(4):2233-43.
20. Akgül ÖU, Canberk B. “An energy efficient next generation network management”, “Computer Communications”, 2016 Jan 15;74:52-
62.
21. Zhou Z, Zhang LJ, Ning K, Wang Q. “EGF-tree an energy efficient index tree for facilitating multi region query aggregation in the
internet of things”, “Personal and Ubiquitous computing”, 2014 Apr 1;18(4).
22. Perković T, Damjanović S, Patrono L, Rodrigues JJ. “Energy Efficiency and the Implementation”, “In Fourth International Congress
on Information and Communication Technology in concurrent with ICT Excellence Awards” (ICICT 2019) 2019 Feb 26.
23. D'Oro S, Galluccio L, Morabito G, “Exploiting object group localization in the Internet of Things Performance analysis”, IEEE
Transactions on Vehicular Technology. 2015 Aug;64(8.
24. Liang JM, Chen JJ, Cheng HH, Tseng YC, “Energy efficient sleep scheduling with QoS considerations in 3GPP LTE advanced
networks” In2013 9th “International Wireless Communications and Mobile Computing Conference” 2013 Jul 1 ,IEEE.
25. Qiu T, Sun W, Bai Y, Zhou Y. “An efficient multi path self organizing strategy in internet of things”, “Wireless personal
communications” 2013 Dec.
26. Hoque MA, Siekkinen M, Nurminen JK. “Energy efficient multimedia streaming to mobile devices”, IEEE Communications Surveys
and Tutorials. 2014 Feb.
27. Kaur N, Sood SK. “An energy efficient architecture for the Internet of Things”, IEEE Systems Journal. 2017 Jun.
28. Reams WR, inventor, “Dish Technologies LLC, “assignee Reduction of power consumption in remote control electronic“, 2019 Feb 5.
29. Backholm A, Tervahauta M, Salorinne S, “Seven Networks Inc, assignee. Dynamic

Authors: T Venkata Naga Jayudu, M Rama Krishna Reddy, C Shoba Bindu

Paper Title: Greedy Knapsack Based Energy Efficient Routing in WMSNS


Abstract: Managing the energy is very challenging in wireless multimedia sensor networks because of heavy
consumption of energy by the sensor nodes. Multimedia data transmission contains heavy energy consumption
operations such as sensing, aggregating, compressing and transferring the data from one sensor node to
neighbour sensor node. Many routing techniques considers residual energy of a neighbour node to forward the
data to that node. But, in reality a critical situation occurs where required energy is greater than individual
neighbour node’s residual energy. In this situation it is not possible to select any neighbour node as a data
forwarder. The proposed greedy knapsack based energy efficient routing algorithm (GKEERA) can address this
critical situation very efficiently. And also a Two-in-One Mobile Sink (TIOMS) is used to provide the power
supply and to collect the data from a battery drained sensor node. GKEERA improves the life time of a network
by balancing the energy consumption between the neighbour nodes.

255. Keywords:
1455-
References: 146
1
1. S. Ehsan and B. Hamdaoui. A survey on energy efficient routing techniques with QoS assurances for wireless multimedia sensor
networks. IEEE Communications Surveys and Tutorials, vol. 14, no. 2, pp. 265-278, 2012.
2. I. F. Akyildiz, T. Melodia, and K. R. Chowdhury. A survey on wireless multimedia sensor networks. Computer Networks,
ScienceDirect, vol. 51, no. 4, pp. 921-960, 2007.
3. Hannes Frey, Stefan Ruhrup, and Ivan Stojmenovic. Routing in wireless sensor networks. Springer London, 2009, pp. 81-111.
4. I. Stojmenovic, X. Lin. Loop-free hybrid single-path/flooding routing algorithms with guaranteed delivery for wireless networks. IEEE
Trans. on Parallel and Distributed Systems,12(10),(2001),1023-1032.
5. H. Takagi, L. Kleinrock. Optimal transmission ranges for randomly distributed packet radio terminals. IEEE Trans. on
Communications, 32(3),(1984) 246-257.
6. T. C. Hou, V. O. Li. Transmission range control in multihop packet radio networks. IEEE Trans. on Communications 34(1) (1986) 38-
44.
7. E. Kranakis, H. Singh, J. Urrutia. Compass routing on geometric networks. in Proc. 11 th Canadian Conference on Computational
Geometry, 1999.
8. I. Stojmenovic, A. P. Ruhil, D. K. Lobiyal. Voronoi diagram and convex hull based geocasting and routing in wireless networks.
Wireless communications and mobile computing 6(2) (2006) 247-258.
9. Watanabe, M., Higaki, H. (2007). No-Beacon GEDIR: Location-Based Ad-Hoc Routing with Less Communication Overhead. Fourth
International Conference on Information Technology (ITNG’07), 48-55.
10. Barbehenn, Michael. (1998). A note on the complexity of Dijkstra’s algorithm for graphs with weighted vertices. Computers, IEEE
Transactions on. 47. 263. 10.1109/12.663776.
11. Y. Zhao, J. Wu, F. Li and S. Lu. On Maximizing the Lifetime of Wireless Sensor Networks Using Virtual Backbone Scheduling. IEEE
Transactions on Parallel and Distributed Systems, vol. 23, no. 8, pp. 1528-1535, Aug. 2012.
12. Y. Liao, H.Qi, W. Li. Load-balanced clustering algorithm with distributed self organization for wireless sensor networks. IEEE Sensors
Journal13(5) (2013) 14981506.
13. S. Li, S. Zhao, X. Wang, K. Zhang, L. Li. Adaptive and secure load-balancing routing protocol for service-oriented wireless sensor
networks. IEEE Systems Journal 8(3) (2014) 858-867.
14. D. Zhang, G. Li, K. Zheng, X. Ming, Z. H. Pan. An energy-balanced routing method based on forward-aware factor for wireless sensor
networks. IEEE Transactions on Industrial Informatics 10(1) (2014) 766-773.
15. X. Liu. An Optimal Distance-Based Transmission Strategy for Lifetime Maximization of Wireless Sensor Networks. IEEE Sensors
Journal, 15(6) (2015) 3484-3491.
16. Z. Han, J.Wu, J. Zhang, L. Liu, K. Tian. A general self-organized tree-based energy-balance routing protocol for wireless sensor
network. IEEE Transactions on Nuclear Science 61(2) (2014) 732-740.
17. Chatzigiannakis Ioannis, Kinalis Athanasios, Nikoletseas Sotiris. Sink mobility protocols for data collection in wireless sensor
network. In: Proceedings of the 4th ACM international workshop on mobility management and wireless access, MobiWac’06. New
York (NY, USA): ACM; 2006. p. 529.
18. Gao Shuai, Zhang Hongke, Das Sajal K. Efficient data collection in wireless sensor networks with path-constrained mobile sinks. IEEE
Trans Mob Comput 2011;10(4):592-608.
19. Salarian H, Chin Kwan-Wu, Naghdy F. An energy-efficient mobile-sink path selection strategy for wireless sensor networks. IEEE
Trans Veh Technol 2014;63(5):2407-19.
20. Nimisha Ghosh and Indrajit Banerjee. An energy-efficient path determination strategy for mobile data collectors in wireless sensor
network. Elsevier 2015.
21. Salarian H, Chin Kwan-Wu, Naghdy F. An energy-efficient mobile-sink path selection strategy for wireless sensor networks. IEEE
Trans Veh Technol 2014;63(5):2407-19.
22. Almi ani K, Viglas A, Libman L. Energy-efficient data gathering with tour length constrained mobile elements in wireless sensor
networks. In: IEEE 35th conference on Local Computer Networks (LCN), Oct 2010; 2010. p. 5829.
23. W.Heinzelman, A. Chandrakasan, H. Balakrishnan. Energy efficient communication protocol for wireless micro sensor networks,
IEEE Proceedings of the 33rd International Conference on System Sciences, 2000, pp.1-10.
24. Tenager Mekonnen, Pawani Porambage, Erkki Harjula and Mika. Energy Consumption Analysis of High Quality Multi-Tier Wireless
Multimedia Sensor Network, IEEE Access,Aug 2017.
Authors: N. Srinivas, T. Anitha, V. Amarendra Babu

Paper Title: Absorbent Li – Ideals of Lattice Implication Algebras


Abstract: on this paper we present the concept of Absorbent LI – ideal of pass section notion polynomial math
L. We communicate about the relations some of the Absorbent LI – requirements to ILI – beliefs, Associative LI
– goals and awesome LI – desires of L. We exhibit the augmentation hypothesis of Absorbent LI – necessities
and the crossing factor of Absorbent LI – dreams is additionally an Absorbent LI – best. We exhibit that the
complement of Absorbent LI – first-rate is Absorbent channel. At lengthy closing we observe dubious idea to
Absorbent LI – requirements and talk approximately the superb houses of hard to recognize Absorbent LI –
desires.

Keywords: LI – ideals, Absorbent LI – ideal, Vague set, Lattice Implication Algebra.

References:

1. A. Ahmadi, S.Mokhtari , A. Kordi, A. Moussavi, On LI – standards of cross segment inspiration algebras, J. of arithmetic and
applications ,32 (2010), sixty seven – seventy four.
2. Gau W. L., Buehrer D. J., indistinguishable units, IEEE Transactions on frameworks, man and Cybernetics, 23(20)(1993), 610 – 614.
3. J. Lai, Y. Xu, Zeng Zhaoyou and Wu. Shuiting, susceptible LI - convictions in pass phase notion variable based math, IJCSNS, 6(9),
256. (2006), 28 - 32.
4. J. Lai and Y.Xu, On WLI - immaculate area and places of WLI - ideals in grid suggestion variable primarily based math, J. Appl. 1462-
Math. Comput., 31, (2009), 113 - 127. 146
5. L. A Zadeh, Fuzzy units, statistics and oversee 8 (1965), 338 – 353. 7
6. M. Sambasiva rao, Transitive and Absorbent channels of grid inspiration variable based totally math, J. Appl. Math. what's more,
Informatics, 32(3),(2014), 323-330.
7. N. Srinivas, V. Amarendra Babu and T. Anitha, uncommon LI convictions and unwell described notable LI - convictions of move
phase notion algebras, normal diary of research, 8(1),(2019),843-854.
8. T. Anitha, V. Amarendra Babu, indistinct LI – goals on cross section suggestion algebras, diary of growing upgrades in Computing
and information Sciences,5 (10)(2014), 788 – 793
9. T. Anitha and V. Amarendra Babu, vague brilliant implicative and ambiguous acquainted LI - standards on pass segment idea
algebras, frequent magazine of unadulterated and related number-crunching, one zero five (1) (2015)39 - 57 .
10. V. Amarendra Babu, T. Anitha., doubtful implicative LI - requirements on grid notion algebras, science and statistics, three (three)
(2015) 53 - 57.
11. V. Amarendra Babu, N. Srinivas, and T. Anitha, Transitive LI-requirements cross segment notion algebras, Jour of Adv explore in
Dynamical and manipulate frameworks, eleven (four), 2019 , 6-thirteen.
12. Y.B. Jun, Y.Xu and E.H. Roh, LI – convictions in grid notion algebras, Bull. Korean Math. Soc. 35(1) (1998), 13 – 23.
13. Y.B. Jun , On LI – convictions and top LI – convictions of grid idea algebras, J. Korean Math. Soc., 36(2), (1999), 369-380
14. Y.B. Jun, great channels of go section proposal algebras, international diary of Math. and Math. Sci. , 24(4),(2000), 277-281.
15. Y.L.Liu, S.Y.Liu, Y.Xu and k.Y.Qin, ILI – convictions and pinnacle LI – beliefs in cross section thought algebras, actualities
Sciences one hundred fifty five (2003), 157 – 17.
16. Y. Xu, Lattice proposal algebras, J. Southwest Jiaotong college 28(1) (1993), 20 – 27.
17. Y. Xu and ok.Y. Qin, Lattice H concept algebras and move segment notion algebras tips, J. Hebel Mining and Civil Engineering
Institute, 3,(1992), 139-14.

Authors: S.Sudha, A.Srinivasan, S.Karthik, S.Hari Krishnan, S.Prakash


257. Paper Title: A Machine Vision Based Detection & Classification of Neovascularisation in Retinal Blood Vessels
Abstract: Diabetic Retinopathy is an eye disease which is caused by excessive sugar level in blood.
Insufficient secretion of insulin hormone is the ground for evolution of diabetes. It affects most of the important
organs in our body. There are two types of DR: Non Proliferative Diabetic Retinopathy and Proliferative
Diabetic Retinopathy. In this proposed system techniques are introduced to detect and classify
neovascularisation. Input fundus image is preprocessed by median filtering and further new vessels are
segmented by using Fuzzy c-means clustering algorithm. After segmentation SIFT features are extracted and are
used to train support vector machine (SVM) classifier. This automated system has been tested for 70 fundus
images and accuracy of 96% is achieved.

Keywords: Diabetic Retinopathy (DR); Median Filtering (MF); Fuzzy C-Means Clustering algorithm (FCM);
Support vector machine (SVM) classifier; Neovascularisation (NV).

References:

1. Sudeshna Sil Kar, Santi P. Maity. Detection of neovascularization in retinal images using mutual information maximization. Computers 1468-
and Electrical Engineering 62 (2017) 194–208. 147
2. Garima Gupta, S. Kulasekaran.et.al Local characterization of neovascularization and identification ofproliferative diabetic retinopathy 1
in retinal fundus images. Computerized Medical Imaging and Graphics 55 (2017) 124–132.
3. He Huang ,He Ma.et.al. Automatic detection of neovascularization in retinal images using extreme learning machine. Neurocomputing
277 (2018) 218–227.
4. Siti Syafinah Ahmad Hassan & David B. L. Bong. Detection of Neovascularization in Diabetic Retinopathy. J Digit Imaging (2012)
25:437–444.
5. Shuang Yu , Di Xiao.et al. Machine Learning Based Automatic neovascularization detection on optic disc region. IEEE Journal of
Biomedical And Health Informatics, Vol. 22, No. 3, May 2018.
6. Sathvika Mudigonda, Faraz Oloumi.et.al. Fractal Analysis of Neovascularization due to Diabetic Retinopathy in Retinal Fundus
Images. 978-1-4673-7545-0/15/$ 31.00.2015 IEEE.
7. Akhilesh Bontala, Jayanthi Sivaswamy. et.al. Image Mosaicing Of Low quality Neonatal Retinal Images. 978-1-4577-1858-
8/12/$26.00©2012 IEEE.
8. R.A. Welikala, J. Dehmeshki. et.al. Automated detection of proliferative diabetic retinopathy using a modified line operator and dual
classification.Computer methods and programs in biomedicine 114 (2014) 247-261.
9. Sudha s and Srinivasan A.Unravelling diabetic retinopathy through image processing, neural networks and fuzzy logic :A review.Asian
Journal of pharmaceutical and clinical research. Vol 10, Issue 4, 2017.
10. Shuang Yu, Di Xiao and Yogesan Kanagasingam. Automatic Detection of neovascularization on Optic Disk Region with Feature
Extraction and Support Vector Machine. 978-1-4577-0220-4/16/$31.00 ©2016 IEEE.

Authors: Durga Karthik, P. Karthikeyan, S.Kalaivani, K.Vijayarekha


Paper Title: Identifying Efficient Road Safety Prediction Model Using Data Mining Classifiers
Abstract: Road accidents are a major cause of death and disabilities. The aim of the traffic accident analysis for
a region is to investigate the cause for accidents and to determine dangerous locations in a region. Multivariate
analysis of traffic accidents data is critical to identify major causes for fatal accidents. In this work, accident
dataset is analysed using algorithmic approach, as an attempt to address this problem. The relationship between
fatal rate and other attributes including collision manner, weather, surface condition, light condition, mobile
users and drunken driving are considered. Prediction model using various data mining classifiers such as
Bayesian, J48, Random Forest will be constructed to enhance safety regulations for a region.

Keywords: Collision manner, Weather, Surface condition, Bayesian, J48, Random Forest.

References:

1. Yanyan Li and Toshiyuki Yamamoto et al(Dec 2017) Understanding factors associated with misclassification of fatigue-related
accidents in police record, Journal of safety research.
258. 2. Alireza Pakgohar and Reza Sigari Tabrizi et al(2010) The role of human factor in incidence and severity of road crashes based on the
CART and LR regression: a data mining approach. Published by Elsevier Ltd. 1472-
3. López Griseldaa, de Oña Juanb and Abellán Joaquín (2012) Using Decision Trees to extract Decision Rules from Police Reports on 147
Road Accidents. SIIV - 5th International Congress - Sustainability of Road Infrastructures. 4
4. Jinming You, Junhua Wang, Jingqiu Guo (2017) Real-time crash prediction on freeways using data mining and emerging techniques.
5. Poojitha Shetty, Sachin P C et al (2017) Analysis of road accidents using data mining techniques International Research Journal of
Engineering and Technology (IRJET).
6. S. Revathi, Dr.A.Sumithra et al (2017) CERTAIN ANALYSIS ON TRAFFIC DATASET BASED ON DATA MINING
ALGORITHMS International Research Journal of Engineering and Technology (IRJET).
7. Baye Atnafu and Gagandeep Kaur (2017) Survey on Analysis and Prediction of Road Traffic Accident Severity Levels using Data
Mining Techniques in Maharashtra, India. International Journal of Current Engineering.
8. Tibebe Beshah, Shawndra Hill(2015) Mining Road Traffic Accident Data to Improve Safety: Role of Road- related Factors on
Accident Severity in Ethiopia Accidents Analysis and Prevention.
9. Ossenbruggen, P. J., J. Pendharkar, et al. (2001). "Roadway safety in rural and small urbanized areas." Accidents Analysis and
Prevention.
10. Chang, L. and H. Wang (2006). "Analysis of traffic injury severity: An application of non-parametric classification tree techniques
Accident analysis and prevention " Accident analysis and prevention.
11. Ng, K. S., W. T. Hung, et al (2002). "An algorithm for assessing the risk of traffic accidents." Journal of Safety Research.
12. Luis Martín, Leticia Baena et al (2014) Using data mining techniques to road safety improvement in Spanish roads. Published by
Elsevier Ltd.
13. Sanjay Kumar Singh “Road Traffic Accidents in India: Issues and Challenges” World Conference on Transport Research - WCTR
2016 Shanghai.
Authors: Natarajan C, Sathiamoorthy G

Paper Title: Alpha labeling of splitting graph of a gutman tree


Abstract: The splitting graph S'(G) of graph G results by introducing a new point a' with respect to each
point a of G such that N(a) equals to N(a') where N(a) and N(a') are the neighborhood sets of a and a'
respectively. The Gutman tree is also known as benzenoid tree and caterpillar tree. In this paper, it is proved
that a splitting graph of a Gutman tree satisfies an alpha labeling.

Keywords: Alpha labeling, splitting graph, Gutman tree.

References:
259.
1475-
1. A. Rosa, “On certain valuations of the vertices of a graph”, Theory of Graphs (Internat. Symposium, Rome, July 1966), Gordon and
Breach, N. Y. and Dunod Paris, (1967) 349-355.
147
2. Joseph A. Gallian, “A Dynamic Survey of Graph Labeling”, The electronic journal of combinatorics (2016), \# DS6 7
3. D. Froncek, “Alpha labelings of full hexagonal caterpillars”, preprint
4. D. Froncek, O. Kingston, and K. Vezina, “Alpha labelings of straight simple polynomial caterpillars”, Congr. Numer., 222 (2014) 57-
64.
5. C. Barrientos and S. Minion, “Alpha labelings of snake polyominoes and hexagonal chains”, Bull. Inst. Combin. Appl., 74 (2015) 73-
83.
6. G. Sethuraman and P. Ragukumar, “Every tree is a subtree of graceful tree, graceful graph and alpha-labeled graph”, Ars Combin., to
appear
7. E. Sampathkumar and H.B. Walikar, “On Splitting Graph of a Graph”, The Karnataka University journal,vol XXV & XXVI 13 (1980-
1981), 13-16.
8. I. Gutman, “Theor. Chim. Acta”, 45 309 (1977).
Authors: M.G.Gnanavel, C.Saranya, A.Viswanathan

Paper Title: Applications of Linear Volterra Integral Equations of First Kind by Using Tarig Transform
Abstract: A Tarig Transform is a transform for solving linear Volterra integral equations of first kind. A few
applications are solved in related to understand the efficiency. This paper deals with this transform and their
inverse transform, convolution theorems are used and derived the exact result.

Keywords: Volterra integral equations, Tarig transform, Inverse Tarig Transform, Convolution Theorem.

References:

1. H. A. Abdallah and A. M. Shama, “Applications of differential transform method to integral equations”, Amer. J. Engg. Res.
(AJER),vol.7(1), pp. 271-276, 2018.
2. S. Aggarwal, R. Chauhan and N. Sharma, “Application of Aboodh transform for solving linear Volterra integro-differential equations
260. of second kind,” Int. J. Res. Adv. Tech., vol . 6(8), pp. 1186-1190, 2018. 1478-
3. S. Aggarwal, R. Chauhan and N. Sharma, “A new application of Kamal transform for solving linear Volterra integral equations,” Int. J.
Lat. Tech. Engg., Magn. & App. Sci., vol. 7(4), pp.138-140, 2018. 148
4. S. Aggarwal, R. Chauhan and N. Sharma, “Application of Kamal transform for solving linear Volterra integral equations of first kind,” 0
Int. J. Res. Adv. Tech., vol. 6(8), pp.2081-2088, 2018.
5. S. Aggarwal, R. Chauhan and N. Sharma, “A new application of Mahgoub transform for solving linear Volterra integral equations,”
Asi. Res., 7(2), pp. 46-48, 2018.
6. L. G. Chambers, “Integral equations, A short course,” International text book company, London, 1976.
7. P. Haarsa, “On Volterra integral equations of the first kind by using Elzaki transform,” Far East J. Mat. Sci. (FJMS), vol. 102(9),
pp.1857-1863, 2017.
8. B. L. Moiseiwitsch, Integral equations, Longman, London and New York, 1977.
9. P. Senthil Kumar, M. G. Gnanavel and V. Viswanathan, “Application of Mohand Tranform for Solving Linear Volterra Integro –
Differential Equations”, Int. J. Res. Adv. Tech., vol. 6(10), pp. 2554-2556, 2018.
10. P. Senthil Kumar, C. Saranya, M. G. Gnanavel and A. Viswanathan, “Application of Mohand Tranform for Solving Linear Volterra
Integral Equations of First Kind,” Int. J. Res. Adv. Tech., vol. 6(10), pp. 2786-2789, 2018.
11. V. Volterra, Theory of functional of integral and integro-differential equations, Dover, New York, 1959.
12. A. M. Wazwaz, A first course in integral equations. World Scientific, Second Edition, Singapore, 2015.
Authors: R. H. Aravinth, R. Vignesh

Paper Title: Mobius Function Graph Mn(G)


Abstract: The study of graphs on positive integer n as its vertex set from 1 to n, the adjacency of vertices
defined using tools of number theoretic functions is interesting and may focus new light on structure of the
integers. This paper is concerned on some of the structural properties of the Möbius function graphs from the
number theoretic Möbius function. Further we have discussed some basic observations, results concerning |E|,
261. subgraph, perfect matching, completeness, independence number and chromatic number of Möbius function
graphs along with new induced proper coloring method. 1481-
148
Keywords: 4

References:

1. Nathanson Melvyn. B, “Connected components of Arithmetic Graphs, Monatshefte fur Mathematik, 89, 219-222, 1980.
2. Vasumathi, N, Graphs on Numbers, Ph.D. Thesis, Sri Venkateswara University, Tirupati, India, 1994.
3. N. Vasumathi and S. Vangipuram, Mobius Graphs, Journal of Informatics and Mathematical Sciences Volume 1 (2009), Number 1, pp.
5560
4. Srimitra, K. K., Shaik Sajana, Bharathi, D., Adjacency and Degree of Graph of Mobius function, i Managers Journal on Mathematics,
5(1), 3138, 2016.
5. S. Meena M. Renugha M. Sivasakthi, CORDIAL LABELING FOR DIFFERENT TYPES OF SHELL GRAPH, International Journal
of Scientific & Engineering Research, Volume 6, Issue 9, September-2015.
6. R. Balakrishnan and G. Ranganathan, A textbook of Graph Theory, Springer-Verlog, NewYork, 2000.

Authors: Ratan Singh Solanki

Paper Title: Web-based Learning: How fair is ‘Fair use’?


Abstract: The word ‘Web-based learning’ sounds good but smells bad when it comes to share the study
material online in context of copyright laws. The current problem is that teachers are under the impression that
everything they want to share with their students online finds protection under the Doctrine of Fair use under
Copyrights law but the unfortunate part is he is totally unaware about the fact that sharing the study material
online may not qualify as fair use if the same is shared with students enrolled in an online course outside the
campus. The need of the present paper is to make Universities and teachers working there aware about the use of
Web based learning without violating the copyright laws of the land. The paper is purely conceptual and only
available literatures have been taken in updating the paper following the doctrinal method of study.

262. Keywords: Web-based learning, Doctrine of Fair use, Copyright laws, Universities, Teachers.
1485-
148
References:
7
1. Y N, Anna ,Comparing the Effectiveness of Classroom and Online Learning: Teaching Research Methods , Journal of Public Affairs
Education, Vol. 19, No. 2 (SPRING 2013), pp. 199-215
2. M. Storey., B Phillips, M .Maczewski , M.Wang, Evaluating the usability of Web-based learning tools , Journal of Educational
Technology & Society, Vol. 5, No. 3, Evaluation of Learning Technologies in Higher Education (July 2002), pp. 91-100
3. I. Hoffman., Fair Use In Online Education and Web Based Training, http://www.ivanhoffman.com/onlinefair.html
4. Photocopying of Copyrighted Works for Educational Purposes: Does it , http://www.niscair.res.in/.../rejour/.../JIPR-vol%2010-
January%202005-pp%2021-33.htm
5. 5. Section 52(1) in the Copyright Act, 1957 - Indian Kanoon at https://indiankanoon.org/doc/257434/
6. L Aroyo., D Darina.,The New Challenges for E-learning: The Educational Semantic Web,Journal of Educational Technology &
Society, Vol. 7, No. 4, Ontologies and the Semantic Web for E-learning (October 2004), pp. 59-69
7. R., Stim.What Is Fair Use? - Copyright Overview - Stanford at https://fairuse.stanford.edu › Overview Sections › Fair Use

Authors: Avinash s, K.Manjunath, S.Senthil Kumar


Lung Cancer Detection using Modified Gabor filter, Gradient operators and Morphological
Paper Title:
segmentation tool
Abstract: Lung Cancer is a disease of irregular cells multiplying and growing into a tumour. It’s hard to
believe, but lung cancer is the primary cause of cancer deaths among both women and men. Every year more
people die of lung cancer than of colon, prostate and Breast cancers. Some important facts of lung cancer are
Excluding Skin cancer, lung cancer is the second most common cancer in both women and men. Statistics from
Indian Council of Medical Research (ICMR) recommend that lung cancer is fast turning into a plague in India. It
is a high mortality cancer due to poor access to affordable health care and diagnosis at late stage. At the time of
diagnosis only 15 percent of the cases of lung cancer are curable. Due to the nature of the disease patients with
lung cancer present themselves for diagnosis at a much later stage than other cancers. Globally lung cancer
accounts for 8.4% percent of all cancers in women and 14.5% in men. For lung cancer Smoking is the single
largest contributor. Other causes are exposure to carcinogenic toxins like radon, asbestos, radiation and air
pollutants. Exposure to women to smoke from the burning of charcoal for cooking is also a cause of lung cancer.
About 20 percent we can reduce the risk of lung cancer by doing physical activities and exercise is known to
improve lung function. In recent times, image processing measures are frequently used in a number of medical
areas for enlargement of the image in preceding recognition and managing periods, where the instant aspect is
263. really important to determine the abnormality problems in objective figures, mainly in a variety of malignancy
tumours such as lung cancer, breast cancer etc. 1488-
149
Keywords: Lung Cancer, Modified Gabor filter, Gradient operators, Morphological segmentation tool. 4

References:

1. Anjali goswami, “For Image Enhancement and Segmentation by using evaluation of Gabor filter parameters”. International Journal of
Advanced Technology and Engineering Research(IJATER)
2. Tim jerman, Franjopernus, Bostjanlikar etc,”Enhancement of vascular structures in 3D and 2D Angiographic images”,IEEE
Transactions on medical Imaging,Vol.35,N0.9,September 2016.
3. Pranshu pandey,Sorika jain and sunil kumar khatri, “Enhancement of medical images using kalman filter”, 6 th International conference
on Reliablity, Infocom Technologies and optimization, sep.20-22,2017, AIIT, Amity university uttar Pradesh , Nodia ,India.
4. Pallavi D.sawant and H.H Kulkarni, “Resolution Enhancement and quality assessment of MRI images using Different Interpolation
Techniques”,2017 International conference on Intelligent computing and control.
5. Henri kivinen, “Automatic Image Enhancement Methods”, Evaluation of Automatic Image Enhancement methods for Reader reporter
images.
6. Abhijeet Rajan, chetan Toshniwal and Aman kumar, “Automatic Adaptive Image Enhancement Algorithm in field of Medical science”,
International journal of scientific and Research publications,Volume 2, Issue 11, November 2012.
7. Hassan Demirel and Ghalamreza Anbarjaafari, “Discrete wavelet transform-Based satellite Image Resolution Enhancement”, IEEE
Transactions on geosciences and remote sensing, vol.49, no.6, June 2011.
8. Shradha fule, “Lung Cancer Detection using Image Processing Techniques”, International Research journal of Engineering and
Technology(IRJET),Vol:04,issue:12,Dec-2017
9. Khinmya mya tun, Aung soe khaing, “Implementation of Lung Cancer Nodule Feature Extraction using Digital Image Processing”,
International Journal of Scientific Engineering and Technology Research, Vol.03, issue.09, may -2014.
10. Bariqi Abdillah,Alhadi Bustamam,Devvi sarwinda, “Image processing based detection of lung cancer on CT scan images”, The Asian
mathematical conference 2016, Conf.series 893.
11. Roohollah Aslanzadeh, kazem qazanfari, mohammad rahmati, “An Efficient Evolutionary Based method for Image segmentation.
12. Dr.S.Kannan, Vair oprakash gurusamy, G.Nalini, “review on Image segmentation techniques”, Research gate, October 2014.
13. Avinash S, Dr.K.Manjunath, Dr.S.Senthil kumar, ”Analysis and comparison of Image Enhancement Techniques for the Prediction of
Lung Cancer” in the 2nd International Conference on Recent Trends in Electronics, Information and communication Technology
(RTEICT-2017) held on 19th-20th May 2017 organised by the Department of Electronics and Communication Engineering, SVCE,
Bangalore, Karnataka, India. IEEE XPLORE ISBN: 978-1-5090-3704-9.
14. Ivan w.selesnick,Richorder Baraniuk and Nickes Kingsbury, “The Dual-Tree complex wavelet transform”, IEEE signal Processing
magazine, November 2005.
15. Lamia JaafarBelaid,walid mourou, “Image Segmentation:A watershed Transformation Algorithm”, Image Anal sterol 2009;28:93-102.

Authors: Subir Gupta

Paper Title: Chan-Vese segmentation of SEM ferrite-pearlite microstructure and prediction of grain boundary
Abstract: The image processing of microstructure for design, measure and control of metal processing has
been emerging as a new area of research for advancement towards the development of Industry 4.0 framework.
However, exact steel phase segmentation is the key challenge for phase identification and quantification in
microstructure employing proper image processing tool. In this article, we report effectiveness of a region based
segmentation tool, Chan-Vese in phase segmentation task from a ferrite- pearlite steel microstructure captured in
scanning electron microscopy image (SEM) image. The algorithm has been applied on microstructure images
and the results are discussed in light of the effectiveness of Chan-Vese algorithms on microstructure image
processing and phase segmentation application. Experiments on the ferrite perlite microstructure data set
covering a wide range of resolution revealed that the Chan-Vese algorithm is efficient in segmentation of phase
region and predicting the grain boundary.

Keywords: Ferrite-Pearlite steel, Phase segmentation, image processing, grain boundary prediction, Chang-
Vese.

References:

1. D. A. Linkens et al., “Materials discovery and design using machine learning,” Comput. Mater. Sci., vol. 3, no. 3, pp. 1661–1668,
2016.
2. B. L. DeCost, T. Francis, and E. A. Holm, “Exploring the microstructure manifold: Image texture representations applied to ultrahigh
264. carbon steel microstructures,” Acta Mater., vol. 133, pp. 30–40, Jul. 2017. 1495-
3. S. M. Azimi, D. Britz, M. Engstler, M. Fritz, and F. Mücklich, “Advanced steel microstructural classification by deep learning
methods,” Sci. Rep., vol. 8, no. 1, pp. 1–14, 2018. 149
4. B. L. DeCost, B. Lei, T. Francis, and E. A. Holm, “High Throughput Quantitative Metallography for Complex Microstructures Using 8
Deep Learning: A Case Study in Ultrahigh Carbon Steel,” Microsc. Microanal., vol. 25, no. 1, pp. 21–29, Feb. 2019.
5. S. Banerjee, S. K. Ghosh, S. Datta, and S. K. Saha, “Segmentation of dual phase steel micrograph: An automated approach,” Meas. J.
Int. Meas. Confed., vol. 46, no. 8, pp. 2435–2440, 2013.
6. J. P. Papa, C. R. Pereira, V. H. C. De Albuquerque, C. C. Silva, A. X. Falcão, and J. M. R. S. Tavares, “Precipitates segmentation
from scanning electron microscope images through machine learning techniques,” Lect. Notes Comput. Sci. (including Subser. Lect.
Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 6636 LNCS, pp. 456–468, 2011.
7. T. Dutta, S. Dey, S. Datta, and D. Das, “Designing dual-phase steels with improved performance using ANN and GA in tandem,”
Comput. Mater. Sci., vol. 157, no. June 2018, pp. 6–16, 2019.
8. T. F. Chan, B. Y. Sandberg, and L. A. Vese, “Active Contours without Edges for Vector-Valued Images 1,” vol. 141, pp. 130–141,
2000.
9. N. R. Pal and S. K. Pal, “A review on image segmentation techniques,” Pattern Recognit., vol. 26, no. 9, pp. 1277–1294, 1993.
10. C. Liu, B. Shi, J. Zhou, and C. Tang, “Quantification and characterization of microporosity by image processing, geometric
measurement and statistical methods: Application on SEM images of clay materials,” Appl. Clay Sci., vol. 54, no. 1, pp. 97–106,
2011.
11. Y. J. Zhang, “A survey on evaluation methods for image segmentation,” Pattern Recognit., vol. 29, no. 8, pp. 1335–1346, 1996.
12. T. Chan and L. Vese, “An Active Contour Model without Edges,” pp. 141–151, 1999.
13. T. F. Chan and L. A. Vese, “Active Contours Without Edges,” vol. 10, no. 2, pp. 266–277, 2001.
14. P. Getreuer, “Chan – Vese Segmentation Simplified Mumford – Shah Model Level Set Functions,” vol. 2, pp. 214–224, 2012.
15. N. Ray, S. T. Acton, T. Altes, E. E. De Lange, and J. R. Brookeman, “Merging parametric active contours within homogeneous image
regions for MRI-based lung segmentation,” IEEE Trans. Med. Imaging, vol. 22, no. 2, pp. 189–199, 2003.
16. O. Dengiz, A. E. Smith, and I. Nettleship, “Grain boundary detection in microstructure images using computational intelligence,”
Comput. Ind., vol. 56, no. 8–9, pp. 854–866, 2005.

Authors: Manish Bhardwaj, Anil Ahlawat

Paper Title: Prolong Lifetime of Wireless Sensor Network Using Reliable Power Grouping Algorithm
Abstract: Vitality effectiveness is the most testing theme in Wireless Sensor Networks (WSN). As a result of
the expanding requests of different applications, and the requirements of vitality, memory and computational
265. intensity of the WSN hubs, numerous thinks about have concentrated on these territories as of late. Specialists
have proposed an assortment of conventions, for example, LEACH, PEGASIS and so forth.In this Manuscript, 1499-
we will talk about how vitality proficiency is influenced by scaling, for example distinctive system sizes, and by 150
various steering calculations. With the expanding utilizations of substantial scale WSNs, for example, savvy 4
framework and ecological observing. This manuscript proposes another steering calculation to enhance the
vitality proficiency by decreasing the number and absolute transmissions remove so as to spare vitality.
Reproductions propose that the proposed calculation will be more vitality proficient in medium to vast scale
remote sensor systems. Kinds of sensors which are utilized to send and get information through the remote
system. Since sensors might be conveyed haphazardly, WSNs don't have a fixed framework and there is no very
much characterized brought together sorting out system.

Keywords: About four key words or phrases in alphabetical order, separated by commas.

References:

1. I.F. Akyilidiz, W. Su, Y. Sankarasubramaniam, and E.Cayirci, “Wireless sensor networks: A survey,” Computer Networks, vol.38, no.
4, pp. 393-422, March 2002.
2. M. Xiaofeng, Y. Min, M. Dilin, “Application overview of wireless sensor networks,” Computer application and software, vol. 25, no.
3, pp. 179-181, March 2008.
3. M. Bhardwaj, Prof. A. Ahlawat, Nidhi Bansal," International Journal of Engineering & Technology", Vol 3, pp 380-383, 2018.
4. M. Bhardwaj, A. Ahalawat (2019) Improvement of Lifespan of Ad hoc Network with Congestion Control and Magnetic Resonance
Concept. In: Bhattacharyya S., Hassanien A., Gupta D., Khanna A., Pan I. (eds) International Conference on Innovative Computing and
Communications. Lecture Notes in Networks and Systems, vol 55. Springer, Singapore.
5. Mehra, Manoj, and Poonam Dabas. "Energy Efficient Secure Routing Protocol (EESRP) in Wireless Sensor Network." International
Journal for Innovative Research in Science and Technology 2.3 (2015): 29-33.
6. N. Geetha, A. Sankar, and P. B. Pankajavalli. "Energy Efficient Routing Protocol for Wireless Sensor Networks-An Eco-Friendly
Approach." Proceedings of the 2014 3rd International Conference on Eco-friendly Computing and Communication Systems. IEEE
Computer Society, 2014.
7. M. Bhardwaj, Prof. A. Ahlawat, " Prolong Lifespan of Wireless Sensor Network with Optimized Information Compression Algorithm
and Magnetic Resonant Concept", Advances in Computer Science Research, Volume 80, China, 2018.
8. M. Bhardwaj, A. Ahlawat, “Reduce Energy Consumption in Ad hoc Network with Wireless Power Transfer Concept “, International
Journal of Control Theory and Applications, Vol. 10, Issue 13, 2017.
9. Pantazis, Nikolaos, Stefanos A. Nikolidakis, and Dimitrios D. Vergados. "Energy-efficient routing protocols in wireless sensor
networks: A survey." Communications Surveys & Tutorials, IEEE 15.2 (2013): 551-591.
10. Singh, Shio Kumar, M. P. Singh, and D. K. Singh. "Routing protocols in wireless sensor networks–A survey." International Journal of
Computer Science & Engineering Survey (IJCSES) Vol 1 (2010): 63-83.
11. M. Bhardwaj, Prof. A. Ahlawat," Optimization of Network Lifetime with Extreme Lifetime Control Proficient Steering Algorithm and
Remote Power Transfer", International Conference on Mathematics, Modelling and Simulation Technologies and Applications
(MMSTA 2017), ISBN: 978-1-60595-530-8, China, 2017.
12. M. Bhardwaj, Prof. A. Ahlawat, "Enhance Lifespan of WSN Using Power Proficient Data Gathering Algorithm and WPT", 2nd
International Conference of Wireless Communication and Network Engineering (WCNE 2017)", ISBN: 978-1-60595-531-5, China,
2017.
13. Biradar, Rajashree V., et al. "Classification and comparison of routing protocols in wireless sensor networks." Ubicc journal 4 (2009):
704-711.
14. Liu, Xuxun. "A survey on clustering routing protocols in wireless sensor networks." Sensors 12.8 (2012): 11113-11153.
15. Younis, Ossama, and Sonia Fahmy. “HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks”,
Mobile Computing, IEEE Transactions on 3.4 (2004): 366-379.
Authors:
A Decentralized Accountability Framework for Enhancing Secure Data Sharing Through ICM in
Paper Title:
Cloud
Abstract: The Cloud substitutes a computing criterion where shared configurable resources are afforded as an
on-demand service over the Internet. Moreover, the cloud environment provides resources to the users on the
basis of services like SaaS, PaaS and IaaS. Generally, a cloud can be referred as private cloud or public cloud.
When a Cloud Service Provider (CSP) imposes upon public cloud resources to compile their private cloud, the
result is demonstrated as a virtual private cloud. Private or public, the imperious intent of cloud computing is to
provide simplistic, reliable usage of various computing resources. One of the significant features of cloud is that
the outsourced data are accessed through any anonymous machines over the Internet. On the other hand, it
creates an issue that user’s fear of unknown access of data, which can become a major difficulty to the wide
implementation of cloud. In this paper, a decentralized accountability framework is developed to monitor the
actual usage and access of the data that is shared on cloud. For that, a logging mechanism that includes
authentication for each user to access the data has also been provided. Moreover, some procedures for providing
the data under the control of data owner includes Integrity Checking Mechanism (ICM) have also been
developed. The overall process strengthens the security constraints over cloud. And the experimental results
266. reveal that the approach affords secure and scalable data sharing with reduced memory utilization and
processing time. 1505-
151
Keywords: Cloud Computing, Accountability, Data sharing, Authentication, logging, ICM. 1

References:

1. Shucheng Y, Cong W, Kui R and Wenjing L, “Achieving Secure and scalable, Fine-grained Data Access Control in Cloud
Computing,” In the Proceedings of IEEE Conference- INFOCOM, March 2010, pp. 1-9.
2. Squicciarini A, Sundareswaran S and Dan L, “Preventing Information Leakage from Indexing in the Cloud,” In the Proceedings of
2010 IEEE Transactions on Distributed Computing, July, 2010, pp. 188 - 195.
3. Cong W, Qian W, Kui R nad Wenjing L, “Privacy-preserving Public Auditing for Data Storage Security in Cloud computing,” IEEE
Transactions on Parallel and Distributed Systems, San Diego, March 2010. ISBN: 1063-6692.
4. Asha M, “Security and privacy Issues of Cloud Computing: Solutions and Secure Framework,” International Journal of
Multidisciplinary Research, April, 2012, Volume: 2, Issue: 4, pp. 182-193.
5. Selvamani K, Jayanthi S, “A Review on Cloud Data Security and Its Mitigation Techniques”, Science Direct-Elsevier, International
Conference on Intelligent Computing, Communication & Convergence (ICCC-2015) science direct. Procedia Computer Science, Vol.
48, 2015 pp. 347 – 352.
6. Cong W, Qian W, Kui R, “Towards secure and dependable storage services in cloud computing,” IEEE Transactions on services
computing, 2012, Volume: 2, Issue: 2.
7. Cong W and Kui R, Jin L, Wenjing L, “Toward publicly auditable secure cloud data storage services,” IEEE Transactions on Secure
Computing, July /Aug-2010 ISBN: 0890-8044/10.
8. Giuseppe A, Randal B, Reza C, Joseph H, Lea K, Zachary P and Dawn S, “Provable data possession at untrusted stores,” In the
Proceedings of 14th ACM conference on Computer and communications security (CCS '07), 2007, pp. 598-609.
9. S. Pearson and A. Charlesworth, “Accountability as a Way Forward for Privacy Protection in the Cloud,” Proceedings First
International Conference Cloud Computing, 2009.
10. Narn L and Yun-Kuan C , “Hybrid Provable Data Possession at Untrusted Stores in Cloud Computing,” In the Proceedings of IEEE
17th International Conference on Parallel and Distributed Systems (ICPADS), December, 2011, pp. 638 - 645.
11. Kihidis, A. , Chalkias, K. and Stephanides, G. , “Practical Implementation of Identity Based Encryption for Secure E-mail
Communication,” In the Proceedings of 14th Panhellenic Conference on Informatics (PCI), September, 2010, pp. 101 – 106.
12. P.T. Jaeger, J. Lin, and J.M. Grimes, “Cloud Computing and Information Policy: Computing in a Policy Cloud?,” J. Information
Technology and Politics, vol. 5, no. 3, pp. 269-283, 2009.
13. Qian W, Cong W, Kui R and Wenjing L, “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,”
In the Proceedings of IEEE Transactions on Parallel and Distributed Systems, May 2011, Volume: 22, Issue: 5, pp. 847-859.
14. Giuseppe A, Randal B, Reza C, Joseph H, Lea K, Zachary P and Dawn S, “Provable data possession at untrusted stores,” In the
Proceedings of 14th ACM conference on Computer and communications security (CCS '07), 2007, pp. Pages 598-609.
15. S. Subashini, V.Kavitha,“A survey on security issues in service delivery models of cloud computing” Journal of Network and
Computer Applications, Vol- 34,2011, pp. 1–11.
16. Xuefeng L, Yuqing Z, Boyang W and Jingbo Y, “Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud, ” IEEE
Transactions On Parallel And Distributed Systems, Vol. 24, No. 6, June 2013 Pp.1182-1191.
17. Jianghong W, Wenfen L, Xuexian H, “Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption,
” IEEE transaction on cloud computing, Journal Of Latex Class Files, VOL. 14, NO. 8, August 2015, pp 1-13.
18. Dimitrios Z, Dimitrios L, “ Addressing cloud computing security issues” science direct-Elsevier, Future Generation Computer
Systems, Vol. 28, 2012, pp. 583–592.
19. Zhigou W, June L, Deng, R.H., “HASBE: A Hierarchical Attribute based Solution for flexible and Scalable access control in cloud
computing,” IEEE transactions On Information and Forensics and Security, April-2012, Volume: 7, Issue: 2, pp. 743 – 754.
20. Ayad F. Barsoum and M. Anwar Hasan, “Integrity Verification of Multiple Data Copies over Untrusted Cloud Servers,” In the
Proceedings of 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID 2012), pp. 829-834.
21. Ayad F. Barsoum, M. Anwar Hasan, “Integrity Verification of Multiple Data Copies over Untrusted Cloud Servers” 12th IEEE/ACM
International Symposium on Cluster, Cloud and Grid Computing, 2012, pp 829-834
22. SmithaSundareswaran, Anna C. Squicciarini and Dan L, “Ensuring Distributed Accountability for Data sharing in the Cloud,” IEEE
Transactions of Dependable and Secure Computing, August 2012, Volume: 8, Issue: 4, pp. 556- 568.
23. Dhanapal, R & Visalakshi, P 2016, ‘Real Time Health Care Monitoring System for Driver Community Using Adhoc Sensor Network’,
Journal of Medical Imaging and Health Informatics, vol. 6, no. 3, pp. 811-815.
24. Dhanapal, R & Visalakshi, P 2016, ‘Optimizing Trust Based Secure Routing for Unified Efficient Resource Sharing for Large Scale
MANET-TSRRS’, Asian Journal of Information Technology, vol. 15, no. 19, pp. 3756-3762.
25. Dhanapal, R & Visalakshi, P 2018, ‘An Efficient Model for Secure and Scalable Health Log Mangement in Cloud using EH-ABE’,
International Journal of Engineering Technology, vol. 7, no.4.19, pp. 309-318.

Authors: R. Mary Geetham, G. JoicyLidwina


IQ, EQ, SQ and Skill Development are not Balanced in Board Examination - Research On
Paper Title:
Reference to Chennai City
Abstract: A school should follow ‘learning methodology’ (like activity based learning, active learning
methodology, etc.), the examination is built within the learning process, which means that there is no separate
exam. Students do self-evaluation, projects, etc. while they are learning the content. Here examination is done on
the basis of students’ learning. Exams are necessary in schools to find out the real skills, talents and knowledge
of the students. But practically this is not done therefore the researcher felt the need to conduct a study to
formulate a question paper which measures and values the student’s IQ,EQ,SQ and Skills Developed in the
students and researcher wanted to identify the pros and cons of board examination, the understand the
psychology of students and various challenges encountered in conducting the board exams. The researcher used
SPSS package to analyse the questionnaire and used certain statistical tools such Frequency Analysis, ANOVA ,
Regression, Factor Analysis etc. to find out that board examination does not inculcate reasoning ability in the
minds of the students neither it makes the students to learn with understanding. and it does not test their general
knowledge. Board Examination at the same time with few negativity induces problem solving technique and
develops social skills though verbal ability and speed of logical reasoning is not tested through questions.
Therefore the researcher advises to revise the pattern of exam giving students a stress free environment, carrying
general knowledge and logical ability.
267.
1512-
Keywords: Examination, Intelligent Quotient, Emotional Quotient, Spiritual Quotient, Skill Development. 152
0
References:

1. Bergin.G (2017)Exam – A Bane or Boon to Education


2. Daniel Goleman (1995) Emotional Intelligence: Why It Can Matter More Than IQ.
3. Francis Galton's (1905) Inquiries into Human Faculty and Its Development
4. Leafy Shrew (2009) IQ and its environmental factors
5. Luders E, Narr KL, Thompson PM, Toga AW (2009) Neuroanatomical correlates of intelligence. Intelligence 37(2): 156-163.
6. Mark Ashton Smith,(2010)The 5 Factors of Intelligence Over the Lifespan ,5 factors of IQ
7. J Neurol Stroke (2014) Factors Influencing Intelligence Quotient.
8. Neisser, U.; Boodoo, G.; Bouchard Jr, T.J.; Boykin, A.W.; Brody, N.; Ceci, S.J.; Halpern, D.F.; Loehlin, J.C.; Perloff, R.; Sternberg,
R.J.; Others, (1998). "Intelligence: Knowns and Unknowns". Annual Progress in Child Psychiatry and Child
Development1997.Retrievedon2008-03-18
9. Plomin R, Spinath FM (2004) Intelligence: genetics, genes, and genomics. J PersSocPsychol 86(1): 112-129.
10. www. i3mindware.com, 5 Factors of EQ -A Collection Of Definitions Of Intelligence.(2019)
11. Neisser, U.; Boodoo, G.; Bouchard Jr, T.J.; Boykin, A.W.; Brody, N.; Ceci, S.J.; Halpern, D.F.; Loehlin, J.C.; Perloff, R.; Sternberg,
R.J.; Others, (1998). "Intelligence: Knowns and Unknowns". Annual Progress in Child Psychiatry and Child Development 1997.
Retrieved on 2008-03-18
12. Shana Lebowitz (2014) Why Your IQ May Have More Influence on Your Success Than You Think
13. Tomas Chamorro-Premuzic, Seymour Adler, and Robert B. Kaiser ( 2013), Industrial and Organizational Psychology.
14. Marcel.Goldschmid (2016)Emotional Intelligence is a Key Success Factor for Managers: 7 Critical SituationsDaniel Goleman(2016 )4
Components of Emotional Intelligence (EQ)

Authors: Nishant Katiyar, Rakesh K Bhujade

Paper Title: Spam Exploration Along With Learning Content Management System (LCMS)
Abstract: By traversing through time we realize that not only the education system has changed be also the
way of teaching needs to be changed which ultimately can get from LCMS, it is one of the widely used tool for
the educating system. Now many institutions are adopting it in order to improve their system of education, but
after all these activities there is also a need for the security. Learning management system is one of the entities
which takes part with excessive size content material transport. It additionally enables to use it in far off area in
addition to useful for the man or woman with disabilities. LMS help in studying the modules based at the
individual ability on person timeframe. Many situations together with screen lock and tool interest disable is
carried out in previous method to keep away from content material leak through unauthorized get admission to.
Consequently locating proper answer structure on LCMS is one of the goal necessities. On this paper, creation of
the security over LCMS and in addition finding an enhance version for imparting the safety in data gaining
access to and managing is furnished.

Keywords: Learning Content Management System (LCMS), Content Spam Revealing, Fingerprint
Authentication, E-Learning, Modified N-Gram.

References:
268.
1. T.-S. Wen and H. C. Lin, The study of e-learning for geographic information curriculum in higher education, in Proceedings of 6th 1521-
International Conference on Applied Computer Science, Hangzhou, China, published by World Scientific and Engineering Academy 152
and Society, 2007, pp. 626-621. 4
2. OSI, Open Source Initiative .
3. J. Noll, What constitutes open source? A study of the vista electronic medical record software, in Open Source Ecosystems: Diverse
Communities Interacting, ed: Springer, 2009, pp. 310-319.
4. Nishant Katiyar and Dr. Rakesh Bhujade, Architecture Model for Cloud use of E-Learning in Higher Education: Indian Perspective,
Special Issue based on proceedings of 4th International Conference on Cyber Security (ICCS) 2018, ISSN- 2460-4010, Online
Available: - https://papers.ssrn.com/sol3/cf_dev/AbsByAuth.cfm?per_id=3332457
5. C. J. McDonald, G. Schadow, M. Barnes, P. Dexter, J. M. Overhage, B. Mamlin, et al., Open Source software in medical informatics—
why, how and what, International journal of medical informatics, vol. 69, pp. 175-184, 2003.
6. N. B. Awang and M. Y. B. Darus, Evaluation of an Open Source Learning Management System: Claroline, Procedia - Social and
Behavioral Sciences, vol. 67, pp. 416-426, 2011.
7. GNU, Licenses - GNU Project - Free Software Foundation..
8. Grenache. H.C., Radigales F. G. Communication software laboratory academic year 2007-2008. E-learning platforms, moodle and
dokeos. Group 95.
9. Sejzi .A. A., Arisa .B. (2013). Learning Management System LMS and LCMS at the virtual university. Another international seminar
on quality assurance and educational institution.
10. Ninomiya. S., Chawan. M., Meshram B.B. (2011). CMS, LMS, and LCMS For eLearning. International Journal of Computer Science
Issues (IJCSI). Vol. 8, Issue 2, ISSN (Online): 1694-0814.
11. Dietmar. R., Mario A. (2006). Michael Piotrowski education components: A component-based e-learning environment ACM 978-1-
59593-610.
12. Irlbeck, S., Mowat, J. (2005). Learning content management system (LCMS), Capella University.
13. Bexheti L. A. (2008). Development of LCMS. International journal of systems Application and development, Issue 1, volume 2.

Authors: Suma M, Goutham M A, Paramesha

Paper Title: Error Estimation of Three Dipoles used as near Field sensors
Abstract: Three sensors coupled in a crossed configuration are used as near field calculating unit of a
transmitter in an unbounded ground plane. The Method of Moments is applied to calculate approximately the
inaccuracy produced by the measuring unit in the near field. The Probe measures both co-pole, cross- pole and z-
directed dipole components simultaneously. However, due to multiple reflections between the radiator and
dipoles, near field values are changed. Computation was carried out for the calibration of the probe and to test
the co-pole voltage and field (with no probe) in x-y plane at 10GHz to compare the relative tested co-pole
voltage pattern with the relative tested field pattern (with no measuring unit). Since the relative tested co-pole
voltage and field are analyzed, no inaccuracy is forced at the midpoint of the plane.

269. Keywords: Basis Functions; Co-pole; Cross pole; EM wave; MoM; Waveguides.
1525-
References: 152
9
1. G.V.Borgiotti, “Fourier transform method in aperture antenna problems,” Alta Frequenza, vol. 32, Nov. 1963.
2. R. J. Mailloux, “Radiation and near-field coupling between two collinear open-ended waveguides,” IEEE
3. Trans. OnAntennas and Propagation, vol. AP-17, Jan. 1969.
4. J. Luzwick and R. F. Harrington, “Mutual coupling analysis in a finite planar rectangular waveguide antenna array,”
Electromagnetics, vol. 2, pp. 25-42, January-March 1982
5. R F. Harrington, and J. R. Mautz, “A generalized network formulation for aperture problems,” IEEE Trans. On Antennas and
Propagation, vol. AP-24, pp. 870-873,Nov. 1976.
6. H. Baudrand, Jun-Wu Tao and J. Atechian, “Study of
7. radiating properties of open-ended rectangular
8. waveguides,” IEEE Trans. on Antennas and Propagation, vol. AP-36, pp. 1071-1077, Aug. 1988.
9. R. F. Harrington, Field computation by moment methods. USA: Roger E. Krieger Publishing Company.
10. K. K. Mei, “On the integral equations of thin wire antennas,” IEEE Trans. on Antennas and Propagation,
11. vol. 13, issue 3, pp. 374-378, May 1965.
12. Paramesha and A. Chakrabarty, “Near-Field Distraction due to the Probe,” International conference on Antenna
13. and Technology, Feb. 2005, Space Application Centre,
14. ISRO, Ahmedabad.
15. Paramesha and A. Chakrabarty, “Near-Field Measurement Using Crossed-Dipole,” International Radar Symposium India, IRSI-05,
December 2005, Bangalore.

Authors: R. Elangovan

Paper Title: Strength Properties of Fibre-Reinforced Self-Consolidating Concrete with Foundry Waste Sand
Abstract: This study presents a comprehensive overview of replacing natural river sand (FA) with foundry
waste sand (FWS) in fibre-reinforced high strength self-consolidating concrete (SCC). Fine aggregate (FA) was
replaced with FWS, proportions varying from 0% to 70%. To maintain workability in the SCC mix, chemical
admixtures were added. During fresh state, properties of SCC like filling and passing ability, segregation
resistance were studied. Assessment results indicated a moderate reduction in workability, slump flow decreased
by 4% over control mix, for 70% replacement of FA with FWS. SCC mixes were prepared with different FWS
contents and evaluated for density, modulus of elasticity, compressive, flexural and split tensile strengths. The
compressive strength increased by 6% to 8%, flexural strength by 2% to 4% and split tensile strength by 2% to
3% when the FA was partially replaced by 20% with FWS. Density of SCC increased by 6.5% and modulus of
elasticity decreased by 10% for 70% replacement of FA with FWS. From the assessment outcome, it can be
resolved that FWS could form a dependable alternative source for natural river sand replacement in high strength
SCC.

Keywords: Self-consolidating concrete, waste foundry sand, slump, strength, segregation, filling ability,
passing ability.

References:

1. American Foundrymen’s Society, “Alternative Utilization of Foundry Waste Sand”, Final Report, Department of Commerce and
Community Affairs, Illinois, 1991
2. ASTM C33 / C33M – 13, “Standard Specification for Concrete Aggregates”, ASTM International, Pennsylvania, United States of
America, 2013
3. ASTM C78-94, “Standard Test Method for Flexural Strength of Concrete (Using Simple Beam with Third Point Loading)”, ASTM
International, Pennsylvania, United States of America, 2002
4. ASTM C469/C469M-14, “Standard Test Method for Static Modulus of Elasticity and Poisson’s Ratio of Concrete in Compression”,
ASTM International, Pennsylvania, United States of America, 2002
270. 5. ASTM C496-96, “Standard Test Method for Splitting Tensile Strength of Cylindrical Concrete Specimens”, ASTM International, 1530-
Pennsylvania, United States of America, 1996 153
6. ASTM, C1602 / C1602M – 12, “Standard Specification for mixing water used in the Production of Hydraulic Cement Concrete”,
ASTM International, Pennsylvania, United States of America. 8
7. BS 1881-116, “Testing Concrete – Part 116, Method for Determination of Compressive Strength of Concrete Cubes”, British Standards
Institution, United Kingdom, 1983.
8. IS:516-1959 (Reaffirmed 2004), “Method of Tests for Strength of Concrete”, Bureau of Indian Standards, New Delhi.
9. IS:1489 (Part 1) : 1991 (Reaffirmed 2005), “Portland Pozzolana Cement - Specification, Part 1 Fly Ash Based”, Bureau of Indian
Standards, New Delhi.
10. IS:5816-1999 (Reaffirmed 2004), “Splitting Tensile Strength of Concrete – Method of Test”, Bureau of Indian Standards, New Delhi.
11. JM Khatib and DJ Ellis, “Mechanical Properties of Concrete Containing Foundry Sand”, ACI Special Publication, 2001, SP–200,
pages 733–748.
12. Mustafa Sahmaran, Mohamed Lachemi, Tahir K Erdem and Hasan Erhan Yucel, “Use of Spent Foundry Sand and Fly Ash for the
Development of Green Self-Consolidating Concrete”, Materials and Structures, 2011, Vol. 44, pages 1193-1204.
13. PK Mehta and PJM Monterio, “Concrete Microstructure, Properties and Materials”, Third Edition, Tata McGraw-Hill Edition, 2006
14. Rafat Siddique, Geert de Schutter and Albert Noumowe, “Effect of Used-Foundry Sand on the Mechanical Properties of Concrete”,
Construction and Building Materials, 2009, Volume 23, pages 976–980.
15. Recep Bakis, Hakan Koyuncu and Ayhan Demirbas, “An Investigation of Waste Foundry Sand in Asphalt Concrete Mixtures”, Waste
Management & Research, 2006, Volume 24, pages 269-274.
16. RN Kraus, Tarun R Naik, BW Ramme and Rakesh Kumar, “Use of Foundry Silica-Dust in Manufacturing Economical Self-
Consolidating Concrete, Construction and Building Materials, 2009, Vol. 23, pages 3439-3442.
17. Sayed Javed, CW Lovell and Leonard Wood, “Waste Foundry Sand in Asphalt Concrete”, Transportation Research Record, 1994,
Volume 1437, pages 27–34.
18. Silvia Fiore and Maria Chiara Zanetti, “Foundry wastes reuse and recycling in concrete production”, American Journal of
Environmental Sciences, 2007, Volume 3(3), pages 135–142.
19. Tarun R Naik, Rudolph N Kraus, Yoon-Moon Chun, Bruce W Ramme and Rafat Siddique, “Precast Concrete Products Using
Industrial By-Products”, ACI Materials Journal, 2004, Volume 101(3), pages 199–206.
20. Tarun R Naik, Rudolph N Kraus, Yoon-Moon Chun, Bruce W Ramme and Shiw S Singh, “Properties of Field Manufactured Cast-
Concrete Products Utilizing Recycled Materials”, Journal of Materials in Civil Engineering, ASCE, July/August 2003, Volume 15(4),
pages 400–407.
21. PA Traeger, “Evaluation of the Constructive Use of Foundry Wastes in Highway Construction”, MS Thesis, The University of
Wisconsin, Madison, 1987.
22. Y Guney, YD Sari, M Yalcin, A Toucan and S Donmez, “Reusage of Waste Foundry Sand in High Strength Concrete”, Waste
Management, Aug/Sep 2010, Volume 30(8-9), pages 1705-1713.

Authors:

Paper Title: Power Load Forecasting using Back Propagation Algorithm


271. Abstract: The day today operation and scheduling activities of a power generation unit requires the forecast
1539-
of power demand to meet the needs of the consumers. Load forecasting is categorized into short, medium and
154
long term forecasts. The short term prediction refers to hourly load forecast for the period lasting from an hour to
4
more than a few days. The medium term forecasts is prediction of power load ranging from one to several
months ahead. Finally, the long term forecast indicates prediction of power load ranging from one to many years
in near future. Excellence of short term hourly power load forecast has a considerable effect on cost effective
functioning of power plants because numerous assessments are dependent on these forecasts. These assessments
comprise cost effective scheduling of power plants, scheduling of coal acquisition, power plant security
consideration, and planning for energy related business. The significance of precise load forecasts will reduce
the wastage of power in the future because of remarkable changes taking place in the structure of power
generation industries due to deregulation and heavy competition. This situation creates thrust on the power
generation sectors to function at maximum possible efficiency, which leads to precise forecasting of the power
load.

Keywords: Power load forecasting, back propagation algorithm, Artificial Neural Network.

References:

1. Purushothaman S and Srinivasa Y.G., “ A procedure for training an artificial neural network with the application of tool wear
monitoring “, International Journal of Prod. Res., pp 635-657, 1998.
2. D. C. Park, M. A. El-Sharkawi, R. J. Marks II, L. E. Atlas, M. J. Damborg. "Electric load forecasting using an artificial neural network,
“IEEE Transactions on Power Systems, Vol. 6, no. 2, pp. 442-449, May 1991.
3. D. Srinivasan, S. S. Tan, C. S. Cheng, Eng Kiat Chan. ''Parallel neural network-fuzzy expert system strategy for short-term load
forecasting: system implementation and performance evaluation", IEEE Transactions on Power Systems, vol.14, no.3, pp.1100-1106,
Aug 1999.
4. Singh A, Kalra P.K, Emmanuel, “Point of view of knowledge based systems for load forecasting”, Symposium on expert systems
application to power systems, 1998, pp 7~1- 7~4.
5. Taylor W. J, McSharry E.P, de Menezes M.L, “A comparison of univariate methods used for forecasting electricity demand up to a
year ahead”, International Journal of Forecasting,2006, Vol.22, pp 1-16.
6. Feinberg E.A, Genethliou D, “Chapter 12 Load Forecasting”, Applied mathematics for power systems, pp 269-282.
7. Galkin I, “Crash introduction to artificial neural networks” found on http://ulcal.uml.edu/~iag/CS/intro-to-ANN.html
8. Galiana F.D, Gross G, ”long term load forecasting”, Proceedings of the IEEE, 1987, Vol. 75 No.12, pp 1558-1573.
9. Singh A, Chen H, Canizares A.C, “ANN-based short term load forecasting in electricity markets”, Proceedings of the IEEE power
engineering society transmission and distribution conference, 2001, pp2:411-415.
10. Komane T, “Short term peak load forecasting using neural networks”, Department of Electrical Engineering, University of Cape Town,
2001.
11. EM 1110-2-1701,”Appendix B load forecasting methods”, 1985, pp B-1-B-5 found On http://www.usace.army.mil/publications/eng-
manuals/em1110-21701/a-b.pdf.
12. http://www.cee.hw.ac.uk/~alison/ai3notes/subsection 2 5 2 1.htm, Expert system Architecture.
13. Anderson D, McNeil G, “Artificial neural networks technology”, A DACS State-of the Art Report, Data & Analysis Center for
Software, 1990, pp 1-35.
14. stergiou C, Siganos D, “Neural Networks” found on http://www.doc.ic.ac.uk/~nd/surprise96/journals/vol4/cs11/report.html.
15. Khothanzad A, Hwang R.C, Abaye A, Maratukulam D, “An adaptive modular artificial neural network yearly load forecaster and its
implementation at electric utilities”, IEEE transactions on power systems, Vol. 10, NO. 3, 1995, pp1716-1722.
16. Netlab Toolbox, help files, © Ian T Nabney (1996-2001), www.ncrg.aston.uk/netlab/index.php

Authors: Y.Kamala Raju, M.S.Britto Jeyakumar


Modulus Of Elasticity On High Performance Glass Fibre Rcc Beams With Partial Replacement
Paper Title:
Of Cement By Silica Fume
Abstract: The present paper contains, Seven blends Mix1 to Mix7 are thrown with 0%, 5%, 7.5% and 10%
substitution of bond utilizing SF and another arrangement of examples with 0%, 5%, 7.5% and 10% substitution
of concrete utilizing SF alongside 0.2% consistent substitution of Glass fiber to contemplate the mechanical
property modulus of versatility. The outcome demonstrates that the ideal substitution of silica smoke is 7.5%.
On the off chance that the fiber of 0.2% is included the malleable and flexural quality got expanded. Absolutely
seven RC beams 200 x 200 x 750mm size were thrown for assessing the flexural test and restored for 28 days.
These beams are tested in loading frame of 1000 kN at 28 days, two point burdens are connected over the beam.
The Heap from the start split, diversion, and a definitive burden are noted for each blend and similar
examination is accomplished for Burden – redirection (P-∆), first break - extreme burden, Moment – Curvature
(M-φ) and Moment – rotation with Control and HPC blend examples lastly different malleable natures is plotted.

Keywords: optimum replacement of silica fume, Moment – Curvature, Moment – Rotation, modulus of
272. elasticity, flexural behavior.
1545-
References: 155
0
1. Er. Magudeaswaran, Dr. Eswaramoorthi (2013) Experimental Study on Durability Characteristics of High Performance Concrete.
2. P. Vinayagam (2012) Experimental Investigation on High Performance Concrete Using Silica Fume and Super plasticizer.
3. N. Seshadri Sekhar1 and P.N. Raghunath (2014) Influence of water binder ratio on high performance concrete .
4. In Hwan Yang, Changbin Joh, and Byung-Suk Kim. “Structural behavior of ultra high performance concrete beams subjected to
bending”. In: Engineering Structures 32.11 (2010), pp. 3478–3487.
5. Zhenhua Wu. “Behavior of High-Strength Concrete Members under Pure Flexure and Axial-Flexural Loading”. PhD thesis. 2007.
6. Aruna Munikrishna et al. “Behavior of concrete beams reinforced with ASTM A1035 grade 100 stirrups under shear”. In: ACI
Structural Journal 108.1 (2011), p. 34.
7. P Kumar Mehta. “High-performance, high-volume fly ash concrete for sustainable development”. In: Proceedings of the international
workshop on sustainable development and concrete technology. Iowa State University Ames, IA, USA. 2004, pp. 3–14
8. M Newtson Craig and Allena Srinivas. “Materials Specification Needs for Future Development of Ultra High Performance Concrete”.
In: Advances in Civil Engineering Materials 4.2 (2014), pp. 17–37.
9. M. Mazloom , A.A. Ramezanianpour , J.J. Brooks (2004) “Effect of silica fume on mechanical properties of high-strength
concrete” “Cement & Concrete Composites 26 (2004)” page no. 347–357.
10. D. Mostofinejad and M. Nozhati(2005) “Prediction of the Modulus of Elasticity of High Strength Concrete” “Iranian Journal of
Science & Technology, Transaction B, Engineering, Vol. 29, No. B3(2005)” page no.311-321
11. Nakin Suksawang, Hani H. Nassif and Padit Tanchan (2006) “Comparison of Elastic Modulus Equations for High Performance
Concrete (HPC) with Pozzolanic Materials” “International Conference on Pozzolan, Concrete and Geopolymer Khon Kaen, Thailand,
May 24-25, page no.237-246.
12. Ji Yajun, Jong Herman Cahyadi(2003) “Effects of densified silica fume on microstructure and compressive strength of blended
cement pastes” “Cement and Concrete Research 33(2003)” page no. 1543–1548.

Authors: V. V. Prathibha Bharathi, T.Krishnaiah

Paper Title: Exoneration Of Waste Water With Solar Energy


Abstract: Water is the most important aspect of life on earth. Despite its abundant availability, small
percentage be able to use for the purpose of drinking (about 1%). Solar water exoneration comes in the form of a
harmless and promising contrivance that purifies water which use a source of renewable solar energy. By rising
the collective cause of solar radiation, the competence of solar water exoneration equipment can be increased,
which is a mutual outcome of solar radiation, and provides additional heat by solar water preheating system. The
main purpose of this effort is to disinfect the water from wastewater using cosmological energy with the course
of action of embodiment. This system is proposed to be experimentally created for this purpose.

Keywords: preheating, renewable energy, embodiment, water.

References:

273. 1. Deepak Devasagayam, Mayuresh Kathe, Mayur Patil, Nimish Kavishwar-"Solar Water Purifier"-International Journal Of Innovative
Research In Advanced Engineering (Ijirae) Issn: 2349-2163volume 1 Issue 9 (October 2014) 1551-
2. Anurag Swain-"Solar Powered Drinking Water Purification & Atw System Through Csr"-International Research Journal Of 155
Engineering And Technology (Irjet) Eissn: 2395-0056 Volume: 03 Issue: 04 April-2016 Www.Irjet.Net P-Issn: 2395-0072. 3
3. Gj Louw- "Development Of A Solar Powered Reverse Osmosis Plant For The Treatment Of Borewell Water"Wrc Report No
1042/1/01 April 2001 Isbn 1 86845 743 5.
4. D. N. Kale, A. A. Desai1,A. H. Khan,C. D. Pawar,V. N. Chougule, Development of waste water Treatment Using Solar Energy, IOSR
Journal of Mechanical and Civil Engineering (IOSR-JMCE) e-ISSN: 2278-1684,p-ISSN: 2320-334X, PP. 49-54
5. Deepak D, “Solar Energy Based Purification of Sea Water – A Detailed Review”, IRJET, Volume: 02 Issue: 07 | Oct-2015, e-
ISSN:2395-0056,p-ISSN:2395-0072,Pages 835-839.
6. Mehtre, “Water Purification by Solar Energy under natural circulation mode”, IRJET, Volume: 04 Issue: 03 | Mar -2017,Pages 2199-
2201.
7. Deepak Devasagayam , “Solar Water Purifier” , IJIRAE, ISSN: 2349-2163,Volume 1 Issue 9 (October 2014),Pages 1758-1763.
8. Thomas Clasen, “Household Water Treatment Using Sodium Dichloroisocyanurate (Nadcc) Tablets: A Randomized, Controlled Trial
To Assess Microbiological Effectiveness In Bangladesh”, AMJTMH, Volume 76(1),February 2007,Pages 187-192.
9. Sophie Boisson, “ Effect of Household-Based Drinking Water Chlorination on Diarrhoea among Children under Five in Orissa, India”.
“A Double-Blind Randomised Placebo-Controlled Trial”, 2013,https://doi.org/10.1371/journal.pmed.1001497.
10. Ahmad Sk, “Water Disinfection Using CSP Technology", IJAER volume 11(ISSN 0973-4562),January 2016 ,pages 8673-8680.
11. Muna Yacoub Hindiyeh, “Investigating the efficiency of solar energy system for drinking water disinfection”,
Desalination,www.elsevier.com/locate/desal, volume 259,Issue 1-3,15 September 2010,pages208-215.

Authors: Srikanth Vadlamudi, R Naresh Kumar goud, T.Krishnaiah


Paper Title: Performance Of Diesel Engine Using Bio-Fuel From Sesame Oil
Abstract: Energy has become a crucial factor for humanity to continue the economic growth and maintain high
standard of living especially after industrial revolution. “Fossil fuels are still the main source of energy. But the
endless consumption of fossil fuels will bring the reserve to an end in near future. As a result fuel prices are
soaring because of diminishing supply than demand. So researchers world over are in constant search of
alternate fuels in the last three to four years, aimed at reducing CO2 emissions and global dependency on fossil
fuels. The use of vegetable oils as a fuel in diesel engine causes some problems due to their high viscosity
compared with conventional diesel fuel. Various techniques and methods are used to solve the problems
resulting from high viscosity. One of these techniques is blending of fuel. In this study, a mix of 5%, 10%,15%,
20%, 25% sesame oil and diesel fuel was used as alternative fuel in a direct injection diesel engine. Diesel
engine performance and exhaust emissions were investigated and compared with the diesel fuel in a diesel
engine. The experimental results show that the engine power and torque of the mixture of sesame oil diesel fuel
are close to the values obtained from diesel fuel and the amount of exhaust emissions are lower than those of
274. diesel fuel. Hence it is seen that mix of sesame oil 20% and 80% diesel fuel can be used as an alternative fuel
1554-
successfully in a diesel engine without any modification and also it is an environmental friendly” fuel in terms of
155
emission parameters.
8
Keywords: Sesame oil, Diesel, Bio-Diesel, Alternate fuels, Performance, Emissions.

References:

1. Improved “conversion of plant oils and animal fats into biodiesel and co-product-Praveen r. Muniyappa, Biosource technology, volume
6,issue 1,april 1996, pages19-24.
2. Biodiesel production: a review-FangruiMa,biosource technology , volume 70,issue 1,october 1999, pages 1-15
3. Triglycerides based Diesel Fuels-Anjana Srivastav, Ram Prasad- Renewable and Sustainable Energy Reviews 4(2000) 111-133.
4. Biodiesel fuels from vegetable oils via catalytic and non-catalytic supercritical alcohol transesterification and other methods:a survey-
AyhanDemirbas, Energy conversion and management, volume 44, issue 13, august 2003, pages 2093-2109.
5. Experimental Investigation on diesel engine fuelled with diesel and biodiesel extracted from sesame oil, Addanki Sreenivasulu ,Dr.L.
Rasidha, IPASJ International Journal of Mechanical Engineering (IIJME), Volume 4, Issue 9, September 2016.
6. Performance Evaluation of a Diesel Engine with Sesame Oil Biodiesel and its Blends with Diesel, Shailaja.M, A. ArunaKumari, V Sita
Rama Raju, International Journal of Current Engineering and Technology”, INPRESSCO.
Authors: Thota Siva Prasad, C.Yuvara, K.Prahalada Rao

Paper Title: Preparation Of Ss 316l Feedstock For Metal Injection Molding (Mim) Process
Abstract: The purpose of this paper is to make the homogeneous mixing of SS 316L steel powder with a
multiple binder system in a custom made mixing machine by varying the process parameters like speed,
Temperature and time as the homogeneity impacts on the final product in the MIM process. A homogeneous
mix of metal powder and binder is essential in metal injection molding process as it affects the product quality
significantly. This paper aims at design of new mixing equipment and characterization of SS 316L feed stock. A
mixing machine of 2 kg capacity is designed and fabricated to prepare a homogeneous mix of SS 316l material
with a multiple binder system. Mixing time, mixing speed and Temperature of Barrel are considered as process
parameters. Taguchi techniques are used to optimize the process parameters .The RPM of the blade is varied
from 20 to 40 in steps of 10, the temperature is varied from 200 to 240 in steps of 20 and the mixing time is
varied from 20 to 40 minutes in steps of 10. The results of the experimentation reveals that mixing temperature
has a profound effect on the homogeneity of the mix.

Keywords: Feed stock, Stainless Steel 316L, Homogeneity, Density Measurement, Binder Burnout Test.
275.
References: 1559-
156
1. Design and Analysis of Feed Stock Mixing Machine for Micro Metal Injection Molding. doi: 10.1016/j.proeng.2015.05.074 3
2. L. Liu, N.H. Loh, B.Y. Tay, S.B. Tor, Y. Murakoshi and R. Maeda, Mixing and characterisation of 316L stainless steel feedstock for
micro powder injection molding, Materials Characterization 54, 2005, pp 230-238.
3. Baum, L. W. and Wright, M. (1999), ‘Composition and process for metal injection molding’, US Patent 5,993,507.
4. R.M. German: Powder Injection Molding, Metal Powder Industries Federation, Princeton, NJ, 1990.
5. R. M. German and A. Bose, Injection Molding of Metals and Ceramics, Metal Powder Industrial Federation (1997).
6. Huang, B., Liang, S., Qu, X. 2003. The Rheology of Metal Injection Molding, Journal of Materials Processing Technology, Vol. 137:
132-137.
7. C. Quinard, T. Barriere, J.C. Gelin, Development and properties identification of 316L stainless steel feedstock for PIM and µPIM,
Powder Technology, in print, 2008.
8. Ebel, T: Metal Injection Molding of Titanium, 'Materials Science Forum', vol. 690, 2011, 181-184.Hwang, KS: Common defects in
metal injection molding (MIM). Piotter, V: Micro metal injection molding (MicroMIM).
9. Li, Duxin; Hou, Haitao; Tan, Zhaoqiang; Lee, Kun: Metal injection Molding of pure Molybdenum, 'Advanced Powder Technology',
vol. 20, no. 5, 2009, 480-487.
10. Loh, NH; Tor, SB; Khor, KA: Production of metal matrix composite part by powder injection molding, 'Journal of materials
processing technology', vol. 108, no. 3, 2001, 398-407.
11. Ozgun, Ozgur; Gulsoy, H Ozkan; Yilmaz, Ramazan; Findik, Fehim: Injection molding of nickel based 625 superalloy: Sintering, heat
treatment, microstructure and mechanical properties, 'Journal of Alloys and Compounds', vol. 546, 2013, 192-207.

Authors: Patteti Krishn

Paper Title: Performance on FBMC-OQAM and OFDM Multicarrier Systems


Abstract: Filter Bank Multi Carrier (FBMC) offers best detestable properties took a gander at over orthogonal
frequency division multiplexing (OFDM) to the attack of nonexistent hindrance. FBMC system is a multicarrier
structure, particularly sensible for 5G remote correspondences. FBMC beats OFDM as a result of proficient use
of the open information move limit and without usage of cyclic prefix (CP). In this paper, we address the issue
of remarkable enrollment at the pilot territory and used to audit the channels with pilot picture, in like way
consider the fundamental conditions for utilization of the assistant pilot pictures. First and two partner pictures
for each pilot plans with power equality uses instead of one picture; it can attainable inspirations driving
necessity of OFDM and FBMC depending upon signal to noise ratio (SNR) what's relentlessly possible to
improve the introduction of one frivolity pictures by using multiple associate pictures. Finally autonomous the
BER execution reenactment results and adornment pilot pictures.

Keywords: Auxiliary pilot patterns, BER, Channel estimation, Cancellation of Interference, FBMC Coding,
OFDM and SNR.
276.
1564-
References: 156
7
1. Alphan Sahin, Ismail Guvenc, and Huseyin Arslan, “A survey on multicarrier communications: Prototype filters, lattice structures, and
implementation aspects,” IEEE Communications Surveys & Tutorials, vol. 16, no. 3, pp. 1312–1338, 2012.
2. Behrouz Farhang-Boroujeny, “OFDM versus filter bank multicarrier,” IEEE Signal Processing Magazine, vol. 28, no. 3, pp. 92–112,
2011.
3. Jeffrey G Andrews, Stefano Buzzi, Wan Choi, Stephen V Hanly, Aurelie Lozano, Anthony CK Soong, and Jianzhong Charlie Zhang,
“What will 5G be?,” IEEE Journal on Selected Areas in Communications, vol. 32, no. 6,pp. 1065–1082, 2014.
4. Gerhard Wunder, Peter Jung, Martin Kasparick, Thorsten Wild, Frank Schaich, Yejian Chen, Stephen Brink, Ivan Gaspar, Nicola
Michailow, Andreas Festag, et al., “5GNOW: non orthogonal, asynchronous waveforms for future mobile applications,” IEEE
Communications Magazine, vol. 52, no. 2, pp. 97–105, 2014.
5. Paolo Banelli, Stefano Buzzi, Giulio Colavolpe, Andrea Modenini, Fredrik Rusek, and Alessandro Ugolini, “Modulation formats and
waveforms for 5G networks: Who will be the heir of OFDM?: An overview of alternative modulation schemes for improved spectral
efficiency,” IEEE Signal Processing Magazine, vol. 31, no. 6, pp. 80–93, 2014.
6. Behrouz Farhang-Boroujeny, “Filter bank multicarrier modulation: A waveform candidate for 5G and beyond,” Advances in Electrical
Engineering, vol. 2014, 2014.
7. Robert W Chang, “Synthesis of band-limited orthogonal signals for multichannel data transmission,” Bell System Technical Journal,
vol. 45, no. 10, pp. 1775–1796, 1966.
8. B Saltzberg, “Performance of an efficient parallel data transmission system,” IEEE Transactions on Communication Technology, vol.
15, no. 6, pp. 805–811, 1967.
9. Helmut B¨olcskei, “Orthogonal frequency division multiplexing based on offset QAM,” in Advances in Gabor analysis, pp. 321–352.
Springer, 2003.
10. Behrouz Farhang-Boroujeny and Chung Him Yuen, “Cosine modulated and offset QAM filter bank multicarrier techniques: a
continuous-time prospect,” EURASIP Journal on Advances in Signal Processing, vol. 2010, pp. 6, 2010.
11. M Bellanger, D Le Ruyet, D Roviras, M Terr´e, J Nossek, L Baltar, Q Bai, D Waldhauser, M Renfors, T Ihalainen, et al., “FBMC
physical layer: a primer,” PHYDYAS, January, 2010.
12. Chrislin L´el´e, J-P Javaudin, Rodolphe Legouable, Alexandre Skrzypczak, and Pierre Siohan, “Channel estimation methods for
preamble-based OFDM/OQAM modulations,” European Transactions on Telecommunications, vol. 19, no. 7, pp. 741– 750, 2008.
13. Dimitrios Katselis, Eleftherios Kofidis, Athanasios Rontogiannis, and Sergios Theodoridis, “Preamble-based channel estimation for
CP-OFDM and OFDM/OQAM systems: A comparative study,” IEEE Transactions on Signal Processing, vol. 58, no. 5, pp. 2911–
2916, 2010.
14. Eleftherios Kofidis, Dimitrios Katselis, Athanasios Rontogiannis, and Sergios Theodoridis, “Preamble-based channel estimation in
OFDM/OQAM systems: a review,” Signal Processing, vol. 93, no. 7, pp. 2038–2054, 2013.

Authors: Shaik Khaja Mohiddin, Y Suresh Babu

Paper Title: Unique Methodology To Mitigate Anti-Forensics In Cloud Using Attack- Graphs
Abstract: In this challenging era of technology where cloud computing has expanded its application wings in
almost all areas. From individual end-users, small scale business to large organizations. All of them are now free
from the maintenance, updating the software and taking the advantage of low-cost investments just by hiring the
services and required applications from the cloud rather than building and maintaining the same. Though these
advantages are creating much demand for cloud services with more required features at the same time, a
challenge comes on the other side from attacks on client's data in the cloud. It becomes more difficult for the
investigator to carry out the investigation during cyber-attacks on the cloud. During the attacks, there is a need
for a quick response when certain anti-forensics is carried out to mislead the investigators. They may lead to
waste of time, efforts, and spent cost. This paper presents a unique methodology to mitigate anti-forensics in a
cloud with the effective usage of the relevant graphs. With the effective usage of graphs by the generation of
attack, evidence and anti-forensic graphs helpful for the investigator to understand the cause and to carry out
relatively countermeasures right way without being deviated by the anti-forensics.

277. Keywords: attack graph, evidence graph, anti-forensic graph.


1568-
References: 157
4
1. Draft NISTIR 8006 “NIST Cloud Computing Forensic Science Challenges,” http://csrc.nist.gov / publications / drafts/nistir-
8006/draft_nistir_8006.pdf, June 2014.
2. Cnet, “Cybercrime moves to the cloud,” http://www.cnet.com/news/cybercrime-moves-to-the-cloud/ [Accessed January 21st, 2016].
3. Al Fahdi, M., Nathan L. Clarke, and Steven M. Furnell. "Challenges to digital forensics: A survey of researchers & practitioners
attitudes and opinions."Information Security for South Africa, 2013. IEEE, 2013.
4. Liu, C., Singhal, A., & Wijesekera, D. (2012). Mapping evidence graphs to attack graphs. 2012 IEEE International Workshop on
Information Forensics and Security (WIFS), from PP 121-127.
5. Shaik Khaja Mohiddin & Dr.Y Suresh Babu (2019). A Technical Framework for Reducing and Analyzing Vulnerable Cyber Attacks
on the Cloud with the Inclusion of Snort based IDS Suitable to Carryout Forensic Analysis Further. JARDCS, ISSN: 1943-023X,
Vol.10.Issue.10, from PP 323-333.
6. Shaik Khaja Mohiddin & Dr. Y Suresh Babu (2019). A Relevance Technical Approach for Screening the Significance of IDS in Cloud
Forensics. (IJITEE) ISSN: 2278-3075, Volume-8 Issue-4S2 March, 2019, from PP 425-430.
7. M Kwan, K P Chow, F Law and P Lai. Reasoning About Evidence using Bayesian Network, Advances in Digital Forensics IV,
International Federation for Information Processing (IFIP) January 2008, Tokyo, pp.141-155.
8. F. Taroni, A. Biedermann, P. Garbolino, C.G. Aitken, A general approach to Bayesian networks for the interpretation of evidence
Forensic Sci. Int., 139 (2004), pp. 5– 16.
9. Darwiche A. Modeling and reasoning with Bayesian networks. Cambridge university press; 2009 Apr 6.
Authors: Mohammad Kh Th E Alazemi, and A. K. M. Mohiuddin
Conflicts and Delays in Mega Construction Projects – Kuwait International Airport Cargo City –
Paper Title:
Research
Abstract: Mega construction projects in general require a lot of planning in terms of land acquisition,
estimating material cost, human resources, financials, safety and many more. It is a common scenario with
delays occurring in such mega projects attributing to increased project costs, delays in work completion. It leads
to creating a negative impact on the prospects of the effective utilization of the project output in terms of space,
facility and resources to commence work at that location. This study aims to identify the factors that could
potentially contribute to project delays and possible methods of resolving the conflicts that have aroused. A case
study on Kuwait International Airport Cargo City was conducted quantitatively as well as qualitatively. It is
278. learnt that management conflicts have a major impact on creating project delays, due to poor management, lack
1575-
of effective communication and ineffective utilization of resources.
158
8
Keywords:

References:

1. Al-Sabah, S.J.A. 1997, Construction disputes and claims in Kuwait, University of Birmingham, School of Civil Engineering, Faculty
of Engineering.
2. Charehzehi, A., Chai, C., Md Yusof, A., Chong, H. Y., & Loo, S. C. (2017). Building information modeling in construction conflict
management. International Journal of Engineering Business Management, 9, 1847979017746257.
3. Fenn, P., Lowe, D., & Speck, C. (1997). Conflict and dispute in construction. Construction Management and Economics, 15(6), 513–
518.
4. Femi, Okuntade Tope. "Causes and effects of conflict in the Nigerian construction industry." International journal of technology
enhancements and emerging engineering research2.6 (2014): 7-16.
5. Gamil, Yaser, and Ismail Abdul Rahman. "Identification of causes and effects of poor communication in construction industry: A
theoretical review." Emerging Science Journal 1.4 (2018): 239-247.
6. Loosemore, M. 2000. Construction crisis management. New York, American Society of Civil Engineers.
7. Langford, D. A., Kennedy, P., & Sommerville, J. (1992). Contingency management of conflict: analysis of contract
interfaces. Construction conflict management and resolution, 63.
8. Saikat Maiti & Jae-ho Choi (2018) Investigation and implementation of conflict management strategies to minimize conflicts in the
construction industry, International Journal of Construction Management, DOI: 10.1080/15623599.2018.1536964
9. Nunnally, Jum C., and Ira H. Bernstein. "The theory of measurement error." Psychometric theory 3 (1994): 209-247.
10. Shapiro, B. (2005), Inherent conflicts in the construction industry and the structure of contracts, Fundamentals of Construction
Contracts: Understanding the Issues conference, Lorman Education Services, Vancouver, BC

Authors: Sanjay H R, S C Gulati, Nithesh Naik, Suhas Kowshik CS

Paper Title: Design and Development of Novel Semi Active Eddy Current Damper for Aerospace Applications
Abstract: The structural vibration damping is of utmost priority and critical for electronic and mechanical
devices used in aircraft and automobiles. A novel eddy current damper is designed and developed, thereby the
damping characteristics were evaluated theoretically and experimentally to obtain an optimum value of damping
coefficient to suppress the vibrations in the devices. After performing the various calculations, the desired value
for “c” (eddy current damping co-efficient) is found out to be 150.93 Ns/m for a plate thickness of 3 mm, a
current value of 3A, number of turns on the electromagnet was 1000. The graph of “c” vs “t” was found out to
be a straight line. The nature of the graph obtained between amplitude of vibration vs time was similar to that of
logarithmic decrement curve where the ratio of successive amplitudes remains constant. The value of damping
coefficient ζ was found out to be in the desired range of the theoretical value.

Keywords: Eddy current damping; vibrations, aerospace, structural damping.

279. References:
1589-
1. Wijker J.J., (2004). Mechanical vibrations in spacecraft design, Berlin and Heidelberg: Springer. 159
2. Huo L.S., Song G.B., Nagarajaiah S., et al., (2012). Semi-active vibration suppression of a space truss structure using a fault tolerant
controller, Journal of Vibration and Control 18(10): 1436-1453. 2
3. Sodano H.A., Bae J.S., (2004). Eddy current damping in structures, Shock and Vibration Digest 36(6): 469-478.
4. Schmid M., Varga P., (1992). Analysis of vibration-isolating systems for scanning tunnelling microscopes, Ultramicroscopy 42-44:
1610-1615.
5. Sodano H.A., Bae J.S., Inman D.J., et al., (2006). Improved concept and model of eddy current damper, Journal of Vibration and
Acoustics 128(3): 294-302
6. Kobayashi, H. and Aida, S., (1993), “Development of a Houde Damper Using Magnetic Damping,” in Proceedings of the 14th Biennial
ASME Conference on Vibration and Noise, Albuquerque, NM, Vol. 62, 25–29.
7. Kienholtz D.A., Smith C.A., and Haile W.B., (1996). A magnetically damped vibration isolation system for a space shuttle payload,
Proceeding of the SPIE International Symposium on Smart Structures and Materials, San Diego, CA, 2720: 272-280.
8. Kwag D.G., Bae J.S., and Hwang J.H., (2007). Experimental study for dynamic characteristics of an eddy current shock absorber,
Journal of the Korean Society Aeronautical and Space Sciences 35(12): 1089-1094.
9. Ebrahimi B., Khamesee M.B., Golnaraghi M.F., (2008). Design and modeling of a magnetic shock absorber based on eddy current
damping effect, Journal of Sound and Vibration 315(4): 875-889.
10. Cheah S.K. and Sodano H.A., (2008). Novel eddy current damping mechanism for passive magnetic bearings, Journal of Vibration and
Control 14(11): 1749-1766.
11. Hart H.W., (2006). Engineering Electromagnetics, Seventh Edition, New York: McGraw Hill.

Authors: Anamika
An integrated PCA – FFNN approach for short term electricity point price forecasting in
Paper Title:
deregulated electricity markets
Abstract: Estimation of cost is the maximum primary enterprise and the purpose behind choosing decisions in
targeted providing frameworks. Generosity, steady exceptional and perfect blessings for the market players are
the usual concerns which may be practiced by way of a point worth determining module such as unassuming
choice botches, much less computational time and reduced multifaceted layout. Hereafter in this work, an
insightful strategy situation to predominant issue analysis (PCA) pre-arranged Feed forward Neural community
(FFNN) is proposed for transitory market clearing charges envisioning for pool based strength markets. The
imagination of the proposed figuring lies in basic decline of having geared up instructive accumulation that's
used for setting up the FFNN, intrinsically lowering the computational time and multifaceted nature load.
280. amongst of the exceptional getting equipped figurings, the Levenberg – Marquardt (LM) be counted is utilized
for the planning functions. The proposed approach is reviewed on the power markets of a place Spain and India. 1593-
The results pass on that it's far viable to lower the comparing errors related with energy marketplace costs 160
finding out the use of proposed composed technique. imply Absolute percentage blunders (MAPE) primarily 3
based affectability assessment is executed to perceive the maximum critical getting equipped parameters that
effect the conjecture botches. The all out research may additionally help the ISO in finding the key elements that
are in shape for estimate with low goofs.

Keywords: Principal component Analysis, Feed Forward Neural Network, Price lags, Market clearing prices.

References:

1. Dornan Matthew. exchange no matter administrative issues? The political economic system of pressure territory exchange in Fiji,
1996–2013. ENERG coverage 2014; 67: 703 – 712.
2. Smiechn Sławomir, Papiez Monika. Essentialness usage and cash associated development inside the mild of social occasion the goals
of imperativeness technique in the european: The bootstrap board Granger causality method. ENERG policy 2014; 71: 118 – 129.
3. Prabavathi M, Gnanadass R. Imperativeness supplying strategies for reconstructed strength showcase. INT J ELEC power 2015; 64:
956 – 966.
4. Rodriguez C P, Anders G J. presenting philosophy structure for exclusive sorts of electric powered power grandstand individuals. IEEE
T energy SYST 2004; 19: 964 – 971.
5. Mathabaa Tebello, Xia Xiaohua, Zhang Jiangfeng. isolating the cash related little bit of leeway of have an effect on really worth test in
mechanical weight booking. ELECTR POW SYST RES 2014; 116: 158 – one hundred sixty five.
6. Anamika, Rajagopal Peesapati, Niranjan Kumar. Estimation of GSR to determine the solar organized energy fee in placing of
deregulated power markets. Revive ENERG 2016; 87: 353 – 363.
7. Catalao J P S, Mariano S J P S, Mendes V M F, Ferreira L A F M. temporary electricity prices foreseeing in a forceful market: a neural
framework technique. ELECTR POW SYST RES 2007; seventy seven: 1297 – 1304.
8. Aggrawal S ok, Saini L M, Kumar A. power worth comparing in deregulated markets: a evaluate and appraisal. INT J ELEC electricity
2009; 31: thirteen – 22.
9. Singhal Deepak, Swaroop okay S. power worth foreseeing using counterfeit neural frameworks. INT J ELEC power 2011; 33: 550 –
555.
10. Zhang Li, Luh Peter B. Neural network based marketplace clearing esteem preference and warranty spoil estimation with an progressed
widened Kalman channel. IEEE T energy SYST 2005; 20: fifty nine – 66.
11. Yan Xing, Chowdhury Nurul A. Mid-term energy marketplace clearing esteem guaging: A numerous SVM method. INT J ELEC
energy 2014; fifty eight: 206 – 214.
12. Yan Xing, Chowdhury Nurul A. Mid-term electricity marketplace clearing worth figuring out using hybrid reinforce vector gadget and
car in opposite shifting regular with outdoor facts. INT J ELEC energy 2014; 60: sixty four – 70.
13. Yan Xing, Chowdhury Nurul A. Mid-time period power market clearing well worth determining: A cream LSSVM and ARMAX
method. INT J ELEC energy 2013; fifty three: 20 – 26.
14. Zhongfu Tan, Jinlian Zhang, Jianhui Wang, Jun Xu. Day-in advance strength well worth foreseeing using wavelet change united with
ARIMA and GRACH fashions. associated electricity 2010; 87: 3606 – 3610.
15. Zhang Jinliang, Tan Zhongfu, Yang Shuxia. Day-beforehand energy esteem guaging by using any other crossbreed system. COMPUT
IND ENG 2012; sixty three: 695 – 701.
16. Pousinho H M I, Mendes V M F, Catalao J P S. Flashing pressure expenses guaging in a forceful market by means of a pass breed
PSO-ANFIS technique. INT J ELEC power 2012; 39: 29 – 35.
17. Nogales Francisco J, Contreras Javier, Conejo Antonio J, Espinola Rosario. comparing following day electricity costs with the aid of
time course of motion models. IEEE T electricity SYST 2002; 17: 342 – 348.
18. Vilar Juan M, Cao Ricardo, Aneiros German. Assessing following day electricity solicitation and worth using non parametric precious
strategies. INT J ELEC energy 2012; 39: 48 – fifty five.
19. Moazzami Majid, Hooshmand Rahmat Allah. present minute nodal blockage worth finding out in a tremendous scale strength
marketplace the usage of ANN with innate improvement getting geared up. TURK J ELEC ENG COMP SCI 2012; 20: 751 – 768.
20. Olmek Mehmet Ali okay, Navruz Isa. Envisioning the day-in advance fee in power converting and settlement marketplace of Turkey
via the use of faux neural frameworks. TURK J ELEC ENG COMP SCI 2015; 23: 841 – 852.
21. Zarezadeh M, Naghavi A, Ghaderi S F. power worth foreseeing in Iranian strength marketplace applying counterfeit neural
frameworks. In: IEEE 2008 electric energy convention; 6 – 7 October 2008; Vancouver, BC, Canada: IEEE. pp. 1 – 6.
22. Simab Mohsen, Haghifam Mahmoud-Reza. using composed version to assess the viability of electrical waft associations. IEEE T
energy SYST 2010; 25: 1806 – 1814.
23. Anbazhagan S, Kumarappan N. Day-ahead deregulated energy market esteem portrayal the usage of neural framework records featured
by way of DCT. ENERG CONVERS manipulate 2014; seventy eight: 711 – 719.
24. J. P. S. Catalao, H. M. I. Pousinho, V. M. F. Mendes, brief term energy charges comparing in an engaged marketplace by using a
creamer adroit philosophy, energy exchange and the board, fifty two, 2011, 1061-1065.
25. Amjady N, Keynia F. Day-ahead worth envisioning of intensity promotes by regular records device and fell neuro-formative
computation. IEEE Transactions on energy systems, 24, 2009, 306–318.
26. G. J. Osorio, J. C. O. Matis, J. P. S. Catalao, energy fees assessing via a mix formative adaptable procedure, strength Conversion and
control, 2014, sixty three, 363-373.
27. H. Shayeghi, A. Ghasemi, Day-in advance electricity costs comparing by means of a modified CGSA approach and creamer WT in
LSSVM based arrangement, strength Conversion and control, 2013, 74, 482-491.
28. M. Shafie Khan, M. Paras Moghaddam, M. okay. Sheik-El-Eslami, charge foreseeing of dya-in advance strength markets the use of a
mutt gauge method, electricity exchange and the board, 52, 2011, 2165-2169.
29. Keynia F. any other issue assurance figuring and composite neural framework for power really worth assessing. constructing packages
of synthetic Intelligence 2012;25:1687–ninety seven.

Authors: Anamika

Paper Title: Volatility Indices Evaluation for Deregulated Electricity Markets


Abstract: The eccentric thought of intensity well worth makes, genuine deciding as a critical test for
orchestrating and motion of an engaged energy markets. in the gift paintings a careful and a high feasible
technique is proposed to bet the strength charges in Spanish electricity markets. Affectability assessment is
proposed with a purpose to find the important thing commitments to a ton of records used for evaluating. the
nature unusualness, adds more vulnerabilities and complexities to govern structure movement, and for this
reason affecting the lead of age, transmission and solicitation side in electricity markets. Thusly, in spite of
guaging, the capricious concept of the power markets is in like way surveyed. The unusualness information are
281. made problem to chronicled precariousness and well worth pace thoughts which can be as of past due related to
1604-
other energy market prices and used in the gift paintings. The result of the assessing version well-knownshows
160
that screw up figuring out with the proposed technique is cheap whilst stood out from a few exceptional fashions
8
proposed within the composition survey. The eventual outcomes of affectability exam well-knownshows that the
fee earlier than an hour, 3 hours, 24 hours, 25 hours and 96 hours are the maximum massive information
capabilities at the same time as guaging the electricity costs using recorded really worth regards as statistics
instructive list. it's miles seen that fall and summer seasons are uncommonly erratic in nature than the spring and
iciness seasons in Spanish power markets. The complete research paintings facilitates the free machine
executives with developing notable operating of pressure structures movement and markets.

Keywords: fee, finding out, shakiness, affectability examination.


References:

1. Paras Mandal, Tomonobu Senjyu, Atsushi Yona, Jung-Wook Park and Anurag k. Srivastav, "Affectability analysis of similar Days
Parameters for Predicting quick term electricity rate", in Proc. Naps' 07, 2007, pp. 568-574.
2. Francisco J. Nogales, Javier Contreras, Antonio J. Conejo and Rosario Espínola, "Foreseeing subsequent Day electricity prices by way
of Time series models", IEEE Trans. electricity systems, vol. 17, no. 2, pp. 342-348, may additionally 2002.
3. Hirofumi Toyama, Tomonobu Senjyu, Phatchakorn Areekul, Shantanu Chakraborty, Atsushi Yona and Toshihisa Funabashi,
"Following Day energy charge Forecasting on Deregulated electricity market" in Proc. T&D Asia 2009, pp. 1-4.
4. Hamidreza Zareipoura, Kankar Bhattacharya and Claudio A. Can izares, "strength marketplace charge Volatility: The event of
Ontario", strength coverage, vol. 35, pp. 4739-4748, can also 2007.
5. Sherzod N. Tashpulatov, "Assessing the Volatility of intensity charges: the example of england and Wales rebate manipulate
grandstand", strength policy, vol. 60, pp. 81-90, may 2013.
6. Ting He, Ke Meng, Zhao Yang Dong, Yong-Taek Oh and Yan Xu, "utilization of excessive performance pics Processing devices for
power gadget call for Forecasting", journal of electrical Engineering and technology, Vol. five, No. three, pp. 363-370, can also 2010.
7. Juan M. Vilar, Ricardo Cao and Germán Aneiros, "Assessing following day strength solicitation and really worth the usage of non
parametric utilitarian methodologies," electric electricity and strength systems, vol. 39, pp. forty eight-55, Feb. 2012.
8. Xing Yan and Nurul A. Chowdhury, "Mid-term energy marketplace clearing really worth evaluating: A cream LSSVM and ARMAX
approach," electric power and power structures, vol. 53, pp. 20-26, April 2013.
9. Li Xie and Hua Zeng, "energy fee Forecasting by way of Clustering-Least Squares guide Vector gadget," in Proc. CSIP 2013, pp. 1357-
1361.
10. charges at IEX INR/Mwh, http://www.iexindia.com/marketdata/areaprice.aspx. Date final got to: 09.01.2015.
11. Deepak Singhal and k. S. Swarup, "electricity charge Forecasting the use of artificial Neural Networks", electrical strength and
electricity structures, vol. 33, pp. 550-555, Feb. 2011.
12. C. P. Rodriguez and G. J. Anders, Bidding method structure for extraordinary sorts of electric energy showcase people, IEEE
Transactions on electricity systems, 2004, 19, 964-971.
13. Francisco J. Nogales, Javier Contreras, Antonio J. Conejo, Rosario Espínola, Forecasting next-Day power charges through Time
collection fashions, IEEE Transactions on strength systems, 2002, 17.
14. Li Zhang, Peter B. Luh, Neural network primarily based marketplace clearing esteem choice and sureness smash estimation with an
advanced widened kalman channel, IEEE Transactions on strength systems, 2005, 20, fifty nine-sixty six.
15. Amjady N, Keynia F. Day-in advance worth deciding of depth well-knownshows via shared statistics method and fell neuro-formative
remember. IEEE Transactions on power structures, 24, 2009, 306–318.
16. Mohsen Simab, Mahmoud-Reza Haghifam, the use of integrated model to assess the performance of electrical Distribution
organizations, IEEE Transactions on energy systems, 2010, 25, 1806 - 1814.
17. Anamika, Rajagopal Peesapati, Niranjan Kumar, "Estimation of GSR to determine sun arranged power fee in deregulated strength
markets," Renewable power, vol. 87, pp. 353-363, 2016.
Authors: S.Sankara Gomathi, A.Amutha, M.Jayapraksan

Paper Title: Personify Educational Assistance Application for Special Children Using Deep Learning
Abstract: Despite various Stand-alone educational assistance application for normal children but for the
special children it was an exceptional case still, so this children with (Anxiety Disorder, ADHD, Learning
Disabilities) find difficult to learn for long hours without getting distracted. A caretaker is needs to be with them
at all the time in order to engage them in studying efficiently. Using this technology at its best, Deep Learning
can be used to monitor the children when they are distracted and their attention can be drawn back by imposing
volunteer distractions on the screen based on the concept of Face Recognition (in terms of facial expressions).
The work has been implemented using python & OpenCV platform. By using this, The scanned image i.e.
testing dataset is being compared to training dataset and thus emotion is predicted for incorporating with
assisting component.

Keywords: Deep Learning, ADHD, Face Recognition, OpenCV.

References:

1. Shabab Bazrafkan, Tudor Nedelcu, Pawel Filipczuk, Peter Corcoran , “Deep Learning for Fcial Expression Recognition: A step closer
to a smart phone that knows your moods”,ICCE, 2017IEEE.
2. Jarenseri Mitrapanot, Bawanpak Bousai, “iCare-ADHD:A Mobile Application Prototype, ICT-ISPC, 2018.
282. 3. https://www.healthline.com
4. Alexandra Savoiu, JamesWong, “Recognizing Facial Expression Using Deep Learning”-Standford University. 1609-
5. https://www.researchgate.net/publication/287867911_Emotion_Recognition _and_Its_Applications 161
6. Laura Mancera, Silvia Baldiris, Ramon Tabregat, Sergio Gomez, Carolima Mejia, “aTenDerAH: a VideoGame To Support E-Learning 4
Students With ADHD”, ICALT, 2017 IEEE.
7. Ching-LingChen, Yung-Wen Tang, Nian-Qiaozlang, Jungpil SHIN ,”Neurofeedback Based Attention Training for Chindren With
ADHD “,2017 IEEE.
8. Eleni Mangina, Giussepe Chiazzese, Tomonori Hasegawa“AHA: ADHD Augmented Learning Environment”,2018
IEEE,NSW,Australia.
9. “Emotion Detection Using Image Processing in Python”, Bharathi Vidyapeethi Institute of Computer Application and Management
(BVICAM) ,NewDelhi,2018 IEEE.
10. https://OpenCV.Org/ & https://pythonprogramming.net
11. Ali Mollahosseini, David Chan, and Mohammad H. Mahoor, ”Going Deeper in Facial Expression Recognition Using Deep Neural
Networks”, University of Denver, CO.
12. Hong-Wei Ng, Viet Dung Ngyuen, Vassilios Vonikakkis, Stefan Winkler, “Deep Learning for Emotion Recognition on Small Datasets
Using Treansfer Learning”, ADSC.
13. - Kanade, T., Cohn, J. F., & Tian, Y. (2000). Comprehensive database for facial expression analysis. Proceedings of the Fourth IEEE
International Conference on Automatic Face and Gesture Recognition (FG'00), Grenoble, France 46-53.- Lucey, P., Cohn, J. F.,
Kanade, T., Saragih, J., Ambadar, Z., & Matthews, I. (2010). The Extended Cohn-Kanade Dataset (CK+): A complete expression
dataset for action unit and emotion-specified expression. Proceedings of the Third International Workshop on CVPR for Human
Communicative Behavior Analysis (CVPR4HB 2010), San Francisco, USA,94-101
14. https://www.asmag.com/mobile/article_detail.aspx?aid=23883
15. Justus Schwan, Esam Ghaleb, Enrique Hortal and Stylianos Asteriadis, “High Performance and Light Weight Real-Time Deep Face
Emotion Recognition”,2017 IEEE.
16. Heechul Jung , Sihaeng Lee, Sunjeong Park, Injae Lee, “Development of Deep Learning-Based Facial Expression Recognition
System”, ICT R&D Preogram,2014.
17. Rajesh Kumar G.A, Ravi Kant Kumar, Gowtam Sanyal, “Facial Emotion Analysis Using Deep Convolution Neural Network”,
ICSPC,Duragpur,2017.
18. Injae Lee, Heechul Jung, Chung Hyuu, Jeongil Seo, Junmo Kim, “Real-Time Personalized Facial Expression Recognition System
Based on Deep Learning”, ICCE.2016 IEEE.
19. Wathsala Nayomi Widanagmaachchi,”Facial Emotion Recognition With a Neural Network Approach”,UCSC, THESIS-Colombo
School of Engineering,2009.
20. “Analysis of Emotionally Salient Aspects of Fundamental Frequency for Emotion Detection”,Caios Busso,2008 IEEE.

Authors: Shubha Rao V, M.Dakshayini

Paper Title: SDN-Based Resource Reservation Protocol for IoT applications in Constrained Networks
Abstract: Constrained netwrks like Wireless Sensor Networks have been identified as a promising scheme for
next-generation wireless networks. These networks are capable of capturing data from the physical world
without human intervention possessing applications such as IoT in various fields of life that require reliable and
précised end to end delivery. However, Wireless Sensor Networks inevitably suffers from severe resource
constraints and hence promising the provision of desired QoS is a challenge. In most of the applications like
military, medical surveillance. Data captured are critical and hence the transmission of such data entails a
minimal end to end delay. In constrained networks achieving minimal delay with effective utilization of
resources are important cost factors for achieving an end to end delivery. In this Paper, a Software-defined
Networking (SDN), based resource reservation protocol, which leverages SDN to centrally process the whole
control logic and accordingly decides the amount of resources to be allocated for each data flow alleviating the
processing overhead of all other nodes thus minimizing the energy consumption is proposed. The proposed
algorithm is evaluated through simulation and the results obtained proved the efficiency of the proposed protocol
by effectively minimizing the system’s energy consumption and end to end delay.

Keywords: Critical data, Energy utilization, Internet of Things, Resource reservation protocol, Software
Defined Networks, Wireless Sensor Networks.

References:

1. Wortmann, Felix, and Kristina Flüchter. "Internet of things." Business & Information Systems Engineering 57.3 (2015): 221-224.
2. Gubbi, Jayavardhana, et al. "Internet of Things (IoT): A vision, architectural elements, and future directions." Future generation
computer systems 29.7 (2013): 1645-1660.
283. 3. IAkyildiz, Ian F., et al. "Wireless sensor networks: a survey." Computer networks 38.4 (2002): 393-422.
4. Younis, Mohamed, Kemal Akkaya, and Moustafa Youssef. "Handling qos traffic in wireless sensor networks." Encyclopedia on Ad
1615-
Hoc and Ubiquitous Computing: Theory and Design of Wireless Ad Hoc, Sensor, and Mesh Networks. 2010. 257-279. 162
5. “RSVP.pdf.” .RFC 2205 2
6. Stankovic, John A. "Research challenges for wireless sensor networks." ACM SIGBED Review 1.2 (2004): 9-12.
7. JPolastre, Joseph, Jason Hill, and David Culler. "Versatile low power media access for wireless sensor networks." Proceedings of the
2nd international conference on Embedded networked sensor systems. ACM, 2004.
8. Bernet, Yoram. "The complementary roles of RSVP and differentiated services in the full-service QoS network." IEEE
Communications Magazine 38.2 (2000): 154-162.
9. Ephremides, Anthony. "Energy concerns in wireless networks." IEEE Wireless Communications 9.4 (2002): 48-59.
10. Kim, Min-Sun, et al. "A resource reservation protocol in wireless mobile networks." Proceedings International Conference on Parallel
Processing Workshops. IEEE, 2001. .
11. Del Cid, Pedro Javier, et al. "DARMA: adaptable service and resource management for wireless sensor networks." Proceedings of the
4th International Workshop on Middleware Tools, Services and Run-Time Support for Sensor Networks. ACM, 2009.
12. Cho, Wan-Hee, Jiho Kim, and Ohyoung Song. "An efficient resource management protocol for handling small resource in wireless
sensor networks." International Journal of Distributed Sensor Networks 9.5 (2013): 324632.
13. Jacobsson, Martin, and Charalampos Orfanidis. "Using software-defined networking principles for wireless sensor networks." SNCNW
2015, May 28–29, Karlstad, Sweden. 2015.
14. Sheng, Zhengguo, et al. "Lightweight management of resource-constrained sensor devices in internet of things." IEEE internet of
things journal 2.5 (2015): 402-411.
15. Zander, Jens, et al. Radio resource management for wireless networks. Artech House, Inc., 2001.
16. Regini, Edoardo, Daeseob Lim, and Tajana Šimunić Rosing. "Resource management in heterogeneous wireless sensor
networks." Journal of Low Power Electronics 7.2 (2011): 123-140.
17. Hassan, Muhammad Ali, Quoc-Tuan Vien, and Mahdi Aiash. "Software defined networking for wireless sensor networks: a
survey." Advances in Wireless Communications and Networks3.2 (2017): 10-22.
18. Ndiaye, Musa, Gerhard Hancke, and Adnan Abu-Mahfouz. "Software defined networking for improved wireless sensor network
management: A survey." Sensors 17.5 (2017): 1031.
19. Luo, Tie, Hwee-Pink Tan, and Tony QS Quek. "Sensor OpenFlow: Enabling software-defined wireless sensor networks." IEEE
Communications letters 16.11 (2012): 1896-1899.
20. Rao, Shubha, and M. Dakshayini. "Energy efficient resource reservation mechanism for constrained networks." 2016 2nd
International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT). IEEE, 2016.
Authors: Sonali Bansal, Shubpreet Kaur, Navdeep Kaur

Paper Title: Enhancement in Brain Image Segmentation using Swarm Ant Lion Algorithm

Abstract: Brain tumor image segmentation is a play a vital role in the medical field or medical processing.
284. Patient treatment with brain tumors is the significant level determine on early-stage detection of these tumors.
Early stage detection of Brain Tumors will enhance the patient lives. The disease of brain tumors by a 1623-
neurologist frequently uses a manual image segmentation that is a hard and time-consuming process, because of 162
necessary automatic image segmentation. Nowadays, automatic image segmentation is very popular and can 8
solve the issue of tumor brain image segmentation with better performance. The main motive of this research
work is to provide a survey of MRI image based brain tumor segmentation techniques. There are various
existing study papers, focusing on new techniques for Reasonable Magnetic Image-based brain tumor image
segmentation. The main problem is considered a complicated process, because of the variability of tumor area of
the complexity of determining the tumor position, size, shape and texture. In this research work, mainly worked
on interference method, feature extraction, morphological operators, edge detection methods of gray level and
Swarm Ant Lion Optimization based on brain tumor shape growing segmentation to optimize the image
complexity and enhance the performance. In new algorithm implemented an inspiring nature method for
segmentation of brain tumor image using hybridization of PSOA and ALO is also called a Swarm Ant Lion
method. Evaluate the performance metrics with image quality factor (PSNR), Error Rate (MSE), and Exact value
(Accuracy Rate). In research work, improve the performance metrics with PSNR and Accuracy Rate and reduce
the error rates and compared with the existing method (PNN).

Keywords: Brain Image Segmentation, Probabilistic Neural Network, Ant Lion and Particle Swarm
Optimization method.

References:

1. Bousselham, A., Bouattane, O., Youssfi, M., & Raihani, A. (2019). Towards Reinforced Brain Tumor Segmentation on MRI Images
Based on Temperature Changes on Pathologic Area. International Journal of Biomedical Imaging, 2019.
2. Calabrese, C., Poppleton, H., Kocak, M., Hogg, T. L., Fuller, C., Hamner, B., ... & Frank, A. (2007). A perivascular niche for brain
tumor stem cells. Cancer cell, vol. 11(1), pp.69-82.
3. Koestner, A., & Higgins, R. J. (2002). Tumors of the nervous system. Tumors in domestic animals, vol. 2(3),pp. 697-738.
4. Prastawa, M., Bullitt, E., Ho, S., & Gerig, G. (2004). A brain tumor segmentation framework based on outlier detection. Medical image
analysis, 8(3), 275-283.
5. Rajasekaran, K. A., & Gounder, C. C. (2018). Advanced Brain Tumour Segmentation from MRI Images. In High-Resolution
Neuroimaging-Basic Physical Principles and Clinical Applications. IntechOpen.
6. Menze, B. H., Jakab, A., Bauer, S., Kalpathy-Cramer, J., Farahani, K., Kirby, J and Lanczi, L. (2014). The multimodal brain tumor
image segmentation benchmark (BRATS). IEEE transactions on medical imaging,vol. 34(10),pp. 1993-2024.
7. Howe, F. A., & Opstad, K. S. (2003). 1H MR spectroscopy of brain tumours and masses. NMR in Biomedicine, 16(3), 123-131.
8. Patil, R. C., & Bhalchandra, A. S. (2012). Brain tumour extraction from MRI images using MATLAB. International journal of
electronics, communication & soft computing science and engineering, vol. 2(1),pp. 1-4.
9. Angulakshmi, M., & Lakshmi Priya, G. G. (2017). Automated brain tumour segmentation techniques—A review. International Journal
of Imaging Systems and Technology, vol. 27(1), pp. 66-77.
10. Foroglou, N., Zamani, A., & Black, P. (2009). Intra-operative MRI (iop-MR) for brain tumour surgery. British journal of
neurosurgery, vol. 23(1),pp. 14-22.
11. Nasir, M., Baig, A., & Khanum, A. (2014, June). Brain tumor classification in MRI scans using sparse representation. In International
Conference on Image and Signal Processing (pp. 629-637). Springer, Cham.
12. Logeswari, T., & Karnan, M. (2010). An improved implementation of brain tumor detection using segmentation based on soft
computing. Journal of Cancer Research and Experimental Oncology,vol. 2(1),pp. 006-014.
13. Selvakumar, J., Lakshmi, A., & Arivoli, T. (2012, March). Brain tumor segmentation and its area calculation in brain MR images using
K-mean clustering and Fuzzy C-mean algorithm. In IEEE-International Conference on Advances in Engineering, Science and
Management (ICAESM-2012) (pp. 186-190). IEEE.
14. Wu, M. N., Lin, C. C., & Chang, C. C. (2007, November). Brain tumor detection using color-based k-means clustering segmentation.
In Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007) (Vol. 2, pp. 245-
250). IEEE.
15. Xuan, X., & Liao, Q. (2007, August). Statistical structure analysis in MRI brain tumor segmentation. In Fourth International Conference
on Image and Graphics (ICIG 2007)(pp. 421-426). IEEE.
16. Hasan, S. K., & Ahmad, M. (2018). Two-step verification of brain tumor segmentation using watershed-matching algorithm. Brain
informatics,vol. 5(2), 8.
17. Kilic, H., Yuzgec, U., & Karakuzu, C. (2018). A novel improved antlion optimizer algorithm and its comparative performance. Neural
C.
18. Kurnar, M., Sinha, A., and Bansode, N. V. (2018). Detection of Brain Tumor in MRI Images by Applying Segmentation and Area
Calculation Method Using SCILAB. In 2018 Fourth International Conference on Computing Communication Control and Automation
(ICCUBEA) (pp. 1-5). IEEE.
19. Akter, L. A., and Kwon, G. R. (2018). Integration of Contourlet Transform and Canny Edge Detector for Brain Image Segmentation.
In 2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN) (pp. 798-800). IEEE.
20. Bai, X., Chen, Z., Liu, M., and Zhang, Y. (2015). Center-free PFCM for MRI brain image segmentation. In 2015 IEEE International
Conference on Image Processing (ICIP)(pp. 656-660). IEEE.

Authors: Shiv Prasad Kori, Alok Sahelay

Paper Title: RSS Based Selective Clustering Technique to Improve Power Utilization in WSN
Abstract: Wireless sensor networks (WSNs) have numerous advantages like easy deployment, scalability, no
need of infrastructure etc. Apart these features the main drawback of WSN is limited power capacity of the
sensor nodes. Hence nodes are unable to perform communication for long time duration as their limited battery
power. Receive signal strength (RSS) is a prime attribute within wireless communication because lower RSS
value leads to more power consumption for data transmission. This paper introduces RSS based approach to
285. improve the power utilization of sensor nodes. A Node near to base station transmits data directly without
1629-
clustering process. A weight parameter calculated for cluster head selection using RSS value of a node and
163
geographic location of the nodes. The propose method works on heterogeneous network like SEP technique.
6
Different power level assign to the sensor node as per distance from base station. The first group of nodes is
normal nodes they transmit data directly to the base station. The proposed method balances the energy of all
nodes and helps to improve total lifetime of sensor networks. The proposed method performs well compare with
existing methods to improve network lifetime and total number of packet transmission.

Keywords: Cluster Head, Node Geographic Location, power optimization, advance node, RSS, Selective
Clustering.

References:

1. Chaurasiya, S.K.; Pal, T.; Bit, S.D.; “An Enhanced Energy-Efficient Protocol with Static Clustering for WSN”, International Conference
on Information Networking (ICOIN), Kuala Lumpur, Malaysia, on pp. 58 – 63, 2011.
2. Heinzelman, W. R., Chandrakasan, A., &Balakrishnan, H., “Energy-efficient communication protocol for wireless microsensor
networks”, In System Sciences, 2000. Proceedings of the 33rd Annual Hawaii International Conference, pp. 10-pp, IEEE, 2000.
3. Smaragdakis, G., Matta, I., &Bestavros, A. , “SEP: A stable election protocol for clustered heterogeneous wireless sensor networks”,
Boston University Computer Science Department, 2004.
4. Abbasi, A.A.; Younis, M., “A survey on clustering algorithms for wireless sensor networks”, Comput. Commun., vol. 30, pp. 2826–
2841, 2007.
5. Arboleda, L.M. C., Nasser N., “Comparison of Clustering Algorithms and Protocols for Wireless Sensor Networks”, In Proceedings of
IEEE CCECE/CCGEI, Ottawa, Canada, pp. 1787–1792, May 2006.
6. Kumarawadu, P. Dechene, D.J. Luccini, M. Sauer A., “Algorithms for Node Clustering in Wireless Sensor Networks: A Survey”, In
Proceedings of 4th International Conference on Information and Automation for Sustainability, Colombo, Sri Lanka, pp. 295–300,
December 2008.
7. Jiang C., Yuan D., Zhao Y., “Towards Clustering Algorithms in Wireless Sensor Networks— A Survey”, In Proceedings of IEEE
Wireless Communications and Networking Conference, Budapest, Hungary, pp. 1–6, April 2009.
8. Maimour M., Zeghilet, H., Lepage F., “Cluster-based Routing Protocols for Energy-Efficiency in Wireless Sensor Networks”,
December, 2010. DOI: http://cdn.intechweb.org/pdfs/12423.pdf
9. Alok Sahelay, Shiv Prasad Kori, “Limited Cluster Technique to Enhance Wireless Sensor Network Lifespan”, International Journal of
Applied Engineering Research (IJAER), Volume 12, Number 17, pp. 6633-6640, 2017
10. Chengfa Li, Mao Ye, Guihai Chen, Jie Wu, “An Energy-Efficient Unequal Clustering Mechanism for Wireless Sensor Networks”, IEEE
International Conference on Mobile Adhoc and Sensor Systems Conference, Washington, DC, pp. – 604, 2005.
11. Bencan Gong, Layuan Li, Shaorong Wang, Xuejun Zhou, “Multi-hop Routing Protocol with Unequal Clustering for Wireless Sensor
Networks”, ISECS International Colloquium on Computing, Communication, Control, and Management, IEEE Computer Society,
Washington, DC, USA, on page(s): 552 – 556, CCCM '08, 2008.
12. Tashtarian F., Honary M.T., Haghighat A.T., Chitizadeh J., “A New Energy-Efficient Level-based Clustering Algorithm for Wireless
Sensor Networks” 6th International Conference on Information, Communications & Signal Processing, Singapore, pp. 1 – 5, 2007.
13. Gongben Can, Shaorong Wang, “A Novel Node Deployment and Clustering Scheme in Wireless Sensor Networks”, Second
International Symposium on Electronic Commerce and Security,. ISECS '09, Nanchang, China, pp. 499 – 503, 2009.
14. Wei Li, Zhe Ji, Liping Cai, Li Hong, “Load-balanced Unequal Clustering Algorithm in UWB-based Wireless Sensor Network”,
International Conference on Information Technology and Computer Science, ITCS 2009, Kiev, Ukraine, pp. 196 – 200, 2009.
Authors: Mazher Sarfaraz Khan, Sayyad Ajij D

Paper Title: Cross Layer Interaction for Strong Route Selection in A O D V for MA N E T

Abstract: Wireless communication could be a requirement of this era as all industries are approaching for the
internet of things and automation. Even supposing multiple choices are ready for wireless communication,
Mobile ad hoc Network (M A N E T) gives wireless communication while not having any infrastructure. M A N
E T typically adopts a preferred and well fitted routing protocol that is Ad hoc On Demand Distance Vector (A
O D V). Stochastic topology inside M A N E T antecedent link breaks various times in network because of that
feeble link quality that appears as packet extinction within the network. In the modern wireless communication
study, it is noted that the performance of system deteriorates because of feeble link creation or link wreckage in
the network. In this paper, link quality improvement in AODV routing protocol is focused. Link quality concern
is proposed to resolve through Cross layer design (C L D) interaction in the OSI communication model. C L D
enforced by interacting Physical initial layer and network middle layer of the OSI model, C L D facilitate in
robust route formation in AODV named as C L D A O D V. The result exhibits growth within the system
Performance in terms of factors like throughput, Packet Delivery Ratio (P D R) and decline in the packet losses
and delays in the network. Network simulator used for performance analysis are N S 2 and N S 3.

Keywords: A/O/D/V, M/A/N/E/T, C/L/D, N/S 2, N/S 3.


286.
1637-
References: 164
2
1. S. Corson and J. Macker, “Mobile ad hoc networking (MANET): Routing protocol performance issues and evaluation considerations,
RFC 2501, Jan. 1999,” RFC2501, no. JAN, 1999.
2. S. Bhale, A. Mishra, and M. Khan, Implementation of DSTC and PSO algorithm using CLD to improve the performance of MANET,
vol. 468. 2017.
3. M. Khan, M. Dhat Shital, and D. Sayyad Ajij, “Cross layer design approach for Congestion Control in MANETs,” 2016 IEEE Int.
Conf. Adv. Electron. Commun. Comput. Technol. ICAECCT 2016, pp. 464–468, 2017.
4. A. Sarfaraz Ahmed, T. Senthil Kumaran, S. Syed Abdul Syed, and S. Subburam, “Cross-layer design approach for power control in
mobile ad hoc networks,” Egypt. Informatics J., vol. 16, no. 1, pp. 1–7, 2015.
5. S. N.-U.-2012 I. C. on and undefined 2012, “Study of congestion control using AODV and signal strength by avoiding link failure in
MANET,” ieeexplore.ieee.org.
6. R. S. Kumar and P. Kamalakkannan, “A review and design study of cross layer scheme based algorithm to reduce the link break in
MANETs,” in 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering, 2013, pp. 139–143.
7. M. M. Hassan et al., “Design of an energy-efficient and reliable data delivery mechanism for mobile ad hoc networks: a cross-layer
approach,” Concurr. Comput. Pract. Exp., vol. 27, no. 10, pp. 2637–2655, Jul. 2015.
8. H. Dandotiya, R. Jain, and R. Bhatia, “Route selection in MANETs by intelligent AODV,” Proc. - 2013 Int. Conf. Commun. Syst.
Netw. Technol. CSNT 2013, pp. 332–335, 2013.
9. P. Singh and H. Dhawan, “Node mobility based route selection in AODV for use in MANETs,” Proc. - 1st Int. Conf. Comput.
Commun. Control Autom. ICCUBEA 2015, pp. 83–87, 2015.
10. R. Mangrulkar, M. A.-2010 S. I. conference, and undefined 2010, “Trust based secured adhoc On demand Distance Vector Routing
protocol for mobile adhoc network,” ieeexplore.ieee.org.
11. H. Somnuk and M. Lertwatechakul, “Multi-hop AODV-2T,” 2009 Int. Symp. Intell. Ubiquitous Comput. Educ. IUCE 2009, pp. 214–
217, 2009.
12. N. M. Krittika Khator, “A Metaphorical Review on Impact of Congestion and Route failure on the Performance Comparison of
Routing Protocols in MANET.”
13. B. Li, Z. Jin, and Y. Shu, “Cross-layer design of energy-saving AODV routing protocol,” Trans. Tianjin Univ., vol. 15, no. 5, pp. 343–
349, Oct. 2009.
14. M. K. Singh, B. Kumar, C. Kumar, and M. Gupta, “Preemptive Multipath-Adhoc On Demand Distance Vector Routing Protocol,” vol.
1, no. 1, pp. 36–40, 2011.
15. R. Mehta and D. K. Lobiyal, “Energy efficient cross-layer design in MANETs,” 2017 4th Int. Conf. Signal Process. Integr. Networks,
SPIN 2017, pp. 448–453, 2017.
16. M. Anand and T. Sasikala, “Efficient energy optimization in mobile ad hoc network (MANET) using better-quality AODV protocol,”
Cluster Comput., Jan. 2018.
17. Z. El-Bazzal, K. El-Ahmadieh, Z. Merhi, M. Nahas, and A. Haj-Ali, “A cross layered routing protocol for ad hoc networks,” 2012 Int.
Conf. Inf. Technol. e-Services, ICITeS 2012, 2012.
18. B. Shin, Y. Ko, S. Han, D. L.-A. 2010 S. School, and undefined 2010, “SINR-Based Link-Quality Routing Protocol in Multi-Radio
Mobile Ad-Hoc Network,” koasas.kaist.ac.kr.
19. E. Mostajeran, R. M. Noor, and H. Keshavarz, “A novel improved neighbor discovery method for an Intelligent-AODV in Mobile Ad
hoc Networks,” 2013 Int. Conf. Inf. Commun. Technol. ICoICT 2013, pp. 395–399, 2013.
20. F. Aune, “Cross-Layer Design Tutorial,” Tutorial, p. 35, 2004.
21. S. G. Bhoge, M. D. Chawhan, Y. Suryavanshi, and V. K. Taksande, “Cross-layer approach for energy & communication efficient
protocol of mobile ad hoc networks,” Proc. 2017 IEEE Int. Conf. Commun. Signal Process. ICCSP 2017, vol. 2018-Janua, pp. 1186–
1189, 2018.
22. M. Kamrul Islam and R. K. Liu, “Cross-Layer Optimization of AODV Routing Protocol For Mobile Ad-Hoc Network (MANET),” no.
Iccsee, pp. 1834–1837, 2013.
23. R. S. Kumar and P. Kamalakkannan, “A review and design study of cross layer scheme based algorithm to reduce the link break in
MANETs,” Proc. 2013 Int. Conf. Pattern Recognition, Informatics Mob. Eng. PRIME 2013, pp. 139–143, 2013.
24. L. Hogie, P. Bouvry, F. G.-E. notes in theoretical computer, and undefined 2006, “An overview of manets simulation,” Elsevier.
25. A. Augustine, “A Comparison of Network Simulators for Wireless Networks,” pp. 1001–1005, 2017.
26. M. S. Siraj, M. Ajay Kumar Gupta, and M. Rinku-Badgujar, “Network Simulation Tools Survey,” 2012.
27. C. E. Perkins, M. Park, and E. M. Royer, “Wmcsa,” Ad-hoc On-Demand Distance Vector Routing, pp. 90–100.
28. F. Bai, N. Sadagopan, B. Krishnamachari, and A. Helmy, “Modeling path duration distributions in MANETs and their impact on
reactive routing protocols,” IEEE J. Sel. Areas Commun., vol. 22, no. 7, pp. 1357–1373, 2004.
29. N. Javaid, M. Ishfaq, M. Jamil, U. Qasim, T. A. Alghamdi, and Z. A. Khan, “Modeling Routing Overhead of Reactive Protocols at
Link Layer and Network Layer in Wireless Multihop Networks,” Math. Probl. Eng., vol. 2015, pp. 1–14, 2015.
30. T. Issariyakul and E. Hossain, Introduction to network simulator NS2, vol. 9781461414. 2012.
31. A. ur R. Khan, S. M. Bilal, and M. Othman, “A Performance Comparison of Network Simulators for Wireless Networks,” 2012 IEEE
Int. Conf. Control Syst. Comput. Eng., pp. 34–38, 2012.

Authors: Akila G, Gayathri R


Advances in Scene Classification of Remotely Sensed High Resolution Images and the Existing
Paper Title:
Datasets
Abstract: Research on Scene classification of remotely sensed images has shown a significant improvement
in the recent years as it is used in various applications such as urban planning, urban mapping, management of
natural resources, precision agriculture, detecting targets etc. The recent advancement of intelligent earth
observation system has led to the generation of high resolution remote sensing images in terms of spatial,
spectral and temporal resolutions which in turn helped the researchers to improve the performance of Land Use
Land Class (LULC) Classification Techniques to a higher level. With the usage of different deep learning
architecture and the availability of various high resolution image datasets, the field of Remote Sensing Scene
Classification of high resolution (RSSCHR) images has shown tremendous improvement in the past decade. In
this paper we present the different publicly available datasets , various scene classification methods and the
future research scope of remotely sensed high resolution images.

Keywords: Deep Learning, Remote Sensing, Scene Classification, Datasets, Convolutional Neural Networks.

References:

1. Y. Yang and S. Newsam, "Bag-Of-Visual-Words and Spatial Extensions for Land-Use Classification," in International Conference on
287. Advances in Geog Inf Sys ,ACM GIS,, 2010.
2. Gui-Song Xia and Wen Yang and Julie Delon and Yann Gousseauand Hong Sun, et al,. "Structural High-resolution Satellite Image
1643-
Indexing", in ISPRS TC VII Symposium - 100 Years ISPRS, Jul 2010, Vienna, Austria. pp.298-303 164
3. B. Zhao and Y.i Zhong and G-S. Xia and L. Zhang, "Dirichlet-Derived Multiple Topic Scene Classification Model for High Spatial 7
Resolution Remote Sensing Imagery", in IEEE Transactions on Geoscience & Remote Sensing, 2016, 54, 2108-2123
4. Zhou, W., Newsam, S., Li, C., & Shao, Z. (2018). "PatternNet: A benchmark dataset for performance evaluation of remote sensing
image retrieval.", ISPRS Journal of Photogrammetry and Remote Sensing, 145, 197-209.
5. G. Cheng, J. Han, X. Lu. "Remote Sensing Image Scene Classification: Benchmark and State of the Art." Proceedings of the IEEE,
2017, 105, 1865–1883
6. Haifeng Li, Chao Tao, Zhixiang Wu, Jie Chen, Jianya Gong, and Min Deng, “Rsi-cb: A large scale remote sensing image classification
benchmark via crowdsource data,” arXiv preprint arXiv:1705.10450, 2017
7. G. Xia. et al., [2017], "AID: A Benchmark Data Set for Performance Evaluation of Aerial Scene Classification," in IEEE Trans on
Geosci & Rem Sensing, volume 55, no. 7, pp. 3965-3981, July 2017
8. P. Jin and G. Xia and F. Hu and Q. Lu and L. Zhang, "AID++: An Updated Version of AID on Scene Classification," in IGARSS 2018
- 2018 IEEE International Geosci and Rem Sensing Symp, Valencia, 2018, pp. 4721-4724.
9. A. Krizhevsky and I. Sutskever and G. Hinton, " Imagenet classification with deep convolutional neural networks",. In NIPS, [2012].
10. K. Simonyan & A. Zisserman, "Very deep convolutional networks for large-scale image recognition",inICLR, [2015]
11. Kaiming He and Xiangyu Zhang and Shaoqing Ren and Jian Sun, "Deep Residual Learning for Image Recognition",
inarXiv:1512.03385v1,[10Dec2015]
12. C. Szegedy and W. Liu and Y. Jia and P. Sermanet and S. Reed and D. Anguelov and D. Erhan and V. Vanhoucke and A. Rabinovich.
"Going deeper with convolutions", in CVPR, [2015].
13. F. Zhang, B. Du, and L. Zhang, “Saliency-guided unsupervised feature learning for scene classification,” IEEE Trans. Geosci. Remote
Sens., vol. 53, no. 4, pp. 2175-2184, 2015.
14. A. Romero, C. Gatta, and G. Camps-Valls, “Unsupervised deep feature extraction for remote sensing image classification,” IEEE
Trans. Geosci. Remote Sens., vol. 54, no. 3, pp. 1349-1362, 2016.
15. L. Huang, C. Chen, W. Li, and Q. Du, “Remote Sensing Image Scene Classification Using Multi-Scale Completed Local Binary
Patterns and Fisher Vectors,” Remote Sensing, vol. 8, no. 6, pp. 483, 2016.
16. M. Castelluccio and G. Poggi and C. Sansone and L. Verdoliva, “Land use classification in remote sensing images by convolutional
neural networks” in arXiv :1508.00092, [2015].
17. K. Nogueira and O. A. Penatti and J. A. d. Santos, “Towards Better Exploiting Convolutional Neural Networks for Remote Sensing
Scene Classification” in arXiv:1602.01517, [2016].
18. G. Cheng and P. Zhou and J. Han, "RIFD-CNN: Rotation-Invariant and Fisher Discriminative Convolutional Neural Networks for
Object Detection", in Proc. IEEE Int. Conf. Comp. Vision & Patt Recgn., [2016], pp. 2884-2893.
19. G. Cheng and C. Ma and P. Zhou and X. Yao and J. Han, "Scene classification of high resolution remote sensing images using
convolutional neural networks," in Proc of IEEE Int. Geo.sci & Remte Sens. Symp, [2016], pp. 767-770.
20. X. Yao and J. Han and G. Cheng and L. Guo, "Semantic segmentation based on stacked discriminative autoencoders and context-
constrained weakly supervised learning" in Proc of ACM Int. Conf in Multimedia, [2015], pp1211-1214.
21. Zeng,Dan&Chen,Shuaijun&Chen,Boyang&Li,Shuying.[2018]."Improving Remote Sensing Scene Classification by Integrating Global-
Context and Local-Object Features", Remt Sens.10.734.10.3390/rs10050734.
22. Yuan,Yuan&Fang,Jie&Lu,Xiaoqiang&Feng,Yachuang.[2018]."Remote Sensing Image Scene Classification Using Rearranged Local
Features" in IEEE.Trans on Geosci & Remt Sens.PP.1-14.
23. Y. Liu and Y. Zhong and Q. Qin, "Scene Classification Based on Multiscale Convolutional Neural Network," in IEEE Trans on
Geosci & Remt Sens, volume. 56, no. 12, pp. 7109-7121, [Dec2018].
doi: 10.1109/TGRS.2018.2848473
24. M. Usman and W. Wang and A. Hadid, "Feature Fusion with Deep Supervision for Remote-Sensing Image Scene Classification," in
[2018] IEEE 30th Intl Conf on Tools with AI [ICTAI], pp. 249-253. doi: 10.1109/ICTAI.2018.00046
25. Qi,Kunlun &Guan,Qingfeng &Yang,Chao&Peng,Feifei &Shen,Shengyu&Wu,Huayi. (2018). "Concentric Circle Pooling in Deep
Convolutional Networks for Remote Sensing Scene Classification". Rem Sens. 10.934.10.3390/rs10060934.
26. Zhang and Wei and Tang and Ping and Zhao and Lijun, "Remote Sensing Image Scene Classification Using CNN-CapsNet", Remote
Sensing, VOlUME 11,NO5,[2019], mdpi, 2072-4292.
Authors: G.I. Lukyanenko, O.V. Antonova, I.Y. Glebkova, N.I. Golysheva, I.O. Yurasova
Technology Application of the Concept of Market-Oriented Reporting in Accounting and
Paper Title:
Statistics
Abstract: One of the current conditions of the modern world is an overabundance of information. Therefore,
the requirements for it are tightened, and only useful and reliable information is of value. The interaction of
counterparties in different markets acquires special meaning. Sustainable and efficient development of business
and the economy as a whole requires constant interaction between market participants through the exchange of
various resources, the starting point for which is information. The potential investors, lenders, buyers, suppliers,
partners, and others can only be attracted by the objective information about your production, business, and
financial activities. Therefore, nowadays the most important task in terms of the development of accounting
information is the preparation of market-oriented reporting by best-selling companies. First of all, it is necessary
to ensure the correct presentation of the basic components of the financial statements: assets, capital, cash flows
and financial results. These data form the determination base for the reliable strategic value of the business, the
expected cash flows, benefits, and the position held by the company in the market. The reporting should include
such indicators as efficiency, dynamics of business development, business activity, and indicators characterizing
the use of inventories. Thus, the modern market-oriented reporting of economic entities should be a targeted
accounting information system on the real value of the various elements of fixed and working capital (assets)
and economic expectations of the business (future income and profits).
Keywords: market-oriented reporting concept, digital economy, synergistic approach, the evolution of
accounting methods and procedures, standardization, economic statistics.

288. References:
1648-
1. Busov, V.I. Enterprise (Business) Value Assessment: A Textbook for Academic Baccalaureate/ V.I. Busov, O.A. Zemlyansky; V.I. 165
Busova. - 2nd ed., edit. - M.: Publishing Urait, 2018. 2
2. Kasyanenko T. G., Makhovikova G. A. Analysis and risk assessment in business: a textbook and a workshop for undergraduate and
graduate programs - 2nd ed., Pererab. and add. - M.: Publishing Urait, 2018.
3. Petrov A.M. Modern concepts of accounting and reporting: a textbook - M.: University textbook: INFRA-M, 2018.
4. Kovalev, V. V., About goodwill "dog, cat" and not only: On the question of far-fetched categories, classifications and algorithms.
Bulletin of St. Petersburg University. Series 5: Economy, - 2016.
5. Makarova I.V. Formation of the customer capital of an organization: theoretical foundations and model assessment tools // Internet
magazine “SCIENCE” Vol. 8, No. 4 (2016).
6. Khorin A.N. Market-oriented financial reporting: a statement of value, - Accounting, 2016.
7. Burtseva, K. Y., Vokina, E. B.,&Shnaider, O. V.(2015). Interconnection between internal control and the assessment of risk of
financial stability loss by educational institutions. Actual problems of economics,172(10),410-418.
8. Zorina, V. S., Melnik, M. V.,&Tsypkin, A. N.(2018). Peculiarities of the coherence time of a spectral supercontinuum generated in
microstructured fibers with two zeros in the group-velocity dispersion. Journal of Optical Technology, 85(9), 535-540.
9. Ragulina, J. V., Suglobov, A. E.,&Melnik, M. V.(2018). Transformation of the role of a man in the system of entrepreneurship in the
process of digitalization of the Russian Economy. Quality - Access to Success, 19(S2), 171-175.
10. T.P. Karpova, A.M. Petrov, O.V. Antonova. Directions of Accounting Development in the Conditions of Digitalization / Jour of Adv
Research in Dynamical & Control Systems, Vol. 10, 07-Special Issue, 2018,pp.(117-125)
11. Lymar, M.P., Kevorkova, Z.A., Petrov, A.M The convergence of national and international accounting standards: Chinese experience. /
International Journal of Civil Engineering and Technology. Volume 9, Issue 13, December 2018, Pages 82-94
12. Kevorkova, Z.A., Petrov, A.M., Savina N.V. Towards liabilities of corporate systems. International Journal of Civil Engineering and
Technology. Volume 10, Issue 2, February 2019, Pages 1582-1593
13. Akhmadeev, R.G. , Bykanova, O.A. , Philippova, N.V. , Vashchekina, I.V. , Turishcheva, T.B. (2018) Macroeconomic indicators and
their impact on the foreign debt burden: The case of BRICS countries. International Journal of Economics and Business
Administration, 6 (2), pp. 68-82.
14. Akhmadeev, R.G., Bykanova, O.A., Morozova T.V., Safonova E.G., Turishcheva, T.B., Lehoux, L. (2018) Evaluation of Financial and
Analytical Activities of the Biggest Car Makers of the Russian Federation. Jurnal Pengurusan, 54, pp. 18 -36
15. Philippova, N.V., Akhmadeev, R.G., Bykanova, O.A., Chaykovskaya, L.A. (2018) Social equity: A route to progressive taxation of
individuals. European Research Studies Journal, 21 (4), pp. 317-330.
16. Chernysheva Natalia A., Perskaya Victoria V., Petrov Alexander M., Bakulina Anna A. Green Energy for Belt and Road Initiative:
Economic Aspects Today and in the Future / International Journal of Energy Economics and Policy. 2019, 9(5), 178-185
17. Bogoviz, A.V., Mishchenko, V.V.,Zakharov, M.Y.,Kurashova, A.A., Suglobov, A.E.Strategy of provision of wireless future's security
Studies in Computational Intelligence 826, с. 941-947.

Authors: Pranav Kumar Saraswati, Saritprava Sahoo, Sarada Prasad Parida, Pankaj Charan Jena
Fabrication, Characterization and Drilling Operation of Natural Fiber Reinforced Hybrid
Paper Title:
Composite With Filler (Fly-Ash/Graphene)
Abstract: The aim of the work is to investigate mechanical properties and machining (drilling) behaviour
glass-sisal-epoxy hybrid composite (GSEHC) with filler as fly-ash and graphene. Hybrid composites are
fabricated by hand lay-up technique using Eglass and sisal as reinforcement fiber and epoxy as binder.
Mechanical and physical properties like tensile, bending, impact strength, hardness, density and water absorption
percentage are examined. The interfacial properties, internal cracks and internal structure of fractured are
observed using Scanning Electron Microscope (SEM). Further drilling operation on the fabricated Hybrid
composite was carried by varying the spindle speed as 600 rpm, 900 rpm, 1200 rpm to observe suitable drilling
speed to carry the circularity test and delamination factors.

Keywords: composite, delamination, physical property, water absorption, SEM.

References:

1. S. Ray, A. K. Rout, and A. K. Sahoo, “Development and characterization of glass/polyester composites filled with industrial wastes
using statistical techniques,” Indian J. Eng. Mater. Sci., vol. 25, no. 2, pp. 169–182, 2018.
2. M. Ramesh, K. Palanikumar, and K. H. Reddy, “Comparative Evaluation on Properties of Hybrid Glass Fiber- Sisal / Jute Reinforced
Epoxy Composites,” Procedia Eng., vol. 51, no. NUiCONE 2012, pp. 745–750, 2013.
3. K. Palanikumar, B. Latha, V. S. Senthilkumar, and J. P. Davim, “Analysis on drilling of glass fiber-reinforced polymer (GFRP)
composites using grey relational analysis,” Mater. Manuf. Process., vol. 27, no. 3, pp. 297–305, 2012.
4. H. Rezghi Maleki, M. Hamedi, M. Kubouchi, and Y. Arao, “Experimental study on drilling of jute fiber reinforced polymer
composites,” J. Compos. Mater., vol. 53, no. 3, pp. 283–295, 2019.
5. A. Kumar and A. Srivastava, “Preparation and Mechanical Properties of Jute Fiber Reinforced Epoxy Composites,” Ind. Eng. Manag.,
vol. 06, no. 04, pp. 4–7, 2018.
6. T. Nadu and T. Nadu, “Mechanical Testing of Hybrid Composite Material ( Sisal and Coir ),” vol. 4, no. 7, pp. 1–6, 2014.
7. S. Mutalikdesai, A. Hadapad, S. Patole, and G. Hatti, “Fabrication and Mechanical Characterization of Glass fibre reinforced Epoxy
Hybrid Composites using Fly ash/Nano clay/Zinc oxide as filler,” IOP Conf. Ser. Mater. Sci. Eng., vol. 376, no. 1, pp. 1–7, 2018.
8. E. Kilickap, “Investigation into the effect of drilling parameters on delamination in drilling GFRP,” J. Reinf. Plast. Compos., vol. 29,
no. 23, pp. 3498–3503, 2010.
9. T. J. Grilo, R. M. F. Paulo, C. R. M. Silva, and J. P. Davim, “Experimental delamination analyses of CFRPs using different drill
geometries,” Compos. Part B Eng., vol. 45, no. 1, pp. 1344–1350, 2013.
10. J. P. Davim, J. C. Rubio, and A. M. Abrao, “A novel approach based on digital image analysis to evaluate the delamination factor
289. after drilling composite laminates,” Compos. Sci. Technol., vol. 67, no. 9, pp. 1939–1945, 2007.
11. H. Hocheng and C. C. Tsao, “The path towards delamination-free drilling of composite materials,” J. Mater. Process. Technol., vol. 1653-
167, no. 2–3, pp. 251–264, 2005. 165
12. H. Hocheng and C. C. Tsao, “Effects of special drill bits on drilling-induced delamination of composite materials,” Int. J. Mach. 9
Tools Manuf., vol. 46, no. 12–13, pp. 1403–1416, 2006.
13. M. Ashok Kumar, G. Ramachandra Reddy, Y. Siva Bharathi, S. Venkata Naidu, and V. Naga Prasad Naidu, “Frictional coefficient,
hardness, impact strength, and chemical resistance of reinforced sisal-glass fiber epoxy hybrid composites,” J. Compos. Mater., vol.
44, no. 26, pp. 3195–3202, 2010.
14. G. Yuvaraj, B. Vijaya Ramnath, A. Abinash, B. Srivasan, and R. Vikas Nair, “Investigation of Mechanical Behaviour of Sisal Epoxy
Hybrid Composites,” Indian J. Sci. Technol., vol. 9, no. 34, 2016.
15. K. Jarukumjorn and N. Suppakarn, “Effect of glass fiber hybridization on properties of sisal fiber-polypropylene composites,”
Compos. Part B Eng., vol. 40, no. 7, pp. 623–627, 2009.
16. K. Devendra and T. Rangaswamy, “Evaluation of Thermal Properties of E-Glass/ Epoxy Composites Filled By Different Filler
Materials,” Int. J. Comput. Eng. Res., vol. 25, no. 5, pp. 2250–3005, 2012.
17. K. Palanikumar, S. Prakash, and K. Shanmugam, “Evaluation of delamination in drilling GFRP composites,” Mater. Manuf. Process.,
vol. 23, no. 8, pp. 858–864, 2008.
18. K. Palanikumar, “Modeling and analysis of delamination factor and surface roughness in drilling GFRP composites,” Mater. Manuf.
Process., vol. 25, no. 10, pp. 1059–1067, 2010.
19. S. Kumar, S. R. Chauhan, P. K. Rakesh, I. Singh, and J. P. Davim, “Drilling of glass fiber/vinyl ester composites with fillers,” Mater.
Manuf. Process., vol. 27, no. 3, pp. 314–319, 2012.
20. L. M. P. Durão, D. J. S. Gonçalves, J. M. R. S. Tavares, V. H. C. de Albuquerque, A. Aguiar Vieira, and A. Torres Marques, “Drilling
tool geometry evaluation for reinforced composite laminates,” Compos. Struct., vol. 92, no. 7, pp. 1545–1550, 2010.
21. V. R. Madhavi and S. S. S. Rao, “Preparing , Studying and Drilling the Composite Materials with different Orientation of Fibers,” pp.
48–55, 2017.
22. G. Cicala, G. Cristaldi, G. Recca, G. Ziegmann, A. El-Sabbagh, and M. Dickert, “Properties and performances of various hybrid
glass/natural fibre composites for curved pipes,” Mater. Des., vol. 30, no. 7, pp. 2538–2542, 2009.
23. U. K. Dwivedi and N. Chand, “Influence of MA-g-PP on abrasive wear behaviour of chopped sisal fibre reinforced polypropylene
composites,” J. Mater. Process. Technol., vol. 209, no. 12–13, pp. 5371–5375, 2009.
24. P. K. Bajpai and I. Singh, “Drilling behavior of sisal fiber-reinforced polypropylene composite laminates,” J. Reinf. Plast. Compos.,
vol. 32, no. 20, pp. 1569–1576, 2013.
25. S. Jayabal, U. Natarajan, and U. Sekar, “Regression modeling and optimization of machinability behavior of glass-coir-polyester
hybrid composite using factorial design methodology,” Int. J. Adv. Manuf. Technol., vol. 55, no. 1–4, pp. 263–273, 2011.
26. M. Sain, P. Suhara, S. Law, and A. Bouilloux, “Interface modification and mechanical properties of natural fiber-polyolefin
composite products,” J. Reinf. Plast. Compos., vol. 24, no. 2, pp. 121–130, 2005.
27. K. Debnath, I. Singh, and A. Dvivedi, “Drilling characteristics of sisal fiber-reinforced epoxy and polypropylene composites,” Mater.
Manuf. Process., vol. 29, no. 11–12, pp. 1401–1409, 2014.
28. A. N. Towo and M. P. Ansell, “Fatigue evaluation and dynamic mechanical thermal analysis of sisal fibre-thermosetting resin
composites,” Compos. Sci. Technol., vol. 68, no. 3–4, pp. 925–932, 2008.
29. M. M. Thwe and K. Liao, “Durability of bamboo-glass fiber reinforced polymer matrix hybrid composites,” Compos. Sci. Technol.,
vol. 63, no. 3–4, pp. 375–387, 2003.
30. N. Chand and S. A. R. Hashmi, “Mechanical properties of sisal fibre at elevated temperatures,” J. Mater. Sci., vol. 28, no. 24, pp.
6724–6728, 1993.
31. A. K. Saha, S. Das, D. Bhatta, and B. C. Mitra, “Study of Jute Fiber Reinforced Polyester Composites by Dynamic Mechanical
Analysis,” J. Appl. Polym. Sci., vol. 71, no. 9, pp. 1505–1513, 1999.
32. A. Lopez-Arraiza, I. Amenabar, A. Agirregomezkorta, M. Sarrionandia, and J. Aurrekoetxea, “Experimental analysis of drilling
damage in carbon-fiber reinforced thermoplastic laminates manufactured by resin transfer molding,” J. Compos. Mater., vol. 46, no.
6, pp. 717–725, 2012.
33. R. Obed D’Souza, Y. P. Shettigar, D. Prajwal Byndoor, S. S. Sudhakar, N. Ahmed, and R. Shetty, “Experimental Analysis on the
Mechanical Properties of Glass-Epoxy composite with Fly ash as a filler material,” IOP Conf. Ser. Mater. Sci. Eng., vol. 376, no. 1,
pp. 0–6, 2018.
34. X. Xin, C. G. Xu, and L. F. Qing, “Friction properties of sisal fibre reinforced resin brake composites,” Wear, vol. 262, no. 5–6, pp.
736–741, 2007.

Authors: Solomon Melese, Debi Prasad Das, Sanjaya Kumar Ghadai, Anil Bajpai

Paper Title: Entrepreneurial Intentions among Business Students in Ethiopia


Abstract: Entrepreneurs are the fortitude of any industry as they come up with an innovative business plan
which eventually provides to cultural and business growth. In Ethiopia, thousands of students graduate from
universities every year, but merely a rare of them plans to begin their businesses. This paper is designed to
analyze the entrepreneurial intentions among undergraduate business students of the University of Gondar,
Ethiopia. The Theory of Planned Behavior (TPB), personal attitude toward entrepreneurship, subjective
measures and perceived behavioral control are the main determinants that influence entrepreneurial purposes.
However, attitudes have improved in this regard, and there have been diverse efforts to magnify the position of
university graduates as patrons of innovative firms. The paper brings out the students’ approach and perceived
behavioral control is an important impact on the entrepreneurial intentions of undergraduate business students.

Keywords: Entrepreneurial Intention; TPB, Perceived Behavioral Control; Personal Attitude; Subjective
Measures.

References:

1. Mohammed, B.S., Fethi, A., & Djaoued, O.B. (2017). The Influence of Attitude, Subjective Norms and Perceived Behaviour Control
on Entrepreneurial Intentions: Case of Algerian Students. American Journal of Economics, 7(6), 274-482
290. 2. Kautonen, T., Gelderen, V. M., & Fink, M. (2015). Robustness of the Theory of Planned Behaviour in Predicting Entrepreneurial
Intentions and Actions. Entrepreneurship Theory and Practice, 39(3), 655-674 1660-
3. Tuker, D., & Selcuk, S. S. (2009). Which Factors Affect Entrepreneurial Intention of University Students? Journal of European 166
Industrial Training, 33(2), 142-159.
4. Wang, W., Lu, W., & Milington, J.K. (2011). Determinants of Entrepreneurial Intention among College Students in China and USa.
3
Journal of Global Entrepreneurship Research, 1(1), 35-44.
5. Gebremeskel, T. (2009). Entrepreneurial attitude and business success. Journal of Business and Administrative Studies, 1(1), 70-92.
6. Gerba, T.D. (2012). Impact of Entrepreneurship Education on Entrepreneurial Intentions of Business and Engineering Students in
Ethiopia. African Journal of Economic and Management Studies, 3(2), 258-277
7. Morgan, S.P., & Bachrach, C.A. (2011). Is the Theory of Planned Behaviour an Appropriate Model for Human Fertility? Vienna
Yearbook of Population Research, Vol-9, 11-18
8. Aizen, I. (1991). The Theory of Planned Behavior. Organisational Behavior and Human Decision Process, 50(2), 179-211
9. Utami, C.W. (2017). Attitude, Subjective Norm, Perceived Behaviour, Entrepreneurship Education and Self Efficacy Towards
Entrepreneurial Intention University Studies in Indonesia.
10. Debarliev, S., Janeska-Iliev, A., Bozhinovska, T., & Viktorija, I. (2015). Antecedents of entrepreneurial intention: Evidence from
Republic of Macedonia. Business and Economic Horizons (BEH), 11(1232-2016-101168), 143.
11. Ajzen, I. (1988). Attitudes, Personality, and Behavior. Milton-Keynes, England: Open.
12. Moriano, J.A., Gorgievski, M., Laguna, M., Stephan, U., & Zarafshani, K. (2012). A Cross-Cultural Approach to Understanding
Entrepreneurial Intention. Journal of Career Development, 39(2), 162-185
13. Podsakoff, P.M., MacKenzie, S.B., Lee, J.Y., & Podsakoff, N.P. (2003). Common Method Biases in Behavioral Research: A Critical
Review of the Literature and Recommendation Remedies. Journal of Applied Psychology, 88(5), 879
14. Engle, R.L., Dimitriadi, N., Gavidia, J.V., Schlaegel, C. Delanoe, S., Alvarado, I., & Wolff, B. (2010). Entrepreneurial Intent: A
Twelve-Country Evaluation of Ajzen’s Model of Planned Behaviour. International Journal of Entrepreneurial Behavior and Research,
16(1), 35-57
15. Robledo, J.L.R., Aran, M.V., Sachez, V.M. & Molina, M.A.R. (2015). The Moderating Role of Gender on Entrepreneurial Intentions:
A TPB Perspective. Intangible Captial, 11(1), 92-117.

Authors: K.E.Sreenivasa Murthy

Paper Title: Design of Building Risk Monitoring From Earthquakes Using Wireless Sensor Network
Abstract: Investigation of the stability of the building is a needed measurement process for all buildings in
the cities. Periodic monitoring of the structure for such damage is therefore a key step in rationally planning the
maintenance needed to guarantee an adequate level of safety and serviceability. However, in order for the
installation of a permanently installed sensing system in buildings to be economically viable, the sensor modules
291. must be wireless to reduce installation costs, must operate with a low power consumption to reduce servicing 1664-
costs of replacing batteries, and use low cost sensors that can be mass produced such as MEMS sensors. 166
8
Keywords: MEMS sensors.

References:

1. faraway scientific progressions: A Strategic examination of worldwide Markets [online]. normally speaking Telecoms Intelligence.
http://www.itireports.com
2. G. Y. Jeong, k. H. Yu, and Kim. N. G. Enduring circulatory weight viewing the use of heartbeat wave voyage time. In standard display
on manipulate, Automation and systems (ICCAS), 2005.
3. ok. Hung, Y. T. Zhang, and B. Tai. Wearable restorative units for telehome recuperating associations. In Procs. twenty sixth Annual
overall display at the IEEE EMBS, 2004.
4. Fang, Xiang et al: An extensible embedded terminal degree for some distance away telemonitoring, estimations and Automation
(ICIA), 2012 typical assembling on cutting side article Identifier: 10.1109/ICInfA.2012.6246761 book 12 months: 2012 , internet
page(s): 668 - 673
5. Majer, L., Stopjaková, V., Vavrinský, E.: fragile and right estimation surroundings for persevering Biomedical after the utilization of
Microelectrodes. In: estimation mechanical ability survey. - ISSN 1335-8871. - Vol. 7, phase 2, No. 2 (2007), s. 20-24.
6. Majer, L., Stopjaková, V., Vavrinský, E.: far off size system for Non-Invasive Biomedical after of Physiological frameworks. In: mag
of electrical Engineering. - ISSN 1335-3632. - Vol. 60, No. 2 (2009), s. fifty seven-6
7. Building Risk Monitoring Using Wireless Sensor Network et.al Narito KURATA. In. 13th World Conference on Earthquake
Engineering Vancouver, B.C., Canada August 1-6, 2004 Paper No. 1406
8. P. SRAVN KUMAR et.al Low Power Wireless Sensor Network for Building Monitoring. on ISSN 2322-0929 Vol.04, Issue.02,
February-2016,
9. Building Stability Monitoring System using WSN., S.SendhilMourougane (IJIRAE) Volume 1 Issue 10 (November 2014).

Authors: S. Senthilraj, N. R. Shanker

Paper Title: A Condition Monitoring System Based On Dyadic Wavelet Transform Using Thermal Image
Abstract: Wavelet analysis is broadly and effectively utilized in image processing and analysis. Because of the
simple and fast algorithm, the dyadic wavelet transform has generally used. A dyadic wavelet transform gives an
excellent output because of the different levels of the wavelet coefficient of the image. The proposed method
presents an optimal value such as mean, standard deviation and entropy for the decomposition and
reconstruction of the thermal image. The original results demonstrate which technique can find the induction
motor faults clearly and effectively.

Keywords: Thermal image, wavelet analysis, dyadic wavelet transform.

References:

1. N. Q. H. ; L. R. X. ; F. S. G. ; G. J. Qin, “A Novel Transform Demodulation Algorithm for Motor Incipient Fault Detection,” IEEE
Trans. Instrum. Meas., vol. 60, no. 2, pp. 480–487, 2011.
2. X. H. ; T. G. H. ; R. G. Harley, “Detection of Rotor Eccentricity Faults in a Closed-Loop Drive-Connected Induction Motor Using an
Artificial Neural Network,” IEEE Trans. Power Electron., vol. 22, no. 4, pp. 1552–1559, 2007.
3. S. H. K. ; H. H. ; G.-A. Capolino, “Gear Tooth Surface Damage Fault Detection Using Induction Machine Stator Current Space Vector
292. Analysis,” IEEE Trans. Ind. Electron. Gear, vol. 62, no. 3, pp. 1866–1878, 2015.
4. Y.-H. K. ; Y.-W. Y. ; D.-H. H. ; J.-H. S. ; D.-S. Kang, “High-Resolution Parameter Estimation Method to Identify Broken Rotor Bar
1669-
Faults in Induction Motors,” IEEE Trans. Ind. Electron., vol. 60, no. 9, pp. 4103–4117, 2013. 167
5. A. M. K. ; S. P. Bertani, “Mechanical Fault Detection in a Medium-Sized Induction Motor Using Stator Current Monitoring,” IEEE 4
Trans. Energy Convers., vol. 20, no. 4, pp. 753–760, 2005.
6. D. Z. L. ; W. W. ; F. Ismail, “An Enhanced Bispectrum Technique With Auxiliary Frequency Injection for Induction Motor Health
Condition Monitoring,” IEEE Trans. Instrum. Meas., vol. 64, no. 10, pp. 2679–2687, 2015.
7. B. Mirafzal ; N.A.O. Demerdash, “On Innovative Methods of Induction Motor Interturn and Broken-Bar Fault Diagnostics,” IEEE
Trans. Ind. Appl., vol. 42, no. 2, pp. 405–414, 2006.
8. T. A. Najafabadi, F. R. Salmasi, S. Member, and P. Jabehdar-maralani, “Detection and Isolation of Speed- , DC-Link Voltage- , and
Current-Sensor Faults Based on an Adaptive Observer in Induction-Motor Drives,” IEEE Trans. Ind. Electron., vol. 58, no. 5, pp.
1662–1672, 2011.
9. H. Nejjari, M. El, H. Benbouzid, and S. Member, “Monitoring and Diagnosis of Induction Motors Electrical Faults Using a Current
Park ’ s Vector Pattern Learning Approach,” IEEE Trans. Ind. Appl., vol. 36, no. 3, pp. 730–735, 2000.
10. I. Motor, B. Failure, C. Transform, and A. C. Study, “InductionMotor Bearing Failure Detection and Diagnosis: Park and Concordia
Transform Approaches Comparative Study,” IEEE/ASME Trans. MECHATRONICS, vol. 13, no. 2, pp. 257–262, 2008.
11. M. Otero, S. Member, P. M. De Barrera, S. Member, G. R. Bossio, and R. Leidhold, “A Strategy for Broken Bars Diagnosis in
Induction Motors Drives,” IEEE Lat. Am. Trans., vol. 16, no. 2, pp. 322–328, 2018.
12. J. A. Ramirez-Nunez, L. A. Morales-Hernandez, R. A. Osornio-Rios, J. A. Antonino-Daviu, and R. J. Romero-Troncoso, “Self-
adjustment methodology of a thermal camera for detecting faults in industrial machinery,” IECON Proc. (Industrial Electron. Conf.,
pp. 7119–7124, 2016.
13. C. Verucchi, G. Bossio, J. B. Member, and G. Acosta, “Fault Detection in Gear Box With Induction Motors : an Experimental Study,”
IEEE Lat. Am. Trans., vol. 14, no. 6, pp. 2726–2731, 2016.

Authors: Anand Kumar, Md Nishat Anwar

Paper Title: A PID and PIDA Controller Design for an AVR System using Frequency Response Matching
Abstract: A proportional integral derivative (PID) and proportional integral derivative acceleration (PIDA)
controller have been designed for voltage regulation in power system. The controller (i.e. PID and PIDA) has
been proposed via frequency response matching of desired reference model with that of system model transfer
function. The proposed PID controller has been designed using one point frequency response matching as well
as pole placement technique, while PIDA controller has been designed using two point frequency response
matching by equating desired set-point closed loop reference model with that of closed loop transfer function of
system model. The response of the proposed PIDA controller shows improved performance for automatic
voltage regulator (AVR) system in comparison with recently available literature. The proposed PID and PIDA
controllers provide fast and smooth response for an AVR system. The advantages associated with the PIDA
controller for an AVR system is to reduce rise time, percentage overshoot and improved robustness, stability
margin.

Keywords: Frequency response matching, AVR, PID controller, PIDA controller, robustness, integral of square
error (ISE).

References:

1. Kundur P. power system stability and control., (1994)


2. Zamani, M.; Karimi-ghartemani, M.; Sadati, N.; Parniani, M. Design of a fractional order PID controller for an AVR using particle
swarm optimization. 2009, 17, 1380–1387. doi:10.1016/j.conengprac.2009.07.005
3. Tang, Y.; Cui, M.; Hua, C.; Li, L.; Yang, Y. Optimum design of fractional order PIλDμcontroller for AVR system using chaotic ant
293. swarm. Expert Syst. Appl., 2012, 39, 6887–6896. doi:10.1016/j.eswa.2012.01.007
4. Aguila-Camacho, N.; Duarte-Mermoud, M.A. Fractional adaptive control for an automatic voltage regulator. ISA Trans., (2013) 52,
807–815. doi:10.1016/j.isatra.2013.06.005.
5. Das, S.; Pan, I. On the Mixed Loop-Shaping Tradeoffs in Fractional-Order Control of the AVR System., (2014), 10, 1982–1991.
6. Zeng, G.Q.; Chen, J.; Dai, Y.X.; Li, L.M.; Zheng, C.W.; Chen, M.R. Design of fractional order PID controller for automatic regulator
voltage system based on multi-objective extremal optimization. Neurocomputing., 2015 160, 173–184. 1675-
doi:10.1016/j.neucom.2015.02.051.
7. Sikander, A.; Thakur, P.; Bansal, R.C.; Rajasekar, S. A novel technique to design cuckoo search based FOPID controller for AVR in
168
power systems. Comput. Electr. Eng., 2017 0, 1–14. doi:10.1016/j.compeleceng.2017.07.005 1
8. Jung, S.; Dorf, R.C. Analytic PIDA Controller Design Technique for A Third Order. IFAC Proc. 1996, Vol. 29, 2–7.
doi:10.1016/S1474-6670(17)57819-2.
9. Puangdownreong, D. Application of Current Search to Optimum PIDA Controller Design. Intell. Control Autom., 2012, 03, 303–312.
doi:10.4236/ica.2012.34035.
10. Sahib, M.A. A novel optimal PID plus second order derivative controller for AVR system., 2015, Eng. Sci. Technol. an Int. J. 18,
194–206. doi:10.1016/j.jestch.2014.11.006.
11. Anwar, M.N.; Pan, S. A Frequency Domain Design of PID Controller for an AVR System., 2014, J. Zhejiang Univ. C (Computers
Electron. 15, 293–299. doi:10.1631/jzus.C1300218.
12. Mukherjee, V.; Ghoshal, S.P. Intelligent particle swarm optimized fuzzy PID controller for AVR system., 2007, 77, 1689–1698.
doi:10.1016/j.epsr.2006.12.004.
13. Shayeghi, H.; Younesi, A.; Hashemi, Y. Optimal design of a robust discrete parallel FP + FI + FD controller for the Automatic Voltage
Regulator system., 2015, Int. J. Electr. Power Energy Syst. 67, 66–75. doi:10.1016/j.ijepes.2014.11.013.
14. Al, A.J.H.; Mustafa, M.W.; Al-geelani, N.A.; Alsaedi, M.A. Sugeno fuzzy PID tuning , by genetic-neutral for AVR in electrical power
generation., 2015, 28, 226–236 .
15. Ribeiro, R.L.A.; Neto, C.M.S.; Costa, F.B.; Rocha, T.O.A.; Barreto, R.L. A sliding-mode voltage regulator for salient pole
synchronous generator. 2015, 129, 178–184.
16. Zhu, H.; Li, L.; Zhao, Y.; Guo, Y.; Yang, Y. CAS algorithm-based optimum design of PID controller in AVR system., 2009, Chaos,
Solitons and Fractals. 42, 792–800. doi:10.1016/j.chaos.2009.02.006.
17. Gozde, H.; Taplamacioglu, M.C. Comparative performance analysis of artificial bee colony algorithm for automatic voltage regulator
(AVR) system., 2011, J. Franklin Inst. 348, 1927–1946. doi:10.1016/j.jfranklin.2011.05.012.
18. Hasanien, H.M.; Member, S. Design Optimization of PID Controller in Automatic Voltage Regulator System Using Taguchi
Combined Genetic Algorithm Method., 2013, 7, 825–831.
19. Chatterjee, S.; Mukherjee, V. PID controller for automatic voltage regulator using teaching-learning based optimization technique.,
2016, Int. J. Electr. Power Energy Syst. 77, 418–429. doi:10.1016/j.ijepes.2015.11.010.
20. Blondin, M.J.; Sanchis, J.; Sicard, P.; Herrero, J.M. New optimal controller tuning method for an AVR system using a simplified Ant
Colony Optimization with a new constrained Nelder–Mead algorithm., 2018 Appl. Soft Comput. 62, 216–229.
doi:10.1016/j.asoc.2017.10.007.
21. Máslo, K.; Kasembe, A.; Kolcun, M. Simplification and unification of IEEE standard models for excitation systems., 2016, Electr.
Power Syst. Res. 140, 132–138. doi:10.1016/j.epsr.2016.06.030.

Authors: Debabrata Sarddar, Utpal Ghosh, Rajat Pandit

Paper Title: Incrementing Bit Fields of Subscriber Identity Module (SIM)

Abstract: The overall markets for SIM cards is massive and comparatively Stable. In fact, the amount of SIM
cards shipped globally is forecast to extend a huge range and still increasing at once. So, increasing the bit field
of MSIN(Mobile Subscriber Identification Number) is additionally an helpful choice to choose. however in
present bit size of nine or ten (depends on the country) the MSIN have over trillion mixtures of obtainable
294. numbers. In our proposed work we have a tendency to makes a group of home MNCs that are connects in usual,
1682-
and Keeps record of attributes like ‘Signal Strength’, ‘Internet Speed’, ‘Call drop. After that, Orders or sorts the
168
set of MNCs as per any alternative of those attributes, then selects the most effective result for home MNCs each
7
time and Updates the database contiguously.As the population is increasing of the globe and additionally there is
no any regulation or an individual is not restricted to use just one SIM card so, it would be a secure possibility
for future use.
Keywords: Subscriber Identity Module(SIM), International Mobile Subscriber Identity(IMSI), ICCID, Bit
fields of SIM card, Personal Unblocking Code(PUC), Encryption- decryption rule.
References:

1. Casadei,, Fabio, Antonio Savoldi, and Paolo Gubian. "Forensics and SIM cards: an Overview." International Journal of Digital
Evidence 5.1 (2006): 1-21.
2. Vedder, Klaus. "Smart cards." 1992 Proceedings Computer Systems and Software Engineering. IEEE, 1992.
3. Jansen, Wayne, and Rick Ayers. "Forensic software tools for cell phone subscriber identity modules." Proceedings of the Conference
on Digital Forensics, Security and Law. Association of Digital Forensics, Security and Law, 2006.
4. Haverinen, Henry, and Joseph Salowey “Extensible authentication protocol method for global system for mobile communications
(GSM) subscriber identity modules (EAP-SIM)”. No. RFC 4186. 2005.
5. Tsai, Yuh-Ren, and Cheng-Ju Chang. "SIM-based subscriber authentication mechanism for wireless local area networks." Computer
communications 29.10 (2006): 1744-1753.
6. Tsai, Yuh-Ren, and Cheng-Ju Chang. "SIM-based subscriber authentication for wireless local area networks." IEEE 37th Annual 2003
International Carnahan Conference onSecurity Technology, 2003. Proceedings.. IEEE, 2003.
7. Urien, Pascal. "Convergent identity: Seamless OpenID services for 3G dongles using SSL enabled USIM smart cards." 2011 IEEE
Consumer Communications and Networking Conference (CCNC). IEEE, 2011.
8. Rankl, Wolfgang, and Wolfgang Effing. Smart card handbook. John Wiley & Sons, 2004.
9. Joo, Jae Hyung, Jeong-Jun Suh, and Young Yong Kim. "Secure remote USIM (Universal Subscriber Identity Module) card application
management protocol for W-CDMA networks." 2006 Digest of Technical Papers International Conference on Consumer Electronics.
IEEE, 2006.
10. ZHOU, Jienan, Jianghong SHI, and Hong WANG. "Research and Design on Subscriber Identity Module Reader [J]." Modern
Electronics Technique 8 2007.

Authors: Jayesh Patil, Rajkumar Bhagat

Paper Title: Optimization of Clearance Volume for Performance Improvement of Reciprocating Compressor
Abstract: The paper addresses to engineers who do design and optimization work in the field of reciprocating
compressors. In this paper theoretical and exact contemplations are given which permit to foresee the valve
misfortunes. Suction valve misfortunes are additionally bring about a decrease of limit. The most effective part
in the development of a reciprocating compressor depends strongly on improvement of its performance. For this
purpose, a performance characteristic evaluation of a two stroke reciprocating air compressor is carried out in
this paper. By and large stream misfortunes of compressor valves are affected by the valve geometry as well as
are intensified by valve pocket misfortunes. The aims were to improve compressor performance by illustrating
the effects of various parameters such as clearance between head and piston, stroke length, friction losses,
compressor running time, background working condition and air leakage. The effect of each parameter was
compared with given performance condition and after it was demonstrated the most important parameter on the
performance. The parameter was measured using three techniques. The experiment addressed some factors that
led to the inefficient performance of the reciprocating compressor air system and cause energy losses. The
results advocate the optimal time for starting time of starting each stage of the two–stage reciprocating
compressor. The work in addition may give a insight for the development of the design of multi-stage
compression and presents some key design parameter.
295.
Keywords: Performance, Volumetric efficiency, compressor valve. 1688-
169
References: 4

1. Pravardhan S. Shenoy and Ali Fatemi,” Connecting Rod Optimization for Weight and Cost Reduction”, The University of Toledo,
SAE International, 2005.
2. Moon Kyu Lee, Hyungyil Lee, Tae Soo Lee & Hoon Jang,” Buckling sensitivity of a connecting rod to the shank sectional area
reduction”, Department of Mechanical Engineering, Sogang University, Seoul 121-742, Republic of Korea, Materials and Design 31
(2010) 2796–2803.
3. Mohammed Mohsin Ali H & Mohamed Haneef,” Analysis of Fatigue Stresses on Connecting Rod Subjected to Concentrated Loads At
The Big End”, Dept of Mechanical Engineering, Ghousia College of Engineering, Ramanagaram-562159, Karnataka, VTU, Belgaum,
Proceedings 2 ( 2015 ) 2094 – 2103.
4. Perkovich, M.; Kuehn, T. H.; and Ramsey, J. W., "Experimental Testing and Computer Simulation of a Reciprocating Refrigeration
Compressor" (1994). International Compressor Engineering Conference. Paper 1010.
5. Burgstaller, Adolf; Nagy, Daniel; Almbauer, Raimund; and Lang, Wolfgang, "Influence of the Main Parameters of the Suction Valve
onthe Overall Performance of a Small Hermetic Reciprocating Compressor" (2008). International Compressor Engineering
Conference.
6. Bhakta, Aditya; Dhar, Sandeep; Bahadur, Vaibhav; Angadi, Shruti; and Dey, Subhrajit, "A Valve Design Methodology For Improved
Reciprocating Compressor Performance" (2012). International Compressor Engineering Conference. Paper 2077.
7. Rezende, Gustavo C.; Silva, Ernane; and Deschamps, Cesar J., "A Combined Experimental-Numerical Procedure to Estimate
LeakageGap of Compressor Valves" (2016). International Compressor Engineering Conference. Paper 2442.
8. Drews, R. E., "The Development, of a Longer Life and Superior Performance Compressor Plate Valve" (1986). International
Compressor Engineering Conference. Paper 538.
Authors: Noor Hashimah Hashim, Mohd Faiz Mohd Yaakob, Mat Rahimi Yusof, Mohd Yusri Ibrahim

Paper Title: Innovative Behavior among Teachers: Empirical Evidence from High-Performance Schools

Abstract: Education is decisive to structure a greater nation and shaping its citizens’ ability to compete
296. globally. It is one of the major drivers for social capital progress and the country’s economy. As such, the 1695-
education sector needs continuous monitoring to identify areas for development. Teacher’s Innovative Behavior 169
plays an important role in the maintenance of quality education. However, in Malaysia, far too little attention has 9
been paid to Innovative Behavior among teachers. Previously published studies are limited to surveys research
design and strategies. Therefore, this mixed methods study aims to identify the Innovative Behavior of teachers
from high-performance schools. A questionnaire of Idea Generation; Idea Promotion and Idea Realization was
distributed to 629 teachers. Meanwhile, four principals and eight teachers were interviewed to corroborate or
refute the quantitative findings. The findings suggest that Idea Generation; Idea Promotion and Idea Realization
have been practiced at high levels in the schools. This study brings important messages to policymakers,
curriculum developers, and relevant authorities. They can use these findings to formulate regulations to promise
a beneficial educational atmosphere and enhance the quality of education.
Keywords: Innovative Behavior, Teacher Education, Teaching, and Instruction.

References:

1. Ministry of Education Kementerian Pendidikan Malaysia. (2013). Pelan Pembangunan Pendidikan Malaysia 2013-2025. Putrajaya,
Malaysia.
2. Brandsford, J., Derry, S., Berliner, D., & Hammerness, K. (2005). Theories of learning and their role in teaching. In L. Darling-
Hammond & J. Bransford (Eds.), Preparing teachers for a changing world (pp. 40–87). San Francisco, CA: Jossey-Bass.
3. Bandura, A., & National Inst of Mental Health. (1986). Prentice-Hall series in social learning theory. Social foundations of thought and
action: A social cognitive theory. Englewood Cliffs, NJ, US: Prentice-Hall, Inc.
4. Cummings, T., & Worley, C. (2015). Organization development and change (10th ed.). Stamford, CT: Cengage Learning.
5. Garvin, David A. "Building a learning organization. Harvard Business Review, 71 (4)." (1993): 78-91.
6. McCharen, Belinda, JiHoon Song, and Jon Martens. "School innovation: The mutual impacts of organizational learning and creativity."
Educational Management Administration & Leadership 39.6 (2011): 676-694.
7. Bouwen, Rene, and Ronald Fry. "Organizational innovation and learning: four patterns of dialog between the dominant logic and the
new logic." International Studies of Management & Organization 21.4 (1991): 37-51.
8. Messmann, Gerhard, and Regina H. Mulder. "Innovative work behaviour in vocational colleges: Understanding how and why
innovations are developed." Vocations and Learning 4.1 (2011): 63-84.
9. Andiliou, Andria, and P. Karen Murphy. "Examining variations among researchers’ and teachers’ conceptualizations of creativity: A
review and synthesis of contemporary research." Educational Research Review 5.3 (2010): 201-219.
10. Janssen, Onne. "Job demands, perceptions of effort‐reward fairness and innovative work behaviour." Journal of Occupational and
organizational psychology 73.3 (2000): 287-302.
11. Kanter, Rosabeth Moss. "When a thousand flowers bloom: Structural, collective, and social conditions for innovation in organizations."
Knowledge Management and Organisational Design 10 (1988): 93-131.
12. Scott, Susanne G., and Reginald A. Bruce. "Determinants of innovative behavior: A path model of individual innovation in the
workplace." Academy of management journal 37.3 (1994): 580-607.
13. West, Michael. "Innovation among health care professionals." Social Behavior (1989): 173-184.
14. Farr, James L., and Michael A. West, eds. Innovation and creativity at work: Psychological and organizational strategies. Wiley, 1990.
15. Woodman, Richard W., John E. Sawyer, and Ricky W. Griffin. "Toward a theory of organizational creativity." Academy of
management review 18.2 (1993): 293-321.
16. Van der Vegt, Gerben S., and Onne Janssen. "Joint impact of interdependence and group diversity on innovation." Journal of
management 29.5 (2003): 729-751.
17. Messmann, Gerhard, and Regina H. Mulder. "Development of a measurement instrument for innovative work behaviour as a dynamic
and context-bound construct." Human Resource Development International 15.1 (2012): 43-59.
18. Mohammad, Razia Fakir, and Brian Harlech-Jones. "Working as partners for classroom reform." International Journal of Educational
Development 28.5 (2008): 534-545.
19. Chang, Cheng-Ping, Hao-Wan Chuang, and Lynne Bennington. "Organizational climate for innovation and creative teaching in urban
and rural schools." Quality & Quantity 45.4 (2011): 935-951.
20. Horng, Jeou‐Shyan, et al. "Creative teachers and creative teaching strategies." International Journal of Consumer Studies 29.4 (2005):
352-358.
21. Thurlings, Marieke, Arnoud T. Evers, and Marjan Vermeulen. "Toward a model of explaining teachers’ innovative behavior: A
literature review." Review of Educational Research 85.3 (2015): 430-471.
22. Morais, Maria Fátima, and Ivete Azevedo. "What is a creative teacher and what is a creative pupil? Perceptions of teachers." Procedia-
Social and Behavioral Sciences 12 (2011): 330-339.
23. Tomic, Welko, and André Brouwers. "Where do teachers get their ideas from?" Creativity and Innovation Management 8.4 (1999):
262-268.
24. Kimonen, Eija, and Raimo Nevalainen. "Active learning in the process of educational change." Teaching and Teacher Education 21.6
(2005): 623-635.
25. McDougall, Jenny. "A crisis of professional identity: How primary teachers are coming to terms with changing views of literacy."
Teaching and Teacher Education 26.3 (2010): 679-687.
26. Opfer, V. Darleen, David G. Pedder, and Zsolt Lavicza. "The role of teachers’ orientation to learning in professional development and
change: A national study of teachers in England." Teaching and Teacher Education 27.2 (2011): 443-453.
27. Ross, John A., and Catherine D. Bruce. "Teacher self-assessment: A mechanism for facilitating professional growth." Teaching and
teacher Education 23.2 (2007): 146-159.
28. Sellars, Maura. "Teachers and change: The role of reflective practice." Procedia-Social and Behavioral Sciences 55 (2012): 461-469.
29. Carmeli, Abraham, Ravit Meitar, and Jacob Weisberg. "Self-leadership skills and innovative behavior at work." International Journal
of Manpower 27.1 (2006): 75-90.
30. Drucker, Peter. "F, Post-Capitalist Society." (1993).
31. Amabile, Teresa M. "Creativity and innovation in organizations." (1996).
32. Janssen, Onne. "Job demands, perceptions of effort‐reward fairness and innovative work behaviour." Journal of Occupational and
organizational psychology 73.3 (2000): 287-302.
33. Janssen, Onne, Evert Van de Vliert, and Michael West. "The bright and dark sides of individual and group innovation: A special issue
introduction." Journal of Organizational Behavior 25.2 (2004): 129-145.
34. Stylianidou, Fani, Richard Boohan, and Jon Ogborn. "Science teachers' transformations of the use of computer modeling in the
classroom: Using research to inform training." Science Education 89.1 (2005): 56-70.
35. Granovetter, Mark S. "The strength of weak ties." Social networks. Academic Press, 1977. 347-367.
36. Baer, Markus. "The strength-of-weak-ties perspective on creativity: A comprehensive examination and extension." Journal of applied
psychology 95.3 (2010): 592.
37. Creswell, John W., and J. David Creswell. Research design: Qualitative, quantitative, and mixed methods approach. Sage publications,
2017.
38. Blaikie, Norman, and Jan Priest. Designing social research: The logic of anticipation. John Wiley & Sons, 2019.
39. Fullan, Michael. Leadership & sustainability: System thinkers in action. Corwin Press, 2005.
40. Hardie, Rosalind. Principals' perceptions of the essential components of sustainable leadership and implications for succession
planning at the elementary school level: A mixed methods research study. Diss. University of Saskatchewan, 2011.
41. Sekaran, Uma, and Roger Bougie. Research methods for business: A skill building approach. John Wiley & Sons, 2016.
42. Bryman, A. (2012). Social research methods. (Fourth edition). Oxford: Oxford University Press.
43. Nunnally, Jum C. Psychometric Theory: 2d Ed. McGraw-Hill, 1978.
44. Cohen, Jacob. "A coefficient of agreement for nominal scales." Educational an
45. Zhou, Jing, and Jennifer M. George. "When job dissatisfaction leads to creativity: Encouraging the expression of voice." Academy of
Management journal 44.4 (2001): 682-696.

Authors: Daroga Ajahar M, M. K. Nalawade

Paper Title: Mathematical Modelling Of Structures Using Model Order Reduction Technique
Abstract: Today’s world is a world of simulation. Now a days, every product is first designed in virtual
domain and then tested for actual implementation. To be able to perform such accurate virtual domain analysis,
an accurate mathematical model is needed to be designed in first place. Specifically, in the field of dynamic
analysis, so as to continuously monitor the system, the requirement a high-fidelity simulation models in all
industries is rising rapidly and this has now become an important part of modern simulation strategies. FEA
simulation software’s nowadays could provide very accurate results but they cannot be used directly for dynamic
simulations where the environment is continuously changing (input forces, random vibrations etc.).Therefore,
this paper deals with design of a mathematical model of a beam to overcome the above stated issue. The
technique so used is Model Order Reduction. This method develops an efficient reduced model by reducing the
degrees of freedom and also preserving a characteristic behavior of the system. The methodology deals with
extracting the mass, and stiffness matrices from FEA simulation software, reducing their size (order), building a
297.
second order system using reduced sizes of mass and stiffness, analyzing mode shapes vectors and nodes for 1700-
input force applications, and generating a state space model of the system. 170
4
Keywords: Finite Element Analysis, Model Order Reduction, Second Order System, State Space.

References:

1. W. Larbi, J.-F. Deü Reduced order finite element formulations for vibration reduction using piezoelectric shunt damping (2018).
2. Zu-QingQu, Model Order Reduction Techniques with Applications in Finite Element Analysis (2004).
3. Dr. Dinesh Chandra, Deepika Srivastava, Model Order Reduction of Finite Element Model (2016).
4. Francisco Chinesta, Pierre Ladevèze, Elías Cueto, A Short Review in Model Order Reduction Based on Proper Generalized
Decomposition (2017).
5. Mohit Garg, Model Order Reduction and Approximation Analysis for Control System Design (2017).
6. Alain Batailly, How to extract structural matrices (mass, stiffness...) Obtention of elementary cyclic symmetric matrices from an
elementary sector in Ansys (2018).
7. P. Koutsovasilis·M. Beitelschmidt Comparison of model reduction. Techniques reduction for large mechanical systems (2008).

Authors: Samarth. S. Nimbal, M. K. Nalawade

Paper Title: Design and Analysis of Multi-Stage Intercooler


Abstract: This paper deals with the design and analysis of air-cooled heat exchangers. Heat exchanger means
exchange the thermal duty to the next stage compressor by the external source. It will help to get an effective
fluid to next stage compressor here working fluid as air so it is divided under air-cooled heat exchanger. In this,
we should know what is problem occurs in the current scenario that is our objectives work on those objectives
with help of theoretical knowledge, theoretical consideration, an analytical calculation that should be validated
with software. For fluid flow use of pressure vessels prepare with the help of ASME codes from pressure vessel
calculation we get thickness. Thermal calculations are made with the help of D. Q. Kern method from the
thermal calculation we get a Heat load and required area for heat transfer. Use of that software like ANSYS,
HTRI they give results if it satisfied our condition we compare that results with experimental values. It will
conclude whatever we get an outputs those are right are wrong.
298.
1705-
Keywords: Duty, Pressure vessel, Heat load, Thickness, Thermal, Heat transfer. 171
0
References:

1. Ewa Piotrowska, Piotr Skowronski "Analysis of Temperature Oscillation Parameters of Heat Exchanging Systems" ,International Journal
of Heat and Mass Transfer,2018.
2. R.Whalley and K. M. Ebrahimi, "Heat Exchanger dynamic analysis" ,ELSEVIER, Department of Aeronautical and Automotive
Engineering Loughborough University, UK, 2016.
3. Tushar Charate, Nilesh Awate, Jaai Badgujar,Suahs Jadhav, "Review of Literature on Heat Transfer Enhancement in Heat Exchangers",
Saraswati College Of engineering, 2015.
4. Parag Mishra,"A Review of Literature on Air Cooled Heat Exchanger", Department of Mechanical Engineering Radharaman Institute of
Research & Technology, Bhopal, MP, India, 2015.
5. ASME codes,Edition- 2010.
6. D. Q. Kern, “Process heat transfer”, McGraw-Hill, 1965.

Authors: K. Kanimozhi , B. Raja Mohamed Rabi


Green Energy: Modeling and Simulation of Thermoelectric Generator for Production of Electricity
Paper Title:
from Air Conditioner Waste Heat
299. Abstract: In this paper modeling and simulation of thermoelectric generator (TEG)modules is validated
1711-
using MATLAB. The TEG model is developed with suitable mfiles and further the model is extended for
171
generating electricity from waste heat liberated by air conditioners. These waste heat may lead to global
4
warming and causes pollution. Hence this problem is addressed in this paper and thermoelectric generators are
used to generate power. TEG is called a green technology as all parts are fixed and power produced is not
wasted. Thermoelectric power generator converts waste heat in to electric energy. Hence thermoelectric power
generation technique aids in the conversion of waste-heat energy into electrical power .So the economical
wastage of thermal energy is avoided .The power production is abundant and also atmospheric pollution is
avoided. As a result overall conversion efficiency of system is enhanced. The produced energy can be used for
lighting a LED bulb, charging the mobile batteries.

Keywords: Green energy, Modeling, Thermoelectric generator modules , Waste heat.

References:

1. K. Kanimozhi , B.Raja Mohamed Rabi , “Parameter analysis method for enhancing efficiency of photovoltaic cells” International
Journal of Chemtech Research, No. 9, 2016,pp.276-281.
2. M. F. Remeli, K. Verojporn, B. Singh, L. Kiatbodin, A. Date, and A. Akbarzadeh, “Passive Heat Recovery System Using Combination
of Heat Pipe and Thermoelectric Generator,” Energy Procedia, vol. 75, 2015,pp. 608–614.
3. K. Kanimozhi , B.Raja Mohamed Rabi, “Development of Hybrid MPPT algorithm under partial shading conditons for low power
applications”,Journal of Electrical Engineering,17(2)2,2017,pp.1-6.
4. K. Kanimozhi, A. Shunmugalatha , “Maximum peak power tracking of photovoltaic systems using adaptive sliding mode controller”,
International Journal of Applied Engineering Reserach., Vol.10,2015,pp.3073-3078.
5. B. Orr and A. Akbarzadeh, “Prospects of Waste Heat Recovery and Power Generation Using Thermoelectric Generators,” Energy
Procedia, vol. 110, no. December 2016, pp. 250–255,
6. ASHRAE, ASHRAE Handbook 2013, American Society of Heating, Refrigerating and Air Conditioning Engineers (Fundamentals).
2013.
7. B. Orr, A. Akbarzadeh, M. Mochizuki, and R. Singh, “A review of car waste heat recovery systems utilising thermoelectric generators
and heat pipes,” Applied Thermal Engineering, vol. 101,2016, pp. 490–495.
8. S. B. Riffat and G. Qiu, “Comparative investigation of thermoelectric air-conditioners versus vapour compression and absorption air-
conditioners,” Applied Thermal Engineering, vol. 24, no. 14–15, 2004,pp. 1979– 1993.
9. K. Kanimozhi ,B.Raja Mohamed Rabi, “Hydrogen synthesis from solar reactor using reverse Photosynthesis “International Journal of
Chemtech Research, Vol. 10,No. 9, 2017,pp.212-219.
10. K. Kanimozhi ,B.Raja Mohamed Rabi, “Neural Network Controlled Primitive Fault Analysis and Monitoring of Wind Turbine Gear
Box”, International Journal of Recent Technology and Engineering,vol.8(2),2019,pp.764-768.
Authors: Pendyala John Adinarayana , B.Kishore Babu

Paper Title: Modern Techniques of Promoting the Banking Financial Services and Insurance (Bsfi)
Abstract: Marketing of banking and financial services are not that much easy because of characteristics like
intangibility, heterogeneity and inseparability. Financial institutions have done swift changes in the operational
milieu. The marketing of financial services and products has become a very difficult subject as it rivets the
understanding of money matters, sociology, psychology and also very important marketing idea. Financial
services marketing submit to the united exercise of marketing strategiesy employed by marketers in the financial
services sector to attract new customers or retain existing ones. . Financial institutions have done rapid changes
in the operational environment.. Currently, banking and financial service firms are facing novel challenges: must
swing from mass marketing to exceedingly individualized marketing. The present promotional mix elements of
classical, conventional techniques - combined advertising, personal selling, sales promotion, public relations and
direct marketing have become insufficient for major banking conglomerates. Due to heavy competition among
firms and usage of modern technology forces the banking and financial firms to adopt modern techniques to
promote their operations to retain and attract new customers..The article will give inputs regarding various new
300. modern marketing techniques adopted by banning and financial service institutions. 1715-
171
Keywords: Promotional strategies, Financial services, Marketing activities Modern methods, Consumers 9
observation.

References:

1. Molly Galetto” 10 Marketing Strategies for Banks and Financial Service Providers to Beat Competitors”April, 18,2017
2. Mircea Valeria Arina,” Promotion Banking Services and Products - Factors Influencing Bank Offer Promotion among Consumers,
3. Jon Matar” Digital Marketing Strategies for Banks and Financial Service Providers, 6th January 2016,.
4. 4Abhinn Shreshtha” Is digital the new darling of the BFSI sector? Key players are channeling a fair share of their budgets towards
creating innovative digital properties that connect with their consumers”
5. Dr.B.kishore babu, Pavani “ Engineering students perception towards social media advertising for social causes, Vijayawada: An
empirical study” International Journal of Recent Technology and Engineering, 2019,7(6), pp. 1901-1907
6. Chintala Balaji et al "Technological relationship between Banknifty & other sectorial indices of NSE" in International Journal of
Recent Technology and Engineering (IJRTE), Volume-8 Issue-2, July 2019.
7. Chintala Balaji et al "Impact of Acquisitions on Financial Performance of Selected Software companies in India" in International
Journal of Innovative Technology and Exploring Engineering.

Authors: Pendyala John Adinarayana , B.Kishore Babu

Paper Title: The Role of Shaping Fin-Tech Services: Social Media Marketing
Abstract: One of the primary changes in the business is getting to be digitalization which is seeing a
301. significant change to the managing an account framework. Digitalization offers new open doors for banks to put
1720-
the client at the focal point of the improvement process. New advancements appear to be and remain in the
172
market to disturb the retail budgetary administration esteem chain, just as bringing new players into the
3
aggressive field. Occupants and new comers have imaginative switches to receive. The powers melding these
progressions have stood out to re-examine the job of keeping money and back, more as an "empowering agent"
than a supplier of items and administrations. Due to heavy completion and development of technology majority
of service firms are forced to promote their products. The existing conventional methods are not enough to reach
customers. That’s why companies are using one more new promotional technique called ‘social media marketing
to reach customers. The article goes for the role of social media marketing to promote financial services of
service firms and to bring the customer close to the service offering forms and how social media marketing
differ from Fintech marketing.

Keywords: Marketing, Social Media, Technology, Customer Service, FinTech marketing.

References:

1. Fintech Trends Report, India 2017-A deep drive in to whats driving the Fintech revelation in India.
2. Achilles’ Heel of Your Social Media Strategy, October 9, 2018,
3. Richard Eldridge Chief Executive Officer, Lenddo Limited “How Social Media Is Shaping Financial Services, 01/21/2016 04:24 pm.
4. Dr.B.kishore babu, Pavani “ Engineering students perception towards social media advertising for social causes, Vijayawada: An
empirical study” International Journal of Recent Technology and Engineering, 2019,7(6), pp. 1901-1907
5. ET Updated Jan 21, 2017, https://www.huffingtonpost.com/richard-eldridge/how- social-media-is-shapi_b_9043918.html
6. Search to Social Media Trends - Banking & Financial Services
7. https://www.finextra.com/blogposting/14770/search-to-social-media-trends---banking-amp-financial-services
8. Chintala Balaji et al "Impact of Acquisitions on Financial Performance of Selected Software companies in India" in International
Journal of Innovative Technology and Exploring Engineering (IJITEE), Volume-8 Issue-9, July 2019 pp: 2415-19
Authors: Snigdha Surapaneni, P.Phani Prasanthi, M. Mounika, A.Eswar, K.Venkata Rao
Fracture Behavior Of Nano Particle Reinforced Sisal Fiber Composites Using Analytical And
Paper Title:
Experimental Methods
Abstract: Sisal fiber reinforced composites are being replaced with manmade composites as these materials
are difficult to manufacture and non biodegradable. On the other hand, the natural fiber reinforced composites
such as sisal fiber reinforced composites shows less strength compared to manmade composites. The objective
of the present work is to explore the mechanical properties of sisal fiber composites and hybrid sisal composites
using analytical and experimental methods. The sisal composites and hybrid sisal composites are prepared by
using hand layup techniques. The hybrid composites are prepared by reinforcing nano carbon powder and sisal
fibers in a polymer matrix with the weight fraction of 9% of carbon powder and 50% of sisal fiber. The elastic
modulus of polymer matrix with carbon powder reinforcement and polymer matrix, carbon powder and sisal
fiber reinforced composites are identified by conducting suitable experiments. Later by using the finite element
method, the fracture behavior of sisal fiber composites and hybrid composites are estimated. The energy released
(ER) and energy required to create the surface (ES) are estimated to identify the critical crack length of the
respective material. The present work is used for the design of sisal fiber composites with respect to young’s
modulus and fracture response.

Keywords: Sisal fiber composites, Young’s modulus, Fracture behavior, crack length.

References:
302.
1. H. SavastanoJr, S.F. Santos, M. Radonjic, W.O. Soboyejo, Fracture and fatigue of natural fiber-reinforced 1724-
cementitiouscomposites,Cement& Concrete Composites 31 (2009) 232–243. 172
2. H.P.S.AbdulKhalilM.S.AlwaniM.N.IslamS.S.SuhailyR.DunganiY.M.H’ngM.Jawaid.
3. The use of bamboo fibres as reinforcements in composites.https://doi.org/10.1533/9781782421276.4.488. 7
4. C. McCarthy, T. Vaughan,Micromechanical failure analysisof advanced composite materials,http://dx.doi.org/10.1016/B978-0-08-
100332-9.00014-1.
5. Qian Li, Yan Li, LiminZhou,A micromechanical model of interfacial debonding and elementary fiber pull-out forsisal fiber-reinforced
composites,10.1016/j.compscitech.2017.10.008.
6. Z. Khan, B.F Yousif, MdMainul Islam, Fracture Behaviour of Bamboo Fiber Reinforced Epoxy Composites,
10.1016/j.compositesb.2017.02.015
7. Shane Johnson, Liping Kang, HazizanMdAkil, Mechanical Behavior of Jute Hybrid Bio-Composites,
10.1016/j.compositesb.2015.12.052.
8. Mustafa Abu Ghalia, Amira Abdelrasoul, Compressive and fracture toughness of natural and synthetic fiber-reinforced
polymer,https://doi.org/10.1016/B978-0-08-102292-4.00007-2
9. M K Guptaa& R K Srivastava,Properties of sisal fiber reinforced epoxy composite,Indian Journal of Fiber& Textile Research, Vol. 41,
September 2016, pp. 235-241.
10. Quim Tarresa, Fabiola Vilasecab, Pedro J. Herrera-Francoc, F. Xavier Espinachd,Marc Delgado-Aguilara, Pere Mutjea,Interface and
micromechanical characterization of tensile strength of biobasedcomposites from polypropylene and henequen strands,Industrial Crops
& Products 132 (2019) 319–326.
11. Arain Muhammad Fahad, Wang Mingxue, Chen Jianyong, Zhang Huapeng, Experimental and numerical study on tensile behavior of
surface modified PVA fiber reinforced strain-hardening cementitious composites, Construction and Building Materials 217 (2019)
403–415.
12. Da Silva F, Filho RDT, FilhoJdAM, Fairbairn EdMR. Physical and mechanical properties of588 durable sisal fiber–cement composites.
Construction and Building Materials. 2010;24:777
13. I. Scheider, T. Xiao, N. Huber, J. Mosler,On the interaction between different size effects in fibrereinforcedPMMA: Towards
composites with optimised fracture behaviour,http://dx.doi.org/10.1016/j.commatsci.2013.04.027

Authors: I. Arun Babu, B. Raghu Kumar, P.Phani Prasanthi, A. Eswar Kumar, Ch. Vidya
Fatigue Characterization Of Sisal Fiber Reinforced Composites Using Experimental And Finite
Paper Title:
Element Method
Abstract: The objective of this study is to investigate the fatigue behavior of sisal fiber reinforced with
carbon nanotubes. The hand lay-up technique is used to prepare the composite material samples. The fatigue
response of pure polymer matrix, composite material which is prepared by reinforcing a sisal fiber reinforced
with a polymer matrix was studied. The effectiveness of nano reinforcement of fatigue response is identified
303. from experiments. Later, the fatigue response of sisal and nano particle reinforced sisal fiber composites (hybrid 1728-
composite) is identified with irregularities by using finite element based software ANSYS. The elastic properties 173
of sisal fiber reinforced composite and carbon nanotube reinforced composite is estimated by using the 2
principles of Micromechanics and Macro-mechanics. The failure mechanism of polymer, conventional sisal fiber
composites and nano filled sisal fiber reinforced composites are identified. The effect of the shape of the
irregularities on the fatigue response is also identified from ANSYS software. From the present work, it is
observed that, the reinforcement of nano reinforcement has considerable influence on the fatigue response of the
resulting composite.

Keywords: Sisal fiber, Carbon nanotube, Fatigue behavior, Finite Element method, Micromechanics and
Macro-mechanics.

References:

1. Qian Li, Yan Li, Limin Zhou, “A micromechanical model of interfacial debonding and elementary fiber pull-out for sisal fiber-
reinforced composites”, Composites Science and Technology, Volume 153, 1 December 2017, Pages 84-94
2. Yingji Wu, Changlei Xia, Liping Cai, Andres C.Garcia, Sheldon Q.Shi, “Development of natural fiber-reinforced composite with
comparable mechanical properties and reduced energy consumption and environmental impacts for replacing automotive glass-fiber
sheet molding compound”, Journal of Cleaner Production, Volume 184, 20 May 2018, Pages 92-100.
3. Mondher Haggui, Abderrahim El Mahi, Zouhaier Jendli, Ali Akrout, Mohamed Haddar, “Static and fatigue characterization of flax
fiber reinforced thermoplastic composites by acoustic emission”, Applied Acoustics Volume 147, April 2019, Pages 100-110.
4. Yidong Zhang, Li Zhang, LichengGuo, Yubo Feng, Gang Liu, Xinyang Sun,Investigation on fatigue performance of T800 composites
structural component,doi.org/10.1016/j.compstruct.2018.04.023
5. MeltemAltinKaratas, HasanGokkaya,A Review on Machinability of Carbon Fiber Reinforced Polymer (CFRP) and GlassFiber
Reinforced Polymer (GFRP) Composite Materials,10.1016/j.dt.2018.02.001.
6. Paul Van Der Sypt, Mehdi Chérif, Christophe Bois,Analysis of the fatigue behaviour of laminated composite holes subjected topin-
bearing loads,doi.org/10.1016/j.ijfatigue.2017.05.025
7. ZengewnWua, Jun Liangb, MaoqingFua, GuodongFanga, ZhengongZhoua, Study of random fatigue behavior of C/SiC composite thin-
wall plates,doi.org/10.1016/j.ijfatigue.2018.07.001
8. Pintu Kumar Vishwakarma, Anand Gaurav, K.K. Singh,Strain estimation around the open hole in GFRP laminate subjected to tension-
tension fatigue loading by FEM, (2018) 7960–7966.
9. Waqas Anwar, M. Zubair Khan, Asif Israr, ShahidMehmood, Nazeer A. Anjum,Effect of structural dynamic characteristics on fatigue
and damagetolerance of aerospace grade composite materials, doi.org/10.1016/j.ast.2017.01.012
10. T. Archana, S.Anand Kumar, R.R. Elangovan, Y. S. Rammohan,RavikumarDumpala, B. Ratna Sunil, R. K. Kumar,Fracture toughness
and fatigue behavior of spider silk and S-glassepoxy composites: An FEM approach, 5 (2018) 2627–2634.
11. Y. KhudariBek, KM. Hamdia, T. Rabczuk, C. Konke,Micromechanical Model for Polymeric Nano-composites Material Based on
SBFEM, doi.org/10.1016/j.compstruct.2018.03.064.
12. JF Durodola, S Ramachandra, S Gerguri, NA Fellows,Artificial neural network for random fatigue loading analysis including the
effectof mean stress,doi.org/10.1016/j.ijfatigue.2018.02.007
13. AparnaGangele, Ashok Kumar Pandey,Elastic and fracture characteristics of graphene-silicon nanosheetcomposites using nonlinear
finite element method, doi.org/10.1016/j.ijmecsci.2018.05.012.
14. HaolingJia, Gongyao Wang, Shuying Chen, YanfeiGao, Weidong Li, Peter K.Liaw, Fatigue and Fracture Behavior of Bulk Metallic
Glasses and Their Composites, doi.org/10.1016/j.pmatsci.2018.07.002.
15. Masanori Kikuchi, Yoshitaka Wada, Yuichi Shintaku, Kazuhiro Suga, Yulong Li,Fatigue crack growth simulation in heterogeneous
material using s-version FEM, doi.org/10.1016/j.ijfatigue.2013.04.022

Authors: J.Katyayani., Ch.Varalakshmi


Cognitive Computational Model for Evaluation of Fintech Products and Services With Respect To
Paper Title:
Vijayawada City, Ap
Abstract: Now in the era of artificial intelligence and digitalisation financial sector is adopting various digital
tools in their products and services offerings. That’s why user acceptance of technology in the financial sector
has became the important field of the study. Internet banking, mobile banking,ATM,cash deposit machines,
instant payment services, online trading in stock markets, online funds transfers,E-wallets,wealth management,
peer to peer lending,blockchain technology are various fintech products and services. This study is an attempt
to analyse the users acceptance of technology in their financial management decisions by using cognitive
computational model. Cognitive computing provides a great opportunity for users to understand the true nature
of risk for the industry especially new upcoming risk such as cyber security. This study mainly focuses on how
different cognitive factors such as perceived expenditure, ease of time, level of risk, service quality, frequent use
304. of automated tools, socio cultural factors, perceived trust, perceived usability and perceived convenience to use
influence the users motive to adopt and utilise the Financial Technology. 1733-
173
Keywords: Artificial Intelligence, Block Chain Technology, Cognitive Computing, Digitalisation. 6

References:

1. Bhavish Jugurnath, R. B. (2018, April). Fintech and digital banking perception and usage in Mauritius,A LOGISTIC REGRESSION
APPROACH. The 5th IBSM International Conference on Business,Management and Accounting
2. ByeongHoon Yoon, J. K. (2016, July). A study on User Behaviors for Consulting of Fintech Companies. Indian Journal of Science
Technology, 9(26). doi:10.17485/ijst/2016/v9i26/97289, July 2016
3. Cham Tat Huei, L. S. (2018). Preliminary Study on Consumer Attitude towards FinTech Products and Services in Malaysia.
International Journal of Engineering&Technology,7,166169
4. doi:Website:www.sciencepubco.com/index.php/IJET
5. Chuttur,M.(2009,september).Overview of TAM : Origins,Developments and Future Directions. Sprouts Working papers on
Information Systems. Retrieved from http://sprouts.aisnet.org/9-37
6. Harrison Stewart, J.J. (2018, January). "Data security and consumer trust in FinTech Innovation in Germany". Information & Computer
Security. Retrieved from https://doi.org/10.1108/ICS-06-2017-0039
7. Lai,P.(Jan./Apr.2017).THE LITERATURE REVIEW OFTECHNOLOGY ADOPTION MODELS AND THORIES FOR THE
NOVELTY TECHNOLOGY. Journal of
InformationSystemsandTechnologyandManagement,JISTEMJ.Inf.Syst.Technol.Manag.vol.14no.1.doi:http://dx.doi.org/10.4301/s1807-
17752017000100002
8. Li-Min Chuang, C.-C. L.-K. (2016). The Adoption of Fintech Service: TAM perspective. International Journal of Management and
Administrative Sciences (IJMAS), 3(7), 01-15. Retrieved from http://www.ijmas.org/
9. Malik Shahzad Shabbir, A. K. (2016, January). Combine Effect of Automated Services and Traditional Services Quality onCustomer
Satisfaction: Evidence from Banking Sector of Pakistan. International Journal of Economics &
ManagementSciences,5.doi:doi.org/10.4172/2162-6359.1000332.
10. Ming-Chih Chen1, S.-S. C.-M.-G. (2016, June). The Key Factors Influencing Internet Finances Services Satisfaction: An
EmpiricalFinances Services Satisfaction: An Empirical Study in Taiwan l. American Journal of Industrial and Business
Management,6,748-762. doi:http://dx.doi.org/10.4236/ajibm.2016.66069
11. Ying-Feng Kuo a, S.-N. Y. (2008, August). Towards an understanding of the behavioral intention. Computers in human
Behaviour,103-110. doi:doi:10.1016/j.chb.2008.07.007
12. Technological Acceptance Model-1

Authors: J.Maruthi Nagendra Prasad, M.Vamsi Krishna


Lung Cancer Segmentation in CT Images Using Fuzzy-C Means Clustering and Artificial Bee
Paper Title:
Colony Algorithm
Abstract: One of the challenging issues to most of the researches is to segment pulmonary nodules from the
CT Lung images. This Research focus on rapid segmentation of pulmonary nodules from the CT Lung images
based on Fuzzy-C Means Clustering and Artificial Bee Colony Algorithm. Classic 2D otsu algorithm is used for
segmentation and Artificial Bee colony algorithm is used for finding optimum threshold values. Finally, FCM
(Fuzzy-C Means) clustering is used over the CT segmented images to cluster the images.

Keywords: CT Lung Images, Segmentation, ABC Algorithm, FCM Clustering.

References:

1. Wei, K., Zhang, T., Shen, X., & Liu, J. (2007, August). An improved threshold selection algorithm based on particle swarm
optimization for image segmentation. In Third International Conference on Natural Computation (ICNC 2007) (Vol. 5, pp. 591-594).
IEEE..
305. 2. Guo, J., Reinhardt, J. M., Kitaoka, H., Zhang, L., Sonka, M., McLennan, G., & Hoffman, E. A. (2002, July). Integrated system for CT-
based assessment of parenchymal lung disease. In Proceedings IEEE International Symposium on Biomedical Imaging (pp. 871-874). 1737-
IEEE.. 173
3. Hoffman, E. A., & McLennan, G. (1997). Assessment of the pulmonary structure-function relationship and clinical outcomes measures: 9
quantitative volumetric CT of the lung. Academic radiology, 4(11), 758-776.
4. Helen, R., Kamaraj, N., Selvi, K., & Raman, V. R. (2011, March). Segmentation of pulmonary parenchyma in CT lung images based
on 2D Otsu optimized by PSO. In 2011 International Conference on Emerging Trends in Electrical and Computer Technology (pp.
536-541). IEEE.
5. Sahoo, P. K., Soltani, S. A. K. C., & Wong, A. K. (1988). A survey of thresholding techniques. Computer vision, graphics, and image
processing, 41(2), 233-260..
6. Chi, Z., Yan, H., & Pham, T. (1996). Fuzzy algorithms: with applications to image processing and pattern recognition (Vol. 10). World
Scientific.
7. Yin, P. Y. (1999). A fast scheme for optimal thresholding using genetic algorithms. Signal processing, 72(2), 85-95.
8. Goshtasby, Ardeshir, and David A. Turner. "Segmentation of cardiac cine MR images for extraction of right and left ventricular
chambers." IEEE transactions on medical imaging 14.1 (1995): 56-64.
9. Otsu, Nobuyuki. "A threshold selection method from gray-level histograms." IEEE transactions on systems, man, and cybernetics 9.1
(1979): 62-66.
10. Ye, Zhiwei, et al. "Image segmentation using thresholding and swarm intelligence." Journal of Software 7.5 (2012): 1074-1082.
11. Sag, Tahir, and Mehmet Cunkas. "Development of image segmentation techniques using swarm intelligence." ICCIT, Konya, Turkey
(2012).
12. 12. Jafar OM, Sivakumar R. Ant-based clustering algorithms: A brief survey. International journal of computer theory and
engineering. 2010 Oct 1;2(5):787.

Authors: D. Balaji, M. Vinoth, K. Santhanalakshmi, Ananth Selvakumar, Zeba Jihan

Paper Title: Impact of Micro Finance among Self Help Groups in Fisheries (At North Chennai)
Abstract: Microfinance can be distinct for low-income consumers such as loans, transfer services, savings,
insurances and other financial products. Micro Finance Institutions and Banks use Self Help Groups as a tool to
bring inclusive growth. The general fact is majority of fish community population are living below poverty line
all over the world. The purpose of this study are to assess the State Co-operative Bank performance of
microfinance onthe economic development of fishing community in north Chennai.
306.
1740-
Keywords: Microfinance, Fishing Community, Community Development.
174
3
References:

1. Annual Report: India, 2008-2009" (Pdf). Department Of Animal Husbandry Dairying And Fisheries, Ministry Of Agriculture,
Government Of India. 2009.
2. Asian Development Bank, Pakistan: Microfinance Sector Development Program (Program Loan), 2010, 30.08.2010.
3. Bansalhema, Journal Of Microfinance, Volume 5 Number 1, Pp. 22-49
4. Food And Agriculture Organization Of The United Nations, “Microfinance Helps Poverty Reduction And Fisheries Management –
Policies To Support Microfinance, Livelihoods And Resources Management.New Directions In Fisheries – A Series Of Policy Briefs
On Development Issues, No. 04. Rome. 8 Pp.,” Issn 1817-2679, 2006, 01.09.2010.
5. Gow. K. M., “Microfinance As A Component Of Sustainable Economic Development In Asia,”Studies In Urban Sustainability And
Project Management, Pp. 382-391, 24.05.2010.
6. Gupta, S.P “Statistical Methods”, Thirty Eight Revised Edition, Sultan Chand & Sons Publishers, New Delhi, (2009).
7. Jayaraman,R. “Performance Analysis Of Fisherwomen Self Help Groups In Tamilnadu”, 2005, 19.08.2010.
8. Karmakar,K.G G.S.Mehta,S.K.Ghosh And P. Selvaraj, “Review Of The Development Of Microfinance Services For Coastal Small
Scale Fisheries And Aquaculture For South Asia Countries (Including India, Bangladesh & Sri Lanka) With Special Attention To
Women, 2009, 30.08.2010.
9. Kothari, C.R “Research Methodology Methods & Techniques”, Second Edition, New Age International Publishers, New Delhi, (2007).
10. Panda Debadutta Kumar, “Participation In The Group Based Microfinance And Its Impact On Rural Households: A Quasi-
Experimental Evidence From An Indian State”, Global Journal Of Finance And Management, Issn 0975 - 6477 Volume 1, Number 2
(2009), Pp. 171-183, Research India Publications, 24. 05. 2010.
11. Puhazhendi. V., K. C. Badatya, Shg-Bank Linkage Programme For Rural Poor – An Impact Assessment, 2002, 19.08.2010.
12. Thiraphongtangthirasunan, Microfinance,Small Scale Fisheries Trade In Selected Apraca-Member Countries,
27.04.2010.Www.Ripublication.Com/Gjfm/Gjfmv1n2_8.Pdf Viewed On Month Of April 2015
13. Www.Microfinancegateway.Org/Gm/Document-1.9.29782/35643_File_10.Pdf
14. Eprints.Qut.Edu.Au/221/1/Gow.Pdf Viewed On Month Of April 2015
15. Www.Nabard.Org/Pdf/Publications/Sudy_Reports/Fisherwomen_Shg_Study.Pdf Viewed On Month Of April 2015
16. Www.Microfinancegateway.Org/Gm/Document Viewed On Month Of March 2015
17. Www.Microfinancegateway.Org/Gm/Document-1.1.6314/29229-Pak-Validation-01%5b1%5d.Pdf. Viewed On Month Of March 2015
18. Www.Nabard.Org/Pdf/Publications/Sudy_Reports/Puhazhendi.Pdf Viewed On Month Of April 2015

Authors: R. Chitravathi , G. Kanimozhi MCA

Paper Title: Disease Prediction Using Snn over Big Data


Abstract: Enormous information and its strategies not just assistance the biomedical and social insurance
segments to estimate the illness expectation yet in addition the patients. It is hard to meet the specialist at all the
occasions in clinic for minor indications. Enormous information gives fundamental data about the maladies
dependent on the indications of the patient. These days’ individuals need to find out about their wellbeing,
ailments and the related medicines for their advancement. Anyway existing medicinal services framework gives
organized info which needs in dependable and exact forecast. Here, Sensational Neural Network (SNN) is
proposed which recognizes the most precise malady dependent on patient’s input which advantages in early
discovery. Electronic Health Record (EHR) keeps up and refreshes persistent wellbeing records which
encourage an improved expectation model. Enormous information utilizes both organized and unstructured data
sources which result in moment direction to their medical problems. The framework takes contribution from the
clients which checks for different illnesses related with the side effects dependent on breaking down an
assortment of datasets. In the event that the framework can't give reasonable outcomes, it private the clients to
go for Clinical Lab Test (CLT, for example, blood test, x-beam, and sweep so on where the transferred pictures
are sent for the successful profound learning forecast. The various parameters incorporated into viable
programmed multi ailment forecast incorporate preprocessing, grouping and prescient examination. The
principle target of the proposed framework is to distinguish the sicknesses dependent on the manifestations and
give legitimate direction for the patients to take treatment rapidly immediately in a helpful and proficient way.

Keywords: Big Data, SNN, EHR, Deep Learning Algorithm, CLT.

References:
307. 1. Min Chen, Yixue Hao, Kai Hwang, Lu Wang, and Lin Wang, “Disease Prediction by Machine Learning over Big Data from
Healthcare Communities”, IEEE. 2169-3536, 2017. 1744-
2. Feixiang Huang, Shengyong Wang, and Chien-Chung Chan, “Predicting Disease By Using Data Mining Basedon Healthcare
Information System”, IEEE International Conference on Granular Computing, 978-1-4673-2311-6, 2012.
174
3. SujathaR ,Sumathy R and Anitha Nithya R, “A Survey of Health Care Prediction Using Data Mining”, International Journal of 9
Innovative Research in Science, Engineering and Technology, Vol. 5, Issue 8, 2016.
4. Pinky Saikia Dutta, Shrabani Medhi, Sunayana Dutta, Tridisha Das and Sweety Buragohain, “Smart Health Care Using Data Mining”,
International Journal of Current Engineering And Scientific Research, ISSN : 2393-8374, Vol.-4, Issue-8,2017.
5. Ravi Aavula, M.Kruthini, N.Raviteja and K.Shashank, “Smart Health Consulting Android System”, International Journal of Innovative
Research in Science, Engineering and Technology, Vol. 6, Issue 3, 2017.
6. Priyanka Vijay Pawar, MeghaSakharamWalunj and PallaviChitte, “Estimation based on Data Mining Approach for Health Analysis”,
International Journal on Recent and Innovation Trends in Computing and Communication, Volume: 4 , 2017.
7. Krishnaiah, G. Narsimha and N. SubhashChandra, “A Study On Clinical Prediction Using Data Mining Techniques”, International
Journal of Computer Science Engineering and Information Technology Research (IJCSEITR), Vol. 3, Issue 1, 2013.
8. Rawan Ali AL-jraib, Wafamoqhas, Huda Saeed Salman, AmeeraMohyAdden and Mona Mohmmad, “Biohouse Journal of Computer
Science”, International Journal Series, ISSN 2379- 1500, 2017.
9. Md. Tahmid Rahman Laskar, Md. Tahmid Hossain, Abu RaihanMostofa Kamal and NafiulRashid, “Automated Disease Prediction
System (ADPS): A User Input-based Reliable Architecture for Disease Prediction”, International Journal of Computer Applications
(0975 – 8887), Vol. 133 – No.15, 2016.
10. Aditya Tomar, “An Approach to Devise an Interactive Software Solution for Smart Health Prediction using Data Mining”,
International Journal of Advanced Research in Computer and Communication Engineering Vol. 5, Issue 7, 2016.
11. VidyaZope, PoojaGhatge, Aaron Cherian, PiyushMantri and KartikJadhav, “Smart Health Prediction using Machine Learning”, IJSRD
- International Journal for Scientific Research & Development| Vol. 4, Issue 12, 2017.
12. AakashKhatavkar, PiyushPotpose and PankajkumarPandey, “Smart Health Prediction System”, IJSRD - International Journal for
Scientific Research & Development Vol. 5, Issue 02, 2017.
13. Prashant Tiwari, AmanJaiswal, NarendraVishwakarm and PushpanjaliPatel, “Smart Health Care - An Android App To Predict Disease
On The Basis Of Symptoms”, International Research Journal of Engineering and Technology (IRJET), Vol.: 04 Issue: 04, 2017.
14. EvaK.Lee and Tsung-LinWu, “Classification and disease prediction via mathematical programming”, American Institute of Physics,
AIP Conference Proceedings, doi: 10.1063/1.2817343, 2007.
15. Riccardo Miotto, Li Li, Brian A. Kidd and Joel T. Dudley, “Deep Patient: An Unsupervised Representation to Predict the Future of
Patients from the Electronic Health Records”, DOI: 10.1038 / srep26094, 2016.
16. Prasan Kumar Sahoo, Suvendu Kumar Mohapatra and Shih-Lin Wu, “Analyzing Healthcare Big Data with Prediction for Future
Health Condition”, IEEE OI 10.1109/ACCESS.2016.2647619, 2016.
17. Cheng-HsiungWeng, Tony Cheng-Kui Huang and Ruo-Ping Han, “Disease prediction with different types of neural network
Classifiers”, Elsevier Ltd. http://dx.doi.org/10.1016/j.tele.2015.08.006, 2016.
18. Xianglin Yang, Yunhai Ton, XiangfengMeng, Shuai Zhao, ZhiXu, YanjunLi,Guozhen Liu and Shaohua Tan, “Online Adaptive
Method for Disease Prediction Based on Big Data of Clinical Laboratory Test”, IEEE978-1-4673-994-3, 2016.
19. AjinkyaKunjir, HarshalSawant, NuzhatF.Shaikh, “Data Mining and Visualization for Prediction of Multiple Diseases in Health Care”,
IEEE 978-1-5090 -6399-4.

Authors: Jaanu Sharma , Vinayak Khajuria, Dilbag Singh

Paper Title: Hybrid Classification Technique for Sentiment Analysis of the Twitter Data
Abstract: Sentiment can be described in the form of any type of approach, thought or verdict which results
because of the occurrence of certain emotions. This approach is also known as opinion extraction. In this
approach, emotions of different peoples with respect to meticulous rudiments are investigated. For the
attainment of opinion related data, social media platforms are the best origins. Twitter may be recognized as a
social media platform which is socially accessible to numerous followers. When these followers post some
message on twitter, then this is recognized as tweet. The sentiment of twitter data can be analyzed with the
feature extraction and classification approach. The hybrid classification is designed in this work which is the
combination of KNN and random forest. The KNN classifier extract features of the dataset and random forest
will classify data. The approach of hybrid classification is applied in this research work for the sentiment
analysis. The performance of the proposed model is tested in terms of accuracy and execution time.

Keywords: Sentiment analysis, KNN, SVM, random forest.

References:

308. 1. Kiruthika M, Sanjana Woonna, “Sentiment analysis of twitter data”, 2016, International journal of innovations in engineering and
technology.
1750-
2. Varsha Sahayak, Vijaya Shete, Apashabi Pathan, “Sentiment Analysis on Twitter Data”, 2015, International Journal of Innovative 175
Research in Advanced Engineering (IJIRAE) 3
3. Apoorv Agarwal Boyi Xie Ilia Vovsha Owen Rambow Rebecca Passonneau, “Sentiment Analysis of Twitter Data”, 2011, Conference
of the European Chapter of the ACL
4. Chandan Arora, Dr. Rachna, “SENTIMENT ANALYSIS ON TWITTER DATA”, 2017, International Research Journal of Engineering
and Technology (IRJET)
5. Vishal A. Kharde, S.S. Sonawane, “Sentiment Analysis of Twitter Data: A Survey of Techniques”, 2016, International Journal of
Computer Applications (0975 – 8887)
6. Onam Bharti, Mrs. Monika Malhotra, “SENTIMENT ANALYSISON TWITTER DATA”, 2016, International Journal of Computer
Science and Mobile Computing, Vol.5 Issue.6,
7. Zhao Jianqiang, Gui Xiaolin, “Deep Convolution Neural Networks for Twitter Sentiment Analysis”, 2018, IEEE
8. Ankit, Nabizath Saleena, “An Ensemble Classification System for Twitter Sentiment Analysis”, 2018, International Conference on
Computational Intelligence and Data Science
9. Sushree Das, Ranjan Kumar Behera, Mukesh Kumar, Santanu Kumar Rath, “Real Time Sentiment Analysis of Twitter Streaming Data
For Stock Prediction”,2018,International Conference on Computational Intelligence and Data Science
10. Salha M. Alzahrani, “Development of IoT Mining Machine for Twitter Sentiment Analysis”, 2018, 15th Learning and Technology
Conference (L&T)
11. Symeon Symeonidis , Dimitrios Effrosynidis , Avi Arampatzis, “ A comparative evaluation of pre-processing techniques and their
interactions for twitter sentiment analysis”,2018, Expert Systems With Applications
12. Sotiris K. Tasoulis, Aristidis G. Vrahatis, Spiros V.Georgakopoulos, Vassilis P. Plagianakos, “Real Time Sentiment Change Detection
of Twitter Data Streams”,2018, Innovations in Intelligent Systems and Applications (INISTA)

Authors: Taran Singh Bharati

Paper Title: Security Enhancement and Privacy Preserving Of Big Data


Abstract: Big data is gaining the popularity among the data scientist and the people from the Biology related
disciplines. Big Data is very huge in volume and comes very fast from various sources. Millions of tweets or
posts are generated per second on social networking sites. Big data has many issues of i.e. nature, storing,
management, and processing, privacy and security in disclosing of attributes of the sensitive data in data of
healthcare etc. For maintaining the privacy there are k-anonymity, p-sensitive k-anonymity, l-diversity, t-
closeness, and k-concealment ways. In this paper an anonymity algorithm is proposed which will be used to
enhance the security and privacy preserving of sensitive attributes of big data .

309. Keywords: Privacy, Big Data, Security, Attacks.


1754-
References: 175
8
1. Inukollu VN, Arsi S, Ravuri SR. Security issues associated with big data in cloud computing. International Journal of Network Security
& Its Applications. 2014 May 1;6 3):45.
2. Terzi DS, Terzi R, Sagiroglu S. A survey on security and privacy issues in big data. In2015 10th International Conference for Internet
Technology and Secured Transactions (ICITST) 2015 Dec 14 (pp. 202-207). IEEE.
3. Mora AC, Chen Y, Fuchs A, Lane A, Lu R, Manadhata P. Top ten big data security and privacy challenges. Cloud Security Alliance.
2012; 140.
4. Kaisler S, Armour F, Espinosa JA, Money W. Big data: Issues and challenges moving forward. In2013 46th Hawaii International
Conference on System Sciences 2013 Jan 7 (pp. 995-1004). IEEE.
5. Matturdi B, Zhou X, Li S, Lin F. Big Data security and privacy: A review. China Communications. 2014 Apr; 11 (14):135-45.
6. Patil HK, Seshadri R. Big data security and privacy issues in healthcare. In2014 IEEE international congress on big data 2014 Jun 27
(pp. 762-765). IEEE.
7. Saurabh pandey, rashmi pandey, Medical (Healthcare) Big Data Security and Privacy Issues, International Journal of Scientific &
Engineering Research Volume 9, Issue 2, feb-2018.
8. Cavoukian A, Jonas J. Privacy by Design in the Age of Big Data. In Guide to Big Data Applications 2012 (pp. 29-48). Springer, Cham.
Web site: www.ipc.on.ca, Privacy by Design: www.privacybydesign.ca
9. Moura J, Serrão C. Security and privacy issues of big data. In Handbook of research on trends and future directions in big data and web
intelligence 2015 (pp. 20-52). IGI Global.
10. Lu R. Zhu H., Liu X. et al., towards efficient and privacy-preserving computing in Big Data era, IEEE Network, july-august, 2014 pp.
46-50.
11. Gahi Y, Guennoun M, Mouftah HT. Big data analytics: Security and privacy challenges. In2016 IEEE Symposium on Computers and
Communication (ISCC) 2016 Jun 27 (pp. 952-957). IEEE.
12. Alguliyev R, Imamverdiyev Y. Big data: big promises for information security. In2014 IEEE 8th International Conference on
Application of Information and Communication Technologies (AICT) 2014 Oct 15 (pp. 1-4). IEEE.
13. Jain P, Gyanchandani M, Khare N. Big data privacy: a technological perspective and review. Journal of Big Data. 2016 Dec; 3(1):25.
14. Perera C, Ranjan R, Wang L, Khan SU, Zomaya AY. Big data privacy in the internet of things era. IT Professional. 2015 May; 17
(3):32-9.
15. Zhang D. Big data security and privacy protection. In8th International Conference on Management and Computer Science (ICMCS
2018) 2018 Oct 20. Atlantis Press.
16. Thayananthan V, Albeshri A. Big data security issues based on quantum cryptography and privacy with authentication for mobile data
center. Procedia Computer Science. 2015 Jan 1; 50: 149-56.
17. Yu S. Big privacy: Challenges and opportunities of privacy study in the age of big data. IEEE access. 2016; 4: 2751-63.
18. Demchenko Y, Ngo C, de Laat C, Membrey P, Gordijenko D. Big security for big data: Addressing security challenges for the big data
infrastructure. In Workshop on Secure Data Management 2013 Aug 30 (pp. 76-94). Springer, Cham.
19. Hu J, Vasilakos AV. Energy big data analytics and security: challenges and opportunities. IEEE Transactions on Smart Grid. 2016 Sep;
7 (5):2423-36.
20. Mehmood A, Natgunanathan I, Xiang Y, Hua G, Guo S. Protection of big data privacy. IEEE access. 2016; 4:1821-34.
21. Gadepally V, Hancock B, Kaiser B, Kepner J, Michaleas P, Varia M, Yerukhimovich A. Computing on masked data to improve the
security of big data. In2015 IEEE International Symposium on Technologies for Homeland Security (HST) 2015 Apr 14 (pp. 1-6).
IEEE.
22. Sharma PP, Navdeti CP. Securing big data hadoop: a review of security issues, threats and solution. Int. J. Comput. Sci. Inf. Technol.
2014; 5 (2):2126-31.
23. Richards NM, King JH. Three paradoxes of big data. Stan. L. Rev. Online. 2013; 66: 41.
24. Bharati, T. S. (2015). Enhanced Intrusion Detection System for Mobile Adhoc Networks using Mobile Agents with no
Manager. International Journal of Computer Applications, 111(10).
25. Bharati, T. S., & Kumar, R. (2015, March). Secure intrusion detection system for mobile adhoc networks. In Computing for Sustainable
Global Development (INDIACom), 2015 2nd International Conference on (pp. 1257-1261). IEEE.
26. Bharati, T. S., & Kumar, R. (2015). Intrusion Detection System for MANET using Machine Learning and State Transition
Analysis. International Journal of Computer Engineering & Technology (IJCET), 6(12), 1-8.
27. Bharati, T. S., & Kumar, R. (2016). Enhanced Key Distribution for Mobile Adhoc Networks. International Journal of Engineering
Science, 6(4), 4184-4187.
28. Bharati T. S. (2017). Agents to Secure MANETS. International Journal of Advanced Engineering and Research Development, 4(11),
1267-1273.
29. Bharati T.S. (2018). MANETs and Its’ Security. International Journal of Computer Networks and Wireless Communication, 8(4), 166-
171.
30. Jaseena KU, David JM. Issues, challenges, and solutions: big data mining. CS & IT-CSCP. 2014 Dec 27; 4 (13):131-40.
31. Abouelmehdi K, Beni-Hessane A, Khaloufi H. Big healthcare data: preserving security and privacy. Journal of Big Data. 2018 Dec 1;
5(1):1.
32. Li N, Li T, Venkatasubramanian S. t-closeness: Privacy beyond k-anonymity and l-diversity. In2007 IEEE 23rd International
Conference on Data Engineering 2007 Apr 15 (pp. 106-115). IEEE.
33. Sweeney L. Achieving k-anonymity privacy protection using generalization and suppression. International Journal of Uncertainty,
Fuzziness and Knowledge-Based Systems. 2002 Oct; 10 (05):571-88.
34. Sweeney L. k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based
Systems. 2002 Oct; 10 (05):557-70.
35. Samarati P. Protecting respondents identities in microdata release. IEEE transactions on Knowledge and Data Engineering. 2001 Nov;
13 (6):1010-27.
36. Truta TM, Vinay B. Privacy protection: p-sensitive k-anonymity property. In22nd International Conference on Data Engineering
Workshops (ICDEW'06) 2006 (pp. 94-94). IEEE.
37. Xiao X, Tao Y. Anatomy: Simple and effective privacy preservation. InProceedings of the 32nd international conference on Very large
data bases 2006 Sep 1 (pp. 139-150). VLDB Endowment.
38. Xiao X, Tao Y. Personalized privacy preservation. InProceedings of the 2006 ACM SIGMOD international conference on Management
of data 2006 Jun 27 (pp. 229-240). ACM.
39. Machanavajjhala A, Gehrke J, Kifer D, Venkitasubramaniam M. l-diversity: Privacy beyond k-anonymity. In22nd International
Conference on Data Engineering (ICDE'06) 2006 Apr 3 (pp. 24-24). IEEE.
40. Iyengar VS. Transforming data to satisfy privacy constraints. InProceedings of the eighth ACM SIGKDD international conference on
Knowledge discovery and data mining 2002 Jul 23 (pp. 279-288). ACM.
41. Bayardo RJ, Agrawal R. Data privacy through optimal k-anonymization. In21st International conference on data engineering (ICDE'05)
2005 Apr 5 (pp. 217-228). IEEE.
42. Sun X, Wang H, Li J, Truta TM, Li P. (p+, α)-sensitive k-anonymity: A new enhanced privacy protection model. In2008 8th IEEE
International Conference on Computer and Information Technology 2008 Jul 8 (pp. 59-64). IEEE.
43. Tassa T, Mazza A, Gionis A. k-Concealment: An Alternative Model of k-Type Anonymity. Trans. Data Privacy. 2012 Apr 1; 5(1):189-
222.
44. Bharati T.S. (2019). Trust Based Security of MANETs. International Journal of Innovative Technology and Exploring Engineering,
8(8), 792-795.
45. Bharati T.S. (2019). Security and Privacy of Internet of Things. International Journal of Innovative Technology and Exploring
Engineering, 8(8), 2740-2743.

Authors: Shivi Varshney, Ritula Thakur and Rajvardhan Jigyasu


EMG Signal Based Pattern Recognition Of Grasping Movement Using MODWT And Weighted
Paper Title:
K- Nearest Neighbor
310. Abstract: This study purposed and evaluates a method based on weighted K-NN classification of surface 1759-
Electromyogram (sEMG) signals. The sEMG signal classification plays the key role in designing a prosthetic for 176
amputee persons. Wavelet transform is new signal processing technique, which provides better resolution in time 4
and frequency domain simultaneously. Due to these wavelet properties, it can be effectively used in processing
the sEMG signal to determine certain amplitude changes at certain frequencies. This paper propose a Maximal
overlap Discrete Wavelet Transform (MODWT) approach for Weighted K-NN classifier for classification of
sEMG signals based Grasping movements. At level 5 signal decomposition using MODWT, useful resolution
component of the sEMG signal is obtained. In this paper Time-domain (TD) features set is used, which shows a
decent performance. In WKNN, use a square-inverse weighted technique to improve the performance of the K-
NN. Hence, a novel feature set obtained from decomposed signal using MODWT is used to improve the
performance of sEMG for classification. MODWT was used for de-noising and time scale feature extraction of
sEMG signals. Several WKNN classifiers are tested to optimize classification accuracy and computational
problems. PCA is use to reduce the size of the level 5 decomposed data. WKNN performance evaluation on
K=10 values with or without PCA. Six hand grasping movements have been classified, results indicate that this
method allows the classification of hand pattern recognition with high precision.
Keywords: Weighted K-NN (WKNN), Maximal overlap discrete wavelet transform (MODWT), sEMG,
Principal component analysis (PCA), gasping movement, feature extraction, hand movements, robotic arm etc.

References:

1. K., Samarawickrama, “Surface EMG Signal Acquisition Analysis and Classification for the Operation of a Prosthetic Limb”, (2018).
2. J., Qi, “Surface EMG hand gesture recognition system based on PCA and GRNN. Neural Computing and Applications”, (2019), 1-9.
3. D., Tao, “Real-time performance of textile electrodes in electromyogram pattern-recognition based prosthesis control” in Proceedings
of 2012 IEEE-EMBS International Conference on Biomedical and Health Informatics , (2012, January), (pp. 487-490). IEEE.
4. L., Elamvazuthi, “Electromyography (EMG) based classification of neuromuscular disorders using multi-layer perceptron. Procedia
Computer Science, (2015),76, 223-228.
5. P.K., Artemiadis, “EMG-based control of a robot arm using low-dimensional embeddings”. IEEE Transactions on Robotics, (2010)
26(2), 393-398.
6. A., Phinyomark, “Feature reduction and selection for EMG signal classification. Expert systems with applications”, (2012) 39(8), 7420-
7431.
7. Y., Narayan, “Surface EMG Signal Classification Using Ensemble Algorithm, PCA and DWT for Robot Control”. In International
Conference on Advanced Informatics for Computing Research (2018, July), (pp. 218-230). Springer, Singapore.
8. A., Abdullah, “Surface EMG signal classification by using WPD and ensemble tree classifiers. In CMBEBIH 2017 (2017) (pp. 475-
481). Springer, Singapore.
9. M. D. R., Ahsan, “Advances in electromyogram signal classification to improve the quality of life for the disabled and aged people”.
Journal of Computer Science, (2010), 6(7), 706.
10. De Andrade, “Improving sEMG-Based Hand Gesture Recognition Using Maximal Overlap Discrete Wavelet Transform and an
Autoencoder Neural Network”. In XXVI Brazilian Congress on Biomedical Engineering (2019) (pp. 271-279). Springer, Singapore.
11. Y., Narayan, Y., “Surface EMG Signal Classification Using Ensemble Algorithm, PCA and DWT for Robot Control”. In International
Conference on Advanced Informatics for Computing Research (2018, July) (pp. 218-230). Springer, Singapore.
12. V., Ahlawat, “Support Vector Machine based Classification Improvement for EMG Signals using Principal Component Analysis”.
Journal of Engineering and Applied Sciences, (2018, July) 13: 6341-6345.
13. A., Bhattacharya, A., “Time domain multi-feature extraction and classification of human hand movements using surface EMG”. In
2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS) (2017, January), (pp. 1-5). IEEE
2.
14. S., Negi, “Feature extraction and classification for EMG signals using linear discriminant analysis. In 2016 2nd International
Conference on Advances in Computing, Communication, & Automation (ICACCA) (fall) (2016, September), (pp. 1-6). IEEE.
15. P., Kumari, “Binary movement classification of sEMG signal using linear SVM and Wavelet Packet Transform”. In 2016 IEEE 1st
International Conference on Power Electronics, Intelligent Control and Energy Systems (ICPEICES) (2016, July), (pp. 1-4). IEEE.
16. S., Khalighi, “Efficient feature selection for sleep staging based on maximal overlap discrete wavelet transform and SVM”. In 2011
Annual International Conference of the IEEE Engineering in Medicine and Biology Society (2011, August), (pp. 3306-3309). IEEE.
17. R., Jigyasu, “Current Based Feature Extraction and Classification of Induction Motor Faults Using Support Vector Machine”, (2018).
18. P., Kumari, “Binary movement classification of sEMG signal using linear SVM and Wavelet Packet Transform”. In 2016 IEEE 1st
International Conference on Power Electronics, Intelligent Control and Energy Systems (ICPEICES) (2016, July), (pp. 1-4). IEEE.
19. M., Khezri, “A novel approach to recognize hand movements via sEMG patterns”. In 2007 29th Annual International Conference of the
IEEE, Engineering in Medicine and Biology Society (2017) (pp. 4907-4910). IEEE.
20. R., Jigyasu, “Bearing Fault Diagnosis Using Weighted K-Nearest Neighbor”, In 2018 2nd International Conference on Trends in
Electronics and Informatics (ICOEI) (2018, May) (pp. 1132-1137). IEEE.
21. Z., Lu, “Myoelectric pattern recognition for controlling a robotic hand: a feasibility study in stroke. IEEE Transactions on Biomedical
Engineering, (2018) 66(2), 365-372.

Authors: Palak Agarwal, Navisha Shetty, Kavita Jhajharia, Gaurav Aggarwal, Neha V Sharma

Paper Title: Machine Learning For Prognosis of Life Expectancy and Diseases
Abstract: Longevity depends on various facets such as economic growth of the country, along with the health
innovations of the region. Along with the prophecy of existence, we also figure out how sensitive a particular
mainland is to few chronic diseases. These factors have a robust impact on the potential life span of the
population. We study the biological and economical aspects of continents and their countries to predict the life
expectancy of the population and to perceive the probability of the continent possessing long standing diseases
311. like measles, HIV/AIDS, etc. Our research is conducted on the theory that exhibits the dependency or correlation
of life expectancy with the various factors which includes the health factors as well as the economic factors. 1765-
Two Machine learning algorithms simple linear regression, multiple linear regression are used for predicting the 177
expectancy of life over different continents, whereas, decision tree algorithm, random forest algorithm, and were 1
applied to classify the likelihood of occurrence of the disease. On comparing and contrasting various algorithms,
we can infer that, multiple linear regression produces the most accurate results as to what the average life
expectancy of the population would be given the current features of the continent like the adult mortality rate,
alcohol consumption rate, infant deaths, the GDP of the country, average percentage expenditure of the
population on health care and treatments, schooling rate, and other such features. On the other hand, we study
five diseases namely, HIV/AIDS, measles, diphtheria, hepatitis B and polio. The experiment concluded that, on
majority, random forest produces better results of classification based on the economic factors of the
combination of various countries of different continents.

Keywords: Machine Learning, life expectancy, Diseases, life measurement, Regression, Random forest,
Decision tree.

References:

1. M. I. Jordan and T. M. Mitchell, “Machine learning: Trends, perspectives, and prospects,” Science, vol. 349, no. 6245, pp. 255–260,
Jul. 2015.
2. A. L. Beam and I. S. Kohane, “Big Data and Machine Learning in Health Care,” JAMA, vol. 319, no. 13, p. 1317, Apr. 2018.
3. V. M. Shkolnikov, E. M. Andreev, R. Tursun-zade, and D. A. Leon, “Patterns in the relationship between life expectancy and gross
domestic product in Russia in 2005–15: a cross-sectional analysis,” Lancet Public Health, vol. 4, no. 4, pp. e181–e188, Apr. 2019.
4. D. M. J. Naimark, “Life Expectancy Measurements,” in International Encyclopedia of Public Health, H. K. (Kris) Heggenhougen, Ed.
Oxford: Academic Press, 2008, pp. 83–98.
5. H. Ouellette-Kuntz, L. Martin, and K. McKenzie, “Chapter Six - A Review of Health Surveillance in Older Adults with Intellectual and
Developmental Disabilities,” in International Review of Research in Developmental Disabilities, vol. 48, C. Hatton and E. Emerson,
Eds. Academic Press, 2015, pp. 151–194.
6. R. B. Darlington, Regression and linear models. McGraw-Hill New York, 1990.
7. K. H. Zou, K. Tuncali, and S. G. Silverman, “Correlation and Simple Linear Regression,” Radiology, vol. 227, no. 3, pp. 617–628, Jun.
2003.
8. K. J. Preacher, P. J. Curran, and D. J. Bauer, “Computational Tools for Probing Interactions in Multiple Linear Regression, Multilevel
Modeling, and Latent Curve Analysis,” J. Educ. Behav. Stat., vol. 31, no. 4, pp. 437–448, Dec. 2006.
9. D. F. Andrews, “A Robust Method for Multiple Linear Regression,” Technometrics, vol. 16, no. 4, pp. 523–531, Nov. 1974.
10. H. Theil, “A Rank-Invariant Method of Linear and Polynomial
11. Regression Analysis,” in Henri Theil’s Contributions to Economics and Econometrics: Econometric Theory and Methodology, B. Raj
and J. Koerts, Eds. Dordrecht:Springer Netherlands, 1992, pp. 345–381.
12. J. R. Quinlan, “DECISION TREES AS PROBABILISTIC CLASSIFIERS,” in Proceedings of the Fourth International Workshop on
MACHINE LEARNING, Elsevier, 1987, pp. 31–37.
13. C. W. Olanow and W. C. Koller, “An algorithm (decision tree) for the management of Parkinson’s disease: treatment guidelines,”
Neurology, vol. 50, no. 3 Suppl 3, pp. S1–S1, 1998.
14. L. Breiman, “Random Forest,” Mach. Learn., vol. 45, no. 1, pp. 5–32, 2001.
15. V. Svetnik, A. Liaw, C. Tong, J. C. Culberson, R. P. Sheridan, and B. P. Feuston, “Random Forest:  A Classification and Regression
Tool for Compound Classification and QSAR Modeling,” J. Chem. Inf. Comput. Sci., vol. 43, no. 6, pp. 1947–1958, Nov. 2003.
16. I. S. Abramson, “Adaptive Density Flattening--A Metric Distortion Principle for Combating Bias in Nearest Neighbor Methods,” Ann.
Stat., vol. 12, no. 3, pp. 880–886, Sep. 1984.

Authors: N. K. Kund
Numerical Modeling on Heat Dissipation from Electronics through Water-Titanium Carbide
Paper Title:
Nanofluid
Abstract: In enduring examination, CFD codes stand established and executed with water-TiC nanofluid to
envision the thermal alarms of ICs. The convective governing equalities of mass, force and drive are computed
for envisaging the thermal issues of ICs. The time pace selected throughout the intact computation is 0.0001 s.
The soundings affect CFD forecasts of temperature curve, temperature arena plus fluid-solid boundary
temperature of IC. The fluid-solid boundary temperature of IC is viewed as 310 K. This stands far less than the
chancy limit of 356 K temperature wished for the objective of outwitting thermal cataclysm of IC. Tritely, the
temperature of water-TiC nanofluid stands peak contiguous to the IC locality. Further, the temperature of water-
TiC nanofluid gently drops with improvement in aloofness from IC. Afterwards, this becomes surrounding
temperature in the distant arena precinct. The analogous tinted temperature curve stands accessible. Besides, the
harmonizing graph of temperature against distance from IC stands revealed. Tritely, the evolution of CFD
construal stay beside the capabilities of stances.

Keywords: IC, CFD Codes, Heat Dissipation, Water-TiC Nanofluid.

312. References:
1772-
1. N. K. Kund, P. Dutta, 2010, Numerical simulation of solidification of liquid aluminium alloy flowing on cooling slope, Trans. 177
Nonferrous Met. Soc. China, Vol. 20, pp. s898-s905. 5
2. N. K. Kund, P. Dutta, 2012, Scaling analysis of solidification of liquid aluminium alloy flowing on cooling slope, Trans. Indian
Institute of Metals, Vol. 65, pp. 587-594.
3. N. K. Kund, 2014, Influence of melt pouring temperature and plate inclination on solidification and microstructure of A356 aluminum
alloy produced using oblique plate, Trans. Nonferrous Met. Soc. China, Vol. 24, pp. 3465−3476.
4. N. K. Kund, 2015, Influence of plate length and plate cooling rate on solidification and microstructure of A356 alloy produced by
oblique plate, Trans. Nonferrous Met. Soc. China, Vol. 25, pp. 61−71.
5. N. K. Kund, P. Dutta, 2015. Numerical study of solidification of A356 aluminum alloy flowing on an oblique plate with experimental
validation, J Taiwan Inst. Chem. Ers., Vol. 51, pp. 159−170.
6. N. K. Kund, P. Dutta, 2016, Numerical study of influence of oblique plate length and cooling rate on solidification and
macrosegregation of A356 aluminum alloy melt with experimental comparison, J. Alloys Compd., Vol. 678, pp. 343−354.
7. N. K. Kund, 2018, Effect of tilted plate vibration on solidification and microstructural and mechanical properties of semisolid cast and
heat-treated A356 Al alloy, Int. J. Adv. Manufacturing Technol., Vol. 97, pp. 1617−1626.
8. N. K. Kund, 2019, EMS route designed for SSM processing, International Journal of Engineering and Advanced Technology, Vol. 8,
pp. 382−384.
9. N. K. Kund, 2019, Cooling slope practice for SSF technology, International Journal of Engineering and Advanced Technology, Vol. 8,
pp. 410−413.
10. N. K. Kund, 2019, Comparative ways and means for production of nondendritic microstructures, International Journal of Innovative
Technology and Exploring Engineering, Vol. 8, pp. 534−537.
11. N. K. Kund, 2019, Simulation of electronics cooling deploying water-zinc oxide nanofluid, International Journal of Recent Technology
and Engineering, Vol. 7, pp. 1076−1078.
12. N. K. Kund, 2019, Numerical studies on fuel cell cooling introducing water-copper nanofluid, International Journal of Recent
Technology and Engineering, Vol. 7, pp. 1079−1081.
13. N. K. Kund, 2019, Computational modeling of fuel cell expending water-zinc oxide nanofluid, International Journal of Innovative
Technology and Exploring Engineering, Vol. 8, pp. 424−426.
14. N. K. Kund, 2019, Investigations on modeling and simulation of electronics cooling exhausting water-aluminum nanofluid,
International Journal of Innovative Technology and Exploring Engineering, Vol. 8, pp. 660−663.
15. N. K. Kund, 2019, Numerical study on effect of nozzle size for jet impingement cooling with water-Al2O3 nanofluid, International
Journal of Engineering and Advanced Technology, Vol. 8, pp. 736−739.
16. N. K. Kund, 2019, Experimental investigations on impacts of nozzle diameter on heat transfer behaviors with water jet impingement,
International Journal of Engineering and Advanced Technology, Vol. 8, pp. 745−748.
17. N. K. Kund, 2019, Comparative CFD studies on jet impingement cooling using water and water-Al2O3 nanofluid as coolants,
International Journal of Innovative Technology and Exploring Engineering, Vol. 8, pp. 545−548.
18. N. K. Kund, 2019, Experimental studies on effects of jet Reynolds number on thermal performances with striking water jets,
International Journal of Innovative Technology and Exploring Engineering, Vol. 8, pp. 2195−2198.
19. N. K. Kund, D. Singh, 2019, CFD studies on heat transfer and solidification progress of A356 al alloy matrix and Al2 O3 nanoparticles
melt for engineering usages, International Journal of Innovative Technology and Exploring Engineering, Vol. 8, pp. 2043−2046.
20. N. K. Kund, S. Patra, 2019, Simulation of thermal and solidification evolution of molten aluminum alloy and SiC nanoparticles for
engineering practices, International Journal of Innovative Technology and Exploring Engineering, Vol. 8, pp. 2047−2050.

Authors: N. K. Kund
CFD Modeling on Influence of Impinging Spout Strength for Device Cooling with Water-Al2O3
Paper Title:
Nanofluid
Abstract: Current assessment get through to the effect of spout strength aimed at spout impact cooling through
water-Al2O3 nanofluid. CFD codes got established to compute the governing equalities of mass, force and drive
for envisaging the thermal issues. CFD codes got executed through water-Al2O3 nanofluid spouts to envisage
thermal issues on the chosen plate. It uses 3 mm nozzle dimension, 5 mm nozzle to plate distance and varying
spout strengths of 42, 52, 62 and 72 m/s. As projected from every temperature arena, the temperature gently
grows from spout impact spot on chosen plate along centrifugally peripheral course. This could stand because of
thermal outflow using water-Al2O3 nanofluid. The developments of temperature disparities alongside the radial
course aimed at the identified cases are really similar. Still, the extreme temperatures over the chosen plate for
situations with spout strengths of 42, 52, 62 and 72 m/s are detected to remain 320, 315, 310 and 308 K,
respectively. It may be witnessed that there is no such significant decrease in temperature from spout strength of
62 to 72 m/s (involving loss of extra mechanical power). Hence, the spout strength of 62 m/s embraces rather
lesser mean temperature and so, it stands as the ideal one.

Keywords: CFD Codes, Spout Strength, Thermal Control, Water-Al2O3 Nanofluid.

References:

1. N. K. Kund, P. Dutta, 2010, Numerical simulation of solidification of liquid aluminium alloy flowing on cooling slope, Trans.
Nonferrous Met. Soc. China, Vol. 20, pp. s898-s905.
2. N. K. Kund, P. Dutta, 2012, Scaling analysis of solidification of liquid aluminium alloy flowing on cooling slope, Trans. Indian
Institute of Metals, Vol. 65, pp. 587-594.
3. N. K. Kund, 2014, Influence of melt pouring temperature and plate inclination on solidification and microstructure of A356 aluminum
alloy produced using oblique plate, Trans. Nonferrous Met. Soc. China, Vol. 24, pp. 3465−3476.
313. 4. N. K. Kund, 2015, Influence of plate length and plate cooling rate on solidification and microstructure of A356 alloy produced by
oblique plate, Trans. Nonferrous Met. Soc. China, Vol. 25, pp. 61−71. 1776-
5. N. K. Kund, P. Dutta, 2015. Numerical study of solidification of A356 aluminum alloy flowing on an oblique plate with experimental 177
validation, J Taiwan Inst. Chem. Ers., Vol. 51, pp. 159−170.
6. N. K. Kund, P. Dutta, 2016, Numerical study of influence of oblique plate length and cooling rate on solidification and 9
macrosegregation of A356 aluminum alloy melt with experimental comparison, J. Alloys Compd., Vol. 678, pp. 343−354.
7. N. K. Kund, 2018, Effect of tilted plate vibration on solidification and microstructural and mechanical properties of semisolid cast and
heat-treated A356 Al alloy, Int. J. Adv. Manufacturing Technol., Vol. 97, pp. 1617−1626.
8. N. K. Kund, 2019, EMS route designed for SSM processing, International Journal of Engineering and Advanced Technology, Vol. 8,
pp. 382−384.
9. N. K. Kund, 2019, Cooling slope practice for SSF technology, International Journal of Engineering and Advanced Technology, Vol. 8,
pp. 410−413.
10. N. K. Kund, 2019, Comparative ways and means for production of nondendritic microstructures, International Journal of Innovative
Technology and Exploring Engineering, Vol. 8, pp. 534−537.
11. N. K. Kund, 2019, Simulation of electronics cooling deploying water-zinc oxide nanofluid, International Journal of Recent Technology
and Engineering, Vol. 7, pp. 1076−1078.
12. N. K. Kund, 2019, Numerical studies on fuel cell cooling introducing water-copper nanofluid, International Journal of Recent
Technology and Engineering, Vol. 7, pp. 1079−1081.
13. N. K. Kund, 2019, Computational modeling of fuel cell expending water-zinc oxide nanofluid, International Journal of Innovative
Technology and Exploring Engineering, Vol. 8, pp. 424−426.
14. N. K. Kund, 2019, Investigations on modeling and simulation of electronics cooling exhausting water-aluminum nanofluid,
International Journal of Innovative Technology and Exploring Engineering, Vol. 8, pp. 660−663.
15. N. K. Kund, 2019, Numerical study on effect of nozzle size for jet impingement cooling with water-Al2O3 nanofluid, International
Journal of Engineering and Advanced Technology, Vol. 8, pp. 736−739.
16. N. K. Kund, 2019, Experimental investigations on impacts of nozzle diameter on heat transfer behaviors with water jet impingement,
International Journal of Engineering and Advanced Technology, Vol. 8, pp. 745−748.
17. N. K. Kund, 2019, Comparative CFD studies on jet impingement cooling using water and water-Al2O3 nanofluid as coolants,
International Journal of Innovative Technology and Exploring Engineering, Vol. 8, pp. 545−548.
18. N. K. Kund, 2019, Experimental studies on effects of jet Reynolds number on thermal performances with striking water jets,
International Journal of Innovative Technology and Exploring Engineering, Vol. 8, pp. 2195−2198.
19. N. K. Kund, D. Singh, 2019, CFD studies on heat transfer and solidification progress of A356 al alloy matrix and Al2 O3 nanoparticles
melt for engineering usages, International Journal of Innovative Technology and Exploring Engineering, Vol. 8, pp. 2043−2046.
20. N. K. Kund, S. Patra, 2019, Simulation of thermal and solidification evolution of molten aluminum alloy and SiC nanoparticles for
engineering practices, International Journal of Innovative Technology and Exploring Engineering, Vol. 8, pp. 2047−2050.

Authors: S. Priyadharsini, K. Ponnalagu, E. Glory Bebina, A.V.R. Aarthi

Paper Title: An Acquisition On Big Data Model For Quality Tracing Of Iron And Steel Industries
Abstract: Quality determine is essential affair for steel industries. Due to complication and variation of nature
input that turn to be changed into many forms. Due to this, it is tough to explicit the report and trace over the
whole product life cycle from designing, construction, etc. According to big data approach, study of the essence
of steel brand and the factor of their manufacturing system and it is effective viable multi row system which
consists of four structure , [1]the basis quality bill of material [BQBOM] ,[2]the general process bill of
material[GPBOM],[3]the production and scheduling bill of material[PSBOM] ,[4]the final quality bill of
material[FQBOM]. This mode would be useful to builders to frame a kind of scheme in big data production
environment.

Keywords: big data , bill of material , hadoop , hdfs, mapreduce ,quality data.

References:

1. Vegie Srinivas, V. Valli kumara “A Novel Approach to Trustable Data Storage in Cloud Computing” , ‘International Journal of
Innovative Technology and Exploring Engineering’- ISSN: 2278-3075, Volume-4 Issue, July 2014.
2. Gurpreet Kaur, Kamaljeet kaur ,”Digital Watermarking and Other Data Hiding Techniques”, ‘International Journal of Innovative
Technology and Exploring Engineering’ –ISSN: 2278-3075, Volume-2, Issue 5, April 2013.
3. Shiv Pratap Singh Kushwah, Keshav Rawat, Pradeep Gupta, “Analysis and Comparison of Efficient Techniques of Clustering
Algorithms in Data Mining” , ‘International Journal of Innovative Technology and Exploring Engineering’, ISSN:2278-3075,
Volume-1, Issue 3,August 2012.
4. Naga Lakshmi, Raja Sekhara Rao, Sai Satyanarayana Reddy,” An Overview of Preprocessing on Web Log Data for Web Usage
Analysis”, ‘International Journal of Innovative Technology and Exploring Engineering’, IISN:2278-3075, Volume-2, Issue-4, March
2013.
5. H. Lookman Sithic, T. Balasubramanian ,” Survey of Insurance Fraud Detection Using Data Mining Techniques”, ‘International
Journal of Innovative Technology and Exploring Engineering’ , ISSN-2278-3075, Volume-2, Issue 3, February 2013.
314. 6. Poornima M, Shivaraj Kumar Patil, Shivukumar, Shridhar K P, Sanjay H, “Implementation of Multiplier of Using Vedic Algorithm”,
‘International Journal of Innovative Technology and Exploring Engineering’ , ISSN-2278-3075, Volume-2, Issue 6, May 2013. 1780-
7. Animesh Tiwari, Megha Jain, “ Analysis of Supply Chain Management in Cloud Computing”, ‘International Journal of Innovative 178
Technology and Exploring Engineering’, ISSN-2278-3075, Volume-3 , Issue 5, October 2013. 3
8. Anurajan Misra, Anshul Sharma, Preeti Gulia, Akanksha Bana, ‘ Big Data- Challenges and Opputunities’, ‘International Journal of
Innovative Technology and Exploring Engineering’ , ISSN-2278-3075, volume-4, Issue 2, July 2014.
9. Kulwant Singh, Atul Kumar, Nitin Sharma, ‘The Mathematical Aspects in Art to Create Decorative Effect in Design Patterns’,
‘International Journal of Innovative Technology and Exploring Engineering’ , ISSN-2278-3075, volume-2, Issue 2, January 2013.
10. Jasvir Singh Rana, Rajendra Prasad, Raghuvir Singh, ‘Order Reduction Using Modified Pole Clustering and Factor Division
Method’, ‘International Journal of Innovative Technology and Exploring Engineering’ , ISSN-2278-3075, volume-3, Issue 11, April
2014.
11. C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring Data Storage Security in Cloud Computing,” Proc. 17th Int’l
Workshop Quality of Service (IWQoS ’09), pp. 1-9, July 2009.
12. Amazon.com, “Amazon Web Services(AWS),” http://aws.amazon.com, 2009.
13. Sun Microsystems, Inc., “Building Customer Trust in Cloud Computing with Transparent Security,
”https://www.sun.com/offers/details/sun_transparency.xml, Nov.
14. Joerg Leukel, Stefan Kirn, and Thomas Schlegel, “Supply Chain as a Service: A Cloud Perspective on Supply Chain Systems”,
VOL. 5, NO. 1, IEEE SYSTEMS JOURNAL, pp. 16-27, March 2011
15. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A.Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and
M. Zaharia, “Above The Clouds: A Berkeley View of Cloud Computing”, Technical Report, EECS Department, University of
California, Berkeley, pages 1-23, February 2009.
16. R. W. Lucky, “Cloud computing”, IEEE Journal of Spectrum, Vol.
17. 46, No. 5, pages 27-45, May 2009
18. A. van der Zee, B. de Vries, ―Design by Computation‖ GA2008, 11th
19. Generative Art Conference, pp 35-52
20. Chee Kai Chua, Robert Gay and Wolfgang Hoheisel , ―A Method of Generating Motifs Aligned Along a Circular Arc‖, Computer
& Graphics, Vol. 18, No. 3, pp. 353-362, 1994.
21. Kaplan C. S. ―Computer Graphics and Geometric Ornamental
22. Design‖, Ph.D., University of Washington, Seattle, 2002.
23. George A. Miller , “WordNet: A Lexical Database for English”.
24. Sukriti Bhattacharya, AgastinoCortesi, “Data Authentication by Dis-tortion Free Watermarking”, ICSOFT 2010
25. Gary C Kessler, “An Overview of Steganography for the Computer Forensics Examiner”. February 2004 (updated June 2011).

Authors: Sunil A. Patel, Ramji M. Makwana


2D CNN and Gated Recurrent Network for Dynamic Hand Gesture Recognition with A Fusion of
Paper Title:
RGB-D and Optical Flow Data
Abstract: The dynamic hand gesture is an essential and important research topic in human-computer
interaction. Recently, Deep convolutional neural network gives excellent performance in this area and gets
promising results. But the Researcher had focused less attention on the feature extraction process, unification of
315. frame, various fusion scheme and sequence-to-sequence prediction of a frame. Therefore, in this paper, we have 1784-
presented an effective 2D CNN architecture with three stream networks and advances weighted feature fusion 179
scheme with the gated recurrent network for dynamic hand gesture recognition. To obtain enough and useful 2
information we have converted each RGB-D video to 30-frame and 45-frame for input. We have calculated an
optical flow for frame-to-frame by given RGB video and extract dense motion features. After finding proper
motion path, we have assigned more weight to optical flow features and fuse this information to the next stage
and gets a comparable result. We have also added a newest Gated recurrent network for temporal recognition of
frame and minimize training time with improved accuracy. Our proposed architecture gives 85% accuracy on the
standard VIVA dataset.
Keywords: 2D Convolutional neural network, Gesture recognition, Optical flow, RGB-D data, Gated recurrent
unit, weighted fusion.

References:

1. Foundation, TNS India Pvt. Limited, "Distracted Driving in India-A Study On Mobile Phone Usage, Pattern & Behaviour," India, 2017.
2. Veni, Shalini AnantShanmugham, "Safe Driving using Vision-based Hand Gesture Recognition System in Non-uniform Illumination
Conditions," Journal of Information and Communication Technology, vol. 12, no. 2, pp. 154-167, 2018.
3. Quentin De Smedt, H. W.-P., "SHREC’17 Track: 3D Hand Gesture Recognition Using a Depth and Skeletal Dataset," Eurographics
Workshop on 3D Object Retrieval, pp. 1-6, 2017.
4. Zhigang Tu, Wei Xie, Dejun Zhang,Ronald Poppe,Remco C. Veltkamp, Baoxin Li , Junsong Yuan, "A survey of variational and CNN-
based optical flow techniques," Signal Processing: Image Communication, vol. 72, pp. 9-24, 2019.
5. Kanade, Bruce D. Lucas and Takeo , "An Iterative Image Registration Technique with an Application to Stereo Vision," In Proceedings
of the DARPA Image Understanding Workshop, Washington, DC, USA, pp. 674-679, 1981.
6. M. Zobl, R. Nieschulz, M. Geiger, M. Lang, and G. Rigoll , "Gesture components for natural interaction with in-car devices," Gesture-
Based Communication in Human-Computer Interaction, Springer, p. 448–459, 2004.
7. F. Parada-Loira, E. Gonzalez-Agulla, and J. Alba-Castro , "Hand gestures to control infotainment equipment in cars," IEEE Intelligent
Vehicles Symposium, p. 1–6, 2014.
8. Jakub Konecny, Michal Hagara , "One-Shot-Learning Gesture Recognition using HOG-HOF," Journal of Machine Learning Research,
vol. 15, pp. 2513-2532, 2014.
9. Gheissari, Somayeh DanafarNiloofar , "Action Recognition for Surveillance Applications Using Optic Flow and SVM," in Asian
Conference on Computer Vision, Springer, Japan, 2007.
10. Fifin Ayu Mufarroha, Fitri Utaminingrum. Hand Gesture Recognition using Adaptive Network Based Fuzzy Inference System and K-
Nearest Neighbor.in International Jornal of Technology, Vol. 3, pp.559-567, 2017.
11. H. Zhang, L.E. Parker , "Code4d: color-depth local spatio-temporal features for human activity recognition from rgb-d videos," IEEE
Trans. Circuits Syst. Video Technol, vol. 26, p. 541–555, 2016.
12. Trivedi, E. Ohn-Bar and M, "Hand gesture recognition in real time for automotive interfaces: A multimodal vision-based approach and
evaluations," IEEE Trans. on Intelligent Transportation Systems, vol. 15, no. 6, pp. 1-10, 2014.
13. P. Molchanov, S. Gupta, K. Kim and J. Kautz, "Hand gesture recognition with 3D convolutional neural networks," IEEE Conference on
Computer Vision and Pattern Recognition Workshops , pp. 1-7, 2015.
14. P. Molchanov, S. Gupta, K. Kim, and K. Pulli, "Multi-sensor system for driver’s hand-gesture recognition," IEEE Automatic Face and
Gesture Recognition, pp. 1-8, 2015.
15. P. Molchanov, X. Yang, S. Gupta, K. Kim, S. Tyree, and J. Kautz, "Online detection and classification of dynamic hand gestures with
recurrent 3d convolutional neural network," IEEE Conference on Computer Vision and Pattern Recognition, p. 4207–4215, 2016.
16. T. Du, L. Bourdev, R. Fergus, L. Torresani, and M. Paluri,, "Learning spatiotemporal features with 3d convolutional networks," IEEE
International Conference on Computer Vision, pp. 1-9, 2015.
17. leni Tsironi, Pablo Barros, Cornelius Weber, Stefan Wermter, "An analysis of Convolutional Long Short-Term Memory Recurrent
Neural Networks for gesture recognition," Neurocomputing, pp. 76-86, 2017.
18. C. Feichtenhofer, A. Pinz, and A. Zisserman, "Convolutional two-stream network fusion for video action recognition," CVPR, p. 1933–
1941, 2016.
19. Shuiwang Ji, Wei Xu, Ming Yang, Kai Yu, "3D Convolutional Neural Networks for Human Action Recognition," IEEE Transactions
on Pattern Analysis and Machine Intelligence, vol. 35, pp. 221-231, 2013.
20. D. Tran, L. Bourdev , R. Fergus , L. Torresani , M. Paluri, "Learning spatiotemporal features with 3d convolutional networks," in IEEE
International Conference on Computer Vision, 2015.
21. Dadashzadeh, Amirhossein & Targhi, Alireza & Tahmasbi, Maryam, "HGR-Net: A Two-stage Convolutional Neural Network for
Hand Gesture Segmentation and Recognition," CoRR, pp. 1-10, 2018.
a. Karpathy, G. Toderici, S. Shetty, T. Leung, R. Sukthankar and L. Fei-Fei, "Large-scale video classification with convolutional neural
networks," in IEEE Conference on Computer Vision and Pattern Recognition, Columbus, OH, 2014.
22. Jeff Donahue ,Lisa Anne Hendricks , Marcus Rohrbach, "Long-term recurrent convolutional networks for visual recognition and
description," in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2015.
23. Karen Simonyan, Andrew Zisserman, "Two-stream convolutional networks for action recognition in videos," in Advances in Neural
Information Processing Systems, 2014.
24. Cho, B. van Merrienboer, D. Bahdanau, and Y. Bengio, "On the properties of neural machine translation: Encoder-decoder
approaches," CoRR, pp. 1-9, 2014.
25. Christian Szegedy, Wei Liu, Yangqing Jia, Pierre Sermanet, Scott Reed, Dragomir Anguelov, Dumitru Erhan, Vincent Vanhoucke,
Andrew Rabinovich, "Going deeper with convolutions," Computer Vision and Pattern Recognition , pp. 1-9, 2015.
26. Karen Simonyan, Andrew Zisserman, "Very Deep Convolutional Networks for Large-Scale Image Recognition," Computer Vision and
Pattern Recognition, pp. 1-14, 2015.
a. Szegedy, V. Vanhoucke, S. Ioffe, J. Shlens and Z. Wojna,, "Rethinking the Inception Architecture for Computer Vision," IEEE
Conference on Computer Vision and Pattern Recognition (CVPR), pp. 2818-2826 , 2016.
27. K. He, X. Zhang, S. Ren and J. Sun, "Deep Residual Learning for Image Recognition," IEEE Conference on Computer Vision and
Pattern Recognition, pp. 770-778, 2016.
28. A. Graves, "Supervised sequence labeling, in Supervised Sequence Labelling with Recurrent Neural Networks," Springer, p. 5–13 ,
2012.

Authors: Nitinkumar Anekar, Shrikant Nimbalkar, Hanmant Shinde, Gautam Narwade, Sunil Nimje

Paper Title: Parametric Analysis of Tube during Bending Operation


Abstract: Bent tubes have a lot of various industrial applications. It is required for the transportation of fluids
or gases. It also used as construction elements in all industries like car, aviation and shipbuilding industry,
refrigeration and air conditioning technology, furniture industry. The objective of this paper is to understand the
316. material deformation occurring during the bending of the tube bends and study the effect of parameters viz.
1793-
bending radius, bending angle, springback on ovality of tube during bending operation. Tube undergoes certain
179
deformation during the bending process which introduces various defects in the tube bends. This will lead the
9
acceptability of tube bends for certain application. For better understanding the approximation of the defect it is
necessary to reduce it at the manufacturing level itself. The testing uses different bending die to differ the
bending radius and tests are performed at different bending angle. These whole data has been used to find the
different defects and also to find the stress induced in the bends using FEA software package
Keywords: Circulatr Tube, Bending Radius, Spring Back, Ovality, Finite Element Method.

References:

9. T.C. Michael, A.R. Veerrappan and S. Shangmungan, “A study on the effect of cross section approximation on the behavior of tube
bend with ovality and thinning”, International Journal of Advanced Engineering Sciences And Technologies, Vol.2, Issue No.2, 132-
138, (2011).
10. A.R. Veerrappan. and S. Shangmungan, “Co-relation between tube bends geometry and allowable pressure in tube bends using artificial
neural network”, International Journal of Engineering, Science and Technology, Vol. 3, Issue No. 4, 284-296, (2011).
11. T.C. Michael, A.R. Veerrappan and S. Shangmungan, “Effect of cross section on collapse load in tube bends subjected to in-plane
closing moment”, International Journal of Advanced Engineering Sciences And Technologies, Vol.3, Issue No.6, 247-256, (2011).
12. L. Sozen, M.A. Guler, R.M. Gorguluarslan and E.M. Kaplan, “Prediction of springback in cnc tube bending process based on forming
parameters”, 11th Int. LS-DYna User Conf., Dearborn, MI, USA, (2010).
13. V. Dan, “The influence of the initial ovality tolerance on the nonlinear cycling analysis of tube bends”, ASME Journal of Pressure
Vessel Technology, Vol.131, Issue No. 041203, 1-7, (2009).
14. R. Agrwal, “Tube bending with axial pull and internal pressure”, Master Thesis, Texas A&M University, Texas, (2004).
15. N.H. Mohammed, A.S. Syed, M.N. Ahmed and K.H. Varma, “Stress, Strain and displacement analysis of individual parts and the tube
of an autonomously designed tube bending machine using finite element analysis”, International Journal of Engineering Research &
Technology, Vol.3, Issue No.12,81-86, (2014).
16. Boyle and J. Spence, A Simple Stress Analysis for Out-of-round, Pressurised Tube Bends, International Journal of Pressure Vessels and
Piping, Vol. 9, Issue No. 4, 251-261, (1981).
17. V.N. Shlyannikov, A.V. Tumanaov, N.V. Boychenko and A.M. Tartygasheva, “Effect of Tube Bend Shape on Creep-Fatigue Crack
Growth”, 14 th International Conference. on Pressure Vessel Technology, 868-878, (2015).
18. J. Wang and R. Agarwal, “Tube Bending Under Axial Force and Internal Pressure”, Journal of Manufacturing Science and Engineering,
Vol. 128, Issue No.2, 598 – 605, (2005).
19. H. Ousji, B. Belkassem ,M.A. Louar ,D. Kakogiannis ,B. Reymen ,L. Pyl , J. “Vantomme, Parametric Study of an Explosive‐Driven
Shock Tube as Blast Loading Tool”, Experimental Techniques, Wiley online Library, (2017).
20. E. Daxin, Yafei Liu ,Huaibei Feng, “Deformation Analysis for the Rotary Draw Bending Process of Circular Tubes: Stress Distribution
and Wall Thinning “, Metal Forming, Wiley online Library,Volume 81, Issue 12 (2010).
21. Basics of Tube Bending. [online] https://www.tubeformsolutions.com/hubfs/doc/TFS_Tool_School_-
_Tube_Bending.pdf?t=1481048596950
22. Aluminium Material Properties [online] https://www.professionalplastics.com/professionalplastics/Aluminum6061DataSheet.pdf
23. ANSYS, Inc., ANSYS Mechanical APDL Element, Release 15.0, 2013.

Authors: Niharika Saxena, L.S.Maurya

Paper Title: Machine Learning Based Diagnosis and Prediction System for Congestive Heart Failure
Abstract: Recently, heart failure has become one of the major Causes of death. By 2030, if it is not controlled
the toll will rise to twenty three million. Cardiologist can predict the disease with 70 % accuracy. Considering
the limitation of cardiologist, a system can be provided to them to predict the disease with more accuracy.
Machine Learning is frequently used in to days world to support healthcare industry. ML provides new
opportunity to analyze the data with more accuracy. It bridges the gap between medical science and technology.
Decision tree is one of the best classification techniques of machine learning which will analyze the data and
predict the disease with accuracy. The main objective of my dissertation work is to predict the disease and
analyze the result. So in this research work the DT technique is used for the prediction of disease and it gave
result with more accuracy on comparison to previous work. Hence this study proved that DT algorithm gives the
result with more accuracy in less time of execution. This research work is a growing range of efficient tools to
assist healthcare industry and medical professionals for the betterment of patients.

Keywords: Machine Learning; Healthcare Prediction system; Machine Learning Techniques; Classification.
317.
References: 1800-
180
1. Akansha Dua and Arpit khanna, “A Study of Machine Learning Algorithms for Disease and Epidimic Prediction” in International 4
Research Journal of Engineering and Technology (IRJET), 2018
2. Atul Kumar Pandey, Prabhat Pandey, K.L. Jaiswal and Ashish Kumar Sen, “A Heart Disease Prediction Model Using Decesion Tree”
in IOSR Journal of Computer Engineering, 2013
3. Amin UI Haq, Jian Ping Li and Shah Najir, “A Hybrid Intelligent System framework for the Prediction of Machine Learning
Algorithms” in Journal of Mobile Information System, 2018
4. Akanksha Gupta, Shubham Pathak and Prof. Kannadasan R ,”An Evaluation of Supervised Machine Learning Algorithms for Heart
Disease Diagnosis ” in International Research Journal of Computer Science (IRJCS) (2017)
5. V.Kirubha and S.Manju Priya ,” Survey on Data Mining Algorithms in Disease Prediction”in International Journal of Computer Trends
andTechnology (IJCTT) (2016
6. Pravin Shinde and Prof. samjay Jadhav ,”Health Analysis System Using Machine Learning” in International Journal of Computer
Science and Information Technology(2014)
7. Deepti Sisodia and Dilip Singh Sisodia, “Prediction of Diabetes using Classification Algorithms” in International Conference on
Computational Intelligence and Data Science, (2018)
8. Parvez Ahmad , Saqib Qamar and Syed Qasim Afser Rizvi , “Techniques of Data Mining In Healthcare : A Review” in International
Journal of Computer Science (2015)
9. Ali Bou Nassif , Mohammad Azzeh , Shadi Banitaan and Daniel Neagu ,”Predictive Analytics Using Machine Learning” in Springer
Neural Computing and Applications
10. Rohan Bhardwaj , Ankit R.Nambiar and Debojyoti Dutta ,”A Study of Machine Learning in Healthcare” in IEEE Conference (2017)

Authors: Rashmi Sharma, Rekha Agarwal, Ashwani Kumar Dubey, Anil Arora

Paper Title: Optimized Design of CMUT with Hexagonal Membranes


Abstract: A Capacitive Micro-machined Ultrasonic Transducer (CMUT) with hexagonal membrane is
constructed to work as a transmitter and compared to a CMUT with circular membrane. In this paper, three
desirable combination of circular and hexagon are analyzed to select the dimensions for hexagonal shaped
CMUT. Capacitive Micro-machined Ultrasonic Transducer (CMUT) is a micro constructed transducer used both
as transmitter for generating ultrasonic waves and as receiver to modulate the electrical capacitance of the
capacitive transducer. It can be fabricated with many geometries especially circular, square, rectangular, and
hexagon. Circular CMUTs offers optimum performance in terms of deflection with DC, deflection of biased
membrane with AC bias, resonant frequency, capacitance and deflection along frequency but for array formation
the wafer area is wasted. A CMUT with hexagonal membrane gives an ultrasonic signal of constant amplitude
with less deflection of membrane within the cavity and the outside environment. Stationary analysis is carried
out with electro-mechanics for discussing the capacitance change of CMUT. The collapse or pull in voltage of
hexagon CMUT is found to be high and increases the bandwidth of CMUT. The absolute percent difference of
resonant frequency is observed to be 2.3 % with dimensions selected from the COH configuration of the CMUT.

Keywords: Array Formation, COH Configuration, Capacitance, Electro-mechanics, Geometries, Ultrasonic


318. Signal.
1805-
References: 180
9
1. Jin X.C. et al., “Fabrication and characterization of surface-micromachined capacitive ultrasonic transducers,” Journal of
Microelectromechanical Systems, vol. 8, (1999), 100–114,.
2. Ladabaum, X. Jin, Soh H.T., Atalar A., and Khuri-Yakub B.T.“Surface micromachined capacitive ultrasonic transducers,” IEEE Trans.
Ultrason. Ferroelectr. Freq. Control, vol. 45, no. 3,(1998),678–690
3. Johnson J., Oralkan O., Demirci U.,Ergun S.,Karaman M., and Khuri-Yakub B.T.,“Medical imaging using capacitive micromachined
ultrasonictransducer arrays,” Ultrasonics, vol. 40, no. 1–8, (2002), 471–476,
4. Berlincourt D., “Piezoelectric Crystals and Ceramics”, in: Mattiat O.E. (eds) Ultrasonic Transducer Materials, Ultrasonic Technology
(A Series of Monographs), Springer, Boston, MA,(1971), 63-124
5. Jin X., Ladabaum I., and Khuri-Yakub B.T., “The microfabrication of capacitive micromachined ultrasonic transducers,” Journal of
Microelectromechanical Systems, vol. 7, no. 3,(1998), 295–302
6. Huang Y., Ergun A.S., Haggstrom E., Badi M.H. and Khuri-Yakub B. T.“Fabricating capacitive micromachined ultrasonic transducers
with wafer bonding technology,” Journal of Microelectromechanical Systems, Vol. 12, no. 4, (2003) pp. 128– 137
7. Knight J., McLean J., and Degertekin F.L., “Low temperature fabrication of immersion capacitive micromachined ultrasonic
transducers on silicon and dielectric substrates,” IEEE Transactions on Ultrasonics, Ferroelectrics and Frequency Control, vol.
51, no. 10, (2004), 1324–1333
8. Wygant I.O., Jamal N. S., Lee H.J.,. Nikoozadeh A., Oralkan O., Karaman M., and Khuri-Yakub B.T., “An integrated circuit with
transmit beamforming flip-chip bonded to a 2-D CMUT array for 3-D ultrasound imaging,” IEEE Transactions on Ultrasonics,
Ferroelectrics and Frequency Control, vol. 56, no. 10, (2009), 2145–2156
9. Nikoozadeh A., Oralkan O.,Gencel M., Choe J.W., Stephens,A. dela Rama, P. Chen, K. Themenius, D.N., Dentinger A., Wildes D.,
Shivkumar K.,Mahajan A. O’Donnell M., Sahn D., and Khuri-Yakub B.T., “Forward-looking volumetric intercardiac imaging using
fully integrated CMUT ring array,” Proc. IEEE Ultrasonics Symp., (2009), 511–514
10. Degertekin F.L., Guldiken R.O., and Karaman M, “Annular-ring CMUT arrays for forward-looking IVUS: Transducer characterization
and imaging,” IEEE Transactions on Ultrasonics, Ferroelectrics and Frequency Control, vol. 53, no. 2,(2006), 474–482
11. Zhuang X., Lin D.S., Oralkan O., and Khuri-YakubB.T., “Fabrication of flexible transducer arrays with through-wafer electrical
interconnects based on trench refilling with PDMS,” Journal of Microelectromechanical Systems, vol. 17, no. 2,(2008), 446–452
12. Bayram B., Oralkan O., Ergun A.S., Haggstrom E., G. G. Yaralioglu ,and B. T. Khuri-Yakub, “Capacitive micromachined ultrasonic
transducer design for high power transmission,” IEEE Transactions on Ultrasonics, Ferroelectrics and Frequency Control , vol.
52, no. 2, 2005, 326–339
13. Oralkan O., Bayram B.,Yaralioglu G.G., Ergun A.S., Kupnik M.,Yeh D.T., Wygant I.O., and Khuri-Yakub B.T., “Experimental
characterization of collapse-mode CMUT operation,” IEEE Transactions on Ultrasonics, Ferroelectrics and Frequency Control,
vol. 53, no. 8, (2006), 1513–152
14. Huang Y, Haggstrom E., Bayram B., Zhuang X., Ergun A.S,Cheng C.H., and Khuri-Yakub B.T., “Comparison of conventional and
collapsed region operation of capacitive micromachined ultrasonic transducers,” IEEE Transactions on Ultrasonics, Ferroelectrics
and Frequency Control ,vol. 53, no. 10,(2006) 1918–1932
15. Sharma R., Agarwal R., and Arora A. , “Evaluation of Ultrasonic Transducer with Divergent Membrane Materials and Geometries”,
Communication in Computer and Information Science, Springer CCIS, vol. 628, Dec. (2016) pp. 779-787.
16. Pursula P., Saarilahti J., Paul O, Viikari V., "Analytical electromechanical model for CMUTs with multi-layered non-uniform-thickness
diaphragm", MME(2012).
17. Sharma R., Agarwal A., Dubey A.K.,Arora A., “Impact Analysis of Variation in Geometrical Features on Intrinsic Characteristics of
CMUT”, International Journal of Engineering, B: Applications Vol. 31, No. 11, (2018) 1846-1851.
18. Ganji, B. A. , Mousavi, A., “Accurate Determination of Pull-in Voltage for MEMS Capacitive Devices with Clamped Square
Diaphragm”, International Journal of Engineering, B: Applications Vol. 25, No. 3, (2012) 161-166.
19. B. Bayram, G. G. Yaralioglu, M. Kupnik, et al., “Dynamic analysis of capacitive micromachined ultrasonic transducers,” IEEE
Transactions on Ultrasonics, Ferroelectrics and Frequency Control, vol. 52, no.12, (2005) 2270-75
20. Nabian A, Rezazadeh G, Haddad-derafshi M., et al., “Mechanical behavior of a circular micro plate subjected to uniform hydrostatic
and non-uniform electrostatic pressure”, Microsystem Technology, vol. 14, (2008), 235–40
21. Gupta, R. K., “Electrostatic pull-in test structure design for in-situ mechanical property measurement of micro-
electromechanical systems (MEMS)”, Ph.D. dissertation, MIT, Cambridge, MA, (1993).

Authors: Mohammad Arshad, Md. Ali Hussain

Paper Title: A Reliable Intrusion Detection System in Wide Area Networks against the assault of DDOS

Abstract: The real test with the present Web Intrusion Detection Systems is an enormous number of alarms
319. are produced by the customary instruments and strategies where the greater part of them are false positive and
less huge. It is hard for the web organize executive or approved client to audit each alarm that is produced by 1810-
customary IDS apparatus on a bustling constant LAN or WAN condition. Thus, numerous MIM assaults might 181
be undetected, which can make serious harm the system frameworks. Fundamentally, customary location models 7
create countless interruption designs which produce high false positive rate. Because of countless interruption
designs, a great deal of time is required for discovery of interruptions on correspondence arrange which
antagonistically influences the productivity of the Intrusion Detection Systems. In this paper we proposed a half
breed approaches for distinguishing different DDoS (Distributed Denial of Service) assaults in WAN. We
directed an inexhaustible study on this works, from which we finished up how we move further on our work.
Keywords: DDoS, attacks, intrusion detection system, WAN, MIM, security.

References:

1. David Karig and Ruby Lee, “Remote Denial of Service Attacks and Countermeasures,” Princeton University Department of Electrical
Engineering Technical Report CE-L2001-002, October 2001.
2. Mohammed Hasan Ali, Bahaa Abbas Dawood AL Mohammed, Madya Alyani Binti Ismail, and Mohamad Fadli Zolkipli. 2018. A new
intrusion detection system based on Fast Learning Network and Particle swarm optimization. IEEE Access 6 (2018), 20255–20261.
3. 3GPP. the 3rd Generation Partnership Project (3GPP).
4. Malware vs Viruses: What’s the Difference? (February 2018). https://antivirus.comodo.com/blog/computer-safety/malware-vs-
viruses-whats-difference/ (Accessed on 02/28/2018).
5. Kalkan K and Alago ¨ z F. A distributed filtering mechanism against DDoS attacks: ScoreForCore. Comput Netw 2016; 108: 199–209.
6. Peng T, Leckie C and Ramamohanarao K. Survey of network-based defence mechanisms countering the Dos and DDos problems.
ACM Computer Surv 2007; 39(1):3.
7. Crispin Cowan, Perry Wagle, Calton Pu, Steve Beattie, and Jonathan Walpole, “Buffer Overflows: Attacks and Defenses for the
Vulnerability of the Decade”, DARPA Information Survivability Conference and Exposition, 2000. Vol. 2, pp. 119-129, 2000.
8. “Executing arbitrary commands using ActiveX “codebase=” parameter”, EdenSoft™, 2 April 2002.
http://www.edensoft.com/exploit.html. (9 April 2003).
9. G. Yao, J. B. Xiao, and P. Xiao, "Source Address Validation Solution with OpenFlow/NOX Architecture," 19th IEEE International
Conference on Network Protocols, 2011.
10. Y.-L. Hu and W.-B. Su, "Design of Event-Based Intrusion Detection System on OpenFlow Network," in 43rd Annual IEEE/IFIP
International Conference on Dependable Systems and Networks (DSN), 2013.
11. Elike Hodo, Xavier Bellekens, Ephraim Iorkyase, Andrew Hamilton, Christos Tachtatzis, and Robert Atkinson. 2017. Machine
Learning Approach for Detection of nonTor Traffic. ACM, Reggio Calabria, Italy, 1–6.
12. Elike Hodo, Xavier Bellekens, Andrew Hamilton, Pierre-Louis Dubouilh, Ephraim Iorkyase, Christos Tachtatzis, and Robert
Atkinson. 2016. Threat analysis of IoT networks using artificial neural network intrusion detection system. In 2016 International
Symposium on Networks, Computers and Communications (IEEE ISNCC’16). IEEE, 1–6.
13. Gisung Kim, Seungmin Lee, and Sehun Kim. 2014. A novel hybrid intrusion detection method integrating anomaly detection with
misuse detection. (2014), 1690-1700 pages. https://doi.org///doi.org/10.1016/j.eswa.2013.08.066 ID: 271506.
14. Yusuf Sahin, Serol Bulkan, and Ekrem Duman. 2013. A cost-sensitive decision tree approach for frauddetection.(2013),5916-5923
pages. https://doi.org///doi.org/10.1016/j.eswa.2013.05.021 ID: 271506.
15. Phurivit Sangkatsanee, Naruemon Wattanapongsakorn, and Chalermpol Charnsripinyo. 2011. Practical real-time intrusion detection
using machine learning approaches. (2011), 2227-2235 pages. https://doi.org///doi.org/10.1016/j.comcom.2011.07.001 ID: 271515.
16. Yinhui Li, Jingbo Xia, Silan Zhang, Jiakai Yan, Xiaochuan Ai, and Kuobin Dai. 2012. An efficient intrusion detection system based
on support vector machines and gradually feature removal method. (2012), 424-430 pages.
https://doi.org///doi.org/10.1016/j.eswa.2011.07.032 ID: 271506.
17. Inho Kang, Myong K. Jeong, and Dongjoon Kong. 2012. A differentiated one-class classification method with applications to
intrusion detection. (2012), 3899-3905 pages. https://doi.org///doi.org/10.1016/j.eswa.2011.06.033 ID:271506.
18. Kamran Shafi and Hussein A. Abbass. 2009. An adaptive genetic-based signature learning system for intrusion detection. (2009),
12036-12043 pages. https://doi.org///doi.org/10.1016/j.eswa.2009.03.036 ID: 271506.
19. Cheng Xiang, Png Chin Yong, and Lim Swee Meng. 2008. Design of multiple-level hybrid classifier for intrusion detection system
using Bayesian clustering and decision trees. (2008), 918-924 pages. https://doi.org///doi.org/10.
20. HANAN HINDY, Division of Cyber Security, Abertay University, Scotland,A Taxonomy and Survey of Intrusion Detection System
Design Techniques, Network Threats and Datasets,Vol. 1, No. 1.
21. Monika Sachdeva, Performance Analysis of Web Service under DDoS Attacks,OI: 10.1109/IADCC.2009.4809152 · Source: IEEE
Xplore

Authors: Vijeta Iyer, S. Aruna devi

Paper Title: M/M/C Queue under Monte Carlo Simulation for a Restaurant Model
Abstract: In this paper we present a stochastic queuing model for a restaurant which captures the stationary
density flow relations. The performance of controlling the heterogeneous crowd in a restaurant under Monte
Carlo simulation with various service distributions has been discussed. Using this analysis in future the waiting
time of the customers can be reduced and the profit of the management can also be increased. The future
behaviour of a restaurant networks both in simulation and analytical methods have been analysed.

Keywords: Inter arrival pattern, Service pattern, M/M/C Queue, Monte Carlo Simulation.
320.
References: 1818-
182
1. S. Arunadevi and Vijeta Iyer (2017). “A Study On M/M/C Queue Model Under Monte Carlo Simulation In Traffic”, IJPAM, Vol. 116, 3
No. 12 (2017)
2. Syed Shujauddin Sameer (2014). “Simulation Analysis of Single server Queuing Model”, International Journal of Information Theory,
Vol. 3, No.3, doi:10.5121/ijit. 2014.330547
3. Erlang.A.K (1909),”The theory of probabilities of Telephone Conversations” Nyt.Jindsskriff Mathematic, B20, 33-39.
4. P.Umarani and S.Shanmugasundaram, “A study on M/M/C Queuing Model under Monte Carlo Simulation in a Hospital”. International
Journal of Pure and Applied Mathematical Sciences, Vol. 9, No. 2 (2016),PP 109-121.
5. Shanmugasundaram .S and Banumathi.P (2015). “A study on single server queue in southern railway using Monte Carlo Simulation”,
Global Journal of Pure and Applied Mathematics “, Vol 11.
6. S.Shanmugasundaram and P.Umarani (2016), “A Simulation study on M/M/1 Queueing Model in a Medical centre”, International
Journal of Science and Research, PP 284 – 288, Vol. 5, Issue 3.

Authors: Shylaja Singam, M. Anand Rao, Ch. Shilpa Chakra


Root and Shoot Uptake of Synthesized Nano Zno and Its Impact on Differences in Bio-Availability
Paper Title:
During Exposure In Aqueous Suspension
Abstract: The proposed study highlights on the synthesis of Zinc oxide nanoparticles using chemical and
green methods. In the field of nanotechnology Green synthesis is an eco-friendly development. The synthesis of
ZnO is carried out using leaf extract of Azadirachta indica (neem) as a reducing agent. The synthesised products
were characterized by X-Ray Diffraction (XRD), Scanning Electron Microscopy (SEM) and Energy Dispersive
X-Ray Analysis (EDAX). The present work is to investigate the effect of chemical and green synthesized zinc
oxide nanoparticles on germination and growth of Lycopersicon esculentum (tomato) using petriplate seed
germination method. The impact of concentration of applied ZnO nanoparticles via green synthesis and chemical
methods were analyzed. It was observed that the growth of Seedling is maximum for green synthesized zinc
oxide nanoparticles at appropriate concentration over chemically synthesized zinc oxide nanoparticles, bulk ZnO
and control. Hence the green method is found to be more effective.

Keywords: leaf extract of Azadirachta indica; XRD; SEM;Lycopersicon esculentum ;ecofriendly; germination.

References:

1. Imtiyaz Hussain, N. B. Singh, Ajey Singh, Himani Singh, S. C. Singh “Green synthesis of nanoparticles and its potential application,”
Biotechnol Lett (2016) 38: 545.
2. Hamid Reza Ghorbanioriental, Feros Parsa Mehr, Hossein Pazoki, Behrad Mosavar Rahmani”Journal of Chemistry,” ISSN: 0970-020
X, Coden: Ojcheg 2015, Vol. 31, No. (2): Pg. 1219-1221
3. Sidra Sabir, Muhammad Arshad, and Sunbal Khalil Chaudhari “Zinc Oxide Nanoparticles for Revolutionizing Agriculture: Synthesis
and Applications,” The Scientific World Journal Volume 2014, Article ID 925494, 8 pages.
321. 4. Singh,N.B.; Amist,Nimisha; Yadav,Kavita; Singh,Deepti; Pandey,J.K.; Singh,S.C“Zinc Oxide Nanoparticles asFertilizer for the
Germination,Growth and Metabolism ofVegetable Crops,” j.Nanoeng.Nanomanuf, Volume 3, Number 4, December 2013, pp. 353-
364(12)
1824-
5. Prasun patra and aruna Goswami “Zinc nitrate derived nano ZnO: Fungicide for disease management of horticultural crops,” int journal 182
of innovative horticulture 1(1):79-84,2012. 9
6. Gnanasangeetha and SaralaThambavani “One Pot Synthesis of Zinc Oxide Nanoparticles via Chemical and Green Method,” Research
Journal of Material Sciences, ISSN 2320–6055, Vol. 1(7), 1-8, August (2013).
7. M.L.Vitosh, D.D. Warncke and R.E. Lucas “Secondary and Micronutrients for vegetables and field crops,”E-486 (1994).
8. Chakra.C.S.,Rajendar.V,K.Venkateswara Rao, Mirgender Kumar “Enhanced antimicrobial and anticancer properties of ZnO and
TiO2 nanocomposites,” 3 Biotech (2017) 7: 89.
9. B. J. Alloway “Zinc in Soils and Crop Nutrition,” IZA and IFA Publishers, Brussels, 2008, 13:12-17
10. Mortvedt, J.J “Crop response to level of water-soluble zinc in granular zinc fertilizers,” Fertilizer Research (1992) 33: 249.
11. Song, X., Qu, P., Yang, H. et al, “Synthesis of γ-Al2O3 nanoparticles by chemical precipitation method,”J Cent. South Univ. Technol.
(2005) 12: 536.
12. Vidya Ca , Shilpa Hirematha ,M N Chandraprabhab , M A Lourdu Antonyraja , Indu Venu Gopala et.al “Green synthesis of ZnO
nanoparticles by Calotropis Gigantea,” International Journal of Current Engineering and Technology ISSN 2277 – 4106 ©2013
INPRESSCO.
13. ParthMalik, Ravi Shankar, Vibhuti Malik, Nitin Sharma and Tapan Kumar Mukherjee, “ Green Chemistry Based Benign Routes for
Nanoparticle Synthesis,” Journal of Nanoparticles Volume 2014, Article ID 302429, 14 pages.
14. R. Tamileswari , M. Haniff Nisha1 , Sr. S. Jesurani “Green Synthesis of Silver Nanoparticles using Brassica Oleracea (Cauliflower)
and Brassica Oleracea Capitata (Cabbage) and the Analysis of Antimicrobial Activity, “IJERT) ISSN:2278-0181,Vol.4Issue04,April-
2015.
15. Zhongzhou Yang Jing Chen Runzhi Dou ,Xiang Gao ,Chuanbin Mao andLi Wang , “Assessment of the Phytotoxicity of Metal Oxide
Nanoparticles on Two Crop Plants, Maize (Zea mays L.) and Rice (Oryza sativa L.),”Int. J. Environ. Res. Public Health 2015, 12(12),
15100-15109;
16. Pramod Mahajan, S. K. Dhoke, and A. S. Khanna “ Effect of Nano-ZnO Particle Suspension on Growth of Mung (Vigna radiata) and
Gram (Cicer arietinum) Seedlings Using Plant Agar Method,”JournalofNanotechnology Volume 2011, Article ID 696535,7pages.
17. Gunalan Sangeethaa Sivaraj Rajeshwaria RajendranVenkatesh “Green synthesis of zinc oxide nanoparticles by aloe barbadensis
miller leaf extract: Structure and optical properties,” Materials Research Bulletin Volume 46, Issue 12, December 2011, Pages 2560-
256.
18. Chittaranjan Kole, “Plant Nanotechnology principles and practices,”ISBN 978-3-319-42154-4(e book) pg 194, 224-230.
Authors: Munisha Devi and Nasib Singh Gill

Paper Title: Novel Algorithm for Enhancing MANET Protocol in Smart Environment
Abstract: Future smart environment will consist of smart devices (objects) that will form an autonomous and
distributed ad-hoc network near the user end. This network needs efficient, cooperative and effective protocols
for the changing network. So it requires a flexible and unified framework for wireless intelligent devices
communication that will permit secure and adaptive routing to fulfill ad-hoc networking requirements. It is
important to propose effective protocols and to identify good architecture for the future internet. Active routing
protocols update the table of information on a regular basis and keep the mobility factor in control. The result of
routing optimization with an efficient and effective scheme to mobility control and energy consumption in
MANET-IoT system shows the main solution of Smart Network. Combination of IoT and MANET routing
322. mechanism enhances the lifetime of nodes in the overall smart environment. This combination helps in the
1830-
provision of services and accessibility for a longer period of time over the future smart environment. This paper
183
presents various securities and safety-related issues of MANET-IoT system, and also advocate the requirement
5
of enhancing routing protocols in a smart environment. In this paper, a new algorithm has been developed to
reduce the delay factor of MANET protocol in a smart environment and performance is evaluated between the
existing and proposed approach on the active protocol.

Keywords: Smart environment, IoT applications; security requirements; smart city, MANET, IoT, Routing
Protocol, AODV.

References:
1. D. Sehrawat, and N. S. Gill. “Deployment of IoT based smart environment: key issues and challenges”. International Journal of
Engineering and Technology (UAE), Vol. 7, No. 2 pp. 544-550, 2018. ISSN: 2227-524X. http://dx.doi.org/10.14419/ijet.v7i2.9504.
2. P. Bellavista, and G. Cardone. “Convergence of MANET and WSN in IoT urban scenarios”. IEEE Sensors Journal, 13(10), (2013),
3558–3567. https://doi.o.rg/10.1109/JSEN.2013.2272099.
3. R. Bruzgiene, and L. (n.d.) Narbutaite. World ’ s largest science, Technology & Medicine Open Access book publisher MANET
Network in the Internet of Things System,2017.
4. L. Narbutaite, and T. Adomkus. "MANET Network in the Internet of Things System." In Ad Hoc Networks. InTech, 2017.
5. Alameri, I. A. "MANETS, and internet of things: the development of a data routing algorithm." Engineering, Technology & Applied
Science Research 8, no. 1 (2018): 2604-2608.
6. T. Alam, "Fuzzy control based mobility framework for evaluating mobility models in MANET of smart devices." ARPN Journal of
Engineering and Applied Sciences, 12, no. 15 (2017): 4526-4538.
7. R. Suji Pramila, and N. Islam. "An analysis of routing protocols in MANETs and Internet of things." In IoT and Application (ICIOT),
2017 International Conference on, pp. 1-8. IEEE, 2017.
8. T. Alam, “Blockchain and its Role in the Internet of Things (IoT)”, International Journal of Scientific Research in Computer Science,
Engineering and Information Technology, pp. 151-157, 2019. DOI: https://doi.org/10.32628/CSEIT195137.
9. J. Karlsson, L. S. Dooley, and G. Pulkkis, “Secure Routing for MANET Connected Internet of Things Systems”. 2018 IEEE 6th
International Conference on Future Internet of Things and Cloud (FiCloud), (2018), 114–119.
https://doi.org/10.1109/FiCloud.2018.00024.
10. N.N. Kachouie, P. Fieguth, J. Ramunas, and E. Jervis. “Probabilistic model-based cell tracking”. International Journal of Biomedical
Imaging, 2006.
11. Li L., Xu X., Cai Y. (2006) “Gradient-Based Autoconfiguration for Hybrid Mobile Ad Hoc Networks”. In: Gerndt M., Kranzlmüller D.
(eds) High-Performance Computing and Communications. HPCC 2006. Lecture Notes in Computer Science, vol. 4208. Springer, Berlin,
Heidelberg.
12. H. Tahir, A. Kanwer, and M. Junaid, “Internet of Things (IoT): An Overview of Applications and Security Issues Regarding
Implementation,” Int. J. Multidiscip. Sci. Eng., vol. 7, no. 1, pp. 14–22, 2016.
13. A. M. Shabut, K. Dahal, Kaiser, S. M., and M. A. Hossain. “Malicious Insider Threats in Tactical MANET: The Performance Analysis
of DSR Routing Protocol”. Proceedings - 2017 IEEE International Conference on Internet of Things, IEEE Green Computing and
Communications, IEEE Cyber, Physical and Social Computing, IEEE Smart Data, Things-Green Com-CPS Com-Smart Data 2017,
2018, 390–395. https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.64
14. M. Devi, and N. S. Gill. “Performance Evaluation of Dynamic Source Routing Protocol in Smart Environment”. International Journal of
Advanced Trends in Computer Science and Engineering. Volume 8, No.2, March - April 2019.
https://doi.org/10.30534/ijatcse/2019/37822019.
15. A. Jangra, & Meenakshi. “An Analysis on Routing Protocols for the Internet of Things”. International Journal of Advanced Research in
Computer Science and Software Engineering, 7(5), (2017), 754–756. https://doi.org/10.23956/ijarcsse/V7I5/0117.
16. M. Devi, and N. S. Gill. “Mobile Ad Hoc Networks and Routing Protocols in IoT Enabled Smart Environment: A Review”.Journal of
Engineering and Applied Sciences,14(3),(2019),802-811.
17. M. Devi, and N. S. Gill. “Study of Mobile Ad hoc Network Routing Protocols in Smart Environment”. International Journal of Applied
Engineering Research, 13(16), (2018),12968–12975.
18. V. V. Mandhare, and R. C. Thool. “Improving QoS of Mobile Ad-hoc Network Using Cache Update Scheme in Dynamic Source
Routing Protocol”. Procedia Computer Science, 79, (2016),692–699. https://doi.org/10.1016/j.procs.2016.03.090.
19. H. Yang, H. Luo, F. Ye, S. Lu, L. Zhang, “Security in mobile ad hoc networks: challenges and solutions,” In Proc. IEE Wireless
Communication, UCLA, Los Angeles, CA, USA; volume- 11, Page(s):38- 47, ISSN: 1536-1284.
20. Nishu Garg and R.P.Mahapatra, “MANET Security Issues,” IJCSNS International Journal of Computer Science and Network Security,
VOL.9 No.8, August 2009.
21. Ping Yi, Yue Wu, and Futai Zou and Ning Liu, “A Survey on Security in Wireless Mesh Networks”, Proceedings of IETE Technical
Review, Vol. 27, Issue 1, Jan-Feb 2010.
22. S.-R. Oh and Y.-G. Kim, “Security Requirements Analysis for the IoT,” in 2017 International Conference on Platform Technology and
Service (PlatCon), 2017, pp. 1–6.

Authors: Nidhi Srivastava

Paper Title: An Agent Based Multimodal Biometric Method for Secure Systems

Abstract: A security system based on biometrics of a person depends on the features of a person. These can be
physical features or behavioral features. User authentication is necessary for security control system and
intelligent human computer interface, so that only the real user accesses it. We present a method for the
authentication of person with help of multimodal data which includes face and speech. Agent based system has
been used for fusion of these data which gives us a more reliable, efficient and secure biometric system. A
method for face detection for recognition of faces has been given. For speech recognition Artificial Neural
Network has been used. Both these combined together identify the speaker. This multimodal biometric method
will give highly reliable secure system.

323. Keywords: ANN, Audio-Visual Fusion, Biometric, Face Detection, Speech Recognition.
1836-
References: 184
0
1. Rishiraj Mukherjee, Tanmoy Islam, Ravi Sankar. "Text dependent speaker recognition using shifted MFCC", Proceedings of IEEE
Southeastcon, 2012
2. A. Kounoudes, V. Kekatos, S. Mavromoustakos. "Voice Biometric Authentication for Enhancing Internet Service Security", 2nd
International Conference on Information & Communication Technologies, 2006
3. P.S. Aleksic, A.K. Katsaggelos. "Audio-Visual Biometrics", Proceedings of the IEEE, Vol. 94, No. 11, November 2006
4. Sanjay Kr. Singh, D. S. Chauhan, Mayank Vatsa, Richa Singh “A Robust Skin Color Based Face Detection Algorithm” Tamkang
Journal of Science and Engineering, Vol. 6, No. 4, pp. 227-234, 2003
5. Ming-Hsuan Yang, David J. Kriegman, Narendra Ahuja, “Detecting Faces In Images: A Survey”, IEEE Transactions On Pattern
Analysis and Machine Intelligence, Vol. 24, No. 1, pp.34-58, January 2002.
6. Ming-Hsuan Yang, Narendra Ahuja. "Face Detection and Gesture Recognition for Human- Computer Interaction", Springer Nature,
2001.
7. Sneha Silvia, Y. Vamsidhar, G. Sudhakar, “Colour Image Clustering using K-Means”, International Journal of Computer Science and
Technology, Vol. 2, SP 1, December 2011
8. Salimi, Fahimeh, Hadi Farzin, and Farzad Ebrahimi. "A novel skin detection method using Generalized Discriminant Analysis",
International Conference on Computer Systems and Industrial Informatics, 2012.
9. Mohamed A. Berbar, Qatar, “Faces and Facial Features Detection in Color Images”, Proceedings of the Geometric Modeling and
Imaging― New Trends, IEEE, 2006.
10. Fang X., Wenquan Gu W., Huang C. “A Method of Skin Color Identification Based On Color Classification”, International Conference
on Computer Science and Network Technology (IEEE), pp 2355 – 2358, 24-26 December 2011
11. Nidhi Srivastava, Harsh Dev, S. Qamar Abbas “Framework for Face Detection”, IJCA, Volume 58– No.17, November 2012.
12. Nidhi Srivastava, “Speech recognition using MFCC and Neural Network” Proceedings of National Conference on Challenges &
Opportunities for Technological Innovation in India” 16th February 2013.
13. Maximilian Kruger, Achim Schafer, Andreas Tewes, Rolf P. Wurtz, “Communicating Agents Architecture with Applications in
Multimodal Human Computer Interaction”, Informatik 2004.
14. Elfriede I. Krauth, Jos van Hillegersberg, Steef L. van de Velde, “Agent-based Human-computer-interaction for Real-time Monitoring
Systems in the Trucking Industry” IEEE Proceedings of the 40th Hawaii International Conference on System Sciences pp. 1-7, 2007.
15. Ashish Mishra “Multimodal Biometrics it is: Need for Future Systems”, IJCA, Volume 3, No.4, June 2010 pp: 28-33.

Authors: Deepa N P, K L Sudha


Intra-Chip and Inter-Chip Wireless Communication Analysis for Millimeter Wave using
Paper Title:
Miniaturized On-Chip Antenna
Abstract: System on Chip (SoC) is an emerging technology for semiconductor devices that aims for better
compaction with reduced interconnects RC delay, noise, and power consumption. Wired connections between
chips, ICs or SoC’s lead to increased heat dissipation, which is undesirable. Hence, mechanisms have been
developed for making communication between the chips wireless and use of miniaturized RF antenna is
inevitable. In this paper, to analyse the performance of wireless communication over millimeter range,
millimeter scale RF antennas operating at frequencies of 20 GHz to 70 GHz are considered. Using ANSYS
HFSS software, the scenario for intra and inter chip wireless communication is established using the bowtie
antenna operating around 50 GHz and their performance evaluation is done considering the various parameters.
An intrachip system of four bowtie antennas is simulated around 50GHz and the S-parameters are plotted and
analysed.
Keywords: Channel Model, On-Chip Antenna, System-on-Chip, Wireless Channel.

References:

1. Jau-Jr Lin, Hsin-Ta Wu, Yu Su, Li Gao, Aravind Sugavanam, Joe E. Brewer and Kenneth K. O, “Communication using
antennas fabricated in silicon integrated circuits”, IEEE Journal of Solid-State Circuits, Vol. 42, Issue: 8, 2007, pp 1678 – 1687.
2. P.J. Guo, and H.-R. Chuang, “A 60-ghz millimeter-wave CMOS RFIC-on-chip meander-line planar inverted-F Antenna for WPAN
324. applications”, 2008 IEEE Antennas and Propagation Society International Symposium, IEEE, 2008,
3. DOI: 10.1109/APS.2008.4619464 1841-
4. Shun-Sheng Hsu, Kuo-Chih Wei, Cheng-Ying Hsu, and Huey Ru-Chuang, “A 60-GHz millimeter-wave CPW-fed Yagi antenna
fabricated by using 0.18-μm CMOS technology”, IEEE Electron Device Letters, vol. 29, no. 6, June 2008, pp. 625-627.
184
5. DOI: 10.1109/LED.2008.920852 9
6. W. Yang, K. Ma, K. S. Yeo and W. M. Lim, "A 60GHz on-chip antenna in standard CMOS silicon technology," 2012 IEEE Asia
Pacific Conference on Circuits and Systems, Kaohsiung, 2012, pp. 252-255. DOI: 10.1109/APCCAS.2012.6419019
7. S. Pan and F. Capolino, "Design of a CMOS on-chip slot antenna with extremely flat cavity at 140 GHz," in IEEE Antennas
and Wireless Propagation Letters, vol. 10, 2011, pp. 827-830,
8. DOI: 10.1109/LAWP.2011.2163291
9. Adel Barakat, Ramesh Pokharel and Hala Elsadek, “Innovative techniques for 60-GHz on-chip antennas on CMOS substrate”,
Microwave Systems and Applications, Sotirios K. Goudos, IntechOpen, 2017, DOI: 10.5772/66238.
10. Y. Dong, T. K. Johansen and V. Zhurbenko, "On-chip patch antenna on InP substrate for short-range wireless communication at
140 GHz," 2017 SBMO/ IEEE MTT-S International Microwave and Optoelectronics Conference (IMOC), 2017, pp. 1-5.
11. DOI: 10.1109/IMOC.2017.8121032
12. http://www.antenna-theory.com/antennas/patches/antenna.php
13. X. Timoneda et al., "Millimeter-wave propagation within a Computer chip package, "2018 IEEE International Symposium on Circuits
and Systems (ISCAS), Florence, 2018, pp. 1-5. DOI: 10.1109/ISCAS.2018.8351875.
14. https://www.ansys.com/en-in/products/electronics/antennas
15. https://www.optenni.com/
16. Saeid Karamzadeh, Oğuz Furkan Kilic, Ahmet Said Hepbicer and Fatih Demirbas, “Bow-Tie antenna design for GPR applications”,
International Journal of Electronics, Mechanical and Mechatronics Engineering, Vol.6, No.2, 2016, pp.1187-1194.
17. Md Shahriar Shamim, Naseef Mansoor, Aman Samaiyar and Shobha Sundar Ram, “Energy-efficient wireless network-on-chip
architecture with log-periodic on-chip antenna” GLSVLSI 14 Proceedings of the 24th edition of the great lakes symposium on VLSI,
2014, pp. 85-86. DOI: 10.1145/2591513.2591566
18. N. H. Noordin, Y. C. Wong, A. T. Erdogan, B. Flynn and T. Arslan, "Meandered inverted-F antenna for MIMO mobile devices,"
2012 Loughborough Antennas & Propagation Conference (LAPC), Loughborough, 2012, pp. 1-4, DOI:
10.1109/LAPC.2012.6402948.

Authors: Mohammad Nasar, Mohammad Abu Kausar

Paper Title: Suitability Of Influxdb Database For Iot Applications


Abstract: Large amounts of data are generated every moment by connected objects creating Internet of
Things (IoT). IoT isn’t about things; it’s about the data those things create and collect. Organizations rely on this
data to provide better user experiences, to make smarter business decisions, and ultimately fuel their growth.
However, none of this is possible without a reliable database that is able to handle the massive amounts of data
generated by IoT devices. Relational databases are known for being flexible, easy to work with, and mature but
they aren’t particularly known for is scale, which prompted the creation of NoSQL databases. Another thing to
note is that IoT data is time-series in nature. In this paper we are discussed and compare about top five time-
series database like InfluxDB, Kdb+, Graphite, Prometheus and RRDtool.
Keywords: Internet of Things, NoSQL databases, InfluxDB, Kdb+, Graphite, Prometheus, RRDtool.

References:

1. https://www.gartner.com/en/newsroom/press-releases/2018-11-07-gartner-identifies-top-10-strategic-iot-technologies-and-trends
2. Gubbia, J., Buyya, R., Marusica, B.S., Palaniswamia, M., 2013. Internet of things (IoT): a vision, architectural elements, and future
directions. Future Gener. Comput Syst. 29 (7), 1645–1660.
325. 3. Miorandi, D., Sicari, S., Chlamtac, I., 2012. Internet of things: vision, applications and research challenges. Ad Hoc Netw. 10 (7), 1850-
1497– 1516. 185
4. Giusto, D., Iera, A., Morabito, G., Atzori, L. (Eds.), 2010. The Internet of Things. Springer. 7
5. Ashton, Kevin (2009), "That ‘internet of things’ thing." RFID journal 22(7):97-114.
6. T. Fan and Y. Chen. (2010) “A Scheme of Data Management in the Internet of Things,” 2nd IEEE International Conference on
Network Infrastructure and Digital Content.
7. Y. Huang and G. Li. (2010) “A Semantic Analysis for Internet of Things,” International Conference on Intelligent Computation
Technology and Automation (ICICTA).
8. Q. Zhou and J. Zhang. (2011) “Research Prospect of Internet of Things Geography,” 19th International Conference on Geoinformatics.
9. J. Li, Z. Huang, and X. Wang. (2011) “Countermeasure Research about Developing Internet of Things Economy,” International
Conference on E -Business and E -Government (ICEE).
10. Why NoSQL databases are needed for the Internet of Things
11. MongoDB. Internet of Things. url: https : / / www . mongodb .com / use - cases/internet-of-things (visited on 04/12/2017).
12. Dan Sullivan, James Sulllivan. Find the IoT database that best fits your enterprise’s needs (Source:
https://internetofthingsagenda.techtarget.com/feature/Find-the-IoT-database-that-best-fits-your-enterprises-needs)
13. DB-Engines. Db-engines ranking, 2019. (Source: https://db-engines.com/en/ranking/time+series+dbms )
14. Adrian McEwen & Hakim Cassimally (2013): Designing the Internet of Internet, first edition. John Wiley and Sons, West Sussex,
PO19 8SQ, United Kingdom.
15. John A. Stankovic (2014): Research Directions for the Internet of Things. IEEE Internet of Things Journal 1(1), p. 3–9,
doi:10.1109/jiot.2014.2312291.
16. Rose, K., Eldridge, S., & Chapin, L. (2015). The internet of things: An overview. The Internet Society (ISOC), 1-50.
17. https://www.influxdata.com/time-series-database/
18. Kx Systems. The 21st Century Time-series Database. Tech. rep. Kx Systems, 2010
19. https://kx.com/discover/#time-series-database
20. https://graphite.readthedocs.io/
21. https://prometheus.io
22. Chooruang, K., & Meekul, K. (2018, November). Design of an IoT Energy Monitoring System. In 2018 16th International Conference
on ICT and Knowledge Engineering (ICT&KE) (pp. 1-4). IEEE.
23. Franck Michel. Integrating heterogeneous data sources in the Web of data. PhD thesis, Universit´e Cˆote d’Azur, 2017.
24. Gunasekaran Manogaran, Daphne Lopez, Chandu Thota, Kaja M Abbas, Saumyadipta Pyne, and Revathi Sundarasekar. Big data
analytics in healthcare internet of things. In Innovative healthcare systems for the 21st century, pages 263–284. Springer, 2017.
Authors: N. Sundaram, Ajay Kumar Sharma

Paper Title: Livestock Farming: A Speedy Solution towards an Enriched Nepal


Abstract: This study is an attempt to analyze the need to revive the economy of Nepal in a speedier manner.
The long-term vision of Nepal is to harness it’s hydro-electricity extensively. But, in the immediate future,
Nepal needs an industry that would sustain it. Livestock farming is an option that the nation could invest upon.
The study touched upon the guideline given by the World Bank and explains why livestock has never been in the
forefront seat of this country by analyzing facts and figures.

Keywords: Natural resources, Industry, Rural, Livestock farming, Nepal.

References:

1. C.N. Acharya. (2019). Clean energy policy, planning and management: gearing up the rapid economic growth and sustainable
development in Nepal. Journal of Economic Info, 6(1), pp. 19-25.
2. K.P. Acharya. (2002). Twenty-four years of community forestry in Nepal. International Forestry Review, 4(2), pp.149-156.
3. K. Aryal, M. Jaishia, L.B. Chhetri, S. Khanal and B.P. Kandel. (2019). Adoption of goat production technology and its impact among
rural farmers in Nawalparsi district of Nepal. Jurnal Agercolere, 1 (1), pp. 1-5.
4. B.E. Borgstrom. (1982, June). Power structure and political speech. Man, 17 (2), pp.313-327.
326. 5. M. Dhakal. (2019). Contribution of poultry farming to livelihood of rural families in Nepal: A case study of Dailekh district. Asian
Journal of Agricultural Extension, Economics and Sociology, 30 (4), pp. 1-8. 1858-
6. R. Dhunganaa, B.R. Lamichhane, T. Savinie, M. Dhakal, B.S. Poudel and J.B. Karki. (2019). Livestock depredation by leopards 186
around Chitwan National Park, Nepal. Mammalian Biology, 96(1), pp. 7-13. 1
7. S. Duwal, P.K. Neupane, B. Devkota and G.C.Y. Dhoj. (2017). Climate change imprint and impacts on livelihood of indigenous
nationalities: A case of chepang community from Bhumlichowk area, Gorkha district, Nepal. International Journal of Sciences: Basic
and Applied Research, 35 (3), pp. 173-183.
8. R. Ghimire. (2014). Crops and Livestock Insurance Practices in Nepal. Journal of Business and Social Sciences, 1 (1), pp. 1-14.
9. N.S. Jodha, “Reviving the social system-ecosystem links in the Himalayas,” in Linking social and ecological systems: Management
practices and social mechanisms for building resilience, Berkes, F., and Folke, C. Ed. Cambridge: Cambridge University Press, 1998,
pp.285-310.
10. P. Kattel. (2016). Socio-Economic Importance of Indigenous Poultry in Nepal. Poultry, Fisheries & Wildlife Sciences, 4(1). pp. 153.
11. Kullabs. (2018). Air, Water, Land, Forest Resource, Wildlife and Minerals. [online]. Available:
https://www.kullabs.com/classes/subjects/units/lessons/notes/note-detail/484.
12. P.N. Mishra. (2003). Conservation of the nature and natural resources in Nepal: Traditional versus modern approaches and
management issues in protected areas. Journal of the National Science Foundation of Sri Lanka, 31(1-2). pp. 125-137.
13. K. Ogino, S.K. Dash and M. Nakayama. (2019). Change to hydropower development in Bhutan and Nepal. Energy for Sustainable
Development, 50(1), pp. 1-17.
14. L.N. Paudel, U. ter Meulen, C. Wollny, H. Dahal, and M. Gauly. (2009). Gender aspects in livestock farming: pertinent issues for
sustainable livestock development in Nepal. Livestock Research for Rural Development, 21 (3). pp. 1-9.
15. U.B. Pradhanang, S.M. Pradhanang, A. Sthapit, N. Y. Krakauer, A. Jha, and T. Lakhankar. (2015). National livestock policy of Nepal:
needs and opportunities. Agriculture, 5(1), pp. 103-131.
16. R. Roy. (2001). Environmental Impact Assessment: a tool for sustainable development. CF Bulletin 7, pp. 20‐26.
17. B.R. Upreti. 2004. Dynamics of resource governance, resource scarcity and conflict in Nepal. Journal of Forest and Livelihoods, 4(1),
pp. 13-19.
18. S.Z. Walelign, M.R. Nielsen and H.O. Larsen. (2017). Environmental income as a pathway out of poverty? empirical evidence on
assetaccumulation in Nepal. The Journal of Development Studies, 7(1), pp. 1508-1526.

Authors: Mamidi Kiran Kumar,V Kamakshi Prasad


DALT: Double Anchor-Based Localization Technique for Wireless Sensor Networks using RSS and
Paper Title:
AoA Measures
Abstract: Tracking the location of target nodes/objects plays a vital role in disaster management and
emergency rescue operations. The wireless sensor network is an easiest and cheapest solution to track the target
nodes/objects in emergency applications. Use of GPS installed devices in wireless sensor networks is one of the
solutions to track the target node’s location. Installing GPS device on every target node is very expensive and
the GPS device drains the battery power, and increases the size of sensor nodes. Localization is an alternative
solution to track the target node’s location. Many localization algorithms are available to track/estimate the
target node’s location coordinates, but the accuracy of the estimated target nodes is poor. A new localization
technique is proposed in this work to improve the accuracy of the estimated location of the target nodes. The
proposed technique uses two anchor nodes, and parameters like linear vector segments, received signal strength,
and angle of arrival measures in the location estimation process. This work has been simulated in MATLAB.
The proposed algorithm outperforms the existing localization techniques.

Keywords: Angle of Arrival, GPS, Localization, Received Signal Strength.

References:

1. L. Zhou, G. Han, L. Liu, “Pulse-based distance accumulation localization algorithm for wireless nanosensor networks”, J. IEEE
Access, Vol.5, 2017, pp. 14380–14390.
2. Mamidi Kiran Kumar, Dr.V. Kamakshi Prasad, “A New Framework for Effective Processing of WSN Application Generated Big
Data”, Int.J. Engineering Technology Science and Research, Vol.4(7), 2017, pp. 240-245.
3. T. Chen, Z. Yang, Y. Liu, D. Guo, X. Luo, “Localization-oriented network adjustment in wireless ad hoc and sensor networks”, IEEE
Trans. Parallel Distrib. Syst., Vol.25, 2014, pp. 146-155.
4. C.S. Engineering, A. Bay, D. Carrera, S.M. Fosson, P. Fragneto, M. Grella, C. Ravazzi, E. Magli, “Virtual Localization in Wireless
Sensor Networks”, Eurasip J. Wirel. Commun. Netw., Vol.2015, 2015, pp. 1-4.
5. Y.P. Zhong, X.H. Kuang, P.W. Huang, “Improved algorithm for distributed localization in wireless sensor networks”, J. Shanghai
327. Jiaotong Univ., Vol.2010, 2010, pp. 64-69.
6. Goldenberg, D.K., “Fine-Grained Localization in Sensor and Ad-Hoc Networks”, Defense Slides, 2006. 1862-
7. P. Parwekar, A. Vangala, “Localization of Sensors in Wireless Sensor Networks”, J. Commun. Comput. Inf. Sci., Vol.836, 2018, pp. 3-
10. 186
8. K. Bregar, M. Mohorcic, “Improving Indoor Localization Using Convolutional Neural Networks on Computationally Restricted 9
Devices”, J. IEEE Access, Vol.6, 2018, pp. 17429–17441.
9. C.-C. Chen, C. Chang, Y. Li, "Range-Free Localization Scheme in Wireless Sensor Networks Based on Bilateration, " Int. J. Distrib.
Sens. Networks”, Vol.9, 2013, pp. 1-10.
10. A. Paul, T. Sato, "Localization in Wireless Sensor Networks: A Survey on Algorithms, Measurement Techniques, Applications and
Challenges," J. Sens. Actuator Networks, Vol. 6(24), 2017, pp. 1-23.
11. S. Arora, S. Singh, "Node Localization in Wireless Sensor Networks Using Butterfly Optimization Algorithm," Arab. J. Sci. Eng, Vol.
42, 2017, pp. 3325–3335.
12. J. Zhao, W. Xi, Y. He, Y. Liu, X.Y. Li, L. Mo, Z. Yang, "Localization of wireless sensor networks in the wild: Pursuit of ranging
quality," IEEE/ACM Trans. Netw, Vol. 21, 2013, pp. 311–323.
13. J. Jiang, C. Lin, F. Lin, S. Huang, "ALRD : AoA Localization with RSSI Differences of Directional Antennas for Wireless Sensor
Networks," Int.Journal of Distributed Sensor Networks, Vol. 2013, 2013, pp. 7-14.
14. Dr V KAMASKHI PRASAD, MAMIDI KIRAN KUMAR, "TASLT: Triangular Area Segmentation based Localization Technique for
Wireless Sensor Networks using RSSI and AoA Measures - A New Approach," in 3rd IEEE Conference, Coimbathor, Tamilnadu,
2018, to be published.
15. Farhan, Shahani, " Zigbee Wireless Networks and Transeivers” Newnes- Elsevier,2008, pp. 171-172.
16. P. Kumar, M.P. Singh, U.S. Triar, R. Anwit, "Localization System for Wireless Sensor Network," International Journal of Computer
Science and Electronics Engineering (IJCSEE) , Vol. 2(1),2014, pp. 6-10.
17. Hui, W. Shuang, X.I.E. Huaiyao, "Localization using Cooperative AOA Approach", International Conference on Wireless
Communications, Networking and Mobile Computing, 2017, pp. 2416–2419.
18. M. I. AlHajri, A. Goian, M. Darweesh, R. AlMemari, R. M. Shubair, L. Weruaga, A. R. Kulaib,“hybrid rss doa technique for enhanced
wsn localization in a correlated environment”, Conference: International Conference on Information and Communication Technology
Research (ICTRC), 2015, pp. 238-241.
19. Chuan-Chin Pu, Chuan-Hsian Pu and Hoon-Jae Lee, "Indoor Location Tracking Using Received Signal Strength Indicator," in
Emerging Communications for Wireless Sensor Networks, A. Foerster, Ed., 2011. Available DOI: 10.5772/10518.
20. S. Joshi, V.I. George, "Localization in Wireless Sensor Networks : A Survey," in CSIR Sponsored X Control Instrumentation System
Conference - CISCON-2013, 2013.
21. S. Wang, H. Hu, K. McDonald-Maier, "Optimization and sequence search based localization in wireless sensor networks, Proc. - 3rd
Int. Conf. Emerg. Secur. Technol. EST 2012.," 2012.
22. N.A. Alrajeh, M. Bashir, B. Shams, "Localization Techniques in WirelessSensor Networks," Int. J. Distrib. Sens. Networks, Vol. 2013,
2013, pp. 1-9.

Authors: Aniket A Terwadkar, M V Walame


Mechanical Properties of Banana Fabric and Kenaf Fiber Reinforced Epoxy Composites: Effect of
Paper Title:
Treatment and Hybridization
Abstract: Nowadays, Natural Fiber Reinforced composites (NFCs) are emerging to be a good substitute for
synthetic fiber reinforced composites as NFCs have many advantages such as low density, high specific strength,
recyclability, low cost and good sound abatement quality etc. Among all types of NFCs, a vast study has been
done on banana fiber and kenaf fiber reinforced composite. However, only limited work has been done on the
banana fabric, kenaf fiber reinforced composite and the effect of their hybridization on mechanical properties.
In this paper, an attempt has been made to study the mechanical properties of the banana fabric, kenaf fiber and
hybrid banana fabric/kenaf fiber reinforced composites. Effect of alkali treatment on kenaf fiber reinforced
composite is discussed in the paper. For the present work, plain-woven banana fabric and randomly oriented
kenaf fiber are used as reinforcement while the epoxy resin is used as a matrix. samples are fabricated using
hand lay-up and vacuum bagging method. Curing is done at ambient temperature (250C-300C) for 48h. Tensile,
impact and hardness test has been performed on a specimen according to ASTM standards. Improvement in
328. mechanical properties is observed after alkali (6% NaOH) treatment on kenaf fiber reinforced composite.
Tensile testing behavior of randomly oriented kenaf fiber composite has been studied using Finite element 1870-
method and results are compared with experimental investigations. This topic present big potential because it 187
seeks to find solution for sustainable development with environmental concerns. 4

Keywords: Alkali treatment, Banana fabric, Hand Lay-up, kenaf fiber, Hand Lay-up, vacuum bagging.

References:

1. D. Puglia, J.Biagiotti and J. M. Kenny, “A Review on Natural Fiber based Composites,” Journal of Natural Fibers, November 2008.
2. M. R. Sanjay, G. R. Arpitha, L. Laxman Naik, K. Gopalakrishnan, B. Yogesha “Application Of Natural Fibers And Its Composites: An
Overview,” Scientific Research Publishing, March 2016.
3. H. M. Akil, M. F. Omar, et.al., “Kenaf fiber reinforced composite: A Review, ” ELSEVIER, Materials and Design 32 (2011) 4107-
4121.
4. James Holbery and Dan Houston, “Natural-Fiber-Reinforced Polymer Composites in Automotive Applications,” JOM November 2006.
5. Dr. Isabella Schiedel, Prof. Dr. Georg Stephan Barfuss Dr. Tobias Nickel and Lion Pfeufer, “Use Of Visible Natural Fibers In-Vehicle
Interiors,” in development interiors.
6. A. Alavudeen, N. Rajini et. Al., “Mechanical properties of banana/kenaf fiber-reinforced hybrid polyester composites: Effect of woven
fabric and random orientation”, ELSEVIER, Materials and Design 66 (2015) 246-257.
7. V. Fiore, G. D. Bella, A. Valenza, “The effect of alkaline treatment on mechanical properties of kenaf fibers and their epoxy
composites”, ELSEVIER, Composites: Part B 68 (2015) 14-21.
8. M. Ramesh, S Nijananthan, Mechanical property analysis of kenaf-glass fiber reinforced polymer composites using finite element
analysis”
9. Lina Herrera-Estrada, Selvum Pillay and Uday Vaidya, “Banana Fiber Composite For Automotive And Transport Applications, ”The
University of Alabama at Birmingham, AL 35294.
10. Dhanaraj Patil and Amit Panchwadkar, “Design and Performance of Collapsible Door Armrest under Crash Test,” in International
Journal Of Innovative Research In Advance Engineering, vol. 1, issue 6, July 2014.
11. Subodh C. Misra, Roy A. Palasek, “Materials for Automotive Interiors door trim panel,” SAE The Engineering Society for Advancing
Mobility Land Sea Air and Space 880338, March 1988.
12. Daniel L. Sobey, Marcus K. Chao, David L. Garrett, “Interior Composite Material,” SAE The Engineering Resouce for Advance
Mobility 51632, General Motor Corp.
13. N. Venkateshwara, “Mechanical Properties Of Banana/Kenaf Fiber-Reinforced Hybrid Polyester Composites: Effect Of Woven Fabric
Random Orientation,” in Materials and Design, ELSEVIER pp. 246-257.

Authors: Sachin Kamley


Performance of Hybrid Ensemble Classification Techniques for Prevalence of Heart Disease
Paper Title:
Prediction
Abstract: In medical science, heart disease is being considered as fatal problem and in every seconds most of
the people dies due to this problem. In heart disease, typically heart stops blood supply to other parts of the
body. Hence, proper functioning of body stopped and affected. In this way, timely and accurate prediction of
heart disease is an important concern in medical science domain. Diagnosing of heart patients with previous
medical history is not being considered as reliable in many aspects. However, machine learning techniques have
mystery to classify heart disease data efficiently and effectively and provide reliable solutions. In the past,
prediction of heart disease problem various machine learning tools and techniques have been adopted. In this
study, hybrid ensemble classification techniques like bagging, boosting, Random Subspace Method (RSM) and
Random Under Sampling (RUS) boost are proposed and performance is compared with simple base
classification techniques like decision tree, logistic regression, Naive Bays, Support Vector Machine, k-Nearest
Neighbor (KNN), Bays Net (BN) and Multi Layer Perceptron (MLP). The heart disease dataset from Kaggle
data source containing 305 samples and Matlab R2017a machine learning tool are considered for performance
evaluation. Finally, the experimental results stated that hybrid ensemble classification methods outperforms than
329.
simple base classification methods in terms of accuracy. 1875-
188
Keywords: Ensemble Classification, Heart Disease, Kaggle, Machine Learning, Matlab R2017a. 2

References:

1. World Health Organization (WHO) (2014). Fact Sheet Available Online at “http://www.who.int/mediacentre/factsheets/fs317/en/ “.
2. K. D. Kochanek, Xu. J. Murphy, S. L. Mini˜no A.M. and H.C. Kung, “Deaths: Final Data for 2009. National Vital Statistics Reports,
60(3), pp. 1–116, 2011.
3. W. Dai, T.S. Brisimi, W.G.Adams, T. Mela, V. Saligrama, and I.C. Paschalidis (2015). Prediction of Hospitalization due to Heart
Diseases by Supervised Learning Methods. International Journal of Medical Informatics, 84(3), 189–197.
4. G. L. Ki Heon, K.N. Yong and Ryu Ho (2007). Mining Biosignal Data: Coronary Artery Disease Diagnosis Using Linear and
Nonlinear Features of HRV. LNAI 4819: Emerging Technologies in Knowledge Discovery and Data Mining, 56-66.
5. M. Fatima and M. Pasha (2017). Survey of Machine Learning Algorithms for Disease Diagnostic. Journal of Intelligent Learning
Systems and Applications, 9(1), 1-6.
6. K.C. Hian and T. Gerald (2005). Data Mining Applications in Healthcare. Journal of Healthcare Information Management, 19(2), 64-
72.
7. E. Alpaydin (2004). Introduction to Machine Learning (Adaptive Computation and Machine Learning). The MIT Press.
8. M.K. Obenshain, “Application of Data Mining Techniques to Healthcare Data. Infection Control & Hospital Epidemiology”, 25(8), pp.
690-695, 2004.
9. A. Malav, K. Kadam and P. Kamat (2017). Prediction of Heart Disease Using K-means and Artificial Neural Network as a Hybrid
Approach to Improve Accuracy. International Journal of Engineering and Technology, 9(4), 1-7.
10. U. Acharya, K.S. Rajendra, D.N. Vidya Ghista, W.J.E. Lim, F. Molinari and M. Sankaranarayanan, “Computer Aided Diagnosis of
Diabetic Subjects by Heart Rate Variability Signals Using Discrete Wavelet Transform Method”, Knowledge Based System, 81, pp.
56-64, 2015.
11. A.K. Dwivedi, “Analysis of Computational Intelligence Techniques for Diabetes Mellitus Prediction. Neural Computing and
Application”, 13 (3), pp. 1-9, 2017.
12. E.K. Hashi, M.S.U. Zaman and M.R. Hasan, “An Expert Clinical Decision Support System to Predict Disease Using Classification
Techniques”, International Conference on Electrical Computation, Communication, Engineering, pp. 396-400, 2017.
13. M. Shahi and R. Gurm Kaur, “Heart Disease Prediction System Using Data Mining Techniques”, Oriental Journal Computer Science
Technology, 6(4), pp. 457-466, 2013.
14. T.R. Baitharu and S.K. Pani (2016). Analysis of Data Mining Techniques for Health-care Decision Support System Using Liver
Disorder Dataset. Procedia Computer Science, 85, 862-870.
15. R. Das and T. Sengur (2009). Effective Diagnosis of Heart Disease through Network Ensembles. Expert System with Applications, 36,
7675-7680.
16. S. Palaniappan and R. Awang (2008). Intelligent Heart Disease Prediction System Using Data Mining Techniques. International
Journal of Computer Science and Network Security, 8(8), 1-6.
17. S. Pouriyeh, S. Vahid, G.D. Pietro, H. Arabnia and J. Gutierrez (2017). A Comprehensive Investigation and Comparison of Machine
Learning Techniques in the Domain of Heart Disease. 22nd IEEE Symposium on Computers and Communications (ISCC 2017):
Workshops-ICTS4eHelath.
18. R. Subha, K. Anandakumar and A. Bharathi (2018). An Ensemble based Extreme Learning Machine for Cardiovascular Disease
Prediction. International Journal of Applied Engineering Research, 13(10), 7903-7912.
19. S. Kamley and R.S. Thakur (2019). Machine Learning Techniques: Performance Analysis for Prevalence of Heart Disease Prediction.
International Journal of Engineering and Advanced Technology (IJEAT), 8(4), 188-191.
20. Data Source Repository Downloaded on 19/03/2019 from “http://www.kaggle.com”.
21. J. Han and M. Kamber, (2006). Data Mining: Concepts and Techniques. 2nd edition, Morgan Kaufmann Publishers, San Francisco.
22. X. Liu, Q. Su. Wang, M., Zhang, Y.Q. Zhu Wang and Q. Wang (2017). A Hybrid Classification System for Heart Disease Diagnosis
Based on the RFRS Method. Computational and Mathematical Methods in Medicine, pp.11-16.
23. E. Nikookar and E. Naderi (2018). Hybrid Ensemble Framework for Heart Disease Detection and Prediction. International Journal of
Advanced Computer Science and Applications (IJACSA), 9(5), 243-248.
24. D. Vadicherla, and S. Sonawane (2013). Decision Support System for Heart Disease Based on Sequential Minimal Optimization in
Support. International Journal of Engineering Sciences and Emerging Technologies, 4(2), 19–26.
25. A.G. Karegowda, A.S. Manjunath and M.A. Jayaram (2010). Feature Subset Selection Problem Using wrapper Approach in Supervised
Learning. International Journal of Computer Applications, 1(7), 13–17.
26. K.C.Tan, E.J. Teoh, Q. Yu and K.C. Goh (2009). A Hybrid Evolutionary Algorithm for Attribute Selection in Data Mining. Expert
Systems with Applications, 36(4), 8616-8630.
Demian V. Smernytskyi, Vitalii P. Bakal, Mykola P. Budzynskyi, Yevhen V. Samus,
Authors:
Maryna V. Tryhubenko
Paper Title: International Legal Aspect of Scientific (Scientific and Technical) Activity Regulation
Abstract: The article addresses the main aspects and issues of international legal regulation of scientific and
technical activities. The basic content of international legal regulation is revealed and its three-level system is
singled out. The main deficiencies in the construction of such a system are determined, in particular, the lack of
flexibility regarding its international legal regulation. This strips many forms and methods for the
implementation of international scientific relations of the adequate legal support level. The major theoretical
views on the processes of international legal regulation of scientific and technical activity are reflected. An
estimation of the international economic law impact on the formation process of international legal acts system
in the field of scientific and technical cooperation is executed. The possibility of differentiating such a bulk of
international legal acts into a separate branch of international law is investigated. A special attention is paid to
the study of the regional level of international legal regulation of scientific and technical activities. The main
deficiencies and advantages of such regulation are highlighted. The necessity of the large-scale involvement of
non-governmental international organizations in this process was emphasized. This will provide a new vision on
the perspective for the development of international scientific and technical cooperation and its international
legal regulation. The existence of a stable viewpoint regarding the necessity of considering international legal
acts in the sphere of scientific and technical cooperation as a means of stimulating the competitive advantages of
330. individual states is revealed. The standpoint regarding the opinion that such cooperation can be used as an 1883-
instrument of pressure from the more developed countries to emerging economies is explored. The necessity of 1888
expanding the possibilities of international legal regulation of scientific and technical activity is substantiated.

Keywords: Industrial property, international legal regulation, research and development, scientific and
technical activity, scientific and technical cooperation.

References:

1. W. W. Burke-White, “Power Shifts in International Law: Structural Realignment and Substantive Pluralism,” Harvard International
Law Journal, Vol. 56(1), 2015. DOI: 10.2139/ssrn.2378912
2. Y. Zhang, The Legal and Regulatory Framework for Innovation and Technology Transfer. Hanoi University, 2011. Available:
https://www.wipo.int/edocs/mdocs/aspac/en/wipo_ip_han_11/wipo_ip_han_11_ref_t2.pdf
3. L. Li, and B. Yu, “Pattern of International Sci-Tech Cooperation and Empirical Analysis,” Journal of Service Science and
Management, Vol. 4, 2011, pp. 35–41.
4. T.V. Portnova, “Choreography sketches as a representational system of dance recording: From M. Petipa to M. Fokine,” Indian Journal
Of Science And Technology, Vol. 9(29), 2016, pp. 88740. DOI: 10.17485/ijst/2016/v9i29/88740
5. T.V. Portnova, “Practices and Methods for Actualization of the Scientific Information in Art Excursions (Excursions and Cultural
Heritage in the Contemporary World,” International Journal of Environmental and Science Education, Vol. 11(14), 2016, pp. 6690-
6696.
6. M. Yaneva-Deliverska, and G. Bekiarova, “Legal aspects of regulation on biomedical scientific researches,” Journal of IMAB - Annual
Proceeding (Scientific Papers), Vol. 16, 2010, pp. 90–94.
7. B. M. Dolan, “Science and Technology Agreements as Tools for Science Diplomacy: A U.S. Case Study,” Science & Diplomacy, Vol.
1(4), 2012. Available:
http://www.sciencediplomacy.org/files/science_and_technology_agreements_as_tools_for_science_diplomacy_science__diplomacy.pd
f
8. T.V. Portnova, “Synthesized nature of fine arts and ballet theater: System analysis of genre development,” European Journal of Science
and Theology, Vol. 14(5), 2018, pp. 189-200.
9. R. D. Hormats, “Science Diplomacy and Twenty-First Century Statecraft,” Science & Diplomacy, Vol. 1(1), 2012. Available:
http://www.sciencediplomacy.org/files/science_diplomacy_and_twenty-first_century_statecraft_science__diplomacy.pdf
10. D. J. Fikkers, and M. Horvat, Basic Principles for effective International Science, Technology and Innovation Agreements.
Luxembourg: Publications Office of the European Union, 2014.
11. T. Chulitskaya, H. Mazepus, Ramasheuskaya I., Toshkov D. Science Policies and International Cooperation in the Eastern
Neighbourhood of the European Union: An Overview. Available: http://eu-strat.eu/wp-content/uploads/2017/01/EU-STRAT-Working-
Paper-No.-2.pdf
12. H. Clever, International scientific cooperation challenges and predicaments options for risk assessment. Available:
https://www.sapea.info/wp-content/uploads/International-Scientific-Cooperation-Challenges-and-Predicaments-Options-for-Risk-
Assessment.pdf
13. E. Palmerini, “The interplay between law and technology, or the RoboLaw project in context,” Law and technology: the challenge of
regulating technological development, E. Palmerini, and E. Stradella, Eds., Pisa: Pisa university press, 2013, pp. 7–27.
14. K. Abbott, International Organizations and International Regulatory Cooperation: Exploring the Links. Available:
https://www1.oecd.org/publications/international-regulatory-co-operation-and-international-organisations-9789264225756-en.htm
15. A. Radauer, and C. Moody, Study on the policy of the European Institute of Innovation and Technology (EIT) and its Knowledge and
Innovation Communities (KICs) regarding Intellectual Property Rights. Brussels: European Commission, 2013.
16. S. Schwaag Serger, and S. Remoe, International Cooperation in Science, Technology and Innovation: Strategies for a Changing World.
Report of the Expert Group established to support the further development of an EU international STI cooperation strategy. European
Union.
17. I. A. Jillison, “The United States and Iran,” Science & Diplomacy, Vol. 2(3), 2013. Available:
http://www.sciencediplomacy.org/article/2013/united-states-and-iran
18. N. Lundin, Evaluation of U.S.-China Clean Energy Research Centre (CERC) – Third-Party Consultation Report. National Center for
Science and Technology Evaluation (NCSTE), 2012.
19. Convention on the Occupation of Industrial Affairs of 20.03.1883. Available: https://zakon.rada.gov.ua/laws/show/995_123
20. Resolution 60/45, adopted by the United Nations General Assembly: Advances in the field of information and telecommunications in
the context of international security. Available: URL: https://zakon.rada.gov.ua/laws/show/995_e45
21. General Assembly resolution 2222 (XXI): Treaty on the Principles of Activities of States for the Exploration and Use of Outer Space,
including the Moon and Other Celestial Bodies. Available:
https://www.un.org/ru/documents/decl_conv/conventions/outer_space_governing.shtml
22. Convention Organs of National Law from 10.12.1982. Available: https://zakon.rada.gov.ua/laws/show/995_057
23. Contract on patent cooperation from 19.06.1970. Available: https://zakon.rada.gov.ua/laws/show/895_001
24. General Assembly Resolution S-18/3 of May 1, 1990. Declaration on International Economic Cooperation, in particular the
revitalization of economic growth and development in developing countries. Available:
https://www.un.org/ru/documents/decl_conv/declarations/int_economic_coop.shtml
25. Convention on the status of international scientific and research centers and scientific organizations SND of 25.11.1998. Available:
https://zakon.rada.gov.ua/laws/show/997_745
26. Agreement on the interstate exchange of scientific and technical information of June 26, 1992. Available:
http://www.cis.minsk.by/page.php?id=2458
Natalia Alekseevna Prodanova, Liudmila Borisovna Trofimova, Lyudmila Nikolayevna
Authors: Korshunova, Sergey Georgievich Kamolov, Konstantin Zaurovich Trapaidze, Albert
Valentinovich Pavlyuk
Paper Title: The Methods and evaluation of RIC Integrated Business Indicators
Abstract: In the conditions of transition to international financial reporting standards (hereinafter – IFRS), the
issues of developing a methodology for analyzing of the Russian consolidated financial statements, prepared in
accordance with the requirements of the international format, are of particular relevance. In order to develop a
methodology for analyzing of consolidated financial statements, the authors developed key indicators RIC of
integrated business, based on the application of institutional analysis, as well as the coefficient method of
relative indicators. The key RIC indicators, presented in the article, are intended to perform express analysis of
consolidated financial statements, since they will provide a basic picture of the financial situation of a group
through a series of simple calculations. The research results can be used in the transformation of statements, as
well as in the construction of consolidated financial statements, generated in Russia in accordance with the IFRS
requirements.

331. Keywords: institutional analysis methodology, the relevance, the overall profitability of non-current assets
revaluation, the profit investment rate, total financial result.
1889-
189
References:
4
24. L.B. Trofimova, “Relevant financial statements in the context of the development of integration processes”, Moscow: Infra-M, 2015.
DOI: 10.12737/14656 (In Russ.)
25. E.A. Osadchy, E.F. Amirova, T.N. Bochkareva, Y.Y. Gazizyanova, A.V. Yumashev, “Financial statements of a company as an
information base for decision-making in a transforming economy”, European Research Studies Journal, 21(2), 2018, pp. 339-350.
26. A.A. Bisultanova, N.S. Zemlyakova, O.A. Razzhivin, E.E. Udovik, A.A. Adamenko, “Modern trends in corporate finance
management”, Espacios, 2018, 39(31).
27. F. Sotti, L. Rinaldi, G. Gavana, “Measurement options for non-controlling interests and their effects on consolidated financial
statements consistency. which should the disclosure be?”, Corporate Ownership and Control, 12(2Continued3), 2015, pp. 293-302.
28. D.S. Usanova, R.Z. Mukhametzyanov, “Initial consolidation of financial statements of Russian companies: Actual issues”, Social
Sciences and Interdisciplinary Behavior - Proceedings of the 4th International Congress on Interdisciplinary Behavior and Social
Science, ICIBSOS 2015, Indonesia: Jakarta, 2016, pp. 249-252.
29. W. van Zijl, W. Maroun, “Discipline and punish: Exploring the application of IFRS 10 and IFRS 12”, Critical Perspectives on
Accounting, 44, 2017, pp. 42-58. doi:10.1016/j.cpa.2015.11.001
30. A. Casajus, H. Labrenz, “Recognition of non-controlling interest in consolidated financial statements based on property rights”,
Review of Law and Economics, 2017, 13(3) doi:10.1515/rle-2015-0050
31. T. Gluzová, “Disclosure of subsidiaries with non-controlling interest in accordance with IFRS 12: Case of materiality”, Acta
Universitatis Agriculturae Et Silviculturae Mendelianae Brunensis, 64(1), 2016, pp. 275-281. doi:10.11118/actaun201664010275
32. N.V. Generalova, D.N. Olenkov, “The consolidated financial statements according to IFRS: voluntary or mandatory?”, Accounting.
1C, 5, 2014, pp. 31-35. (In Russ.)
33. L.V. Sotnikova, “The consolidated financial statements are: the need to build”, Accounting in construction organizations, 8, 2014, pp.
44-49. (In Russ.)
34. S.I. Puchkova, “Business combinations and consolidated financial statements in the period of transition to IFRS”, Accounting, 5, 2015,
pp. 26-29. (In Russ.)
35. Y.U. Tikhonova, “The consolidated accounts as the basis for determining the financial condition of the corporation”, Master's Herald,
12-2(51), 2015, pp. 65-67. (In Russ.)
36. E.M. Akhmetshin, “The System of Internal Control as a Factor in the Integration of the Strategic and Innovation Dimensions of a
Company’s Development”, Journal of Advanced Research in Law and Economics, 8(6), 2017, pp. 1684-1692.
doi:10.14505/jarle.v8.6(28).03
37. K.S. Mullakhmetov, R.D. Sadriev, R.A. Bikulov, I.G. Khairullin, “Information assurance of the procedure of development of
management decision-making”, Paper presented at the Proceedings of the 32nd International Business Information Management
Association Conference, IBIMA 2018 - Vision 2020: Sustainable Economic Development and Application of Innovation Management
from Regional Expansion to Global Growth, 2018, pp. 6433-6442.
38. V.L. Vasilev, “The role of information and information technology in the management control function”, Biosciences Biotechnology
Research Asia, 11(3), 2014, pp. 1469-1474. doi:10.13005/bbra/1540
39. S.G., Kamolov, P.V., Artemova, V.E. Berezko, “Shaping the systems of digital public governance of the digital economy in Russia and
abroad”, Studies in Computational Intelligence, 826, 2019, pp. 435-442. doi:10.1007/978-3-030-13397-9_51
40. A.A. Urasova, P.A. Kuznetsov, A.V. Plotnikov, “Modeling horizontal integration of companies in volatile markets”, Espacios, 2017,
38(62)
41. L.B. Trofimova, “Application coefficient diagnosis in factor analysis of the consolidated financial statements”, Financial analytics:
problems and solutions, 38, 2014, pp. 39-50.
42. E.A. Osadchy, E.M. Akhmetshin, “Accounting and control of indirect costs of organization as a condition of optimizing its financial
and economic activities”, International Business Management, 9(7), 2015, pp. 1705-1709. DOI:10.3923/ibm.2015.1705.1709
43. A. d'Arcy, A. Tarca, “Reviewing IFRS goodwill accounting research: Implementation effects and cross-country differences”,
International Journal of Accounting, 53(3), 2018, pp. 203-226. doi:10.1016/j.intacc.2018.07.004
44. A. Amorós Martínez, J.A. Cavero Rubio, “The economic effects of IFRS goodwill reporting”, Australian Accounting Review, 28(3),
2018, pp. 309-322. DOI:10.1111/auar.12200
45. F. Mazzi, P. André, D. Dionysiou, I. Tsalavoutas, “Compliance with goodwill-related mandatory disclosure requirements and the cost
of equity capital”, Accounting and Business Research, 47(3), 2017, pp. 268-312. DOI:10.1080/00014788.2016.1254593.

Authors: Soufhwee A.R, Effendi Mohamad, Abdul Rahman, A.A.


Enhancement of Time-Driven Activity–Based Costing (TDABC) by using Simulation in
Paper Title:
Manufacturing Process towards Industry 4.0
Abstract: The new industrial revolution brings changes to organizations that will need to adapt their system to
sustain their business in a highly competitive market. In term of costing, most manufacturers continuously
working towards reducing production costs by focusing on activities process improvement and resources as a
cost driver. One of the current problems faced by most manufacturers that adopted Time-Driven Activity-Based
Costing (TDABC) is lack of combined used of simulation as a tool for validation. Conventional technique also
caused users estimated incorrect variables consideration to the costing system. The purpose of this paper is to
provide a system for managers or decision makers to analyze results which can significantly reduce production
costs by eliminating unnecessary resources with the aid of a simulation model. Simulation was proposed as new
approach to determine the optimum results based on the given scenarios. An analysis on how the framework
was implemented at an automotive manufacturing company was illustrated the enhancement of TDABC by
using simulation. Results of conventional method using Activity Based Costing (ABC) was compared with
TDABC where existing production layouts and parameters were maintained. Simulation model was created
based on current situation and the results were compared to the old method. The results indicated that simulation
can easily be adapted to support the planned and operational TDABC activities. Towards industry 4.0 it was
proven that simulation is one of the key technologies in the new industrial revolution. Besides that, TDABC
methodology in this research is more accurate and faster, by means of an enhanced decision-making process and
supported organization manufacturing system.
332.
1895-
Keywords: Activity Based Costing, Time Driven Activity Based Costing; Simulation, Manufacturing Industry 190
and Optimization. 0

References:

1. Meade, David, Financial models and tools for managing lean manufacturing. Auerbach Publications, 2006.
2. Kaplan, Robert S., and Steven R. Anderson, Time-driven activity-based costing: a simpler and more powerful path to higher profits.
Harvard business press, 2007.
3. A. Almeida and J. Cunha, “The implementation of an Activity-Based Costing (ABC) system in a manufacturing company,” Procedia
manufacturing, 13, pp.932-939, 2017.
4. A. Szychta, “Time-Driven Activity-Based Costing in Service Industries,” Social Sciences, (1392-0758), Vol. 67 No.1, 2010.
5. Öker, F., and Adıgüzel, H., “Time driven activity‐based costing: An implementation in a manufacturing company,” Journal of
Corporate Accounting & Finance, Vol.27 No.3, pp.39-56, 2016.
6. R.G. Sargent, “Verification and validation of simulation models,” Journal of Simulation,” Vol.7 No.1, pp.12-24, 2013.
7. Salama, Shady, and Amr B. Eltawil., "A Decision Support System Architecture Based on Simulation Optimization for Cyber-Physical
Systems," Procedia Manufacturing 26, pp. 1147-1158, 2018.
8. Ingalls, R.G., “Introduction to simulation,” In Proceedings of the 33nd Conference On Winter Simulation, 2001, pp.7-16. IEEE
Computer Society.
9. Mohamad, E.B. and Ito, T., “Integration of e-learning and simulation to user training programme of SMED,” International Journal of
Internet Manufacturing and Services,” 3(2), pp.121-136, 2013.
10. Kelton, W.D., Sadowski, R.P., and Zupick, N.B., Simulation with ARENA, 6th ed., McGraw-Hill, Maidenhead, 2014.
11. Mohamad, E.B., Ibrahim, M.A.B., Sukarma, L., Rahman, M.A.A., Shibghatullah, A.S.B. and Salleh, M.R.B., “Improved decision
making in lean manufacturing using simulation-based approach. International Journal of Agile Systems and Management,” Vol.10,
No.1, pp.34-48, 2017.
12. Mohamad, E., Ito, T. and Yuniawan, D., “Quantifying benefits of lean manufacturing tools implementation with simulation in coolant
hose factory,” Journal of Human Capital Development (JHCD), Vo.6, No.2, pp.13-26, 2013.
13. Helberg, C., Galletly, J.E., and Bicheno, J.R., “Simulating activity-based costing’, Industrial Management & Data Systems,” Vol.94
No.9, pp.3-8, 1994.
14. Kostakis, H., Boskou, G., and Palisidis, G., “Modelling activity-based costing in restaurants,” Journal of Modelling in Management,
Vol.6 No.3, pp.243-257, 2011.
15. Özbayrak, M., Akgün, M., and Türker, A.K., “Activity-based cost estimation in a push/pull advanced manufacturing system,”
International Journal of Production Economics, Vol.87 No.1, pp.49-65, 2004.
16. Greasley, A., “Using process mapping and business process simulation to support a process-based approach to change in a public
sector organization,”. Technovation, Vol. 26 No.1, pp.95-103, 2006.
17. Greasley, A., and C.M. Smith, “Using activity-based costing and simulation to reduce cost at a police communications centre,”
Policing: An International Journal of Police Strategies & Management, Vol.40 No.2, pp.426-441, 2017.
18. Ganorkar, A.B., Lakhe, R.R., and Agrawal, K.N., “Time Driven Activity Based Costing (TDABC) Model for Cost Estimation of
Welding Process for a Ssi,” Industrial Engineering Journal, 2017.
19. Siguenza-Guzman, L., Van den Abbeele, A., Vandewalle, J., Verhaaren, H. and Cattrysse, D., “Using Time-Driven Activity-Based
Costing to support library management decisions: A case study for lending and returning processes,” The Library Quarterly, Vol.84
No.1, pp.76-98, 2014.
20. Freckmann, G., Schmid, C., Baumstark, A., Rutschmann, M., Haug, C. and Heinemann, L., “Analytical performance requirements for
systems for self-monitoring of blood glucose with focus on system accuracy: relevant differences among ISO 15197: 2003, ISO 15197:
2013, and current FDA recommendations,” Journal of diabetes science and technology, Vol.9 No.4, pp.885-894, 2015.
Authors: K. R. K. Sastry, P. Praveen Kumar

Paper Title: Internet Enabled Remote Control Device for Air Conditioners
Abstract: Traditional infrared air conditioner remote control range is confined to a maximum of 10 meters.
When mercury soars users set very low temperature of AC Unit, resulting in Electricity consumption and
discomfort. To improve AC remote control range and to provide a comfort temperature of the user, a solution of
Internet Enabled Remote Control Device for Air Conditioners is proposed. The user, while commuting or at
home, sets the air conditioner (AC) unit to a desired temperature best suited for the individual. The remote
controller, according to the user set parameters Travel time, Set temperature, operates the AC unit. An algorithm
is developed to control the AC considering the Ambient Temperature and the above two parameters to keep the
room temperature desired by the user when user reaches the destination. The user gets the information about the
Temperature values issued by the AC remote control. This design is validated on an in-house developed Xilinx
Field Programmable Gate Array (FPGA) board.

Keywords: Field Programmable Gate Array (FPGA), Node MCU, Internet of Things (IoT), Slice register, air
conditioner (AC) unit, ambient temperature, Infra Red (IR).

References:
333.
1901-
1. Kuen-Min Lee, Wei-Guang Teng, Ting-Wei Hou,“Point-n-Press: An Intelligent Universal Remote Control System for Home
Appliances,” IEEE Trans. Autom. Sci. Eng.,vol. 13, no. 3, Jul 2016. 190
2. Laehyun Kim, Wanjoo Park, Hyunchul Cho and Sehyung Park, “A Universal Remote Control with Haptic Interface for Customer 5
Electronic Devices,” IEEE Trans. Consumer Electron., vol. 56, no. 2, pp. 913-918, May 2010.
3. Taewan Kim, Hakjoon Lee, and Yunmo Chung “Advanced Universal Remote Controller for Home Automation and Security,” IEEE
Trans. Consumer Electron., vol. 56, no. 4, pp. 2537-2542, Nov 2010.
4. Ali Ziya Alkar and Umit Buhur “An Internet Based Wireless Home Automation System for Multifunctional Devices,” IEEE Trans.
Consumer Electron.,vol. 51, no. 4, nov 2005.
5. Qi Zhang, “An Intelligent Air Conditioning Control System Based on Mobile Communication Networks,” 2015 12th International
Conference on Fuzzy Systems and Knowledge Discovery (FSKD).
6. Ch.Arun prakash,K.R.K. Sastry “ Implementation of Air Conditioner Infrared Protocol on a Reconfigurable Hardware,” 2018 8th
International Conference on Cloud Computing, Data Science & Engineering (Confluence), pp.787-790, Aug 2018.
7. Boyoung Lee, Sojung Yang and Deokjai Choi “A Status Monitoring System Design/Implementation for Home Appliances controlled
by home server”2009 First International Conference on Networks & Communications, pp. 220-223, doi:10.1109/NetCoM.2009.21,
2009.
8. Rakesh K. Deore, Vijay R. Sonawane and Pooja H.Satpute “Internet of Things Based Home Appliances Control” 2015International
Conference on Computational Intelligence and Communication Networks, pp.898-902, 2015.
9. Ming Wang, Guiqing Zhang, Chengui Zhang, Jianbin Zhang, chengdong Li “An IoT-based Appliance Control System for Smart
Homes” 2013 Fourth International Conference on Intelligent Control and Information Processing (ICICIP), pp.744-747, June 9-11,
2013.
10. YAN Wenbo, WANG Quanyu, GAO Zhenwei “Smart Home Implementation Based on Internet and WiFi technology” Proceedings of
the 34th Chinese Control Conference, July 28-30, 2015.

Authors: G.Srinivasa Raju, M.AjayDilipKumar, S.Suryanarayana Raju

Paper Title: Quantifying Inference Learning Model to Explore Twitter User Emotions
Abstract: Increasing social media used by different peoples express their opinions and feelings in the form
sentences and text messages. So that extracting the information from message i.e which consists different issues
in text and identifying anxiety depression of individuals and measuring well-being or mood of a community.
334. This is because of its significance in a wide scope of fields, for example, business and governmental issues.
1906-
Individuals express assessments about explicit themes or elements with various qualities and powers, where
191
these estimations are firmly identified with their own sentiments and feelings. Various techniques and lexical
0
assets have been proposed to break down feeling from normal language writings, tending to various assessment
measurements. In this article, we propose a novel inference methodology for quantifying and inferring the
Twitters users’ conclusion grouping utilizing distinctive notion measurements as meta-level highlights. We
consolidate angles, for example, assessment quality, feeling and extremity markers, created by existing
estimation investigation strategies and assets. Our exploration demonstrates that the mix of assumption
measurements gives critical improvement in Twitter feeling characterization errands, for example, extremity and
subjectivity.

Keywords: Twitter, Information extraction, social media, machine learning, assessment, sentiment analysis.

References:

1. Shaunak Joshi, Deepali Deshpande, "Twitter Sentiment Analysis System", International Journal of Computer Applications (0975 –
8887) Volume 180 – No.47, June 2018.
2. Felipe Bravo-Marquez, Marcelo Mendoza, "Combining Strengths, Emotions and Polarities for Boosting Twitter Sentiment Analysis",
WISDOM’13, August 11 2013, Chicago, IL, USA Copyright 2013 ACM 978-1-4503-2332-1/13/08 ...$15.00.
3. Bradley, M. M., and Lang, P. J. Affective Norms for English Words (ANEW) Instruction Manual and Affective Ratings. Technical
Report C-1, The Center for Research in Psychophysiology University of Florida, 2009.
4. Cambria, E., Speer R., Havasi C., and Hussain A. SenticNet 2: A Semantic and Affective Resource for Opinion Mining and Sentiment
Analysis. In FLAIRS Conference, pages 202–207, 2012.
5. Carvalho, P., Sarmento, L., Silva, M. J., and de Oliveira, E. Clues for detecting irony in user-generated contents: oh...!! it’s "so easy" ;-
). In Proceeding of the 1st international CIKM workshop on Topic-sentiment analysis for mass opinion Hong Kong, China, 2009.
6. Esuli, A., and Sebastiani, F. Sentiwordnet: A publicly available lexical resource for opinion mining. In In Proceedings of the 5th
Conference on Language Resources and Evaluation, 2006.
7. Go, A., Bhayani, R., and Huang, L. Twitter sentiment classification using distant supervision. Technical report Stanford University,
2010.
8. Felix Ming Fai Wong, Chee Wei Tan, "Quantifying Political Leaning from Tweets, Retweets, and Retweeters", IEEE Transactions on
Knowledge and Data Engineering 1041-4347 (c) 2015.
9. P. Barber´a, “Birds of the same feather tweet together: Bayesian ideal point estimation using Twitter data,” Political Analysis, 2014.
10. R. Cohen and D. Ruths, “Classifying political orientation on Twitter: It’s not easy!” in Proc. ICWSM, 2013.
11. J. Grimmer and B. M. Stewart, “Text as data: The promise and pitfalls of automatic content analysis methods for political texts,”
Political Analysis, 2013.
12. M. D. Conover, B. Gonc¸alves, J. Ratkiewicz, A. Flammini, and F. Menczer, “Predicting the political alignment of Twitter users,” in
Proc. IEEE SocialCom, 2011.
13. M. D. Conover, J. Ratkiewicz, M. Francisco, B. Gonc¸alves, A. Flammini, and F. Menczer, “Political polarization on Twitter,” in Proc.
ICWSM, 2011.
14. CVX Research, Inc., “CVX: Matlab software for disciplined convex programming, version 2.0 beta,” http://cvxr.com/cvx, Sep. 2012.
15. unpublished M. Fiedler, “A property of eigenvectors of nonnegative symmetric matrices and its application to graph theory,”
Czechoslovak Mathematical Journal, vol. 25, no. 4, pp. 619– 633, 1975.
16. S. Finn, E. Mustafaraj, and P. T. Metaxas, “The coretweeted network and its applications for measuring the perceived political
polarization,” in Proc. WEBIST, 2014.
17. J. L. Fleiss, “Measuring nominal scale agreement among many raters,” Psychological Bulletin, vol. 76, no. 5, pp. 378– 382, 1971.
18. M. Gabielkov, A. Rao, and A. Legout, “Studying social networks at scale: Macroscopic anatomy of the Twitter social graph,” in Proc.
SIGMETRICS, 2014.
19. D. Gayo-Avello, “All liaisons are dangerous when all your friends are known to us,” in Proc. HT, 2011.
20. M. Gentzkow and J. M. Shapiro, “What drives media slant? Evidence from U.S. daily newspapers,” Econometrica, vol. 78, no. 1, pp.
35–71, January 2010.
21. S. Gerrish and D. Blei, “How the vote: Issue-adjusted models of legislative behavior,” in Proc. NIPS, 2012.
22. ——, “Predicting legislative roll calls from text,” in Proc. ICML, 2011.
23. J. Golbeck and D. Hansen, “A method for computing political preference among Twitter followers,” Social Networks, vol. 36, pp.
177–184, 2014.
Authors: Bhagyashree, Kavyashree

Paper Title: Effectiveness of Magneto-Rheological Damper Placement in Seismic Vibration Control


Abstract: Earthquake is dangerous natural calamities considered in the nature which will destroy the
environment completely. The human life along with the structures will be in threat, so a sophisticated structural
design is required and hence efficient control algorithm is required to overcome this hazard. The passive and
active control system has been developed to control the structures and it is found that active control strategy
performs better than passive but because of some limitation like cost effectiveness and reliability semi-active
control system is been adopted in recent years. Therefore this work aims at the design of Robust Proportional
Derivative Controller along with semi-active damper like Magneto-rheological damper. This controller is a
combination of classical PID controller and state feedback controller. The commanded voltage of this controller
will be sent to the current driver. This current driver will convert the voltage to current. Magneto-rheological
damper in turn receives this controlled current and produces the force required to control the vibration of the
structure. The minimum control effort is simulated by placing MR damper in different floors of the structure and
335. results are demonstrated. Optimum placement of the damper plays an important role because of economy and 1911-
minimum vibration to the least possible consideration. 191
4
Keywords: Magneto-rheological damper, Robust Proportional Derivative (PID) Controller, Semi-active
control.

References:

1. Dyke S. J., Spencer B. F., Sain M. K., and Carlson J. D., “ Modeling and control of magneto-rheological dampers for seismic response
reduction”, Smart Material Structures, vol. 5, 1996,pp. 565–575.
2. Housner G. W., et al. “Structural Control : Past, Present, and Future”, journal of engineering mechanics, vol. 123, 1997, pp. 897–971.
3. Spencer B., Dyke S., and Sain M., “Phenomenological model for magneto rheological dampers”, J. Eng., vol. 123, 1997, pp.230–238.
4. Ge M., Chiu M. and Wang Q., “Robust PID controller design via LMI approach”, Journal of process control, vol. 12, 2002, pp. 3-13.
5. Guclu R., “Sliding mode and PID control of a structural system against earthquake”, Mathematical and computer modeling, vol. 44,
2006, pp. 210–217.
6. Wongprasert N. and Symans M. D., “Numerical Evaluation of Adaptive Base-Isolated Structures Subjected to Earthquake Ground
Motions”, Journal of Engineering Mechanics, vol. 131, 2005, pp. 109–119.
7. Karamodin A. K., Haji-Kazemi H., Rowhanimanesh A. R., and Akbarzadeh-Tootoonchi M. R., “Semi-Active Control of Structures
Using a Neuro-Inverse Model of MR Dampers”, Sci. Iran. Trans. a-Civil Eng., vol. 16, 2009, pp. 256–263.
8. Aly A. M., “Vibration Control of Buildings Using Magneto-rheological Damper: A New Control Algorithm”, Journal of Engineering,
2013, pp. 1–10.
9. Rao V. S., George V. I., Kamath S., and Shreesha C., “Performance Evaluation of Reliable H Infinity Observer Controller With Robust
PID Controller Designed for TRMS With Sensor, Actuator Failure”, Far East J. Electron. Commun., vol. 16, 2016, pp. 355–380.
10. Kavyashree, Jagadisha H. M., Rao V. S. and Bhagyashree, “Classical PID Controller for Semi-Active Vibration Control of Seismically
excited structure using Magneto-Rheological Damper”, First International Conference on Energy and Environment, Calicut, 2018.
11. Rao V. S., Kavyashree, “Tremor Control of Structure with Optimum Positioning of Magneto-Rheological Damper”, Journal of
Advanced Research in Dynamical & Control Systems, vol. 10(13), 2018, pp. 238-245.
12. Chopra A. K. “Free Vibration Tests: Dynamics of Structures: Theory and Applications to Earthquake Engineering”, 2nd Ed. Prentice
Hall, Upper Saddle River, NJ, 2001, pp. 54-57.
13. Ogata K. “Modern Control Engineering”, New Jersey: Prentice-Hall, 1990, pp. 682-700.

Authors: Nilima Warade, T. Ravi

Paper Title: Implementation and Utilization of LBIST for 16 bit ALU


Abstract: This paper refers to implementation of Low Power Built-In-Self-Test (LBIST) and its utilization
for testing of 16 bit ALU core. Low Power Test Pattern (LP) Generator is programmable and able to produce
pseudorandom test patterns. The programmability feature brings in selectiveness in toggling levels of test
patterns. This helps to increase the error coverage gradient. This low power pattern generator consists of a
pseudo random pattern generator (PSPR) which can be a linear feedback shift register or ring generator. The test
pattern generator allows the production of binary sequences by devices with that selected toggling rate is defined
as ‘Preselected toggling’ (PRESTO) activity. In this methodology, controls for operation of generator are
selected automatically. Selection of all the controls is made simple and accurate for the tuning. Using this
method fault coverage of test pattern generator can be improved as well as pattern count ratio gets improved.
The proposed low power test compression method helps to get predictable test patterns. Here preselected
toggling based logic BIST is used to get flexible and accurate test patterns hence high quality testing is achieved
here with integration of PRESTO and LBIST method.

Keywords: fault coverage, low power BIST, pattern Generator, PRESTO, PSPR.

References:

1. A. S. Abu-Issa and S. F. Quigley , “Bit-swapping LFSR for low-power BIST,” in Electron.Lett, vol. 44, no. 6, pp. 401–402, Mar.
2008.
2. C. Barnhart et al., “Extending OPMISR beyond 10x scan test efficiency,” IEEE Design Test, vol. 19, no. 5, pp. 65–73, Sep./Oct. 2002.
3. S. Bhunia, H. Mahmoodi, D. Ghosh, S. Mukhopadhyay, and K. Roy, “Low-power scan design using first-level supply gating,” IEEE
Trans. Very Large Scale Integr. (VLSI) Syst., vol. 13, no. 3, pp. 384–395, Mar.2005.
4. M. Chatterjee and D. K. Pradham, “A novel pattern generator for near perfect fault-coverage,” in Proc. 13th IEEE Very Large Scale
Integr. (VTSI) Test Symp., Apr./May 1995, pp.417–425.
5. F. Corno, M. Rebaudengo, M. S. Reorda, G. Squillero, and M. Violante,“Low power BIST via non-linear hybrid cellular automata,” in
Proc. 18th IEEE Very Large Scale Integr. (VTSI) Test Symp., May 2000, pp.29–34.
336. 6. D. Das and N. A. Touba, “Reducing test data volume using external/ LBIST hybrid test patterns,” in Proc. Int. Test Conf. (ITC), 2000,
pp. 115–122. 1915-
7. R. Dorschand H. Wunderlich, “Tailoring ATPG forembedded testing,” in Proc. Int. Test Conf. (ITC), 2001, pp. 530–537.
8. M. Filipeket al., “Low power decompressor and PRPG with constant value broadcast,” in Proc. 20th Asian Test Symp. (ATS), Nov.
192
2011, pp. 84–89. 0
9. S. Gerstendorfer and H.Wunderlich, “Minimized power consumption for scan-based BIST,” in Proc. Int. Test Conf. (ITC), 1999, pp.77–
84.
10. V. Gherman, H. Wunderlich, H. Vranken, F. Hapke, M. Wittke, and M. Garbers, “Efficient pattern mapping for deterministic logic BIST,”
in Proc. Int. Test Conf. (ITC), Oct. 2004, pp.48–56.
11. P. Girard, L. Guiller, C. Landrault, and S. Pravossoudovitch, “A test vector inhibiting technique for low energy BIST design,” in Proc. 17th
IEEE VLSI Test Symp. (VTS), Apr. 1999, pp.407–412.
12. P. Girard, L. Guiller, C. Landrault, S. Pravossoudovitch, and H.-J. Wunderlich, “A modified clock scheme for a low power BIST test
pattern generator,” in Proc. 19th IEEE VLSI Test Symp. (VTS), May 2001, pp. 306–311.
13. P. Girard, C. Landrault, S. Pravossoudovitch, A. Virazel,and H.-J. Wunderlich, “High defect coverage with low-power test sequences in a
BIST environment,” IEEE Design Test, vol. 19, no. 5, pp. 44–52, Sep.2002.
14. M. Filipeket al., “Low-power programmable PRPG with test compression capabilities,” IEEE Trans. Very Large Scale Integr. (VLSI)
Syst. , vol.23, no.6, pp. 1063–1076, Jun. 2016
15. Nongthombam Imocha Singh, “A Brief Review for Semiconductor Memory Testing Based on BIST Techniques”, IJET, vol. 7 no
3.1,2018
16. Hakmiet al., "Programmable deterministic Built-In Self-Test," 2007 IEEE International Test Conference, Santa Clara, CA,
2007, pp. 1-9. doi:10.1109/TEST.2007.4437611
17. S. Hellebrand, Hua-Guo Liang and H. -. Wunderlich, "A mixed mode BIST scheme based on reseeding of folding counters," Proceedings
International Test Conference 2000 (IEEE Cat. No.00CH37159), Atlantic City, NJ, USA, 2000, pp. doi: 10.1109/TEST.2000.894274
18. S. Hellebrand, J. Rajski, S. Tarnick, S. Venkataraman and B. Courtois, "Built-in test for circuits with scan based on reseeding of multiple-
polynomial linear feedback shift registers," in IEEE Transactions on Computers,vol.44,no.2,pp. 223-233,Feb.
19. A. Jas, C. V. Krishna and N. A. Touba, "Weighted pseudorandom hybrid BIST," in IEEE Transactions on Very Large Scale Integration
(VLSI) Systems, vol. 12, no.12, pp.1277-1283, Dec. 2004, doi:10.1109/TVLSI.2004.837985
20. Seongmoon Wang and S. K. Gupta, "LT-RTPG: a new test-per-scan BIST TPG for low switching activity," in IEEE Transactions on
Computer-Aided Design of Integrated Circuits and Systems, vol.25, no.8, pp.1565-1574, Aug. 2006.doi: 10.1109/TCAD.2005.855927
21. N. A. Toubaand E. J. McCluskey, "Transformed pseudo-random patterns for BIST," Proceedings 13th IEEE VLSI Test Symposium,
Princeton, NJ, USA, 1995, pp. 410-416.doi: 10.1109/VTEST.1995.512668
22. P. M. Rosinger, B. M. Al-Hashimiand N. Nicolici, "Low power mixed-mode BIST based on mask pattern generation using dual
LFSR re-seeding," Proceedings. IEEE International Conference on Computer Design: VLSI in Computers and Processors, Freiberg,
Germany, 2002, pp. 474-479, doi: 10.1109/ICCD.2002.1106816
23. N. A. Touba, "Survey of Test Vector Compression Techniques," in IEEE Design & Test of Computers, vol. 23, no. 4, pp. 294-303,
April 2006. doi:10.1109/MDT.2006.105
24. B. Singh, A. Khosla and S. Bindra, "Power Optimization of Linear Feedback Shift Register (LFSR) for Low Power BIST," 2009 IEEE
International Advance Computing Conference, Patiala, 2009, pp. 311-314. doi:10.1109/IADCC.2009.4809027
25. T. Saraswathi, K. Raginiand G. R. Ch, "A review on power optimization of linear feedback shift register (LFSR) for Low power
built in self-test (BIST)," 2011 3rd International Conference on Electronics Computer Technology, Kanyakumari, 2011, pp.172-176
doi: 10.1109/ICECTECH.2011.5942075
26. C. Zoellin, H. Wunderlich, N. Maeding and J. Leenstra, "BIST Power Reduction UsingScan-Chain Disable in the Cell Processor," 2006
IEEE International Test Conference, Santa Clara, CA, 2006, pp. 1-8. doi:10.1109/TEST.2006.297695
27. H. Wunderlichand G. Kiefer, "Bit-flipping BIST," Proceedings of International Conference on Computer Aided Design, San Jose,
CA,USA, 1996, pp.337-343. doi: 10.1109/ICCAD.1996.569803
28. J. Rajski, J. Tyszer, M. Kassaband N. Mukherjee, "Embedded deterministic test," in IEEE Transactions on Computer-Aided Design of
Integrated Circuits and Systems," vol. 23, no. 5, pp. 776-792, May 2004.doi:10.1109/TCAD.2004.826558.
29. B. Nadeau-Dostie, K. Takeshita and J. Cote, "Power-Aware At-Speed Scan Test Methodology for Circuitswith Synchronous Clocks,"
2008 IEEE International Test Conference, Santa Clara, CA, 2008, pp. 1-10. doi:10.1109/TEST.2008.4700574
30. M. Tehranipoor, M. Nouraniand N. Ahmed, "Low Transition LFSR for BIST-Based Applications," 14th Asian Test Symposium
(ATS'05), Calcutta, 2005, pp.138-143 doi: 10.1109/ATS.2005.77
31. B. Nadeau-Dostie, K. Takeshitaand J. Cote, "Power-Aware At-Speed Scan Test Methodology for Circuits with Synchronous Clocks,"
2008 IEEE International Test Conference, Santa Clara, CA, 2008, pp. 1-10. doi:10.1109/TEST.2008.4700574
32. Hua-GuoLiang, S. Hellebrandand H. -. Wunderlich, "Two-dimensional test data compression for scan-based deterministic BIST,"
Proceedings International Test Conference 2001 (Cat. No.01CH37260), Baltimore, MD, USA, 2001, pp. 894-902. doi:
10.1109/TEST.2001.966712
33. X. Lin and J. Rajski, "Adaptive Low Shift Power Test Pattern Generator for Logic BIST," 2010 19th IEEE Asian Test Symposium,
Shanghai, 2010, pp. 355-360. doi: 10.1109/ATS.2010.67
34. Lei Li and K.Chakrabarty, "Test set embedding for deterministic BIST using a reconfigurable interconnection network," in IEEE
Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol.23,no.9,pp. 1289-1305, Sept.2004.
doi:10.1109/TCAD.2004.831593
35. P. Wohl, J. A. Waicukauski, S. Patel and M. B. Amin, "X-tolerant compression and application of scan-at patterns in a bist
architecture," International Test Conference, 2003. Proceedings. ITC 2003, Charlotte, NC, USA, 2003, pp.727-736,
doi:10.1109/TEST.2003.1270902
36. X. Liu and Q. Xu, "On simultaneous shift- and capture-power reduction in linear decompressor-based test compression environment,"
2009 International Test Conference, Austin, TX, 2009, pp. 1-10. doi:10.1109/TEST.2009.5355554
37. S. Bhunia, H. Mahmoodi, D. Ghosh, S. Mukhopadhyay and K. Roy, "Low-power scan design using first-level supply gating,” in IEEE
Transactions on Very Large Scale Integration (VLSI) Systems, vol. 13, no. 3, pp. 384-395, March 2005. doi:
10.1109/TVLSI.2004.842885
38. M. Arai et al., "Test Data Compression of 100x for Scan-Based BIST," 2006 IEEE International Test Conference, SantaClara, CA,
2006, pp. 1-10. doi: 10.1109/TEST.2006.297664
39. T. Enmin, S. Shengdongand S.Wenkang," Power Reduction in BIST Design Based on Genetic Algorithm and Vector-Inserted TPG,"
2007 8th International Conference on Electronic Measurement and Instruments, Xi'an, 2007, pp. 4-533-4-537.doi:
10.1109/ICEMI.2007.4351199
40. Xiaodong Zhangand K. Roy, "Power reduction in test-per-scan BIST," Proceedings 6th IEEE International On-Line Testing Workshop
(Cat. No.PR00646), Palma de Mallorca, Spain, 2000, pp. 133-138. doi:10.1109/OLT.2000.856625
41. Xiaodeng Zhangand K. Roy, "Peak power reduction in low power BIST," Proceedings IEEE 2000 First International Symposium on
Quality Electronic Design (Cat. No. PR00525), San Jose, CA, USA, 2000, pp. 425-432. doi: 10.1109/ISQED.2000.838911
42. S. Srinivasan, G. Swaminathan, J. H. Aylorand M. R. Mercer, "Combinational circuit ATPG using binary decision diagrams," Digest of
Papers Eleventh Annual 1993 IEEE VLSI Test Symposium, Atlantic City, NJ, USA, 1993, pp.251-258.doi:
10.1109/VTEST.1993.313354.

Authors: Hüseyin GÖKÇEKUŞ, Youssef Kassem, Ogodor Elvis Ikechukwu

Paper Title: An Assessment on Relationship of Agricultural Sub-Sectors with GDP in Nigeria


Abstract: This study is majorly concentrated on the various agricultural subsectors in Nigeria, how the
subsectors has influenced the economic growth of Nigeria using econometric procedure to estimate the
parameters of the model, and also the various shortcomings encountered by the agricultural subsectors in Nigeria
and possible solutions. It also emphasize on the sector that has been abandoned, whereas, the growing
recognition is directed toward the major resources (crude oil) which generated diminishing returns in agriculture
contributions in regards to the economic growth in Nigeria. Moreover, the paper emphasized on the relationship
of agricultural sub-sectors with Gross Domestic Product (GDP) which the sub-sectors entails crop production,
fishery, livestock and forestry. The Intention of this research presents the conclusion that the agricultural part is
a concrete sector of the economy and cannot be underrated or trivialized seeing that agricultural sector output is
important to economic activities in Nigeria. Therefore, the general growth of the country’s economy depends on
the progress of agriculture. If there’s availability of credit facility to the agricultural sector, it will enhance the
boosting of the country’s GDP and thereby causing growth in the economy. An additional objective of this paper
337. attempts to carry maximum value for public officials and legislators.
1921-
Keywords: Agriculture, Development, Economic growth, Econometric procedure, Sub-sectors. 192
5
References:

1. Aluko, S. (2004). Making Natural Resources into a blessing rather than a curse: in covering oil. A Reporter’s Guide to Energy and
Development. Open Society Institute.
2. Beintema, N. M., & Stads, G. J. (2006). Agricultural research and development in Sub-Saharan Africa: An era of
stagnation. Background Paper, ASTI Initiative, International Food Policy Research Institute, Washington, DC.
3. Odetola, T., & Etumnu, C. (2013). Contribution of agriculture to economic growth in Nigeria. The 18th.
4. Chauvin, N. D., Mulangu, F., & Porto, G. (2012). Food production and consumption trends in sub-Saharan Africa: Prospects for the
transformation of the agricultural sector. UNDP Regional Bureau for Africa: New York, NY, USA.
5. Daramola, A., Ehui, S., Ukeje, E., & McIntire, J. (2007). Agricultural export potential. Economic Policy Options for a Prosperous
Nigeria, London: Palgrave Macmillan, 301-329.
6. Dickey, D. A., & Fuller, W. A. (1981). Likelihood ratio statistics for autoregressive time series with a unit root. Econometrica: Journal
of the Econometric Society, 1057-1072.
7. Granger, C. W. (1981). Some properties of time series data and their use in econometric model specification. Journal of
econometrics, 16(1), 121-130.
8. Ifeanyi, N. N., Felix, C., Remy, O. M., Jude, C. N., Nnanna, M. A. M., & Joe, O. (2008). Empirical assessment of Nigeria’s
agricultural export and economic welfare. MPRA Paper, 12, p636.
9. Izuchukwu, O. (2011). Analysis of the contribution of agricultural sector on the Nigerian economic development. World review of
business research, 1(1), 191-200.
10. Jorgenson, D. W. (1961). The development of a dual economy. The Economic Journal, 71(282), 309-334.
11. Lipton, M. (2012). Learning from others: Increasing agricultural productivity for human development in Sub-Saharan Africa. United
Nations Development Programme Regional Bureau for Africa Working Paper, 7.
12. Mukhtar, M. (1987). Agricultural development in Nigeria: the role of market and non‐market forces. Review of African Political
Economy, 14(39), 42-50.
13. Odetola, T., & Etumnu, C. (2013). Contribution of agriculture to economic growth in Nigeria. The 18th.
14. Ogen, O. (2007). The Agricultural Sector and Nigeria’s Development: Comparative Perspectives from the Brazilian Agro-Industrial
Economy, 1960-1995. Nebula, 4(1), 184-194.
15. Ojowu, O., & Mensah, S. A. (1988). Agricultural commodity marketing in Nigeria without the Marketing Boards. Agricultural
Administration and Extension, 29(4), 281-292.
16. Odetola, T., & Etumnu, C. (2013). Contribution of agriculture to economic growth in Nigeria. The 18th.
17. Omorogiuwa, O., Zivkovic, J., & Ademoh, F. (2014). The role of agriculture in the economic development of Nigeria. European
Scientific Journal, ESJ, 10(4).
18. Otaha, J. I. (2012). Dutch disease and Nigeria oil economy. African Research Review, 6(1), 82-90.
19. Sanusi, L. S. (2010). Growth prospects for the Nigerian economy. Convocation Lecture.
20. Muhammad-Lawal, A., & Atte, O. A. (2016). An analysis of agricultural production in Nigeria. African Journal of General
Agriculture, 2(1).

Authors: Prabhjot Kaur, Sandeep Singh Kang

Paper Title: Hybrid Routing Protocol for Wireless Body Area Networks
Abstract: Healthcare is an application where the Wireless Body Area Network (WBAN), the emerging field
of Wireless Sensor Network (WSN), can give assistance to the person in case of detection of abnormal activities
of the human body without demanding the presence of the doctor. The small-sized sensors can be deployed for
continuous monitoring of the physical activities of the human body. In the case of abnormal activity, the sensors
will alert the person as well as share the data with the health expert. The information to be sent is very critical so
the routing nodes selection must be done in such a manner that the malicious nodes will not get the information.
There are various factors which we can count as the selection parameters for taking a node as part of the route.
The Trust of the sensor node is very important as if the node is not trustworthy the chances of delivering correct
data to the destination node are very less. This may lead to a threat to a person’s life. In this paper we are
presenting a routing algorithm which will count the trust of the node as an important factor and update the path if
it found any malicious node in between the route.

Keywords: Wireless Body Area Networks, Quality of Service, routing challenges, routing protocols in WBAN,
applications of WBAN.

References:

1. Roy, M., Chowdhury, C., & Aslam, N. (2017). Designing an energy efficient WBAN routing protocol. 2017 9Th International
Conference On Communication Systems And Networks (COMSNETS). doi: 10.1109/comsnets.2017.7945390
2. Al-Janabi, S., Al-Shourbaji, I., Shojafar, M., & Shamshirband, S. (2017). Survey of main challenges (security and privacy) in wireless
body area networks for healthcare applications. Egyptian Informatics Journal, 18(2), 113-122. doi: 10.1016/j.eij.2016.11.001
3. Negra, R., Jemili, I., & Belghith, A. (2016). Wireless Body Area Networks: Applications and Technologies. Procedia Computer
Science, 83, 1274–1281.doi:10.1016/j.procs.2016.04.266
338. 4. Toor, A., & Jain, A. (2016). A survey of routing protocols in Wireless Sensor Networks: Hierarchical routing. 2016 International
Conference On Recent Advances And Innovations In Engineering (ICRAIE). doi: 10.1109/icraie.2016.7939555 1926-
5. Ling, Z., Hu, F., Wang, L., Yu, J., & Liu, X. (2017). Point-to-Point Wireless Information and Power Transfer in WBAN With Energy 193
Harvesting. IEEE Access, 5, 8620-8628. doi: 10.1109/access.2017.2695222 2
6. Poon, C., Yuan-Ting Zhang, & Shu-Di Bao. (2006). A novel biometrics method to secure wireless body area sensor networks for
telemedicine and m-health. IEEE Communications Magazine, 44(4), 73-81. doi: 10.1109/mcom.2006.1632652
7. Huang, H., Gong, T., Ye, N., Wang, R., & Dou, Y. (2017). Private and Secured Medical Data Transmission and Analysis for Wireless
Sensing Healthcare System. IEEE Transactions On Industrial Informatics, 13(3), 1227-1237. doi: 10.1109/tii.2017.2687618
8. He, D., Zeadally, S., Kumar, N., & Lee, J. (2017). Anonymous Authentication for Wireless Body Area Networks With Provable
Security. IEEE Systems Journal, 11(4), 2590-2601. doi: 10.1109/jsyst.2016.2544805
9. Poon, C., Lo, B., Yuce, M., Alomainy, A., & Hao, Y. (2015). Body Sensor Networks: In the Era of Big Data and Beyond. IEEE
Reviews In Biomedical Engineering, 8, 4-16. doi: 10.1109/rbme.2015.2427254
10. Usman, M., Asghar, M., Ansari, I., & Qaraqe, M. (2018). Security in Wireless Body Area Networks: From In-Body to Off-Body
Communications. IEEE Access, 6, 58064-58074. doi: 10.1109/access.2018.2873825
11. Seo, S., Bang, H., & Lee, H. (2015). Coloring-based scheduling for interactive game application with wireless body area networks. The
Journal Of Supercomputing, 72(1), 185-195. doi: 10.1007/s11227-015-1540-7
12. Du, D., Hu, F., Wang, F., Wang, Z., Du, Y., & Wang, L. (2015). A game theoretic approach for inter-network interference mitigation
in wireless body area networks. China Communications, 12(9), 150-161. doi: 10.1109/cc.2015.7275253
13. Ahmed, A., Abu Bakar, K., Channa, M., Haseeb, K., & Khan, A. (2015). A trust aware routing protocol for energy constrained wireless
sensor network. Telecommunication Systems, 61(1), 123-140. doi: 10.1007/s11235-015-0068-8
14. Movassaghi, S., Majidi, A., Jamalipour, A., Smith, D., & Abolhasan, M. (2016). Enabling interference-aware and energy-efficient
coexistence of multiple wireless body area networks with unknown dynamics. IEEE Access, 4, 2935-2951. doi:
10.1109/access.2016.2577681
15. Moosavi, H., & Bui, F. (2016). Optimal Relay Selection and Power Control With Quality-of-Service Provisioning in Wireless Body
Area Networks. IEEE Transactions On Wireless Communications, 15(8), 5497-5510. doi: 10.1109/twc.2016.2560820
16. Tang, Q., Tummala, N., Gupta, S. K. S., & Schwiebert, L. (2005). TARA: Thermal-Aware Routing Algorithm for Implanted Sensor
Networks. Lecture Notes in Computer Science, 206–217. doi:10.1007/11502593_17
17. Bhangwar, A. R., Kumar, P., Ahmed, A., & Channa, M. I. (2017). Trust and Thermal Aware Routing Protocol (TTRP) for Wireless
Body Area Networks. Wireless Personal Communications, 97(1), 349–364.doi:10.1007/s11277-017-4508-5
18. Roy, M., Chowdhury, C., Kundu, A., & Aslam, N. (2017). Secure lightweight routing(SLR) strategy for wireless body area
networks. 2017 IEEE International Conference On Advanced Networks And Telecommunications Systems (ANTS). doi:
10.1109/ants.2017.8384119
19. Sethi, D., & Bhattacharya, P. P. (2016). A Study on Energy Efficient and Reliable Data Transfer (EERDT) Protocol for WBAN. 2016
Second International Conference on Computational Intelligence & Communication Technology (CICT).doi:10.1109/cict.2016.57
20. Ahmed, A., Bakar, K. A., Channa, M. I., Haseeb, K., & Khan, A. W. (2015). TERP: A Trust and Energy Aware Routing Protocol for
Wireless Sensor Network. IEEE Sensors Journal, 15(12), 6962–6972.doi:10.1109/jsen.2015.2468576
21. Alshamsi, A. Z., & Barka, E. S. (2017). Implementation of energy efficient/lightweight encryption algorithm for wireless body area
networks. 2017 International Conference on Informatics, Health & Technology (ICIHT).doi:10.1109/iciht.2017.7899139
22. Ahmed, S., Javaid, N., Yousaf, S., Ahmad, A., Sandhu, M. M., Imran, M., Alrajeh, N. (2015). Co-LAEEBA: Cooperative link aware
and energy efficient protocol for wireless body area networks. Computers in Human Behavior, 51, 1205–1215.
doi:10.1016/j.chb.2014.12.051
23. Javaid, N., Abbas, Z., Fareed, M., Khan, Z., & Alrajeh, N. (2013). M-ATTEMPT: A New Energy-Efficient Routing Protocol for
Wireless Body Area Sensor Networks. Procedia Computer Science, 19, 224-231. doi: 10.1016/j.procs.2013.06.033
24. Navya, V., & Deepalakshmi, P. (2017). Mobility supported threshold based stability increased throughput to sink using multihop
routing protocol for link efficiency in wireless body area networks (M-TSIMPLE). 2017 IEEE International Conference on Intelligent
Techniques in Control, Optimization and Signal Processing (INCOS).doi:10.1109/itcosp.2017.8303107
25. Liu, B., Yan, Z., & Chen, C. W. (2017). Medium Access Control for Wireless Body Area Networks with QoS Provisioning and Energy
Efficient Design. IEEE Transactions on Mobile Computing, 16(2), 422–434. doi:10.1109/tmc.2016.2549008
26. Chen, Z., He, M., Liang, W., & Chen, K. (2015). Trust-Aware and Low Energy Consumption Security Topology Protocol of Wireless
Sensor Network, Journal of Sensors, 2015, 1–10. doi:10.1155/2015/716468
27. Barakah, D. M., & Ammad-uddin, M. (2012). A Survey of Challenges and Applications of Wireless Body Area Network (WBAN) and
Role of a Virtual Doctor Server in Existing Architecture. 2012 Third International Conference on Intelligent Systems Modelling and
Simulation. doi:10.1109/isms.2012.108
28. Kim, B.-S., Kim, K., & Kim, K.-I. (2017). A Survey on Mobility Support in Wireless Body Area Networks. Sensors, 17(4),
797.doi:10.3390/s17040797
29. Javaid, N., Ahmad, A., Nadeem, Q., Imran, M., & Haider, N. (2015). iM-SIMPLE: iMproved stable increased-throughput multi-hop
link efficient routing protocol for Wireless Body Area Networks. Computers in Human Behavior, 51, 1003–
1011.doi:10.1016/j.chb.2014.10.005.
Authors: David Livingston J, Kirubakaran E
Client/Server Model of Data Privacy using Extended Playfair Cipher for SaaS Applications on the
Paper Title:
Cloud
Abstract: Cloud Computing is a paradigm of distributed computing that delivers on-demand and utility-based
services to its customers. It provides a set of shared computing resources such as networking, servers, storage,
and applications in the form of services to an organization or an individual. The major benefits of cloud
computing include on-demand self-service and cost-effectiveness. For the customer, there is no up-front cost for
setting up and running the applications on the cloud. Despite the benefits provided by various cloud services,
the outsourcing of data storage and computation raise many new security issues. One of such security issues that
have to be addressed before uploading our sensitive data to the cloud is data privacy. With the cloud model,
end-users lose control over the physical location of data, because data will be stored and processed elsewhere on
the globe and not in the local computer. Hence, we need an algorithm for encrypting the data that can be stored
and retrieved from a database managed by the public cloud.

Keywords: Distributed Computing, Cloud Computing, Data Privacy, Encryption, Public Cloud.

References:

339. 1. Open Source For You, May 2018 issue.


2. David Crookes, Cloud Computing, Tata McGraw-Hill Edition, 2012 1933-
3. Dominic Betts, Scott Densmore, Ryan Dunn, Manashi Narumoto, Eugenio Pace, Matias Woloski, Developing Applications for the 193
Cloud on the Microsoft Windows Azuer Platform, Microsoft Press, 1 st Edition, 2011
4. Rania Fahim El-Gazzar, “A Literature Review on Cloud Computing Adoption Issues in Enterprises”, 2016, HAL Id: hal-01381189,
6
https://hal.inria.fr/hal-01381189
5. Frederico Durao, Jose Fernando S. Carvalho, Anderson Fonseka, Vinicius Cardoso Garcia, “A Systematic Review on Cloud
Computing”, Journal of Supercomputing, 2014, Published online: 31 January 2014, DOI: 10.1007/s11227-014-1089-x
6. Gururaj Ramachandra, Mohsin Iftikhar, Farrukh Aslam Khan, “A Comprehensive Survey on Security in Cloud Computing”, Conference
Paper, Procedia Computer Science 110 (2017) 465–472, DOI: 10.1016/j.procs.2017.06.124
7. AWS Security Best Practices, AWS Whitepaper, Published in August 2016.
8. Alessandro Agostino, Klaus Solberg Soilen, Bart Gerritsen, “Cloud Solution in Business Intelligence for SMEs – Vendor and Customer
Perspectives”, 2013, Journal of Intelligence Studies in Business, https://ojs.hh.se/index.php/JISIB/article/view/72/76
9. Nabil Giweli, “A Thesis on Enhancing Cloud Computing Security and Privacy”, 2013, School of Computing, Engineering and
Mathematics, University of Western Sydney
10. Amar Ghorbel, Mahmoud Ghorbel, Mohamed Jmaiel, “Privacy in Cloud Computing Environments: a Survey and Research Challenges”,
Journal of Supercomputing, 2017, Published online: 23 January 2017, DOI 10.1007/s11227-016-1953-y
11. Mazhar Ali, Samee U. Khan, Athanasios V. Vasilakos, “Security in Cloud Computing: Opportunity and Challenges”, Journal of
Information Sciences, 2015, Pp. 357-383, http://dx.doi.org./10.1016/j.ins.2015.01.025
12. Overview of AWS Storage Service, AWS Whitepaper, Published in December 2016.
13. P. Ravi Kumar, P. Herbert Rajb, P. Jelcianac, “Exploring Data Security Issues and Solutions in Cloud Computing”, Procedia Computer
Science 125 (2018) 691–697, DOI: 10.1016/j.procs.2017.12.089
14. Gaurav Sharma, Ajay Kakkar, “Cryptography Algorithms and approaches used for data security”, 2012, International Journal of
Scientific & Engineering Research Volume 3, Issue 6, June-2012, ISSN 2229-5518

Authors: Pradip Paul, Arunangshu Giri, Satakshi Chatterjee, Swatee Biswas


Determining the Effectiveness of ‘Cloud Computing’ on Human Resource Management by
Paper Title:
Structural Equation Modeling (SEM) in Manufacturing Sector of West Bengal, India
340. Abstract: The manufacturing industry is very much crucial for driving the economy of the nation. It has a
direct impact on the GDP of any nation and also, it is very beneficial for a country to be strong in the 1937-
manufacturing industry. This is also the case for a developing nation such as India. Hence, it is imperative for 194
the organization to effectively manage their human resources to optimally utilize them as they are the non- 2
perishable resources of the company. This could be done with the help of Cloud-Computing which is one of the
advanced fields of elastic IT (Information Technology). This technology is continuously gaining momentum as
it is relatively easier to use in E-HRM (Electronic-Human Resource Management) and also contains less initial
investment. The objective of the study is to identify the factors that have an impact on the effectiveness of
Human Resource Management by the help of Cloud computing. Various statistical tools like Exploratory Factor
Analysis and Structural Equation Modeling have been executed in this study by SPSS 21 and AMOS 21
software.

Keywords: Cloud Computing; Manufacturing Industry; Information Technology; Electronic-Human Resource


Management.

References:

1. Andrew Hill, J. M. (2014, March 7). Race to the cloud. Deloitte University Press. Retrieved from http://dupress.com/articles/hc-trends-
2014-race-to-the-cloud.
2. Asniar & Budiawan, R. (2016). Implementation of cloud computing in higher education. International Conference on Innovation in
Engineering and Vocational Education IOP Publishing. 128(2016). DOI: 10.1088/1757-899X/128/1/012022.
3. Becker, G. S. (1964). Human Capital, New York: Columbia University Press.
4. Bhadani, R. (2014). A new dimension in HRM: Cloud Computing. International Journal of Business and Management Invention. 3(7).
13-15. ISSN: 2319-8028.
5. Fan, Y. W., Wu, C. C., Chen, C. D., & Chang, C. C. (2013). A Delphi study on cloud computing adoption. Web Journal of Chinese
Management Review, 16(1), 1-17.
6. Hitt, M. A., Bierman, L., Shimizu, K., & Kochhar, R. (2001). Direct and moderating effects of human capital on strategy and
performance in professional service firms: a resource-based perspective. Academy of Management Journal, 44(1), 13-28.
http://dx.doi.org/10.2307/3069334.
7. IDC (2013). IDC forecasts worldwide public IT cloud services spending to reach nearly $108 billion by 2017 as focus shifts from
savings to innovation. Retrieved from http://www.idc.com/getdoc.jsp?containerId=prUS24298013.
8. Jaeger P. T., Lin J. and Grimes M. (2009) “Cloud computing and information policy: Computing in a policy cloud?” Journal of
Information Technology and politics, 5(3).
9. Jiang, K., Lepak, D. P., Hu, J., & Baer, J. C. (2012). How does human resource management influence organizational outcomes? A
meta-analysis investigation of mediating mechanisms. Academy of Management Journal, 55(6), 1264-1294.
http://dx.doi.org/10.5465/amj.2011.0088.
10. Khanghahi, N. & Ravanmehr, R. (2013). Cloud Computing Performance Evaluation: Issues and Challenges. International Journal on
Cloud Computing: Services and Architecture. 3(5). DOI: 10.5121/ijccsa.2013.3503.
11. Kumar, R. (2017). Cloud Technology and Human Resource Management. Annual Research Journal of SCMS, Pune. 5(2017). 82-91.
ISSN: 2348-0661.
12. Kumar, R. (2017). Cloud Technology and Human Resource Management. Annual Research Journal of Symbiosis Centre for
Management Studies, Pune. 5(2017). 82-91. ISSN: 2348-0661.
13. Nazir, M. (2012). Cloud Computing: Overview and current research challenges. IOSR Journal of Computer Engineering. 8(1). 14-22.
ISSN: 2278-0661.
14. Odun-Ayo, I., Misra, S., Omoregbe, N., Onebere, E., Bulama, Y. & Damasevicius, R. (2017). Cloud based security driven human
resource management system. Advances in Digital Technologies. DOI: 10.3233/978-1-61499-773-3-96.
15. Sharma, T. & Banga, V.K. (2013). Efficient and enhanced algorithm in Cloud Computing. International Journal of Soft Computing and
Engineering. 3(1). 385-390. ISSN: 2231-2307.
16. Staten, J. (2008) “Is Cloud Computing Ready for the Enterprise?” Technical report, Forrester Research, Inc., Cambridge, USA.
17. Wright, P.M., McCormick, B., Sherman, W.S. & McMahan, G.C. (1997). The role of human resource practices in Petro Chemical
Refinery Performance. CAHRS Working Paper Series. DOI: http://digitalcommons.ilr.cornell.edu/cahrswp/153.
Authors: Nandana Prabhu, Deepak Bhoir, Nita Shanbhag

Paper Title: Diabetic Retinopathy Screening using Machine Learning for Hierarchical Classification
Abstract: Diabetic Retinopathy is a consequence of prolonged unaddressed diabetes. It is currently diagnosed
by the subjective clinical examination and manual grading of the fundus images by the ophthalmologists. This
disease is progressive in nature. Hence early detection and treatment go a long way in helping the patients fight
the dire consequences of the disease. Given the fact that number of ophthalmologists is very less as compared to
the patients, a cost-effective, computer assisted, automated retina analysis system is highly desirable for the rural
health care. This paper proposes an automatic Diabetic Retinopathy detection system based on the presence of
bright lesions on the retina which is one of the symptoms of Diabetic Retinopathy. Initially the optic disc is
removed from the fundus image as its brightness is similar to that of the bright lesions. Exudates are extracted
and its various features are obtained. Later, feature based hierarchical classification is performed for detection of
different stages of the disease. This method is based on the same logical steps as followed by the
ophthalmologists and hence assures more accurate classification results. Two methodologies, Random Forest
341. algorithm and Artificial Neural Network are explored and accuracy, sensitivity and specificity are evaluated at 1943-
each stage of classification. The former outperformed the latter. The accuracy obtained using Random Forest are 194
100%, 85.71% and 87.5% and Artificial Neural network are 100%,78.5% and 66.67% for Stage 1, Stage 2 and 8
Stage 3 respectively.

Keywords: Artificial Neural Network, Exudates, Non Proliferative, Random Forest, Retinopathy.

References:

1. K. Vishwanath, D. D. Murray McGavin “Diabetic retinopathy: clinical findings and management,” Review Article, Community Eye
Health, vol. 16, no. 46, 2003, pp.21-24.
2. B. Bowling, “Kanski's Clinical Ophthalmology-A systematic Approach,” 8th Edition, ELSEVIER
3. S. Wild, G. Roglic, A. Green, R. Sicree, H. King, “Global prevalence of diabetes: estimates for the year 2000 and projections for
2030,” Diabetes Care 2004; vol. 27, issue 5, May, 2004, pp. 1047-1053. [PMID: 15111519]
4. J. K. H. Goh, S. S. Sim, G. S. W. Tan, “Retinal Imaging Techniques for Diabetic Retinopathy Screening,” J. Diabetes Sci. and Tech.,
vol. 10, no.2, 2016, pp. 282–294. DOI: 10.1177/1932296816629491
5. Decenciere, Etienne, X. Zhang, G. Cazuguel, L. Bruno, B. Cochener, C. Trone, P. Gain, “Feedback on a publicly distributed image
database: the MESSIDOR database”, Image Analysis and Stereology, vol. 33, no 3, Aug 2014, pp: 231-234.Availblea t
http://dx.doi.org/10.5566/ias.1155.
6. S.W. Franklin, S. E. Rajan, “Diagnosis of Diabetic Retinopathy by employing image processing technique to detect exudates in
retinal images”, IET Image Processing, vol. 8, issue. 10, 2014, pp. 601-609. doi : 10.1049/iet-ipr.2013.0565.
7. A. Sopharak, B. Uyyanonvara, S. Barman, T. H. Williamson, “Automatic detection of diabetic retinopathy exudates from non-dilated
retinal images using mathematical morphology methods,” Comp. Med. Img. and Graphics, ELSEVIER 32 , 2008, pp. 720–727.
doi:10.1016/j.compmedimag.2008.08.009
8. D. A. Godse, D. S. Bormane, “Automated Localization of Optic Disc in Retinal Images,” IJACSA, vol. 4, no. 2, 2013
9. R. Kamble, M. Kokare, G. Deshmukh, F. A. Hussin, F. Meriaudeau, Localization of optic disc and fovea in retinal images using
intensity-based line scanning analysis,” J. Comp. in Bio. And Med., ELSEVIER 87, 2017, pp. 382-396.
htttp://dx.doi.org/10.1016/j.compbiomed.2017.04.016
10. R. Wang, L. Zheng, C. Xiong, C. Qiu, H. Li, X. Hou, B. Sheng, P. Li, Q. Wu, “Retinal optic disc localization using convergence
tracking of blood vessels,” Multimedia Tools Applications, Springer Science + Business Media, New York 2016. DOI
10.1007/s11042-016-4146-z
11. S. Bharkad, “Automatic segmentation of optic disk in retinal images”, Biomed. Sig Proc. Cont.. 2017, vol. 31, pp. 483–498.
http://dx.doi.org/10.1016/j.bspc.2016.09.009
12. D. Marin, M. E. Gegundez-Aries, A. Suero, J. M. Bravo, “Obtaining optic disc center and pixel region by automatic Thresholding
methods on morphologically processed fundus images”, ELSEVIER, Comp. Meth. And programs in Biomed. 118, 2015, pp. 173-185.
http://dx.doi.org/10.1016/j.cmpb.2014.11.003
13. M. B. Patwari, Dr. R. R. Manza,Y. M. Rajput, M. Saswade, N. K. Deshpande, “Automatic Detection of Retinal Venous Beading and
Tortuosity by using Image Processing Techniques,” IJCA , Feb. 2014.
14. S. Badshaa, A.W. Reza, K. G. Tan, “A new Blood Vessel Extraction technique Using Edge Enhancement and Object Classification,”
Springer –J. of Dig. Img, 2013, pp 1107-1115. DOI 10.1007/s10278-013-9585-8
15. M. Kavitha, S. Palani,” A new fast Curvelet Transform with a morphological operations based method for extraction of retinal blood
vessels using Graphical User Interface,” Intl. J. of Sci. and Engg. Research, vo3, iss.6, June 2012.
16. B. D. Barkana, I. Saricicek, B. Yildirim, “Performance analysis of descriptive statistical features in retinal vessel segmentation via
fuzzy logic, ANN, SVM, and classifier fusion, ”ELSEVIER Knowledge-Based Sys. 118, 2017, pp. 165–176.
http://dx.doi.org/10.1016/j.knosys.2016.11.022
17. A. Salazar-Gonzalez, D. Kaba, Y. Li, and X. Liu, “Segmentation of the Blood Vessels and Optic Disk in Retinal Images,” IEEE J. of
Biomed. And Health Informatics, vol. 18, no. 6, Nov. 2014, pp 1874-1886.
Digital Object Identifier 10.1109/JBHI.2014.2302749
18. L. C. Rodrigues, M. Marengoni, “Segmentation of optic disc and blood vessels in retinal images using wavelets, mathematical
morphology ,and Hessian-based multi-scale filtering, ” Biomed. Sig. Proc. and Control ELSEVIER 36, 2017, pp. 39–49.
http://dx.doi.org/10.1016/j.bspc.2017.03.014
19. J. H. Tan, U. R. Acharya, S. V. Bhandary, K. C. Chua, S. Sivaprasad, “Segmentation of optic disc, fovea and retinal vasculature using a
single convolutional neural network,” J. of Comp. Sci. 20 , 2017, pp.70–79. http://dx.doi.org/10.1016/j.jocs.2017.02.006.
20. T. Jaya, J. Dheeba2, N. Albert Singh, “ Detection of Hard Exudates in Colour Fundus Images Using Fuzzy Support Vector Machine-
Based Expert System,” Springer, J Digit Imaging, 28:761–768, 2015. DOI 10.1007/s10278-015-9793-5
21. R. Srivastava, J. Liu, T-Y Wong,“ Detecting Retinal Microaneurysms and Hemorrhages with Robustness to the Presence of Blood
Vessels,” ,Article in Computer Methods and Programs in Biomed., Oct. 2016, DOI: 10.1016/j.cmpb.2016.10.017
22. C. Sinthanayothin, V. Kongbunkiat, S. Phoojaruenchanachai, A. Singalavanija, “Automated Screening System for Diabetic
Retinopathy,” Proc. of the 3rd Intl Symposium on Image and Sig. Proc. and Analysis, 2003, pp915-920.
23. P.Prasanna, S. Jain, N. Bhagatt, A. Madabhushi, “Decision Support System for Detection of Diabetic Retinopathy Using
Smartphones,” 7th Intl. Conf. on Pervasive Comp. Tech. for Healthcare and Workshops, 2013. DOI
10.4108/icst.pervasivehealth.2013.252093
24. Md. A.B Jahiruzzaman, M.A.Hossain, “Detection and Classification of Diabetic Retinopathy Using K Means Clustering and Fuzzy
logic” IEEE 2015, pp 534-538. DOI: 10.1109/ICCITechn.2015.7488129
25. D. Ning, L. Yafen, “Automated Identification of Diabetic Retinopathy Stages Using Support vector Machine,” Proc. of 23rd Chinese
Cont. Conf., July 26-28, Xi’an, China, 2013, pp. 3882-3886.
26. H. Tjandrasa, R. E. Putra, A. Y. Wijaya, I. Ashanti, “ Classification of Non-Proliferative Diabetic Retinopathy based on Hard Exudates
Using Soft Margin SVM,” IEEE Intl. Conf. on Control Sys., Computing and Engg, 29 Nov. -1 Dec. 2013, Penang, Malaysia, pp. 376-
380.
27. S. R. Sarni, J. Chisina, P. Vasile, S. James , “Automatic detection of microaneurysms in fundus images for Diabetic Retinopathy
screening,” Springer Neural Networks and Appl., June 2015, pp1149-1164. DOI 10.1007/s00521-015-1929-5
28. B. Antel, A. Hajdu, “ An ensemble –based system for microaneurysms detection and diabetic retinopathy grading,” Biomedical
Engineering, IEEE Transactions on Biomedical Engineering, Vol. 59, no. 6, 2012. pp. 1720–1726.
29. S. Morales, K. Engan, V. Naranjo, and A. Colomer,” Retinal Disease Screening through Local Binary Patterns,” IEEE Journal Of
Biomedical And Health Informatics, Vol. 21, No. 1, Jan. 2017, pp. 184-192. DOI: 10.1109/JBHI.2015.2490798
30. G. Nikita, C. Mehmet, H. R. Bryan, “Machine learning Identification of Diabetic Retinopathy”, IEEE Conf. Sig. Proc. in Med. and
Biol. Symposium, USA, 2014.
31. H. Pratt, F. Coenen, D. M. Broadbentc, S. P Hardinga, Y. Zheng, “Convolutional Neural Networks for Diabetic Retinopathy,” Intl.
Conf. On MIUA 2016, July 2016, Loughborough, UK, ELSEVIER, Science direct, Proc. Computer Science 90, 2016, pp. 200 –
205.doi: 10.1016/j.procs.2016.07.014
32. N. A. Prabhu, D.V. Bhoir, U. Rao, “Template matching technique for Optic Disc localization in Fundus Image”, IEEE fifth Intl Conf.
on Computing for Sustainable Global Development, BVICAM, India, 1143-1147, Mar., 2018.

Authors: E. Sophiya, S. Jothilakshmi

Paper Title: Audio Tagging System using Deep Learning Model

Abstract: Deep learning has been getting more attention towards the researchers for transforming input data
into an effective representation through various learning algorithms. Hence it requires a large and variety of
datasets to ensure good performance and generalization. But manually labeling a dataset is really a time
342. consuming and expensive process, limiting its size. Some of websites like YouTube and Freesound etc. provide 1949-
large volume of audio data along with their metadata. General purpose audio tagging is one of the newly 195
proposed tasks in DCASE that can give valuable insights into classification of various acoustic sound events. 7
The proposed work analyzes a large scale imbalanced audio data for a audio tagging system. The baseline of the
proposed audio tagging system is based on Convolutional Neural Network with Mel Frequency Cepstral
Coefficients. Audio tagging system is developed with Google Colaboratory on free Telsa K80 GPU using keras,
Tensorflow, and PyTorch. The experimental result shows the performance of proposed audio tagging system
with an average mean precision of 0.92.
Keywords: Audio Processing, Audio Features, Deep Learning, Acoustic event detection, Audio Tagging,
Google Colab, GPU.

References:

1. Jongpil Lee and Juhan Nam, “Multi-Level and Multi-Scale Feature Aggregation using Pre trained Convolutional Neural Networks for
Music Auto-Tagging”, IEEE Signal Processing Letters, Vol.24, No. 8, Aug 2017.
2. Qiuqiang Kong, Yong Xu, Wenwu Wang, Mark D. Plumbley, “A Joint Detection-Classification Model For Audio Tagging Of Weakly
Labelled Data”, International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE, 2017.
3. Yong Xu, Qiuqiang Kong, Qiang Huang, Wenwu Wang, and Mark D. Plumbley, “Convolutional Gated Recurrent Neural Network
Incorporating Spatial Features for Audio Tagging”, IEEE, 2017.
4. Turab Iqbal, Qiuqiang Kong, Mark D. Plumbley, Wenwu Wang, “General-Purpose Audio Tagging from Noisy Labels using
Convolutional Neural Networks” Detection and Classification of Acoustic Scenes and Events, 2018.
5. Matthias Dorfer, and Gerhard Widmer, “Training General-Purpose Audio Tagging Networks with Noisy Labels and Iterative Self-
Verification”, Detection and Classification of Acoustic Scenes and Events, 2018.
6. Nam Kyum Kim, Jeong Hyeon Yang, Jeong Eun Lim, Jinson Park, Ji Hyun Park, and Hong Kook Kim, “ Gist_Wisenetai Audio
Tagger Based On Concatenated Residual Network For Dcase 2018 Challenge Task 2”, Detection and Classification of Acoustic Scenes
and Events, 2018.
7. Qingkai WEI, Yanfang LIU, and Xiaohui RUAN, “A Report on Audio Tagging with Deeper CNN, 1d-Convnet and 2d-Convnet”,
Detection and Classification of Acoustic Scenes and Events, 2018.
8. Marcel Lederle and Benjamin Wilhelm, “Combining High-Level Features of Raw Audio and Spectrograms for Audio Tagging”,
Detection and Classification of Acoustic Scenes and Events, 2018.
9. Juhan Nam, Jorge Herrera, and Kyogu Lee, “A Deep Bag-of-Features Model for Music Auto-Tagging”, CoRR, 2015.
10. Jongpil Lee Jiyoung Park Keunhyoung Luke Kim Juhan Nam, “Sample-Level Deep Convolutional Neural Networks for Music Auto-
Tagging using raw waveforms”, 14th Sound & Music Computing Conference, 2017.
11. Yann LeCun, Yoshua Bengio, and Geoffrey Hinton, “Deep Learning”, Nature, 2015.

Authors: Mahima Shanker Pandey, Sudhir Singh Soam, Surya Prakash Tripathi

Paper Title: Recognition of X-rays bones: Challenges in the Past, Present and Future
Abstract: Image processing tool is a key role in medical uses, by extracting anatomical features the contouring
of the regions from medical images. The discovery of bone sketch from X-ray images has recently introduced a
new dimension in the literature as it proves to be an important step of radiological imaging analysis. X-ray
images are segmented to study bone skeleton where the image is split into several parts, to examine the fracture
of bones, and to plan for treatment before surgery. This report's, purpose is to survey digital image splitting
methods. In image segmentation, research analysis is important for categories and it is important to provide an
overview of assistive segmentation techniques with highlighting advantage and disadvantage.

Keywords: Edge Detection, Medical imaging, Medical image segmentation, Wrist X-Ray Processing.

References:

1. www.sciencedirect.com
2. Jena, Shweta, Barnali Sahu, and Alok Kumar Jagadev. "Analysis of Medical X-ray Bone Images Using Image Segmentation." In
Intelligent Computing, Communication and Devices, pp. 787-794. Springer India, 2015.
3. R. Sivakumar, M. Karnan, “Intelligent optimization techniques for mammogram Image analysis through bilateral subtraction”,
IEEE International Conference of Computational Intelligence and Computing Research, pp.1-4, 2010.
4. Pathak, A, Pal, K and King, R A ‘Syntactic recognition of skeletal maturity’, Patt.Recogn. Lett., Vol 2 (1984) pp193-197
5. Pathak, A and Pal, K ‘Fuzzy grammars in syntactic recognition of skeletal maturity from x-rays’, IEEE Trans. Syst. Man & Cybern., Vol
16 (1986)
343. 6. Kwabwe, A, Pal, K and King, R A ‘Recognition of bones from x-rays of the hand’, Int. J. Syst. & Sci., Vol 16 No 4 (1985) pp 403-413
7. Cristina Stolojescu-Crisan, Stefan Holban, “A Comparison of X-Ray Image Segmentation Techniques”, Advances in Electrical 1958-
and Computer Engineering, Volume 13, Number 3, pp: 85-92, 2013. 196
8. Alireza Norouzi, Mohd Shafry Mohd Rahim, Ayman Altameem, Tanzila Saba, Abdolvahab Ehsani Rad, Amjad Rehman & Mueen 6
Uddin (2014) “Medical Image Segmentation Methods, Algorithms, and Applications”, IETE Technical Review, 31:3, 199-213.
9. Dzung L. Pham, Chenyang Xu, and Jerry L. Prince, “Current Methods in Medical Image Segmentation”, Annual Review of
Biomedical Engineering 2000, Volume 2, pp: 315-337,
10. Rutvi Shah, Priyanka Sharma " Bone Segmentation from X-Ray Images: Challenges and Techniques" Springer Nature Singapore Pte
Ltd. 2018,
11. Walter Huda, R. Brad Abrahams "Radiographic Techniques, Contrast, and Noise in X-Ray Imaging" AJR 2015; 204:W126–W131
12. Vittorio Murino, Enrico Puppo "Image Analysis and Processing — ICIAP 2015" 18th International Conference, Genoa, Italy, September
7-11, 2015, Proceedings, Part 2
13. Rafael C. Gonzalez, Richard E. Woods -"Digital Image Processing" fourth edition, Pearson Education, ISBN: 81-7808-629-8
14. V. Zharkova, S. Ipson, J. Aboudarham and B. Bentley, “Survey of image processing techniques”, EGSO internal deliverable, Report
number EGSO 5-D1_F03-20021029, October, 2002, 35p.
15. J. C. Russ. Image Processing Handbook, the Sixth Edition. CRC Press Taylor & Francis Group, 2011.
16. I. N. Bankman. Handbook of Medical Imaging Processing and Analysis. Academic Press, 2000.
17. G. Dougherty. Medical Image Processing Techniques and Applications. Springer, 2011.
18. P.K. Sahoo, S. Soltani, A.K.C. Wong , Y. Chen., A Survey of Thresholding Techniques, Computer Graphics and Image Process.,
41(1988) 233-260.
19. Devi, H.K.A., (2006). Thresholding: A Pixel-Level Image Processing Methodology Preprocessing Technique for an OCR System for the
Brahmi Script. Ancient Asia. 1, pp.161–165.
20. Aziz Makandar, Bhagirathi Halalli (2015) Threshold Based Segmentation Technique for Mass Detection in Mammography ,Volume 11,
Number 6, November 2016,doi: 10.17706/jcp.11.6.472-478
21. J.S. Weszka, A. Rosenfeld, Threshold evaluation techniques, IEEE Trans. Systems, Man and Cybernetics, SMC-8(8) (1978) 627-629.
22. P.W. Palumbo, P. Swaminathan, S.N. Srihari, Document image binarization: Evaluation of algorithms, Proc. SPIE Applications
ofDigital Image Proc., SPIE Vol. 697, (1986), pp:278-286.
23. S.U. Le, S.Y. Chung, R.H. Park, A Comparative Performance Study of Several Global Thresholding Techniques for
Segmentation, Graphical Models and Image Processing, 52 (1990) 171-190
24. C.A. Glasbey, An analysis of histogram-based thresholding algorithms, Graphical Models and Image Processing, 55 (1993) 532-537.
25. G.K. Manos, A.Y. Cairn, I. W. Rickets and D. Sinclair, “Segmenting radiographs of the hand and wrist”, Elsevier Computer Methods
and Programs in Biomedicine, vol. 43 (3-4), pp.227-237, 1993.
26. Sándor Szénási : Medical Image Segmentation with Split-and-Merge Method
27. C.Harris, M.Stephens. “A Combined Corner and Edge Detector”. 1988
28. D. Feng, “Segmentation of Bone Structures in X-ray Image”, PhD thesis, School of Computing National University of Singapore, under-
guidance of Dr. Leow Wee Kheng (Associate Professor), 2006.
29. M. Kulkarni,“X-ray image segmentation using active shape models”, Master's thesis, University of Cape Town, 2008.
30. A. A. Tirodkar, “A Multi-Stage Algorithm for Enhanced X-Ray Image Segmentation”, International Journal of Engineering Science and
Technology (IJEST), Vol. 3 No. 9, pp. 7056-7065, 2011.
31. P. Annangi, S. Thiruvenkadam, A. Raja, H. Xu, X. W. Sun, and L. Mao “A region based active contour method for X-ray lung
segmentation using prior shape and low level features”, Proc. of the International Symposium on Biomedical Imaging, pp. 892- 895,
2010.
32. B. R. Abidi, J. Liang and M. A. Abidi,"Automatic x-ray image segmentation for threat detection ", Proc. of the Fifth International
Conference Computational Intelligence and Multimedia Applications, 2003.
33. B. N. Li, C. K. Chui, S. Chang, and S. H. Ong, “Integrating spatial fuzzy clustering with level set methods for automated medical image
segmentation", Elsevier - Computers in Biology and Medicine, no.10, pp.1-10, 011.
34. L. Florea, C. Florea, C. Vertan and A. Sultana, “Automatic Tools for Diagnosis Support of Total Hip Replacement Follow-up ",
Advances in Electrical and Computer Engineering, vol.11, no.4, pp.55- 63, 2011.
35. I. El-Feghi, “X-ray image segmentation using auto adaptive fuzzy index measure”, Proc. of the 47th Midwest Symposium on Circuits
and Systems, vol.3, pp. 499-502, 2004.
36. S. K. Mahendran and S. S. Baboo, “Enhanced automatic X-ray bone image segmentation using wavelets and morphological operators”,
Proc. of the International Conference on Information and Electronics Engineering, 2011.
37. E. H. Said, G. Fahmy, D. Nassar, and H.Ammar, “Dental X-ray Image Segmentation”, Proc. of the SPIE, vol. 5404, pp. 409-417, 2004.
38. Bin Zhou, Xiao-Lin Yang, Rui Liu and Wei Wei, 2010. Image Segmentation with Partial Differential Equations. Information
Technology Journal, 9: 1049-1052.
39. S.Z. Li. Markov random field modeling in computer vision. Springer, 1995.
40. K.Held, E.R.Kops, B.J.Krause,W.M.Wells,R.Kikinis,et al. Markov random field segmentation of brain MR images. IEEE T. Med.Imag.,
16(6),1997
41. J. Jiang, P. Trundle ,J.Ren "Medical image analysis with artificial neural networks" 2010
42. Alex Krizhevsky, Ilya Sutskever, Geoffrey E. Hinton "ImageNet Classification with Deep Convolutional Neural Networks"
43. Jang Hyung Lee, PhD, Kwang Gi Kim"Applying Deep Learning in Medical Images:The Case of Bone Age Estimation" Healthc Inform
Res. 2018 January;24(1):86-92.
44. S. Binitha, S Siva Sathya, “A Survey of Bio inspired Optimization Algorithms”, International Journal of Soft Computing and
Engineering (IJSCE), ISSN: 2231-2307, vol.2, Issue 2, May 2012.
45. S. Linying, B .Sharp, and C.C. Chibelushi,"Knowledge-Based Image Understanding: A Rule-Based Production System for X-Ray
Segmentation", Proc. of the 4th International Conference on Enterprise Information Systems, vol. 1, pp. 530 - 533, Spain, 2002.

Authors: N. K. Kund

Paper Title: Computational Modeling on Fuel Cell Cooling with Water Based Copper Oxide Nanofluid
Abstract: In the smart investigation, CFD programmes got developed and executed with water-CuO
nanofluid to envision the thermal concerns of fuel cell. The convective governing equalities of mass, force and
drive are computed for predicting the thermal issues of fuel cell. The time step selected throughout the intact
computation is 0.0001 s. The soundings affect CFD forecasts of temperature field, temperature contour plus
fluid-solid boundary temperature of fuel cell. The fluid-solid boundary temperature of fuel cell is noticed as 340
K. This stands far less than the hazardous limit of 356 K temperature desired for the objective of beating thermal
cataclysm of fuel cell. The temperature of water-CuO nanofluid stands peak contiguous to the fuel cell vicinity.
Additionally, the temperature of water-CuO nanofluid gently drops with improvement in remoteness from fuel
cell. Subsequently, this becomes surrounding temperature within the distant arena precinct. The equivalent
temperature curve stands accessible. In addition, the congruent plot of temperature against distance from fuel
cell stands publicized. The establishment of CFD revelations stay alongside the backgrounds of capacities.

Keywords: Fuel Cell, Cooling, CFD Codes, Water-CuO Nanofluid.

References:
344.
1967-
1. N. K. Kund, P. Dutta, 2010, Numerical simulation of solidification of liquid aluminium alloy flowing on cooling slope, Trans.
Nonferrous Met. Soc. China, Vol. 20, pp. s898-s905. 197
2. N. K. Kund, P. Dutta, 2012, Scaling analysis of solidification of liquid aluminium alloy flowing on cooling slope, Trans. Indian 0
Institute of Metals, Vol. 65, pp. 587-594.
3. N. K. Kund, 2014, Influence of melt pouring temperature and plate inclination on solidification and microstructure of A356 aluminum
alloy produced using oblique plate, Trans. Nonferrous Met. Soc. China, Vol. 24, pp. 3465−3476.
4. N. K. Kund, 2015, Influence of plate length and plate cooling rate on solidification and microstructure of A356 alloy produced by
oblique plate, Trans. Nonferrous Met. Soc. China, Vol. 25, pp. 61−71.
5. N. K. Kund, P. Dutta, 2015. Numerical study of solidification of A356 aluminum alloy flowing on an oblique plate with experimental
validation, J Taiwan Inst. Chem. Ers., Vol. 51, pp. 159−170.
6. N. K. Kund, P. Dutta, 2016, Numerical study of influence of oblique plate length and cooling rate on solidification and
macrosegregation of A356 aluminum alloy melt with experimental comparison, J. Alloys Compd., Vol. 678, pp. 343−354.
7. N. K. Kund, 2018, Effect of tilted plate vibration on solidification and microstructural and mechanical properties of semisolid cast and
heat-treated A356 Al alloy, Int. J. Adv. Manufacturing Technol., Vol. 97, pp. 1617−1626.
8. N. K. Kund, 2019, EMS route designed for SSM processing, International Journal of Engineering and Advanced Technology, Vol. 8,
pp. 382−384.
9. N. K. Kund, 2019, Cooling slope practice for SSF technology, International Journal of Engineering and Advanced Technology, Vol. 8,
pp. 410−413.
10. N. K. Kund, 2019, Comparative ways and means for production of nondendritic microstructures, International Journal of Innovative
Technology and Exploring Engineering, Vol. 8, pp. 534−537.
11. N. K. Kund, 2019, Simulation of electronics cooling deploying water-zinc oxide nanofluid, International Journal of Recent Technology
and Engineering, Vol. 7, pp. 1076−1078.
12. N. K. Kund, 2019, Numerical studies on fuel cell cooling introducing water-copper nanofluid, International Journal of Recent
Technology and Engineering, Vol. 7, pp. 1079−1081.
13. N. K. Kund, 2019, Computational modeling of fuel cell expending water-zinc oxide nanofluid, International Journal of Innovative
Technology and Exploring Engineering, Vol. 8, pp. 424−426.
14. N. K. Kund, 2019, Investigations on modeling and simulation of electronics cooling exhausting water-aluminum nanofluid,
International Journal of Innovative Technology and Exploring Engineering, Vol. 8, pp. 660−663.
15. N. K. Kund, 2019, Numerical study on effect of nozzle size for jet impingement cooling with water-Al2O3 nanofluid, International
Journal of Engineering and Advanced Technology, Vol. 8, pp. 736−739.
16. N. K. Kund, 2019, Experimental investigations on impacts of nozzle diameter on heat transfer behaviors with water jet impingement,
International Journal of Engineering and Advanced Technology, Vol. 8, pp. 745−748.
17. N. K. Kund, 2019, Comparative CFD studies on jet impingement cooling using water and water-Al2O3 nanofluid as coolants,
International Journal of Innovative Technology and Exploring Engineering, Vol. 8, pp. 545−548.
18. N. K. Kund, 2019, Experimental studies on effects of jet Reynolds number on thermal performances with striking water jets,
International Journal of Innovative Technology and Exploring Engineering, Vol. 8, pp. 2195−2198.
19. N. K. Kund, D. Singh, 2019, CFD studies on heat transfer and solidification progress of A356 al alloy matrix and Al2 O3 nanoparticles
melt for engineering usages, International Journal of Innovative Technology and Exploring Engineering, Vol. 8, pp. 2043−2046.
20. N. K. Kund, S. Patra, 2019, Simulation of thermal and solidification evolution of molten aluminum alloy and SiC nanoparticles for
engineering practices, International Journal of Innovative Technology and Exploring Engineering, Vol. 8, pp. 2047−2050.
Authors: N. K. Kund

Paper Title: Modeling and Simulation on IC Cooling using Water Centered SiO2, TiC and MgO Nanofluids
Abstract: In stubborn courtesy, CFD codes became established and executed with water based SiO2, TiC and
MgO nanofluids to envision the thermal alarms of ICs. The convective governing equalities of mass, force and
drive are computed for envisaging the thermal issues of ICs. The time pace selected throughout the intact
computation is 0.0001 s. The soundings affect CFD forecasts of temperature curve, temperature arena plus fluid-
solid boundary temperature of IC. Corresponding fluid-solid boundaries temperatures of IC are viewed as 349,
310 and 328 K for water based SiO2, TiC and MgO nanofluids, respectively. The temperature of water-TiC
nanofluid stands peak contiguous to the IC locality as it stands far less than the chancy temperature limit of 356
K. Further, the temperature of water-TiC nanofluid gently drops with improvement in aloofness from IC.
Afterwards, this becomes surrounding temperature in the distant arena precinct. The analogous tinted
temperature curve stands accessible. Besides, the harmonizing graph of temperature against distance from IC
remains revealed. The realization of CFD indulgent endure proximate to the services of miens.

Keywords: CFD Codes, Thermal Control, SiO2, TiC and MgO Nanofluids.

References:

1. N. K. Kund, P. Dutta, 2010, Numerical simulation of solidification of liquid aluminium alloy flowing on cooling slope, Trans.
Nonferrous Met. Soc. China, Vol. 20, pp. s898-s905.
2. N. K. Kund, P. Dutta, 2012, Scaling analysis of solidification of liquid aluminium alloy flowing on cooling slope, Trans. Indian Institute
of Metals, Vol. 65, pp. 587-594.
3. N. K. Kund, 2014, Influence of melt pouring temperature and plate inclination on solidification and microstructure of A356 aluminum
alloy produced using oblique plate, Trans. Nonferrous Met. Soc. China, Vol. 24, pp. 3465−3476.
4. N. K. Kund, 2015, Influence of plate length and plate cooling rate on solidification and microstructure of A356 alloy produced by
oblique plate, Trans. Nonferrous Met. Soc. China, Vol. 25, pp. 61−71.
345. 5. N. K. Kund, P. Dutta, 2015. Numerical study of solidification of A356 aluminum alloy flowing on an oblique plate with experimental 1971-
validation, J Taiwan Inst. Chem. Ers., Vol. 51, pp. 159−170.
6. N. K. Kund, P. Dutta, 2016, Numerical study of influence of oblique plate length and cooling rate on solidification and macrosegregation 197
of A356 aluminum alloy melt with experimental comparison, J. Alloys Compd., Vol. 678, pp. 343−354. 5
7. N. K. Kund, 2018, Effect of tilted plate vibration on solidification and microstructural and mechanical properties of semisolid cast and
heat-treated A356 Al alloy, Int. J. Adv. Manufacturing Technol., Vol. 97, pp. 1617−1626.
8. N. K. Kund, 2019, EMS route designed for SSM processing, International Journal of Engineering and Advanced Technology, Vol. 8, pp.
382−384.
9. N. K. Kund, 2019, Cooling slope practice for SSF technology, International Journal of Engineering and Advanced Technology, Vol. 8,
pp. 410−413.
10. N. K. Kund, 2019, Comparative ways and means for production of nondendritic microstructures, International Journal of Innovative
Technology and Exploring Engineering, Vol. 8, pp. 534−537.
11. N. K. Kund, 2019, Simulation of electronics cooling deploying water-zinc oxide nanofluid, International Journal of Recent Technology
and Engineering, Vol. 7, pp. 1076−1078.
12. N. K. Kund, 2019, Numerical studies on fuel cell cooling introducing water-copper nanofluid, International Journal of Recent
Technology and Engineering, Vol. 7, pp. 1079−1081.
13. N. K. Kund, 2019, Computational modeling of fuel cell expending water-zinc oxide nanofluid, International Journal of Innovative
Technology and Exploring Engineering, Vol. 8, pp. 424−426.
14. N. K. Kund, 2019, Investigations on modeling and simulation of electronics cooling exhausting water-aluminum nanofluid, International
Journal of Innovative Technology and Exploring Engineering, Vol. 8, pp. 660−663.
15. N. K. Kund, 2019, Numerical study on effect of nozzle size for jet impingement cooling with water-Al2O3 nanofluid, International
Journal of Engineering and Advanced Technology, Vol. 8, pp. 736−739.
16. N. K. Kund, 2019, Experimental investigations on impacts of nozzle diameter on heat transfer behaviors with water jet impingement,
International Journal of Engineering and Advanced Technology, Vol. 8, pp. 745−748.
17. N. K. Kund, 2019, Comparative CFD studies on jet impingement cooling using water and water-Al2O3 nanofluid as coolants,
International Journal of Innovative Technology and Exploring Engineering, Vol. 8, pp. 545−548.
18. N. K. Kund, 2019, Experimental studies on effects of jet Reynolds number on thermal performances with striking water jets,
International Journal of Innovative Technology and Exploring Engineering, Vol. 8, pp. 2195−2198.
19. N. K. Kund, D. Singh, 2019, CFD studies on heat transfer and solidification progress of A356 al alloy matrix and Al2 O3 nanoparticles
melt for engineering usages, International Journal of Innovative Technology and Exploring Engineering, Vol. 8, pp. 2043−2046.
20. N. K. Kund, S. Patra, 2019, Simulation of thermal and solidification evolution of molten aluminum alloy and SiC nanoparticles for
engineering practices, International Journal of Innovative Technology and Exploring Engineering, Vol. 8, pp. 2047−2050.

Authors: N. K. Kund
Paper Title: CFD Simulation on IC Thermal Cooling through Water Involved TiO2, AlN and CuO Nanofluids
Abstract: In persevering courteousness, CFD codes got developed and run with water based TiO2, AlN and
CuO nanofluids to envision the thermal alarms of ICs. The convective governing equalities of mass, force and
drive are computed for envisaging the thermal issues of ICs. The time pace selected throughout the intact
computation is 0.0001 s. The soundings affect CFD forecasts of temperature curve, temperature arena plus fluid-
solid boundary temperature of IC. Corresponding fluid-solid boundaries temperatures of IC are viewed as 351,
312 and 338 K for water based TiO2, AlN and CuO nanofluids, respectively. The temperature of water-AlN
nanofluid stands peak contiguous to the IC locality as it stands far less than the chancy temperature limit of 356
K. Further, the temperature of water-AlN nanofluid gently drops with improvement in aloofness from IC.
Afterwards, this becomes surrounding temperature in the distant arena precinct. The analogous tinted
temperature curve stands accessible. In addition, the congruent plot of temperature verses distance from IC stays
publicized. The apprehension of CFD lenient stand adjacent to the facilities of expressions.

Keywords: CFD Codes, Thermal Control, TiO2, AlN and CuO Nanofluids.

References:

1. N. K. Kund, P. Dutta, 2010, Numerical simulation of solidification of liquid aluminium alloy flowing on cooling slope, Trans.
Nonferrous Met. Soc. China, Vol. 20, pp. s898-s905.
2. N. K. Kund, P. Dutta, 2012, Scaling analysis of solidification of liquid aluminium alloy flowing on cooling slope, Trans. Indian
Institute of Metals, Vol. 65, pp. 587-594.
3. N. K. Kund, 2014, Influence of melt pouring temperature and plate inclination on solidification and microstructure of A356 aluminum
alloy produced using oblique plate, Trans. Nonferrous Met. Soc. China, Vol. 24, pp. 3465−3476.
4. N. K. Kund, 2015, Influence of plate length and plate cooling rate on solidification and microstructure of A356 alloy produced by
oblique plate, Trans. Nonferrous Met. Soc. China, Vol. 25, pp. 61−71.
5. N. K. Kund, P. Dutta, 2015. Numerical study of solidification of A356 aluminum alloy flowing on an oblique plate with experimental 1976-
validation, J Taiwan Inst. Chem. Ers., Vol. 51, pp. 159−170.
346. 6. N. K. Kund, P. Dutta, 2016, Numerical study of influence of oblique plate length and cooling rate on solidification and 198
macrosegregation of A356 aluminum alloy melt with experimental comparison, J. Alloys Compd., Vol. 678, pp. 343−354. 0
7. N. K. Kund, 2018, Effect of tilted plate vibration on solidification and microstructural and mechanical properties of semisolid cast and
heat-treated A356 Al alloy, Int. J. Adv. Manufacturing Technol., Vol. 97, pp. 1617−1626.
8. N. K. Kund, 2019, EMS route designed for SSM processing, International Journal of Engineering and Advanced Technology, Vol. 8,
pp. 382−384.
9. N. K. Kund, 2019, Cooling slope practice for SSF technology, International Journal of Engineering and Advanced Technology, Vol. 8,
pp. 410−413.
10. N. K. Kund, 2019, Comparative ways and means for production of nondendritic microstructures, International Journal of Innovative
Technology and Exploring Engineering, Vol. 8, pp. 534−537.
11. N. K. Kund, 2019, Simulation of electronics cooling deploying water-zinc oxide nanofluid, International Journal of Recent Technology
and Engineering, Vol. 7, pp. 1076−1078.
12. N. K. Kund, 2019, Numerical studies on fuel cell cooling introducing water-copper nanofluid, International Journal of Recent
Technology and Engineering, Vol. 7, pp. 1079−1081.
13. N. K. Kund, 2019, Computational modeling of fuel cell expending water-zinc oxide nanofluid, International Journal of Innovative
Technology and Exploring Engineering, Vol. 8, pp. 424−426.
14. N. K. Kund, 2019, Investigations on modeling and simulation of electronics cooling exhausting water-aluminum nanofluid,
International Journal of Innovative Technology and Exploring Engineering, Vol. 8, pp. 660−663.
15. N. K. Kund, 2019, Numerical study on effect of nozzle size for jet impingement cooling with water-Al2O3 nanofluid, International
Journal of Engineering and Advanced Technology, Vol. 8, pp. 736−739.
16. N. K. Kund, 2019, Experimental investigations on impacts of nozzle diameter on heat transfer behaviors with water jet impingement,
International Journal of Engineering and Advanced Technology, Vol. 8, pp. 745−748.
17. N. K. Kund, 2019, Comparative CFD studies on jet impingement cooling using water and water-Al2O3 nanofluid as coolants,
International Journal of Innovative Technology and Exploring Engineering, Vol. 8, pp. 545−548.
18. N. K. Kund, 2019, Experimental studies on effects of jet Reynolds number on thermal performances with striking water jets,
International Journal of Innovative Technology and Exploring Engineering, Vol. 8, pp. 2195−2198.
19. N. K. Kund, D. Singh, 2019, CFD studies on heat transfer and solidification progress of A356 al alloy matrix and Al2 O3 nanoparticles
melt for engineering usages, International Journal of Innovative Technology and Exploring Engineering, Vol. 8, pp. 2043−2046.
20. N. K. Kund, S. Patra, 2019, Simulation of thermal and solidification evolution of molten aluminum alloy and SiC nanoparticles for
engineering practices, International Journal of Innovative Technology and Exploring Engineering, Vol. 8, pp. 2047−2050.

Authors: B.Nataraj, K.R.Prabha


Paper Title: Wideband Rectangular Patch Antenna for X- Band Applications
Abstract: In this paper, a wideband rectangular patch antenna for X-band applications is proposed. The
antenna is printed on an FR4-epoxy substrate with thickness 1.58 mm and the patch dimensions are 9.13 mm by
6.27 mm. The design is simulated using Advanced Design System software to yield a return loss of -33.53 dB at
10.58 GHz resonant frequency. The drawbacks of patch antenna such as narrow bandwidth and low gain are
improved through this design to provide good gain characteristics. The benefits of microstrip patch antenna
347. including low profile, low weight, ease of fabrication etc. makes it an ideal choice for design optimization to
effectively support mobile, military requirements, wireless and satellite communication. 1981-
198
Keywords: Microstrip, patch, bandwidth, X-band, return loss. 4

References:

1. B Nataraj and K R Prabha, “ Design of microstrip rectangular patch antenna for cancer detection”, International Journal of Mechanical
Engineering and Technology (IJMET), Volume 9, Issue 13, December 2018.
2. B Nataraj, K R Prabha, S Surya Sri, G Suguna and K A Swathi, “Design of RF MEMS Phase Shifter using Capacitive Shunt Switch”,
International Journal of Pure and Applied Mathematics, Volume 119, No. 10, pp. 1053-1066, 2018.
3. Soufian Lakrit, Hassan Ammor, Soufiane Matah, et al., “A new small high-gain wideband rectangular patch antenna for X and Ku
bands applications”, Journal of Taibah University for Science, vol. 12, no. 2, pp. 202–207, 2018.
4. Rozh Najeeb, Diyari Hassan, Dana Najeeb, Huseyin Ademgil, “Design and Simulation of Microstrip Patch Antenna Array for X-Band
Applications”, IEEE conference on High Capacity Optical Networks and Enabling Technologies, October 2016.
5. Lakrit S and Ammor H, “Design on X-band wideband andhigh-gain multi-layer microstrip antenna”, Journal of Engineering Science
Technology Rev., vol. 7, no. 3, pp. 176–179, 2014.
6. Mohamed AlyAboul-Dahab, Hussein Hamed Mahmoud Ghouz and Ahmed Zakaria Ahmed Zaki, “High gain compact microstrip patch
antenna for X-band applications”, International Journal of Antennas (JANT), vol.2, no.1, January 2016.
7. Ankita Goel, M R Tripathy and Sohaib Abbas Zaidi, “Design and Simulation of Inverted T-Shaped Antenna for X-band Applications”,
International Journal of Information & Computation Technology, Vol. 4, No. 6, 2014.
8. Shilpa Waghmare, O.P.Sharma, “An Improved Design of Slotted Microstrip Patch Antenna for X Band and Ku band Applications”,
International Journal of Engineering Research & Technology (IJERT), Vol. 6, Issue 05, May 2017.
9. M. Samsuzzaman, M.T. Islam, J.S. Mandeep, “Design of a Compact new shaped Microstrip Patch Antenna for Satellite Application”,
Advances in Natural and Applied Sciences, 6(6), pp. 898-903, 2012.
10. Meenakshi Dular, Ira Joshi, “Study of multiband patch antenna for X-band applications”, International Journal of Electrical and
Electronics Engineers (IJEEE), Volume 2, Issue 4,August 2015.

Authors: B.Nataraj, K.R.Prabha

Paper Title: Wideband Rectangular Patch Antenna for X- Band Applications


Abstract: In this paper, a wideband rectangular patch antenna for X-band applications is proposed. The
antenna is printed on an FR4-epoxy substrate with thickness 1.58 mm and the patch dimensions are 9.13 mm by
6.27 mm. The design is simulated using Advanced Design System software to yield a return loss of -33.53 dB at
10.58 GHz resonant frequency. The drawbacks of patch antenna such as narrow bandwidth and low gain are
improved through this design to provide good gain characteristics. The benefits of microstrip patch antenna
including low profile, low weight, ease of fabrication etc. makes it an ideal choice for design optimization to
effectively support mobile, military requirements, wireless and satellite communication.

Keywords: Microstrip, patch, bandwidth, X-band, return loss.

References:

348. 1. B Nataraj and K R Prabha, “ Design of microstrip rectangular patch antenna for cancer detection”, International Journal of Mechanical
Engineering and Technology (IJMET), Volume 9, Issue 13, December 2018. 1985-
2. B Nataraj, K R Prabha, S Surya Sri, G Suguna and K A Swathi, “Design of RF MEMS Phase Shifter using Capacitive Shunt Switch”, 198
International Journal of Pure and Applied Mathematics, Volume 119, No. 10, pp. 1053-1066, 2018. 9
3. Soufian Lakrit, Hassan Ammor, Soufiane Matah, et al., “A new small high-gain wideband rectangular patch antenna for X and Ku
bands applications”, Journal of Taibah University for Science, vol. 12, no. 2, pp. 202–207, 2018.
4. Rozh Najeeb, Diyari Hassan, Dana Najeeb, Huseyin Ademgil, “Design and Simulation of Microstrip Patch Antenna Array for X-Band
Applications”, IEEE conference on High Capacity Optical Networks and Enabling Technologies, October 2016.
5. Lakrit S and Ammor H, “Design on X-band wideband andhigh-gain multi-layer microstrip antenna”, Journal of Engineering Science
Technology Rev., vol. 7, no. 3, pp. 176–179, 2014.
6. Mohamed AlyAboul-Dahab, Hussein Hamed Mahmoud Ghouz and Ahmed Zakaria Ahmed Zaki, “High gain compact microstrip patch
antenna for X-band applications”, International Journal of Antennas (JANT), vol.2, no.1, January 2016.
7. Ankita Goel, M R Tripathy and Sohaib Abbas Zaidi, “Design and Simulation of Inverted T-Shaped Antenna for X-band Applications”,
International Journal of Information & Computation Technology, Vol. 4, No. 6, 2014.
8. Shilpa Waghmare, O.P.Sharma, “An Improved Design of Slotted Microstrip Patch Antenna for X Band and Ku band Applications”,
International Journal of Engineering Research & Technology (IJERT), Vol. 6, Issue 05, May 2017.
9. M. Samsuzzaman, M.T. Islam, J.S. Mandeep, “Design of a Compact new shaped Microstrip Patch Antenna for Satellite Application”,
Advances in Natural and Applied Sciences, 6(6), pp. 898-903, 2012.
10. Meenakshi Dular, Ira Joshi, “Study of multiband patch antenna for X-band applications”, International Journal of Electrical and
Electronics Engineers (IJEEE), Volume 2, Issue 4,August 2015.

Authors: Ruchika Sinhal, Kavita Singh, Mukesh Raghuwanshi

Paper Title: Heart Rate Measurement Based on Color Signal Extraction


Abstract: Photoplethysmography measures vital signs through to extraction of signals from the body. The
paper explains the technique for extraction of pulse rate from the videos for three color channels namely; red,
green and blue. The DMIMS database is used for experimentation which consists of total 720 videos out of
which 25 videos are used for analysis. The results presented in this paper depict that our algorithm works best
for blue channel followed by green and then red channel. The main focus of paper is to extract pulse rate from
the recorded video and compare the output for different channels and find the best channel for heart rate
extraction.
349. Keywords: Photoplethysmography, vital sign monitoring, rPPG, heart rate estimation, color channels. 1990-
199
References: 3
1. J. Allen, “Photoplethysmography and its application in clinical physiological measurement,” Physiol. Meas., vol. 28, no. 3, pp. R1–
R39, Mar. 2007.
2. K. K. Tremper and S. J. Barker, “Pulse Oximetry,” Anesthesiol. J. Am. Soc. Anesthesiol., vol. 70, no. 1, pp. 98–108, Jan. 1989.
3. “The time-variable photoplethysmographic signal; dependence of the heart synchronous signal on wavelength and sample volume. -
PubMed - NCBI.” [Online]. Available: https://www.ncbi.nlm.nih.gov/pubmed/8564151. [Accessed: 03-Oct-2018].
4. R. Sinhal, K. Singh, and A. Shankar, “Estimating vital signs through non-contact video-based approaches: A survey,” in 2017
International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE), Bhopal, 2017, pp. 139–141.
5. Y. Sun and N. Thakor, “Photoplethysmography Revisited: From Contact to Noncontact, From Point to Imaging,” IEEE Trans. Biomed.
Eng., vol. 63, no. 3, pp. 463–477, Mar. 2016.
6. G. de Haan and V. Jeanne, “Robust Pulse Rate From Chrominance-Based rPPG,” IEEE Trans. Biomed. Eng., vol. 60, no. 10, pp.
2878–2886, Oct. 2013.
7. D. Wedekind, H. Malberg, S. Zaunseder, F. Gaetjen, K. Matschke, and S. Rasche, “Automated identification of cardiac signals after
blind source separation for camera-based photoplethysmography,” in 2015 IEEE 35th International Conference on Electronics and
Nanotechnology (ELNANO), Kyiv, Ukraine, 2015, pp. 422–427.
8. Sijung Hu, V. A. Peris, A. Echiadis, Jia Zheng, and Ping Shi, “Development of effective photoplethysmographic measurement
techniques: From contact to non-contact and from point to imaging,” in 2009 Annual International Conference of the IEEE
Engineering in Medicine and Biology Society, Minneapolis, MN, 2009, pp. 6550–6553.
9. Y. Sun, “Motion-compensated noncontact imaging photoplethysmography to monitor cardiorespiratory status during exercise,” J.
Biomed. Opt., vol. 16, no. 7, p. 077010, Jul. 2011.
10. D. J. McDuff, J. R. Estepp, A. M. Piasecki, and E. B. Blackford, “A survey of remote optical photoplethysmographic imaging
methods,” in 2015 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), Milan,
2015, pp. 6398–6404.
11. Litong Feng, Lai-Man Po, Xuyuan Xu, Yuming Li, and Ruiyi Ma, “Motion-Resistant Remote Imaging Photoplethysmography Based
on the Optical Properties of Skin,” IEEE Trans. Circuits Syst. Video Technol., vol. 25, no. 5, pp. 879–891, May 2015.
12. M. Kumar, A. Veeraraghavan, and A. Sabharwal, “DistancePPG: Robust non-contact vital signs monitoring using a camera,” Biomed.
Opt. Express, vol. 6, no. 5, p. 1565, May 2015.
13. M. Kumar, J. Suliburk, A. Veeraraghavan, and A. Sabharwal, “PulseCam: High-resolution blood perfusion imaging using a camera and
a pulse oximeter,” in 2016 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC),
Orlando, FL, USA, 2016, pp. 3904–3909.
14. A. K. S. Kushwaha, M. Kolekar, and A. Khare, “Vision based method for object classification and multiple human activity recognition
in video survelliance system,” in Proceedings of the CUBE International Information Technology Conference on - CUBE ’12, Pune,
India, 2012, p. 47.
15. L. Iozzia, L. Cerina, and L. Mainardi, “Relationships between heart-rate variability and pulse-rate variability obtained from video-PPG
signal using ZCA,” Physiol. Meas., vol. 37, no. 11, pp. 1934–1944, Nov. 2016.
16. J. Rumiński, “Reliability of Pulse Measurements in Videoplethysmography,” Metrol. Meas. Syst., vol. 23, no. 3, pp. 359–371, Sep.
2016.
17. Jeehyun Choe, Dahjung Chung, A. J. Schwichtenberg, and E. J. Delp, “Improving video-based resting heart rate estimation: A
comparison of two methods,” in 2015 IEEE 58th International Midwest Symposium on Circuits and Systems (MWSCAS), Fort
Collins, CO, USA, 2015, pp. 1–4.
18. “Philips IP&S.” [Online]. Available: http://www.ip.philips.com/about/. [Accessed: 03-Oct-2018].

Authors: Emmanuel Gospel Raj R, Joby Titus T, Sanjana Devi V. S, Nithya Priya S, Adeline Daisy R

Paper Title: Design And Fabrication Of Copra Sweeping Robot


Abstract: Copra Crushing Industry has one of the production processes that is being used widely in the Oil
production and manufacturing industries. Considering a fully equipped plant, the production ranges from 500-
560 tons of oil per month. A good yielding copra provides 95% of output that has 5-7% of moisture content.
Lesser the moisture content higher the yield. In the process of oil extraction, the copra is fed into the chute that is
pumped onto the main silo for steaming process. This feeding process is done manually; hence, there are many
mishaps occurring like copra falling away from the chute. A dried copra is crunchy enough to pierce the leg of
the employees. Therefore, our paper aims to provide solution to these issues and ensure the safety of the
employees. Design and fabrication of copra sweeping robot is proposed in this paper. The robot runs on wheels
utilizes a sweeper mechanism to accumulate dried copra in a coconut oil extraction plant. This application of
350. mechatronics comes under the field of Mobile Robotics. It is used to sweep the copra to one side so that the 1994-
employees could pass through the place without any harm. It is provided with an attachment for the sweeping 199
process. This could ultimately ensure employee safety and increase the productivity. 6
Keywords: Oil Production and Manufacturing, Yield, Silo, Mobile Robotics, Mechatronics.

References:

1. Zelun Li, Zhicheng Huang, “Design of a type of cleaning robot with Ultrasonic”, JATT Vol. 47 No 3, 2013, Chongqing University of
Science and Technology, Chongqing, China.
2. Ajith Thomas, Rohith M S, Febin Jolly, Jeeson Cheriyan, Ms Reenu Mary George “An Advanced Mobile Robot for Floor Cleaning”,
IJAREEIE Vol. 5, 2016,Mar Baselios Institute of Technology and Science, Nellimattom, Kerala, India.
3. Yong-Joo Oh, Yoshio Watanabe, “Development of Small Robot for Floor Cleaning”, Kanagawa Univerity, Rekakubashi 3-27-1,
Yokohama, Kanagawa, Japan.

Authors: Wafa Aladawi , C. Jayakumari, Sumesh E P, Vidhyalavanya

Paper Title: Recent Innovations in Automated Detection and Classification of Diabetic Retinopathy
Abstract: Due to the increasing prevalence of diabetic retinopathy worldwide, it’s an urgent need to develop
smart system that help to detect disease using one of the modern technologies. Artificial intelligence is one of
the popular techniques nowadays which has the ability to learn from experience and carry out human-like tasks.
Large number of researches have been conducted to find out effective medical diagnosis methods for numerous
diseases. Likewise, huge number of researches have been done that discuss automated detection and
351.
classification of diabetic retinopathy. This paper reviews the existing methodologies, datasets, sensitivity, 1997-
specificity and classification accuracy in diabetic retinopathy. 200
4
Keywords: Diabetes Mellitus; Diabetic Retinopathy; NPDR; PDR; Artificial intelligence; Machine Learning;
Image Preprocessing; Deep Learning; CNN; RNN; RBM; Autoencoders; Kaggle; Messidor-2; DRIVE;
TensorFlow; Keras; Theano; Sensitivity; Specificity; Accuracy.

References:
1. WHO | Diabetes mellitus", Who.int, 2019. [Online]. Available: https://www.who.int/mediacentre/factsheets/fs138/en/. [Accessed: 05-
May- 2019].
2. F. Cold and E. Health, "Types of Diabetes Mellitus", WebMD, 2019. [Online]. Available:
https://www.webmd.com/diabetes/guide/types-of-diabetes-mellitus#1. [Accessed: 05- May- 2019].
3. D. Singh Sisodia, S. Nair and P. Khobragade, "Diabetic Retinal Fundus Images: Preprocessing and Feature Extraction For Early
Detection of Diabetic Retinopathy", Biomedical and Pharmacology Journal, vol. 10, no. 02, pp. 615-626, 2017. Available:
10.13005/bpj/1148.
4. R. Raman, S. Srinivasan, S. Virmani, S. Sivaprasad, C. Rao and R. Rajalakshmi, "Fundus photograph-based deep learning algorithms
in detecting diabetic retinopathy", Eye, vol. 33, no. 1, pp. 97-109, 2018. Available: 10.1038/s41433-018-0269-y.
5. J. de la Torre, D. Puig and A. Valls, "Weighted kappa loss function for multi-class classification of ordinal data in deep learning",
Pattern Recognition Letters, vol. 105, pp. 144-154, 2018. Available: 10.1016/j.patrec.2017.05.018.
6. P. Grewal, F. Oloumi, U. Rubin and M. Tennant, "Deep learning in ophthalmology: a review", Canadian Journal of Ophthalmology,
vol. 53, no. 4, pp. 309-313, 2018. Available: 10.1016/j.jcjo.2018.04.019.
7. W. Lu, Y. Tong, Y. Yu, Y. Xing, C. Chen and Y. Shen, "Applications of Artificial Intelligence in Ophthalmology: General Overview",
Journal of Ophthalmology, vol. 2018, pp. 1-15, 2018. Available: 10.1155/2018/5278196.
8. N. Graham, Artificial Intelligence, Vol. 1076, Blue Ridge Summit: Tab Books, Philadelphia, PA, USA, 1979.
9. V. Gulshan et al., "Development and Validation of a Deep Learning Algorithm for Detection of Diabetic Retinopathy in Retinal
Fundus Photographs", JAMA, vol. 316, no. 22, p. 2402, 2016. Available: 10.1001/jama.2016.17216.
10. G. Gardner, D. Keating, T. Williamson and A. Elliott, "Automatic detection of diabetic retinopathy using an artificial neural network: a
screening tool.", British Journal of Ophthalmology, vol. 80, no. 11, pp. 940-944, 1996. Available: 10.1136/bjo.80.11.940.
11. H. Pratt, F. Coenen, D. Broadbent, S. Harding and Y. Zheng, "Convolutional Neural Networks for Diabetic Retinopathy", Procedia
Computer Science, vol. 90, pp. 200-205, 2016. Available: 10.1016/j.procs.2016.07.014.
12. V. Gulshan et al., "Development and Validation of a Deep Learning Algorithm for Detection of Diabetic Retinopathy in Retinal
Fundus Photographs", JAMA, vol. 316, no. 22, p. 2402, 2016. Available: 10.1001/jama.2016.17216.
13. M. Hazim Johari et al., "Early Detection of Diabetic Retinopathy by Using Deep Learning Neural Network", International Journal of
Engineering & Technology, vol. 7, no. 411, p. 198, 2018. Available: 10.14419/ijet.v7i4.11.20804.
14. Voets M, Møllersen K, Bongo LA. Replication study: Development and validation of deep learning algorithm for detection of diabetic
retinopathy in retinal fundus photographs. arXiv preprint arXiv:1803.04337. 2018. http://arxiv.org/abs/1803.04337.
15. G. Lin et al., "Transforming Retinal Photographs to Entropy Images in Deep Learning to Improve Automated Detection for Diabetic
Retinopathy", Journal of Ophthalmology, vol. 2018, pp. 1-6, 2018. Available: 10.1155/2018/2159702.
16. S. Dutta, B. Manideep, S. Basha, R. Caytiles and N. Iyengar, "Classification of Diabetic Retinopathy Images by Using Deep Learning
Models", International Journal of Grid and Distributed Computing, vol. 11, no. 1, pp. 99-106, 2018. Available:
10.14257/ijgdc.2018.11.1.09.
17. Chandrakumar T and R Kathirvel, "Classifying Diabetic Retinopathy using Deep Learning Architecture", International Journal of
Engineering Research and, vol. 5, no. 06, 2016. Available: 10.17577/ijertv5is060055.
18. V. Chandore and S. Asati, "Automatic Detection of Diabetic Retinopathy using deep Convolutional Neural Network", International
Journal of Advance Research, Ideas and Innovations in Technology, vol. 3, no. 4, pp. 633-641, 2017. Available: http://www.ijariit.com.
[Accessed 9 May 2019].
19. S. Sayed, S. Kapre and D. Inamdar, "Detection of Diabetic Retinopathy using Image Processing and Machine Learning", International
Journal of Innovative Research in Science, Engineering and Technology, vol. 6, no. 1, pp. 99-107, 2017. Available:
http://www.ijirset.com. [Accessed 9 May 2019].
20. [20]B. Ramasubramanian and G. Prabhakar, "An Early Screening System for the Detection of Diabetic Retinopathy using Image
Processing", International Journal of Computer Applications, vol. 61, no. 15, pp. 6-10, 2013. Available: 10.5120/10002-4864.
21. M. Abràmoff et al., "Improved Automated Detection of Diabetic Retinopathy on a Publicly Available Dataset Through Integration of
Deep Learning", Investigative Opthalmology & Visual Science, vol. 57, no. 13, p. 5200, 2016. Available: 10.1167/iovs.16-19964.
22. F. Ari Mukti, C. Eswaran, N. Hashim, H. Chiung Ching and M. Uvaze Ahamed Ayoobkhan, "An automated grading system for
diabetic retinopathy using curvelet transform and hierarchical classification", International Journal of Engineering & Technology, vol.
7, no. 215, p. 154, 2018. Available: 10.14419/ijet.v7i2.15.11375.
23. K. Xu, D. Feng and H. Mi, "Deep Convolutional Neural Network-Based Early Automated Detection of Diabetic Retinopathy Using
Fundus Image", Molecules, vol. 22, no. 12, p. 2054, 2017. Available: 10.3390/molecules22122054.
24. N. Chakrabarty, "A Deep Learning Method for the detection of Diabetic Retinopathy", in 2018 5th IEEE Uttar Pradesh Section
International Conference on Electrical, Electronics and Computer Engineering (UPCON), 2019.
25. D. Hemanth, O. Deperlioglu and U. Kose, "An enhanced diabetic retinopathy detection and classification approach using deep
convolutional neural network", Neural Computing and Applications, 2019. Available: 10.1007/s00521-018-03974-0.
26. Z. Li et al., "An Automated Grading System for Detection of Vision-Threatening Referable Diabetic Retinopathy on the Basis of Color
Fundus Photographs", Diabetes Care, vol. 41, no. 12, pp. 2509-2516, 2018. Available: 10.2337/dc18-0147.
27. K. Kansal and E. Nishi, "Automated Detection of Exudates for Diabetic Retinopathy Screening in Fundus Images Using CS-ACO
Optimization Approach", International Journal of Bio-Science and Bio-Technology, vol. 8, no. 3, pp. 323-340, 2016. Available:
10.14257/ijbsbt.2016.8.3.33.
28. M. Partovi, S. Rasta and A. Javadzadeh, "Automatic detection of retinal exudates in fundus images of diabetic retinopathy patients",
Journal of Analytical Research in Clinical Medicine, vol. 4, no. 2, pp. 104-109, 2016. Available: 10.15171/jarcm.2016.017.
29. B. Thakar, S. Patel, V. Palod, A. Shetty, P. Hatode and J. Khanapuri, "Automatic Detection of Microaneurysms in Diabetic
Retinopathy Using Python", SSRN Electronic Journal, 2019. Available: 10.2139/ssrn.3367665.
30. B. Hijazi, G. Quellec, M. Lamard, B. Cochener,"Automatic detection of diabetic retinopathy using jointly trained CNNs", Acta
Ophthalmologica, vol. 96, no. 261, pp. 52-52, 2018. Available: 10.1111/aos.13972_184.
31. P. Kumar, R. Deepak, A. Sathar, V. Sahasranamam and R. Kumar, "Automated Detection System for Diabetic Retinopathy Using Two
Field Fundus Photography", Procedia Computer Science, vol. 93, pp. 486-494, 2016. Available: 10.1016/j.procs.2016.07.237.
32. M. Leeza and H. Farooq, "Detection of Severity Level of Diabetic Retinopathy Using Bag of Features Model", IET Computer Vision,
2019. Available: 10.1049/iet-cvi.2018.5263.
33. M. Bhaskaranand et al., "Automated Diabetic Retinopathy Screening and Monitoring Using Retinal Fundus Image Analysis", Journal
of Diabetes Science and Technology, vol. 10, no. 2, pp. 254-261, 2016. Available: 10.1177/1932296816628546.
34. R. Sahoo and C. Sekhar, "Detection of Diabetic Retinopathy from Retinal Fundus Image using Wavelet based Image Segmentation",
International Journal of Computer Applications, vol. 182, no. 47, pp. 46-50, 2019. Available: 10.5120/ijca2019918775.
35. N. Ramachandran, S. Hong, M. Sime and G. Wilson, "Diabetic retinopathy screening using deep neural network", Clinical &
Experimental Ophthalmology, vol. 46, no. 4, pp. 412-416, 2017. Available: 10.1111/ceo.13056.
36. Y. Singh, P. Kumar Bhatia and O. Sangwan, "A REVIEW OF STUDIES ON MACHINE LEARNING TECHNIQUES", International
Journal of Computer Science and Security, vol. 1, no. 1, pp. 70-84, 2007. [Accessed 20 May 2019].
37. Y. Li, N. Yeh, S. Chen and Y. Chung, "Computer-Assisted Diagnosis for Diabetic Retinopathy Based on Fundus Images Using Deep
Convolutional Neural Network", Mobile Information Systems, vol. 2019, pp. 1-14, 2019. Available: 10.1155/2019/6142839.
38. A. Rakhlin, "Diabetic Retinopathy detection through integration of Deep Learning classification framework", 2019.
39. TensorFlow", TensorFlow, 2019. [Online]. Available: https://www.tensorflow.org. [Accessed: 19- Jun- 2019].
40. Welcome — Theano 1.0.0 documentation", Deeplearning.net, 2019. [Online]. Available: http://deeplearning.net/software/theano/.
[Accessed: 19- Jun- 2019].
41. M. COŞKUN, Ö. YILDIRIM, A. UÇAR and Y. DEMIR, "AN OVERVIEW OF POPULAR DEEP LEARNING METHODS",
European Journal of Technic, vol. 7, no. 2, pp. 165-176, 2017. Available: 10.23884/ejt.2017.7.2.11 [Accessed 18 June 2019].
42. Home - Keras Documentation", Keras.io, 2019. [Online]. Available: https://keras.io. [Accessed: 19- Jun- 2019].
43. K. Du and M. Swamy, "Recurrent Neural Networks", Neural Networks and Statistical Learning, pp. 337-353, 2013. Available:
10.1007/978-1-4471-5571-3_11 [Accessed 18 June 2019].
44. H. Guillaume PATRY, "Messidor - ADCIS", ADCIS, 2019. [Online]. Available: http://www.adcis.net/en/third-party/messidor/.
[Accessed: 18- Jun- 2019].
45. R. Harrison, "Continuous restricted Boltzmann machines", Wireless Networks, 2018. Available: 10.1007/s11276-018-01903-6.
46. More than 350,000 Omani diabetics in 2050", Online Atheer Newspaper, 2019. [Online]. Available:
https://www.atheer.om/archives/22790/. [Accessed: 18- Jun- 2019].
47. Alwatan.com, 2019. [Online]. Available: http://www.alwatan.com/graphics/2001/April/20.4/heads/ot9.htm. [Accessed: 18- Jun- 2019].
48. Prevalence of diabetic retinopathy, proliferative diabetic retinopathy and non-proliferative diabetic retinopathy in Asian T2DM
patients: a systematic review and Meta-analysis", International Journal of Ophthalmology, 2019. Available: 10.18240/ijo.2019.02.19
[Accessed 20 June 2019].
49. Care.diabetesjournals.org, 2019. [Online]. Available:
http://care.diabetesjournals.org/content/diacare/suppl/2018/12/17/42.Supplement_1.DC1/DC_42_S1_2019_UPDATED.pdf.
[Accessed: 20- Jun- 2019].
50. International Diabetes Federation - Facts & figures.", 2019. [Online]. Available: https://idf.org/aboutdiabetes/what-is-diabetes/facts-
figures.html. [Accessed: 20- Jun- 2019].
51. J. Tarr, K. Kaul, M. Chopra, E. Kohner and R. Chibber, "Pathophysiology of Diabetic Retinopathy", ISRN Ophthalmology, vol. 2013,
pp. 1-13, 2013. Available: 10.1155/2013/343560 [Accessed 20 June 2019].
52. Kaggle: Your Home for Data Science", Kaggle.com, 2019. [Online]. Available: https://www.kaggle.com/. [Accessed: 18- Jun- 2019].
53. DRIVE: Digital Retinal Images for Vessel Extraction", Isi.uu.nl, 2019. [Online]. Available:
http://www.isi.uu.nl/Research/Databases/DRIVE/. [Accessed: 18- Jun- 2019].
54. A. UzZaman and S. Bashir, "DIABETIC RETINOPATHY DETECTION USING IMAGE- PROCESSING", Master,
BRACUniversity, 2016.
55. M. Maliha, A. Tareque and S. Saha Roy, "Diabetic Retinopathy Detection Using Machine Learning", Bachelor, Engineering BRAC
University, 2018.
56. Diabetic Retinopathy - Middle East", American Academy of Ophthalmology, 2019. [Online]. Available: https://www.aao.org/topic-
detail/diabetic-retinopathy-middle-east. [Accessed: 01- Jul- 2019].

Authors: Venkateswara Rao Varri, N. Arun Vignesh, Asisa Kumar Panigrahy, C H Usha Kumari
Implementation of Low density Parity Check system using Probabilistic Gradient Descent Bit
Paper Title:
Flipping Decoder
Abstract: This paper represents the concept of hard decision decoder in which PGDBF is suitable decoder for
the basic model of hard-choice decoder as long as low-density parity check code (LDPC) which is increase the
error correction. This design introduced dynamic architecture which reduce the capability of random
disarrangement of the PGDBF. The design is working on the Short Random Sequence (SRS) that is replica cover
on the PGDBF decoding guidelines. In each iteration flipping number of bits these are focusing on improvement
in performance and decoding delay. The best SRS is essential to manage the well-known decoding achievement
of PGDBF, we introduced two kind of access with same hardware categories, but various LDPC codes are
perform different behaviors. In this design we are modifying small hardware decoding unit for obtaining a good
decoding explanation for present and further purpose.

Keywords: Gradient-Descent bit flipping, low-density parity-checker, Irregular generator.

References:

1. D., Fossorier, Declercq, M. and Biglieri, E., 2014. “Channel Coding:Theory,Algorithms,and Applications”:. Academic Press.
Academic Press Library in Mobile and Wireless Communications
2. N. and Fossorier, Miladinovic, M.P., 2005.” Improved bit-flipping decoding of low-density parity-check codes”. IEEE Transactions
on Information Theory, 51(4), pp.1594-1606.
352. 3. Kang, J., Huang, Q. Zhang, L., Lin, S. and Abdel-Ghaffar, K., 2009. “Two reliability-based iterative majority-logic decoding
algorithms for LDPC codes”. IEEE Transactions on communications, 57(12), pp.3597-3606. 2005-
4. M., Zhao, Jiang C., Shi, Z. and Chen, Y., 2005. “An improvement on the modified weighted bit flipping decoding algorithm for
LDPC codes”. IEEE Communications Letters, 9(9), pp.814-816.
200
5. T., Nakamura, Wadayama,K., Yagita, M., Funahashi, Y., Usami, S. and Takumi, I., 2008, December. “Gradient descent bit flipping 9
algorithms for decoding LDPC codes”. In 2008 International Symposium on Information Theory and Its Applications (pp. 1-6). IEEE.
6. Lee, C.H. and Wolf, W., 2005.” Implementation-efficient reliability ratio based weighted bit-flipping decoding for LDPC
codes”. Electronics letters, 41(13), pp.755-757
7. Takawira, F. Ngatched, T.M.N., and Bossert, M., 2007, June.” A modified bit-flipping decoding algorithm for low-density parity-
check codes”. In 2007 IEEE International Conference on Communications (pp. 653-658). IEEE.
8. O., Ivaniš, P. Al Rasheed, O.,and Vasić, B., 2014. “Tolerant probabilistic gradient-descent bit flipping decoder”. IEEE
Communications Letters, 18(9), pp.1487-1490.
9. IEEE Computer Society LAN/MAN Standards Committee, 2007. IEEE standard for information technology-telecommunications and
information exchange between systems-Local and metropolitan area networks-specific requirements part 11:” Wireless LAN medium
access control (MAC) and physical layer (PHY) specifications”. IEEE Std 802.11.
10. D., Dolinar, S. Divsalar, and Jones, C., 2007, October. “Short protograph-based LDPC codes”. In MILCOM 2007-IEEE Military
Communications Conference (pp. 1-6). IEEE.
11. Kumar, B.V.,and Jeon, S. 2010. “Performance and complexity of 32 k-bit binary LDPC codes for magnetic recording channels”. IEEE
Transactions on Magnetics, 46(6), pp.2244-2247.
12. Dong, G., Xie, N. and Zhang, T., 2010. “On the use of soft-decision error-correction codes in NAND flash memory”. IEEE
Transactions on Circuits and Systems I: Regular Papers, 58(2), pp.429-439.
13. Zhang,and Dong, G., Xie, N. T., 2010. “On the use of soft-decision error-correction codes in NAND flash memory”. IEEE
Transactions on Circuits and Systems I: Regular Papers, 58(2), pp.429-439.
14. ] Mohsenin, T. and Baas, B., 2009, November. “Trends and challenges in LDPC hardware decoders”. In 2009 Conference Record of
the Forty-Third Asilomar Conference on Signals, Systems and Computers (pp. 1273-1277). IEEE.
15. ] Nie, J., Wen, J., Dong, Q. and Zhou, Z., 2005, May. A seamless handoff in IEEE 802.16 a and IEEE 802.11 n hybrid networks.
In Proceedings. 2005 International Conference on Communications, Circuits and Systems, 2005. (Vol. 1, pp. 383-387). IEEE.
16. Ghaffari, F., Le, K., Declercq, D. Spagnol, C., Popovici, E., Ivanis, P. and Vasic, B., 2015, May. “Efficient realization of probabilistic
gradient descent bit flipping decoders”. In 2015 IEEE International Symposium on Circuits and Systems (ISCAS) (pp. 1494-1497).
IEEE.
17. Tanner, R.M., Sridhara, D. and Fuja, T., 2001. “A class of group-structured LDPC codes”. Proc. ICSTA, pp.365-370.
18. Tanner, R.M., Sridhara, D. and Fuja, T., 2001. “A class of group-structured LDPC codes”. Proc. ICSTA, pp.365-370.
19. Declercq, D. and LeTrung, K., Vasić, B., Ivaniš, P. 2016, January. “Approaching maximum likelihood performance of LDPC codes
by stochastic resonance in noisy iterative decoders”. In 2016 Information Theory and Applications Workshop (ITA) (pp. 1-9). IEEE.
20. Xu, J., Chen, L., Djurdjevic, I., Lin, S. and Abdel-Ghaffar, K., 2006. “Construction of regular and irregular LDPC codes”: Geometry
decomposition and masking. IEEE Transactions on information theory, 53(1), pp.121-134.
21. Rajput, P. and Shukla, B., Panda, A.K., 2012, May. “FPGA implementation of 8, 16 and 32 bit LFSR with maximum length feedback
polynomial using VHDL”. In 2012 International Conference on Communication Systems and Network Technologies (pp. 769-773).
IEEE.
22. Ugurdag, H.F., Yuce, B., Gören, S. and Dündar, G., 2014. “Fast and efficient circuit topologies forfinding the maximum of n k-bit
numbers”. IEEE Transactions on Computers, 63(8), pp.1868-1881”.
23. Gupta, T., Nguyen-Ly, T.T. Pezzin, M., Savin, V., Declercq, D. and Cotofana, S., 2016, August. “Flexible, cost-efficient, high-
throughput architecture for layered LDPC decoders with fully-parallel processing units”. In 2016 Euromicro Conference on Digital
System Design (DSD) (pp. 230-237). IEEE.
24. Alles, M., Brack, T. Lehnigk-Emden, T., Kienle, F., Wehn, N., L'Insalata, N.E., Rossi, F., Rovini, M. and Fanucci, L., 2007, April.”
Low complexity LDPC code decoders for next generation standards”. In 2007 Design, Automation & Test in Europe Conference &
Exhibition (pp. 1-6). IEEE.
25. Wang, Z., Gao, Sha, J M. and Li, L., 2008. “Multi-Gb/s LDPC code design and implementation. IEEE Transactions on Very Large
Scale Integration (VLSI) Systems”, 17(2), pp.262-268.

Authors: Gousia Nissar, Dinesh Kumar Garg, Burhan Ul Islam Khan

Paper Title: Implementation of Security Enhancement in AES by Inducting Dynamicity in AES S-Box
Abstract: Advance Encryption Standard (AES) supersedes Data Encryption Standard (DES) and is the best
known and most widely used block cipher. As for now, there are no known practical attacks that would allow
anyone to read correctly implemented AES encrypted data. However, several theoretical attacks have been
announced until now. A theoretical attack called Biclique Attack is known to have broken Full AES and requires
2126.1, 2189.7, 2254.4 operations to recover an AES-128, AES-192, AES-256 respectively. Biclique Attack is
faster than Brute force attack by a factor of four. As such, these theoretical attacks are of high computational
complexity; they do not threaten the practical use of AES in any way. However, attacks always get better; they
never get worse. As the technology evolves, successful attacks (using Quantum Computing and faster GPU)
against AES may turn up, and they may be difficult to ignore. In this study, we aim to enhance the security
prospects of AES with the inclusion of Dynamicity character in AES S-Box for increased resilience against
Brute Force Attack and Biclique Attack, and hashing technique is combined with AES algorithm to achieve
variance in security using MD4, SHA3 or SHA5. The novel key dispersion technique is introduced to increase
the avalanche effect of AES algorithm.

Keywords: AES, DES, Encryption, S-Box.

References:

1. M. Masihuddin, B.U.I. Khan, M. Mattoo and R. Olanrewaju, “A Survey on E-Payment Systems: Elements, Adoption, Architecture,
Challenges and Security Concepts”, Indian Journal of Science and Technology, vol. 10, no. 20, pp. 1-19, 2017.
2. Biryukov, D. Khovratovich, and I. Nikolic, “Distinguisher and related-key attack on the full aes-256”, Advances in cryptology-crypto
2009, Springer, 2009, pp. 231–249.
3. B.U.I. Khan, R. Olanrewaju, F. Anwar, A. Najeeb and M. Yaacob, “A Survey on MANETs: Architecture, Evolution, Applications,
Security Issues and Solutions”, Indonesian Journal of Electrical Engineering and Computer Science, vol. 12, no. 2, pp. 832-842, 2018.
353. Available: 10.11591/ijeecs.v12.i2. pp832-842 2010-
4. S. Hussain, B.U.I. Khan, F. Anwar and R. Olanrewaju, “Secure Annihilation of Out-of-Band Authorization for Online
201
Transactions”, Indian Journal of Science and Technology, vol. 11, no. 5, pp. 1-9, 2018.
5. T. Mehraj, B. Rasool, B.U.I. Khan, A. Baba and A. Lone, “Contemplation of Effective Security Measures in Access Management 8
from Adoptability Perspective”, International Journal of Advanced Computer Science and Applications, vol. 6, no. 8, pp. 188-200,
2015. Available: 10.14569/ijacsa.2015.060826.
6. B. Rasool, T. Mehraj, B. Khan, A. Mehraj and Z. Najar, “Securely Eradicating Cellular Dependency for E-Banking
Applications”, International Journal of Advanced Computer Science and Applications, vol. 9, no. 2, pp. 385-398, 2018. Available:
10.14569/ijacsa.2018.090253.
7. W. Stallings, Cryptography and network security: Principles and practices. Pearson Education India, 2006.
8. Announcing the Data Encryption Standard, Federal Information Processing Standards Publication 46-3, pp. 1-27, 1999.
9. H. Feistel, “Cryptography and computer privacy,” Scientific american, vol. 228, no. 5, pp. 15-23, 1973.
10. Announcing the Advanced Encryption Standard (AES), Federal Information Processing Standards Publication 197, pp. 1-51, 2001.
11. B.U.I. Khan, R. Olanrewaju, A. Baba, S. Lone and N. Zulkurnain, “SSM: Secure-Split-Merge Data Distribution in Cloud
Infrastructure”, in 2015 IEEE Conference on Open Systems (ICOS), Melaka, Malaysia, 2015, pp. 40-45.
12. H. Gilbert and M. Minier., “A Collision Attack on 7 Rounds of Rijndael”, in The Third Advanced Encryption Standard Candidate
Conference, 2000, pp. 230–241.
13. N. Ferguson, J. Kelsey, S. Lucks, B. Schneier, M. Stay, D. N. Ferguson, J. Kelsey, S. Lucks, B. Schneier, M. Stay, D. Wagner, and
D. Whiting, “Improved Cryptanalysis of Rijndael”, in Bruce Schneier, editor, Fast Software Encryption: 7th International Workshop,
Springer-Verlag, 2001, pp. 213–230.
14. H. Demirci and A. A. Selc¸uk, “A Meet-in- the-Middle Attack on 8-Round AES”, in Kaisa Nyberg, editor, Fast Software Encryption:
15th International Workshop, FSE 2008, vol. 5086 of Lecture Notes in Computer Science, Springer-Verlag, 2008, pp. 116–126.
15. A. Bogdanov, D. Khovratovich, and C. Rechberger, “Biclique Cryptanalysis of the Full AES”, in Dong Hoon Lee and Xiaoyun Wang,
editors, Advances in Cryptology- ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology
and Information Security, vol. 7073 of Lecture Notes in Computer Science, Springer-Verlag, 2011, pp. 344–371.
16. H. O. Alanaji, A. A. Jaidan, B. B. Jaidan, H. A. Jalab and Y. Al-Nabani, “New Comparative Study Between DES, 3DES, AES Within
Nine Factors.,” Journal of Computing, vol. 2, no. 3, pp. 152-157, 2010
17. G. Jakimoski and Y. Desmedt, “Related-Key Differential Cryptanalysis of 192-bit Key AES Variants”, in M. Matsui and R. J.
Zuccherato, editors, Selected Areas in Cryptography, 10th Annual International Workshop, SAC 2003, vol. 3006 of Lecture Notes in
Computer Science, Springer-Verlag, 2004, pp. 208–221.
18. N. Ferguson, J. Kelsey, S. Lucks, B. Schneier, M. Stay, D. Wagner, and D. Whiting, “Improved Cryptanalysis of Rijndael”, in B.
Schneier, editor, Fast Software Encryption: 7th International Workshop, FSE 2000, vol. 1978 of Lecture Notes in Computer Science,
Springer-Verlag, pp. 213–230, 2001.
19. E. Biham, O. Dunkelman, and N. Keller, “Related-Key Boomerang and Rectangle Attacks”, in R. Cramer, editor, Advances in
Cryptology - EUROCRYPT 2005, vol. 3494 of Lecture Notes in Computer Science, pp. 507–525. Springer-Verlag, 2005.
20. J. Kim, S. Hong, and B. Preneel, “Related-Key Rectangle Attacks on Reduced AES-192 and AES-256”, in A. Biryukov, editor, Fast
Software Encryption: 14th International Workshop, FSE 2007, vol. 4593 of Lecture Notes in Computer Science, pp. 225–241.
Springer-Verlag, 2007.
21. A. Biryukov, O. Dunkelman, N. Keller, D. Khovratovich, and A. Shamir, “Key Recovery Attacks of Practical Complexity on AES
Variant with Up To 10 Rounds”, IACR eprint server, 2009/374 July 2009, http://eprint. iacr.org/2009/374.
22. F. Standaert, G. Rouvroy, J. Quisquater, and J. Legat, “Efficient implementation of Rijndael encryption in reconfigurable hardware:
Improvements & design tradeoffs,” in Proc. CHES 2003, Cologne, Germany, 2003.
23. Coppersmith, “The data encryption standard (des) and its strength against attacks,” IBM journal of research and development, vol. 38,
no. 3, pp. 243–250, 1994.
24. A. Janadi and D. A. Tarah, “AES Immunity Enhancement against algebraic attacks by using dynamic S-Boxes”, in the proceedings of
3rd International Conference on Information and Communication Technologies: From Theory to Applications, 2008.
25. L. May, M. Henricksen, W. Millan, G. Carter, and E. Dawson, “Strengthening the key schedule of AES”, in the proceedings of 7th
Australasian conference on Information Security and Privacy - Lecture Notes in Computer Science, Vol. 2384, pp. 226-240, 2002.
26. Biryukov and D. Khovratovich, “Related-key cryptanalysis of the full aes-192 and aes-256,” Advances in Cryptology– ASIACRYPT
2009, pp. 1–18, 2009.
27. N. Stoinov, “One Approach of using Key-Dependent S-BOXes in AES”, in the proceedings of 4th International conference,
Multimedia communications, Services and Security - Communications in computer and information science, Vol. 149, pp. 317- 323,
2011.
28. J. Choy, A. Zhang, K. Khoo, M. Henricksen and A. Poschmann, “AES Variant Secure Against Related-key, Differntial and
Boomerang attacks”, in the proceedings of 5th International workshop on Information Security Theory and Practice. Security and
Privacy of Mobile Devices in Wireless Communication - Lecture Notes in Computer Science, Vol. 6633, pp. 191-207, 2011.
29. L. Hathaway, “National policy on the use of the advanced encryption standard (aes) to protect national security systems and national
security information,” National Security Agency, vol. 23, 2003.
30. I. C. Paar and I. J. Pelzl, “Introduction to Public-Key Cryptography,” in Understanding Cryptography, Springer Berlin Heidelberg,
2010, pp. 149-171.

Authors: Garima Mathur, Navita Nathani

Paper Title: Personality Traits and Risk Tolerance among Young Investors

Abstract: India is a developing nation with highest number of youths in world. The youth is growing in the
era of internet, least fare Wi-Fi connections. They have ample of knowledge available at one click. For any
decision they search multiple options which give them sense that they are opting for the best and will reduce the
chances of setbacks. Although every individual vary in their risk taking capacity and the capacity to tolerate
setbacks is mostly related to kind of personality characteristics an individual carry. Present study is an attempt to
identify the kind of relationship between personality types in (BIG Five model) and risk tolerance among youth.
There are five personality traits measured through BIG Five namely; Extraversion, Agreeableness,
Conscientiousness, Neuroticism (Emotional Instability) and Openness to Experience. The study intended to ask
whether these personality types play an important role in deciding tolerance behavior among young investors.
The data was collected on a five point scale for all five personality traits. Each trait was evaluated through five
statements on a scale developed by Mayfield, Perdue & Wooten (2008) modified by Wong, Chuah, Kui, Soo &
Ang (2016). There were 25 statements in totality for measuring personality traits. The data was collected for risk
tolerance, inclusive of eight items developed by Grable and Lytton (1999). There were 102 respondents from
whom data was collected. The sampling respondents were in the age range of 22 to 27 years, who either have
just started earning or having less than 5 years of total earning tenure. These investors are considered a bit
selective but high in risk tolerance. We also intend to find out the kind of relationship between variables. Results
indicated that Agreeableness, Neuroticism and Openness were strongly correlated to risk tolerance, but there was
354. no significant relationship of extraversion and conscientiousness with risk tolerance. Furthermore, risk tolerance
was checked on the basis of gender. The results indicated that there was no difference in risk tolerance of male 2019-
and female investors unlikely suggested by Mishra, Lalumiere & William (2011) who stated that risk propensity 202
varies from male to female. 3

Keywords: Big Five, Neuroticism, Openness to Experience, Conscientiousness, Extravert, Agreeableness, risk
tolerance.

References:

1. Anic, Gabriella (2007). The association between personality and risk taking. Graduate Theses and Dissertations.
http://scholarcommons.usf.edu/etd/605
2. Barsky, R. B., Juster, F. T., Kimball, M. S. & Shapiro, M. D. (1997). Preference parameters and behavioral heterogeneity: An
experimental approach in the Health and Retirement Study, Quarterly Journal of Economics, 112(2), 537-579.
3. Bye, R., & Lamvik, G. M. (2007). Organizational culture and risk perception. Zagadnienia Eksploatacji Maszyn, 42(2), 131-146.
4. Chen, H., & Volpe, R. P. (2002). Gender differences in personal financial literacy among college students. Financial services
review, 11(3), 289-307.
5. Corter, J. E., & Chen, Y. J. (2006). Do investment risk tolerance attitudes predict portfolio risk? Journal of Business and
Psychology, 20(3), 369.
6. Costa, P. T., & McCrae, R. R. (1992a). Normal personality assessment in clinical practice: The NEO Personality Inventory.
Psychological Assessment, 4, 5–13.
7. Costa, P. T., & McCrae, R. R. (1992b). Professional Manual: Revised NEO Personality Inventory (NEO-PI-R) and NEO five-Factor
Inventory (NEO-FFI). Lutz, FL: Psychological Assessment Resources, Inc.
8. Costa, P. T., & McCrae, R. R. (2003). NEO-FFI: NEO Five Factor Inventory. Lutz, FL: Psychological Assessment Resources, Inc.
9. Costa, P. T., Jr., Terracciano, A., & McCrae, R. R. (2001). Gender differences in personality traits across cultures: Robust and
surprising findings. Journal of Personality and Social Psychology, 81, 322–331. http://dx.doi.org/10.1037/0022-3514.81.2.322
10. Davies, G. B., & Brooks, P. (2014). Risk tolerance: Essential, behavioural and misunderstood. Journal of Risk Management in
Financial Institutions, 7(2), 110-113.
11. Dhiman, B., & Raheja, S. (2017). Does personality traits and emotional intelligence influence investment decisions of investors?. Asian
Journal of Research in Social Sciences and Humanities, 7(7), 99-110.
12. Dutta, M., Halder, A. K., & Singh, S. Anic, G. (2007). The association between personality and risk taking.B. (2010). Morphology and
properties of hot dip Zn–Mg and Zn–Mg–Al alloy coatings on steel sheet. Surface and Coatings Technology, 205(7), 2578-2584.
13. Eysenck, H. J. (1967). The biological basis of personality. Springfield, IL: Thomas.
14. Falahati, L., & Paim, L. (2011). Gender Differences in Financial Well-Being among College Students. Journal of Basic and Applied
Sciences, 5(9), 1765-1776.
15. Falahati, L., & Paim, L. (2012). Gender Differences in Saving Behavior Determinants among University Students. Journal of Basic and
Applied Sciences, 2(6), 5848- 5854.
16. Grable, J., & Lytton, R. H. (1999). Financial risk tolerance revisited: the development of a risk assessment instrument. Financial
services review, 8(3), 163-181.
17. John OP, Naumann LP, Soto CJ (2008). Paradigm shift to the integrative Big Five trait taxonomy: History, measurement, and
conceptual issues. In RWOP John, Handbook of personality: New York: Guilford Press. Theory Res. pp.114-158.
18. Kannadhasan, M. (2015). Retail investors financial risk tolerance and their risk taking behaviour: The role of demographics as
differentiating and classifying factors. IIMB Management Review, 27, 175-184.
19. Laing, G. (2010). Impact of cognitive biases on decision making by financial planners: Sunk cost, framing and problem
space. International Journal of Economics and Finance, 2(1), 11-22.
20. Mayfield, C., Perdue, G., & Wooten, K. (2008). Investment management and personality type. Financial Services Review, 17(3), 219-
236.
21. Mishra, S., Lalumière, M. L., & Williams, R. J. (2010). Gambling as a form of risk-taking: Individual differences in personality, risk-
accepting attitudes, and behavioral preferences for risk. Personality and Individual Differences, 49(6), 616-621.
22. Mishra, S., Lalumière, M. L., Morgan, M., & Williams, R. J. (2011). An examination of the relationship between gambling and
antisocial behavior. Journal of Gambling Studies, 27(3), 409-426.
23. Mohamad Anuar Md Amin, Nur Azura Sanusi, Suhal Kusairi and Zuhura Mohamed Abdallah (2014). Inverse relationship of financial
risk and performance in commercial banks in Tanzania. Investment Management and Financial Innovations, 11(4-1).
24. Nicholson, N., Soane, E., Fenton ‐ O'Creevy, M., &Willman, P. (2005). Personality and domain ‐ specific risk taking. Journal of Risk
Research, 8(2), 157-176
25. Oehler, A., & Wedlich, F. (2018). The relationship of extraversion and neuroticism with risk attitude, risk perception, and return
expectations. Journal of Neuroscience, Psychology, and Economics, 11(2), 63.
26. Pak, O., & Mahmood, M. (2015). Impact of personality on risk tolerance and investment decisions: A study on potential investors of
Kazakhstan. International Journal of Commerce and Management, 25(4), 370-384.
27. Sadi, R., Asl, H., Rostami, M., Gholipour, A. and Gholipour, F. (2011). Behavioral finance: The explanation of investors’ personality
and perceptual biases effects on financial decisions. International Journal of Economics and Finance, 3(5), 234-241.
28. Sadiq, M., & Amna, H. (2019). Impact of Personality Traits on Risk Tolerance and Investors' Decision Making. International Journal
of Applied Behavioral Economics (IJABE), 8(1), 1-20.
29. Thanki, H. 2015. Risk Tolerance Dependent on What? Demographics or Personality Type: Findings from an Empirical Research.
Journal of Marketing and Consumer Research , 6, 48-56.
30. Weller, J. and Thulin, E. (2012). Do honest people take fewer risks? Personality correlates of risk-taking to achieve gains and avoid
losses in HEXACO space. Personality and Individual Differences, 53(7), 923-926.
31. Wong, C. H., Chuah, C. Y., Kui, S. B., Soo, L. H., & Ang, S. Z. (2016). The effect of personality traits and demographic characteristics
towards risk tolerance and investment decision making (Doctoral dissertation, UTAR).
32. Zaleskiewicz, T. (2001). Beyond risk seeking and risk aversion: Personality and the dual nature of economic risk taking. European
journal of Personality, 15(S1), S105-S122.

Authors: Parthipan G, Dhiyaneswaran J, Vimal raja M, Rajesh K, Sanjeeviraj K

Paper Title: Fabrication of Wireless Remote Controlled Electric Lawn Mower


Abstract: Pollution is considered as an important problem in the present world. Usage of Gas Lawn-mowers
creates Noise and Smoke pollution which is harmful to the environment. So the replacement of Gas mowers with
the Electric lawn mowers which runs by Electric motors will be the better solution. The design objective is to
build an electric lawn mower which is controlled by using a micro-controller called NodeMCU. The micro-
controller is connected wirelessly to the mobile phone through Wi-Fi. The use of IoT (Internet of Things) in this
lawn mower plays a major role. The whole model is controlled with the mobile application. We use a total of
three controls in the application which is used to control the movements of the geared motors. Two of these
controls are used for the motion of the lawn mower, and the third controls the cutting motor. The speed of all
these motion motors can be controlled since analog outputs are obtained from the NodeMCU. Here, human
effort is less. Compared to the gas mower, the electric mower has a less pollution rate.
355.
2024-
Keywords: Lawn Mower, Electric Motors, Micro-controller, Node MCU. 202
7
References:

1. Priest, M. W., D. J. Williams, and H. A. Bridgman. "Emissions from in-use lawn-mowers in Australia." Atmospheric Environment 34.4
(2000): 657-664.
2. Lerman, Susannah B., and Alexandra R. Contosta. "Lawn mowing frequency and its effects on biogenic and anthropogenic carbon
dioxide emissions." Landscape and urban planning 182 (2019): 114-123.
3. Simple Design of Self-Powered Lawn Mower, Basil Okafor , Department of Mechanical Engineering, Federal. University of
Technology Owerri, Imo State, Nigeria
4. Optimization of the operating parameters of a grass trimming machine, Zulquernain Mallick*, Department of Mechanical Engineering,
Jamia Millia Islamia, Jamia Nagar, New-Delhi-110025, India
5. "Arduino Alternatives: 5 Microcontrollers You Should Know." Popular Mechanics.
6. "RCArduino" How To Read an RC Receiver With A Microcontroller.

Authors: Manas Kumar Yogi

Paper Title: Handling Multifacets of Trust Management in Cyber Physical Systems


Abstract: Trust should be learnt from history and context sensitive. It should not be absolute in nature. Due to
the conglomeration of various technologies in a secure cyber physical system it is quite a challenge to handle
356.
trust issues in a cyber physical system. Trust management in cyber physical system is needed due to increase in
the degree of autonomy, decentralized policies ,dynamic environment, decision-making based on social 2028-
rules,customs,laws,values, and ethics. This chapter brings light into the existing strategies already applied by 203
few organizations, their inherent benefits and consequent shortcomings too. There are many factors contributing 2
towards the establishment, expression, evaluation ,maintenance of trustworthiness. In this chapter we advocate a
novel framework for trust management which stands up to the research directions of how to build a
unifiedframework for trust management, how to modify the way we compute trust, how to decide the right
granularity for a trust model.

Keywords: Trust,, Policy ,Reputation, Request, Credential, Revocable.

References:

1. R.F. Babiceanu, R. Seker, Big data and virtualization for manufacturing cyber-physical systems: A survey of the current status and
future outlook, Computers in Industry, 81 (2016) 128-137.
2. R.F. Babiceanu, R. Seker, Manufacturing operations, Internet of things, and big data: Towards predictive manufacturing systems, in:
T. Borangiu, D. Trentesaux, A. Thomas, (Eds.), Service Orientation in Holonic and Multi-Agent Manufacturing, Springer Studies in
Computational Intelligence, 594 (2015), pp. 157-164.
3. R.F. Babiceanu, R. Seker, Manufacturing cyber-physical systems enabled by complex event processing and big data environments: A
framework for development, in: T. Borangiu, D. Trentesaux, A. Thomas, (Eds.), Service Orientation in Holonic and Multi-Agent
Manufacturing, Springer Studies in Computational Intelligence, 594 (2015), pp. 165-173.
4. M. Goodman, Future Crimes: Everything is Connected, Everyone is Vulnerable, and What We Can Do About It, Random House, New
York,2015.
5. P.A.A. Ralston, J.H. Graham, J.L. Hieb, Cyber security risk assessment for SCADA and DCS networks, ISA Transactions, 46 (2007)
583-594.
6. L. Wang, M. Torngren, M. Onori, Current status and advancement of cyber-physical systems in manufacturing, Journal of
Manufacturing Systems, 37 (2015) 517-527.
7. L.J. Wells, J.A. Camelio, C.B. Williams, J. White, Cyber-physical security challenges in manufacturing systems, Manufacturing
Letters, 2(2014) 74-77.

Authors: D. Christy Daniel, L. Shyamala


Paper Title: An Insight on Sentiment Analysis Research from Text using Deep Learning Methods
Abstract: Nowadays, Deep Learning (DL) is a fast growing and most attractive research field in the area of
image processing and natural language processing (NLP), which is being adopted across several sectors like
medicine, agriculture, commerce and so many other areas as well. This is mainly because of the greater
advantages in using DL like automatic feature extraction, capability to process more number of parameters and
capacity to generate more accuracy in results. In this paper, we have examined the research works which have
used the DL based Sentiment Analysis (SA) for the social network data. This paper provides the brief
explanation about the SA, the necessities of the pre-processing of text, performance metrics and the roles of DL
models in SA. The main focus of this paper is to explore how the DL algorithms can enhance the performance of
SA than the traditional machine learning algorithms for text based analysis. Since DL models are more effective
for NLP research, the text classification can be applied on the complex sentences in which there are two inverse
emotions which produces the two different emotions about an event. Through this literature appraisal we
conclude that by using the Convolutional Neural Network (CNN) technique we can obtain more accuracy than
others. The paper also brings to the light that there is no major focus on mixed emotions by using DL methods,
which eventually increases the scope for future researches.

Keywords: Sentiment Analysis, Deep Learning, Machine Learning, Neural Networks.


357. References: 2033-
204
1. Tsytsarau, Mikalai, Themis Palpanas. Survey on mining subjective data on the web. Data Mining and Knowledge Discovery, 24.3
(2012): 478-514.
8
2. Pang, Bo, Lillian Lee, ShivakumarVaithyanathan. Thumbs up?: sentiment classification using machine learning
techniques. Proceedings of the ACL-02 conference on Empirical methods in natural language processing-Volume 10, Association for
Computational Linguistics, 2002.
3. Turney, Peter D. Thumbs up or thumbs down?: semantic orientation applied to unsupervised classification of reviews. Proceedings of
the 40th annual meeting on association for computational linguistics, Association for Computational Linguistics, 2002.
4. Wiebe, Janyce M, Rebecca F. Bruce, Thomas P. O'Hara. Development and use of a gold-standard data set for subjectivity
classifications. Proceedings of the 37th annual meeting of the Association for Computational Linguistics on Computational Linguistics,
Association for Computational Linguistics, 1999.
5. Hu, Minqing, Bing Liu. Mining and summarizing customer reviews. Proceedings of the tenth ACM SIGKDD international conference
on Knowledge discovery and data mining, ACM, 2004.
6. Larsen JT, McGraw AP. Further evidence for mixed emotions. J Pers Soc Psychol, 2011 Jun; 100(6):1095-110.
7. Annett M, Kondrak G. A comparison of sentiment analysis techniques: Polarizing movie blogs. In Conference of the Canadian Society
for Computational Studies of Intelligence, 2008 May 28 (pp. 25-35), Springer, Berlin, Heidelberg.
8. Shukla A, Misra R. Sentiment Classification and Analysis Using Modified K-Means and Naïve Bayes Algorithm. International Journal
of Advanced Research in Computer Science and Software Engineering, 2015 Aug;5(8):80-5.
9. Pouyanfar S, Sadiq S, Yan Y, Tian H, Tao Y, Reyes MP, Shyu ML, Chen SC, Iyengar SS. A Survey on Deep Learning: Algorithms,
Techniques, and Applications. ACM Computing Surveys (CSUR), 2018 Sep 18;51(5):92.
10. MedhatW, Hassan A, Korashy H. Sentiment analysis algorithms and applications:
11. Xu L, Jiang C, Ren Y, Chen HH. Microblog dimensionality reduction—a deep learning approach. IEEE Transactions on Knowledge
and Data Engineering, 2016 Jul 1;28(7):1779-89.
12. Araque O, Corcuera-Platas I, Sanchez-Rada JF, Iglesias CA. Enhancing deep learning sentiment analysis with ensemble techniques in
social applications. Expert Systems with Applications, 2017 Jul 1;77:236-46.
13. Al-Sallab A, Baly R, Hajj H, Shaban KB, El-Hajj W, Badaro G. AROMA: a recursive deep learning model for opinion mining in
Arabic as a low resource language. ACM Transactions on Asian and Low-Resource Language Information Processing (TALLIP),
2017 Jul 13;16(4):25.
14. Majumder N, Poria S, Gelbukh A, Cambria E. Deep learning-based document modeling for personality detection from text. IEEE
Intelligent Systems, 2017 Mar;32(2):74-9.
15. Li J, Li H, Kang X, Yang H, Zong C. Incorporating Multi-Level User Preference into Document-Level Sentiment Classification. ACM
Transactions on Asian and Low-Resource Language Information Processing (TALLIP), 2018 Nov 19;18(1):7.
16. Meisheri H, Ranjan K, Dey L. Sentiment extraction from Consumer-generated noisy short texts. In Data Mining Workshops
(ICDMW), 2017 IEEE International Conference on 2017 Nov 18 (pp. 399-406), IEEE.
17. Jianqiang Z, Xiaolin G, Xuejun Z. Deep Convolution Neural Networks for Twitter Sentiment Analysis. IEEE Access, 2018;6:23253-
60.
18. Chatterjee A, Gupta U, Chinnakotla MK, Srikanth R, Galley M, Agrawal P. Understanding Emotions in Text Using Deep Learning and
Big Data. Computers in Human Behavior, 2019 Apr 1;93:309-17.
19. Akhtar MS, Kumar A, Ekbal A, Bhattacharyya P. A hybrid deep learning architecture for sentiment analysis. In Proceedings of
COLING 2016, the 26th International Conference on Computational Linguistics: Technical Papers 2016 (pp. 482-493).
20. Kim Y. Convolutional neural networks for sentence classification. arXiv preprint arXiv:1408.5882, 2014 Aug 25.
21. Go A, Bhayani R, Huang L. Twitter sentiment classification using distant supervision. CS224N Project Report, Stanford, 2009
Dec;1(12).
22. Manning C, Surdeanu M, Bauer J, Finkel J, Bethard S, McClosky D. The Stanford CoreNLP natural language processing toolkit. In
Proceedings of 52nd annual meeting of the association for computational linguistics: system demonstrations 2014 (pp. 55-60).
23. Kathuria P.(2015). Sentiment wsdgithub repository . https://github.com/kevincobain20 0 0/sentiment _ classifier/ . Accessed on May
30, 2016.
24. Narayanan V, Arora I, Bhatia A. Fast and accurate sentiment classification using an enhanced Naive Bayes model. In International
Conference on Intelligent Data Engineering and Automated Learning 2013 Oct 20 (pp. 194-201), Springer, Berlin, Heidelberg.
25. Smedt TD, Daelemans W. Pattern for python. Journal of Machine Learning Research. 2012;13(Jun):2063-7.
26. Loria, S. (2016). Textblob documentation page . https://textblob.readthedocs.org/en/ dev/index.html . Accessed on May 30, 2016.
27. Guimaraes RG, Rosa RL, De Gaetano D, Rodriguez DZ, Bressan G. Age Groups Classification in Social Network Using Deep
Learning. IEEE Access, 2017;5:10805-16.
28. Ren X, Zhou Y, He J, Chen K, Yang X, Sun J. A convolutional neural network-based chinese text detection algorithm via text structure
modeling. IEEE Transactions on Multimedia, 2017 Mar;19(3):506-18.
29. Chen Y, Zhang Z. Research on text sentiment analysis based on CNNs and SVM. In2018 13th IEEE Conference on Industrial
Electronics and Applications (ICIEA) 2018 May 31 (pp. 2731-2734). IEEE.
30. Li Y, Wei B, Liu Y, Yao L, Chen H, Yu J, Zhu W. Incorporating knowledge into neural network for text representation. Expert
Systems with Applications, 2018 Apr 15;96:103-14.
31. Rezaeinia SM, Rahmani R, Ghodsi A, Veisi H. Sentiment analysis based on improved pre-trained word embeddings. Expert Systems
with Applications, 2019 Mar 1;117:139-47.
32. Alharbi AS, de Doncker E. Twitter sentiment analysis with a deep neural network: An enhanced approach using user behavioral
information. Cognitive Systems Research, 2019 May 1;54:50-61.
33. Zhao R, Mao K. Topic-aware deep compositional models for sentence classification. IEEE/ACM Transactions on Audio, Speech, and
Language Processing, 2017 Feb;25(2):248-60.
34. Cho K, Van Merriënboer B, Gulcehre C, Bahdanau D, Bougares F, Schwenk H, Bengio Y. Learning phrase representations using RNN
encoder-decoder for statistical machine translation. arXiv preprint arXiv:1406.1078, 2014 Jun 3.
35. Dragoni M, Petrucci G. A neural word embeddings approach for multi-domain sentiment analysis. IEEE Transactions on Affective
Computing, 2017 Oct 1;8(4):457-70.
36. Lee SH, Kim DM, Cheong YG. Predicting Emotion in Movie Scripts Using Deep Learning. In Big Data and Smart Computing
(BigComp), 2018 IEEE International Conference on 2018 Jan 15 (pp. 530-532). IEEE.
37. Kratzwald B, Ilić S, Kraus M, Feuerriegel S, Prendinger H. Deep learning for affective computing: Text-based emotion recognition in
decision support. Decision Support Systems, 2018 Nov 1;115:24-35.
38. Huang M, Qian Q, Zhu X. Encoding syntactic knowledge in neural networks for sentiment classification. ACM Transactions on
Information Systems (TOIS), 2017 Jun 9;35(3):26.
39. Hinton GE. Deep belief networks. Scholarpedia, 2009 May 31;4(5):5947.
40. Sun X, Gao F, Li C, Ren F. Chinese microblog sentiment classification based on convolution neural network with content extension
method. In 2015 International Conference on Affective Computing and Intelligent Interaction (ACII) 2015 Sep 1 (pp. 408-414). IEEE.
41. Chaturvedi I, Ong YS, Tsang IW, Welsch RE, Cambria E. Learning word dependencies in text by means of a deep recurrent belief
network. Knowledge-Based Systems, 2016 Sep 15;108:144-54.
42. Hassan A, Mahmood A. Convolutional Recurrent Deep Learning Model for Sentence Classification. IEEE Access, 2018;6:13949-57.
43. Xia F, Zhang Z. Study of text emotion analysis based on deep learning. In 2018 13th IEEE Conference on Industrial Electronics and
Applications (ICIEA) 2018 May 31 (pp. 2716-2720), IEEE.
44. Chen T, Xu R, He Y, Wang X. Improving sentiment analysis via sentence type classification using BiLSTM-CRF and CNN. Expert
Systems with Applications, 2017 Apr 15;72:221-30.
45. Sun B, Tian F, Liang L. Tibetan Micro-Blog Sentiment Analysis Based on Mixed Deep Learning. In 2018 International Conference on
Audio, Language and Image Processing (ICALIP) 2018 Jul 16 (pp. 109-112), IEEE.
46. Lin D, Li L, Cao D, Lv Y, Ke X. Multi-modelity weakly labeled sentiment learning based on Explicit Emotion Signal for Chinese
microblog. Neurocomputing, 2018 Jan 10;272:258-69.
47. Wu C, Wu F, Wu S, Yuan Z, Liu J, Huang Y. Semi-supervised dimensional sentiment analysis with variational autoencoder.
Knowledge-Based Systems, 2019 Feb 1;165:30-9.
48. Socher R, Lin CC, Manning C, Ng AY. Parsing natural scenes and natural language with recursive neural networks. In Proceedings of
the 28th international conference on machine learning (ICML-11) 2011 (pp. 129-136).

Authors: T. Anuprathibha, C. S. KanimozhiSelvi


Enhanced Medical Tweet Opinion Mining using Improved Dolphin Echolocation Algorithm Based
Paper Title:
Feature Selection
Abstract: Extraction and analysis of public opinions from social network data can provide interesting
outcomes and inferences about product, service, event or personality. Twitter is one of the most popular medium
358. for analyzing the public sentiment through user tweets. Feature specific opinion analysis provides highly 2049-
accurate and effective classification and categorization of public opinions. This paper focuses on developing an 205
opinion mining framework for automated analysis of tweet opinions using efficient feature selection and 5
classification algorithms. For this purpose, an Improved Dolphin Echolocation Algorithm (IDEA) is developed
by enhancing the optimization performance of the Dolphin Echolocation Algorithm (DEA). The limitations of
DEA are the insufficient exploration and exploitation properties in local optimum solutions and also impact the
convergence rate. These shortcomings are overcome by the proposed IDEA algorithm. In this work, first the
tweets are collected and pre-processed to extract the features using Part-of-Speech (POS) tagging and n-grams
aided by a dictionary. Using IDEA, the feature subset candidates are selected and the outcomes are fed as input
to the baseline classifiers to obtain highly accurate opinion classification. The evaluation of the k-Nearest
Neighbor (KNN), Naïve Bayes (NB) and Support Vector Machine (SVM) classifiers using the two feature
selection approaches of DEA and IDEA are performed over cancer and drug tweets datasets and the results
illustrate that the classification accuracy of opinions is enhanced significantly through the IDEA based feature
selection than the traditional DEA algorithm. These results justify the utilization of the proposed IDEA
algorithm for improving the opinion mining applications in different fields.
Keywords: Dolphin Echolocation Algorithm, Feature specific opinion analysis, Improved Dolphin
Echolocation Algorithm, Opinion mining, sentiment analysis, Support Vector Machine.

References:

1. E. Kouloumpis, T. Wilson and J. Moore, “Twitter sentiment analysis: The good the bad and the omg!,” In Fifth International AAAI
conference on weblogs and social media, pp. 538-54, July 2011.
2. Sabari, “A High End Sentimental Analysis in Social Media Using Hash Tags,” Journal of Applied Science and Engineering
Methodologies, vol. 1, no. 1, pp. 137-143, 2015.
3. H. Saif, Y. He and H. Alani, “Semantic sentiment analysis of twitter,” In International semantic web conference, Springer, Berlin,
Heidelberg, pp. 508-524, Nov 2012.
4. S. Kumar, F. Morstatter and H. Liu, Twitter data analytics. New York: Springer, pp. 1041-4347, 2014.
5. K. Weller, A. Bruns, J. Burgess, M. Mahrt and C. Puschmann, Twitter and society. Peter Lang, vol. 89, 2014.
6. K. Thomas, C. Grier, D. Song and V. Paxson, “Suspended accounts in retrospect: an analysis of twitter spam,” In Proceedings of the
2011 ACM SIGCOMM conference on Internet measurement conference, pp. 243-258, Nov 2011.
7. Liu, “Sentiment Analysis and Subjectivity,” Handbook of natural language processing, vol. 2, no. 2010, pp. 627-666, 2010.
8. M. Taboada, J. Brooke, M. Tofiloski, K. Voll and M. Stede, “Lexicon-based methods for sentiment analysis,” Computational
linguistics, vol. 37, no. 2, pp. 267-307, 2011.
9. G. Sidorov, S. Miranda-Jiménez, F. Viveros-Jiménez, A. Gelbukh, N. Castro-Sánchez, F. Velásquez and J. Gordon, “Empirical study
of machine learning based approach for opinion mining in tweets,” In Mexican international conference on Artificial intelligence,
Springer, Berlin, Heidelberg, pp. 1-14, Oct 2012.
10. Mudinas, D. Zhang and M. Levene, “Combining lexicon and learning based approaches for concept-level sentiment analysis,”
In Proceedings of the first international workshop on issues of sentiment discovery and opinion mining, ACM, p. 5, Aug 2012.
11. Stojanovski, G. Strezoski, G. Madjarov, I. Dimitrovski and I. Chorbev, “Deep neural network architecture for sentiment analysis and
emotion identification of Twitter messages,” Multimedia Tools and Applications, vol. 77, no. 24, pp. 32213-32242, 2018.
12. M. M. Mostafa, “Mining and mapping halal food consumers: A geo-located Twitter opinion polarity analysis,” Journal of Food
Products Marketing, vol. 24, no. 7, pp. 858-879, 2018.
13. N. Zainuddin, A. Selamat and R. Ibrahim, “Hybrid sentiment classification on twitter aspect-based sentiment analysis,” Applied
Intelligence, vol. 48, no. 5, pp. 1218-1232, 2018.
14. Al-Thubaity, Q. Alqahtani and A. Aljandal, “Sentiment lexicon for sentiment analysis of Saudi dialect tweets,” Procedia computer
science, vol. 142, pp. 301-307, 2018.
15. P. Rodrigues and N. N. Chiplunkar, “A new big data approach for topic classification and sentiment analysis of Twitter
data,” Evolutionary Intelligence, pp. 1-11, 2019.
16. H. Alahmadi and X. J. Zeng, “Twitter-based recommender system to address cold-start: A genetic algorithm based trust modelling
and probabilistic sentiment analysis,” In 2015 IEEE 27th International Conference on Tools with Artificial Intelligence (ICTAI), pp.
1045-1052, Nov 2015.
17. N. Yuvaraj and A. Sabari, “Twitter sentiment classification using binary shuffled frog algorithm,” Intelligent Automation & Soft
Computing, vol. 23, no. 2, pp. 373-381, 2017.
18. Kumar and A. Jaiswal, “Swarm intelligence based optimal feature selection for enhanced predictive sentiment accuracy on
twitter,” Multimedia Tools and Applications, pp. 1-25, 2019.
19. M. Tubishat, M. A. Abushariah, N. Idris and I. Aljarah, “Improved whale optimization algorithm for feature selection in Arabic
sentiment analysis,” Applied Intelligence, vol. 49, no. 5, pp. 1688-1707, 2019.
20. L. Goel and A. Garg, “Sentiment Analysis of Social Networking Websites using Gravitational Search Optimization
Algorithm,” International Journal of Applied Evolutionary Computation (IJAEC), vol. 9, no. 1, pp. 76-85, 2018.
21. G. S. Budhi, R. Chiong, Z. Hu, I. Pranata and S. Dhakal, “Multi-PSO based Classifier Selection and Parameter Optimisation for
Sentiment Polarity Prediction,” In 2018 IEEE Conference on Big Data and Analytics (ICBDA), pp. 68-73, Nov 2018.
22. R. M. Packiam and V. S. J. Prakash, “A Novel Integrated Framework Based on Modular Optimization for Efficient Analytics on
Twitter Big Data,” In Information and Communication Technology for Intelligent Systems, Springer, Singapore, pp. 213-224, 2019.
23. Bell, J. M. Brenier, M. Gregory, C. Girand and D. Jurafsky, “Predictability effects on durations of content and function words in
conversational English,” Journal of Memory and Language, vol. 60, no. 1, pp. 92-111, 2009.
24. A. Kaveh and N. Farhoudi, “A new optimization method: Dolphin echolocation,” Advances in Engineering Software, vol. 59, pp. 53-
70, 2013.

Authors: G. Santhana Devi, M. Germanus Alex

Paper Title: Rapid Emergncy Message Dissemination Routing In Delay Tolerant Network
Abstract: In VANET, vehicles are move very fast as a consequence intermittent connectivity occurs
frequently. In this delay-tolerant situation, the emergency rescue message broadcast is an extremely challenging
task. The proposed routing protocol REMD give a solution to the problem. REMD follow the store carry
forward method and flooding based message forwarding method. This paper expresses rapid emergency message
359. dissemination routing in delay tolerant network called REMD Protocol. In this protocol, the source vehicle
2056-
broadcast emergency message to the presented all neighbour vehicles in its communication range. The sender
206
vehicle allocates message replicas and message time to live to the neighbour vehicles based on the
0
corresponding vehicles credence value. Each vehicle credence value is calculated from their Visited Level
Estimation (VLE) and Destination Reaches Level Estimation (DLE) values.

Keywords: Delay-tolerant network, credence value, emergency message, message dissemination, routing
protocol.
References:

1. Small T and Haas Z-J, “Resource and performance tradeoffs in delay-tolerant wireless networks,” in Proceeding of the 2005 ACM
SIGCOMM Workshop on Delay-tolerant networking - WDTN ’05. New York, New York, USA: ACM Press, 2005, pp. 260–267.
2. Vahdat A and Becker D, “Epidemic Routing for Partially Connected Ad Hoc Networks,” in Technical Report CS-200006, vol. CS-
200006, no. CS-200006. Duke University, Apr. 2000, pp. CS–2000–06.
3. Burgess J, Gallagher B, Jensen D, and Levine B-N, “MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks,” in
Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, vol. 6, no. c, Barcelona,
Spain, Apr. 2006, pp. 1–11.
4. Fu, Qiao, Lin Zhang, Wei Feng, and Yixin Zheng, (2011), ”Dawn: A density adaptive routing algorithm for vehicular delay tolerant
sensor networks.” In Communication, Control, and Computing (Allerton), 2011 49th Annual Allerton Conference on, pp. 1250-1257.
IEEE.
5. Lo, Wei-Zen, Jhih-Siao Gao, and Shou-Chih Lo, (2012), ”Distance-aware routing with copy control in vehicle-based DTNs.” In
Vehicular Technology Conference (VTC Spring), IEEE 75th, pp. 1-5. IEEE, 2012.
6. Wu, Di, Gang Zhu, and Dongmei Zhao,(2013), ”Adaptive carry-store forward scheme in two-hop vehicular delay tolerant networks.”
Communications Letters, IEEE 17, no. 4, pp. 721-724.
7. Soares, Vasco NGJ, Joel JPC Rodrigues, and Farid Farahmand, (2014), ”GeoSpray: A geographic routing protocol for vehicular delay-
tolerant networks.” Information Fusion 15 : 102-113.
8. K. Obraczka, K. Viswanath, and G. Tsudik, “Flooding for reliable multicast in multi-hop ad hoc networks,” Wireless Networks, vol. 7,
no. 6, pp. 627–634, 2001 .
9. Leontiadis, Ilias, and Cecilia Mascolo, (2007), ”Geopps: Geographical opportunistic routing for vehicular networks.” In World of
Wireless, Mobile and Multimedia Networks, 2007. WoWMoM 2007. IEEE International Symposium on a, pp. 1-6.
10. Zhao J and Cao G, (2008), “Vadd: Vehicle-assisted data delivery in vehicular ad hoc networks”, IEEE Transactions on Vehicular
Technology, 57(3), pp. 1910-1922.
11. Khabbaz, Maurice J., Wissam F. Fawaz, and Chadi M. Assi, (2011), ”Probabilistic bundle relaying schemes in two-hop vehicular delay
tolerant networks.” Communications Letters, IEEE 15, no. 3 , pp. 281-283.

Authors: Nitin Sahai, Adarsha B. Chandran, Akashitara Bhuyan, Bikash Das, Sushil Mandal, Tribedi Sarma

Paper Title: Effect of Yoga on Physical and Physiological Parameters


Abstract: Yoga is an ancient science which is practiced by an individual as a physical and mental exercise to
become fit and healthy. In current study we perform various YOGA exercises to see its effects on various
physiological parameters. The main objective of this study is to analyze the effect of karma yoga on physical
(strength of quadriceps group of muscles) and physiological parameters such as blood oxygen saturation level
(SpO2), heart rate and blood pressure. Healthy subjects are selected randomly for yoga session. SpO2, heart
rates are measured using pulse oximeter and blood pressure using blood pressure apparatus. We used
Electromyogram (EMG) acquisition and analysis software to acquire EMG signal from the quadriceps muscle.
The variations in the physical and physiological parameters after performing karma yoga for a period of time are
observed. The study concludes that there is a significant improvement in the strength of quadricep muscle but
reduction in the pulse rate, SpO2, systolic and diastolic blood pressure after practicing the scheduled yoga. The
significant results of these experiments show that if yoga exercises will be performed by any individual then its
helps in improving their physiological parameters.

Keywords: Yoga, Blood oxygen saturation level, heart rate, blood pressure, pulse oximeter, electromyogram.

References:

1. Jyotsana R. Bharshankar et al, “Effect of Yoga on Cardiovascular System in Subjects Above 40 Years”, Indian Journal of Physiology
and Pharmacology 2003, 47(2), pp.202-206.
360. 2. Mandanmohan, L. Jatiya, K. Udupa and A. B. Bhavanani, “Effects of Yoga training on handgrip, respiratory pressures and
pulmonary functions”, Indian J Physiol Pharmacol 2003, 47(4), pp. 387-392. 2061-
3. J. D. Bronzino, The Biomedical Engineering Handbook, Biomedical Engineering Fundamental 3rd edition, Taylor & Francis Group,
2010.
206
4. N. Florek, Yoga Poses Handbook, Slim for Life, Module 1 STRECH. 4
5. A. Safronov, “Yoga Physiology, psychosomatics, bioenergetics, Strengthening Postures”, Techniques of Firming the Field, Looseness
and Density of Chakra, 2011, pp.1-245.
6. L. Kaminoff, A. Matthews, and S. Ellis, “Yoga anatomy”, USA: Champaign, IL: Human Kinetics, 2007, PP. 33-78.
7. V. S. Cowen and T. B. Adams. "Physical and perceptual benefits of yoga asana practice: results of a pilot study", Journal of Bodywork
and Movement Therapies, 9(3), 2005, PP. 211-219.
8. B. K. S. Ieyengar, “The Illustrated Light on Yoga”, PP.-1-179.
9. A Handbook of Basic Asanas, Indian Institute of Information Technology Design and Manufacturing, Kancheepuram, Chennai, vol.9,
2017.
10. Madanmohan*, k. Udupa, A. B. Bhavanani, C. C. Shatapathy and A. Sahai**, “Modulation of cardiovascular response to exercise by
yoga training”, Indian J Physiol Pharmacol 2004, 48(4): pp.461-465.
11. T. Field, M. Diego, and M. H. Reif. "Tai chi/yoga effects on anxiety, heartrate, EEG and math computations", Complementary
therapies in clinical practice, 16(4), 2010, pp. 235-238.
12. P. K. Acharya, S. Mandal and P. K. Singh, “The effects of yoga (ASANA) on Human Lower Limb Muscles”, International Journal of
Electronics and Telecommunication Technology, vol. 2. SP-1, Dec 2011, pp.263-266.
13. N. Sahai, R. P. Tewari, L. Singh, “Mechanical behavior of muscles during flexion and extension of lower limb on variable age group
by using BRG. LifeMod”, The third international conference on the development of biomedical engineering in Vietnam, Springer,
Berlin, Heidelberg, 2010, pp.48-50.
14. A. Saikia, S. Mazumdar, N. Sahai, S. Paul and D. Bhatia, “Comparative study and feature extraction of the muscle activity patterns in
healthy subjects”, 2016 3rd International Conference on Signal Processing and Integrated Networks (SPIN), IEEE, 2016 147-151.
15. A. Saikia, et al., "Recent advancements in prosthetic hand technology", Journal of medical engineering & technology, 40(5), (2016),
pp. 255-264.
16. P. Sharma et al., “Yoga Practice and Biochemical and Physiological Alterations in Normal Subjects”, Asian Journal of Pharmaceutical
and Clinical Research, 9(2), 2016, PP. 186-188.
17. K. Karak, M. Jana and A. Manna, “Effect of Yoga on Anthropometrical and Physiological variables of college going students”,
International Journal of Physical Education, Sports and Health, 2(2), 2015, pp. 245-249.
18. D. T. Sonwane and N. V. Mishra. "Study of effects of yoga and pranayam on human reaction time and certain physiological parameters
in normal and hypertensive subjects." National Journal of Physiology, Pharmacy and Pharmacology, 6(4), 2016, pp. 323-328.
19. D. Lacerda, 2100 Asanas, The Complete Yoga Poses, Standing Poses Handbook.
20. Beazley, Debra, Shilpa Patel, Brent Davis, Steven Vinson, and Lori Bolgla. "Trunk and hip muscle activation during yoga poses:
Implications for physical therapy practice", Complementary therapies in clinical practice, vol.29, 2017, pp.130-135.
21. N. N. Nayak and K. Shankar. "Yoga: a therapeutic approach", Physical Medicine and Rehabilitation Clinics, 15(4), 2004, pp. 783-798.
22. R. Murugesan, N. Govindarajulu and T. K. Bera*, "Effect of selected yogic practices on the management of hypertension", Indian
Journal of Physiology and Pharmacology, 44(2), 2000, PP. 207-210.
23. Cowen, Virginia S., and Troy B. Adams. "Heart rate in yoga asana practice: A comparison of styles." Journal of Bodywork and
Movement Therapies”, 2007, 11(1), pp.91-95.

Authors: Sanya Anees, Smriti Rekha Baruah, Pallab Sarma

Paper Title: Hybrid RF-FSO System Cascaded with UWOC Link


Abstract: This work presents outage analysis of a hybrid communication system, where radio frequency (RF)
and free space optical (FSO) communication links transmit in parallel to the then cascaded underwater wireless
optical communication (UWOC) link forming a RF/FSO-UWOC cooperative system. Optical wireless
communication (OWC) is being used as a viable communication technology by researchers due to its advantages
such as fast speed, cost effectiveness, and highly secure transmission. The proposed architecture connects the
terrestrial and the underwater regions to form an end-to-end cooperative system. This hybrid RF/FSO back-haul
link makes the system more reliable as the optical link is highly susceptible to weather conditions. The channel
models considered are Nakagami-m distributed fading, Double Generalized Gamma (DGG) distributed
atmospheric turbulence along with Rayleigh distributed misalignment losses and mixture of Exponential
Generalized Gamma (EGG) distributed oceanic turbulence for RF, FSO, and UWOC links, respectively. Results
show that outage performance is severely affected due to RF fading, DGG distributed irradiance, air bubble
concentration, temperature gradient, and saltiness of water source.

Keywords: Double Generalized Gamma, Decode-and-forward, free space optical, optical wireless
communication, radio-frequency, Nakagami-m distribution, underwater optical communication.

References:

1. L. Andrews, R. Phillips, and C. Hopen, Laser Beam Scintillation with Applications. New York, USA: SPIE Press, 2001.
361. 2. D. Kedar and S. Arnon, Urban optical wireless communication networks: The main challenges and possible solutions, IEEE Commun. 2065-
Mag., vol. 42, no. 5, pp. S2S7, Jan. 2004.
3. M. A. Khalighi and M. Uysal, Survey on free space optical communication: A communication theory perspective, IEEE Commun. 206
Surveys & Tutorials, vol. 16, no. 4, pp. 22312258, Fourth quarter 2014. 9
4. Mohammad Ali Amirabadi ” Performance Analysis of a Novel Hybrid FSO/RF Communication System arXiv:1802.07160[eess.SP]
5. S. Anees and M. R. Bhatnagar, Performance of an amplify-and-forward dual-hop asymmetric RF-FSO communication system, IEEE J.
Opt. Commun. Netw., vol. 7, no. 2, pp. 124135, Feb. 2015.
6. S. Anees and M. R. Bhatnagar, Performance evaluation of decode-andforward dual-hop asymmetric RF-FSO system, IET
Optoelectronics, vol. 9, no. 5, pp. 232240, June 2015.
7. Hemani Kaushal and Georges Kaddoum, “Underwater Optical Wireless Communication,” IEEE Access, April vol.4, pp. 1518-1547,
2016
8. Z. Zeng, H. Zhang,Y. Dong and J.Cheng, “A survey of underwater optical wireless Communication,”IEEE Communications Surveys
Tutorials, vol.19, no. 1, pp. 204-238, 2017
9. Mohammad Ali Amirabadi, “Performance Analysis of a Novel Hybrid FSO/RF Communication System,”arXiv:1802.07160 [eess.SP ]
10. R. J Hill, “Optical propagation in turbulent water”, Journal of Optical Society of America, vol. 68, no.8, pp 1067-1072, Aug. 1978
11. C. Gabriel, M. Ali Khalighi, Salah Bourennane, Pierre Leon and Vincent Rigaud, “Monte-Carlo-based channel characterization for
underwater optical communication systems”, IEEE/OSA Journal of Optical Communications and Networking, vol. 5, no.1, pp. 1-12,
January 2013.
12. C. Boucouvalas, K. P. Peppas, K. Yiannopoulos and Z. Ghassemlooy, “Underwater Optical Wireless Communications With Optical
Amplification and Spatial Diversity”, IEEE Photonics Technology Letters, vol. 28, no. 22, November 15, 2016.
13. W. O. Popoola and Z. Ghassemlooy,“Sub-Carrier Intensity Modulated Free-Space Optical Communications in irradiance”, Journal of
Light Wave Technology, vol. 27, no. 8, April 15, 2009
14. E. Zedini, H. M Oubei, A. Kammoun, M. Hamdi, B.S Ooi and M. S Alouini “Unified Statistical Channel Model for Turbulence-
induced fading in underwater wireless optical communications systems”, IEEE Transactions on Communications, 2017.
15. S. Anees and R. Deka, “On the Performance of DF Based Dual-Hop Mixed RF/UWOC System”, IEEE Vehicular Technology
Conference, 2019.
16. H. AlQuwaiee, I. S. Ansari and M.-S. Alouini, “On the Performance of Free space Optical Communication Systems over Double
Generalised Gamma Channel”, IEEE Journal on Selected Area in Communications, vol. 33, no.9, September, 2015.

Authors: Shambhu Nath Sharma, S. Prasanna

Paper Title: A Novel Purchase Target Prediction System using Extreme Gradient Boosting Machines
Abstract: In recent days, electronic business (E-trade) gives more changeto buyers as well as opens doors in
web based promoting and advertising. Online promoters can see increasingly about buyer inclinations,
dependent on their day by day web-based shopping and surfing. The advancement of big data and distributed
362. computing systems further engage promoters and advertisers to have an information driven and purchaser
explicit inclination proposal dependent on the web-basedsurfing narratives. In this article, a decision supportive 2070-
network is proposed to anticipate a customer buy intentionin the middle of surfing. The proposed decision 207
support framework classifies surfing sessions into sales based and common methods utilizing extreme boosting 2
machines. The proposed technique further demonstrates its solid forecasting ability contrasted with other
benchmark calculations which includes logistic retrogression and conventional ensemble brands. The suggested
technique can be executed in actual time offering calculations for web-based publicizing methodologies.
Promotion on surfing session with potential buying expectation enhance the successfulof ads.
Keywords: purchase intention forecast, big data, decision trees machine learning, extreme gradient boosting
machines.

References:

1. S. Rodgers and E. Thorson, “The interactive advertising model: How users perceive and process online ads,” Journal of Interactive
Advertis-ing, Vol.1, pp.41–60, 2000.
2. B. Zheng, K. Thompson, S.W. Yoon, S.S. Lam and N. Gnanasamban-dam, “Customers’ behavior prediction using artificial neural
network,” In Proceedings of Industrial and Systems Engineering Research Confer-ence, pp.700-709, 2013.
3. N. Chen, Y. Chen, X. Ye, H. Ling, S. Song and C.T. Huang, “Smart City Surveillance in Fog Computing,” In Advances in Mobile
CloudComputing and Big Data in the 5G Era (pp. 203–226), SpringerInternational, 2016.
4. G. Zhuo, Q. Jia, L. Guo, M. Li and P. Li, “Privacy-preserving verifiable data aggregation and analysis for cloud-assisted mobile
crowdsourcing,” In IEEE INFOCOM 2016-The 35th Annual IEEE International Confer-ence on Computer Communications (pp. 1-9),
2016.
5. E. Kim, W. Kim and Y. Lee, “Combination of multiple classifiers for the customer’s purchase behavior prediction,” Decision Support
Systems, Vol. 34, pp.167–175, 2003.
6. J. H. Friedman, “Greedy function approximation: a gradient boosting machine,” Annals of Statistics, Vol. 29, pp. 1189–1232, 2001.
7. K. Thompson, B. Zheng, S.W. Yoon, S.S. Lam and N. Gnanasam-bandam, “Understanding behavioral patterns: big data analytics
helps business and government gain insight from social media,” Engineeringand Management Solutions at Work, Vol. 46, No. 4,
pp.28–33, 2014.
8. E. Suh, S. Lim, H. Hwang, and S. Kim, “A prediction model for the purchase probability of anonymous customers to support real time
web marketing: a case study,” Expert Systems with Applications, Vol. 27, No. 2, pp. 245–255, 2004.
9. P. Esmailian and M. Jalili, “Purchase Prediction and Item Suggestion based on HTTP sessions in absence of User Information,” In
Proceedingsof the 2015 International ACM Recommender Systems Challenge (p. 6),2015.
10. P. Romov and E. Sokolov, “Recsys challenge 2015: ensemble learning with categorical features,” In Proceedings of the 2015
International ACMRecommender Systems Challenge (p. 1), 2015.
11. M. Brown, N. Pope and K. Voges, “Buying or browsing? An exploration of shopping orientations and online purchase
intention,”EuropeanJournal of Marketing, Vol. 37, pp.1666–1684.
12. C. Park, D. Kim, J. Oh and H. Yu, “Predicting user purchase in E-commerce by comprehensive feature engineering and decision
boundary focused under-sampling,” In Proceedings of the 2015 International ACMRecommender Systems Challenge (p. 8), 2015.
13. D. Ben-Shimon, A. Tsikinovsky, M. Friedmann, B. Shapira, L. Rokach, and J. Hoerle, “Recsys challenge 2015 and the yoochoose
dataset,” In
14. Proceedings of the 9th ACM Conference on Recommender Systems, pp.357–358, 2015.
15. T. Chen and C. Guestrin, “XGBoost: A Scalable Tree Boosting System,” In Proceedings of the 22nd ACM SIGKDD International
Conference onKnowledge Discovery and Data Mining, 2016.
16. B. Zheng, S.W. Yoon and S.S. Lam, “Breast cancer diagnosis based on feature extraction using a hybrid of K-means and support
vector machine algorithms,” Expert Systems with Applications, Vol. 41, pp.1476–1482, 2014.

Authors: CH. Naga Santhosh Kumar, K. S. Reddy

Paper Title: Effective Data Analytics on Opinion Mining


Abstract: Over the extent of the most recent couple of years, in setting on the augmentation being utilized
Internet, bit of client's opinion has stretched out that has led to the growth in motivation towards opinion mining.
Opinion Mining is fundamental for the two people and affiliations. People like to see the opinions given by
different clients about a specific thing or alliance. Affiliations need to break down the duty of its clients so as to
improve its future choices. Concentrates on the Internet about a specific subject can be in millions that makes it
premonition to comprehend a client's opinion and necessities. End examination enables us to center audits and
present the structure that could be useful for certified investigating and thing improvement. In this paper, we
complete an examination of Opinion Mining, covering different procedures in doubt examination and difficulties
that show up in this field.

Keywords: Opinion, Sentiment Classification, Opinion Mining, Sentiment Analysis.

References:

1. Ytharth Garg, Jyotika Pruthi “Sentiment Analysis and Opinion Mining: A review of various applications in multivaried domains)”,
363. International Journal of Computer Science & Engineering Technology (IJCSET), Vol. 7 No. 03 Mar 2016 2073-
2. Anu Maheshwari, Anjali Dadhich, Dr. Pratistha Mathur “Opinion Mining: A Survey”, International Journal of Advanced Research in 207
Computer and Communication Engineering, Vol. 4, Issue 1, January 2015
3. P.Kalarani, Dr.S. Selva Brunda “An Overview on Research Challenges in Opinion Mining and Sentiment Analysis”, International 8
Journal of Innovative Research in Computer and Communication Engineering, Vol. 3, Issue 10, October 2015
4. Werner Antweiler and Murray Z. Frank. Is all that talk just noise? The information content of internet stock message boards. Journal
of Finance, 59(3):1259–1294, 2004.
5. Nikolay Archak, Anindya Ghose, and Panagiotis Ipeirotis. Show me the money! Deriving the pricing power of product features by
mining consumer reviews. In Proceedings of the ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD),
2007.
6. Shlomo Argamon, editor. Proceedings of the IJCAI Workshop on DOING IT WITH STYLE: Computational Approaches to Style
Analysis and Synthesis. 2003.
7. Shlomo Argamon, Jussi Karlgren, and James G. Shanahan, editors. Proceedings of the SIGIR Workshop on Stylistic Analysis Of Text
For Information Access. ACM, 2005.
8. Shlomo Argamon, Jussi Karlgren, and Ozlem Uzuner, editors. Proceedings of the SIGIR Workshop on Stylistics for Text Retrieval in
Practice. ACM, 2006.
9. ChandraKala, C. Sindhu2 “OPINION MINING AND SENTIMENT CLASSIFICATION: A SURVEY”, ICTACT Journal on soft
computing, Volume: 03, Issue: 01, October 2012
10. Bakhtawar Seerat, Farouque Azam “Opinion Mining: Issues and Challenges (A survey)”, International Journal of Computer
Applications (0975 – 8887)Volume 49– No.9, July 2012
11. G.Vinodhini, RM.Chandrasekaran “Sentiment Analysis and Opinion Mining: A Survey”, Volume 2 Issue 6, June 2012.
12. Bing Liu. 2010. Sentiment Analysis: A Multi-Faceted Problem.Neesha Jebaseeli, E.Keerubakaran, “A Survey on Sentiment Analysis
of (Product) Reviews” , International Journal of Computer Applications (0975-888), Volume 47, 2012.
13. Zhongwu Zhai, Bing Liu, Identifying Evaluative Sentences in Online Discussions, 2011.
14. Krisztian Balog, Maarten de Rijke. 2006.Decomposing Bloggers' Moods - Towards a Time Series Analysis of Moods in the
Blogosphere.
15. Khairullah Khan, Baharum B. Baharudin, Aurangzeb Khan, Fazal-e-Malik, “Mining Opinion from Text Documents: A Survey”, 3rd
IEEE International Conference on Digital Ecosystems and Technologies, 2009 .

Authors: Lavanya Maddisetti, Ranjan K. Senapati, Ravindra JVR

Paper Title: Supervised Machine Learning for Training a Neural Network as 5:2 Compressor
Abstract: Machine Learning has achieved substantial development in numerous applications like image
processing, pattern recognition, approximate computing etc. This paper interlinks supervised machine learning
algorithm and VLSI architectures to train a neural network as exact and approximate 5:2 compressors.
Probabilistic pruning type of approximation technique has been employed on the exact 5:2 compressor. This
approximation technique on compressors reduces the power consumption with variation in the outputs without
affecting the error limit. The simulation of 5:2 compressors and training of neural network using machine
learning algorithm has been done using Spectre simulator of Cadence Design Systems at 45nm CMOS
technology node and Keras library with TensorFlow background respectively.

Keywords: Accuracy, Classification, Machine Learning, Neural Network.

References:

1. Veeramachaneni, et.al., “Novel architectures for high-speed and low-power 3-2, 4-2 and 5-2 compressors,” Proc. Int. Conf. on VLSI
Design (VLSID), 2007, pp. 324-329.
2. Chang, et.al, “Ultra low voltage, low power CMOS 4-2 and 5-2 compressors for fast arithmetic circuits”, IEEE Trans. Circuits Syst. I,
Fundam. Theory Appl., 2004, 51, (10), pp. 1985–1997.
3. Saha.P., Samantha, P., kumar, D., 2016, “ 4:2 and 5:2 Decimal Compressors,” proc. 7th International Conference on Intelligent
Systems, Modelling and Simulation., Bangkok, Thailand, pp. 424-429.
4. Mehdi Ghasemzadeh, Sina Mahdavi, Abolfazl Zokaei, Khayrollah Hadidi, “A New Ultra High Speed 5-2 Compressor with a New
364. Structure”, 23rd International Conference Mixed Design of Integrated Circuits and Systems, June 23-25, 2016, Poland.
5. D.Balobas and N.Konofaos, "Low- power high-performance CMOS 5-2 compressor with 58 transistors", Electronics Letters, 2079-
Institution of Engineering and Technology, 2018, 54(5), pp. 278-280.
6. Lavanya. M, Ranjan K. Senapati, JVR Ravindra, "Low-Power Near-Explicit 5:2 Compressor for Superior Performance Multipliers",
208
International Journal of Engineering Research and Technology, Vol(11), No.(4), 2018. 4
7. Lavanya.M, Ravindra JVR, “Performance metrics of Inexact Multipliers based on Approximate 5:2 Compressors”, 15th International
SOC Design Conference (ISOCC), 2018, Daegu, South Korea, pp. 84-85.
8. Ankur.A, et.al, “Approximate Computing: Challenges And Opportunities,” IEEE International Conference on Rebooting Computing
(ICRC), 2016, San Diego, USA.
9. Momeni.A, et.al, “Design and analysis of approximate compressors for multiplication,” IEEE Transactions on Comp., 64 (4), 2015, pp.
984–994.
10. Suganthi.V, et.al, “Design of Power and Area Efficient Approximate Multipliers,” IEEE Transactions on VLSI Systems, 2016, pp.1-5.
11. Darjn.E, et.al, “Approximate Multipliers Based on New Approximate Compressors,” IEEE Transactions on CAS-I: Regular Papers, PP
(99), 2018, pp. 1-14.
12. Avinash.L, et.al, “Parsimonious Circuits for Error-Tolerant Applications through Probabilistic Logic Minimization”, International
Workshop on PATMOS 2011, pp.204-213.
13. Liang.J, et.al, “New Metrics for the Reliability of Approximate and Probabilistic Adders,” IEEE Transactions on Computers, 63(9),
2013, pp. 1760-1771.
14. Zervakis.G, et.al, “Design-Efficient Approximate Multiplication Circuits through Partial Product Perforation,” IEEE Trans. on VLSI
Systems, 24(10), 2016, pp. 3105-3117.
15. Peter. A, et.al, “Opportunities for Machine Learning in Electronic Design Automation,'' in ISCAS, 2018, Italy.
16. Ilaria.S, et.al, “Circuit carving: A methodology for the design of approximate hardware,” Design, Automation & Test in Europe
Conference (DATE), 2018, Germany.
17. Schlachter.J et.al, “Design and Applications of Approximate Circuits by Gate-Level Pruning,” IEEE Transactions on VLSI Systems 25
(5), 2017, pp.1694-1702.
18. Sashi Obilishetty, “Digital Intelligence and Chip Design,” International Symposium on VLSI Design, Automation and Test (VLSI-
DAT), 2018, Taiwan.
19. Kouretas, et.al, “Logarithmic number system for deep learning,” 7th International Conference on Modern Circuits and Systems Tech.
(MOCAST), 2018, Greece.

Authors: Sonu Joseph, Sherine Joy

Paper Title: Learning Attitudes and Resistance to Learning Language in Engineering Students
Abstract: This paper a part of a larger study on the effects of blended learning, it describes classroom
experiences from a teacher and learner and details the action research on 250 students who were administered a
course on Communication Skills & Personality Development to the Third Year Engineering Students at HITS
Chennai, India. The regular parameters of conducting a course such as {a} attendance, {b} performance based
results {c} on time submission of tasks and {d}engaging them in class activities became more challenging to the
365. researcher because of the attitude that the scholars presented towards language learning. This ranges from non-
2085-
acceptance of any new format of teaching, unwillingness to put in extra effort, inhibition stemming from the
209
perception of their peers. To that end the teaching method and assessment were developed that included
1
constructivism, social constructivism and problem-based learning as pedagogy. The programme designed also
integrated flipped learning, peer and self-reviews, consistent marking structures based on the Vygotsky Activity
Theory. The results confirm initial and strong resistance towards the methodology, lack of physical, emotional
and mental input, initial fear and shyness towards the perception of others. Post the initial block what followed
was an environment of support, continuous motivation that stemmed from their own activity and creation of
learning resources by the scholars.
Keywords: Learner resistance; blended learning; Activity theory; Presentation; Learning attitude.

References:

1. Indian Education System - An overview. (2018). https://www.britishcouncil.in/sites/default/files/indian_school_education_system_-


_an_overview_1.pdf [Accessed 27 Sep. 2018].
2. National Education Association. “Preparing 21st century students for a global society: An educator’s guide to the “Four Cs”.”
Alexandria, VA: National Education Association, 2010.
3. McVeigh, Brian J. “Japanese higher education as myth.” Routledge, 20105, pp. 187-189.
4. Tagg, J. “Why Students Resist Learning: A Practical Model for Understanding and Helping Students.” Stylus Publishing, LLC, 2016.
5. Tolman, Anton O., “Janine Kremling, and John Tagg. “Why students resist learning: A practical model for understanding and helping
students.” Stylus Publishing, 2016, pp. 6-7.
6. “Understanding Student Resistance to Active Learning-Faculty Focus.” https://www.facultyfocus.com/resources/teaching-strategies-
techniques/active-learning/student-r esistance-active-learning/. Accessed 24 Jul. 2018.
7. Perry, William “Forms of Intellectual and Ethical Development in the College Years”. Harvard., 1970.
8. Becker, Howard, Blanche Geer and Everett Cherrington Hugh. “Making the Grade: The Academic Side of College Life.” Transaction
Press, 2015.
9. Freire, Paulo. “Pedagogy of the Oppressed. Trans. Myra Bergman Ramos. Continuum Press. Freire, Paulo and Antonio Faundez”.
1989.
10. Moore, Helen A. “Student resistance in sociology classrooms: Tools for learning and teaching. Sociology Department,” Sociological
Viewpoints, 2007, Vol. 23, pp. 29-44.
11. Gross, Ronald. Motivating Resistant Students. (Retrieved October http://adulted.about.com/od/teachertoolkit/a/motivation.htm.
Columbia University, 2007.
12. Becker, Howard, Blanche Geer and Everett Cherrington Hugh. “Making the Grade: The Academic Side of College Life”. Transaction
Press, 1985.
13. Canagarajah, A. Suresh. “Critical ethnography of a Sri Lankan classroom: Ambiguities in student opposition to reproduction through
ESOL”. Tesol Quarterly, 1993, Vol. 27, pp. 601-626.
14. Escandon, Arturo. “Education/learning resistance in the foreign-language classroom: A case study.” AIS St Helens, Centre for
Research in International Education, 2004.
15. Brockett, R. G., and Hiemstra, R. “Self-Direction in Adult Learning: Perspectives on Theory, Research, and Practice.” New York:
Routledge, 1991.
16. Hollander, Jocelyn A., and Rachel L. Einwohner. “Conceptualizing resistance. Sociological forum”,2004, vol. 19, No. 4, pp. 533-554.
17. Bonwell, C. C., and Eison, J.A. “Active learning: creating excitement in the classroom. ASH#-ERIC Higher Education Report No. 1,
Washington, D.C.:” The George Washington University, School of Education and Human Development, 1991.
18. Carr, R., Palmer, S., and Hagel, P. “Active learning: the importance of developing a comprehensive measure”. Active Learning in
Higher Education, 2015, Vol.16, pp.173-186.
19. Bransford, J.D., Brown, A.L., and Cocking, R.R. (Eds.) “How people learn: Brain, mind, experience, and school”. Washington, D.C.:
National Academy Press, 1999.
20. Vygotsky, L. S. “Mind in society”. Cambridge, MA: Harvard University Press. 1978.
21. Brame, C.J. and Biel, R. “Test-enhanced learning: the potential for testing to promote greater learning in undergraduate science
courses.” CBE Life Sciences Education, 2015, Vol. 14, pp. 1-12.
22. Barkhuizen, G. P. “Discovering learners’ perceptions of ESL classroom teaching/learning activities in a South African context.”
TESOL Quarterly, 1998, vol. 32, No. 1, pp. 85-108.
23. Block, D. “A day in the life of a class: Teacher/learner perceptions of task purpose in conflict”. System,1994, Vol. 22, pp. 473-486.
24. Tse, Lucy. “Student Perceptions of Foreign Language Study: A Qualitative Analysis of Foreign Language Autobiographies.” Modern
Language Journal, 2001, vol. 84 No. 1 pp. 69-84.
25. Krashen, S.“Principles and Practice in Second Language Acquisition.” Oxford: Perga, 1982.
26. Gardner, R. and W. Lambert "Language aptitude, intelligence, and second-language achievement." Journal of Education Psychology,
1965, Vol. 56, pp. 191-199.
27. Brown, H. D. “Teaching by principles: An interactive approach to language pedagogy” (2nd edition). Englewood Cliffs, New Jersey:
Addison Wesley Longman, 2001.
28. Ellis, R. “The Study of Second Language Acquisition.” Oxford: Oxford University Press, 1994.
29. Stover, Sheri & Holland, Cindra. “Student Resistance to Collaborative Learning”, International Journal for the Scholarship of Teaching
and Learning. 2018, Vol 12. 10.20429/ijsotl.2018.120208.

Authors: Kiran kumar.m, m.c. Math


Estimation of a Spark Ignition Engine’s Performance Parameters for Ethanol-Gasoline blends
Paper Title:
using Response Surface Methodology
Abstract: The Internal Combustion(IC) engine design and growth plays an important role in determining
engine performance and emission features. The performance and emission properties of the spark ignition (SI)
motor are also more influenced by gasoline ethanol blends. In this work, an effort has been made to optimize the
operating parameters in order to minimize BSFC, CO, NO2, CO2, HC and maximize BTE using Response
Surface Methodology (RSM). The engine is operated under constant speed conditions with different working
conditions for better mixing and distinct additive composition (iso-octane) in the range of 0.3%, 0.4% and 0.5%.
The appropriate RSM was used to reduce the use of petrol, its exhausts and maximize Brake Thermal Efficiency.
The experimental and statistical approximation demonstrates the rise in Thermal Brake Efficiency (BTE) and
366.
decline in Specific Brake Fuel Consumption (BSFC). In addition, the chosen RSM model demonstrates reduced 2092-
CO, HC, NO2 and CO2 emissions. From the assessment, it is noted that E30 mix with 0.5% additive has better 209
motor efficiency features and reduced emissions at a peak speed of 1800rpm among all test blends with varying 9
proportion of additives.

Keywords: Gasoline, Spark Ignition Engine, Iso-Octane, Ethanol, Response surface methodology.

References:

1. M.C.Math, Sudheer Prem Kumar, Soma V. Chetty. “Energy for Sustainable Development Technologies for biodiesel production from
used cooking oil — a review” Volume 14, Issue 4, December 2010, Pages 339–345.
2. The harmful effects of vehicle exhaust- A case study for policy change, environment and human health. INC.1191 ridge road. North
haven, CT 06473 phone: (203) 248-6582. Fax: (203) 288-7571. Www.ehhi.org
3. Robert D. Entenberg and Albert L. Menard, Jr. “Future Octane Number Requirements for Future Market Demand, Journal of
Marketing”, Vol. 30, No. 1 (Jan. 1966), pp. 28-32.
4. Thomas Midgley, Jr., and Charles F. Kettering. “Tetraethyl lead Solves the “Knock” Problem:  Its Discovery and Early
Developments”, American Chemical Society, 2003, 22 (25), pp 5154–5178.
5. Marin, D. Kodjak. 1998. “Relative Cancer Risk of Reformulated Gasoline and Conventional Gasoline Sold in the Northeast, the
Northeast States for Coordinated Air Use Management, Book”, NESCAUM, 1998.
6. M.Koc, Y.Sekmen, T.Topgu, H.S.Yu. The effects of ethanol unleaded gasoline Blend on engine performance and exhaust emissions in
a spark-ignition Engine”, Renew. Energy 34 (2009) 2101-2106.
7. V.R. Surisetty, A.K. Dalai, J. Kozinski. “Alcohols as alternative fuels: an overview”, Appl. Catal. A: General 404 (2011) 1-11.
8. Elfasakhany.2013. “Investigation on performance and emissions characteristics of an internal combustion engine fuelled with
petroleum gasoline and a hybrid Methanol-gasoline fuel”, IJET-IJENS 13 (2013)24-43.
9. Brinkman.N. 1981. “Ethanol Fuel-A Single-Cylinder Engine Study of Efficiency and Exhaust Emissions," SAE Technical Paper
810345, 1981, doi: 10.4271/810345.
10. G. A. Kapadia, P. D. Patel, T. M. Patel, “Parametric Optimization of 4-Stroke Spark Ignition Engine Fuelled with Ethanol Blended
Gasoline using Response Surface Methodology”, IJSDR, IISN:2455-2631, , June 2016 IJSDR, volume 1, Issue 6, P 367-375.
11. Gholamhassan Najafi, Barat Ghobadian, Talal Yusaf, Seyed Mohammad Safieddin Ardebili3, Rizalman Mamat4, “Optimization of
performance and exhaust emission parameters of a SI (spark ignition) engine with gasoline ethanol blended fuels using response
surface methodology”, energy(2015), http://dx.doi.org/10.1016/j.energy.2015.07.004
12. Chen YL, Chen S, Tsai JM, Tsai CY, Fang HH, Yang IC, Liu SY. “Optimization of suitable ethanol blend ratio for motorcycle engine
using response surface method”, ISSN 1093-4529, journal of environmental science and health, part A (2012) 47.101-108,
DOI:10.1080/10934529.2012.629949.
13. Bharadwaz YD, Rao B.G, Rao V.D, Anusha C. “Improvement of biodiesel methanol blends performance in a variable compression
ratio engine using response surface methodology”. Alexandria Eng J 2016;55(2):1201–9.
14. R. Saidur, M.I. Jahirul, M. Hasanuzzaman and H.H. Masjuki. analysis of exhaust emissions of natural gas engine by using response
surface methodology, ISSN 1812-5654, journal of applied sciences 8(19): 3328-3339,2008.
15. Chen YL, Chen S, Tsai JM, Tsai CY, Fang HH, Yang IC, Liu SY. Optimization of suitable ethanol blend ratio for motorcycle engine
using response surface method, ISSN 1093-4529, journal of environmental science and health, part A(2012) 47.101-108,
DOI:10.1080/10934529.2012.629949.
16. Rajmohan T, Palanikumar K. Application of the central composite design in optimization of machining parameters in drilling hybrid
metal matrix composites. Measurement 2013; 46(4):1470–81.
17. Nithyanandan K, Wu H, Huo M, Lee C-F. A preliminary investigation of the performance and emissions of a port-fuel injected SI
engine fueled with acetone-butanol-ethanol (ABE) and gasoline. SAE technical paper 2014; 2014-01-1459.
18. Hubadillah SK, Othman MHD, Harun Z, Ismail A, Iwamoto Y, Honda S, et al. Effect of fabrication parameters on physical properties
of metakaolin-based ceramic hollow fiber membrane (CHFM). Ceram Int 2016; 42(14):15547–58.
19. Hatami M, Cuijpers MCM, Boot MD. Experimental optimization of the vanes geometry for a variable geometry turbocharger (VGT)
using a Design of Experiment (DoE) approach. Energy Convers Manage 2015; 106:1057–70.
20. Hirkude JB, Padalkar AS. Performance optimization of CI engine fuelled with waste fried oil methyl ester-diesel blend using response
surface methodology. Fuel 2014; 119:266–73.
21. Kumar BR, Saravanan S, Rana D, Nagendran A. “Combined effect of injection timing and exhaust gas recirculation (EGR) on
performance and emissions of a DI diesel engine fuelled with next-generation advanced biofuel–diesel blends using response surface
methodology”. Energy Converse Management 2016; 123:470–86.
Authors: Sanjesh S. Pawale, Sandeep B. Vanjale

Paper Title: Performance Improvement of TCP New Reno using one way delay Measurement
Abstract: Well known TCP NewReno protocol when used with wire-cum-wireless network its performance
decreases, due to the inability to discriminate wireless loss with congestion loss. One way delay can give better
network characteristics than approximate RTT used in TCP congestion control algorithms. In this paper, we
have proposed a modified version of TCP NewReno based on one-way delay measurement. We called it as
WNewReno. Our proposed algorithm detects wireless loss and improves performance. Simulations are carried
out using ns-2.34.

Keywords: one-way delay (OWD Round Trip time (RTT), Transmission control protocol (TCP), TCP
NewReno, TCP Reno.

References:

1. Alexander Afanasyev, Neil Tilley, Peter Reiher, and Leonard Kleinrock, “Host-to-Host Congestion Control for TCP,” IEEE
367. COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 12, NO. 3, THIRD QUARTER 2010. 2100-
2. Ka-Cheong Leung and Victor O.K. Li “TCP in Wireless Networks: Issues, Approaches, and Challenges” IEEE communication surverys
4TH QUARTER 2006, VOLUME 8, NO. 4. 210
3. H. Balakrishnan, V. Padmanabhan, S. Seshan, and Y. Katz, “A Comparison of Mechanisms for Improving TCP Performance over 6
Wireless Links,” IEEE/ACM Transactions on Networking, pp. 756–769, 1997.
4. Network M. Allamn, V. Paxson, W. Stevens “TCP Congestion Control” RFC 2581.
5. T. Henderson, S. Floyd "The NewReno Modification to TCP’s Fast Recovery Algorithm" RFC 2582, April 1999.
6. Li Yun, Zhang Rui, Liu Zhanjun, Liu Qilie “An Improved TCP Congestion Control Algorithm Over Mixed wired/wireless networks”
Proceedings of IC-BNMT2009.
7. G. Almes, S. Kalidindi, M. Zekauskas “A One-way Delay Metric for IPPM” RFC 2679.
8. Jin-Hee Choi, Chuck Yoo "One-way delay estimation and its application" ELSEVIER Computer Communications 28 (2005) 819–828.
9. Aleksandar Kuzmanovic and Edward W. Knightly “TCP-LP: Distributed Algorithm for Low Priority Data Transfer" IEEE INFOCOM
2003.
10. Parag Kulkarni, Mahesh Sooriyabandara, Lu Li, “Improving TCP Performance in Wireless Networks by classifying causes of packet
losses” IEEE/WCNC.2009.
11. K. Stangherlin, R. Costa Filho, W. Lautenschlager, V. Guadagnin, L. Balbinot, R. Balbinot, V. Roesler "One-Way Delay Measurement
in Wired and Wireless Mobile Full-mesh Networks" IEEE WCNC 2011.
12. M. Mathis, J. Semske, J. Mahdavi, and T. Ott. "The macroscopic behavior of the TCP congestion avoidance algorithm" Computer
Communication Review, 27(3), July 1997.
13. Network Simulator ns2, http://www.isi.edu/nsnam/ns.

Authors: Shivam Gupta, Nersisson Ruban, Shivam Kumar


Electroencephalograph Based Control and Feature Extraction Algorithms for Automated Powered
368. Paper Title:
Exoskeleton
Abstract: Mobility and the posture are the major concern for people suffering from endo skeleton disorders.
For such people, exoskeleton provides great support and protection. Mostly Exoskeletons are used for the
rehabilitation purposes and can improve the life of an individual who has lost his body part and thus help in
assistance. In this article, various technologies which are mainly used for the implementation and performance
of exoskeleton are reviewed. The systems are compared based on their accuracy and work reliability. The work
discusses the machine used, the movement for which the system is tested, the training algorithms used by
different researchers, the input control for the system, controlling element for the system, and their advantages.
Various training algorithms are also discussed based on the feature extraction techniques which are used to
obtain features from the pre-processed brain signals such as EEG, iEEG, EMG. Applying these features in the
training model and robot system and testing of the system in real time or pre obtained data. This research paper
is written with the intention to differentiate various techniques used and to analyse the best possible technique
for conducting the biomechanical operations processes on the robot and to get the user with the most accurate
and reliable system which can be used in daily life. These exoskeletons have their application in the field of
medicine , military and even help firefighters for various purposes.

Keywords: Exoskeleton, Electro Encephalo Graph, Brain Computer Interface, Automation, Machine Learning.

References:

1. Rodolphe Héliot, Amy L. Orsborn, Karunesh Ganguly, and Jose M. Carmena, "System Architecture for Stiffness Control in Brain–
Machine Interfaces", IEEE Transactions on Systems, Man, and Cybernetics—Part A: Systems and Humans, VOL. 40, NO. 4, pp. 732-
742, JULY 2010.
2. David P. McMullen, Guy Hotson, Kapil D. Katyal, Brock A. Wester, Matthew S. Fifer, Timothy G. McGee, Andrew Harris, Matthew
S. Johannes, R. Jacob Vogelstein, Alan D. Ravitz, William S. Anderson, Nitish V. Thakor, and Nathan E. Crone, "Demonstration of a
Semi-Autonomous Hybrid Brain–Machine Interface Using Human Intracranial EEG, Eye Tracking, and Computer Vision to Control a
Robotic Upper Limb Prosthetic", IEEE Transactions on Neural Systems And Rehabilitation Engineering, VOL. 22, NO. 4, pp. 784-
796, JULY 2014.
3. Howida A. Shedeed ; Mohamed F. Issa ; Salah M. El-sayed, "Brain EEG Signal Processing For Controlling a Robotic Arm", in 2013
8th International Conference on Computer Engineering & Systems (ICCES), 2013, pp. 152-157.
4. Enrique Hortal, Daniel Planelles, Andre´s U´ beda, A´ lvaro Costa and Jose´ M. Azor´ın, “Brain-Machine Interface System to
Differentiate between Five Mental Tasks”, in 2014 IEEE International Systems Conference Proceedings, 2014, pp. 172-175.
5. Shiyuan Qiu, Zhijun Li, Wei He, Longbin Zhang, Chenguang Yang, and Chun-Yi Su, “Brain–Machine Interface and Visual
Compressive Sensing-Based Teleoperation Control of an Exoskeleton Robot”, IEEE Transactions on Fuzzy Systems, VOL. 25, NO. 1,
pp. 58-59, FEBRUARY 2017.
6. Genci Capi1, Toshihide Takahashi1, Kazunori Urushiyama2, and Shigenori Kawahara, “Controlling the Robot Using the Brain
Signals”, The 18th IEEE International Symposium on Robot and Human Interactive Communication Toyama, Japan, pp. 781-785, 2107-
Sept. 27-Oct. 2, 2009. 211
7. Hassan Samadi, Mahdi Karimi, “Fuzzy Logic Technique to Control a Robot Based on Non-Invasive Brain Computer Interface by
Human Group”, in Proceeding of the 2nd RSI/ISM International Conference on Robotics and Mechatronics, pp. 695-699, October 15-
3
17, 2014, Tehran, Iran.
8. Eric A. Pohlmeyer, Babak Mahmoudi, Shijia Geng, Noeline Prins, and Justin C. Sanchez, “Brain Machine Interface Control of a
Robot Arm using Actor-Critic Reinforcement Learning”, in 34th Annual International Conference of the IEEE EMBS San Diego,
California USA, pp. 4108-4111, 28 August - 1 September, 2012.
9. Karthikeyan Balasubramanian, Joshua Southerland, Mukta Vaidya, Kai Qian , Ahmed Eleryan, Andrew H Fagg, Marc Sluzky, Karim
Oweiss, Nicholas Hatsopoulos, “Operant conditioning of a multiple degree-of-freedom brain-machine interface in a primate model of
amputation”, in 35th Annual International Conference of the IEEE EMBS Osaka, Japan, pp. 303-306, 3 - 7 July, 2013.
10. Guy Hotson, Ryan J. Smith, Adam G. Rouse, Marc H. Schieber, Nitish V. Thakor, and Brock A. Wester, “High Precision Neural
Decoding of Complex Movement Trajectories Using Recursive Bayesian Estimation With Dynamic Movement Primitives”, IEEE
Robotics and Automation Letters, VOL. 1, NO. 2, pp. 676-683, JULY 2016.
11. J. d. R. Millán, “Brain-Controlled Devices: The Perception-Action Closed Loop”, in 2016 4th International Winter Conference on
Brain-Computer Interface (BCI), 2016, pp. 1-2.
12. Sanggyun Kim, Todd P. Coleman, “Team Decision Theory and Brain-Machine Interfaces”, in Proceedings of the 5th International
IEEE EMBS Conference on Neural Engineering Cancun, Mexico, pp. 605-608, April 27 - May 1, 2011.
13. Luca Tonin, Tom Carlson, Robert Leeb, and Jos´e del R. Mill´an, “Brain-Controlled Telepresence Robot by Motor-Disabled People”,
in 33rd Annual International Conference of the IEEE EMBS Boston, Massachusetts USA, pp. 4227-4230, August 30 - September 3,
2011.
14. Andrea Finke, Andreas Knoblauch, Hendrik Koesling and Helge Ritter, “A hybrid brain interface for a humanoid robot assistant”, in
33rd Annual International Conference of the IEEE EMBS Boston, Massachusetts USA, pp. 7421-7424, August 30 - September 3,
2011.
15. Andre´s U´ beda, Jose´ M. Azor´ın, Nicola´s Garc´ıa, Jose´ M. Sabater, Carlos Pe´rez, “Brain-Machine Interface Based on EEG
Mapping to Control an Assistive Robotic Arm”, in The Fourth IEEE RAS/EMBS International Conferenceon Biomedical Robotics and
Biomechatronics Roma, Italy. June 24-27, 2012, pp. 1311-1315.
16. Jun-ichiro Furukawa, Tomoyuki Noda, Tatsuya Teramae, and Jun Morimoto, “An EMG-Driven Weight Support System With
Pneumatic Artificial Muscles”, IEEE Systems Journal, VOL. 10, NO. 3, pp. 1026-1034, SEPTEMBER 2016.
17. Schröer, S., Killmann, I., Frank, B., Voelker, M., Fiederer, L., Ball, T. and Burgard, W.,, “An Autonomous Robotic Assistant for
Drinking”, in 2015 IEEE International Conference on Robotics and Automation (ICRA) Washington State Convention Center Seattle,
Washington, May 26-30, 2015, pp. 6482-6487.
18. Zhijun Li, Suna Zhao, Jiding Duan, Chun-Yi Su, Chenguang Yang, and Xingang Zhao, “Human Cooperative Wheelchair With Brain–
Machine Interaction Based on Shared Control Strategy”, IEEE/ASME Transactions on Mechatronics, VOL. 22, NO. 1, pp. 185-195,
FEBRUARY 2017.
19. Jingjun Wang, Yadong Liu, Jingsheng Tang, “Fast Robot Arm Control Based on Brain-computer Interface”, in 2016 IEEE Information
Technology, Networking, Electronic and Automation Control Conference, 2016, pp. 571-575.
20. Petr Sysel and Zdenek Sm ekal, “Enhanced estimation of power spectral density of noise using the wavelet transform”, in Department
of Telecommunications, Brno University of Technology, Purkynova, Czech Republic.
21. L. Bhargavi, Dr. V.Jagan Naveen, “Noise Suppression in Speech Signals Using Kalman Filtering”, in 10th International Conference on
Recent Trends in Engineering Science and Management, Newton’s Institute of Science & Technology, Guntur Dist, Andhra Pradesh,
India, 12th-13th August 2017, pp. 548-554.
22. Jur van den Berg, Pieter Abbeel, Ken Goldberg, “LQG-MP: Optimized Path Planning for Robots with Motion Uncertainty and
Imperfect State Information∗”, in University of California, Berkeley, March 19, 2011.
23. Murray, S.A., Ha, K.H., Hartigan, C. and Goldfarb, M., 2015. An assistive control approach for a lower-limb exoskeleton to facilitate
recovery of walking following stroke. IEEE Transactions on Neural Systems and Rehabilitation Engineering, 23(3), pp.441-449.H.
Poor, An Introduction to Signal Detection and Estimation. New York: Springer-Verlag, 1985, ch. 4.
Authors: Muhammad Azri Othman, Zamberi Jamaludin, Mohamad Minhat

Paper Title: Design of Intelligent CNC system using IEC61499 Function Block
Abstract: CNC machine tool is the end mechanism in the process of converting input materials into desired
outputs shape reflecting the customer specifications and requirements. All executions and operation processes
are fully organized and control by the CNC controller unit. As the brain for the whole system, the architecture
and internal structure of the controller plays an important role in realizing intelligent functions of the CNC
machine tool systems. Unfortunately, the methodology for CNC machines programming remains relatively
unchanged over these years. Traditionally, CNC machine tools have rigid programming structure. Most of the
CNC programs are restricted to any modification during machining operation execution. Establishing of STEP-
NC as next generation data model lead to huge paradigm shift of future CNC system especially the ways of CNC
being programmed. However, as a passive data model, STEP-NC does not have any intelligent functionality.
Thus, to overcome these limitations, a new data processing unit for adaptive CNC controller is proposed based
on IEC61499 function blocks. The main function of this unit is to establish operational decision-making function
at controller level. It generates native information for a particular machine tool. Whereby, the availability of
manufacturing resources and machine condition are taken into account. By establishing layered and distributed
architecture, the proposed systems are expected to cover up the deficiency of current CNC controller structure.
Hence, the portability, interoperability, flexibility and openness of the CNC controller structure can be further
improved.

Keywords: CNC, Adaptive Controller, Function Block, STEP-NC.

369. References:
2114-
1. S. T. Newman et al., “Strategic advantages of interoperability for global manufacturing using CNC technology,” Robotics and 211
Computer Integrated Manufacturing, vol. 24, no. 6, pp. 699–708, 2008. 8
2. M. A. Othman, M. Minhat, and Z. Jamaludin, “An overview on STEP-NC compliant controller development,” in IOP Conference
Series: Materials Science and Engineering, vol. 257, pp. 41–51, 2017.
3. M. Minhat, “Development of a STEP-NC Controller,” University of Auckland, 2009.
4. Y. Liu, X. Guo, W. Li, K. Yamazaki, K. Kashihara, and M. Fujishima, “An intelligent NC program processor for CNC system of
machine tool,” Robotics and Computer Integrated Manufacturing, vol. 23, no. 2, pp. 160–169, 2007.
5. Y. Yusof and L. Kamran, “New Technique for the Interpretation of ISO 14649 and 6983 based on Open CNC Technology,”
International Journal Computer Integrated Manufacturing, vol. 29, pp. 136–148, 2016.
6. W. Xiao, L. Zheng, J. Huan, and P. Lei, “A complete CAD / CAM / CNC solution for STEP-compliant manufacturing,” Robotics and
Computer Integrated Manufacturing, vol. 31, pp. 1–10, 2015.
7. X. W. Xu, L. Wang, and Y. Rong, “STEP-NC and function blocks for interoperable manufacturing,” IEEE Trans. Autom. Sci. Eng.,
vol. 3, no. 3, pp. 297–308, 2006.
8. I E C, Function blocks. International Standard IEC 61499, 2005.
9. “Holobloc.” [Online]. Available: http://ftp.holobloc.com/. [Accessed: 19-Jul-2019].
10. L. Wang, H.-Y. Feng, and N. Cai, “Architecture design for distributed process planning,” Journal Manufacturing Systems, vol. 22, no.
2, pp. 99–115, 2003.
11. H. Wang, X. Xu, and J. Des Tedford, “An adaptable CNC system based on STEP-NC and function blocks,” International Journal
Production Research, vol. 45, no. 17, pp. 3809–3829, 2007.
12. M. Minhat, V. Vyatkin, X. Xu, S. Wong, and Z. Al-Bayaa, “A novel open CNC architecture based on STEP-NC data model and IEC
61499 function blocks,” Robotics and Computer Integrated Manufacturing, vol. 25, no. 3, pp. 560–569, 2009.
13. T. Nikolaos, M. Jörn, D. Michael, and M. Dimitris, “Optimal Machining Parameter Selection Based on Real-Time Machine
Monitoring Using IEC61499 Function Blocks For Use In A Cloud Manufacturing Environment : a Case Study for Face Milling,” in
Proceedings of the ASME 2014 International Manufacturing Science and Engineering Conference, pp. 1–9, 2014.
14. T. Peng, X. Xu, and L. Wang, “A novel energy demand modelling approach for CNC machining based on function blocks,” Journal of
Manufacturing Systems, vol. 33, no. 1, pp. 196–208, 2014.

Authors: Sanya Anees

Paper Title: FSO Cooperative System Analysis for DF based Relay


Abstract: This paper presents performance and information theoretic analysis for cascaded free space optical
(FSO) communication system using decode-and-forward relaying protocol. Optical links experience Gamma-
Gamma distributed atmospheric turbulence, path loss, and misalignment losses. Derived closed-form statistical
characteristics of the end-to-end SNR of the system are used for outage analysis, bit-error-rate analysis, and
information theoretic analysis of the proposed system, for various modulation schemes and adaptive
370. transmission protocols, respectively. In the performance analysis, impact of misalignment losses and
scintillations is seen on various performance parameters and the adaptive modulation schemes using capacity of 2119-
proposed systems. 212
8
Keywords: Bit error rate, decode-and-forward relaying, Gamma-Gamma turbulence, free space optical (FSO)
communication, path loss, pointing error.

References:

1. L. Andrews, R. Phillips, and C. Hopen, Laser Beam Scintillation With Applications. New York, USA: SPIE Press, 2001.
2. D. Kedar and S. Arnon, “Urban optical wireless communication networks: The main challenges and possible solutions,” IEEE
Commun. Mag., vol. 42, no. 5, pp. S2–S7, Jan. 2004.
3. M. Safari and M. Uysal, “Relay-assisted free-space optical communication,” IEEE Trans. Wireless Commun., vol. 7, no. 12, pp. 5441–
5449, Dec. 2008. [4] M. R. Bhatnagar, “Average BER analysis of Differential Modulation in DF cooperative communication system
over Gamma– Gamma fading FSO links,” IEEE Commun. Lett., vol. 16, no. 8, pp. 1228–1231, Aug. 2012.
4. S. Anees and M. R. Bhatnagar, “On the capacity of decode-andforward dual-hop free space optical communication systems,” in IEEE
Wireless Commun. and Netw. Conf. (WCNC), 6-9 April 2014, pp. 18–23.
5. X. Tang et al., “Multihop free-space optical communications over turbulence channels with pointing errors using heterodyne
detection,” IEEE/OSA J. Lightw. Technol., vol. 32, no. 15, pp. 2597–2604, Aug. 1 2014.
6. S. Anees and M. R. Bhatnagar, “Performance analysis of amplify-and-forward dual-hop mixed RF/FSO systems,” in IEEE 80th
Vehicular Tech. Conf. (VTC Fall), Sept 2014, pp. 1–5.
7. H. Samimi and M. Uysal, “End-to-End performance of mixed RF/FSO transmission systems,” J. Opt. Commun. Netw., vol. 5, no. 11,
pp. 1139–1144, Nov. 2013.
8. S. Anees and M. R. Bhatnagar, “Exact performance analysis of DF based mixed triple-hop RF/FSO/RF communication system,” in
IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Montreal, Canada, Oct. 2017, pp.
8–13.
9. M. R. Bhatnagar and Z. Ghassemlooy, “Performance evaluation of FSO MIMO links in Gamma-Gamma fading with pointing errors,”
in Proc. IEEE Int. Conf. Commun. (ICC), London, U.K., June 2015, pp. 1–6.
10. S. Anees, P. Harsha, and M. R. Bhatnagar, “On the performance of AF based mixed triple-hop RF/FSO/RF communication system,” in
IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Montreal, Canada, Sept. 2017.
11. T. A. Tsiftsis et al., “Optical wireless links with spatial diversity over strong atmospheric turbulence channels,” IEEE Trans. Wireless
Commun., vol. 8, no. 2, pp. 951–957, Feb. 2009.
12. K. P. Peppas et al., “Capacity analysis of dual amplify-andforward relayed free-space optical communication systems over turbulence
channels with pointing errors,” IEEE/OSA J. Opt. Commun. Netw., vol. 5, no. 9, p. 11, Sept. 2013.
13. W. O. Popoola, “Subcarrier Intensity Modulated free-space optical communication systems,” Ph.D. dissertation, School of Computing,
Engineering and Information Sciences, Univ. Northumbria, Sept. 2009.
14. H. G. Sandalidis, T. A. Tsiftsis, and G. K. Karagiannidis, “Optical wireless communications with heterodyne detection over turbulence
channels with pointing errors,” J. Lightw. Technol., vol. 27, no. 20, pp. 4440–4445, Oct. 2009.
15. C. Datsikas, K. Peppas, N. Sagias, and G. Tombras, “Serial freespace optical relaying communications over gamma-gamma
atmospheric turbulence channels,” IEEE J. Opt. Commun. Netw., vol. 2, no. 8, pp. 576–586, Aug. 2010.
16. W. Gappmair, “Further results on the capacity of free-space optical channels in turbulent atmosphere,” IET Commun., vol. 5, no. 9, pp.
1262–1267, June 2011.
17. J. N. Laneman et al., “Cooperative diversity in wireless networks: Efficient protocols and outage behavior,” IEEE Trans. Inf. Theory,
vol. 50, no. 11, pp. 3062–3080, Dec. 2004.
18. N. I. Miridakis et al., “Multiuser relaying over mixed RF/FSO links,” IEEE Trans. Commun., vol. 62, no. 5, pp. 1634–1645, May 2014.
19. W. Popoola and Z. Ghassemlooy, “BPSK subcarrier intensity modulated free-space optical communications in atmospheric
turbulence,” IEEE/OSA J. Lightw. Technol., vol. 27, no. 8, pp. 967–973, Apr. 2009.
20. A. P. Prudnikov, Y. A. Brychkov, and O. I. Marichev, Integrals and Series, 1st ed., G. G. Gould, Ed. New York, USA: Gordon and
Breach Science Publishers, 1990, vol. 3.
21. A. Papoulis and S. U. Pillai, Probability, Random variables and stochastic Processes, 4th ed., A. Arbour, Ed. Tata Mcgraw-Hill, 2002.
22. Y. L. Luke, The Special Functions and their Approximation, R. Bellman, Ed. New York: Academic Press, 1969, vol. 1.
23. M. Shah, “On generalizations of some results and their applications,” Collectanea Mathematica, vol. 24, no. 3, pp. 249–266, 1973.
24. B. L. Sharma and R. F. A. Abiodun, “Generating function for generalized function of two variables,” Proc. of the American
Mathematical Society, vol. 46, no. 1, pp. 69–72, Oct. 1974.
25. I. S. Ansari et al., “A new formula for the BER of binary modulations with dual-branch selection over generalized-K composite fading
channels,” IEEE Trans. Commun., vol. 59, no. 10, pp. 2654–2658, Oct. 2011.
26. M. R. Bhatnagar and Arti M. K., “On the closed-form performance analysis of Maximal Ratio Combining in ShadowedRician fading
LMS channels,” IEEE Commun. Lett., vol. 18, no. 1, pp. 54–57, Jan. 2014.
27. F. Yilmaz and M.-S. Alouini, “A unified MGF-based capacity analysis of diversity combiners over Generalized fading channels,”
IEEE Trans. Commun., vol. 60, no. 3, pp. 862–875, March 2012.
28. M. R. Bhatnagar, “On the capacity of decode-and-forward relaying over Rician fading channels,” IEEE Commun. Lett., vol. 17, no. 6,
pp. 1100–1103, June 2013.
29. http://functions.wolfram.com/HypergeometricFunctions/MeijerG/.
30. I. I. Kim et al., “Wireless optical transmission of fast ethernet, FDDI, ATM, and ESCON protocol data using the TerraLink laser
communication system,” Optical Engineering, vol. 37, pp. 3143–3155, Dec. 1998.
31. S. Bloom et al., “Understanding the performance of free-space optics,” J. Optical Netw., vol. 2, pp. 178–200, June 2003.
32. A. A. Farid and S. Hranilovic, “Outage capacity optimization for free-space optical links with pointing errors,” J. Lightw. Technol.,
vol. 25, no. 7, pp. 1702–1710, July 2007.
33. D. K. Borah and D. G. Voelz, “Pointing error effects on freespace optical communication links in the presence of atmospheric
turbulence,” J. Lightw. Technol., vol. 27, no. 18, pp. 3965–3973, 15 Sept. 2009.
34. F. Yang et al., “Free-space optical communication with nonzero boresight pointing errors,” IEEE Trans. Commun., vol. 62, no. 2, pp.
713–725, Feb 2014.

Authors: Mahesh .G, Satish Kumar .T


Real Time Traffic Light Detection by Autonomous Vehicles using Artificial Neural Network
Paper Title:
Techniques
Abstract: Autonomous vehicles are the reality of the future, they will open up the way for future advanced
systems where computers are expected to take over the decision making of driving. These automobiles are
capable of sensing their environment and moving with little or no human input. The main goal of this research is
to detect traffic light in real-time for autonomous vehicles. Apart from taking decisions to navigate in the right
manner the autonomous vehicles important task is to detect traffic lights, so that it can obey the traffic rules with
371. sufficient precision. The work carried out in this research makes use of two Artificial Intelligence technique,
2129-
these techniques are compared in accomplishing the task of traffic light detection in real time. The two models
213
that are designed and implemented are Convolution neural network (CNN) and Deep Convolution Inverse
3
Graphics Network (DCIGN). The results clearly show that DCIGN out performance CNN by 8%.

Keywords: Convolution neural network, Deep Convolution Inverse Graphics Network, stochastic gradient
descent algorithm, Autonomous vehicles, traffic light.

References:
1. Abedin, Md Zainal, Prashengit Dhar, and Kaushik Deb. "Traffic sign recognition using hybrid features descriptor and artificial neural
network classifier." 2016 19th International Conference on Computer and Information Technology (ICCIT). IEEE, 2016.
2. Behrendt, Karsten, Libor Novak, and Rami Botros. "A deep learning approach to traffic lights: Detection, tracking, and classification."
2017 IEEE International Conference on Robotics and Automation (ICRA). IEEE, 2017.
3. Hamdi, Sabrine, et al. "Road signs classification by ANN for real-time implementation." 2017 International Conference on Control,
Automation and Diagnosis (ICCAD). IEEE, 2017.
4. Jung, Seokwoo, et al. "Real-time Traffic Sign Recognition system with deep convolutional neural network." 2016 13th International
Conference on Ubiquitous Robots and Ambient Intelligence (URAI). IEEE, 2016.
5. Li, Xi, et al. "Traffic light recognition for complex scene with fusion detections." IEEE Transactions on Intelligent Transportation
Systems 19.1 (2018): 199-208.
6. Müller, Julian, and Klaus Dietmayer. "Detecting traffic lights by single shot detection." 2018 21st International Conference on
Intelligent Transportation Systems (ITSC). IEEE, 2018.
7. Ozcelik, Ziya, et al. "A vision-based traffic light detection and recognition approach for intelligent vehicles." 2017 International
Conference on Computer Science and Engineering (UBMK). IEEE, 2017.
8. Priyanka, D., et al. "Traffic light and sign detection for autonomous land vehicle using Raspberry Pi." 2017 International Conference
on Inventive Computing and Informatics (ICICI). IEEE, 2017.
9. Saini, Sanjay, et al. "An efficient vision-based traffic light detection and state recognition for autonomous vehicles." 2017 IEEE
Intelligent Vehicles Symposium (IV). IEEE, 2017.
10. Shi, Zhenwei, Zhengxia Zou, and Changshui Zhang. "Real-time traffic light detection with adaptive background suppression filter."
IEEE Transactions on Intelligent Transportation Systems 17.3 (2016): 690-700.
11. Tran, Tai Huu-Phuong, et al. "Real-time traffic light detection using color density." 2016 IEEE International Conference on Consumer
Electronics-Asia (ICCE-Asia). IEEE, 2016.
12. Yudin, Dmitry, and Dmitry Slavioglo. "Usage of fully convolutional network with clustering for traffic light detection." 2018 7th
Mediterranean Conference on Embedded Computing (MECO). IEEE, 2018.
13. Kulkarni, Tejas D., William F. Whitney, Pushmeet Kohli, and Josh Tenenbaum. "Deep convolutional inverse graphics network."
In Advances in neural information processing systems, pp. 2539-2547. 2015.
14. Tjandra, Andros, et al. "Stochastic gradient variational bayes for deep learning-based ASR." 2015 IEEE Workshop on Automatic
Speech Recognition and Understanding (ASRU). IEEE, 2015.

Authors: C. Joel, T.Jeyapoovan

Paper Title: Machinability Optimization of Abrasive Water Jet Cutting Process on AA6082 Aluminium Alloy
Abstract: Aluminium alloys are extensively used nowadays in various manufacturing industries due to its
special properties and high strength. In this study, AA6082 aluminium alloy is taken into consideration by
studying the machinability properties using the abrasive water jet cutting process. RSM technique is used for
conducting the experiments by varying the input factors such as stand-off distance, abrasive feed and nozzle
transverse speed. The effect of hardness and surface roughness is investigated. The correlation between the input
parameters and the corresponding output was tested by analysis of variance to check the 95% confidence level.

Keywords: Aluminium alloy 6082, Abrasive Water Jet Cutting, Hardness, Roughness, RSM.

References:

1. Caydas¸ U, Hasc¸alik A (2008) A study on surface roughness in abrasive waterjet machining process using artificial neural networks
and regression analysis method. J Mater Process Technol 202(1):574–582
372. 2. A. Alberdi, T. Artaza, A. Suárez, A. Rivero, F. Girot, “An experimental study on abrasive waterjet cutting of CFRP/Ti6Al4V stacks for
drilling operations, Int J Adv Manuf Technol (2016) 86:691–704 DOI 10.1007/s00170-015-8192-x
2134-
3. C A Niranjan, S Srinivas, M Ramachandra, Effect of process parameters on depth of penetration and topography of AZ91 magnesium 214
alloy in abrasive water jet cutting, Journal of Magnesium and Alloys 000 (2018) 1–9 0
4. Marin Gostimirovic, Vladimir Pucovsky, Milenko Sekulic, Dragan Rodic, Vlastimir Pejic, Evolutionary optimization of jet lag in the
abrasive water jet machining, The International Journal of Advanced Manufacturing Technology
5. Kök M, Kanca E, Eyercioglu O (2011) Prediction of surface roughness in abrasive waterjet machining of particle reinforced MMCs
using genetic expression programming. Int J Adv Manuf Technol 55(9–12):955–968
6. Azlan MZ, Habibollah H, Safian S (2011) Genetic algorithm and simulated annealing to estimate optimal process parameters of the
abrasive water jet machining. Eng Comput 27:251–259
7. Yuvaraj Natarajan, Pradeep Kumar Murugasen, Lenin Raj Sundarajan, Rajadurai Arunachalam Experimental Investigation
on Cryogenic Assisted Abrasive Water Jet Machining of Aluminium Alloy, International Journal of Precision Engineering and
Manufacturing-Green Technology
8. Vijay Kumar Pal, Puneet Tandon, Identification of the role of machinability and milling depth on machining time in controlled depth
milling using abrasive water jet Int J Adv Manuf Technol (2013) 66:877–881
9. Prabhuswamy N R, S Srinivas, Aref Vasli, Sheshashayan M V, Venkatesh S, Yash Roongta, Machinability Studies of Aluminium 6061
cut by Abrasive Water Jet, Materials Today: Proceedings 5 (2018) 2865–2870
10. Parikshit A. Dumbhare, Shikha Dubey, Yogesh V. Deshpande, Atul B. Andhare, Purushottam S. Barve, Modelling and multi-objective
optimization of surface roughness and kerf taper angle in abrasive water jet machining of steel Journal of the Brazilian Society of
Mechanical Sciences and Engineering (2018) 40:259.
Dhanamjayulu C, Ankita Ghorui, Subhasri Chatterjee, Yashraj Saluja, Sarthak Singhal,
Authors:
Arunkumar G
Paper Title: Transmission of Audio signals using Visible Light Communication via LEDs
Abstract: With the episodic increase of advancement in technology, wireless communication has become the
need of the hour. The rate at which the use of wireless technology is being developed is tremendous. However,
373. with the increase in usage, there has been unfortunately an increase in network complexity. In order to resolve
2141-
the crisis of radio frequency spectrum, a newly developed technology has been proposed. This technology has
214
been coined as Li-Fi: Light Fidelity. It is a technology, based on Visible Light Communication, which is used to
6
transmit signals and data from one system to another with the help of a Led. The paper proposes a transmission
system which will be responsible for transmitting audio signals from one system to another with the help of Li-
Fi. Here a light emitting diode acts as the Li-Fi transmitter and photodiode acting as a Li-Fi receiver.The
spontaneous switching of the Led enables propagation of signals through a wireless channel and is picked up by
the receiving photodiode. The photodiode adhering to its functiontransforms the optical signals into electrical
signals and therefore original data is retrieved and transferred. Additionally, with proposition to the system, a
comparative study has been delineated with the already existing system.The existing system of networking and
communications involve Wi-fi. The emergence and usage of Li-fi is necessary because it offers a substantially
similar user experience to Wi-Fi except using the light spectrum. It is essential as it will able to meet up the
connectivity demands of future as it is able to unlock unprecedented data and bandwidth.

Keywords: Li-Fi, Light Emitting Diode (LED), Photodiode, Visible Light Communication (VLC) Wireless
Communication.

References:

1. Aman Singla, Divyata Sharma and Sharda Vashisth, “Data Connectivity in Flights using Visible light communication,” IEEE
International Conference on Computing and Communication Technologies for Smart Nation (IC3TSN), 2017
2. Toshihiko Komine and Masao Nakagawa, “Fundamental Analysis for Visible-Light Communication System using LED Lights,” IEEE
Transactions on Consumer Electronics, Vol. 50, No. 1, pp. 100-107 February 2004.
3. Jay H. Bhut, Dharmrajsinh N. Parmar, and Khushbu V. Mehta, “LI-FI Technology – A Visible Light Communication,” International
Journal of Engineering Development and Research, pp.25-28, January 2014.
4. Syifaul Fuada and Trio Adiono, “Short range Audio Transfer through 3 Watt White Led on LoS channels,” IEEE International
Symposium on Intelligent Signal Processing and Communication Systems, November 6-9, 2017, Xiamen, China.
5. M. Sharmila1, M. Shrin Shifana, V. Theebica, V. Sangeethapriya and Mrs. M. Prathibha, “Audio Transmission Using Li-Fi
Technology,” International Research Journal of Engineering and Technology (IRJET), Vol.05, pp. 413-417, April 2018.
6. Nabil Abd Rabou, Hiroaki Ikeda, Hirofumi Yoshida, and Shigenobu Shinohara, “Optical Fiber Transmission of Multi-Channel FM
audio and video signals,” IEEE Transactions on Consumer Electronics, Vol. 39, No. 3, pp. 593-597, August 1993.
7. Sridhar Rajagopal, Richard D. Roberts and Sang-Kyu Lim, “IEEE 802.15.7 Visible Light Communication: Modulation Schemes and
Dimming Support,” IEEE Communications Magazine Volume:50 , Issue: 3 , pp. 72-82, March 2012
8. Rachel Kobo, Khmaies Ouahada, Richard Ndjiongue, and Olorato Precious Lekgotle, “Home Intercommunication System Using
Visible Light Communications,” IIMC International Information Management Corporation, 2017.
9. M.Mutthamma, “A survey on Transmissionof data through illumination-Li-Fi,” International Journal of Research in Computer and
Communication Technology, Vol 2, Issue 12, pp. 1427-1430,December 2013.
10. Grantham K. H. Pang, Chi-Ho Chan, and Thomas T. O. Kwan, “Tricolor Light-Emitting Diode Dot Matrix Display System with Audio
Output,” IEEE Transactions on Industry Applications, Vol. 37, No. 2, pp. 534-540, March-April 2001.
11. Abdelmoujoud Assabir , Jamal Elmhamdi , Ahmed Hammouch and Abdellatif Akherraz, “Application of Li-Fi Technology in the
Transmission of the Sound at the Base of the PWM,” IEEE 2nd International Conference on Electrical and Information Technologies
ICEIT’2016.
12. E. B. Adoptante, Jr, K. D. Cadag, and V. R. Lualhati, “Audio Multicast by Visible Light Communication for Location Information for
the Visually Impaired,” 8th IEEE International Conference Humanoid, Nanotechnology, Information Technology Communication and
Control, Environment and Management (HNICEM), December 2015.

Authors: Hussain Bohra, Amrit Ghosh

Paper Title: A Research on Microstrip Ultrawide Band Filters using Defected Ground Structure Techniques
Abstract: In this paper, microstrip ultra-wideband (UWB) filters using various defected ground structures are
studied. Miniature microstrip filters employed in transceiver of modern wireless communication systems play
vital role in controlling and regulating frequency response. DGS techniques are etched in ground plane to design
compact microstrip based low pass, high pass, bandpass and band reject filters used in modern wireless systems.
Various modified and hybrid defected ground structure techniques are employed to achieve high return loss, low
insertion loss, ultra compactness, good selectivity and linearity in filters. Study reveals that the proper selection
and incorporation of DGS techniques while designing microstrip ultra wideband filter optimizes the various vital
parameters which enhances its performance and practicability for various modern wireless communication
applications.

Keywords: Defected ground structure (DGS), Filters, Microstrip, Ultrawide band (UWB).

374. References:
2147-
1. Ali J.K. and Alsaedi H., "Second Harmonic Reduction of Miniaturized Dual-mode Microstrip Bandpass Filters Using Fractal Shaped 215
Open Stub Resonators", 2012.
2. Boutejdar A., Omar A., Burte E.P. and Mikuta R.,” An Improvement of Defected Ground Structure Lowpass/Bandpass Filters Using H- 3
Slot Resonators and Coupling Matrix Method”, Journal of Microwaves, Optoelectronics and Electromagnetic Applications, vol. 10, no.
2, pp. 295-307, 2011.
3. Boutejdar A., Darwish A. and Omar A.,” Design and Improvement of Compact Half-Wavelength Band Pass Filter Employing
Overlapped Slotted Ground Structure (SGS) and Multilayer Technique”, ACES J., vol. 28, no. 8, pp. 685-692, 2013.
4. Boutejdar A., Elsherbini A., Balalem A., Machac J. and Omar A., Design of New DGS Hairpin Microstrip Band pass Filter Using
Coupling Matrix Method, Progress In Electromagnetics Research Symposium(2007), Prague, Czech Republic, pp. 261-265, August
2007.
5. Chaudhary G., Choi H., Jeong Y., Lim J., Kim D. and Kim J.C., “Design of Dual-Band Band pass Filter Using DGS With Controllable
Second Pass band”, IEEE Microwave And Wireless Components Letters, vol. 21, no. 11, pp. 589-591, 2011.
6. Chen F.S., Zhan L.M. (corresponding author), Li W.G. and Tang Q.H., Compact Wideband Tri-mode Microstrip Band pass Filter
Based on input/output DGS Coupling structure, IEEE International Conference on Microwave and Millimeter Wave Technology
(ICMMT 2016), Wuhan, pp. 1-6, 2016.
7. Chen J.X., Ma Y., Cai J., Zhou L.H., Bao Z.H. and Che W., “Novel Frequency-Agile Band pass Filter With Wide Tuning Range and
Spurious Suppression”, IEEE Transactions On Industrial Electronics, vol. 62, no. 10, pp. 6428-6435, 2015.
8. Gaurav Y. and Chauhan R.K., “Design of BPF using Pseudo-Interdigital Structure for Impedance Bandwidth enhancement of
Monopole Antenna for UWB Application”, International Journal of Electronics Engineering Research, vol. 9, no. 1, pp. 37-55, 2017.
9. Hejazi Z.M., “A Fast Design Approach of Compact Microstrip Multiband Band Pass Filters”, Microwave and Optical Technology
Letters, vol. 54, no. 4, pp. 1075-1079, 2012.
10. Huang T., Yang X., Huang Y., Hel Z.S. and Shao Z., An X-band SIW-DGS Band pass Filter with Improved Stop band Performance,
IEEE International Conference on Communication Problem Solving (ICCP 2015), Panzhihua, China, pp. 473-474, 2015.
11. Jaldi M. and Tayarani M., “A compact band pass filter by use of defected ground structure”, IEICE Electronics Express, vol. 8, no. 7,
pp. 1431-1436, 2011.
12. Jaldi M. and Tayarani M., Characteristics of a Novel Slow-Wave Defected Ground Structure for Planar Wide Band Filters,
International Conference on Information and Electronics Engineering (IPCSIT 2011), Singapore, pp. 135-139, 2011.
13. Karthikeyan S.S. and Kshetrimayum R.S., “Notched UWB band pass filter using complementary single split ring resonator”, IEICE
Electronics Express, vol. 7, no. 17, pp. 1290-1295, 2010.
14. Kufa M. and Raida Z., “Comparison of Planar Fractal Filters on Defected Ground Substrate”, Radioengineering, vol. 21, no. 4, pp.
1019-1024, 2012.
15. Kumar A. and Kartikeyan M.V., “Design and realization of microstrip filters with new defected ground structure (DGS)”, Engineering
Science and Technology International Journal, vol. 20, no. 2, pp. 679-686, 2016.
16. Kumar A., Patel R. and Kartikeyan M.V., “Investigation on Microstrip Filters with CSRR Defected Ground Structure”, Advanced
Electromagnetics, vol. 5, no. 2, pp. 28-33, 2016.
17. Li Y.C. and Xue Q., “Tunable Balanced Band Pass Filter with Constant Bandwidth and High Common-Mode Suppression”, IEEE
Transactions on Microwave Theory and Techniques, vol. 59, no. 10, pp. 2452-2460, 2011.
18. Lin H., Peng H., Xia X., Yang T. and Jin H., “A novel ultra-wideband band pass filter using defected microstrip structures”, IEICE
Electronics Express, vol. 13, no. 7, pp. 1-6, 2016.
19. Liu M., Wang C., and Kim N.Y., “Design of a compact triple-band band pass filter using triple-mode stub-loaded step-impedance
resonator”, IEICE Electronics Express, vol. 12, no. 18, pp. 1-9, 2015.
20. Lu J., Wang J. and Gu H., “Design of compact balanced ultra-wide band bandpass filter with half mode dumbbell DGS”, Electronics
Letters, vol. 52, no. 9, pp. 731-732, 2016.
21. Mansour I. Elhennawy H., Adly S. and Dein T.E., “Design of Stepped Impedance Microstrip Low Pass Filter with DGS”, International
Journal of Engineering Research and Development, vol. 10, no. 7, pp. 58-67, 2014.
22. Mao J.R., Choi W.W., Tam K.W., Che W.Q., and Xue Q., “Tunable Band Pass Filter Design Based on External Quality Factor Tuning
and Multiple Mode Resonators for Wideband Applications”, IEEE Transactions on Microwave Theory and Techniques, vol. 61, no. 7,
pp. 2574-2584, 2013.
23. Mogadasi M.N., Alamolhoda M. and Rahmati B., “Spurious-response suppression in microstrip parallel coupled bandpass filter by
using defected microstrip structure”, IEICE Electronic Express, vol. 8, no. 2, pp. 70-75, 2011.
24. Mogadasi M.N., Alamolhoda M. and Rahmati B.,” Harmonics blocking in hairpin filter using defected microstrip structure”, IEICE
Electronic Express, vol. 8, no. 9, pp. 639-635, 2011.
25. Moyra T., Parui S.K. and Das S., “Harmonics Reduced High Selective Band Pass Filter Using Open Ended Coupled Resonator and
Defected Ground Structure”, International Journal of Electrical and Electronics Engineering Research, vol. 1, no. 1, pp. 57-63, 2011.
26. Moyra T., Parui S.K. and Das S., “Design of High Quality Factor and Harmonic Reduced Band pass Filter Using Coupled Resonators
and Defected Ground Structures”, International Journal of Soft Computing and Engineering (IJSCE), vol. 1, no. 6, pp. 185-188, 2012.

27. Noh S.K. and Yun T.S., “Quarter-Wavelength Stub Bandpass Filter with T-type Inverter for Harmonic Suppressed Application”,
International Journal of Control and Automation, vol. 6, no. 2, pp. 293-302, 2013.
28. Noh S.K. and Yun T.S., “Harmonic Suppressed Short-Stub Band Pass Filter with T-type Inverter”, ISA 2013 ASTL, vol. 21, no. 1, pp.
72-76, 2013.
29. Pandey A.K. and Chauhan R.K., Miniaturized Dual-Band BPF WiMax/WLAN Applications, 1st IEEE Conference on Power
Electronics, Intelligent Control and Energy Systems (ICPEICES 2016), Gorakhpur, pp. 1-4, 2016.
30. Rouhi R., Ghobadi C., Nourinia J. and Pirani S., “Compact Elliptic Function Low Pass Filter Based On Defected Ground Structures”,
IEICE Electronic Express, vol. 7, no. 6, pp. 434-439, 2010.
31. Saini Y. and Kumar M., “Design and Analysis of Compact UWB Bandpass Filter with Wide Passband Using Defected Ground
Structure”, American Journal of Engineering Research, vol. 3, no. 8, pp. 267-272, 2014.
32. Shaheen M.M., Hussein A., Tarrad I.F. and Shalaby A.A.T., “Compact LPF Design With Low Cutoff Frequency Using V- Shaped
DGS Structure”, International Journal of Electronics and Communication Engineering & Technology, vol. 6, no. 1, pp. 1-6, 2015.
33. Shi X., Xi X., Liu J. and Yang H., “Novel ultra-wide band (UWB) band pass filter using multiple-mode resonator”, IEICE Electronics
Express, vol. 13, no. 11, pp. 1-7, 2016.
34. Singh P. and Tomar R., “The use of defected ground structures in designing microstrip filters with enhanced performance
characteristics”, Procedia Technology, Conference on Electronics, Telecommunication and Computers-CETC 2013, pp. 58-64, 2014.
35. Wei F., Qin P.Y., Guo Y.J. and Shi X.W., “Design of multi-band band pass filters based on stub loaded stepped-impedance resonator
with defected microstrip structure”, IET (The Institution of Engineering and Technology) Microwave, Antennas & Propagation, vol.
10, no. 2, pp. 230-236, 2016.
36. Weng L.H., Guo Y.C., Shi X.W., and Chen X.Q., “An Overview on Defected Ground Structure”, Progress in Electromagnetics
Research B, vol. 7, pp. 173-189, 2008.
37. Wulandari B.D. and Munir A., Equivalent Circuit for Microstrip Band pass Filter, IEEE 2nd International Conference on Wireless and
Telematics, Indonesia, pp. 14-19, 2016.
38. Yamamoto Y., Li K. and Hashimoto O., “Ultra-wideband (UWB) band pass filter using shunt stub with lumped capacitor”, IEICE
Electronics Express, vol. 4, no. 7, pp. 227-231, 2007.
39. Zhang S., Lei Zhu L. and Rui Li R., “Compact Quadruplet Bandpass Filter Based on Alternative J/K Inverters and λ/4 Resonators”,
IEEE Microwave and Wireless Components Letters, vol. 22, no. 5, pp. 224-232, 2012.

Authors: D.Prabha, R. Siva Subramanian, S.Balakrishnan, M.Karpagam

Paper Title: Performance Evaluation of Naive Bayes Classifier with and without Filter Based Feature Selection
Abstract: Customer Relationship Ma agement tends to analyze datasets to find insights about data which in
turn helps to frame the business strategy for improvement of enterprises. Analyzing data in CRM requires high
intensive models. Machine Learning (ML) algorithms help in analyzing such large dimensional datasets. In most
real time datasets, the strong independence assumption of Naive Bayes (NB) between the attributes are violated
375. and due to other various drawbacks in datasets like irrelevant data, partially irrelevant data and redundant data,
2154-
it leads to poor performance of prediction. Feature selection is a preprocessing method applied, to enhance the
215
predication of the NB model. Further, empirical experiments are conducted based on NB with Feature selection
8
and NB without feature selection. In this paper, a empirical study of attribute selection is experimented for five
dissimilar filter based feature selection such as Relief-F, Pearson correlation (PCC), Symmetrical Uncertainty
(SU), Gain Ratio (GR) and Information Gain (IG).

Keywords: CRM, Prediction, Machine Learning, Naïve Bayes, feature selection.


References:

1. Frederico Cruz-Jesus , Andreia Pinheiro, Tiago Oliveira, "Understanding CRM adoption stages: empirical analysis building on the
TOE framework," Computers in Industry 109 (2019) 1–13
2. Zeynab Soltani et al., "The impact of the customer relationship management on the organization performance," Journal of High
Technology Management Research 29 (2018) 237–24
3. 3 D. Prabha and R. S. Subramanian, "A survey on customer relationship management," 2017 (ICACCS), Coimbatore, 2017, pp. 1-5
4. Cristina-claudia osman, Ana -maria ghiran, "Extracting customer traces from CRMS: From Software to Process models," The 12 th
International conference interdisciplinarity in engineering , Procedia manufacturing 32 (2019) 619-626.
5. Siva Subramanian Raju and Prabha Dhandayudam, "Prediction of customer behaviour analysis using classification algorithms," AIP
Conference Proceedings 1952, 020098 (2018); doi: 10.1063/1.5032060
6. J.Weston et al., " Feature Selection for SVMs," In NIPS 13,2000
7. Mary Walowe Mwadulo, "A Review on Feature Selection Methods For Classification Tasks", IJCATR0506 Volume 5– Issue 6, 395 -
402, 2016
8. Sánchez-Maroño et al., " Filter Methods for Feature Selection – A Comparative Study," 178-187. 10.1007/978-3-540-77226-2_19.
9. Kononenko I. (1991), "Semi-naive bayesian classifier. In: Kodratoff Y. (eds) Machine Learning — EWSL-91,". EWSL 1991. Lecture
Notes in Computer Science, vol 482. Springer, Berlin, Heidelberg
10. Pazzani M.J. (1996), "Searching for Dependencies in Bayesian Classifiers," Lecture Notes in Statistics, vol 112. Springer, New York,
NY
11. Friedman, N Geiger, D. & Goldszmidt, "M, Machine Learning (1997) 29:131.https://doi.org/10.1023/A:10077465528199,"
12. E. Keogh, M. Pazzani, "Learning Augmented Bayesian Classifiers: A Comparison of Distribution-Based and Classification-Based
Approaches," pp. 225-230, 1999
13. Zheng, Z. & Webb, G.I, “Lazy Learning of Bayesian Rules”, Machine Learning, 41, 53-84 10.1023/A:1007613203719
14. Webb, G., Boughton, J. & Wang, Z, “Not So Naive Bayes: Aggregating One-Dependence Estimators,” Machine Learning, 58 5-24.
10.1007/s10994-005-4258-6.
15. Pat langley,Stephanie sage, "Induction of Selective Bayesian Classifiers," UAI'94 Proceedings of the 10th international conference on
Uncertainty in AI Pages 399-406.
16. C Ratanamahatana, D Gunopulos," Feature selection for the naive bayesian classifier using decision trees," Applied artificial
intelligence, volume 17,Issue 5-6,pages 475-487
17. S. DeepaLakshmi and T. Velmurugan, "Empirical Study of Feature Selection Methods for High Dimensional Data," IJST, Vol 9(39),
DOI: 10.17485/ijst/2016/v9i39/90599, October 2016
18. Aytug Onam,Serder Korukoglu, "A feature selection model based on genetic rank aggregation for text sentinment classfication,"
Journal of Information science 1-14
19. Roberto Vega et al., "Assessment of feature selection and classification methods for recognizing motor imagery tasks from
electroencephalographic signals," Artificial Intelligence Research, 2017, Vol. 6, No. 1
20. Ankita Mangal, Elizabeth A.Holm, "A Comparative Study of Feature Selection Methods for Stress Hotspot Classification in Materials,"
Integrating Materials and Manufacturing Innovation (2018) 7:87–95
21. Antonio Arauzo-Azofra, Jose Manuel Benitez,J.L.Casto, "A feature set measure based on Relief," Proc fifth Intl Conf,Artifical
Intelligence,pp,279-305,1994
22. Sánchez-Maroño (2007) et. al, " Filter Methods for Feature Selection – A Comparative Study,"178-187. 10.1007/978-3-540-77226-
2_19.
23. Salim Chikhi and Sadek Benhammada, " ReliefMSS: a variation on a feature ranking ReliefF algorithm," IJBIDM ,Volume 4,Issue
3/4,Nov 2009,Pages 375-390
24. 24.Jasmina NOVAKOVIĆ, Perica STRBAC, Dusan BULATOVIĆ, "Toward Optimal Feature Selection Using Ranking Methods And
Classification Algorithms," Yugoslav Journal of Operations Research 21 (2011), Number 1, 119-135.
25. Thu ZarPhyu, NyeinNyeinOo, "Performance Comparison of Feature Selection Methods," MATEC Web of Conferences matec 42,
06002 (2016)
26. Jianli Ding, Liyang Fu, "A Hybrid Feature Selection Algorithm Based on Information Gain and Sequential Forward Floating Search,"
Journal of Intelligent Computing ,Volume 9 ,Number 3 September 2018
27. R.Porkodi, "Comparison of Filter Based Feature Selection Algorithms: An Overview," (IJIRTS) VOLUME 2, NUMBER2
28. Dr. Kadhim B.S. Al Janabi, Rusul Kadhim, "Data Reduction Techniques: A Comparative Study for Attribute Selection Methods,"
IJACST. ISSN 2249-3123 Vol 8, No 1 (2018), pp. 1-13
29. Venkatachalam K et al., “Effective Feature Set Selection And Centroid Classifier Algorithm For Web Services Discovery,”
International Journal of Pure and Applied Mathematics, Volume 119, No. 12, 2018, pp.1157-1172.
30. K Mani, P Kalpana, "A Review on Filter Based Feature Selection," IJIRCCE, Vol. 4, Issue 5, May 2016
31. Minghao Piao , Yongjun Piao and Jong Yun Lee, "Symmetrical Uncertainty-Based Feature Subset Generation and Ensemble Learning
for Electricity Customer Classification," Symmetry 2019, 11, 498; doi:10.3390/sym11040498
32. D. SheelaJeyarani, A. Pethalakshmi, "An Efficient Fuzzy Entropy Based Feature Selection Algorithm for High Dimensional Data,"
International Journal of Advanced Research in Computer Science Volume 6, No. 6, June - July 2015
33. C. Sunil Kumar and R.J. Rama Sree, " Application Of Ranking Based Attribute Selection Filters To Perform Automated Evaluation Of
Descriptive Answers Through Sequential Minimal Optimization Models," Ictact Journal On Soft Computing. 05.860-
868.10.21917/ijsc.2014.0122
34. S.Senthamarai, N.Ramaraj, " A novel hybrid feature selection via Symmetrical Uncertainty ranking based local memetic search
algorithm," Knowledge-Based Systems 23 (2010) 580–585
35. Suban Ravichrandan, Chandrasekaran Ramasamy, "Performance Comparison of Dimensionality Reduction Methods
using MCDR," IJIRAE ISSN: 2349-2763 Issue 07, Volume 3 (July 2016)
36. N.S.Nithya and K Duraiswamy, "Gain ratio based fuzzy weighted association rule mining classifier for medical diagnostic interface,"
Vol. 39, Part 1, Feb 2014, pp. 39–52. c Indian Academy of Sciences
37. Anuj Sharma, Shubamoy Dey, " Performance Investigation of Feature Selection Methods and Sentiment Lexicons for Sentiment
Analysis," International Journal of Computer Applications (0975 – 8887).
38. R. Praveena Priyadarsini , M.L.Valarmathi and S. Sivakumari, " Gain Ratio Based Feature Selection Method For Privacy Preservation,"
Ictact Journal On Soft Computing, April 2011, Volume: 01, Issue: 04
39. [Moro et al., 2014] S. Moro, P. Cortez and P. Rita, 'A Data-Driven Approach to Predict the Success of Bank Telemarketing," Decision
Support Systems, Elsevier, 62:22-31, June 2014
40. Dhandayudam Prabha Krishnamurthi, Ilango, "Customer Behavior Analysis Using Rough Set Approach," Journal of Theoretical and
Applied Electronic Commerce Research, vol. 8/ issuse 2/August, 2013, pp. 21-33
41. Yvan Saeys, Inaki Inza, Pedro Larranaga, "A review of feature selection techniques in bioinformatics," Bioinformatics ,Vol 23, Iss 19,
1 Oct 2007,Pg 2507-2517.
42. Balakrishnan S, K.Aravind, A. Jebaraj Ratnakumar, “A Novel Approach for Tumor Image Set Classification Based On Multi-Manifold
Deep Metric Learning,” International Journal of Pure and Applied Mathematics, Vol. 119, No. 10c, 2018, pp. 553-562.
43. Jebaraj Rathnakumar, S.Balakrishnan, “Machine Learning based Grape Leaf Disease Detection”, JARDCS, Vol. 10, 775-780.
44. S. Vasu et al., “A Machine Learning Based Approach for Computer Security”, JARDCS ,Vol.10, 915- 919.
Authors: Dineshkumar C, Roshan D, Jeyakumar P.D, Tamilarasan T.R, V.Deepan

Paper Title: Generation of Electrical Energy for Charging of a Battery by using Exhaust Gas Energy
Abstract: In present day most of the automobile vehicles runs and depends upon the automotive electronics
therefore the need of electrical energy for running the electronics system. By using the exhaust gas energy it can
produce the energy or charge the battery or power the electrical systems in different operating conditions. The
system assists the existing battery during demand. The gas from combustion engine goes as waste approximately
70%of heat without utilizing properly. An attempt is made to charge the battery and it can use to power the
electrical systems by using energy from exhaust gas turbine. It is used for the conversion of heat energy to
electrical energy. To charge the battery by using the mechanical power from the engine exhaust manifold turbine
without compromising the engine efficiency with limited back pressure. The main aim is to convert the heat
energy to electrical energy through turbine which gets the higher out turn energy from the exhaust gases. The
exhaust gas is utilized for charging and assisting the electrical system.

Keywords: Exhaust gas, Turbine, motor, Electrical systems, Battery.


376.
References: 2159-
216
1. J. S. Jadhao, D. G. Thombare 2013. Review on Exhaust Gas Heat Recovery for I.C. Engine. International Journal of Engineering and 3
Innovative Technology (IJEIT) Volume 2, Issue12.
2. Sawan Kumar Tripathi, Sanjay Malav, Sourabh Jain, 2016. Review On Exhaust Gas Heat Recovery For IC Engine Using
Thermoelectric Generator. International Journal Of Advanced Research In Science And Engineering Volume No 5, Issue 6.
3. S.Vijaya Kumar, Amit Kumar Singh, Athul Sabu, Mohamed Farhan.P 2015. Generation of Electricity by Using Exhaust from Bike.
International Journal of Innovative Research in Science, Engineering and Technology. Doi/full irjet.net/archives/V4/i3/IRJET-
V4I3497.
4. M.Chinnapandian, V.Pandiyarajan, A.Prabhu & R.Velraj 2015.Experimental Investigation of a Cascaded Latent Heat Storage System
for Diesel Engine Waste Heat Recovery Pages 1308-1317. Energy sources. doi/full/10.1080/15567036.2011.586974.
5. Dineshkumar C, Subramanian M, Jenorish Muthaya, Deepan V 2018. Health Monitoring System for Automobile Vehicles to Enhance
Safety, International journal of vehicle structure and systems, Article in press Volume 10, Issue 6.
6. Deepan, M. Subramanian, C. Dineshkumar 2018. Motorcycle rider fatigue analyse: Results of an Online Survey, International Journal
of Mechanical and Production Engineering Research and Development (IJMPERD) ISSN (P): 2249-6890; ISSN (E): 2249-8001 Vol.
8.
7. Dineshkumar C, Subramanian M. June 2018. Experimental Investigation of Onboard Driver Condition Monitoring System for
Passenger Vehicles, International Journal of Mechanical Engineering and Technology (IJMET) Volume9, Issue6, pp.01-
09.ArticleID:IJMET_06_07_001.www.iaeme.com/IJMET/index.asp 305.
Authors: Vishal Saroha, B. S. Pabla, Sukhdev Singh Bhogal

Paper Title: Characterization of ABS for Enhancement of Mechanical Properties


Abstract: Polymers have been increasingly used in industry due to their light weight, lower cost, reduced
secondary operations, design flexibility and ease in manufacturing. However the mechanical properties like
micro hardness and wear resistance of plastic restrict their applications. In this paper an effort has been made to
improve the mechanical properties of plastic by applying a coating of Ni through electrodeposition method.
There has been a remarkable improvement in the wear resistance and hardness after coating. The experimental
investigation, analysis of result and conclusion are presented in this paper.

Keywords: Metallization, Electroless plating, Surface conditioning, Micro hardness, Wear rate.

References:
377.
1. Equbal, A., Dixit, N. K., & Sood, A. K. “Electroless plating on plastic”, Int. J. Sci. Eng. Res, Vol. 4, 2013, pp. 8.
2164-
2. Mai, T. T., Schultze, J. W., & Staikov, G. “Microstructured metallization of insulating polymers”, Electrochimica acta, Vol. 48(20-22), 216
2003, pp. 3021-3027. 7
3. Tang, X., Cao, M., Bi, C., Yan, L., & Zhang, B. “Research on a new surface activation process for electroless plating on ABS
plastic”, Materials Letters, Vol. 62(6-7), 2008, pp. 1089-1091.
4. Kong, F. Z., Zhang, X. B., Xiong, W. Q., Liu, F., Huang, W. Z., Sun, Y. L., ... & Chen, X. W. “Continuous Ni-layer on multiwall
carbon nanotubes by an electroless plating method”, Surface and Coatings Technology, Vol. 155(1), 2002, pp. 33-36.
5. Bazzaoui, M., Martins, J. I., Bazzaoui, E. A., Albourine, A., Wang, R., & Hong, P. D. “A simple method for acrylonitrile butadiene
styrene metallization”, Surface and Coatings Technology, Vol. 224, 2013, pp. 71-76.
6. Teixeira, L. A. C., & Santini, M. C. “Surface conditioning of ABS for metallization without the use of chromium baths”, Journal of
Materials Processing Technology, Vol. 170(1-2), 2005, pp. 37-41.
7. Li, D., Goodwin, K., & Yang, C. L. “Electroless copper deposition on aluminum-seeded ABS plastics”, Journal of Materials Science,
Vol. 43(22), 2008, pp. 7121-7131.
8. Nigam, S., Mahapatra, S. S., & Patel, S. K. “A Non-Toxic Metallization Technique for Deposition of Copper on ABS Plastic”.
9. Garcia, A., Berthelot, T., Viel, P., Mesnage, A., Jégou, P., Nekelson, & Palacin, S. “ABS polymer electroless plating through a one-
step poly (acrylic acid) covalent grafting”, ACS applied materials & interfaces, Vol. 2(4),2010, pp. 1177-1183.

Authors: A.Charles

Paper Title: Merkle Hellman Knapsack Cryptosystem based Cloud Auditing Protocol
378. Abstract: The cloud environment provided the cloud storage services to allow the users for storing, managing
2168-
and accessing their data through the internet. The user worried about the integrity of data because of their data
217
can be modified by external hackers due to the limited control. The new auditing technology is required for
4
allowing the user to use local storage without worrying about the integrity of the data. An independent entity
called Third Party Auditor (TPA) is presented for auditing task rather than putting the burden of task to the user
themselves. In our proposed work, the Cloud Auditor (CA) plays the role of monitoring the modifications done
to the block by any external hacker if it happens; original data is recovered from its cache log. Every data that
transacts between the storage, user and the CA are encrypted with Merkle Hellman Knapsack Cryptosystem
based Cloud Auditing Protocol (MHKC-CAP) algorithm. Thus the proposed methodology outperforms the
existing algorithms like Message Digest 5 (MD5) algorithm and Advanced Encryption Standard (AES) by
means of auditing time around 13 milliseconds and accuracy in terms of False Positive Rate (FPR) and False
Negative Rate (FNR) are around 0.67% and 0.5%.

Keywords: Cloud Storage Services, Third Party Auditor, Message Digest 5, Advanced Encryption Standard
and Merkle Hellman Knapsack Cryptosystem based Cloud Auditing Protocol.

References:

1. Yang, Changsong, Xiaofeng Chen, and Yang Xiang. "Blockchain-based publicly verifiable data deletion scheme for cloud storage."
Journal of Network and Computer Applications, vol. 103, pp. 185-193, 2018.
2. Alassafi, Alharthi, Walters, and Wills, “A framework for critical security factors that influence the decision of cloud adoption by Saudi
government agencies”, Telematics and Informatics, vol. 34, no. 7, pp, 996-1010, 2017.
3. El-Booz, Sheren A., Gamal Attiya, and Nawal El-Fishawy. "A secure cloud storage system combining time-based one-time password
and automatic blocker protocol." EURASIP Journal on Information Security, no. 1, pp. 13, 2016.
4. T. Xiang, Li, Chen, Yang, and Zhang, “Achieving verifiable, dynamic and efficient auditing for outsourced database in cloud”, Journal
of Parallel and Distributed Computing, vol. 112, pp. 97-107, 2018.
5. Hudic, Aleksandar, Paul Smith, and Edgar R. Weippl. "Security assurance assessment methodology for hybrid clouds." Computers &
Security, vol. 70, pp. 723-743, 2017.
6. Shen, Yu, Xia, Zhang, Lu, and Hao, “Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third
party medium”, Journal of Network and Computer Applications, vol. 82, pp. 56-64, 2017.
7. Xu, Wu, Khan, Choo, and He, “A secure and efficient public auditing scheme using RSA algorithm for cloud storage”, The Journal of
Supercomputing, pp. 1-25, 2017.
8. Luo, Xu, Huang, Wang, and S. Fu, “Efficient auditing for shared data in the cloud with secure user revocation and computations
outsourcing”, Computers & Security, vol. 73, pp. 492-506, 2018.
9. Wan, Zhang, Pei, and Chen, “Efficient privacy-preserving third-party auditing for ambient intelligence systems”, Journal of Ambient
Intelligence and Humanized Computing, vol. 7, no. 1, pp. 21-27, 2016.
10. Zhang, Jianhong, Hongxin Meng, and Yong Yu. "Achieving public verifiability and data dynamics for cloud data in the standard
model." Cluster Computing, vol. 20, no. 3, pp. 2641-2653, 2017.
11. Salem Mohaned Zkaria, Sahar F. Sabbeh, and E. L. Tarek, "An Efficient Privacy Preserving Public Auditing Mechanism for Secure
Cloud Storage", International Journal of Applied Engineering Research, vol. 12, no. 6, pp. 1093-1101, 2017.
12. J. Shen, J. Shen, X. Chen, X. Huang, and W. Susilo, “An efficient public auditing protocol with novel dynamic structure for cloud
data”, IEEE Transactions on Information Forensics and Security, vol. 12, no. 10, pp. 2402-2415, 2017.
13. S. Anbuchelian, C. M. Sowmya, and C. Ramesh. "Efficient and secure auditing scheme for privacy preserving data storage in
cloud." Cluster Computing, pp. 1-9, 2017.
14. Zhang, Jianhong, and Qiaocui Dong, "Efficient ID-based public auditing for the outsourced data in cloud storage", Information
Sciences, vol. 343, pp. 1-14, 2016.
15. Y. Yu, L. Xue, M. H. Au, W. Susilo, J. Ni, Y. Zhang, and J. Shen, “Cloud data integrity checking with an identity-based auditing
mechanism from RSA”, Future Generation Computer Systems, vol. 62, pp. 85-91, 2016.
16. Wei, Jinqiao, Ying Wang, and Xiaoxue Ma. "Text image authenticating algorithm based on MD5-hash function and Henon
map." Ninth International Conference on Digital Image Processing (ICDIP 2017). Vol. 10420. International Society for Optics and
Photonics, 2017.

Authors: Pratima Malhotra, Kanika Sharma


Improved Multiple Gateway Node Based Routing Architecture for Heterogeneous Wireless Sensor
Paper Title:
Network
Abstract: In modern era, with technologies shifting from wired to wireless technologies, Wireless Sensor
Networks (WSNs) play an essential role in advancement of technology. WSNs have limited battery .In this
paper, we propose Improved Multiple Gateway Node (MGN) based Routing Architecture (IMRA) that increases
both network lifetime and stability period of the network and also improves energy efficiency. It uses the
technique of load balancing and considers average energy of the network to improve aforementioned parameters.
IMRA is event-driven protocol and has four MGNs with unlimited power which makes this protocol efficient for
use in disaster prone areas like earthquakes, forest fires etc. saving millions of lives. Wireless Sensor Networks
(WSNs) play an essential role in advancement of technology. Various disasters like earthquakes, forest fires, etc.
can be sensed in advance using latest technology in WSNs and preventive measures can be taken. IMRA
surpasses other protocols by increasing Stability Period, Half Node Dead and Network lifetime by 58.18%,
379.
55.94% and 52.96% respectively as compared to traditional MRA and by 156.99%, 86.2% and 90.12% 2175-
respectively as compared to Threshold sensitive Energy Efficient Delay aware Routing Protocol(TEDRP). 218
0
Keywords: IMRA, Network Lifetime, Stability Period, WSN.

References:

1. I.F. Akyildiz,W. Su, Y. Sankarasubramaniam and E. Cayirci, “Wireless sensor networks: a survey” Computer networks, Vol. 38, No. 4,
pp. 393-422, 2002.
2. P. Baronti, P. Pillai, V. W. C. Chook, S. Chessa, A. Gotta, and Y. F. Hu, “Wireless sensor networks: A survey on the state of the art and
the 802.15.4 and ZigBee standards,” Computer Communications,Vol. 30,No. 7, pp. 1655–1695, 2007.
3. M. Younis and K. Akkaya, “Strategies and techniques for node placement in wireless sensor networks: A survey,” Ad Hoc Networks,
Vol. 6, No. 4, pp. 621–655, 2008.
4. J. Wang, Z. Cheng, L. Jing & T. Yoshida, “Design of a 3D localization method for searching survivors after an earthquake based on
WSN”, 3rd International Conference on Awareness Science and Technology (iCAST), IEEE, pp. 221-226, 2011.
5. G.W. Allen, K. Lorincz, M. Ruiz, O. Marcillo, J. Johnson, J. Lees & M. Welsh, “Deploying a wireless sensor network on an active
volcano”, IEEE internet computing, Vol. 10, No. 2, pp. 18-25, 2006.
6. E.S. Biagioni & K.W. Bridges, “The application of remote sensor technology to assist the recovery of rare and endangered species”,
The International Journal of High-Performance Computing Applications, Vol. 16, No. 3, pp. 315-324, 2002.
7. D. Sharma, A. Ojha, and A. P. Bhondekar, “Heterogeneity consideration in wireless sensor networks routing algorithms: a review”,
Springer US, 2018.
8. G. Anastasi, M. Conti, M. Di Francesco, and A. Passarella, “Energy conservation in wireless sensor networks: A survey,” Ad Hoc
Networks,Vol. 7, No. 3, pp. 537–568, 2009.
9. J. N. Al-Karaki and A. E. Kamal, “Routing techniques in wireless sensor networks: A survey,” IEEE Wirel. Commun., Vol. 11, No. 6,
pp. 6–27,2004.
10. K. Akkaya and M. Younis, “A survey on routing protocols for wireless sensor networks.”, Ad hoc networks, Vol. 3, No. 3, pp.325-349,
2005.
11. X. Hu, J. Luo, Z. Xia, and M. Hu, “Adaptive Algorithm of Cluster Head in Wireless Sensor Network Based on LEACH,” in IEEE, 3rd
International Conference on Communication Software and Networks, pp. 14–18, 2011.
12. P. G. V. Naranjo, M. Shojafar, H. Mostafaei, Z. Pooranian, and E. Baccarelli, “P-SEP: a Prolong Stable Election Routing Algorithm for
Energy-Limited Heterogeneous Fog-Supported Wireless Sensor Networks,” Springer, The Journal of Supercomputing, Vol. 73, No. 2,
pp. 733–755, 2017.
13. N. Mittal, U. Singh, and B. S. Sohi, “A Stable Energy Efficient Clustering Protocol for Wireless Sensor Networks,” Springer, Wireless
Networks, Vol. 23, No. 6, pp. 1809–1821, 2017.
14. S. Verma, N. Sood, and A. K. Sharma, “Design of a Novel Routing Architecture for Harsh Environment Monitoring in Heterogeneous
WSN,” IET Wireless Sensor Systems, Vol. 8, No. 6, pp. 284-294, 2018.
15. Y. Tian, Y. Wang, and S.-F. Zhang, “A Novel Chain-Cluster Based Routing Protocol for Wireless Sensor Networks,” in IEEE,
International Conference on Wireless Communications, Networking and Mobile Computing, pp. 2456–2459, 2007.
16. S. Jang, H.-Y. Kim, N.-U. Kim, and T.-M. Chung, “Energy-Efficient Clustering Scheme with Concentric Hierarchy,” in IEEE
International RF & Microwave Conference, pp. 79–82, 2011.

Authors: Manoj B Chandak

Paper Title: Park-A-Lot


Abstract: With the increasing difficulty in finding parking spaces and the increasing need for security, an
automated system to guide vehicles to parking will come as rescue. With this project of ours we aim to develop
an approach that will allow automated entry to the employee vehicles that are registered with the office. This
system will automatically detect if a vehicle has been registered and accordingly open the gates of the institute
for the vehicle along with which it will also display and guide vehicles to vacant parking spaces and alternate
parking areas in case of occupied parking lots.

Keywords: Monitored Parking, Professional Parking, license Plate, Number Plate, CCA.

References:
380. 1. Mello C, Costa D, “ A Complete System For Vehicle Licence Plate Recognition ”, in 16 th International Conference on Signals and
Image Processing , IEEE Xplore , 2009
2181-
2. S.Davidson, “The Use Of Automatic Number Plate Recognition In Managing To The Boots Company Headquarter Site”, in IEEE Int. 218
Conf. on Security Technology, London, 2001. 5
3. H.Lee, “Real Time Automatic Vehicle Management System Using Vehicle Tracking and Car Plate Number Identification”, IEEE
ICME, Baltimore, USA, 2003.
4. T.Sirithinaphong, “The Recognition of Car License Plate for Automatic Parking System”, Int. Symp. on Signal Processing and its
Applications, Australia, 1999.
5. M.Sezgin et al. “Survey over image thresholding techniques and quantitative performance evaluation”, Journal of Electronic Imaging,
2004, vol. 13, no. 1, pp. 317-327.
6. Dave A.(2018) , License Plate Detector. Retrieved from https://github.com/apoorva-dave/LicensePlateDetector
7. Minhaj A. (2018), Arduino Automated Parking, Retrieved from https://ashrafminhajfb.blogspot.com/2018/08/arduino-automated-
parking-garage.html
8. Oladegi F.(2017) , Developing a License Plate Recognition System with Machine Learning in Python. Retrieved from
https://blog.devcenter.co/developing-a-license-plate-recognition-system-with-machine-learning-in-python-787833569ccd
9. Rosebrock A. (2018) An OpenCV barcode and QR code scanner.Retrieved from https://www.pyimagesearch.com/2018/05/21/an-
opencv-barcode-and-qr-code-scanner-with-zbar/
10. .Database Connection, Retrieved from https://www.w3schools.com/python/python_mysql_getstarted.asp.

Authors: Bandi Rambabu, A Venugopal Reddy, Sengathir Janakiraman


A Hybrid Artificial Bee Colony and Bacterial Foraging Algorithm for Optimized Clustering in
Paper Title:
Wireless Sensor Network
Abstract: The emerging ubiquitous nature of wireless sensor networks has made it suitable and applicable to a
diversified number of vital applications that include environment surveillance, health monitoring using
implantable sensors, weather forecasting and other plethora of contexts. The critical issues such as computation
time, limited memory and energy are more common due to the tiny sized hundred and thousands of sensor nodes
existing in the networks. In this context, the network lifetime completely depends on the potential use of
381. available resources. The process of organizing closely located sensor nodes into clusters is convenient for
effective management of cluster and improving the lifetime of the complete network. At this juncture, swarm 2186-
intelligent and evolutionary algorithms the pertains to the problem of NP-complete is determined to achieve a 219
superior optimal solution. In this paper, a Hybrid Artificial Bee Colony and Bacterial Foraging Algorithm-based 1
Optimized Clustering (HABC-BFA-OC) is proposed for achieving enhanced network lifetime in sensor
networks. In this proposed HABC-BFA-OC technique, the benefits of Bacterial Foraging Optimization is
included for improving the local search potential of ABC algorithm in order to attain maximum exploitation and
exploration over the parameters considered for cluster head selection. The simulation experiments of the
proposed HABC-BFA-OC technique confirmed an enhanced network lifetime with minimized energy
consumptions during its investigation with a different number of sensor nodes.
Keywords: Cluster Head Selection, (ABC)Artificial Bee Colony, (BFO)Bacterial Foraging Optimization,
Network Lifetime, Exploitation, Exploration.

References:

1. Baradaran and K. Navi, “CAST-WSN: The Presentation of New Clustering Algorithm Based on Steiner Tree and C-Means Algorithm
Improvement in Wireless Sensor Networks,” Wireless Personal Communications, vol. 97, no. 1, pp. 1323–1344, 2017.
2. V. Krishnaswamy and S. S. Manvi, “Fuzzy and PSO Based Clustering Scheme in Underwater Acoustic Sensor Networks Using Energy
and Distance Parameters,” Wireless Personal Communications, 2019.
3. R. Kumar and D. Kumar, “Multi-objective fractional artificial bee colony algorithm to energy aware routing protocol in wireless sensor
network,” Wireless Networks, vol. 22, no. 5, pp. 1461–1474, 2015.
4. T. S. Murugan and A. Sarkar, “Optimal cluster head selection by hybridisation of firefly and grey wolf optimisation,” International
Journal of Wireless and Mobile Computing, vol. 14, no. 3, p. 296, 2018.
5. Q. Ni, Q. Pan, H. Du, C. Cao, and Y. Zhai, “A Novel Cluster Head Selection Algorithm Based on Fuzzy Clustering and Particle Swarm
Optimization,” IEEE/ACM Transactions on Computational Biology and Bioinformatics, vol. 14, no. 1, pp. 76–84, 2017.
6. V. Pal, Yogita, G. Singh, and R. Yadav, “Cluster Head Selection Optimization Based on Genetic Algorithm to Prolong Lifetime of
Wireless Sensor Networks,” Procedia Computer Science, vol. 57, pp. 1417–1423, 2015.
7. P. Rajpoot and P. Dwivedi, “Optimized and load balanced clustering for wireless sensor networks to increase the lifetime of WSN
using MADM approaches,” Wireless Networks, 2018.
8. Shankar and N. Jaisankar, “Security Enabled Cluster Head Selection for Wireless Sensor Network Using Improved Firefly
Optimization,” Advances in Intelligent Systems and Computing Proceedings of the Eighth International Conference on Soft Computing
and Pattern Recognition (SoCPaR 2016), pp. 176–192, 2017.
9. M. A. Hasnat, M. Akbar, Z. Iqbal, Z. A. Khan, U. Qasim, and N. Javaid, “Bio inspired distributed energy efficient clustering for
Wireless Sensor Networks,” 2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW),
2015.
10. Vimalarani, R. Subramanian, and S. N. Sivanandam, “An Enhanced PSO-Based Clustering Energy Optimization Algorithm for
Wireless Sensor Network,” The Scientific World Journal, vol. 2016, pp. 1–11, 2016.
11. T. Shankar, S. Shanmugavel, and A. Rajesh, “Hybrid HSA and PSO algorithm for energy efficient cluster head selection in wireless
sensor networks,” Swarm and Evolutionary Computation, vol. 30, pp. 1–10, 2016.
12. F. Solaiman and A. Sheta, “Energy optimization in wireless sensor networks using a hybrid K-means PSO clustering
algorithm,” Turkish Journal Of Electrical Engineering & Computer Sciences, vol. 24, pp. 2679–2695, 2016.
13. P. S. Mann and S. Singh, “Artificial bee colony metaheuristic for energy-efficient clustering and routing in wireless sensor
networks,” Soft Computing, vol. 21, no. 22, pp. 6699–6712, 2016.
14. R. Prasad, P. V. Naganjaneyulu, and K. S. Prasad, “A Hybrid Swarm Optimization for Energy Efficient Clustering in Multi-hop
Wireless Sensor Network,” Wireless Personal Communications, vol. 94, no. 4, pp. 2459–2471, 2016.
15. S. Kaur and R. Mahajan, “Hybrid meta-heuristic optimization based energy efficient protocol for wireless sensor networks,” Egyptian
Informatics Journal, vol. 19, no. 3, pp. 145–150, 2018.

Authors: Vijay Anand R, Prabhu J , Kumar P J, Kiruba thangam R, MuthamilSelvan

Paper Title: Image Distribution with Scalable Access Control for Privacy in Social Network
Abstract: The pervasiveness of interpersonal organizations has made it less demanding than any time in
recent memory for clients parts the photographs, recordings, Different communication like audio, video
materials anyone in anyplace. Be that as it may, the simple access of client produced media content additionally
realizes security concerns. Customary control of connection components, however the solitary connection
strategy only through particular bit of substance, can't fulfill the client protection prerequisites in substantial
scale media sharing frameworks. Rather, arranging numerous connection for dimensions benefits at mutual
video and audio parts are wanted. In unhandy, this adjusts the guideline for interpersonal organizations in data
spread. Then again, it concurs the difficult social Websites with their informal organization clients. Propose a
versatile media get to control framework to empower such an arrangement in a protected and productive way.
The proposed SMAC framework engaged these adaptable encoded message approach quality based encryption
calculation just as a complete key administration plot. Here, give normal evidence along with secure for
demonstrate the new framework with their security. Moreover, And also lead escalated investigations cell
phones to exhibit its productivity.

382. Keywords:
2192-
References: 219
4
1. Image Privacy protection with secure JPEG transmorphing. L. Yuan and T. Ebrahimi, Year : 2017.
2. Flexible Data Access Control Based on Trust and Reputation in Cloud Computing," Z. Yan, X. Li, M. Wang and A. V. Vasilakos,
“Year : 2017.
3. “SeDaSC: Secure Data Sharing in Clouds," M. Ali et al., Year: 2017.
4. Deep Learning with Differential Privacy. M. Abadi, A. Chu, I. Goodfellow, H. B. McMahan, I. Mironov, K. Talwar. Year : 2016.
5. Adaptive reversible data hiding by extending the generalized integer transformation. YingqiangQiu, ZhenxingQian, Lun Yu. Year :
2016.
6. Privacy-preserving photo sharing based on a secure JPEG. L. Yuan, P. Korshunov, T. Ebrahimi, Year : 2015.
7. Privacy-Preserving Deep Learning. R. Shokri, V. Shmatikov, Year: 2015.
8. High capacity reversible data hiding and content protection for radiographic images.D. Cavagnino, M. Lucenteforte, and M. Grangetto.
Year : 2015.
9. Onliine Sociial Nettworks: Threeats and Sollutions. M. Firre, R. Goldschmiidt and Y. Ellovici. Year : 2014.
10. Security and privacy for storage and computation in cloud computing. L. Wei, H. Zhu, Z. Cao, X. Dong, W. Jia, Y. Chen, A. V.
Vasilakos, Year : 2014.
11. “Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks," Y. Wu, W. Zhuuo, and R. Deeng,Year:
2013.
12. Adaptive reversible data hiding scheme based on integer transform. F. Peng, X. Li, and B. Yang. Year : 2012.
13. Privacy and security for online social networks: challenges and opportunities. C. Zhang, J. Sun, X. Zhu and Y. Fang, Year : 2010
14. “Achieving secure, scalable, and fine-grained data access control in cloud computing," S. Yu, C. Wang, K. Ren, and W. Lou, Year:
2010.
15. Benchmarking for steganography. Roberto Caldelli, Francesco Filippini and Rudy Becarelli. Year : 2010.
16. “Secure service convergence based on scalable media coding," Lian, S.,Year: 2010.
17. “Scrambling for Privacy Protection in Video Surveillance Systems," F. Dufaux and T. Ebrahimi, Year: 2008.
18. Gibbs construction in steganography. I. Cox, M. Milller, J. Blooom, J. Frridrrich, and T. Kalkker. Year : 2007
19. “Ciphertext-Policy Attribute- Based Encryption," Betheencourt, J.; Sarhai, A.; Waterrs, B.,Year 2007.
20. “Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data," V. Goyal, O. Pandey, A. Sahai, and B. Waters,
Year: 2006.
Authors: VijayAnand R, Prabhu J, MuthamilSelvan T, Thanapal P, Manivannan S.S

Paper Title: Secured Service Chains Tuned Resource Sharing using Nsdp
Abstract: In the current network area, cloud service providers offer infinite storage space and computing
power for users to manage their data in the cloud. To enjoy these services, individuals or organizations store
their private data on cloud servers. However, in the case of security breaches, users’ private data stored in the
cloud are no longer safer. When users outsource their data to cloud servers, they expect complete privacy of their
data stored in the cloud storage. To enjoy these services, individuals or organizations store their private data on
cloud servers. The semantic-based keyword search over encrypted cloud data becomes of paramount
importance. Protecting the privacy and data of users has remained a very crucial problem for cloud servers
Additionally, the existing approaches only process them as single words, the flexibility of the encryption policy
and the description of users’ rights, and it changes from a one-one to one-many scenario during the encryption
and decryption phases, calculation method to measure the semantic similarity between compound concepts.
Keyword has been widely used in many scenarios, particularly in cloud computing. In this Project in the
proposed scheme we use the trusted authority to generate the trapdoor .The generated trapdoor will be send to
the user's e-mail ID, the user will search.
383.
2195-
Keywords: 219
8
References:

1. R. Brindha and A. GhousiaSamrin,"Efficient privacy-preserving keyword search method for retrieving data from cloud",2017
International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS). March 2017.
2. L. Wu, Y. Zhang, K. K. R. Choo, et al. ”Efficient and secure identity based encryption scheme with equality test in cloud computing”.
Future Generation Computer Systems, Pp- 22-31, 2017.
3. C. Chen, X. Zhu, P. Shen, J. Hu, S. Guo, Z. Tari, and A. Y. Zomaya, “An efficient privacy-preserving ranked keyword search method,”
IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 4, pp. 951–963, 2016.
4. S. Ma, Q. Huang, M. Zhang, and B. Yang," Identity-based encryption with outsourced equality test in cloud
computing”.IEEE,InformationSciences,pp- 389-402.2016.
5. Jevin D. West, Ian Wesley-Smith, Carl T. Bergstrom, “A Recommendation System Based On Hierarchical Clustering Of An Article-
Level Citation Network”, IEEE Transactions On Big Data, 2016.
6. Zheng Yan, Wenxiu Ding, Xixun Yu, Haiqi Zhu, Robert H. Deng, Fellow, “Duplication On Encrypted Big Data In Cloud”, IEEE
Transactions On Big Data, Vol. 2, No. 2, 2016.
7. Z. Fu, F. Huang, X. Sun, A. Vasilakos, and C. N. Yang, “Enabling semantic search based on conceptual graphs over encrypted
outsourced data,” IEEE Transactions on Services Computing, vol. PP, no. 99, pp. 1–1, 2016.

Authors: Rosalinda B. Guiyab


Development of Prediction Models for the Dengue Survivability Prediction: An Integration of Data
Paper Title:
Mining and Decision Support System
Abstract: Dengue is a viral disease that has been feared by people globally. Due to its rapid prevalence and
increasing threat, this study explored on the use of data mining techniques together with decision support system
to develop prediction models of dengue survivability. This study was focused on three important points namely:
identify significant predictor attributes to dengue survivability prediction, development of a rule-based and
decision tree models for dengue survivability prediction, and the development of a dengue survivability platform
for prediction purposes. The developed rule-based and decision tree models were compared according to
accuracy and they underwent the 10-fold cross validation procedure and were integrated in the system to provide
a platform to predict the survivability of a patient given the input medical data using a client-server
configuration via the Internet. The result of the prediction for the dengue survivability may be used as an
intervention by medical practitioners in the general management of dengue cases.
384.
2199-
Keywords: Data Mining, Decision Support System, Dengue, Prediction Models, Survivability. 220
5
References:

1. H. Verespej and J. Pasquale, “A characterization of node uptime distributions in the planetlab test bed,” Proc. IEEE Symp. Reliab.
Distrib. Syst., no. October, pp. 203–208, 2011.
2. G. F. O. R. Diagnosis, “New edition 2009,” 2009.
3. World Health Organization, “Dengue Situation Update Number 508 Update on the Dengue situation in the Western Pacific Region,”
World Heal. Organ. West. Pacific Reg., no. 508, pp. 4–8, 2017.
4. “2017_Dengue_MW1-MW48.pdf.” .
5. J. Soni, “Predictive Data Mining for Medical Diagnosis : An Overview of Heart Disease Prediction,” vol. 17, no. 8, pp. 43–48, 2011.
6. O. Folorunso and A. O. Ogunde, “Data Mining as a Technique for Knowledge Management in Business Process Redesign,” vol. 2, no.
1, pp. 33–44, 2004.
7. A. Kumar et al., “A decision support system to facilitate management of patients with acute gastrointestinal bleeding . Adrienne Chu ,
Hongshik Ahn , Bhawna Halwan , Everson LA Artifon , Alan Barkun , Michail G . Lagoudakis and Atul Kumar . ( AC , HA and BH
contributed equally to the study ) The study was funded by 2005 Research and Outcomes Effectiveness Awards of the American
Society of Gastrointestinal Endoscopy .,” pp. 1–41, 2005.
8. A. S. Al-malaise, “Integration of Automated Decision Support Systems with Data Mining Abstract : A Client Perspective,” vol. 4, no.
2, pp. 173–176, 2013.
9. A. G. Karegowda, A. S. Manjunath, G. Ratio, and C. F. Evaluation, “Comparative study of Attribute Selection Using Gain Ratio,” Int.
J. Inf. Technol. Knowl. Knowl. Manag., vol. 2, no. 2, pp. 271–277, 2010.
10. A. K. Sen, S. B. Patel, and D. P. Shukla, “A Data Mining Technique for Prediction of Coronary Heart Disease Using Neuro-Fuzzy
Integrated Approach Two Level,” Int. J. Eng. Comput. Sci., vol. 2, no. 9, pp. 1663–1671, 2013.

Authors: Latha B. M, Manjula B. K, Venkata Sumana C. H

Paper Title: Modal Hybrid Image Fusion using Discrete Wavelet and Contourlet Transform
Abstract: Image fusion is used to enhance the quality of images by combining two images of same scene
obtained from single or multiple modalities. In medical diagnosis different types of imaging modalities such as
X-ray, Computed tomography (CT), Magnetic resonance imaging (MRI), Magnetic resonance angiography
(MRA), PET scan etc., provide limited information where some information is common and some unique. This
paper presents a hybrid combination of Discrete Wavelet and Contourlet. For the obtained fused images, it is
proposed to compute performance metrics like Entropy, Peak signal to noise ratio and Mean square error and
compare them with existing methods as to come out with best combination of transformations that yield highly
informative fused image. Proposed method will be simulated using MATLAB tool.

385. Keywords: Image fusion, Computed tomography, Magnetic resonance angiography, Discrete wavelet and
contourlet, Entropy. 2206-
221
References: 0

1. A. Jyoti, S. S. Bedi. (2015). Implementation of hybrid image fusion technique for feature enhancement in medical diagnosis.
Human-centric Computing and Information Sciences, 5(3), pp. 1-17.
2. M. Sweta, B. Mara. (2012). CT and MRI image fusion using curvelet transform, 2(2), pp. 848-852.
3. M. Navneetkaur, H. Kaur. (2014). Review On: Image Fusion Using Wavelet and Curvelet Transform. IJCSIT, 5(2), pp.2467-2470.
4. M. Qiguang, W. Baoshul. (2005). A Novel Image Fusion Method Using Contourlet Transform. IEEE trans. geosci. remotesens., 43(6),
pp. 1391-1402.
5. S. Yang, M. Wang, L. Jiao, R. Wu, and Z. Wang. (2010). Image fusion based on a new contourlet packet. Inf. Fusion, 11(2), pp. 78–84.
6. J. Nunez, X. Otazu, O. Fors, A. Prades, V. Pala and R. Arbiol. (1999) Multiresolution-based image fusion with additive wavelet
decomposition. IEEE Transactions on Geo-science and Remote sensing, 37(3), pp. 1204-1211.
7. D. R. Rodrigues. (2015). Curvelet Based Image fusiontechniques for MedicalImages. IJRASET, 3(3), pp. 902-908.
8. R. J. Sapkal, S. M. Kulkarni. (2015). Image Fusion based on Wavelet Transform for Medical Application. IJERA, 2(5), pp. 624-627.

Authors: Yash D.Chhaniyara , Mahesh.M.Makwana, Mrudula S. Kulkarni


Achieve High Compressive Strength and durability of Concrete Made from Recycled Concrete
Paper Title:
Aggregate
Abstract: Growth in the construction industry is growing daily and the demolition of the old structure creates
massive quantities of rubbles and from that 30-40% were coarse aggregate. Utilizing of coarse aggregates
through recycling helps to give economic and sustainable development. The aim of this study is to achieve high
compressive strength with minimum wear effect of new concrete made of recycled concrete aggregate. To
achieve aim in this study has been considered high strength of concrete mix i.e.M40, M50 and M60 for
compressive strength and for abrasion test, considered mix of M50 and M60. A replacement percentage for the
compressive strength test was 0%(normal), 20%, 40%, 60%, and 80% while for abrasion test considering 0%,
20%, 40% and 60% replacement ratio. This research helps to use recycled concrete aggregate in construction
sector.

Keywords: abrasion test, compressive strength test of RCA, recycled concrete aggregate, waste of concrete and
recycling.

386. References:
2211-
1. Sami W. Tabsh and Akmal S. Abdelfatah, “Influence of recycled concrete aggregates on strength properties of concrete” Sharjah, 221
United Arab Emirates: Science Direct, August 2008, pp. 1163-1167 4
2. Frondistou-Yannas S, “Waste concrete as aggregate for new concrete” ACI, 1977;74(8):373–6.
3. A. Akbarnezhad, K. C. G. Ong, C. T. Tam, and M. H. Zhang, “Effects of the Parent Concrete Properties and Crushing Procedure on the
Properties of Coarse Recycled Concrete Aggregates” American Society of Civil Engineers, 2013, pp.1795-1802
4. Akmal Abdelfatah, Sami W. Tabsh, and Sherif Yehi, “Utilization of Recycled Coarse Aggregate in Concrete Mixes” American
University of Sharjah, UAE: Researchgate, June 2011, pp.562-566.
5. Abhishek Verma and Krishna Murari, “Recycled aggregate from c&d waste modified by dry processing and used as a partial
replacement of coarse aggregate in concrete portland pozzolana-cement c& d waste concrete hardened properties durability properties”
Guna, India: Researchgate, September 2017, pp.671-678
6. Md. Safiuddin, Ubagaram Johnson Alengaramb, Md. Moshiur Rahman, Md. Abdus Salamb and Mohd. Zamin Jumaat “Use of recycled
concrete aggregate in concrete” Kuala Lumpur, Malaysia: Journal of Civil Engineering and Management, Oct 2013, pp.796-810.
7. Iveta Nováková and Karel Mikulica “Properties of concrete with partial replacement of natural aggregate by recycled concrete
aggregates from precast production” Czech Republic: Sciencedirect, 2016, pp.360-367
8. George Wardeh, Elhem Ghorbel, Hector Gomart, and Bruno Fiorio “Bond and Cracking Behavior of Reinforced Concrete Members
Incorporating Recycled Aggregates” France: 2018, pp.516-523
9. XIAO JianZhuang1, LEI Bin, and ZHANG ChuanZeng, “On carbonation behavior of recycled aggregate concrete” Siegen, Germany,:
September 2012, pp.2609-2616
10. C.S. Poon, Z.H. Shui and L. Lam, “Effect of microstructure of ITZ on compressive strength of concrete prepared with recycled
aggregates” Hong Kong, PR China: march 2003, pp.461-468.

Authors: Sanghamitra Brahma

Paper Title: Influence of Leadership on Creativity In Business Academics/ Higher Education


Abstract: Business academics/ higher education and training must continuously strive to cope up with the
evolving demands of the corporate world. Proactive approach towards adaptability to the environmental changes
may be mastered through creative leadership and mentoring of the academic institutes. It has been found that
few research studies have focused on the cases of influence of leadership on creativity in higher education. This
study addresses the challenges faced in the sector of business academics/higher education and empirically
explores how leadership influences creativity among the academics to enable more advanced and appropriate
education and training in management or business education sector/ higher education, in the mid-tier institutes,
in particular. A qualitative, case research approach has been used to understand the relationship between
leadership style and academic creativity and its role in enhancing the effectiveness of business academics/ higher
education. The findings of the study have established a positive influence of creative leadership on the
effectiveness of business academics/ higher education. It has led to the identification of three critical aspects that
are essential for inducing creativity in business academics/ higher education, i.e., appropriate leadership style,
organization structure that balances between hierarchy and heterarchy to facilitate communication, and creative
interaction leading to learning and growth.

Keywords: Creativity, Leadership, Heterarchy, Business Academics, Higher Education, Case Research.

References:

1. Aarnio, H., & Enqvist, J. (2016). Uudistettu DIANA-malli kehykseksi digiajan oppimiselle. Journal of Professional and Vocational
Education, 18(3), 39-48.
2. Aime, F., Humphrey, S., Scott, D.D., & Paul, J.P. (2014). The riddle of hierarchy: Power transitions in cross-functional teams.
Academy of Management Journal, 57(2), 327-352.
3. Amabile, T.M. (1988). A model of creativity and innovation in organizations. Research in Organizational Behaviour, 10, 123-167.
4. Amabile, T.M., Conti, R., Coon, R., Lazenby, J., & Herron, M. (1996). Assessing the work environment for creativity. Academy of
Management Journal, 39(5), 1154-1184.
5. Avolio, B.J., & Bass, B.M. (1988). Transformational leadership, charisma and beyond. In Hunt, J.G., Baliga, B.R., Dachler, H.P., &
Schriesheim, C.A. (Eds.), Emerging leadership vistas, 29-49. Boston, MA: Lexington.
6. Avolio, B.J., Waldman, D.A., & Yammarino, F.J. (1991). The four I’s of transformational leadership. Journal of European Industrial
Training, 15(4), 9-16.
7. Borgmann, L., Rowald, J., & Bormann, K.C. (2016). Integrating leadership research: A meta-analytical test of Yukl’s meta-categories
of leadership. Personnel Review, 45(6), 1340-1366.
8. Brynjolfsson, E., & McAfee, A. (2014). The second machine age: Work, progress, and prosperity in a time of brilliant technologies.
387. New York and London: W.W. Norton & Company.
9. Coleman, D. (2001). Emotional intelligence: Issues in paradigm building. In C. Cherniss, & D. Coleman (Eds.), The emotionally
2215-
intelligent workplace, 13-26. San Francisco: Jossey-Bass. 222
10. Crumley, C.L. (2001). Communication, holism, and the evolution of sociopolitical complexity. In J. Haas (Eds.), From leaders to 1
rulers, 19-33. New York: Kluwer Academic/ Plenum Publishers.
11. Crumley, C.L. (2005). Remember how to organize: Heterarchy across disciplines. In C.S. Beekman, & W.S. Baden (Eds.), Nonlinear
models for archeology and anthropology. 35-50. Adlershot, UK: Ashgate Press.
12. Csikszentmihalyi, M. (1999). A Systems perspective on creativity. Edited extract from Sternberg, R. (Eds.), Handbook of creativity,
313-335. Cambridge: Cambridge University Press.
13. Derecskei, A. (2016). How do leadership styles influence the creativity of employees? Society and Economy, 38(1), 103-118.
14. Derue, D.S., Nahrgang, J.D., Wellman, N., & Humphrey, S.E. (2011). Trait and behavioral theories of leadership: An integration and
meta-analytic test of their relative validity. Personnel Psychology, 64(1), 7-52.
15. Dube, L., Bourhis, A., & Jacob, R. (2006). Towards a typology of virtual communities in practice. Interdisciplinary Journal of
Information, Knowledge, and Management, 1(1), 63-93.
16. Ghobadian, A., & Narayanan, V.K. (2014). The vital role of management education. Financial Times.
17. Gilson, L.L., Maynard, M.T., Jones Young, N.C., Vertiainen, M., & Hakonen, M. (2015). Virtual teams research: 10 years, 10 themes
and 10 opportunities. Journal of Management, 41(5), 1313-1337.
18. Guo, J., Dilley, A.E., & Gonzales, R. (2016). Creativity and leadership in organizations: A literature review. Creativity: Theories-
Research-Applications, 3(1), 127-151.
19. Hazy, J.K. (2009). Innovation reordering: five principles for leading continuous renewal. In S. Schlomer & N. Tomaschek (Eds.),
Leading in complexity: New ways of management, 40-56. Heidelberg: Systemische For-schung im Car-Auer Verlag.
20. Hu, H., Gu, Q., & Chen, J. (2013). How and when does transformational leadership affect organizational creativity and innovation?
Critical review and future directions. Nankai Business Review International, 4(2), 147-166.
21. Humala, I. (2014). Defining leadership that fosters creativity in virtual work: Descriptive interpretative concept analysis. Journal of
Professional and Vocational Education, 16(3), 22-43.
22. Humala, I. (2016). Heterarchial ontological commitment for leaders to stimulate creativity among virtual work-force. Nordic Journal of
Business, 65(2), 45-65.
23. Humala, I. (2017). Typology on leadership towards creativity in virtual work. Interdisciplinary Journal of Information, Knowledge and
Management, 12, 209-243.
24. Hyypia, M., & Parjanen, S. (2013). Boosting creativity with transformational leadership in fuzzy front-end innovation leadership
processes. Interdisciplinary Journal of Information, Knowledge and Management, 8, 21-40.
25. Jana, S. (2017). Higher Education in West Bengal – An overview. Artha Beekshan, 26, 21-55.
26. Johnson, P. (2015). Creativity in a real-time world: Improvisation and the culture of creativity. Journal of Business Anthropology, 4(2),
265-273.
27. Kallio, T.J., & Kallio, K.M. (2011). Organisatorinen luovuus – hypesta kohti louvuuden mahdollistavia organisaatiorakenteita.
Liiketaloudellinen Aikakauskirja, 1, 33-64.
28. Lipnack, J., & Stamps, J. (1999). Virtual teams: The new way to work. Strategy & Leadership, 27(1), 14-19.
29. Livingston, L. (2010). Teaching Creativity in Higher Education. Arts Education Policy Review, 111(2), 59-62.
30. Martens, Y. (2011). Creative workplace: Instrumental and symbolic support for creativity. Facilities, 29(1), 63-79.
31. McGuire, J.B., Palus, C.J., Pasmore, W., & Rhodes, G.B. (2015). Transforming your organization. Greensboro, NC: Centre for
Creative Leadership.
32. Panteli, N., & Chiasson, M. (2008). Exploring virtuality within and beyond organizations: Social, global and local dimensions.
Hampshire and New York: Palgrave Macmillan.
33. Parjanen, S. (2012). Creating possibilities for collective creativity: Brokerage functions in practice-based innovation. Doctoral
dissertation, Lappeenranta University of Technology, Finland.
34. Pinar, T., Zehir, C., Kitapsi, H., & Tanriverdi, H. (2014). The relationships between leadership behaviours: Team learning and
performance among the virtual teams. International Business Research, 7(5), 68-79.
35. Plowman, D.A., Solansky, S., Beck, T.E., Baker, L., Kulkarni, M., & Villareal Travis, D. (2007). The role of leadership in emergent,
self-organization. The Leadership Quarterly, 18(4), 341-356.
36. Post, D.G. (2001). Anarchy, state and the internet: An essay on lawmaking in cyberspace. In P. Ludlow (Ed.), Crypto anarchy,
cyberstates, and pirate utopias, 197-212. Cambridge and London: The MIT Press.
37. Poutanen, P. (2016). Complexity and collaboration in creative group work. Doctoral dissertation, University of Helsinki.
38. Purvanova, R.K., & Bono, J.E. (2009). Transformational leadership in context: Face-to-face and virtual teams. The Leadership
Quarterly. 20(3), 343-357.
39. Reeves, T.C., Herrington, J., & Oliver, R. (2002, July). Authentic activities and online learning. In J. Herrington (Ed.), Proceedings of
the 25th HERDSA Annual Conference. 562-567. Perth: Edith Cowan University.
40. Sawyer, R.K., & DeZutter, S. (2009). Distributed creativity: How collective creations emerge from collaboration. Psychology of
Aesthetics, Creativity, and the Arts, 3(2), 81-92.
41. Schepers, P., & van den Berg, P.T. (2007). Social factors of work-environment creativity. Journal of Business and Psychology, 21(3),
407-428.
42. Searle, G.D., & Hanrahan, S.J. (2011). Leading to inspire others: charismatic influence or hard work? Leadership & Organization
Development Journal, 32(7), 736-754.
43. Spelthann, V., & Haunschild, A. (2011). Organizational creativity in heterarchies: The case of VFX production. Creativity and
Innovation Management, 20(2), 100-107.
44. Staw, B.M. (2016). Stumbling towards a social psychology of organizations: An autobiographical look at the direction of
organizational research. Annual Review of Organizational Psychology and Organizational Behaviour, 3, 1-19.
45. Thow, Y.L. (2007). The new intelligence leadership strategy for iCAS. Human Systems Management, 26(2), 111-122.
46. Toom, A. (2016). Hiljainen tieto ja asiantuntijuus. In E. Kallio (Ed.), Ajattelun kehitys aikuisuudessa – kohti moninakokulmaisuutta.
245-268. Jyvaskyla: FERA, Soumen kasvatustieteellinen seurary.
47. Tost, L.P., Gino, F., & Larrick, R.P. (2013). When power makes others speechless: The negative impact of leader power on team
performance. Academy of Management Journal, 56(5), 1465-1586.
48. Uhl-Bien, M., Marion, R., & McKelvey, B. (2007). Complexity leadership theory: Shifting leadership from the industrial age to the
knowledge era. The Leadership Quarterly, 18(4), 298-318.
49. Virtanen, M. (2013). Opettajan emotionaalinen kompetenssi: Tutkimus lukanopettajien ja luokanopettajiksi opiskelevien
tunnealytaidoista ja niiden tarkeydesta. (Unpublished doctoral dissertation). Acta Electronica Universitatis Tam-perensis 1301.
Tampere: University of Tampere.
50. Wang, P., & Zhu, W. (2011). Mediating role of creative identity in the influence of transformational leadership on creativity: Is there a
multilevel effect? Journal of Leadership & Organizational Studies, 18(1), 25-39.
51. Warrick, D.D. (2011). The urgent need of skilled transformational leaders: Integrating transformational leadership, and organization
development. Journal of Leadership, Accountability and Ethics, 8(5), 11-26.
52. Woodman, R.W., Sawyer, J.E., & Griffin, R.W. (1993). Towards a theory of organizational creativity. Academy of Management
Review, 18(2), 293-321.
53. Yin, R.K. (2003). Case Study Research: Design and Methods (3rd Eds). Sage: Thousand Oaks, California.
54. Yukl, G., Gordon, A., & Taber, T. (2002). A hierarchical taxonomy of leadership behavior: Integrating a half century of behavior
research. Journal of Leadership & Organizational Studies, 9(1), 15-32.
55. Zacher, H. & Johnson, E. (2014). Leadership and creativity in higher education. Studies in Higher Education, 40(7), 1210-1225.

Authors: Madduri Venkata Sai Soma Manish, Rajesh Kannan Megalingam


Applying and Evaluating Supervised Learning Classification Techniques to Detect Attacks on Web
Paper Title:
Applications
Abstract: Web applications are the source of information such as usernames, passwords, personally
identifiable information, etc., they act as platforms of knowledge, resource sharing, digital transactions, digital
ledgers, etc., and have been a target for attackers. In recent years reports say that there is a spike in the attacks on
web applications, especially attacks like SQL injection and Cross Site Scripting have grown in drastic numbers
due to discovery of new vulnerabilities. The attacks on web applications still persist due to the nature of attack
payloads, as these payloads are highly heterogeneous and look very similar to regular text even web applications
with many security features in place may fail to detect these malicious payload strings. To overcome this
problem there are various methods described one such method is utilizing machine learning models to detect
malicious strings by classifying the input strings given to the web applications. This paper describes the study of
six binary classification methods Logistic regression, Naïve Bayes, SGD, ADABoost, Random Forrest, Decision
trees using our own dataset and feature set.

388. Keywords: Binary Classification, Machine Learning, Web Application.


2222-
222
References:
5
1. Web Attack Visualization | Akamai. (2019). Retrieved 18 July 2019, from https://www.akamai.com/us/en/resources/our-thinking/state-
of-the-internet-report/web-attack-visualization.jsp
2. I. Trustwave Holdings, “Modsecurity: Open source web application firewall.” [Online]. Available: http://www.modsecurity.org/
3. OWASP. Owasp modsecurity core rule set project. [Online]. Available https://www.owasp.org/index.php/
4. Torrano-Gimenez, C., Perez-Villegas, A., & Alvarez, G. (2009). A self-learning anomaly-based web application firewall.
In Computational Intelligence in Security for Information Systems(pp. 85-92). Springer, Berlin, Heidelberg.
5. Wassermann, G., & Su, Z. (2004, October). An analysis framework for security in web applications. In Proceedings of the FSE
Workshop on Specification and Verification of component-Based Systems (SAVCBS 2004) (pp. 70-78).
6. Kc, G. S., Keromytis, A. D., & Prevelakis, V. (2003, October). Countering code-injection attacks with instruction-set randomization.
In Proceedings of the 10th ACM conference on Computer and communications security (pp. 272-280). ACM.
7. Mitropoulos, D., & Spinellis, D. (2009). SDriver: Location-specific signatures prevent SQL injection attacks. computers &
security, 28(3-4), 121-129.
8. Halfond, W. G., Viegas, J., & Orso, A. (2006, March). A classification of SQL-injection attacks and countermeasures. In Proceedings
of the IEEE International Symposium on Secure Software Engineering (Vol. 1, pp. 13-15). IEEE.
9. Vogt, P., Nentwich, F., Jovanovic, N., Kirda, E., Kruegel, C., & Vigna, G. (2007, February). Cross Site Scripting Prevention with
Dynamic Data Tainting and Static Analysis. In NDSS (Vol. 2007, p. 12).
10. team, c. (2019). CTFtime.org / All about CTF (Capture The Flag). Retrieved 18 July 2019, from https://ctftime.org/about/
11. sqlmap: automatic SQL injection and database takeover tool. (2019). Retrieved 18 July 2019, from http://sqlmap.org/
12. XSSer: Cross Site "Scripter". (2019). Retrieved 18 July 2019, from https://xsser.03c8.net/
13. commixproject/commix.(2019). Retrieved 18 July 2019, from https://github.com/commixproject/commix
14. justmarkham/scikit-learn-videos. (2019). Retrieved 18 July 2019, from https://github.com/justmarkham/scikit-learn-
videos/blob/master/09_classification_metrics.ipynb
15. Rogers, S., & Girolami, M. (2016). A first course in machine learning. Chapman and Hall, ch. Assessing Classification Performance,
pp. 196–201.
Authors: Sankalp.U. Joshi, Nishant.S.Kulkarni

Paper Title: Effect of Epoxy Glass Fiber Reinforcement on Dynamic Characteristics of Sheet Metal Structure
Abstract: Stamped sheets are widely used in automotive and industrial structures. Their stiffness and strength
depends on various shapes in which they are stamped (trapezoidal, semi-circular). Epoxy glass fiber is widely
used for replacing the actual components or by reinforcement. Reinforcement of this sheet metal structures with
epoxy glass fiber will adhere its strength characteristics and also help in stiffing the structure. In order to use
same shape of structure with high stiffness reinforcement of epoxy glass fiber can be used on that structure.
Vibration of plates greatly depends upon various characteristics like aspect ratio, boundary condition and fiber
orientation. The developed shape of structure after sheet metal processing and the thickness of the structure
also contributes to its stiffness. Present study involves vibration analysis based on the geometry of the stamped
sheets. Fixed – fixed boundary conditions are taking into the consideration, because Stamped sheets generally
fails at fastened locations or welded locations. Modal analysis is performed to study dynamic characteristics of
reinforced structures. In order to validate the experimental results Comparative analysis is carried out by using
finite element analysis. Conclusions are drawn and suitable future scope is suggested.

Keywords: Epoxy Glass Fiber, Modal analysis, Finite element analysis.


389.
2226-
References: 223
0
1. S.Chavan, “Study on vibration analysis of composite plates” IJRSI Vol.1, Issue.8, ISSN 2321-2705
2. Crawley E.F., J. Compos. Mater., 13, (1979), 195-205.
3. Erkling A, Bulut M, and Yeter E., Sci. Eng. Compos. Mater. 22 (2014), 565-571.
4. Pushparaj Pingulkar and Suresha B. “Free Vibration Analysis of Laminated composite Plates using Finite Element Method”, polymers
& polymers composites, Vol 24, No.7,2016
5. S. U. Ratnaparkhi, S.S.Sarnobat “Vibration analysis of composite plate”, IJMER, Vol. 3, Jan-Feb. 2013, pp-377-380, ISSN: 2249-6645
6. G.V. Mahajan, V. S. Aher, “Composite material: A Review over current development and automotive application”, International
Journal of Scientific and Research publication, Volume 2, Issue 11 November 2012, ISSN 2250-3153
7. KanakKalita and Abir Dutta, ”Free vibration analysis of Isotropic and composite rectangular plates”, International journal of
mechanical and research, ISSN No. 2249-0019, Volume 3, Number 4(2013), pp. 301-308.
8. R. Rikards, A. Chate, O.Ozolinsh, ”Analysis for buckling and vibration of composite stiffened shells and plates”, ELSEVIER,
composite structure 51 (2001) 361-370.
9. S.S.Chavan,” Study of vibration analysis of composite plates”, IJRSI, ISSN NO. 2321-2705,Volume 1,Issue8
10. Y.X.Zhang, C.H.Yang,” Recent developments in finite element analysis for laminated composite plates.” Composite Structures
88(2009) 147-157
11. B.N.Singh, A.K.S Bisht, M.K.Pandit, K.K.Shukla,” Non linear vibration analysis of composite plates with material uncertainties: A
Monte Carlo Simulation approach”, Journal of sound and vibration 324 (2009)126-138
12. Faruk Firat Calim, “Free and forced vibrations of non-uniform composite beams”, Composite Structures 88 (2009) 413-423

Authors: Gurmeet Singh, A.P. Singh

Paper Title: On the Design of 2×2 MIMO Fractal Antenna Array for C band applications
Abstract: A 2×2 MIMO planar fractal antenna array using Sierpinski gasket along with microstrip feed line
has been investigated. Different configurations of antenna array has been studied. The optimized unit element
used in array is further modified geometrically by corner rounding and cut in feed to improve its performance
including gain. Proposed fractal array antenna resonates at 4.19 GHz and 7.86 GHz lies in C band and simulated
using High frequency structure simulator. Such an attempt has been rarely reported in the literature. Simulated
reflection coefficient shows that Proposed antenna works in C band frequency range for various applications and
results are quite promising.

Keywords: MIMO, Fractal array, Sierpinski Gasket, C Band.


390.
2231-
References: 223
5
1. D. H. Werner and S. Ganguly, “An overview of fractal antenna engineering research,” IEEE Antennas Propag. Mag., vol. 45, no. 1, pp.
38–57, 2003.
2. A. Pharwaha, partap Singh, and S. Rani, “A Novel Antenna Design for Telemedicine Applications,” Int. J. Commun. Sci. Eng., vol. 7,
no. 12, pp. 617–621, 2013.
3. S. Chaimool, C. Chokchai, and P. Akkaraekthalin, “Multiband loaded fractal loop monopole antenna for USB dongle applications,”
Electron. Lett., vol. 48, no. 23, p. 1446, 2012.
4. A. Kulshrestha and B. Khakde, “Fractal Antenna for Multiband Applications,” Int. J. Innov. Eng. Technol., vol. 5, no. 3, pp. 206–214,
2015.
5. A. Awad, S. A. Chahine, Z. Osman, and K. Y. Kabalan, “Investigation of H-tree Multiband Prefractal Antennas,” pp. 1–6, 2020.
6. G. Singh and A. P. Singh, “On the design of planar antenna using Fibonacci word fractal geometry in support of public safety,” Int. J.
RF Microw. Comput. Eng., vol. 29, no. 2, p. e21554, Feb. 2019.
7. A. Kumar and A. Partap, “On the Design of 2×2 Element Fractal Antenna Array using Dragonfly Optimization,” Int. J. Comput. Appl.,
vol. 179, no. 33, pp. 27–34, Apr. 2018.
8. A. Kumar and A. P. Singh, “Design of micro‐machined modified Sierpinski gasket fractal antenna for satellite communications,” Int. J.
RF Microw. Comput. Eng., p. e21786, Apr. 2019.
9. A. A. R. Saad and H. A. Mohamed, “Printed millimeter-wave MIMO-based slot antenna arrays for 5G networks,” AEU - Int. J.
Electron. Commun., 2019.
10. P. T. Liu, T. C. Tang, and K. H. Lin, “C-band MIMO antenna with isolation and gain enhancement for MIMO radar applications,”
IEEE Antennas Propag. Soc. AP-S Int. Symp., no. 1, pp. 490–491, 2014.
11. D. Thi Thanh Tu, N. Gia Thang, N. Tuan Ngoc, N. Thi Bich Phuong, and V. Van Yem, “28/38 GHz dual-band MIMO antenna with
low mutual coupling using novel round patch EBG cell for 5G applications,” in 2017 International Conference on Advanced
Technologies for Communications (ATC), 2017, vol. 2017-Octob, pp. 64–69.
12. M.-Y. Li et al., “Eight-Port Orthogonally Dual-Polarized Antenna Array for 5G Smartphone Applications,” IEEE Trans. Antennas
Propag., vol. 64, no. 9, pp. 3820–3830, Sep. 2016.
13. Y. Li, C.-Y.-D. Sim, Y. Luo, and G. Yang, “Multiband 10-Antenna Array for Sub-6 GHz MIMO Applications in 5-G Smartphones,”
IEEE Access, vol. 6, no. May, pp. 28041–28053, 2018.
14. T. P. T. Aguilar JR, Beadle M, “The microwave and RF characteristics of FR4 substrates,” in IEE Colloquium on Low Cost Antenna
Technology (Ref. No. 1998/206), pp. 2–6.
15. Nasimuddin, K. Esselle, and A. K. Verma, “Resonance frequency of an equilateral triangular microstrip antenna,” Microw. Opt.
Technol. Lett., vol. 47, no. 5, pp. 485–489, Dec. 2005.
L. S. Solanki, S. Singh, and D. Singh, “Modified Wideband Bowtie Antenna for WLAN and High Speed Data Communication
Applications,” Wirel. Pers. Commun., vol. 95, no. 3, pp. 2649–2663, Aug. 2017

Authors: Sebagenzi Jason, Suchithra R


EeadSelfCloud: Energy Efficient Adaptive Depth Self Cloud Mechanism for VM Migration in
Paper Title:
Data Centers
Abstract: Cloud computing, with its great potential in low cost and demanding services, is a good computing
platform. Modern data centers for cloud computing are facing the difficulty of consistently increasing
complexity because of the expanding quantity of clients and their enlarging resource demands. A great deal of
efforts are currently focused on giving the cloud framework with autonomic behavior , so it can take decision
about virtual machine (VM) management over the datacenter without intervention of human beings. Most of the
self-organizing solutions results in eager migration, which attempts to diminish the amount of working servers
virtual machines. These self-organizing resolution produce needless migration due to unpredictable workload.
So also it consume huge amounts of electrical energy during unnecessary migration process. To overcome this
issue, this project develop one novel VM migration scheme called eeadSelfCloud. The proposed schema is used
to change the virtual machine in a cloud center that requires a lot of factors, such as basic requirements for
resources during virtual machine setup, dynamic resource allocation, top software loading, software execution,
and power saving at the Data Center. Data Center Utilization, Average Node Utilization, Request Rejection
Ration, Number of Hop Count and Power Consumption are taken as constraint for measuring the proposed
approach. The analysis report depicted that the proposed approach performs best than the other existing
approaches.

Keywords: Cloud Computing; Data centre; VM Placement; VM Migration; Energy Efficient Self Organization
Cloud.

References:

1. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “Above the clouds: A berkeley view
391. of cloud computing,” EECS Department, University of California, Berkeley, Tech. Rep., February 2009.
2. Calheiros. R.N., R. Buyya, C.A.F.D. Rose, A heuristic for mapping virtual machines and links in emulation testbeds, in: Proceedings of 2236-
the 38th International Conference on Parallel Processing, Vienna, Austria, 2009.
3. Cardosa. M., M. Korupolu, A. Singh, Shares and utilities based power consolidation in virtualized server environments, in:
224
Proceedings of the 11th IFIP/IEEE Integrated Network Management, IM 2009, Long Island, NY, USA, 2009. 4
4. Chaisiri. S, B.-S. Lee, and D. Niyato, “Optimal virtual machine placement across multiple cloud providers,” in Services Computing
Conference, 2009. APSCC 2009. IEEE Asia-Pacific. IEEE, 2009, pp. 103– 110.
5. Chase.J.S., D.C. Anderson, P.N. Thakar, A.M. Vahdat, R.P. Doyle, Managing energy and server resources in hosting centers, in:
Proceedings of the 18th ACM Symposium on Operating Systems Principles, ACM, New York, NY, USA, 2001, pp. 103–116.
6. Chen. Y and R. Sion, “To cloud or not to cloud?: musings on costs and viability,” in Proc. of the 2nd ACM Symposium on Cloud
Computing, SOCC ’11, Cascais, Portugal, October 2011, pp. 29:1–29:7.
7. Chiaraviglio. L., I. Matta, GreenCoop: cooperative green routing with energyefficient servers, in: Proceedings of the 1st ACM
International Conference on Energy-Efficient Computing and Networking, e-Energy 2010, Passau, Germany, 2010, pp. 191–194.
8. Dodonov. E., R. de Mell, A novel approach for distributed application scheduling based on prediction of communication events, Future
Generation Computer Systems 26 (5) (2010) 740–752.
9. Elnozahy. E., M. Kistler, R. Rajamony, Energy-efficient server clusters, PowerAware Computer Systems (2003) 179–197.
10. Gandhi. A., M. Harchol-Balter, R. Das, C. Lefurgy, Optimal power allocation in server farms, in: Proceedings of the 11th International
Joint Conference on Measurement and Modeling of Computer Systems, ACM, New York, NY, USA, 2009, pp. 157–168.
11. Guo. C., G. Lu, H. Wang, S. Yang, C. Kong, P. Sun, W. Wu, Y. Zhang, Secondnet: a data center network virtualization architecture
with bandwidth guarantees, in: Proceedings of the 6th International Conference on Emerging Networking EXperiments and
Technologies, CoNEXT 2010, Philadelphia, USA, 2010.
12. Gupta. M., S. Singh, Greening of the internet, in: Proceedings of the ACM Conference on Applications, Technologies, Architectures,
and Protocols for Computer Communication, SIGCOMM 2003, New York, NY, USA, 2003, pp. 19–26.
13. Gyarmati. L., T. Trinh, How can architecture help to reduce energy consumption in data center networking? in: Proceedings of the 1st
ACM International Conference on Energy-Efficient Computing and Networking, e-Energy 2010, Passau, Germany, 2010, pp. 183–186.
14. Hyser. C, B. McKee, R. Gardner, and B. J. Watson, “Autonomic virtual machine placement in the data centre,” Hewlett Packard
Laboratories, Tech. Rep. HPL-2007-189, vol. 189, 2007.
15. Koseoglu. M., E. Karasan, Joint resource and network scheduling with adaptive offset determination for optical burst switched grids,
Future Generation Computer Systems 26 (4) (2010) 576–589.
16. Kusic. D., J.O. Kephart, J.E. Hanson, N. Kandasamy, G. Jiang, Power and performancee management of virtualized computing
environments via lookahead control, Cluster Computing 12 (1) (2009) 1–15.
17. Nathuji. R, K. Schwan, Virtualpower: coordinated power management in virtualized enterprise systems, ACM SIGOPS Operating
Systems Review 41 (6) (2007) 265–278.
18. Panarello. C., A. Lombardo, G. Schembra, L. Chiaraviglio, M. Mellia, Energy saving and network performance: a trade-off approach,
in: Proceedings of the 1st ACM International Conference on Energy-Efficient Computing and Networking, e-Energy 2010, Passau,
Germany, 2010, pp. 41–50.
19. Pinheiro. E, R. Bianchini, E.V. Carrera, T. Heath, Load balancing and unbalancing for power and performancee in cluster-based
systems, in: Proceedings of the Workshop on Compilers and Operating Systems for Low Power, 2001, pp. 182–195.
20. Raghavendra,R., P. Ranganathan, V. Talwar, Z. Wang, X. Zhu, No ‘‘power’’ struggles: coordinated multi-level power management for
the data center, SIGARCH Computer Architecture News 36 (1) (2008) 48–59.
21. Rodero-Merino. L., L. Vaquero, V. Gil, F. Galan, J. Fontan, R. Montero, I. Llorente, From infrastructure delivery to service
management in clouds, Future Generation Computer Systems 26 (8) (2010) 1226–1240.
22. Shelar. M, S. Sane, V. Kharat, and R. Jadhav, “Efficient virtual machine placement with energy saving in cloud data centre,”
International Journal of Cloud-Computing and Super-Computing, vol. 1, no. 1, pp.15–26, 2014.
23. Speitkamp.B and M. Bichler, “A mathematical programming approach for server consolidation problems in virtualized data centres,”
IEEE Transactions on services computing, vol. 3, no. 4, pp. 266–278, 2010. [3]
24. Srikantaiah S., A. Kansal, F. Zhao, Energy aware consolidation for cloud computing, Cluster Computing 12 (2009) 1–15.
25. Tomas. L., A. Caminero, C. Carrion, B. Caminero, Network-aware metascheduling in advance with autonomous self-tuning system,
Future Generation Computer Systems 27 (5) (2010) 486–497.
26. Vasic. N., D. Kostic, Energy-aware traffic engineering, in: Proceedings of the 1st ACM International Conference on Energy-Efficient
Computing and Networking, e-Energy 2010, Passau, Germany, 2010, pp. 169–178.
27. Verma. A., P. Ahuja, A. Neogi, pMapper: power and migration cost aware application placement in virtualized systems, in:
Proceedings of the 9th ACM/IFIP/USENIX International Conference on Middleware, Springer, 2008, pp. 243–264.

Authors: S. Yuvaraj, V. Anish

Paper Title: Strength Properties of Nano Silica Recycled Sustainable Concrete

Abstract: This experiment highlights the salient features of concrete under nanotechnology. Concrete
production requires huge amount of cement and aggregates which eventually increases carbon emission and
contaminates environment. Hence, incorporation of ‘F’ class fly ash which is partially replaced for cement,
recycled aggregate and cactus gel can be done which can reduce dumping issues, carbon emission and cost.
However, incorporation of fly ash in ordinary Portland cement deviates its strength consequently. Hence, Nano-
silica can be added as an additive to fill up the deviation, thereby increasing its workability and improving the
strengthening factor of concrete. In this paper mineral admixture such as Nano-silica were used to increase the
strength of concrete and natural polymer substances such as cactus jelly is used to increase the workability of
concrete. For the binding material cement were replaced with the fly-ash at the percentage of 60% respectively
and for the coarse aggregate quarry aggregate has been replaced with recycled aggregate with the proportion of
40% and 60% respectively. In the investigation three specimens were casted say conventional, replacement of
60% and replacement of 60% with Nano silica and cactus extract solution. The result of compressive and
flexural strength were compared. The aim of this experiment is to maintain the economy and environmental
effect.
Keywords: Nano-silica, Cactus Jelly, Recycled Aggregate, Sustainable Concrete and Fly-ash.
392.
References: 2245-
224
1. Ali Nazari and Shadi Riahi. The effects of SiO2 nano particles on physical and mechanical properties of high strength compacting 8
concrete, Elsevier, Composites part B, 42, 2010, pp. 570-578.
2. Amaran R. and Ravi R. Effect Of Cactus On The Rheological Properties Of Cement, International Journal of Chemical Science,
14(S1), 2016, pp. 203-210.
3. Byung-Wan Jo, Chang-Hyun Kim, Ghi-ho Tae and Jang-Bin Park. Characteristics of cement mortar with nano-SiO2 particles.
Construction and Building Materials, 21, 2007, pp. 1351-1355.
4. IS:383-1970. Specification for coarse aggregate and fine aggregate from natural sources for concrete. Burea of Indian Standards.
5. IS:455-1989. Portland Slag Cement- Specification. Bureau of Indian Standards.
6. IS: 13920-1993, “Indian Standard code of practice for ductile detailing of concrete structures subjected to seismic forces”, Bureau of
Indian Standards, New Delhi.
7. Ye-Qing, Zhang-Zenan, Kong-Deyu. Influence of Nano-SiO2 Addition on Properties of Hardened Cement Paste as Compared With
Silica Fume. Construction and Building Materials, 21, 2007, pp. 539-545.
8. R.S.Chen, Q.Ye. Research on Comparison of Properties of Hardened Cement Paste Between Nano sio2 and Silica Fume. Cement and
Concrete research , 1, 2002, pp. 7-10.
9. N. Thuadaij and A. Nuntiya. Synthesis and Characterization of Nano silica from Rice Husk Ash Prepared by Precipitation Method,
Journal of Natural Science, 7(1), 2007, pp 59-65.
10. E. L. Ventolà, M. Vendrell, P. Giraldez and L. Merino. Traditional Organic Additives Improve Lime Mortars: New Old Materials for
Restoration and Building Natural Stone Fabrics. Construction and Building Materials, 5, 2011, pp. 3313-3318.
11. Singh, Bhattacharyya, and L. P. Singh. Granulometric synthesis and characterization of dispersed nano silica powder and its
application in cementitious system, Advances in Applied Ceramics, 111, 2012, pp. 220–227.
12. M.Stefanidou and I.Papayianni. Influence of nano-SiO2 on the Portland cement pastes, Elsevier, 43, 2011, pp. 2706-2710.
13. Kooshafar.M and Madani. S.H. Influential Mechanisms and Potential Applications of Nano-Silica in Cement Composites, Civil
Engineering Infrastructures Journal, 50 (2),2017, pp.169-187.

Authors: Oksana Bakulina, Iryna Legan (Lehan), Ivan Bakhov

Paper Title: Cluster Associations as a Factor of Innovative and Integrative Development of the Economy
Abstract: The purpose of the article is to substantiate the motivational preferences of the cluster formation
393. participants, as well as to determine the influence of clusters on the enterprise's performance and socio-economic
2249-
development of regions. Based on the study of the preferences of the creation and functioning of the clusters, it
225
has been revealed that cluster formations allow each of the participants to benefit from the synergy effect arising
5
in the course of combining efforts for the sake of production scaling. The obtained results show that cluster
formations are characterized by an emphasis on increasing employee satisfaction due to the integration of
motivational preferences of the cluster association participants (production, financial, marketing, innovative,
personnel, socio-psychological, environmental, and other preferences) and the formation of qualitatively new
opportunities for the implementation of corporate and personal needs of employees. The assessment of the
possibilities of forming clusters made it possible to identify the most important factors, such as the development
of entrepreneurial culture, which in turn affected the formation of the enterprise’s image, the trust of
communities, the implementation of innovations, and access to new markets. Based on the conducted study, the
authors have determined the formation mechanism of cluster associations, which includes economic,
organizational, social, and environmental components.

Keywords: cluster associations, clustering, integration, motivational advantages, synergetic effect.

References:

1. E.L. Andreyeva, A.I. Tatarkin, and A.V. Ratner, “Instrumenty razvitiya vysokotekhnologichnoy promyshlennosti: opyt Germanii i
Rossii” [Tools for the development of high-tech industry: the experience of Germany and Russia]. Ekonomicheskoye vozrozhdeniye
Rossii [Russia's Economic Revival], vol. 2(44), 2015, pp. 94-101 [in Russian].
2. J.M. Keynes, Obshchaya teoriya zanyatosti, protsenta i deneg [General theory of employment, percent, and money]. Moscow: Gelios
ARV, 2002 [in Russian].
3. Y.E. Kirilov. (2013). Klastery yak instrument pidvyshchennia konkurentospromozhnosti natsionalnoi ekonomiky v umovakh
hlobalizatsii [Clustering as a tool to improve the competitiveness of national economies in globalization conditions]. Efektyvna
ekonomika – Effective economy, 12. Avaliable: http://www.economy.nayka.com.ua/?op=1&z=2608 [in Ukrainian].
4. M.E. Porter, “Clusters and the new economics of competition”. Harvard Business Review, November-December issue, 1998, pp. 77-90.
5. S.A. Rosenfield. (1997). Bringing business clusters into the mainstream of economic development. European Planning Studies. 5(1). pp.
3-23. Avaliable: http://dx.doi.org/10.1080/09654319708720381
6. G. Swann, and M. Prevezer, “A comparison of the dynamics of industrial clustering in computing and biotechnology”. Research Policy,
vol. 25(7), 1996, pp. 1139-1157.
7. S.I. Sokolenko, Povyishenie konkurentosposobnosti ekonomiki oblastey Zapada i YUga Ukrainyi na osnove formirovaniya novyih
proizvodstvennyih sistem (klasterov). Rezultatyi sotsialno-ekonomicheskih issledovaniy [Improving the competitiveness of the economy
of the regions of the West and South of Ukraine based on the formation of new production systems (clusters). The results of socio-
economic research]. Kyiv: Logos, 2005 [in Ukrainian].
8. O. Solvell, Clusters: balancing evolutionary and constructing forces. Stockholm: Ivory Tower Publishing, 2008.
9. N. Komar, “Kontseptsiia formuvannia ta derzhavnoi pidtrymky klasternykh struktur v Yevropi” [Concept of formation and state support
of cluster structures in Europe]. Visnyk Ternopilskoho natsionalnoho tekhnichnoho ekonomichnoho universytetu [Bulletin of the
Ternopil National Technical Economic University], vol. 2, 2014, pp. 53-64 [in Ukrainian].
10. S. Okutayeva et al., “Comprehensive estimation of prerequisites on creating an agricultural cluster in the Akmola Region”. Journal of
Advanced Research in Law and Economics, vol. 9(4), 2018, pp. 1416-1427.
11. E.F. Zavorotin et al., “Perfecting the cluster development in the regional dairy products subcomplex of the Russian agro-industrial
complex”. Journal of Environmental Management and Tourism, vol. 9(5), 2018, pp. 947-954.
12. A. Crossman. (2019). Cluster analysis and how it is used in research. Avaliable: https://www.thoughtco.com/cluster-analysis-3026694
[in English].
13. M. Künzel, G. Meier zu Köcker, and T. Köhler. Clusters and Innovations. Cluster Initiatives as Drivers of Innovations. Avaliable:
https://www.clusterportal-bw.de
14. Lauterwasser, and Ortiz, “Konzept zur systemati-schen Analyse der Wissens-und Technologietrans-ferstrukturen in und zwischen
Clustern“, 2015. Unpublished [in German].
15. P. Smertenko, L. Chernyshev, I. Bilan, et al., „Klastery i tekhnolohichni platformy yak mekhanizmy rozvytku ekonomiky Ukrainy”
[Clusters and technological platforms as mechanisms of economic development of Ukraine]. Visnyk NAN Ukrainy [Bulletin of the
National Academy of Sciences of Ukraine], vol. 3, 2014, pp. 67-74 [in Ukrainian].
16. P.G. Piperopoulos. Entrepreneurship, innovation, and business clusters. London: Gower Publishing, 2012.
17. A.A. Migranyan (2007). Problemyi i perspektivyi razvitiya konkurentosposobnyih klasterov v Kyirgyizskoy respublike [Problems and
prospects of development of competitive clusters in the Kyrgyz Republic]. Problemyi sovremennoy ekonomiki [Problems of the Modern
Economy], 1(21). Avaliable: http://www.m-economy.ru/art.php?nArtId=1248 [in Russian].
18. The Global Competitiveness Report (n.d.). weforum.org. Avaliable:
http://www.weforum.org/reports/global*competitiveness*report*2016*2017
19. O.S. Bakulina, Motyvatsiia personalu silskohospodarskykh pidpryiemstv v umovakh realizatsii yevrointehratsiinykh priorytetiv. [Staff
motivation at agricultural enterprises under the conditions of implementing the European integration priorities]. Ph.D. Theses.
Zhytomyr: ZNAU, 2015 [in Ukrainian].
20. I.M. Legan, Konkurentospromozhnist molodi na rynku pratsi: shliakhy zabezpechennia ta napriamy pidvyshchennia [The
competitiveness of the youth in the labor market: Ways of support and directions of increase]. Ph.D. Thesis. Kyiv: M.V. Ptoukha
Institute for Demography and Social Studies of the National Academy of Sciences of Ukraine, 2015 [in Ukrainian].
21. V.G. Fedorenko, A.M. Tugay, A.F. Goyko, and V. B. Zhabaylo, “Kontseptsiia klasternoi polityky v Ukraini”. [Concept of cluster
policy in Ukraine]. Ekonomika ta derzhava [Economy and the State], vol. 11, 2008, pp. 5-15 [in Ukrainian].

Authors: K.Ananthajothi, M.Subramaniam


CLDC: Efficient Classification of Medical Data Using Class Level Disease Convergence Divergence
Paper Title:
Measure
Abstract: The problem of medical data classification is analyzed and the methods of classification are
reviewed in various aspects. However, the efficiency of classification algorithms is still under question. With
the motivation to leverage the classification performance, a Class Level disease Convergence and Divergence
394. (CLDC) measure based algorithm is presented in this paper. For any dimension of medical data, it convergence
or divergence indicates the support for the disease class. Initially, the data set has been preprocessed to remove 2256-
the noisy data points. Further, the method estimates disease convergence/divergence measure on different 226
dimensions. The convergence measure is computed based on the frequency of dimensional match where the 2
divergence is estimated based on the dimensional match of other classes. Based on the measures a disease
support factor is estimated. The value of disease support has been used to classify the data point and improves
the classification performance.
Keywords: High Dimensional Clustering, Classification, Medical Data, Convergence, Divergence, Disease
Prediction.

References:

1. Sarab Almuhaideb,Mohamed El Bachir Menai, Impact of preprocessing on medical data classification, Springer, Frontiers of Computer
Science 2016, Volume 10, Issue 6, pp 1082–1102.
2. Sarab Al-Muhaideb, Mohamed El Bachir Menai Hybrid Metaheuristics for Medical Data Classification, Springer, Hybrid Metaheuristics
pp 187-217.
3. Małgorzata Przybyła-Kasperek, Alicja Wakulicz-Deja, Global Decisions Taking on the Basis of Dispersed Medical Data, Springer,
International Workshop on Rough Sets, Fuzzy Sets, Data Mining, and Granular-Soft Computing RSFDGrC 2013
4. Iryna Pliss,Iryna Perova, Diagnostic Neuro-Fuzzy System and Its Learning in Medical Data Mining Tasks in Conditions of Uncertainty
about Numbers of Attributes and Diagnoses, Springer, Automatic Control and Computer Sciences November 2017, Volume 51, Issue 6,
pp 391–398
5. Agnieszka Mykowiecka Anna Kupść Małgorzata Marciniak, Rule-Based Medical Content Extraction and Classification, Springer,
Intelligent Information Processing and Web Mining pp 237-245, 2017.
6. Nadir Mustafa ; Jian-Ping Li, Medical data classification scheme based on hybridized SMOTE technique (HST) and Rough Set
technique (RST), IEEE Conference on cloud computing and big data analytics, 2017.
7. Tejaswini U. Mane, Smart heart disease prediction system using Improved K-means and ID3 on big data, IEEE Conference on Data
Management, Analytics and Innovation (ICDMAI), 2017.
8. Marharyta Aleksandrova ; Oleg Chertov ; Armelle Brun ; Anne Boyer , Contrast classification rules for mining local differences in
medical data, IEEE Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications
(IDAACS), 2017.
9. Sara Belaroucia), Mohammed Amine Chikh ,Medical imbalanced data classification, ASTES, Volume 2, Issue 3, Page No 116-124,
2017.
10. SarabAlMuhaideb, Mohamed El BachirMenai, An Individualized Preprocessing for Medical Data Classification, Elsevier, Computer
Science, vol.82, 2016.
11. S. Ranganatha ; H. J. Pooja Raj ; C. Anusha ; S. K. Vinay , Medical data mining and analysis for heart disease dataset using
classification techniques, IEEE Conference on Research & Technology in the Coming Decades (CRT 2013).
12. Sergio Ramires-gallego, Bartosz Krawczvk, Nearest Neighbor Classification for High-Speed Big Data Streams Using Spark, IEEE
Transaction on Systems, Man, Cybernetics, Systems, Vol.47, Issue 10, 2017.
13. Manal Alghamdi, Mouaz Al-Mallah, Predicting diabetes mellitus using SMOTE and ensemble machine learning approach: The Henry
Ford ExercIse Testing (FIT) project, PLOS, 12(7), 2017.
14. M. Akhiljabbar, B.L.Deekshatulu, PritiChandra, Classification of Heart Disease Using K- Nearest Neighbor and Genetic Algorithm,
Elsevier Procedia Technology , vol.10, pp:85-94, 2013.
15. Min Chen ; Yixue Hao ; Kai Hwang ; Lu Wang ; Lin Wang , Disease Prediction by Machine Learning Over Big Data From
Healthcare Communities, IEEE Access, vol. 5, pp:8869-8879, 2017.
16. Jie Zhou, Bo-quan Fu ,The research on gene-disease association based on text-mining of PubMed,Springer, BMC Bioinformatics, 2018.
17. Kaan Uyara, Ahmet İlhana, Diagnosis of heart disease using genetic algorithm based trained recurrent fuzzy neural networks, Elsevier,
Procedia Computer Science 120 (2017) 588–593.
18. PradiptaMaji and Chandra Das, “Relevant and Significant Supervised Gene Clustersfor Microarray Cancer Classification”, IEEE
Transactions on Nanobioscience, vol. 11, no. 2, pp. 161-168, 2012.
19. UjjwalMaulik, AnirbanMukhopadhyay, DebasisChakraborty, “Gene-Expression-Based Cancer Subtypes Prediction Through Feature
Selection and Transductive SVM”, IEEE Transactions on Biomedical Engineering, vol. 60, no. 4, pp. 1111-1117, 2013.
20. Shuichi Kawano et al., “Identifying Gene Pathways Associatedwith Cancer Characteristics viaSparse Statistical Methods” IEEE/ACM
Transactions on Computational Biology and Bioinformatics, vol. 9, no. 4, pp. 966-972, 2012.
21. K.Ananthajothi, M.Subramaniam, Multilevel incremental influence measure based classification of medical data for improved
classification, Springer, Cluster Comput. (2018). https://doi.org/10.1007/s10586-018-2498-z.
Samsuri Abdullah, Najihah Husna Ahmad Nasir, Marzuki Ismail, Ali Najah Ahmed, Mohammad
Authors:
Nor Khasbi Jarkoni
Paper Title: Development of Ozone Prediction Model in Urban Area

Abstract: One of the main challenges for countries in tropical area such as Malaysia is the high concentration
of ozone (O3) caused by elevated levels of anthropogenic and natural ozone precursors. In this study, variation
of O3 concentrations in urban area (Klang) was investigated using data covering three-year period (2012–2015)
on hourly basis. Result shows that the diurnal cycle of ozone concentration has a mid-day peak (1400hrs) while
lower concentration occurs at night time (2100hrs) as it titrates nitrogen dioxide (NO2). There exists statistically
significant difference (p<0.05) of O3 concentration at study areas. Moderate Spearman correlation coefficient
was evaluated between O3 and NO2 (r=0.45, p<0.05). Multiple linear regression (MLR) model was developed
and signifies that nitrogen oxides (NO), relative humidity (RH), NO2, carbon monoxide (CO), wind speed (WS),
temperature (T) and sulphur dioxide (SO2) are the significant predictors for O3 concentration. This study
suggests that the emission of O3 precursors, particularly NOx from motor vehicles, needs to be controlled to
395. reduce the incidence of high O3 levels in Malaysia. 2263-
226
Keywords: Klang, multiple linear regression, ozone, spearman correlation, urban area. 7

References:

1. Vingarzan, R. (2004). A review of surface ozone background levels and trends. Atmospheric Environment. 38(21), 3431-3442.
2. Fernández-Fernández, M. I., Gallego, M. C., García, J. A., & Acero, F. J. (2011). A study of surface ozone variability over the Iberian
Peninsula during the last fifty years. Atmospheric Environment. 45(11), 1946-1959.
3. Marathe, S. A., & Murthy, S. (2015). Seasonal variation in surface ozone concentrations, meteorology and primary pollutants in coastal
mega city of Mumbai, India. Journal of Climatology & Weather Forecasting. 3(3): 149.
4. Moustris, K. P., Nastos, P. T., Larissi, I. K., & Paliatsos, A. G. (2012). Application of Multiple Linear Regression models and artificial
neural networks on the surface ozone forecast in the greater Athens area, Greece. Advances in Meteorology. 2012: 1-8.
5. Abdul-Wahab, S. A., Bakheit, C. S., & Al-Alawi, S. M. (2005). Principal component and multiple regression analysis in modelling of
ground-level ozone and factors affecting its concentrations. Environmental Modelling & Software. 20(10): 1263-1271.
6. Ismail, M., Suroto, A. and Abdullah, S. (2015). Response of Malaysian Local Rice Cultivars Induced by Elevated Ozone Stress.
EnvironmentAsia. 8(1): 86-93.
7. Abdullah, S., Ismail, M., Fong, S. Y. and Ahmed, A. N. (2016). Evaluation for long term PM 10 concentration forecasting using multi
linear regression (MLR) and principal component regression (PCR) models. EnvironmentAsia. 9(2): 101-110.
8. Abdul-Wahab, S. A., Bakheit, C. S., & Al-Alawi, S. M. (2005). Principal component and multiple regression analysis in modelling of
ground-level ozone and factors affecting its concentrations. Environmental Modelling & Software. 20(10): 1263-1271
9. Barrero, M. A., Grimalt, J. O., & Cantón, L. (2006). Prediction of daily ozone concentration maxima in the urban atmosphere.
Chemometrics and Intelligent Laboratory Systems. 80(1): 67-76.
10. Leh, O. L. H., Ahmad, S., Aiyub, K., Jani, Y. M., & Hwa, T. K. (2012). Urban air environmental health indicators for Kuala Lumpur
city. Sains Malaysiana. 41(2): 179-191.
11. Abdullah, S., Ismail, M., Ghazali, N. A. and Ahmed, A. N. (2018). Forecasting particulate matter (PM 10) concentration: A radial basis
function neural network approach. AIP Conference Proceedings. 2020: 020043-1-6.
12. Abdullah, S., Ismail, M., Samat, N. N. A. and Ahmed, A. N. (2018). Modeling Particulate Matter (PM 10) Concentration in Industrialized
Area: A Comparative Study of Linear and Nonlinear Algorithms. ARPN Journal of Engineering and Applied Sciences. 13(20): 8226-
8234.
13. Batista, G. E., & Monard, M. C. (2003). An analysis of four missing data treatment methods for supervised learning. Applied Artificial
Intelligence. 17(5-6): 519-533.
14. Moustris, K. P., Nastos, P. T., Larissi, I. K., & Paliatsos, A. G. (2012). Application of Multiple Linear Regression models and artificial
neural networks on the surface ozone forecast in the greater Athens area, Greece. Advances in Meteorology. 2012: 1-8.
15. Abdullah, S., Ismail, M. and Fong, S. Y. (2017). Multiple linear regression (MLR) models for long term PM 10 concentration forecasting
during different monsoon seasons. Journal of Sustainability Science and Management. 12(1): 60-69.
16. Kovac-Andric, E., Brana, J. & Gvozdic, V. (2009). Impact of meteorological factors on ozone concentrations modelled by time series
and multivariate statistical methods. Ecology Informatics. 4: 117-122.
17. Ismail, M., Abdullah, S., Jaafar, A. D., Ibrahim, T. A. E. and Shukor, M. S. M. 2018. Statistical modeling approaches for PM10
forecasting at industrial areas of Malaysia. AIP Conference Proceedings. 2020: 020044-1-6.
18. Abdullah, S., Hamid, F. F. A., Ismail, M., Ahmed, A. N. and Mansor, W. N. W. (2019). Data on Indoor Air quality (IAQ) in
kindergartens with different surrounding activities. Data in Brief. 25: 103969.
19. Ismail, M., Abdullah, S., Yuen, F. S., & Ghazali, N. A. (2016). A ten-year investigation on ozone and it precursors at Kemaman,
Terengganu, Malaysia. Environment Asia. 9(1): 1-8.
20. Banan, N., Latif, M. T., Juneng, L., & Ahamad, F. (2013). Characteristics of surface ozone concentrations at stations with different
backgrounds in the Malaysian Peninsula. Aerosol and Air Quality Research. 13(3): 1090-1106.
21. Abdullah, S., Shukor, M. S. M., Shahrudin, D. and Ismail, M. (2018). The assessment of indoor air quality (IAQ) at refinery industry.
International Journal of Civil Engineering and Technology. 9(9): 925-932.
22. Abdullah, A. M., Ismail, M., Yuen, F. S., Abdullah, S. and Elhadi, R. E. (2017). The relationship between daily maximum temperature
and daily maximum ground level ozone concentration. Polish Journal of Environmental Studies. 26(2): 517-523.
Anna Anatolyevna Burdina, Anna Aleksandrovna Nekhrest, Yuriy Nikolayevich Frolov, Yelena
Authors:
Timofeyevna Manayenkova
Paper Title: Stationary Time Series in Pricing

Abstract: The methods for analyzing the dynamics of time series are compared in this study, the mechanisms
for assessing the accuracy of value forecasting are examined, and a brief description of the models and examples
of their use are provided. The problem of choosing the optimal model according to the criterion of the minimum
forecasting error is stated and solved. The methods of mathematical modeling, mathematical statistics and
econometrics, such as autoregression, moving average, exponential smoothing, and neural network modeling
were used to solve this problem. The result of the study is the algorithm for finding the optimal model based on
minimizing the forecasting error, as well as the program that implements this algorithm.
Keywords: ARIMA, autoregression, dynamics analysis, exponential smoothing, forecast estimation, moving
average, neural networks, pricing, time series.

References:

396. 1. A. I. Kibzun, and S. Yu. Kan, Zadachi stokhasticheskogo programmirovaniya s veroyatnostnymi kriteriyami [Problems of stochastic
programming with probabilistic criteria]. Moscow: FIZMATLIT, 2009. 2268-
2. Yu. N. Lapygin, V. E. Krylov, and A. P. Chernyavsky, Ekonomicheskoye prognozirovaniye [Economic forecasting]: study guide. 227
Moscow: Eksmo, 2009.
3. A. N. Troshin, and A. A. Burdina, Formalizatsiya zadachi optimizatsii stoimosti korporativnykh struktur s uchetom faktora regionalnoy 2
nadezhnosti [Formalization of the problem of optimizing the cost of corporate structures taking the factor of regional reliability into
account]. Proceedings of the MAI. Moscow: MAI, 2011.
4. A. A. Burdina, N. O. Melikaslanova, A. N. Zakharov, T. M. Rogulenko, and N. V. Moskvicheva, “Methodology of estimating the cost of
credit resources taking into account the complexity of attracting them based on the equivalence theorem,” International Journal Espacios,
vol. 2(38), 2017, p. 27.
5. D. Rutkovskaya, M. Pilinsky, and L. Rutkovsky, Neyronnyye seti, geneticheskiye algoritmy i nechetkiye sistemy [Neural networks,
genetic algorithms and fuzzy systems]. Moscow: Hotline – Telecom, 2006.
6. A. G. Granberg (ed.), Statisticheskoye modelirovaniye i prognozirovaniye [Statistical modeling and forecasting]. Moscow: Finance and
Statistics, 1990.
7. J. S. Armstrong, “Forecasting for Marketing,” in Quantitative Methods in Marketing. London: International Thompson Business Press,
1999. pp. 92–119.
8. A. A. Burdina, M. N. Kaloshina, and A. S. Chizhik, “Comprehensive method of analyzing the investment potential of industrial
enterprises,” International Journal Academy of Strategic Management Journal, vol. 16(2), 2017.
9. M. Sc. Jingfei Yang, Power System Short-term Load Forecasting: Thesis for Ph.d degree. Darmstadt: Elektrotechnik und
Informationstechnik der Technischen Universitat, 2006.
10. D. Kriesel, A Brief Introduction to Neural Networks. 2007. Available: http://www.dkriesel.com/_media/science/neuronalenetze-en-
zeta2-2col-dkrieselcom.pdf.
Authors: Debajit Sensarma, Samar Sen Sarma

Paper Title: Application of Graphs in Security


Abstract: Now-a-days in the era of Big Data huge information is gathered in every second. Humans are now
already interconnected via smart phones, gadgets, smart meters and other smart appliances. Also all these
computing devices are fully connected to each other and this is known as “Internet of Things” which produces
crucial information in every moment. These sensitive information needs to be protected. So, design of a good
security mechanism is needed to provide protection against unauthorized attacks on this information. This article
mainly takes cryptography and graph as a tool and concentrated on designing two public key encryption scheme
based on graph where the first protocol is based on properties of matrices generated from graph. The aim is to
protect the message graph generated from a given message. The second protocol is based on the properties of
graphical codes.

397. Keywords: Graph, Information Security, Cyber Security, Cryptography, Graphical Codes.
2273-
References: 227
9
1. Von Solms, Rossouw, and Johan Van Niekerk. "From information security to cyber security." computers & security38 (2013): 97-102.
2. Shannon, Claude E. "Communication theory of secrecy systems." Bell system technical journal 28, no. 4 (1949): 656-715.
3. Sensarma, D., and S. Sen Sarma. "A Unified Framework for Security and Storage of Information A Unified Framework for Security
and Storage of Information." International Journal of Advance Engineering and Research Development 2, no. 1 (2015).
4. ISO/IEC. ISO/IEC TR 13335-1:2004 information technology security techniques management of information and communications
technology security part 1: concepts and models for information and communications technology security management. ISO/IEC, JTC
1, SC27, WG 1 2004.
5. International Telecommunications Union (ITU). ITU-TX.1205: series X: data networks, open system communications and security:
telecommunication security: overview of cybersecurity 2008.
6. Whitman, Michael E., and Herbert J. Mattord. "Principles of information security. Cengage Learning." receives US patent for personal
identification device.(2005). Wireless News(2011): 1-1.
7. Kahate, Atul. Cryptography and network security. Tata McGraw-Hill Education, 2013.
8. Lewin, Kurt. Principles of topological psychology. Read Books Ltd, 2013.
9. Knuth, Donald E. The Art of Computer Programming, Volume 4, Fascicle 6: Satisfiability. Addison-Wesley Professional, 2015.
10. Al Etaiwi, Wael Mahmoud. "Encryption algorithm using graph theory." Journal of Scientific Research & Reports 3, no. 19 (2014):
2519-2527.
11. Yamuna, M., A. Sankar, Siddarth Ravichandran, and V. Harish. "Encryption of a Binary String using music notes and graph
theory." International Journal of Engineering and Technology 5, no. 3 (2013): 2920-2925.
12. Yamuna M, Meenal Gogia, Ashish Sikka, Md. Jazib Hayat Khan. “Encryption using graph theory and linear algebra.” International
Journal of Computer Application. ISSN:2250-1797; 2012.
13. Amudha A, Charles Sagayaraj A.C., Shantha Sheela A.C. “An Application of Graph Theory in Cryptography”, International Journal of
Pure and Applied Mathematics, Vol.119 (13), 375-383, 2018.
14. Sensarma, Debajit, and Samar Sen Sarma. "Gmdes: a graph based modified data encryption standard algorithm with enhanced
seurity." Int J Res Eng Technol 3, no. 3 (2014): 653-660.
15. Klima, Richard E., and Neil P. Sigmon. Cryptology: classical and modern with maplets. Chapman and Hall/CRC, 2012.
16. Ustimenko, Vasyl. "On graph-based cryptography and symbolic computations." Serdica Journal of Computing 1, no. 2 (2007): 131-
156.
17. Akl, Selim G. "The graph is the message: design and analysis of an unconventional cryptographic function." From Parallel to
Emergent Computing, Adamatzky, A. et al., Eds., Taylor & Francis, CRC Press, Boca Raton, Florida (2019).
18. Paszkiewicz, Andrzej, Anna Górska, Karol Górski, Zbigniew Kotulski, Kamil Kulesza, and Janusz Szczepański. "Proposals of graph
based ciphers, theory and implementations." In Proceedings of the Regional Conference on Military Communication and Information
Systems. CIS Solutions for an Enlarged NATO, RCMIS. 2001.
19. Lu, Steve, Daniel Manchala, and Rafail Ostrovsky. "Visual cryptography on graphs." Journal of combinatorial optimization21, no. 1
(2011): 47-66.
20. McEliece, Robert J. "A public-key cryptosystem based on algebraic." Coding Thv 4244 (1978): 114-116.
21. Sun, Hung-Min. "Cryptanalysis of a public-key cryptosystem based on generalized inverses of matrices." IEEE communications
letters 5, no. 2 (2001): 61-63.
22. Hecker, David, and Stephen Andrilli. Linear Methods: A General Education Course. Chapman and Hall/CRC, 2018.
23. Eves, Howard Whitley. Elementary matrix theory. Courier Corporation, 1980.
24. Sensarma, Debajit, and Samar Sen Sarma. "Data Hiding using Graphical Code based Steganography Technique." arXiv preprint
arXiv:1509.08743 (2015).
25. Deo, Narsingh. "Graph theory with applications to engineering and computer science: PHI Learning Pvt." Ltd India (2004).
26. Hakimi, S., and J. Bredeson. "Graph theoretic error-correcting codes." IEEE Transactions on Information Theory 14, no. 4 (1968): 584-
591.
27. Jungnickel, Dieter, and Scott A. Vanstone. "Graphical codes revisited." IEEE Transactions on Information Theory 43, no. 1 (1997):
136-146.
28. Jungnickel, Dieter, and D. Jungnickel. Graphs, networks and algorithms. Berlin: Springer, 2005.

Authors: Niroj Kumar Pani, Satyasundara Mahapatra, Rati Ranjan Dash

Paper Title: Two-Phase Security Framework for Network Layer Communication in Ad Hoc Clouds

Abstract: An ad hoc cloud computing environment on the infrastructure point of view is formed by
consuming resources from existing occasionally available computing setups that are primarily used for some
other purposes, for example, personal computers, mobile phones and such similar devices connected to the
internet. In this paper, we propose a mechanism to secure the network layer communications particularity
398. routing and data packet forwarding in ad hoc cloud environment. The paper details the proposed scheme and
analyses its robustness on the security perspective. 2280-
228
Keywords: Cloud computing, ad hoc cloud, security, routing, forwarding.
5
References:

1. P. Mell and T. Grance, “The NIST definition of cloud computing,” Communications of the ACM, vol. 53, no. 6, p. 50, 2010.
2. G. Kirby, A. Dearle, A. Macdonald, and A. Fernandes, “An approach to ad hoc cloud computing,” arXiv preprint arXiv: 1002.4738,
2010.
3. S. K. Pippal, S. Mishra, and D. S. Kushwaha, “Architectural Design and Issues for Ad-Hoc Clouds,” Advances in Communication,
Network, and Computing, pp. 291-296, 2012.
4. A. R. Mohammad, A. S. Elham, and Y. Jararweh, “AMCC: Ad-hoc based Mobile Cloud Computing Modeling,” Procedia Computer
Science, vol. 56, pp.580-585, 2015.
5. N. Fernando, S. W. Loke, and W. Rahayu, “Mobile cloud computing: A survey,” Future Generation Computer Systems, vol. 29, no. 1,
pp.84-106, 2013.
6. Gary A. McGilvary, Adam Barker, and Malcolm Atkinson, "Ad hoc cloud computing." 2015 IEEE 8th International Conference on
Cloud Computing. IEEE, 2015.
7. P. Gupta, A. Seetharaman, and J. R. Raj, “The usage and adoption of cloud computing by small and medium businesses,” International
Journal of Information Management, vol. 33, no. 5, pp. 861–874, 2013.
8. H. Wang, W. He, and F.-K. Wang, “Enterprise cloud service architectures,” Information Technology and Management, vol. 13, no. 4,
pp. 445–454, 2012.
9. S. Srinivasamurty and D. Q. Liu, “Security and Privacy in Cloud Computing: A Survey,” Parallel and cloud computing, vol. 2, no. 4, pp.
126-149, 2013.
10. M. Almorsy, J. Grundy, and I. M¨uller, “An analysis of the cloud computing security problem,” in Proceedings of the 17th Asia Pacific
Software Engineering Conference (APSEC), Cloud Workshop, Sydney, Australia, pp. 1-7, 2010.
11. Niroj Kumar Pani, Bikram Keshari Rath, and Sarojananda Mishra, "A Topology-Hiding Secure On-Demand Routing Protocol for
Wireless Ad Hoc Network," International Journal of Computer Applications, vol. 144, no. 4, pp. 42-50, 2016.
12. Niroj Kumar Pani, Bikram Keshari Rath, Sarojananda Mishra. "Localization Adaptive Secure Routing for Ad-Hoc Cloud Networks
Based on Synchronized Timestamp Approach", Proceedings of the Second International Conference on Information and Communication
Technology for Competitive Strategies - ICTCS '16, 2016.
13. B. A. Forouzan and D. Mukhopadhyay, Cryptography and Network Security (Special Indian Edition). McGraw-Hill Education, 2011.
14. A. J. Menezes, P. C. V. Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography. CRC Press, 1996.
15. S. Ghazizadeh, O. Ilghami, E. Sirin, and F. Yaman, "Security-aware adaptive dynamic source routing protocol," In Proceedings of 27th
Annual IEEE Conference on Local Computer Networks (LCN 2002), IEEE, pp. 751-760, 2002.
16. M. H. Kharche, and M. D. S. Chouhan, “Implementing trust in cloud using public key infrastructure,” International Journal of Advanced
Computer Science and Applications, vol. 3, no. 3, 2012.
Authors: Mohd Muslim Md Zalli, Hasniza Nordin, Rosna Awang Hashim
The role of self-regulated learning Strategies on learners’ Satisfaction in Massive Open Online
Paper Title:
Course (MOOC): Evidence from Malaysia MOOC
Abstract: Learning in Massive Open Online Courses (MOOCs) necessitates learners to be capable of self-
regulating their learning in order to oversee and adapt their behaviour and actions in certain learning settings.
Studies have highlighted that learners who have good control of self-regulation in their learning, either formal or
informal learning contexts, utilise more competent learning strategies in online learning context. Nevertheless,
MOOCs attract a diverse range of learners, each with different experience and satisfaction. The aim of this study
is to examine the role of self-regulated learning (SRL) and its components (time management, planning, self-
evaluation, and help-seeking) on learners’ satisfaction in MOOC. Data were collected from 281 learners of a
Malaysia MOOC namely Asas Keusahawanan (Introduction to Entrepreneurship), in the second semester of the
Malaysian universities academic calendar. A cross-sectional web-based survey was applied and a Partial Least
Square (PLS) approach was use for analysing data. Findings indicated that all of SRL components except help-
seeking are important factors for explaining learners’ satisfaction in a MOOC. This study provides useful
suggestions for the course designers of MOOCs platforms, and the facilitators in engaging learners with suitable
SRL strategies and increase the level of course satisfaction.

Keywords: Massive Open Online Course (MOOC), Malaysia MOOC, Satisfaction, Self-regulated learning.

References:

1. B. Voss, “Massive open online courses (MOOCs): A Primer for University and College Board Members,” Association of Governing
Boards of Universities and Colleges [White Paper], 2013. Available: agb.org/sites/agb.org/files/report_2013_MOOCs.pdf.
399. 2. D. Shah, “By the numbers: MOOCS in 2017,” 2018. Available: https://www.class-central.com/report/mooc-stats-2017/
3. M. F. M. Yaakob, and M. M. M. Zalli, “An Overview of Massive Open Online Courses (MOOCs), Pedagogies, and Distance 2286-
Education,” in Redesigning Higher Education Initiatives for Industry 4.0: IGI Global, 2019, pp. 56-68. 229
4. N. Rubaai, and H. Hashim, “Polytechnic ESL lecturers’ acceptance of using Massive Open Online Course (MOOC) for teaching
English as a Second Language (ESL),” International Journal of Innovative Technology and Exploring Engineering, vol. 8(9), 2019, pp. 0
114-121.
5. R. F. Kizilcec, M. Perez-Sanagustín, and J. J. Maldonado, “Self-regulated learning strategies predict learner behavior and goal
attainment in massive open online courses,” Computers and Education, vol. 104, 2017, pp. 18–33.
6. S. Lajoie, and R. Azevedo, “Teaching and learning in technology-rich environments,” Handbook of Educational Psychology, vol. 2,
2006, pp. 803–821.
7. K. F. Hew, and W. S. Cheung, “Students’ and instructors’ use of massive open online courses (MOOCs): Motivations and challenges,”
Educational Research Review, vol. 12, 2014, pp. 45–58.
8. R. F. Kizilcec, and S. Halawa, “Attrition and achievement gaps in online learning,” in Proceedings of the Second ACM Conference on
Learning@Scale, 2015, pp. 57–66.
9. E. Rabin, Y. M. Kalman, and M. Kalz, “An empirical investigation of the antecedents of learner-centered outcome measures in
MOOCs,” International Journal of Educational Technology in Higher Education, vol. 16(1), 2019, pp. 14.
10. L. Barnard, V. Paton, and W. Lan, “Online self-regulatory learning behaviors as a mediator in the relationship between online course
perceptions with achievement,” International Review of Research in Open and Distance Learning, vol. 9(2), 2008, pp. 1–15.
11. N. Dabbagh, and A. Kitsantas, “Supporting self-regulation in student-centered web-based learning environments,” International
Journal on E-Learning, vol. 3(1), 2004, pp. 40-47.
12. B. J. Zimmerman, “Attaining self-regulation: A social cognitive perspective,” in Handbook of self-regulation: Academic Press, 2000,
pp. 13-39.
13. A. Kitsantas, and B. J. Zimmerman, “Comparing self-regulatory processes among novice, non-expert, and expert volleyball players: A
microanalytic study,” Journal of Applied Sport Psychology, vol. 14(2), 2002, pp. 91-105.
14. J. L. Whipp, and S. Chiarelli, “Self-regulation in a Web-based course: A case study,” Educational Technology Research and
Development, vol. 52(4), 2004, pp. 5-22.
15. L. Song, E. S. Singleton, J. R. Hill, and M. H. Koh, “Improving online learning: Student perceptions of useful and challenging
characteristics,” The Internet and Higher Education, vol. 7(1), 2004, pp. 59-70.
16. E. Yukselturk, and S. Bulut, “Predictors for student success in an online course,” Educational Technology and Society, vol. 10(2),
2007, pp. 71-83.
17. R. F. Kizilcec, and E. Schneider, “Motivation as a lens to understand online learners: Toward data-driven design with the OLEI Scale,”
Transactions on Computer-Human Interactions, vol. 22(2), 2015, pp. 24.
18. K. Ley, and D. B. Young, “Instructional principles for self-regulation,” Educational Technology Research and Development, vol.
49(2), 2001, pp. 93-103.
19. P. C. Sun, R. J. Tsai, G. Finger, Y. Y. Chen, and D. Yeh, “What drives a successful elearning? An empirical investigation of the critical
factors influencing learner satisfaction,” Computers and Education, vol. 50(4), 2008, pp. 1183–1202.
20. R. W. Brislin, “Back-translation for cross-cultural research,” Journal of Cross-cultural Psychology, vol. 1, 1970, pp. 185-216.
21. J. F. Hair, W. C. Black, B. J. Babin, and R. E. Anderson, Multivariate Data Analysis: A Global Perspective (7th edition). Upper
Saddle River, New Jersey: Pearson Education Inc., 2010.
22. J. F. Hair, G. T. M. Hult, C. Ringle, and M. Sarstedt, A primer on partial least squares structural equation modeling (PLS-SEM) (2nd
ed.). London: Thousand Oaks: SAGE, 2017.
23. D. W. Barclay, C. Higgins, and R. Thompson, “The partial least square (PLS) approach to causal modeling: Personal computer
adoption and use as an illustration,” Technology Studies, vol. 2(2), 1995, pp.285–309.
24. C. Fornell, and D. F. Larcker, “Evaluating structural equation models with unobservable variables and measurement error,” Journal of
Marketing Research, vol. 18(1), 1981, pp. 39–50.
25. Z. Awang, SEM Made Simple: A Gentle Approach to Learning Structural Equation Modelling. Bandar Baru Bangi: MPWS Rich
Resources, 2015.
26. L. Breslow, D. E. Pritchard, J. DeBoer, G. Stump, A. D. Ho, and D. Seaton, “Studying learning in the worldwide classroom: Research
into edX’s first MOOC,” Research and Practice in Assessment, vol. 8, 2013, pp. 13–25.
27. A. Ogan, E. Walker, R. Baker, M. M. T. Rodrigo, J. C. Soriano, and M. J. Castro, “Towards understanding how to assess help-seeking
behavior across cultures,” International Journal of Artificial Intelligence in Education, vol. 25(2), 2015, pp. 229–248.

Authors: D Sathyanarayanan, M Krishnamurthy


Efficient Intelligent Generic Recommendation Knowledge Graph in Education Domain using
Paper Title:
Association Rule Mining and Machine Learning
Abstract: Knowledge graph is used to extract and derive new facts from huge variety of data sources through
relationship. An existing Natural language processing tool is specific and performs adaptive learning mechanism
through instruction concepts. The specific knowledge graph suffers a problem of finding large collections of
new facts with inter domain. This problem is addressed by implementing an efficient model for integrating
various domain of interest as a generic knowledge graph. This proposed model has three major phases they are
generic data collection, generic relationship establishment and generic deployment for education domain. The
data are collected, preprocessed and categorized in to specific subject category by producing integrated data set.
The relationship is established based on the pedagogical data with assessment data of leaners are classified in to
course list. This generic knowledge graph is compared with the CNN based model and GCN based model. The
validation of these models are assessed and deployed into application services for teachers and learners. The
main objective of the proposed graph is to organize a generic knowledge graph for deriving huge amount of new
facts to the education domain with maximum support and confidence level.

Keywords: Knowledge Graph, Association Rule Mining, Semantic Mining, Ontology, Relational Database.

References:

1. Yucong Duan, Lixu Shao, Gongzhu Hu, Zhangbing Zhou, Quan Zou and Zhaoxin Lin,"Specifying architecture of knowledge graph
with data graph, information graph, knowledge graph and wisdom graph", DOI: 10.1109/SERA.2017.7965747,2017,Pp 1-12.
400. 2. Lv Qingjie, Xu Lingyu, Yu Jie, Wang Lei, Xun Yunlan, Shi Suixiang and Liu Yang, "Research on domain knowledge graph based on
the large scale online knowledge fragment", IEEE Workshop on Advanced Research and Technology in Industry Applications 2291-
(WARTIA),DOI: 10.1109/WARTIA.2014.6976259,Ottawa, ON, Canada, 2014, Pp 1-6. 229
3. Danae Pla Karidi,"From user graph to Topics Graph: Towards twitter followee recommendation based on knowledge graphs", IEEE
32nd International Conference on Data Engineering Workshops (ICDEW),DOI: 10.1109/ICDEW.2016.7495629, IEEE, 2016,Pp 1.8. 6
4. Nandish Jayaram, Arijit Khan, Chengkai Li, Xifeng Yan and Ramez Elmasri,"Querying Knowledge Graphs by Example Entity
Tuples", IEEE Transactions on Knowledge and Data Engineering, Volume: 27 , Issue: 10 ,2015,Pp 2797 - 2811.
5. Ruijie Wang, Meng Wang, Jun Liu, Siyu Yao, Qinghua Zheng,"Graph Embedding Based Query Construction Over Knowledge
Graphs",IEEE International Conference on Big Knowledge (ICBK), DOI: 10.1109/ICBK.2018.00009, 2018, Pp: 1 - 8.
6. Zuopeng Justin Zhang,"Graph Databases for Knowledge Management", IT Professional, Volume: 19 , Issue: 6 , 2017,Pp 26 - 32.
7. Fu Leijie, Bai Yv, Zhong Zhenyuan,"Constructing a vertical knowledge graph for non-traditional machining industry",IEEE 15th
International Conference on Networking, Sensing and Control (ICNSC),DOI:10.1109/ICNSC.2018.8361341 2018, ,Pp 1-6.
8. Jiandong Li, Atsushi Sato, Runhe Huang, Dongming Chen,"A Rule-Based Knowledge Discovery Engine Embedded Semantic Graph
Knowledge Repository for Retail Business",International Conference on Advanced Cloud and Big Data (CBD),DOI:
10.1109/CBD.2016.024, 2016,Pp 1-8.
9. Maximilian Nickel, Kevin Murphy, Volker Tresp, Evgeniy Gabrilovich,"A Review of Relational Machine Learning for Knowledge
Graphs", Proceedings of the IEEE, Volume: 104 , Issue: 1 , 2016, Pp 11 – 33.
10. Lirong Qiu, Huili Zhang,"Review of Development and Construction of Uyghur Knowledge Graph",IEEE International Conference on
Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC),
DOI: 10.1109/CSE-EUC.2017.181, IEEE, 2017, Pp 1-6.
11. Xiao Yu, Hao Ma et al,"On building entity recommender systems using user click log and freebase knowledge", WSDM '14
Proceedings of the 7th ACM international conference on Web search and data mining ,2017, Pp 263-272.
12. Feichen Shen, Hongfang Liu, Sunghwan Sohn, David W. Larson, and Yugyung Lee,"Predicate Oriented Pattern Analysis for
Biomedical Knowledge Discovery",Intell Inf Manag. volume 8, Issue 3, Pp 66–85.
13. D Sathyanarayanan, M. Krishnamurthy,"An Efficient Association Rule Based Dynamic Support CountAdaptation Model for XML
Databases Using XQuery",International Journal of Applied Engineering Research ISSN 0973-4562 Volume 10, Number 6 (2015) pp.
16129-16147.
14. D Sathyanarayanan, M Krishnamurthy,"Association Rule Mining Using Frequent Itemsets Generation by Anti- Mirroring Of Bit
Vectors",International Journal of Pure and Applied Mathematics,Volume 118 No. 20 2018, Pp.5033-5044.
Authors: P Sarma, M Mitra, M P Bhuyan, V Deka, S Sarmah, S K Sarma

Paper Title: Automatic Vowel Recognition from Assamese Spoken words


Abstract: Vowel plays the most important role in any speech processing work. In this research work,
recognition of Assamese vowel from spoken Assamese words is explored. Assamese is a language which is
spoken by major people in Brahmaputra Valley of Assam, Assam is a state which is situated in the North-East
part of India. This automatic vowel recognition system is implemented by using three efficient techniques
Support Vector Machine (SVM), K-Nearest Neighbor (KNN) and Random Forest (RF) classifier. The database
used in the experiments is specially designed for this purpose. A list of phonetically vowel rich Assamese words
is prepared for the experiment. As an initial effort, twenty different (20) words uttered by fifty-five (55) speakers
are taken. Utterances from both male and female speakers are collected. Each utterance was repeated two times
by every speaker. A database of the total of 2200 samples is prepared. After experimenting on different samples
it is seen that Random Forest (RF) is giving the best performance compared to the other two classifiers. The
401. performance of the system is shown with testing dataset and comparison is done. Outcome of this research work
will enhance the Machine Translation from Assamese to any other language.
2297-
Keywords: LPC, Support Vector Machine (SVM), K-Nearest Neighbor (KNN), Random Forest (RF). 230
4
References:

1. M.Devi and P.H.Talukdar (2015) "A Study on Estimation of Formants of Assamese Vowel and Words using LPC Method", Journal of
Harmonized Reserch, 3(3) : 116 – 121
2. Banikanta Kakati “Assamese its formation and development” 5th ed (2007) Guwahati, India, LBS publication
3. G.K.Vallabha and B. Tuller “Systematic errors in the formant analysis of steady- state vowels.” (2002) Speech Communication, 38(1-
2 ) : 141- 160
4. J. N. Holmes, W. J. Holmes, and P. N. Garner “Using formant frequencies in speech recognition” (1997) Proc. EUROSPEECH 4
:2083-2086
5. V.A. Natarajan and S. Jothilakshmi (2012) "Segmentation of continuous speech into consonant and vowel units using formant
frequencies", International Journal of Computer Applications, 56(15) : 0974 – 8887
6. M.Sarma and K.K. Sarma (2013) "Vowel phoneme segmentation for speaker identification using an ANN based framework", Journal
of Intelligent System, 22(2):111 – 130
7. B.Sarma, (2013) "Normalization and automatic recognition of Assamese vowels," International Journal of Computer Applications,
75(11) : 0975 – 8887
8. K.K.Sarma and M.Sharma, (2015) "Dialectal Assamese vowel speech detection using acoustic phonetic features, KNN and RNN",2nd
International Conference on Signal Processing and Integrated Networks , Noida, India, IEEE : 674-678
9. A.H. Aliw and E. H. A. Ameer," (2017) Comparative study of five text classification algorithms with their improvements ",
International Journal of Applied Engineering Research 12 (14) : 4309-4319.
10. D. Dutta, R.D.Choudhury and S.Gogoi,(2019) "Speech Corpora, Feature Extraction Techniques and Classifiers with Special Reference
to Automatic Speech Recognition", International Journal of Computer Sciences and Engineering, 7(2).
11. W.Koehrsen,(2017) "Random Forest Simple Explanation",Medium, Dec. 27, 2017
[Online].Available:https://medium.com/@williamkoehrsen/random-forest-simple-explanation-377895a60d2d
12. M.Bazmara, K Nearest Neighbor Algorithm for Finding Soccer Talent, Researchgate, April 2013 .[online].
Available:https://www.researchgate.net/publication/237080861_K_Nearest_Neighbor_Algorithm_for_Finding_Soccer_Talent
retrieved on 13th May, 2019 "Support vector machine", Wikipedia. Accessed May 18, 2019.[Online].Available:
https://en.wikipedia.org/wiki/Support-vector_machine.

Authors: Oksana Priemets, Konstantin Samoilov, Inna Zayats, Zhanar Kenessarina, Ellina Yssembayeva

Paper Title: Innovations in Kazakhstan’s Architecture


Abstract: The evolution of Kazakhstan’s architecture illustrates the constant synthesis of internal and external
forms. It creates its original form. This form continues its development under the influence of the factors of
tradition and innovations. This interesting process occurred in the 20th century. Trends of the beginning of the
21st century look peculiar.

Keywords: architectural composition, architecture evolution, continuity, innovation, style, synthesis.

References:

1. I.N. Tasmagambetov, “Kulyptas”. Astana: OF Berel, 2002.


2. E.M. Baitenov, “Memorialnoe zodchestvo Kazakhstana: evolyutsiya i problemy formoobrazovaniya” [“Memorial Architecture of
Kazakhstan: The Evolution and Problems of Formation”]. Almaty: KazGASA, 2004.
402. 3. K.I. Samoilov, “Arkhitektura Kazakhstana XX veka (Razvitie arkhitekturno-khudozhestvennykh form)” [“Architecture of Kazakhstan of
the 20th Century (Development of Architectural-Artistic Forms)”]. Moscow-Almaty: M-ARi Design, 2004. 2305-
4. B.T. Tuyakbaeva, “Almaty: drevnii, srednevekovyi, kolonialnyi, sovetskii etapy urbanizatsii” [“Almaty: Ancient, Medieval, Colonial, 231
Soviet Stages of Urbanization”]. Almaty: "World Discovery", 2008.
5. A.S. Galimzhanova, and M.B. Glaudinova, “Istoriya iskusstva Kazakhstana: v 3-kh t. Tom 2: Arkhitektura” [“History of Kazakhstan 3
Art: in 3 Vols. Vol. 2: Architecture”]. Almaty: Oner, 2011.
6. D.D. Omuraliev, and O.V. Wolitschenko, “Meinstrimy noveishei arkhitektury – dvadtsat pervyi vek” [“Mainstreams of the Newest
Architecture – the Twenty-First Century”]. Saarbrücken: Palmarium Academic Publishing, 2013.
7. B.A. Glaudinov, “Evolyutsiya zodchestva Kazakhstana” [“Evolution of the Architecture of Kazakhstan”]. Almaty: Aleiron, 2016.
8. E.G. Malinovskaya, “Pamyatnik sovremennoi arkhitektury [“Monument to Modern Architecture”]. Almaty: ARK Gallery, 2016.
9. G.A. Isabayev, “Stilevye osobennosti arkhitektury Kazakhstana vtoroi poloviny XIX – nachala XX veka” [“Style Features of the
Architecture of Kazakhstan in the Second Half of the 19th – Early 20th Century”]. Almaty: Zhibekzholy, 2017.
10. A.Y. Bronovitskaya, N.S. Malinin, and Y.I. Palmin, “Alma-Ata: arkhitektura sovetskogo modernizma. 1955-1991. Spravochnik-
putevoditel” [“Alma-Ata: Architecture of the Soviet Modernism. 1955-1991. Guidebook”]. Moscow: Garage Museum of Contemporary
Art, 2018.
11. O.N. Priemets, and K.I. Samoilov, “Razvitie ornamenta v arkhitekture Almaty” [“The Ornament Evolution in the Almaty
Architecture”]. Almaty: Stroitelstvo i arkhitektura, 2019.
12. “Svod pamyatnikov istorii i kultury Kazakhstana. Yuzhno-Kazakhstanskaya oblast” [“Collection of Historical and Cultural Monuments
of the Kazakhstan. South-Kazakhstan Region”]. Almaty: Glavnaya redaktsiya "Kazak entsiklopediyasy", 1994.
13. “Svod pamyatnikov istorii i kultury Respubliki Kazakhstan. Zhambylskaya oblast” [“Collection of Historical and Cultural Monuments
of Kazakhstan. Zhambyl Region”]. Almaty: RGP NIPI PMK, 2002.
14. B.G. Ayagan, (Ed.), “Svod pamyatnikov istorii i kultury g. Almaty [“Collection of Monuments of History and Culture of Almaty”].
Almaty: TOO Kazak entsiklopediyasy, 2006.
15. “Svod pamyatnikov istorii i kultury Respubliki Kazakhstan. Akmolinskaya oblast” [“Collection of Monuments of History and Culture of
the Republic of Kazakhstan. Akmola Region”]. Almaty: Aruna, 2009.
16. “Svod pamyatnikov istorii i kultury Respubliki Kazakhstan. Zapadno-Kazakhstanskaya oblast” [“Collection of Monuments of History
and Culture of the Republic of Kazakhstan. West-Kazakhstan Region”]. Almaty: Aruna, 2010.
17. A.V. Makhiyanova, O.L. Panchenko, E.Sh. Akhmetova, D.K. Shigapova, and D.F. Sadretdinov, “City Population as a Subject of Urban
Ecosystem’s Development”. Journal of Advanced Research in Dynamical and Control Systems, vol. 11(05-special issue), pp. 1916-
1923.
18. A.I. Finogenov, and A.V. Popov, “Concept of Planning Development of Coastal Resort Settlements under Conditions of Complex
Relief”. Journal of Environmental Management and Tourism, vol. 10, 1(33), 2019.
19. A.V. Popov, “Architectural Examination of Student Accommodation in Russia and the CIS”. Amazonia Investiga, vol. 8(19), 2019, pp.
179-190.
20 A.V. Popov, “The Impact of Architectural and Space-Planning Design of Student Accommodation (Dormitories, Campuses) on the
Time Budget of The Student Youth”. International Journal of Engineering and Advanced Technology, vol. 8(3), 2019, pp. 128-133

Galyna V. Getun, Svitlana I. Botvinovska, Nataliia F. Kozak, Andrii V. Zapryvoda, Hanna H.


Authors:
Sulimenko
Paper Title: Envelope Life Cycle Costing of Energy-Efficient Buildings in Ukraine
Abstract: The article describes main points and characteristics of the building envelope design considering
life-cycle cost and compliance with the codes for energy efficiency parameters in Ukraine. This article contains
of the problem analysis of the requirements development for the energy-efficient buildings parameters in
Ukraine considering life-cycle cost in the walling design. The structural concepts for the thermal insulation of
building exterior walls and roof coatings and their impact on energy efficiency are considered. Designing
rational structural concepts for thermal insulating envelope of energy-efficient buildings. The role of the life
cycle cost criterion in making decisions on the choice of building envelope is clarified. Analysis of activities,
publications and regulatory documents in Ukraine and the EU-countries for the design of rational thermal
insulating building envelope considering life-cycle cost to reducing energy consumption. The requirements of
regulatory documents on the design of energy-efficient buildings in Ukraine are systematized. The variants of
construction solutions for building envelope are considered in terms of the life-cycle cost and energy saving
requirements. The tasks of choosing optimal solutions for enclosing structures of external walls and building
coatings are multicriteria of a cardinal choice of alternatives with different important measures from a finite set
of feasible solutions when considering a weakly structured problem with clearly defined separated parameters.
Thermal insulating building envelope using modern insulation systems should be used in all types of buildings.

Keywords: Building, building envelope, coating, energy efficiency, life cycle, wall.

References:

1. Thermal insulation of buildings. DBN V.2.6-31:2016. Available: https://gazobeton.org/sites/default/files/sites/all/uploads/DBN-V.2.6-


31-2016-Teplova-izolyatsiya-budivel.pdf
403. 2. G. Getun, and V. Zaprivody, “Energy efficiency of buildings in Ukraine,” Bulletin of the builder, 4, 2018, pp. 43-47. 2314-
3. M. Timofeev, and A. Pryshchenko, “Ensuring strength and rigidity of the cross-section in monolithic walls with energy-saving
assembly designs,” Energy efficiency in construction and architecture, 7, 2015, pp. 296-301. 232
4. V. Ploskyi, G. Getun, M. Timofeev, and V. Zaprivody, Energy efficient apartment building. Kyiv: KNUBA, 2018. 1
5. Energy efficiency of buildings. Calculation of energy consumption for heating and cooling. DSTU B EN ISO 13790:2011. Available:
http://online.budstandart.com/ua/catalog/doc-page?id_doc=28005
6. Designing. Energy efficiency of buildings. Method of calculating energy consumption for heating, cooling, ventilation, lighting and hot
water. DSTU B А.2.2-12:2015. Available: https://thermomodernisation.org/wp-content/uploads/2017/11/1781___.2.2-12.pdf
7. A. Brooking, P. Jones, and F. Cox, Expert systems. Principles and case studies. Moscow: Radio i Svyaz, 1987.
8. G. Getun, B. Rumyantsev, and A. Zhukov, Insulation systems of building constructions. Dnipro: Zhurpfond, 2016.
9. V. Ploskyi, and G. Getun, Architecture of buildings and structures. Book 2. Residential buildings. Kamianets-Podilskyi: Ruta Publ.,
2017.
10. V. Ploskyi, G. Getun, V. Martynov, O. Sergeychuk, V. Virots'kyi, V. Zaprivody, V. Kripak, L. Lavrinenko, and I. Malyshev,
Architecture of buildings and structures. Book 4. Technical exploitation and reconstruction of buildings. Kamianets-Podilskyi: Ruta
Publ., 2018.
11. Covering of buildings and structures. DBN V.2.6-220:2017. Available:
http://kbu.org.ua/assets/app/documents/dbn2/117.1%20%D0%94%D0%91%D0%9D%20%D0%92.2.6-
220~2017.%20%D0%9F%D0%BE%D0%BA%D1%80%D0%B8%D1%82%D1%82%D1%8F%20%D0%B1%D1%83%D0%B4%D1
%96%D0%B2%D0%B5%D0%BB%D1%8C%20%D1%96%20%D1%81%D0%BF%D0%BE%D1%80%D1%83%D0%B4.pdf
12. G. Getun, Architecture of buildings and structures. Book 1. The basics of designing. Kyiv: Kondor Publ., 2012.
13. Buildings and structures. Residential buildings. Substantive provisions. DBN V.2.2-15-2005. Available:
http://kbu.org.ua/assets/app/documents/dbn2/64.1.%20%D0%94%D0%91%D0%9D%20%D0%92.2.2-15-
2005.%20%D0%91%D1%83%D0%B4%D0%B8%D0%BD%D0%BA%D0%B8%20%D1%96%20%D1%81%D0%BF%D0%BE%D
1%80%D1%83%D0%B4%D0%B8.%20%D0%96%D0%B8%D1%82%D0%BB%D0%BE%D0%B2%D1%96%20%D0%B1%D1%8
3%D0%B4%D0%B8.pdf
14. G. Getun, and I. Lesko, “Design flat-roof coatings considering their life-cycle cost,” Energy saving in construction and architecture, 11,
2018, pp. 95-102.
15. O. Voloshin, and S. Mashchenko, Models and methods of decision-making. Kyiv: Kyiv University Publ., 2010.
16. S. Mikoni, “Choosing the best options from databases,” in Collection of conference reports according to soft calculations and
measurements. SCM99. St.-Peterburg: SPGETU, 1999, pp. 3-14.
17. S. Emelyanov (ed.), Multicriteria choice for solving weakly structured problems. Moscow: VNISI, 1978.

Authors: Prasant Kumar Dash, N. K. Barpanda, Madhumita Panda

Paper Title: Congestion Control in Cable Network Transmission using Novel RED Algorithm
Abstract: Congestion is an important issue in cable network where transmitted packets to the network are
much more than holding capacity of network. Each network needs the maximum number of successful packets
404. to reach the destination with less number of packet losses and low time delay with better fairness. There are
several congestion control algorithms which have been studied to keep the network stable. They employ various
techniques from which the buffer or queue management used by the router is one significant issue to control
congestion. The Active Queue Management algorithms like RED controls the queue size by dropping or
marking the packets before buffer becomes full . In this paper a new algorithm has been proposed and the results
are compared with existing RED algorithm using network simulator (NS-2) in a responsive environment of the
cable network.

Keywords: Congestion control, AQM,RED,NOVEL RED, Queue based.


2322-
References:
232
1. Que, Dashun, Zhixiang Chen, and Bi Chen. "An improvement algorithm based on RED and its performance analysis." 2008 9th
4
International Conference on Signal Processing. IEEE, 2008.
2. S. Rastogi and S. Srivastava, “Comparison Analysis of Different Queuing Mechanisms Droptail , RED and NLRED in Dumbbell
Topology,” vol. 3, no. 4, pp. 3–5, 2014.
3. Ceco, Afan, Novica Nosovic, and Kenan Bradic. "Performance comparison of active queue management algorithms." 2012 20th
Telecommunications Forum (TELFOR). IEEE, 2012.
4. Ismail, Alshimaa H., et al. "Enhanced random early detection (ENRED)." International Journal of Computer Applications92.9 (2014).
5. Thiruchelvi, G., and J. Raja. "A survey on active queue management mechanisms." international journal of Computer Science and
Network security 8.12 (2008): 130-145.
6. Athuraliya L.S., Li V.H. and Yin Q., “REM: Active queue management,” IEEE Network, vol.15, pp. 48–53, 1999.
7. Frank Eyermann. Simulating Networks with Network Simulator 2. University of Zurich. 2008-06-03.
8. Floyd S. and Jacobson V., “Random early detection gateways for congestion avoidance”, IEEE/ACM Transactions on Networking, vol.
1, no. 4, pp. 397–413, 1993

Authors: Sunanda Mendiratta, Neelam Turk, Dipali Bansal

Paper Title: A Robust Isolated Automatic Speech Recognition System using Machine Learning Techniques
Abstract: In order to make fast communication between human and machine, speech recognition system are
used. Number of speech recognition systems have been developed by various researchers. For example speech
recognition, speaker verification and speaker recognition. The basic stages of speech recognition system are pre-
processing, feature extraction and feature selection and classification. Numerous works have been done for
improvement of all these stages to get accurate and better results. In this paper the main focus is given to
addition of machine learning in speech recognition system. This paper covers architecture of ASR that helps in
getting idea about basic stages of speech recognition system. Then focus is given to the use of machine learning
in ASR. The work done by various researchers using Support vector machine and artificial neural network is
also covered in a section of the paper. Along with this review is presented on work done using SVM, ELM,
ANN, Naive Bayes and kNN classifier. The simulation results show that the best accuracy is achieved using
ELM classifier. The last section of paper covers the results obtained by using proposed approaches in which
SVM, ANN with Cuckoo search algorithm and ANN with back propagation classifier is used. The focus is also
on the improvement of pre-processing and feature extraction processes.

Keywords: Speech recognition system, SVM, kNN, ANN, Cuckoo search optimization, ELM.

References:
405. 1. P. Sanderson, “Cognitive work analysis and the analysis, design, and evaluation of human-computer interactive systems, in proc: 2325-
Computer Human Interaction, pp.220-22, 1998. 233
2. A.A.M. Abushariah, T.S. Gunawan, O.O. Khalifa, M.A.M. Abushariah, “English digits speech recognition system based on Hidden
Markov Models”, in proc: Computer and Communication Engineering, pp. 1- 5, 2010. 1
3. M. Gavrilescu, “Improved automatic speech recognition system using sparse decomposition by basis pursuit with deep rectifier neural
networks and compressed sensing recomposition of speech signals”, in proc: 10th International Conference on Communications, pp.1-6
2014.
4. T. Siddique, U. S. Tiwary, “Natural Language Processing and Information Retrieval”, Oxford, 2008.
5. M. Ji, R. Srinivasan, D. Crookes, A. Jafari, “CLOSE-A Data-Driven Approach to Speech Separation”, Audio, Speech and Language
Processing, IEEE, Vol.21 No.7, pp.1355–1368, 2013.
6. X. Cai, W. Li, “Ranking Through Clustering: An Integrated Approach to Multi-Document Summarization”, Audio, Speech and
Language Processing, IEEE, Vol.21 No.7, pp. 1424-1433, 2013.
7. R. K. Aggarwal, Mayank Dave, “Implementing a Speech Recognition System Interface for Indian Languages”, Proceedings of the
IJCNLP-08 Workshop on NLP for Less Privileged Languages, pp. 105-112, 2008.
8. B. Raj and Stern, “Missing feature approach in speech recognition”, Signal Processing magazine, IEEE, pp. 101-116, 2005.
9. K.S. Rao, B. Yegnanarayana, “Modelling Syllable Duration in Indian Language Using Neural Networks. In proceeding of ICASSP
Montreal, Qubic, Canada, pp 313-316, 2004.
10. Baker, L. Deng, J. Glass, S. Khudanpur, C.-H. Lee, N. Morgan, D. O. Shaughnessy, “Research developments and directions in speech
recognition and understanding. Part I,” IEEE Signal Process. Mag., Vol. 26, no. 3, pp. 75_80, May, 2009.
11. Bilmes, “What HMMs can do,” IEICE Trans. Inf. Syst., pp. 869_91, Mar. 2006.
12. J. Stadermann, and G. Rigoll, “A hybrid SVM/HMM acoustic modelling approach to automatic speech recognition,” in Proceedings of
the Interspeech, Jeju island, Korea, pp. 661-664, 2004.
13. S. Zhang, A. Ragni, and M. Gales, “Structured log linear models for noise robust speech recognition,” IEEE Signal Process. Lett, pp.
945-948, 2010.
14. Phuti J Manamela, Madimetja J Manamela, Thipe I Modipa, Tshepisho J Sefara, Tumisho B Mokgonyane, “The Automatic
Recognition of Sepedi Speech Emotions based on Machine Learning Algorithms”, 2018 International Conference on Advances in Big
Data, Computing and Data Communication Systems (ICABCD), pp. 1-7, 2018.
15. Osman Eray, Sezai Tokat, Serdar Iplikci, “An Application of Speech Recognition with Support Vector Machines”, 2018 6th
International Symposium on Digital Forensic and Security (ISDFS), pp. 1-6, 2018.
16. Rubén Solera-Ureña, Ana Isabel García-Moral, Carmen Peláez-Moreno, Manel Martínez-Ramón, Senior Member, Fernando Díaz-de-
María, “Real-Time Robust Automatic Speech Recognition Using Compact Support Vector Machines”, IEEE TRANSACTIONS ON
AUDIO, SPEECH, AND LANGUAGE PROCESSING, pp. 1347-1361, 2012.
17. Sunanda Mendiratta, Neelam Turk, Dipali Bansal, “Automatic Speech Recognition Using Optimal Selection of Features Based On
Hybrid ABC-PSO”, 2016 International Conference on Inventive Computation Technologies (ICICT), pp. 1-7, 2016.
18. Balwant A. Sonkamble, D.D. Doye, “Use of Support Vector Machines Through Linear Polynomial (LP) Kernel for Speech
Recognition”, 2012 International Conference on Advances in Mobile Network, Communication and Its Applications, pp. 46-49, 2012.
19. Xiu-Qing Zhang, Shu-Wang Chen, “Speech recognition system based on DSP and SVM”, Proceedings of the Ninth International
Conference on Machine Learning and Cybernetics, pp. 2313-2316, 2010.
20. Anurag Bajpai, Umang Varshney, Deepam Dubey, “Performance Enhancement of Automatic Speech Recognition System using
Euclidean Distance Comparison and Artificial Neural Network”, 2018 3rd International Conference On Internet of Things: Smart
Innovation and Usages (IoT-SIU), pp. 1-5, 2018.
21. Sanjay Valaki, Harikrishna Jethva, “A Hybrid HMM/ANN Approach for Automatic Gujarati Speech Recognition”, 2017 International
Conference on Innovations in information Embedded and Communication Systems (ICIIECS), pp. 1-5, 2017.
22. Nawel Souissi, Adnane Cherif, “Speech Recognition System Based on Short-term Cepstral Parameters, Feature Reduction Method and
Artificial Neural Networks”, 2nd International Conference on Advanced Technologies for Signal and Image Processing - ATSIP'2016,
pp. 667-671, 2016.
23. Santosh Gupta, Kishor M. Bhurchandi, Avinash G. Keskar, “An Efficient Noise-Robust Automatic Speech Recognition System using
Artificial Neural Networks”, International Conference on Communication and Signal Processing, pp. 1873, 1877, 2016.
24. Sunanda Mendiratta, Neelam Turk, Dipali Bansal, “Automatic speech recognition by cuckoo search optimization based artificial neural
network classifier”, 2015 International Conference on Soft Computing Techniques and Implementations (ICSCTI), pp. 29-34, 2015.
25. Sunanda Mendiratta, Neelam Turk, Dipali Bansal, “Isolated word recognition system for speech to text conversion using ANN”,
IIOAB, pp. 78-91, 2016.
26. Sunanda Mendiratta, Neelam Turk, Dipali Bansal, “Fuzzy based selection of dwt features for automatic speech recognition system for
man machine interaction with CS-ANN classifier”, IIOAB, pp. 222-240, 2016.
27. Sonia Sunny, David Peter S, K. Poulose Jacob, “Performance of different classifiers in speech recognition”, IJRET, pp. 590-597, 2013.
28. M. Kalamani, Dr. S. Valarmathy, S. Anitha, “Automatic Speech Recognition using ELM and KNN Classifiers”, International Journal
of Innovative Research in Computer and Communication Engineering, pp. 3145-3152, 2015.

Authors: Elamurugan Periyasamy, Ragul S, Jainul Aafdeen,Varathan G

Paper Title: Controlling of Reactor Temperature and Re-Generator Temperature in FCCU

Abstract: The paper shows the machine of RGA investigation, decoupler and prescient command to the Fluid
Catalytic Cracking Unit (FCCU).A circuitous activating archetypal of the riser–regenerator arrangement is
urbanized and after acclimated in the controller. A archetypal FCCU processes a ample bulk of the feedstock
into added admired products. The all-embracing bread-and-butter allowances of a adorning could be appreciably
added if able ascendancy and enhancement strategies are implemented. Ascendancy of the FCC continues to be
a arduous and important problem. An ascendancy arrangement is composed of several interacting ascendancy
loops. The amount of achievable another configurations of ascendancy loops is actual large. Multi bend
ascendancy systems are generally acclimated for multivariable progressions as of their minimalism. Relative
accretion arrangement is acclimated to abbreviate the alternation and bidets the capricious pairings and again
decoupler is developed to abolish alternation completely. Stabilization can be accomplished through apish
accomplishing of a archetypal predictive ascendancy (MPC).

Keywords: FCCU, Control, RGA, Decoupler, MPC.

References:

406. 1. Elamurugan.P,and Dinesh Kumar D.2010.“Modeling and Control of Fluid Catalytic Cracking Unit in Petroleum
Refinery.”International Journal of Computer Communication and Information System 2 (1): 55- 2332-
59.doi:http://www.ijcns.com/pdf/11.pdf 233
2. N. Rajeev.,Krishna Prasad,and U. B. Reddy Ragul.2015. “Process Simulation and Modeling of Fluidized Catalytic Cracker
Performance in Crude Refinery.”Petroleum Science and Technology 33:110–117.doi:
8
http://www.researchgate.net/publication/269985843
3. Elamurugan P, Dinesh kumar D and Siva K. 2019. “Investigation of Multivariable Controllers for Fluid Catalytic Cracking Unit”.
Carribean Journal of Science, 53,(1):565-571. doi: http://www.caribjsci.com/gallery/44.pdf
4. JafarSadeghzadehAhari.,Amir Farshi,and KhaledForsat.2008. “A Mathematical modeling of riser reactor in industrial unit.”Petroleum
&coal50(2):15-24.doi:http://www.researchgate.net/publication/26524354
5. ChunyangJia., SoharbRohani, and Arthur Jutan.2003. “FCC unit modeling, identification and model predictive control, a simulation
study.”Chemical Engineering and processing 42: 311-325.doi: http://www.sciencedirect.com/science/article/pii/S0255270102000557
6. Elamurugan P and Siva K. 2016.“Analysis of Multivariable Controller for Fluid Catalytic Cracking Unit in Petroleum Refinery”.
Journal of Advances in Chemistry, 12(18,):5088-5095.doi: https://doi.org/10.24297/jac.v12i18.605
7. Raluca Roman., Zoltan K. Nagy., Mircea V. Cristea, and Serban P. Agachi. 2009. “Dynamic modelling and nonlinear model predictive
control of a Fluid Catalytic Cracking Unit.”Computers and Chemical Engineering33:605–
617.doi:http://www.sciencedirect.com/science/article/pii/S0098135408001622
8. RohitRamachandran., G.P.Rangaiah, and S.Lakshminarayanan. 2007. “Data analysis, modeling and control performance enhancement
of an industrial fluid catalytic cracking unit” Chemical Engineering Science 62: 1958 – 1973. doi:
http://www.sciencedirect.com/science/article/pii/S0009250906007974.
9. Mircea V. Cristea., Serban P. Agachi, and VasileMarinoiu.2003. “Simulation and model predictive control of a UOP fluid catalytic
cracking unit” Chemical Engineering and Processing 42: 67- 91.
doi:http://www.sciencedirect.com/science/article/pii/S025527010200017X
10. Raj Kumar Gupta., VineetKumar,and V.K. Srivastava. 2007. “A new generic approach for the modeling of fluid catalytic cracking
(FCC)riser reactor Chemical Engineering Science 62: 4510–
4528.doi:http://www.sciencedirect.com/science/article/pii/S0009250907004046
11. MehranHeydari., Habib Ale Ebrahim, and BahramDabir. 2010.“Modeling of an Industrial Riser in the Fluid Catalytic Cracking
Unit.”American Journal of Applied Sciences 7 (2): 221-226.doi: http://thescipub.com/PDF/ajassp.2010.221.226.pdf
12. Elamurugan P and Siva K. 2016. “Comparison of Decoupler with PID Controller and Model Predictive Controller for the Fluid
Catalytic Cracking Unit in Petroleum Refinery‟. Asian Journal of Information Technology,15(17):3356-
3365.Available:http://docsdrive.com/pdfs/medwelljournals/ajit/2016/3356-3365.pdf

Authors: Mainejar Yadav, Ranvijay

Paper Title: Collusion Attacks in XOR Based RG-VSS


Abstract: Visual secret sharing (VSS) is a well-known technique from the past few decades for data security.
Recently, XOR based VSS has attracted many researchers due to its lossless or good visual quality of
reconstructed secret image. Cheating in visual cryptography based VSS was introduced by Horng et. al. in 2006.
Cheating occurs when a dishonest participant presents fake share and performs stacking of fake share with
honest participants who have genuine share, thereby revealing the fake secret image instead of the original secret
image. Cheating occurs when some XOR based VSS are exposed to collusion attacks. Here, in this paper, we
have demonstrated and proved that there is a security issue in existing XOR based VSS schemes.

Keywords: Cheating problem, Collusion attack, Random grids, Visual secret sharing.

References:

1. A.Shamir (1979) “How to share a secret”, Communications of the ACM, 22, 612–613.
2. C.M. Hu, W.G.Tzeng (2007) “Cheating prevention in visual cryptography”, IEEE Transactions on Image Processing. 16(1), 36–45.
3. C.N. Yang, A.G.Peng, T.S.Chen (2009) “MTVSS: Misalignment Tolerant Visual Secret Sharing on resolving alignment difficulty”,
Signal Processing. 89(8), 1602–1624.
407. 4. D. Ou, W. Sun and X. Wu. (2015) “Non-expansible XOR based visual cryptography scheme with meaningful shares”, Signal 2339-
Processing. 108,604-621.
5. D.S.Tsai, T.H.Chen, G.Horng (2007) “A cheating prevention scheme for binary visual cryptography with homogeneous secret 234
images”, Pattern Recognition, 40(8), 2356–2366. 5
6. G.Blakley (1979) “Safe guarding cryptographic keys”, AFIPS Conference. 313–317.
7. G.B.Horng, T.H.Chen, D.S.Tsai (2006) “Cheating in visual cryptography”, Designs, Codes and Cryptography. 38(2), 219–236.
8. M.Naor, A. Shamir (1994) “Visual cryptography”, Advance in Cryptology: Eurocrypt94, Lecture Notes in Computer Science. 950, 1–
12.
9. M.Naor, B.Pinkas (1997) “Visual authentication and identification. International Cryptology Conference on Advances in Cryptology”,
Lecture Notes in Computer Science. 1294, 322–336.
10. O.Kafri, E.Keren (1987) “Encryption of pictures and shapes by random grids”, Optics Letters. 12(6), 377–379.
11. R.D.Prisco, A.D.Santis (2006) “Cheating immine (2,n)-threshold visual secret sharing scheme. Security and Cryptography for
Networks”, Lecture Notes in Computer Science. 4116.
12. R.Lukac, K.N. Plataniotis (2005) “Bit-level based secret sharing for image encryption”, Pattern Recognition. 38(5), 767–772.
13. S.J.Shyu (2007) “Image encryption by random grids”, Pattern Recognition. 40, 1014–1031.
14. T.H.Chen, D.S.Tsai (2006) “Owner–customer right protection mechanism using a watermarking scheme and a watermarking protocol”,
Pattern Recognition. 39(8), 1530–1541.
15. T.H.Chen, K.H.Tsao (2009) “Visual secret sharing by random grids revisited”, Pattern Recognition. 42, 2203–2217.
16. T.H.Chen, K.H.Tsao (2011) “Threshold visual secret sharing by random grids” Journal of Systems and Software. 84, 1197–1208.
17. X.Yan, S. Wang, X. Niu and Ching-Nung Yang (2015) “Random grid based visual secret sharing with multiple decryptions”, J. Vis.
Commun. Image R. 26, 94-104.
18. Yao-Sheng Lee, Tzung-Her Chen (2012) “Insight into collusion attacks in random-grid-based visual secret sharing”, Signal Processing.
92,727-736.

Authors: Rajesh Kumar Upadhyay, Subodh Kumar, Manoj Kumar Rana

Paper Title: Impact of Energy and Mobility on MANETs Routing Protocols: AODV and DSR
Abstract: Routing protocols can be tested in realistic conditions of Mobile Ad-hoc network (MANET)). The
performance of MANET depends on different parameters such as used number of nodes, mobility speed, routing
protocols, mobility model and energy models etc. In this paper, researchers made an effort to analyze the impact
of energy and mobility on the performance of AODV and DSR routing protocols with varying mobility speed
under random waypoint mobility model and radio energy models in the MANET. Detailed simulations have
been carried out using QualNet simulator for 50 nodes. Performance of AODV and DSR routing protocols has
been analyzed under the premise of performance metrics namely average throughput, average end to end delay
and average jitter using CBR traffic patterns.

Keywords: AODV, DSR, Speed, Mobility Model, Energy Model.


408.
References: 2346-
235
1. T. Larsson and N. Hedman, “Routing Protocols in Wireless Adhoc Networks: A Simulation Study”, Master‘s Thesis, Lulea Tekniska 2
University of Technology, Stockholm, 1998.
2. D. Djenouri, A. Derhab and N. Badache, “Ad-hoc Networks Routing Protocols and Mobility”, International Arab Journal of
Information Technology, 3(2), pp. 126-133, 2006.
3. R. K. Upadhyay and S. Kumar, “Effect of Mobility on Energy Consumption in MANET Routing Protocols: A Review Study”, IRACST-
International Journal of Computer Networks and Wireless Communications (IJCNWC), ISSN: 2250-3501, Vol.8, No.3, pp. 66-71, May-
June 2018.
4. T. Camp, J. Boleng and V. Davies, “A Survey of Mobility Models for Ad-hoc Network Research”, Wireless Communication & Mobile
Computing (WCMC): Special issue on Mobile Ad-hoc Networking: Research, Trends and Applications, 2(5), pp. 483-502, 2002.
5. P. K. Varshney, G. S. Agrawal and S. K. Sharma, “Analysis the Impact of Radio Energy Models on Aspects of Power Consumption in
Routing Protocols of Wireless Ad-hoc Networks using FTP traffic pattern”, International Journal of Modern Computer Science and
Applications, Volume No.-4, Issue No.-1, pp. 13-18, 2016.
6. S. Kumar., G. S. Agrawal, and S. K. Sharma, “Impact of Mobility on MANETs Routing Protocols Using Group Mobility Model”, I.J.
Wireless and Microwave Technologies, 2, pp. 1-12, 2017.
7. B. Chen and C. H. Chang, “Mobility Impact on Energy Conservation of Ad-hoc Routing Protocols”, SSGR-2003, pp. 1-7, 2003.
8. S. Hamma, S., E. Cizeron, H. Issaka and J. P. Gredon J. P., “Performance Evaluation of Reactive and Proactive Routing Protocol in
IEEE 802.11 Ad-hoc Network”, ITCom 06 - Next Generation and Sensor Networks, Boston, pp. 638-709, 2006.
9. F. Maan and N. Mazhar, “MANET Routing Protocols Vs Mobility Models: A Performance Evaluation” 3rd International Conference
on Ubiquitous and Future Networks, IEEE, pp.179-184, 2011
10. M. Kaushal and P. Singh, “Performance Analysis of DSR, DYMO, OLSR and RIP Protocols of Manet using CBR and VBR
Transmission Traffic Mode”, International Journal of Current Engineering and Technology, ISSN 22774106, INPRESSCO, pp. 1541-
1448, 2013
11. D. Dhakal and K. Gautam , “Performance Comparison of AODV and DSR Routing Protocols in Mobile Ad- hoc Networks: A Survey”,
International Journal of Engineering Science and Innovative Technology (IJESIT), ISSN: 23195967, Volume 2, Issue 3, pp. 258-265,
2013.
12. D. Vir, S. K. Agrawal and S. A. Imam, “Investigation on Aspects of Power Consumption in Routing Protocols of MANET using Energy
Traffic Model”, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 2, Issue 1,
pp 590-598, 2013.
13. S. Kumar., G. S. Agrawal, and S. K. Sharma, “Performance Comparison of OLSR and Star Routing Protocols in MANETS using
Random Waypoint Mobility Model”, International Journal of Development Research, ISSN 22309926, pp. 1656-1659, 2014.
14. I. M. A. Fahmy, L. Nassef and H. A. Hefny, “Energy Consumption Efficiency and Performance Evaluation of DSDV and AODV
Routing Protocols”, International Journal of Computer Networks and Wireless Communications, Vol. No. 2, pp. 113-118, 2014.
15. P. K. Varshney, G. S. Agrawal, S. K. Sharma, “Energy Consumption Analysis of Wireless Ad-hoc Networks Routing Protocols under
Different Energy Models”, International Conference IAET-2016 Special Issue), Vol. 5, No. 1, pp. 250-253, 2016.
16. P. Acharekar, S. Mehta and S. Panbude, ‘Comparative Study for Performance Analysis of Routing Protocols in Mobility and Non-
Mobility Scenarios’, Emerging Trends in Electrical, Electronics & Instrumentation Engineering: An International Journal, Vol. 3, No.
1/2/3, pp.1-18, 2016.

Authors: Jasbir Singh, Sandeep Sharma, Amrinder Pal Singh

Paper Title: Oxidation Effects on wear Resistance of SS-304 and SS-316 Austenitic Stainless Steels
Abstract: Present manuscript deals with the sliding wear behaviour of SS- 304 and SS-316 with and without
oxidation prior to wear test. The dry sliding wear performance of the steel samples was noted in as received
conditions and then after oxidizing the sample at 600°C for 6 hours. The variations in hardness of both the steels
before and after oxidation were estimated. The dry sliding wear tests were carried out using pin on disk
technique at different sliding velocity and different loads, by using hardened steels counter surface. The worn
surfaces were characterised by using FE-SEM/EDS analysis to ascertain the mechanism of wear in the samples.
From various characterisation results and observations of volume loss, the effect of prior oxidation was analysed
for the both stainless steels. It has been found that the oxidation leads to the formation of some protective oxides
which leads to increase in the hardness of the samples due to which the wear performance was improved
compared to the as received alloys.

Keywords: Sliding wear, Oxidation, Hardness, SEM.

References:

1. M.A. Barcelos, M.V. Barcelos, J.desarujo, A.R. Franco Jr., E.A. Vieira,“Wear resistance of AISI 304 stainless steel submitted to low
temperature plasma carburizing”, REM - Int. Eng. J., vol. 70, 2017, pp. 293-298.
2. T. Kumar, P. Jambulingam , M. Gopal and A. Rajadurai, “Surface hardening of AISI 304, 316, 304l and 316l SS using cyanide free salt
bath nitriding process”, International Symposium of Research Students on Materials Science and Engineering, December 2002-04
Chennai India.
3. S.G.Sapate1, Amit Kumar, R.K.Khatirkar, S.Chandel, “Abrasive Wear Properties of Plasma Nitrided H11 Steel”, Proc. of Int. Conf. on
Advances in Mechanical Engineering 2012
4. R. Goyal, K. Singh, S. Singla, “Wear Behaviour of Thermal Spray Coating Process on Carbon Steel”, IJRMET Vol. 4, Issue 2, Spl- 2
409. May - October 2014.
5. C. Tassin, F. Laroudie, M. Pons, L. Lelait, “Improvement of the wear resistance of 316L stainless steel by laser surface alloying”,
2353-
Surface and Coatings Technology 80(1), pp. 207-210. 235
6. E. Wen, R. Song , W. Xiong, “Effect of Tempering Temperature on Microstructures and Wear Behavior of a 500 HB Grade Wear- 7
Resistant Steel”, Metals, 9, 2019, pp.45-52;
7. , L.H. Paijan, M.N. Berhan, M.S. Adenan, N.F.M. Yusof, E. Haruman, “ Structural Development of Expanded Austenite on Duplex
Stainless Steel by Low Temperature Thermo chemical Nitriding Process”,.Adv. Mater. Res. Vol.576, 2012, pp. 260–263.
8. D. Oliveira, W.R. Kurelo, B.C.E.S. Ditzel, D.G. Serbena, F.C. Foerster, C.E.de Souza, “On the S-phase formation and the balanced
plasma nitriding of austenitic-ferritic super duplex stainless steel”, Appl. Surf. Sci., vol. 434, 2018, pp. 1161–1174.
9. Y. Sun,X. Li, T. Bell, “ Structural characteristics of low temperature plasma carburised austenitic stainless steel”, Mater. Sci. Technol.,
vol. 15, 1999, pp. 1171–1178.
10. N. Mingolo,T. schiptschin, A.P. Pinedo, “On the formation of expanded austenite during plasma nitriding of an AISI 316L austenitic
stainless steel” Surf. Coat. Technol. vol. 006,2012, pp. 4215–4218
11. F. Borgioli, A. Fossati, E. Galvanetto, T. Bacci, “Glow-discharge nitriding of AISI 316L austenitic stainless steel: Influence of
treatment temperature”, Surf. Coat. Technol. VOL. 200, 2005, pp. 2474–2480
12. M.P. Fewell,. D.R.G. Mitchell, J.M. Priest,, K.T.Short, G.A. Collins, “The nature of expanded austenite”, Surf. Coat. Technol. vol.131,
2000, pp. 300–306.
13. A. Recco, D. Lopez, A.F. Bevilacqua, F. Silva, A.P. Tschiptschin, “Improvement of the slurry erosion resistance of an austenitic
stainless steel with combination of surface treatment: nitriding and TiN coating”, Surf. Coat. Technol. vol. 202, 2007, pp. 993-997.
14. N. L .Parthasarathi, M. Duraiselvam, “Improvement of High Temperature Wear Resistance of AISI 316 ASS through NiCrBSiCFe
Plasma Spray Coating”, Journal of Minerals & Materials Characterization & Engineering, vol. 9, No.7, 2010, pp.653-670,.
15. L. Bourithis, G. Papadimitriou, “Three body abrasion wear of low carbon steel modified surfaces”, Wear, vol.258, 2005, pp. 1775-
1786.
16. S.Das, “Processing and Characterization of Plasma Sprayed Ceramic Coatings on Steel Substrate: Part I. On Coating Characteristics”,
Metallurgical and Materials Transactions A, vol. 34 (9), 2003:, pp. 1909 – 1918.
17. Cheng-HsunHsu ; Wei-Che Huang ; Chi-Yu Chang ,Improvement on wear resistance of 304 stainless steel via Cr-C-O Arc-coatings,
2017 International Conference on Applied System Innovation (ICASI).
18. XiaoyueJin,BinWang,WenbinXue⁎, Jiancheng Du, Xiaoling Wu, Jie Wu, “Characterization of wear-resistant coatings on 304 stainless
steel fabricated by cathodic plasma electrolytic oxidation, Surface and Coatings Technology, Volume 236, 15 December 2013, Pages
22-28.
19. Engineering Coatings—Design and Application, 2nd ed., S. Grainger and J. Blunt, Ed., Woodhead Publishing Ltd., 1999, p 7.
20. D. L. Duan, S. Li, X. H. Duan, S. Z. Li (2005) “Wear behavior of thermally sprayed coatings under different. loading conditions”,
Tribology Transactions, vol. 48 issue 1, pp. 45-50.
21. Y. N. V. Sai Ram , Syed Kammaluddin , Shabana , Deva Raj and P. MastanRao, International Journal of Advanced Science and
Technology , vol.93 (2016), pp.45-54.
22. K. Nomura, Y. Ujihira, “Analysis of oxide layers on stainless steel (304, and 316) by conversion electron faussbauer spectrometry”,
Journal Of Materials Science vol. 25, 1990, pp.1745-1750.
23. H. Hooshyar, T. Jonsson, J. Hall, J. E. Svensson, L. G. Johansson, J. Liske , “The Effect of H2 and H2O on the oxidation of 304L-
stainless steel at 600°C “, General behavior (part I)’’ Oxidation of Metals, 2015, pp 1-22.
24. R. Guillamet, J. Lopitaux, B. Hannoyer and M. Lenglet, “Oxidation of stainless steels (AISI 304 and 3 16) at high temperature.
Influence on the metallic substratum”, Journal de Physique IV Colloque vol. 03 (C9), 1993, , pp.C9-349-356.
25. T. Ujiro, K. Yoshioka, R. W. Staehle, “Differences in Corrosion Behavior of Ferritic and Austenitic Stainless Steels”, Corrosion.
1994;50(12):953-962.
26. W.N. Liu, X. Sun, E. Stephens, M.A. Khaleel, “Life prediction of coated and uncoated metallic interconnect for solid oxide fuel cell
applications”, J. Power Sources vol. 189, 2009, pp. 1044-1050.
27. D.J.Young, “High temperature oxidation and corrosion of metals”, Corrosion Series, ed. T. Burstein. vol. 1. 2008, Elsevier Science.
28. M.X. Wel, S.Q. Wang,l. Wang, X.H. Cui, “Wear and friction characteristics of a selected stainless steel”, Tribology Transactions, vol.
54, 2011, pp. 840-848.
29. T. F. J.Quinn, J. L. Sullivan, D. M. Rowson, “Developments in the Oxidational Theory of Mild Wear,” Tribol. Int., 13, 1980, pp 153-
158.
30. R. C. Dante, Handbook of Friction Materials and their applications Woodhead Publisher, 2016, pp. 123-134.
31. S.Q. Wang, M.X. Wei, F. Wang, “Transition of Mild Wear to Severe Wear in Oxidative Wear of H21 Steel”, Tribol Lett 32, 2008, pp.
67-72.
32. H.So, D.S.Yu, C.Y. Chuang, “ Formation and wear mechanism of tribo-oxides and the regime of oxidational wear of steel”, Wear vol.
253, 2002, pp.1004–1015 .
33. G.A. Fontalvo, C. Mitterer, “The effect of oxide-forming alloying elements on the high temperature wear of a hot work steel”,
Wear 258, 2005, pp. 1491–1499.
Authors: Sumanjit Das, Sarojananda Mishra

Paper Title: Advanced Deep Learning Framework for Stock Value Prediction
Abstract: The main attractive feature to stock market is speedy growth of stock economic value in short yoke
of time. The investor analyses the demonstration, estimated value and growth of organizations before investing
money in market. The analysis may not be enough by using conventional process or some available methods
suggested by different researches. In present days large number of stocks are available in market it is very
difficult to study each stock by help of very few suggested foretelling methods. To know the anticipated stock
value we need some advanced prediction technology for stock market. This paper introduce an advanced skillful
method to plan and analyze the different organizers stock execution in market and prognosticate best suitable
stock by predicting close price of stock. The projected arrangement is based on multilayer deep learning neural
Network optimized by Adam optimizer. Recent 6 years (2010-2016) data of different organizations are applied
to the model to demonstrate the skillfulness of the projected proficient method. From result it has been
ascertained that the projected framework is best suited to all different data set of various sectors. The prediction
error is very minimal as visible from outcome graph of framework.

Keywords: Stock market, deep learning, multilayer perceptron, ANN, forecasting, soft computing.

References:

1. Malkiel BG A random walk down Wall Street: the time-tested strategy for successful investing. WW Norton & Company (2007).
2. Patel J, Shah S, Thakkar P, Kotecha K Predicting stock and stock price index movement using trend deterministic data preparation and
machine learning techniques. Expert Syst Appl 42 :( 2015) 259–268.
3. DOI: 10.1016/j.eswa.2014.07.040
410. 4. Patel J, Shah S, Thakkar P, Kotecha K Predicting stock market index using fusion of machine learning techniques. Expert Syst Appl 2358-
42: (2015) 2162–2172. doi>10.1016/j.eswa.2014.10.031
5. Anbalagan T and Maheswari, Classification and prediction of stock market index based on fuzzy metagraph, Procedia Computer
236
Science, 47 (2015) 214-221. doi.org/10.1016/j.procs.2015.03.200 7
6. M. Y. Chen and B. T. Chen. A hybrid fuzzy time series model based on granular computing for stock price forecasting, Information
Sciences, 294 (2015) 227-241.
7. S. M. Chen and P.Y. Kao. TAIEX forecasting based on fuzzy time series, particle swarm optimization technique and support vector
machines, Information Sciences, 247 (2013) 62-71. doi>10.1016/j.ins.2018.02.016
8. F. M. Talarposhti, H. J. Sadaei, R. Enayatifar, F. G. Guimares, M. Mahmud, T. Eslami, Stock market forecasting using a hybrid model
of exponential fuzzy time series, International Journal of Approximate Reasoning, 70 (2016) 79 –98. DOI:10.1016/j.ijar.2015.12.011
9. L. Y. Wei, C.H. Cheng and H.H. Wu. A hybrid ANFIS based on-period moving average model to forecast TAIEX stock, Applied Soft
Computing, 19 (2014) 86-92. doi.org/10.1016/j.asoc.2014.01.022
10. F. Ye, L. Zhang, D. Zhang, H. Fujita, Z. Gong, A novel forecasting method based on multi-order fuzzy time series and technical
analysis, Information Sciences, 367-368 (2016) 41 – 57.
11. S. M. Chen and W. S. Jian, Fuzzy forecasting based on two-factor second order fuzzy-trend logical relationship groups, similarity
measures and PSO techniques, Information Sciences, 391-392 (2017) 65 – 79. DOI:10.1109/TSMCB.2012.2223815
12. X. Zhong and D. Enke, A comprehensive cluster and classification mining procedure for daily stock market return forecasting,
Neorocomputing, 267 (2017) 152 – 168. DOI10.1016/j.neucom.2017.06.010
13. Park, K., & Shin, H. Stock price prediction based on a complex interrelation network of economic factors. Engineering Applications of
Artificial Intelligence, 26, (2013) 1550–1561. DOI 10.1016/j.engappai.2013.01.009
14. Shin, H., Hou, T., Park, K., Park, C.-K., & Choi, S. Prediction of movement direction in crude oil prices based on semi-supervised
learning. Decision Support Systems, 55, (2013) 348–358. doi.org/10.1016/j.intele.2017.02.001
15. Kia, A. N., Haratizadeh, S., & Heshmati, Z. Analysis and prediction of fluctuations for sector price indices with cross correlation and
association based networks: Tehran stock exchange case. Bonfring International Journal of Industrial Engineering and Management
Science, (2016) 37-95.
16. Narayan, P. K., Sharma, S. S., & Thuraisamy, K. S. Can governance quality predict stock market returns? new global evidence.
Pacific-Basin Finance Journal, 35, (2015) 367–380. DOI: 10.1016/j.pacfin.2015.02.007
17. R. Efendi, M. M. Deris and Z. Ismail, Implementation of fuzzy time series in forecasting of the non-stationary data, Int. Journal
Computation Intelligence and Applications, 15 (2016) 50-60. doi.org/10.1142/S1469026816500097
18. J. Watada, Fuzzy time-series analysis and forecasting of sales volume, Fuzzy Regression Analysis, (1992) 211 -227.
DOI10.1016/j.bbe.2017.01.003
19. J. Watada, S. Wang and W. Pedrycz. Building confidence-interval based fuzzy random regression models, IEEE Trans. Fuzzy Systems,
17 (6) (2009) 1273 –1283. doi.org/10.1109/TFUZZ.2009.2028331
20. N. Arbaiy and J. Watada. Linear fractional programming for fuzzy random based possibilistic programming problem, Int. J.
Simulation Systems Science and Technology, 14 (2) (2014) 24 – 30. DOI.org/10.1007/978-3-319-13153-5_9
21. R. Efendi, N. Arbaiy and M. M. Deris, Indonesian-Malaysian stock models using fuzzy random auto-regression, Proceeding Seminar
Nasional Teknologi Komunikasi dan Industri, (2017) 604-611. DOI: 10.1016/j.ins.2018.02.016
22. L. Shao, Y.-H. Tsai, J. Watada and S. Wang. Building fuzzy random autoregression model and its application, J. Watada et al., (Eds):
Intelligence Decision Technology 1 SIST, (15) (2012) 155 – 164. doi.org/10.1007/978-3-642-29977-3_16
23. H. Vata Arani and S. A. Torabi, Integrated material-financial supply chain master planning under mixed uncertainty, Information
Sciences, 423 (2018) 96– 114. DOI 10.1016/j.ins.2018.02.016
24. B. Zahiri, P. Jula and R. T. Moghaddam, Design of a pharmaceutical supply chain network under uncertainty considering perishability
and substitutability, Information Sciences, 423 (2018) 257 – 283. DOI 10.1016/j.ins.2017.09.046
25. Gurusen E, Kayakutlu G, Daim TU Using artificial neural network models in stock market index prediction. Expert Syst Appl 38
(2011) 10389–10397. DOI:10.1016/j.eswa.2011.02.068
26. Aboueldahab T, Fakhreldin Md , Prediction of stock market indices using hybrid genetic algorithm/particle swarm optimization with
perturbation term. In: International Conference on swarm intelligence (ICSI 2011), Cergy, (2011) 14–15.
27. Göçken M, Özçalıcı M, Boru A, Dosdoğru AT Integrating metaheuristics and artificial neural networks for improved stock price
prediction. Expert Syst Appl 44: (2016) 320–331. DOI 10.1016/j.eswa.2015.09.029
28. Lam AYS, Li VOK, Yu JJQ Real-coded chemical reaction optimization. IEEE Trans Evol Comput 16(3): (2012) 339–
353.doi.org/10.1155/2018/8042689
29. Nayak J, Naik B, Behera HS A novel chemical reaction optimization based higher order neural network (CRO-HONN) for nonlinear
classification. Ain Shams Eng J. (2015). https ://doi.org/10.1016/j.asej.2014.12.013
30. Nayak SC, Misra BB, Behera HS artificial chemical reaction optimization of neural networks for efficient prediction of stock market
indices. Ain Shams Eng J. (2015) doi.org/10.1016/j.asej.2015.07.015
31. Nayak SC, Misra BB, Behera HS (2017a) efficient financial time series prediction with evolutionary virtual data position exploration
Neural Comput App, (2017) l1–22.
32. https ://doi.org/10.1007/s00521-017-3061-1
33. Castillo, O., Melin, P.: Simulation and forecasting complex financial time series using neural networks and fuzzy logic. In: Proceedings
the IEEE the International Conference on Systems, Man and Cybernetics, vol. 4, (2001) 2664–2669. doi.org/10.1007/978-3-540-
24855-2_120
34. Kehagias, A., Petridis, V.: Predictive modular neural networks for time series classification. Neural Netw. 10(1), 31–49 (2000), 245–
250. doi: 10.1109/TNN.2002.804288
35. Maguire, L.P., Roche, B., McGinnity, T.M., McDaid, L.J.: Predicting a chaotic time series using a fuzzy neural network. Inf. Sci.
112(1–4), (1998) 125–136. doi.org/10.1016/S0020-0255(98)10026-9
36. Melin, P., Castillo, O., Gonzalez, S., Cota, J., Trujillo, W., Osuna, P.: Design of Modular Neural Networks with Fuzzy Integration
Applied to Time Series Prediction, vol. 41/2007, (2007) 265–273. Springer, Heidelberg. doi.org/10.1007/978-3-319-67946-4_6
37. Jang, J.S.R., Sun, C.T., Mizutani, E.: Neuro-Fuzzy and Soft Computing. Prentice Hall (1996)
38. Sollich, P., Krogh, A.: Learning with ensembles: how over-fitting can be useful. In: Touretzky, D.S., Mozer, M.C., Hasselmo, M.E.
(eds.) Advances in Neural Information Processing Systems, Denver, CO, vol. 8, (1996) 190–196. MIT Press, Cambridge, MA.
39. Hansen, L.K., Salomon, P.: Neural network ensembles. IEEE Trans. Pattern Anal. Mach. Intell. 12 (10), (1990) 993–1001.
doi.org/10.1109/34.58871
40. C.H. Aladag, U. Yolcu, E. Egrioglu, A.Z. Dalar, A new time invariant fuzzy time series forecasting method based on particle swarm
optimization, Appl. Soft Comput. 12 (2012) 3291–3299. doi.org/10.1016/j.asoc.2012.05.002
41. A.-S. Chen, M.T. Leung, Regression neural network for error correction in foreign exchange forecasting and trading, Comput. Oper.
Res. 31 (2004) 1049–1068.
42. N.G. Pavlidis, D.K. Tasoulis, M.N. Vrahatis, Financial forecasting through unsupervised clustering and evolutionary trained neural
networks, in: Proceedings of 2003 Congress on Evolutionary Computation, CEC'03, volume 4, Canberra, Australia, 8–12 Dec,( 2003),
2314–2321.
43. M. Rout, B. Majhi, R. Majhi, G. Panda, Forecasting of currency exchange rates using an adaptive ARMA model with differential
evolution based training, J. King Saud. Univ. - Comput. Inf. Sci. 26 (2014) 7–18. DOI 10.1016/j.jksuci.2013.01.002
44. R.D.A. Arau´Jo, T.A.E. Ferrira, A morphological-rank-linear evolutionary method for stock market prediction. Inf. Sci.237(2013), 3–
17 (2013). https://doi.org/10.1016/j.ins.2009.07.007.
45. B. Majhi, C.M. Anish, Multi objective optimization based adaptive models with fuzzy making for stock market forecasting. Neuro
Comput. 167(2015), 502–511. https://doi.org/10.1016/j.neucom.2015.04.044
46. R. Bisoi, P.K. Dash, A hybrid evolutionary dynamic neural network for stock market trend analysis and prediction using unscented
Kalman filter. Appl. Soft Comput. 19, (2014),41–56.
47. https://doi.org/10.1016/j.asoc.2014.01.039.
48. M. Senapati, S Das, S.N. Mishra, A Novel Model for Stock Price Prediction Using Hybrid Neural
49. Network, J. Inst. Eng. India Ser. B, Springer, (2018) . https://doi.org/10.1007/s40031-018-0343-7
50. C. Krauss, X.A. Do, N. Huck, Deep neural networks, gradient-boosted trees, random forests: statistical arbitrage on the s&p 500, Eur.
J. Oper. Res. 259 (2) (2017) 689–702. DOI: 10.1016/j.ejor.2016.10.031
51. J.-F. Chen, W.-L. Chen, C.-P. Huang, S.-H. Huang, A.-P. Chen, Financial time-series data analysis using deep convolution neural
networks, in: 20167th International Conference on Cloud Computing and Big Data (CCBD), IEEE,(2016), 87–92.
52. T. Fischer, C. Krauß, Deep Learning with Long Short-term Memory Networks for Financial Market Predictions, Tech. Rep., FAU
Discussion Papers in Economics, (2017). //EconPapers.repec.org/RePEc:zbw:iwqwdp:112017
53. Chong E, Han C, park FC, Deep learning Networks for stock market analysis and prediction: methodology, data representation and
case studies, Expert System Appl 83: 187-205, (2017). DOI:10.1016/j.eswa.2017.04.030
54. Heaton JB, polson NG, witte JH, Deep learning for finance: deep portfolios, Appl stoch models Bus Ind 33(1) (2017), 3-12.
https://doi.org/10.1002/asmb.2209
55. S.C. Nayak, B.B Mishra, H.S Behera, ACFLN: artificial chemical functional link network for prediction of stock market index,
Evolving systems,pp (2018) . DOI: 10.1007/s12530-018-9221-4
56. [52] D.P Kingma, J.L Ba, Adam: A method for stochastic optimization, conference ICLR (2015).
57. Mingyue, Q., Cheng, L., & Yu, S. Application of the Artifical Neural Network in predicting the direction of stock market index. In
2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS), IEEE (2016) (pp. 219–223).
58. H. D. Huynh, L. M. Dang, and D. Duong, “A new model for stock price movements prediction using deep neural network,” in
Proceedings of the Eighth International Symposium on Information and Communication Technology. ACM, (2017) , pp. 57–62.
59. Weng, B. , Tsai, Y.-T. , Li, C. , Barth, J. R. , Martinez, W. , & Megahed, F. M. (2017). An ensemble based approach for major U.S.
stock and sector indices prediction. Ap- plied Soft Computing . Under Review
60. Das, S.,Mishra, Senapati, M.R., (2018)A Novel Model for Stock Price Prediction Using Hybrid Neural Network ,Journal of Institute of
Engineering India Series-B, Springer.

Authors: Alycia Sebastian, K.Siva Sankar


Paper Title: A Secure Boot Loader System for Loading an Operating System with Fingerprint Authentication
Abstract: In today’s world, people are constantly on move and portable systems are in demand. With
technology advancement, people exploit different types of memory devices for a portable system. For any
external boot medium, the BIOS boot order setting change is required. The dynamic boot loader successfully
eliminated this dependency and allowed the user to directly boot from any portable USB. The usage of USB has
grown exponentially in recent years and securing it has become a major concern. In this paper, the USB is
devised as a highly secured portable boot medium with fingerprint authentication to ensure data security. It
performs feature extraction by combining both Local Directional Pattern (LDP) and Histograms of Oriented
Gradients (HOG) which improves the accuracy rate. The classification is performed by random forest classifier,
such that the intended users alone are granted access to the private storage area of the USB drive.

Keywords: Flash Memories, Fingerprint Recognition, Operating Systems, Portable computers.

References:

1. Tetmeyer, A., & Saiedian, H, “Security threats and mitigating risk for USB devices”, IEEE Technology and Society Magazine, 29(4),
p.44-49, 2010.
2. https://www.digitaltrends.com/computing/largest-flash-drives/
3. Pham, D. V., Syed, A., & Halgamuge, M. N, “Universal serial bus based software attacks and protection solutions”, Digital
investigation, 7(3), 172-184, 2011.
4. Alycia Sebastian, Dr. K. Siva Sankar,” Design of a Dynamic Boot Loader for loading an Operating System”, Journal of Computer
Science, volume 15, no.1, p.190-196, 2019.
5. Alycia Sebastian, Dr. K. Siva Sankar,” Design of a Boot Loader for Operating System”, Australian Journal of Basic and Applied
Sciences, volume 9, no 2, p. 368-374, 2015.
6. Sivaiah, B., Murthy, T. S. N., & Babu, T. V, “Boot multiple Operating Systems from ISO images using USB Disk”, IEEE International
Conference on Electronics and Communication Systems (ICECS), p. 1-5, February 2014.Daesung Moon, Youn hee Gil, Dosung Ahn,
411. Sung Bum Pan, [7] Mr. A. N. Magdum, Dr. Y. M. Patil,” A Secure Data Transfer Algorithm for USB Mass Storage Devices to Protect
Documents”, International Journal of Emerging Engineering Research and Technology, volume 2, no 4, p.78-84, July 2014. 2368-
7. Kyungroul Lee, Insu Oh, Yeunsu Lee, Hyeji Lee, Kangbin Yim, and Jungtaek Seo, “A Study on a Secure USB Mechanism That 237
Prevents the Exposure of Authentication Information for Smart Human Care Services,” Journal of Sensors, volume 2018(1) , p.1- 17, 4
2018.
8. Kyungroul Lee, Hyeungjun Yeuk, Youngtae Choi, Sitha Pho, Ilsun You, Kangbin Yim, “Safe Authentication Protocol for Secure USB
Memories”, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, volume 1, no. 1, p. 46-55,
2010.
9. Jaein Kim, Youngjun Lee, Kyungroul Lee, Taeyoung Jung, Dmitry Volokhov, and Kangbin Yim, “ Vulnerability to Flash Controller
for Secure USB Drives”, Journal of Internet Services and Information Security (JISIS), volume 3, no. 3/4, p. 136-145, November 2013.
10. Yongwha Chung and Chee Hamg Park. “Fingerprint Based Authentication for USB Token Systems”, Information security
Applications, Volume 2908 of the series Lecture Notes in Computer Science, p. 355-364, 2004.
11. Benjamin Rodes, Xunhua Wang, “Security analysis of a fingerprint-protected USB drive”, Proceedings of the 26th Annual Computer
Security Applications Conference, p. 89-96, December 2010.
12. Jeena Sara Viju, Sruthy, “SVM and Random Forest Classification Methods for Fingerprint Liveness Detection”, International Research
Journal of Engineering and Technology, volume 5, no.2, February 2018.
13. Bo Xu, Daozhi Lin, Lonbiao Wang, Hongyang Chao, Weifeng Li and Qinmin Liao, “Performance comparison of local directional
pattern to local binary pattern in off-line signature verification system”, IEEE 7th International Congress on Image and Signal
Processing, January 2015.
14. Tomasi, C., & Manduchi, R, “Bilateral filtering for gray and color images”, Proceedings of the 1998 IEEE International Conference on
Computer Vision, p. 839), January 1998.
15. Stark, J. A, “Adaptive image contrast enhancement using generalizations of histogram equalization”, IEEE Transactions on image
processing, volume 9, no.5, p. 889-896, 2000
16. Dalal, N., & Triggs, B, “Histograms of oriented gradients for human detection”, International Conference on computer vision & Pattern
Recognition (CVPR'05) IEEE Computer Society, volume 1, p. 886-893), June 2005.
17. Jabid, T., Kabir, M. H., & Chae, O, “Local directional pattern (LDP)–A robust image descriptor for object recognition”,7th IEEE
International Conference on Advanced Video and Signal Based Surveillance, p.482-487, August 2010.
18. Mori, T, ”Information gain ratio as term weight: the case of summarization of IR results Proceedings of the 19th international
conference on Computational linguistics, volume 1, p.1-7, September 2002.
19. Denil, M., Matheson, D., & De Freitas, N, “Narrowing the gap: Random forests in theory and in practice”, International conference on
machine learning, p. 665-673, January 2014.
20. Cunningham, P., & Delany, S. J, “k-Nearest neighbour classifiers”, Multiple Classifier Systems, volume 34, no. 8, p. 1-17, 2007.
21. Tipping, M. E, “The relevance vector machine”, In Advances in neural information processing systems, p. 652-658 , 2007.
Authors: N.Rajeswaran, T.Samraj Lawrence, R.P.Ramkumar, N.Thangadurai
An Efficient Technique to Remove Gaussian Noise and Improve the Quality of Magnetic
Paper Title:
Resonance Image
Abstract: Medical Resonance Imaging (MRI) is very useful in different medical applications for diagnosis the
diseases in human body. But the main problem arising in MRI images is presence of various noises. These
noises are affecting the originality of the MRI images and producing erroneous results. Here Brain MRI images
are used for analysis of noise. Brain images are fractal in nature and especially those images are affected by
412. various noises. In this paper we discussed about the Gaussian noise in brain MRI image. The effect of this noise
is reduced by wavelet based thresholding techniques. They are namely Visu shrink, SURE shrink and Bayes 2375-
shrink. These three methods are applied to the brain MRI images and obtained results are compared by 237
PSNR(Peak signal to Noise ratio), MSE(Mean Square Error),Absolute error, Fractal dimension, IEF(Image 7
Enhancement Factor),Normalized cross correlation and structural content.

Keywords: MRI Images, Gaussian Noise, Wavelet Thresholding, PSNR,MSE, NK, and IEF.

References:
1. N. Rajeswaran and C. Gokilavani, 2016. Reduction of FBM Noise in Brain MRI Images Using Wavelet Thresholding Techniques.
Asian Journal of Information Technology, 15: 855-861.
2. D. L. Dononho, "Denoising by soft-thresholding", IEEE Transactions on Information Theory, p.613-622, December 1995.
3. Nilesh Bhaskarrao Bahadure, Arun Kumar Ray, and Har Pal Thethi, “Image Analysis for MRI Based Brain Tumor Detection and
Feature Extraction Using Biologically Inspired BWT and SVM,” International Journal of Biomedical Imaging, vol. 2017, Article ID
9749108, 12 pages, 2017. https://doi.org/10.1155/2017/9749108.
4. G.R.Thippeswamy and Dr.P.K.Tiwari, “Fractal Geometry in Image Processing”, International Journal of Digital Communication and
Networks (IJDCN), Volume 1, Issue 1, pp.24-28, July 2014.
5. M. Ghazel, G. Freeman, E. Vrscay, "Fractal-Wavelet Image Denoising Revisited", IEEE Transactions on Image Processing, vol. 15, no.
9, September 2006.
6. D. H. Shin, R. H. Park, S. J. Yang, "Block based noise estimation using adaptive Gaussian filtering, " IEEE Transaction On Consumer
Electronics, vol. 51, no. 1, pp. 218-226, 2005.
7. N. Ramanaiah & S. Kumar, (2013). Removal of high density salt and pepper noise in images and videos using denoising methods.
IJCSMC, Vol. 2, Issue. 10, October 2013, pg.234 – 242.
8. S. Bacchelli, S. Papi, "Image Denoising Using Principal Component Analysis in the Wavelet Domain",Journal of Computational and
Applied Mathematics, vol. 189, pp. 606-21, 2006.
9. L. Jiang and W. Yang, "Adaptive Magnetic Resonance Image Denoising Using Mixture Model and Wavelet Shrinkage", Proceedings
of 7th Digital Image Computing: Techniques and Applications, 10-12 Dec. 2003, Sydney, Australia.
10. K. Kannan and S. A. Perumal, "Optimal Decomposition Level of Discrete Wavelet Transform for Pixel Based Fusion of Multi -
Focused Images," Conference on Computational Intelligence and Multimedia Applications, 2007. International Conference on,
Sivakasi, Tamil Nadu, 2007, pp. 314-318.
Authors: T.Lakshmi Siva Rama Krishna, P.Bandavi, K.Priyanka, V.P.Vivek

Paper Title: Novel User Level Data Leakage Detection Algorithm


Abstract: Data leakage detection (DLD) is the most widely used detection technique in many applications
such as etc. detecting data leakage by various data sources is an important research issue. Several researchers
contributed to detect the data leakage by proposing various techniques. In the existing DLD techniques the
performance metrics such as accuracy and time have been neglected. In this paper, we have proposed a new
DLD algorithm and named it as novel user level data leakage detection algorithm (NULDLDA). In the proposed
NULDLDA we have considered the user point of view to know the leakage of data by which agent among
several existing agents. We have implemented and compared the NULDLDA with existing DLD. The
experimental results indicate that proposed NULDLDA improved the performance over DLD with respect to
time and accuracy.

Keywords: IT; watermarking guilty agent; explicit data; DLP (data leakage prevention).

References:

1. DanfengYao,XiaokuiShu and Elisa Bertino, Fellow IEEE,,”Privacy-Preserving Detection of Sensitive Data Exposure”, IEEE
TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 10, NO. 5, MAY 2015
2. A. Broder and M. Mitzenmacher, Network applications of bloom filters: A survey,Internet Math., vol. 1, no. 4, pp. 485509, 2004..
3. H. Yin, M. Egele, D. Song, C. Kruegel, and E. Kirda, “Panorama: Capturing system wide information flow for malware detection and
analysis”, in Proc. 14th Association for Computer Machinery Conf. Comput. Commun.Secur., 2007, pp. 116127.
4. G. Karjoth and M. Schunter, ‘A privacy policy model for enterprises’, in Proc. 15th IEEE Comput.Secur. Found. Workshop, Jun. 2002,
413.
pp. 271281. 2378-
5. K. Borders, B. Lau, , E. V. Weele and A. Prakash, “Protecting confidential data on personal computers with storage capsules”, in Proc. 238
18th USENIX security 1
6. Symp., 2009, pp. 367382.
7. A. Nadkarni and W. Enck, Preventing accidental data disclosure in modern operating systems, in Proc. 20th Association for Computer
Machinery Conf. Comput.Commun.Secur., 2013, pp 10291042.
8. Y. Jang, B. D. Payne,, S. P. Chung and W. Lee,” Gyrus: A framework for user-intent monitoring of text-based networked
applications”, in Proc. 23rd USENIX
9. Security Symp., 2014, pp. 7993.
10. X. Shu and D. Yao, Data leak detection as a service, in Proc. 8th Int. Conf. Secur. Privacy Commun.Netw., 2012, pp. 222240.
11. MogullR.Understandingandselectingadatalosspreventionsolution.Retrieved from 〈https://securosis.com/assets/library/reports/DLP-
Whitepaper.pdf〉; 2010.
12. Boehmer, Wolfgang. "Analyzing Human Behavior Using Case-Based Reasoning with the Help of Forensic Questions." In Advanced
Information Networking and Applications (AINA), 2010 24th IEEE International Conference on, pp. 1189-1194. IEEE, 2010.
13. Shabtai, Asaf, Yuval Elovici, and LiorRokach.“A survey of data leakage detection and prevention solutions”.Springer Science &
Business Media, 2012.
14. Yu, Fang, Zhifeng Chen, YanleiDiao, T. V. Lakshman, and Randy H. Katz. "Fast and memory-efficient regular expression matching
for deep packet inspection."In Architecture for Networking and Communications systems, 2006.ANCS 2006. ACM/IEEE Symposium
on, pp. 93-102. IEEE, 2006.
15. Hackl, Andreas, and Barbara Hauer."State of the art in network-related extrusion prevention systems."Proceedings, 7th international
symposuim on database engineering and applications (2009): 329-35.
16. Y. Shapira, B. Shapira, and A. Shabtai. Content-based data leakage detection using extended fingerprinting,2013.
17. T. F. Gharib, M. M. Fouad, A. Mashat, and I. Bidawi,Self organizing map-based document clustering using WordNet ontologies Int. J.
Com- put. Sci. Issues, vol. 9, no. 1, pp. 8895, 2012.

Authors: Nivedita Shrivastava, Bibhudendra Acharya

Paper Title: FPGA Implementation of RECTANGLE Block Cipher Architectures


Abstract: In recent time, various lightweight algorithms have been proposed to provide security in a
constrained resource environment. With so many algorithms and their different implementations, it is hard to
choose the appropriate security primitive for an application. In this work, various hardware implementations of
lightweight block cipher RECTANGLE is proposed like Iterative design, 16-bits architecture, Reduced
Substitution box design, RAM-based design and Iterative design with Partial loop unrolled. These designs
provide aid in overcoming the problem of security in a constrained resource environment. Architectures are
designed and implemented in various FPGA platforms. Results are extensively evaluated and compared on the
basis of throughput, throughput/slice, area utilization, energy requirement and power consumption for their
implementation in different FPGA platforms. Best trade-off among throughput and area is given by Iterative
design with partial loop unrolling. It also gave best energy consumption values for all FPGAs. Ram-based
design utilized least number of registers for its implementation.

Keywords: BRAM, FPGA, lightweight cryptography, Security, RECTANGLE Cipher, Hardware architecture.
414.
References: 2382-
239
1. P. Pawar, and A. Trivedi, “Device-to-Device Communication Based IoT System: Benefits and Challenges.” IETE Technical Review, 1
2018, pp.1-13.
2. C. A. Lara-Nino, A. Diaz-Perez, and M. Morales-Sandoval, “Lightweight hardware architectures for the present cipher in FPGA.”
IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 64, no. 9, 2017, pp.2544-2555.
3. A. A. R. Haeri, M. G. Karkani, M. Sharifkhani, M. Kamarei, and A. Fotowat-Ahmady, “Analysis and design of power harvesting
circuits for ultra-low power applications,” IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 64, no. 2, 2017, pp. 471–479, Feb.
4. Z. Zou, D. S. Mendoza, P. Wang, Q. Zhou, J. Mao, F. Jonsson, H. Tenhunen, and L. R.Zheng, “A low-power and flexible energy
detection IR-UWB receiver for RFID and wireless sensor networks,” IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 58, no. 7, pp.
1470–1482, Jul. 2011.
5. C. Alippi, and C. Galperti, “An adaptive system for optimal solar energy harvesting in wireless sensor network nodes,” IEEE Trans.
Circuits Syst. I, Reg. Papers, vol. 55, no. 6, pp. 1742–1750, Jul. 2008.
6. M. Kar, A. Kumar, D. Nandi, and M. K. Mandal “Image encryption using DNA coding and hyperchaotic system”, IETE Technical
Review, 2018, pp.1-12.
7. N. F. Pub, "197: Advanced encryption standard (AES)," Federal Information Processing Standards Publication, vol. 197, pp. 0311,
2001.
8. D. E. Standard, "Federal information processing standards publication 46," National Bureau of Standards, US Department of
Commerce, vol. 23, 1977.
9. A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann, M. J. Robshaw, Y. Seurin, and C. Vikkelsoe, "PRESENT: An ultra-
lightweight block cipher," in International Workshop on Cryptographic Hardware and Embedded Systems, vol. 4727. Berlin Germany:
Springer, 2007, pp. 450-466.
10. Z. Xiang, W. Zhang, Z. Bao, and D. Lin, "RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms," Science
China Information Sciences, vol. 58, 2015, pp. 1-15.
11. Z. Gong, S. Nikova, and Y. W. Law, "KLEIN: a new family of lightweight block ciphers," International Workshop on Radio Frequency
Identification: Security and Privacy Issues, vol. 7095, 2011, pp. 1-18.
12. J. Guo, T. Peyrin, A. Poschmann, and M. Robshaw, “The LED block cipher,” in International workshop on cryptographic hardware and
embedded systems, vol. 6917, 2011, pp. 326–341.
13. C. H. Lim, and T. Korkishko, "mCrypton–a lightweight block cipher for security of low-cost RFID tags and sensors," in International
Workshop on Information Security Applications, 2005, pp. 243-258.
14. T. Shirai, K. Shibutani, T. Akishita, S. Moriai, and T. Iwata, "The 128-bit block cipher CLEFIA," in International Workshop on Fast
Software Encryption, 2007, pp. 181-195.
15. R. Beaulieu, S. Treatman-Clark, D. Shors, B. Weeks, J. Smith, and L. Wingers, "The SIMON and SPECK lightweight block ciphers,"
in Design Automation Conference (DAC), 52nd ACM/EDAC/IEEE, 2015, pp. 1-6.
16. K. Shibutani, T. Isobe, H. Hiwatari, A. Mitsuda, T. Akishita, and T. Shirai, "Piccolo: an ultra-lightweight block cipher," in International
Workshop on Cryptographic Hardware and Embedded Systems, 2011, pp. 342-357.
17. T. Suzaki, K. Minematsu, S. Morioka, and E. Kobayashi, "Twine: A lightweight, versatile block cipher," in ECRYPT Workshop on
Lightweight Cryptography, 2011.
18. W. Wu, and L. Zhang, "LBlock: a lightweight block cipher," in International Conference on Applied Cryptography and Network
Security, 2011, pp. 327-344.
19. B. S. Shankar, and S. Tripathy. "Securing Multicast Group Communication in IoT-Enabled Systems." IETE Technical Review, vol. 36,
issue 1, pp.83-93, 2018.
20. B. N. Silva, M. Khan, and K. Han, “Internet of Things: A Comprehensive Review of Enabling Technologies, Architecture, and
Challenges”, IETE Technical Review, vol. 35, issue 2, pp. 205-220, 2017
21. T. Xu, J. B. Wendt, and M. Potkonjak, “Security of IoT systems: Design challenges and opportunities,” in Proc. IEEE/ACM Int. Conf.
Comput.-Aided Design (ICCAD), Piscataway, NJ, USA, Nov. 2014, pp. 417–423.
22. T. Tuan, S. Kao, A. Rahman, S. Das, and S. Trimberger, “A 90nm low-power FPGA for battery-powered applications,” in Proc. of the
2006 ACM/SIGDA 14th international sym. on FPGA. New York, NY, USA: ACM, 2006, pp. 3–11.
23. T. Good, and M. Benaissa, “Very small FPGA application-specific instruction processor for AES,” IEEE Trans. Circuits Syst. I, Reg.
Papers, vol. 53, no. 7, pp. 1477–1486, Jul. 2006.
24. P. Yalla, and J.-P. Kaps, “Lightweight cryptography for FPGAs,” in Proc. Int. Conf. Reconfigurable Comput. FPGAs (ReConFig),
Dec. 2009, pp. 225–230.
25. J. A. Galaviz-Aguilar, J. C. Nuñez-Perez, F. J. Perez-Pinal, and E. Tlelo-Cuautle "FPGA Realisation of n-QAM Digital
Modulators." IETE Technical Review, DOI: 10.1080/02564602.2018.1470038, 2018.
26. N. Smyth, M. McLoone, and J. V. McCanny, “WLAN security processor,” IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 53, no. 7, pp.
1506–1520, Jul. 2006.
27. E. B. Kavun, and T. Yalcin, “RAM-based ultra-lightweight FPGA implementation of PRESENT,” in Proc. Int. Conf. Reconfigurable
Comput. FPGAs (ReConFig), 2011, pp. 280–285.
28. C. A. Lara-Nino, M. Morales-Sandoval, and A. Diaz-Perez, "Novel FPGA-based low-cost hardware architecture for the PRESENT
block cipher," in Proc. Euromicro Conference on Digital System Design (DSD), 2016, pp. 646-650.
29. N. Hanley, and M. O’Neill, “Hardware comparison of the ISO/IEC 29192-2 block ciphers,” in Proc. IEEE Comput. Soc. Annu. Symp.
VLSI (ISVLSI), Aug. 2012, pp. 57–62.
30. J. J. Tay, M. L. D. Wong, M. M. Wong, C. Zhang, and I. Hijazin, “Compact FPGA implementation of PRESENT with Boolean S-
Box,” in Proc. 6th Asia Symp. Quality Electron. Design, Aug. 2015, pp. 144–148.
31. A. J. Elbeirt, and C. Paar, “An FPGA implementation and evaluation of the Serpent block cipher”, in FPGA `00 Proceedings of the
2000 ACM /SIGDA eighth international symposium on field programmable gate arrays, Feb. 2011, pp. 33-40.
32. A. Moradi, A. Barenghi, T. Kasper, and C. Paar, “On the vulnerability of FPGA bitstream encryption against power analysis attacks:
Extracting keys from Xilinx Virtex-II FPGAs,” In Proceedings of the 18th ACM conference on Computer and communications
security, 2011, pp. 111–124.
33. M. Nassar, Y. Souissi, S. Guilley, and J.-L. Danger, “‘Rank correction’: A new side-channel approach for secret key recovery,” In
International Conference on Security Aspects in Information Technology. Berlin, Germany: Springer, 2011, pp. 128–143.
34. S. Gao, H. Chen, W. Wu, L. Fan, W. Cao, and X. Ma, “My traces learn what you did in the dark: Recovering secret signals without
key guesses,” . In Cryptographers’ Track at the RSA Conference. Cham, Switzerland: Springer, 2017, pp. 363–378.
35. (Sep. 2016). 7 Series FPGAs Configurable Logic Block. [Online]. Available: www.xilinx.com
36. Identification Cards—Contactless Integrated Circuit Cards—Proximity Cards—Part 2: Radio Frequency Power and Signal Interface,
document ISO/IEC 14, 443-2, Aug. 2010.

Authors: Aniket Ravindra Ingole, Nilesh Naresh Sonole, Chirag Ramesh Thakur

Paper Title: Utilisation of E-Waste, Fly Ash in Manufacturing of Paver Blocks and Tiles
Abstract: E-Waste that is increasing day by day turning into a major threat to public health and successively
pollutes the setting. India ranks fifth in the world for e-waste generation; about a pair of million a lot of e-waste
is generated associate rally and an unrevealed quantity of e-waste is foreign from alternative countries around
the world. The aim of this project is to exchange cement with e-waste and fly ash in paver block, tiles and to
chop back the worth of paver block and tiles compared thereto of convention concrete paver blocks and tiles.
Use of concrete paver block and tiles square measure presently day after day turning into standard; they are used
for paving of approaches, strategies and ton and collectively the pre-engineering building and pavements.
Throughout this project, we've used e-waste in various proportions with quarry dirt and ash, coarse combination,
compound, and metal-containing material and cement. This can be often one in every of the foremost effective
ways that to avoid the buildup of e-waste which can be a non-degradable waste. This as an alternative saves the
quanta of sand and clay that ought to be got eliminate from the dear stream beds. The e-waste getable in surplus
quantity and thence the worth issue comes down. Collectively Coloring agents are added to the mixture to
comprehend desired shades. Thence throughout this project, an endeavor is formed to review regarding the
properties of the paver blocks and tiles that are ready-made pattern e-waste. The paver blocks and tiles were
prepared and tested and so the results were mentioned.
415. Keywords: E-waste, Fly ash, Paver blocks, Tiles, Construction. 2392-
239
References: 6
1. Baboon Rai, S. Tabin Rushad, Bhavesh Kr, and S. K. Duggal “Research Article Study of Waste Plastic Mix Concrete with Plasticizer”
International Scholarly Research Network ISRN Civil Engineering Volume 2012, Article ID 469272, 5 pages doi:10.5402/2012/469272
2005.
2. Manual on Cement Concrete & Aggregates Australia Use of Recycled Aggregates in Construction May 2008Removal and Reuse of
Hardened Concrete (ACI 555R- American Concrete Institute.
3. S. Gavela, C. Karakosta , C. Nydriotis , V. Kaselouri- Rigopoulou , S. Kolias, P. A. Tarantili , C. Magoulas , D. Tassios and A.
Andreopoulos “A Study Of Concretes Containing Thermoplastic Wastes As Aggregates.
4. L. R. Bandodkar, A. A. Gaonkar, N. D. Gaonkar, & Y.P. Gauns “ Pulverised PET Bottles as Partial Replacement for Sand” International
Journal of Earth Sciences and Engineering 1009 ISSN 0974-5904, Volume 04, No 06 SPL, October 2011, pp. 1009-1012.
5. Dr. Prahallada M.C and Dr. Prakash K.B “Strength and Workability Characteristicsof Waste Plastic Fibre Reinforced Concrete Produced
From Recycled Aggregates” International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-962
6. Aeslina Abdul Kadir, Noor Amira Sarani, “An Overview of Wastes Recycling in Fired Clay Bricks” International Journal of Integrated
Engineering, Vol. 4 No. 2 (2012) p. 53-69
7. Amit Gawande, G. Zamare., V.C Renge., Saurabh Tayde, G. Bharsakale.. (2012) “An overview on waste plastic utilization in asphalting
of roads”, Journal of Engineering Research And Studies (JERS), Vol.III, Issue II, pp 01-05
8. Ganesh Tapkire, Satish Parihar, Pramod Patil, Hemraj R Kumavat, “Recycled Plastic used in Concrete Paver Block” International Journal
of Research in Engineering and Technology eissn: 2319-1163, Vol: 03 special issue: 09, NCETCE-2014.
9. P K Jain, Shanta Kumar & J B Sengupta, “Mitigation of rutting in bituminous roads by use of waste polymeric packaging materials”
Indian Journal of Engineering & Materials Sciences Vol. 18, June 2011, pp. 233-238.
Authors: B.Paulchamy, J.Jaya, K.Kalpana
Modified Master Key Based Multipath Reinforcement Pre-Distribution Scheme for Wireless
Paper Title:
Sensor Networks
Abstract: Wireless Sensor Network (WSN) is one of the budding fields of technology. It is mainly used for
Environmental monitoring and Data accumulation. Due to the limited energy in WSNs, it faces many practical
difficulties. The main challenge is the security issues. Objective of this project is to provide security against
clone attack in a WSN that are arranged in cluster topology. In this paper, a method to implement three
important security measures namely i) Master – Key Pre-distribution solutions, ii) Super imposed disjunct
matrix code and iii) Multipath key reinforcement scheme is discussed. One method complements the advantage
of other method and thus provides high security. The final analysis shows that the computational overhead is
minimum.
416.
2397-
Keywords: WSN, Data accumulation, super imposed disjunct matrix code, Multipath key. 240
0
References:

1. Ross Anderson and Adrian Perrig. Key infection: Smart trust for smart dust. Unpublished Manuscript,November 2001.
2. Dirk Balfanz, Drew Dean, Matt Franklin, Sara Miner, and Jessica Staddon. Self-healing key distribution with revocation. In
Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 241–257, May 2002.
3. M. Beller and Y. Yacobi. Fully-fledged two-way public key authentication and key agreement for low-cost terminals. Electronics
Letters, 29(11):999–1001, May 1993
4. Peter Bergstrom, Kevin Driscoll, and John Kimball. Making home automation communications secure. IEEE Computer, 34(10):50–56,
Oct 2001.
5. C. Bekara, M. Laurent-Maknavicius. “A new protocol for securing wireless sensor networks against Maknavicius. “A new protocol for
securing wireless sensor networks againstnodes replication attacks”, In Proceedings of the 3 rd IEEE International Conference on
Wireless and Mobile Computing, Networking and Communications (WiMob), 2007. nodes replication attacks”, In Proceedings of the
3rd IEEE International Con Mobile Computing, Networking and Communications (WiMob), 2007.
6. B. Parno, A. Perrig, and V.D. Gligor, “Distributed Detection of Node Replication Attacks in Sensor Proc. IEEE Symposium. Security
and Privacy, pp. 49-63, May 2005. Networks,” Proc. IEEE Symposium. Security and Privacy, pp. 49.
7. Detection of Clone Attacksin Wireless Sensor Networks”, IEEE Transactions on Dependable and Secure Computing., vol. 8, no.
Management Scheme for Distributed Sensor Networks,” Proc.
8. R. Brooks, P. Govindaraju, M. Pirretti, N. Vijaykrishnan, and M.T. Kandemir, “On the Detection of Clones in Sensor Networks Using
Random Key Predistribution,” IEEE Trans. Systems, Man and Maknavicius. “A new protocol for securing wireless sensor networks
againstference on Wireless.
9. Kai Xing Fang, Liu Xiuzhen, Cheng David, H. C. Du, Real-Time Detection of Clone Attacks in Wireless Sensor Networks
Proceedings of the 28th International Conference on Distributed Computing Systems, 2008, Pages 3-10.
10. Joseph Binder, Hans Peter Bischof, Zero Knowledge Proofs of Identityfor Ad Hoc Wireless Networks An In-Depth Study, Technical
Report, 2003. http://www.cs.rit.edu/ jsb7384/zkpsurvey.pdf.
11. Klempous R.; Nikodem J.; Radosz, L.; Raus, N. ByzantineAlgorithms in Wireless Sensors Network, Wroclaw Univ.
ofTechnol.,Wroclaw; Information and Automation, 2006. ICIA2006.International Conference on, 15-17 Dec. 2006, pages :319-324
12. A. J. Macula. A simple construction of d-disjunct matrices withcertain constant weights Discrete Math., 162(13):311-312, 1996 .
13. K. Xing, X. Cheng, L. Ma, and Q. Liang.,Superimposed Code Based Channel Assignment in Multi-radio Multichannel Wireless Mesh
Networks. In MobiCom’07, pages 15-26, 2007.

Authors: Subhani Shaik, Nallamothu Naga Malleswara Rao

Paper Title: Performance Analysis of Elastic Search Technique in Identification and Removalof Duplicate Data
Abstract: Elastic search is a way to organize the data and make it easily accessible. It is a server based search
on Lucene. It is a highly scalable, distributed and full-text search engine. Elastic search is developed in Java. It is
published as open source under the terms of the Apache License. Elastic search is the most popular enterprise
search engine. Elastic search includes all advances in speed, security, scalability, and hardware efficiency.
Elastic search is a tool for querying written words. It can perform some other smart tasks, but its principal is
returning text similar to a given query and statistical analyses of a quantity of text. Elasticsearch is a standalone
database server, which is written in Java and using HTTP/JSON protocol,it’s takes data and optimized the data
according to language based searches and stores it in a sophisticated format. Elastic search is very convenient,
supporting clustering and leader selection out of the box. Whether it’s searching a database of trade products by
description, finding similar text in a body of crawled web pages. In this manuscript elastic search capability of
copied data identification and its removing techniques performance are analyzed.

Keywords: Elastic search, duplicate data identification, data removing techniques, performance analysis.

References:

1. Verstrepen K, Goethals B. Top-n suggestion for shared records. In: Proceedings of the ninth ACM Conference on Recommender
Systems, RecSys'15, New York, NY, 2015, ACM, pp. 59– 66.
2. Bender S, Jarmin R, Kreuter F, Lane J. Protection and classification. In: Big Data and Social Science Research: Theory and Practical
Approaches. CRC Press, 2016.
3. Hauge M, Stevenson M, Rossmo D, Le Comber S. Labeling banksy: Using geographic profiling to explore a cutting edge
craftsmanship riddle. J Spat Sci. 2016;61:185– 190.
4. Shmueli G., Yahav I., 2014, "Handling Simpson's Catch 22 in Big Data with grouping and relapse trees", Proceedings of the European
Conference on Information Systems (ECIS) 2014, Tel Aviv, Israel, June 9-11, 2014, ISBN 978-0-9915567-0-0
5. Slaoui SC, Lamari Y. Grouping of substantial information dependent on the social investigation. In: Proceedings of the universal
417. meeting on canny frameworks and PC vision. 25– 26 March 2015; Fez. Washington: IEEE Computer Society. 2015. p. 1– 7. 2401-
6. Popov G., Magomedov Sh. Similar investigation of different strategies treatment master evaluations. Universal Journal of Advanced
Computer Science and Applications. 2017. Т. 8. № 5. С. 35-39. DOI: 10.14569/IJACSA.2017.080505 Elastic Search: Distributed, 240
Lucene-based Search Engine" May 2010, Sematext Blog. 5
7. O. Baysal, R. Holmes, and M. W. Godfrey. Designer dashboards: The requirement for subjective investigation. IEEE Software,
30(4):46{52, 2013.
8. Long B, Chapelle JB, Zhang Y. Positioning through anticipated misfortune advancement. IEEE Trans Knowl Data Eng
2015;27(5):267-74.
9. Lin J, Ryaboy D, Weil K. Full-content ordering for advancing choice activities in substantial scale information examination. San Jose,
California, New York, USA: ACM; 2011.Available from: http://www.acm.org/publications.Unpluggable Similarity. Accessible from:
https://www.elastic.co/manage/en/versatile search/direct/current/pluggablesimilarites.htm.
10. Butler MH, Rutherford J. Appropriated Lucene: A Distributed Free Text Index for Hadoop. HP Laboratories, HPL; 2008.Elastic search
invigorate interim versus ordering execution. Accessible from: https://sematext.com/preparing/elastic¬search/. Date Accessed:
8/07/2013.8. You know for Search. Accessible from: https://www.elas¬tic.co/blog/you-know-for-seek inc. Date Accessed: 13/07/2016
11. Sai Divya M, Goyal SK. ElasticSearch: A progressed and snappy search strategy to deal with voluminous information.
COM¬PUSOFT. An International Journal of Advanced Computer Technology. 2013 Jun; 2(6):171– 5.
12. Holovaty A, Kaplan-Moss J. The Definitive Guide to Djan¬go: Web Development Done Right. Apress, (second edn). 2009 Jul. Django
Documentation, Available from: http://stackover-flow.com/questions/29957604/django-1-8-static-records doesnt-work. Date Accessed:
30/04/2015.
13. Django-Haystack Documentation. Accessible from: https://pi.python.org/pypi/django-bundle/2.4.0. Date Ac¬cessed: 09/06/2015.
Understanding Information Retrieval by Using Apache Lucene and Tika Part-1. Accessible from: https://dzone.
com/articles/understanding-data. Date Accessed: 22/08/2014.
14. Senthil Kumar NK, Kishore Kumar K, Rajkumar N, Amsa¬valli K. Website streamlining by Fuzzy Classification and Prediction.
Indian Journal of Science and Technology. 2016 Jan; 9(2):1– 5.
15. Kausar A, Dhaka VS, Singh SK. Plan of Web Crawler for the Client – Server Technology. Indian Journal of Science and Technology.
2015 Dec; 8(36):1– 7.
16. Stephen Mock,"Designsafe:UsingElasticsearch to share and Search Data on Science Web Portal",Practice and Experience in Advanced
Research Computing 2017 on Sustainability, Success and Impact,ISBN: 978-1-4503-5272-7,July 13,2017.
17. Joaquin Delgado,"Scalable Recommender Systems: Where Machine Learning Meets Search",9th ACM Conference on Recommender
Systems,ISBN: 978-1-4503-3692-5,September 20 ,2015.
18. Anton Firsov ,"Traditional IR meets Ontology Enginnering in look for Data",40th International ACM SIGIR Conference on Research
and Development in Information Retrieval,ISBN: 978-1-4503-5022-8,August 2017.
19. Andreas Both, "An administration situated look structure for full content, geospatial and semantic search",10th International
Conference on Semantic Systems,ISBN: 978-1-4503-2927-9,September 2014.
20. Shelly Garion,"Big Data Analysis of distributed storage logs utilizing sparkle", tenth ACM International Systems and Storage
Conference,ISBN: 978-1-4503-5035-8,May 2017.
21. Bela Gipp, "Citolytics: A Link-based Recommender System for Wikipedia",11th ACM Conference on Recommender Systems,ISBN:
978-1-4503-4652-8,August 2017.

Authors: Chandrika Gadiparthi, Manasa Bathina , Supriya Emani , Venkata Vara Prasad Padyala

Paper Title: The Spectrum Sensing and Path Optimization Techniques in Cognitive Radio Networks
Abstract: Cognitive Radio (CR) is a versatile, insightful radio and system innovation that can naturally
recognize accessible directs in a remote range and change transmission parameters empowering more
interchanges to run simultaneously and furthermore improve radio working conduct. The primary thought of the
intellectual system is to give the range band to the unlicensed clients without making any damage to the earth.
By utilizing the recurrence range band, we came to utilization of these intellectual systems. Right off the bat, we
have to frame the system through any methodologies .we are utilizing optimization Mechanisms for path
identification in cognitive Radio.

Keywords: Cognitive Radio, unlicensed users , packer tracer, licensed users, ant colony optimization.

References:

1. Venkataraman, Hrishikesh, and Gabriel-Miro Muntean. Cognitive Radio And Its Application For Next Generation Cellular And
Wireless Networks. 1st ed. Dordrecht: Springer, 2012.
418. 2. Cordeiro, Carlos, Dave Cavalcanti, and SaishankarNandagopalan. "Cognitive Radio For Broadband Wireless Access In TV Bands: The
IEEE 802.22 Standards". Cognitive Radio Communications and Networks (2010): 387-429. 2406-
3. Al-Doseri, H. F., and M. A. Mangoud. "Performance Analysis Of Cooperative Spectrum Sensing Under Guaranteed Throughput 241
Constraints For Cognitive Radio Networks". Journal of Computer Networks and Communications 2016 (2016): 1-9.Networks". Journal 1
of Computer Networks and Communications 2016 (2016): 1-9.
4. J. Mitola, G. Maguire, "Cognitive radio: Making software radios more personal", IEEE Personal Communications, vol. 6, no. 4, pp. 13-
18, Aug. 1999.
5. M. Gastpar, "Gaussian multiple-access channels under received-power constraints" IEEE Information Theory Workshop, 2004 (ITW
2004), pp. 452-457, Oct. 2004
6. Zhang H., Wang X., Memarmoshrefi P., Hogrefe D. A Survey of Ant Colony Optimization Based Routing Protocols for Mobile Ad
Hoc Networks. IEEE Access. 2017;5:24139–24161. doi: 10.1109/ACCESS.2017.2762472. [CrossRef].
7. Baras J.S., Mehta H. A Probabilistic Emergent Routing Algorithm for Mobile Ad Hoc Networks; Proceedings of the Modeling and
Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt’03); Antipolis, France. 3–5 March 2003; 10p.
8. Baras J.S., Mehta H. A Probabilistic Emergent Routing Algorithm for Mobile Ad Hoc Networks; Proceedings of the Modeling and
Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt’03); Antipolis, France. 3–5 March 2003; 10p
9. Woungang I., Dhurandher S.K., Obaidat M.S., Ferworn A., Shah W. An ant-swarm inspired energy-efficient ad hoc on-demand routing
protocol for mobile ad hoc networks; Proceedings of the 2013 IEEE International Conference on Communications (ICC);udapest,
Hungary. 9–13 June 2013; pp. 3645–3649
10. Prabaharan S.B., Ponnusamy R. Secure and energy efficient MANET routing incorporating trust values using hybrid ACO;
Proceedings of the 2016 International Conference on Computer Communication and Informatics (ICCCI); Coimbatore, India. 7–9
January 2016; pp. 1–8.
Authors: Mohammed Hatem Obaid, Nurul Fadly Habidin

Paper Title: The Mediating Effect of Knowledge Transfer in Construction Project

Abstract: The construction industry is a competitive high-risk industry with an unprecedented uncertainties in
technology, budget, and development processes. It has become more dynamic in nature and the execution of
projects have become more complex and difficult to manage. The need then evolved to develop a framework for
project performance. This study investigates the factors affecting the project success and performance using a
knowledge and resource-based approach. Data was collected from project managers, civil engineers, site
managers, and architects. A total of 221 responses were collected. The data analysis was conducted using SPSS
and Smart PLS. This results from this investigation revealed that knowledge transfer does not mediate the effect
of strategic factors or employee factors on the project performance of Iraqi public construction projects. This
finding indicated that the role of knowledge practices in Iraqi public project is still not matured. Top
management are advised to effectively implement the knowledge management practices in public projects.
419. Implementing knowledge management will avoid the organization the cost of repeating the same mistakes. Thus,
it was concluded in this study that knowledge transfer is still in its infancy and currently it has no mediating 2412-
241
effect between the variables of this study.
6

Keywords: Project success; Project failure; Construction project; SPSS; AMOS; Knowledge-base, Resource
based.

References:

1. F. T. Berssaneti and M. M. Carvalho, “Identification of variables that impact project success in Brazilian companies,” Int. J. Proj.
Manag., vol. 33, no. 3, pp. 638–649, 2015.
2. M. M. de Carvalho, L. A. Patah, and D. de Souza Bido, “Project management and its effects on project success: Cross-country and
cross-industry comparisons,” Int. J. Proj. Manag., vol. 33, no. 7, pp. 1509–1522, 2015.
3. J. B. Barney, “Resource-based theories of competitive advantage: A ten-year retrospective on the resource-based view,” J. Manage.,
vol. 27, no. 6, pp. 643–650, 2001.
4. M. Porter, Competitive Advantage: Creating and sustaining superior performance, vol. 15. 1985.
5. L. Zhang and W. Fan, “Improving performance of construction projects: A project manager’s emotional intelligence approach,” Eng.
Constr. Archit. Manag., vol. 20, no. 2, pp. 195–207, 2013.
6. A. Badewi and E. Shehab, “The impact of organizational project benefits management governance on ERP project success: Neo-
institutional theory perspective,” Int. J. Proj. Manag., vol. 34, no. 3, pp. 412–428, 2016.
7. A. Razif, A. Razak, A. Aini, V. Pandiyan, and K. Sundram, “The relationships of human success factor , information technology , and
procurement process coordination on operational performance in building construction industry – A Proposed Conceptual Framework,”
Procedia Econ. Financ., vol. 31, no. 15, pp. 354–360, 2015.
8. H. Kim, “Transformational Leadership, Organizational Clan Culture, Organizational Affective Commitment, and Organizational
Citizenship Behavior: A Case of South Korea’s Public Sector,” Public Organ. Rev., vol. 14, no. 3, pp. 397–417, 2014.
9. S. Alaaraj, Z. A. Mohamed, and U. S. Ahmad Bustamam, “External Growth Strategies and Organizational Performance in Emerging
Markets: The Mediating Role of Inter-Organizational Trust,” Rev. Int. Bus. Strateg., vol. 28, no. 2, pp. 206–222, 2018.
10. S. Alaarj, A. M. Zainal, and U. Bustamam, “The Effect of Knowledge Management Capabilities on the Performance of Malaysian
Large-Scale Organizations: An Empirical Study,” Adv. Glob. Bus. Res., vol. 12, no. 1, pp. 1024–1038, 2015.
11. S. Hart and C. Banbury, “How Strategy-Making Processes Can Make a Difference,” Strateg. Manag. J., vol. 15, no. 4, pp. 251–269,
1994.
12. D. Neef, “Making the case for knowledge management: the bigger picture,” Manag. Decis., vol. 37, no. 1, pp. 72–78, 1999.
13. M. Lj Todorović, D. Č Petrović, M. M. Mihić, V. Lj Obradović, and S. D. Bushuyev, “Project success analysis framework: A
knowledge-based approach in project management,” Jpma, vol. 33, pp. 772–783, 2015.
14. G. Pan, S.-L. Pan, and C.-Y. Lim, “Examining how Firms Leverage IT to Achieve Firm Productivity: RBV and Dynamic Capabilities
Perspectives,” Inf. Manag., vol. 52, no. 4, pp. 401–412, 2015.
15. N. Golafshani, “Understanding Reliability and Validity in Qualitative Research,” Qual. Res., vol. 8, no. 4, pp. 597–607, 2003.
16. J. Pallant, SPSS survival manual: a step by step guide to data analysis using SPSS. 2016.
17. H. H. Chen, S. Qiao, and A. H. I. Lee, “The impacts of different R&D organizational structures on performance of firms: Perspective
of absorptive capacity,” J. High Technol. Manag. Res., vol. 25, no. 1, pp. 83–95, 2014.
18. T. Brady and A. Davies, “Learning to deliver a mega-project: The case of heathrow terminal 5,” in Procuring Complex Performance:
Studies of Innovation in Product-Service Management, 2012, pp. 174–196.
19. A. Ordanini, G. Rubera, and M. Sala, “Integrating Functional Knowledge and Embedding Learning in New Product Launches. How
Project Forms Helped EMI Music,” Long Range Plann., vol. 41, no. 1, pp. 17–32, 2008.
20. S. Alaarj, Z. Abidin-Mohamed, and U. S. B. A. Bustamam, “Mediating Role of Trust on the Effects of Knowledge Management
Capabilities on Organizational Performance,” Procedia - Soc. Behav. Sci., vol. 235, no. 2016, pp. 729–738, 2016.
21. S. Alaarj, Z. A. Mohamed, and U. S. A. Bustamam, “Do Knowledge Management Capabilities Reduce the Negative effect of
Environment Uncertainties on Organizational Performance? A Study of Public Listed Companies in Malaysia,” Int. J. Econ. Res., vol.
14, no. 15, pp. 443–456, 2017.
22. S. Alaarj, Z. A. Mohamed, and U. S. A. Bustamam, “The Effect of Knowledge Management Capabilities on Performance of
Companies : A Study of Service Sector,” Int. J. Econ. Res., vol. 14, no. 15, pp. 457–470, 2017.
Authors: K. Srinivas, J. Tarun Kumar, Shyamsunder Merugu

Paper Title: GEVD Based on Multichannel Wiener Filter for Removal of EEG Artifacts
Abstract: The electroencephalography (EEG) signals are contaminated by ocular artifacts usually called as
ElectroOculoGraphy(EOG) artifacts. This occurs due to an eye movement and repeatedly blinking eyes, it is a
major barrier to overcome when analyzing ElectroEncephaloGram (EEG) data. In this paper, Generalized Eigen
Value Decomposition (GEVD) algorithm based on Multichannel Wiener filter (MWF) was proposed. In the
GEVD algorithm, the covariance matrix of the artifact is identified and substituted by low rank approximation.
For both real and hybrid EEG data is demonstrated using this algorithm and also compared with other existing
methods for removal of artifacts. This paper determines generic, robust and fast algorithm for artifact removal of
various types of EEG signals. Signal to Error Ratio (SER) and Artifact to Residue Ratio (ARR) both are
expressed in dBs. The better performance of artifact removal is expressed with high SER which measures clean
EEG distortion and ARR measures the artifact estimation.

Keywords: EEG, EOG, Multichannel Wiener filter, Generalized Eigen Value Decomposition, Signal to Error
Ratio (SER) and Artifact to Residue Ratio (ARR).

References:

1. G. Wang, C. Teng, K. Li, Z. Zhang, and X. Yan, “The Removal of EOG Artifacts from EEG Signals Using Independent Component
420. Analysis and Multivariate Empirical Mode Decomposition,” vol. 2194, no. c, pp. 1–7, 2015. 2417-
2. B. K. Kumar, K. V. S. V. R. Prasad, and D. Alekhya, “Techniques On The Removal Of Ocular Artifacts In,” 2016 Int. Conf. Inven.
Comput. Technol., vol. 3, pp. 1–5. 242
3. K. Islam, A. Rastegarnia, and Z. Yang, “Methods for artifact detection and removal from scalp EEG : A review Les méthodes de 1
détection et de rejet d ’ artefact de l ’ EEG de,” Neurophysiol. Clin. / Clin. Neurophysiol., vol. 46, no. 4–5, pp. 287–305, 2016.
4. S. Zahan, A. E. Mode, and D. Emd, “Removing EOG artifacts from EEG Signal Using Noise-Assisted Multivariate Empirical Mode
Decomposition,” 2016 2nd Int. Conf. Electr. Comput. Telecommun. Eng., no. December, pp. 1–5, 2016.
5. P. Li, Z. Chen, and Y. Hu, “A method for automatic removal of EOG artifacts from EEG based on ICA-EMD,” pp. 1860–1863, 2017.
6. L. Tang, M. Zhao, Y. Zhou, and X. Wu, “Automatic Artifact Reduction Based on MEMD- ICA for Seizure Prediction,” 2018 IEEE
Biomed. Circuits Syst. Conf., pp. 1–4.
7. A. K. Maddirala and R. A. Shaik, “Separation of Sources From Single-Channel EEG Signals Using Independent Component
Analysis,” IEEE Trans. Instrum. Meas., vol. 67, no. 2, pp. 382–393, 2018.
8. C. Sciences, “Intelligentocular artifacts removal in a non- invasive singlechannel EEG recording,” no. 1, 2015.
9. K. Zeng, D. Chen, G. Ouyang, L. Wang, and S. Member, “An EEMD-ICA Approach to Enhancing Artifact Rejection for Noisy
Multivariate Neural Data,” IEEE Trans. Neural Syst. Rehabil. Eng., vol. 24, no. 6, pp. 630–638, 2016.
10. H. Maki, T. Toda, S. Sakti, G. Neubig, S. Nakamura, and A. O. Model, “An Evaluation of EEG Ocular Artifact Removal with a Multi-
channel Wiener Filter Based on Probabilistic Generative Model,” 2015 37th Annu. Int. Conf. IEEE Eng. Med. Biol. Soc., no. 2, pp.
2775–2778, 2015.
11. R. Kher and R. Gandhi, “Adaptive Filtering based Artifact Removal from Electroencephalogram ( EEG ) Signals,” 2016 Int. Conf.
Commun. Signal Process., pp. 561–564, 2016.
12. “Eeg Signal Enhancement Using Multi-Channel Wiener Filter With A Spatial Correlation Prior Graduate School of Information
Science Nara Institute of Science and Technology ( NAIST ), Japan,” pp. 2639–2643, 2015.
13. R. Van Rompaey and M. Moonen, “GEVD Based Speech and Noise Correlation Matrix Estimation for Multichannel Wiener Filter
Based Noise Reduction,” 2018 26th Eur. Signal Process. Conf., pp. 2544–2548, 2018.
14. A. Delorme, H. Serby, and S. Makeig, “Table of Contents,” 2004.
Authors: L. Jaya Singh Dhas, B. Mukunthan

Paper Title: Kleinberg’s Hyper-Richness Based Fuzzy Partition Clustering for Efficient Bi-Temporal Data
Abstract: Clustering is the process used for partitioning the total dataset into different classes of similar
objects. The group contains knowledge about their members and also helps to understand the structure of the
dataset very easily. Clustering the bitemporal data is one of the major tasks in data mining since the bitemporal
datasets are very large with various attribute counts. Hence the accurate clustering is still challenging tasks. In
order to improve the clustering accuracy with less complexity, Kleinberg’s Hyper-richness Bitemporal property
based fuzzy c means partition Clustering (KHBP-FCMPC) technique is introduced. The KHBP-FCMPC
technique partition the bitemporal dataset into number of possible groups with an improved performance rate
based on a distance metric. At first, the ‘c’ numbers of clusters are initialized. The KHBP-FCMPC technique
uses the core data point module and authority sector module to minimize the execution time of clustering the
data points. Core data point module served as the centroid of the cluster. Each cluster contains one core data
point. After that, the distance is computed with the membership function. The authority sector module assigns
the data points into the cluster with minimum distance. After that, the centroid is updated and the process
iterated until the convergence is met. Finally, the Kleinberg’s Hyper-richness Bitemporal property is applied to
verify the total dataset equals the partition of all the data points. This property used to group the entire data
points into the cluster with higher accuracy. Experimental evaluation is carried out using a temporal dataset with
different factors such as clustering accuracy, false positive rate, time complexity and space complexity with a
number of data points. The experimental results show that the proposed KHBP-FCMPC technique increases the
bitemporal data clustering accuracy with less false positive rate, time complexity as well as space complexity.
Based on the results observations, KHBP-FCMPC technique is more efficient than the state-of-the-art methods.

Keywords: clustering, bitemporal data, Kleinberg’s Hyper-richness Bitemporal property, fuzzy c means
partition Clustering, Core data point module, authority sector module.

References:

1. YunYang and Jianmin Jiang, “Bi-weighted ensemble via HMM-based approaches for temporal data clustering”, Pattern Recognition,
Elsevier, Volume 76, April 2018, Pages 391 - 403.
2. Md. Abul Hasnat, Julien Velcin, Stephane Bonnevay, Julien Jacques, “Evolutionary clustering for categorical data using parametric
links among multinomial mixture models”, Econometrics and Statistics, Elsevier, Volume 3, July 2017, Pages 141-159.
3. Hani El Assaad, Allou Saméa, Gérard Govaert and Patrice Aknina, “A variational Expectation–Maximization algorithm for temporal
data clustering”, Computational Statistics & Data Analysis, Elsevier, Volume 103, November 2016, Pages 206 - 228.
421. 4. Saeid Soheily-Khah Ahlame, Douzal-Chouakria, EricGaussier, “Generalized k-means-based clustering for temporal data under
weighted and kernel time warp”, Pattern Recognition Letters, Elsevier, Volume 75, May 2016, Pages 63 - 69. 2422-
5. Joseph Crawford and Tijana Milenković, “ClueNet: Clustering a temporal network based on topological similarity rather than 243
denseness”, PLoS ONE, Volume 13, Issue 5, 2018, Pages 1 - 25. 0
6. Lucia Paci and Francesco Finazzi, “Dynamic model-based clustering for spatio-temporal data”, Statistics and Computing, Springer,
March 2018, Volume 28, Issue 2, Pages 359 – 374.
7. Initialization and Model Selection for HMM-Based Hybrid [7] Yun Yang and Jianmin Jiang, “Adaptive Bi-Weighting Toward
Automatic Meta-Clustering Ensembles”, IEEE Transactions on Cybernetics, Volume 49, Issue 5, 2018, Pages 1 – 12.
8. Yongping Zhang znd Lun Liu, “Understanding temporal pattern of human activities using Temporal Areas of Interest”, Applied
Geography, Elsevier, Volume 94, May 2018, Pages 95-106.
9. Nazanin Asadi , Abdolreza Mirzaei , Ehsan Haghshenas, “Creating Discriminative Models for Time Series Classification and
Clustering by HMM Ensembles”, IEEE Transactions on Cybernetics , Volume 46 , Issue 12 , 2016 , Pages 2899 – 2910.
10. Saeed Aghabozorgi, Teh Ying Wah, Tutut Herawan, Hamid A. Jalab, Mohammad Amin Shaygan, and Alireza Jalali, “A Hybrid
Algorithm for Clustering of Time Series Data Based on Affinity Search Technique”, The Scientific World Journal, Hindawi Publishing
Corporation, Volume 2014, March 2014, Pages 1 - 12.
11. Xin Yao , Di Zhu ,Yong Gao , Lun Wu , Pengcheng Zhang , Yu Liu, “A Stepwise Spatio-Temporal Flow Clustering Method for
Discovering Mobility Trends”, IEEE Access, Volume 6, August 2018, Pages 44666 – 44675.
12. K.P. Agrawal, Sanjay Garg, Shashikant Sharma and Pinkal Patel, “Development and validation of OPTICS based spatio-temporal
clustering technique”, Information Sciences, Elsevier, Volume 369, November 2016, Pages 388 - 401.
13. Yun Yang and Ke Chen, “Temporal Data Clustering via Weighted Clustering Ensemble with Different Representations”, IEEE
Transactions on Knowledge and Data Engineering, Volume 23, Issue 2, 2011, Pages 307 – 320.
14. Feng Zhou , Fernando De la Torre , Jessica K. Hodgins, “Hierarchical Aligned Cluster Analysis for Temporal Clustering of Human
Motion”, IEEE Transactions on Pattern Analysis and Machine Intelligence, Volume 35 , Issue 3 , March 2013, Pages 582 – 596.
15. Zhilin Li, Qiliang Liu, Jianbo Tang, Min Deng, “An adaptive method for clustering spatio-temporal events”, Transactions in GIS,
Wiley online library, Volume 22, Issue 1, February 2018, Pages 323 - 347.
16. Dongzhi Zhang, Kyungmi Lee and Ickjai Lee “Hierarchical Trajectory Clustering for Spatio-temporal Periodic Pattern Mining”, Expert
Systems with Applications, Elsevier, Volume 92, February 2018, Pages 1 - 11.
17. Nikos Pelekis , Panagiotis Tampakis, Marios Vodas, Christos Doulkeridis, Yannis Theodoridis, “On temporal-constrained sub-
trajectory cluster analysis”, Data Mining and Knowledge Discovery, Springer, Volume 31, Issue 5, September 2017, Pages 1294 –
1330.
18. Cátia M. Salgado, Marta C. Ferreira and Susana M. Vieira , “Mixed Fuzzy Clustering for Misaligned Time Series”, IEEE Transactions
on Fuzzy Systems , Volume 25, Issue No. 6, December 2017, Pages 1777 – 1794.
19. Yi-Cheng Chen, Wen-Chih Peng and Suh-Yin Lee, “Mining Temporal Patterns in Time Interval-Based Data”, IEEE Transactions on
Knowledge and Data Engineering , Volume 27 , Issue 12 , 2015, Pages 3318 – 3331.
20. Catherine Matias and Vincent Miele, “Statistical clustering of temporal networks through a dynamic stochastic block model”, Journal
of Royal Statistical Society, Volume 79, Issue 4, September 2017, Pages 1119 -1141.
21. Yun Yang and Jianmin Jiang, “HMM-based hybrid meta-clustering ensemble for temporal data”, Pattern Recognition, Elsevier,
Volume 56, January 2014, Pages 299 – 310.
22. Haijun Liu, Jian cheng, and Feng wang, “Sequential Subspace Clustering via Temporal Smoothness for Sequential Data Segmentation”
Journal of IEEE Transactions on Image Processing, vol. 27, issue 2, Feb 2018, pp. 866 – 878.
23. Jonghem youn, Junho shim, Sang-Goo Lee, “Efficient Data Stream Clustering With Sliding Windows Based on Locality-Sensitive
Hashing” Journal of IEEE Access, Volume.6, October 2018, Page 63757 – 63776.
Authors: Anupoju Sai Vamsi, Singavarapu Veerendra, Seela Chiranjeeva Rao

Paper Title: Design of a Roller Bearing Grease Removal Device


Abstract: In the present Scenario, The manual method for Removing grease from the Roller Bearing used in
the railway department became a major problem. Chemicals will effect humans while cleaning the railway
bearings in manual method. In order to reduce human effect and increase efficiency in cleaning, we are aimed to
design a machine which will automatically clean the bearings and will decrease the time of cleaning. In the
overhauling process, which will be done manually will be directly apply the kerosene and the compressed air.
This suggested machine will clean the bearing automatically by providing kerosene and compressed air with
high velocity. The compressed air with high velocity will be provided to rotate the bearing continuously and
kerosene will be applied simultaneously, Thus the cleaning of the bearing. Will be done automatically. It works
on principle that kerosene air mixture will reduce the density and remove the grease from the bearing completely
and it is collected in a drain. After the overhauling process, the parts will be assembled in the railway coaches.
So this machine can reduce the time in the working process and avoids the human problems in manual method.
422.
Keywords: Manual Degreasing, Infections to humans, Automatic cleaning process, Kerosene, Compressed air, 2431-
Overhauling process. 243
4
References:

1. CAT.NO.SRBMM-1 „NBC‟ “spherical roller bearing, mounting, dismounting and maintenance manual”, ppt- 20(2001).
2. PSG college of technology “design data book “, (2005) . panerselvam r, ”production and operations management“.
3. Nalinksh syyas, “Technology mission on Indian railways”, Indian institute of technology, kanpur ,(2006).
4. Angellalocasio, “manufacturing cost modeling of product design” .
5. Juha Miettinen, Peter Andersson,” Acoustic emission of rolling Bearing lubricated with contaminated grease.
6. Original Research Article tribology International”, Volume 33, Issue 11, November 2000, Pages 777-78.
7. Don Ehlert ,”Eliminating risks in Bearing lubrication Original Research Article, World Pumps”, Volume 2012, Issue 7, July–August
2012, Pages 24,26,28,30-31.
8. Jeremy Lineham, “Ultrasonic probes for inspecting bearing, Original Research article World Pumps”, Volume 2008, Issue 503, August
2008, Pages 34-36.
9. Neeraj Niijjaawan, Rasshmi Niijjaawan ,”Bearing and its maintenance Modern Approach to Maintenance in Spinning”, 2010, Pages
333-364.

Authors: Hari Prasad Dara, Narasimha Rao Maragani, K.Vijayakumar, K.Sunil Babu
Preparation and Characterization of Gel Polymer Electrolyte Based on PAN- NH4CF3SO4 and
Paper Title:
Nano ZrO2 Filler –Application as an Electrochemical cell
Abstract: In the present investigation, the Nano Composite Gel Polymer Electrolyte (NCGPEs) based on nano
fillers ZrO2, Polyacrylonitrile (PAN), and Ammonium Triflate (NH4CF3SO4) doped at various wt% ratios
prepared with the help of solution cast technique. The better amorphous nature observed for the
70PAN:30NH4CF3SO4 composition with addition of 1-4 wt% of ZrO2 nano fillers and structural, complexation
studies of NCGPEs were confirmed by XRD technique. The micro structural studies and particle size can be
revealed by SEM technique. DC Conductivity studies reveal the ionic conductivity performance on effect of
temperature and composition wt% of nano powder. The ionic conductivity studies observed for
70PAN:30NH4CF3SO4 with nano powder ZrO2 concentration ranging from 1-4 wt%. The sample containing
3wt% of ZrO2 exhibits the highest conductivity order of 4.20x10-4 S cm-1 at room temperature (303K) and
4.65x 10-3 S cm-1 at 373K. The cell parameters like Open Circuit Voltage, Short Circuit Current, energy density
and power density were perfectly determined which were useful to explain electrochemical cell behavior.

Keywords: NCGPEs; Surface morphology, Discharge parameters; Electrochemical Cell Applications.

References:
423.
2435-
1. Kumudu Perera, K.P. Vidanapathirana, M.A.K.L. Dissanayake“ Effect of the polymer host, Polyacrylonitrile on the performance of Li
rechargeable cells”, K. Perera et al. /Sri Lankan Journal of Physics, Vol 12, 2011, pp. 25-31 . 243
2. Beck F, and Ruetschi, P. Rechargeable batteries with aqueous electrolytes, Electrochim. Acta., 45 , 2000, pp.2467–2482. 9
3. S. Rajendran, T. Mahalingam, and R. Kannan, “Experimental investigations on PAN–PEO hybrid polymer electrolytes” Solid State
Ionics, 130, 2000, pp.143-148.
4. ChithraM.Mathew, K. Kesavan, and S. Rajendran, “Structural and Electrochemical Analysis of PMMA Based Gel Electrolyte
Membranes,” Hindawi Publishing Corporation International Journal of Electrochemistry Volume 2015, pp. 1-7.
5. Ramesh Babu,K.Vijaya Kumar, “Studies on Structural and Electrical Properties of NaHCO3 Doped PVA Films for Electrochemical
Cell Applications”- International Journal of ChemTech ResearchCODEN (USA): IJCRGG ISSN: 0974-4290Vol.7, No.1, 2014-2015,
pp 171-180.
6. I.Blaszczyk-Lezak, V.Desmaret,C.Mijangos, “Electrically conducting polymer nanostructures confined in anodized aluminum oxide
templates (AAO),” eXPRESS Polymer Letters Vol.10, No.3 ,2016, pp . 259–272
7. N.Ammakutti @ Sridevi, P.M.Shyly, X.Sahaya Shajan, “Mechanical and ionic conductivity studies on polymer electrolytes
incorporated with chitin nano fiber for rechargeable magnesium ion batteries,” International Journal of Science, Technology &
Management Volume No 04, Special Issue No. 01, March 2015.pp.23-28.
8. S. Sarojini and C. Anjali, “Synthesis and Structural Characterization Studies on Solid Polymer Electrolyte System with Magnesium
Triflate as Host Salt, EC as Plasticizer and MgO as Nanofiller,” Chemical Science Transactions, ISSN:2278-3458, 2016,pp.345-352.
9. Alamgir M., Abraham K.M., “Room temperature rechargeable polymer electrolyte batteries,” Journal of Power sources, 1995, pp.40-
45.
10. Slane S., Salomon M., “Composite gel electrolyte for rechargeable lithium batteries,” Journal of power sources, 1995, pp.7-10.
11. Yoon H., Chung W., Jo aN., “Study on ionic transport mechanism and interactions between salt and polymer chain in PAN based solid
polymer electrolytes containing LiCF3SO3,” Electrochemica Acta, 2004, pp.289-293.
12. Wang Z., Huang B., Huang H., Chen L., Xue R., Wang F., “Infrared spectroscopic study of the interaction between lithium salt LiClO4
and the plasticizer ethylene carbonate in the poly acrylonitrile based electrolyte,” Solid state ionics, 1996, vol.143-148.
13. Narasimha Rao Maragani, N.Krishna jyothi, K.Vijaya kumar, “Ion Transport and Spectroscopic Studies of Poly acrylonitrle complexed
with Ammonium trifluoro methane sulfonate (NH4CF3SO4) Gel polymer electrolyte system,” Int.J.Chem.Sci:14(2), 2016, pp.789-802.
14. Huang B., Wang Z., Chen L., Xue R., Wang F., “The mechanism of lithium ion transport in poly acrylonitrile based polymer
electrolytes,” Solid state ionics, 1996, pp. 279-284.
15. Girish Kumar G., Sampath S., “Spectroscopic characterization of a gel polymer electrolyte of zinc triflate and polyacrylonitrile,”
Polymer, 2004, pp.2889-2895.
16. Narasimha Rao Maragani, N.Krishna jyothi, K.Vijaya kumar, “Structural, Thermal and Battery Characteristic Properties of
NH4CF3SO4 Doped PAN films for Electrochemical Cell Applications,” International Journal of ChemTech ResearchCODEN (USA):
IJCRGG ISSN: 0974-4290 Vol.9, No.5, 2016, pp 432-438.
17. Xianguo Ma, Xinglan Huang, JiandongGao, Shu Zhang, ZulingPeng, Zhenghua Deng, JishuanSuo,Anionic polymer electrolyte with
enhanced electrochemical performance based on surface-charged latex nanoparticles for flexible lithium-ion batteries,” J. Power
sources, 2014; pp.259-266.
18. R.F Bhajantri, V.Ravichandary, A.Harsha Vincent crasta, suresh P Nayak, Bojapoojary, “Micro structural studies on Bacl2 doped PVA
polymer. Polymer, 2006, pp.3591-3598.
19. N.Krishna Jyothi, K.Vijaya Kumar, P.Narayana Murthy, ”FTIR, XRD and DC Conductivity Studies of Proton Conducting Gel
Polymer Electrolytes Based on Polyacrylonitrile (PAN),” Int.J.Chem.Tech.Res.,69(13),2014,pp.5214-5219.
20. Dr. Narasimha Rao Maragani, M.Gnana Kiran, “AC conductivity and Dielectric studies of PVA based solid polymer
electrolytes,”.J.Indian.Chem.society, vol 96, January 2019 pp 76-77.
21. Maragani Narasimharao, Vijayakumar K. “Effect of Al2O3 ceramic filler on PAN-based composite Gel polymer electrolytes for
Electrochemical Cell Applications.” Vol. 15, No. 4, Iranian Journal of Material Science and Engineering, 2018,pp 132-140.
22. Maragani Narasimharao, Vijayakumar K. “Structural and ionic conductivity studies on Plasticized PAN- Sodium Fluoride Polymer
Electrolytes for Electro chemical cell Applications.” Iranian Journal of Material Science and Engineering. 14(4), 2017, pp.1-10.

Authors: Bernd Wiedecke, Mamatov Narzillo, Mirabbos Payazov, Samijonov Abdurashid

Paper Title: Acoustic Signal Analysis and Identification


Abstract: Speech in one of most important things in our life. Creating community between human and
machine using speech is one of critical problems. Signal processing helps to solve the basic stages of various
areas of this problem. Working in the field of speech-audio signals processing is conducted very actively. Article
describes examples of analysis and speech-audio signals one of the methods processing.

424. Keywords: acoustic signals, frequency range, identification, signal processing, wavelet and spectrum analysis.
2440-
References: 244
2
1. B.Wiedecke, V.Khamrayeva, M. Payazov: Analysis of components of speech audio signals in the extended frequency range.–Tashkent:
Vestnik TUIT, № 1, 2010.
2. B.Wiedecke, V.Khamrayeva, M. Payazov: Sizzling signals in the process of identification and recognition of speech. – Tashkent:
Vestnik TUIT, № 3, 2010.
3. A.K. Alimurodov, R.R. Churakov «Rewiew and classification methods for processing speech signals in the speech recognation
systems» Measurement. Monitoring. Control. Control № 2. 2015
4. A.В. Davidov «Hilbert-Huang transformation» 2010.

Authors: Mamatov Narzillo, Samijonov Abdurashid, Nurimov Parakhat, Niyozmatova Nilufar

Paper Title: Automatic Speaker Identification by Voice Based on Vector Quantization Method
Abstract: In this paper, the systems of speaker identification of a text-dependent and independent nature were
considered. Feature extraction was performed using chalk-frequency cepstral coefficients (MFCC). The vector
quantization method for the automatic identification of a person by voice has been investigated. Using the
extracted features, the code book from each speaker was built by clustering the feature vectors. Speakers were
modeled using vector quantization (VQ). Using the extracted features, the code book from each speaker was
built by clustering the feature vectors. Codebooks of all announcers were collected in the database. From the
results, it can be said that vector quantization using cepstral features produces good results for creating a voice
425. recognition system.
2443-
Keywords: cepstral coefficient, criteria, feature, identification, method, model, phoneme, probability, signal, 244
speech. 5

References:

1. Campbell J.P. Speaker Recognition: A Tutorial // Proceedings of the IEEE. 1997. Vol. 85, No. 9. P. 1437-1462.
2. Y.Linde, A.Buzo, and R.M.Gray .: ‘An algorithm for vector quantizer design,” IEEE Trans. Commun. ’, Vol. COM-28, no. 1, pp. 84-
95, 1980.
3. A.Gersho, R.M.Gray .: ‘Vector Quantization and Signal Compression’, Kluwer Academic Publishers, Boston, MA, 1991.
4. Dr.H.B.Kekre, Ms.Vaishali Kulkarni, Speaker Identification by Vector Quantization, International Journal of Engineering Science and
Technology Vol. 2 (5), 2010, 1325-1331.

Authors: Mamatov Narzillo, Samijonov Abdurashid, Nurimov Parakhat, Niyozmatova Nilufar

Paper Title: Karakalpak Speech Recognition with CMU Sphinx


Abstract: One of the main problems of speech recognition systems is the diversity of natural languages. Most
426.
of the existing systems can recognize the verbal information of some natural languages. But speech recognition 2446-
on many languages is not introduced into these systems due to objective or subjective reasons. Including Uzbek, 244
Tajik, Karakalpak and other languages. 8
Keywords: amplitude, criteria, feature, frequency, phoneme, probability, segment, signal, speech.

References:

1. Kipyatkova, I. S., Ronzhin, A. L., and Karpov, A. A. 2013. Automatic processing of colloquial Russian. St. Petersburg.
2. https://cmusphinx.github.io/wiki/tutorialoverview/
3. Rabiner, L. and Juang, V.N. 1993. Fundamentals of Speech Recognition. Prentice Hall.

Authors: Manish Mohan Baral, Amitabh Verma, Venkataiah Chittipaka

Paper Title: Ethics in Cloud Computing: Implications for India


Abstract: Cloud Computing (CC) has drawn the attention in global business level. It is another age of
computing systems, progressively creating a promising answer to computing complexity and increasing size of
data. Although the evolution has not reached the maturity level but still there is adequate research about this
topic. The study is proposed to identify the factors, which influences cloud computing adoption (CCA) in India
through ethical context. Research was conducted using methodology of quantitative technique, which was based
on study of 149 respondents from different industries in India. A research model was proposed which consisted
of 6 hypothesis and then tested through multiple regression methods and factor analysis. The findings of the
study shows that reliance on technology, proscriptive pressure and control are significant contributors and
functional creep, compliance and educational pressure were insignificant contributors. It classifies probable
advantages and probable ethical or moral issues for would be clients, particularly in the field of business.

Keywords: Factors, Cloud Computing, Ethical, India.

References:

1. Zhang, Q., Cheng, L., and Boutaba, R. 2010. Cloud computing: state-of-the-art and research challenges. Journal of internet services and
applications 1, 1 (2010), 7-18.
2. Reviewer-Gvero, I. 2014. Cloud computing concepts, technology and architecture by Thomas Erl, Zaigham Mahmood and Ricardo
Puttini. ACM SIGSOFT Software Engineering Notes 39, 4 (2014), 37-38.
3. Palmer, M., & Bradshaw, T. 2011. Storm of publicity for cloud computing. Financial Times, 2011
4. McCarthy, J. 1961. Centennial Keynote address, Cambridge: Massachusetts Institute of Technology, (1961).
5. Parkhill, D. 1966. The challenge of computer utility, Reading: Addison-Wesley (1966).
6. ARIF, M. A history of cloud computing, Computer weekly, (2009).
7. Dikaiakos, M. D., Katsaros, D., Mehra, P., Pallis, G., and Vakali, A. 2009. Cloud computing: Distributed internet computing for IT and
scientific research. IEEE Internet computing, 13, 5, (2009), 10-13.
8. Gartner. 2010. Gartner Special Report, The What, Why and When of Cloud Computing, (2010).
9. Kim, W. 2009. Cloud computing: Today and tomorrow. Journal of object technology, 8,1, (2009), 65-72.
427. 10. Grimes, J. M., Jaeger, P. T., and Lin, J. 2009. Weathering the storm: The policy implications of cloud computing, (2009).
11. Haeberlen, A. 2010. A case for the accountable cloud. ACM SIGOPS Operating Systems Review, 44,2, (2010), 52-57. 2449-
12. Timmermans, J., Stahl, B. C., Ikonen, V., and Bozdag, E. 2010. The ethics of cloud computing: A conceptual review. In IEEE 2nd 245
International Conference on Cloud Computing Technology and Science, (2010), 614-620.
13. Murley, D. 2009. Law libraries in the cloud. Law Library Journal, 101, (2009), 249.
3
14. de Bruin, B., and Floridi, L. 2017. The ethics of cloud computing. Science and engineering ethics, 23, 1, (2017), 21-39.
15. Faragardi, H. R. 2017. Ethical Considerations in Cloud Computing Systems. Multidisciplinary Digital Publishing Institute
Proceedings, 1,3, (2017), 166.
16. Paquette, S., Jaeger, P. T., & Wilson, S. C. 2010. Identifying the security risks associated with governmental use of cloud
computing. Government information quarterly, 27, 3, (2010), 245-253.
17. Carter, I. The independent value of freedom. Ethics, 1995, 105, 819-845.
18. Hair, J.F., Black, W.C., Babin, B.J. and Anderson, R.E. 2010. Multivariate Data Analysis, 7th ed., Prentice Hall, Upper Saddle River,
New Jersey, (2010).
19. Hair, F, Black, W, Babin, B, Anderson, R and Tatham, R. 2005. Multivariate data analysis, 6th edn, Pearson Prentice Hall, Upper
Saddle River, New Jersey, (2005).
20. Thompson B. 2004.Exploratory and confirmatory factor analysis: understanding concepts and applications. Washington, DC: American
Psychological Association, (2004).
21. Pallant, J. 2011. Multivariate analysis of variance. SPSS survival manual. Crows Nest: Allen & Unwin, 20, 11, (2011), 283-296.
22. Norman, G. 2010. Likert scales, levels of measurement and the “laws” of statistics. Advances in health sciences education, 15, 5,
(2010), 625-632.
23. Sullivan, G. M., & Artino Jr, 2013. A. R. Analyzing and interpreting data from Likert-type scales. Journal of graduate medical
education, 5,4, (2013), 541-542.
24. Shah Alam, S., Ali, M. Y., & Mohd. Jani. 2011. M. F. An empirical study of factors affecting electronic commerce adoption among
SMEs in Malaysia. Journal of business economics and management, 12, 2, (2011), 375-399.
25. Sin Tan, K., Choy Chong, S., Lin, B., & Cyril Eze, U. 2010. Internet-based ICT adoption among SMEs: Demographic versus benefits,
barriers, and adoption intention. Journal of enterprise information management, 23, 1, (2010), 27-55.
26. Ifinedo, P. 2011. Internet/e-business technologies acceptance in Canada's SMEs: an exploratory investigation. Internet Research, 21, 3,
(2011), 255-281.
27. Levenburg, N., Magal, S. R., & Kosalge, P. 2006. An exploratory investigation of organizational factors and e‐business motivations
among SMFOEs in the US. Electronic Markets, 16, 1, (2006), 70-84.
28. Prasad, A., Green, P., Heales, J., & Finau, G. 2014. Towards a Model of Cloud Computing Services for SMEs. Australasian
Conference of Information Systems, Auckland, NZ, (2014).
29. Jambekar, A.B., & Pelc, K.I. 2002. Managing a manufacturing company in a wired world. International Journal of Information
Technology & Management, 1, 1, (2002), 131-141.
30. Alshamaila, Y, Papagiannidis, S & Li, F. 2013. Cloud computing adoption by SMEs in the north east of England: A multi-perspective
framework, Journal of Enterprise Information Management, 26, 3, (2013), 250-275.

Authors: Niranjan Kumar, Saurabh Sambhav, Prakash Kumar, Srest Somay

Paper Title: Multiwall Carbon Nanotube Made Antenna At Terahertz Frequency Range
Abstract: Earlier the propagation capability of BCNTs (bunch carbon nanotubes) made antenna was studied in
terahertz frequency vicinity and its fulfilments were correlated with conventionally used thin gold film antenna.
Those experiments were performed on the half-wave ribbon aerial of BCNTs and then on thin gold foil antennas
which were resonated from 1THz to 50THz frequency range. To calculate its radiation efficiency they use both
Moment of the moment (MOM) and potential integral equation (MPIE) technique. The numerical simulated
result tells us that the radiation capability of a BNCTs of density 104 (CNTs/um) antenna has typically become
smaller than the capability of gold foil antenna. We have experimented with replacing BCNT by MWCNT made
antenna and studied its result on the same frequency range. After examination, we found that the interband
transitions hinder big problems in MWCNT. It also hinders the propagation of guided wave and gives spoiling
effect basically in the achievement of a fixed dimension MWCNT when we used it as an antenna.

Keywords: Multiwall Carbon Nanotube, Interband transitions, scattering parameters, gold carbon ribbon.
428.
References:
2454-
1. M. V. Shuba. “Theory of multiwall carbon nanotubes as waveguides and antennas in the infrared and the visible regimes”, Physical 245
review B, 04/2009.
2. M. V. Shuba. “Electromagnetic wave propagation in an almost circular bundle of closely packed metallic carbon nanotubes” Physical
7
Appraisal B, 10/2007.
3. M.S. Dresselhaus, G. Dresselhaus, and Ph. Avouris, Carbon Nanotubes (Springer, Berlin, Germany, 2001).
4. S. Reich, C. Thomsen, and J. Maultzsch “Carbon Nanotube, Basic Concepts and Physical Properties” (Wiley-VCH, Berlin, Germany,
2004).
5. M. L. Schipper, N. Nakayama – Rachhford, C. R. Davis, N. W. S. Kam, P. Chu, Z. Liu, X. Sun, H. Dai, and S. S. Gambhir, “ Nature
Nanotechnology “. 3, 216 (2008).
6. G. Ya. Slepian, S. A. Maksimenko, A. Lakhtakia, O. Yevtushenko, and A. V. Gusakov, Phys. Rev. B 60, 17136 (1999).
7. S. A. Maksimenko and G.Ya. Slepian, “In Electromagnetic Fields in Unconventional Materials and Structures” (O. N. Singh and A.
Lakhtakia, Eds.) (Wilei, New Yourk, NY, USA, 2000), pp 217-255.
8. S. A. Maksimenko and G. Ya. Slepian, “Nano electromagnetics of low-dimensional structures, in Nanometer Structures: Theory,
Modeling and Simulation” (A. Lakhtakia, ed) (SPIE Press, Bellingham. WA, USA. 2004), pp, 145-206.
9. M. J. Hagmann, IEEE Trans. “Nanotechnology” 4, 289 (2005).
10. J. Rybcznski. K. Kempa, A. Herczynski, Y. Wang, M. J. Naughton. Z. F. Ren, Z. P. Huang, D. Cai, and M. Giersig, Appl. Phys.
Lett. 90 021104 (2007).
11. A. Raychowdhury and K. Roy, IEEE Trans, CAD Integrated, Circ. Syst. 25, 58 (2006).
12. A. G. Chiariello and G. Miano, COMPEL Int. J. Comp. Math. Electrical Electron. Engg, 26 571 (2007).
13. A. Maffucci, G. Miano, and F. Villone, Int. J. Circ. Theory Appl. 36. 31 (2008).
14. H. Li, W. Y. Yin, K. Banerjee, and J. F. Mano, IEEE Trans Electron Device.
15. Y. Wang, K. Kempa, B. Kimball, J. B. Carlson, G. Benham, W. Z. Li, T. Kimball, J. Rybczynski, and Z. F. Ren, Appl. Phys. Lett.
85, 2607 (2004).
16. G. W. Hanson, IEEE Antennas Propagat. Mag. In press, June (2008).
17. M. Ge and K. Sattler, Science 260, 515 (1991).
18. J. Hao and G. W. Hanson, Phys. Rev. B 74, 035119 (2006).
19. J. Hao and G. W. Hanson, Phys. Rev. B 75, 165416 (2007).
20. O. V. Kibis and M. E. Portnoi, Tech. Phys. Lett. 31, 671 (2005).
21. O. V. Kibis, M. Rosenan de Costa, and M. E. Portnoi, Nano Lett. 7, 3414 (2007).
22. S. Bandow, M. Takizawa, K. Hirahara, M. Yudasaka, and S. lijima, Chem. Phys. Lett. 337, 56 (2001).
23. S. Wang and M. Grifoni, Phys. Rev. Lett. 95, 266802 (2005).
24. R. Saito, G. Dresselhaus, and M. S. Dresselhaus, Appl. Phys. 73, 494 (1993).
25. P. Lambin, V. Meunier, and A. Rubio, Phys. Rev. B 62, 5129 (2000).
26. K. H. Ahn, Y. H. Kim, J. Wiersig and K. J. Chang, Phys. Rev Lett 90. 026601 (2003).
27. S. A. Maksimenko, A. A. Khrushchinsky, G. Ya. Slepian, and O. V. Kibis, J. Nanophoton,1, 013505 (2007).
28. S. Iijima, Nature (London) 354, 56 (1991).
Authors: Aishwarya Rastogi, Amit Doegar

Paper Title: Object-Based and Rule-Based Classification of Synthetic Aperture Radar Images
Abstract: Since thousands of years, the land is the basic and very important requirement for humans to survive
and grow. The surface area of the earth provided by nature contains many different geographical locations
divided into oceans, mountains, rivers, barren land, fertile land, ice caps and many more. The huge land masses
and water bodies need to be observed and analyzed for optimum utilization of resources. Remote sensing is the
best possible way to observe the earth's surface from a distance through different satellites and sensors. But most
of the satellite images are not clear up to the extent to classify different terrain features accurately. Hence
classification of image is needed to observe different terrain features in original images. In this study, the aim is
to propose a branch of natural computation for SAR image classification into different terrain features with
better information retrieval and accuracy measures as compared to traditional methods for satellite image
429. classification. The object-based analysis has been used to extract spectral reflectance of five texture measures
2458-
namely urban, rocky, vegetation, water and barren to generate training set. Minimum distance to mean classifier
246
has been used with one of the Nature Inspired computation technique i.e. bacterial foraging optimization
3
algorithm for the satellite image classification, to extract the more accurate information about land area of Alwar
district, Rajasthan, India. In the proposed study a high-quality thematic map has been generated with the 7-band
multi-spectral, medium-resolution satellite images. This approach provides the greater speed and accuracy in its
computation with 97.43% overall accuracy (OA) and 0.96 Kappa co-efficient.

Keywords: Synthetic Aperture Radar (SAR) Image, Land use land cover (LULC), Object-based image analysis
(OBIA), Bacterial Foraging Optimization Algorithm (BFOA).

References:
1. H. Zakeri, F. Yamazaki, and W. Liu, “Texture Analysis and Land Cover Classification of Tehran Using Polarimetric Synthetic
Aperture Radar Imagery,” Applied Sciences, vol. 7, no. 5, p. 452, 2017
2. Brando, V.E., Dekker, A.G. "Satellite hyperspectral remote sensing for estimating estuarine and coastal water quality." IEEE Trans.
Geosci. Remote Sens. 2003, 41,1378-1387.
3. Molch, K."Radar Earth Observation Imagery for Urban Area Characterisation”,JRC Scientific and Technical Reports; European
Commission: Luxembourg,2009; pp. 1-19.
4. Turner, B.L.; Lambin, E.F. ; reenberg, A. "The emergence of land change science for global environmental change and sustainability”.
Proc. Natl. Acad. Sci. USA 2007, 104, 20666-20671.
5. Pro-Lite Technology, 2019. [Online]. Available: https://www.pro-lite.co.uk/File/laser_safety_laser_basics.php. [Last Accessed: 23
July, 2019].
6. P. Wang and V. M. Patel, “Generating high quality visible images from SAR images using CNNs,” 2018 IEEE Radar Conf. RadarConf
2018, pp. 570–575, 2018.
7. Hendorson, F.M.; Lewis, A.J. Introduction. In Principles and applications of Imaging Radar, 3 rd ed.; Manual of Remote Sensing; John
Wiley & Sons Inc.: New York, NY, USA,1998; pp. 1-6.
8. Lillesand, T.M.; Kiefer, R.W.; Chipman, J.W." Remote Sensing and Image Interpretation”, 5 th ed.; John Wiley &Sons Inc.: New York,
NY, USA, 2004: pp. 638-713
9. Dell' Acqua, F,; Gamba, P. "Texture-based characterisation of urban environmental on satellite SAR images”.IEEE Trans. Geosci.
Remote Sens. 2003, 41, 153-159
10. Centre for Remote Imaging, Sensing and Processing, “Dr. S. C. Liew”, 2001. [Online]. Available:
https://crisp.nus.edu.sg/~research/tutorial/mw.htm. [Last Accessed: 23 July, 2019].
11. R. C. Weih and N. D. Riggan, “Object-based classification vs. pixel-based classification: Comparitive importance of multi-resolution
imagery”, Int. Arch. Photogramm. Remote Sens. Spat. Inf. Sci., vol. XXXVIII, pp. 1–6, 2010.
12. Y. Guo, X. Jia, and D. Paull, “Effective Sequential Classifier Training for Multitemporal Remote Sensing Image Classification,” IEEE
Transactions on image processing, pp. 1-6, 2018
13. C. D. Man, T. T. Nguyen, H. Q. Bui, K. Lasko, and T. N. T. Nguyen, “Improvement of land-cover classification over frequently cloud-
covered areas using Landsat 8 time-series composites and an ensemble of supervised classifiers,” International Journal of Remote
Sensing, vol. 39, no. 4, pp. 1243–1255, 2018.
a. Sewnet and G. Abebe, “Land use and land cover change and implication to watershed degradation by using GIS and remote sensing in
the Koga watershed, North Western Ethiopia,” Earth Science Informatics, vol. 9, pp. 99–108, 2017.
14. M. I. Sameen, B. Pradhan, H. Z. M. Shafri, M. R. Mezaal, and H. Bin Hamid, “Integration of Ant Colony Optimization and Object-
Based Analysis for LiDAR Data Classification,” IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing,
vol. 10, no. 5, pp. 2055–2066, 2017.
Authors: E.V.N.Jyothi, S.Sailaja

Paper Title: Upcoding Fraud Discovery in the Economical Fields Using Block Chain Technology
Abstract: Discovering the fraud is the most important now a days as it is observed in every sector starting from
Banks to schools. Therefore it is significant discover this fraud so that the loss could be zero. Upcoding
fraudulence is one kind of fraud observed now days in which the provider gains extra monetary by coding a
solution in spite it is taken by the claimer the fraud will claim the insurance one more time without allusion of
certified person. Owed to this claimer could misplace assurance still he is endorsed person to increase due to
fraud has already claimed the monetary. With the help of expert system and data withdrawal it’s easier to
recognize scam. With superior technologies like block chaining it’s easier to detect fraud in the addition of fraud
it is also known the history of the fraud. This paper concentrates on up coding Fraudulence discovery using
block chain technology.

Keywords: Blockchain, Upcoding, Fraud Discovery.

References:
430. 1. Phua, Clifton, et al. "A comprehensive survey of data miningbased fraud detection research." [2010]. 2464-
2. Kirkos, Efstathios, Charalambos Spathis, and Yannis Manolopoulos. "Data mining techniques for the detection of fraudulent financial 246
statements." [2007]: 995-1003.
3. Hastie, Trevor, Robert Tibshirani, and Jerome Friedman. "Unsupervised learning." [2009]. 485-585. 8
4. Zanero, Stefano, and Sergio M. Savaresi. "Unsupervised learning techniques for an intrusion detection system." [2004].
5. Zhu, Xiaojin. "Semi-supervised learning literature survey." [2005].
6. http://www.slideshare.net/Tatiana.lando/clusteringpresentation
7. Kumar, Mohit, Rayid Ghani, and Zhu-Song Mei. "Data mining to predict and prevent errors in health insurance claims processing."
[2010].
8. Suresh, Nallan C., et al. "Detection of upcoding and code gaming fraud and abuse in prospective payment healthcare systems." [2014].
9. Prasadu Peddi [2017] Design of Simulators for Job Group Resource Allocation Scheduling In Grid and Cloud Computing
Environments, ISSN: 2319-8753 volume 6 issue 8 pp: 17805-17811.
10. Hsia, Renee Y., and Yaa Akosa Antwi. "Variation in charges for emergency department visits across California." [2014]: 120-126.
11. Chandola, Varun, Sreenivas R. Sukumar, and Jack C. Schryver. "Knowledge discovery from massive healthcare claims data." [2013].
12. Luo, Wei, and Marcus Gallagher. "Unsupervised DRG upcoding detection in healthcare databases." [2010].
13. Jürges, Hendrik, and Juliane Köberlein-Neu. "First Do No Harm-Then Do Not Cheat: DRG Upcoding in German Neonatology."
[2013].
14. E.V.N. Jyothi, V. Purna Chandra Rao, “A Comparative Study on Access Controls and its Characteristics”, Jour of Adv Research in
Dynamical & Control Systems, Vol. 11, 04-Special Issue, 2019.
15. Sasongko, Nanang. "Fraud Detection In Non-Cash T ransactions Using Information System Audit (A Case Study Of Government Bank
in Bandung Indonesia)." [2015].

Authors: Mai M Eldeeb, Akram S kotb, Hany S Riad, Ayman A. Ashour

Paper Title: Passenger Capacity of Underground Metro by the Use of Neural Network Program (NNP)
431. Abstract: The present paper deals with studying on (GCUM) by the use of (NNP), consequently, the future
2469-
passenger fluctuations can be well predicted and it will be helpful to make wise decisions for realizing the most
247
safety and economic future operation.To attain this goal, a methodology was proposed to collect the necessary
3
data and analyze them. These data were applied as the inputs into the Neural Network Program (NNP) for the
two (GCUM) lines ‘1’ & ‘2’ to have two models as inputs and outputs, one for the 1st line and the other for the
2nd one, taking only into consideration, the input, and output variables which gave tolerances less 19% than that
were obtained by applying excel program. Thus, it is easily to predict the future capacity for any predicted year,
and the corresponding headway as well as to prepare an estimated schedule complies with the required future
Rolling Stock (RS).

Keywords: Greater Cairo Underground Metro (GCUM), metro schedule; annual fluctuations of metro
passengers, Neural Network Program (NNP), Rolling Stock (RS).

References:

1. HAYKIN, S “Redes Neurais: princípios e prática. 2nd ed. POA-RS, Bookman. 2001
2. Michael A. Arbib, Fletcher Jones. Handbook of brain theory and neural networks. 2nd ed. Cambridge, MIT Press. 2003
3. BRAGA, A.P., CARVALHO, A.L.F., LUDERMIR, T. B.. Redes Neurais Artificiais: teorias e aplicações. RJ: LTC. 2000
4. Wei He, Senior Member, IEEE, and Yiting Dong, Student Member, IEEE. "Adaptive Fuzzy Neural Network Control for a Constrained
Robot Using Impedance Learning”. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS.
5. Barbara Korousic –Seljak “TIMETABLE CONSTRUCTION USING GENERAL HEURISTIC TECHNIQUES” Journal of
ELECTRICAL ENGINEERING, VOL. 53, NO. 3-4, 2002, pp. 61-69.
6. Masoud Yaghini*, Mohammad M. Khoshraftar and Masoud Seyedabadi, “Railway passenger train delay prediction via neural network
model”. JOURNAL OF ADVANCED TRANSPORTATION, J. Adv. Transp. 2013; 47:355–368.
7. Carey M, Kwiecinski “A. Stochastic approximation to the effects of headways on knock-on delays of trains”. Transportation Research
2007; 28:251–267.
8. Yuan J. Stochastic Modeling of Train Delays and Delay Propagation in Stations, PhD dissertation, Delft University of Technology,
Faculty of Civil Engineering and Geosciences, Department of Transportation and Planning, 2006.
9. Zonglei L, Jiandong W, Guansheng Z. “A new method to alarm large scale of flights delay based on machine learning. International
Symposium on Knowledge Acquisition and Modeling” 2008; 589–592. DOI: 10.1109/KAM.2008.18.
10. Dragana Macura, Milica Šelmić, Branka Dimitrijević, Milorad Miletić. “NEURAL NETWORK BASED MODEL FOR PREDICTING
THE NUMBER OF SLEEPING CARS IN RAIL TRANSPORT”. International Journal for Traffic and Transport Engineering, 2015,
5(1): 29 – 35.
Mikhail Yu. Dyakonov, Aleksey Valeryevich Novikov, Diana N. Slabkaya, Suzana L. Balova,
Authors:
Vladimir Dmitriyevich Sekerin, Anna Evgenievna Gorokhova
Paper Title: Customer Service Quality Management System
Abstract: A service enterprise is considered to be a complex set of material and technical, information, labor,
financial and human resources, whose diversity involves the search for ways of rational combination and use
them to ensure the achievement of the set goals of the enterprise. Service quality management is one of the types
of management activities that arose as a result of the labor division and specialization of enterprise management
functions. The aim of the study is to identify the possibilities of designing a Service Quality Management
System at the enterprises of the restaurant industry meeting the requirements of ISO 9001.The article shows the
relevance of solving the problem of modeling the customer service quality management system based on ISO
standards in the enterprise of the restaurant business, as well as analyzes various theoretical approaches to
understanding the essence of the service quality management system.To achieve the set goal, a structural and
functional model of the customer service quality management system was developed, as well as a model of the
staff quality management system.

Keywords: quality management, quality management system, customer service quality management system,
staff quality management system, restaurant business.

References:

1. R.P. Valevich, “Upravlenie kachestvom tovarov i uslug” [Quality management of goods and services], Minsk, Publishing House of the
432.
Belarusian State Economic University, 2008, pp. 304. 2474-
2. S.L. Ahire, “Total quality management interfaces: An integrative framework”, Management Science, 27(6), 1997, pp. 91-105.
3. V.K. Chong, M.J. Rundus, “Total quality management, market competition, and organizational performance”, British Accounting
247
Review, 36, 2004, pp. 155-172. 8
4. M. Zineldin, “Total relationship management (TRM) and total quality management (TQM)”, Managerial Auditing Journal, 15(1/2),
2000, pp. 20-28.
I. Ghobadian, S. Speller, M. Jones, “Service quality: Concepts and models”, International Journal of Quality and Reliability Management,
11(9), 1994, pp. 43-66.
5. G.S. Sureshchandar, C. Rajendran, R.N. Anantharaman, “A conceptual model for total quality management in service organizations”,
Total Quality Management, 12(3), 2001, pp. 343-363.
6. H. Kaynak, “The relationship between total quality management practices and their effects on firm performance”, Journal of Operations
Management, 21, 2003, pp. 405- 435.
7. J. Dulen, “Quality control”, Restaurant and Institutions, 109(5), 1999, pp. 38-52.
8. S-K. Rheea, J.Y. Rhab, “Public service quality and customer satisfaction: Exploring the attributes of service quality in the public
sector”, The Service Industries Journal, 29(11), 2009, pp. 1491-1512.
9. N. Chowdhary, M. Prakash, “Prioritizing service quality dimensions”, Managing Service Quality, 17(5), 2007, pp. 493-509.
I. Gil, G. Berenguer, A. Cervera, “The roles of service encounters, service value, and job satisfaction in achieving customer satisfaction in
business relationships”, Industrial Marketing Management, 37(8), 2008, pp. 921-939.
10. S.S. Andaleeb, C. Conway, “Customer satisfaction in the restaurant industry: An examination of the transaction-specific model”,
Journal of Services Marketing, 20(1), 2006, pp. 3-11.
11. Quality management principles. International Organization for Standardization. ISO Central Secretariat. Geneva, Switzerland Retrieved
from https://www.iso.org/files/live/sites/isoorg/files/archive/pdf/en/pub100080.pdf
12. Y. Namkung, S. Jang, “Are highly satisfied restaurant customers really different? A quality perception perspective”, International
Journal of Contemporary Hospitality Management, 20(2), 2008, pp. 142-155.
13. S. Marković, S. Raspor, K. Šegarić, “Does restaurant performance meet customers’ expectations? An assessment of restaurant service
quality using a modified DINESERV approach”, Tourism and Hospitality Management, 16(2), 2010, pp. 181-195.
14. N. Barber, R.J. Goodman, B.K. Goh, “Restaurant consumers repeat patronage: A service quality concern”, International Journal of
Hospitality Management, 30(2), 2011, pp. 329-336.
15. J. Ha, S.C. Jang, “Effects of service quality and food quality: The moderating role of atmospherics in an ethnic restaurant segment”,
International Journal of Hospitality Management, 29(3), 2010, pp. 520-529.
16. E.A. Wall, L.L. Berry, “The combined effects of the physical environment and employee behavior on customer perception of restaurant
service quality”, Cornell Hotel and Restaurant Administration Quarterly, 48(1), 2007, pp. 59-69.
17. C.H.J. Wu, R.D. Liang, “Effect of experiential value on customer satisfaction with service encounters in luxury-hotel restaurants”,
International Journal of Hospitality Management, 28(4), 2009, pp. 586-593.
18. M. Haghighi, A. Dorosti, A. Rahnama, A. Hoseinpour, “Evaluation of factors affecting customer loyalty in the restaurant industry”,
African Journal of Business Management, 6(14), 2012, pp. 5039-5046.
Authors: Bhavana, V. Jagan Naveen, K. Krishna Kishore

Paper Title: Comprehensive Analysis of Machine Learning Algorithms for Face Detection
Abstract: Face detection is the most common application used in security system, cameras, fun face filter
apps, etc. many techniques and algorithms are introduced by developers for face detection in real time but all
techniques or algorithms does not give best results while applying on all ranges of processors. In this, three
machine learning algorithms i.e. Histogram of Oriented Gradient, Haar cascade classifier and deep neural
networks implemented on different processors for verifying processing speed of each algorithm on the different
processor.

Keywords: Deep neural network, Haar cascade classifier, Histogram of oriented gradient, Machine learning.

References:
433.
1. G K, Vasyl T. Structure and model of the smart house security system using machine learning methods. In2017 2nd International
2479-
Conference on Advanced Information and Communication Technologies (AICT) 2017 Jul 4 (pp. 105-108). IEEE 248
2. “Machine Learning For Dummies” by John Paul Mueller and Luca Massaron 2
3. Han F, Shan Y, Cekander R, Sawhney HS, Kumar R. A two-stage approach to people and vehicle detection with hog-based svm.
InPerformance Metrics for Intelligent Systems 2006 Workshop 2006 Aug 21 (pp. 133-140).
4. Viola P, Jones M. Rapid object detection using a boosted cascade of simple features. CVPR (1). 2001 Dec 8;1(511-518):3.
5. Farfade, S.S., Saberian, M.J. and Li, L.J., 2015, June. Multi-view face detection using deep convolutional neural networks.
In Proceedings of the 5th ACM on International Conference on Multimedia Retrieval (pp. 643-650). ACM.
6. Freund Y, Schapire RE. A decision-theoretic generalization of on-line learning and an application to boosting. Journal of computer and
system sciences. 1997Aug 1;55(1):119-39.
7. LeCun Y, Bengio Y, Hinton G. Deep learning. nature. 2015 May;521(7553):436
8. Indola FN, Han S, Moskewicz MW, Ashraf K, Dally WJ, Keutzer K. SqueezeNet:AlexNet-level accuracy with 50x fewer parameters
and <0.5MBJmodel size. arXiv preprint arXiv:1602.07360.2016 Feb 24
9. Y, Shelhamer E, Donahue J, Karayev S, Long J, Girshick R, Guadarrama S, Darrell T. Caffe: Convolutional architecture for fast feature
embedding. InProceedings of the 22nd ACM international conference on Multimedia 2014 Nov 3 (pp. 675-678). ACM
10. “Artificial intelligence computing leadership from Nvidia”, www.nvidia.com.

Authors: M Nagaraju, Priyanka Chawla

Paper Title: IoT Implementation and Management for Smart Farming


Abstract: Precision agriculture can enable the vision of smart agriculture, improves the crop productivity and
increases profitability of yields. Utilization of water is also an important criterion for a good agriculture and high
production. The new dimension of smart farming in agriculture is Internet of Things. The IoT is a best solution
for smart agriculture due to the use of interoperable, pervasive, scalable and open technologies and gained
momentum in the field of agriculture. The advanced growth in IoT technologies even made the dream come true
with the connectivity reached to rural areas. The use of highly accurate IoT sensors can measure the
environmental context of farms and helps in improving the accuracy of precision agriculture. This paper reviews
the various applications of IoT motivated by a purpose to identify various areas with latest trends, architecture
frameworks. Selected papers were clustered based on various domain and subdomains corresponding to the
usage of sensors, actuators, communication technologies, energy controls, storage solutions, data analysis for
decision making and visualization to the farmer through web applications.

Keywords: Data Analysis, Decision Making, Internet of Things, IoT Technologies, Precision Agriculture,
434.
Smart Agriculture. 2483-
249
References: 1

1. Aiello, G., Giovino, I., Vallone, M., Catania, P., & Argento, A, “A decision support system based on multisensor data fusion for
sustainable greenhouse management”. Journal of Cleaner Production (in press), 2017.
2. Amarendra Goapa, Deepak Sharma, A.K. Shukla, C. Rama Krishna., “An IoT based smart irrigation management system using
Machine learning and open source technologies”. Journal of Computers and Electronics in Agriculture, 2018, pp: 41–49.
3. Andreas Kamilaris, Feng Gao, Francesc X. Prenafeta-Boldu and Muhammad Intizar Ali., “Agri-IoT: A Semantic Framework for
Internet of Things-enabled Smart Farming Applications”. IEEE 3rd World Forum on Internet of Things (WF-IoT), 2016, pp: 442-445.
4. Barcelo-Ordinas, J. M., Chanet, J. P., Hou, K.-M., & Garcia-Vidal, J., “A survey of wireless sensor technologies applied to precision
agriculture”. Precision Agriculture, 13, 2016, pp: 801-808.
5. Barrachina-Muñoz, S., Bellalta, B., Adame, T., Bel, A., “Multi-hop communication in the uplink for LPWANs”. Computing.
Networks. 123, 2017, pp: 153–168.
6. Dieisson Pivoto, Paulo Dabdab Waquil, Edson Talamini, Caroline Pauletto Spanhol Finocchio, Vitor Francisco Dalla Corte, Giana de
Vargas Mores., “Scientific Development of Smart Farming Technologies and their Application in Brazil”. Information Processing in
Agriculture Journal, 2018, pp: 21–32.
7. Farzad Kiani, Amir Seyyedabbasi., “Wireless Sensor Network and Internet of Things in Precision Agriculture”. International Journal of
Advanced Computer Science and Applications (IJACSA), Vol. 9, No. 6, 2018, pp: 99-102.
8. Ferentinos, K. P., Katsoulas, N., Tzounis, A., Kittas, C., & Bartzanas T., “A climate control methodology based on wireless sensor
networks in greenhouses”. Acta Horticulturae, 1107, 2015, pp: 75-82.
9. Geng Bai, Yufeng Ge, Waseem Hussain, P. Stephen Baenziger, George Graef., “A Multi-Sensor System for High Throughput Field
Phenotyping in Soybean and Wheat Breeding”. Journal of Computers and Electronics in Agriculture, 2016, pp: 182–190.
10. Giorgetti, A., Lucchi, M., Tavelli, E., Barla, M., Gigli, G., Casagli, N., Chiani, M., Dardari, D., “A robust wireless sensor network for
landslide risk analysis: system design, deployment, and field testing”. IEEE Sens. Journal. 16, 2016, pp: 6374–6386.
11. Jayaraman, P., Palmer, D., Zaslavsky, A., & Salehi, A., “Addressing information processing needs of digital agriculture with Open IoT
platform”. And open-source Retrieved from http://link. springer.com/chapter/ 10.1007/978-3-319-16546-2_11, 2015.
12. Jazayeri, M. A., Liang, S. H. L., & Huang, C. Y., “Implementation and evaluation of four interoperable open standards for the internet
of things”. Sensors (Switzerland), 15(9), 2015, pp: 24343-24373.
13. Jesús Martín Talavera, Luis Eduardo Tobón, Jairo Alejandro Gómez, María Alejandra Culman, Juan Manuel Aranda, Diana Teresa
Parra, Luis Alfredo Quiroz, Adolfo Hoyos, Luis Ernesto Garreta., “Review of IoT Applications in Agro-Industrial and Environmental
Fields”. Computers and Electronics in Agriculture Journal, 142, 2017, pp: 283–297.
14. Katsoulas, N., Bartzanas, T., & Kittas, C., “Online professional irrigation scheduling system for greenhouse crops”. Acta Horticulturae,
1154, 2017, pp: 221-228.
15. Katsoulas, N., Elvanidi, A., Ferentinos, K. P., Kacira, M., Bartzanas, T., & Kittas., C. “Crop reflectance monitoring as a tool for water
stress detection in greenhouses: A review”. Bio Systems Engineering, 151, 2016, pp: 374-398.
16. Keerthi, V., & Kodandaramaiah, G. N., “Cloud IoT based greenhouse monitoring system”. International Journal of Engineering
Research and Applications, 5(10), 2015, pp: 35-41.
17. Kozai, T., & Fujiwara, K., “Moving toward self-learning closed plant production systems. In LED lighting for urban agriculture”,
2016, pp: 445-448. Singapore: Springer Singapore. Retrieved from https://doi.org/ 10.1007/978-981-10-1848-0_32.
18. Lee, M., & Yoe, H., 2015. “Analysis of environmental stress factors using an artificial growth system and plant fitness optimization”.
Bio Med Research International, 2015, pp: 1-6. Retrieved from https:// doi.org/10.1155/2015/ 292543.
19. Michael J. O’Grady, Gregory M.P. O’Hare., “Modelling the smart farm”. Information Processing in Agriculture(IPA)-The Journal of
the China Agricultural University, Vol.4, 2017, pp: 179–187.
20. Miguel A. Zamora-Izquierdo, Jose Santa a, Juan A. Martı´nez, Vicente Martı´nez, Antonio F. Skarmeta., “Smart farming IoT platform
based on edge and cloud computing”. Bio Systems Engineering Journal, 2018, pp: 4-12.
21. Nurzaman Ahmed, Debashis De, and Md. Iftekhar Hussain., “Internet of Things (IoT) for Smart Precision Agriculture and Farming in
Rural Areas”. IEEE Internet of Things Journal, 2018, pp: 1-9.
22. Olakunle Elijah, Tharek Abdul Rahman, Igbafe Orikumhi, Chee Yen Leow MHD Nour Hindia., “An Overview of Internet of Things
(IoT) and Data Analytics in Agriculture: Benefits and Challenges”. IEEE Internet of Things Journal, 2018, pp: 1-12.
23. Pang, Z., Chen, Q., Han, W., Zheng, L., “Value-centric design of the internet-of-things solution for food supply Chain: value creation,
sensor portfolio and information fusion”. Inform. Syst. Front. 17, pp: 289–319. Retrieved from http://dx.doi.org/10.1007/ s10796-012-
9374-9, 2015.
24. Pavithra G., “Intelligent Monitoring Device for Agricultural Greenhouse Using IOT”. Journal of Agricultural Science and Food
Research, Vol.9, Issue 2, 2018, pp: 1-4.
25. Sander J.C. Janssen, Cheryl H. Porter, Andrew D. Moore, Ioannis N. Athanasiadis, Ian Foster, James W. Jones, John M. Antle.,
“Towards a New Generation of Agricultural System Data, Models and Knowledge Products: Information and Communication
Technology”. Agricultural Systems Journal 155, 2017, pp: 200–212.
26. Sarangi, S., Umadikar, J., Kar, S., “Automation of agriculture support systems using Wisekar: case study of a crop-disease advisory
service”. Comput. Electron. Agric. 122, 2016, pp: 200–210. Retrieved from http://dx.doi.org/ 10.1016/j.compag. 2016.01.009.
27. Saville, R., Hatanaka, K., Wada, M., “ICT application of real-time monitoring and estimation system for set-net fishery”. In:
OCEANS, 2015, pp: 1–5.
28. Shaikh, F.K., Zeadally, S., “Energy harvesting in wireless sensor networks: a comprehensive review”. Renew. Sustain. Energy Rev. 55,
2016, pp: 1041–1054. Retrieved from http://dx.doi.org/10.1016/j.rser.2015.11 .010.
29. Sinha, R.S., Wei, Y., Hwang, S.-H., “A Survey on LPWA technology: LoRa and NBIoT”. ICT Express 3, 2017, pp: 14–21. Retrieved
from http://dx.doi.org/10.1016/ j.icte.2017.03.004.
30. Sukhpal Singh Gill, Inderveer Chana, Rajkumar Buyya, “IoT Based Agriculture as a Cloud and Big Data Service: The Beginning of
Digital India”. Journal of Organizational and End User Computing, Volume 29, Issue 4, 2017, pp: 1-21.
31. Wang, J., Yue, H., “Food safety pre-warning system based on data mining for a sustainable food supply Chain”. Food Control 73,
2017, pp: 223–229. Retrieved from http://dx.doi.org/10.1016 /j.foodcont.2016.09.048.
32. Wong, B.P., Kerkez, B., “Real-time environmental sensor data: an application to water quality using web services”. Environ. Modell.
Software 84, 2016, pp: 505–517. Retrieved from http://dx.doi.org/10.1016/j.envsoft. 2016.07.020.
33. Yanbo Huang, CHEN Zhong-xin, YU Tao, HUANG Xiang-zhi, GU Xing-fa., “Agricultural Remote Sensing Big Data: Management
and Applications”. Journal of Integrative Agriculture 17(9), 2018, pp: 1915–1931.
34. Yi Liu, Weili Han, Yin Zhang, Lulu Li, Junyu Wang, Lirong Zheng., “An Internet-of-Things Solution for Food Safety and Quality
Control: A Pilot Project in China”. Journal of Industrial Information Integration, 2016, pp: 2-7.
35. Zhang S. Wang M. Shi W. Zheng W., “Construction of intelligent water saving irrigation control system based on water balance”.
IFAC (International Federation of Automatic Control), 2018, pp: 466-469.
36. Zhang, J., Kong, F., Zhai, Z., Han, S., Wu, J., & Zhu, M., “Design and development of IOT monitoring equipment for open livestock
environment”. International Journal of Simulation: Systems, Science and Technology, 17(26), 2016. Retrieved from https://doi.org/
10.5013/IJSSST.a.17.26.23.
37. Zheng, R., Zhang, T., Liu, Z., Wang, H., “An EIoT system designed for ecological and environmental management of the Xianghe
segment of china’s grand canal”. Int. J. Sustain. Dev. World Ecol. 23, 2016, pp: 372–380. Retrieved from http://dx.doi.org/10.1080/
13504509.2 015.1124470.

Authors: Prashant Mishra, Dheeraj Rane


An Application of Big Data in Social Media Anomaly Detection using Weight Based Technique to
Paper Title:
Compare Performance of PIG and HIVE
Abstract: Social media is become one of the most popular application. Commonly social media is used for
communication and social activities. Thus a significant amount of data is produced in these platforms and
handling of these data requires advance data handling techniques thus big data is used to deal with such huge
data. On the other hand, now in these days attackers and phishers are also active on social media. These attackers
435. create fake profiles and trap the users to still their confidential and sensitive information. In this context the fake
2592-
profiles are one of the serious problems in these days in social media. In this presented work a new technique for
249
detecting the social media anomaly profile is prepared and their implementation is described in this paper. In
7
addition of that the experimental analysis on real twitter profiles are also performed for 1200 profile features. To
process these data two BIG data utilities are used namely PIG and HIVE is used. These profile features are
collected from the live twitter data and evaluation of different profiles. The experimental results are compared
for both the utilities (i.e. PIG and Hive) to demonstrate the successfully identification of legitimate and anomaly
profiles.
Keywords: BIG Data, data mining, fake profile, HIVE, PIG ,profile anomaly, social media, social spamming.

References:

1. E. Drago, “The Effect of Technology on Face-to-Face Communication”, The Elon Journal of Undergraduate Research in
Communications, Vol. 6, No. 1, Spring 2015
2. T. D. Baruah, “Effectiveness of Social Media as a tool of communication and its potential for technology enabled connections: A
micro-level study”, International Journal of Scientific and Research Publications, Volume 2, Issue 5, May 2012 1, ISSN 2250-3153
3. G. Stringhini, C. Kruegel, G. Vigna, “Detecting Spammers on Social Networks”, ACSAC ’10 Dec. 6-10, 2010, Austin, Texas USA,
Copyright 2010 ACM 978-1-4503-0133-6/10/12
4. K. Krombholz, D. Merkl, E. Weippl, “Fake Identities in Social Media: A Case Study on the Sustainability of the Facebook Business
Model”, Journal of Service Science Research (2012) 4:175-212, DOI 10.1007/s12927-012-0008-z, The Society of Service Science and
Springer 2012
5. G. bani, Ali A., L. Wei, T. Mahbod, “Network Intrusion Detection and Prevention”, Advances in Information Security 47, DOI
10.1007/978-0-387-88771-5_2, © Springer Science + Business Media, LLC 2010
6. A. Mishra, J. Joshi, “Botnet Detection based on System and Community Anomaly Detection”, International Journal of Computer
Science And Technology, Vol. 8, Issue 2, April - June 2017
7. S. Agrawal, J. Agrawal, “Survey on Anomaly Detection using Data Mining Techniques”, 19th International Conference on Knowledge
Based and Intelligent Information and Engineering Systems, Procedia Computer Science 60 ( 2015 ) 708 – 713
8. A. L. Buczak, and E. Guven, “A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection”, IEEE
Communications Surveys & Tutorials, Vol. 18, No. 2, Second Quarter 2016
9. N. Moustafa & J. Slay, “The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and
the comparison with the KDD99 data set”, Information Security Journal: A Global Perspective, DOI: 10.1080/19393555.2015.1125974
10. S. M. Erfani, S. Rajasegarar, S. Karunasekera, C. Leckie, “High-dimensional and large-scale anomaly detection using a linear one-
class SVM with deep learning”, Pattern Recognition, 2016 Elsevier Ltd
11. Q. Niyaz, W. Sun, A. Y Javaid, and M. Alam, “A Deep Learning Approach for Network Intrusion Detection System”, BICT 2015,
December 03-05, New York City, United States Copyright © 2016 ICST, DOI 10.4108/eai.3-12-2015.2262516
12. https://data.world/datasets/social-media
13. https://archive.ics.uci.edu/ml/datasets.html
14. C. White, L. Plotnick, J. Kushma, S. R. Hiltz and M. Turoff, “An online social network for emergency management”, Int. J.
Emergency Management, Vol. 6, Nos. 3/4, 2009
15. A. Patterson, “Social-networkers of the world, unite and take over: A meta-introspective perspective on the Facebook brand”, Journal
of Business Research 65 (2012) 527–534, © 2011 Elsevier Inc
16. W. G. Mangold, D. J. Faulds, “Social media: The new hybrid element of the promotion mix”, Business Horizons (2009) 52, 357—365,
2009 Kelley School of Business, Indiana University
17. D. boyd, “Why Youth (Heart) Social Network Sites: The Role of Networked Publics in Teenage Social Life”, MacArthur Foundation
Series on Digital Learning – Youth, Identity, and Digital Media Volume (ed. David Buckingham). Cambridge, MA: MIT Press
18. A. K. Uysal, “An improved global feature selection scheme for text classification”, Expert Systems With Applications 43 (2016) 82–
92, 2015 Elsevier Ltd
19. X. Wu, V. Kumar, J. R. Quinlan, J. Ghosh, Q. Yang, H. Motoda, G. J. McLachlan, A. Ng, B. Liu, P. S. Yu, Z. H. Zhou, M. Steinbach,
D. J. Hand, D. Steinberg, “Top 10 algorithms in data mining”, Knowl Inf Syst (2008) 14:1–37, DOI 10.1007/s10115-007-0114-2,
Springer-Verlag London Limited 2007
20. https://nocodewebscraping.com/extract-twitter-tweets-followers-excel/
21. C. Mathy, N. Derbinsky, J. Bento, J. Rosenthal, J. Yedidia, “The Boundary Forest Algorithm for Online Supervised and Unsupervised
Learning”, Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, Copyright c 2015
22. V. López, S. d. Río, J. M. Benítez, F. Herrera, “Cost-sensitive linguistic fuzzy rule based classification systems under the MapReduce
framework for imbalanced big data”, http://dx.doi.org/10.1016/j.fss.2014.01.015, 0165-0114/© 2014 Elsevier B.V. All rights reserved.
Authors: Shakunthala B. S, C S Pillai

Paper Title: Robotic Handwritten Kannada Character Recognition using Neural Network
Abstract: Data preparing and the board is basic now a days. In this paper, programmed preparing of structures
written in Kannada language is considered. A reasonable pre-preparing procedure is introduced for separating
written by hand characters. Essential Component Analysis (PCA) and Histogram of arranged Gradients (HoG)
are utilized for highlight extraction. These highlights are sustained to multilayer feed forward back spread neural
system for arrangement. Just 57 characters are utilized for acknowledgment. Exhibitions of two highlights are
looked at for changed number of classes. Hoard is found to have preferred acknowledgment exactness over PCA
as number of classes expanded. This is actualized in Visual Studio 2010 utilizing Open CV library.

Keywords: Back Propagation Neural Network, Form Processing, Histogram of Gradients, Kannada Script,
Principal Component Analysis.
436.
References: 2498-
46. AfefKacem,AsmaSaidani,AbdelBelaid,“Asystemforanautomaticread 25
ngofstudentinformationsheets”,InternationalConferenceonDocumentAnalysisandRecognition,pp1265-1269,2011. 02
47. M.ThungamaniandP.RamakanthKumar,“ASurveyMethodsandStrategiesinHandwrittenKannadaCharacterSegmentation”,InternationalJou
rnalofScienceResearch,Vol1,Issue1,June2012.
48. H.RMamathaandandK.Srikantamurthy,“MorphologicaloperationsanprojectionprofilebasedsegmentationofhandwrittenKannadadocument
”,InternationalJournalofAppliedInformationSystems(IJAIS),Vol4,No.5,October2012.
49. NethravathiB,ArchanaC.P,ShashikiranK,A.GRamakrishnanandVIja
Kumar,“CreationofhugeannotateddatabaseforTamilandKannadaOHR”,12thIEEEInternationalConferenceonFrontiersinHandwritingRecog
nition,Nov2010,Pages415-420.
50. RM.K.SinhaandH.N.Mahabala,“MachineRecognitionofDevanagaiScript”,IEEETransactionsonSystems,ManandCybernetics,Vol.Smc9,N
o8,August1979.
51. LianaM.LorigoandVenuGovindaraju,“OfflineArabichandwritingrecognition:Asurvey”,IEEETransactionsonPatternAnalysisandmachineIn
telligence,Vol28,No.5,May2006.
52. VengatesanK.,andS.Selvarajan”ImprovedT-Clusterbasedschemefor
combinationgenescaleexpressiondata”InternationalConferenceonRadar,CommunicationandComputing(ICRCC),pp.131-136.IEEE(2012).
53. KalaivananM.,andK.Vengatesan.”Recommendationsystembasedon
atisticalanalysisofrankingfromuser.InternationalConferenceonInformationCommunicationandEmbeddedSystems(ICICES),pp.479-
484,IEEE,(2013).
54. K.Vengatesan,S.Selvarajan:TheperformanceAnalysisofMicroarrayDatausingOccurrenceClustering.InternationalJournalofMathematical
ScienceandEngineering,Vol.3(2).pp69-75(2014).
55. KVengatesan,VKaruppuchamy,SPragadeeswaran,ASelvaraj,”FASTClusteringAlgorithmforMaximizingtheFeatureSelectioninHighDim
ensionalData”,Volume–4,Issue-2,InternationalJournalofMathematicalSciencesandEngineering(IJMSE),December2015.
56. Dayashankar Singh et.al., "Hindi character recognition using RBF neural network and directional group feature extraction technique",
International Conference on Cognitive Computing and Information Processing(CCIP), March 2015.
57. N. Sandhya et.al., "Broken kannada character recognition — A neural network based approach", International Conference on
Electrical, Electronics, and Optimization Techniques (ICEEOT), 2016.
58. Nikita Singh, "An Efficient Approach for Handwritten Devanagari Character Recognition based on Artificial Neural Network", 5th
International Conference on Signal Processing and Integrated Networks (SPIN), 2018.
59. Sushama Shelke et.al., "Performance optimization and comparative analysis of neural networks for handwritten Devanagari character
recognition", International Conference on Signal and Information Processing (IConSIP), 2016.
60. Behnam Alizadehashraf et.al., "Persian handwritten character recognition using convolutional neural network", 10th Iranian
Conference on Machine Vision and Image Processing (MVIP), 2017.
61. G. O. Young, “Synthetic structure of industrial plastics (Book style with paper title and editor),” in Plastics, 2nd ed. vol. 3, J.
Peters, Ed. New York: McGraw-Hill, 1964, pp. 15–64.
62. W.-K. Chen, Linear Networks and Systems (Book style). Belmont, CA: Wadsworth, 1993, pp. 123–135.
63. H. Poor, An Introduction to Signal Detection and Estimation. New York: Springer-Verlag, 1985, ch. 4.
64. B. Smith, “An approach to graphs of linear forms (Unpublished work style),” unpublished.
65. E. H. Miller, “A note on reflector arrays (Periodical style—Accepted for publication),” IEEE Trans. Antennas Propagat., to be
published.
66. J. Wang, “Fundamentals of erbium-doped fiber amplifiers arrays (Periodical style—Submitted for publication),” IEEE J. Quantum
Electron., submitted for publication.
67. C. J. Kaufman, Rocky Mountain Research Lab., Boulder, CO, private communication, May 1995.
68. Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron spectroscopy studies on magneto-optical media and plastic substrate
interfaces(Translation Journals style),” IEEE Transl. J. Magn.Jpn., vol. 2, Aug. 1987, pp. 740–741 [Dig. 9th Annu. Conf. Magnetics
Japan, 1982, p. 301].
69. M. Young, The Techincal Writers Handbook. Mill Valley, CA: University Science, 1989.
70. (Basic Book/Monograph Online Sources) J. K. Author. (year, month, day). Title (edition) [Type of medium]. Volume(issue).
Available: http://www.(URL)
71. J. Jones. (1991, May 10). Networks (2nd ed.) [Online]. Available: http://www.atm.com
72. (Journal Online Sources style) K. Author. (year, month). Title. Journal [Type of medium]. Volume(issue), paging if given.
Available: http://www.(URL).
Authors: Challa Narasimham
Distributed Architecture for Secure, Attack-Resilient Crypto Currency Transactions for the
Paper Title:
Classified Temporal and Text Data
Abstract: In the digital world, the crypto currency has to do with the use of tokens based on the distributed
ledger technology in a secure manner. Crypto currency can be a resource on a block chain network or can be
seen as a tool to perform the transactions ensuring the privacy and security. Data may be available in temporal or
text format. This paper describes about the distributed architecture for secure and attack-resilient bit coin-based
crypto currency transactions for classified temporal and text data. The temporal data may be voice, sound or
graphical information basing on the time series. If the data available is temporal this work describes about how it
can be classified into a processed form. In this context, this paper describes the process of converting temporal
data into text data. Further, the paper describes about the process of ensuring the security. This paper describes
about the methodologies of cryptography-based hashing, attack-resilient nonce generation and verifiable
encryption techniques for the construction of resilient transactions against stealthy data-integrity attack.
437.
2503-
Keywords: Classification, Crypto currency, Hashing, Nonce, Temporal Data, Transactions, Verifiable
25
encryption.
05
References:

1. Camenisch, J. and I. Damgård (2000) “Verifiable encryption, group encryption, and their applications to separable group signatures and
signature sharing schemes”.
2. 2. Camenisch, J. and V. Shoup (2003). “Practical verifiable encryption and decryption of discrete logarithms.” pp 126–144.
3. C. Cachin, K. Kursawe, V. Shoup, Practical Asynchronous Byzantine Agreement Using Cryptography, 1999.
4. Z. Zheng, S. Xie, H. Dai, X. Chen and H. Wang, "An Overview of Block chain Technology: Architecture, Consensus and Future Trends".
5. M. Sato, S. Matsuo "Long-Term Public Block chain: Resilience against Compromise of Underlying Cryptography".
6. H. Halpin, M. Piekarska, "Introduction to Security and Privacy on the Block chain".
7. 7. P. Geurts, “Pattern extraction for time series classification”, 2001.
8. M. S. C. Kadous “Classification of multivariate time series and structured data using constructive induction,” Machine Learning, vol. 58,
no. 2-3, p. 179–216, 2005.
Authors: M.Shankar, Meena GL, V.Mouneswari

Paper Title: An Impact of Operating and Non-Operating Expenses on Financial Viability in Jet Airways
Abstract: ‘Crisis’ – the result of insolvency and bankruptcy situation for a firm or nation. The reasons for a
crisis of a firm are internal and external environmental facts to which the firm couldnot understand thoroughly.
438. During the crisis the shareholders blame the firm’s policies, procedures and administrative strategies. The banks
2506-
show reluctance not only to the firms but also to their linkages also. In the present paper a detailed study has
25
been carried out about the crisis in Jet Airways. For the purpose descriptive study has been chosen to know the
09
root cause which damaged the harmonic functioning of the company. The results have disclosing that pre-
emptive actions must be taken by the firms to absorb corporate government policies perfectly. It is the primary
responsibility in front of the Governments to involve in internal activities of the corporate firms and the policies
should be made by makers in such a way only.

Keywords: financial crisis, insolvency, bankruptcy, financial ratios.

References:

1. http://economictimes.indiatimes.com/jet-airways-[india]-ltd/infocompanyhistory/companyid-4374.cms
2. http://en.wikipedia.org/wiki/Jet Airways
3. Zhouying Jin and Ying Bai (2009), ‘Beyond the financial crisis: a way forward with development paradigm’, Springer-Verlag London
Limited, AI &Soc, volume 24, issue 4, pp.343–349.
4. John Loxley (1985), “Regulation and Restructuring: Responses to the International Financial Crisis”, Contemporary Crises, Elsevier
Publishers B.V., volume 9, issue 2, pp.103-125.
5. Bernd Braasch (2009), “Financial Crisis and Information Gaps - Comments on a Proposal by OtmarIssing and Jan Pieter Krahnen”,
Intereconomics, volume 44, issue 4, pp.208-214.
6. Reinout D.Vriesendorp and Martin A Gramatikov (2010) “Funding Corporate Rescue: The Impact of the Financial Crisis”,
International Insolvency Review, Volume 19, issue 3, pp.209-237.
7. Benjamin Dennis and Simon Kandel (2000), “Holding out for a Haircut: Financial Crisis, Moral Hazard, and Interest Rate Policy”,
International Journal of Finance and Economics, vol.5, issue.3, pp. 233–249.
Authors: Khyati , J.S.Sohal

Paper Title: A Hybrid Intelligent Decision-Making System for Navigation with Optimized Performance
Abstract: A moving vehicle comes across some permanent components like roads and some variable
components like other vehicles etc. Keeping these components at forefront, an automated vehicle needs to take
astute and speedy decisions about its next move. In this research paper, we have proposed a hybrid model based
on two soft computing techniques that is Neural Networks and Fuzzy Systems to optimize the performance of
Navigation Systems in terms of speed and accuracy. The proposed model is an extension of authors previous
work [ 1] in which the Best Feature Selection model was created to extract the most paramount features of
navigation images. In that, it was observed that extracted feature set had direct impact on speed and accuracy of
the working model as no resources were required to be spent on impertinent features. Our hybrid model
performs three steps afore taking final decision that is either to move or stop the automated vehicle. The first
step involves passing the outputs of Best Feature Selection Model and PCA as inputs through Convolutional
Neural Network (CNN) deep learning model and obtaining the response in form of move or stop. Principal
Component Analysis (PCA) technique was performed on the extracted feature set to improve our knowledge
about input feature set by procreating new features. In our previous work [2], it was justified that Principal
Component Analysis (PCA) when used in conjunction with Convolutional Neural Networks (CNN) yields better
results as compared to standalone performance of PCA and CNN. It was withal analysed that PCA-CNN is
going to give nearly same precision either we give ten percent training or we give high order training. The
second step involves using one other variant of Neural Networks that is Re-current Neural Networks (RNN) for
ascertaining out the bestest feature from all eleven features of Best Feature Selection Model. The factor with
least Mean Square Error is used to calculate the decision in form of move or stop. The last step involves passing
the outputs of CNN model and RNN model through Fuzzy Module. Here the Fuzzy rules are generated to take
final decision for moving vehicle. The accuracy of this hybrid model came out be 89.28 percent which is far
better than individual accuracies that is 72 percent and 60 percent of CNN model and RNN model respectively
439.
Keywords: Convolutional Neural Net-works, Fuzzy logic, Intelligent Systems, Neural Networks, Principal 2510-
Component Analysis, Recurrent Neural Networks. 25
14
References:

1. Marwah,K. Sohal,J. (2018).“Improved Decision Making for Navigation Scenarios” In AISC-Advanced Computational and
Communication Paradigms: Proceedings Volume 2, pages 717–726. Springer.
2. Marwah,K. Sohal,J. (2019). “A unified CNN framework for intelligent decision making related to navigation” In ICCES,2019:
accepted to be published by IEEE Xplore Digital Library
3. Manning T, Sleator RD, Walsh P. (2014), “Biologically inspired intelligent decision making: a commentary on the use of artificial
neural networks in bioinformatics”, In Bioengineered, vol. 5, pp. 80-95.
4. Pomerleau,D.(1993).“Rapidly Adapting Artificial Neural Networks for Autonomous Navigation”, In Advances in Neural Information
Processing Systems.
5. Wang,J. Zhang,,Y.,(2009) .“An GPS/DR Navigation System Using ,Neural Network for Mobile Robot”, in IEEE Explore
6. Kaneko,S. Hua,B. (2015).“Neural Network based Guide Robot Navigation: An Evolutionary Approach” ,In IEEE International
Symposium on Robotics and Intelligent Sensors (IEEE IRIS2015),Volume 76, 2015, Pages 74–79.
7. Jefferson R Souza.(2011).“Vision-based Autonomous Navigation Using Neural Net-works and Templates in Urban Environments”,
In SAC '11 Proceedings of the 2011 ACM Symposium on Applied Computing, Pages 1376-1381
8. Kim D, Chen T.(2015).“Deep Neural Network for Real-Time Autonomous Indoor Navigation” arXiv preprint 14 arXiv:1511.04668
9. Pradhan,S.eta.l(2009).“Fuzzy logic techniques for navigation of several mobile robots” In Applied Soft Computing , Elsevier Volume
9, Issue 1, January 2009, Pages 290–304, Elsevier
10. Hong T.,Nakhaeinia D. , Karasfi B.(2012).“Application of Fuzzy Logic in Mobile Ro-bot Navigation” Intech,2012
11. Raguraman S.M.(2009). “Mobile robot navigation using Fuzzy logic controller” In Con-trol, Automation, Communication and Energy
Conservation, 2009.
12. Faisal,M., etal.(2013).“Fuzzy Logic Navigation and Obstacle Avoidance by a Mobile Robot in an Unknown Dynamic Environment” In
International journal of advance robotic systems
13. Omrane,H.(2016).“Fuzzy Logic Based Control for Autonomous Mobile Robot Navigation” In Computational Intelligence and
Neuroscience Volume 2016,Article No.20 Hindawi Publishing Corp. New York, NY, United States.
14. Mohanty P. Parhi D. (2014),“Navigation of autonomous mobile robot using adaptive network based fuzzy inference system”, In
Journal of Mechanical Science and Technol-ogy , Volume 28, Issue 7, pp 2861–2868
15. Joshi M. ,Zaveri, M.(2010), “ Neuro-fuzzy based autonomous mobile robot navigation system”, In Control Automation Robotics &
Vision (ICARCV),IEEE Explore.

Authors: Rachana Nagal, Pradeep Kumar, Poonam Bansal

Paper Title: Optimal C code Implementation of OWGWA-CSS Algorithm on TMS320C6713 DSK


Abstract: This paper presents the C code optimization of Oppositional Whale Grey Wolf Algorithm with
Control Search Space (OWGWA-CSS) used for denoising EEG signal for its real-time implementation on
floating point DSP processor TMS320C6713. In general, developers tried to speed up the program all-time
which leads to increase in the code size so as increase the complexity as well as difficult readability. To make
the code efficient it is important to optimize the C code. For optimizing the C code first, the MATLAB code is
converted to C and then implemented on DSP processor. Here, multiple C code optimization techniques for the
efficient implementation of OWGWA-CSS algorithm on DSP processor TMS320C6713 is presented. The aim
of optimizing C code is to reduce the computational burden and speed up the process. The work done here is a
step to minimize Millions Instruction Per Second (MIPS) used to execute the c- code of OWGWA-CSS EEG
noise cancellation algorithm. The C code optimization is done by using Code Composer Studio (Integrated
Development environment for TMS320C67xx series). CCS is used for optimization, profiling, debugging and
implementation. After applying various C code optimization techniques 25% reduction in MIPS has been
obtained.

Keywords: Code Optimization, profiling, Adaptive Noise Canceller, DSP Processor, Optimization algorithms,
EEG Signal.

References:

1. Karthik, G. V. S., Fathima, S. Y., Rahman, M. Z. U., Ahamed, S. R., & Lay-Ekuakille, A., “Efficient Signal Conditioning Techniques
for Brain Activity,” in Remote Health Monitoring Network. IEEE Sensors Journal, 13(9), 3276–3283, 2013.
2. Janos Szalal, Piroska Haller, Zita Marthi , “Adaptive Filtering of EEG Signals”, in proc. Interdisciplinarity in Engineering International
Conference, 406-411, 2012.
3. Mannan, M. M. N., Kamran, M. A., & Jeong, M. Y. “Identification and Removal of Physiological Artifacts from
Electroencephalogram Signals: A Review” IEEE Access, 6, 30630–30652, 2018.
4. Machado, S., Araújo, F., Paes, F., Velasques, B., Cunha, M., Budde, H. Budde, F. Basile, R. Anghinah, O. Arias-Carrio´ n, M. Cagy,
R. Piedade, T.A. Graaf, A.T. Sack, and P. Ribeiro, “EEG-based Brain-Computer Interfaces: An Overview of Basic Concepts and
Clinical Applications in Neurorehabilitation”. In Reviews in the Neurosciences, 21(6), 451-468,2010.
5. B. Paulchamy , “Efficient Removal of Artifacts from EEG signal Using Enhanced Hybrid Learning Method,” in Studies on Ethno-
2515-
Medicine, 11:4, 359-365, 2017. 25
6. B. Widrow, J.R. Glover, J.M. McCool, J. Kaunitz, C.S. Williams, R. H. Hearn, J. R. Zeidler, Eugene Dong Jr., R. C. Goodlin , 20
“Adaptive noise cancellation: Principles and applications,” in Proc. IEEE 63 (12), 639–952, 1975.
7. Janos Szalal, Piroska Haller, Zita Marthi, “Adaptive Filtering of EEG Signals”, in proc. Interdisciplinarity in Engineering International
Conference, 406-411, 2012.
8. B. Widorw and M. Kamenetsky , “Statistical efficiency of adaptive algorithms,” in IEEE Tran. On Neural Network, Neural Networks,
16(5-6), 735-44,2013.
9. J. M. Górriz, Javier Ramírez, S. Cruces-Alvarez, Carlos G. Puntonet, Elmar W. Lang, and Deniz Erdogmus, “A Novel LMS Algorithm
Applied to Adaptive Noise Cancellation,” in IEEE Signal Processing Letters, 16(1), 34–37, 2009.
10. A.Zhou, B.Y.Qu,H.Li, S.Z.Zhao, P.N.Suganthan, Q.Zhang, “Multi objective evolutionary algorithms: a survey of the state of the art,”
in Swarm and Evolutionary Computation. 1 (1) 32–49, 2011.
11. Mohd Nadhir, Ab Wahab, M. N., Nefti-Meziani, S., & Atyabi, A., “A Comprehensive Review of Swarm Optimization Algorithms,” in
PLOS ONE, 10(5), 2015.
12. S. Mirjalili & A. Lewis, “The whale optimization algorithm,” in Advances in Engineering Software, 95, 51-67, 2016.
13. Gharehchopogh, F. S., & Gholizadeh, H., “A comprehensive survey: Whale Optimization Algorithm and its applications,” in Swarm
and Evolutionary Computation. doi:10.1016/j.swevo.2019.03.004, 2019.
440. 14. Mirjalili, Seyedali, Seyed Mohammad Mirjalili, and Andrew Lewis, “Grey Wolf Optimizer,” in Advances in Engineering Software 69,
46-61,2014.
15. H. R. Tizhoosh, “Opposition-based reinforcement learning”, in Journal of Advanced Computational Intelligence and Intelligent
Informatics, 10(4), 578-585, 2006.
16. M.K. Ahirwal ; Anil Kumar ; G.K. Singh, “EEG/ERP Adaptive Noise Canceller Design with Controlled Search Space (CSS) Approach
in Cuckoo and Other Optimization Algorithms, “ IEEE/ACM Transactions on Computational Biology and Bioinformatics, 10(6),
1491–1504,2013.
17. Mark B. Kraeling, “Optimization of C code in a real time environment,” WESCON, pp:574 – 580,1996.
18. Pratibha Singh, Smriti Sonker, Prabhat Verma, “Optimization Techniques in C – A Survey,” in International Journal of Computer
Applications Volume 115 – No. 20, April 2015.
19. Kin H. Yu and Yu Hen Hu, “Optimized Code Generation for Programmable Digital Signal Processors,” in IEEE International
Conference on acoustic speech and signal processing, 461-464, 1993.
20. Rachana Nagal, Pradeep Kumar, Poonam Bansal, “Profiling and Optimization of Variable Step Size Algorithm used for Adaptive
Noise Cancellation,” on 2nd International Conference on “Computing for Sustainable Global Development”, Proceedings of the 9th
IEEE Conference INDIACom, pp. 1848 - 1852, March 2015.
21. Qingfeng Zhuge, Zili Shao, Edwin H. -M. Sha, “Optimal Code Size Reduction for Software-Pipelined Loops on DSP Applications,” in
Proceedings of the International Conference on Parallel Processing, pp. 1-8, 2001.
22. Code Composer Studio IDE Getting Started Guide: User's Guide (spru509f)”, Texas Instruments, 2005

Authors: V. Vinoth Kumar, K. S. Arvind, S. Umamaheswaran, Suganya K.S

Paper Title: Hierarchal Trust Certificate Distribution using Distributed CA in MANET


Abstract: In the growing network generation of wireless systems, there is a necessity usage of deploying
441. wireless network for usage of individual mobile users. The considerable examples are the deploying MANET in
2521-
emergency situations like disaster, military surveillance, tactical networks, data networks etc. This network
25
situation doesn’t work on centralized and adopt the rely operations without access points. All these application
24
areas adopts infrastructure less environment which facilitates highly possible network attacks. Identifying such a
security breach happening in network would be a Herculean task. This research identifies trusted parties will
involve in message communication and provides privacy of the message being sent to destination using
cryptographic mechanisms. When two or more networks involve in data communication at that situation making
the authentication with the help of certification distribution method would be a difficult task. Hence the nodes
are dropping the packet or unauthorized parties do the denial of service so that delay will increase and
throughput is reduced. In order to overcome this issue, the cross certification method is implemented with the
distribution of certificate using hierarchal trust. This method solves the issue of authentication problem and
coordinates for all the nodes to communicate to each other as a trusted party. When two ad hoc networks merge,
we need a mechanisms for nodes originated from different networks to certify and authenticate each other.
Finally the simulation was conducted with certain parameters and achieved better throughput and reduced delay
of data transfer.

Keywords: Digital Certificate, trust model, TLS, MANET, AODV.

References:

1. L. Zhou and Z. J. Haas, “Securing ad hoc networks,” IEEE Network, vol. 13, no. 6, pp. 24–30, 1999.
2. S. Yi and R. Kravets, “MOCA: mobile certificate authority for wireless ad-hoc networks,” in Proceedings of the 2nd Annual PKI
Research Workshop (PKI '03), 2003.
3. R. Li, J. Li, P. Liu, and H.-H. Chen, “On-demand public-key management for mobile ad hoc networks,” Wireless Communications and
Mobile Computing, vol. 6, no. 3, pp. 295–306, 2006.
4. .Y. Zhang, W. Liu, W. Lou, and Y. Fang, “Securing mobile ad hoc networks with certificateless public keys,” IEEE Transactions on
Dependable and Secure Computing, vol. 3, no. 4, pp. 386–399, 2006.
5. S. Raghani, D. Toshniwal, and R. Joshi, “Dynamic support for distributed certification authority in mobile ad hoc networks,”
in Proceedings of the International Conference on Hybrid Information Technology (ICHIT '06), pp. 424–432, November 2006.
6. Y. Dong, A.-F. Sui, S. M. Yiu, V. O. K. Li, and L. C. K. Hui, “Providing distributed certificate authority service in cluster-based
mobile ad hoc networks,” Computer Communications, vol. 30, no. 11-12, pp. 2442–2452, 2007.
7. S. Kent, Privacy enhancement for Internet electronic mail: Part II: Certi_cate-based key management, Tech. rep., Network
Working Group, request for Comments: 142 (1993).
8. S. Capkun, L. Buttyan, and J.-P. Hubaux, “Self-organized public-key management for mobile ad hoc networks,” IEEE Transactions on
Mobile Computing, vol. 2, no. 1, pp. 52–64, 2003.
9. K. Ren, T. Li, Z. Wan, F. Bao, R. H. Deng, and K. Kim, “Highly reliable trust establishment scheme in ad hoc networks,” Computer
Networks, vol. 45, no. 6, pp. 687–699, 2004.
Authors: V.Sukumar, R.Senthilkumar, V.Manieniyan

Paper Title: Bio Oil from Bio Waste (Mahua Oil Cake) Using Fast Pyrolysis Process
Abstract: Biomass is a renewable resource utilized to produce bio fuel from bio waste. In this experiment,
fixed bed fast pyrolysis is carried out on a model of mahua oil cake (MOC dimension) to conclude
predominantly the consequences of pyrolysis temperature, MOC dimension and nitrogen gas flow rate from the
pyrolysis yields. The temperature, MOC dimension and nitrogen gas flow rate were varied between 500 to 600
oC, 2 mm to 6 mm and 0.2 to 0.4 liter per min (lpm). The utmost oil yield of 25.90 wt % was attained for a
nitrogen gas flow rate of 0.3 lpm, particle size of 4 mm and pyrolysis temperature of 550oC. The pyrolysis oil
had a calorific value of 28180 KJ/kg. The pyrolysis gas may well be utilized as a gaseous fuel. In addition, the
bio-oil was illustrated by elemental, gas chromatography/mass spectrometry (GC-MS) analyzer.

Keywords: Biomass, Char, Fast pyrolysis, Fixed bed, Mahua oil cake.

References:

442. 1. Chen, Dongdong, Quanhong Ma, Lingfei Wei, Naixu Li, Quanhao Shen, Wei Tian, Jiancheng Zhou, and Jieyu Long. "Catalytic
hydroliquefaction of rice straw for bio-oil production using Ni/CeO2 catalysts." Journal of analytical and applied pyrolysis 130 (2018): 2525-
169-180. 25
2. David, E., & Kopac, J. (2018). Pyrolysis of rapeseed oil cake in a fixed bed reactor to produce bio-oil. Journal of analytical and applied 28
pyrolysis, 134, 495-502.
3. Sukumar, V., V. Manieniyan, R. Senthilkumar, and S. Sivaprakasam. "Production of bio oil from sweet lime empty fruit bunch by
pyrolysis." Renewable Energy 146 (2020): 309-315.
4. Pimenta, A.S., da Costa Monteiro, T.V., Fasciotti, M., Braga, R.M., de Souza, E.C. and de Lima, K.M.G., 2018. Fast pyrolysis of trunk
wood and stump wood from a Brazilian eucalyptus clone. Industrial Crops and Products, 125:630-638.
5. Sensoez, S. and Angin, D., (2008). Pyrolysis of safflower (Charthamus tinctorius L.) seed press cake in a fixed-bed reactor: part 2.
Structural characterization of pyrolysis bio-oils. Bioresource technology, 99(13):5498-5504.
6. Sukumar, V., V.Manieniyan, and S. Sivaprakasam. "Experimental Studies on DI Diesel Engine Fueled in Sweet Lime Pyrolysis Oil
with Biodiesel." International Journal of Applied Engineering Research 14, no. 5 1145-1150. 2019.
7. Sukumar,V., V.Manieniyan, and S. Sivaprakasam.(2015). Bio oil production from biomass using pyrolysis and upgrading-a
review. Int. J. ChemTech Res 8.1:196-206.
8. Uresin, E., Gulsac, I. I., Budak, M. S., Unsal, M., Ozgur Buyuksakallı, K., Aksoy, P., & Okur, O. (2019). Effects of operational
parameters on bio-oil production from biomass. Waste Management & Research, 37(5), 516-529.
9. Yan, B., Zhang, S., Chen, W., & Cai, Q. (2018). Pyrolysis of tobacco wastes for bio-oil with aroma compounds. Journal of analytical
and applied pyrolysis, 136, 248-254.
10. Zhang, Y., Liu, H., Zhu, X., Lukić, I., Zdujic, M., Shen, X. and Skala, D., (2018). Biodiesel synthesis and kinetic analysis based on
MnCO3/Na-silicate as heterogeneous catalyst. J. Serb. Chem. Soc., 83(3):345-365.
Authors: Preetha Menon, Anand Sadasivan

443. Paper Title: A Vignette of Spiritual Intelligence and Transformational Leadership


Abstract: The United Nations (UN) has identified 17 Sustainable Development Goals aimed to end poverty, 2529-
hunger and inequality, act on climate change and the environment, improve access to health and education, and 25
build strong institutions and partnerships. A style of leadership, ingrained in an altruistic and holistic approach 34
that acknowledges the interrelationships of all beings, is a pre-requisite to achieve sustainable development. The
projects undertaken by Amrita Institutions, under the guidance and leadership of its founder, Sri Mata
Amritanandamayi Devi, are in tandem with the Sustainable Development Goals identified by the UN. Results of
a survey conducted to unravel the observable components of Spiritual Intelligence (SI) and Transformational
Leadership (TL) of Sri Mata Amritanandamayi Devi, suggest a classic blend of SI and TL. Emulation of the
convergence of SI and TL is projected to be an approach for mankind to transcend the differences of race,
culture, and ideology, and regard one another as entities of a single all-encompassing consciousness. This
prospective is predicted to promote fulfilment, purpose and meaning to life of individuals, communities, nations,
and the world at large. The preliminary study illustrating this concept needs to be explored as recommendation
for a future research, encompassing qualitative and quantitative analysis, to yield a holistic view of leadership
characteristics. Longitudinal studies could also be pursued to deduce their trajectories over longer periods in
time.

Keywords: Spiritual Intelligence, Transformational Leadership, Vignette, Sri Mata Amritanandamayi Devi,
Contemporary spiritual leader, Sustainable Development Goals.

References:

1. UN (2016) Sustainable Development Goals. Retrieved from https://www.un.org/sustainabledevelopment/


2. Seymour, M., & Levin, H. M. (2015). Educating for humanity: Rethinking the purposes of education. Routledge
3. Garfield, A. M., Drwecki, B. B., Moore, C. F., Kortenkamp, K. V. & Gracz, M. D. (2014). The Oneness Beliefs Scale: Connecting
spirituality with pro‐environmental behavior. Journal for the Scientific Study of Religion, 53(2), 356-372.
4. Chawla, V. & Guda, S. (2010). Individual spirituality at work and its relationship with job satisfaction, propensity to leave and job
commitment: An exploratory study among sales professionals. Journal of Human Values, 16(2), 157-167.
5. Dhiman, S. K. (2016). Ethics and Spirituality of Sustainability: What Can We All Do? The Journal of Values-Based Leadership, 9(1),
11.
6. Baindur, M. (2015). Nature in Indian philosophy and cultural traditions. Springer.
7. Gupta, K. S. (2016). The Philosophy of Rabindranath Tagore. Routledge.
8. Albahari, M. (2019). Beyond cosmo-psychism and the great I am: How the world might be grounded in universal ‘advaitic’
consciousness. The Routledge Handbook of Pan psychism. Routledge. Retrieved from
https://s3.amazonaws.com/academia.edu.documents/50196480/Beyond_Cosmopsychism_and_the_Great_I_Am.pdf?response-content-
disposition=inline%3B%20filename%3DBeyond_Cosmopsychism_and_the_Great_I_Am.pdf&X-Amz-Algorithm=AWS4-HMAC-
SHA256&X-Amz-Credential=AKIAIWOWYYGZ2Y53UL3A%2F20190628%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-
Date=20190628T055241Z&X-Amz-Expires=3600&X-Amz-SignedHeaders=host&X-Amz-
Signature=2e8940f74883bd78fc032250a2ac08245ca8e7b7d0bc5fafc3a62045e17e811a
9. Caplan, M., Portillo, A., & Seely, L. (2013). Yoga psychotherapy: the integration of western psychological theory and ancient yogic
wisdom. Journal of Transpersonal Psychology, 45(2).
10. Rhoda, D. (2014). Ayurvedic Psychology: Ancient Wisdom Meets Modern Science. International Journal of Transpersonal Studies,
33(1), 14.
11. Raman, V. V. (2012). Hinduism and Science: Some Reflections. Zygon, 47(3), 549-574.
12. Rudert, A. (2010). Research on Contemporary Indian Gurus: What’s New about New Age Gurus? Religion Compass, 4(10), 629-642.
13. Fibiger, M. Q. (2017). Śri Mātā Amṛtānandamayī Devī—The Global Worship of an Indian Female Guru. In East spirit: Transnational
Spirituality and Religious Circulation in East and West (pp. 80-99). Brill.
14. Lucia, A. J. (2014). “Give Me Sevā Overtime”: Selfless service and humanitarianism in Mata Amritanandamayi’s transnational Guru
movement. History of Religions, 54(2), 188-207.
15. Pandya, S.A (2016)a. Seva in Mata Amritanandamayi Mission: Social Service as a Public Face of Faith. Implicit Religion, 19(3).
16. Dutta, S. (2014). Religious associations and development in India: a study of the Ramakrishna Mission. Journal of Social Sciences, 6
(2), 96- 111
17. Singh, G., Maurya, A., & Jain, V. (2017). Spirituality in Indian Organizations. In Managing VUCA Through Integrative Self-
Management (pp. 171-181). Springer, Cham.
18. Pandya, S.A (2016)b. Aging spiritually: Pitamaha Sadans in India. Cogent Social Sciences, 2(1), 1219212.
19. Fairholm, G. W. (1996). Spiritual leadership: Fulfilling whole-self needs at work. Leadership & Organization Development Journal,
17(5), 11-17.
20. Cavanagh, G. F. (1999). Spirituality for managers: Context and critique. Journal of organizational change management, 12(3), 186-199.
21. Walker, M. W., & McPhail, C. J. (2009). Spirituality matters: Spirituality and the community college leader. Community College
Journal of Research and Practice, 33(3-4), 321-345.
22. Fry, L. W. (2003). Toward a theory of spiritual leadership. The leadership quarterly, 14(6), 693-727.
23. Benefiel, M. (2005). The second half of the journey: Spiritual leadership for organizational transformation. The leadership quarterly,
16(5), 723-747.
24. Khan, Z.A., Nawaz, A., Khan, I., & Khan, D. I. (2016). Leadership Theories and Styles: A Literature Review. Journal of Resources
Development and Management, 16.
25. Bolden, R., Gosling, J., Marturano, A., & Dennison, P. (2003). A review of leadership theory and competency frameworks. Centre for
Leadership Studies, University of Exeter.
26. Rogers, J. L. (2003). Preparing spiritual leaders: One teacher takes on the challenge. About Campus, 8(5), 19-26
27. Yang, K. (2006). The spiritual intelligence of nurses in Taiwan. Journal of Nursing Research, 14(1), 24-35.
28. Kessler, R. (2000). The soul of education: Helping student find connection, compassion, and character at school. Alexandria, VA:
Association for Supervision and Curriculum Development.
29. Moffett, J. (1994). Spiritual awakening through education. San Francisco: Jossey-Bass
30. Bass, B. M., & Riggio, R. E. (2006). Transformational leadership. Psychology Press.
31. Howard, B. B., Guramatunhu-Mudiwa, P. & White, S. R. (2009). Spiritual intelligence and transformational leadership: A new
theoretical framework. Journal of Curriculum and Instruction, 3(2), 54.
32. Amma (2014). Who is Amma? Sri Mata Amritanandamayi Devi. Retrieved 2/7/2019 from https://www.amritapuri.org/amma/who
33. Jnanamritananda. (2007). Lead Us to The Light. Part II. A Collection of Amma’s Teachings. Amritapuri, Kolam, Kerala: Mata
Amritanandamayi Mission Trust. 216
34. Suresh, K.G. (2014, October 06). Agents of Social Transformation. The Pioneer. Retrieved from http://www.dailypioneer.com
35. Warier, M. (2006). Modernity and its imbalances: Constructing modern selfhood in the Mata Amritanandamayi Mission. Religion,
36(4), 179-195.
36. Pandharipande, R. V. (2010). Authenticating a tradition in transition: Language of Hinduism in the US. In the Sociology of Language
and Religion (pp. 58-83). Palgrave Macmillan UK.
37. Zohar, D. (1997). Rewiring the corporate brain: Using the new science to rethink how we structure and lead organizations. Berrett-
Koehler Publishers.
38. Bass, B. M., & Bass, R. (2008). The Bass handbook of leadership: Theory, research, and managerial applications. Simon and Schuster.
39. Reave, L. (2005). Spiritual values and practices related to leadership effectiveness. The leadership quarterly, 16(5), 655-687.
40. Kumar, A. (2017). Sāttvika Leadership: An Indian Model of Positive Leadership. Journal of Business Ethics, 142(1), 117-138.
41. Kuhnert, K.W. & Lewis, P. (1987). Cited in Krishnan, V. R. (2008). The impact of transformational leadership on followers' duty
orientation and spirituality. Journal of Human Values, 14(1), 11-22.
42. Kishore, K., & Nair, A. (2013). Transcendental leaders are the moral fiber of an organization. Journal of Business Management &
Social Sciences Research, 2(7), 57-62.
43. Krishnan, V. R. (2008). The impact of transformational leadership on followers' duty orientation and spirituality. Journal of Human
Values, 14(1), 11-22.
44. Mael, F., & Ashforth, B. E. (1992). Alumni and their alma mater: A partial test of the reformulated model of organizational
identification. Journal of organizational Behavior, 13(2), 103-123.Mael and Ashforth, 1992
45. Meyer, J.P., Stanley, D.J., Herscovitch, L., & Topolnytsky, L. (2002). Affective, continuance, and normative commitment to the
organization: A meta-analysis of antecedents, correlates, and consequences. Journal of Vocational Behavior, 61 (2002), 20-52.
Authors: Palak J Shukla, Atul K Desai, Chetankumar D Modhera

Paper Title: Dynamic Response of RC Panel with and Without Openings Subjected To Blast Loading
Abstract: The dynamic response of reinforced concrete (RC) panels without and with different configuration
of opening under blast load scenario is investigated in the present study. The numerical simulations were carried
out using finite element method with ABAQUS application. The concrete behavior under blast loading was
modelled using Concrete damaged plasticity model. The material parameters for concrete damaged plasticity
model were determined using methodology proposed by [14]. The parametric study was carried out using
variation in blast load due to different charge weight. It was observed that the peak displacement increases with
increase in blast load. It was also observed that at lower blast load, failure of reinforced concrete panel was
initiated by cracking at rear face of panel but as the blast load increases the RC panel was failed by combination
of crushing of front face of panel along with cracking of rear face. It was observed that for the given blast load,
the RC panel without opening is less affected by crushing failure as compared to RC panel with opening
configuration studied. It was also observed that the RC panel with circular opening at center is stiffer than other
opening configuration and observed to have stable structural performance against the blast load studied.

Keywords: blast phenomenon, numerical simulation, concrete damaged plasticity model, damage variables.

References:

1. J Li, C. Wu, H. Hao, Z. Wang, Y. Su , “Experimental investigation of ultra-high performance concrete slabs under contact
explosions”, International Journal of Impact Engineering, 2016, vol. 93, pp. 62-75
2. W. Wang, D. Zhang, F. Lu, S. Wang & F. Tang,(2013) Experimental study and numerical simulation of the damage mode of a square
444. reinforced concrete slab under close-in explosion., ,Engineering Failure Analysis, 2013, vol 27, pp. 41-51 2535-
3. Z. Syed, S. Raman, T. Ngo, P. Mendis & T. Pham, “The failure behavior of reinforced concrete panel under far-field and near-field
blast effects”.Structures,2018, vol. 14, pp. 220-229
25
4. J. Li, C. Wu & H. Hao , “Investigation of ultra-high performance concrete slab and normal strength concrete slab under contact 49
explosion”, Engineering Structures,2015,vol. 102, pp. 395-408
5. D Kakogiannis , F. Pascualena ,B. Reymen , L. Pyl, J. M Ndambi ,E. Segers, D. Lecompte, J. Vantomme & T. Kramuthammer
,“Blast performance of reinforced concrete hollow core slabs in combination with fire: Numerical and experimental assessment”, Fire
Safety Journal, 2013, vol. 57, pp 69-82
6. G. Thiagarajan, A. Kadambi, S. Robert & C. Johnson, “Experimental and finite element analysis of doubly reinforced concrete slabs
subjected to blast loads”, International Journal of Impact Engineering,2015, vol 78:162-173
7. A. Stolz, K. Fischer, C. Roller & S. Hauser (2014), “Dynamic bearing capacity of ductile concrete plates under blast loading”.
International Journal of Impact Engineering,2014, vol. 69, pp. 25-38
8. W. Wang, D. Zhang, F. Lu, S. Wang & F. Tang (2012) Experimental study on scaling the explosion resistance of a one way square
reinforced concrete slab under a close-in blast loading, International Journal of Impact Engineering,2012, vol. 49, pp. 158-164
9. S. Yao, S. Zhang, X. Chen, F. Lu & W. Wang, (2016) “Experimental and numerical study on the dynamic response of RC slabs under
blast loading”, Engineering Failure Analysis, 2016, vol. 66, pp 120-129
10. Yi Huan, Q. Fang, Li Chen & Y. Zhang (2008) Evaluation of blast-resistant performance predicted by damaged plasticity model for
concrete, Transactions of Tianjin University and Springer-Verlag,2008), vol. 14(6), pp. 414-421
11. Y. Xia, C. Wu & Z. Li, Optimized design of foam cladding for protection of reinforced concrete members under blast loading, Journal
of Structural Engineering, 2014, pp 06014010-1-7
12. ABAQUS/CAE User’s Manual, Dassault Systems Simulia Corporation, Providence, Rhode Island, USA, Version 6.11.
13. J Lubnier , J Oliver, S Oller & E. Onate, “ A plastic damage model for concrete” , Solid Structure, 1989, vol. 23(5),pp -299-326
14. B. Alfarah, F. Almansa-Lopez & S. Oller, “New methodology for calculating damage”, variables evolution in plastic damage model
for RC structures Engineering Structures, 2017, vol. 132, pp.- 70-86
15. J. Lee & GL Fenves” Plastic-damage for cyclic loading of concrete structures”. Journal of Engineering Mechanics,1998, vol. 124:892-
900
16. L J Malvar & J E Crawford (1998) , “Dynamic increase factors for steel reinforcing bars”, Twenty-Eighths DDESB Seminar, 1998,
Orlando, 1-17.
Authors: Swati Katwal, Vinay Bhatia

Paper Title: An Optimal Filter to Reduce BER Utilizing RLS and Firefly
Abstract: Data communication network suffers due to symbol interference and un-optimized channel
response. In recent years faster communication architectures like OFDM were designed to transmit the data as
445.
fast as and compatible with modern day communication devices. In order to utilize the channel efficiently, data 2550-
should be filtered and precise. Swarm Intelligence based recursive least square algorithm has been developed 25
utilizing Extended Firefly Algorithm for the geometric transformation of the data. The optimized filtered data 56
has been cross-verified using Support Vector Machine approach. The permutation matrix of proposed work has
been compared with results obtained using Kalman filtering. Results demonstrate that if a filter is designed
significantly relative to the single objective function of the optimization algorithm, it generates quite good
estimates. The performance of the proposed structure is evaluated using Bit Error Rate and Average Logarithmic
Error measures.

Keywords: Data Communication, OFDM, RLS, SVM, SI.

References:

73. Mahmood, F., Ahlam, “An Optimized Adaptive Filtering for Speech Noise Cancellation”, Al-Rafadain Engineering Journal, Vol. 23,
No.5, 2015.
74. Shoorehdeli, Aliyari, M., Teshnehlab, M and Sedigh, A.K, “Training ANFIS as an identifier with intelligent hybrid stable learning
algorithm based on particle swarm optimization and extended Kalman filter”, Fuzzy Sets and Systems, Vol.160, No.7, pp.922-
948,2009.
75. Khanesar, Ahmadieh, M, “Extended Kalman filter based learning algorithm for type-2 fuzzy logic systems and its experimental
evaluation”, IEEE Transactions on Industrial Electronics, Vol.59, No.11, pp.4443-4455, 2012.
76. Dong, M., AND Wang, N, “Adaptive network-based fuzzy inference system with leave-one-out cross-validation approach for
prediction of surface roughness”, Applied Mathematical Modelling, Vol. 35, No.3, pp.1024-1035, 2011.
77. Song, Jinwei, Zhang, Z and Chen X, “Lossless compression of hyperspectral imagery via RLS filter”, Electronics Letters, Vol.49,
No.16, pp.992-994,2013.
78. Bashir Rahmaniana, Majid Pakizeha, Seyed Ali Akbar Mansoori, Morteza Esfandyaria, Dariush Jafari, Heidar Maddah, Abdolmajid
Maskooki, “Prediction of MEUF process performance using artificial neural networks and ANFIS approaches”, Journal of the Taiwan
Institute of Chemical Engineers, Vol.43, No.4, pp.558-565,2012.
79. Mohammed, Ramadan, J and Gurnam Singh, “An efficient RLS algorithm for output-error adaptive IIR filtering and its application to
acoustic echo cancellation”, Computational Intelligence in Image and Signal Processing, CIISP, IEEE Symposium on IEEE, pp.139-
143, 2007.
80. R. A. Boujemaa, S. Marcos, “Parallel Kalman Filtering for Optimal Symbol-By-Symbol Estimation in an Equalization Context”,
Signal Process., Science Direct, Vol.85, pp.25–1138,2005.
81. M. Enescu, M. Sirbu, V.Koivunen, “Adaptive Equalization of Time-Varying MIMO channels”, ACM Signal Process.Archive, Vol. 85,
pp. 81–93, 2005.
82. Mark, J.W, “A Note on the Modified Kalman Filter for channel Equalization”, in Proc.IEEE , Vol. 6,pp.481-482,1973.
83. Wu, Gin-Der, and Zhu, Z.W, “An enhanced discriminability recurrent fuzzy neural network for temporal classification
problems”, Fuzzy Sets and Systems, Vol.237, pp. 47-62, 2014.
84. Kim, H.N., and Song, W.J, “An Adaptive IIR Equalizer for Non-Minimum-Phase channel”, in Proc. of Inter Conf.on Signal Process,
pp.441-444, 1998.
85. Shimamura,T.Semnani, S.,Cowan, CWN, “Equalization of Time-Variant Communication Channel via Channel Estimation Based
Approaches”, IEEE Inter. Conf. On Acous.Speech, and Signal Process, Vol.2, pp.1703-1706, 1996.
86. Grohan.P. and Marcos.S, “Structures and Performances of Several Adaptive Kalman Equalizers”, in Proc. IEEE Workshop Digital
Signal Process, Loen, Norway, pp. 454–457,1996.
87. Patra, Jagdish C., and Ranendra N. Pal, “A functional link artificial neural network for adaptive channel equalization”, Signal
Processing, Vol.43, No.2, pp.181-195,1995.
88. Mclaughlin, S, “Adaptive Equalization via Kalman Filtering Techniques”, IEEE Proc, for Radar and Signal Process, Vol.4, pp. 123-
130,1991.
89. Pahlavani, Parham, and Mahmoud R, “Multi-criteria route planning based on a driver’s preferences in multi-criteria route
selection”, Transportation research part C: emerging technologies, Vol.40, pp.14-35, 2014.
90. Suwatthikul, Jittiwut, McMurran, r., and Peter Jones.R, “In-vehicle network level fault diagnostics using fuzzy inference
systems”, Applied Soft Computing, Vol.11, No.4, pp.3709-3719,2011.
91. Morteza Esfandyari, Mohammad Ali Fanaei, Reza Gheshlaghi Mahmood Akhavan Mahdavi, “Neural network and neuro-fuzzy
modeling to investigate the power density and Columbic efficiency of microbial fuel cell”, Journal of the Taiwan Institute of Chemical
Engineers, 2016, Vol.58, pp.84-91,2016.
92. Mclaughlin, S., Mulgrew, B and Cowan, C.F.N, “A Performance Study of Three Adaptive Equalizer environment”, in Proc. IEEEInter.
Conf. on Comm, Vol.2, pp.193–197, 1989.
93. Mirahmadi, M., Al-Dweik, A., & Shami, A, “BER reduction of OFDM based broadband communication systems over multipath
channels with impulsive noise”, IEEE transactions on communications, Vol. 61, No. 11, pp. 4602-4615,2013.
94. Wu, S., Wang, H., & Youn, C. H, “Visible light communications for 5G wireless networking systems: from fixed to mobile
communications”, IEEE Network, Vol. 28, No.6, pp.41-45, 2014.
95. Wang, S. W., Chen, F., Liang, L., He, S., Wang, Y., Chen, X., & Lu, W, “A high-performance blue filter for a white-led-based visible
light communication system”, IEEE wireless communications, Vol.22, No.2, pp.61-67,2015.
96. Jiang, T., Ni, C., Ye, C., Wu, Y., & Luo, K, “A novel multi-block tone reservation scheme for PAPR reduction in OQAM-OFDM
systems”, IEEE Transactions on Broadcasting, Vol.61, No.4, pp. 717-722,2015.
97. Xu, J., Kong, M., Lin, A., Song, Y., Yu, X., Qu, F., & Deng, N, “OFDM-based broadband underwater wireless optical communication
system using a compact blue LED”, Optics Communications, Vol. 369, pp.100-105,2016.
98. Siddiq, A. I, “PAPR reduction in OFDM systems using peak insertion”, AEU-International Journal of Electronics and
Communications, Vol. 69, No 2, pp.573-578, 2015.

Authors: Abhash Ganeshan, R.Shanmughasundaram

Paper Title: Estimation of Soc and Soh Using Mixed Neural Network and Coulomb Counting Algorithm
Abstract: The Lithium ion battery is widely used in most of the battery powered electronics and automotive
products like mobile phones, laptop, wall watch, calculator and other. The Battery provides power to devices
with the facility of movability. On the other hand, it also provides power backup to devices. The Battery State of
charge (SOC) and state of health (SOH) are the key terms by which the available charge and its life span can be
446. estimated. In this paper, SOC is estimated using a back-propagation neural network with 3 inputs namely,
2557-
voltage, current, and temperature of the battery. Coulomb counting method is used to find the new or remaining
25
capacity of the battery which will notify about its SOH. The whole setup is implemented in PIC16F877A with
61
the voltage, current and temperature sensors.

Keywords: Back-propagation, SOC, SOH, PIC16f877A, Coulomb counting.

References:
1. T.R.Crompton, Batteries refrence book, newnews Book Company, third edition 2000.
2. A. Rahmoun and H. Biechl, “Modeling of Li-Ion Batteries using Equivalent Circuit Diagrams”, Przeglad Elektrotechniczny (Electrical
Review) 2012”,pp 152-156.
3. Petzl M, Danzer MA. Advancements in OCV measurement and analysis for lithium-ion batteries. IEEE Trans Energy Convers
2013;28:675–81.M. Young, The Techincal Writers Handbook. Mill Valley, CA: University Science, 1989.
4. He HW, Xiong R, Peng JK. Real-time estimation of battery state-of-charge with unscented Kalman filter and RTOS mu COS-II
platform. Appl Energy 2016;162:1410–8.
5. H.J. Bergveld, Dmitry Danilov, Paul P. L. Regtien, Peter H. L. Notten, Valer Pop"Battery Management Systems: Accurate State-of-
Charge Indication for Battery-Powered Applications" published in 2018 springer.
6. G.Pistoia, Lithium-Ion Batteries Advances and Applications, Elsevier 1st edition 2014.
7. Harishankar,K.P.Sudharsan,U.Vignesh,T.Viveknath,P.Sivraj,K.Vijith,”Efficient charging of battery and production of power from
solar energy”, published in 2014 International Conference on Embedded Systems.
8. Ramprasath.R and Shanmughasundaram.R,“STCKF Algorithm Based SOC Estimation of Li-Ion Battery by Dynamic Parameter
Modeling”:4th International Symposium SIRS 2018, Bangalore, India, September 19–22, 2018.

Authors: Gulnora Ismoilova, Feruza Nabieva, G’ayrat Dehqonov


The Importance And Necessity Of Establishing Strong Cooperation Between Businesses And
Paper Title:
Universities In Uzbekistan
Abstract: Today, efficiently implementing innovations in entrepreneurship is vital. The root of innovation
stems from education that needs investment. This thesis analyzes the current trends of entrepreneurship, factors
influencing on it and ways of improving its status in Uzbekistan. The article also suggests and encourages
industries and entrepreneurs to invest university research sections so that to hold university and entrepreneurs’
partnership for reaching optimum solutions to current issues.

Keywords: entrepreneurship, innovation, investment, risk, partnership. government, culture, education.

References:

1. Sh. Mirziyoyev. "Entrepreneur feeds everyone". https://sptnkne.ws/gV4R. 2017 year.


2. Kim, S.; Ryoo, H.; Ahn, H. Student customized creative education model based on open innovation. J. OpenInnov. Technol. Market
Complex.2017, 3, 6.
447. 3. O’Connor, A. A conceptual framework for entrepreneurship education policy: Meeting government and economic purpose. J. Bus.
Ventur. 2013, 28, 546–563. 2562-
4. Walter, S.G.; Block, J.H. Outcome of entrepreneurship education: An institutional perspective. J. Bus. Ventur. 2016, 31, 216–233. 25
5. Mitra, J. Consider velasquez: Reflections on the development of entrepreneurship programs. Ind. High Educ. 2002, 16, 191–202.
6. Jones, C.; English, J. A contemporary approach to entrepreneurship education. Educ. Train. 2004, 46, 416–423. 65
7. Cruz, N.M.; Escudero, A.I.R.; Barahona, J.H.; Leitao, F.S. The effect of entrepreneurship education programmes on satisfaction with
innovation behavior and performance. J. Eur. Ind. Train. 2009, 33, 198–214.
8. Daud, S.; Abidin, N.; Sapuan, N.M.; Rajadurai, J. Enhancing university business curriculum using an importance-performance
approach: A case study of the business management faculty of a university inMalaysia. Int. J. Educ. Manag. 2011, 25, 545–569.
9. Byun, C.G.; Sung C.S.; Park J.Y.; Choi D.S. (2018), “A study on the Effectiveness of Entrepreneurship Education Programs in Higher
Education Institutions: A Case Study of Korean Graduate Programs”, Journal of Open Innov.: Technol. Mark. Complex. 2018,4,26;
doi: 10.3390/joitmc4030026 .
10. http://ncee.org/what-we-do/center-on-international-education-benchmarking/top-performing-countries/south-korea-overwiev/suth-
korea-instructional-systems/
11. Cornali F. (2012), “Effectiveness and efficiency of educational resources”, Evaluation Practices, Indicators and Rhetoric, Vol. 2 No. #,
pp. 255-260, available at: www.SciRP.org/journal/sm.
12. Vieluf et al., (2012), Teaching Practices and Pedagogical Innovation: Evidence from TALIS, OECD Publishing, Paris, available at:
www.oecd.org/edu/school/TalisCeri%202012%20(tppi)-Ebook.pdf
13. Kagami, S. (2015), “Innovation and University Entrepreneursgip: Challenges Facing Japan Today”, in Oum, S. P. Intarakumnerd, G.
Abonyi and S.Kagami (eds.), Innovation, Technology, Transfers, Finance, and Internationalization of SMEs’ Trade and Investment
ERIA Research Project Report FY2013, No.14.Jakarta: ERIA, pp.97-121.

Authors: Prashant Parashar, Divakar Singh

Paper Title: Development of High Quality Color Image Compression using Block Transformation
Abstract: The upcoming era of social media will be highly equipped with the images and the videos. Images
or multimedia content sharing and storing services are still costly for common man which is need to be resolved
to cover all the users either middle class or high society users. Various online platforms have filled the gaps for
freedom of expression for everyone. The huge demand of the multimedia data sharing through the
telecommunication networks has increased. The compression of images has changed the requirements for
effective transmission and storage media. With the convenience of accessibility of press tools and digital image
web exchange, there has been a dramatic increase. Image is the least component of multimedia information and
448.
includes a important portion of the velocity of communication for multimedia data communication n 2566-
Developments in image compression techniques have therefore developed potential requirement. For all 25
pictures, a fundamental concept of image formation is that the pixels are linked and comprise extremely useless 72
data afterwards. The primary objective of this job is to discover in the image reduced associated pixel intensities.
In this work an adaptive frequency domain block processing for color image compression has developed and
simulated.

Keywords: Image Compression, Color Image, PSNR, Lossy Compression, Block Transform.

References:
1. S. Zhu, M. Li, C. Chen, S. Liu and B. Zeng, "Cross-Space Distortion Directed Color Image Compression," in IEEE Transactions on
Multimedia, vol. 20, no. 3, pp. 525-538, March 2018.
2. R. R. M. Daga, "Improved k-d tree-segmented block truncation coding for color image compression," 2017 IEEE 2nd International
Conference on Signal and Image Processing (ICSIP), Singapore, 2017, pp. 178-182.
3. Q. Zhang, D. Liu and H. Li, "Deep network-based image coding for simultaneous compression and retrieval," 2017 IEEE International
Conference on Image Processing (ICIP), Beijing, 2017
4. C. Jia, X. Zhang, J. Zhang, S. Wang and S. Ma, "Deep convolutional network based image quality enhancement for low bit rate image
compression," 2016 Visual Communications and Image Processing (VCIP), Chengdu, 2016, pp. 1-4.
5. R. Rothe, R. Timofte and L. Van, "Efficient regression priors for reducing image compression artifacts," 2015 IEEE International
Conference on Image Processing (ICIP), Quebec City, QC, 2015, pp. 1543-1547.
6. H. Bai, M. Zhang, M. Liu, A. Wang and Y. Zhao, "Two-Stage Multiview Image Compression Using Interview SIFT Matching," 2014
Data Compression Conference, Snowbird, UT, 2014, pp. 398-398.
7. Y.-H. Kim, B. C. Choi, and J. Paik, “High-fidelity RGB video coding using adaptive inter-plane weighted prediction,” IEEE Trans.
Circuits Syst. Video Technol., vol. 19. no. 7, pp. 1051-1056, Jul. 2009.
8. X. M. Liu, D. B. Zhao, R. Q. Xiong, S. W. Ma, W. Gao, and H. F. Sun, “Image interpolation via regularized local linear
regression,” IEEE Trans. on Image Process., vol. 20, no. 12, pp. 3455-3469, Dec. 2011.
9. S. Y. Zhu, L. Y. Zeng, B. Zeng, and M. Gabbouj, “Image interpolation based on non-local geometric similarities and directional
gradients,” IEEE Trans. on Multimedia, vol. 18, no. 9, pp.1707-1719, Sept. 2016.
10. H. S. Malvar and D. H. Staelin, “Optimal FIR pre- and postfilters for decimation and interpolation of random signals,” IEEE
Trans. on Commun., vol. 36, no. 1, pp. 67-74, Jan. 1988.
11. W.-S. Lu and A. M. Sevcenco, “Design of optimal decimation and interpolation filters for low bit-rate image coding,” in Proc. IEEE
Asia Pacific Conf. on Circuits and Systems, pp. 378-381, 2006.
12. S. Q. Wang, K. Gu, S. W. Ma, and W. Gao, “Joint chroma downsampling and upsampling for screen content image,” IEEE Trans.
Circuits Syst. Video Technol., vol. 26, no. 9, pp. 1595-1609, Sept. 2016.
13. T. D. Tran, J. Liang, and C. J. Tu, “Lapped transform via time-domain pre- and post-filtering,” IEEE Trans on Signal Process., vol. 51,
no. 6, pp. 1557-1571, Jun. 2003.
14. B. Zeng and J. J. Fu, “Directional discrete cosine transforms: a new framework for image coding,” IEEE Trans. Circuits Syst. Video
Technol., vol. 18, no. 3, pp. 305-313, Mar. 2008.

Authors: P.Sathyaseelan, S.Karthik, Mathew Alphonse, R. Ramesh Kumar

Paper Title: Bearing Strength and Failure Modes Analysis of Carbon Reinforced Aluminium Laminate
Abstract: Objective of this paper is study the bearing strength and failure modes of the Fiber Metal Laminates
prepared by hand layup technique in two different stacking sequences. Parameters like ratio of hole distance to
hole diameter (e/D), ratio to the width of composite to hole diameter (W/D) are varied during the experiment.
Hole diameter is kept constant as 6mm and e value is taken as 6mm, 12mm, 18mm, 24mm, 30mm and 36mm.
Similarly the width of the FML specimen is maintained as 24mm and 36mm respectively. Results show that
laminate with [Ca0°/Ca90°/Al/Ca90°/Ca0°]s orientation is having a bearing strength 3.94% higher than that of
[Al/Ca0°/Ca90°/Al/Ca0°]s orientation. In terms of failure modes the specimens with distance-diameter ratio
greater than 3 and the two width- diameter ratio 4 and 6 exhibited bearing failure. For smaller ratios, the failure
is due to shear out which involves combination of bearing and net tension failure.

Keywords: Bearing strength, failure modes, CARALL, e/D ratio, W/D ratio.

References:

1. Sinmazçelik T, Avcu E, Özgür M, Çoban O. A review : Fibre metal laminates, background, bonding types and applied test methods
2011; 32:3671–85. doi:10.1016/j.matdes.2011.03.011.
2. Asundi A, Choi AYN. Materials Processing Technology Fiber Metal Laminates : An Advanced Material for Future Aircraft 1997.
3. Mccarthy MA, Mccarthy CT, Lawlor VP, Stanley WF. Three-dimensional finite element analysis of single-bolt, single-lap composite
bolted joints : part I — model development and validation 2005; 71:140–58. doi:10.1016/j.compstruct.2004.09.024.
4. Okutan B, Karakuzu R. A study of the effects of various geometric parameters on the failure strength of pin-loaded woven-glass-fiber
449. reinforced epoxy laminate 2001; 61:1491–7.
5. Xiao Y, Ishikawa T. SCIENCE AND Bearing strength and failure behavior of bolted composite joints (part II : modeling and 2573-
simulation) 2005; 65:1032–43. doi:10.1016/j.compscitech.2004.12.049. 25
6. Xiao Y, Ishikawa T. SCIENCE AND Bearing strength and failure behavior of bolted composite joints (part I : Experimental 78
investigation) 2005; 65:1022–31. doi:10.1016/j.compscitech.2005.02.011.
7. Thoppul SD, Finegan J, Gibson RF. Mechanics of mechanically fastened joints in polymer – matrix composite structures – A review.
Compos Sci Technol 2009; 69:301–29. doi:10.1016/j.compscitech.2008.09.037.
8. Olmedo A, Santiuste C, Barbero E. An analytical model for predicting the stiffness and strength of pinned-joint composite laminates.
Compos Sci Technol 2014; 90:67–73. doi:10.1016/j.compscitech.2013.10.014.
9. Hu XF, Haris A, Ridha M, Tay TE. Progressive failure of bolted single-lap joints of woven fibre-reinforced composites 2018.
doi:10.1016/j.compstruct.2018.01.104.
10. Zhang Z. ScienceDirect ScienceDirect An experimental investigation into pin loading effects on fatigue crack growth in Fibre Metal
Laminates modeling pressure turbine blade of an airplane gas turbine engine. Procedia Struct Integr 2016;2:3361–8.
doi:10.1016/j.prostr.2016.06.419.
11. Singh K, Saini JS, Bhunia H, Singh J. Investigations to increase the failure load for joints in glass epoxy composites 2018;0:1–17.
doi:10.1177/0954406218779617.
12. Calabrese L, Fiore V, Scalici T, Bruzzaniti P, Valenza A. Failure Maps to Assess Bearing Performances of Glass Composite Laminates
2018:1–10. doi:10.1002/pc.24806.
13. Pisano AA, Fuschi P, Domenico D De. Composites : Part B A layered limit analysis of pinned-joints composite laminates : Numerical
versus experimental findings. Composites Part B 2012; 43:940–52. doi:10.1016/j.compositesb.2011.11.030.
14. Aktas A, Dirikolu MH. The effect of stacking sequence of carbon epoxy composite laminates on pinned-joint strength 2003; 62:107–
11. doi: 10.1016/S0263-8223(03)00096-5.
15. Khashaba UA, Sebaey TA, Alnefaie KA. Composites : Part B Failure and reliability analysis of pinned-joints composite laminates :
Effects of stacking sequences. Composites Part B 2013; 45:1694–703. doi:10.1016/j.compositesb.2012.09.066.
16. Lee SK, Kim MW, Park CJ, Chol MJ, Kim G, Cho JM, et al. Effect of fiber orientation on acoustic and vibration response of a carbon
fiber/epoxy composite plate: Natural vibration mode and sound radiation. Int J Mech Sci 2016; 117:162–73.
doi:10.1016/j.ijmecsci.2016.08.023.
17. Kaufman JG1999 Properties of Aluminium Alloys: Tensile, Creep, and Fatigue Data at High and Low Temperatures (Metals Park, OH:
ASM International)
18. Sathyaseelan P. Experimental and Finite Element Analysis of Fibre Metal Laminates (FML’ S) Subjected to Tensile, Flexural and
Impact Loadings with Different Stacking Sequence. Int J Mech Mechatronics Eng 2015; 15:23–7.
19. D5961/D5961M-05e1 Standard Test Method for Bearing Response of Polymer–Matrix Composite Laminates. Vol. 15.03. Composite
Materials. ASTM International. West Conshohocken, PA: 2005.

Authors: Ashok Kumar Mohapatra, Minakhi Behera, Nanda Kishore Ray

Paper Title: E-Type Asymmetric Multilevel Inverter Based Transformer less Traction Drive
Abstract: To overcome the limitations of conventional multilevel inverter such as of more no. of power
semiconductor switches, large no. of capacitors, more switching loss etc. , a new topology of Envelope type (E-
type) MLI is used. This E-type Module has some preferable features like reduced no. of components and low
switching frequency. This E-type asymmetric converter uses four unequal DC sources and ten switches to
generate 13 level of output voltage. SHE modulation technique is used to achieve high quality output voltage
with low harmonic content. This E-type converter configuration will be used in transformer less traction drive.
Nowadays Induction motors are used as electric drives for most of the electric railways. A transformer less
connection is used for feeding Induction motor. This converter-inverter configuration will convert single phase
450. AC voltage to DC and again this DC voltage will be converted into three phase AC. The output of the E-type
Multi level inverter will be used to drive the Induction motors. 2579-
25
Keywords: MLI, E-type, Asymmetric, SHE, Transformer less. 89

References:

1. E. Samadaei, S. A. Gholamian, A. Sheikholeslami, and J. Adabi, “An Envelope Type (E-Type) Module: Asymmetric Multilevel
Inverters with Reduced Components” IEEE Transaction on Industrial Electronics, Vol. 63, No. 11, Nov 2016.
2. L. Li, D. Czarkowski, Y. Liu, and P. Pillay, “Multilevel selective harmonic elimination PWM technique in series-connected voltage
inverters,” IEEE Trans.Ind.Appl.., vol. 36, no. 1, pp. 160–170, Jan/Feb 2000.
3. Muhammad H. Rashid, “Power Electronics Circuits, Devices and Applications, 3rd ed., PEARSON publication, 2009.
4. M. S. A. Dahidah, V. G. Agelidis, “Selective Harmonic Elimination PWM Control for Cascaded Multilevel Voltage Source
Converters: A Generalized Formula,” IEEE Transaction On Power Electronics, vol. 23, no. 4, pp. 1620-1630, Jul 2008.

Authors: Badr Almutairi, Sultan Almotairi


A Heterogeneous and Optimized System for Trainers for Analysis and Rectification of
Paper Title:
Compilation Errors
Abstract: In the computing world where information is being gathered and analyzed it’s important for
programmers to convert raw data into meaningful information and this can only be achieved through
programming. The art of programming is not easy as many programming languages are present in the current
programming world. The first programming course for any new programmer is always difficult. New
programmers always try to copy the code provided by their instructors and after compiling the program, gets the
number of errors which they are not able to solve. In this paper, we present a solution which helps the instructors
and the programmers to know about student’s capacity of coding. This system provides a top few errors with
their solutions. The programmers and the evaluators can also use the system to optimize the program which the
students and the other stakeholders are using. As this system alerts the programmers and the other stakeholder
about the compilation errors which occur and thus providing instant help for rectifications of the code when
needed.

Keywords: Programming, Code Compilations, Code Optimization, Rectification of real-time errors.

References:
451.
1. Yasuhiko Morimoto,Kunimi Kurusawa, Setsuo Yokoyama, MaomiUeno, Youzou Miyadera, A Support System forTeaching Computer 2590-
Programming Based on the Analysis of Compilation Errors, Sixth International Conference on Advanced Learning Technologies 25
(ICALT’06).
2. T. Moreau, M. Wyse, J. Nelson, A. Sampson, H. Esmaeilzadeh, L. Ceze, M. Oskin, "Snnap: Approximate computing on programmable
94
socs via neural acceleration", 21st International Symposium on High Performance Computer Architecture (HPCA), 2015.
3. S. Mazahir, O. Hasan, R. Hafiz, M. Shafique, J. Henkel, "An area-efficient consolidated configurable error correction for approximate
hardware accelerators", 53rd Design Automation Conference (DAC), 2016.
4. M.K. Ayub, O. Hasan, M. Shafique, "Statistical error analysis for low power approximate adders", 54rd Design Automation Conference
(DAC), 2017.
5. C. Li, W. Luo, S.S. Sapatnekar, J. Hu, "Joint precision optimization and high level synthesis for approximate computing", 52nd Design
Automation Conference (DAC), 2015.
6. J. Huang, J. Lach, G. Robins, "Analytic error modeling for imprecise arithmetic circuits", Silicon Errors in Logic - System Effects, 2011.
7. A. Yaganteeswarudu, " The speaking compiler-A compiler with audio for immediate error correction", 3rd International Conference on
Computing for Sustainable Global Development (INDIACom), pg. 980-983, 2016.
8. W.-T. J. Chan, A.B. Kahng, S. Kang, R. Kumar, J. Sartori, "Statistical analysis and modeling for error composition in approximate
computation circuits", 31st International Conference on Computer Design (ICCD), 2013.
9. J.S. Hu ; F. Li ; V. Degalahal ; M. Kandemir ; N. Vijaykrishnan ; M.J. Irwin, " Compiler-directed instruction duplication for soft error
detection ", Design, Automation and Test in Europe, Page s: 1056 - 1057 Vol. 2, 2005.
10. Moslem Didehban ; Aviral Shrivastava ; Sai Ram Dheeraj Lokam, " NEMESIS: A software approach for computing in presence of soft
errors ", IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pg. 297 – 304, 2017.
11. Jorge Castro-Godínez ; Sven Esser ; Muhammad Shafique ; Santiago Pagani ; Jörg Henkel, " Compiler-driven error analysis for
designing approximate accelerators ", Design, Automation & Test in Europe Conference & Exhibition (DATE), Page s: 1027 – 1032,
2018.
12. Kazuhiko Nagao and Naohiri Ishii, A Concept of Agent based learning system for C Programming, 2nd International Conference on
Information Technology Based Higher Education and Training, Kumamoto, Japan, July 4-6, 2001.
13. Dean Sanders and Brain Dorn, Classroom Experience with Jeroo, Central Plains Conference (CCSC) JCSC 18, 4(April 2003).
14. S. Lee, D. Lee, K. Han, E. Shriver, L.K. John, A. Gerstlauer, "Statistical quality modeling of approximate hardware", 17th Intl.
Symposium on Quality Electronic Design (ISQED), 2016.
15. H. Jiang, C. Liu, N. Maheshwari, F. Lombardi, J. Han, "A comparative evaluation of approximate multipliers", Intl. Symposium on
Nanoscale Architectures (NANOARCH), 2016.
16. A.K. Verma, P. Brisk, P. Ienne, "Variable latency speculative addition: A new paradigm for arithmetic circuit design", Design
Automation and Test in Europe (DATE), 2008.
17. N. Zhu, W.L. Goh, K.S. Yeo, "An enhanced low-power highspeed adder for error-tolerant application", 12th International Symposium
on Integrated Circuits (ISIC), 2009.
18. R. Ye, T. Wang, F. Yuan, R. Kumar, Q. Xu, "On reconfiguration-oriented approximate adder design and its application", Intl.
Conference on Computer-Aided Design (ICCAD), 2013.
19. Ioana Tuugalei Chan Mow, Analysis of Student Programming Errors in Java Programming Courses, Journal of Emerging Trends in
Computer and Information Sciences, Vol. 3, No. 5, May 2012.
20. S. Liu, K. Pattabiraman, T. Moscibroda, B. G. Zorn, "Flikker: saving dram refresh-power through critical data partitioning", ASPLOS
2011, pp. 213-224.
21. M. de Kruijf, S. Nomura, K. Sankaralingam, "Relax: an architectural framework for software recovery of hardware faults", ISCA, pp.
497-508, 2010.
22. D. T. Stott, B. Floering, D. Burke, Z. Kalbarczpk, R. K. Iyer, "NFTAPE: a framework for assessing dependability in distributed systems
with lightweight fault injectors", DSN, pp. 91-100, 2000.
23. R. Maia, L. Henriques, D. Costa, H. Madeira, "XceptionTM - enhanced automated fault-injection environment", DSN, pp. 547-550,
2002.
24. V. C. Sharma, A. Haran, Z. Rakamaric, G. Gopalakrishnan, "Towards Formal Approaches to System Resilience", PRDC, 2013.
25. J. Wei, A. Thomas, G. Li, K. Pattabiraman, "Quantifying the accuracy of high-level fault injection techniques for hardware faults",
DSN, 2014.
26. J. A. Stratton, C. Rodrigues, I.-J. Sung, N. Obeid, L.-W. Chang, N. Anssari, G. D. Liu, W.-m. Hwu, "Parboil: A revised benchmark
suite for scientific and commercial throughput computing", Center for Reliable and High-Performance Computing, 2012.
27. H. Cho, S. Mirkhani, C.- Y. Cher, J. A. Abraham, S. Mitra, "Quantitative evaluation of soft error injection techniques for robust system
design", DAC, 2013.
28. B. Sangchoolie, F. Ayatolahi, R. Barbosa, R. Johansson, J. Karlsson, "Benchmarking the hardware error sensitivity of machine
instructions", Proceedings of the 2013 IEEE Workshop on Silicon Errors in Logic-System Effects (SELSE Workshop), 2013.
29. The PHP Group, May. 2019, http://www.php.net,
30. Free Software Foundation, Inc. , May. 2019, http://gcc.gnu.org.
Authors: Urvashi Srivastava, Namita Mohanty, Jitendra Mohanty

Paper Title: Internship: A Realistic Job Preview and Selection Mechanism


Abstract: This paper aims to put forward the benefits and utility of internship programmes for organisations,
employers and interning students. It suggests conceptualising internship as a realistic job preview experience for
interns. It questions if “being in the situation” gives a new set of relevant reference points for future pragmatic
decisions to an intern and the organisation in assessing work environment and benefits attached for self-
development. It also underlines the importance of increasing the information quality in an internship programme
to improve recruitment image of an organisation and create employability of an intern in the industry, which are
mainly affected by the dynamic concepts of economies and employment. Approach: The paper adopts a
discursive analysis to present the importance of increasing the information quality in internship programmes and
increasing its contribution to recruitment and selection process and employability of individuals. Findings:
Information quality in a general management sense emerges as the key to provide deeper meaning and
contributes value to the processes created for transfer of skills and knowledge, and add value to the recruitment
exercise, especially in nonlinear economies. Practical Implication: High-quality information programmes
contribute to employability, career development for the intern and recruitment brand image for the host in the
digital age. Originality: The relationship between internship, realistic job preview experience and information
quality is one which bear the same cohesive structural functionality and are based on the utility for the emerging
demands of the market.

452. Keywords: Entrepreneurial Intention; TPB, Perceived Behavioral Control; Personal Attitude; Subjective
2595-
Measures.
26
02
References:

1. 1999, The ACM Digital Library-ACM, New York, pp. 80-87


2. Andrews, J. and Higson, H. (2008), “Graduate employability, ‘soft skills’ versus ‘hard’ business knowledge: a European study”,
Higher Education in Europe, Vol. 33 No. 4, pp. 411– 422.
3. Baur, J.E., Buckley, M.R., Bagdasarov, Z. and Dharmasiri, A.S., (2014). “A historical approach to realistic job previews: An
exploration into their origins, evolution, and recommendations for the future”. Journal of Management History, Vol. 20 No. 2, pp.200-
223.
4. Breaugh, J.A. (2008), “Employee recruitment: current knowledge and important areas for future research”, Human Resource
Management Review, Vol. 18 No. 3, pp. 103–118.
5. Breaugh, J.A. (2014), “Establishing recruitment objectives and developing a recruitment strategy for attaining them” Cable, D.M., Yu,
K.Y.T (Ed.), The Oxford handbook of recruitment. Oxford University Press, New York, NY. pp. 361-381
6. Breaugh, J.A. and Billings, R.S. (1988), “The realistic job preview: five key elements and their importance for research and practice”,
Journal of Business & Psychology, Vol. 2 No. 4, pp. 291– 305.
7. Breaugh, J.A. and Starke, M. (2000), “Research on employee recruitment: so many studies, so many remaining questions”, Journal of
Management, Vol. 26 No. 3, pp. 405–434.
8. Cable, D.M. and Turban, D.B.(2001), “Establishing the dimensions, sources, and value of jobseekers’ employer knowledge during
recruitment”, Buckley, M.R, Wheeler, A.R, Halbesleben J.R.B (Ed.), Research in Personnel and Human Resources Management,
Emerald, United Kingdom, UK, pp. 115–163.
9. Callanan, G. and Benzing, C. (2004), “Assessing the role of internships in the career-oriented employment of graduating college
students”, Education + Training, Vol. 46 No. 2, pp. 82–89.
10. Chen, F.C., Ku, E., Shyr, Y.H., Chen, F.H. and Chou, S.S., (2009). “Job demand, emotional awareness, and job satisfaction in an
internships: The moderating effect of social support”. Social Behavior and Personality: an international journal, Vol. 37 No10,
pp.1429-1440.
11. Coco, M., (2000), “Internships: a try before you buy arrangement”, SAM Advanced Management Journal, Vol. 65 No. 2, pp. 41–43.
12. Collins, C.J. and Han, J. (2004), “Exploring applicant pool quantity and quality: the effects of early recruitment practice strategies,
corporate advertising, and firm reputation”, Personnel Psychology, Vol. 57 No 3, pp. 685–717.
13. Cranmer, S. (2006), “Enhancing graduate employability: best intentions and mixed outcomes”, Studies in Higher Education, Vol. 31,
No 2. pp. 169–184.
14. Dineen, B.R. and Noe, R.A. (2009), “Effects of customization on application decisions and applicant pool characteristics in a web-
based recruitment context”, Journal of Applied Psychology, Vol. 94 No 1 pp. 224–234.
15. Dobbs.S, Madgavkar.A, Barton.D, Labaye.E, Manyika.J, Roxburgh.C, Lund.S and Madhav.S (2012), “The world at work: Jobs, pay,
and skills for 3.5 billion people”, available at:
16. EID, Internship programme at GE, available at www.ge.com/in/careers/culture/universitystudents/internship-opprtunities, (accessed on
10 June 2018) .
17. Eppler, M.J. (2003), “Managing Information Quality: Increasing the Quality of Information in Knowledge Intensive Products and
Processes”, Springer, Heidelberg, Berlin.
18. Finch, D.J., Hamilton, L.K., Baldwin, R. and Zehner, M. (2013), “An exploratory study of factors affecting undergraduate
employability”, Education + Training, Vol. 55 No. 7, pp. 681–704.
19. Fogg, B.J. and Tseng, H. (1999). “The elements of computer credibility”, in Human Factors in Computing Systems 1999 proceedings
of the SIGCHI conference in Pittsburgh, Pennsylvania
20. Freeman, R.E., Harrison, J.S. and Wicks, A.C., (2007). “Managing for stakeholders: Survival, reputation, and success”. Yale
University Press, Haven & London.
21. Gault. J., Leach, E. and Duey. M. (2010), “Effects of business internships on job marketability: the employers’ perspective”, Education
+ Training, Vol. 52 No. 1, pp. 76–88.
22. Gault. J., Redington, J. and Schlager, T. (2000). “Undergraduate business internships and career success: are they related?” Journal of
marketing education, Vol 22 No 1, pp.45-53.
23. Gupta. P.B, Burns. D.J. and Schiferl. J.S., (2010), “An exploration of student satisfaction with internship experiences in marketing”,
Business Education & Accreditation, Vol. 2 No. 1, pp. 27–37.
24. Highhouse. S., Brooks. M.E. and Gregarus. G. (2009). “An organizational impression management perspective on the formation of
corporate reputations”. Journal of Management, Vol 35 No 6, pp.1481-1493.
25. Hovland, C.I. and Weiss, W. (1951).”The influence of source credibility on communication effectiveness”. Public opinion quarterly,
Vol 15 No 4, pp.635-650.
26. Hoyle, J. and Deschaine, M. E. (2016), “An interdisciplinary exploration of collegiate internships: requirements for undergraduate and
graduate programs”, Education + Training, Vol. 58 No. 4, pp. 372–389
27. Hoyle, J. and Goffnett, S. (2013), “A stakeholder framework for designing and directing effective marketing internships”, Journal for
Advancement of Marketing Education, Vol. 21 No. 1, pp. 1–15.
28. Hoyle, J.A. (2013), “Exploring stakeholder relationships in a university internship program: a qualitative study”, Doctoral dissertation,
Central Michigan University, Michigan.
29. https://www.mckinsey.com/~/media/mckinsey/MGI Global_labour_Full_Report_June_2012.ashx (accessed on 20 December 2017)
30. Hurst, J.L and Good L.G. (2010), “A 20-year evolution of internships: implications for retail interns, employers and educators”, The
International Review of Retail, Distribution and Consumer Research, Vol. 20 No 1, pp. 175–186.
31. Hurst, J.L. and Good, L.K., (2009). “Generation Y and career choice: The impact of retail career perceptions, expectations and
entitlement perceptions”. Career Development International, Vol 14 No 6, pp.570-593.
32. Knight, P.T. (2001). “Employability and quality”. Quality in Higher Education, Vol 7 No 2, pp.93-95.
33. Knouse, S.B., Tanner, J.T., and Harris, E.W. (1999), “The relation of college internships, college performance, and subsequent job
opportunity”, Journal of Employment Counselling, Vol 36 No. 1, pp. 35–43.
34. Laboissiere. M, Mourshed. (2017), “Closing the skill gap: Creating workforce development programs that work for everyone”,
available at: http://www.mckinsey.com/industries/social sector/our-insight/closing-the-skill-gap-creating-workforce-development-
programs-that-workfor-everyone (accessed on 12 January 2018).
35. Landis, R.S., Earnest, D.R., and Allen, D.G. (2014), “Realistic job previews: past, present, and future”, in Yu, K.Y. Trevor and Cable,
Daniel M. (Eds), The Oxford Handbook of Recruitment, Oxford University Press, New York, pp. 423–436.
36. Lee. A, (2007), “Special section: how can a mentor support experiential learning?” Clinical Child Psychology and Psychiatry, Vol 12
No. 3, pp. 333–340.
37. Maertz Jr, C.P., Stoeberl, P.A. and Marks, J. (2014), “Building successful internships: lessons from the research for interns, schools,
and employers”, Career Development International, Vol. 19 No. 1, pp. 123–142.
38. Major, D. A. and Kozlowski, S. W. J. (1997), “Newcomer information seeking: individual and contextual influences“, International
Journal of Selection and Assessment, Vol 5 No 1, pp. 16–28.
39. Miller, H. (1996), “The multiple dimensions of information quality”, Information Systems Management, Vol. 13 No. 2, pp. 79–82.
40. Moustakas, C.E., (1995), “Being-in, Being-for, Being-with”, Jason Aronson, Inc., Northvale, N.J.
41. O’Reilly III, C.A. (1982), “Variations in decision makers’ use of information sources: the impact of quality and accessibility of
information”, Academy of Management Journal, Vol. 25 No. 4, pp. 756–771.
42. Oliver, B. (2015), “Redefining graduate employability and work-integrated learning: proposals for effective higher education in
disrupted economies“, Journal of Teaching and Learning for Graduate Employability, Vol. 6 No. 1, pp. 56–65.
43. Phillips, J.M. (1998), “Effects of realistic job previews on multiple organizational outcomes: a meta-analysis”, Academy of
Management Journal, Vol. 41 No 6, pp. 673–690.
44. Pool, L.D. and Sewell, P. (2007), “The key to employability: developing a practical model of graduate employability”, Education +
Training, Vol. 49 No. 4, pp. 277–289.
45. Smith, V. (2010), “Enhancing employability: human, cultural, and social capital in an era of turbulent unpredictability”, Human
Relations”, Vol. 63 No. 2, pp. 279–300.
46. STEP, Internship at ThoughtWorks, available at: http://www.thoughtworks.com/STEP (Accessed 10 January 2018).
47. Taylor, M.S. (1988), “Effects of college internships on individual participants”, Journal of Applied Psychology, Vol. 73 No. 3, pp.
393–401.
48. Van Hoye, G. and Lievens, F. (2005). “Recruitment‐Related Information Sources and Organizational Attractiveness: Can Something
Be Done About Negative Publicity?” International Journal of Selection and assessment, Vol 13 No 3, pp.179-187.
49. Van Hoye, G. and Lievens, F. (2009), “Tapping the grapevine: a closer look at word–of–mouth as a recruitment source”, Journal of
Applied Psychology, Vol. 94 No 2, pp. 341–352.
50. Wickramasinghe, V. and Perera, L. (2010), “Graduates’, university lecturers’ and employers’ perceptions towards employability
skills”, Education + Training, Vol. 52 No. 3, pp. 236–244.
51. Yorke, M. and Knight, P., (2004). “Self‐theories: some implications for teaching and learning in higher education”. Studies in Higher
Education, Vol 29 No 1, pp.25-37.
52. Zhao, H. and Liden, R.C. (2011), “Internship: a recruitment and selection perspective”, Journal of Applied Psychology, Vol. 96 No. 1,
pp. 221–229.
Praveen Kumar Reddy M, T Sunil Kumar Reddy, S.Balakrishnan, Syed Muzamil Basha
453. Authors:
Ravi Kumar Poluru
Paper Title: Heart Disease Prediction Using Machine Learning Algorithm
Abstract: Heart disease is a common problem which can be very severe in old ages and also in people not
having a healthy lifestyle. With regular check-up and diagnosis in addition to maintaining a decent eating habit
can prevent it to some extent. In this paper we have tried to implement the most sought after and important
machine learning algorithm to predict the heart disease in a patient. The decision tree classifier is implemented
based on the symptoms which are specifically the attributes required for the purpose of prediction. Using the
decision tree algorithm, we will be able to identify those attributes which are the best one that will lead us to a
better prediction of the datasets. The decision tree algorithm works in a way where it tries to solve the problem
by the help of tree representation. Here each internal node of the tree represents an attribute, and each leaf node
corresponds to a class label. The support vector machine algorithm helps us to classify the datasets on the basis
of kernel and it also groups the dataset using hyper plane. The main objective of this project is to try and reduce
the number of occurrences of the heart diseases in patients.

Keywords: About four key words or phrases in alphabetical order, separated by commas.

References:

1. M. Amiri and G. Armano, "Early diagnosis of heart disease using classification and regression trees," The 2013 International Joint 2603-
Conference on Neural Networks (IJCNN), Dallas, TX, 2013, pp. 1-4. doi: 10.1109/IJCNN.2013.6707080
2. S. Ekız and P. Erdoğmuş, "Comparative study of heart disease classification," 2017 Electric Electronics, Computer Science, Biomedical 26
Engineerings' Meeting (EBBT), Istanbul, 2017, pp. 1-4. 06
doi: 10.1109/EBBT.2017.7956761
3. P. Su, J. Yang, Z. Li and Y. Liu, "Mining Actionable Behavioral Rules Based on Decision Tree Classifier," 2017 13th International
Conference on Semantics, Knowledge and Grids (SKG), Beijing, 2017, pp. 139-143.
doi: 10.1109/SKG.2017.00030
4. D. Bertsimas, J. Dunn and A. Paschalidis, "Regression and classification using optimal decision trees," 2017 IEEE MIT Undergraduate
Research Technology Conference (URTC), Cambridge, MA, 2017, pp. 1-4.
doi: 10.1109/URTC.2017.8284195
5. P. Nag, S. Mondal, F. Ahmed, A. More and M. Raihan, "A simple acute myocardial infarction (Heart Attack) prediction system using
clinical data and data mining techniques," 2017 20th International Conference of Computer and Information Technology (ICCIT),
Dhaka, 2017, pp. 1-6.
doi: 10.1109/ICCITECHN.2017.8281809.
6. J. Thomas and R. T. Princy, "Human heart disease prediction system using data mining techniques," 2016 International Conference on
Circuit, Power and Computing Technologies (ICCPCT), Nagercoil, 2016, pp. 1-5.
doi: 10.1109/ICCPCT.2016.7530265
7. S. Radhimeenakshi, "Classification and prediction of heart disease risk using data mining techniques of Support Vector Machine and
Artificial Neural Network," 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), New
Delhi, 2016, pp. 3107-3111.
8. M. Sultana, A. Haider and M. S. Uddin, "Analysis of data mining techniques for heart disease prediction," 2016 3rd International
Conference on Electrical Engineering and Information Communication Technology (ICEEICT), Dhaka, 2016, pp. 1-5. doi:
10.1109/CEEICT.2016.7873142.

Authors: Shashikumar Prakash Mitadar , Veena-Kumara-Adi


Adsorption and Statistical Analysis of Textile Effluent Contaminated with Congo red On Orange
Paper Title:
Peel
Abstract: In the present study we made an effort to deploy orange peel as adsorbent to remove Congo red dye
from a synthetic media. Adsorption of Congo red dye was carried out using Response Surface Methodology
(RSM).The influence of various factors such as adsorbent dosage, initial concentration of adsorbate and agitation
time on adsorption was analyzed. A total no of 13 runs of experiments were conducted by using the detailed
conditions which is designed by RSM based Box-Behnken Design. Contour plots and surface plots were
analyzed to know the effect of factors. Activated orange peel could adsorb a maximum of 96.776% of congo red
dye. The values observed in the experiment well agreed with the RSM predicted values .Activated orange peel
seems to be better adsorbent and RSM could be a great tool undertake adsorption.: Congo Red Dye, Adsorption,
Response Surface Methodology, Orange Peel, Box-Behnken Design.

Keywords: Adsorption, Box-behnken Design ,Congo red dye, Orange peel ,Response Surface Methodology.
454.
References: 2607-
26
1. Adeboye Omolara Olubunmi (2015), “Investigations of the Adsorption of Congo Red Dye from Aqueous Solution on Modified Indian 15
Goose Grass (Elucine indica)”, Chemistry Journal Vol. 1, No. 6, 2015, pp. 182-187.
2. E. Kowsalya, S. Sharmila and Jeyanthi Rebbecca (2015),” Removal of congo red dye from effluent sample using casurina leaves as a
adsorbent”, Journal of Chemical and Pharmaceutical Research, 2015, 7(9): 659-665.
3. Fahim Bin AbdurRahamab ,Maimuna Akter, M.Zainal Abedin(2013),”Dyes Removal From Textile Wastewater Using Orange Peels”,
International Journal of Scientific &Technology ,Research volume 2,Issue 9.
4. “I.Ameeth Bashaa , R. Nagalakshmia, T. Shanthi (2016) “Removal Of Congo Red And Magenta Dyes From Industrial Waste Water By
Thorn Apple Leaf Powder” Int. J. Chem. Sci.: 14(S1), 2016, 57-64.
5. M. Srinivas Kini, K.Balakrishna Prabhu, Ankit Gundecha and Devika .U(2017) “Statistical Analysis of Congo Red Dye Removal
Using Sawdust Activated Carbon”, International Journal of Applied Engineering Research ISSN 0973-4562 Volume 12, Number 1.
6. Martin Valica, Stanislav Hostin(2016) “Electrochemical Treatment Of Water Contaminated With Methylorange”, Nova
Biotechnologica et Chimica 15-1.
7. Muhammad Imran Khan , Shahbaz Akhtar , Shagufta Zafar , Aqeela Shaheen 1, Muhammad Ali Khan , Rafael Luque and Aziz ur
Rehman(2015) “Removal of Congo Red from Aqueous Solution by Anion Exchange Membrane (EBTAC): Adsorption Kinetics and
Themodynamics”, Materials , 8, 4147-4161.
8. Mohammad Fadhil Abid, Mumtaz Abdulahad Zablouk1 and Abeer Muhssen Abid-Alameer (2012) “Experimental study of dye
removal from industrial wastewater by membrane technologies of reverse osmosis and nanofiltration”, Iranian Journal of
Environmental Health Science & Engineering 9.17.
9. Nese Ertugay ,Filiz Nuran Acar(2017) “Removal of COD and color from direct blue 71 azo dye wastewater by Fenton’s
oxidation:Kinetic Study”,Arabian journal of chemistry,10,S1158-S1163.
10. Nirav P. Raval , Prapti U. Shah& Nisha K. Shah(2016) “Adsorptive amputation of hazardous azo dye Congo red from wastewater: a
critical review”, Springer ,June 2016.doi:10.1007/s11356-016-6970-0.
11. P.V. Nidheesh , Minghua Zhou , Mehmet A. Oturan (2018) “An overview on the removal of synthetic dyes from water by
electrochemical advanced oxidation proceses”, Chemosphere 197 (2018) 210-227.doi:10.1016/j.chemosphere.2017.12.195.
12. Seema, Anil Yadav, Mamta Bhagat, Virender Yadav(2017) “Congo Red Dye Removal From Aqueous Solution Using Activated
Orange Peel”, International Journal of Engineering Technology Science and Research, Volume 4, Issue 12.
13. Sujit Gulhane and Ranjit Turukmane(2017) “Effect of Make in India on textile sector”, Journal of Textile Engineering& Fashion
Technology,Volume 3 Issue 1.
14. Sayğılı G.A.(2015) “Synthesis, characterization and adsorption properties of a novel biomagnetic composite for the removal of Congo
Red from aqueous medium”, J. Mol. Liq. 2015, 211, 515-526
15. Sudipta Chatterjee,Min W.Lee,Seung H.Woo (2010) “Adsorption of congo red by chitosan hydrogel beads impregnated with carbon
nanotubes”,Bioresource Technology 101(2010)1800-1806.
16. Vanitha Katheresan ,Jibrail Kansedo,Sie Yon Lau (2018),”Efficiency of various recent wastewater dye removal methods:A
review”,Journal of Environmental Chemical Engineering,Vol 6,Issue 4,Page no, 4676-4697.https://doi.org/10.1016/j.jece.2018.06.060.
17. Youzhou Zhou , Liuqin Ge and Neng Fan(2018)” Adsorption of Congo red from aqueous solution onto shrimp shell powder”,
Adsorption Science & Technology 0(0) 1–21.
18. Yusef Omidi Khaniabadi, Mohammad Javad Mohammadi, Mojtaba Shegerd, Shahram Sadeghi, Sedigheh Saeedi, Hassan Basiri
(2017), “Removal of Congo red dye from aqueous solutions by a low-cost adsorbent: activated carbon prepared from Aloe Vera leaves
shell”, Environmental Health Engineering and Management Journal 2017, 4(1), 29–35.
19. Y.C.Wong , K.N. Ranjini And W.A.Wan-Nurdiyana (2014), Removal of Congo Red and Acid Yellow 36 Dye Using Orange Peel and
Rice Husk as Absorbents, Oriental Journal Of Chemistry, Vol. 30, No. (2).
20. Yaneva, Z. L. & Georgieva, N. V. (2012) “ Insights into Congo red adsorption on agro-industrial materials – spectral, equilibrium,
kinetic, thermodynamic, dynamic and desorption studies, a review”. International Review of Chemical Engineering 4 (2) 127–146.
21. Zaharia Carmen and Suteu Daniela(2012) “Textile organic dyes-characteristics,polluting effects and separation/elimination procedures
from industrial effluents-A Critical Overview”, Research gate,52-86.
22. Zhanying Zhang, Lalehvash Moghaddam, Ian M. O’Hara, William O.S. Doherty(2011) “Congo Red Adsorption by Ball-Milled
Sugarcane Bagasse”, Chemical Engineering Journal, 178, pp. 122-128.

Authors: Sugumar D, Harshavarthan V, Kavisri S, Aezhisai Vallavi M S, Vanathi P T

Paper Title: Citrus Classification and Grading Using Machine Learning Algorithms
Abstract: Sorting of fruit into different grade is essential to fetch high price in the market. The fruits are
graded based on height, size, area and weight. Each and every fruit changes the skin’s color in their life span.
Hence, it is appropriate to grade them by processing color images of them and then applying estimation or
recognition techniques on those images. Citrus (plant) grows even in temperature lands and it does not penetrate
its root too deep. It is a precious commodity and used for various day to day activities. In this paper, Machine
vision technique is used to sort citrus based on variety and quality. Primarily, the image is captured by a camera,
placed at a particular distance. Then captured citrus image is classified into different categories, based on their
color, size and quality. During the processing, the attributes are determined based on their defects in the surface
of the citrus. Finally, the quality and breed are determined based on the three-color planes of color image and
gray scale image respectively.

Keywords: Machine vision, Machine learning, Citrus, Unsupervised Algorithm, Classification.

References:

1. Chandra Sekhar Nandi, Bipan Tudu and Chiranjib Koley,” A Machine Vision Technique for Grading of Harvested Mangoes based on
455. Maturity and Quality”, in IEEE Journal on Sensors in 2016.
2. Krishna Singh, lndra Gupta, Roorkee Uttrakhand, Sangeeta Gupta, “International Journal of Signal Processing, Image Processing and 2616-
Pattern Recognition, SVM-BDT PNN and Fourier Moment Technique for Classification of Leaf Shape”, in December 2010. 26
3. Mohammed A. H. Ali and Kelvin Wong Thai, “Automated Fruit Grading System”, IEEE 3rd International Journal on Robotics and
Manufacturing Automation (ROMA) in 2017.
21
4. Vinay Kumar, Binod Kumar vimai, Rakesh Kumar, Rakesh Kumar and Mukesh Kumar, “Determination of soil ph by using digital
image processing technique”, Journal of Applied and Natural Science in 2014.
5. Chandra Sekhar Nandi, Bipan Tudu and Chiranjib Koley “An Automated Machine Vision Based System for Fruit Sorting and
Grading”, Sixth International Conference on Sensing Technology (ICST) in 2012.
6. Ruchita R. Mhaski, P.B. Chopade and M.P. Dale, “Determination of Ripeness and Grading of Tomato using Image Analysis on
Raspberry Pi”, International Conference on Communication, Control and Intelligent Systems (CCIS) in 2015.
7. S. Md. Iqbal, P.E. Sankaranarayanan, A. Gopal and Athira B. Nair, “Estimation of Size and Shape of Citrus Fruits Using Image
Processing for Automatic Grading”, 3rd International Conference on Signal Processing, Communication and Networking (ICSCN) in
2015.
8. Seema, A. Kumar and G. S. Gill,” Automatic Fruit Grading and Classification System Using Computer Vision”, Second International
Conference on Advances in Computing and Communication Engineering in 2015.
9. Q. Li and S. Ren,“A real-time visual inspection system for discrete surface defects of rail heads”, IEEE Trans. Instrument
Measurement in Aug. 2019.
10. Y. Li, Y. F. Li, Q. L. Wang, D. Xu, and M. Tan, “Measurement and detect detection or the weld bead based on online vision
inspection”, IEEE Trans. &strum. Measurement in Jul 2010.
11. J. K. Sainis, V. K. Chadda and R. Rastogi, “Applications of image processing in biology and agriculture”, Electronics Systems
Division.
12. Mahendran R*, Jayashree GC and Alagusundaram K “Application of Computer Vision Technique on Sorting and Grading of Fruits
and Vegetables”, Indian Institute of Crop Processing Technology, Ministry of Food Processing Industries, GOI Pudukkottai Road,
Thanjavur 613 005, Tamil Nadu, India.

Authors: Amit Shrivastava


456.
Paper Title: Development of Asynchronous Motor Bearing Fault Diagnosis Method using TDA and FFNN
Abstract: Asynchronous motors (AM) are life line of any process industry. Malfunctioning of AM at any stage
of process leads the cost of finish product and decrease the efficiency of plant. Hence detection and diagnosis of
AM failure at early stage is essential for timely maintenance and enhance the overall efficiency of the plant. The
work present in this paper focuses on the bearing faults of AM. For this purpose experimental setup is developed
in laboratory and results are based on experimental study carried out in laboratory by analysing AM generated
vibration signals using time domain analysis (TDA) and feed forward neural network (FFNN).

Keywords: Bearing Failure, Induction Motor, Neural Network, Time Domain Analysis, Vibration Signals.

References:
2622-
1. Amit Shrivastava Sulochana Wadhwani S, “An approach for fault detection and diagnosis of rotating electrical machine using vibration
signal analysis” Recent Advances and Innovations in Engineering (ICRAIE- 2014), Jaipur, India, IEEE Xplore: 25 September 2014.
26
2. M.Blodt, P. Granjon, B. Raison and G. Rostaing Models for bearing damage detection in induction motor using stator current 25
monitoring IEEE transaction on industrial electronics, 55, Apr 2008, pp 383-388.
3. M.L.Sin, W.L. Soong and N. Ertugrul Induction Machine On-Line Condition Monitoring and Fault Diagnosis- A Survey, Australasian
Universities Power Engineering Conference, Christchurch, New Zealand, 2003, pp 1-6.
4. A.K. Nandi Advanced Digital Vibration Signal Processing for Condition Monitoring, Proc. 13th International Congress and Exhibition
on Condition Monitoring and Diagnostic Engineering Management, Houston, Tex, USA, December 2000, pp 129-143.
5. Alberto Bellini, Fiorenzo Filippetti, Carla Tasoni, And Gerard-Andre Capolino Advances in diagnostic techniques for induction motor,
IEEE transaction on industrial electronics, l55, Dec 2008,pp 4109-4126.
6. B.Samanta and K.R. Al-Balushi Use of Time Domain Features for The Neural Network Based Fault Diagnosis of A Machine Tool
Coolant System, Proceedings of the I MECH E Part I Journal of Systems and Control Engineering, 215( 3), 2001, pp 199-207.
7. Amit Shrivastava Asynchronous Machines Rotor Faults Detection Using Current Signal Analysis and Diagnosis Using Fast Fourier
Transform, Advanced Science, Engineering and Medicine 11(1-2), January 2019, pp 110-113.
8. W.T. Thomson Current Signature Analysis to Detect Induction Motor Faults”, IEEE Industry Applications Magazine, , July/Aug.
2001, pp 26-34.

Authors: Siddharth Goutam, Srija Unnikrishnan, Sundary Prabavathy, Neel Kudu

Paper Title: Prediction of Vertical Handover Using Multivariate Regression Model


Abstract: Choosing the best performing network among the pool of available networks is a challenge faced by
every mobile user. This paper majorly focuses on the development of a system that can ease the above task
based on available parameters like Received Signal Strength, Bandwidth, Cost, Network Coverage, Jitter, Packet
Loss, Latency etc. The system uses Multivariate Regression Model to help select the best network with the help
of a mobile application. The algorithm assigns a Handover value to each available network among the pool of
available networks and makes a comparative study to facilitate the decision of the best performing network. The
system can also be used by service providers to optimise their network performance by studying the effect of
change in the network parameters. Another possible application can be to check the Handover feasibility of
future technology networks. The paper also tries to focus on the giving insights on the influence each network
parameter mentioned above has on the final value of Handover by using statistical methods and ANOVA.

Keywords: Vertical Handover (VHO), Handover Value (HV), Received Signal Strength (RSS), Quality Of
Service (QoS) Analysis Of Variance (ANOVA), Multivariate Linear Regression (MLR), Coefficient Of
457. Correlation, Coefficient Of Regression. 2626-
26
References: 33
1. Xu Bao, Winfred Adjardjah, Andrews A. Okine, Wence Zhang, and Jinsheng Dai, "A QoE-maximization-based vertical handover
scheme for VLC heterogeneous networks," EURASIP Journal on Wireless Communications and Networking, 2018.
2. Johann Marquez Barja, Carlos T. Calafate, Juan-Carlos Cano, and Pietro Manzoni, "An overview of vertical handover techniques:
Algorithms, protocols and tools," Computer Communications, Elsevier, vol. 34, pp. 985-997, 2011.
3. Siddharth Goutam and Srija Unnikrishnan, "QoS based Vertical Handover Decision Algorithm using Fuzzy Logic," in IEEExplore,
Mumbai, 2019.
4. Xiaohuan Yan, Ahmet Sekercioglu , and Sathya Narayanan, "A survey of vertical handover decision algorithms in Fourth Generation,"
Computer Networks, Elsevier, vol. 54, no. 11, pp. 1848–1863, August 2010.
5. Hamid Zare Abyaneh, "Evaluation of multivariate linear regression and artificial neural networks in prediction of water quality
parameters," Journal of Environmental Health Science & Engineering, 2014.
6. Samiya M. Shimly, David B. Smith, and Samaneh Movassaghi, "Wide-Sense-Stationarity of Everyday Wireless Channels for Body-to-
Body Networks," in IEEE International Conference on Communication (ICC), 2018.
7. Richard E. Nance, Robert L. Moose, and Robert V. Foutz, "A Statistical Technique for Comparing Heuristics : An Example from
Capacity Assignment Strategies in Computer Network Design," Communications of the ACM, vol. 30, no. 5, pp. 430-442, May 1987.
8. Prasanna Sahoo, Probability and Mathematical Statistics. Louisville, KY 40292, USA, 2013.
9. Gulden Kaya Uyanik and Nese Guler, "A study on multiple linear regression analysis," in ELSEVIER, Turkey, 2013, pp. 234-240.
Authors: Shivi Sharma, Ashish Sharma, Hemraj Saini

Paper Title: Advanced Network Security Analysis (ANSA) in Big Data Technology
Abstract: Big Data has caught the attention of research, science, and business world due to the advancement in
458. digitalization. With the evolution of the Internet of Things (IoT), data is increasing by massive amounts every
2634-
day. In the big data environment, securing a large amount of data has become a challenging issue in both
26
security and research industry. In this paper, a framework has been proposed to inspect malignant information
39
and suspicious activities traveling over the networks by utilizing Hive Queries. This framework’s procedure
loads activity information into Hadoop Distributed File System (HDFS) through a Hive database thus examining
the information. This information is sorted as IP Wise, Port Wise, and Protocol Wise. Hive queries will help to
achieve these three goals:- 1) Traffic classification 2) Interrupt Identification 3) analyzing of network traffic.
Using this framework provides users’ a benefit of being able to investigate Big Data and helps them to detect
attacks. Therefore, this framework will allow prevention of network attacks and enable real-time detection in a
Big Data environment.

Keywords: Big Data, Hadoop, Network attack, Network Security Analysis.

References:

1. Naik, N., Jenkins, P., Savage, N. and Katos, V., 2016, December. Big data security analysis approach using computational intelligence
techniques in R for desktop users. In Computational Intelligence (SSCI), 2016 IEEE Symposium Series on (pp. 1-8). IEEE.
2. Bachupally, Y.R., Yuan, X. and Roy, K., 2016, March. Network security analysis using Big Data technology. In SoutheastCon, 2016
(pp. 1-4). IEEE.
3. Lämmel, R., 2008. Google’s MapReduce programming model—Revisited. Science of computer programming, 70(1), pp.1-30.
4. Big Data Basics-Part 5- "Introduction to Map Reduce" https://www.mssqltips.com/sqlservertip/3222/big-data-basics--part-5--
introduction-to-mapreduce/
5. HADOOP Map Reduce Tutorial- https://www.tutorialspoint.com/hadoop/hadoop_mapreduce.htm
6. Baijin Yang, Tonglin Zhang " A Scalable Meta-Model for Big Data Security Analyses" IEEE 2016
7. Yuangang Yao, Lei Zhang, Jin Yi, Yong Peng, Weihua Hu, Lei Shi " A Framework for Big Data Security Analysis and the Semantic
Technology" IEEE 2016
8. Tiwari, H.C., and Yadav, S. 2015. A review on big data and its security. International Conference on Innovations in Information.
Embedded and Communication Systems 1-5.
9. https://wiki.apache.org/hadoop/DataNode
10. Andrea Trevino, Introduction to K-means clustering (12.06.16) https://www.datascience.com/blog/k-means-clustering
11. Dean, J. and Ghemawat, S., 2010. MapReduce: a flexible data processing tool. Communications of the ACM, 53(1), pp.72-77.
12. Thusoo, A., Sarma, J.S., Jain, N., Shao, Z., Chakka, P., Anthony, S., Liu, H., Wyckoff, P. and Murthy, R., 2009. Hive: a warehousing
solution over a map-reduce framework. Proceedings of the VLDB Endowment, 2(2), pp.1626-1629.
13. Thusoo, A., Sarma, J.S., Jain, N., Shao, Z., Chakka, P., Zhang, N., Antony, S., Liu, H. and Murthy, R., 2010, March. Hive-a petabyte
scale data warehouse using hadoop. In Data Engineering (ICDE), 2010 IEEE 26th International Conference on (pp. 996-1005). IEEE.
14. Lan, L. and Jun, L., 2013, December. Some special issues of network security monitoring on big data environments. In Dependable,
Autonomic and Secure Computing (DASC), 2013 IEEE 11th International Conference on (pp. 10-15). IEEE.
Authors: Bharti Sharma, Adeel Hashmi, Ankit Kumar

Paper Title: Whale Optimization Based Recommendation System


Abstract: Recommendation System is an information filtering system which seeks to predict the “liking” of a
user for an item, with the aim to suggest the user those items which he/she is most likely to select/buy. The focus
of this paper is on rating prediction whose main objective is to predict the ratings the current user is going to
give to the items which are yet to be rated/viewed by him/her. This paper uses a collaborative filtering based
approach for generating recommendation, and the model used is a clustering-based model. In this approach all
the existing users are clustered using whale optimization technique, instead of traditional clustering approaches
like k-means, EM algorithm, etc. The appropriate cluster is then identified for the active user, and the ratings of
the active user are predicted based on ratings given by other users belonging to the same cluster. Different
measures like MAE, SD, RMSE and t-value are used for performance analysis of the proposed method and the
results obtained are found to be highly accurate.

Keywords: Collaborative filtering, MAE, SD, RMSE, T-value, WCSS.

References:

1. Resnick, Paul, and Hal R. Varian, "Recommender systems", Communications of the ACM 40.3 , 1997, pp. 56-58.
459. 2. Zhongzhi, Shi, "A clustering algorithm based on swarm intelligence", Info-tech and Info-net, Proceedings, ICII 2001-Beijing,
International Conferences, Vol. 3, IEEE, 2001.
2640-
3. Linden, Gregory D., Jennifer A. Jacobi, and Eric A. Benson," Collaborative recommendations using item-to-item similarity mappings", 26
U.S. Patent No. 6,266,649 ,2001. 44
4. Lemire, Daniel, and Anna Maclachlan, "Slope one predictors for online rating-based collaborative filtering" ,Proceedings of the 2005
SIAM International Conference on Data Mining, Society for Industrial and Applied Mathematics, 2005.
5. Koren, Yehuda, Robert Bell, and Chris Volinsky, "Matrix factorization techniques for recommender systems" ,Computer 8, 2009, pp.
30-37.
6. Burke, Robin, "Hybrid web recommender systems" ,The adaptive web. Springer, Berlin, Heidelberg, 2007, pp. 377-408.
7. Adomavicius, Gediminas, and Alexander Tuzhilin, "Context-aware recommender systems", Recommender systems handbook, Springer,
Boston, MA , 2011, pp. 217-253.
8. Aggarwal, CharuC.,"Knowledge-based recommender systems",Recommender systems. Springer, 2016, pp. 167-197.
9. Ye, Mao," Exploiting geographical influence for collaborative point-of-interest recommendation" ,Proceedings of the 34th international
ACM SIGIR conference on Research and development in Information Retrieval, ACM, 2011.
10. Ujjin, Supiya, and Peter J. Bentley, "Particle swarm optimization recommender system", Swarm Intelligence Symposium, 2003, SIS'03,
Proceedings of the IEEE, 2003.
11. Bedi, P., R. Sharma, and H. Kaur, "Recommender system based on collaborative behavior of ants" ,Journal of artificial intelligence 2.2 ,
2009, pp. 40-55.
12. Watkins, William A., and William E. Schevill, "Aerial observation of feeding behavior in four baleen whales: Eubalaenaglacialis,
Balaenoptera borealis, Megapteranovaeangliae, and Balaenopteraphysalus" ,Journal of Mammalogy 60.1 ,1979,pp. 155-163.
13. Goldbogen, Jeremy A ,"Integrative approaches to the study of baleen whale diving behavior, feeding performance, and foraging
ecology", BioScience 63.2 ,2013,pp. 90-100.
14. Mirjalili, Seyedali, and Andrew Lewis, "The whale optimization algorithm", Advances in Engineering Software 95, 2016, pp. 51-67.

Authors: Sunitha Tappari , K. Sridevi


Paper Title: Resource Optimized Security Coding In Light Weight Security Protocol
Abstract: The overhead for resource utilization in the round coding operation of security coding is large.
Though lightweight protocols are used as a measure of provisioning, higher level of security in many real time
applications, the need of key scheduling, key generation and s-box operation leads to large resource utilization.
This resource consumption intern leads to large power consumption and area overhead. To minimize the
resource utilization in this paper, a new resource optimization technique following resource reutilization scheme
is proposed. The resource utilization is synchronized by the delay term instruction application in cryptography
coding.

Keywords: Security coding, resource optimization, resource reutilization, light weight coding.

References:

1. Tay, J.J.; Wong, M.L.D.; Wong, M.M.; Zhang, C.; Hijazin, I. “Compact FPGA implementation of PRESENT with Boolean S-Box”.
In: Proceedings of the 6th Asia Symposium on Quality Electronic Design (ASQED), Kula Lumpur, Malaysia, 4–9 August 2015; pp.
144–148.
2. Batra, I.; Luhach, A.K.; Pathak, N.; “Research and Analysis of Lightweight Cryptographic Solutions for Internet of Things”. In:
Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies,
Udaipur, India, 4–5 March 2016; p. 23.
3. Patil, A.; Bansod, G.; Pisharoty, N.; “Hybrid Lightweight and Robust Encryption Design for Security in IoT”.Int. J. Secur. Its Appl.
2015, 9, 85–98.
460. 4. Shamir, A.; Biryukov, A.; Perrin, L.P. “Summary of an Open Discussion on IoT and Lightweight Cryptography”. In: Proceedings of 2645-
Early Symmetric Crypto Workshop; University of Luxembourg: Luxembourg, 2017. 26
5. Biryukov, A.; Perrin, L. “State of the Art in Lightweight Symmetric Cryptography”, International Association for Cryptologic 51
Research: Esch-sur-Alzette, Luxembourg, 2017.
6. Wang, Y.; Ha, Y. “FPGA-based 40.9-Gbits/s masked AES with area optimization for storage area network”.IEEE Trans. Circuits Syst.
II Express Briefs 2013, 60, 36–40.
7. McLoone, M.; McCanny, J.V. “PRESENT FPGA implementations utilising look-up tables”. J. VLSI Signal Process. Syst. Signal
Image Video Technol. 2003, 34, 261–275.
8. Liu, F.; Ji, W.; Hu, L.; Ding, J.; Lv, S.; Pyshkin, A.; Weinmann, R.-P. “Analysis of the SMS4 block cipher”. ACISP 2007, 4586, 158–
170.
9. Lee, S.W.; Moon, S.-J.; Kim, J.N. “High-Speed Hardware Architectures for ARIA with Composite Field Arithmetic and Area-
Throughput Trade-Offs”. ETRI J. 2008, 30, 707–717.
10. Bansod, G.; Raval, N.; Pisharoty, N. “Implementation of a new lightweight encryption design for embedded security”. IEEE Trans. Inf.
Forensics Secur. 2015, 10, 142–151.
11. Kitsos, P.; Sklavos, N.; Parousi, M.; Skodras, A.N. “A comparative study of hardware architectures for lightweight block ciphers”.
Comput. Electr. Eng. 2012, 38, 148–160.
12. Satoh, A.; Morioka, S.; Takano, K.; Munetoh, S. “A compact PRESENT hardware architecture with S-box optimization”. Asiacrypt
2001, 2248, 239–254.
13. Rudra, A.; Dubey, P.K.; Jutla, C.S.; Kumar, V.; Rao, J.R.; Rohatgi, P. “Efficient PRESENT encryption implementation with composite
field arithmetic”. CHES 2001, 2162, 171–184.
14. Canright, D. “A very compact S-box for AES”. In International Workshop on Cryptographic Hardware and Embedded Systems;
Springer: Berlin/Heidelberg, Germany, 2005; pp. 441–455.
15. Guo, X.; Chen, Z.; Schaumont, P. “Energy and performance evaluation of an FPGA-based SoC platform with AES and PRESENT
coprocessors”. Lect. Notes Comput. Sci. 2008, 5114, 106–115.
16. Bogdanov, A.; Knudsen, L.R.; Leander, G.; Paar, C.; Poschmann, A.; Robshaw, M.J.B.; Seurin, Y.; Vikkelsoe, C. “PRESENT: An
ultra-lightweight block cipher”. CHES 2007, 4727, 450–466.

Authors: Syed Afzal Basha, B. Jayarami Reddy, C. Sashidhar

Paper Title: Effective Utilization of Quarry Residues and Mineral Admixtures in High Strength Concrete
Abstract: The various requesting utilization of cement is not promptly met with Ordinary Portland cement
(OPC) alone. To satisfy up the need and just as guaranteed the green concrete durability, it has ends up
important to add mineral increments with the best blend of others by-product as substitution to improve the
performance without risking the quality of the concrete. In the construction industry, OPC cement and stream
sand are utilized as significant material making it rare and restricted. While, with respect to the cement is notable
as the greatest guilty parties for discharging carbon dioxide (CO2). Consequently, incomplete substitution of
cement turns into a need just as common sand in concrete by waste material or by-product without bargaining
the nature of the finished result. Fractional supplanting with Ground Granulated Blast furnace Slag (GGBS),
Silica Fume (SF) fuses with 100% of quarry dust (QD) as sand substitution has been utilized. The utilization of
100% QD with OPC+SF delivered increasingly durable concrete with low chloride ingress and preferred
461. outfitting over with 100% stream sand. Notwithstanding the cost impact advantage, the decrease in exhaustion of 2652-
stream sand, tending to condition and manageability issues, it is a significant commitment in making green 26
concrete. 58
Keywords: Ordinary Portland cement, Ground Granulated Blast furnace Slag, Silica fume, quarry dust.

References:

1. Berndt, M.L. (2015) Influence of concrete mix design on CO2 emissions for large wind turbine foundations, Renewable Energy, 83:
608-614.
2. Ankit N. Patel, Prof. Jayesh Kumar Pitroda (2013), “An Exploration Study on Stone Waste as Foregoing Alternatives for Green
Concrete” International Journal of Advanced Engineering Research and Studies, Technical Journals Online (IJAERS), E -
ISSN2249 – 8974, Volume - II, Issue - III, April - June, 2013 /35 – 38
3. Manasseh JOEL, “Use of Crushed Granite Fine as Replacement to River Sand in Concrete Production”, Leonardo Electronic Journal of
Practices and Technologies, ISSN 1583-1078 Issue 17, July-December 2010 p. 85-96
4. Chandana Sukesh et al,”Partial Replacement of Sand with Quarry Dust in Concrete”, International Journal of Innovative Technology
and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-2, Issue-6, May 2013
5. R. Ilangovan, N. Mahendran, and K. Nagamani, “Strength and durability properties of concrete containing quarry rock dust as fine
aggregate,” ARPN Journal of Engineering and Applied Sciences, vol. 3, no. 5, pp. 20–26, 2008.
6. A.Sivakumar, M.Prakash. (2011), ‘Characteristic studies on the mechanical properties of quarry dust addition in conventional
concrete’, Journal of Civil Engineering and Construction Technology, Vol. (10), pp. 218-235, Academic Journals.
7. Divakar, Y., Manjunath, S., and Aswath, M. U. (2012). Experimental Investigation on Behavior of Concrete with the use of Granite
Fines, International Journal of Advanced Engineering Research and Studies, 1(4): 84- 87.
8. Poonam, Anoop Bishnoi, and Manju Bala. (2015), Effect of Quarry Dust as Partial Replacement of Sand in Concrete, Intl
Journal of All Research Education and Scientific Methods 3(6):1-5.
9. Safiuddin, M., Raman, S. N., Zain, M. F. M. (2007). Flowing Concretes with Quarry Waste Fine Aggregate, J. Civil Eng. Res. Pract.,
4(1): 17-25.
10. Rezende, L.R., and Carvalho, J.C. (2003). The Use of Quarry Waste in Pavement Construction, Resources, Conservation and
Recycling, 39(1): 91-105.
11. Lohani, T. K., Padhil M., Dash K. P., and Jena S. (2012). Optimum Utilization of Quarry Dust as Partial Replacement of Sand in
Concrete, Inter. Journal of Applied Sciences, 1(2): 391- 404.
12. Hameed, and Sekar. (2009). Properties of Green Concrete Containing Quarry Rock Dust and Marble Sludge Powder as Fine
Aggregate.
13. Vishal, S. G., Pranita, S. B. (2014), Influence of Silica Fume in Concrete. IOSR Journal of Mechanical and Civil Engineering (IOSR-
JMCE), 44-47
14. Felekoglu, B. (2007). Utilization of High Volumes of Limestone Quarry Wastes in Concrete Industry (Self-Compacting Concrete
Case). Resources, Conserv. Recycling, 51: 770-791.
15. Hmaid Mir, A., Improved Concrete Properties Using Quarry Dust as Replacement for Natural Sand, International Journal of
Engineering Research and Development, 11(3): 46-56.
16. Jaharatul Dini Karen Lee Abdullah et al, “The effect of quarry dust with cement by-products on properties of concrete”, Malaysian
Journal of Civil Engineering 30(3):415-428(2018).
Authors: Vinay A Kulkarni, Maneetkumar R Dhanvijay, A Y Momin

Paper Title: Surface Plate Based Method for Quick Check CMM Accuracy Measurement
Abstract: Coordinate Measuring Machine is now mandatory in Industries for not only dimensional
measurement but also form measurement of jobs. However, due to changes in temperature in Indian Scenario,
Rigidity of guide ways, frictional bearings, it is always susceptible for error development. These errors if not
addressed, integrates into dimensional measurement of workpart, which remains induced due to measurement
system error. Best position of job in entire volume of CMM affects the accuracy of measurand and is the
deciding factor in CMM measurement. An attempt is made in this paper, to establish low cost surface plate
based method for quick check CMM accuracy measurement by operator only without requirement of Laser
CMM expert. The outcome of method depicts closeness within 3 µm with laser interferometer. This saves at
least two lakhs rupees per three months and the total saving will be 6 lakhs rupees, annually.
462. Keywords: CMM, Surface Plate, Quick Check, Error. 2659-
26
References: 62
1. C H Rim, C M Rim, J G Kim, G Chen, J S Pak, A calibration method of portable coordinate measuring arms by using artifacts, Mapan,
34 (2019) 1-11. https://doi.org/10.1007/s12647-018-0297-x
2. B Strbac, V Radlovacki, V Spasic-Jokic, M Delic, M Hadzistevic, The difference between GUM and ISO/TC 15530-3 Method to
Evaluate the Measurement Uncertainty of Flatness by a CMM, Mapan, 32(2017), 251-257. https://doi.org/10.1007/s12647-017-0227-3
3. V A Kulkarni, B B Ahuja, Test Specific Uncertainty Analysis of Zirconia-Dolerite Ball Plate by Monte Carlo Simulation,
Mapan,31(2016), 1-8, https://doi.org/10.1007/s12647-015-0152-2
4. Osamu Sato, Makoto Abe, Toshiyuki Takasuji, Coordinate –based evaluation of two dimensional artefact calibration value as the
reference standards for coordinate measuring machines, Mapan, 33(2018), 191-199, https://doi.org/10.1007/s12647-017-0250-4
5. Girija Moona, Rina Sharma, Usha Kiran, KP Chaudhary, Evaluation of Measurement Uncertainty for Absolute Flatness Measurement
by using Fizeau Interferometer with Phase Shifting Capability, Mapan, 29 (2014), 261-267, https://doi.org/10.1007/s12647-014-0106-
0.

Authors: Avinash Pareek , Sandeep Kumar Saini , Chitra Holla , Geetha Nagaraju
“Enabling Women Entrepreneurs in Horticulture and Instruction Parts in India through
Paper Title:
Microfinance Advancements”
Abstract: Empowerment is a multi-dimensional, social procedure of expanding the limit of people or
gatherings to settle on decisions and to change those decisions into wanted activities and results. This procedure
makes the ability to utilize these decisions in his or her very own life, network and society, with people
following up on issues that they characterize as vital. Empowerment is a procedure which empowers one to pick
up power, expert and impact over themselves, organizations or society. At the end of the day, empowerment is
having basic leadership intensity of one's own and the capacity to settle on appropriate choices. Empowerment
463. likewise implies capacity to learn abilities for enhancing one's close to home or gathering power. This Research
Paper centers around understanding the connection between connection between social factor components with 2663-
by and large social factor of women by directing a poll study. 26
66
Keywords: Questionnaire, Empowerment, Decision making etc.

References:

1. Anitha H.S and Narendra K, (2015), Empowerment of rural women entrepreneurs through E-Commerce with special reference to
handicraft industry, Rural Women Entrepreneurship in India, ISBN – 978 – 81 – 928540 – 0 – 7, pp 396 – 398
2. Anitha. H.S and Yashoda.R (2018), Rural Women Entrepreneurs in the Indian Agricultural Sector, Rural Women Entrepreneurship in
India, ISBN – 978 – 81 – 928540 – 0 – 7, pp 128 –131.
3. Anitha H.S and Sowmya. K.R (2018), Rural Women Participation as Entrepreneurs in Economic Development of India, Rural Women
Entrepreneurship in India, ISBN – 978 – 81 – 928540 – 0 – 7, pp 159 –163
4. Anitha H.S. &Kiran.R. Rao, (2017),SWOT Analysis of Rural Women Entrepreneurship in India-An Overview, Rural Women
Entrepreneurship in India, ISBN – 978 – 81 – 928540 – 0 – 7, pp 189 –195.
5. Archana H.N and Kokila H.S, Role of Institutions in Rural Women Entrepreneurship, Rural Women Entrepreneurship in India, ISBN –
978 – 81 – 928540 – 0 – 7, pp 249 - 257.
6. Arun, (2009), Microfinance: A Rural Hoursehold Study in Davangere District of Karnataka, Microfinance and Sustainable Livelihood
Promotions and Sustainable Livelihood Promotions in India,, ISBN – 978 – 81 – 7446 – 937 – 3, pp 251 – 258.
7. Aswatha Narayan and Srikanth. R (2018), Opportunities and Challenges faced by Rural Women Entrepreneurs in a changing India –
An Evaluation Study, Women Entrepreneurship in India, ISBN – 978 – 81 – 928540 – 0 – 7, pp 51 – 5943.
8. Anjana K (2018), Financial Literacy in Indian Economy, Microfinance and Sustainable Livelihood Promotions in India, ISBN – 978,
ISBN – 978 – 81 – 7446 – 937 – 3, pp 259 – 266
9. AlokMisra, Microfinance in India and millennium Development Goals: maximizing impact on poverty, Discussion paper for workshop
on World Bank -18th September, 2018.
10. Archana Bundela ,(2013),Role of Self help Groups in rural Employment of India: A case Study of SwarnaJayanthi Gram
SwarozgarYojana,IOSR Journal of Humanities and Social Science,Volume7,No1,January-February,pp38-41.
11. Avinash Pareek, Satyam Pincha; “Social Medial and Business Environment”, in International Journal of latest Technology in
Engineering, Management and Applied Science, ISSN: 2278-2540 Volume–II, Issue–I, (Jan., 2013), PP 33-41
12. Avinash Pareek, Dr. Satyam Pincha; “Indian Rural Market: An Impulse to FMCG Sector”, in IOSR Journal of Business and
Management (IOSR-JBM), e-ISSN: 2278-487X. Volume– 8 , Issue– 1 (Jan. - Feb. 2013), PP 21-27, DOI (Digital Object Identifier)
number is 10.9790/487X-0812127
13. Avinash Pareek, Dr. Satyam Pincha “A Study on Environment Friendly Marketing” in International Journal of Research in Commerce
& Management, ISSN: 0976-2183. Volume No. 4 (2013), Issue No. 3 (March), PP 77-80
14. Dr. Satyam Pincha, Avinash Pareek “Business Ethics: Way for Sustainable Development of Organisation” in International Journal of
Research in Commerce, It & Management, ISSN: 2231-5756. Volume No. 3 (2013), Issue No. 03 (March), PP 105-107
15. Avinash Pareek, Dr. Satyam Pincha; “Indian Cement Industry: A Road Ahead” in International Journal in Management and Social
Science, ISSN: 2321-1784. Volume No. 03 Issue No. 08, (August, 2015), PP 432-439 (Impact Factor- 4.358)
16. Dr. Satyam Pincha, Avinash Pareek, Kusum Lata Joriya; “An Empirical Study on Online Purchasing Behaviour of Women”
International Journal of Commerce and Management Research, ISSN: 2455-1627; Volume No. 3, Issue No. 6, (June, 2017) PP 60-64
Impact Factor: RJIF 5.22
17. Avinash Pareek, Dr. Satyam Pincha, Dr. Piyush Pareek; “To Study the Perceptions of the Opinion Leaders of Various Attributes of a
Brand” International Journal of Applied Services Marketing Perspectives; ISSN:(Print): 2279-0977, (Online): 2279-0985, Impact
Factor: 7.056
18. Avinash Pareek, Dr. Satyam Pincha, Dr. Piyush Pareek ;“Estimating the Attributes that Prompts the Actual End Users to Buy a
Specific Brand of Cement in Churu District of Rajasthan” International Journal of Logistics and Supply Chain Management
Perspectives; ISSN (Print): 2319-9032, (Online): 2319-9040, Impact Factor: 7.175
Authors: K. Viswanath Allamraju, Arrola Ravikumar

Paper Title: Structural and Thermal Analysis of Disc Brake With Drilled Holes Of Various Materials
Abstract: The design of braking system of a vehicles is very important in order to minimize the accidents and
increase the life span of vehicle, with this motto, in this paper presented the structural analysis, fatigue analysis
and thermal analysis of disc brake with drilled holes(DBDH) was done by considering various materials of
DBDH such as carbon alloy, steel and carbon steel. The comparison of those materials is studied in various
mechanical and thermal properties such as deformation, strain, stress, factor of safety, number cycles under
cyclic loading and heat flux. Simulation studies were done in Ansys 14.5 version. It is observed that the heat
flow rate is high in carbon alloy and low in carbon steel material of DBDH model. Maximum stress is observed
in steel in structural analysis.

Keywords: Cabon alloy, Carbon steel, DBDH model, Steel , Thermal analysis.

References:

1. Jung, S. P., Park, T. W., Kim, Y. G., A study on thermal characteristic analysis and shape opti- mization of a ventilated disc,
International Journal of Precision Engineering and Manufacturing 13 (1)2012,pp. 57–63..
2. Khalid, M. K., Mansor, M. R., Abdul Kudus, S. I., Tahir, M. M., Hassan, M. Z., Performance in- vestigation of the UTeM Eco-Car disc
brake system, International Journal of Engineering & Tech- nology 11 (6) 2011,pp. 1–6.
3. Nouby, M., Abdo, J., Mathivanan, D., Srinivasan, K., Evaluation of disc brake materials for squeal reduction, Tribology Transactions 54 2667-
(4) 2011,pp. 644–656. 26
4. Omolayo, P. M., Ogheneortega, O. J., Numerical simulation of thermoelastic contact problem of disc brake with frictional heat 71
generation, New York Science Journal 5 (10) 2012,pp.39–43.
5. O¨ ztu¨rk, B., Arslan, F., O¨ ztu¨rk, S., Effects of different kinds of fibers on mechanical and tribologi- cal properties of brake friction
materials, Tribology Transactions 56 (4) 2013, pp. 536–545.
6. Rajagopal, T. K. R., Ramachandran, R., James, M., Gatlewar, S. Ch., Numerical investigation of fluid flow and heat transfer
characteristics on the aerodynamics of ventilated disc brake rotor using CFD, Thermal Science 18 (2) 2014, pp. 667–675.
7. Limpert, R., The thermal performance of automotive disc brakes, SAE Technical Paper 750873, 1975.
8. Morgan, S., Dennis, R., A theoretical prediction of disc brake temperatures and a comparison with experimental data, SAE Technical
Paper 720090, 1972.
464. 9. Dhaubhadel, M. N., Review: CFD applications in the automotive industry, Journal of Fluids En- gineering 118 (4) 1996, pp.647–653.
10. Palmer, E., Fieldhouse, J., Mishra, R., Optimisation of pin shape and its configuration for a pin type vente brake disc using CFD,
FISITA, Yokohama, 2006.
11. Hudson, M., Ruhl, R., Ventilated brake rotor air flow investigation, SAE Technical Paper 971033, 1997.
12. Zhang, J., Xia, C., Research of the transient temperature field and friction properties on disc brakes, Proceedings of the 2nd International
Conference on Computer and Information Applica- tion, 2012, pp. 201–204.
13. Zagrodzki, P., Thermoelastic instability in friction clutches and brakes-transient modal analysis revealing mechanisms of excitation of
unstable modes, International Journal of Solids and Struc- tures 46 ,2009, pp. 2463–2476.
14. Zhu, Z. C., Peng, U. X., Shi, Z. Y., Chen, G. A., Three-dimensional transient temperature field of brake shoe during hoist’s emergency
braking, Applied Thermal Engineering 29 (2009) 932–937.
15. Voldˇrich, J., Frictionally excited thermoelastic instability in disc brakes-transient problem in the full contact regime, International
Journal of Mechanical Sciences 49 (2007) 129–137.
Authors: Pranab Kumar Bharimalla, Souratendu Praharaj, Satya Ranjan Dash

Paper Title: ANN Based Block Chain Security Threat Mechanism


Abstract: Blockchain was first introduced to the world in a form of crypto currency. Since then it’s grabbing
popularity day by day and has already started changing lifestyle and business process in some areas. The
Blockchain is a data structure, and consists of time-stamped list of blocks, used to create a digitally secured,
transactional ledger that, facilitates the process of recording transactions and tracking assets in a distributed
business network instead of resting with a single provider. It brings a paradigm shift from the conventional way
of storing transactional data, exchanging value, assets decentralizing and sharing data across a large network of
untrusted participants without intervention of any centralized trusted agency, but still building a trusted system
without compromising data integrity, security and reliability. This paper is based on survey of different
consensus mechanisms already available so far and an introduce our own approach to tack one of the security
threats by introducing a Neural Network to the consensus mechanism of Blockchain.

Keywords: BlockChain, Cryptocurrency, Security Threats, Double Spending, Deep Learning.

References:

1. Bitcoin Miners Ditch Ghash.io Pool Over Fears of 51% Attack. https://www.coindesk.com/bitcoin-miners-ditch-ghash-io-pool-51-
attack/ .
2. Hashrate Distribution. https://blockchain.info/pools
3. Good Samaritan' Blockchain Hacker Who Returned 267 BTC Speaks Out. https://www.coindesk.com/good-samaritan-blockchain-
465. hacker-returned-255-btc-speaks/
4. Mayer, H. (2016). ECDSA security in bitcoin and ethereum: a research survey. CoinFaabrik, June, 28.Yu, X., Shiwen, M. T., Li, Y., & 2672-
Huijie, R. D. (2017, August). Fair deposits against double-spending for Bitcoin transactions. In Dependable and Secure Computing, 26
2017 IEEE Conference on (pp. 44-51). IEEE.
5. Yu, X., Shiwen, M. T., Li, Y., & Huijie, R. D. (2017, August). Fair deposits against double-spending for Bitcoin transactions. In
79
Dependable and Secure Computing, 2017 IEEE Conference on (pp. 44-51). IEEE.
6. Watanabe, H., Fujimura, S., Nakadaira, A., Miyazaki, Y., Akutsu, A., & Kishigami, J. (2016, January). Blockchain contract: Securing
a blockchain applied to smart contracts. In Consumer Electronics (ICCE), 2016 IEEE International Conference on (pp. 467-468). IEEE.
7. Sasson, E. B., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., & Virza, M. (2014, May). Zerocash: Decentralized
anonymous payments from bitcoin. In Security and Privacy (SP), 2014 IEEE Symposium on (pp. 459-474). IEEE.
8. Kosba, A., Miller, A., Shi, E., Wen, Z., & Papamanthou, C. (2016, May). Hawk: The blockchain model of cryptography and privacy-
preserving smart contracts. In Security and Privacy (SP), 2016 IEEE Symposium on (pp. 839-858). IEEE.
9. Zhu, Y., Guo, R., Gan, G., & Tsai, W. T. (2016, June). Interactive incontestable signature for transactions confirmation in bitcoin
blockchain. In Computer Software and Applications Conference (COMPSAC), 2016 IEEE 40th Annual (Vol. 1, pp. 443-448). IEEE.
10. Litke, P., & Stewart, J. (2014). Cryptocurrency-stealing malware landscape. Technical report.
11. Bamert, T., Decker, C., Wattenhofer, R., & Welten, S. (2014, September). Bluewallet: The secure bitcoin wallet. In International
Workshop on Security and Trust Management(pp. 65-80). Springer, Cham. Luu, L., Teutsch, J., Kulkarni, R., & Saxena, P. (2015,
October). Demystifying incentives in the consensus computer. In Proceedings of the 22nd ACM SIGSAC Conference on Computer
and Communications Security (pp. 706-719). ACM.
12. Luu, L., Teutsch, J., Kulkarni, R., & Saxena, P. (2015, October). Demystifying incentives in the consensus computer. In Proceedings of
the 22nd ACM SIGSAC Conference on Computer and Communications Security (pp. 706-719). ACM.
13. Heilman, E., Kendler, A., Zohar, A., & Goldberg, S. (2015, August). Eclipse Attacks on Bitcoin's Peer-to-Peer Network. In USENIX
Security Symposium (pp. 129-144).
14. Nayak, K., Kumar, S., Miller, A., & Shi, E. (2016, March). Stubborn mining: Generalizing selfish mining and combining with an
eclipse attack. In Security and Privacy (EuroS&P), 2016 IEEE European Symposium on (pp. 305-320). IEEE.
15. Gervais, A., Karame, G. O., Wüst, K., Glykantzis, V., Ritzdorf, H., & Capkun, S. (2016, October). On the security and performance of
proof of work blockchains. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (pp. 3-
16). ACM.
Authors: Amrita Jyoti, Shiv Singh Sarangdevot, Munesh Chandra
Efficient Load Balancing and Service Broker Policy Using Local and Global Representatives in
Paper Title:
Cloud Computing
Abstract: Cloud computing is a technology in the field of computing which offer services to the customer from
anywhere at any time [1]. In the cloud, resources are shared all around the work for quick servicing to the
customer. The aggregation of two terms is referred as cloud computing. The term “cloud” is a pool of different
resources offers services to the end customers and “computing” is done based on the Service Level Agreement
(SLA) to make the resources efficiently to the customers. Load balancing is an important challenge in the
environment of the cloud to increase the utilization of resources [3]. Here we proposed an algorithm which is
based on load balancing and service broker policy. We user two representative thin the proposed approach local
representative and global representative Local user representative is used to predict the parameters of user task
466.
and based on priority it allocate the task to the Virtual Machine (VM). Then for scheduling the task and provide 2680-
the services to the users based on the available cloud brokers global user representative used Dynamic Optimal 26
Load-Aware Service Broker (DOLASB).we used two scenario with different no. of user requests , in these 87
scenario result of our proposed method is better as compared with the other existing methods in terms s of
Execution Time, Makespan, Waiting Time, Energy Efficiency and Throughput.

Keywords: load balancing, service broker policy, cloud computing, cloudsim.

References:

1. Xu M, Tian W, Buyya R, “A survey on load balancing algorithms for virtual machines placement in cloud computing, ” Concurrency
and Computation: Practice and Experience. vol.29, no.12, 2017.
2. Zhu, W., Zhuang, Y., & Zhang, L. (2017). A three-dimensional virtual resource scheduling method for energy saving in cloud
computing. Future Generation Computer Systems, 69, 66-74.
3. Muthulakshmi B, Somasundaram K, “A hybrid ABC-SA based optimized scheduling and resource allocation for cloud environment”.
Cluster Computing. pp. 1-9, 2017.
4. Jiang, D., Xu, Z., Liu, J., & Zhao, W. (2016). An optimization-based robust routing algorithm to energy-efficient networks for cloud
computing. Telecommunication Systems, 63(1), 89-98.
5. M Katyal, A Mishra, "A comparative study of load balancing algorithms in cloud computing environment". arXiv preprint
arXiv:1403.6918, 2014.
6. Q Zhang, L Cheng, R Boutaba, "Cloud computing: state-of-the-art and research challenges". Journal of internet services and
applications, vol.1, no. 1, pp.7-18, 2010.
7. Kaneria, RK Banyal, "Analysis and improvement of load balancing in Cloud Computing", InICT in Business Industry & Government
(ICTBIG), International Conference, IEEE. pp. 1-5, 2016.
8. S Ray, A De Sarkar, "Resource allocation scheme in cloud infrastructure", In Cloud & Ubiquitous Computing & Emerging
Technologies (CUBE), 2013 International Conference, IEEE. pp. 30-35, 2013.
9. Gupta, I., Kumar, M. S., & Jana, P. K. (2018). Efficient Workflow Scheduling Algorithm for Cloud Computing System: A Dynamic
Priority-Based Approach. Arabian Journal for Science and Engineering, 1-16.
10. C McMillen, KN Stubbs, PE Rybski, SA Stoeter, M Gini, NP Papanikolopoulos, "Resource scheduling and load balancing in
distributed robotic control systems". Robotics and Autonomous Systems. Vol.44, no.3-4, pp.251-9, 2003.
11. FF Moghaddam, M Ahmadi, S Sarvari, M Eslami, A Golkar, "Cloud computing challenges and opportunities: A survey". In Telematics
and Future Generation Networks (TAFGEN), 2015 1st International Conference, IEEE. pp. 34-38, 2015.
12. H Wen, Z Hai-ying, L Chuang, Y Yang, “Effective load balancing for cloud-based multimedia system". In Electronic and mechanical
engineering and information technology (EMEIT), 2011 international conference, IEEE. Vol. 1, pp. 165-168, 2011.
13. Lal A, Krishna CR, “Critical Path-Based Ant Colony Optimization for Scientific Workflow Scheduling in Cloud Computing Under
Deadline Constraint”. In Ambient Communications and Computer Systems, pp. 447-461, 2018.
14. Guddeti RM, Buyya R, “A Hybrid Bio-Inspired Algorithm for Scheduling and Resource Management in Cloud Environment”. IEEE
Transactions on Services Computing. 2017.
15. Z Xiao, W Song, Q Chen, "Dynamic resource allocation using virtual machines for cloud computing environment". IEEE transactions
on parallel and distributed systems, vol.24, no.6, pp.1107-17, 2013.
16. Z Zhang, X Zhang, "A load balancing mechanism based on ant colony and complex network theory in open cloud computing
federation". InIndustrial Mechatronics and Automation (ICIMA), 2010 2nd International Conference, IEEE, Vol. 2, pp. 240-243, 2010.
17. ST Maguluri, R Srikant, L Ying, "Stochastic models of load balancing and scheduling in cloud computing clusters", In INFOCOM,
2012 Proceedings IEEE, pp. 702-710, 2012.
18. X Meng, V Pappas, and L Zhang, "Improving the scalability of data center networks with traffic-aware virtual machine placement,” In
INFOCOM, 2010 Proceedings IEEE, pp. 1-9, 2010.
19. YO Yazir, C Matthews, R Farahbod, S Neville, A Guitouni, S Ganti, Y Coady, "Dynamic resource allocation in computing clouds
using distributed multiple criteria decision analysis, " In Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference, IEEE,
pp. 91-98, 2010.
20. K Tsakalozos, H Kllapi, E Sitaridi, M Roussopoulos, D Paparas, A Delis, "Flexible use of cloud resources through profit
maximization and price discrimination," In Data Engineering (ICDE), 2011 IEEE 27th International Conference, IEEE, pp. 75-86,
2011.
21. U Sharma, P Shenoy, S Sahu, A Shaikh, "A cost-aware elasticity provisioning system for the cloud, " In Distributed Computing
Systems (ICDCS), 2011 31st International Conference, IEEE, pp. 559-570, 2011.
22. Yang J, Jiang B, Lv Z, Choo KK, “A task scheduling algorithm considering game theory designed for energy management in cloud
computing, ” Future Generation Computer Systems. 2017.
23. S Khatua, MM Manna, N Mukherjee, "Prediction-based instant resource provisioning for cloud applications, " In Proceedings of the
2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing, IEEE Computer Society, pp. 597-602, 2014.
24. J Grover, S Katiyar, "Agent based dynamic load balancing in Cloud Computing,” In Human Computer Interactions (ICHCI), 2013
International Conference, IEEE, pp.1-6, 2013.
25. Somu N, Kirthivasan K, VS SS. A computational model for ranking cloud service providers using hypergraph based techniques.
Future Generation Computer Systems. 2017 Mar 1;68:14-30.
26. R Kaur, P Luthra. "Load balancing in cloud computing,” In Proceedings of International Conference on Recent Trends in Information,
Telecommunication and Computing, ITC, 2012.
27. Tafsiri SA, Yousefi S. Combinatorial double auction-based resource allocation mechanism in cloud computing market. Journal of
Systems and Software. Vol.137, pp.322-34, 2018.
28. Mishra SK, Puthal D, Sahoo B, Jena SK, Obaidat MS. An adaptive task allocation technique for green cloud computing. The Journal of
Supercomputing. 2018 Jan 1;74(1):370-85.

Authors: Jaspreet Kaur, Amit Kumar Bindal

Paper Title: Node Failure Handling Through Localized Relocation over Wireless Sensor Network
Abstract: Communication over WSN under environmental hazards is a major issue. These constraints may
have an impact over the behavior of the sensors/routing protocols and resource consumption; thus, may lead to
the node failure condition i.e. software/hardware failure, security threats, excessive energy consumption, etc. It
is necessary to analyze the impact of failure over network performance. In this paper, a node failure management
solution is proposed, and its performance is analyzed using different protocols i.e. LEACH, AODV, and DSDV.

Keywords: Reliability, WSN, Node Failure.

467. References: 2688-


th 26
1. A. Hossain, "On the impact of node failure on network coverage in wireless sensor network" 5 International Conference on
Computers and Devices for Communication (CODEC), IEEE-2012, pp.1-4 95
2. Dr. A. Verma, P. Kaur, J. Kaur, "Improved LeDiR technique for fault Node Recovery in Wireless Sensor Network" International
Journal of Scientific & Engineering Research Vol.6 (7), IJSER-2015, pp.918-924
3. M. Younis, I. F. Senturk, K. Akkaya, S. Lee, F. Senel, "Topology management techniques for tolerating node failures in wireless
sensor networks: A survey", Computer Networks, Vol.58, Elsevier-2014, pp.254-283
4. M. Imran, M. Younis, Abas Md Said, H. Hasbullah, "Localized motion-based connectivity restoration algorithms for wireless sensor
and actor networks", Journal of Network and Computer Applications, Vol.35 (2), Elsevier-2012, pp.844-856
5. V. Jha, N. Prakash, A. K. Mohapatra, "Energy Efficient Model for Recovery from Multiple Nodes Failure in Wireless Sensor
Networks", Wireless Personal Communications, Springer-2019, pp.1–21
6. R. Palanikumar, K. Ramasamy, "Effective failure nodes detection using matrix calculus algorithm in wireless sensor networks",
Cluster Computing, Springer-2018,pp 1-10
7. P. Chanak, I. Banerjee, R. Simon Sherratt, "Energy aware distributed routing algorithm to tolerate network failure in wireless sensor
networks", Ad Hoc Networks, Vol.56 Elsevier-2017, pp.58-172
8. A. Hawban, iXingfu Wang, Hassan KuhlaniSaleem KarmoshiRafia GhoulYaser SharabiEsa Torbosh, "Sink-oriented tree based data
dissemination protocol for mobile sinks wireless sensor networks", Wireless Networks, Springer-2018, Vol.24 (7), pp.2723–2734.
9. S. Din, Anand Paul, Awais Ahmad, Jeong Hong Kim, "Energy efficient topology management scheme based on clustering technique
for software defined wireless sensor network", Peer-to-Peer Networking and Applications, pp.1–9.
10. A. Farhat, Christophe Guyeux, Abdallah Makhoul, Ali Jaber, Rami Tawil, Abbas Hijazi, "Impacts of wireless sensor networks
strategies and topologies on prognostics and health management", Journal of Intelligent Manufacturing, Springer-2017, pp.1–27.
11. N. Abdolmaleki, Mahmood Ahmadi, Hadi Tabatabaee Malazi, Sebastiano Milardo, "Fuzzy topology discovery protocol for SDN-
based wireless sensor networks", Simulation Modelling Practice and Theory, Vol.79, Elsevier-2017, pp.54-68.
12. Jian, Ling Qi, Xiaolin Gui, Zhenlong Peng, "Joint design of hierarchical topology control and routing design for heterogeneous
wireless sensor networks",Computer Standards & Interfaces, Vol.51, Elsevier- 2017, pp.63-70.
13. X. Hao, Weijing Liu, Ning Yao, Dehua Geng, Xida Li, “Distributed topology construction algorithm to improve link quality and
energy efficiency for wireless sensor networks", Journal of Network and Computer Applications, Vol.72 Elsevier-2016, pp. 162-170.
14. J. Gui, Kai Zhou, "Flexible Adjustments between Energy and Capacity for Topology Control in Heterogeneous Wireless Multi-hop
Networks", Journal of Network and Systems Management, Springer-2016, Vol.24 (4), pp.789–812.
15. T. Muhammed, Riaz Ahmed Shaikh, "An analysis of fault detection strategies in wireless sensor networks", Journal of Network and
Computer Applications, Vol.78 Elsevier-2017, pp.267-287
16. Z. EnxingLiu Ranran, "Routing Technology in Wireless Sensor Network Based on Ant Colony Optimization Algorithm", Wireless
Personal Communications, Springer-2017, Vol.95 (3), pp.1911–1925
17. S. Hu, Guanghui Li, "Fault-Tolerant Clustering Topology Evolution Mechanism of Wireless Sensor Networks", IEEE Access-2018,
Vol.6, pp.28085-28096
18. J. Zhu, Yong Feng, Ming Liu, Guihai Chen, Yongxin Huang, "Adaptive online mobile charging for node failure avoidance in wireless
rechargeable sensor networks", Computer Communications, Vol.126, Elsevier-2018, pp.28-37.
19. S. Xia, Lei Zhu, Lu Yu, Wei Tong, "Cascading failures model based on the node efficiency", Chinese Automation Congress (CAC),
IEEE-2015, pp.270-274.
20. P. Sun, Nancy Samaan, "Random Node Failures and Wireless Networks Connectivity: Theoretical Analysis", IEEE Wireless
Communications Letters, Vol.4 (5), IEEE-2015, pp.461-464.
21. P. Billand, Christophe Bravard, Sitharama S. Iyengar, Rajnish Kumar, Sudipta Sarangi, "Network connectivity under node failure",
Economics Letters, Vol.149 Elsevier-2016, pp.164-167.
22. H. Ran Liu, Yan-Long Hu, Rong-Rong Yin, Yu-Jing Deng, "Cascading failure model of scale-free topology for avoiding node
failure", Neurocomputing, Vol.260, Elsevier-2017, pp. 443-448.
23. S. Chouikhi, Inès El Korbi, Yacine Ghamri-Doudane, Leila Azouz Saidane, "Recovery from simultaneous failures in a large scale
wireless sensor network", Ad Hoc Networks, Vol.67, Elsevier-2017, pp.68-76.
24. T. Stanzin, M. K. Murmu, "Minimum Spanning Tree in Cognitive Radio Networks: A Distributed Approach to Maintain for Node
Failures", 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT), IEEE-2018, pp.1-6.
25. A. More, V. Raisinghani, "A node failure and battery-aware coverage protocol for wireless sensor networks", Computers & Electrical
Engineering, Vol.64, Elsevier- 2017, pp.200-219
26. B. Varghese, G. McKee, V. Alexandrov, "Handling single node failures using agents in computer clusters", Proceedings of the 2010
International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS '10), IEEE-2010, pp.96-
101.
27. M. Salari, L. Kattan, W. H. K. Lam, H. P. Lo, Mohammad Ansari Esfeh, "Optimization of traffic sensor location for complete link
flow observability in traffic network considering sensor failure", Transportation Research Part B: Methodological, Vol. 121, Elsevier-
2019, pp.216-251
28. R. Begum, ABID H SAYED, "sensor node failure detection in wireless sensor network: a survey", IJETCSE-2015, Vol.14 (2), pp.72-
74
29. S. Jia, L. Ma, D. Qin, "Fault Detection Modelling and Analysis in a Wireless Sensor Network", Journal of Sensors, 2018, pp.1-9
30. Y. Cheng, Q. Liu,2 Jun Wang, S. Wan ,T. Umer, "Distributed Fault Detection for Wireless Sensor Networks Based on Support Vector
Regression", Wireless Communications and Mobile Computing, 2018, pp.1-8.
31. R. Ranjan Swain, Pabitra Mohan Khilar, Sourav Kumar Bhoi, "Heterogeneous fault diagnosis for wireless sensor networks", Ad Hoc
Networks, Vol.69, Elsevier-2018, pp.15-37
32. R. R. Swain, T. Dash, P. M. Khilar, "A Complete Diagnosis of Faulty Sensor Modules in a Wireless Sensor Network", Ad Hoc
Networks, In press, accepted manuscript, In Press, Elsevier-2019, Article 101924.
Bohdan Danylyshyn, Svitlana Bondarenko, Marina Malanchuk, Kateryna Kucherenko, Vitalii
Authors:
Pylypiv, Oleksandr Usachenko
Paper Title: Method of Real Options in Managing Investment Projects
Abstract: A key factor for the success of the project management is the availability of a clear pre-defined plan,
minimizing risks and deviations from the plan, efficient management of changes (as opposed to process,
functional management, service level management). Using the binomial method to estimate the value of real
options, they proceed from the assumption that the number of links is discrete and known in advance. The logic
of this approach requires that their number corresponding to the frequency of making the most significant
decisions for the project. The nodes of the lattice should be those moments in time in which strategic decisions
are made on reducing, developing, switching business, etc. In general, the use of the real options method extends
the tools to justify decisions in managing investment projects.

468. Keywords: Binomial Approach, Real Options, Investment Project, Project management, underlying asset
2696-
lattice, option valuation lattice, decision lattice.
26
99
References:

1. Best K., Zlockie J., Winston R. International standards for project management. Paper presented at PMI® Global Congress 2011 – North
America, Dallas, TX. Newtown Square, PA: Project Management Institute, 2011, https://www.pmi.org/learning/library/international-
standards-project-management-6292
2. Svitlana Bondarenko, Oksana Volkova, Iryna Ageieva and Nataliia Klievtsievych, “Modeling the Risk Management of Financial
Investments by the Fisher Criterion”, International Journal of Civil Engineering and Technology, 10(04), pp. 359-366, 2019.
3. Iryna Bashynska, Marina Malanchuk, Olena Zhuravel, Kateryna Olinichenko, “Smart Solutions: Risk Management of Crypto-Assets and
Blockchain Technology”, International Journal of Civil Engineering and Technology (IJCIET) 10(2), pp. 1121–1131, 2019.
4. Svitlana Bondarenko, Volodymyr Lagodienko, Iryna Sedikova and Olga Kalaman, “Application of Project Analysis Software in Project
Management in the Pre-Investment Phase”, Journal of Mechanical Engineering and Technology, 9(13), pp. 676-684, 2018.
5. Prokopenko O.V., Zięba K.K., Olma S.M. “Efficient and effective management of knowledge of seniors as an element of organization
development”, Marketing and Innovation Management, 2, pp. 181–187, 2016.
6. Portela1 S., Menezes R. “On the Use of Discounted Cash Flow Method on the Customer Valuation”, International Journal of Latest
Trends in Finance & Economic Sciences, Vol-1No. 1 March, pp. 12-15, 2011.
7. James D. Stice, Earl K. Stice, David M. Cottrell, Derrald Stice. “Chapter 10 Teaching Operating Cash Flow: One Matrix for Analysis –
Two Methods for Presentation”, Advances in Accounting Education: Teaching and Curriculum Innovations, pp. 199-215, 2018.
8. Borges R.E.P., Meier A., Dias M.A.G., Neto A.D.D. Oilfield Abandonment Decision by Applying a Fuzzy Pay-Off Method for Real
Options. In: Meier A., Portmann E., Terán L. (eds) Applying Fuzzy Logic for the Digital Economy and Society. Fuzzy Management
Methods. Springer, Cham, 2019.
9. Weidong ChenaYuZengaChongqingXu. “Energy storage subsidy estimation for microgrid: A real option game-theoretic approach”,
Applied Energy, Volume 239, pp. 373-382, 2019.
10. Malpica A., Frías P. “Valuation of an American Option for the Spanish Secondary Reserve Market Using a Machine Learning Model”,
IEEE Transactions on Power Systems, Volume: 34 , Issue: 1, pp. 544-554, 2019
11. Zervos, M., Oliveira, C. & Duckworth, K. Math Meth Oper Res (2018) 88: 417. https://doi.org/10.1007/s00186-018-0641-5
12. Benaroch M. “Real Options Models for Proactive Uncertainty-Reducing Mitigations and Applications in Cybersecurity Investment
Decision Making”, Information Systems Research, Volume 29, Issue 2, pp. 253-523, 2018. https://doi.org/10.1287/isre.2017.0714
13. Rózsa A. “Development of real option theory in the last 20 years”, The Annals of the University of Oradea. Economic Sciences 25(1),
pp. 698-709, 2016.
Kirill Evgenievich Karpukhin, Aleksey Stanislavovich Terenchenko, Aleksey Fedorovich
Authors:
Kolbasov, Vladimir Nikolaevich Kondrashov
Paper Title: The Use Of Microturbines as an Energy Converter For Motor Transport
Abstract: At this stage of the development of vehicles with a combined power plant, one of the areas of
development is the study of the introduction of a low-power gas turbine engine, the so-called microturbine, as a
converter of thermal energy into mechanical. This solution has numerous positive aspects related to its fuel
consumption, small dimensions, high efficiency, as well as a number of performance indicators. In this case, the
vehicle is also equipped with a high-speed generator with the goal of converting the mechanical energy of the
microturbine into electrical energy. This ensures the microturbine operation in a given range on the characteristic
of optimal fuel consumption. The article contains an analysis of the use of microturbine generators in vehicles;
some constructive solutions are considered as well. An overview of vehicles with microturbine generators and
their comparison with traditional internal combustion engines is given. The movement of the vehicle is carried
out by one or several traction motors. More than ten developments of motor vehicles using the microturbine as
an additional source of energy for vehicles with traction electric drive are already known in the world, including
MiTRE (Microturbine Range Extender). Among such vehicles, one can name the Trolza "Ecobus" buses, Delta
Hypercar supercar, Isuzu NPR trucks, Mack Truck, Kenworth.

Keywords: ecology, electric vehicle, energy efficiency, gas turbine, high-speed alternator, hybrids,
microturbine.

References:
469.
1. P.L. Klimov, and E.A. Razumets, “Raspredelennaya generatsiya na baze mikroturbin. Opredelenie termina, opisanie
2700-
tekhnologicheskogo protsessa” [“Distributed generation based on microturbines. Definition of the term, description of the process”]. 27
Modern scientific research: current issues, achievements, and innovations, a collection of articles of the IV International Scientific 03
Practical Conference. In 2 parts: MTSNS «Nauka i Prosveshchenie», 2018, pp. 54-56.
2. S.V. Bakhmutov, K.E. Karpukhin, A.S. Terenchenko, R.Kh. Kurmaev, V.N. Kondrashov, and S.F. Sklyarinskiy, “Production of the
electric vehicle experimental prototype with the range extender”. Biosciences Biotechnology Research Asia, vol. 12(2), 2015.
3. R.H. Kurmaev, A.A. Umnitsyn, A.S. Terenchenko, and K.E. Karpukhin, “Development of a high-voltage battery with a thermostatic
system for electric vehicles”. International Journal of Mechanical Engineering and Technology, vol. 9, 2018.
4. D.V. Shlepko, and N.N. Kargapolova, “Mikrogazoturbinnye elektrostantsii (MIKRO-GTES). Preimushchestva mikrogazoturbinnykh
elektrostantsiy. Energo- i resursosberezhenie v teploenergetike i sotsialnoy sfere: materialy mezhdunarodnoy nauchno-tekhnicheskoy
konferentsii studentov, aspirantov, uchenykh” [“Microgas turbine power plants (MICRO-GTES). Advantages of microgas turbine
power plants. Energy and resource saving in heat and power engineering and social sphere: materials of the international scientific and
technical conference of students, graduate students, scientists”]. Yuzhno-Uralskiy gosudarstvennyy universitet (natsionalnyy
issledovatelskiy universitet), vol. 2(1), 2014, pp.359-363
5. N.N. Efimov, S.V. Skubienko, V.N. Baltyan, V.V. Kopitsa, A.E. Chistyakov, A.V. Nikitina, S.N. Chebotarev, and A.Yu. Lagutin,
“Perspektivy primeneniya parovykh mikroturbin v raspredelennoy energetike” [“Prospects for the use of steam microturbines in
distributed energy”]. Izvestiya vysshikh uchebnykh zavedeniy. Severo-Kavkazskiy region. Seriya: Tekhnicheskie nauki. Yuzhnyy
federalnyy universitet, vol. 1(197), 2018, pp. 34-44.
6. N. Penny, “Rover Case History of Small Gas Turbines”. SAE Transactions, vol. 72, 1964.
7. H.C. Hill, “Progress of Gas Turbine Truck Tests”. Quarterly Transactions, vol. 6(3), 1952.
8. W.A. Turunen, “Pinwheels or Pistons? A Progress Report on Automotive Gas Turbines”. SAE Transactions, vol. 63, 1955.
9. G.J.Jr. Huebner, “The Automotive Gas Turbine – Today and Tomorrow”. SAE Transactions, vol. 65, 1957.
10. J. Watt, “Avtomobilnaya mikroturbina dlya avtonomnogo energosnabzheniya domov” [“Automobile microturbine for autonomous
power supply of houses”]. 2018.
11. “Mack Trucks to Evaluate Wrightspeed Route Powertrain in Mack LR Model”. Available:
https://www.macktrucks.com/community/mack-news/2016/mack-trucks-to-evaluate-wrightspeed-route-powertrain-in-mack-lr-model/.
Authors: Elena S. Medkova

Paper Title: Sculpture in Modern Environment: Educational Technology


Abstract: The article looks at the issues connected with art education aimed at training professional sculptors
and qualified spectators. It outlines the main problems of sculptural thinking in the Russian mentality. The
470.
current situation is described in terms of shifting paradigms related to filling the everyday environment of 2704-
Russian cities with sculptural objects. The article provides results of the research into preferences of population 27
groups most knowledgeable about art, such as experts in art education, teachers and professional sculptors. A 12
stable tradition of visual thinking rather than using tactile imagery has been identified, as well as preferences for
the realistic paradigm of art and academic traditions at all stages of sculptors’ training. At the same time, the
article shows positive changes in the social demand towards small-scale sculpture that is actively present in the
living environment of a modern person. The main problems of sculptor training at different levels of education
are indicated. The author suggests a new model of teaching sculpture based on the actualization of mythological
traditions in the cultural paradigm of postmodernism.

Keywords: art education in Russia, mythological structures in sculpture, sculptural thinking, sculpture,
symbolism of shapes in sculpture, visual and tactile thinking.

References:

1. Yu.A. Smolenkova, “Stroganovskaya shkola skulptury v kontekste istoricheskogo i khudozhestvennogo prostranstva Rossii XX-XXI
vekov” [“The Stroganov school of sculpture in the context of historical and art space in Russia in the 20th and 21st centuries”]. Ph.D.
Thesis. Available: http://www.dissercat.com/content/stroganovskaya-shkola-skulptury-v-kontekste-istoricheskogo-i-
khudozhestvennogo-prostranstva-#ixzz59SL56mnu
2. “Moscow Architecture School “MARSH””. Available: http://march.ru/
3. “Krasnoyarsk Children’s Art School no. 2. Program “Sculpture””. Available: http://artsch2.ru/
4. “Moscow Academic Art Lyceum of the Russian Academy of Arts. Contest results”. Available: http://art-
lyceum.ru/index.php/home/sobytiya/67-moskovskij-oblastnoj-ochnyj-konkurs-akademicheskoj-skulptury-itogi )
5. “The list of festivals”. Available:
http://festrussia.ru/festivali.html?_openstat=ZGlyZWN0LnlhbmRleC5ydTsxMTQ2MDUxNjszNzk1MTY3MTQxO2dvLm1haWwucnU
6Z3VhcmFudGVl&yclid
6. “Moscow Academic Art Lyceum of the Russian Academy of Arts. Programs”. Available: http://www.art-lyceum.ru/
7. “St. Petersburg State Academic Art Lyceum named after B.V. Ioganson of the Russian Academy of Arts. Programs”. Available:
http://www.artlicei.ru/
8. “Institute of Arts at Moscow State Pedagogical University. Programs”. Available: http://mpgu.su/ob-mpgu/struktura/faculties/institut-
iskusstv/
9. “Moscow State Academic Art Institute named after V.I. Surikov. Programs”. Available: http://surikov-vuz.com/
10. “The Russian Academy of Painting, Sculpture and Architecture named after I.S. Glazunov. Program”. Available: http://www.glazunov-
academy.ru/
11. “St. Petersburg State Academy Institute of Painting, Sculpture and Architecture named after I.E. Repin of the Russian Academy of Arts.
Programs”. Available: http://www.artsacademy.ru/
12. “Moscow State Academy of Industrial and Applied Arts named after S.G. Stgoranov. Programs”. Available: https://www.mghpu.ru/
13. “St. Petersburg State Academy of Art and Design named after A.L. Stieglitz. Programs”. Available: http://spbghpa.ru/
14. A.I. Rukavishnikov, “Courses”. Available: http://art-rukav.ru/classes/%D...
15. U. Eco, “Otkrytoe proizvedenie” [“The open work”]. St. Petersburg: Simpozium, 2006.
16. M. German, “Modernizm. Iskusstvo pervoi poloviny XX veka” [“Modernism. Art of the first half of the 20th century”]. St. Petersburg:
Azbuka-klassika, 2005.
17. E.Yu. Andreeva, “Postmodernizm: iskusstvo vtoroi poloviny XX – nachala XXI veka” [“Postmodernism: art of the second half of the
20th century and the beginning of the 21st century”]. St. Petersburg: Azbuka-klassika, 2007.
18. L.F. Chertov, “Znakovaya prizma: stati po obshchei i prostranstvennoi semiotike” [“The prism of sign: articles on general and spatial
semiotics”]. Moscow: Yazyki slavyanskoi kultury, 2014.
19. A.A. Pelipenko, “Dualisticheskaya revolyutsiya i smyslogenez v istorii” [“Dualistic revolution and semantic genesis over the history”].
Moscow: MGUKI, 2007.
20. S.O. Khan-Magomedov, “Arkhitektura sovetskogo avangarda”. [“Architecture of the Soviet avant-garde”]. Book 1. Problems of
molding. Artists and movements. Moscow: Stroiizdat, 1996.
21. J. Baudrillard, “Simvolicheskii obmen i smert” [“Symbolic exchange and death”]. Translation from French and preface by S. Zenkina.
Moscow: Dobrosvet, KDU Publishing, 2000.
22. D. Gartman, “Postmodernizm ili logika postfordizma? [“Postmodernism; or, the Cultural Logic of Post-Fordism?]. In: M.S. Ilchenko,
and V.S. Martyanov (eds.), “Postfordizm: kontseptsii, instituty, praktiki”. Moscow: Politicheskaya entsiklopediya, 2015.
23. J.F. Lyotard, “Sostoyanie postmoderna” [“The postmodern condition”]. Translated from French by Shmako N.A. St. Petersburg:
Alteiya, 1998.
24. K. Hart, “Postmodernizm” [“Postmodernism”]. Translated from English by K.Tkachenko. Moscow: FAIR-PRESS, 2006.
25. D. Eimert, “Iskusstvo i arkhitektura. XX vek, 1900–1960” [“Art and architecture. The 20th century, 1900–1960”]. Translated from
English. Moscow: ZAO “BMM”, 2011.
26. I.P. Ilin, “Poststrukturalizm. Dekonstruktivizm. Postmodernizm” [“Poststructuralism. Deconstructivism. Postmodernism”]. Moscow:
Intrada, 1996.
27. M.A. Mozheiko, “Postmodernizm” [“Postmodernism”]. In: A.A. Gritsanov, and M.A. Mozheiko (eds.), “Postmodernizm:
Entsiklopediya”. Minsk: Interpresservis; Knizhnyi Dom, 2001.
28. R. Barthes, “Mifologii [“Mythologies”]. Translated from French by S. Zenkina. Moscow, Akademicheskii proekt, 2008.
29. M. Eliade, “Aspekty mifa” [“Aspects of a myth”]. Moscow: Akademicheskii proekt, 2010.
30. M. Eliade, “Mif o vechnom vozvrashchenii” [“The myth of eternal return”]. Translated from French by E. Morozova, E.
Murashkintseva. St. Petersburg, Aleteiya, 1998.
31. M. Eliade, “Okkultizm, koldovstvo i mody v kulture” [“Occultism, witchcraft, and cultural fashions”]. Translated from English by E.V.
Sorokin. Kiev: Sofiya; Moscow: ID “Gelios”, 2002.
32. A.A. Pelipenko, “Iskusstvo v zerkale kulturologii” [“Art in the mirror of cultural studies”]. St. Petersburg: Nestor-Istoriya, 2009.
Marina V. Kosolapova, Alexander M. Petrov, Igor G. Yshanov, Nataliya K. Muravitskaya,
Authors:
Hursheda Sh. Nurmuhamedova
The Economic Significance of Statistical Research Activities of Representative Offices of
Paper Title:
Companies Abroad
Abstract: The modern development of economic relations is unthinkable without obtaining data to make an
informed and rational business management decision. This situation determines the significance of statistical
information and justifies its primary role. This article presents statistical analytics data that discloses activity
471. directions implemented abroad by commercial offices of the Russian Federation. In turn, the study, analysis, and
2713-
evaluation of statistical data contribute to the formation and implementation of modern methods for
27
determining the effectiveness of the representative offices' activities of the Russian Federation economic
22
entities. Another generally accepted direction of using statistical data information is to improve the investment
policy in advanced research, development, and optimization of the business model. Statistical data processing
should be prompt, reliable and efficient. The effectiveness of statistical information is considered through the
receipt of economic benefits by an economic entity implementing its activities as the representative offices
abroad. By means of statistical data, regularities of changes of the social, economic environment and other
external factors influencing the development result of an economic entity are determined, which in turn
contributes to the development of effective sustainable development policy.

Keywords: financial resources, educational activities, educational programs, human capital, intellectual capital,
intellectual property, marketing capital, organizational capital, scientific activity, social capital.

References:

1. Efimova O.E., Nikiforova E.V., Schneider O.V., and others. Financial and analytical tools for sustainable development of economic
entities: a textbook/team of authors; by ed. O.V. Efimova. - M .: KNORUS, 2019. - 178p.
2. Bryson J. Strategic Planning for Public and Nonprofit Organizations A Guide to Strengthening and Sustaining Organizational
Achievement (rev. edn.). – San Francisco, CA: Jossey-Bass, 1995. p.576.
3. Mitchell R.K., Agle B.R., Wood D.J. Toward a theory of stakeholder identification and salience: Defining the principle of who and
what really counts // The Academy of Management Review –1997. - №22 (4). – P. 853-886. URL:
http://www.jstor.org/stable/259247. Appeal Date:: 05.05.2019г.
4. Nikiforova EV, Borovitskaya MV, Nikiforova OA, Schneider OV COMPLEX ISSUES OF TRANSFORMATION OF THE
ACCOUNTING FINANCIAL REPORTING IN THE OIL AND GAS INDUSTRY / Economy. Business. Banks. 2018. No. 1 (22). Pp.
154-165.
5. Efimova O.V. Sustainable development reporting: stages and procedures for preparation. Accounting Analysis. Audit 2018; 5 (3):
40-53. DOI: 10.26794 / 2408-9303-2018-5-3-40-53
6. Federal State Statistics Service. URL: http://www.gks.ru/wps/wcm/connect/rosstat_main/rosstat/ru/statistics/ftrade/#. Appeal Date:
04/26/2019
7. Terenteva T.V., Shashlo N.V., Kuzubov A.A., Shnaider V.V. ECONOMIC ADDED VALUE AS A TOOL OF COST-ORIENTED
MANAGEMENT BY BUSINESS STRUCTURES OF INDUSTRY // Bulletin of National academy of the managerial personnel of
culture and arts. 2018. № 2. С. 167-172.
8. Efimova O.V. Development of analytical support for sustainable development strategies. Audit and financial analysis. 2014; №3: with.
303-308.
9. Federal State Statistics Service. URL: http://www.gks.ru/wps/wcm/connect/rosstat_main/rosstat/ru/statistics/ftrade/#. Appeal Date:
04/26/2019
10. Foreign economic information portal of the Ministry of Economic Development of Russia. URL:
http://www.ved.gov.ru/monitoring/foreign_trade_statistics/basic_goods_export/. Appeal Date: 04/26/2019
11. Customs statistics of foreign trade of Russia. URL:
http://www.customs.ru/index.php?option=com_newsfts&view=category&id=125&Itemid=1976&limitstart=20. Appeal Date:
04/26/2019
12. RAEX600. The largest companies in Russia. Who creates the economy of the country. URL: https://raex-
a.ru/update_files/1247_1_1000023197.pdf. Circulation date: 04/30/2019.
13. International Integrated Reporting Standard. URL: http://integratedreporting.org/wp-content/uploads/2015/03/13-12-08-THE-
INTERNATIONAL-I R-FRAMEWORK-2-1.pdf. Circulation date: 04.05.2019g.
14. Kevorkova, Z.A., Petrov, A.M., Savina N.V. Towards liabilities of corporate systems. International Journal of Civil
Engineering and Technology. Volume 10, Issue 2, February 2019, Pages 1582-1593
15. Nikiforova E. V. Formation and disclosure of information on sustainable development of the company // Actual problems of
Economics and law. 2016. Vol. 10, № 2. P. 113-123.
16. Nikiforova E.V. Paradigm of public reporting of economic entities // World Applied Sciences Journal. 2014. Т. 29. № 5. С. 667-670.
17. T.P. Karpova, A.M. Petrov, O.V. Antonova. Directions of Accounting Development in the Conditions of Digitalization / Jour of Adv
Research in Dynamical & Control Systems, Vol. 10, 07-Special Issue, 2018,pp.(117-125)
18. Lymar, M.P., Kevorkova, Z.A., Petrov, A.M The convergence of national and international accounting standards: the Chinese
experience. / International Journal of Civil Engineering and Technology. Volume 9, Issue 13, December 2018, Pages 82-94
19. Akhmadeev, R.G., Bykanova, O.A., Philippova, N.V., Vashchekina, I.V., Turishcheva, T.B. (2018) Macroeconomic indicators and
their impact on the foreign debt burden: The case of BRICS countries. International Journal of Economics and Business
Administration, 6 (2), pp. 68-82.
20. Akhmadeev, R.G., Bykanova, O.A., Morozova T.V., Safonova E.G., Turishcheva, T.B., Lehoux, L. (2018) Evaluation of Financial and
Analytical Activities of the Biggest Car Makers of the Russian Federation. Jurnal Pengurusan, 54, pp. 18 -36
21. Philippova, N.V., Akhmadeev, R.G., Bykanova, O.A., Chaykovskaya, L.A. (2018) Social equity: A route to progressive taxation of
individuals. European Research Studies Journal, 21 (4), pp. 317-330.
22. Akhmadeev, R.G., Kosov, M.E., Bykanova, O.A., Korotkova, E.M., Mamrukova, O.I.(2016) Assessment of the tax base of the
consolidated group of taxpayers in Russia using the method of polynomial interpolation. Indian Journal of Science and Technology, 9
(12), 89533.
Authors: A. Zeynep Onur, Fatemeh Nouban

Paper Title: Software in the Architectural Presentation And Design Of Buildings: State-Of-The-Art
Abstract: Since in the recent years the architecture software have completely changed the work of architects,
today, the architects begin to use software to achieve every kind of design that they are working for from the
very beginning until the end. As presented in this paper, the choice of architectural software depends on the
specific needs of the designs ranging from two-dimensional design to three-dimensional or BIM technologies.
Since some architects prefer to use different software specific for the design that they are working on and they
combine the results to produce the intended ultimate result, while some prefer only one software for the entire
472. work, in this paper, it has been attempted to cover both cases.The main aim of this paper is to introduce the most
2723-
used architectural and building design software from two-dimensional to BIM technologies to cover the needs of
27
architects in the presentation and design of buildings. Twelve architectural and building design software were
29
selected and classified depending on the purpose of their application. The selected software have been analyzed
according to the BIM levels, and most commonly used software in every BIM level and their advantages and
disadvantages are presented. Two software from BIM level 0, three software from BIM level 1, and four
software from BIM level 2, together with 3 software for the design of buildings, a total of twelve software have
been selected and technically described by giving the technical specifications, characteristics, application
domains, limitation, technical popularity and capabilities that can be a complete guideline for architects and
building designers to choose the suitable software to be applied in architectural and building design professions.
Finally for the architectural presentation the software of BIM level 0 (AutoCAD LT and DraftSight), BIM level
1 (AutoCAD Architecture, Chief Architect and TurboCAD), BIM level 2 (ArchiCAD, Revit, Vectorworks
Architect and Allplan Architecture), and for the buildings design the CSI software packages (SAP 2000, ETABS
and SAFE) and STAAD.PRO software are recommended to be employed.

Keywords: Software, Architecture, Presentation, Design, Computer-Aided Design, Cad, Bim, Csi.

References:

1. Dib C., 2017,”5 key differences between AutoCAD and Revit” Linked in online. Available: https://www.linkedin.com/pulse/5-key-
differences-between-autocad-revit-carole-dib
2. Stroma Certification Ltd 2019 Retrieved from: https://www.stroma.com/certification/bim/levels
3. Vatin N.G. O., “BIM-technology in architectural design” Advanced Materials Research Vols. 1065-1069 (2015) pp 2611-2614.
4. Dat L., 2016, “The Importance of AutoCAD in the BIM World”, Online Available: https://www.augi.com/articles/detail/the-
importance-of-autocad-in-the-bim-world
5. Lallotra B. and Singhal B. (2017). A compatibility study on design and analysis of reinforced concrete structural design using the
software. International Journal of Engineering and Technology (IJET), vol. 9(2), 1012-1021.
6. Kumar V. P. and K. Saikiran (2018). Non-Linear Dynamic Analysis of Multistoried Reinforced Concrete Building by Considering Soil-
Structure Interaction (SSI). International Journal of Innovative Technology and Exploring Engineering, 7(7), 5-9.
7. Srinivasa P. R. et al. (2019). Study the Impact of Blast Load on G+7 Multistoried RCC Structure with Varied Distances. International
Journal of Innovative Technology and Exploring Engineering, 8(4), 615-621.
8. Strusoft Software, (2019). Retrieved from: https://strusoft.com/products/femdesign/concrete-design
9. Sadeghi K., Ghaboun N., (2019, June) “Significant Guidance to Employ the Software to Analyze and Design the Reinforced Concrete
Structures: State-Of-The-Art”, International Journal of Innovative Technology and Exploring Engineering (IJITEE) [Online]. 8(9),
1160-1169, Available: https://www.ijitee.org/wp-content/uploads/papers/v8i9/I8035078919.pdf
10. Bethany, 2017, “Which Architecture Software Should I Use?” Scan2CAD, Available:
https://www.scan2cad.com/architecture/architecture-software/
11. ArchiCAD, by Graphisoft, 2019, Retrieved from: https://www.capterra.co.uk/software/2018/archicad
12. Best 20 Building Information Modeling (BIM) Software in 2019, Retrieved from: https://financesonline.com/building-information-
modeling/
13. What is Allplan Architecture?, Retrieved from: http://comparecamp.com/allplan-architecture-review-pricing-pros-cons-features/
14. Computers and Structures Incorporation (CSI), (2019). Retrieved from: https://www.csiamerica.com/products.
15. Sadeghi K., Abdeh A., Al-Dubai S., (2017, December) “An Overview of Construction and Installation of Vertical Breakwaters”,
International Journal of Innovative Technology and Exploring Engineering (IJITEE) [Online]. 7(3), 1-5, Available:
https://www.ijitee.org/download/volume-7-issue-3/
16. Sadeghi K., Al Haj Houseen Q., Abo Alsel S., (2017, December) “Gravity Platforms: Design and Construction Overview”,
International Journal of Innovative Technology and Exploring Engineering (IJITEE) [Online]. 7(3), 6-11, Available:
https://www.ijitee.org/download/volume-7-issue-3/
17. Bentley Systems Incorporated (2019). Retrieved from: https://www.bentley.com/en/products/product-line/structural-analysis-
software/staadpro.
18. Research Engineers (REI), (2019). Retrieved from: https://www.reig.de/en/our-software-solutions-at-a-glance/staadpro/international-
design-codes/.Bentley Systems, Incorporated (2019). Retrieved from: https://www.bentley.com/en/products/product-line/structural-
analysis-software/staadpro-advanced

Authors: Winda Sekar Dewi, Ema Utami, Bambang Sudaryatno

Paper Title: Database Migration using Data Synchronization and Transactional Replication
Abstract: Database migration is one of the important thing to make the data can be stored optimally and
minimize risk of data lost. Data Synchronization and Transactional Replication can be used to do it.
Transactional Replication is working on services area to migrate database stored in cloud to another cloud
storage. Data Synchronization is used to synchronize migrated database with origin database. Data lost concerns
remain as the big consideration to widespread the adoption. Many ways can be done to minimize the risks, one
of them is by migrate the database that is already stored in cloud to another database in cloud. This research will
conduct database migration using data synchronization and transaction replication. By using Azure and Amazon
Web Services as Database Migration Services, these techniques allow SQL Database data to be easily replicated,
and allows multiple SQL Databases to isolate mission-critical workloads from analytic queries that run relatively
longer. The evaluation is by comparing these two migration services based on the synchronizing time of full
loaded database migration. Migration result shows that database migration using transactional replication and
data synchronization is influenced by the number of rows as well as size of the table, server location, also
473. uploading and downloading speed in each database migration service.
2730-
Keywords: Database Migration, Transactional Replication, Data Synchronization, Azure, AWS. 27
34
References:

1. B. Hanstein, Rittal White Paper: Security Management for Data Centre Infrastructures. Freidhelm LOH Group.
2. B. Nagarajan and Dr.J. Suguna, “A Review on Cloud Data Storage in Virtual Perspective” in International Journal of Computer
Science and Information Technologies, vol. 5, May. 2014, pp. 6027-6031.
3. R. Sudeepa and Dr.H.S Guruprasad, “Effective Secure Storage and Retrieve in Cloud Computing” in International Journal of Advanced
Computing Engineering and Application (IJACEA), vol. 3, no. 3, June. 2014, pp. 37-42.
4. W. Dawoud, I. Takouna, C. Meinel, “Infrastructure as a Service Security: Challenges and Solutions,” IEEE Xplore, in The 7 th
International Conference on Information and Systems, 2010.
5. E. Gorelik, “Cloud Computing Models”, working paper in Massachusetts Institute of Technology, Cambridge, January 2013.
6. B.O. Ogbuokiri, C.N. Udanor, M.N. Agu, “Implementing Big Data Analytics for Small and Medium Enterprises (SME) Regional
Growth”, in IOSR Journal of Computer Engineering (IOSR-JCE), vol. 17, issue. 6, ver. IV, Nov-Dec. 2015, pp. 35-43.
7. M. Anshar, M. W. Ashraf, M. Fatima, “Data Migration in Cloud : A Systematic Review” in American Scientific Research Journal For
Engineering Technology and Sciences (ASRJETS), vol. 48, no. 1, 2018, pp. 73-89
8. V.S. Kushwah, A. Saxena, “A Security Approach for Data Migration in Cloud Computing”, in International Journal of Scientific and
Research Publication, vol. 5, issue. 3, May. 2103, pp. 1-8.
9. G. Singh, S. Satardekar, Y. Rane, and Prof. A. Srivastava, “Database Migration between Two Heterogeneous Systems” in International
Journal of Engineering Trends and Technology (IJETT), vol. 2, no.3, April. 2015, pp. 126–128.
10. R. Ahmadi, B.R. Cami, H. Hassanpour, “Automatic Data Migration between Two Databases with Different Structure”, in
International Journal Applied Information Systems (IJAIS), vol. 3, no. 3, July. 2012, pp. 23-28.
11. R. Yadav, P. Patil, U. Nevase, T. Trivedi, Prof.B. Patil, “Incremental Data Migration in Multi-database Systems using ETL Algorithm”
in International Journal of Computer Science and Information Technologies (IJCSIT), vol. 5, no. 2, 2014, pp. 2121-2125
12. M. Elamparithi, V. Anuratha, “A Review on Database Migration Strategies, Techniques, and Tools” in World Journal of Computer
Application and Technology, vol. 3, no. 3, 2015, pp. 41-48.
13. G. Singh, Dr.V. Laxmi, “A Review on Data Migration in Public Cloud” in International Journal of Engineering Sciences & Research
Technology (IJESRT), vol. 6, no. 4, April. 2017, pp. 247-251.
14. M. C. Mazilu, “Database Replication”, in Database Systems Journal, vol. 1, no. 2, 2010, pp. 33-38.
15. S.A. Moiz, P. Sailaja, G. Venkataswamy, N.P. Supriya, “Database Replication: A Survey of Open Source and Commercial Tools”, in
International Journal of Computer Application, vol. 13, no. 6, January.2011, pp.1-8.
16. R. Jindal, “Review Paper on Database Synchronization between Local and Server” in International Journal of Engineering Sciences and
Research Technology (IJESRT), vol. 5, no. 7, July. 2016, pp. 1396-1400.
17. I. Shabani, B. Cico, A. Dika, “Solving Problems in Software Applications through Data Synchronization in Case of Absence of the
Network”, in International Journal of Computer Science (IJCSI), vol. 9, issue. 1, no. 3, January. 2012, pp. 10-16.
Authors: Jigesh Yadav, Manikant Paswan

Paper Title: Prediction and Optimization of Weld Bead Geometry


Abstract: Bead geometry plays very important role in predicting the quality of weld as cooling rate of the weld
depends on the height and bead width, also bead geometry determines it’s residual stresses and distortion. Weld
bead geometries are outcomes of several welding parameters taken into consideration. If arc travel is high and
arc power is kept low it will produce very low fusion. If electrode feed rate is kept higher width is also found to
be on higher side which makes bead tto flat. Also, the parameters like current, voltage, arc travel rate, polarity
affects weld bead geometry. Hence, this paper uses techniques like ANN, linear regression and curvilinear
regression for predictions of weld bead geometry and their relations with different weld parameters.

Keywords:

References:

1. J.B. Austin, Electric Arc Welding, Am. Tech. Soc., Chicago, 1956.
2. T.B. Jefferson, The Welding Encyclopedia, McGraw-Hill, New York, 1951.
3. P.I. Houldcroft, Welding Process, Cambridge University Press, Cambridge, 1967.
4. F.D. Graham, Audels Welder Guide, Taraporevala Sons and Co., Bombay, 1966.
5. B. Ronay, The significance of extremity in curve welding, Weld. Architect (1960)
6. B.E. Rossi, Welding and its Applications, McGraw-Hill, New York, 1941.
7. V. Tsegelsky, The Electric Welder, Foreign Language Publishing House, Moscow, 1976.
8. Shumovsky A, Controlling welding shrinkage and contortion, The Canadian Welder, April, 1952.
9. R.L. Applications, L.M. Gourd, K.A. Lelson, Effect of welding factors upon globule shape and size in submerged-circular segment
welding, Weld. Met. Fabr. (1963).
10. H.S. Gurev, R.D. Strong, Solidification marvels in dormant gas metalarc welds, Weld. J. (1963)
11. N. Christensen, V.L. de Davies, K. Gjermurdsen, Distribution of temperatures in curve welding, Brit. Weld. J. (1965)
12. M.L. Begeman, B.H. Amstead, U.I. Mashruwala, Effects of decreased climatic weight on circular segment welding attributes, Weld. J.
(1950)
474. 13. PAL K, PAL S K. Delicate processing strategies utilized for the displaying and improvement of gas metal curve welding: A survey [J].
Universal Journal of Manufacturing Research, 2011. 2735-
14. MURUGAN N, PARMAR R S. Impacts of MIG process parameters on the geometry of the dab in the programmed surfacing of 27
tempered steel [J]. Diary of Materials Processing, 1994. 42
15. KIM I S, BASU A, SIORES E. Numerical models for control of weld dot infiltration in the GMAW procedure [J]. Universal Journal of
Advanced Manufacturing Technology, 1996.
16. RAO P S, GUPTA O P, MURTY S N, RAO A B K. Impact of procedure parameters and numerical model for the forecast of globule
geometry in beat GMA welding [J]. Universal Journal of Advanced Manufacturing Technology, 2009.
17. PALANI P K, MURUGAN N. Advancement of scientific models for expectation of weld dab geometry in cladding by transition cored
curve welding J. Worldwide Journal of Advanced Manufacturing Technology, 2006.
18. PAL S, MALVIYA S K, PAL S K, SAMANTARAY A K. Improvement of value qualities parameters in a beat metal inactive gas
welding procedure utilizing dim based Taguchi technique J. Worldwide Journal of Advanced Manufacturing Technology, 2009.
19. TARNG Y S, YANG W H. Advancement of the weld dot geometry in gas tungsten bend welding by the Taguchi technique J. Global
Journal of Advanced Manufacturing Technology, 1998.
20. KARUNAKARAN N, BALASUBRAMANIAN V. Impact of beat current on temperature conveyance, weld dot profiles and qualities
of gas tungsten bend welded aluminum combination joints J. Exchanges of Nonferrous Metals Society of China, 2011
21. NAGESH D S, DATTA G L. Hereditary calculation for advancement of welding factors for stature to width proportion and utilization
of ANN for forecast of dot geometry for TIG welding process J. Connected Soft Computing.
22. KIM I S, JEONG Y J, SON I J, KIM I J, KIM J Y, KIM I K, YARAGADA P K D V. Affectability examination for procedure
parameters impacting weld quality in automated GMA welding process J. Diary of Materials Processing Technology, 2003.
23. PALANI P K, MURUGAN N. Affectability investigation for procedure parameters in cladding of tempered steel by transition cored
circular segment welding J. Diary of Manufacturing Processes, 2006.
24. KIM I S, SON K J, YANG Y S, YARAGADA P K D V. Affectability investigation for procedure parameters in GMA welding
procedures utilizing a factorial plan technique J. Universal Journal of Machine Tools and Manufacture, 2003.
25. KARAOGLU S, SECGIN A. Affectability examination of submerged circular segment welding process parameters J. Diary of
Materials Processing Technology, 2008.
26. Ueyama, T., Ohnawa, T., Tanaka, M., and Nakata, K. 2005. Impacts of light setup and welding current on weld dab development in
fast pair beat gas metal circular segment welding of steel sheets. Science and Technology of Welding and Joining .
27. Talkington, J. E. 1998. Variable extremity gas metal bend welding. Doctoral thesis, The Ohio State University.
28. J. E. Hinkel, F.W. Forthoeffel, High turmoil thickness submerged circular segment welding with twin wires, welding J. (1976)
29. RS Chandel affidavit qualities of twin wire submerged circular segment welding process, proc. Int. perplex seaward materials and ice
building gathering, Houston, February, 1990
30. I I Ivochkin et al, prospect for the utilization of powdered filler metal in combination welding, weld push. (1969)
31. W. Troyer, J. Mikurak, High testimony submerged curve welding with iron powder joint fill. Welding J. (1974)
32. N Baily, Submerged curve welding ferritic steels with alloyed metal powder, welding J. (1991).
33. Yong-hua SHI, Ze-pei ZHENG, Jin HUANG, Sensitivity model for expectation of globule geometry in submerged wet transition cored
circular segment welding, Trans. Nonferrous Met. Soc. China 23(2013)
34. PALANI P K, MURUGAN N. Affectability examination for procedure parameters in cladding of tempered steel by transition cored
circular segment welding [J]. Diary of Manufacturing Processes, 2006.
35. KARAOGLU S, SECGIN A. Affectability examination of submerged bend welding process parameters [J]. Diary of Materials
Processing Technology, 2008.
36. KATHERASAN D, ELIAS J V, SATHIYA P, HAQ A N. Reenactment and parameter streamlining of motion cored circular segment
welding utilizing counterfeit neural system and molecule swarm enhancement calculation J. Diary of Intelligent Manufacturing, 2012.
37. SATHIYA P, ARAVINDAN S, JEYAPAUL R, AJITH P M, HAQ A N. Advancing the weld globule qualities of overly austenitic
treated steel (904L) through dark based Taguchi technique [J]. Multidiscipline Modeling in Materials and Structures, 2010.
38. V. Gunaraj , N. Murugan , Application of reaction surface system for anticipating weld dot quality in submerged curve welding of
channels, Journal of Materials Processing Technology (1999) .
39. R. A. RIBEIRO, E. B. F. SANTOS, P. D. C. ASSUNÇÃO, R. R. MACIEL, AND E. M. BRAGA Predicting Weld Bead Geometry in
the Novel CWGMAW Process.
40. Assuncão, P. D. C. 2013. Estudo da Viabilidade do Processo de Soldagem GMAW-DCW (twofold virus wire). Ace theory. Belém,
Paré, Brazil. Government University of Pará. In Portuguese.
41. N. Murugan, R.S. Parmar, Effect of SAW process factors on globule geometry in single wire surfacing, J. Mater. Procedure. Technol.
37 (1993).
42. L. J. Yang, R.S. Chandel, M.J. Bibby, The impacts of procedure factors on the dab width of submerged-curve weld stores Journal of
Materials Processing Technology, 29 (1992)
43. Ravinder Pal Singh, R.K.Garg, Dinesh Kumar Shukla, Mathematical displaying of impact of extremity on weld globule geometry in
submerged curve welding, Journal of Manufacturing Processes.
44. B. Senthilkumar, T. Kannan, Effect of Flux Cored Arc Welding process parameters on dab geometry in overly duplex tempered steel
claddings.

Authors: Ichrak LAFRAM, Siham EL IDRISSI, Aicha Marrhich, Naoual BERBICHE, Jamila EL ALAMI

Paper Title: Network Data Classification through Artificial Neural Networks and GenClust++ Algorithm
Abstract: Information systems are becoming more and more complex and closely linked due to the
exponential use of internet applications. These systems are encountering an enormous amount of traffic, this
traffic can be a normal one destined for natural use or it may be a malicious one intended to violate the security
of the system. Therefore, a defense method needs to be in place. One of the commonly used tools for network
security is the Intrusion Detection System (IDS). An IDS, while ensuring real - time connectivity, tries to
identify fraudulent activity using predetermined signatures or pre-established network behavior while
monitoring incoming traffic. Intrusion detection systems based on signature or behavior cannot detect new
attacks and fall when small deviations occur. Also, current anomaly detection approaches suffer often from high
false alarms. As a solution to these problems, machine learning techniques are a new and promising tool for the
identification of attacks. In this paper, the authors present a hybrid approach, combining artificial neural
networks and a hybrid clustering algorithm based on k-means and genetic algorithm called GenClust++. The
final framework leads to a fast, highly scalable and precise packets classification system. We tested our work on
the newly published dataset CICIDS 2017. The overall process was fast, showing high accuracy classification
results.

Keywords: Intrusion Detection, Machine Learning, Traffic Classification, Artificial Neural Networks,
Clustering, GenClust++.

References:

1. A.Jelsiana Jennet, Dr. J Frank Vijay. International Journal of Applied Engineering Research ISSN 0973-4562 Volume 10, Number 17
475. (2015) pp.12635-12641. 2743-
2. Piero P.Bonissone, “Soft computing: the convergence of emerging reasoning technologies,” Soft Computing Journal, vol 1, no 1, pp. 6-
18, Springer-Verlag 1997 27
3. Beghdad, R. (2008). Critical study of neural networks in detecting intrusions. Computers and Security, 27(5-6), 168–175 50
4. Rahman, M. A., & Islam, M. Z. (2014). A hybrid clustering technique combining a novel genetic algorithm with k-means. Knowledge-
Based Systems, 71, 21 - 28. Retrieved from http://dx.doi.org/10.1016/j.knosys.2014.08.011
5. Jacob Kogan, “Introduction to Clustering Large and High-Dimensional Data”, University of Maryland, Baltimore County
6. Sharafaldin, I., Gharib, A., Habibi Lashkari, A., and Ghorbani. Towards a reliable intrusion detection benchmark dataset. Software
Networking, 2017.
7. A. K. Jain, “Data Clustering: 50 Years Beyond K-Means”, in Pattern Recognition Letters, vol. 31 (8), pp. 651-666, 2010
8. E. Eskin, A. Arnold, M. Prerau, L. Portnoy, and S. Stolfo, “A geometric framework for unsupervised anomaly detection: Detecting
intrusions in unlabeled data,” in Applications of Data Mining in Computer Security, Kluwer, 2002
9. 978-1-4244-5143-2 ©2010 IEEE DOI: 10.1109/ITAPP.2010.5566641 Internet Technology and Applications, 20-22 Aug. 2010
10. Bannour S. and M. R. Azimi-Sadjadi. Principal component extraction using recursive least squares learning, Neural Networks, IEEE
Transactions on, 1995,6, 2. 457–469
11. Chen, Y. H., Abraham, A., & Yang, B. (2007). Hybrid flexible neural-tree-based intrusion detection systems. International Journal of
Intelligent Systems, 22(4), 337–352
12. Jirapummin, C., Wattanapongsakorn, N., & Kanthamanon, P. (2002). Hybrid neural networks for intrusion detection system.
Proceedings of ITC–CSCC, 928–931
13. Lei Yu and Huan Liu. Feature selection for high-dimensional data: A fast correlation-based filter solution. In Proceedings of the
Twentieth International Conference on Machine Learning (ICML 2003), 2003
14. Jacob Kogan, “Introduction to Clustering Large and High-Dimensional Data”, University of Maryland, Baltimore County
15. Axelsson S.: Intrusion detection systems: A taxonomy and survey. Technical Report No 99-15, Dept. of Computer Engineering.
16. Zahidul Islam, et al. Combining K-Means and a Genetic Algorithm through a Novel Arrangement of Genetic Operators for High
Quality Clustering. Journal of latex class files, vol. 13, no. 9, september 2014 2
17. Maulik & Bandyopadhyay, 2000; Bandyopadhyay & Maulik, 2002; Laszlo & Mukherjee, 2007; Liu, Wu, & Shen, 2011
18. Lloyd, S. P. (1982). Least squares quantization in PCM. IEEE Transactions on Information Theory, 28(2), 129 –136
19. Mardia KV, Kent JT, Bibby JM (1979) Multivariate analysis. Academic Press, London
20. Hornik, K., M. Stinchcombe, and H. White, ‘‘Multilayer Feedforward Networks are Universal Approximators,’’ Neural Networks,
Vol. 2, 1989, pp. 359–366
21. J. McHugh, “Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as
performed by lincoln laboratory,” ACM Transactions on Information and System Security, vol. 3, no. 4, pp. 262–294, 2000
22. Brown C, Cowperthwaite A, Hijazi A, Somayaji A. Analysis of the 1999 DARPA/Lincoln laboratory IDS evaluation data with
netadhict. Computational intelligence for security and defense applications. Piscataway, NJ, USA: IEEE Press; 2009. p. 67e73
23. Gharib, A., Sharafaldin, I., Habibi Lashkari, A., and Ghorbani, A. A. (2016). An evaluation framework for intrusion detection dataset.
In 2016 International Conference on Information Science and Security (ICISS), pages 1–6
24. https://www.mcafee.com/enterprise/en-us/assets/reports/rp-quarterly-threats-dec-2016.pdf
25. Ichrak Lafram, N.Berbiche, J.Elalami, A random forest estimator combined with n-Artificial neural network classifiers to optimize
network intrusion detection. IJAER, ISSN 0973-4562 Volume 12, Number 16 (2017) pp. 5835-5843
26. S. El idrissi, N.Berbiche, F.Guerouate, Performance evaluation of web application security scanners for prevention and protection
against vulnerabilities. IJAER Vol 12 n 17 (2017).

Authors: Aishwarya S Lande, B.P.Kulkarni

Paper Title: Wireless Security Camera System


Abstract: As the technology is advancing day by day, there are various alternatives occurring for the already
present or previous technologies. This article suggests the working of an wireless CCTV camera. The article
gives a brief idea of various technologies or software being used for to security purpose. The main goal of our
design was to develop a network that allowed for the transmitting and receiving of images from camera nodes to
a base station. The main objective is self powered wireless security camera.

Keywords: Raspberry Pi, DC to DC convertor, Motion Library.

References:
1. “Theft of motor vehicles classified by regional authority”. Quarterly national household survey, 2004.Central Statistics Office Ireland.
4a 12-15.
2. [2] Marcus Baram. “Eye on the City: Do Cameras Reduce Crime?”.ABC News.9 July 2007. Viewed 4 September
2007.<http://www.abcnews.go.com/US/Story?id=3360287&page=1>.
3. Gazzola, Robert. Surveillance Secure Inc. Personal contact: e-mail. 12 September 2007.
476. 4. 123 Security Products. Wireless digital four, August 2007. <http://www.bizrate.com/homesecurity/oid14605114.html> 2751-
5. Mathew Conway, Phong Damn, Janelle Tavares. Worcester Polytechnic Institute. “Efficient Surveillance System” 27
<http://www.wpi.edu/Academics/Projects/projects.html>.
6. Big Bruin. 4 Channel Wireless Camera System. 16 September 2007. 54
<http://www.bigbruin.com/reviews05/wirelesscams/index.php?file=1>.
7. WiFi Alliance. “What is the range of a wireless network”. 16 August 2007. <http://www.wi-
fi.org/knowledge_center_overview.php?docid=3278>.
8. P. S. Dhake and B. Sumedha S., “Embedded Surveillance System Using PIR No. 02, no. 3, 2014.
9. J. D., “Real Time Embedded Network Video Capture And SMS Alerting system,” Jun. 2014.
10. S. Sneha, “IP Camera Video Surveillance using Raspberry Pi.,” Feb. 2015.
11. F. C. Mahima and A. Prof. Gharge, “Design and Develop Real Time Video Surveillance System Based on Embedded Web Server
Raspberry PI B+ Board. International Journal of Advance Engineering and Research Development (Ijaerd), NCRRET.,” pp. 1–4,
2015.
12. J. G. J, “Design and Implementation of Advanced ARM Based Surveillance System Using Wireless Communication.,” 2014.
13. P. Sanjana, J. S. Clement, and S. R., “Smart Surveillance Monitoring System Using Raspberry PI and PIR Sensor.,” 2014.
14. U. Kumar, R. Manda, S. Sai, and A. Pammi, “Implementation Of Low Cost Wireless Image Acquisition And Transfer To Web Client
Using Raspberry Pi For Remote Monitoring. International Journal of Computer Networking, Wireless and Mobile Communications
(IJCNWMC).,” vol. No. 4, no. 3, pp. 17–20, 2014.
15. Z. Sundas, “Motion Detecting Camera Security System with Email Notifications and Live Streaming Using Raspberry Pi.” .
16. M. Peter and H. David, “Learn Raspberry Pi with Linux,” Apress, 2012.
Authors: Grantej Vinod Otari, Vijay Ram Ghorpade, Sachin Harakhchand Dhanani

Paper Title: A Fuzzy Lattice System to Trust Management in Mobile Grid


Abstract: Mobile Grid is a crossbreed technology formed by amalgamation of the two prominent technologies
namely mobile technology and grid technology that enable sharing and collaboration of mobile resources
cooperatively, transparently, efficiently, reliably and securely. Mobile Grid considers the mobility issues and
overcomes the constraints and deficiencies in both the technologies. However, this heterogeneous, dynamic and
open mobile grid network is more prone to malicious and selfish nodes inside and outside the network. Hence, a
vigorous security mechanism is needed that considers different security threats and pro-vide different levels of
security services. Here, we propose one such preventive security service based on Trust Management. The
proposed trust management service uses a novel fuzzy lattice approach for trust estimation of the nodes in the
network. A node with high trust value is allowed to participate in the network. A malicious node having low
477. trust value is prevented from performing the task. A fuzzy lattice approach can compute incrementally the same
intervals in the training data independent of the order of presentation within a short period. Experimental 2755-
analysis of the fuzzy lattice approach shows that the proposed approach outperforms most of the existing 27
approaches based on fuzzy logic. 60

Keywords: Mobile Gird, Trust Management, Fuzzy Lattice

References:

1. David G. Rosado, Eduardo Fernandez-Medina, Javier Lopez, Mario Piat-tini ,‘Systematic design of secure Mobile Grid systems’,
Journal of Network and Computer Applications, (2011).
2. Qiyi Han1, HongWen, Gang Feng, BinWu, Mengyin Ren, ‘Self-nominating trust model based on agglomerative fuzzy systems for
peer-to-peer networks’, Springer Peer-to-Peer Networking and Applications, Volume 9, Issue 6, (2016), pp 020-1030.
3. Song SS, Hwang K, Zhou RF, Kwok YK, ‘Trusted P2P transactions with fuzzy reputation aggregation’, IEEE InternetComput.,
9(6),(2005), pp24-34.
4. Chen HW, Ye ZW (2008), ‘Research of P2P trust based on fuzzy decision-making’, In: Proceedings of 12th International
Conferenceon Computer Supported Cooperative Work in Design, (2008), pp 793-796.
5. Lin HQ, Li ZT, Huang QF, ‘Multifactor hierarchical fuzzy trust evaluation on peer-to-peer networks’, Peer-to-Peer Networking and
Applications, (2011), pp:376-390.
6. Ing-Ray Chen and JiaGuo, ‘Dynamic Hierarchical Trust Management of MobileGroups and Its Application to Misbehaving
NodeDetection’, IEEE International Conference on Advanced Information Networking and Ap-plications (AINA), (2014).
7. Ing-Ray Chen, JiaGuo (2015), ‘Hierarchical trust management of community of interest groups in mobile ad hoc networks’ , Ad Hoc
Networks, Volume 33, (2015), pp 154-167.
8. Bedi Punam, N.A. Aakanksha, and Richa Sharma, ‘Trust and context view-based knowledge sharing in MANets’, International Journal
of Trust Management in Computing and Communications, Vol.1 No.1, (2013), pp.85 – 103.
9. Hui Xia, Zhiping Jia, Lei Ju, Xin Li, Youqin Zhu, ‘A Subjective Trust Management Model with Multiple Decision Factors for
MANET based on AHP and Fuzzy Logic Rules’, IEEE/ACM International Conference on Green Computing and Communications,
(2011).
10. Pedro B. Velloso, Rafael P. Laufer, Daniel de O. Cunha, Otto Car-los M. B. Duarte, and Guy Pujolle, ‘Trust Management in Mobile
AdHoc NetworksUsing a Scalable Maturity-Based Model’ , IEEE TRANSACTIONS ON NETWORK AND SERVICE
MANAGEMENT, VOL. 7, NO.3, (2010).
11. Lei Chen, JiahuangJi, Zihong Zhang, Wireless Network Security, Springer Nature America, Inc., (2013).
12. JiGuo , Alan Marshall, Bosheng Zhou, ‘A New Trust Management Frame-work for Detecting Malicious and Selfish Behaviour for
Mobile Ad hoc Networks’, International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11, (2011).
13. JiGuo (2011), ‘A New Trust Management Framework for Detecting Malicious and Selfish Behaviour for Mobile Ad Hoc Networks’ ,
IEEE 10th International Conference on Trust Security and Privacy in Computing and Communications, (2011).
14. BasitQureshi, Geyong Min, DemetresKouvatsos, ‘M-Trust: A Trust Management Scheme for Mobile P2P Networks’,IEEE/IFIP
International Conference on Embedded and Ubiquitous Computing, (2010), pp 476-483.
15. Qureshi, Basit I.(Kouvatsos, Demetres and Min, Geyong), ‘Trust Management for P2P application in Delay Tolerant Mobile Ad-hoc
Networks. An Investigation into the development of a Trust Management Framework for Peer to Peer File Sharing Applications in
Delay Tolerant Disconnected Mobile Ad-hoc Networks’, Ph. D. thesis, University of Bradford, (2011).
16. BasitQureshi, Geyong Min, DemetresKouvatsos, ‘A distributed reputation and trust management scheme for mobile peer-to-peer
networks’, Computer Communications, Volume 35, Issue 5, (2012), pp 608-618.
17. Zhexiong Wei, Helen Tang, F. Richard Yu, Maoyu Wang, and Peter Mason, ‘Security Enhancements for Mobile Ad HocNetworks
with Trust Management Using UncertainReasoning’, IEEE Transactions on Vehicular Technology, Volume: 63, Issue: 9, (2014).
18. Azzedine Boukerche, and Yonglin Ren, ‘A Secure Mobile Healthcare System usingTrust-Based Multicast Scheme’, IEEE JOURNAL
ON SELECTED AREAS IN COMMUNICATIONS, VOL. 27, NO. 4, (2009).
Authors: Jigesh Yadav, Manikant Paswan
Different Methods for Predicting and Optimizing Weld Bead Geometry with Mathematical
Paper Title:
Modeling and ANN Technique
Abstract: Bead geometry plays very important role in predicting the quality of weld as cooling rate of the weld
depends on the height and bead width, also bead geometry determines it’s residual stresses and distortion. Weld
bead geometries are outcomes of several welding parameters taken into consideration. If arc travel is high and
arc power is kept low it will produce very low fusion. If electrode feed rate is kept higher width is also found to
be on higher side which makes bead tto flat. Also, the parameters like current, voltage, arc travel rate, polarity
affects weld bead geometry. Hence, this paper is a review of different experimentations and modeling techniques
regarding predictions of weld bead geometry and their relations with different weld parameters.

Keywords:

References:

1. J.B. Austin, Electric Arc Welding, Am. Tech. Soc., Chicago, 1956.
2. T.B. Jefferson, The Welding Encyclopedia, McGraw-Hill, New York, 1951.
3. P.I. Houldcroft, Welding Process, Cambridge University Press, Cambridge, 1967.
4. F.D. Graham, Audels Welder Guide, Taraporevala Sons and Co., Bombay, 1966.
5. B. Ronay, The significance of extremity in curve welding, Weld. Architect (1960)
6. B.E. Rossi, Welding and its Applications, McGraw-Hill, New York, 1941.
478. 7. V. Tsegelsky, The Electric Welder, Foreign Language Publishing House, Moscow, 1976.
8. Shumovsky A, Controlling welding shrinkage and contortion, The Canadian Welder, April, 1952. 2761-
9. R.L. Applications, L.M. Gourd, K.A. Lelson, Effect of welding factors upon globule shape and size in submerged-circular segment
welding, Weld. Met. Fabr. (1963).
27
10. H.S. Gurev, R.D. Strong, Solidification marvels in dormant gas metalarc welds, Weld. J. (1963) 66
11. N. Christensen, V.L. de Davies, K. Gjermurdsen, Distribution of temperatures in curve welding, Brit. Weld. J. (1965)
12. M.L. Begeman, B.H. Amstead, U.I. Mashruwala, Effects of decreased climatic weight on circular segment welding attributes, Weld. J.
(1950)
13. PAL K, PAL S K. Delicate processing strategies utilized for the displaying and improvement of gas metal curve welding: A survey [J].
Universal Journal of Manufacturing Research, 2011.
14. MURUGAN N, PARMAR R S. Impacts of MIG process parameters on the geometry of the dab in the programmed surfacing of
tempered steel [J]. Diary of Materials Processing, 1994.
15. KIM I S, BASU A, SIORES E. Numerical models for control of weld dot infiltration in the GMAW procedure [J]. Universal Journal of
Advanced Manufacturing Technology, 1996.
16. RAO P S, GUPTA O P, MURTY S N, RAO A B K. Impact of procedure parameters and numerical model for the forecast of globule
geometry in beat GMA welding [J]. Universal Journal of Advanced Manufacturing Technology, 2009.
17. PALANI P K, MURUGAN N. Advancement of scientific models for expectation of weld dab geometry in cladding by transition cored
curve welding J. Worldwide Journal of Advanced Manufacturing Technology, 2006.
18. PAL S, MALVIYA S K, PAL S K, SAMANTARAY A K. Improvement of value qualities parameters in a beat metal inactive gas
welding procedure utilizing dim based Taguchi technique J. Worldwide Journal of Advanced Manufacturing Technology, 2009.
19. TARNG Y S, YANG W H. Advancement of the weld dot geometry in gas tungsten bend welding by the Taguchi technique J. Global
Journal of Advanced Manufacturing Technology, 1998.
20. KARUNAKARAN N, BALASUBRAMANIAN V. Impact of beat current on temperature conveyance, weld dot profiles and qualities
of gas tungsten bend welded aluminum combination joints J. Exchanges of Nonferrous Metals Society of China, 2011
21. NAGESH D S, DATTA G L. Hereditary calculation for advancement of welding factors for stature to width proportion and utilization
of ANN for forecast of dot geometry for TIG welding process J. Connected Soft Computing.
22. KIM I S, JEONG Y J, SON I J, KIM I J, KIM J Y, KIM I K, YARAGADA P K D V. Affectability examination for procedure
parameters impacting weld quality in automated GMA welding process J. Diary of Materials Processing Technology, 2003.
23. PALANI P K, MURUGAN N. Affectability investigation for procedure parameters in cladding of tempered steel by transition cored
circular segment welding J. Diary of Manufacturing Processes, 2006.
24. KIM I S, SON K J, YANG Y S, YARAGADA P K D V. Affectability investigation for procedure parameters in GMA welding
procedures utilizing a factorial plan technique J. Universal Journal of Machine Tools and Manufacture, 2003.
25. KARAOGLU S, SECGIN A. Affectability examination of submerged circular segment welding process parameters J. Diary of
Materials Processing Technology, 2008.
26. Ueyama, T., Ohnawa, T., Tanaka, M., and Nakata, K. 2005. Impacts of light setup and welding current on weld dab development in
fast pair beat gas metal circular segment welding of steel sheets. Science and Technology of Welding and Joining .
27. Talkington, J. E. 1998. Variable extremity gas metal bend welding. Doctoral thesis, The Ohio State University.
28. J. E. Hinkel, F.W. Forthoeffel, High turmoil thickness submerged circular segment welding with twin wires, welding J. (1976)
29. RS Chandel affidavit qualities of twin wire submerged circular segment welding process, proc. Int. perplex seaward materials and ice
building gathering, Houston, February, 1990
30. I I Ivochkin et al, prospect for the utilization of powdered filler metal in combination welding, weld push. (1969)
31. W. Troyer, J. Mikurak, High testimony submerged curve welding with iron powder joint fill. Welding J. (1974)
32. N Baily, Submerged curve welding ferritic steels with alloyed metal powder, welding J. (1991).
33. Yong-hua SHI, Ze-pei ZHENG, Jin HUANG, Sensitivity model for expectation of globule geometry in submerged wet transition cored
circular segment welding, Trans. Nonferrous Met. Soc. China 23(2013)
34. PALANI P K, MURUGAN N. Affectability examination for procedure parameters in cladding of tempered steel by transition cored
circular segment welding [J]. Diary of Manufacturing Processes, 2006.
35. KARAOGLU S, SECGIN A. Affectability examination of submerged bend welding process parameters [J]. Diary of Materials
Processing Technology, 2008.
36. KATHERASAN D, ELIAS J V, SATHIYA P, HAQ A N. Reenactment and parameter streamlining of motion cored circular segment
welding utilizing counterfeit neural system and molecule swarm enhancement calculation J. Diary of Intelligent Manufacturing, 2012.
37. SATHIYA P, ARAVINDAN S, JEYAPAUL R, AJITH P M, HAQ A N. Advancing the weld globule qualities of overly austenitic
treated steel (904L) through dark based Taguchi technique [J]. Multidiscipline Modeling in Materials and Structures, 2010.
38. V. Gunaraj , N. Murugan , Application of reaction surface system for anticipating weld dot quality in submerged curve welding of
channels, Journal of Materials Processing Technology (1999) .
39. R. A. RIBEIRO, E. B. F. SANTOS, P. D. C. ASSUNÇÃO, R. R. MACIEL, AND E. M. BRAGA Predicting Weld Bead Geometry in
the Novel CWGMAW Process.
40. Assuncão, P. D. C. 2013. Estudo da Viabilidade do Processo de Soldagem GMAW-DCW (twofold virus wire). Ace theory. Belém,
Paré, Brazil. Government University of Pará. In Portuguese.
41. N. Murugan, R.S. Parmar, Effect of SAW process factors on globule geometry in single wire surfacing, J. Mater. Procedure. Technol.
37 (1993).
42. L. J. Yang, R.S. Chandel, M.J. Bibby, The impacts of procedure factors on the dab width of submerged-curve weld stores Journal of
Materials Processing Technology, 29 (1992)
43. Ravinder Pal Singh, R.K.Garg, Dinesh Kumar Shukla, Mathematical displaying of impact of extremity on weld globule geometry in
submerged curve welding, Journal of Manufacturing Processes.
44. B. Senthilkumar, T. Kannan, Effect of Flux Cored Arc Welding process parameters on dab geometry in overly duplex tempered steel
claddings.
Authors: Sahana M, Gowrishankar S
Identification and Classification of Cataract Stages in Old Age People Using Deep Learning
Paper Title:
Algorithm
Abstract: Cataract is a dense cloudy area that forms in a lens of the eye because of which many people are
going blind. More than 50% of people in old age suffer due to cataract and will not have a clear vision. In the
convolutional neural network, there are many trained models which help in the classification of the object. We
use transfer learning technology to train the model for the data set we have. The image feature extraction model
with the inception V3 architecture trained on image net. Cataract and normal image dataset are collected. A
cataract is further divided into a mature and immature cataract. The result shows whether the image is either a
normal eye or cataract eye with the model accuracy being 87.5%. If in the presence of cataract, the model will
identify the stage of cataract.

Keywords: cataract, conventional neural network, tensorflow, transfer learning, inception V3.

References:

1. Evan W. Patton, Xingzhi Qian, Qian Xing, Justin Swaney and Tingying Helen Zeng, “Machine Learning on Cataracts Classification
479. using SqueezeNet”, 4th International Conference On Universal Village, Boston, USA, pp 1-3, October 2018, isbn - 978-1-5386-5197-
1. 2767-
2. Qinyan Zhang, Zhiqiang Qiao, Yanyan Dong and Ji-Jiang Yang, “Classification of Cataract Fundus Images Based on Deep Learning”,
IEEE International Conference on Imaging Systems and Techniques, Beijing, China, pp 1-5, October 2017, isbn - 978-1-5386-1620-8.
27
3. Jijiang Yang, Yu Niu, MeiMei Yang, Qinyan Zhang and Jianqiang Li, “Classification of Retinal Image for Automatic Cataract 72
Detection”, 15th International Conference on e-Health Networking, Lisbon, Portugal, pp 674-679, October 2013, isbn - 978-1-4673-
5801-9.
4. Jianqiang Lia, He Hana, Linglin Zhanga, i Zhangb, Bo Liua, Qing Wangc and Jijiang Yangc, “Automatic Cataract Detection and
Grading Using Deep Convolutional Neural Network”, 14 th International Conference on Networking, Sensing and Control, Calabria,
Italy, pp 60-65, May 2017, isbn - 978-1-5090-4429-0.
5. Rohit Chavan, Darshana Patil, Arvind Nair, Dheeraj Jadhav and Niranjan Bhat, “Analysis and Study of Cataract Detection
Techniques”, International Conference on Global Trends in Signal Processing, Information Computing and Communication, Jalgaon,
India, pp 516-519, December 2016, isbn - 978-1-5090-0467-6.
6. Tarun Luthra, Sarfaraz Masood, Mumtaz Ahmed and Himanshu Sundriyal, “Identification of Diabetic Retinopathy in Eye Images
Using Transfer Learning”, International Conferene on Computing, Communication and Automation, Greater Nodia, India, pp 1183-
1187, May 2017, isbn - 978-1-5090-6471-7.
7. Navneet Toshniwal, “Text and Atlas Slit Lamp Biomicroscopy for Assessment in Cataract Surgery”, 2014.
8. JayaKumar and Niya C P, “Analysis of Different Automatic Cataract Detection and Classification Methods”, International Advance
Computing Conference, Banglore, India, pp 696-700, June 2015, isbn - 978-1-4799-8047-5.
9. Qinyan Zhang, Zhiqiang Qiao, Ji-Jiang Yang and Yanyan Dong, “Application of SVM Based on Genetic Algorithm in Classification
of Cataract Fundus Images”, International Conference on Imaging Systems and Techniques, Beijing, China, pp 1-5, October 2017, isbn
- 978-1-5386-1620-8.
10. Jaspreet kaur, Manpreet kaur and Ravinder kaur, “Low Cost Cataract Detection System using Smart Phone”, International Conference
on Green Computing and Internet of Things, Nodia, India, pp 1607-1609, October 2015, isbn - 978-1-4673-7910-6.
11. A. W. Setiawan, Y. N. Fuadah and T. L. R.Mengko, “Performing High Accuracy of the System for Cataract Detection Using Statistical
Texture Analysis and K-Nearest Neighbor”, International Seminar on Intelligent Technology and Its Applications, Surabaya,
Indonesia, pp 85-88, May 2015, isbn - 978-1-4799-7711-6.
12. Xinting Gao, “Automatic Feature Learning to Grade Nuclear Cataracts Based on Deep Learning”, IEEE Transactions on Biomedical
Engineering, Singapore, pp 2693-2701, November 2015, isbn - 1558-2531.
13. Agung W. Setiawan, Yunendah Nur Fuadah, Tati L.R. Mengko and Budiman, “Mobile Cataract Detection using Optimal Combination
of Statistical Texture Analysis”, International Conference on Instrumentation, Communications, Information Technology and
Biomedical Engineering, Bandung, Indonesia, pp 232-236, November 2015, isbn - 978-1-4673-7800-0.
14. V Bhanumathi and V Harini, “Automatic Cataract Classification System”, International Conference on Communication and Signal
Processing, Melmaruvathur, India, pp 0815-0819, April 2016, isbn - 978-1-5090-0396-9.
15. Ping Wang, Wenai Song, Xudong Zhang and Qing Wang, “Semi-Supervised Learning Based on Cataract Classification and Grading”,
40th Annual Computer Software and Applications Conference, Atlanta, USA, pp 641-646, June 2016, isbn - 978-1-4673-8845-0.
16. Kai Niu, Jing Ran, Hongyan Zhang, Zhiqiang He and Hongxin Song, “Cataract Detection and Grading Based on Combination of Deep
Convolutional Neural Network and Random Forest”, International Conference on Network Infrastructure and Digital Content,
Guiyang, China, pp 155-159, August 2018, isbn - 978-1-5386-6067-6.
17. D. V. Jadhav and Amol B. Jagadale, “Early Detection and Categorization of Cataract using Slit-Lamp Images by Hough Circular
Transform”, International Conference on Communication and Signal Processing, Melmaruvathur, India, pp 0232-0235, April 2016,
isbn - 978-1-5090-0396-9.
18. Amol Jagadale and Snehal Patange, “Framework for Detection of Cataract and Gradation According its Severity”, International
Conference on Pervasive Computing, Pune, India, pp 1-3, January 2015, isbn - 978-1-4799-6272-3.
19. Syed, D. Galib and Juyel Rana, “Cataract Detection using Smartphone”, International Conference on Electrical Information and
Communication Technology, Khulna, Bangladesh, pp 1-4, December 2017, isbn - 978-1-5386-2307-7.
20. A K Kurana, “Comprehensive Ophthalmology”, 2007.

Authors: Faridzah Jamaluddin, Hazlina Haji Ali, Sharipah Soaad Syed Yahaya

Paper Title: New Robust MEWMA Control Chart for Monitoring Contaminated Data
Abstract: Multivariate Exponential Weighted Moving Average (MEWMA), E2 control chart is a popular
multivariate control chart for monitoring the stability of time series data (non-random pattern). However, in this
paper, we have shown that the existing MEWMA, E2 control chart is sensitive in contaminated data or in the
presence of outliers. To address this problem, this paper proposed an alternative MEWMA E2 control chart
using robust mean vector and covariance matrix instead of the classical mean vector and covariance matrix
respectively. The classical mean vector in MEWMA E2 control chart is replaced by Winsorized Modified One-
step M-estimator (WM) while the classical covariance matrix is replaced by the Winsorized covariance matrix.
The proposed MEWMA E2 control chart known as robust MEWMA control chart, denoted as RE2 control chart.
The control limit for the RE2 control chart was calculated based on simulated data. The performance of RE2 and
existing MEWMA E2 control charts are based on the false alarm rate. The result revealed that the RE2 control
chart is more effective in controlling false alarm rates as compared to the existing MEWMA, E2 control chart.
The zinc-lead flotation data show that the RE2 performs better in application.

Keywords: Control chart, Contaminated data, Multivariate Exponential Weighted Moving Average
(MEWMA), Robust estimator, Winsorized One-step M-estimator (WM).

References:

1. J. C. Benneyan, R. C. Lloyd, and P. E. Plsek, “Statistical process control as a tool for research and healthcare improvement,” Qual. Saf.
Heal. Care, vol. 12, no. 6, pp. 458–464, 2003.
2. F. Correia, R. Nêveda, and P. Oliveira, “Chronic respiratory patient control by multivariate charts,” Int. J. Health Care Qual. Assur.,
vol. 24, no. 8, pp. 621–643, 2011.
480. 3. M. Waterhouse, I. Smith, H. Assareh, and K. Mengersen, “Implementation of multivariate control charts in a clinical setting,” Int. J. 2773-
Qual. Heal. Care, vol. 22, no. 5, pp. 408–414, 2010. 27
4. L. Burgas, J. Melendez, J. Colomer, J. Massana, and C. Pous, “Multivariate statistical monitoring of buildings. Case study: Energy
monitoring of a social housing building,” Energy Build., vol. 103, pp. 338–351, 2015. 80
5. J. P. George, Z. Chen, and P. Shaw, “Fault Detection of Drinking Water Treatment Process Using PCA and Hotelling’s T2 Chart,” Int.
J. Comput. Electr. Autom. Control Inf. Eng., vol. 3, no. 2, pp. 430–435, 2009.
6. M. Shaban, “Drainage water reuse: State of control and process capability evaluation,” Water. Air. Soil Pollut., vol. 225, no. 11, 2014.
7. A. Faraz, C. Heuchenne, E. Saniga, and E. Foster, “Monitoring delivery chains using multivariate control charts,” Eur. J. Oper. Res.,
vol. 228, no. 1, pp. 282–289, 2013.
8. I. G. Guardiola, T. Leon, and F. Mallor, “A functional approach to monitor and recognize patterns of daily traffic profiles,” Transp.
Res. Part B Methodol., vol. 65, pp. 119–136, 2014.
9. Y. Samimi and A. Aghaie, “Monitoring usage behavior in subscription-based services using control charts for multivariate attribute
characteristics,” in 2008 IEEE International Conference on Industrial Engineering and Engineering Management, IEEM 2008, 2008,
pp. 1469–1474.
10. D. C. Montgomery, Introduction to Statistical Quality Control, 6th ed. New York: John Wiley & Sons, 2009.
11. G. Capizzi and G. Masarotto, “Evaluation of the run-length distribution for a combined Shewhart-EWMA control chart,” Stat.
Comput., vol. 20, no. 1, pp. 23–33, 2010.
12. N. Khan, M. Aslam, and C. H. Jun, “Design of a Control Chart Using a Modified EWMA Statistic,” Qual. Reliab. Eng. Int., vol. 33,
no. 5, pp. 1095–1104, 2017.
13. S. W. Roberts, “Control Chart Tests Based on Geometric Moving Averages,” Technometrics, vol. 1, no. 3, pp. 239–250, 1959.
14. C. M. Borror, D. C. Montgomery, and G. C. Runger, “Robustness of the EWMA Control Chart to Non-Normality,” J. Qual. Technol.,
vol. 31, no. 3, pp. 309–316, 1999.
15. S. W. Human, P. Kritzinger, and S. Chakraborti, “Robustness of the EWMA control chart for individual observations,” J. Appl. Stat.,
vol. 38, no. 10, pp. 2071–2087, 2011.
16. Z. G. Stoumbos and J. H. Sullivan, “Robustness to Non-normality of the Multivariate EWMA Control Chart,” J. Qual. Technol., vol.
34, no. 3, pp. 260–276, 2002.
17. M. C. Testik, G. C. Runger, and C. M. Borror, “Robustness properties of multivariate EWMA control charts,” Qual. Reliab. Eng. Int.,
vol. 19, no. 1, pp. 31–38, 2003.
18. P. . Rousseeuw and B. . Van Zomeren, “Unmasking Multivariate Outliers and Leverage Points,” J. Am. Stat. Assoc., vol. 85, no. 411,
pp. 633–639, 1990.
19. V. S. Aelst, E. Vandervieren, and G. Willems, “A Stahel-Donoho estimator based on huberized outlyingness,” Comput. Stat. Data
Anal., vol. 56, no. 3, pp. 531–542, 2012.
20. P. J. Rousseeuw and M. Hubert, “Robust statistics for outlier detection,” Wiley Interdiscip. Rev. Data Min. Knowl. Discov., vol. 1, no.
1, pp. 73–79, 2011.
21. J. L. Alfaro and J. F. Ortega, “A robust alternative to Hotelling’s T2 control chart using trimmed estimators,” Qual. Reliab. Eng. Int.,
vol. 24, no. 5, pp. 601–611, 2008.
22. J. L. Alfaro and J. F. Ortega, “A comparison of robust alternatives to Hotelling’s T2 control chart,” J. Appl. Stat., vol. 36, no. 12, pp.
1385–1396, 2009.
23. H. Ali, S. S. Syed Yahaya, and Z. Omar, “Robust hotelling T2 control chart with consistent minimum vector variance,” Math. Probl.
Eng., vol. 2013, 2013.
24. F. S. Haddad, S. S. Syed Yahaya, and J. L. Alfaro, “Alternative Hotelling’s T2 charts using winsorized modified one-step M-
estimator,” Qual. Reliab. Eng. Int., vol. 29, no. 4, pp. 583–593, 2013.
25. W. A. Jensen, J. B. Birch, and W. H. Woodall, “High breakdown estimation methods for phase I multivariate control charts,” Qual.
Reliab. Eng. Int., vol. 23, no. 5, pp. 615–629, 2007.
26. S. S. Syed Yahaya, H. Ali, and Z. Omar, “An alternative hotelling T2 control chart based on minimum vector variance (MVV),” Mod.
Appl. Sci., vol. 5, no. 4, pp. 132–151, 2011.
27. C. A. Lowry, W. H. Woodall, C. W. Champ, and S. E. Rigdon, “A multivariate exponentially weighted moving average control chart,”
Technometrics, vol. 34, no. 1, pp. 46–53, 1992.
28. H. Ali and S. S. Syed Yahaya, “On robust mahalanobis distance issued from minimum vector variance,” Far East J. Math. Sci., vol. 74,
no. 2, 2013.
29. R. R. Wilcox and H. J. Keselman, “Repeated measures one-way ANOVA based on a modified one-step M-estimator,” Br. J. Math.
Stat. Psychol., vol. 56, no. 1, pp. 15–25, 2003.
30. R. Wilcox, “Multiple comparisons based on a modified one-step Multiple comparisons based on a modified,” J. Appl. Stat., vol. 30, no.
10, pp. 1231–1241, 2003.
31. P. J. Rousseeuw and C. Croux, “Alternative to the Median Absolute Deviation,” Am. Stat. Assoc., vol. 88, no. 424, pp. 1273–1283,
1993.
32. J. V. Bradley, “Robustness?,” Br. J. Math. Stat. Psychol., vol. 31, no. 2, pp. 144–152, 1978.
33. J. H. Sullivan and W. H. Woodall, “Adapting control charts for the preliminary analysis of multivariate observations,” Commun. Stat. -
Simul. Comput., vol. 27, no. 4, pp. 953–979, 1998.

Authors: Dhamini Poorna Chandra, S. Rajarajeswari

Paper Title: An Optimized Hybrid Neural Network Model for Detecting Depression among Twitter Users
Abstract: The proposed work is to extensively evaluate if a user is depressed or not using his Tweets on
Twitter. With the omni presence of social media, this method should help in identifying the depression of users.
We propose an Optimized Hybrid Neural Network model to evaluate the user tweets on Twitter to analyze if a
user is depressed or not. Where Neural Network is trained using Tweets to predict the polarity of Tweets. The
Neural Network is trained in such a way that at any point when presented with a Tweet the model outputs the
polarity associated with the Tweet. Also, a user-friendly GUI is presented to the user that loads the trained neural
network in no time and can be used to analyze the users’ state of depression. The aim of this research work is to
provide an algorithm to evaluate users’ sentiment on Twitter in a way better than all other existing techniques.

Keywords: Depression, Neural Network, Twitter, Polarity, Social Media.

References:

1. James W Pennebaker, Cindy K Chung, Molly Ireland, Amy Gonzales, and Roger J Booth. The Development and Psychometric
Properties of LIWC2007 The University of Texas at Austin 2007.
2. Susan Jamison-Powell, Conor Linehan, Laura Daley, Andrew Garbett, and Shaun Lawson. “I can’t get no sleep”: discussing #insomnia
on Twitter. In Conference on Human Factors in Computing Systems- Proceedings, pages 1501–1510, 2012.
3. Munmun De Choudhury. Role of Social Media in Tackling Challenges in Mental Health. In Proceedings of the 2nd International
Workshop on Socially-Aware Multimedia (SAM’13), pages 49–52, 2013.
4. H Andrew Schwartz, Johannes Eichstaedt, Margaret L Kern, Gregory Park, Maarten Sap, avid Stillwell, Michal Kosinski, and Lyle
Ungar. Towards Assessing Changes in Degree of Depression through Facebook. In Proceedings of the Workshop on Computational
Linguistics and Clinical Psychology: From Linguistic Signal to Clinical Reality, pages 118–125, 2014.
5. Glen Coppersmith, Mark Dredze, and Craig Harman. Measuring Post Traumatic Stress Disorder in Twitter. In Proceedings of the 7th
International AAAI Conference on Weblogs and Social Media (ICWSM), volume 2, pages 23–45, 2014.
6. Glen Coppersmith, Mark Dredze, and Craig Harman. Quantifying Mental Health Signals in Twitter. In Proceedings of the Workshop on
Computational Linguistics and Clinical Psychology: From Linguistic Signal to Clinical Reality, pages 51–60, 2014.
7. Glen Coppersmith, Mark Dredze, Craig Harman, and Kristy Hollingshead. From ADHD to SAD: Analyzing the Language of Mental
Health on Twitter through Self-Reported Diagnoses. In Computational Linguistics and Clinical Psychology, pages 1–10, 2015.
8. Margaret Mitchell, Kristy Hollingshead, and Glen Coppersmith. Quantifying the Language of Schizophrenia in Social Media. In
481. Computational Linguistics and Clinical Psychology, pages 11–20, Colorado. Association for Computational Linguistics, 2015. 2781-
9. Daniel Preotiuc-Pietro, Maarten Sap, H. Andrew Schwartz, and Lyle Ungar. Mental Illness Detection at the World Well-Being Project 27
for the CLPsych 2015 Shared Task. In Proceedings of the 2nd Workshop on Computational Linguistics and Clinical Psychology: From
Linguistic Signal to Clinical Reality, pages 40–45, 2015.
95
10. E. Kouloumpis, T. Wilson, and J. Moore, "Twitter sentiment analysis: The good the bad and the omg!" ICWSM, vol. 11, pp. 538–541,
2011.
11. Philip Resnik, William Armstrong, Leonardo Claudino, and Thang Nguyen. The University of Maryland CLPsych 2015 Shared Task
System. In CLPsych 2015 Shared Task System. pages 54–60, 2015.
12. Daniel Preotiuc-Pietro, Maarten Sap, H. Andrew Schwartz, and Lyle Ungar. Mental Illness Detection at the World Well-Being Project
for the CLPsych 2015 Shared Task. In Proceedings of the 2nd Workshop on Computational Linguistics and Clinical Psychology: From
Linguistic Signal to Clinical Reality. pages 40–45, 2015.
13. Nathan Aston, Jacob Liddle, and Wei Hu. 2014. Twitter sentiment in data streams with perceptron. Journal of Computer and
Communications, 11–16, 2014. http://dx.doi.org/10.4236/jcc.2014.23002.
14. Jimmy Lin and Alek Kolcz. Large-scale machine learning at twitter. In Proceedings of the 2012 ACM SIGMOD International
Conference on Management of Data (SIGMOD’12). ACM, New York, NY, 793– 804, 2012. http://dx.doi.org/10.1145/2213836.2213958
15. Ammar Hassan, Ahmed Abbasi, and Daniel Zeng. Twitter sentiment analysis: A bootstrap ensemble framework. In Proceedings of the
International Conference on Social Computing (SocialCom’13). IEEE Computer Society, 357–364, 2013.
http://dx.doi.org/10.1109/SocialCom.2013.56
16. Mike Thelwall, Kevan Buckley, Georgios Paltoglou, Di Cai, and Arvid Kappas. Sentiment strength detection in short informal text. J.
Am. Soc. Inform. Sci. Technol. 61, 12 (2010), 2544–2558, 2010.
17. Mike Thelwall, Kevan Buckley, and Georgios Paltoglou. Sentiment strength detection for the social web. J. Am. Soc. Inform. Sci.
Technol. 63, 1 (2012), 163–173, 2012.
18. Reynier Ortega, Adrian Fonseca, and Andres Montoyo. SSA-UO: Unsupervised twitter sentiment analysis. In Proceedings of the 7th
International Workshop on Semantic Evaluation - 2nd Joint Conference on Lexical and Computational Semantics (SemEval’13).
Association for Computational Linguistics, 501– 507, 2013.
19. Preslav Nakov, Zornitsa Kozareva, Alan Ritter, Sara Rosenthal, Veselin Stoyanov, and Theresa Wilson. Semeval-2013 task 2: Sentiment
analysis in twitter. In Proceedings of the 7th International Workshop on Semantic Evaluation - 2nd Joint Conference on Lexical and
Computational Semantics (SemEval’13). Association for Computational Linguistics, 312–320, 2013.
20. Hilke Reckman, Cheyanne Baird, Jean Crawford, Richard Crowell, Linnea Micciulla, Saratendu Sethi, and Fruzsina Veress. Rule-based
detection of sentiment phrases using SAS sentiment analysis. In 2nd Joint Conference on Lexical and Computational Semantics (*SEM),
Volume 2: 7th International Workshop on Semantic Evaluation, Vol. 2. Association for Computational Linguistics, 513– 519, 2013.
21. Xia Hu, Jiliang Tang, Huiji Gao, and Huan Liu. Unsupervised sentiment analysis with emotional signals. In Proceedings of the 22nd
International Conference on World Wide Web (WWW’13). ACM, New York, NY, 607–618, 2013.
http://dx.doi.org/10.1145/2488388.2488442
22. Manoochehr Ghiassi, James Skinner, and David Zimbra. Twitter brand sentiment analysis: A hybrid system using n-gram analysis and
dynamic artificial neural network. Expert Syst. Appl. 40, 16 (2013), 6266–6282, 2013. http://dx.doi.org/10.1016/j.eswa.2013.05.057
23. Akshi Kumar and Teeja Mary Sebastian. Sentiment analysis on twitter. International Journal of Computer Science. Issues 9, 4, 372–378,
2012.
24. Vinh Ngoc Khuc, Chaitanya Shivade, Rajiv Ramnath, and Jay Ramanathan. Towards building large-scale distributed systems for twitter
sentiment analysis. In Proceedings of the 27th Annual ACM Symposium on Applied Computing (SAC’12). ACM, New York, NY, 459,
2012. http://dx.doi.org/ 10.1145/2245276.2245364
25. Farhan Hassan Khan, Saba Bashir, and Usman Qamar. TOM: Twitter opinion mining framework using hybrid classification scheme.
Decision Supp. Syst. 57 (Jan. 2014), 245–257, 2014. http://dx.doi.org/10.1016/j.dss.2013.09.004
26. Michael Speriosu, Nikita Sudan, Sid Upadhyay, and Jason Baldridge. Twitter polarity classification with label propagation over lexical
links and the follower graph. In Proceedings of the First Workshop on Unsupervised Learning in NLP (EMNLP’11). Association for
Computational Linguistics, Stroudsburg, PA, 53–63, 2011.
27. Chenhao Tan, Lillian Lee, Jie Tang, Long Jiang, Ming Zhou, and Ping Li. User-level sentiment analysis incorporating social networks.
In Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD’11). ACM, New
York, NY, 1397–1405, 2011. http://dx.doi.org/10.1145/2020408.2020614
28. M. A. Moreno, L. A. Jelenchick, K. G. Egan, E. Cox, H. Young, K. E. Gannon, and T. Becker, “Feeling bad on Facebook: depression
disclosures by college students on a social networking site” Depress. Anxiety, vol. 28, no. 6, pp. 447–455, Jun. 2011.
29. [29] Alec Go, Richa Bhayani, and Lei Huang. Twitter Sentiment Classification Using Distant Supervision. Technical Report. Standford,
2009.
30. Luciano Barbosa and Junlan Feng. Robust sentiment detection on twitter from biased and noisy data. In Proceedings of the 23rd
International Conference on Computational Linguistics: Posters (COLING’10). Association for Computational Linguistics, Stroudsburg,
PA, 36–44, 2010.
31. Fotis Aisopos, George Papadakis, and Theodora Varvarigou. Sentiment analysis of socialmedia content using n-gram graphs. In
Proceedings of the 3rd ACM SIGMM International Workshop on Social Media (WSM’11). ACM, New York, NY, 9–14, 2011.
http://dx.doi.org/10.1145/2072609.2072614.
32. Long Jiang, Mo Yu, Ming Zhou, Xiaohua Liu, and Tiejun Zhao. Target-dependent twitter sentiment classification. In Proceedings of the
49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies - Volume 1 (HLT’11).
Association for Computational Linguistics, Stroudsburg, PA, 151–160, 2011.

Authors: Chua Ye Ling, Sharifah Osman, Mohd Fadzil Daud, Wan Nazdah Wan Hussin
Application of Vee Diagram as a Problem-Solving Strategy in Developing Students’ Conceptual
Paper Title:
and Procedural Knowledge
Abstract: Vee diagram is a constructivist approach to teaching and learning, to help students understand the
relevant principles and concepts of mathematical problem-solving. This study aimed to investigate the
development of students’ conceptual and procedural knowledge after the Vee diagram is introduced as a
problem-solving strategy in learning a topic in mathematics. This study used a quasi-experimental research
design, which involved 48 lower secondary school students selected through purposive sampling. Data were
collected using a set of pre-test and post-test that consists of 5 mathematical problem-solving questions. Data
were analysed using Statistical Package for Social Science version 23. Findings of this study showed that the
application of Vee diagram as a mathematical problem-solving strategy has significantly developed students’
conceptual and procedural knowledge.

Keywords: Conceptual knowledge, procedural knowledge, problem-solving strategy, Vee diagram.

482. References:
2796-
1. Faulkenberry, E. E. D. 2003. Secondary mathematics pre-service teachers’ conceptions of rational numbers. Unpublished Doctoral 28
Dissertation, Oklahoma State University, Oklahoma.
2. Phonapichat, P., Wongwanich, S., & Sujiva, S. (2014). An analysis of elementary school students ’ difficulties in mathematical 00
problem-solving. Procedia-Social and Behavioral Sciences, 116(2012), 3169–3174.
3. National Research Council. (2000). How People Learn: Brain, Mind, Experience, and School. Washington, D.C.: National Academies
Press. doi:10.17226/9853.
4. Mutai, D. K., Changeiywo, J. M., & Learning, D. (2014). Effects of Gowin ’ s Vee Heuristic Strategy on Secondary School Students ’
Conceptual Understanding and Metacognition in the Topic of Moments in Physics, in Uasin Gishu County, Kenya. Journal of
Education and Practice, 5(29), 2222–1735.
5. Yılmaz, G., & Kaçar, A. (2016). On the Teaching Polygons to Primary School 7 th Grade Students Using Vee Diagrams and Mind
Maps Çokgen Konusunun Öğretiminde Kullanılan Vee Diyagramı v e Kavram Haritalarının İlköğretim 7 . Sınıf Öğrencilerinin
Başarısı, 3(1), 13–24.
6. English, L., & Lesh, R. (2008). Future Directions and Perspectives for Problem Solving Research and Curriculum Development. QUT
Digital Repository, (July), 6–13.
7. Gilmore C, Clayton S, Cragg L, McKeaveney C, Simms V, Johnson S (2018) Understanding arithmetic concepts: The role of domain-
specific and domain-general skills. PLoS ONE 13(9): e0201724. https://doi.org/10.1371/journal.pone.0201724
8. Rittle-johnson, B., Schneider, M., & Star, J. R. (2015). Not a One-Way Street : Bidirectional Relations Between Procedural and
Conceptual Knowledge of Mathematics.
9. Rittle-johnson, B., & Schneider, M. (2015). Developing Conceptual and Procedural Knowledge of Mathematics. (Roi Cohen Kadosh,
Ed.). Oxford University Press.
10. Rittle-johnson, B., & Alibali, M. W. (1999). Conceptual and Procedural Knowledge of Mathematics: Does One Lead to the Other?
American Psychological Association, 91(1), 175–189
11. Rittle-johnson, B., & Star, J. R. (2007). Does Comparing Solution Methods Facilitate Conceptual and Procedural Knowledge ? An
Experimental Study on Learning to Solve Equations. Journal of Educational Psychology, 99(3), 561–574.
12. Thiessen, R. (1992). The Vee Diagram : A Guide for Problem Solving. Aims Newsletter, pp. 3–6.
13. Jose, C. (2011). Heuristic Diagrams as a Tool to Teach History of Science ´. Springer.
14. Afamasaga-fuata, K. (2009). Secondary Pre-service Teachers ’ Use of Vee Diagrams to Analyse Problems and Illustrate Multiple
Solutions. Mathematics Teacher Education and Development, 10, 15–29.
15. Afamasaga-fuata, K. (2003). Vee Diagrams as a Problem Solving Tool : Promoting Critical Thinking and Synthesis of Concepts and
Applications in Mathematics. [online], Available: https://www.aare.edu.au/data/publications/2007/afa07202.pdf
16. Teachey, A. L. (2003). Investigations in Conceptual Understanding of Polynomial Functions and the Impact of Mathematical Belief
Systems on Achievement in an Accelerated Summer Program for Gifted Students. North Carolina State University.
17. Hashemi, N., Abu, M. S., Kashefi, H., & Rahimi, K. (2014). Undergraduate Students’ Difficulties in Conceptual Understanding of
Derivation. Procedia - Social and Behavioral Sciences, 143, 358–366.
18. Afamasaga-Fuata’i, K. (2004). An Undergraduate Student’s Understanding of Differential Equations through Concept Maps and Vee
Diagrams. First Int. Conference on Concept Mapping, 1(October), 21–30. R
19. Schneider, M., Rittle-Johnson, B., & Star, J. R. (2011). Relations among conceptual knowledge, procedural knowledge, and procedural
flexibility in two samples differing in prior knowledge. Developmental Psychology, 47(6), 1525-1538.
20. Haapasalo, L. (2004). The conflict between conceptual and procedural knowledge: Should we need to understand in order to be able to
do, or vice versa? [online], Available:
https://pdfs.semanticscholar.org/5465/9ddf3ce1b9eb1891facce00a672992df528c.pdf?_ga=2.73352851.1622265419.1564287598-
578224854.1562745776

Authors: Ramesh Babu P, E Sreenivasa Reddy

Paper Title: A Novel Framework design for Semantic based Image retrieval as a Cyber Forensic Tool
Abstract: Cyber forensics includes the areas of computer forensics, network forensics and internet forensics.
Digital images were commonly used in cyber forensics to collect criminal images, fingerprints, images of crime
events and so on. Since the current cyber forensic tools are not very much furnished with the course of action of
huge image data, it becomes a big issue to obtain image evidence to prosecute the criminal, most of the evidence
is available in the form of raw semantics. Cyber forensic investigators often face the challenge of manually
examining an enormous quantity of digital image information to identify direct evidence with the assistance of
this semantics. Semantic based image retrieval system (SBIR) is therefore the recent and best option to solve this
drawback. The main purpose of this research is to design for cyber forensic tools a novel framework of
semantic-based image retrieval system. We therefore present a deep learning framework based on the
Convolution neural network(GoogLeNet) for recognizing distinct facial expressions from the Yale facial image
database for cyber associated forensic tools, the presented framework is very effective for classification and
detection based on semantics or verbal descriptions. The network has accomplished a decent accuracy of 86.25
% after training.

Keywords: Cyber Forensics, CBIR, CNN, GoogLeNet, SBIR, Image, Semantics, Deep learning and facts.

References:

1. David Bamman and Tanya Piplani, “DeepSeek: Content Based Image Search & Retrieval”. Published in semantic scholar.
http://arxiv.org/abs/1801.03406v2.
2. Max H. Quinn, Erik Conser, Jordan M. Witte and Melanie Mitchell. “Semantic Image Retrieval via Active Grounding of Visual
Situations” Published in the proceedings of International Conference on Semantic Computing.
483. 3. Wei Wang, Yuqing Song and Aidong Zhang. “Semantics-based Image Retrieval by Region Saliency”. Published in International
Conference on Image and Video Retrieval CIVR 2002: Image and Video Retrieval, pp 29-37. 2801-
4. Umar Manzoor, Mohammed A. Balubaid. “Semantic Image Retrieval: An Ontology Based Approach”. Published in IJARAI, Volume 28
4 Issue 4, 2015. Digital Object Identifier (DOI): 10.14569/ IJARAI.2015.040401. 08
5. M. Kalimuthu and Ilango Krishnamurthi. “Semantic-Based Facial Image-Retrieval System with Aid of Adaptive Particle Swarm
Optimization and Squared Euclidian Distance”. Hindawi-Journal of Applied Mathematics, http://dx.doi.org/10.1155/2015/284378.
6. Anuja khodaska and Siddarth Ladhake. “Semantic Image Analysis for Intelligent Image Retrieval”. Published in International
Conference on Intelligent Computing, Communication & Convergence (ICCC-2014). Procedia Computer Science 48 (2015) 192 – 197.
7. V. Lavrenko, R. Manmatha and J. Jeon. “A Model for Learning the Semantics of Pictures” published in Advances in Neural
Information Processing Systems 16 (NIPS 2003).
8. Manish Chowdhury, Sudeb Das and Malay Kumar Kundu. “Interactive Content Based Image Retrieval Using Ripplet Transform and
Fuzzy Relevance Feedback” Published in Indo-Japanese Conference on Perception and Machine Intelligence, 2012, pp 243-251.
9. Yixin Chen, Vassil Roussev, Golden G. Richard III and Yun Gao. “Content-Based Image Retrieval for Digital Forensics”. IFIP
International Conference on Digital Forensics, 2005: Advances in Digital Forensics pp 271-282.
10. Che-Yen Wen and Chiu-Chung Yu. ”Image Retrieval of Digital Crime Scene Images” Published in Forensic Science Journal, 2005;
4:37-45.
11. Ben Bradshaw. “Semantic based image retrieval: a probabilistic approach”. Published in proceedings of 8 th International conference on
Multimedia. Pgs: 167-176.
12. D.L. Bhaskari and P Ramesh Babu “A Meticulous Survey on Cyber forensics“ Published in ELSEVIER proceedings of ICACM 2011-
Hyderabad.
13. Ramesh Babu P, E.S. Reddy “A Comprehensive Survey on Semantic based Image Retrieval Systems for Cyber Forensics”. Published
in the IJCSE, ISSN: 2347-2693, Volume 6 Issue 8, Aug-2018.
14. H. Kaur and K. Jyoti, “Survey of techniques of high level semantic based image retrieval,” International Journal of Research in
Computer and Communication Technology, vol. 2, no. 1, pp. 15-19, 2013.
15. V. Vijaya rajan, M. Khalid, and C. Mouli, “A review: from keyword based image retrieval to ontology based image retrieval,”
International Journal of Reviews in Computing, vol. 12, no. 1, pp. 1–17, 2012.
16. B.-C.Chen, Y.-Y.Chen, Y.-H.Kuo, andW. H.Hsu, “Scalable face image retrieval using attribute-enhanced sparse codewords,” IEEE
Transactions on Multimedia, vol. 15, no. 5, pp. 1163–1173, 2013.
17. J. Yang, M. Luo, and Y. Jiao, “Face recognition based on image latent semantic analysis model and SVM,” International Journal of
Signal Processing, Image Processing and Pattern Recognition, vol. 6, no. 3, pp. 101–110, 2013.
18. I. Sudha,V. Saradha, M. Tamilselvi, andD.Vennila, “Face image retrieval using facial attributes By K-means,” International Journal of
Computer Science and Information Technologies, vol. 5, no. 2, pp. 1622–1625, 2014.
19. S. Pange and S. Lokhande, “Image retrieval system by using CWT and support vector machines,” Signal & Image Processing, vol. 3,
no. 3, pp. 63–71, 2012.
20. N. V. D. P. T. Dinh Viet Sang, "Facial Expression Recognition Using DeepConvolutional Neural Networks," published in the
proceedings of ICKSE, 2017.

Authors: Huu Nam Nguyen, Van Quan Tran, Anh Quan Ngo, Quang Hung Nguyen

Paper Title: Using Natural Pozzolan, Cement and Lime for Stabilizing Soil in Earth Dams
Abstract: The paper has focused on studying the ability of using natural pozzolan to combine lime and cement
in process of stabilized soil, implementing experimental contents for on-site soil including: grain composition,
plastic limit, plasticity index, mineral parts and other common mechanical properties, standard compaction.
Followed by experiments for soil, cement and pozzolan stabilized soil mixtures, including standard compaction,
compressive strength. A suitable model of physical experiments to simulate and prove lime, cement and
pozzolan stabilized soil meets the criteria for making waterproofing materials for earth dams in the Central
Highlands.
484. Keywords: Stabilized soil, natural pozzolan, lime, cement. 2809-
28
References: 14
1. Soil Stabilization for Pavements. Department of the Army (DA), the Navy and the Air Force, 1994.
2. PCA, Soil- cement laboratory handbook. Porland cement association, 1992.
3. N. H. Tri, Researching appropriate technology for rural road construction. Ministry of Science & Technology of Vietnam, 2015.
4. NLA, Mixture Design and Testing Procedures ixture Design and Testing Procedures for Lime Stabilized Soil or Lime Stabilized Soil.
National lime association, 2006.
5. TCVN 8858-11, Crushed macadam foundation and natural grading to reinforce cement in road pavement structure - Construction and
acceptance. 2011
6. NAMM, Improvement of geotechnical properties of silty sand soils using natural pozzolan and lime. International journal of geo-
enghineering, 2018

Authors: Boopathy G, Vijayakumar K.R, Chinnapandian M, Gurusami K


Development and Experimental Characterization of Fibre Metal Laminates to Predict the
Paper Title:
Fatigue Life
Abstract: During the last two decades, the concept of Fibre Metal Laminates (FMLs) has been evolved to find
solution to the requirement of improving mechanical properties and reducing structural weight of elemental
components of aircraft structures. In this work FML is prepared using Al 2024 by placing alternately with
glass/carbon/aramid Fibres. From experimental results of FML shows greater advantage in mechanical
properties then aluminium monolithic layer and this composite fibre laminates individual. The FMLs tested in
this work were made of 3 layers of 2024 T3 aluminium alloy 0.28 mm thickness and fibre mats. The 5-3/2
laminates of size 300x300 mm with 3 mm thick were prepared using Vacuum Assisted Resin Transfer Moulding
(VARTM) in cold compaction and test specimen were cut by using abrasive water jet machining as per ASTM
Standards. The adhesion between fibre and metal layer will play a major role in strength of FML. By keeping
this in consideration FMLs were prepared without blow holes and capable of withstanding delamination while
preparing specimens through water jet and during various tests employed. The fracture surfaces of destructed
specimens are studied with help Scanning Electron Microscope (SEM) image. Similarly, the numerical
simulation of all the tests were done using Ansys APDL 10.0 Software. It is observed that aramid FML have
substantially stronger in longitudinal directions. Hence, more priority given in this paper to investigate tensile
strength and fatigue life of aramid FML.
485.
2815-
Keywords: FML, VARTM, SEM, Fatigue, Fracture Surface, Numerical Simulations. 28
18
References:

1. Alderliesten, R.C., Hagenbeek, M., Homan, J.J. et al, Fatigue and Damage Tolerance of Glare, Applied Composite Materials ,2003.
2. A,Volt,L.B.Vogelesang,and T.J.de Vries, TowardsApplication of Fiber Metal Laminates in Larger Aircraft, Aircraft Eng. & Aerospace
Technology, 71 (6) (1999), pp,558-570.
3. Woerden, H.J.M., Sinke, J. & Hooijmeijer, P.A, Maintenance of Glare Structures and Glare as Riveted or Bonded Repair Material,
Applied Comp. Materials b, 2003 10: 307.
4. A.Asundi,A.Y.NChoi,Fiber Metal Laminates:An advanced material for future aircraft, Journal of Materials Processing Technology,63,
1997,384-394.
5. Harris B, Fatigue in Composites, Vol.3.CRG/WP,2003.
6. Boopathy G,Vijaya Kumar K.R, et al., Experimental Characterization Of Fibre Metal Laminates For Tensile And
ImpactProperties With Finite Element Modelling Approach, Caribbean Journal of Science, Volume 53, ISSUE 2 (MAY - AUG), 2019.
7. Ankush P. Sharma, Sanan H. Khan, Venkitanarayanan Parameswaran, Experimental and numerical investigation on the uni-axial
tensile response and failure of fiber metal laminates,Composites Part B: Engineering, Volume 125, 15 September 2017, Pages 259-274.
8. B.Muthu Chozha Rajana, et al., Impact Response and Damage Characteristics of Carbon Fibre Reinforced Aluminium Laminates
(CARAL) under Low Velocity Impact Tests, Materials Today: Proceedings 5 ,2018, 20070–20077.
9. M. Mariam,et al., Tensile and fatigue properties of single lap joints of aluminium alloy/glass fibre reinforced composites fabricated
with different joining methods, Composite Structures 200 ,2018, 647–658.
10. R.Citarella, G.Cricri, Three dimensional BEM and FEM Sub modeling in a Cracked FML Full Scale Aeronautic Panel, Appl
ComposMater,2014,21:557-577.

486. Authors: Elena Petrovna Olesina, Tatyana Valentinovna Gorodilina


The Technology of Media Culture usage in the Educational Environment: Development of
Paper Title:
Creative Self-Actualization
Abstract: The article looks at the experience of building a media environment at school as a system of self-
education and self-development for modern teenagers. The authors present a model of development of
teenagers’ creative self-actualization in the media educational environment, the technology of media culture use
in the educational environment and an original diagnostic methodology for determination of the degree of
development of school students’ creative self-actualization based on assessment of independent work carried out
by teenagers (media projects creation) taking into account emotional and semantic visualization of information
and the symbolism of associative-semantic connections to evaluate the quality of the conducted work. As a
result of the performed experiment, the authors identified personal characteristics shown by school students in
the course of their work on media projects and developed a typology of dominant activities that includes four
types of individual characteristics observed in school students: analytical, informational, proactive and synthetic
types. Based on this typology the authors have determined the relevance and necessity for differentiation of
work with teenagers of different ages in various forms of media educational environment and development of
their individual educational paths. Correspondingly, a four-stage mechanism of introduction of a teenager into a
media educational environment has been suggested providing for the integration of art into the educational
environment. The article presents the results of a pilot project that was carried out in state budgetary educational
institutions located in Moscow: School no. 1253, School no. 171, School no. 89 and in the children's creative
center Trubetskoy Estate in Khamovniki. The article is intended for scientists, teachers, pedagogues and
methodological experts who deal with the issues of media education.

Keywords: media education, activity development, personal competencies, value-semantic regulation, sense-
generating function of motive, personal meaning.

References:

1. E. A. Bondarenko, “Mediabezopasnost lichnosti v informatsionnom prostranstve sovremennoi shkoly” [Personal media security in the
information space of a modern school]. Bulletin of Chelyabinsk State University, vol. 21(312), Issue 80, 2013, pp. 21–32. 2819-
2. I. V. Chelysheva. (2107). Novye obrazovatelnye standarty i perspektivy mediaobrazovaniya v magistrature “Organizatsiya raboty s
molodezhyu” (na primere issledovatelskikh proektov) Mediaobrazovanie [New educational standards and future prospects for media 28
education in the Master’s Degree program “Organization of work with the youth” (exemplified by research projects)]. Journal of history, 26
theory and practice of media education, vol. 1. Available: http://www.mediagram.ru/files/2017-1.pdf
3. A. V. Fedorov, “Mediaobrazovanie: sotsiologicheskie oprosy” [Media education: public opinion polls]. Taganrog: Kuchma, 2007.
4. E. Husserl, “Fenomenologiya vnutrennego soznaniya vremeni” [Phenomenology of internal time consciousness]. Collected works, vol.
1, Moscow: Gnozys, 1994.
5. D. Fedyunin, S. Lochan, S. Avtonomova, L. Kutyrkina, and I. Mintusov, “The Scenario Approach to Establishing GR Communications
in Higher Education Institutions”. Journal Of Advanced Research In Law And Economics, 2018, vol. 9(2), pp. 472-480.
doi:10.14505//jarle.v9 2(32).11
6. E. A. Bondarenko, “Mediaobrazovanie v formirovanii sovremennoi obrazovatelnoi sredy” [Media education in the development of
modern educational environment]. Educational technology of XXI century. Moscow: Publishing house of Russian Academy of
Education, 2009, pp. 51–57.
7. M. R. Ginsburg, “Lichnostnoe samoopredelenie kak psikhologicheskaya problema” [Personal self-identification as a psychological
problem]. Question of psychology, 1988, vol. 2, pp. 19–27.
8. O. V. Stukalova, “Gumanitarnoe znanie i sovremennoe khudozhestvennoe obrazovanie: voprosy metodologii. Integratsiya – osnova
produktivnykh modelei sovremennogo gumanitarno-khudozhestvennogo obrazovaniya” [Humanitarian knowledge and modern artistic
education: methodological isssues. Integration as the basis for productive models of modern humanitarian and artistic education].
Materials of the All-Russian conference (1−3 November 2010, Moscow). Collection of scientific papers. Moscow: Sputnik+, 2010, pp.
35–41.
9. E. F. Komandyshko, “Pedagogicheskii potentsial iskusstva v tvorcheskom razvitii uchashcheisya molodezhi: integrativnyi podkhod”
[Pedagogical potential of art in the creative development of students: the integrative approach]. Monograph. Moscow: IKhO RAO
Publishing, 2011.
10. M. R. Ginsburg, “Psikhologicheskoe soderzhanie lichnostnogo samoopredeleniya” [Psychological content of personal self-
identification]. Question of psychology, 1994, vol. 3, pp. 43–52.
11. E. A. Bondarenko. (2018). Tekhnologii mediaobrazovaniya [Technologies of media education]. Available:
http://mim.org.ru/publikatsii/190-tekhnologii-mediaobrazovaniya
12. A. A. Zhurin. “Integrirovannoe mediaobrazovanie v srednei shkole” [Integrated media education at secondary school]. Moscow: Binom.
Knowledge laboratory, 2012.
13. L. G. Savenkova, and A. B. Nikitina, “Sovremennoe ponimanie problem integratsii v obrazovanii” [Modern understanding of integration
issues in education]. Standards and monitoring in education, 2016, vol. 4, pp. 50–63.
14. I. V. Chelysheva, “Metodika i tekhnologiya mediaobrazovaniya v shkole i vuze” [The methodology and technology of media education
at school and at higher education institutions]. Taganrog: Publishing center of Taganrog State Pedagogical Institute, 2009.
15. G. K. Selevko, “Sovremennye obrazovatelnye tekhnologii” [Modern educational technologies]. Moscow: Public education, 1998.
Authors: V.B.Pravalika, S.Nageswararao

Paper Title: Despeckling and Analysing Land Use Land Cover of Synthetic Aperture Radar Image
Abstract: In Image processing, Synthetic Aperture Radar(SAR) images are inherently affected by speckle
noise, which visually degrades the appearance of the images and may severely affect the quality of SAR image
interpretation tasks like object detection or target detection, instance segmentation and image analysis. Hence
487.
SAR image Despeckling becomes a hot research issue. In this paper, the proposed method Total Variation (TV) 2827-
Denoising is used to address this issue. It is applied to SAR imagery to decrease the noise. It is a filtering 28
method which works efficiently. The process of decreasing the speckle noise is known as Despeckling. When 31
there is noise in the image the actual data is affected. The actual meaning of noise is unwanted signal. Noise is
an undesirable by-product in an image that disturbs the original image. On removal of noise, it results in the
noise free SAR image. The Land Use Land Cover (LULC) analysis of a SAR image can be accurate when there
is no noise in the SAR image. Therefore the main aim of this paper is to analyze the land use and land cover
(LULC) in the despeckled high resolution image.

Keywords: SAR images, Despeckling, Total Variation, Principal Component Analysis

References:

1. YaserArianpour, HamidrezaAminavar, James A. ritcey, Gradient based SAR image despeckling and super resolution using Zernike
moments and boostrapping, IEEE, 2017
2. Yao Zhao, JianGuo Liu, Bingchen Zhang, Wen Hong, Yi-Rong Wu, Adaptive Total Variation Regularization Based SAR Image
Despeckling and Despeckling Evaluation Index, IEEE transactions on Geoscience and Remote Sensing, Vol.53, No.5, may 2015, pp
2765-2744
3. Yao Zhao, JianGuo Liu, Bingchen Zhang, Wen Hong, Yi-Rong Wu, An Adaptive Total Variation Regularization Method for SAR
Image Despeckling, IEEE transactions on Geoscience and Remote Sensing Symposium, 2014
4. http://www.askaswiss.com/2016/12/how-to-denoise-images-in-python.html?m=1
5. AiyeolaSikiruYommy, Rongke Liu, Spencer OjogbaOnuh and AniCosmasIkechukwu, SAR Image Despeckling and Compression
Using K-Nearest Neighbour Based Lee Filter and Wavelet, IEEE, 2015
6. `Weiping Ni and XinboGao, Despeckling of SAR Image Using Generalized Guided Filter With Bayesian Nonlocal Means, IEEE
TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, 2015
7. JieGeng, Jianchao Fan, Xiaorui Ma, Hongyu Wang, Ke Cao, an iterative low-rank representation for sar image despeckling, IEEE,
2016
8. ZhenchuanPang,GuanghiZhao,Guangng Shi, FangfangShen, SAR Image Despeckling with Adaptive Sparse Representation, School of
Electronic Engineering, IEEE, 2015
9. Hui Zhang, Jinfang Zhang, FanjiangXu, Land use and land cover classification based on image saliency map Cooperated coding, IEEE
International Conference on Image Processing (ICIP), 2015
10. M. Dharani and G. Sreenivasulu, Land use and land cover change detection by using principal component analysis and
morphological operations in remote sensing applications, International Journal of Computers and Applications, Taylor & Francis,
2019
11. NageswaraRaoSirisala and C.ShobaBindu. A Novel QoS Trust Computation in MANETs Using Fuzzy Petri Nets, International Journal
of Intelligent Engineering and Systems, Vol.10, No.2, (2017), pp 116-125
12. NageswaraRaoSirisala and C.ShobaBindu. Uncertain Rule Based Fuzzy Logic QoS Trust Model in MANETs, International
Conference on Advanced Computing and Communications -ADCOM, (IITM PhD forum), (2015), pp.55-60.1
13. V.B. Pravalika, S. Nageswararao, A survey on Despeckling of synthetic aperture radar images, international journal of computer
sciences and engineering, vol.6, 2018
14. https://towardsdatascience.com/a-step-by-step-explanation-of-principal-component-analysis-b836fb9c97e2
15. https://medium.com/@aptrishu/understanding-principle-component-analysis-e32be0253ef0
https://towardsdatascience.com/a-step-by-step-explanation-of-principal-component-analysis-b836fb9c97e2

Authors: Gazal, Sangeeta Kamboj

Paper Title: Designing and Implementation of Free RTOS Multichannel Data Logger using Microcontroller
Abstract: A data logger is an electronic device that records data over time or in relation to location either
with a built in instrument or sensor. In the paper, a data logger is designed and developed using STM32F407
DISCOVERY Board. An code is developed and tested using STM32CUBE and Atollic True Studio softwares
in the proposed work. GSM Module SIM900EI is interfaced with microcontroller to send voltage output values
of all the sensors interfaced with it for cloud computation in the paper. The paper also demonstrate hardware
implementation of the designed data logger. The proposed data logger can be used in the Automatic Weather
Stations (AWS).
488.
Keywords: 2832-
2836
References:

1. Roberson P. "Using data loggers ", Science Teachers' workshop 2004, north Sydney.
2. Huang Jian “Research of Serial Communication Based on STM32”, 2016.
3. Luharuka R. et al. “A microcontroller-based portable GSR data logger for physiological sensing”, proceedings of conference
department of Mechanical and Industrial Engineering, University of Massachusetts, Amherst.
4. LiuYing M.J.S.R.D.L, “Design of USB Multi-channel and Humidity Acquisition System Based on Wireless Communication”
ICEMI’2009.
5. Perez S. J. et al. “A microcontroller based data logging System” Instrumentation and Development Vol. 3(8), copyright 1997, Journal
of the Mexican Society of Instrumentation.

Authors: Praveen K Wilson, J R Jeba

Paper Title: Anaphora Resolution using ThemeSets


Abstract: Anaphora resolution is a procedure of replacing pronouns with its referring nouns which may be
available in the same sentence or in different sentences within the same document. Even multiple approaches are
available for anaphora resolution; there may be some space for semantic approaches which provides solution
better than syntactic or corpus based approaches. In syntactic approaches, all noun phrases from the previous or
489.
current sentences are checked for getting constrains agreement with the anaphor and score value is calculated for 2837-
a pair of Noun-Pronoun based on these constrains. The pair getting the highest positive score is treated as the 28
result. In some cases the sentence structure is not changed, hence the score corresponding to the feature values 42
and syntactic structures are same. Here the actual replacement of pronoun with noun depends on the meaning of
the sentence especially the meaning of the verb. To resolve such situations, here we are proposing a method
which is a combination of syntactic and semantic approaches based on ThemeSets or thematic sets. Using
ThemeSets we are exploiting the role of verbal lexemes associated with the noun or pronoun for the resolution of
anaphora. Anaphora resolution in semantic way has great importance in the modern era of artificial intelligence
which enhance multi-dimensional research in the area of natural language processing in a better way.

Keywords: Anaphora Resolution, ThemeSets, Verbal lexemes, Nominal Anaphora, Feature Constraints.

References:

1. Sharma and Pradeep Kumar Singh,”A Survey on Anaphora Resolution”, International Journal of Computer Applications (0975-8887),
Recent Innovations in Computer Science and Information Technology
2. Triveni Lal Pal,Kamlesh Dutta and Pardeep Singh, “Anaphora Resoution in Hindi:Issues and Challenges”,International Journal of
Computer Applications (0975-8887),Volume 42-No.18,March 2012.
3. Ashima and Rajni Mohana, “Anaphora Resolution in Hindi: Issues and Directions”, Indian Journal of Science and
Technology,Volume-9 (32),August 2016
4. Daya Shankar Yadav et.al ,”Anaphora Resolution for Indian Languages:The State of the Art”, CPUH-Research Journal:2016,I(2),01-
07.
5. Mitkov R (1998) Robust pronoun resolution with limited knowledge. In: Proceedings of the 36th Annual Meeting of the Association
for Computational Linguistics and 17th International Conference on Computational Linguistics-Volume 2, Association for
Computational Linguistics, pp 869–875
6. Ng V, Cardie C (2002a) Combining sample selection and error-driven pruning for machine learning of coreference rules. In:
Proceedings of the ACL-02 conference on Empirical methods in natural language processing-Volume 10, Association for
Computational Linguistics, pp 55–62
7. Ng V, Cardie C (2002b) Improving machine learning approaches to coreference resolution. In: Proceedings of the 40th annual meeting
on association for computational linguistics, Association for Computational Linguistics, pp 104–111
8. Haghighi A, Klein D (2009) Simple coreference resolution with rich syntactic and semantic features. In: Proceedings of the 2009
Conference on Empirical Methods in Natural Language Processing: Volume 3- Volume 3, Association for Computational Linguistics,
pp 1152–1161
9. Lappin S, Leass HJ (1994) An algorithm for pronominal anaphora resolution. Computational linguistics 20(4):535–561
10. Kennedy C, Boguraev B (1996) Anaphora for everyone: pronominal anaphora resoluation without a parser. In: Proceedings of the 16th
conference on Computational linguistics-Volume 1, Association for Computational Linguistics, pp 113–118
11. Carbonell JG, Brown RD (1988) Anaphora resolution: a multi-strategy approach. In: Proceedings of the 12th conference on
Computational linguistics-Volume 1, Association for Computational Linguistics, pp 96–101
12. Ge N, Hale J, Charniak E (1998) A statistical approach to anaphora resolution. In: Sixth Workshop on Very Large Corpora
13. Hobbs JR. Resolving pronoun references. Lingua. 1978 Apr 30;44(4):311-38
14. Lapin S.Leass HJ , “An Algorithm for Pronominal Anaphora Resolution “, Computational Linguistics, 1994 Dec 1:20(4):535-61
15. Mitkov,Ruslan,Boguraev,Branimir and Lappin Shalom,2001, ”Introduction to the Special Issue on Computational Anaphora
Resolution in Computational Linguistics”,Volume 27, Number 4 , 2001
16. Connoly D, Burger JD , Day DS,”A machine learning approach to anaphor reference” ”, Proceedings International Conference, New
Methods in Language Processing,UK,255-61
17. Paul, Michael & Yamamoto, Kazuhide & Sumita, Eiichiro. (2002). Corpus-Based Anaphora Resolution towards Antecedent
Preference. COREF@ACL 1999
18. Tetreault JR,”A Corpus-Based Evaluation of Centering and Pronoun Resolution “,Computational Linguistic ,Special Issue on
Computational Anaphor Resolution, 2001 Dec;27(4):507-20
19. Brennan S,Friedman M, Pollard C, “A Centering Approach to pronouns”, Proceedings 25th Annual Meeting of the ACL,USA,1987
20. Baldwin B.CogNIAC: High precision co-reference with limited knowledge and linguistic resources, ACL’97 workshop on operational
factors in practical, robust anaphora resolution, Madrid,Spain,1997;38-45
Authors: Avadhani Bindu, Saumya Ranjan Giri, P. Venkateswara Rao

Paper Title: Automatic JUnit Generation and Quality Assessment using Concolic and Mutation Testing
Abstract: The necessity of Unit Testing cannot be denied in catching bugs at the lowest level of software
development with low cost of fixing bugs. It is difficult and costly to detect a bug at a later stage of development
in a large module of software. Since there are many individual units (functions) in a software program, manual
unit testing needs a lot of effort and time. A huge amount of time and human effort can be saved if unit testing is
automated. There are 3 basic needs of unit testing i.e. identifying the inputs to a function, detecting runtime
errors and detecting logical errors. Concolic Testing is used to identify the inputs to function and detecting the
runtime errors. Mutation Testing is used to detect the logical errors. The identified inputs to a function are called
as Test Cases. Mutation testing can verify the test cases to see if there is a need of having more test cases for a
function. Our software uses both Concolic and Mutation testing and can automate the unit testing process of Java
code to a great extent. The output of the work is JUnit where user can make his own assertions for every auto-
generated test cases.
490. Keywords: Unit Testing, JUnit, Concolic testing, Mutation testing, Java Path Finder and PIT. 2843-
28
References: 51
1. Symbolic Execution for Software Testing: Three Decades Later by Cristian Cadar and Koushik Sen. In Communications of the ACM,
February 2013, Vol.56 No.2
2. Java Path Finder. http://javapathfinder.sourceforge.net.
3. S. Anand, C. S. Pasareanu, and W. Visser. JPF-SE: a symbolic execution extension to Java PathFinder. In TACAS’0, 2007.
4. Willem Visser, Corina S. Pasareanu and Sarfaz Khurshid. Test Input Generation with Java PathFinder by In ISSTA’04, July 2004.
5. Khurshid S., Pasareanu C.S., Visser W. (2003) Generalized Symbolic Execution for Model Checking and Testing. In: Garavel H.,
Hatcliff J. (eds) Tools and Algorithms for the Construction and Analysis of Systems. TACAS 2003. Lecture Notes in Computer
Science, vol 2619. Springer, Berlin, Heidelberg. ISBN: 978-3-540-00898-9 , February 2003.
6. Luckow, Kasper Søe, Marko Dimjasevic, Dimitra Giannakopoulou, Falk Howar, Malte Isberner, Temesghen Kahsai, Zvonimir
Rakamaric and Vishwanath Raman. “JDart: A Dynamic Symbolic Analysis Framework.” TACAS (2016).
7. Pasareanu, Corina S., Neha S. Rungta and Willem Visser. “Symbolic execution with mixed concrete-symbolic solving.” ISSTA (2011).
8. Pasareanu, Corina S., Peter C. Mehlitz, David H. Bushnell, Karen Gundy-Burlet, Michael R. Lowry, Suzette Person and Mark Pape.
“Combining unit-level symbolic execution and system-level concrete execution for testing NASA software.” ISSTA (2008).
9. Pasareanu, Corina S., Willem Visser, David H. Bushnell, Jaco Geldenhuys, Peter C. Mehlitz and Neha S. Rungta. “Symbolic
PathFinder: integrating symbolic execution with model checking for Java bytecode analysis.” Automated Software Engineering 20
(2013): 391-425.
10. Coles, Henry & Laurent, Thomas & Henard, Christopher & Papadakis, Mike & Ventresque, Anthony. (2016). PIT: a practical mutation
testing tool for Java (demo). 449-452. 10.1145/2931037.2948707.
11. F. Mariya and D. Barkhas, "A comparative analysis of mutation testing tools for Java," 2016 IEEE East-West Design & Test
Symposium (EWDTS), Yerevan, 2016, pp. 1-3.
12. Z. Nayyar, N. Rafique, N. Hashmi, N. Rashid and S. Awan, "Analyzing test case quality with mutation testing approach," 2015 Science
and Information Conference (SAI), London, 2015, pp. 902-905.
13. K. Sen and G. Agha. CUTE and jCUTE: Concolic unit testing and explicit path model-checking tools. In CAV’06, 2006.
14. K. Sen, D. Marinov, and G. Agha. CUTE: A concolic unit testing engine for C. In ESEC/FSE’05, Sep 2005.
15. P. Godefroid, N. Klarlund, and K. Sen. DART: directed automated random testing. In Proc. PLDI 2005.
16. K. Sen, D. Marinov, and G. Agha. CUTE: a concolic unit testing engine for C. In Proc. ESEC/SIGSOFT FSE, 2005.
17. Java Path Finder. https://github.com/javapathfinder/jpf-core/wiki.
18. PITEST (online). www.pitest.org.
19. R. A. DeMillo, R. J. Lipton, and F. G. Sayward, “Hints on Test Data Selection: Help for the Practicing programmer,” Computer, vol.
11, no. 4, pp. 34–41, April 1978.
20. R. G. Hamlet, “Testing Programs with the Aid of a Compiler,” IEEE Transactions on Software Engineering, vol. 3, no. 4, pp. 279–
290, July1977.
21. Y. Jia and M. Harman, "An Analysis and Survey of the Development of Mutation Testing," in IEEE Transactions on Software
Engineering, vol. 37, no. 5, pp. 649-678, Sept.-Oct. 2011.

Authors: S .Saradha, V. Priyanandhini, V. Priyanandhini, T. Sreekala

Paper Title: Single Image Dehazing using Transmission Estimation


Abstract: Image dehazing is a system which can reduce poor consequence of haze on pictures which increase
competence of the picture/tape meting out method in the indistinct climate. The present study, presents a simple
image dehazing technique. System deletes the initial transmittal, exactly depends on hidden area division which
in turn reduces the initial transmittal. First, we build raw transmittal in Gaussian pyramid using selective
transmittal extraction prior. Second, a patch based on Laplacian pyramid which gives the value of nonlinear re-
trace function point by point. Third, is universal Laplacian map which states the segmentation-based re-traced
image. All the three segmentation guide the performer for transmittal refinement. Finally, the dehazing output
gets back from the refined transmittal and atmospheric scattered technique.

Keywords: dehazing, Image Processing, MATLAB.

References:

1. Dynamic range independent image quality assessment’, ttp://resources. mpiinf.mpg.de/hdr/-vis_metric/, accessed 27 July 2015
2. Yan, Q., Xu, L., Jia, J.: ‘Dense scattering layer removal’ (ACM Asia Technical Briefs, 2013), p. 14
3. Meng, G., Wang, Y., Duan, J., et al.: ‘Efficient image dehazing with boundary constraint and contextual regularization’. Proc. Int.
491. Conf. on Computer Vision, 2013, pp. 617–624 2852-
4. Kim, J., Jang, W., Sim, J., et al.: ‘Optimized contrast enhancement for realtime image and video dehazing’, J. Vis. Commun. Image
Represent., 2013, 24, (3), pp. 410–426
28
5. Gibson, K.B., Vo, D.T., Nguyen, T.Q.: ‘An investigation of dehazing effects on image and video coding’, IEEE Trans. Image Process. 57
(TIP), 2012, 21, (2), pp. 662–673
6. Tang, K., Yang, J., Wang, J.: ‘Investigating haze-relevant features in a learning framework for image dehazing’. Proc. Int. Conf.
Computer Vision and Pattern Recognition, 2014, pp. 2995–3002
7. Xu, L., Lu, C., Xu, Y., et al.: ‘Image smoothing via L0 gradient minimization’, ACM Trans. Graph. (TOG), 2011, 30, (6), p. 174 [7]
He, K., Sun, S., Tang, X.: ‘Guided image filtering’. Proc Int. Conf. European Conf. on Computer Vision,2010, pp. 1–14.
8. Ancuti, C.O., Ancuti, C., Hermans, C., et al.: ‘A fast semi-inverse approach to detect and remove the haze from a single image’. Proc.
Int. Conf. Asian Conf. on Computer Vision, 2010, pp. 501–514
9. Tarel, J., Hautire, N.: ‘Fast visibility restoration from a single color or gray level image’. Proc. Int. Conf. Computer Vision, 2009, pp.
2201–2208
10. He, K., Sun, S., Tang, X.: ‘Single image haze removal using dark channel prior’. Proc. Int. Conf. Computer Vision and Pattern
Recognition, 2009 (Oral)
11. Kopf, J., Neubert, B., Chen, B., et al.: ‘Deep photo: model-based photograph enhancement and viewing’, ACM Trans. Graph. (TOG),
2008, 27, (5), p. 116
12. Tan, R.: ‘Visibility in bad weather from a single image’. Proc. Int. Conf.Computer Vision and Pattern Recognition, 2008, pp. 1–8
13. Fattal, R.: ‘Single image dehazing’,ACM Transactions on Graphics(TOG),2008, 27, (3), p. 72
14. Aydin, T.O., Mantiuk, R., Myszkowski, K., et al.: ‘Dynamic range independent image quality assessment’, ACM Trans. Graph.
(TOG), 2008, 27, (3), p. 69
15. Dr.K.Dharmarajan, Farhanah Abuthaheer and Dr.K.Abirami. “Sentiment Analysis on Social Media." Journal of Emerging
Technologies and Innovative Research (JETIR) www.jetir.org , Volume 6, Issue 3.pp. 210-217

Authors: G. Thailambal, P.Shanmugalakshmi, R. Durga


Paper Title: A Novel Method of Rainfall Prediction using MLP-FFN and Hybrid Neural Network Algorithm
Abstract: The present work proposes a cross breed neural system and multilayer perceptron_ feed forward
system based model for precipitation forecast. The crossover models are multistep technique. At first, the
information is bunched into a sensible number of groups, at that point for each bunch has prepared
independently by Neural Network (NN). Also, as a preprocessing stages a component choice stage is
incorporated. Feed forward choice calculation is utilized to locate the most reasonable arrangement of highlights 2858-
for foreseeing precipitation. To set up the creativity of the proposed cross breed forecast model (Hybrid Neural 28
Network or HNN) has been contrasted and two surely understood models in particular multilayer perceptron 62
feed-forward system (MLP-FFN) utilizing diverse execution measurements. The reproduction results have
uncovered that the proposed model is essentially superior to conventional strategies in anticipating precipitation.

Keywords: Rainfall prediction, multi-layer perceptron, neural network, hybrid model.


References:

1. Agrawal, R., and Srikant R. (1994). Speedy counts for mining connection rules. Systems of the twentieth Universal Meeting on
Enormous Information Bases, Santiago, Chile, 478-499
2. Agrawal., R., Imielinski, T., and Swami, A. (1993). Mining connection oversees between sets of things in tremendous databases ACM
492. SIGMOD Record, 22(2), 207-216
3. Aggarwal, R., and Kumar, R. (2013). A Far reaching Audit of Numerical Climate Forecast Models. General Diary of PC
Applications,74(18).
4. Asadi, S., Shahrabi, J., Abbaszadeh, P., and Tabanmehr, S. (2013) Another hybrid fake neural framework for precipitation flood
strategy showing. Neurocomputing, 121, 470-480.
5. Bui., D.T., Pradhan., B., Revhaug, I., Nguyen, D. B., Pham, H. V., and Bui, Q. N(2013). An epic cross breed evidential conviction
work based soft reason model in spatial estimate of precipitation activated shallow torrential slides in the Lang Child city zone
(Vietnam). Geomatics, Common Perils and Hazard, 6(3), 243-271. doi:10.1080/19475705.2013.843206
6. Chau., K. W., and Wu, C. L. (2010). A cream model joined with lone territory examination for consistently precipitation desire. Journal
of Hydroinformatics, 12(4),458. doii:10.2166/hydro.2010.032
7. Chetan, M., and Sudheer, K. P. (2006). A cream straight neural model for stream deciding Water Assets Exploration, 42(4), n/a-n/a.
doi:10.1029/2005wr004072
8. Ganti, R. (2014). Month to month storm precipitation deciding using ounterfeit neural frameworks
9. Goyal, M. K. (2013). Month to month precipitation estimate using wavelet backslide and neural framework: an examination of 1901-
2002 data, Assam, India. Speculative and Connected Climatology,118(1-2), 25-34.
10. Guhathakurta., P. (2008). Long lead storm precipitation, desire for meteorological sub-divisions of India using deterministic fake neural
framework model Meteorol Atmos Phys., 101(1-2.), 93-108.
11. Dharmarajan, K., and M. A. Dorairangaswamy. "Discovering Student E-Learning Preferred Navigation Paths Using Selection Page and
Time Preference Algorithm." International Journal of Emerging Technologies in Learning (iJET) 12.10 (2017): 202-211.

Authors: A.S.Arunachalam, S. Vaishnavi Sree, K.Dharmarajan

Paper Title: Malware Detection and Classification using Random Forest and Adaboost Algorithms
Abstract: The chance of malware within the Internet of Things (IoT) surroundings is increasing due to a loss of
detectors. This paper proposes a way to are expecting the intrusion of malware the usage of state-of the-art
gadget mastering algorithms which could discover malware faster and greater appropriately, as compared with
the existing methods (this is, payload, port-based, and statistical techniques). Clever workplace surroundings
was implemented to capture the drift of packet datasets, where malware and normal packets were captured, and
eleven features have been extracted from them. Four gadget getting to know algorithms (random forest, a guide
vector gadget, AdaBoost, and a Gaussian mixture version–primarily based naive Bayes classifier) were
investigated to implement the automatic malware monitoring gadget. Random wooded area and AdaBoost have
to separate the malware and normal flows flawlessly, due to their ensemble structures, which could classify
unbalanced and noisy datasets.

Keywords: Malware classification, Artificial Intelligence, Pattern recognition and classification, Mirai
malware.

493. References:
2863-
1. Gubbi, Jayavardhana, et al. "Internet of Things (IoT): A vision, architectural elements, and future directions." Future generation 28
computer systems 29.7 (2016):1645-1660. 68
2. Kshetri, Nir. "Can Blockchain Strengthen the Internet of Things?" IT Professional 19.4 (2017):68-72.
3. Lee, In, and Kyoochun Lee. "The Internet of Things (IoT): Applications, investments, and challenges for enterprises." Business
Horizons 58.4 (2015):431-440.
4. Deng, Houtao, and George Runger. "Feature selection via regularized trees." Neural Networks (IJCNN), The 2016 International Joint
Conference on. IEEE,2016.
5. Sun, Yanmin, Andrew KC Wong, and Mohamed S. Kamel. "Classification of imbalanced data: A review." International Journal of
Pattern Recognition and Artificial Intelligence 23.04 (2018):687-719.
6. Kolias, Constantinos, et al. "DDoS in the IoT: Mirai and other botnets." Computer 50.7 (2017):80-84.
7. Sutton, Richard S., and Andrew G. Barto. Reinforcement learning: An introduction. Vol. 1.No.Cambridge: MIT press,2012.
8. Fiore, Ugo, et al. "Network anomaly detection with the restricted Boltzmann machine." Neurocomputing 122 (2013):13-23.
9. Moore, Andrew W., and Denis Zuev. "Internet traffic classification using bayesian analysis techniques." ACM SIGMETRICS
Performance Evaluation Review. Vol. 33. No. 1. ACM,2005.
10. Liaw, Andy, and Matthew Wiener. "Classification and regression by randomForest." R news 2.3 (2012): 18-22.
11. Hearst, Marti A., et al. "Support vector machines." IEEE Intelligent Systems and their applications 13.4 (2015):18-28.
12. Schölkopf, Bernhard, and Alexander J. Smola. Learning with kernels: support vector machines, regularization, optimization, and
beyond. MIT press, 2002.
13. Hastie, Trevor, et al. "Multi-class adaboost." Statistics and its Interface 2.3 (2017):349-360.
14. Stephens, Matthew. "Bayesian analysis of mixture models with an unknown number of components-an alternative to reversible jump
methods." Annals of statistics (2017):40-74.

Authors: B Vikram Anand, Sujit Kumar Patro, Srikant Misra

Paper Title: Optimization Parameters in Passive Energy Technologies Plus its Execution
Abstract: The usage of energy in households needs enlarged in the modern years owing towards the emergent
call in energy used intended for heating plus cooling in households. Enrichments ought to be ready in insulation,
494.
plant, illumination plus controls. These designs endure important structures that help in the direction of 2869-
achieving an energy effective household. So, the key objective of this paper is to distinguish what has been 28
accomplished so far towards making households more supportable in terms of energy practice and what can be 72
ready to progress the household to exploit the habit of day lighting warranting the illumination levels remain
suitable for the household. So here a simulation was been done using Sketchup, Openstudio and Energy plus
softwares to design and develop the house by considering the above and the results are been discussed.

Keywords: Passive Energy, Household, Day illumination control, Direct plus Indirect expansions, Energy plus

References:

1. B.Vikram Anand, Mathematical modeling of houses towards the design strategy of green Houses with MATLAB, IRJET ,Volume 3,
Issue 5, ISSN No. 2395 – 0072,2016
2. Appendix G of Approved Document L (Dept of the Environment and Welsh Office, 1995 edition).
3. Bruce anderson, Solar Energy: Fundamentals in House Design. Mc Graw-hill, 1977
4. House Research Establishment (BRE), Day illumination Design in Architecture
5. House Research Establishment (BRE), http://www.bre.co.uk
6. Diana Schumacher, Energy : Crisis or Opportunity?
7. Donald R. Wulfinghoff, The Modern History of Energy Conservation: An Overview for Information Professionals.

Authors: S.Shiyamala, S.Suganya

Paper Title: Detection, Localization of Text in Images by Mser and Enhanced Swt
Abstract: The number digital images and digital videos has raised highly. The text shows in the images is
major thing for fully understanding the images. So it is very signifigant to recognize the text. First step of text
recognization system is known as text detection. But detecting text from images is very challenging and it is
receiving high amount of concentration. Text detection is improved by pre-procssing techniques like noise
removal, contrast changes and etc. Recently MSER (Maximally Stable Edge Region) and SWT (Stroke Width
Transformation) methods are used seperately or combined with each other for detecting and localizing text. This
paper analyzes and compares technical challenges and performance of above methods and take in new and fast
method for text detection and localization. The proposed method comprises an enhanced technique based on
SWT which combined with MSER. The proposed method detect wording which is located in differnt directions,
different angle and combined letters. Performance of exisisting and proposed methods on road signal images
495. depicted in experimental results.
2873-
28
Keywords: MSER, SWT ,Canny edge detection.
75
References:

1. Gomez, L., Karatzas, D. (2014). A fast hierarchical method for multi-script and arbitrary oriented scene text extraction, 2014, 19(4) 1-
15.
2. Wu, H., Zou, B., Zhao, YQ. (2016). Natural scene text detection by multi-scale adaptive colour clustering and non-text filtering,
Neurocomputing, 214. 1011–1025.
3. Tian, Z, Huang, W, He, T, et al. (2016). Detecting Text in Natural Image with Connectionist Text Proposal Network, Computer Vision
– ECCV 2016. Springer International Publishing, 2016.
4. Epshtein, B., E. Ofek, and Y. Wexler. Detecting text in natural scenes with stroke width transform in IEEE Conference on Computer
Vision and Pattern Recognition (CVPR). 2010.
5. Chucai, Y. and T. YingLi, Text String Detection From Natural Scenes by Structure-Based Partition and Grouping. Image Processing,
IEEE Transactions on, 2011.20(9): pp. 2594-2605.
Authors: K. Bintu Sumanth, G Dilli Babu, S Satish Kumar
Mechanical and Wear Characterization of Nano Based Calotropis Gigantea Fiber Reinforced
Paper Title:
Polyester Composites
Abstract: The growing interest on development of biodegradable materials led to growing concern about bio-
based composite materials among the bio fibers applications one of the lightweight materials. Very minor
research work is available in the mechanical characterization of CGF composites. In this paper the mechanical
properties like tensile strength, flexural strength, impact strength and hardness of the CGF reinforced polymer
composites were investigated. Also the impact of naturally modified montmorillonite (MMT).Nano clay on
mechanical properties of the CGF composites was studied. The maximum volume fraction of the Specimens is
35%. The results demonstrate that the properties of nano-based CGF composites are better than the non-nano
based composites. Tri-biological behavior of the CGF composites also studies and observed that nano CGF
composites are having good wear characterization.

496. Keywords: Calotropis Gigantea fibers (CGF), polyester resin, Nano clay (MMT), Mechanical Properties.
2876-
References: 28
79
1. Chatterjee A, Chandraprakashi S. “The treatise of Indian medicinal plants,” Publications & Info. Directorate, New Delhi, (1995).
2. Vaidyaratnam P S. “Indian Medicinal Plants”, Orient Longman, Chennai. (2012).
3. Sastry, C. S. T. and Kavathekar, K. Y. Plants for Reclamation of Wasteland, Publication & Info. Direct, CSIR, New Delhi, (1990).
4. Venkateshwaran. “Mechanical and water absorption behaviour of banana/sisal reinforced”, Elsevier. 32 (2011), 4017.
5. Dr. Ravi Kumar N and Bhagya Lakshmi N, “Composites fabrication and mechanical testing of natural fiber reinforced polypropylene
hybrid composite”, Int.J.Engg. Research, 3 (2013), 49.
6. Srivastava V.K, “Effect of CNTS on the wear and friction performance of carbon fibre woven fabric reinforced epoxy resin
composites”, Int. J. Mater. Comp, 6 (2016), 95.
7. Ahmadi. H “Investigation on tensile properties of plain and Nano clay reinforced syntactic foams”, Int. J. Mater. Comp, 6 (2017), 34.
8. Idumah C.I and Hassan. A. “Hibiscus Cannabinus Fiber/PP based Nano-Bio composites Reinforced with Graphene Nano platelets”, J.
Nat. Fib, 14 (2017), 691.
9. Vijaya Ramnath. “Evaluation of mechanical properties of abaca–jute–glass fibre reinforced epoxy composite”, elsevier.51 (2013), 357.
10. Ramanaiah. K, Ratna Prasad A.V, Hema Chandra Reddy K, “Effect of Fiber Loading on Mechanical Properties of Borassus Seed
Shoot Fiber Reinforced Polyester”, J. Mater. Environ. Sci, 3 (2012), 374.
11. Ramanaiah. K, Ratna Prasad A.V., “Mechanical and Thermo-Physical Properties of Fish Tail Palm Tree Natural Fiber–Reinforced
Polyester”, Int. J. Pol. Anal. Char, 18(2013), 126.
12. Ajaya Kumar Behera, Sridevi Avancha, Ramkrishna Sen & Basudam Adhikari “Development and Characterization of Nanoclay-
Modified Soy Resin-Based Jute Composite as an Eco-friendly/Green Product”, Pol.Pla.
13. Qinghai ji, Ping zhu, jiahai lu. “Experimental study and modelling of fatigue life prediction of plain weave carbon/polymer composite
under constant amplitude loading”, Advanced composite materials,26 (2015), 295.
14. Marina H and Ishizaki, “Characterization of Green Coconut Fiber Composites”, Int.J.Pol.Anal.Char, 13(2008), 319.

Authors: Vanitha M, Mangayarkarasi R, Sumaiya Thaseen I, Saira Banu J

Paper Title: Secure and Error-Free Data Storage on Cloud via Deniable CP-ABE Scheme
Abstract: Cloud storage services are quickly increasing and more prevalent. CSP-cloud storage providers offer
storage as a service to all the users. It is a paid facility that allows association to outsource their confidential data
to be stored on remote servers. But, identity privacy and preserving data from an untrusted cloud is a difficult
concern, because of the successive change of the members. CSP has to be secured from an illegitimate person
who performs data corruption over cloud servers. Thus, there is a need to safeguard information from the
individuals who don’t have access by establishing numerous cloud storage encryption plans. Every such plan
implemented expects that distributed storage suppliers are protected and can't be hacked; however, practically
speaking, a few powers will compel distributed storage suppliers to render client details and secret information
on the cloud, in this manner inside and out bypassing stockpiling encryption plans. In this paper, a new scheme
is introduced to protect user privacy by a deniable CP_ABE(Cloud Provider_ Attribute Based Encryption)
scheme which implements a cloud storage encryption plan. Since coercers cannot specify whether privileged
insights are valid or not, the CSP ensures privacy of the user.

497. Keywords: cloud storage, Cloud servers, Encryption.


2880-
References: 28
83
1. Sahai, A., & Waters, B, Fuzzy identity-based encryption. In Annual International Conference on the Theory and Applications of
Cryptographic Techniques, 2005, pp. 457-473.
2. Goyal, V., Pandey, O., Sahai, A., & Waters, B., Attribute-based encryption for fine-grained access control of encrypted data. In
Proceedings of the 13th ACM conference on Computer and communications security, 2006, pp. 89-98.
3. Bethencourt, J., Sahai, A., & Waters, B., Ciphertext-policy attribute-based encryption. In Security and Privacy, 2007. SP'07. IEEE
Symposium on, 2007, pp. 321-334.
4. Waters, B., Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In International
Workshop on Public Key Cryptography, 2011, pp. 53-70.
5. Sahai, A., Seyalioglu, H., & Waters, B.,Dynamic credentials and ciphertext delegation for attribute-based encryption. In Advances in
Cryptology–CRYPTO 2012, pp. 199-217.
6. Hohenberger, S., & Waters, B., Attribute-based encryption with fast decryption. In Public-Key Cryptography–PKC 2013, pp. 162-179.
7. Tysowski, P. K., & Hasan, M. A., Hybrid attribute-and re-encryption-based key management for secure and scalable mobile
applications in clouds. IEEE Transactions on Cloud Computing, 1(2), 2013, 172-186.
8. Dürmuth, M., & Freeman, D. M, Deniable encryption with negligible detection probability: An interactive construction. In Annual
International Conference on the Theory and Applications of Cryptographic Techniques, 2011, pp. 610-626.
9. Gasti, P., Ateniese, G., & Blanton, M. ,Deniable cloud storage: sharing files via public-key deniability. In Proceedings of the 9th
annual ACM workshop on Privacy in the electronic society, 2010, pp. 31-42.
Authors: Lan Huong Nguyen, Quang Hung Nguyen

Paper Title: Confidence-Based Assessment of Safety of Irrigation Reservoir in Vietnam


Abstract: Recently, in Vietnam deterministic design method has been applying for assessment of dam safety
which confidence for the works and the headworks are not quantified. Under this study audience are introduced
to the number of existing dams in Vietnam and relevant studies on confidence in the field of irrigation. The
authors have applied theories of irrigation works, the theory of statistical probability and the theory of system
analysis in developing algorithms for assessment of confidence level II for irrigation reservoir headworks in
conditions in Vietnam. Based on detailed algorithms and block diagrams, the authors have built program for
design of safety probability for incident mechanisms for individual works and the entire system of Phu Ninh
reservoir in Quang Nam province. Analysis of the influence of random variables on individual incident
mechanisms, the impact of incident mechanisms on the confidence of the works and the level of effect caused by
the works on the overall confidence of the system brought the authors about solutions that improve the
498.
confidence of the system in case of new design or system repair. 2884-
28
Keywords: problem tree, random variable, functions of confidence, confidence, and safety probability. 93

References:

1. Phan Si Ky, Problems in some irrigation works in Vietnam and measures. Agricultural Press, Hanoi, 2000.
2. Nguyen Vi, Method of modeling of statistics in calculation of confidence of port works. Transportation Press, Hanoi, 2009.
3. Nguyen Van Mao, Nguyen Huu Bao, Nguyen Lan Huong, Dam safety probability calculation grounds, Construction Press, 2014
4. Probabilistic design and risk assessment of large dams, 1996, J,K Virijling/ M, Hauer/ R,E, Jorissen.
5. "Основные положения расчета причальных сооружений на надежность," М. В/О “Мортехинформреклама”, РД 31-31-35-85,
1986.
6. "Main report of Phu Ninh irrigation system in Quang Nam" HEC1, Phu Ninh reservoir rehabilitation and safety improvement project,
2001
7. Nguyen Quang Hung, Nguyen Van Mao . Reliability analysis of revetment using interlocking concrete blocks. Jurnal of water resources
and environmental engineering. Vol 44. 37-42. 2014.
8. Pham Hong Cuong, Quang Hung Nguyen. Applying reliability theory to appraise quality of irrigation system in Vietnam. International
Journal of Innovative Technology and Exploring Engineering (IJITEE), Volume-8 Issue-8. 1277-1281. 2019
9. Lan Huong Nguyen, Quang Hung Nguyen, Application of reliability theory in calculation of safety reservoir. International Journal of
Recent Technology and Engineering (IJRTE)Volume-8,Issue-2, July, 2019.

Authors: K. Vijayalakshmi, M. Vinayakamurthy, Anuradha

Paper Title: Normalization of Behavioral Features in Autism Spectrum Disorder With Influencing Attributes
Abstract: The brain developmental disorder that affects both behavior and communication is autism spectrum
disorder (ASD) considered and recognized as a major medical issue affects the increasing population
approximately 0.5%– 0.6%. It is a highly heterogeneous neuro-developmental condition that has severe
symptoms with various comorbid disorders. Applied Behavior Analysis involves various methods to understand
the change in behavior through therapy. The goal is to identify and increase relevant behaviors which can help
to diagnose attributes that affect learning. Data mining as the technology handles such medical grounds to
predict by analyzing patterns in huge data sets. The outline of the proposed work is to find the relevant attributes
from the dataset by normalizing and ranking the attributes. The CFS subset evaluator using various search
methods like best first, greedy stepwise and exhaustive search are used to filter relevant feature from the dataset.
The ultimate objective of this paper work is to examine the ASD applied behaviors with subject to normalization
and ranking. Applying these to the feature selection methods would help for better understanding on various
currently wide spread complex medical condition.

Keywords: Autism Spectrum Disorder (ASD), Applied Behavior Analysis (ABA), Data Mining, Feature
Selection.

References:

1. Abby Flynt, Madeleine I. G. Daepp, Diet- related chronic disease in the northeastern united states: a model based clustering approach,
Springer, 2015.
2. LucioTonello, Luca Giacobbi, Alberto pettrnon, Alessandro Scuotto, Massimo Cocchi, Fabio Gabrielli, and Glenda cappelo, Crisis
Behavior in Autism Spectrum Disorders: A Self-Organized critically Approach, Hindawi, 2018. 2894-
499. 3. Malinda L. Pennington, Douglas Cullinan, and Louise B. Southern, Defining autism: variability in state education agency definitions of
and evaluations for autism spectrum disorders, Hindawi, 2014. 28
4. So Hyun Kim, Catherine Lord, The Behavioral Manifestations of Autism Spectrum Disorders, Elsevier, 2014. 96
5. R. Caruana and D. Freitag, Greedy Attribute Selection, Proc. 11th Int’l Conf. Machine Learning, pp. 28-36, 1994.
6. S. Das, Filters, Wrappers and a Boosting-Based Hybrid for Feature Selection, Proc. 18th Int’l Conf. Machine Learning, pp. 74-81,
2001.
7. M. Dash, K. Choi, P. Scheuermann, and H. Liu, Feature Selection for Clustering-a Filter Solution, Proc. Second Int’l Conf. Data
Mining, pp. 115-122, 2002.
8. M. Dash and H. Liu, Feature Selection for Classification, Intelligent Data Analysis: An Int’l J., vol. 1, no. 3, pp. 131-156, 1997.
9. M. Dash and H. Liu, Handling Large Unsupervised Data via Dimensionality Reduction, Proc. 1999 SIGMOD Research Issues in Data
Mining and Knowledge Discovery (DMKD-99) Workshop, 1999.
10. R. Kohavi and G.H. John, Wrappers for Feature Subset Selection, Artificial Intelligence, vol. 97, nos. 1-2, pp. 273-324, 1997.
11. Tabtah, F. (2017). Autism Spectrum Disorder Screening: Machine Learning Adaptation and DSM-5 Fulfillment. Proceedings of the 1st
International Conference on Medical and Health Informatics 2017, pp.1-6. Taichung City, Taiwan, ACM.
12. K. Vijayalakshmi, Dr. Vinayakamurthy, Dr. V. Anuradha, Mining Behaviors on Learning and Feeding Issues of Autism Clusters,
IJSTR, vol 1 , issue 1, 2017.
13. Huan Liu, Lei Yu, Toward Integrating Feature Selection Algorithms for Classification and Clustering, IEEE Transactions on
Knowledge and Data Engineering, Vol. 17, No. 4, April 2005.
14. Krzysztof Pancerz, Wiesław Paja, Jerzy Gomuła, Random Forest Feature Selection for Data Coming from Evaluation Sheets of
Subjects with ASDs, Proceedings of the Federated Conference on Computer Science and Information Systems pp. 299–302, ACSIS,
Vol. 8. ISSN 2300-5963, 2016.
15. Raid Alzubi, Naeem Ramzan, Hadeel Alzoubi, Hybrid Feature Selection Method for Autism Spectrum Disorder SNPs, IEEE, 2017
16. Yasuhiro Kakihara, Tetsuya Takiguchi, Yasuo Ariki, Yasushi Nakai and Satoshi Takada, Acoustic Feature Selection Utilizing Multiple
Kernel Learning for Classification of Children with Autism Spectrum and Typically Developing Children, Proceedings of the 2013
IEEE/SICE International Symposium on System Integration, Kobe International Conference Center, Kobe, Japan, December 15-17.

Authors: Soni M, Abraham George


Optimal Design of Unequal Conductor Spacing In Grounding Grid by Modern Computational
Paper Title:
Intelligent Techniques
Abstract: With uniform grid spacing current distribution among grid conductors is non-uniform; conductors
towards the periphery carry more current and conductors towards the centre carry less current. Non- uniform
grid spacing increases leakage current in the centre conductors while decreases in the fringe conductors bringing
about uniform distribution of leakage current. This paper presents optimal design of unequal grid spacing in
grounding grid design by two modern computational intelligent techniques: Particle Swarm Optimization
500. technique and Bat Algorithm technique. Compression ratio is the method adapted in creating unequal grid
2898-
conductor spacing, in which compression ratio C is varied from 0.1 to 1 to result in numerous unequal grid
29
configurations. Modern intelligent techniques such as PSO and BAT algorithm are implemented to find the
03
optimal value of compression ratio C so as to achieve one best unequal grid configuration among numerous
feasible unequal grid configurations. Mat Lab software is developed for both PSO and BAT algorithm which are
extremely adaptable to examine the unequal grid spacing. Optimal value of compression ratio C is obtained for
different number of grid conductors along the x-axis and y-axis and unequal grid spacing is analysed through
distinct graphs.
Keywords: Touch Voltage, Step Voltage, Unequal grid distance, Compression ratio.

References:

1. ANSI/IEEE Std.80-2000, “Guide for safety in AC substation Grounding”, IEEE, New Yark.
2. J.G. Sevrak(1976),”Optimized grounding grid design using variable spacing technique”, IEEE Transactions on Power Apparatus and
System, Vol,PAS-95, No1,pp 362-374.
3. Unde, M G and Kushare, B,E(2014)., “Effect of compression ratio on touch voltage in layered soil”, in Proc, IEEE sixth Power India
Conference, In press.
4. Soni M, and Dr. Abraham George (2019). .“. “International Journal of Scientific & Engineering Research: Vol 6, Issue 8, pp.1558-
1563.
5. Soni. M and Dr. Abraham George(2015). .“Cost Effective Grounding Grid Design for substation. “International Journal of Scientific &
Engineering Research: Vol 6, Issue 8, pp.1558-1563.
6. L.Huang X Chen, H Yan(1995), ”Study of unequally spaced grounding Grids”, IEEE Transactions on Power Delivery, Vol 10, No.2,
pp 716-722.
7. L.Huang(1988), “Study of Calculation and Modeling of Unequal Spacing Ground Grid Potential Distribution”, Master’s Thesis,
Chongqing University, P.R.China.
8. IEEE Std.81.2012, IEEE Guide for Measuring Earth Resistivity Grounding Impedance, and Earth Surface Potentials of a Ground
System, IEEE, New York USA.
9. Dawalibi F, Mukhedkar D (2012), “Parametric analysis of grounding grid in uniform soil”, In: Power and energy engineering
conference(APPEEC), Shanghai, 27-29,.p.1-3.
10. C. Zhen, Z. Yongquan, and L. U. Mindi, “A simplified Adaptive Bat Algorithm Based on Frequency,” J. Comput. Inf. Syst., vol. 9: 16
(201, pp. 6451–6458, 2013.
11. El-Sayed M. El-Refaie, Said E. Elmasry, M.K. Abd Elrahman, Mohamed H. Abdo (2014), “achievement of the best design for
unequally spaced grounding grids”, Ain Shams Engineering Journal (2015) 6, 171–179
12. Osama Elsayed Gouda, Eng Hanan Mohamed Ahmed Ibrahim ,” Earth Surface Potentials and GPR for Grids Having Different
Conductors' Distributions Buried in different Layer Soil Structures” 14 th International Middle East Power Systems Conference, Cairo
University, Egypt, December 19-21, 2010.
Authors: Abhishek.A.R, Chinmaya Murthy.H.R, Kushal.D, Mayur.M.S, Raghu.N, Deepak.G

Paper Title: Design and Fabrication of Magnetic Drive System


Abstract: A drive system is used to transmit the power from input to the output shaft. The contact between the
meshing components will lead to loss of energy due to the friction between them. This paper aims at the design
and fabrication of a magnetic friction-less drive system aiming at increasing the efficiency of the drive by
minimizing the friction. Presently the system is designed for low speeds. However, theoretical implementation
of this in high speed applications is suggested in this paper.

Keywords: Contactless, Frictionless, Magnetic, Drive System.


501.
References: 2904-
29
1. Tlali, P. M., R. J. Wang, and S. Gerber. "Magnetic gear technologies: A review." 2014 International Conference on Electrical Machines 07
(ICEM). IEEE, 2014.
2. Muruganandam, G., S. Padma, and P. Selvakumar. "Design and implementation of a novel magnetic bevel gear." Journal of Control
Engineering and Applied Informatics 15.2 (2013): 30-37.
3. Uppalapati, Krishna K., et al. "Performance of a magnetic gear using ferrite magnets for low speed ocean power generation." 2012 IEEE
Energy Conversion Congress and Exposition (ECCE). IEEE, 2012.
4. B. Ackermann, “Magnetic Drive Arrangement,” US pat. 5 994 809, 1999.
5. N. Laing, “Magnetic Transmission,” US pat. 3 645 650, 1972.
6. T. B. Martin, “Magnetic Transmission,” US pat. 3 378 710, 1968.
7. H. T. Faus, “Magnet Gearing,” US pat. 2 243 555, 1941.
8. C. G. Armstrong, “Power Transmitting Device,” US pat. 687 292, 1901.
Abdul Khadar Asundi, Pradeep Basavaraj Jyoti, Mudakapla Shadaksharappa Nagaraj, Shabana
Authors:
Sarmas Sultan
Paper Title: An Efficient Cryptography Key Management for Secure Communications in Smart Metering
Abstract: Smart Grid (SG) is used in power systems to enhance environmental sustainability and increase the
efficiency of energy management. In Smart Grid systems, Smart Meter (SM) is one of the most important
devices. The SM is an advanced energy meter that receives data from the load devices of end users and
computes the customer’s energy consumption. After that these smart meter transfers the information to the utility
company and/or system operator. The secure data transmission is the main issue between the smart meters to the
smart grid. Because the advanced metering architecture is vulnerable to the cyber-attacks. In order to ensure the
security of smart meter data, the cryptography based encryption techniques are used in the SG. In this paper, the
secure data transmission between the SM and the SG is performed by RSA cryptography. The communication
over the devices performed by Binary Phase Shift Keying (BPSK). Here, the data from the SM encrypted using
RSA encryption technique and then it transmitted using BPSK to SG. At last, at the smart grid the RSA
decryption technique is used to decrypt the power values from various loads. The introduced RSA based
encryption key management mechanism used to provide the end to end security in the smart metering 2908-
502. communications. The access of the data is limited by providing the key to the authorized end users for enhancing 29
the confidentiality of the data transmission. This proposed method is named as BPSK-RSA methodology. The 16
performance of this BPSK-RSA methodology evaluated using energy consumption of the load devices. Then the
performance of BPSK-RSA methodology is compared with DFT based CHE in terms of Mean Square Error
(MSE). By taking the average, the MSE of BPSK-RSA methodology is improved at 5.02% than the DFT based
CHE. The performance of the BPSK-RSA methodology is also compared with ECC-SM method in terms of
Packet Delivery Ratio (PDR), Throughput (TH) and End to End Delay (EED). The PDR, TH and EED of BPSK-
RSA methodology are improved at 2.95%, 6.24% and 19.64% than the ECC-SM method at 100 smart meter
placement.

Keywords: Contactless, Frictionless, Magnetic, Drive System.

References:

1. Tlali, P. M., R. J. Wang, and S. Gerber. "Magnetic gear technologies: A review." 2014 International Conference on Electrical
Machines (ICEM). IEEE, 2014.
2. Muruganandam, G., S. Padma, and P. Selvakumar. "Design and implementation of a novel magnetic bevel gear." Journal of Control
Engineering and Applied Informatics 15.2 (2013): 30-37.
3. Uppalapati, Krishna K., et al. "Performance of a magnetic gear using ferrite magnets for low speed ocean power generation." 2012
IEEE Energy Conversion Congress and Exposition (ECCE). IEEE, 2012.
4. B. Ackermann, “Magnetic Drive Arrangement,” US pat. 5 994 809, 1999.
5. N. Laing, “Magnetic Transmission,” US pat. 3 645 650, 1972.
6. T. B. Martin, “Magnetic Transmission,” US pat. 3 378 710, 1968.
7. H. T. Faus, “Magnet Gearing,” US pat. 2 243 555, 1941.
8. C. G. Armstrong, “Power Transmitting Device,” US pat. 687 292, 1901.

Authors: Sasmita Mohapatra

Paper Title: Routing Protocol for Clustered Bee-Ad Hoc MANETS with Proper node Utilization
Abstract: Making MANETs energy efficient has been a biggest challenge from many years. In this regard in
the previous works routing protocols have been introduced for stabilized clustering scheme with swarm
intelligence where the MANETs are made energy efficient with well balanced multipath routing protocols. But
in all the proposed protocols the cluster structures are non overlapping where there is a probability that some of
the nodes may be left without any consideration in the clusters of MANET as nodes are highly dynamic in
nature. These nodes usually do not belong to any of the clusters thus cannot take part in the routing process
unless cluster splitting takes place. In that case certain time error may occur if any such kind of node carries any
special information. For that the clusters may be made overlapping but in that case number of clusters may
increase leading to complicated structure where efficiency may decrease suddenly in case of node movement or
failure. For this a novel clustering and routing procedure has been introduced in the paper where not only all the
nodes take part in data transmission but also number of clusters are minimized to improve efficiency. The work
has been carried by using NS-2 simulator.

Keywords: Energy-efficient, MANET, Clustering, Non-overlapping, Node-utilization, Stable.

References:

1. G. O. Young, “Synthetic Cai, Xuelian, YulongDuan, YingHe, JinYang, Changle Li.: Bee-Sensor-C: an energy-efficient and scalable
503. multipath routing protocol for wireless sensor net-works. International Journal of Distributed Sensor Networks. 2015,pp. 1-14 (2015) 2917-
2. Saleem, Muhammad, MuddassarFarooq.: Beesensor: a bee-inspired power aware routing protocol for wireless sensor networks. In:
Workshops on Applications of Evolutionary Computation, pp. 81-90. Springer, Berlin Heidelberg (2007)
29
3. SasmitaMohapatra, Siddappa, M.: Bee-Inspired Routing the ultimate routing process for Energy Efficient MANET. International Journal 21
of Applied Engineering Research. ISSN 0973-4562. Vol. 10, Number 18, pp. 38855-38862 (2015)
4. SasmitaMohapatra, Siddappa, M.: Stable Cluster Maintenance Scheme for Bee-AdHoc-C: An Energy-Efficient and Scalable Multipath
Routing Protocol for MANET. In: Third International Conference On Advances in Computing, Control and Networking (ACCN ),
Bangkok (2015)
5. SasmitaMohapatra, Siddappa, M.: Improvised routing using Border Cluster Node for Bee-AdHoc-C: An Energy-Efficient and
systematic Routing Protocol for MANETs, In: International Conference On Advances in Computer Applications (ICACA), IEEE (2016)
6. Mohapatra, Sasmita, and M. Siddappa. "Load-Balanced Energy-Enhanced Routing Protocol for Clustered Bee-Ad Hoc MANETs." In
Proceedings of First International Conference on Smart System, Innovations and Computing, pp. 191-202. Springer, Singapore, 2018.
7. Mohapatra S., Siddappa M. (2019) Multi Path Routing in Load Balanced Energy Enhanced Bee-AdHoc-C MANETs. In: Hemanth J.,
Fernando X., Lafata P., Baig Z. (eds) International Conference on Intelligent Data Communication Technologies and Internet of Things
(ICICI) 2018. ICICI 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 26. Springer, Cham
8. Bentaleb, Abdelhak, Abdelhak Boubetra, and Saad Harous. "Survey of clustering schemes in mobile ad hoc networks." Communications
and Network 5, no. 02 (2013): 8
9. Yu, J. Y., and Peter HJ Chong. "3hbac (3-hop between adjacent clusterheads): a novel non-overlapping clustering algorithm for mobile
ad hoc networks." In 2003 IEEE Pacific Rim Conference on Communications Computers and Signal Processing (PACRIM 2003)(Cat.
No. 03CH37490), vol. 1, pp. 318-321. IEEE, 2003.
10. Yu, JaneYang, PeterHanJooChong.: A survey of clustering schemes for mobile ad hoc networks. IEEE Communications Surveys &
Tutorials 7, no. 1, pp. 32-48 (2005)
11. Maan, Fahim, NaumanMazhar.: MANET routing protocols vs mobility models: A performance evaluation. In: Third International
Conference on Ubiquitous and Future Networks (ICUFN), pp. 179-184. IEEE (2011)
12. Gopinath, S., Sureshkumar, N., Vijayalakshmi, G., Natraj, N.A., Senthil, T., Prabu, P.: Energy Efficient Routing Protocol for MANET,
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 2, No 1 (2012).

Authors: Mukesh kumar, J.S. Ubhi

Paper Title: Consequences of Body-Biasing Technique on SRAM Memory


Abstract: The circuit changes the threshold voltage effectively with a definite delay and power by altering the
504.
body biasing of the transistors. The body bias is employed to govern the frequency and leakage of the memory 2922-
device. The threshold voltage of individual transistor is decreases by applying the reverse body bias (RBB) and 29
increases with forward body bias (FBB). This paper presents the viability of RBB to decrease the leakage power 25
and increase in the speed of operations for SRAM circuit. The investigation of RBB dependencies on various
performance parameters are analyzed. It is observed that the leakage power improves by 30.32% on applying
RBB voltage compared to zero body bias while the transient power increases by 3.22% but decrease of delay by
84.56% dominates on it. Because of this the overall energy consumption reduces by 84.06%. Further the
simulation work is carried out to see effect of supply voltage variation on leakage power at different RBB
voltage and temperature. Therefore, the RBB scheme is beneficial for devices of low leakage, low energy and
high speed of operation but this RBB voltage is limited by band-to-band tunneling current.

Keywords: RBB, Frequency, leakage power, delay.

References:

1. A.P. Shah, N. Yadav, A. Beohar, S.K Vishvakarma, “On-chip Adaptive Body Bias for Reducing the Impact of NBTI on 6T SRAM
Cells,” IEEE Transactions on Semiconductor Manufacturing. Vol. 31, pp.1–8, 2018.
2. M. Kumar, J.S. Ubhi, “Performance evaluation of 6T, 7T & 8T SRAM at 180 nm technology” 8th International Conference on
Computing, Communications and Networking Technologies (ICCCNT), pp. 1–6 2017.
3. Y. Wang, M. Enachescu, S.D. Cotofana, L. Fang, “Microelectronics Reliability Variation tolerant on-chip degradation sensors for
dynamic reliability management systems,” Microelectronics Reliability, vol. 52, pp. 1787–1791, 2012.
4. Neil H.E. Weste, and Kamran Eshraghian. "Principles of CMOS VLSI design: a systems perspective," Pearson Education, second
edition, pp. 51-52,2004.
5. S. Narendra, A. Keshavarzi, A. B. Bloechel, S. Borkar, & V. De, “Forward body bias for microprocessors in 130-nm technology
generation and beyond,” IEEE Journal of Solid-State Circuits, vol. 38 no. 5, pp. 696-701, 2003.
6. W. James Tschanz, Siva Narendra, Raj Nair, and Vivek De, "Effectiveness of adaptive supply voltage and body bias for reducing
impact of parameter variations in low power and high performance microprocessors," IEEE Journal of Solid-State Circuits, vol. no. 5
pp. 826-829, 2003.
7. C. Wann, J. Harrington, R. Mih, S. Biesemans, K. Han, R. Dennard, O. Prigge, C. Lin, R. Mahnkopf and B. Chen, “CMOS with active
well bias for low-power and RF/analog applications,” IEEE Symposium on VLSI Technology. Digest of Technical Papers (Cat. No.
00CH37104), pp. 158-159, June 2000.
8. N. Kimizuka, Y. Yasuda, T. Iwamoto, I. Yamamoto, K. Tanaka, Y. Akiyama, and K. Imai, “Ultralow standby power (U-LSTP) 65-nm
node CMOS technology utilizing HfSiON dielectric and body-biasing scheme,” in VLSI Symp. Tech. Dig., pp. 218–219, 2005.
9. S.F. Huang, C. Wann, Y.S. Huang, C.Y. Lin, T. Schafbauer, S.M. Cheng, Y.C. Cheng, D. Vietzke, M. Eller, C. Lin, and Q. Ye,
“Scalability and biasing strategy for CMOS with active well bias”. In IEEE Symposium on VLSI Technology, Digest of Technical
Papers pp. 107-108, June 2001.
10. A. Keshavarzi, S. Narendra, S. Borkar, C. Hawkins, K. Royi, & V. De, “Technology scaling behavior of optimum reverse body bias for
standby leakage power reduction in CMOS IC's,” In IEEE Proceedings, International Symposium on Low Power Electronics and
Design, pp. 252-254, August 1999.
11. V. Kursun, & E. G. Friedman, “Multi-voltage CMOS circuit design,” John Wiley & Sons pp. 169-169.

Authors: Nidhi Sonkar, Sudhakar Pandey, Sanjay Kumar

Paper Title: Ant Colony Optimization Based Routing Scheme in Vehicular Delay Tolerant Networks
Abstract: Delay Tolerant Networks finds its application in variety of environments and addresses issues like
intermittent connection, long and variable delays and high latency. Vehicular Delay Tolerant Networks was
introduced due to its various characteristic matches with DTNs. In particular class of VDTN there are two types
of nodes: Stationary and Mobile nodes. Stationary nodes are deployed along the roadside and mobile nodes are
constrained to move over the roads with variable speeds. This letter presents a new routing algorithm based on
Ant Colony Optimization in Vehicular Delay Tolerant Network. We performed extensive simulation in ONE
simulator and compare with Probabilistic Bundle Relaying Scheme to gauge the benefits of Ant Colony
Optimization based scheme over Probabilistic Bundle Relaying scheme.

Keywords: Delay Tolerant Network, Vehicular Delay Tolerant Networks, Ant Colony Optimization,
Probabilistic Bundle Relaying scheme, Vehicular Adhoc Network.

References:

1. J. J. P. C. Rodrigues et al., “The Vehicular Delay-Tolerant Networks (VDTN) Euro-NF joint research project,” in 2011 7th EURO-NGI
505. Conference on Next Generation Internet Networks, NGI 2011 - Proceedings, 2011.
2. P. Rog et al., “From Delay-Tolerant Networks to Vehicular Delay-Tolerant Networks,” vol. 14, no. 4, pp. 1166–1182, 2012. 2926-
3. C. Science and M. Studies, “A Survey on Delay Tolerant Network,” vol. 3, no. 7, pp. 184–190, 2014. 29
4. S. H. Ahmed, H. Kang, and D. Kim, “Vehicular Delay Tolerant Network (VDTN): Routing perspectives,” 2015 12th Annu. IEEE 30
Consum. Commun. Netw. Conf. CCNC 2015, no. January, pp. 898–903, 2015.
5. J. Pang and A. Deshmukh, “Delay Tolerant Networking,” pp. 1–17, 2006.
6. R. Kumar and M. Dave, “A Comparative Study of Various Routing Protocols in VANET,” J. Comput. Sci., vol. 8, no. 4, p. 6, 2011.
7. B. Ayyappan and P. Mohan Kumar, “Vehicular Ad Hoc Networks (VANET): Architectures, methodologies and design issues,” 2016
2nd Int. Conf. Sci. Technol. Eng. Manag. ICONSTEM 2016, pp. 177–180, 2016.
8. T. Taleb, A. Benslimane, and K. Ben Letaief, “Toward an effective risk-conscious and collaborative vehicular collision avoidance
system,” IEEE Trans. Veh. Technol., vol. 59, no. 3, pp. 1474–1486, 2010.
9. M. Zhang and R. S. Wolff, “A border node based routing protocol for partially connected vehicular Ad Hoc networks,” J. Commun.,
vol. 5, no. 2, pp. 130–143, 2010.
10. V. Information, “Probabilistic bundle relaying scheme in a multi-copy vehicular delay tolerant network Nidhi Sonkar *, Sudhakar
Pandey and Sanjay Kumar,” vol. 4, no. 1, pp. 43–54, 2019.
11. N. Sonkar, “Probabilistic Bundle Relaying Scheme in Multi- Hop Vehicular Delay Tolerant Network.”
12. M. Dorigo and T. Stützle, “The Ant Colony Optimization Metaheuristic,” in Ant Colony Optimization, 2018.
13. F. Pasic, “Network routing using Ant Colony Optimization,” pp. 1–9, 2013.
14. J. E. Bell and P. R. McMullen, “Ant colony optimization techniques for the vehicle routing problem,” Adv. Eng. Informatics, 2004.
15. M. Dorigo and L. M. Gambardella, “Ant colonies for the travelling salesman problem,” BioSystems, 1997.
16. A. K. Habboush, “Ant Colony Optimization ( ACO ) Based MANET Routing Protocols : A Comprehensive Review,” vol. 12, no. 1, pp.
82–92, 2019.
17. S. K. Gaikwad, “An Ant Colony Optimization based Routing Techniques for VANET,” no. April, pp. 418–422, 2016.
18. F. Aadil, K. B. Bajwa, S. Khan, and N. M. Chaudary, “CACONET : Ant Colony Optimization ( ACO ) Based Clustering Algorithm for
VANET,” pp. 1–21, 2016.
19. J. N. G. Isento, J. J. P. C. Rodrigues, J. A. F. F. Dias, M. C. G. Paula, and A. Vinel, “Vehicular delay-tolerant networks?a novel
solution for vehicular communications,” IEEE Intell. Transp. Syst. Mag., vol. 5, no. 4, pp. 10–19, 2013.
20. S. H. Ahmed, H. Kang, and D. Kim, “Vehicular Delay Tolerant Network (VDTN): Routing perspectives,” 2015 12th Annu. IEEE
Consum. Commun. Netw. Conf. CCNC 2015, pp. 898–903, 2015.
21. M. J. Khabbaz, W. F. Fawaz, and C. M. Assi, “Probabilistic bundle relaying schemes in two-hop vehicular delay tolerant networks,”
IEEE Commun. Lett., vol. 15, no. 3, pp. 281–283, 2011.
22. C. Wang, B. Zhao, W. Peng, C. Wu, and Z. Gong, “Routing algorithm based on ant colony optimization for DTN congestion control,”
Proc. 2012 15th Int. Conf. Network-Based Inf. Syst. NBIS 2012, pp. 715–720, 2012.
23. A. Keränen, T. Kärkkäinen, and J. Ott, “Simulating mobility and DTNs with the ONE,” J. Commun., vol. 5, no. 2, pp. 92–105, 2010.

Authors: Abhay Shelar, Amit Mahindrakar


Practical Scrutiny for Concrete Strength Properties of Ready-Mix Concrete Plant from Waste
Paper Title:
Concrete Aggregate
Abstract: The rise in the awareness of climate change and the increasing environmental concerns has led to
research in the areas of using the waste materials from Ready Mix Plants. This paper is an attempt to focus on
the use of these wastes as using ready mix concrete plant waste aggregates obtained by crushing, and finding
motorized assets of concretes complete by using many aggregates proportions with various proportions.
Recycling materials is an efficient way to increase the life cycle of the material and contributes to environmental
protection.

Keywords: Aggregate, Concretes, Ready mix plants, Recycling materials.

References: 2931-
506. 29
1. Van Jaarsveld J GS, Van Deventer J S J and Schwartzman A, The potential use of Geopolymeric Materials to Immobilise 35
2. Toxic Metals:Part I. Theory and application”, Minerals Engineering, Vol. 10, No. 7, pp. 659-669, 1997.
3. Xu H and Van Deventer J S J , The Geopolymerisation of AluminoSilicate Minerals”, International Journal of Mineral
4. Processing, Vol. 59, No. 3, pp. 247-266, 2000
5. Swanepoel J C and StrydomC A , Utilisation of fly ash in a geopolymeric material. Applied Geochemistry, Vol. 17: pp.
6. 1143- 1148, 2002.
Zhou X and Zhang J , Geopolymer Technology: The Current State Of TheArt”, Journal of Material Science, Vol. 42, pp. 2917-2933,
2007
Authors: Vijay Kumar Gurani, Abhishek Ranjan, Chiranji Lal Chowdhary

Paper Title: Diabetic Retinopathy Detection Using Neural Network


Abstract: Now-a-days diabetics are affecting many people and it causes an eye disease called “diabetics
retinopathy” but many are not aware of that, so it causes blindness. Diabetes aimed at protracted time harms the
blood vessels of retina in addition to thereby affecting seeing ability of an individual in addition to leading to
diabetic retinopathy. Diabetic retinopathy is classified hooked on twofold classes, non-proliferative diabetic
retinopathy (NPDR) and proliferative diabetic retinopathy (PDR). Finding of diabetic retinopathy in fundus
imaginary is done by computer vision and deep learning methods using artificial neural networks. The images of
the diabetic retinopathy datasets are trained in neural networks. And based on the training datasets we can detect
whether the person has (i)no diabetic retinopathy, (ii) mild non-proliferative diabetic retinopathy, (iii) severe
non-proliferative diabetic retinopathy and (iv) proliferative diabetic retinopathy.

Keywords: Diabetic, Retinopathy, Detection, Neural Network.

References:

1. Shuangling W., Yilong Y., Guibao C., Benzheng W., Yuanjie Z., and Gongping Y., Hierarchical retinal blood vessel segmentation
507. based on feature and ensemble learning, Neurocomputing,, Vol. 149 (B), pp. 708-717,2015..
2. M. Haloi, Improved Microaneurysm detection using Deep Neural Networks, Cornel University Library, arXiv:1505.04424v2, 2016. 2936-
3. Martina Melinscak, Pavle Prentasic, Sven Loncaric, Retinal Vessel Segmentation using Deep Neural Networks, VISAPP(1), pp. 577- 29
582, 2015. 40
4. G G Gardner, D Keating, T H Williamson, and A T Elliott, Automatic detection of diabetic retinopathy using an artificial neural
network: a screening Tool, J Ophthalmol., Vol. 80(11), pp. 940–944, 1996.
5. Sohini R., Dara D. K., Keshab K. P., “DREAM: Diabetic Retinopathy Analysis Using Machine Learning”, IEEE Journal of Biomedical
and Health Informatics, Vol. 18 (5), pp.1717-1728, 2014.
6. Jaykumar L., A.V. Deorankar, Sagar Lachure, Swati G. Romit J.,, Diabetic Retinopathy using Morphological operations and Machine
Learning, IEEE International Advance Computing Conference (IACC), 12-13 June 2015.
7. Priya R., Aruna P., “SVM and Neural Network based Diagnosis of Diabetic Retinpathy”, International Journal of computer
Applications, International Journal of Computer Applications, Vol. 41(1), pp. 6-12, 2012.
8. Shantala G., Jagadeesh P., Shivanand S., International Journal of Computer Applications, Vol. 111, pp. 5-8, 2015.
9. Nitish S. Geoffrey H. Alex K. Ilya S., Ruslan S., Dropout: A simple way to prevent Neural networks from overfitting, Journal of
Machine learning research, Vol. 15(Jun), pp. 1929−1958, 2014.
10. Carson L., Darvin Y., Margaret G. and Tony L.,, Automated Detection of Diabetic Retinopathy using Deep Learning, AMIA Jt
Summits Transl Sci Proc. 2018, pp. 147-155, 2018. .
11. Saket K. Anamika J., Misha K., Identification of different stages of Diabetic Retinopathy using artificial neural network, Sixth
International Conference on Contemporary Computing (IC3), 2013.
12. Pan J., Yong Z., Sui D., and Qin H., Diabetic Retinopathy Detection Based on Deep Convolutional Neural Networks for Localization
of Discriminative Regions, International Conference on Virtual Reality and Visualization (ICVRV), 2018.
13. Shaohu W., Yan L., Yin Z., Deep convolutional neural networks for diabetic retinopathy detection by image classification, Computers
& Electrical Engineering, Vol. 72, pp. 274-282, 2018.
14. Tianmei G., Jiwen D., Henjian L., Yunxing G., Simple convolutional neural network on image classification, IEEE 2nd International
Conference on Big Data Analysis (ICBDA), 10-12 March 2017.
15. Jainesh R., Vishal W., Aniruddh S., Praseniit B., Diagnosis of skin diseases using Convolutional Neural Networks, Second
International Conference on Electronics, Communication and Aerospace Technology (ICECA), 29-31 March 2018.
16. Kuntal K. P., K. S. Sudeep, Preprocessing for image classification by convolutional neural networks, IEEE International Conference on
Recent Trends in Electronics, Information & Communication Technology (RTEICT), 20-21 May 2016.
17. Kien N., Clinton F., Sridha S., Improving deep convolutional neural networks with unsupervised feature learning, IEEE International
Conference on Image Processing (ICIP), 2015.
18. C.L. Chowdhary, 3D object recognition system based on local shape descriptors and depth data analysis, Recent Patents on Computer
Science, Vol. 12(1), pp. 18-24, 2019.
19. C.L. Chowdhary, A. Darwish, A.E. Hassanien, Cognitive Deep Learning: Future Direction in Intelligent Retrieval, Handbook of
Research on Deep Learning Innovations and Trends, pp. 220-231, 2019.
20. C.L. Chowdhary, DP Acharjya, Clustering algorithm in possibilistic exponential fuzzy c-mean segmenting medical images, Journal of
Biomimetics, Biomaterials and Biomedical Engineering, Vol. 30, pp. 12-23, 2017.
21. B. Singh, S. Bhattacharya, C.L. Chowdhary, DS Jat, A review on internet of things and its applications in healthcare, Journal of
Chemical and Pharmaceutical Sciences, Vol. 10(1), pp. 447-452, 2017.
22. C.L. Chowdhary, D.P. Acharjya, Breast Cancer Detection using Intuitionistic Fuzzy Histogram Hyperbolization and Possibilitic Fuzzy
c-mean Clustering algorithms with texture feature based Classification on Mammography Images, Proceedings of the International
Conference on Advances in Information Communication Technology & Computing, Article No. 21, 2016.
23. C.L. Chowdhary, G.V.K. Sai, D.P. Acharjya, Decrease in false assumption for detection using digital mammography, Computational
Intelligence in Data Mining—Volume 2, pp. 325-333, 2016.
Authors: Jayanthi K Murthy, Sneha N S
Optimized S-box and Mix-Columns for AES Architecture for live IP video Encryption and
Paper Title:
Decryption by Key Generation Through face Recognition
Abstract: This paper proposes an AES based Encryption and Decryption of a live IP video used for security in
surveillance systems. Here, the key is generated based on neural networks techniques for facial recognition.
Principal component analysis and Eigen vector algorithms are used to extract biometric facial features which are
used to train the neural network. At the receiver side, the original video plays only if the user is authenticated or
else it plays an encrypted video. This work proposes an AES architecture based on optimizing timing in terms
of adding inner and outer pipeline registers for each round and Key Expansions. Further by optimizing the
Crypto Multiplication for Mix columns via LUT based approach aid in further optimization in terms of timing.
LUT and Pipelined based implementation techniques are optimal for FPGA based implementations. ROM table
and pipelining are the two techniques used to implement AES. Result indicates that with the combination of
pipelined architecture and Distributed/Split LUT-Pipelined techniques, the encryption has higher throughput and
speed.

508. Keywords: AES, Look up table, LUT Pipeline architecture, principal component analysis.
2941-
References: 29
45
1. William Stallings, Cryptography and Network Security- Principles and Practice, third edition, Pearson Education.
2. Xinmiao Zhang, Keshab K. Parhi,”High-Speed VLSI Architectures for the AES Algorithm”, IEEE transactions on very large scale
integration (vlsi) systems, vol. 12, no. 9, september 2004.
3. R.Saranya1, S.Prabhu “Image Encryption using RSA Algorithm with Biometric Recognition”, International Journal of Engineering and
Computer Science ISSN: 2319-7242.
4. Vinita Bandiwad, Bhanu Tekwani, “Face Recognition and Detection using Neural Networks”, International Conference on Trends in
Electronics and Informatics ICEI 2017, 978-1-5090-4257-9/17©2017 IEEE.
5. S. M. Umar Talha, Mir Asif “Efficient Advance Encryption Standard (AES) Implementation on FPGA Using Xilinx System
Generator”, IEEE 2016 6th International Conference on Intelligent and Advanced Systems (ICIAS).
6. Divya Mangala, B.S and Prajwala N.B, “Facial Expression Recognition by Calculating Euclidian Distance for Eigen Faces using
PCA”, IEEE International Conference on Communication and Signal Processing, April 3-5, 2018, India.
7. M Tousif Ahmed, Sanjay Sinha, “Design and Development of Efficient Face Recognition Architecture using Neural Network on
FPGA”, Proceedings of the Second International Conference on Intelligent Computing and Control Systems (ICICCS 2018) IEEE
Xplore Compliant Part Number: CFP18K74-ART; ISBN:978-1-5386-2842-3.
8. Swinder Kaur, Prof. RenuVig, “Efficient Implementation of AES Algorithm in FPGA Device”, IEEE International Conference on
Computational Intelligence and Multimedia Applications 2017.

Authors: Prashant Kumar, Munish Vashishath, P. K. Bansal


Paper Title: Analytical Modeling and Simulation of Nanoscale Fully Depleted Dual Metal Gate SOI MOSFET
Abstract: The demand and development of scaled semiconductors devices for upcoming challenges in VLSI
technology is unending. CMOS technology plays a very important role in fulfilling this criterion. The
conventional MOSFET exhibits short channel effects (SCE) and performance degradation when scaled down in
the nanometer regime. In order to meet the required enhanced performance and to further increase the device
density new materials and new device structures have been developed. This paper analyses the performance
characteristics of one of such improved device structure i.e Fully Depleted Silicon over Insulator (FDSOI) which
also incorporate the gate having two metals of different work function specifically called Dual Material Gate
(DMG) SOI MOSFET. The analytical modeling for this device structure has also been carried out. The
simulation characteristics match closely with analytical results and as the surface potential profile of the device
has step function in ensures that this device effectively reduces the SCE.

Keywords: DIBL, DMG, Ion/Ioff, SCE, SOI, TCAD.


2946-
509. 29
References:
50
1. Kuo J. and Lin S. C., “Low Voltage SOI CMOS VLSI Device and Circuit. John Wiley & Sons, 2004.
2. Jean Pierre Colinge,“Silicon On Insulator: Material to VLSI,” Kluewr Academic Publication,2004.
3. Shubham Sahay and Mamidala Jagadesh Kumar, “Junctionless Field Effect Transistors; Design, Modeling, and Simulation” John
Wiley & Sons, 2019.
4. Long W. et. al., “Dual material gate Field Effect Transistor,” IEEE Transaction on Electron Devices, Vol. 46, pp. 865-870, 1999.
5. Reddy G. and Kumar Mamidala J., “A new dual material double gate (DMDG) SOI MOSFET for nanoscale CMOS design,”
International Semiconductor Device Research Symposium, 2003.
6. A.Chaudhary and Mamidala J. Kumar, "Controlling Short channel Effects in Deep Submicron SOI MOSFETs for Improve Reliability;
A Review", IEEE Transaction on Device and Materials Reliability, Vol.4, pp.99-109, 2004.
7. Jin H..D.et. al “Modeling of Surrounding Gate MOSFET with Bulk Trap States”, IEEE Trans. Electron Devices, Vol. 54, pp. 166-
169, January 2007.
8. A.Bhattacharyya, “Compact MOSFET Models for VLSI Design”. John Wiley & Sons. 2009.
9. Shrikan B., Rana A., “Performance Analysis of Fully-Depleted Dual-Material Gate (DMG) SOI MOSFET at 25nm Technology”,
IJRET, Vol. 3, pp. 21-28, May 2014.
10. Prashant Kumar, Munish Vashishath, Bansal PK. “Comparative Analysis of FD-DMDG SON MOSFET over FD DMDG SOI
MOSFET” Journal of Electronic Design Technology, 9(1), 2018, pp. 9–16
11. Gupta S.K. and Baishya S., “Design Considerations of Electrically Induced Source Drain Junction SOI MOSFETs for the Reduced
Short Channel and Hot Carrier Effects”, IJCEE, Vol. 3[6], pp. 869-872, 2011.
12. Ranka D. et. al, “Performance Analysis of FDSOI MOSFETs with Different Gate Spacer Dielectric,” IJCA, Vol. 18(5). pp. 22–27,
2011.
13. H.Song et al., “Investigation of Positive Bias Temperature Instability Characteristics of Fully-Depleted Silicon-on-Insulator
Tunneling-Field-Effect-Transistor with High-k Dielectric Gate Stacks,” Journal of Nanoscience and. Nanotechnology,Vol. 19(10), pp.
6131–6134, 2019.
14. Zing Yong et.al, “Flip chip integrated silicon Mach Zehnder modulator with a 28nm fully depleted silicon on insulator CMOS driver,”
Optical Express, Vol. 25(6), pp. 6112–6121, 2017.
15. Y.Xiong et al., “Electrical Properties of Ultrathin Hf-Ti-O Higher k Gate Dielectric Films and Their Application in ET-SOI
MOSFETs,” Nanoscale Res. Letters, Vol. 11(1), pp. 533-547, 2016.
16. Darwin S. and Samuel T., “A Holistic Approach on Junction-less Dual Material Double Gate (DMDG) MOSFET with High-k Gate
Stack for Low Power Digital Applications”, Silicon. 2019.
17. P.Banerjee, A.Sarkar, and S.Sarkar, “Exploring the short channel characteristics and performance analysis of DMDG-SON-
MOSFET,” Microelectronics Journal, Vol. 6, pp.50– 56,2017.
18. S.Kumar et. al,"Device linearity and intermodulation distortion comparison of dual material gate and conventional AlGaN/ GaN high
electron mobility transistor", Microelectronics Reliability,Vol. 51[3], pp. 587-596, 2011.
19. A. Priya, N.Srivastava, and R.Mishra, “Perspective of Buried Oxide Thickness Variation on Triple Metal Gate (TMG) Recessed-S/D
FDSOI MOSFET,” Advances in Electrical and Electronic Engineering, Vol. 16( 3). 2018.
20. E. Garcia Cordero et al., “Three Dimensional Integrated Ultra Low Volume Passive Microfluidics with Ion Sensitive Field Effect
Transistors for Multiparameter Wearable Sweat Analyzers,” ACS Nanosci, Vol. 12(12), pp. 12646–12656, 2018.
21. Santunu Sarangi et al,"A Rigorous Simulation Based Study of Gate Misalignment Effects in Gate Engineered doublegate (DG)
MOSFETs", Superlatt. and Microstru., Vol. 60, pp 263-269, 2013.
22. S.Shee et al, “Threshold voltage roll off and DIBL model for DMDG SON MOSFET; A quantum study,” Proc. Student IEEE
Symposium. 2014.
23. Prashant Kumar, Munish Vashistath, Bansal PK. “Study of Scaling of MOSFET on Various Electrical Characteristics using Silvaco
TCAD Tool” Journal of Semiconductor Devices and Circuits, 5(1), pp.11–19. 2018.
24. K. Chen, G. Zhang, and X. Zheng, “A subthreshold swing model for FD SOI MOSFET with vertical Gaussian profile,” 2011
International Semiconductor Device Research Symposium (ISDRS). 2011.
25. S.Shee et. al,“Quantum confinement effects in the subthreshold characteristics of shortchannel DM DG MOSFET,” Proceedings of the
2014 International Conference on Control, Instrumentation, Energy, and Communication (CIEC). 2014.

Authors: Simrat Tuteja, Anukool Manish Hyde, Rashmi Somani


An Empirical Analysis on Information Technology Adaptation in Nationalized and Private Sector
Paper Title:
Banks
Abstract: Information technology adaptation in banking system is essential for facing challenges with
competitors, smooth running and to meet requirement of the target customers by providing them best and fast
services expected by them. Hence the objective of present research is to compare the adaptation of information
technology in Nationalized and Private sector banks. This paper assesses the use of Information Technology and
its services in Nationalized and Private banks. The present study was conducted in Nationalized and Private
sector banks of Indore (M.P) division. While selecting the bank branch, care was taken to check whether that
bank is using Information Technology for providing services to customers. The study shows that there is no
major difference in level of Information Technology Adaptation, but Nationalized banks does not provide proper
technical assistance and training programs as compared to Private banks. Data was collected from 298
employees of Nationalized and Private Banks from Indore division. T-test was used for data analysis.

Keywords: Information Technology, competitors, Nationalized Banks, Private Banks.

References:

1. Barnes SJ (2003) Mobile banking: concept and potential. International Journal of Mobile Communications 1: 273-288.
2. Casolaro, L., & Gobbi, G. (2007). Impact of information technology and productivity changes in the banking industry economic notes.
3. Cheah CM, Teo AC, Sim JJ, Oon KH, Tan BI (2011) Factors affecting Malaysian mobile banking adoption: an empirical analysis.
International Journal of Network and Mobile Technologies.
4. Cruz P, Neto LBF, Munoz-Gallego P, Laukkanen T (2010) Mobile banking rollout in emerging markets: Evidence from Brazil. 2951-
510. International Journal of Bank Marketing 28: 342-371. 29
5. Kleijnen M, De Ruyter K, Wetzels M (2007) An assessment of value creation in mobile service delivery and the moderating role of
time consciousness. Journal of Retailing 83: 33-46. 56
6. Kozak, S. (2005), The role of information technology in the profit and cost efficiency improvementsof the banking sector, Journal of
Academy of Business and Economics, February 1, 2005.
7. Luarn P, Lin HH (2005) Toward an understanding of the behavioral intention to use mobile banking. Computers I Human Behavior 21:
873-891.
8. Laukkanen T (2007) Internet vs. mobile banking: comparing customer value perceptions. Business Process Management Journal 13:
788-797.
9. Mahdi, S. & Mehrdad, A. (2010). E-Banking in Emerging Economy: Empirical Evidence of Iran, International Journal of Economics
and Finance, 2(1), 201-209
10. Panetta, K. (2016). Gartner’s Top 10 Strategic Technology Trends for 2017: Artificial Intelligence, Machine Learning, and Smart
Things Promise an Intelligent Future. (Available at 〈http://www.gartner.com/smarterwithgartner/gartners-top-10-technology-trends-
2017/〉).
11. To, P.-L., Liao, C., Chiang, J. C., Shih, M.-L., & Chang, C.-Y. (2008). An empirical investigation of the factors affecting the adoption
of instant messaging in organizations. Computer Standards & Interfaces, 30(3), 148-156.
12. Sulaiman A, Jaafar NI, Mohezar S (2007) An overview of mobile banking adoption among the urban community. International Journal
of Mobile Communications 5: 157-168.
13. Venkatesh, V., Morris, M.G., Davis, G.B. & Davis, F.D. (2003). User acceptance of information technology: Towards a unified view.
MIS Quarterly, 27(3), 425-478.
14. Yang AS (2009) Exploring adoption difficulties in mobile banking services. Canadian Journal of Administrative Sciences 26: 136-149.
15. Zhou T, Lu Y, Wang B (2010) Integrating TTF and UTAUT to explain mobile banking user adoption. Computers in Human Behavior
26: 760-767.

Authors: Nitin Singh Chauhan, Ashutosh Saxena, J.V.R. Murthy

Paper Title: Measuring Security for Applications Hosted in Cloud


Abstract: Despite the numerous benefits of cloud computing, concerns around security, trust and privacy are
holding back the cloud adoption. Lack of visibility and tangible measurement of the security posture of any
cloud hosted application is a disadvantage to cloud service customers. Decision to migrate workloads on the
Cloud requires thoughtful analysis about security implications and ability to measure the security controls after
hosting. In this paper, we propose a framework to quantitatively measure different aspects of information
security for Cloud applications. This framework has a system through which we can define applications specific
controls, gather information on control implementation, calculate the security levels for applications and present
them to stakeholders through dashboards. Framework also includes detailed method to quantify the security of a
Cloud application considering different aspects of security, control criticalities, stakeholder responsibilities and
cloud service models. System and method provide visibility to Cloud customer on the security posture of their
cloud hosted applications.

Keywords: Cloud, Security, Authentication, Privacy, Security Metrics.

References:

1. Ristenpart, T., Tromer, E., Shacham, H. and Savage, S., 2009, November. Hey, you, get off of my cloud: exploring information leakage
in third-party compute clouds. In Proceedings of the 16th ACM conference on Computer and communications security (pp. 199-212).
ACM
511. 2. Hallappanavar, V.L. and Birje, M.N., 2019. Trust Management in Cloud Computing. In Cloud Security: Concepts, Methodologies, 2957-
Tools, and Applications (pp. 1686-1711). IGI Global.
3. Jelen, G., 2000, June. SSE-CMM security metrics. In NIST and CSSPAB Workshop. 29
4. Hale, M.L. and Gamble, R., 2012, June. Secagreement: Advancing security risk calculations in cloud services. In Services (SERVICES), 63
2012 IEEE Eighth World Congress on (pp. 133-140). IEEE
5. Dasgupta, D. and Rahman, M.M., 2011, October. Estimating security coverage for cloud services. In Privacy, Security, Risk and Trust
(PASSAT) and 2011 IEEE Third Inernational Conference on Social Computing (SocialCom), 2011 IEEE Third International Conference
on (pp. 1064-1071). IEEE.
6. Saripalli, P. and Walters, B., 2010, July. Quirc: A quantitative impact and risk assessment framework for cloud security. In Cloud
Computing (CLOUD), 2010 IEEE 3rd International Conference on (pp. 280-288). IEEE.
7. Jouini, M., Aissa, A.B., Rabai, L.B.A. and Mili, A., 2012. Towards quantitative measures of Information Security: A Cloud Computing
case study. International Journal of Cyber-Security and Digital Forensics (IJCSDF), 1(3), pp.248-262.
8. Trimintzios, P., 2011. Survey on Resilience Metrics. European Network and Information Security Agency (ENISA).
9. Grobauer, B., Walloschek, T. and Stocker, E., 2011. Understanding cloud computing vulnerabilities. IEEE Security & Privacy, 9(2),
pp.50-57.
10. Savola, R.M., 2007, October. Towards a taxonomy for information security metrics. In Proceedings of the 2007 ACM workshop on
Quality of protection (pp. 28-30). ACM.
11. Trapero, R., Modic, J., Stopar, M., Taha, A. and Suri, N., 2016. A novel approach to manage cloud security SLA incidents. Future
Generation Computer Systems.
12. Cloud controls matrix v3.0.1 (10-6-16 update): Cloud security alliance (2009) Available at:
https://cloudsecurityalliance.org/download/cloud-controls-matrix-v3-0-1/ (Accessed: 3 March 2017).
13. de Vaulx, F.J., Simmon, E.D. and Bohn, R.B., 2018. Cloud computing service metrics description (No. Special Publication (NIST SP)-
500-307).
14. Rizvi, S., Ryoo, J., Kissell, J., Aiken, W. and Liu, Y., 2018. A security evaluation framework for cloud security auditing. The Journal of
Supercomputing, 74(11), pp.5774-5796.
15. Hsien, W.F., Yang, C.C. and Hwang, M.S., 2016. A Survey of Public Auditing for Secure Data Storage in Cloud Computing. IJ Network
Security, 18(1), pp.133-142.
Authors: Kunal Khosla, Apurva Naik
Measurement of Bone Density Parameters using Ultrasound and Hardware Development on bone
Paper Title:
Density Measurement
Abstract: Ultrasound waves due to their inherent small wave- length can be used in diagnosis or evaluation of
tissue. Ultrasound simulations can be useful to investigate and analyze different properties at different sites
512. especially when there is no volumetric data available. In the proposed paper, simulation of ultrasound in a 2-D
2964-
bone model and hardware implementation has been presented. Due to complex structures of bone, a simple
29
linear model consisting of both cortical and cancellous bone has been proposed. In the simulation, a broadband
67
emitter with center frequency of 1 Megahertz is used along with an array of receivers to capture the signal. An
attempt has been made to calculate bone density parameters in-vivo for human feet, and finally display the
computed parameters onto a LCD using Arduino Uno Board. An algorithm involving fourier transforms was
used to calculate Broadband Ultrasound Attenuation (BUA) and Speed of Sound (SoS) in Matrix Laboratory
(MATLAB).

Keywords: Broadband ultrasound attenuation, speed of sound, simsonic, matrix laboratory, osteoporosis,
osteopenia, quantitative ultrasound.

References:

1. Bossy, Emmanuel and Grimal, Quentin: Numerical Methods for Ultrasonic Bone Characterization. In: Bone Quantitative Ultrasound,
Springer Netherlands, 181–228, 2011.
2. Ha¨ıat, Guillaume and Padilla, Fr´ed´eric and Peyrin, Franc¸oise and Laugier, Pascal: Variation of Ultrasonic Parameters with
Microstructure and Material Properties of Trabecular Bone: A 3D Model Simulation.In: Journal of Bone and Mineral Research, 665–
674, 2007.
3. Biot,M. A. : Theory of Propagation of Elastic Waves in a Fluid-Saturated Porous Solid. I. Low-Frequency Range. In: The Journal of
the Acoustical Society of America, 168–178, 1956.
4. Biot,M. A. : Theory of Propagation of Elastic Waves in a Fluid-Saturated Porous Solid. II. Higher Frequency Range. In: The Journal of
the Acoustical Society of America, 179-191, 1956.
5. Ayg¨un,Haydar and Attenborough,Keith and Postema,Michiel and Lauriks, Walter and Langton, Christian M.: Predictions of angle
dependent tortuosity and elasticity effects on sound propagation in cancellous bone. In: The Journal of the Acoustical Society of
America, 3286-3290, 2009.
6. P. Laugier and P. Droin and A.M. Laval-Jeantet and G. Berger: In vitro assessment of the relationship between acoustic properties and
bone mass density of the calcaneus by comparison of ultrasound parametric imaging and quantitative computed tomography. In: Bone,
157–165,1997.
7. T.HarnroongrojS, JiamamornratT and Tharmviboonsri: Characteristics of anterior inferior calcaneal cortex. In: Foot and Ankle
Surgery, 1–4, 2017.
8. Barker R.: Non-Invasively Assessed Skeletal Bone Status and its Relationship to the Biomechanical Properties and Condition of
Cancellous Bone. Cranfield University (2006).
9. Bossy et al, www.simsonic.fr, JASA 115, 2314–2324, 2004.

Authors: Anudeep Gandam, Jagroop Singh Sidhu

Paper Title: A Post-Processing Algorithm for Spatial Domain Detection & Removal of Alocking Artifacts
Abstract: Block based Discrete Cosine Transform (BDCT) is commonly used to detect and remove blocking
artifacts in the compressed images. We proposed spatial domain post processing algorithm with four fold model.
In the initial stage, pixel vector (PV) is calculated for horizontal as well as vertical block boundaries, after
defining PV calculation of different threshold values is made for extracting blocking artifacts. These thresholds
are basically adaptive to the image quality due to strong correlation with the PV. To avoid ringing artifacts
across block edges directional filter is proposed. Our research further worked on region classification based upon
activity of PV within the blocks. Based upon different PV activity regions separate filters are used to achieve
best filtering and finally Symmetrical Pixel Normalization filter (SPN Filter) is used to normalize the values of
symmetrical pixel value for better visual performance . Proposed technique various indices like PSNR, MSSIM,
GBIM are calculated and compare with different post processing techniques used in literature.

Keywords: BDCT, blocking artifacts, GBIM, PSNRB, SPNF.

References:

1. Wallace GK. The JPEG still-picture compression standard. Commun ACM 1991;34:30–44.
2. Mitcheel JL, Pennebaker WB, Fogg CE, Legall DJ. MPEG video compression standard. New York: Chapman & Hall; 1997.
3. ITU Recommendations H.261. Video Code for Audio Visual Service at p x 64 k bits/sec; 1993.
4. Reeve HC, Lim JS. Reduction of blocking effects in image coding. Opt Eng 1984;23:34–7.
513. 5. D.-K. Kwon, M.-Y. Shen, C.-C.J. Kuo, An improved adaptive deblocking filter for MPEG video decoder, Proc. SPIE 5685 (Jan. 2005)
702. 2968-
6. J. Xu, S. Zheng, X. Yang, Adaptive video-blocking artifact removal in Discrete Hadamard Transform domain, Opt. Eng. 45 (8) (Aug. 29
2006) 080501.
7. G. Zhai, W. Zhang, X. Yang, Image deblocking based on multi-scale edge representation, Proc. SPIE 6043 (Mar. 2005) 60430F
77
8. Yang Y, Galatsanos NP, Katsaggelos AK. Regularized reconstruction to reduce blocking artifacts of block Discrete Cosine Transform
compressed images. IEEE Trans Circ Syst Video Technol 1993;3:421–32.
9. Paek H, Kim R-C, Lee SU. A DCT-based spatially adaptive post processing technique to reduce the blocking artifacts in Transform
coded images. IEEE Trans Circ Syst Video Technol 2000;10:36–41.
10. D. Youla, H. Webb, Image restoration by the method of convex projections: part 1—theory, IEEE Trans. Med. Imaging 1 (2) (Oct.
1982) 81–94.
11. S. Liu, A.C. Bovik, Efficient DCT-domain blind measurement and reduction of blocking artifacts, IEEE Trans. Circuits Syst. Video
Technol. 12 (2002) 1139–1149.
12. Y. Luo, R.K. Ward, Removing the blocking artifacts of block-based DCT compressed images, IEEE Trans. Image Process. 12 (7) (Jul.
2003) 838–842
13. Singh S, Kumar V, Verma HK. Reduction of blocking artifacts in JPEG compressed Images. Digit Signal Process 2007;17:225–43.
14. Jin Wang, Zhensen Wu, Gwanggil Jeon, Jechang Jeong, An efficient spatial deblocking of images with DCT compression, Digital
Signal Processing, Volume 42, 2015, Pages 80-88, ISSN 1051-2004, http://dx.doi.org/10.1016/j.dsp.2015.03.009.
15. J.J. Zou, H. Yan, A deblocking method for BDCT compressed images based on adaptive projections, IEEE Trans. Circuits Syst. Video
Technol. 15 (3) (Mar. 2005) 430–435.
16. C. Wang, P. Xue, W. Lin, W. Zhang, S. Yu, Fast edge-preserved postprocessing for compressed image, IEEE Trans. Circuits Syst.
Video Technol. 16
17. D. Youla, Generalized image restoration by the method of alternating orthogonal projections, IEEE Trans. Circuits Syst. 25 (9) (Sep.
1978) 694–702.
18. Jagroop Singh, Sukhwinder Singh, Dilbag Singh, Moin Uddin, A signal adaptive filter for blocking effect reduction of JPEG
compressed images, AEU - International Journal of Electronics and Communications, Volume 65, Issue 10, 2011, Pages 827-839,
ISSN 1434-8411,
19. Lee YL, Kim HC, Park HW. Blocking effect reduction of JPEG images by signal adaptive filtering. IEEE Trans Image Process
1998;7:229–34.
20. J. Jin, R. Gu, J. Yuan, A novel image deblocking method based on curvelet trans-form, in: Proc. ICNC, 2011, pp.1800–1804.
21. Jin Wang, Zhensen Wu, Gwanggil Jeon, Jechang Jeong, An efficient spatial deblocking of images with DCT compression, Digital
Signal Processing, Volume 42, 2015, Pages 80-88, ISSN 1051-2004.

Authors: D. Jasmine Priskilla, K. Arulanandam

Paper Title: A Backward Single Source Shortest Path Algorithm For Directed Graph
Abstract: A new directed backward variant of the Single Source Shortest Path algorithm was described in
this paper. This algorithm accept that approaching adjacency list of the given graph vertex loads showed up in
expanding request. The running time of forward, based strategy algorithm is the best aftereffect of O (n), which
are the most ideal forward-backward SSSP consequences of Wilson et al. Moreover, the likelihood of the new
algorithm additionally requires O (n) time.This is an equally improved version of exponentially and polynomial
small probability derived by Wilson et al.

Keywords: shortest path, backward algorithm, directed graph, directed backward algorithm.
2978-
References: 29
514. 81
1. E. W. Dijkstra. “A note on two problems in connexion with graphs”,1959, pp. 269-271.
2. Mikkel Thorup. “Undirected single-source shortest paths with positive integer weights in linear time”, J. ACM, 1999, pp.362-394.
3. Tadao Takaoka and Alistair Moffat. “An O(n2log n log log n) expected time algorithm for the all shortest distance problem”. In
Mathematical foundations of computer science, 1980 (Proc. Ninth Sympos., Rydzyna, 1980), volume 88 of Lecture Notes in Comput.
Sci., Springer, Berlin, 1980, pp. 643-655.
4. Peter A. Bloniarz. “A shortest-path algorithm with expected time O(n2log n log*n)”, 1983, pp.588-600.
5. P. M. Spira. “A new algorithm for finding all shortest paths in a graph of positive arcs in average time O(n2log2n)”, 1973, pp. 28-32.
6. David B.Wilson and Uri Zwick.” A forward-backward single-source shortest paths algorithm”, IEEE 54th Annual Symposium on
Foundations of Computer Science, 2013, pp.707-716.
7. J.W.J. Williams. Algorithm 232: Heapsort. Communications of the ACM, 1964, pp.347-348.
Authors: Gayathry G, Thirumalaiselvi R

Paper Title: Full Stack Software Development and Multi Aspect Testing
Abstract: Various statistical methods are used to estimate software reliability, to gain accuracy in software
reliability prediction the data sets from the software testing results must be in detail and enormous in size.
Existing papers have been acquired the reliability with a limited number of datasets, that too acquired from
existing templates. This work attempts to create two layers of software design and testing methods to acquire a
real-time error dataset. The first one is single system software design and second one is multiuser server-based
testing. Using these two types of software design and by employing automatic data testing using Brute force
algorithm, dynamic error occurrences of the datasets with time period will be acquired and tabulated, based on
the error results. Instead of predicting the accuracy alone, the proposed work will also predict the possible
reasons for the error occurrence scenario and tries to provide an optimal solution, using these types of vigorous
testing and solutions, various aspects of the software can be measured like user traffic handling capability,
possibility of input error combinations etc. For designing purpose, two different type of software one is java for
desktop application and another one is python language for multiuser activity will be used to give different
515. flavors in testing results. 2982-
29
Keywords: client, pattern generator, reliability, server. 84
References:

1. IEEE. IEEE Standard Glossary of Software Engineering Terminology. Number STD 610.12-1990. IEEE, 1990.
2. Xue, M. and Zhu, C., “The Socket Programming and Software Design for Communication Based on Client/Server”,” 2009 Pacific-Asia
Conference on Circuits, Communications and Systems, pp. 774-777, 2009
3. IDG Communications (2017). Sockets Programming in Java World from IDG. [Online]. Available at: https://www.javaworld.com /
article / 2077322/core-java/core-java-sockets-programming-in-java-atutorial.html[Accessed 17-July-2017]
4. Z. Yuqing, W. Wu, D. Li, “Efficient Client Assignment for ClientServer Systems”, IEEE Transactions on Network and Service
Management, Vol. 13 Issue 4, pp. 835-847, August 2016.
5. Brian K. Williams and Stacey C. Sawyer. Using Information Technology: A Practical Introduction To Computers & Communications.
McGraw-Hill Irwin, Montreal, 2003
6. http://www.mysql.com
7. http://www.javaworld.com
8. APTECH Team (2005): Java Simplified – 1. Aptech Limited, Mumbai, India.
Authors: Uganya G, Sudhan M.B, Shijin Kumar P.S

Paper Title: License Plate Recognition with Feature Salience and Neural Network
Abstract: Hough Transform, Feature Salience, Histogram Projection, Back Propagation Neural Network,
License Plate Recognition.

Keywords: Hough Transform, Feature Salience, Histogram Projection, Back Propagation Neural Network,
License Plate Recognition.
References:

1. C. Anagnostopoulos, I. Anagnostopoulos, I. Psoroulas, V. Loumos, E. Kayafas, License plate recognition from still images and video
sequences: a survey, IEEE Transactions on Intelligent Transportation Systems 9 (3) (2008) 377-391.
2. Salau, A. O., Yesufu, T. K., & Ogundare, B. S. (2019). Vehicle plate number localization using a modified grabcut algorithm. Journal
of King Saud University-Computer and Information Sciences.
3. Al-Hmouz, R., & Aboura, K. (2014). License plate localization using a statistical analysis of Discrete Fourier Transform signal.
Computers & Electrical Engineering, 40(3), 982-992.
4. Asif, M. R., Chun, Q., Hussain, S., Fareed, M. S., & Khan, S. (2017). Multinational vehicle license plate detection in complex
516. backgrounds. Journal of Visual Communication and Image Representation, 46, 176-186.
5. Azam, S., & Islam, M. M. (2016). Automatic license plate detection in hazardous condition. Journal of Visual Communication and
2985-
Image Representation, 36, 172-186. 29
6. Li, H., Wang, P., You, M., & Shen, C. (2018). Reading car license plates using deep neural networks. Image and Vision Computing, 91
72, 14-23.
7. Safaei, A., Tang, H. L., & Sanei, S. (2016). Real-time search-free multiple license plate recognition via likelihood estimation of
saliency. Computers & Electrical Engineering, 56, 15-29.
8. Saini, M. K., & Saini, S. (2017S). Multiwavelet transform based license plate detection. Journal of Visual Communication and Image
Representation, 44, 128-138.
9. Wang, R., Sang, N., Huang, R., & Wang, Y. (2014). License plate detection using gradient information and cascade detectors. Optik,
125(1), 186-190.
10. Wang, Y., Ban, X., Chen, J., Hu, B., & Yang, X. (2015). License plate recognition based on SIFT feature. Optik, 126(21), 2895-2901.
11. Yu, S., Li, B., Zhang, Q., Liu, C., & Meng, M. Q. H. (2015). A novel license plate location method based on wavelet transform and
EMD analysis. Pattern Recognition, 48(1), 114-125.
12. Varun, R., Kini, Y. V., Manikantan, K., & Ramachandran, S. (2015). Face recognition using hough transform based feature extraction.
Procedia Computer Science, 46, 1491-1500.
13. Gonzalez .R.C, R.E .Woods ,"Digital Image Processing", 2nd Edition, Printice Hall, Englewood Cliffs , NY 2002.
14. Shijin Kumar P.S and Sudhan M.B. "A Hybrid Framework for Brain Tumor Detection and Classification using Neural Network"
ARPN Journal of Engineering and Applied Sciences 13(24) (2018): pp.9631-9636.
15. Shijin Kumar P.S and V. S. Dharun. "Combination of Fuzzy C-means Clustering and Texture Pattern Matrix for Brain MRI
Segmentation." Biomedical Research 28(5) (2017): pp.2046-2049.

Authors: Aparna V.Mote, Pratima Patil

Paper Title: E-commerce Sites with Outfit Composition using Deep Learning Method
Abstract: The fashion industry has developed in many fields and its growth is making an enormous promote in
article of clothing company and e-commerce entity. The difficult task for IT industry in this field is designing
the predictive system of data mining to model this. E-commerce uses electronic communication as well as
information technology in many transactions for creating, transforming or for redefining the relationships
between individuals and organizations. It simply means buying of products, services and information and selling
them through computer network. It is totally changing the traditional approach of business. The main change in
business is noticeable growth and it has many significant effects on environment as well. This is the reason why
it is so preferred in business nowadays. The important part of the proposed system is to rate the fashionable
outfit individual and it is considers appearances as well as meta-data. Our approach has first implemented a
system of encoding visual characteristics with the help of deep convolution network for complicated contents
because it is not possible to list or to label every attribute of a image. Secondly, we proposed a multi-model deep
learning framework for rich contexts of fashion outfit. We propose a system which will recommend with review
comments and which product should purchase and the system will display a rating of the product.
517.
2992-
Keywords: Convolutional neural Network, outfit product images, data mining.
29
94
References:

1. A.Veit, B.Kovacs, S. Bell, J.McAuley, K.Bala, and S. J. Belongie, “Learning visual clothing style with heterogeneous dyadic co-
occurrences,” ICCV, 2015.
2. M. H. Kiapour, X. Han, S. Lazebnik, A. C. Berg, and T. L. Berg, “Where to buy it: Matching street clothing photos in online shops,”
in ICCV, 2015, pp. 3343–3351.
3. K. Yamaguchi, M. H. Kiapour, L. E. Ortiz, and T. L. Berg, “Retrieving similar styles to parse clothing,” IEEE Trans. Pattern Anal.
Mach. Intell., vol. 37, no. 5, pp. 1028–1040, 2015.
4. S. Liu, Z. Song, G. Liu, C. Xu, H. Lu, and S. Yan, “Street-to-shop: Cross-scenario clothing retrieval via parts alignment and auxiliary
set,” in CVPR, 2012, pp. 3330–3337.
5. Aparna V. Mote, Pratima Patil, Tejaswini Mane, ’Information Retrieval in CBR using vertical association Knowledge and Shannon
Information Gain’, IEEE conf. on Information, Communication, Engineering and Technology, Aug. 2018.
6. S. Liu, J. Feng, Z. Song, T. Zhang, H. Lu, C. Xu, and S. Yan, “Hi, magic closet, tell me what to wear!” in ACM Multimedia, ser. MM
’12, 2012, pp. 619–628.
7. S. Bhat, K. Kansana, J.Majid,”A Review on E-commerce”, Asian Journal of Technology & Management Research, 2016
8. https://bbamantra.com/e-commerce-introduction/
9. H.Bulsara, P.Vaghela,” E-Commerce: Past, Present and Future - An Indian Perspective“, ICIE 2017.

Authors: Rakesh Kumar Donthi, Md. Tanwir Uddin Haider

Paper Title: Knowledge Based System using Ontology for Accessing Sentiments of Indian Railways Tweets
Abstract: The interactions in social networks like Twitter are reflecting sentiments of people at large.
Especially opinion mining has wherewithal to provide social feedback that complements traditional feedback for
making strategic decisions. The sentiments data is basically stored in the Relational Data Base. But the demerits
518.
of this data base is that it comes back with an answer at most once and it is very difficult to address complex 2995-
queries over the data, lagging inherent properties such as transitivity or symmetry. It also has closed world 30
assumption i.e., what is not known to be true in the data base is by default considered as false because 01
knowledge represented in the data base is assumed to be complete. To overcome all these demerits, we have
developed knowledge-based system using ontology, for accessing sentiments of Indian Railways tweets. Indian
Railways (IR) is very huge organization which consistently strives to improve its services from time to time. In
our prior work, a framework was proposed and implemented using sentiment analysis for Indian railways tweets.
The results were grouped into clusters based on five attributes pertaining to IR such as Cleanliness, Staff
Behaviour, Punctuality, Security and Timeliness. These clusters are being updated from time to time to reflect
up to date social feedback. However, the problem with the existing system is that, its accessibility and ease of
use to stakeholders is not easy. So, we proposed a knowledge based system which will represent clusters for a
universal and interoperable data representation that is from database to RDF schema to ontology and apply
inference rules and query using SPARQL. This system is accessible to humans and also programs in
heterogeneous Machine-to-Machine (M2M) environments. We proposed a methodology to achieve this and the
knowledge is made available for further processing and stakeholders can access. The proposed system is
evaluated with a prototype application and found to be useful and flexible.

Keywords: Indian Railways, Knowledge Based System, Sentiment Analysis, Ontology, RDF.

References:

1. Anmol Rai Gupta and L. Shalini. (2013). Improvisation of Experience of Indian Railways using Sentimental Analysis. International
Journal of Computer Applications. 66 (11), p1-3.
2. EfstratiosKontopoulos, Christos Berberidis, TheologosDergiades and Nick Bassiliades. (2013). Ontology-based sentiment analysis of
twitter posts. Elsevier, p4065–4074.
3. DamianBorth, Tao Chen, Rong-Rong Ji and Shih-Fu Chang. (2015). SentiBank Large-Scale Ontology and Classifiers for Detecting
Sentiment and Emotions in Visual Content. ACM, p1- 2.
4. K. M. Sam and C. R. Chatwin. (2013). Ontology-Based Sentiment Analysis Model of Customer Reviews for Electronic
Products. International Journal of e-Education, e-Business, e-Management and e-Learning. 3 (6), p1- 6.
5. UganYasavur, Reza Amini, Christine Lisetti and NapthaliRishe. (2013). Ontology-Based Named Entity Recognizer for Behavioral
Health. International Florida Artificial Intelligence Research Society Conference, p1- 6.
6. EfstratiosKontopoulos, Christos Berberidis, TheologosDergiades and Nick Bassiliades. (2013). Ontology-based sentiment analysis of
twitter posts. Elsevier, p4065–4074.
7. PratikThakora and Dr. SreelaSasib. (2015). Ontology-based Sentiment Analysis Process for Social Media Content. Elsevier. 53, p199–
207.
8. Lina Zhou and PimwadeeChaovalit. (2007). Ontology-Supported Polarity Mining. JOURNAL OF THE AMERICAN SOCIETY FOR
INFORMATION SCIENCE AND TECHNOLOGY. 59 (1), p98–110.
9. JantimaPolpinij and Aditya K. Ghose. (2008). An Ontology-based Sentiment Classification Methodology for Online Consumer
Reviews. IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, p1-7.
10. Liviu-Adrian Cotfas, CameliaDelcea, IoanRoxin and Ramona Paun. (2015). Twitter Ontology-Driven Sentiment Analysis. Springer,
p1-9.
11. IonSmeureanu, AndreeaDioşteanu, CameliaDelcea and LiviuCotfas. (2011). BUSINESS ONTOLOGY FOR EVALUATING
CORPORATE SOCIAL RESPONSIBILITY. 28 Amfiteatru Economic. 13 (29), p1- 15.
12. MichalPtaszynski, RafalRzepka, Kenji Araki and Yoshio Momouchi. (2014). A Robust Ontology of Emotion Objects, p1- 6.
13. Gopi A. Patel and NidhiMadia. (2016). A Survey Ontology Based Information Retrieval for Sentiment Analysis. International Journal
of Scientific Research in Science, Engineering and Technology. 2 (2), p460-465.
14. Xiang Ji, Soon Ae Chun and James Geller. (2016). Knowledge-Based Tweet Classification for Disease Sentiment Monitoring, p1- 31.
15. Ankita and NabizathSaleenaa. (2018). An Ensemble Classification System for Twitter Sentiment Analysis. Elsevier, p937–946.
16. Robert Arp, Barry Smith and Andrew D. Spear (2015). Building Ontologies with Basic Formal Ontology. London: The MIT Press. p1-
245.
17. Barry Smith (2015). Basic Formal Ontology 2.0 SPECIFICATION AND USER’S GUIDE, p1-103.
18. FatenKharbat and Haya El-Ghalayini. (2010). Building Ontology from Knowledge Base Systems, p1- 15.
19. Dr John Easton (2017). DATA INT EGRAT ION IN THE RAI L DOMAIN, p1-181.
20. Jing Mei, Li Ma and Yue Pan. (2012). Ontology Query Answering on Databases, p1-14.
21. Zhijun Zhang and John.A. Miller. (2010). Ontology Query Languages for the Semantic Web a Performance Evaluation, p1- 34.
22. Magdalena Ortiz. (2014). Ontology Based Query Answering the Story So Far, p1-14.
23. Robert Arp and Barry Smith. (2015). Realizable Entities in Basic Formal Ontology, p1- 8.
24. Rakesh Kumar Donthi, Md. Tanwir Uddin Haider. (2019). A Blend Ensemble Classifier for Sentiment Decision Making in Indian
Railways Tweets, Journal of Advanced Research in Dynamical & Control Systems, Vol.11, no.2, p145-163.
Alexander Valerievich Nikitin, Svetlana Nikolaevna Trunova, Victoria Aleksandrovna
Authors:
Voropaeva
The Assessment of the Effectiveness of the Implementation of Scenarios for the Sustainable
Paper Title:
Development of Agriculture
Abstract: In the following article, the advantage of the scenario analysis of the development of agriculture at
assessment of effective management of its sustainable development, taking into account realization of possible
strategic objectives is disclosed. Comparative characteristic of three scenarios of development of agriculture is
given. Their differences are specified. The system of indicators that allows determining the effect of the complex
processes of use of natural and production resources on effectiveness of management of sustainable development
of agriculture is characterized. Its perspective growth parameters in the sectoral context are analyzed. The
conclusion is drawn that the effective scenario at which the Russian agrarian economic policy has to be aimed is
519. optimistic. It is this vector of effective management, which can ensure the achievement of strategic landmarks 3002-
for the development of the agro-industrial complex for a ten-year perspective. 30
05
Keywords: scenario analysis, agriculture, sustainable development, management effectiveness.

References:

1. S.N. Trunova, A.A. Ananskih. Metodologicheskie aspekty strategicheskogo upravleniya selskim hozyajstvom dlya ustojchivogo rosta
proizvodstva selskohozyajstvennoj produkcii i ego effektivnosti. Materials of the XXIII All-Russian Scientific and Practical
Conference of Young Scientists of Post-Graduate Students and Students Youth Science 2013: Technology and Innovation 11 - 15
March. Perm State Agricultural Technological Fund, 2013, p. 413.
2. I.P. Shalyapina, S.N. Trunova. Strategiya upravleniya razvitiem agrarnogo proizvodstva: konceptualnye podhody (collective
monograph). Michurinsk, 2013.
3. I.P. Shalyapina, S.N. Trunova. Metodologiya ocenki i prognozirovaniya ustojchivogo razvitiya agrarnogo proizvodstva (collective
monograph). Michurinsk, 2012.
4. S.N. Trunova, I.A. Trunov. Formirovanie chelovecheskogo kapitala v agrarnom proizvodstve. Scientific works of the Michurinsk state
agrarian University, issue 1, volume 3: Economics/ed. by V. A. Babushkin. Michurinsk: publishing house of the Michurinsk SAU,
2017
5. S.N. Trunova, I.A. Trunov. Konceptualnye osobennosti strategicheskogo upravleniya selskim hozyajstvom. Materials of the VIII
International Scientific and Practical Conference "Actual Issues of Economics and Agribusiness" March 17, 2017. FSEI HE Bryansk
State University
6. S.N. Trunova. Metodicheskij podhod k ocenke effektivnosti upravleniya ustojchivym razvitiem hozyajstvuyushhih subektov agrarnogo
sektora ekonomiki. Materials of the Russian correspondence scientific-practical conference (with international participation) "Business.
Science. Education: problems. Prospects. Strategies" May 26, 2015 Vologda Institute of Business Vologda.
7. S.N. Trunova. Kompleksnaya metodika ocenki effektivnosti strategicheskogo upravleniya razvitiem selskohozyajstvennoj
organizacii . "Technologies of food and processing industry of AIC - healthy food products" Association Technologies of food and
processing industry of AIC - healthy food products, Voronezh, 2015, No 2.
8. I.P.Shalyapina, S.N. Trunova et al. Ustojchivoe razvitie agrarnogo proizvodstva: metodologicheskie podhody k ocenke i
prognozirovaniyu (collective monograph). Moscow, 2013.

Authors: V. S. Jagadale, S. N. Padhi

Paper Title: Mechanical Behavior of Coir Fiber Reinforced Epoxy Composites with Variable Fiber Lengths
Abstract: Most studies on the application of natural fibers as reinforcement in polymer composites are
growing as a result of the changes in characteristics that fibers can provide for the product. This can be achieved
by manufacturing of composites using Hand Layup process. The 2% NaOH fiber treatment was performed to
improve fiber-matrix interfaces making spathe- fibre-reinforced composites better mechanical characteristics.
Filler loadings as 5% by volume of coir fiber are selected as reinforcement in composites. The varying lengths of
fiber chosen as 5mm, 10mm & 15mm and resin-hardner ratio are maintained as 10:0.8. A total 3 numbers of
plates with volume as 300 х 300 х 4 mm3 were produced and specimens as per the various ASTM standard were
tested to determine the ultimate various Mechanical properties for different configuration. The strength of epoxy
resin / coir fiber composites was noticed at a maximum 15 mm (15.27 N / mm2) fiber length. The maximum
impact strength of the charpy was also 15 mm fiber length (9.87 kJ / m2).The Experimental results were
validated using a numerical method technique in FEA software. The obtained results by experimentation and
Finite Element Analysis are very much closer to each other. The results show good mechanical properties and
hint us as a replacement for conventional materials in industrial applications.

Keywords: FEA, Coir Fiber, Mechanical Properties, ASTM.

References:

520. 1. Rozman H.D., Tan K.W., Kumar R.N., Ishak Z.A.M., Ismail H., (2000). “The effect of Lignin as a Compatibilizer on the physical
properties of coconut fiber polypropylene Composites”, European polymer journal36, pp.1483 –1494 3006-
2. Rout, J., Misra, M., Tripathy, S. S., Nayak, S. K., & Mohanty, A. K. (2001).”The Influence of fibber treatment on the performance of 30
coir-polyester Composites”. Composites Science and Technology, 61(9), pp.1303-1310. 11
3. Laly A.Pothan, Zachariah Oommenb, and Thomas S, (2003). “Dynamic Mechanical Analysis of Banana Fiber Reinforced Polyester
Composites”, Composites Science and Technology, 63(2), pp. 283-293.
4. Monteiro S.N., Terrones L.A.H., D’Almeida J.R.M., (2008). “Mechanical performance of coir fiber/polyester composites Polymer
Testing” 27, pp. 591–595.2
5. Samal, S. K., Mohanty, S., & Nayak, S. K. (2009). “Polypropylene—Bamboo/Glass Fiber Hybrid Composites: Fabrication and
Analysis of Mechanical, Morphological Thermal, and Dynamic Mechanical Behavior. Journal of Reinforced Plastics and Composites”,
28(22), pp.2729-2747.
6. Reddy, E. V. S., Rajulu, A. V., Reddy, K. H., & Reddy, G. R. (2010). “Chemical Resistance and tensile properties of glass and
bamboo fibers reinforced polyester hybrid Composites”. Journal of Reinforced Plastics and Composites, 29(14), pp.2119-2123
7. Biswas, S., Kendo, S., & Patnaik, A. (2011). “Effect of fiber length on mechanical Behavior of coir fiber reinforced epoxy
composites”. Fibers and Polymers, 12(1).
8. Ayrilmis N., Jarusombutiv S., Fueangvivat V., Bauchongkol PlP., White R.H., (2011). “Coir Fiber Reinforced Polypropylene
Composite Panel for Automotive Interior Applications”, Fibers and Polymers 12(7), pp. 919-926
9. Romli, F. I., Alias, A. N., Rafie, A. S. M., & Majid, D. L. A. A. (2012). “Factorial Study on the Tensile Strength of a Coir Fiber-
Reinforced Epoxy Composite”. AASRIrocedia, 3, pp.242-247.
10. Sreenivasan, V. S., Ravindran, D., Manikandan, V., & Narayanasamy, R. (2012) “Influence of fiber treatments on mechanical
properties of short Sansevieria cylindrical Polyester composites”. Materials & Design, 37, pp.111-121.
11. Lu, T., Jiang, M., Jiang, Z., Hui, D., Wang, Z., & Zhou, Z. (2013). “Effect of surface Modification of bamboo cellulose fibers on
mechanical properties of cellulose/epoxy Composites”. Composites Part B: Engineering, 51, pp.28-34
12. Mishra, V., & Biswas, S. (2013).” Physical and Mechanical Properties of Bi- directional Jute Fiber Epoxy Composites Procedia
Engineering”, 51, pp.561-566.
13. Mir, S. S., Nafsin, N., Hassan, M., Hassan, N., & Hassan, A. (2013).” Improvement of Physical-mechanical properties of coir-
polypropylene bio composites by fiber chemical Treatment”. Materials & Design, 52, pp.251-257

Authors: C.N.Umadevi, N.P.Gopalan

Paper Title: Privacy Preserving Outsourced Calculations With Symmetric Fully Homomorphic Encryption
Abstract: Cloud computing is a new paradigm which provides cloud storage service to manage, maintain and
back up private data remotely. For privacy concerns the data is kept encrypted and made available to users on
521. demand through cloud service provider over the internet. The legacy encryption techniques rely on sharing of
3012-
keys, so service providers and end users of the cloud have exclusive rights on the data thus the secrecy may loss.
30
Homomorphic Encryption is a significant encryption technique which allows users to perform limited arithmetic
15
on the enciphered data without loss of privacy and security. This paper addresses a new simple and non-
bootstrappable Fully Homomorphic Encryption Scheme based on matrices as symmetric keys with access
control.
Keywords: Access Policy, Fibonacci P-Number, Fully Homomorphic Encryption, Smith Normal Form,
Semantic Secure.

References:

1. R.Rivest, A.Shamir and L.Adleman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of
the ACM, 21(2), pp. 120-126.
2. Gentry, A Fully Homomorphic Encryption Scheme, Dissertation, https://crypto.stanford.edu/Craig/Craig-thesis.
3. Pierre-Alain Fouque, Benjamin Hadjibeyli and Paul Kirchner, “Homomorphic Evaluation of Lattice-Based Symmetric Encryption
Schemes”, https://eprint.iacr.org/2019/653.pdf.
4. Gentry, Craig. (2009). Fully Homomorphic Encryption Using Ideal Lattices. Proceedings of the Annual ACM Symposium on Theory
of Computing. 9. 169-178. 10.1145/1536414.1536440.
5. T. Plantard, W. Susilo and Z. Zhang, "Fully Homomorphic Encryption Using Hidden Ideal Lattice", IEEE Transactions on Information
Forensics and Security, vol. 8, no. 12, pp. 2127-2137, Dec. 2013.
6. Gu, Chunsheng. (2011). Fully Homomorphic Encryption, Approximate Lattice Problem and LWE. IACR Cryptology ePrint Archive.
2011. 114. 10.11591/closer.v2i1.1339.
7. Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba. Packed Homomorphic Encryption Based
on Ideal Lattices and Its Application to Biometrics. 1st Cross Domain Conference and Workshop on Availability, Reliability, and
Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.55-74.
8. K. Hariss, M. Chamoun and A. E. Samhat, "On DGHV and BGV fully homomorphic encryption schemes," 2017 1st Cyber Security in
Networking Conference (CSNet), Rio de Janeiro, 2017, pp. 1-9.
9. T. Shen, F. Wang, K. Chen, K. Wang and B. Li, "Efficient Leveled (Multi) Identity-Based Fully Homomorphic Encryption Schemes,"
in IEEE Access, vol. 7, pp. 79299-79310, 2019.
10. W. Weili, H. Bin and Z. Xiufeng, "Identity-based leveled fully homomorphic encryption over ideal lattices," 2017 IEEE 2nd
International Conference on Big Data Analysis (ICBDA), Beijing, 2017, pp. 377-381.
11. M. Van Dijk, C. Gentry, S. Halevi and V.Vaikuntanathan, Fully homomorphic encryption over the integers, Proceedings of
EUROCRYPT-2010, Lecture Notes in Computer Science, vol. 6110, Springer, pp.24-43.
12. Martins, Paulo & Sousa, Leonel & Mariano, Artur. (2017). A Survey on Fully Homomorphic Encryption: An Engineering Perspective.
ACM Computing Surveys. 50. 1-33. 10.1145/3124441.
13. Iti Sharma, A Symmetric FHE scheme based on Linear Algebra, International Journal of Computer Science and Engineering
Technology, Vol.05, pp.558-562.
14. Beunardeau, Marc & Connolly, Ais & Géraud, Rémi & Naccache, David. (2016). Fully Homomorphic Encryption: Computations with
a Blindfold. IEEE Security & Privacy. 14. 63-67. 10.1109/MSP.2016.8.
15. J. Coron, T.Lepoint and M.Tibouchi, Batch fully homomorphic encryption over the integers, https://eprint.iacr.org/2013/36.pdf
16. L. Cardoso dos Santos, G. Rodrigues Bilar and F. Dacêncio Pereira, "Implementation of the fully homomorphic encryption scheme
over integers with shorter keys," 2015 7th International Conference on New Technologies, Mobility and Security (NTMS), Paris, 2015,
pp. 1-5.
17. J. Ye and M. Shieh, "Low-Complexity VLSI Design of Large Integer Multipliers for Fully Homomorphic Encryption," in IEEE
Transactions on Very Large Scale Integration (VLSI) Systems, vol. 26, no. 9, pp. 1727-1736, Sept. 2018.
18. Ding, Yong & Han, Bo & Wang, Huiyong & Li, Xiumin. (2018). Ciphertext retrieval via attribute-based FHE in cloud computing. Soft
Computing. 22. 10.1007
19. Ahmed El-Yahyaoui, and Mohamed Daifr Ech-Cherif El Kettani, “About Fully Homomorphic Encryption Improvement Techniques,”
International Journal of Embedded and Real-Time Communication Systems, vol. 10, no. 3, pp. 1–20, 2019.
20. Clear, Michael, Hughes, Arthur, Tewari and Hitesh. (2013). Homomorphic Encryption with Access Policies: Characterization and
New Constructions. 0.1007/978-3-642-38553-7_4.
Authors: Chandrakanta Yadav, Yogesh Kumar Gupta

Paper Title: Cost Effective Ant Colony Optimization in Cloud Computing


Abstract: Cloud computing is a term for a wide range of developments possibilities. It is rapidly growing
paradigm in software technology that offers different services. Cloud computing has come of age, since
Amazon's rollouted the first of its kind of cloud services in 2006. It stores the tremendous amount of data that
are being processed every day. Cloud computing is a reliable computing base for data-intensive jobs. Cloud
computing provide computing resources as a service. It is on-demand availability of computing resources
without direct interaction of user. A major focus area of cloud computing is task scheduling. Task scheduling is
one among the many important issues to be dealt with. It means to optimize overall system capabilities and to
allocate the right resources. Task scheduling referred to NP-hard problem. The proposed algorithm is Cost
Effective ACO for task scheduling, which calculates execution cost of CPU, bandwidth, memory etc. The
suggested algorithm is compared with CloudSim with the presented Basic Cost ACO algorithm-based task
scheduling method and outcomes clearly shows that the CEACO based task scheduling method clearly
522. outperforms the others techniques which are in use into considerations. The task is allotted to the number of
VMs based on the priorities (highest to lowest) given by user. The simulation consequences demonstrate that the 3016-
suggested scheduling algorithm performs faster than previous Ant Colony Optimization algorithm in reference 30
to the cost. It reduces the overall cost as compare to existing algorithm. 20

Keywords: Cloud Computing, Cost Optimization, Task Scheduling, ACO, CEACO.

References:

1. Abdi, s. and Saeed S.: Task scheduling using modified PSO algorithm in cloud computing environment. International conference on
machine learning, electrical and mechanical engineering. 2014.
2. https://intellipaat.com/blog/what-is-cloud-computing/
3. Kumar, S. and Manpreet, S.: Metaheuristic based workflow scheduling in cloud environment. 5th International Conference on
Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO). IEEE, 2016.
4. Lakshmi, R, and Srinivasu,N.: A dynamic approach to task scheduling in cloud computing using genetic algorithm. Journal of
Theoretical & Applied Information Technology 85.2 2016.
5. Verma, A. and Kaushal, S.: A hybrid multi-objective Particle Swarm Optimization for scientific workflow scheduling. Parallel
Computing 62: 1-19. 2017.
6. Reddy, G. and Kumar,S.: MACO-MOTS: Modified Ant Colony Optimization for Multi Objective Task Scheduling in Cloud
Environment. 2019.
7. Agarwal, M. and Srivastava,G.: A PSO Algorithm-Based Task Scheduling in Cloud Computing. Soft Computing: Theories and
Applications. Springer, Singapore, 295-301. 2019.
8. Jana, B. and Mandal T. : A Task Scheduling Technique Based on Particle Swarm Optimization Algorithm in Cloud Environment. Soft
Computing: Theories and Applications. Springer, Singapore. 525-536. 2019.
9. Jain, R. and Sharma,N.: A systematic analysis of nature inspired workflow scheduling algorithm in heterogeneous cloud environment.
International Conference on Intelligent Communication and Computational Techniques (ICCT). IEEE, 2017.
10. Alworafi, M. et al. : Cost-aware task scheduling in cloud computing environment. International Journal of Computer Network and
Information Security 9.5, 52. 2017.
11. Al-maamari, Ali. and Fatma A.: Task scheduling using PSO algorithm in cloud computing environments. International Journal of Grid
and Distributed Computing 8.5: 245-256. 2015.
12. Verma, A., & Kaushal, S. : Deadline constraint heuristic-based genetic algorithm for workflow scheduling in cloud. International
Journal of Grid and Utility Computing, 5(2), 96-106. 2014.
13. Awad, A. I. and Abdel_kader,H. M.: Enhanced particle swarm optimization for task scheduling in cloud computing environments.
Procedia Computer Science 65: 920-929. 2015.
14. Guo, L. et al.: Task scheduling optimization in cloud computing based on heuristic algorithm. Journal of networks7.3, 547. 2012.
15. Kennedy, J. "Particle swarm optimization. " Encyclopedia of machine learning. Springer, Boston, MA, 760-766. 2011.
16. Kalra, M. and Singh, S. : A review of metaheuristic scheduling techniques in cloud computing. Egyptian informatics journal 16.3 275-
295. 2015.
17. Saleh, H., Nashaat, H., Saber, W., & Harb, H. M. :IPSO task scheduling algorithm for large scale data in cloud computing
environment. IEEE Access, 7, 5412-5420. 2018.
18. Kaur, R. and Singh,K. : Efficient Task Scheduling using Load Balancing in Cloud Computing. International Journal of Advanced
Networking and Applications 10.3 3888-3892. 2018.
19. Mathew, T. K. and Jose, J. : Study and analysis of various task scheduling algorithms in the cloud computing environment. Advances
in Computing, Communications and Informatics (ICACCI) International Conference on. IEEE, 2014.
20. Sethi, N. and Singh,G. : Improved Mutation-Based Particle Swarm Optimization for Load Balancing in Cloud Data Centers. Harmony
Search and Nature Inspired Optimization Algorithms. Springer, Singapore, 939-947. 2019.
21. Singh, R. et al.: Hybrid Metaheuristic Based Scheduling with Job Duplication for Cloud Data Centers. Harmony Search and Nature
Inspired Optimization Algorithms. Springer, Singapore, 989-997. 2019.
22. Masdari, M. et al. : A survey of PSO-based scheduling algorithms in cloud computing. Journal of Network and Systems
Management 25.1.122-158. 2017.
23. Buyya, R. and Rodrigo N. Calheiros.: Modeling and simulation of scalable Cloud computing environments and the CloudSim toolkit:
Challenges and opportunities. 2009 international conference on high performance computing & simulation. IEEE, 2009.
24. Soltani, Nasim. and Barekatain,B.: Heuristic algorithms for task scheduling in cloud computing: a survey. International Journal of
Computer Network and Information Security 9.8, 16. 2017.
25. Mohana, S. J., M. Saroja, and M. Venkatachalam. Comparative analysis of swarm intelligence optimization techniques for cloud
scheduling. IJISET 1.10, 15-19. 2014.
26. Selvi, V. and Umarani,R.: Comparative analysis of ant colony and particle swarm optimization techniques. International Journal of
Computer Applications 5.4, 1-6. 2010.

Authors: Sukhdev Singh, Chander Kant

Paper Title: Novel Method of FKP Feature Extraction Using Mechanical Variable
Abstract: Feature extraction is one of the most essential phase in biometric authentication. It helps in extracting
and measuring the biometric image as ideal as possible. These features sets can be used further for image
matching, recognition or learning techniques in supervised algorithms. In the proposed work a novel features
extraction method for finger knuckle print is explored with comparative analysis. The proposed scheme is based
on different mechanical variables and its efficiency also proved by plotting different curves in Matlab R2009a

Keywords: finger knuckle print, feature extraction, digital image processing, recognition rate.

References:

1. Mahesh Kumar, K. P. Finger Knuckle-Print identification based on local and global feature extraction using sdost. American Journal of
Applied Sciences, 929-938, 2014.
2. Shoichiro Aoyama, K. I.,”A finger-knuckle-print recognition algorithm using phase-based”. Information Sciences, 53-64, 2014.
3. Dong ping Tian, “A Review on Image Feature Extraction and Representation Techniques”, International Journal of Multimedia and
Ubiquitous Engineering Vol. 8, No. 4, July, pp 385-396, 2013.
523. 4. Revathi, R., & Hemalatha, M. An Emerging Trend of Feature Extraction Method In Video Processing. Cs & It-Cscp, 69–80, 2012. 3021-
5. Lin Zhang, Lei Zhang and David Zhang, “Monogenic Code: A Novel Fast Feature Coding Algorithm with Applications to
FingerKnuckle-Print Recognition “Proceedings of the International Workshop on Emerging Techniques and Challenges for Hand Based 30
Biometrics, 2010. 25
6. YANG Wanknou, SUN Changyin and SUN Zhongxi, “Finger-Knuckle-Print Recognition Using Gabor Feature and OLDA”,
Proceedings of the 30th Chinese Control Conference, pp.2975-2978,July 22-24, 2011.
7. Xiaoyuan Jing, Wenquian Li, Chao Lan, Yongfang, Yao, Xi Cheng and Lu Han, “Orthogonal Complex Locality Preserving Projections
based on Image Space Metric for Finger-Knuckle-Print Recognition”, 2011.
8. Goh Kah Ong Michael and Tee Connie and Andrew Teoh Beng Jin, “ Robust Palm Print and Knuckle Print Recognition System Using a
Contactless Approach”, 5th IEEE Conference on Industrial Electronics and Applications, pp.323-329, 2010.
9. Shen, Linlin, Li Bai, and Zhen Ji. "Hand-based biometrics fusing palmprint and finger-knuckle-print." 2010 International Workshop on
Emerging Techniques and Challenges for Hand-Based Biometrics. IEEE, 2010.
10. Ajay Kumar and Yingbo Zhou, “Personal Identification using Finger Knuckle Orientation Features”, Electronic Letters Vol.45, no 20,
pp.1-7, September 2009.
11. Zahara S.Sharaiatmadar, Karim Faez, “A Novel Approach for Finger-Knuckle-Print Recognition Based on Gabor Feature Fusion”, 4th
international Congress on Image and Signal Processing, pp.1480-1484, 2011.
12. A. Kumar, Ch. Ravikanth, “Personal authentication using finger knuckle surface”, IEEE Trans. Inf. Forensics Secur., 4 (1) pp. 98-110,
2009.
13. Nalwa, V. (2002). Automatic on-line signature verification. Proceedings of the IEEE, 215-239.
14. (PolyU) Finger-Knuckle-Print Database. Available at The Hong Kong Polytechnic University (PolyU) Finger-Knuckle-Print Database:
http://www4.comp.polyu.edu.hk/~biometrics/FKP.htm.
Authors: Ben John Stephen S

Paper Title: Advanced Energy Management System For Hybrid Vehicle


Abstract: The battery and ultra-capacitor hybrid storage system (HESS) is a system which can be adopted in
the EV. By utilizing Ultra-capacitors, the batteries can be protected from high peak currents, which can be
especially harming to the batteries. Consequently it is conceivable to expand the battery life. Battery and ultra-
capacitor are connected through a bidirectional non-isolated multi input converter which has numerous points of
interest. Fuzzy logic based energy management strategy is an efficient method to manage energy through HESS
and furthermore regulating the SoC of ultra-capacitor while smoothing the battery power profile.

Keywords: Battery, Bidirectional non-isolated MIC, Energy management strategy (EMS), Ultra-capacitor (UC)
524.
3026-
References: 30
30
1. S A. Khaligh, J. Cao, and Y. J. Lee, “A multiple-input DC–DC converter topology,” IEEE Trans. Power Electron., vol. 24, no. 3, pp.
862–868, Mar. 2009.
2. S. Dusmez, X. Li, and B. Akin, “A new multiinput three-level DC/DC converter,” IEEE Trans. Power Electron., vol. 31, no. 2, pp.
1230–1240, Feb. 2016.
3. H. Yin, W. Zhou, M. Li, C. Ma, and C. Zhao, “An adaptive fuzzy logic-based energy management strategy on battery/ultracapacitor
hybrid electric vehicles,” IEEE Trans. Transport. Electrific., vol. 2, no. 3, pp. 300–311, Sep. 2016.
4. B. Vural et al., “Fuel cell and ultra-capacitor hybridization: A prototype test bench based analysis of different energy management
strategies for vehicular applications,” Int. J. Hydrogen Energy, vol. 35, no. 20, pp. 11161–11171, Oct. 2010.
5. F. Akar, Y. Tavlasoglu, E. Ugur, B. Vural, and I. Aksoy, “A bidirectional nonisolated multi-input DC–DC converter for hybrid energy
storage systems in electric vehicles,” IEEE Trans. Veh. Technol., vol. 65, no. 10, pp. 7944–7955, Oct. 2016.

Authors: John Livingston.S, Kumudha Raimond

Paper Title: Mirafs - Multi Image Resoulution Quality Acuminate Fusing System
Abstract: In Remote sensing applications, due to the increase in spatial and spectral resolutions, the time
complexity became a vital aspect in order to process and deliver the solutions in a timely fashion. Remote
sensors which acquire high-resolution image data often misses geometrical alignments and spectral stabilizations
because of its dynamic routines, which results in crucial consideration such as loss of information and degraded
quality in a single region of interest. This ignited us in finding the need for fusion of data to obtain quality
products in remote sensing domain. Leaving the noise in source data compromises the overall quality of the
solution. In proposed method to reduce the negative impacts of noise on the image skin, we use the confined
filter function which held back the noise while reconstructing the image. In some cases, when image fusion is
carried out using the least significant spectral band values will also lead to degraded output; in such condition,
the Proposed method chooses high informative bands by careful attention to spectral values in each band. The
anticipated outcomes through these methods are significant reduction in computational complexity and noise
insensitivity. The fusion process must be verified to validate image sets for smart combinations of bands. The
image pixels were considered as components to organize the fused spectral quality. The proposed HSI based
MIRAFS method is compared with state of art fusion models and the results shows prominent improvement in
the quality of fused images when we chose high spectral values. In MIRAFS, the quality of the resultant fused
image has also been checked whether it has minimized spectral degradation with the amplified resolution by
conserving spectral information as much as possible.

525. Keywords: Fused Image; Noise; Spectral quality; Image Pixel. 3031-
30
References: 35
1. W. P. Loughlint,“Principal Component Analysis for Alteration Mapping”Photogrammetric Engineering Remotesensing, vol. 57, no.
9, september 1991. pp. 1–3
2. Igor Yanovsky, Anthony B. Davis, Veljko M. Jovanovic,“Multilayer Separation and its Application to Separating Layers of
Clouds”UCLA CAM Report, 2011. pp. 113–121
3. Amina Saleem, Azeddine Beghdadi and Boualem Boashash,“Image Quality Metrics Based Multi-focus Image Fusion”IEEEM, 2011.
pp. 131–137
4. Rafael do Espirito Santo,“Principal Component Analysis applied to digital image compression” ORIGINAL ARTICLE, published
was due on Jun 13, 2012.
5. A. Anish,T. Jemima Jebaseeli,“A Survey on Multi-Focus ImageFusion Methods”International Journal of Advanced Research in
Computer Engineering & Technology (IJARCET) Volume 1, Issue 8, October 2012.
6. Binod kumar Choudhary, Navin kumar Sinha and Prem shanker,“Pyramid Method in Image Processing”Journal of Information
Systems and Communication,Volume 3, Issue 1, 2012.
7. Hui Huang, Uri Ascher,“Faster gradient descent and the efficient recovery of images”12 Aug 2013.
8. Ewelina PIEKAR, Michal MOMOT, Alina MOMOT,“Segmentation of Images Using Gradient Methods and Polynomial
Approximation” JOURNAL OF MEDICAL INFORMATICS & TECHNOLOGIES Vol. 23,2014.
9. Mostafa Amin-Naji, Ali Aghagolzadeh,“Multi-focus image fusion using VOL and EOL in DCT domain”International Conference on
New Research Achievements in Electrical and Computer Engineering (ICNRAECE), May 13, 2016.
10. R. J. Vidmar. (1992, August). On the use of atmospheric plasmas as electromagnetic reflectors. IEEE Trans. Plasma Sci. [Online].
21(3). pp. 876—880.Available:http://www.halcyon.com/pub/journals/21ps03-vidmar
11. Alphy George ,John Livingston.S “A Survey on Full Reference Image Quality Assessment Algorithms” International Journal of
Research in Engineering and Technology Vol.2, Issue.12, pp. 303-307, Dec. 2013
12. S. Arokia Jerome George,John Livingston.S “Survey on Region Growing Segmentation and Classification for Hyperspectral Images”
International Journal of Computer Applications (0975 – 8887) Volume 62– No.13 January 2013
Authors: Praveen Kumar Dwivedi, Surya Prakash Tripathi

Paper Title: A Simplified Interval Type-2 Fuzzy Implementation for Financial Credit Decision
Abstract: Credit assessment of potential customers with the help of their previous history of credit transaction
is one of the main issues in financial credit approval system. The credit rating of the customer shows that the
financial stability of the individual or firm. Based on financial stability, the bankers can approve their credit
grant. The basic factors that affect the credit rating of the customer is history of payment, the unsettled amount,
period of credit history, types of credit and many other factors. The creditworthiness of the customer is assessing
based on result obtained from these factors. The prime objective of the credit approval system is to avoid loss of
amount that may be associated with an incorrect decision. To avoid such type of decisions, it requires designing
of credit rating models for credit and their risk analysis. This type of models benefited the bankers to approve the
credit grant or not. The bank credit system is a binary classification system that classifies the customer either the
good or bad based on their previous credit history. In this context, several fuzzy classification systems have been
designed to classify the customer. In this article, we have designed a simplified interval type-2 fuzzy system for
financial credit decision using two different membership function based approaches and compared the
performance in terms of accuracy of classification.

Keywords: Interval Type-2, Fuzzy System, Credit Classification, Accuracy, Type-1 Fuzzy System etc.

References:

1. L. A. Towards a generalized theory of uncertainty (GTU) – an outline. Information Sci.,2005, 172, 1–40.
2. Zadeh, L. A. The concept of a linguistic variable and its application to approximate reasoning, Part I. Information Sci., 1975, 8(3),
199–249.
3. Zadeh, L. A. The concept of a linguistic variable and its application to approximate reasoning, Part II. Information Sci., 1975, 8(4),
301–357.
4. Mizumoto, M. and Tanaka, K. Some properties of fuzzy sets of type-2. Information and Control, 1976,31, 312–340.
526. 5. Karnik, N. N. and Mendel, J. M. Type-2 fuzzy logic systems: type-reduction. In Proceedings of the IEEE Conference on Systems, 3036-
Man, and Cybernetics, San Diego, California, USA, 1998, 2046–2051. 30
6. C. Wagner, "Juzzy – A Java based Toolkit for Type-2 Fuzzy Logic", Proceedings of the IEEE Symposium Series on Computational
Intelligence, Singapore, April 2013. 44
7. Zadeh, L. A. Fuzzy sets. Information and Control,1965, 8, 338–353.
8. King, P. and Mamdani, E. The application of fuzzy control to industrial processes. Automatica, 1997,13, 235–242.
9. Wu, D. and Tan, W. W. A simplified architecture fortype-2 FLSs and its application to non linear control. In Proceedings of the 2004
IEEE Conference on Cybernetics and intelligent systems, Singapore, 2004, pp. 485–490.
10. Sepulveda, R., Castillo, O., Melin, P., RodriguezDiaz, A., and Montiel, O. Experimental study ofintelligent controllers under
uncertainty usingtype-1 and type-2 fuzzy logic. Information Sci.,2007, 177, 2023–2048.
11. Sepulveda, R., Castillo, O., Melin, P., Rodriguez Diaz, A., and Montiel, O. An efficient computational method to implement type-2
fuzzy logic in control applications. In Analysis and design of intelligent systems using soft computing techniques(Eds P. Melin, O.
Castillo, E. G. Ramı ´rez, J.Kacprzyk, and W. Pedrycz). Series Advances in intelligent and soft computing, 2007 vol. 41, pp.45–52
(Springer-Verlag, Berlin).
12. Daradkeh, M., McKinnon, A., Churcher, C., 2013.Supporting informed decision-making under uncertainty and risk through interactive
visualization. The Australian Computer Science Communications,35(5), 23-32.
13. Hameed, I.A., 2011. Using Gaussian membership functions for improving the reliability and robustness of students' evaluation
systems. Expert systems with Applications, 38(6), 7135-7142.
14. Iancu, I., 2012. A Mamdani type fuzzy logic controller, Fuzzy Logic - Controls, Concepts, Theories and Applications, Prof. Elmer
Dadios (Ed.), ISBN: 978-953-51-0396-7.
15. Wu, D., 2013. Approaches for reducing the computational cost of interval type-2 fuzzy logic systems: overview and comparisons.
IEEE Transactions on Fuzzy Systems, 21(1), 80-99.
16. Zhang, Tengfei, Fumin Ma, Dong Yue, Chen Peng, and Gregory MP O'Hare. "Interval Type-2 Fuzzy Local Enhancement Based
Rough K-means Clustering Considering Imbalanced Clusters." IEEE Transactions on Fuzzy Systems (2019).
17. Saeed, S. K., & Hagras, H. (2018, September). Adaptive Type-2 Fuzzy Logic Based System for Fraud Detection in Financial
Applications. In 2018 10th Computer Science and Electronic Engineering (CEEC) (pp. 15-18). IEEE.
18. Jana, D. K., & Ghosh, R. (2018). Novel interval type-2 fuzzy logic controller for improving risk assessment model of cyber security.
Journal of information security and applications, 40, 173-182.
19. Hameed, I. A., Elhoushy, M., Zalam, B. A., &Osen, O. L. (2016, April). An Interval Type-2 Fuzzy Logic System for Assessment of
Students' Answer Scripts under High Levels of Uncertainty. In CSEDU (2) (pp. 40-48).
20. Sidik, G. K., &Djatna, T. (2018). A fairness model based on interval type-2 fuzzy set for islamic financing scoring in indonesia.
Airlangga International Journal of Islamic Economics and Finance, 1(1).

Authors: Snigdhadip Ghosh, Vijay Kumar Dwivedi

Paper Title: Assessment of Plan Form Development using Protective Materials around an Island
Abstract: As per recent survey of different survey portals, it is nearly proved that the most dangerous threat of
nature is soil erosion and changes of plan form development in river topography. There are many reasons behind
this degradation such as difference in climate, changes in direction of wind and water, man made changes of
river path etc. In this project, we tried to locate the changes in plan form development due to erosion and
527. deposition of soil after using protective materials. So this project was carried out to study the detachment,
3045-
transportation and deposition of cohesion less uniform and non-uniform sediments as well as run-off around an
30
island made of silty clay material having protection material as gravel and stone. 48
Keywords: Climate change, Detachment of soil, Protection materials, Erosion and deposition.

References:
1. Ghosh S., Das S., Dwivedi V.K. (2018) Study of Soil Erosion and Deposition around an Island in a Natural Stream. In: Singh V.,
Yadav S., Yadava R. (eds) Hydrologic Modeling. Water Science and Technology Library, vol 81. Springer, Singapore
2. Welvaert M, Rosseel Y (2013) On the Definition of Signal-To-Noise Ratio and Contrast-To-Noise Ratio for fMRI Data. PLoS ONE
8(11): e77089.
3. Kostaschuk, R., J. Best, P. Villard, J. Peakall, and M. Franklin (2005), Measuring flow velocity and sediment transport with an acoustic
Doppler current profiler, Geomorphology, 68, 25– 37
4. Rennie, C. D., R. G. Millar, and M. A. Church (2002), Measurement of bed load velocity using an acoustic Doppler current profiler, J.
Hydraul.Eng., 128, 473– 483.

Authors: Nagesh B.K., B. R. LakshmiKantha


Performance Evaluation of Battery and Super-Capacitor for Electric Vehicle with Hybrid
Paper Title:
Techniques
Abstract: In recent trends, Plug-in Hybrid Electric Vehicles (PHEVs) have an excessive opportunity due to its
charging facilities and charge storage system. Through appropriate design and development, Electric Vehicles
(EVs) not only eliminate the pollution but also make the system more efficient over traditional vehicles.
However, still it is in the progress of the investigation and has several unanswered issues. The performance of
PHEV depends upon proper utilization of electric power which is solely affected by the battery State-Of-Charge
(SOC). SOC determination becomes a vital problem in whole area where it comprises a battery storage; because
it has several drawbacks such as weak power density, longevity, etc. one probable and favourable resolution for
this issue is multi-source EV. Both the batteries and Ultra-Capacitors (UC) can reduce the aforementioned
disadvantages in existing systems. This proposed work has more efficiency because of the combined design
model of both battery and super-capacitor. Hence, in this work, the Particle Swarm Optimization (PSO)
technique with Fuzzy Logic Controller (FLC) is implemented for optimal sharing of power between the battery
and the super-capacitor.

Keywords: Plug-in Hybrid Electric Vehicles (PHEVs), State-Of-Charge (SOC), Energy management
system(EMS), Particle Swarm Optimization (PSO), Fuzzy Logic Controller (FLC).

References:

1. T. H. Wang, O. Sename, and J. J. Martinez-Molina. (2013). A LPV/H∞ Approach for Fuel Consumption Minimization of the PHEV
with Battery Life Prolongation. IFAC Proceedings 46(21), pp. 378-383.
2. F. Zhang, F. Yang, D. Xue, and Y. Cai. (2019). Optimization of compound power split configurations in PHEV bus for fuel
consumption and battery degradation decreasing. Energy, 169, pp. 937-957.
528. 3. J. D. K. Bishop, C. J. Axon, D. Bonilla, M. Tran, D. Banister, and M. D. McCulloch. (2013). Evaluating the impact of V2G services on
the degradation of batteries in PHEV and EV, Applied energy, 111, pp. 206-218. 3049-
4. C. Liu, Y. Wang, and Z. Chen. (2019). Degradation model and cycle life prediction for lithium-ion battery used in hybrid energy 30
storage system. Energy 166, pp. 796-806.
5. C. G. Hochgraf, J. K. Basco, T. P. Bohn, and I. Bloom. (2014). Effect of ultracapacitor-modified PHEV protocol on performance 56
degradation in lithium-ion cells. Journal of Power Sources 246, pp. 965-969.
6. Y. Chiang, W.Y. Sean, and S. Jeong. (2019). Current control of energy management system by applying ultracapacitor with boost
converter interface for reused lithium-ion battery. Journal of Cleaner Production, 220, pp. 945-952.
7. R. Xiong, H. Chen, C. Wang, and F. Sun. (2018). Towards a smarter hybrid energy storage system based on battery and ultracapacitor-
A critical review on topology and energy management. Journal of cleaner production, 202, pp. 1228-1240.
8. P. Bubna, G. A. Suresh, and A. K. Prasad. (2012). Integration of batteries with ultracapacitors for a fuel cell hybrid transit bus. Journal
of Power Sources, 199, pp. 360-366.
9. M. E. Glavin, and W. G. Hurley. (2012). Optimisation of a photovoltaic battery ultracapacitor hybrid energy storage system. Solar
Energy 86, (10), pp. 3009-3020.
10. A. Burke, and M. Miller. (2011). The power capability of ultracapacitors and lithium batteries for electric and hybrid vehicle
applications. Journal of Power Sources 196(1), pp. 514-522.
11. A. Mirzaei, A. Jusoh, Z. Salam, E. Adib, and H. Farzanehfard. (2011). Analysis and design of a high efficiency bidirectional DC–DC
converter for battery and ultracapacitor applications. Simulation Modelling Practice and Theory 19(7), pp. 1651-1667.
12. J. Tian, R. Xiong, W. Shen, and J. Wang. (2019). Frequency and time domain modelling and online state of charge monitoring for
ultracapacitors. Energy, 176, pp. 874-887.
13. T. D. Atmaja, (2015). Energy storage system using battery and ultracapacitor on mobile charging station for electric vehicle. Energy
Procedia, 68, pp. 429-437.
14. H. Marzougui, M. Amari, A. Kadri, F. Bacha, and J. Ghouili. (2017). Energy management of fuel cell/battery/ultracapacitor in
electrical hybrid vehicle. International journal of hydrogen energy, 42(13), pp. 8857-8869.
15. K. Gokce, and A. Ozdemir. (2016). A rule based power split strategy for battery/ultracapacitor energy storage systems in hybrid electric
vehicles. International Journal of Electrochemical Science, 11, pp. 1228-1246.
16. R. Xiong, Y. Duan, J. Cao, and Q. Yu. (2018). Battery and ultracapacitor in-the-loop approach to validate a real-time power
management method for an all-climate electric vehicle. Applied energy 217, pp. 153-165.
17. A. Demircalı, P. Sergeant, S. Koroglu, S. Kesler, E. Öztürk, and M. Tumbek. (2018). Influence of the temperature on energy
management in battery-ultracapacitor electric vehicles. Journal of cleaner production 176, pp. 716-725.
18. H. Peng, J. Wang, W. Shen, D. Shi, and Y. Huang. (2019). Compound control for energy management of the hybrid ultracapacitor-
battery electric drive systems. Energy.
Authors: Janice Dyan G. Quiloña, Shoven M. Afable

Paper Title: Development and Evaluation of Eastern Samar State University-Can-avid Campus Website
Abstract: To provide an avenue for the university where it can share its profile, mission, vision, policies,
achievements, capabilities, news and activities in the local, national and international arena of the academe, the
529.
IT Development Team of ESSU Can-avid Campus developed the website of the Campus using PHP and 3057-
WordPress. A descriptive-developmental method of research was utilized to emphasize the development of the 30
web application. Requirements Analysis was done to determine the important features that the website must 60
contain per user definition. After development, the website was subjected to quality evaluation to describe the
performance of the software through an evaluation survey questionnaire based on ISO/IEC9126 software quality
standards. 303 direct end-users from among IT experts, employees and students of the campus were asked to
evaluate the functionality and usability of the website. Evaluation results showed almost 100% compliance of
the system requirements specified by the target clients and a highly usable software overall performance rating.
The website, if regularly maintained will boast the organization valued image on the web and further increase
clients and enrollees of the Campus.

Keywords: University Website, ISO 9126 quality website, Web Administration, Web Application
Functionality and Usability.

References:

1. E. B. Cosidon, “Student Information System for Kalinga State University-Rizal Campus”, International Journal of Management and
Commerce Innovations ISSN 2348-7585 (Online) Vol. 4, Issue 1, 2016
2. Executive Order No. 47 s. 2011
3. R. D. Pacio, “Online Student Information System of Benguet State University (OSIS-BSU), Philippines”, International Journal of
Innovative Interdisciplinary Research Issue 4, 2013
4. Republic Act No. 10844
5. S.R. Bharamagoudar, R.B. Geeta, & S.G. Totad, “Web Based Student Information Management System”, 2013

Authors: Hong Son Nguyen, Trung Thanh Pham,Van Quan Tran, Quang Hung Nguyen

Paper Title: Nonlinear Analysis of Flat Steel Frame Semi rigid Connection Subjected to Dynamic Loads
Abstract: The paper aims to analyze the plastic frame elasticity with a beam-column joint which is a nonlinear
semi-rigid linkage, an ideal plastic elastic material model; set up the elastic elastic equation, using the Newmark
method to solve the differential equations of oscillating equations with Newton-Raphson iterative method of
improvement and programming to determine the internal force and the movement of the frame by the
programming language MATLAB program; limit the scope of research on structural problems subject to
earthquake load described by acceleration diagram.

Keywords: elastic nonlinear, flat steel frame, MATLAB, earthquake load.


530.
References: 3061-
30
1. Nguyen Hong Son, Nguyen Tram, "Analysis of plastic structure of non-linear semi-rigid flat steel frame under static load", Proceedings 65
of the national conference on mechanical mechanics of deformed solid material for the eighth time, Thai Nguyen, August 2006.
2. Nguyen Hong Son, Vu Thanh Hai, "Building the equivalent mass matrix of bar elements with elastic mass distribution distribution",
Journal of Irrigation and Environment, No. 13, 6/2006, Water Resources University, page 31-34. (2006).
3. Vietnamese design standard TCXDVN, design of shock-resistant construction, (Draft 2000 and 2005)
4. Bathe K.J. Finite Element Procedures, Prentice-Hall International, Inc. (1996)
5. CEN: Eurocode 3, (1992), Design of Steel Structures-Part I-General-Rules and Rules for Building, CEN ENV. (1992)
6. Chopra A. K., Dynamics of Structures, Theory and Application to Earthquake Engineering, Prentice Hall, Upper Saddle River, New
Jersey 07458. (1985)
7. Clough R.W., Penzien J. Dynamic of Structures, McGraw-Hill Book Co, New York. (1993)
8. Bruneau M., Uang C., Whittaker A. Ductile Design of Steel Structures, McGraw Hill, New York. (1998)
9. Wolfram Research. Mathematica 5.1, Inc., 100 Trade Center Drive, Champaign, IL, 61820-7237, USA. (2004)
Mythily M, Radhika Nambiar, Kethsy Prabhavathy, Iwin Thanakumar Joseph, Deepa Kanmani
Authors:
S
Paper Title: A Design Pattern Structure Specification to Extract Statistical Report
Abstract: Design patterns are ecological abstract documents which offer acceptable solutions for the continual
issues. It allows developers to communicate in a well-known way with the system design. This paper reviewing
set of research articles to know the current trend on design pattern’s applications. This research also introduces
the structure of a new pattern that acts as data analyzer of any software given as input. This pattern acts as
centralized data storage of concrete class objects. The instances are analyzed by various functionalities of
analyzer in-order to derive results. It helps to solve some of the day to day problems faced by the software
designer. This pattern provides services for a group of concrete members to design set of functionalities in order
to support data analytics. The structure and its applicability on software are examined, using a case study.

531. Keywords: Design pattern, Application of design patterns, Data analytics.


3066-
References: 30
70
1 B. E. Lorber, “Un Nid De Carton De Dendrolasiuis Fuliginosus (Hym., Formicidae, Formicinae),” Entomologiste, Vol. 36, Pp. 135–
139, 1980.
2 D. K. Kim, L. Lu, And B. Lee, “Design Pattern-Based Model Transformation Supported By Qvt,” J. Syst. Softw., Vol. 125, Pp. 289–
308, 2017.
3 S. Hussain, J. Keung, M. K. Sohail, A. A. Khan, And M. Ilahi, “Automated Framework For Classification And Selection Of Software
Design Patterns,” Appl. Soft Comput. J., Vol. 75, Pp. 1–20, 2019.
4 S. Hussain Et Al., “Implications Of Deep Learning For The Automation Of Design Patterns Organization,” J. Parallel Distrib. Comput.,
Vol. 117, Pp. 256–266, 2018.
5 A. K. Dwivedi, A. Tirkey, R. B. Ray, And S. K. Rath, “Software Design Pattern Recognition Using Machine Learning Techniques,”
Ieee Reg. 10 Annu. Int. Conf. Proceedings/Tencon, Pp. 222–227, 2017.
6 M. N. Riaz, “Impact Of Software Design Patterns On The Quality Of Software: A Comparative Study,” 2018 Int. Conf. Comput. Math.
Eng. Technol. Inven. Innov. Integr. Socioecon. Dev. Icomet 2018 - Proc., Vol. 2018–Janua, No. 4, Pp. 1–6, 2018.
7 A. Di Marco And R. Mirandola, “Model Transformation In Software Performance Engineering,” Lect. Notes Comput. Sci. (Including
Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), Vol. 4214 Lncs, Pp. 95–110, 2006.
8 R. Ferenc, Á. Beszédes, L. Fülöp, And J. Lele, “Design Pattern Mining Enhanced By Machine Learning,” Ieee Int. Conf. Softw.
Maintenance, Icsm, Vol. 2005, Pp. 295–304, 2005.
9 B. Bafandeh Mayvan And A. Rasoolzadegan, “Design Pattern Detection Based On The Graph Theory,” Knowledge-Based Syst., Vol.
120, Pp. 211–225, 2017.
10 K. Lano, S. Kolahdouz-Rahimi, S. Yassipour-Tehrani, And M. Sharbaf, “A Survey Of Model Transformation Design Patterns In
Practice,” J. Syst. Softw., Vol. 140, Pp. 48–73, 201
11 B. Hamid And D. Weber, “Engineering Secure Systems:Models, Patterns And Empirical Validation,” Comput. Secur., Vol. 77, Pp. 315–
348, 2018.

Authors: Hong Son Nguyen, Van Quan Tran, Quang Hung Nguyen
Influence of Parameters Reinforced Concrete Floor to Stiffness of Beam – Columns Connector in
Paper Title:
Composite Structures
Abstract: In this paper, the author introduces the beam – column connections, steel – concrete composite
beams and floor element in the frame structures, and shows how to determine the stiffness connections of the
typical beam - column according to European standards. Survey parameters affecting, including: slab thickness;
section area and module elasticity of reinforcing bars; distance anchor, in order to clarify the influence of the
parameters on the stiffness of the connections beam - column in composite steel – concrete structures.

Keywords: Composite joints, Connections, Steel.

532. References:
3071-
1. Pham Van Hoi, Steel - concrete composite structure, Science and Technology Publishing House, Hanoi, (2006) 30
2. Nguyen Hong Son, "One way to determine the mechanical characteristics of beam-column links in steel frame structure", Construction
Journal, No. 4/2013, pages 70 - 74. (2013) 75
3. Nguyen Hong Son, "Determining the stiffness of the beam-column link in the steel-concrete composite frame structure," Construction
Journal, No. 5/2013, page 71 - 75. (2013)
4. Le Hong Kien, Evaluation of the impact of steel-concrete composite floor on softness of frame nodes, Technical Master thesis, Hanoi
Architectural University. (2014)
5. CEN (2004): Eurocode 3, Design of Steel Structures-Part I-8-Design of Joints, ENV 1993-1-1:1992. (1992)
6. AISC, Partially Restrained Composite Connections, Steel Design Guide Series. (2003)
7. CEN: Eurocode 4 (1992), Design of Composite Steel and Concrete Structures-Part I-1-General Rules and Rules for Buildings, ENV
1994-1-1:1992. (2004)
8. Faella C., Piluso V., Rizzano G. Structural Steel Semi-Rigid Connections Theory, Design and Software, CRC Press, Boca Raton, FL.
(2000)
9. Structural Steelwork Eurocodes Development of A Trans-National Approach, SSEDTA, “Lecture 9: Composite Joints”. (2001)

Authors: Le Thuy Nguyen, Hong Son Nguyen, Van Quan Tran, Quang Hung Nguyen

Paper Title: Impact of Wind Load on Large Plate Billboards in Vietnam


Abstract: The paper presents the analysis of the impact of wind loads on large plate billboards, how to
determine and convert input data and repeat cycle conversion ratios in calculating the wind load between
Vietnam standards and foreign standards. In addition, the article presents the notes in the calculation according
to different standards, thereby giving the process of calculating the determination of wind load according to
Vietnam standard TCVN 2737-1995, European standard EN 1991- 1-4 and AmericanASCE / SEI 7-05 standards
for large billboard advertising by MathCad calculation software, presenting calculations for a specific billboard,
from the results of the presentation, we get some conclusions and recommendations.
533.
3076-
Keywords: Large plate billboard construction, wind load, texture, failure, standard l. 30
81
References:

1. TCVN 2737:1995 Load and impact - Design standards, Construction Publisher, Hanoi.
2. QCVN 02 : 2009/BXD National technical regulation data on natural conditions used in construction, Construction Publisher, Hanoi.
3. The effects of wind on texture. Pham Hoang Kien. JVEEF’s Newletter No.8, p 6-16, 2008.
4. ASCE/SEI 7-05 Minimum design loads for buildings and other structures, published by American Society of CivilEngineers,
Virginia, USA, 338 p, 2006.
5. EN 1991-1-4Eurocode 1: Actions on structures - General Actions - Part 1-4: Wind Actions
6. Wind loads on structures, Claes Dyrbye – Svend Ole Hansen; Jonh Wiley & Son, 1989.

Authors: S. Sivasankar and A. Praveen Kumar

Paper Title: Numerical Modeling of Square Steel Members Wrapped by CFRP Composites
Abstract: HSS (Hollow Structural Steel) tubular members used in buildings and bridges for structural
application is rapidly developing technique in the recent era. Since, they have many advantages over RC
structural members. This paper presents the application of CFRP on HSS tubular members under axial
534.
compression. Typical failure occurred during axial loading was local buckling, and this could be reduced by 3082-
wrapping CFRP sheets around the HSS tubular columns were investigated experimentally. Eight steel samples 30
are used in this test. Among eight specimens, two are unwrapped and the remaining six columns are externally 87
wrapped by CFRP. CFRP sheets are used as strips, and the width of the sheets are constant. The spacing between
the CFRP sheets is also constant. All columns are tested in column tester till the maximum to understand their
failure modes, Ultimate load, load Vs. Displacement, Stress- Strain behaviour and Ductility index. Finally,
results obtained from the experimental investigation could be validated with ANSYS software. The ultimate load
and displacements from ANSYS validation are closely match with test results.

Keywords: Axial compression, Wrapping, CFRP sheets, Buckling, HSS columns, Short columns, Strips and
ANSYS.

References:

1. Arduini, M., Nanni, A., 1997. Behavior of Precracked RC beams strengthened with carbon FRP Sheets. ASCE Journal of for
Composites Construction 1 (2), 63–70.
2. Chajes, M.J., Thomson, T.A., Januszka, T.F., Fin, W., 1994. Flexural strengthening of concrete beams using externally bonded
composite materials. Construction and Building Materials 8 (3), 191–201.
3. Bonacci, J.F., Maalej, M., 2000. Externally bonded fiber-reinforced polymer for rehabilitation of corrosion damaged concrete beams.
ACI Structural Journal 97 (5), 703–711.
4. Teng JG, Lam L, Chan W, Wang J. Retrofitting of deficient RC cantilever slabs using GFRP strips. J Comput Constr L 2000; 4(2): 75–
84.
5. Xiao Y, Wu H. Compressive behavior of concrete confined by carbon fiber composite jackets. Journal of Materials in Civil
Engineering 2000; 12(2).
6. Li, J & Hadi, MNS 2003, ‘Behaviour of externally confined high-strength concrete columns under eccentric loading’, Composite
Structures, vol. 62, pp. 145-153.
7. Zhong Tao, Lin-Hai Han & Ling-Ling Wang 2007, ‘Compressive and flexural behaviour of CFRP-repaired concrete-filled steel tubes
after exposure to fire’, Journal of Constructional Steel Research, vol. 63, pp. 1116-1126.
8. Teng, JG & Hu, YM 2007, ‘Behaviour of FRP-Jacketed circular steel tubes and cylindrical shells under axial compression’,
Construction and Building Materials, vol. 21, pp. 827-838.
9. Haedir, J, Bambach, MR, Zhao, XL & Grzebieta, RH 2010, ‘Analysis of CFRP externally-reinforced steel CHS tubular beams’,
Composite Structures, vol. 92, pp. 2992-3001.
10. Ehab Ellobody, 2013, ‘Numerical modelling of fibre reinforced concrete-filled stainless steel tubular columns’, Thin-Walled
Structures, vol. 63, pp. 1-12.
11. A.H. Keykha, M. Nekooei, R. Rahgozar, Numerical and experimental investigation of hollow steel columns strengthened with carbon
fiber reinforced polymer, Journal of Structural and Construction Engineering, 3 (1) (2016) 49-58.
12. Sundarraja, MC & Sivasankar, S 2012, ‘Axial behaviour of HSS tubular sections strengthened by CFRP strips- An experimental
investigation’, Science and Engineering of Composite Materials. vol. 19, pp. 159-168.
Authors: Minati Mohanty, Sagarika Panda

Paper Title: Crumb Rubber: A sustainable road paving material


Abstract: In the Present Scenario, the use of automobiles has increased significantly and due to that the waste
or scrap tyres are also increasing day by day. The waste tyres are classified as solid waste. The proper disposal
of these waste tyres has become a serious environmental issue as the tyres are manufactured with synthetic
rubber. According to the past records, the scrap tyres were used as a common additive to bituminous binders
which not only addresses the pavement performance issues but also tackles the problem of disposal of these
tyres. Therefore, In this study an attempt is made to know what percentage incorporation of crumb rubber to
bitumen upgrade the strength and durability of the pavement and a comparative study has been done using both
wet process and dry process on semi-dense bituminous concrete. Efforts are being made to make it a Sustainable
road paving material.

Keywords: Bitumen; crumb rubber; Aggregates; SDBC Mix

References:

1. Moe Aung Lwin1, HandojoDjatiUtomo,“Crumb Rubber Modified Bitumen in Open Graded Wearing Course of Flexible Pavement”,
Scientific Research, 2017.
2. Ministry of Road Transport & Highways (MORT&H),specifications for Road & Bridge works.
535. 3. Nimisha P. R.1, Muhammedshahid P. T.2, Krishna priya K. U.3 , Muhnis Mohammed4, Raveena Jobbi5,“Experimental Studies on the 3088-
Properties of Modified Bituminous Mixes using Crumb-rubber”, International Research journal of Engineering &
Technology,(IRJET),2018.
30
4. Srinivasakumar,Textbook of Highway Engineering 92
5. .Shinde. S. S.1, Waychal. A. A.2, Patil. S. B, “Effect of crumb rubber in bitumen using Marshall Stability test”, International journal
for Research in Applied Science and Engineering Technology,2016.
6. K. S. Dhivya1, P.Vidhubala2, S. Rajalakshmi3, S. Viramathithan4,“Improvement of pavement performance using crumb rubber and
recycled glass powder”, International Research journal of Engineering & Technology,(IRJET),2017.
7. ParmeetSingh, AkashPathania, AbhishekGupta, Deepak Kumar, Kamalpreet Singh, Devinder
8. Angurana, Abhishek Sharma, Bhrigu Sharma, Dr. ArvindDewangan, Er. Khushwace Singh, “Modification of Bitumen (Using crumb
rubber and Mica)”,International Journal of Engineering Research And Management (IJERM), 2018.
9. VikramSingh ,“Experimental study on partial replacement of Bitumen with Crumb Rubber” ,International journal of civil Engineering
& Technology (2017).
10. MagdyAbdelrahman, MohyeldinRagab* and Daniel Bergerson, ,“Effect of Used Motor Oil on the Macro and Micromechanical
Properties of Crumb Rubber Modified Asphalt”, International journal of Waste Resources,2015.
11. BirukYigezu Tefera1, Kassa Tadele2, Anteneh Geremew1,“Evaluation of the Effect of Rubber Modified Bitumen on Asphalt
Performance”, American journal of civil Engineering,Science Publishing Group,2018.
12. Kumar Praveen, Mehndiratta H. C, And K. Singh Lakshman, "Comparative Study Of Rheological Behavior Of Modified
Bitumen",Journal Of Materials In Civil Engineering, 2010: 978-984 .
13. Rahul R G, Nidhin G. Raj, Nadhiya F M, Hima Mohan, Athira K S, GoutamDivakarSanthish, , “Effect of crumb rubber on Asphalt
mixture performance,"International journal of Science Engineering and Technology”,2016.
14. 13.Veena Venudharan",Effect of crumb rubber gradation on asphalt binder modification: rheological evaluation, optimization and
selection”,Materials and structures,2017..
15. V.Venudharan.,K.P.Biligiri, “Study on Recovery Behaviour of Crumb Rubber Modified Asphalt Binders”,12th International
Conference on Transportation Planning and Implementation Methodologies for Developing Countries, Mumbai, India, 2016.
16. V.Venudharan.,K.P.Biligiri, “Investigation on creep and recovery behavior of Rubber Modified Asphalt Binders”, Conference on
Sustainable Asphalt Pavement for Developing Countries (CONSAP), 2016.

Authors: Rudragoud Patil, R. H. Goudar


Implementation of User Centric SSE for Privacy-Preserving and Enhancing Searching Efficiency
Paper Title:
in Cloud Environment
Abstract: Cloud computing allows the users geographically located to access data and application from a
cloud which follows the pay-as-you-go financial model. This technology provides a method to enhance the
capabilities dynamically without having to spend in new infrastructure or training personnel. Cloud computing
promises to offer reliable services to the customer through the construction of next-generation data centers and
storage technology. With its wide advantages, cloud computing has emerged as fast emergent segments of the
IT. Hence data security is a major concern for cloud users. One solution to this is that user can apply encryption
techniques on data before sending it to the cloud server. But encrypted data limits the server’s capability to make
plaintext keyword search. Keyword search functionality that can function over the encrypted data is desirable
but no information about the searched keyword or the retrieved document should not compromise in this
process. Our implementation of searchable symmetric encryption proves that it is not vulnerable to such things
and preserves privacy of user data and query.

Keywords: Privacy preserving, Keyword search, Encrypted data.

References:

1. Boneh D, Waters B (2007) Conjunctive, subset, and range queries on encrypted data. In: SalilVadhan P (ed) Theory ofcryptography,
LNCS 4392, Springer, Berlin Heidelberg, pp 535–554.
2. 2.Boneh D, Crescenzo GD, Ostrovsky R, Persiano G (2004) Public-key encryption with keyword search. In: Cachin C,Camenisch JL
(eds) Advances in Cryptology EUROCRYPT, LNCS 3027. Springer, Berlin Heidelberg, pp 506–522.
3. Liu Q, Wang G, Wu J (2009) An efficient privacy preserving keyword search scheme in cloud computing. In: InternationalConference
536. on Computational Science and Engineering (CSE), Vol. 2, pp 715–720.
4. Liu Q, Wang G, Wu J (2012) Secure and privacy preserving keyword searching for cloud storage services. J Netw Comput Appl
3093-
(JNCA) 35(3):927–933. 30
5. urtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficientconstructions. 98
In: Proceedings of the 13th ACM conference on Computer and communications security, ACM,pp 79–88.
6. Chang YC, Mitzenmacher M (2005) Privacy preserving keyword searches on remote encrypted data. In: Ioannidis J,Keromytis A,
Yung M (eds) Applied Cryptography and Network Security, LNCS 3531. Springer, Berlin Heidelberg, pp442–455.
7. Kamara S, Lauter K (2010) Cryptographic cloud storage. In: Sion R, Curtmola R, Dietrich S, Kiayias A, Miret JM, Sako K,Sebé F
(eds) Financial Cryptography and Data Security, LNCS 6054. Springer, Berlin, Heidelberg, pp 136–149.
8. Hacigümüs. H, Iyer B, Li C, Mehrotra S (2002 Executing sql over encrypted data in the database-service-provider model. In:
Proceedings of SIGMOD, ACM, pp 216–227.
9. Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J NetwComputAppl
34:1–11.
10. Kubiatowicz J, Bindel D, Chen Y, Czerwinski S, Eaton P, Geels D et al (2000) Oceanstore: an architecture for global-scale
persistent storage. In: Architectural support for programming languages and operating systems, ACM, pp.190–201.
11. 11. Muthitacharoen A, Morris R, Gil T M, Chen B (2002) Ivy: a read/write peer-to-peer file system. In: Proceedings of the
5th symposium on Operating System Design and Implementation, vol. 36, pp 31–44.
12. Salam, M.I., Yau, WC., Chin, JJ. et al. Hum. Cent. Comput. Inf. Sci. (2015) 5: 19. https://doi.org/10.1186/s13673-015-0039-9.
13. 13.D. V. N. Siva Kumar and P. Santhi Thilagam “Searchable encryption approaches: attacks and challenges”, Springer-Verlag
London Ltd., part of Springer Nature 2018.https://doi.org/10.1007/s10115-018-1309-4.
14. Zuojie Deng et.al “A multi-user searchable encryption scheme with keyword authorization in a cloud storage” Future Generation
Computer Systems, Volume 72, July 2017, Pages 208-218.
15. Manju S Nair and Rajasree M.S “Fine-grained search and access control in multi-user searchable encryption without shared keys”
Journal of Information Security and Applications, Volume 41, August 2018, Pages 124-133.
16. Xu, L., Weng, CY., Yuan, LP. et al. J Supercomput (2018) 74: 1001. https://doi.org/10.1007/s11227-015-1515-8
17. 17.G. Wang, C. Liu, Y. Dong, P. Han, H. Pan, B. Fang, "ID-Crypt: A Multi-User Searchable Symmetric Encryption Scheme for Cloud
Applications", IEEE Access, vol. 6, pp. 2908-2921, 2018.
18. Suleman. J. Nadaf et.al (2016), “Cloud Based Privacy Preserving Health Data Storage and Retrieval System”, International
Conference on Inventive Computation Technologies.

Authors: Edwin S Soji, T.Kamalakannan


A Conceptual AI-System Model for Home Automation and Smart Monitoring Based
Paper Title:
On Vision
Abstract: Home automation is a rapidly increasing developmental area in the terribly present days attributable
to the higher rate of affordability and ease. It provides the potential of controlling our homes and having the
sides retort to events that are managed mechanically, it has become an extremely popular attribute due to its
safety functions and reasons of value. We projected a model to introduce the whole automation of our house
with a security system for our household. The ideal concept of this project is to ascertain an answer that can be
537. achieved within a minimal budget. We got so used off shelf elements aspect that the amount reduced drastically.
This study conjointly discusses the chosen literature, fashionable datasets, and concludes with the challenges 3099-
within the domain at the side of a future direction. The main conceptual focus of this paper is to pose a system 31
based design that demonstrates the interfacing between MATLAB with camera and Arduino board for 02
observation and management of household instruments. In the projected system, Arduino board is interfaced
with MATLAB victimization serial communication to regulate home appliances. Image acquisition device is
interfaced to MATLAB which will ceaselessly show the status of the different type of household equipment on
the Graphical computer program [GUI] designed in MATLAB. When the correct commands are dispatched from
the MATLAB user interface, the corresponding household equipment is turned ON/OFF which are interfaced to
Arduino through relay board. The system conjointly sends alert messages or signals if any abnormality is
detected in the associate degree. The human motion recognition domain has been active for quite 20 years and
has provided an oversized quantity of literature.

Keywords: Home automation, Household equipment, Human motion recognition, MATLAB, IoT.

References:

1. F.A. Qayyum,M. Naeem, A.S.Khwaja, A.Anpalagan,L.Guan, And B.Venkatesh, 2015,”Appliancs Scheduling Optimization in Smart
Home Networks”, Department of electrical and computer engineering, Ryerson university,Toronto, Canada.
2. Praveen Kumar, Umesh Chandra Pati(2016),”IOT Based Monitoring and control of appliances for Smart Home”, IEEE International
Conference On Recent Trends In Electronics Information communication Technology, India.
3. Vignesh Govindraj, Mithileysh Sathiyanarayan, ”Customary Homes to Smart Homes using Internet of Things and Mobile
Application”, Bangalore, India.
4. X. Lei, G. Tu, A. X. Liu, C. Li, and T. Xie, “The insecurity of home digital voice assistants - amazon alexa as a case study,” CoRR,
vol. abs/1712.03327, 2017.
5. J. Gratch, N. Wang, J. Gerten, E. Fast, and R. Duffy, “Creating rapport with virtual agents,” in Intelligent Virtual Agents (C.
Pelachaud, J.-C. Martin, E. Andre, G. Chollet, K. Karpouzis, and D. Pel ´ e, eds.), (Berlin, ´ Heidelberg), pp. 125–138, Springer Berlin
Heidelberg, 2007.
6. S.-W. A. L. Shane Mitchell, Nicola Villa Martin, "The internet of everything for cities: Connecting people process data and things to
improve the livability of cities and communities", 2013, [online] Available: http://www.cisco.comlweb/about/ac79/docs/ps/motmlIoE-
Smart-City_PoV.pdfpr. Embodied Conversational Agents. Cambridge, MA, USA: MIT Press, 2000.
7. Yunchuan Sun, Hongli Yan, Junsheng Zhang et al., "Organizing and Querying the Big Sensing Data with Event-Linked Network in the
Internet of Things", International Journal of Distributed Sensor Networks, vol. 2014.
8. B. Weiss, I. Wechsung, C. Kuhnel, and S. M ¨ oller, “Evaluating embodied ¨ conversational agents in multimodal interfaces,”
Computational Cognitive Science, vol. 1, p. 6, Aug 2015.
9. Y. Matsuyama, A. Bhardwaj, R. Zhao, O. Romeo, S. Akoju, and J. Cassell, “Socially-aware animated intelligent personal assistant
agent,” in Proceedings of the 17th Annual Meeting of the Special Interest Group on Discourse and Dialogue, pp. 224–227, Association
for Computational Linguistics, 2016.
10. L. Yuan Zeng, "A Security Framework for Internet of Things Based on 4G communication", 2nd International Conference On
computer Science And Network Technology, pp. 1715-1718, 2012. B. Martinez and M. F. Valstar, Advances, Challenges, and
Opportunities in Automatic Facial Expression Recognition, pp. 63–100. Cham: Springer International Publishing, 2016.
11. N. Mahalle, B. Anggorojati, N. R. Prasad, R. Prasad, "Identity Authentication and Capability Based Access Control (IACAC) for the
Internet of Things", Journal of Cyber Security and Mobility, vol. 1, no. 4, pp. 309-348, march 2013.
12. F. Schroff, D. Kalenichenko, and J. Philbin, “Facenet: A unified embedding for face recognition and clustering,” in 2015 IEEE
Conference on Computer Vision and Pattern Recognition (CVPR), pp. 815–823, June 2015.

Authors: Amritha G, Manasi Suresh, Indu B

Paper Title: Literary trends in Cyber Space: Portrayal of the Metamodern “wings of Poesy”
Abstract: English literature, after sailing through different courses down the history, has now entered a new
space, which may affect its further cruise. The growth of technological space has given rise to a new genre
called cyber literature, which plays a significant role in the promotion of literary works. Cyber literature refers to
written literary texts, distributed and read on electronic screens. This electronic space provides a more flexible
and convenient platform for the artistic expressions of aspiring and budding authors. Cyber literature which
emerged towards the end of the 1990s through blogging, later expanded in social media platforms like Facebook,
Instagram, Twitter, Myspace etc. While the means and modes of expression changed, literature was again
moulded into something else, satisfying the needs of a modern reader. This paper explores the possibility of
social media and online communities as the new alternative to print publication, and it also aims at studying the
present and upcoming literary trends in the cyber space through a few examples. The case study includes an
analysis of the works of Rupi Kaur, an author who paved her way for fame using Instagram; Terribly Tiny Tales
and other pages in Facebook which seized the young hearts with relatable snippets and prose poems;
applications like “Haiku jam” which bring together people from all over the world to write a Haiku in unison.
The modern generation which upgrades their lifestyle along with the technological evolution, and the
contemporary issues that affect them, brings out a new literary culture. The unrestrained author-reader
interaction further decreases the former gap which held back the readers from voicing their opinions. While it
538.
possesses both positive and negative effects, it creates a space where everyone can be a writer, though only the 3103-
fittest will survive. 31
06
Keywords: Cyber literature, Literary trends, Rupi Kaur, Instagram, Terribly Tiny Tales

References:

1. Viires, Piret. (2005). “Literature in Cyberspace”. Available at: https://www.folklore.ee/folklore/vol29/cyberlit.pdf


2. N. Roy, “Voices of the new 'Instagram poets',” Financial Times, 23-Feb-2018. [Online]. Available:
https://www.ft.com/content/34433034-1651-11e8-9e9c-25c814761640. [Accessed: 25-Jul-2019].
3. 3-4. “Long story short,” terribly tiny tales. [Online]. Available: https://terriblytinytales.com/#secondSection/3 . [Accessed: 20-Jul-
2019].
4. Baron, Naomi S. (2003).”Whatever.”: A New Language Model? Available at:
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.616.9168&rep=rep1&type=pdf
5. Ross, K. (2007). Teachers say text messages r ruining kids' riting skills. American Teacher, 92(3), 4.
6. Vermeulen, T. and van den Akker, R. (2010). Notes on metamodernism. Journal of AESTHETICS & CULTURE, 2, p.10.
7. L. Turner, “The Metamodernist Manifesto: Luke Turner (2011),” The Metamodernist Manifesto | Luke Turner (2011). [Online].
Available: http://www.metamodernism.org/ . [Accessed: 30-Jul-2019].
8. Watts, Rebecca. (2018). “The Cult of the Noble Amateur”. Available at: https://www.pnreview.co.uk/cgi-bin/scribe?item_id=10090
9. 10.A. Ghose, “On brand, Rupi Kaur,” https://www.livemint.com, 23-Mar-2018. [Online]. Available:
https://www.livemint.com/Leisure/6Ai4YNKonsueZHFdxwNfOL/On-brand-Rupi-Kaur.html . [Accessed: 28-Jun-2019].
10. “Long story short,” terribly tiny tales. [Online]. Available: https://terriblytinytales.com/#firstSection. [Accessed: 30-Jul-2019].
11. 12 – 13. “Write Together, Feel Better,” HaikuJAM. [Online]. Available: https://haikujam.com/ . [Accessed: 10-Jul-2019].

Authors: L.Ramesh, R.A.Roseline

Paper Title: Secure Data Sharing Of Sensitive Medical Record (Phr) In the Cloud
Abstract: Present day human services areas need to make a domain which lessens tedious endeavors and other
expensive tasks to acquire a Patient complete medicinal transcription and consistently incorporates this
multifariousness accumulation of therapeutic information to convey it to the social insurance specialists.
Sensitive medical record (PHRs) came to be generally embraced to empower social insurance suppliers and
patients to make, oversee and get to human services data from wherever, and whenever. Cloud administrations
give the essential foundation at lower cost and better quality. Distributed computing when utilized in Healthcare
segment diminishes the expense of putting away, handling and refreshing with improved proficiency and quality.
In any case, the security of information in the cloud isn't acceptable today. The electronic wellbeing record
comprises of pictures of the patient's record which is exceptionally private. Human services information has
stringent security prerequisites for secrecy, accessibility to approved clients, and detect ability of connection.
The focal point of the present examination is explore on the above mentioned problem necessities and suggest an
answer for human services cloud suppliers this study will assist in ensuring persistent' information they have and
of those mentioned high significance. The attention will be on explicit distributed computing medicinal services
confidential matter and how cloud homomorphic encryption with part key and key designation can help in
gathering social insurance administrative necessities. The recommended system depends on proposed
calculation, RSA calculation, and Secret sharing calculation, Data imparting calculation to key assignment to
guarantee information privacy, validation, respectability, and accessibility in a staggered progressive request.
This will empower the social insurance supplier to accept/discard several entrance conditions in several requests,
particularly in therapeutic investigation condition.
539.
3107-
Keywords: PHR,ABE,QR-Code,QR-KP ABE. 31
14
References:

1. Samir Bahsani, Tarik Nahhal," Encryption as a Service for Data Healthcare Cloud Security ", IEEE, 2016.
2. Mr.K.A.Muthukumar,Dr.M.Nandhini, "Modified Secret Sharing Algorithm for Secured Medical Data Sharing in Cloud Environment",
IEEE, 2016.
3. Fahad Saeed Alamri, Ki Dong Lee, "Secure Sharing of Health Data OverCloud", IEEE, 2015.
4. Alex Page, Ovunc Kocabas, Scott Ames, "Cloud-based Secure Health Monitoring: Optimizing Fully Homomorphic Encryption for
Streaming Algorithms", IEEE, 2014.
5. Huda Elmogazy, Omaima Bamasak," Towards Healthcare Data Security in Cloud Computing", IEEE, 2013.
6. S. El-etriby, E. M. Mohamed, H. S. Abdul-kader, "Modern Encryption Techniques for Cloud Computing", ICCIT. 2012.
7. A. Kaur, M. Bhardwaj, "Hybrid Encryption for Cloud Database Security", UESAT, Vol-2, Issue- 3, pp737 - 741, May-Jun 2012.
(http://www.ijesat.org)
8. V. Gampala, S. Inuganti, S. Muppidi, "Data Security in Cloud Computing with Elliptic Curve Cryptography", USCE, Vol. 2, Issue 3,
ISSN: 2231-2307, July 2012.
9. R. L. Rivest, L. M. Adleman, and M. L. Dertouzos. On data banks and privacy homomorphisms. In Foundations of Sec.Comp. pp. 169-
180, 1978.
10. R. 1. Rivest, A. Shamir, and 1. M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Common. ACM,
21(2):pp.120-126, 1978.
11. C. Gentry. A fully homomorphic encryption scheme. PhD thesis, Stanford University,2009,www.crypto.stanford.edulcraig.
12. C. Gentry, "Fully homomorphic encryption using ideal lattices", In M. Mitzenmacher, editor, SIOC, pp.169- 178.ACM, 2009.
13. M. Tebaa, S. EI hajji, Abdellatif EI ghazi,"Homomorphic Encryption Applied to the Cloud Computing Security" ,World Congress on
Engineering (WCE) Vol. 1, July 2012.
14. B. Hayes, "Alice and Bob in Cipherspace", American Scientist, Vol. 100, pp. 362-367, Sep-Oct 2012, www.americanscientist.org
15. C. Gentry, "Computing Arbitrary Functions of Encrypted Data", ACM, Vol. 53 Issue 3, pp. 97-105, March 2010

Authors: Aniruddha P. Kshirsagar, Shradha K. Dhole, Pravin S. Patil, Rohini B. Kokare

Paper Title: Mobischool School Management System Using Android Application


Abstract: Mobiles are used everywhere. It is beneficial to have android application of School Management
system. This application includes database handling. Fully functional, flexible application and friendly interface
is required for school management application so that it will be easily handled by parents as well as teachers. It
is useful to get immediate alerts to the parents about notices [13]. Paper based activities are very costly and
difficult to handle [12].

Keywords: Android , Web View


540.
References: 3115-
31
1. SaurabhWalia and SatinderjitKaur Gill, ―A Framework for Web Based Student Record Management System using PHP‖, Himachal 19
Pradesh,vol.3, August (2014).
2. S.R. Bharamagoudar, Geeta R.B. and S.G. Totad, ―Web Based Student Information Management System‖, Andhra Pradesh, vol. 2,
June (2013).
3. ManasiKawathekar,Kirti K. Bhate,PankajBelgoankar,-An Android Application for Student Information System ||, Vashi, Navi
Mumbai, vol. 4, September (2015).
4. Vishwakarma R Ganesh,-Android College Management System ||,vol. 5, April (2016).
5. N. M. Z. Hashim and S. N. K. S. Mohamed, “Development of Student Information System”, UniversitiyTeknikal Malaysia Melaka,
vol. 2, pp. 256-260, August (2013).
6. Jianye Liu and JiankunYu ,Research on Development of Android Applications, Fourth International Conference on Intelligent
Networks and Intelligent Systems© (2011) IEEE DOI 10.1109/ICINIS.2011.40 pgs69-72.
7. Saad Ali, PrajwolNakarmi, and Sara Haghighi. Proposal: Birthday reminder Technical report, KTH, 2011. RohollahKarimi,
Mohammad Kalantari,”Enhancing security and confidentiality in location-based data encryption algorithms, International Conference
on Advances in Computing, Communications and Informatics (ICACCI), (2011).
8. Zhi-gang YUE, You-wei JIN, “The development and design of the student management system based on the network environment”,
International Conference on Multimedia Communications, 978-0- 7695- 4136-5/10 (2010) IEEE.
9. TANG Yu-fang,ZHANG Yong-sheng,“Design and implementation of college student information management system based on the
web services”. Natural Science Foundation of Shandong Province(Y2008G22), 978-1-4244-3930-0/09 (2009) IEEE.
10. Zhibing Liu, HuixiaWang,HuiZan “Design and implementation of student information management system.”(2010) International
symposiumon intelligence information processing and trusted computing.978-0-7695-4196-9/10 IEEE.
11. Bal´azsBeny´ o, B´alintS´odor ,TiborDoktor and GergelyFordos “Student attendance monitoring at the university using NFC” IEEE on
computer techonolgy- June (2010) .
12. Samkeet Jain,Radhika Garg,Vaibhavkrishna Bhosle,Lilash “ Smart university-student information management system” 2017
International Conference On Smart Technologies For Smart Nation (SmartTechCon) IEEE (2018) .
13. Dastgir Pojee,Farooq Shaikh,Vishal Kuvar,Fahim Rarh,Mohd. Abbas Meghani "Multi-platform college management framework" 2nd
International Conference on Communication and Electronics Systems (ICCES) IEEE (2017) .
Authors: Neha Yadav, T.V. Raman

Paper Title: Assessing the Effect of Financial Literacy on Investors Decisions Making
Abstract: Indian economy has made its growth at an accelerating pace over the last decade. The study aims to
assess literacy level of investors. The association between demographic, socio-economic profile of investors and
their financial literacy level has been studied. The study also finds that whether literacy of investors have any
effect on decision making of investors. To see the impact of demographic factors on financial literacy level,
regression is performed. The result of the study states that decision of investors is significantly affected by
literacy and knowledge of investors regarding financial terms.

Keywords: Financial Literacy, Financial Decisions, Investors Financial Knowledge


541.
3120-
References: 31
24
1. Hastings, J. S. (2003). Finacial Literacy, Financial Education and Economic Outcomes. Annual Review Of Economics , 5 (347-373).
2. Hung, A. (2009). Defining and Measuring Finacial Literacy. RAND Working Paper Series WR-708 , 28.
3. Huston, S. J. (2010). Measuring Financial Literacy. Journal of Consumer Affairs .
4. Jariwala, H. V. (2015). Analysis of Financial Literacy Level of Retail Individual Investors of Gujarat State and Its Effect on Investment
Decision. Journal of Business and Finance Librarianship , 20 (1).
5. Lusardi, A. (2010). Financial Literacy among the young. Journal of Consumer affairs , 2 (1).
6. Mandell, L. (2009). The Impact of Financial Literature Education on subsequent Financial Behavior. Journal of Financial Counseling
and Planning , 20 (1), 10.
7. Naidu, D. J. (2017). Financial Literacy in India. International Journal of Research in Business Studies and Management , 4 (6), 3.
8. Singh, N. G. (2018). Financial Literacy among Youth. International Journal of Social Economics , 45 (1).

Authors: A.Lakshmanarao, Y.Swathi, T. Srinivasa Ravi Kiran

Paper Title: An Effecient Fake News Detection System Using Machine Learning
Abstract: Social media plays a major role in several things in our life. Social media helps all of us to find some
important news with low price. It also provides easy access in less time. But sometimes social media gives a
chance for the fast-spreading of fake news. So there is a possibility that less quality news with false information
is spread through the social media. This shows a negative impact on the number of people. Sometimes it may
impact society also. So, detection of fake news has vast importance. Machine learning algorithms play a vital
role in fake news detection; Especially NLP (Natural Language Processing) algorithms are very useful for
detecting the fake news. In this paper, we employed machine learning classifiers SVM, K-Nearest Neighbors,
Decision tree, Random forest. By using these classifiers we successfully build a model to detect fake news from
the given dataset. Python language was used for experiments.

Keywords: fake news, machine learning, python.

References:
542.
1. N. J. Conroy, V. L. Rubin, and Y. Chen, “Automatic deception detection: Methods for finding fake news,” Proceedings of the 3125-
Association for Information Science and Technology, vol. 52, no. 1, pp. 1–4, 2015. 31
2. S. Feng, R. Banerjee, and Y. Choi, “Syntactic stylometry for deception detection,” in Proceedings of the 50th Annual Meeting of the 29
Association for Computational Linguistics: Short Papers-Volume 2, Association for Computational Linguistics, 2012, pp. 171–175.
3. Junaed Younus Khan, Md. Tawkat Islam Khondaker, Anindya Iqbal and Sadia Afroz “A Benchmark Study on Machine Learning
Methods for Fake News Detection”, arXiv:1905.04749v1, [cs.CL] 12 May 2019
4. Rubin, V.L., Chen, Y., Conroy, N.J.: Deception detection for news: three types of fakes. In: Proceedings of the 78th ASIS&T Annual
Meeting: Information Science with Impact: Research in and for the Community (ASIST 2015). Article 83, p. 4, American Society for
Information Science, Silver Springs (2015)
5. Shlok Gilda,”Evaluating machine learning algorithms for fake news detection”, 2017 IEEE 15th Student conference on Research and
Development, INSPEC Accession Number: 17613664.
6. Conroy, N. J., Rubin, V. L., & Chen, Y. (2015). Automatic deception detection: Methods for finding fake news. Proceedings of the
Association for Information Science and Technology, :52(1), 1-4.
7. Hadeer Ahmed, Issa Traore1, and Sherif Saad, “Detection of Online Fake News Using N-Gram Analysis and Machine Learning
Technique”, Springer International Publishing AG 2017I. Traore et al. (Eds.): ISDDC 2017, LNCS 10618, pp. 127–138, 2017.
8. Schow,A.:The 4 Types of‘Fake News’. Observer (2017) .http://observer.com/2017/01/fake-news-russia-hacking-clinton-loss/
9. Shlok Gilda, Department of Computer Engineering, Evaluating Machine Learning Algorithms for Fake News Detection, 2017 IEEE
15th Student Conference on Research and Development (SCOReD)
10. Thota, Aswini; Tilak, Priyanka; Ahluwalia, Simrat; and Lohia, Nibrat (2018) "Fake News Detection: A Deep Learning Approach,"
SMU Data Science Review: Vol. 1: No. 3, Article 10, 2018.
Authors: D. Rajababu, A.V.V. Sudhakar, B. Sathyavani

Paper Title: Development of Technology for High-Power Industry Converters


Abstract: The power stable of the converters is actually coming from some milliwatts (as in a cellphone) to
dozens of megawatts in an HVDC gearbox body. Along with "classic" electronic devices, power streams, as well
as current, are actually utilized to hold relevant information, whereas along with power electronic devices, they
lug power. This inverter may magnify source of power like gas- mobiles, little wind turbines, as well as photo-
voltaic assortments (i.e. it agrees with for circulated power treatments). The principles of resources and also
changes are actually described and also categorized. Coming from the general regulations of resource
propinquities, a universal procedure of power converter formation exists.

Keywords: power, converters, inverters.


543.
3130-
References:
31
1. A. Rufer, Static elements, CAS Power Converters for Fragment Accelerators, Warrington, 2004. 32
2. H. Foch and also J. Roux, Convertisseurs statiques d'énergie électrique à semi-conducteurs, License FR 78324428, United States
license 093106 (1978).
3. H. Foch, P. Marty as well as J. Roux, Use duality regulation in the perception of transistorized converters, PCI Process, Munich, 1980.
4. Y. Cheron, H. Foch and also T. Meynard, Generality of the powerful change idea: Frameworks as well as efficiency, Power Electronic
devices and also Apps, EPE, Grenoble, September 1987.
5. Y. Cheron, Soft Commutation (Chapman & Venue, 1992) (ISBN 0 412 39510 X).
6. R. Arches, F. Bordry, Y. Cheron, B. Escaut, H. Foch, P. Marty as well as M. Metz, Principes fondamentaux: Commutation dans les
convertisseurs statiques, in D 3153, Techniques de l'Ingénieur, Traité de Spirit Electrique, 9-1989.
7. Thompson, M.T. "Keep in minds 01" Intro to Power Electronic Devices. Thompson Consulting, Inc.
8. Kharagpur. "PowerSemiconductor Instruments" EE IIT. Obtained 25 March 2012
9. MuhammadH.Rashid, POWER ELECTRONIC DEVICES HANDBOOKDEVICES, CIRCUITS, As Well As FUNCTIONS 3rd
Version Butterworth-Heinemann,2007 ISBN 978-0-12-382036-5
Authors: Shivaleela. Patil, Shubhangi.DC

Paper Title: An Integrated Technique for Face Sketch Recognition Using DCNN
Abstract: Face Recognition (FR) is considered as one of the chief use in the investigation of criminals. In the
majority of the cases, information about the criminal is not available. In such situations, sketch artist draw the
sketch of the guess with the oral explanation provided by the eyewitness. These sketches can then be matched
manually against mug shot photos. This process is time-consuming. Hence there require a method that
efficiently goes with composite sketches to the gallery of mug shot databases. Thus the proposed system uses a
scheme for matching composite sketch and photo images, photo image features are extracted and fused to train
the system. Composite Sketch feature is matched with face photo images. Feature extraction (FE) is done using
Multi-Scale Local Binary Patterns (MLBP) Tchebichef Moments and Multiscale Circular Weber Local
Descriptor (MCWLD), Principal Component Analysis (PCA) is used for fusion of extracted features, DCNN
used as a classifier to recognize the face. The experiments are conducted using PRIP-HDC dataset and the
proposed system gives good accuracy in face recognition.

Keywords: Composite Sketch, MCWLD, Tchebichef Moments and MLBP and Tchebichef Moments and
DCNN Classifier, Knowledge Base (KB).

References:

544. 1. Faraji MR, and Qi X, “Face Recognition under Varying Illumination with Logarithmic Fractal Analysis”, Signal Processing Letters,
IEEE, Vol. 21, No. 12, pp.1457-1461, 2014. 3133-
2. Peng C, Gao X., Wang N, Tao D, Li X, and Li J, “Multiple Representations-Based Face Sketch–Photo Synthesis”, Transactions on 31
Neural Networks and Learning Systems, IEEE, Vol. 27, No. 12, pp.2201-2215, 2016. 40
3. Li S, Gong D and Yuan Y, “Face Recognition using Weber Local Descriptors”, Neurocomputing, Elsevier, Vol. 122, pp. 272-283,
2013.
4. Lu, J, Liong V E, Wang G, and Moulin P, “Joint Feature Learning for Face Recognition”, Transactions on Information, IEEE,
pp.1371-1383, Vol. 10, No. 07, 2015.
5. Qi Y, Guo J, Song Y, Z, Xiang, T, Zhang H, and Tan Z H, “Im2Sketch: Sketch Generation by Uncomplicated Perceptual Grouping”,
Neurocomputing, Elsevier, Vol. 165, pp.338-349, 2015.
6. Zhou, Jin, and Baoxin Li, “Automatic Generation of Pencil-Sketch Like Drawings from Personal Photos,” International Conference,
IEEE, pp. 1026-1029, 2015.
7. Han H, Klare B.F, Bonnen K and Jain, A.K, “Matching Composite Sketches to Face Photos: A Component-Based
Approach, Transactions on Information Forensics and Security”, International Conference, IEEE, Vol. 08, No. 01, pp.191-204, 2013.
8. Wang N, Li J, Tao D, Li X and Gao, “Heterogeneous Image Transformation”, Neurocomputing, Elsevier, Vol. 10, No. 07, pp.77-84,
2013.
9. Vu N S, “Exploring Patterns of Gradient Orientations and Magnitudes for Face Recognition”, Transactions on Information Forensics
and Security, IEEE Transactions on Information Forensics and Security, Vol. 08, No. 02, pp.295-304, 2013.
10. Wang N, Tao D, Gao X, Li X. and J, “Transductive Face Sketch-Photo Synthesis”, IEEE, Vol. 08, No. 01, pp.1364-1376, 2013.
11. Ding C, Xu C, and Tao D, “Multi-Task Pose-Invariant Face Recognition”, Transactions on Image Processing, IEEE, Vol. 24, No. 03,
pp.980-993, 2015.
12. Deepinder Singh and Dr. Rajat Gupta, “Matching Facial Composite Sketches to Police Mug-Shot Images Based on Geometric
Features”, IOSR Journal of Computer Engineering, Vol. 16, Issue 3, pp.29-35, 2014.
13. Reshma C. Mohan, Jayamohan and Arya raj, “Matching Sketches with Digital Face Images using MCWLD and Image Moment
Invariant”, IOSR Journal of computer engineering, Vol. 17, Issue 6, pp. 131-137, 2015.
14. Paritosh Mittal, Mayank Vatsa, and Richa Singh, “Composite Sketch Recognition via Deep Network A Transfer Learning Approach”,
International Conference, IEEE, pp. 251 – 256, 2015.
15. Mittal Paritosh, Mayank Vatsa, and Richa Singh, “Composite Sketch Recognition via Deep Network-A Transfer Learning Approach”,
International Conference, IEEE, pp. 251-2562015, 2015.
16. Ganesh S. Pakmode, “Component-Based Representation Approach to Recognize Face Photo using Composite Sketches”, International
Journal of Innovative Research in Computer and Communication Engineering, Vol. 3, Issue 6, pp. 5756-5758, 2015.
17. Faraji MR. and Qi X, “Face Recognition under Varying Illuminations Using Logarithmic Fractal Dimension-Based Complete Eight
Local Directional Patterns”. Neurocomputing, Elsevier, pp.16-30, 2016.
18. Mollahosseini A, Chan D., and Mahoor, M.H, “March. Going Deeper in Facial Expression Recognition Using Deep Neural Networks”,
Applications of Computer Vision, IEEE, Vol. 24, Issue 2, pp. 1-10, 2016.
19. Wang, J, Lu C, Wang, M, Li, P, Yan, S. and Hu, X, “Robust Face Recognition via Adaptive Sparse Representation”, Transactions on
Cybernetics, IEEE, Vol. 44, Issue 12, pp.2368-2378, 2014.
20. Qianwen Wan and Karen Panetta, “A Facial Recognition System for Matching Computerized Composite Sketches to Facial Photos
using Human Visual System Algorithms”, International Conference, IEEE, pp. 1-6, 2016.
21. http://biometrics.cse.msu.edu/pubs/databases.html
22. Scott Klum, Hu Han, Brendan Klare, and Anil K. Jain. “The FaceSketchID System: Matching
23. Facial Composites to Mugshots”. IEEE Transaction on Information Forensics and Security (TIFS), vol. 9, no. 12, pp. 2248-2263, Dec.
2014.

Authors: Lan Huong Nguyen, Quang Hung Nguyen


Application of Monte Carlo Method in Hydraulic Structures Safety Assessment in Vietnam
Paper Title:
Conditions
Abstract: Vietnam is a country with many dams but most of these works are designed according to the
Determined design method and analysis of safety factors, while the Random design method and the reliability
analysis have become popular in the world for many years. The paper introduces the method of calculating
reliability for hydraulic structures according to the Monte Carlo method or the level III random design method.
Based on the method of calculating the reliability of dams according to the Monte Carlo, the authors applied to
calculate the reliability of the main dam of Phu Ninh - Quang Nam irrigation reservoirs. Compare with the
reliability calculations at level II and have recommendations applied to all levels of construction in Vietnam
conditions: with important dams will be calculated according to the problem of level III, with less important
works of regions, calculated according to level II.

545. Keywords: Monte Carlo method, failure probability, random variable, confidence function, water overtopping
mechanism. 3141-
31
46
References:

1. Nguyen Quang Hung, Nguyen Van Mao . Reliability analysis of revetment using interlocking concrete blocks. Jurnal of water
resources and environmental engineering. Vol 44. 37-42. 2014.
2. Nguyen Van Mao, Nguyen Huu Bao, Nguyen Lan Huong, Dam safety probability calculation grounds, Construction Press, 2014
3. Probabilistic design and risk assessment of large dams, 1996, J,K Virijling/ M, Hauer/ R,E, Jorissen
4. I. M. Sobol’, Primer for the Monte Carlo Method, no. ISBN 0-8493-8673, 2000
5. Nguyen Vi, Method of modeling of statistics in calculation of confidence of port works. Transportation Press, Hanoi, 2009.
6. "Main report of Phu Ninh irrigation system in Quang Nam" HEC1, Phu Ninh reservoir rehabilitation and safety improvement project,
2001
7. Lan Huong Nguyen, Quang Hung Nguyen, Application of reliability theory in calculation of safety reservoir. International Journal of
Recent Technology and Engineering (IJRTE)Volume-8,Issue-2, July, 2019
8. Pham Hong Cuong, Quang Hung Nguyen. Applying reliability theory to appraise quality of irrigation system in Vietnam. International
Journal of Innovative Technology and Exploring Engineering (IJITEE), Volume-8 Issue-8. 1277-1281. 2019.

Authors: Vatan, Avinash Sharma, Sandip Goyal

Paper Title: IoT Standards and Applicability to Human Life


Abstract: A member of the Radio Frequency Identification Development (RFID) Association originated the
idea of IoT in 1999. Currently it become more applicable to the practical universe due to the growth of mobile
appliances, installed and global information, cloud computing and analysis of data. At present IoT acquired a
large observation from researchers because it beseems a significant machinery which assurance smart human life
by recognizing communication theory between articles, gadgets and every belonging of human beings. Presume
wherever millions of objects can feel, convey and share knowledge, all inter-related through either public or
private Internet Protocol networks. These inter-connected objects have constantly composed the data, evaluate
and used to commence act, supplying abundance of knowledge for designing, control and judgement making.
This is exactly the world of IoT (Internet of Things). IoT describes a manner that comprise things of the actual
546. world and detectors connected to these things, attached to the internet by guided and unguided network design.
3147-
The IoT detectors can employ various types of attachments such as RFID, Wireless-Fidelity, Bluetooth and
31
ZigBee. Additionally IoT approves broad domain connectivity by adopting many automations e.g. Global
53
System Mobile communication, General Packet Radio Services, 4G and Long Term Evolution. IoT empowered
objects will share knowledge of the provision of things, the nearby atmosphere with people, operating systems
and other appliances of IoT related with technology. Since the Internet of Things will produce a medium of
smart city, healthcare, connected houses and architecture in extension to several significant applicabilities such
as smart power, networks, conveyance, garbage control so that the universe will become smart in every aspects.

Keywords: Embedded, Optimization, RFID, Smart city, ZigBee.

References:
1. Saranya C. M., Nitha K. P., Analysis of Security methods in Internet of Things. International Journal on Recent and Innovation Trends
in Computing and Communication, Volume 3, Issue 4, April 2015.
2. Ketan Devadiga, “IEEE 802.15.4 and The Internet of Things” available at https://
wiki.aalto.fi/download/attachments/59704179/devadiga- 802-15-4-and-theiot.pdf?version=1
3. Bayouth, M & Thorpe, C 1996, An AHS concept based on anautonomous vehicle architecture, Proceedings of 3rd annual world
congress on intelligent transportation systems.
4. https://www.postscapes.com/internet-of-things-protocols/
5. Bejczy, AK 2009, „Sensors, controls and man-machine interface for advanced teleoperation‟, Science procedia, vol. 208, pp. 1327-
1335.
6. Belim, N, Bhambure, H, Kumbhar, P & Tuteja, S 2013, „Automate and Secure Your Home Using Zigbee Technology‟, International
Journal of Innovative Research in Computer and Communication Engineering, vol. 1, no. 1, pp.63-66.
7. Bolivar, MPR 2008, „Smart cities: big cities, complex governance, Transforming city government for successful smart cities‟, Public
administration and information technology, Springer, vol. 8, pp. 1-8.
8. Zeinab Kamal Aldein Mohammed and Elmustafa Sayed Ali Ahmed, “Internet of Things Applications, Challenges and Related Future
Technologies”.
9. https://en.wikipedia.org/wiki/Internet_of_things
10. Anshu Adwani, Kirti H. Madan, Rohit Hande, 2015,"Smart Highways Systems for Future Cities", 7292-7298.
11. Ankita Gill, Amita Arora, Manvi Siwch, 2017,"A Review on Applications Of Internet of Things", 17-21.
12. Ankita More, Prof. Vivekanandreddy,2017,"E - Monitoring of Physical Health Care System using IoT",438-439.
13. Arushi Singh, Divya Pathak, Prachi Pandit, Shruti Patil, Prof. Priti . C. Golar, 2017,"IOT based Air and Sound Pollution Monitoring
System", 1273-1278.
14. Baig, F, Mahmood, A, Javid, N, Razzaq, S, Khan, N & Saleem, Z2013, „Smart home energy management system for monitoring and
scheduling of home appliances using ZigBee‟, Journal of basic and applied scientific research, vol.3, no. 5, pp. 880-891.
15. Bandyopadhyay, D & Sen, J 2011, „Internet of things – Applications and challenges in technology and standardization‟, Wireless
personal communications, pp. 1-24.

Authors: S K Mala, M M Shanmugapriya

Paper Title: Graph of an Intuitionistic Fuzzy Ideal of M⟙ Groups in Near Rings


Abstract: The objective of this paper is to establish a relationship between intuitionistic fuzzy (IF) theory,
graph theory, intuitionistic fuzzy graph theory with the ideal algebraic structure of a near ring in MΓ group. The
idea of graph of an intuitionistic fuzzy (IF) ideal, the regular graph of an intuitionistic fuzzy (IF) ideal and their
isomorphism in MΓ group of near rings are discussed. Also, few properties of theirs are studied here as
theorems.

Keywords: Graph of an intuitionistic fuzzy (IF) ideal, regular graph of an intuitionistic fuzzy (IF) ideal,
isomorphism of graphs of intuitionistic fuzzy (IF) ideals in MΓ group of near rings.

References:

1. Atanassov, K.T., IF sets, Fuzzy set and systems, 20, 87-96 (1986).
2. Jianming, Z., and Xueling, M.,Intuitionistic fuzzy ideals of near-rings.International Society for Mathematical Sciences, 61, 219-223.
547. (2005).
3. Jun, Y. B., Sapanci M., and Ozturk M. A. Fuzzy ideals in gamma near-rings, Turk. J.Math. 22, 449-459(1998). 3154-
4. Kim, S. D., and Kim, H. S., fuzzy ideals of near-rings. Bull. Korean Mathematical Society, 33(4), 593-601(1996). 31
5. Karunambigai M.G., Parvathi R. and Buvaneswari R., Arcs in Intuitionistic fuzzy graphs, Notes on Intuitionistic fuzzy sets, 18, 48-58,
4, (2012).
57
6. Karunambigai M.G.,Parvathi R. and Buvaneswari R., Intuitionistic fuzzy graphs, Notes on Intuitionistic fuzzy sets, 18, 48-58, 4,
(2012).
7. Mala, S. K., Shanmugapriya, M. M., IF ideals of MΓ groups, International Journal of Mathematical Archieve, 9(1), 114-122 (2018).
8. Murali Krishna Rao.M , Fuzzy ideal graphs of a semigroup., Annals of Fuzzy Math- ematics and informatics, X, No x, xx-xx, (2018),
9. Palaniappan, N and Ramachandran, M. A Note on Characterization of Intuitionistic Fuzzy Ideals in G-Rings. International
Mathematical Forum. 5. 2553-2562 (2010).
10. Pilz, G., Near-Rings, Revised edition, North Holland (1983).
11. Rosenfeld .A, Fuzzy graphs, Fuzzy sets and their application to cognitive and decision process . (Proc .U.S -Japan sem , University of
Calif ,Berkley California 1974 ) Academic Press , New York ,PP77-95 (1975) .
12. Satyanarayana, B., and Prasad, K. S. Near rings, fuzzy ideals, and graph theory. CRC press, 305 312, 335 344(2013).
13. Shanmugapriya, M. M., and Arjunan, K., Homo morphism in Q-Intuitionistic L Fuzzy Sub near-rings of a near-ring,International
Journal of Mathematical Achieves,3,1000- 1004, (2012).
14. Sharma, P. K., Intuitionistic fuzzy representations of intuitionistic fuzzy groups. Asian Journal of Fuzzy and Applied Mathematics
(2015).
15. Zadeh, L. A. Fuzzy sets. In Fuzzy Sets, Fuzzy Logic, and Fuzzy Systems, 338353(1996).
16. Zhan, J., and Xueling, IF ideals of near-rings, Scientiae MathematicaeJaponicae, 289- 293(2014).

Authors: Ajai S., K. Kumar, P. M. Abdul Rahiman, V. S. Sohoni, V. S. Jahagirdar

Paper Title: Vortex Prediction in a Pump Intake System Using Computational Fluid Dynamics
Abstract: A pump intake system consists of forebay, pumpbay and pipeline arrangements through which water
flows in order to meet its demand. Vortices and velocity fluctuations affects the performance of a pump intake
system. This paper presents the vortex prediction in a pump sump for varying flow conditions across the pump
bay and the bellmouth section, using computational fluid dynamics (CFD) code Flow 3D. Geometry of
rectangular type sump was chosen for comparing the physical experimentation with the computational model.
The velocity fluctuations, location of vortex formation and its profiles predicted by CFD code was compared
with that of the physically observed experiments. The velocity and fluid flow profiles predicted by CFD
correlated well with the flow conditions observed during the physical experiments. Further, characteristics of
vortex were also studied with respect to the velocity change. Increase in the wobbling phenomenon of the vortex
with increase in the flow velocity was also identified with the computational studies. CFD can be used as a tool
548. to study the preliminary design of a hydraulic system for a particular field condition, thus complementing the
physical model studies to facilitate the construction of an optimized and effective pump intake system.
3158-
Keywords: bellmouth, pump bay, streamlines, swirl angle, vortices. 31
63
References:

99. Ajai S., Abdul Rahiman P M, Kumar K (2016) “CFD Analysis of Multi-Intake Pump Sump System”, Indian Journal of Power and River
Valley Development, ISSN: 0019-5537, Issue: September-October.
100. Cecilia Lucino, Sergio Lisca y Gonzalo Duró (2010), “Vortex detection in pump sumps by means of CFD”, XXIV Latin
American Congress on Hydraulics (IAHR), Punta Del Este, Uruguay.
101. Constantinescu G. S. and Patel V. C. (1998), “Numerical model for simulation of pump-intake flow and vortices.” ASCE Journal
of Hydraulic Engineering, Vol. 124, No.2, pp 123-124
102. Essam A Khalifa, Mostafa A. Abu-Zeid, S. M. Abdel-Rahman, Sami A. A. El-Shaikh (2014), “Evaluation of the flow
characteristics in the intake structure and pump sumps using physical model” , International Journal of Engineering Research and
Technology, ISSN 0974-3154 Volume 7, Number 1, pp 79-91.
103. Flow-3D guide, v11.2, Flow Science, Inc., U.S.A.
104. Hydraulic Institute Standards (1998), American national standard for pump intake design, ANSI/HI 9.8., American National
Standards Institute, Hydraulic Institute, Washington. DC.
105. J.T Kshirsagar and Shyam N. Shukla (2008), “Numerical prediction of air entrainment in pump intakes”, Proceedings of the
twenty fourth International Pump users Symposium.
106. KadamPratap M. and D.S. Chavan (2013), “CFD analysis of flow in pump sump to check suitability for better performance of
pump”, International Journal on Mechanical Engineering and Robotics, ISSN (Print): 2321-5747, Volume-1, Issue-2, pp 59-65.
107. Roberge J. A. (1999), “Use of computational fluid dynamics (CFD) to model flow at pump intakes.” M. S. dissertation,
Environmental Engineering., Worcester Polytechnic Institute, Worcester, Massachusetts, U.S.A.
108. S.G. Joshi and S.N. Shukla (2002), “Use of CFD for sump flow studies”, National Seminar on ‘Pumps, valves, pipes and
accessories’, Mumbai, India.
109. S. Pradeep, G. Sayantan, P.G. Prasad and M.S. Mohan Kumar (2012), “CFD simulation and experimental validation of a
horizontal pump intake system”, ISH Journal of Hydraulic Engineering, Vol. 18, No. 3, pp 173-185.
110. Tanweer S. Deshmukh and V. K Gahlot (2010), “Simulation of flow through a pump sump and its validation”, International
Journal of Recent Research and Applied Studies, ISSN 2349-4891, 4 (1), pp 7-17.
Authors: Rajni Singla, Rekha Yadav

Paper Title: Design an All Digital PLL with Ripple Reduction Technique
Abstract: The article describes about the design and implementation of advance version of Phase Lock Loop
(PLL) is All Digital PLL. Research work is on ADPLL where parameter ripple is reduced by applying the
technique of ripple reduction technique. Ripple reduction technique reduces the use of Kth counter, Kth counter
comes under consideration when enable is ON. Phase locked loops are most widely used in communication
system. Most of the PLL’s that are used currently are hybrid type PLL’s where all the blocks are assumed to be
digital. The circuit design of ADPLL consists of Digital Controlled Oscillator (DCO), loop filter and Phase
Frequency detector (PFD). Here phase detector used is Ex-or gate, for loop filter, Kth counter is used and
Increment/Decrement circuit is used as DCO. Divide-by-N counter is used for feedback system. The output of
the DCO is going in the PFD through the feedback network. Xilinx Vivado suit 2018.2 tools is used for
simulating Verilog code. Board chosen in vivado is zed board Zynq. First, with the help of circuit diagram of
ADPLL Verilog code is being written on project window. After compilation of code it is simulated with the help
of test bench. After that it is going to be implemented and verified with the board zedboard. Number of LUTs
used are 32 and Flip Flops used are 35. This paper presents an all digital approach for the design, simulation,
synthesis and implementation of FPGA based ADPLL centered at 195.31 KHz using Verilog HDL code. The
proposed design methodology resulted in reduction of ripple, power dissipation, junction temperature of board.
Proposed research work further can be used in communication for frequency synthesizer. Any system whether it
is from communication or digital etc ADPLL is common to use for ripple reduction at its output. So ADPLL is
basic building block in any type of communication system.
549.
3164-
Keywords: ADPLL, Ex-or Phase detector, Kth counter, Counters, Ripple Cancellation Circuit. 31
68
References:

1. "ALL DIGITAL PHASE LOCKED LOOP", International Journal of Emerging Technologies and Innovative Research (www.jetir.org),
ISSN:2349-5162, Vol.6, Issue 6, page no.348-351, June-2019.
2. Yadav R, Shukla NK, Gupta R. “All-Digital Phase Locked Loop (ADPLL) as an Intellectual Property (IP) Core for an Application-
specified Integrated Circuit (ASIC) Product: A Survey”. Journal of VLSI Design Tools & Technology. 2019 Mar 11;5(3):12-7.
3. Gothandaraman A. “Design and Implementation of an All Digital Phase Locked Loop using a Pulse Output Direct Digital Frequency
Synthesizer”.
4. Edway S, Manjunath RK. “Design and simulation of FPGA based all digital phase locked loop (ADPLL)”. In2017 3rd International
Conference on Applied and Theoretical Computing and Communication Technology (iCATccT) 2017 Dec 21 (pp. 259-263). IEEE.
5. Chaudhary AK, Kumar M. “Design and implementation of ADPLL for Digital communication applications”. In2017 2nd International
Conference for Convergence in Technology (I2CT) 2017 Apr 7 (pp. 397-401). IEEE.
6. Dinesh R, Marimuthu R. “A Survey on ADPLL Components and their effects upon Power, Frequency and Resolution”. International
Journal of Applied Engineering Research. 2016;11(3):1569-74.
7. Tripathi N, Pradhan SN. “Design of Power Efficient All Digital Phase Locked Loop (ADPLL)”. In2016 International Conference on
Wireless Communications, Signal Processing and Networking (WiSPNET) 2016 Mar 23 (pp. 778-782). IEEE.
8. Purkayastha BB, Sharma KK. “A digital phase locked loop based signal and symbol recovery system for wireless channel”. India:
Springer; 2015 Jan 29.
9. Xu L. “All-digital phase-locked loop for radio frequency synthesis”. PhD thesis. 2014 May.
10. https://www.xilinx.com/support/documentation/sw_manuals/xilinx2014_1/ug937-vivado-design-suite-simulation-tutorial.pdf
11. ata K, Kumar M. “ALL digital phase-locked loop (ADPLL): a survey”. International Journal of Future Computer and Communication.
2013 Dec 1;2(6):551.
12. Chung CC, Sheng D, Su WS. “A 0.5 V/1.0 V fast lock-in ADPLL for DVFS battery-powered devices”. In2013 International
Symposium on VLSI Design, Automation, and Test (VLSI-DAT) 2013 Apr 22 (pp. 1-4). IEEE.
13. Feist T. “Vivado design suite”. White Paper. 2012 Jun;5:30.
14. Kumar M, Lata K. “FPGA implementation of ADPLL with Ripple Reduction Techniques”. International Journal of VLSI design &
Communication Systems (VLSICS). 2012 Apr 1;3(2):99-106.
15. Das A, Dash S, Babu BC, Sahoo AK. “A novel phase detection system for linear all-digital phase locked loop”. In2012 Students
Conference on Engineering and Systems 2012 Mar 16 (pp. 1-6). IEEE.
16. Wang YL, Wang GT, Liu WJ. “Design and implementation of the RF front-end all-digital phase-locked loop in the UHF RFID reader”.
InKey Engineering Materials 2011 (Vol. 474, pp. 63-68). Trans Tech Publications.
17. Kumm M, Klingbeil H, Zipf P. “An FPGA-based linear all-digital phase-locked loop”. IEEE Transactions on Circuits and Systems I:
Regular Papers. 2010 Sep;57(9):2487-97.
18. Zhang Q, Huang K, Liu Z, Li Z. “Research and application of all digital phase-Locked loop”. In2009 Second International Conference
on Intelligent Networks and Intelligent Systems 2009 Nov 1 (pp. 122-125). IEEE.
19. Fergusson WW, Patel RH, Bereza W. “Modeling and Simulation of Noise in Closed-Loop All-Digital PLLs using Verilog-A”. In2007
IEEE Custom Integrated Circuits Conference 2007 Sep 16 (pp. 857-860). IEEE.
20. Bergeron J, Cerny E, Hunter A, Nightingale A. “Verification methodology manual for SystemVerilog”. Springer Science & Business
Media; 2006 Jan 16.
21. Staszewski RB, Wallberg JL, Rezeq S, Hung CM, Eliezer OE, Vemulapalli SK, Fernando C, Maggio K, Staszewski R,Barton N, Lee
MC. “All-digital PLL and transmitter for mobile phones. IEEE journal of Solid-State circuits”. 2005 Dec;40(12):2469-82.
22. Stefo R, Schreiter J, Schlussler JU, Schuffny R. High resolution “ADPLL frequency synthesizer for FPGA-and ASIC-based
applications”. InProceedings. 2003 IEEE International Conference on Field-Programmable Technology (FPT)(IEEE Cat. No.
03EX798) 2003 Dec 17 (pp. 28-34). IEEE.
23. Fahim AM, Elmasry MI. “A fast lock digital phase-locked-loop architecture for wireless applications. IEEE Transactions on Circuits
and Systems II: Analog and Digital Signal Processing”. 2003 Mar 26;50(2):63-72.
24. Khalil AH, Ibrahim KT, Salama AE. “Design of ADPLL for good phase and frequency tracking performance”. InProceedings of the
Nineteenth National Radio Science Conference 2002 (pp. 284-290). IEEE.
25. Liu Y. “Design of all digital phase-locked loop in serial link communication” (Doctoral dissertation).
26. Thomas JB. “An analysis of digital phase-locked loops”. Pasadena, CA: Jet Propulsion Laboratory; 1989
27. Nienhaus HA, Jain VK. “A digital phase lock loop for VLSI telecommunication applications. InProceedings”. IEEE Energy and
Information Technologies in the Southeast' 1989 Apr 9 (pp. 1216-1220). IEEE.
28. Sandoz JP, Steenaart W. “Performance Improvement of a Binary Quantized All-Digital Phased-Locked Loop with a New Aided-
Acquisition Technique”. IEEE transactions on communications. 1984 Dec;32(12):1269-76.
29. Troha DG, Gallia JD. “Digital phase-locked loop design using SN54/74LS297”. Texas Instruments; 1981.
30. Heiman A, Bar-Ness Y. “Optimal design of PLL with two separate phase detectors”. IEEE Transactions on Communications. 1981
Feb;29(2):92-100. x
Authors: Sheelesh Kumar Sharma, Navel Kishor Sharma

Paper Title: Text Classification Using Ensemble Of Non-Linear Support Vector Machines
Abstract: With the advent of digital era, billions of the documents generate every day that need to be managed,
processed and classified. Enormous size of text data is available on world wide web and other sources. As a first
step of managing this mammoth data is the classification of available documents in right categories. Supervised
machine learning approaches try to solve the problem of document classification but working on large data sets
of heterogeneous classes is a big challenge. Automatic tagging and classification of the text document is a useful
task due to its many potential applications such as classifying emails into spam or non-spam categories, news
articles into political, entertainment, stock market, sports news, etc. The paper proposes a novel approach for
classifying the text into known classes using an ensemble of refined Support Vector Machines. The advantage of
proposed technique is that it can considerably reduce the size of the training data by adopting dimensionality
reduction as pre-training step. The proposed technique has been used on three bench-marked data sets namely
CMU Dataset, 20 Newsgroups Dataset, and Classic Dataset. Experimental results show that proposed approach
is more accurate and efficient as compared to other state-of-the-art methods.

Keywords: Text classification, support vector machine, non-linear ensemble, machine learning, natural
language processing.
550.
References: 3169-
31
1. Berry, M. W. (2004). Survey of text mining. Computing Reviews, 45(9), 548. 74
2. Hotho, A., Nürnberger, A., & Paaß, G. (2005, May). A brief survey of text mining. In Ldv Forum (Vol. 20, No. 1, pp. 19-62).
3. Kumar, B. S., & Ravi, V. (2016). A survey of the applications of text mining in financial domain. Knowledge-Based Systems,
114, 128-147.
4. Zhu, F., Patumcharoenpol, P., Zhang, C., Yang, Y., Chan, J., Meechai, A., ... & Shen, B. (2013). Biomedical text mining and its
applications in cancer research. Journal of biomedical informatics, 46(2), 200-211.
5. AlSumait, L., Barbará, D., & Domeniconi, C. (2008, December). On-line lda: Adaptive topic models for mining text streams with
applications to topic detection and tracking. In 2008 eighth IEEE international conference on data mining (pp. 3-12). IEEE.
6. He, W., Zha, S., & Li, L. (2013). Social media competitive analysis and text mining: A case study in the pizza industry.
International Journal of Information Management, 33(3), 464-472.
7. Zanasi, A., & Zanasi, A. (2007). Text mining and its applications to intelligence, CRM and knowledge management. Wit Press.
8. Kang, M., Ahn, J., & Lee, K. (2018). Opinion mining using ensemble text hidden Markov models for text classification. Expert
Systems with Applications, 94, 218-227.
9. Zhang, X., Zhao, J., & LeCun, Y. (2015). Character-level convolutional networks for text classification. In Advances in neural
information processing systems (pp. 649-657).
10. Conneau, A., Schwenk, H., Barrault, L., & Lecun, Y. (2016). Very deep convolutional networks for text classification. arXiv
preprint arXiv:1606.01781.
11. Skrlj, B., Kralj, J., Lavrač, N., & Pollak, S. (2019). Towards Robust Text Classification with Semantics-Aware Recurrent Neural
Architecture. Machine Learning and Knowledge Extraction, 1(2), 575-589.
12. Abdi A., Shamsuddin S.M, Hasan S., & Piran J. (2019): Deep learning based sentiment classification of evaluative text based on
multi-feature fusion, Information Processing and Management, 56, 1245-1259.
13. He J., Wang L., Liu L., Feng J., & Wu H. (2019) Long Document Classification From Local Word Glimpses via Recurrent
Attention Learning, 7, 40707 – 40718 .
14. Wang, S. J., Mathew, A., Chen, Y., Xi, L. F., Ma, L., & Lee, J. (2009). Empirical analysis of support vector machine ensemble
classifiers. Expert Systems with applications, 36(3), 6466-6476.
15. Wang, T. Y., & Chiang, H. M. (2007). Fuzzy support vector machine for multi-class text categorization. Information Processing
& Management, 43(4), 914-929.
16. Tang, F. M., Wang, Z. D., & Chen, M. Y. (2005). On multiclass classification methods for support vector machines. Control and
Decision, 20(7), 746.
17. Chatterjee, S., Jose, P. G., & Datta, D. (2019). Text Classification Using SVM Enhanced by Multithreading and CUDA.
International Journal of Modern Education and Computer Science, 11(1), 11.
18. Goudjil, M., Koudil, M., Bedda, M., & Ghoggali, N. (2018). A novel active learning method using SVM for text classification.
International Journal of Automation and Computing, 1-9.
19. Do, T. N., & Poulet, F. (2019). Latent lSVM classification of very high dimensional and large scale multi-class datasets.
Concurrency and Computation: Practice and Experience, 31(2), e4224.
20. CMU Web Knowledgebase Dataset http://www.cs.cmu.edu/afs /cs.cmu.edu/project/theo-20/www/data/ (last visited on June 15,
2019)
21. 20 News Net Dataset: http://qwone.com/~jason/20Newsgroups/ (last visited on June 15, 2019)
22. Classic dataset http://www.dataminingresearch.com/ download/ dataset/classicdocs.rar (last visited on June 15, 2019).

Authors: D.Chandravathi , P.V.Lakshmi


Privacy Preserving Using Extended Euclidean Algorithm Applied To RSA-Homomorphic
Paper Title:
Encryption Technique
Abstract: Communication of confidential information over Internet is the key aspect of security applications.
Providing protection to sensitive information is of major concern. Many cryptographic algorithms have been in
use for providing security of confidential information. Providing security for data has become major challenge in
this era. Classical cryptography is playing a major role in providing security for applications. In modern days
securing confidential information in the cloud is considered as an important challenge. Homomorphic
Encryption technique is one of the best solutions that provide security in the cloud[1]. In this paper, Extended
Euclidean Algorithm is used for generating keys. This technique follows RSA Homomorphic encryption
technique. .RSA Homomorphic encryption using Extended Euclidean algorithm (RSA-HE-EEA) is secure when
compared to RSA as it based on the generation of private key which makes the algorithm complex .This
technique of using Extended Euclidean Algorithm(EEA) is fast and secure when compared to RSA
homomorphic encryption technique. The encryption process utilizes modulo operator which gives security as
well.The beauty of this algorithm is in generation of private key which uses Extended Euclidean Algorithm
(EEA) that helps in avoiding brute force attacks. Also, this technique uses Homomorphic operations which gives
enhance security to confidential information in the cloud.

Keywords: Classical Cryptography, Homomorphic encryption, RSA, EEA, private key, brute force attack.

References:

1. Maheswari Losetti, Kanaka Raju Gariga “An Enhanced Rsa Algorithm for Low Computational Devices” International Journal of
Advanced,Research and Innovations Vol.1, Issue .2, pp 114-118.
2. Kuldeep Singh, Rajesh Verma, Ritika Chehal “Modified Prime Number Factorization Algorithm (MPFA) For RSA Public Key
Encryption”,International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-4, September 2012,
pp 204-206.
3. Sonal Sharma, Jitendra Singh Yadav and Prashant Sharma, “Modified RSA Public Key Cryptosystem Using Short Range Natural
Number Algorithm” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 8,
August 2012, pp 134-138.
4. “Extended Euclid algorithm and its application in RSA”,Jianqin Zhou ; Jun Hu ; Ping Chen The 2nd International Conference on
Information Science and Engineering,IEEE, 10.1109/ICISE.2010.5691644, 4-6 Dec. 2010.
5. R Gennaro. (2000), “RSA-Based Undeniable Signatures”, Journal of Cryptology, Vol 13, No. 4, pp 397-416. 3175-
551. 6. R Cramer, V Shoup. (2008), “Signature schemes based on the strong RSA assumption”, ACMTransactions on Information and System 31
Security, Vol 3, No 3, pp 161-185.
7. Gennaro. (2008), “Robust and Efficient Sharing of RSA Functions”, Journal of Cryptology, Vol 13, No 2, pp 273-300. 79
8. D Boneh, M Franklin. (2001), “Efficient generation of shared RSA keys”, Journal of the ACM, Vol 48, No. 4, pp 702-722.
9. Rivest, R.; A. Shamir; L. Adleman. "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems", Communications of
the ACM 21 (2): 120–126, doi: 10.1145/359340.359342, 1977.
10. B. Schneier, Applied cryptography, second edition, NY: John Wiley & Sons, Inc., 1996.
11. William Stallings, Cryptography and Network Security, Pearson Education, Fourth Edition.
12. Atul Kahate, Cryptography and Network Security, Tata McGraw-Hill Publishing Company Limited.
13. Nidhi Singhal, J.P.S.Raina “Comparative Analysis of AES and RC4 Algorithms for Better Utilization”,
14. International Journal of Computer Trends and Technology- July to Aug Issue 2011.
15. Priti V. Bhagat, Kaustubh S. Satpute and Vikas R. Palekar “Reverse Encryption Algorithm: A Technique for Encryption &
Decryption” International Journal of Latest Trends in Engineering and Technology (IJLTET), Vol. 2 Issue 1 January 2013,pp 90-95.
16. Gagandeep shahi, Charanjit singh “Cryptography and its two Implementation Approaches” International Journal of Innovative
Research in Computer and Communication Engineering ,Vol. 1, Issue 3, May 2013,PP 668-672.

Authors: Pankaj Kumar Kanoujiya, Piyush Charan, Tahsin Usmani, Zohaib Hasan Khan
Performance Estimation of 111kWp Grid Interactive Solar PV Power Plant at Integral
Paper Title:
University
Abstract: Solar Photovoltaic (SPV) is a novel technology to harvest solar energy as and when we talk about
552. replacing the conventional grid electricity. The degree of development of a country is measured by the amount
of energy used by humans. Energy demand is increasing due to population, urbanization and industrialization. 3180-
As a result conventional electricity needs to be replaced with non conventional energy resources so as to save the 31
environment from pollution due to increased number of unwanted gases and dust particles in the air. Harmful 87
gases like COx and SO2 in the environment are affecting the Air Quality Index (AQI) and making it difficult for
humans to breathe. Solar Energy is a clean and green solution to improve the AQI of the earth. In this research
we study and analyze the performance of a grid interactive SPV plant installed at Academic Block-II, Integral
University. In this regard, we measure the performance ratio for 4 (four) months. The effect of shading on the
PV panel is reviewed due to deposition of dust particles and bird feces.

Keywords: Solar Photovoltaic, Grid Interactive System, Performance Ratio, Capacity Utilization Factor

References:

1. Charan, P., Siddiqui, MM., Mittal, N., Khan, Z.H., “Solar Power Scavenging for Wireless Sensor Networks”, Journal of Mobile
Computing, Communications & Mobile Networks, Vol 3 Issue3, 2016, pp. 33-41.
2. Akash Kumar Shukla, K. Sudhakar, Prashant Baredar , “Simulation and performance analysis of 110 kWp grid-connected photovoltaic
system for residential building in India: A comparative analysis of various PV technology”, Energy Reports 2, pp 82–88, 2016.
3. B. Shiva Kumar, K. Sudhakar, “Performance evaluation of 10 MW grid connected solar photovoltaic power plant in India‖ Volume 1,
Pages 184-192, November 2015.
4. Maurya, E., Charan, P., Saeed, SH., “Study and Performance Evaluation of 91kW Grid Interactive SPV System (Case Study).” IOSR
Journal of Engineering (IOSRJEN), vol. 08, no. 11,, pp. 15-28, 2018.
5. Charan, P., Usmani, T., Paulus, R., Saeed, Syed, S.H., “Empirical Validation for Energy Efficiency of DEAR routing protocol over
AODV in IEEE802.15.4 based Wireless Sensor Networks”, International Journal of Innovative Technology and Exploring Engineering
(IJITEE), Vol. 8 Iss.8, pp.853-857, 2019.
Authors: Kamaljit Kaur, Kanwalvir Singh Dhindsa

Paper Title: A Novel Tweet Recommendation Framework for Twitter


Abstract: In order to keep them updated users follow various Twitter accounts to get the latest information. As
their social network increases it becomes challenging for them to find the relevant content from the massive
collection of information. A Twitter user needs to scan a lot of less relevant posts to find the interesting tweets.
Important updates may get lost if user is not able to read all the messages. So there is need that the most relevant
updates are shown to the user first. Traditionally, the most retweeted tweets are considered popular and are
brought forward. In order to improve the attractiveness of the incoming tweets we propose a personalized tweet
ranking method based on the trending topics in the user network. A hashtag ranking model is developed to map
the tweets into a ranked list of hashtags. The tweets corresponding to those hashtags are then ranked based on
the linear weighted model that considers features related to tweet, author of tweet and the user. Finally,
conducting a pilot user study we analyze the effectiveness of the proposed framework.

Keywords: Favorites, Hashtags, Retweets, Tweets, Twitter Timeline.

References:

1. Lu, C., Lam, W. and Zhang, Y., 2012, July. Twitter user modeling and tweets recommendation based on wikipedia concept graph. In
Workshops at the Twenty-Sixth AAAI Conference on Artificial Intelligence (pp. 33-38).
2. Pla Karidi, Danae & Stavrakas, Yannis & Vassiliou, Yannis. 2016. A Personalized Tweet Recommendation Approach Based on
Concept Graphs. 253-260. 10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0056.
3. Sharma, Chhavi & Bedi, Punam. (2018). Community based Hashtag Recommender System (CHRS) for twitter. Journal of Intelligent
& Fuzzy Systems.
4. Ding, Z., Zhang, Q. and Huang, X., 2012. Automatic hashtag recommendation for microblogs using topic-specific translation model.
Proceedings of COLING 2012: Posters, pp.265-274.
5. Ran, C., Shen, W. and Wang, J., 2018, April. An Attention Factor Graph Model for Tweet Entity Linking. In Proceedings of the 2018
553. World Wide Web Conference on World Wide Web(pp. 1135-1144). International World Wide Web Conferences Steering Committee.
6. Ma, J., Feng, C., Shi, G., Shi, X. and Huang, H., 2018. Temporal enhanced sentence-level attention model for hashtag
3188-
recommendation. CAAI Transactions on Intelligence Technology, 3(2), pp.95-100. 31
7. Gong, Y., Zhang, Q. and Huang, X., 2018. Hashtag recommendation for multimodal microblog posts. Neurocomputing, 272, pp.170- 92
177.
8. Kou, F.F., Du, J.P., Yang, C.X., Shi, Y.S., Cui, W.Q., Liang, M.Y. and Geng, Y., 2018. Hashtag Recommendation Based on Multi-
Features of Microblogs. Journal of Computer Science and Technology, 33(4), pp.711-726.
9. Ben-Lhachemi, N. and Nfaoui, E.H., 2018. Using Tweets Embeddings For Hashtag Recommendation in Twitter.Procedia Computer
Science, 127, pp.7-15.
10. Ben-Lhachemi, N. and Nfaoui, E.H., 2018, April. Hashtag Recommendation Using Word Sequences’ Embeddings. InInternational
Conference on Big Data, Cloud and Applications(pp. 131-143). Springer, Cham.
11. Otsuka, E., Wallace, S.A. and Chiu, D., 2016. A hashtag recommendation system for twitter data streams.Computational social
networks, 3(1), p.3.
12. She, J. and Chen, L., 2014, April. Tomoha: Topic model-based hashtag recommendation on twitter. In Proceedings of the 23rd
International Conference on World Wide Web (pp. 371-372). ACM.
13. Godin, F., Slavkovikj, V., De Neve, W., Schrauwen, B. and Van de Walle, R., 2013, May. Using topic models for twitter hashtag
recommendation. In Proceedings of the 22nd International Conference on World Wide Web (pp. 593-596). ACM.
14. Ran, C., Shen, W. and Wang, J., 2018, April. An Attention Factor Graph Model for Tweet Entity Linking. In Proceedings of the 2018
World Wide Web Conference on World Wide Web(pp. 1135-1144). International World Wide Web Conferences Steering Committee.
15. Ma, J., Feng, C., Shi, G., Shi, X. and Huang, H., 2018. Temporal enhanced sentence-level attention model for hashtag
recommendation. CAAI Transactions on Intelligence Technology, 3(2), pp.95-100.
16. Gong, Y., Zhang, Q. and Huang, X., 2018. Hashtag recommendation for multimodal microblog posts.Neurocomputing, 272, pp.170-
177.
17. Kou, F.F., Du, J.P., Yang, C.X., Shi, Y.S., Cui, W.Q., Liang, M.Y. and Geng, Y., 2018. Hashtag Recommendation Based on Multi-
Features of Microblogs. Journal of Computer Science and Technology, 33(4), pp.711-726.
18. Terán, L., Mensah, A.O. and Estorelli, A., 2018. A literature review for recommender systems techniques used in microblogs. Expert
Systems with Applications, 103, pp.63-73.
19. Orellana-Rodriguez, C. and Keane, M.T., 2018. Attention to news and its dissemination on Twitter: A survey. Computer Science
Review, 29, pp.74-94.
20. Zhang, A., Zheng, M. and Pang, B., 2018. Structural diversity effect on hashtag adoption in Twitter. Physica A: Statistical Mechanics
and its Applications, 493, pp.267-275.
21. Lee, H., Abdar, M. and Yen, N.Y., 2018. Event-based trend factor analysis based on hashtag correlation and temporal information
mining. Applied Soft Computing
22. Uysal, I. and Croft, W.B., 2011, October. User oriented tweet ranking: a filtering approach to microblogs. In Proceedings of the 20th
ACM international conference on Information and knowledge management (pp. 2261-2264). ACM.
23. Amiri, M.Z. and Shobi, A., 2017. A link prediction strategy for personalized tweet recommendation through doc2vec approach.
Research in economics and management, 2(4), pp.63-76.
24. Du, G., Sun, J., Huang, X. and Yu, J. Mining User Interests for Personalized Tweet Recommendation on Map-Reduce Framework. In
Proceedings of the 19th International Conference on Enterprise Information Systems (ICEIS 2017) - Volume 1, pages 201-208
25. Kaur K, Dhindsa K.S, 2019 TrendNet Algorithm: Towards Personalization of Twitter Trends. International Journal of Recent
Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-8 Issue-2, pages 1555-1560
26. Kaur K, Dhindsa K.S, 2019, Study of Existing Design Architectures and Frameworks in Twitter. In Proceedings of the IEEE
International Conference on Automation, Computational and Technology Management (ICACTM)

Authors: Satinderdeep Kaur, Nidhi Bhatla


An Efficient Gesture Recognition with ABC-ANN Classification and Key-Point Features
Paper Title:
Extraction for Hand Images
Abstract: With the advent of an electronic device in humanization, there has been various usage of easing
human-computer interface. However, novel methods and techniques have been developed for boosting the HCI
interface. In the world of technology, including gestures in the human-computer interface, become a crucial
exploration field. The gesture has become a communication approach with the computer interface and users.
Hand Gesture works as a natural boundary for serving as an inspiring strength for investigating gesture
classifications. The hand gesture is used in a wide variety of applications like as recognition technology,
controlling of system, computer system, electronic device, home appliances, flying equipment controlling, and
so forth. The hand gesture is described as the production of the motion or the gestures by hands; it determines
the expression through a signature pattern that leads to the interface between the system and individuals.
However, hand gesture plays the main role in the establishment of the novel human and system interface. In this
research, a classification technique with ABC –ANN is developed to enhance the detection rate and the SIFT
algorithm has been implemented to extract features of hand images. Features are described as - i) Assignment
(ii) Localization (iii) Orientation and (iv) SIFT key-points. The extraction of features is done through the key
point format. Along with that, classification and selection of the specific features of gesture image acquired
based on categories. Experimental analysis is done based on parameter metrics (testing rate, validation rate,
recognition rate) to improve the detection rate.

Keywords: Hand Gesture Recognition, Sign Languages, SIFT key point, and ABC-ANN classification
methods.

References:

1. Mitra, S and Acharya, T. (2007). Gesture recognition: A survey. IEEE Transactions on Systems, Man, and Cybernetics, Part C
(Applications and Reviews), vol. 37(3), pp. 311-324.
2. 2.Xu, Y. and Dai, Y. (2017). Review of hand gesture recognition study and application. Contemp Eng Sci, vol. 10(8), pp. 375-384.
3. Smith, A. V. W., Sutherland, A. I., Lemoine, A. and Mcgrath, S. (2000). U.S. Patent No. 6,128,003. Washington, DC: U.S. Patent
and Trademark Office.
554. 4. Elmezain, M., Al-Hamadi, A., Appenrodt, J and Michaelis, B. (2008, December). A hidden Markov model-based continuous gesture
recognition system for hand motion trajectory. In 2008 19th International Conference on Pattern Recognition (pp. 1-4). IEEE. 3193-
5. Freeman, W. T. and Roth, M. (1995, June). Orientation histograms for hand gesture recognition. In International workshop 31
on automatic face and gesture recognition (Vol. 12, pp. 296-301). 99
6. Liang, R. H. and Ouhyoung, M. (1998, April). A real-time continuous gesture recognition system for sign language. In Proceedings
Third IEEE international conference on automatic face and gesture recognition (pp. 558-567). IEEE.
7. Garg, P., Aggarwal, N. and Sofat, S. (2009). Vision-based hand gesture recognition. World Academy of Science, Engineering, and
Technology, vol. 49(1), pp. 972-977.
8. Liu, X. and Fujimura, K. (2004, May). Hand gesture recognition using depth data. In Sixth IEEE International Conference on
Automatic Face and Gesture Recognition, 2004. Proceedings. (pp. 529-534). IEEE.
9. Bretzner, L., Laptev, I. and Lindeberg, T. (2002, May). Hand gesture recognition using multi-scale color features, hierarchical
models and particle filtering. In Proceedings of the fifth IEEE international conference on automatic face gesture recognition (pp.
423-428). IEEE.
10. Choudhury, A., Talukdar, A. K. and Sarma, K. K. (2014, February). A novel hand segmentation method for multiple-hand gesture
recognition system under complex background. In 2014 International Conference on Signal Processing and Integrated Networks
(SPIN) (pp. 136-140). IEEE.
11. Khan, R. Z., and Ibraheem, N. A. (2012). Comparative study of hand gesture recognition system. In Proc. of the International
Conference of Advanced Computer Science & Information Technology in Computer Science & Information Technology (CS & IT)
(vol. 2, No. 3, pp. 203-213).
12. Khan, R. Z and Ibraheem, N. A. (2012). Hand gesture recognition: a literature review. International Journal of Artificial Intelligence
& Applications, vol. 3(4), pp. 161.
13. Reifinger, S., Wallhoff, F., Ablassmeier, M., Poitschke, T., and Rigoll, G. (2007, July). Static and dynamic hand-gesture recognition
for augmented reality applications. In International Conference on Human-Computer Interaction (pp. 728-737). Springer, Berlin,
Heidelberg.
14. Molina, J., Escudero-Viñolo, M., Signoriello, A., Pardàs, M., Ferrán, C., Bescós, J. and Martínez, J. M. (2013). Real-time user
independent hand gesture recognition from time-of-flight camera video using static and dynamic models. Machine vision and
applications, vol. 24(1), pp. 187-204.
15. Tiantian, L., Jinyuan, S., Runjie, L., and Yingying, G. (2015, May). Hand gesture recognition based on improved histograms of
oriented gradients. In The 27th Chinese Control and Decision Conference (2015 CCDC) (pp. 4211-4215). IEEE.
16. Chiang, T., and Fan, C. P. (2018, April). 3D depth information based 2D low-complexity hand posture and gesture recognition
design for human-computer interaction. In 2018 3rd International Conference on Computer and Communication Systems (ICCCS)
(pp. 233-238). IEEE.
17. Jaramillo, A. G., and Benalcázar, M. E. (2017, October). Real-time hand gesture recognition with EMG using machine learning. In
2017 IEEE Second Ecuador Technical Chapters Meeting (ETCM) (pp. 1-5). IEEE.
18. Sun, J. H., Ji, T. T., Zhang, S. B., Yang, J. K. and Ji, G. R. (2018, December). Research on the Hand Gesture Recognition Based on
Deep Learning. In 2018 12th International Symposium on Antennas, Propagation and EM Theory (ISAPE) (pp. 1-4). IEEE.
19. 19. Hand Gesture Datasets", Lttm.dei.unipd.it, 2019. [Online]. Available: http://lttm.dei.unipd.it/downloads/gesture/.
[Accessed: 05- Jun- 2019].

Authors: Manoj Gupta, Pankaj Gakhar

Paper Title: Power Quality Improvement in a Grid Coupled Solar PV System using Grey Wolf Optimization
Abstract: Since the PV penetration in the utility grid is increasing rapidly, there is a need of a control strategy
for the purpose of energy optimization and for providing clean and green electric power to the utility grid. In this
paper, a dynamic technique is proposed employing a Fractional Order PI controller tuned using Grey Wolf
Optimization Technique. The strategy provides the independent control active as well as reactive power being
injected into the grid. A complete investigation on performance analysis and THD levels at different solar
irradiation value were conducted on MATLAB/SIMULINK software. The efficacy of the work is validated by
comparing the results obtained by using Grey Wolf Optimization with permissible IEEE standards and the
observations proves the power quality improvement by reducing the THD i.e. Total Harmonic Distortion levels.

Keywords: Power Quality, FO-PI Controller, Grid Connected PV, Power Management.

References:
555.
1. P. Gakhar and M. Gupta, "Harmonic Mitigation in a Transformer Less Grid Connected Solar PV System Using Modified LCL 3200-
Filter," 2018 3rd International Conference and Workshops on Recent Advances and Innovations in Engineering (ICRAIE), Jaipur, 32
India, 2018, pp. 1-4. 04
2. M. Israr and A. K. Pandey, "Modeling and control of utility grid connected solar photovoltaic array integrated system using
MATLAB," 2017 International Conference on Computation of Power, Energy Information and Commuincation (ICCPEIC),
Melmaruvathur, 2017, pp. 500-505.
3. Pankaj Gakhar, Manoj Gupta, “A novel control strategy for power quality improvement in grid-connected solar photovoltaic system”,
Indonesian Journal of Electrical Engineering & Computer Science, Sept, 2019
4. Yu K, Liao C, Yau H., “A new.fractional-order.based intelligent maximum.power point tracking control algorithm for photovoltaic
power systems”. Int J Photoenergy 2015;2015:1e8.
5. S. Buso and P. Mattavelli, Digital Control in Power Electronics: Morgan & Claypool, 2006.
6. Topaz CM , BernoffAJ , Logan S , Toolson W . A model for rolling swarms of lo- custs. Eur Phys J Special Top 2008;157:93–109 .
7. S. Mirjalili, S. M. Mirjalili, and A. Lewis, "Grey Wolf Optimizer," Advances in Engineering Software, vol. 69, pp. 46-61, 2014.
8. R. A. Swief and T. S. Abdel-Salam, "PV impact on distribution system performance following grey wolf algorithm," 2017 Nineteenth
International Middle East Power Systems Conference (MEPCON), Cairo, 2017, pp. 437-444.
9. K. S. EI-Bidairi, H. Duc Nguyen, S. D. G. Jayasinghe and T. S. Mahmoud, "Multiobjective Intelligent Energy Management
Optimization for Grid-Connected Microgrids," 2018 IEEE International Conference on Environment and Electrical Engineering and
2018 IEEE Industrial and Commercial Power Systems Europe (EEEIC / I&CPS Europe), Palermo, 2018, pp. 1-6.

Authors: Pankaj Borah, Nijara Konch

Paper Title: Radiated Force due to Surge Motion by a Pair of Submerged Cylinder in Water
Abstract: Evaluation of hydrodynamic coefficients due to surge of submerged structure is great significant to
designing a device which can be consider as a device of wave energy. In the present work, a theoretical approach
is developed to describe radiation of water wave by fully submerged cylinder placed above a submerged circular
plate in water of finite depth which is based on linear water wave theory The radiation problem due to surge
motion by this pair of cylinders have investigated with the suspicion of linear water wave theory. To determine
the radiated potentials in every area, we utilize the eigenfunction expansion method and variables separation
method. Finally, we derived the analytical expressions of Hydrodynamic coefficients i. e. added mass and
damping coefficient due to surge and associated unknown coefficients are calculated by utilizing the matching
conditions between the physical and virtual boundaries. A set of added mass and damping coefficient have
presented graphically for various radius of the submerge cylinder.

Keywords: finite depth, radiation, surge, virtual boundary.

References:
556.
3205-
1. Abramowitz, M., & Stegun, I. A. (1965). Handbook of Mathematical Functions. New York: Dover. 32
2. Bhatta, D. D., & Rahman, M. (2003). On scatering and radiation problem for a cylinder in water of finite depth. International Journal of
Engineering Science, 41(9), 931-967.
10
3. Bhattacharjee, J., & Soares, C. G. (2010). Wave Interaction with a Floating Rectangular Box Near a Vertical Wall with Step Type
Bottom Topography. Journal of Hydrodynamics, 22 (5), 91-96.
4. Hassan, M., & Bora, S. N. (2012). Exciting forces for a pair of coaxial hollow cylinder and bottom-mounted cylinder in water of finite
depth. Ocean Engineering, 50, 38-43.
5. Hassan, M., & Bora, S. N. (2013). Exciting forces for a wave energy device consisting of a pair of coaxial cylinders in water of finite
depth. J. Marine Sci. Appl., 12, 315-324.
6. Jiang, S. C., Teng, B., Ning, D. Z., & Lin, Z. (2010). An Analytical Solution of Wave Diffraction by a Submerged Vertical Cylinder.
The Ocean Engineering, 28 (3), 68-75 [In Chinese].
7. MacCamy, R. C., & Fuchs, R. A. (1954). Wave forces on piles: A diffraction theory. Technical Memo, No. 69. US Army Beach
Erosion Board, p. 17.
8. Rahma, M. (1995). Water waves Waves: Relating Modern Theory to Advanced Engineering Applications. Clarendon Press, Oxford
9. Rahman, M., & Bhatta, D. D. (1993). Second order wave forces on a pair of cylinders. Canadian Applied Mathematics Quarterly, 1(3),
343-382.
10. Shen, Y. M., Zheng, Y. H., & You, Y. G. (2005). On the Radiation and Diffraction of Linear Water Waves by a Rectangular Structure
over a Sill: Part I. Infinite Domain of Finite Water Depth. Ocean Engineering, 32, 1073-1097.
11. Wu, B. J., Zheng, Y. H., You, Y. G., Sun, X. Y., & Chen, Y. (2004). On Scattering and Radiation Problem for a Cylinder over a
Cylindrical Barrier in Water of Finite Depth. Engineering Science, 6(2), 48-55 [In Chinese].
12. Wu, B. J., Zheng, Y. H., & You, Y. G. (2006). Response Amplitude and Hydrodynamic Force for a Buoy over a Convex. Journal of
Waterway, Port, Coastal, and Ocean Engineering, 132(2), 97-105.
13. Zheng, Y. H., Shen, Y. M., You, Y. G., Wu, B. J , & Rong, Liu (2005). Hydrodynamic properties of two vertical truncated cylinders in
waves. Ocean Engineering, 32, 241-271.

Authors: Praveen Sharma, Subhas Chandra Rana, Rabindra Nath Barman


Experimental Evaluation of Temperature Difference on Needle roller Bearing using Different
Paper Title:
Loads and Grades of oil Lubricant
Abstract: Needle roller bearings are mostly used in most of the rotating machines because of their accuracy
and proper working operation. The temperature difference of bearing is the most important factor for rotating
machines which should be as low as possible. In this paper, the experimental work has been performed on needle
roller bearing with different loads (20, 40, 60, 80 and 100 N) applied on it and with six lubricants of different
viscosity grades (ISO 10, 32, 46, 68, 100 and 120). It is found that the temperature of test bearing is increased
with increasing of applied load in every oil lubricant and the temperature difference is decreased from ISO 10 oil
lubricant to ISO120 oil lubricant. It is also found that the speed of shaft maintained constant for the oil lubricants
of ISO 10 to ISO100 but the speed of shaft is decreased using oil lubricant of ISO 120 due to high frictional
force.

Keywords: Different Loads, Needle Roller Bearing, Temperatures difference.

References:

1. Fangbo Ma, Zhengmei Li , Shengchang Qiu , Baojie Wu , Qi An, Transient thermal analysis of grease-lubricated spherical roller
bearings, Tribology International 93 (2016) 115-123.
557. 2. G.E. Morales-Espejel , P.M.Lugt , H.R.Pasaribu , H.Cen, Film thickness in grease lubricated slow rotating rolling bearings, Tribology
International 74 (2014) 7–19. 3211-
3. Guillermo E. Morales Espejel , Antonio Gabelli, A model for rolling bearing life with surface and subsurface survival: Sporadic surface 32
damage from deterministic indentations, Tribology International 96 (2016) 279–288. 20
4. I..Linares Arregui, B. Alfredsson, Elastic–plastic characterization of a high strength bainitic roller bearing steel- experiments and
modelling, International Journal of Mechanical Sciences 52 (2010) 1254–1268.
5. Jafar Takabi, M.M. Khonsari, Experimental testing and thermal analysis of ball bearings, Tribology International 60 (2013) 93–103.
6. Jafar Takabi, M.M. Khonsari, On the dynamic performance of roller bearings operating under low rotational speeds with consideration
of surface roughness, Tribology International 86 (2015) 62–71.
7. Jing Liu, Zhanglin Yan, Yimin Shao, An investigation for the friction torque of a needle roller bearing with the roundness error,
Mechanism and Machine Theory 121 (2018) 259–272.
8. Jingqiu Wang, Huajun Zhao, Wei Huang, Xiaolei Wang, Investigation of porous polyimide lubricant retainers to improve the
performance of rolling bearings under conditions of starved lubrication, Wear 380-381 (2017) 52–58.
9. Ke Yan, Yatai Wang, Yongsheng Zhu, Jun Hong, Investigation on the effect of sealing condition on the internal flow pattern of high-
speed ball bearing, Tribology International 105 (2017) 85–93.
10. Konstantinos D. Bakoglidis, Ileana Nedelcu, Ivan G. Ivanov, Ralph Meeuwenoord, Susann Schmidt, Erik Janzén, Pascal Ehret,
Grzegorz Greczynski, Lars Hultman, Rolling performance of carbon nitride-coated bearing components in different lubrication regimes,
Tribology International 114 (2017) 141–151.
11. M. Marquart , M.Wahl , S.Emrich , G.Zhang , B.Sauer , M.Kopnarski , B.Wetzel, Enhancing the life time of MoS2-lubricated ball
bearings, Wear 303 (2013) 169–177.
12. Philipp Bergmann, Florian Grün, István Gódor, Gabriel Stadler, Verena Maier-Kiener, On the modelling of mixed lubrication of
conformal contacts, Tribology International 125 (2018) 220–236.
13. R. A. E. Wood, Rolling bearing cages, TRIBOLOGY February 1972.
14. Siyuan Ai, Wenzhong Wang , Yunlong Wang, Ziqiang Zhao, Temperature rise of double-row tapered roller bearings analyzed with the
thermal network method , Tribology International 87 (2015) 11-22.
Authors: Shalini Sahay, A.K.Wadhwani, Sulochana Wadhwani, Sarita S.Bhadauria

Paper Title: Detection and Classification of ECG Signal through Machine learning
Abstract: The electrical activity which might be acquired by inserting the probes on the body exterior that is
originated within the individual muscle cells of the heart and is summed to indicate an indication wave form
referred to as the EKG (ECG). Cardiac Arrhythmia is an associate anomaly within the heart which may be
diagnosed with the usage of signals generated by Electrocardiogram (ECG). For the classification of ECG
signals a software application model was developed and has been investigated with the usage of the MIT-BIH
database. The version is based on some existing algorithms from literature, entails the extraction of a few
temporal features of an ECG signal and simulating it with a trained FFNN. The software version may be
employed for the detection of coronary heart illnesses in patients. The neural network’s structure and weights are
optimized using Particle Swarm Optimization (PSO). The FFNN trained with set of rules by PSO increase its
558. accuracy. The overall accuracy and sensitivity of the algorithm is about 93.687 % and 92%. 3221-
32
Keywords: Baseline wander, Electrocardiogram, Feature extraction,FFNN,PSO. 27

References:

1. S. Chaudhuri, T. D. Pawar, and S. Duttagupta, “Review of ECG Analysis.” Springer, 2009


2. B. Acar and H. Koymen, “SVD-Based On-Line Exercise ECG Signal Othogonalization ,” IEEE Trans Biomed Eng, vol. 46, no. 3, pp.
311–321, 1999.
3. Yongjin Wang,Foteini Agrafioti, Dimitrios Hatzinakos, and Konstantinos N.Plataniotis, “Analysis of Human Electrocardiogram for
Biometric Recognition,” Hindawi Publishing Corporation EURASIP Journal on Advances in Signal Processing Volume 2008, Article
ID 148658,dol:10.1155/2008/148658 2007.
4. Shahnaz Ayub, J.P.Saini: “Fusion Beats Extraction from ECG Using Neural Networks based Soft Computing Techniques”, Advances
in Applied Science Research, 2010, I(2) 76 – 83.
5. L. Biel, O. Pettersson, L. Philipson, and P. Wide, “ECG analysis: a new approach in human identification,” IEEE Transactions on
Instrumentation and Measurement, vol. 50, no. 3, pp. 808– 812, 2001
6. J. M. Irvine, B. K. Wiederhold, L. W. Gavshon, et al., “Heart rate variability: a new biometric for human identification,” in Proceedings
of the International Conference on Artificial Intelligence (IC-AI ’01), pp. 1106–1111, Las Vegas, Nev, USA, June 2001.
7. Hasan, M.A., & Mamun, M.D. (2012) “ Hardware approach of R-peak detection for the measurement of fetal and maternal heart rates,”
Journal of Applied Research and Technology, 10, 835-844.
8. Tran, T., McNames, J., Aboy, M., & Goldstein, B. (2004) “ Prediction
9. of paroxysmal atrial fibrillation by analysis of atrial premature complexes,” IEEE Trans Biomed Eng., 51, 561-569.
10. Tsipouras, M.G., Fotiadis, D.I., & Sideris, D. (2002)“Arrhythmia
11. classification using the R-R- interval duration signal,” IEEE Computers in Cardiology, 2002, 485-488.
12. J.I.Willems and CSE working party, “Recommendations for measurement standards in quantitative ECG,” European Heart Journal
1985)6,815-825.
13. Shahnaz Ayub, J.P.Saini: “Fusion Beats Extraction from ECG Using Neural Networks based Soft Computing Techniques”, Advances
in Applied Science Research, 2010, I(2) 76 – 83.
14. W. Jiang, S.G. Kong, “Block-based neural networks for personalized ECG signal classification,” IEEE Trans. Neural Netw. 18 (6)
(2007) 1750–1761E. H. Miller, “A note on reflector arrays (Periodical style—Accepted for publication),” IEEE Trans. Antennas
Propagat., to be published
15. Balambigai Subramanian, “ECG signal classification and parameter estimation using multiwavelet transform,” Biomedical Research
2017; 28 (7): 3187-3193
16. M. Clerc, “The swarm and the queen: towards a determininistic and adap-tive particle swarm optimization,” in: Congress on
Evolutionary Computation(CEC99), 1999, pp. 1951–1957.[28] J.A. Swets, Measuring the accuracy.
17. Ebrahimi A, Addeh J,(2015), “Classification of ECG Arrhythmias Using Adaptive Neuro-Fuzzy Inference System and Cuckoo
Optimization Algorithm,” CRPASE, ISSN 2423-4591,Vol. 01, Issue No.04,pp.134-140, November 2015

Authors: Devesh Rath, Ipseeta Satpathy, B. C. M. Patnaik


Augmented Reality (Ar) & Virtual Reality (Vr) - A Channel for Digital Transformation in
Paper Title:
Industrialization Fostering Innovation & Entrepreneurship
Abstract: Industry 4.0 leading towards fourth generation of industrialization is in the global news of every
nation. Digitalization plays a pivotal role in the said process in which the prospects of Augmented Reality (AR)
and Virtual Reality (VR) are of vital focus by different business houses cross sectors across the globe. The study
enumerates the prospective procedural measures to be incorporated by various educational institutes catering to
the futuristic industrial needs being a part of Industry 4.0 through collaborative approach. Moreover, it also
delineates the dominant role of AR & VR as a means of new age learning mechanism in optimizing the youths
fostering towards innovation and entrepreneurship through research and development by virtue of impedances of
skill development in the form of short term and long term courses among students and faculties. This
reverberates in deciphering the various industrial objections through formulation of startup entities thereby
enhancing the economy through technological interventions. The multi functionality of AR and VR across
different sectors like game technology, entertainment, tourism, medicine & healthcare, prehistoric studies,
streams of engineering & technology, trade & commerce, architecture, education, life sciences and many more
has been elucidated as a part of study objective in the mentioned paper.

Keywords: Augmented Reality (AR), Virtual Reality (VR), Engineering Technology, Medicine, Healthcare,
Tourism, Entrepreneurship, Innovation, Industry 4.0, Skill Development.

References:

1. Alexandra Klimova, Anna Bilyatdinova, Andrey Karsakov, Existing Teaching Practices in Augmented Reality, Procedia Computer
559. Science 136 (2018) 5–15, 7th International Young Scientist Conference on Computational Science 10.1016/j.procs.2018.08.232
2. Alexander Perzylo, Markus Rickert, Björn Kahl, Nikhil Somani, Christian Lehmann, Alexander Kuss, Stefan Profanter, Anders Billesø 3228-
Beck, Mathias Haage, Mikkel Rath Hansen, Malene Tofveson Nibe, Máximo A. Roa, Olof Sörnmo, Sven Gestegård Robertz, Ulrike 32
Thomas, Germano Veiga, Elin Anna Topp, Ingmar Kessler, and Marinus Danzer, Smart Robots for Flexible Manufacturing, IEEE
ROBOTICS & AUTOMATION MAGAZINE, MARCh 2019 1070-9932/19©2019IEEE
36
3. Alexandra Rese, DanielBaier, Andreas Geyer-Schulz, StefanieSchreiber, How augmented reality apps are accepted by consumers: A
comparative analysis using scales and opinions, Technological Forecasting & Social Change 124 (2017) 306–319
4. Amy Phillips, Paul Tumarkin and Nasser Peyghambarian, Entrepreneurship and Commercialization At Universities: A Faculty
Perspective, echnology and Innovation, Vol. 19, pp. 601-603, 2018, ISSN 1949-8241 E-ISSN 1949-825X
http://dx.doi.org/10.21300/19.3.2018.601
5. Anabel L. Kečkeš and Igor Tomičić, Augmented Reality in Tourism – Research and Applications Overview, Interdisciplinary
Description of Complex Systems 15(2), 157-167, 2017, DOI: 10.7906/indecs.15.2.
6. Anand Nayyar, Bandana Mahapatra, DacNhuong Le, G. Suseendran, Virtual Reality (VR) & Augmented Reality (AR) technologies for
tourism and hospitality industry, International Journal of Engineering & Technology, 7 (2.21) (2018) 156-160
7. Anna Tarabasz, Marko Selaković, Christopher Abraham, The Classroom of the Future: Disrupting the Concept of Contemporary
Business Education, Entrepreneurial Business and Economics Review, 6(4),
8. 231-245. https://doi.org/10.15678/EBER.2018.060413
9. Artur Lugmayr, Estefanía Serral, Ansgar Scherp, Bogdan Pogorelc and Moyen Mustaquim, Ambient media today and tomorrow,
Multimed Tools Appl (2014) 71:7–37, DOI 10.1007/s11042-012-1346-z
10. Azizul Hassan, Haywantee Ramkissoon, Augmented Reality Application in Visitor Experiences,
https://www.researchgate.net/publication/303923635, 2016
11. A.V. Andryushin, I.A. Shcherbatov, E.V. Makarevich, Organization of Students Innovative and ScientificWork in the Paradigm of the
University 3.0, 978-1-5386-5832-1/18/$31.00 ©2018 IEEE
12. Chris D. Kounavis, Anna E. Kasimati and Efpraxia D. Zamani, Enhancing the Tourism Experience through Mobile Augmented
Reality: Challenges and Prospects, www.intechopen.com, Int. j. eng. bus. manag., 2012, Vol. 4, Special Issue Digital and Mobile
Economy, 10:2012, DOI : 10.5772/51644
13. Dario Assante, Alessandro Caforio, Marta Flamini, Elpidio Romano, Smart Education in the context of Industry 4.0, 978-1-5386-9506-
7/19/$31.00 ©2019 IEEE
14. Dariusz M. Trzmielak, William B. Zehner II, Marketing of New Technologies and Products – Perspectives, Challenges, and Actions,
HANDEL WEWNĘTRZNY 2018;5(376):289-299
15. Eduardo González Mendívil, Rocío Esmeralda Naranjo Solís, Horacio Ríos, Innovative Augmented Reality System for Automotive
Assembling Processes and Maintenance: An Entrepreneurial Case at Tec de Monterrey, ICTON 2013, 978-1-4799-0683-3/13/$31.00
©2013 IEEE
16. Egui Zhu, Arash Hadadgar, Italo Masiello and Nabil Zary, Augmented reality in healthcare education: an integrative review, Zhu et al.
(2014), Augmented reality in healthcare education: an integrative review. PeerJ 2:e469; DOI 10.7717/peerj.469
17. E G Su Goh, Mohd Shahrizal Sunar and Ajune Wanis Ismail, 3D Object Manipulation Techniques in Handheld Mobile Augmented
Reality Interface: A Review, Digital Object Identifier 10.1109/ACCESS.2019.2906394
18. Fatin Norsyafawati Mohd Sabri, Zulkarnaen Khidzir, Ahmad Rasdan Ismail and Khairul Azhar Mat Dau, Empirical Study on
Important Elements of Mobile Augmented Reality Application for Heritage Content, 978-1-5090-2631-9/16/$31.00 ©2016 IEEE
19. Florian Maurer, Jens Schumacher, Organizational Robustness and Resilience as Catalyst to Boost Innovation in Smart Service
Factories of the Future, 978-1-5386-1469-3/18/$31.00 ©2018 IEEE, 2018 IEEE International Conference on Engineering, Technology
and Innovation (ICE/ITMC)
20. HE Ling, LI Rui, VR Glasses and Leap Motion Trends in Education, 978-1-5090-2218-2/16/$31.00 ©2016 IEEE
21. Hsieh MC, Lee JJ (2018) Preliminary Study of VR and AR Applications in Medical and Healthcare Education. J Nurs Health Stud Vol.
3:No.1:1
22. Jari Roy Lee Kaivo-oja and Iris Theresa Lauraeus, The VUCA approach as a solution concept to corporate foresight challenges and
global technological disruption, DOI 10.1108/FS-06-2017-0022 VOL. 20 NO. 1 2018, pp. 27-49, © Emerald Publishing Limited, ISSN
1463-6689
23. Jhonattan Miranda, Dante Chavarría-Barrientos, Paul K. Wright, Experiences in Interactive Collaborative Learning using an Open
Innovation Laboratory, 978-1-5386-0774-9/17/$31.00 ©2017 IEEE
24. Jorge Martín-Gutiérrez, Carlos Efrén Mora, Beatriz Añorbe-Díaz, Antonio González-Marrero, Virtual Technologies Trends in
Education, EURASIA Journal of Mathematics Science and Technology Education, ISSN 1305-8223 (online) 1305-8215 (print), 2017
13(2):469-486, DOI 10.12973/eurasia.2017.00626a
25. Jos Leijten, Innovation policy and international relations: directions for EU diplomacy, European Journal of Futures Research (2019)
7:4, https://doi.org/10.1186/s40309-019-0156-1
26. Jyoti Chauhan, Shilpi Taneja, Anita Goel, Enhancing MOOC with Augmented Reality, Adaptive Learning and Gamification, 978-1-
4673-6747-9/15/$31.00 2015 IEEE
27. Marco Pironti, Paola Pisano, Armando Papa, Technology Resilience and the S.T.O.R.M. Factory, Symphonya. Emerging Issues in
Management (symphonya.unimib.it), 2, 108-124, http://dx.doi.org/10.4468/2018.2.09
28. Matthias Heutger Dr. Markus Kückelhaus, AUGMENTED REALITY IN LOGISTICS: Changing the way we see logistics – a DHL
perspective, 2014
29. Michael H Kurniawan, Suharjito, Diana, Gunawan Witjaksono, Human Anatomy Learning Systems Using Augmented Reality on
Mobile Application, 3rd International Conference on Computer Science and Computational Intelligence
2018.10.1016/j.procs.2018.08.152, 1877-0509, Procedia Computer Science 135 (2018) 80–88
30. Mika Raunio, Nadja Nordling, Mika Kautonen, Petri Räsänen, Open Innovation Platforms as a Knowledge Triangle Policy Tool –
Evidence from Finland, Foresight and STI Governance, vol. 12, no 2, pp. 62–76, DOI: 10.17323/2500-2597.2018.2.62.76
31. Moritz Quandt, Benjamin Knoke, Christian Gorldt, Michael Freitag, Klaus-Dieter Thoben, General Requirements for Industrial
Augmented Reality Applications, 51st CIRP Conference on Manufacturing Systems, 10.1016/j.procir.2018.03.061, Procedia CIRP 72
(2018) 1130–1135
32. Nakul Gupta and Sangeeta Shah Bharadwaj, Agility in business school education through richness and reach: a conceptual model, Vol.
55 No. 4/5, 2013, pp. 370-384, Emerald Group Publishing Limited 0040-0912, DOI 10.1108/00400911311326018
33. Patrick Dallasega, Erwin Rauch, Christian Linder, Industry 4.0 as an enabler of proximity for construction supply chains: A systematic
literature review, https://doi.org/10.1016/j.compind.2018.03.039, Computers in Industry 99 (2018) 205-225
34. Potukuchi Thryamba kam, Influence of Augmented Reality in Showcasing the Digital Tourism Experience for Future Travelers with
Human Touch, International Journal of Innovative Research in Computer and Communication Engineering , Vol.5, Special Issue 2,
April 2017, ISSN(Online): 2320-9801, ISSN (Print): 2320-9798
35. Rabeh Morrar, Husam Arman, and Saeed Mousa, The Fourth Industrial Revolution (Industry 4.0): A Social Innovation Perspective,
Technology Innovation Management Review November 2017 (Volume 7, Issue 11)
36. Rachid Lamrani, El Hassan Abdel Wahed, Learning through play in pervasive context - A Survey, 978-1-5090-0478-2/15/$31.00
©2015 IEEE
37. Rob Kitchin, The real-time city? Big data and smart urbanism, Geo Journal (2014) 79:1–14, DOI 10.1007/s10708-013-9516-8
38. Saheed A. Gbadegeshin, The Effect of Digitalization on the Commercialization Process of High-Technology Companies in the Life
Sciences Industry, Technology Innovation Management Review January 2019 (Volume 9, Issue 1)
39. Sergio Martin, Manuel Castro, David Gago, Daniel Torres, A massive Open Online Community on App Development and
Entrepreneurship, 978-1-4673-6355-6/13/$31.00 ©2013 IEEE
40. Sirkka L. Jarvenpaa, Willem Standaert, Digital Probes as Opening Possibilities of Generativity, Journal of the Association for
Information Systems (2018) 19(10), 982-1000, doi: 10.17705/1jais.00516
41. Stefano Pace, Looking at innovation through CCT glasses: Consumer culture theory and Google glass innovation, ISSN 2183-0606,
Journal of Innovation Management, JIM 1, 1 (2013) 38-54
42. Tomáš Jeřábek, Vladimír Rambousek, Radka Wildová, Specifics of Visual Perception of The Augmented Reality in The Context of
Education, Procedia - Social and Behavioral Sciences 159 ( 2014 ) 598 – 604, Academic World Education and Research Center,
DOI: 10.1016/j.sbspro.2014.12.432
43. Yang Zhao, Ruoxin Zhou, Yinping Ci, Factors influencing service innovation of MSNs in China: a theoretical and empirical research,
Vol. 35 No. 3, 2017 pp. 368-385 © Emerald Publishing Limited,0737-8831, DOI 10.1108/LHT-09-2016-0106
44. Wikipedia Internet sources, https://en.wikipedia.org/wiki/Augmented_reality
45. Wikipedia Internet sources, https://en.wikipedia.org/wiki/Virtual_reality
46. Google search, https://www.realitytechnologies.com/companies/

Authors: Maggie Dayana. A, Victor Williams Rayar


Camphor Sulfonic acid Protonated Poly (2, 5-dimethoxyaniline) - Cadmium sulfide blend thin
Paper Title:
film for Ammonia gas Sensing Application
Abstract: Poly (2, 5-dimethoxyaniline) and Cadmium sulfide nanocomposite blend have been prepared by low
cost, feasible oxidative polymerization method. Poly (2, 5-dimethoxyaniline) has been protonated with Camphor
sulfonic acid. nanocomposite blend thin films were obtained by blending with CdS into Poly (2, 5-
dimethoxyaniline) for different weight percentage by dip coating. The structural, morphological, optical
characterizations of pristine Poly (2, 5-dimethoxyaniline) and nanocomposite blend thin films were analyzed.
The XRD pattern shows that the crystallinity of the blend film increases with increasing CdS concentration.
FESEM images shows porous blend film. The UV-Vis and Photoluminence spectra analysis shows the extension
of conjugation length with decreasing band gap with increasing CdS concentration. The presence of functional
groups were studied from FTIR spectra. The CSA protonated Poly (2, 5-dimethoxyaniline) – Cadmium sulfide
560. blend films have been investigated as ammonia gas. 3237-
32
Keywords: ammonia sensor, Cadmium sulfide Camphor sulfonic acid, m-cresol, Poly (2, 5-dimethoxyaniline), 42
thin film.

References:

1. J. Ikäheimo, J. Kiviluoma, R. Weiss, and H. Holttinen, “Power-to-ammonia in future North European 100 % renewable power and heat
system,” Int. J. Hydrogen Energy, vol. 43, no. 36, pp. 17295–17308, 2018.
2. A. Kaushik, R. Kumar, S. Arya, M. Nair, B. Malhotra, and S. Bhansali, “Organic–Inorganic Hybrid Nanocomposite-Based Gas
Sensors for Environmental Monitoring,” Chem. Rev., vol. 115, 2015.
3. T. N. Ly and S. Park, “Highly sensitive ammonia sensor for diagnostic purpose using reduced graphene oxide and conductive
polymer,” Sci. Rep., vol. 8, no. 1, p. 18030, 2018.
4. S. Pandey, “Journal of Science : Advanced Materials and Devices Highly sensitive and selective chemiresistor gas / vapor sensors
based on polyaniline nanocomposite : A comprehensive review,” J. Sci. Adv. Mater. Devices, vol. 1, no. 4, pp. 431–453, 2016.
5. V. Patil, S. R. Sainkar, and P. P. Patil, “Growth of poly(2,5-dimethoxyaniline) coatings on low carbon steel,” Synth. Met., vol. 140, no.
1, pp. 57–63, 2004.
6. S. Xiong, Z. Kong, J. Lan, S. Yi, Y. Wang, R. Zhang, M. Gong, B. Wu, J. Chu, and X. Wang, “Fabrication of high yield and highly
crystalline poly(2,5-dimethoxyanline) nanoplates using various organic sulfonic acids as the dopant agents and soft-templates,” J.
Mater. Sci. Mater. Electron., vol. 27, no. 11, pp. 11142–11150, 2016.
7. S. Palaniappan, Y.-T. Chang, C.-M. Liu, and P. Manisankar, “Mechanochemical synthesis and characterization of poly(2,5-dimethoxy
aniline) salts,” J. Appl. Polym. Sci., vol. 124, no. 5, pp. 4281–4288, 2012.
8. C. Yuan, L. Zhang, L. Hou, J. Lin, and G. Pang, “Green interfacial synthesis of two-dimensional poly(2,5-dimethoxyaniline)
nanosheets as a promising electrode for high performance electrochemical capacitors,” RSC Adv., vol. 4, no. 47, p. 24773, 2014.
9. A. Mahudeswaran, D. Manoharan, J. Chandrasekaran, J. Vivekanandan, and P. S. Vijayanand, “CSA Doped Poly(aniline-co-o-
toluidine) and Dispersed Zinc Oxide Nanoparticles: a Promising Material for Photovoltaics,” Mater. Res., vol. 18, no. 3, pp. 482–488,
2015.
10. S. Sharma, S. Singh, and N. Khare, “Synthesis of polyaniline/CdS (nanoflowers and nanorods) nanocomposites: a comparative study
towards enhanced photocatalytic activity for degradation of organic dye,” Colloid Polym. Sci., vol. 294, no. 5, pp. 917–926, 2016.
11. R. K. Singh, A. Kumar, K. Agarwal, D. Dwivedi, K. N. Sood, and R. Singh, “Influence of Binary Oxidant (FeCl3:APS) Ratio on the
Spectroscopic and Microscopic Properties of Poly(2,5-Dimethoxyaniline),” Open J. Polym. Chem., vol. 2, no. 3, pp. 105–112, 2012.
12. K. A. Ibrahim, “Synthesis and characterization of polyaniline and poly(aniline-co-o-nitroaniline) using vibrational spectroscopy,”
Arab. J. Chem., vol. 10, pp. S2668–S2674, 2017.
13. M. Das and D. Sarkar, “One-pot synthesis of zinc oxide - polyaniline nanocomposite for fabrication of efficient room temperature
ammonia gas sensor,” Ceram. Int., vol. 43, no. 14, pp. 11123–11131, 2017.
14. R. A. Devi, M. Latha, S. Velumani, G. Oza, P. Reyes-Figueroa, M. Rohini, I. G. Becerril-Juarez, J.-H. Lee, and J. Yi, “Synthesis and
Characterization of Cadmium Sulfide Nanoparticles by Chemical Precipitation Method.,” J. Nanosci. Nanotechnol., vol. 15, no. 11, pp.
8434–8439, Nov. 2015.
15. K. H. Lee, B. J. Park, D. H. Song, I. J. Chin, and H. J. Choi, “The role of acidic m-cresol in polyaniline doped by camphorsulfonic
acid,” Polymer (Guildf)., vol. 50, no. 18, pp. 4372–4377, 2009.
16. A. Shit, P. Chal, and A. K. Nandi, “An insight into the hybrid dye-sensitized solar cell from polyaniline-CdS nanotubes through
impedance spectroscopy,” Phys. Chem. Chem. Phys., vol. 18, no. 46, pp. 31732–31743, 2016.
17. S. K. Dey and D. Sarkar, “Effect of Cd source concentration on CdS-polyaniline (CdS-PANI) nanocomposite thin films,” Synth. React.
Inorganic, Met. Nano-Metal Chem., vol. 45, no. 7, pp. 1011–1017, 2015.
18. M. Ghoswami, R. Ghosh, G. Chakraborty, K. Gupta, and A. K. Meikap, “Optical and electrical properties of polyaniline-cadmium
sulfide nanocomposite,” Polym. Compos., vol. 32, no. 12, pp. 2017–2027, 2011.
19. S. E. Mavundla, G. F. Malgas, P. Baker, and E. I. Iwuoha, “Synthesis and Characterization of Novel Nanophase Hexagonal Poly(2,5-
dimethoxyaniline),” Electroanalysis, vol. 20, no. 21, pp. 2347–2353, 2008.
20. S. Xiong, J. Liu, and X. Lu, “Preparation of Highly Crystalline Poly(2,5-dimethoxyaniline) Nanoplates Using a Soft-Template Method
and Their Structural Characterization,” Aust. J. Chem., vol. 64, no. 9, pp. 1196–1202, 2011.
21. N. M. Das, D. Roy, N. Clarke, V. Ganesan, and P. S. Gupta, “Dynamics of roughening and growth kinetics of CdS–polyaniline thin
films synthesized by the Langmuir–Blodgett technique,” RSC Adv., vol. 4, no. 61, pp. 32490–32503, 2014.
22. B. T. Raut, P. R. Godse, S. G. Pawar, M. A. Chougule, D. K. Bandgar, S. Sen, and V. B. Patil, “New process for fabrication of
polyaniline–CdS nanocomposites: Structural, morphological and optoelectronic investigations,” J. Phys. Chem. Solids, vol. 74, no. 2,
pp. 236–244, 2013.
23. B. Yeole, T. Sen, D. Hansora, and S. Mishra, “Polypyrrole/Metal Sulphide Hybrid Nanocomposites: Synthesis, Characterization and
Room Temperature Gas Sensing Properties,” Mater. Res., vol. 19, pp. 999–1007, 2016.
24. G. Hu, G. Orkoulas, and P. Christofides, “Regulation of film thickness, surface roughness and porosity in thin film growth using
deposition rate,” Chem. Eng. Sci., vol. 64, pp. 3903–3913, 2009.
25. B. T. Raut, M. A. Chougule, S. R. Nalage, D. S. Dalavi, S. Mali, P. S. Patil, and V. B. Patil, “CSA doped polyaniline/CdS organic–
inorganic nanohybrid: Physical and gas sensing properties,” Ceram. Int., vol. 38, no. 7, pp. 5501–5506, 2012.

Authors: Minoshma M, Sanil Jayamohan, Namitha Sharon

Paper Title: Femone Health Monitoring System


Abstract: As per the medical reports, each year 4 million newborns die within 28 days of birth and more suffer
from disabilities, diseases, infections, and injuries. According to 2017 death rate, about 8,02,000 neonatal deaths
are reported in India. The inability to detect any discomforts/criticalness that the babies can go through in the
initial stages of life can lead to permanent disabilities/disorders and even death. The absolutely imperative
approach to shrunken the mortality rate is to detect neonatal criticalness and give timely attention. Enabling an
environment for newborn safety depends on the availability of adequate health-care facilities, equipment’s,
561.
medicines and emergency care when needed. Femone Health Monitoring System is developed with an aim to 3243-
detect the difficulties faced by the babies and make it available to the user as well as doctors for easy diagnosis 32
and treatment. The proposed technique is a wireless noninvasive system which monitors the vital physiological 48
parameters of neonates including heart rate, oxygen level, body temperature, and wetness. Heart rate, oxygen
level and body temperature are measured using the principle of photoplethysmography (PPG). The measured
parameters are sent to an MQTT server and are published through the Femone app in real-time. The system also
records the neonatal conditions in a day to day manner for future reference. A number of clinical trials were
conducted in order to check the performance and for validation.
Keywords: PPG, MQTT, wetness, oximeter.

References:

1. S. Bouwstra, W. Chen, L. Feijs, and S. B. Oetomo, “Smart Jacket Design for Neonatal Monitoring with Wearable Sensors,” in 2009
Sixth International Workshop on Wearable and Implantable Body Sensor Networks, 2009, pp. 162–167.
2. D. De, A. Mukherjee, A. Sau, and I. Bhakta, “Design of smart neonatal health monitoring system using SMCC,” Healthc. Technol.
Lett., vol. 4, no. 1, pp. 13–19, Feb. 2017.
3. H. Rao, D. Saxena, S. Kumar, and S. G. V., “Low Power Remote Neonatal Temperature Monitoring Device,” in Proceeding BIOSTEC
2014 Proceedings of the International Joint Conference on Biomedical Engineering Systems and Technologies - Volume 1, 2014, pp.
28–38.
4. N. Saquib, M. T. I. Papon, I. Ahmad, and A. Rahman, “Measurement of heart rate using photoplethysmography,” in 2015 International
Conference on Networking Systems and Security (NSysS), 2015, pp. 1–6.
5. S. Mukherjee, K. Dolui, and S. K. Datta, “Patient health management system using e-health monitoring architecture,” in 2014 IEEE
International Advance Computing Conference (IACC), 2014, pp. 400–405.
6. S. Dash, K. H. Shelley, D. G. Silverman, and K. H. Chon, “Estimation of Respiratory Rate From ECG, Photoplethysmogram, and
Piezoelectric Pulse Transducer Signals: A Comparative Study of Time Frequency Methods,” IEEE Trans. Biomed. Eng., vol. 57, no. 5,
pp. 1099–1107, May 2010.
7. M. Nitzan and H. Taitelbaum, “The measurement of oxygen saturation in arterial and venous blood,” IEEE Instrum. Meas. Mag., vol.
11, no. 3, pp. 9–15, Jun. 2008.
8. A. E. M. KHEIR and M. E. M. HAMZA, “Pattern Of Oxygen Saturation, Heart Rate And Respiratory Rate In Healthy Term Neonates
In Khartoum State,” J. Basic Appl. Res. Int., vol. 19, no. 2, pp. 105–110, 2016.
9. J. Wan, Y. Zou, Y. Li, and J. Wang, “Reflective type blood oxygen saturation detection system based on MAX30100,” in 2017
International Conference on Security, Pattern Analysis, and Cybernetics (SPAC), 2017, pp. 615–619.
10. A. L. Amoo, H. A. Guda, H. A. Sambo, and T. L. G. Soh, “Design and implementation of a room temperature control system:
Microcontroller-based,” in 2014 IEEE Student Conference on Research and Development, 2014, pp. 1–6.
11. J. Allen, “Photoplethysmography and its application in clinical physiological measurement,” Physiol. Meas., vol. 28, no. 3, pp. R1–
R39, Mar. 2007.
12. Johansson, A., Öberg, P.Å. & Sedin, G. J Clin Monit Comput (1999) 15: 461. https://doi.org/10.1023/A:1009912831366 .
Authors: Ashish Kumar Parashar
Augmentation of Compressive Strength of Bricks Made of Various Materials by Adding Molten
Paper Title:
Plastic waste
Abstract: Today, the world is facing a huge threat due to solid wastes. The most dangerous material identified,
among all types of waste is, Plastic. From UN report, every year the globe uses 500 billion plastic bags while,
half of the plastic utilized is of single use only. In India, 70 percent of total plastic used is discarded as a waste.
Around, 9.47 million tonnes per annum (TPA) of plastic waste is generated in the country, which is about 25940
tonnes per day (TPD). The 70 percent of the world’s plastic mass eventually sinks in ocean, damaging life on the
seabed. Considering the present state of affairs worldwide, the recent research is focused on, how the waste
material like plastic can be utilized, for making bricks and enhanced its compressive strength. Thus the ultimate
goal of this study is, to create a positive social, economic and environmental impact, using molten plastic waste,
while also remaining profitable and viable as business. An attempt was made to study the characteristics of
bricks made of Sand, Moorum, Quarry dust and Iron chips with varying volume of Plastic as 20%, 25%, 30%
and 35%. A step by step procedure is adopted to perform various Indian Standard code recommended important
tests on the above stated plastic bricks (varying percentage). The compressive strength and water absorption
capacity of bricks made with above stated % of plastic was determined. The study concludes and highlighting
the fact that, the bricks having 30% plastic with 70% Moorum gives maximum compressive strength and for
bricks 35% of plastic with 65% Sand give minimum compressive strength in 7 days. The study also indicates
that, as the percentage of plastic increases, water absorption capacity of bricks decreases. The bricks made from
plastic were susceptible against temperature so it used for construction in the cold region.

Keywords: Plastic Waste, Sand, Quarry Dust, Iron Chips Compressive Strength, Water Absorption,
Environmental Issue.

References:

1. Amit Gawande, G. Zamare., V.C Renge., Saurabh Tayde, G. Bharsakale.. “An overview on waste plastic utilization in asphalting of
roads”, Journal of Engineering Research And Studies (JERS), Vol.3 (2), 2012, pp. 01-05. 3249-
562. 2. BIS: Crushing or Compressive Strength of bricks IS 1077-1957 32
3. BIS, Classification and Characteristics of Bricks IS 1077: 1973 54
4. BIS, Common Burnt Clay Building Bricks- Specification: Fifth Revision IS 1077:1992.
5. BIS, Methods of Tests of Burnt Clay Building Bricks IS 3495 (Parts 1): 1992
6. BIS, Building Bricks: Part I Determination of Compressive Strength (Third Revision ) IS 3495 ( Pa rt 1 ) : 1992
7. L. Zhang, “Production of Bricks from Waste Materials”, A Review. Construction and Building Materials, Vol. 47, 2013, pp. 643-655.
8. P. M. Hiremath, S. Shetty, N. Rai, “Utilization of Waste Plastic in Manufacturing of Plastic Soil Bricks”, International Journal of
Technology Enhancements and Emerging Engineering Research, Vol. 2(4), 2014, pp. 102-107.
9. R. Daftardar, Patel, R. Shah, P. Gandhi and H. Garg, “Use of Waste Plastic as a Construction Material”, International Journal of
Engineering and Applied Sciences, Vol. 4 (11), 2017, pp. 148-151.
10. Rosato, Domic, Donald, “Plastics Engineering Manufacturing and Data Book”, Vol. 1. Boston, Kluwer Academic Pub., 2001
11. Raju and R. Chauhan, “An Experimental Study on Strength Behaviour of Cement Concrete with Use of Plastic Fibre”, National
Conference on Advances in Engineering and Technology, 2014, pp 30-34,
12. S. Dinesh and K. Kirubhakaran., “Utilisation of Waste Plastic in Manufacturing of Bricks and Paver Blocks” , International Journal of
Applied Engineering Research, Vol.2 (4), 2016, pp. 364-368.
13. S. Arabia, “Utilization of Limestone Dust in Brick Making”, Journal of Engineering Sciences, Assiut University, Vol. 40 (3), 2012, pp.
913-922.
14. WWW.https://madhavuniversity.edu.in/utilization-of-waste-plastic.html
Authors: Anamika Singh, Manish Kumar Srivastava, Navneet Kumar Singh

Paper Title: AI-based Short-Term Electric Time Series Forecasting


Abstract: In current scenario of various electrical profiles like load profile, energy met profile, peak demand,
etc. are very complex and therefore affected proper power system planning. Electrical forecasting is an
important part in proper power system planning. Classical models, i.e., time series models and other
conventional models are restricted for linear and stationary electrical profiles. Consequently, these models are
not suitable for accurate electrical forecasting. In this paper, artificial neural network (ANN) based forecasting
models are proposed to forecast hydro generation, energy met and peak demand. Auto-regressive (AR), moving
average (MA), Auto-regressive Moving average (ARMA) and auto-regressive integrated moving average
(ARIMA) are also developed to show the effectiveness of ANN based models over time series models.
Additionally, best selection of hidden neurons in ANN is also shown here.

Keywords: Artificial neural network, mean absolute percentage error, power system planning.

References:

1. M.A.J. Moran, E.G. Romera And D C. Fernandez (2013) “Monthly Electric Demand Forecasting With Neural Filters,” Electrical
Power And Energy Systems, Vol. 49, Pp. 253-263.
2. A.K. Fard, H. Samet And F. Marzbani (2014) “A New Hybrid Modified Firefly Algorithm And Support Vector Regression Model For
Accurate Short-Term Load Forecasting,” Expert Systems With Applications, Vol. 41, Pp. 6047-6056, October 2014.
3. Navneet K. Singh, Asheesh K. Singh And Manoj Tripathy (2014) “A Comparative Study Of Bpnn, Rbfnn And Elman Neural Network:
A Case Study Of Delhi Region,” 9th International Conference On Industrial And Information Systems (Iciis), India, Pp.1-6.
4. Navneet K. Singh, Manoj Tripathy And Asheesh K. Singh (2011) “A Radial Basis Function Neural Network Approach For Multi-Hour
Short Term Load Price Forecasting With Type Of Day Parameter,” 6th Ieee International Conference On Industrial And Information
Systems (Iciis), Sri Lanka, Pp.316-321.
5. S. Jurado, J. Peralta, A. Nebot, F. Mugica And P. Cortez (2013) “Short-Term Electric Load Forecasting Using Computational
Intelligence Methods,” Ieee International Conference On Fuzzy Systems, India, Pp. 1-8.
6. Navneet K. Singh, Asheesh K.Singh And Manoj Tripathy (2012) “Selection Of Hidden Layer Neurons And Best Training Method For
Ffnn In Application Of Long Term Load Forecasting,” Journal Of Electrical Engineering, Vol. 63, Pp. 153-161.
7. V.H. Hinojosa And A. Hoese (2010) “Short-Term Load Forecasting Using Fuzzy Inductive Reasoning And Evolutionary Algorithms,”
Ieee Transaction On Power Systems, Vol. 25, Pp. 565-574.
8. P. C. Chang, C.Y. Fan And J.J. Lin (2010) “Monthly Electricity Demand Forecasting Based On A Weighted Evolving Fuzzy Neural
Network,” Electrical Power And Energy Systems, Vol. 33, Pp. 17-27.
9. V. Gonzalez And J. Contreras (2012) “Forecasting Power Prices Using A Hybrid Fundamental-Econometric Model,” Ieee Transaction
On Power Systems, Vol.27, Pp. 363-372.
10. A.U. Haque, P. Mandal, J. Meng, A.K. Srivastava, T.L. Seng, T. Senjyu (2013) “A Novel Hybrid Approach Based On Wavlet
563. Transform And Fuzzy Artmap Network For Predicting Wind Farm Power Production,” Ieee Transactions On Industry Applications, 3255-
Vol. 49, Pp. 2253-2261. 32
11. L. Wu And M. Shahidehpour (2014) “A Hybrid Model For Integrated Day-Ahead Electricity Price And Load Forecasting In Smart
Grid,” Iet Generation, Transmission & Distribution, Vol. 8, Pp. 1937-1950. 61
12. C. Cecati, J. Kolbusz, P. Rozycki, P. Siano And B M. Wilamowski (2015) “A Novel Rbf Training Algorithm For Short-Term Electric
Load Forecasting And Comparative Studies,” Ieee Transaction On Industrial Electronics, Vol. 62, Pp. 6519-6529.
13. S. Li P. Wang And L. Goel (2016) “A Novel Wavelet-Based Ensemble Method For Short-Term Load Forecasting With Hybrid Neural
Network And Feature Selection,” Ieee Transactions On Power Systems, Vol.31, Pp. 1788-1798.
14. B. Li J. Zhang, Y. He And Y. Wang (2017) “Short-Term Load Forecasting Method Based On Wavelet Decomposition With Second-
Order Gray Neural Network Combined With Adf Test,” Ieee Access, Vol. 5, Pp. 16324-16331.
15. M. Jawad, S.M. Ali, B. Khan, C.A. Mehmood, U. Farid, Z.Ullah, S.Usman, A. Fayyaz, J. Jadoon, N. Tareen, A. Basil, M.A. Rustam
And I. Sami (2018) “Genetic Algorithm-Based Non-Linear Auto-Regressive With Exogenous Inputs Neural Network Short-Term And
Medium-Term Uncertainty Modeling And Prediction For Electrical Load And Wind Speed,” The Journal Of Engineering, Vol. 2018,
Pp. 721-729.
16. S. Anbazhagan And N. Kumarappan (2013) “Day-Ahead Deregulated Electricity Market Price Forecasting Using Recurrent Neural
Network,” Ieee Systems Journal, Vol.7, Pp. 866-872.
17. Navneet K. Singh, Asheesh K. Singh And Manoj Tripathi (2014) “Short Term Load Forecasting Using Genetically Optimized Radial
Basis Function Neural Network,” Australasian Universities Power Engineering Conference, (Aupec), Perth Australia, Pp. 1-5.
18. Navneet K. Singh, Asheesh K. Singh And Pradeep Kumar (2014) “Pso Optimized Radial Basis Function Neural Network Based
Electric Load Forecasting Model”, Australasian Universities Power Engineering Conference (Aupec), Perth, Australia, Pp. 1-5.
19. “Operational Performance Report, India, 2012-2018” [Online] Website: Https://Posoco.In
20. Y. Liu, T. Zhi, H. Xi, X. Duan And H. Zhang (2019) “A Novel Content Popularity Prediction Algorithm Based On Auto Regressive
Model In Information Centric Iot,” Ieee Access, Vol. 7, Pp. 27555-27564.
21. S.A. Fattah, W.P. Zhu And M.O. Ahmad (2011) “Identification Of Autoregressive Moving Average Systems Based On Noise
Compensation In The Correlation Domin,” Iet Signal Processing, Vol.5, Pp. 292-305.
22. Z. Liu, Z. Cai And X.T. Na (2011) “Forecasting Research Of Aero-Engine Rotate Speed Signal Based On Arma Model,” Procedia
Engineering, 15, Pp. 115-121.
23. C.A.V. Cardoso And G.L. Cruz (2016) “Forecasting Natural Gas Consumption Using Arima Models And Artificial Neural Networks,”
Ieee Latin America Transactions, Vol. 14, Pp. 2233-2238.
24. W.S. Mcculloch And W. Pitts, “A Logical Calculus Of The Ideas Imminent In Nervous Activity,” Bulletin Of Mathematical
Biophysics, Vol.5, Pp. 115-133, 1943.
25. C.M. Lee And C.N. Ko (2009) “Time Series Prediction Using Rbf Neural Networks With A Nonlinear Time-Varying Evolution Pso
Algorithm,” Neurocomputing, Vol. 73, Pp. 449-460.
26. A.Y. Alanis (2018) “Electricity Prices Forecasting Using Artificial Neural Networks,” Ieee Latin America Transactions, Vol. 16, Pp.
105-111.
27. P.M. Baggenstoss (2018) “On The Duality Belief Networks And Feed-Forward Neural Networks,” Ieee Transactions On Neural
Networks And Learning Systems, Vol. 30, Pp. 190-200.
28. C. Guoqiang, T. Zhongzhi And X. Zongyi (2010) “Modelling Of Electrohydraulic Systems Using Rbf Neural Networks And Genetic
Algorithm,” Journal Of Convergence Information Technology, Vol.5.
29. G.E.P. Box And G.M. Jenkins (1976) “Time Series Analysis: Forecasting And Control, Holden-Day Inc, 500 Sansome Street, San
Francisco, California,”.

564. Authors: Rashmi Gupta, Vivek Jaglan


Paper Title: Test Case Generation for UML Behavioral Diagram by Traversal Algorithm
Abstract: Software testing play crucial role in the software development as it consumes lot of time and
resources. However testing process needs to be more efficiently done because overall software quality relies
upon good testing approach. The present research focus on generation of test cases from UML diagrams. The
combination graph is made by using activity and sequence diagrams. These diagrams proves to be more efficient
as activity diagram gives the dynamic behavior of the model and sequence diagram is used to understand
detailed functionality of the system. In this paper, a combined approach using Breadth first and depth first search
is proposed which will generate expected test cases. The comparative study is done for test case generation using
BFS and DFS algorithm and the result proves that the DFS traversal algorithm provides more accurate result for
path coverage.

Keywords: Test case generation, traversal algorithm, UML diagrams, software testing.

References:

1. V.K. Shanthi a., Mohan Kumar G. A Novel Approach for Automated Test Path Generation using TABU Search Algorithm.
International Journal of Computer Applications. 2012;48(13):28–34.
2. Srivastaval J, Dwivedi T. Software Testing Strategy Approach On Source Code Applying. 2015;6(3):25–31. 3262-
3. Tripathy A, Mitra A. Test case generation using activity diagram and sequence diagram. In: Proceedings of International Conference 32
on Advances in Computing. Springer; 2013. p. 121–9. 66
4. Monalisa, S., Debashish, K., & Rajib, M. Automatic test case generation from UML sequence digrams. Proceedings of IEEE
Conference on Software Maintenance. 2007
5. Ranjita, K. S., Vikas, P., & Prafulla, K. B. Generation of test cases using activity diagram. Interntional Journal of Computer Science
and Informatics, 2013;3(2).
6. Meiliana, aIrwandhi S., aRicky S. Alianto, aDaniel, bFord LG . Automated Test Case Generation from UML Activity Diagram and
Sequence Diagram using Depth First Search Algorithm in International Conference on Computer Science and Computational
Intelligence 2017, ICCSCI, Elseveir 2017.
7. Faria JP, Paiva ACR, Yang Z. Test generation from UML sequence diagrams. Proceedings - 2012 8th International Conference on the
Quality of Information and Communications Technology, QUATIC 2012. 2012;245–50.
8. Panthi V. Automatic Test Case Generation using Sequence Diagram. 2012;2(4):22–9.
9. Swagatika, D. , Arup Acharya and Durga Prasad Mohapatra .Test case generation for concurrent object oriented systems using
combinational UML models., 2012
10. Hettab A, Chaoui A, Aldahoud A. Automatic Test Cases Generation From Uml Activity Diagrams Using Graph. 2013.
11. Sumalatha VM, others. Object Oriented Test Case Generation Technique using Genetic Algorithms. International Journal of Computer
Applications. 2013;61(20).
12. Asad S, Shah A, Shahzad RK, Shafique S, Bukhari A, Humayun M. Automated Test Case Generation Using UML Class & Sequence
Diagram. 2016;15(3):1–12.
13. Khurana N, Chillar RS A Novel Technique for Generation and Optimization of Test Cases Using Use Case, Sequence, Activity
Diagram and Genetic Algorithm in journal of software .2015.

Authors: N. Sanjeev, Kaza Prem Rakshit Kumar


An Experimental Programme on Fibre Reinforced Concrete made with OPC, Fly Ash and
Paper Title:
Metakaolin
Abstract: Most commonly used composite building material in construction industry is Concrete due to ease of
construction and its properties like compressive strength and durability. The basic ingredient of Concrete having
adhesive nature is Ordinary Portland Cement(OPC). OPC is being replaced with Fly Ash and Metakaolin as
these mineral admixtures possess pozzolanic properties which credit for strength gain and cost reduction in
concreting. In this investigation, OPC is replaced up to 40% with Fly Ash and Metakaolin for M35 grade of
Fibre Reinforced Concrete(FRC). Natural sand is replaced completely with Manufactured sand (M-sand). Steel
fibres @ 1% of binder are used. Mechanical properties like compressive strength and split tensile strength at 7
days and 28 days age are tested. Additionally durability tests like water absorption and sorptivity after 28days
curing are conducted. The test results indicated that 30% replacement of OPC was optimum for strength criteria,
workability of Concrete was decreased with increase in replacement of OPC with Fly Ash and Metakaolin
together.

565. Keywords: Fly Ash, Manufactured Sand, Metakaolin, Ordinary Portland Cement (OPC), Steel fibres,
Sorptivity and Water Absorption. 3267-
32
References: 70

1. Vinayak B Kulkarni, Mahesh V Tatikonda (2016), “Mechanical Properties of Fly Ash Concrete Containing Metakaolin”, International
Journal of Advanced Research in Science, Engineering and Technology (IJARSET), Volume 3, Issue 11, ISSN: 2350-0328, pp. 2894-
2898.
2. Stephen Issac, Anju Paul (2018), “A Literature Review On The Effect of Metakaolin and Fly Ash On Strength Characteristics Of
Concrete”, International Journal of Advance Research and Innovative Ideas in Education (IJARIIE), Volume 4, Issue 2, ISSN (O)-2395-
4396, pp. 6-11.
3. M.Mohanraj, S.Gayathri (2018), “A Study on Mechanical Properties of Concrete using Fly Ash and Metakaolin”, International Journal
of Advanced Research in Science, Engineering and Technology (IJARSET), Volume 6, Issue 11, , ISSN(O): 2319-8753, pp. 21543-
21550.
4. Pooja Kirange , Akash G Misal ,Shubham P Jadhav ,Suraj A Metakari, Omkar D Nilankar (2019), “Effect Of Metakaolin And Fly Ash
In Strength Of Concrete”, Proceedings of Conference on Advances on Trends in Engineering Projects (NCTEP-2019), in Association
with Novateur Publications, IJIERT-ISSN No: 2394-3696 pp. 65-66.
5. IS 456:2000, Indian standard code of practice for plain and reinforced concrete.
6. IS 10262:2009, Indian standard code of practice for Concrete Mix Proportioning –Guidelines.
7. IS 12269:1987, Specifications for Ordinary Portland Cement 53 Grade.
8. IS 383:1970, Indian standard specifications for coarse and fine aggregate from natural sources for Concrete.
9. IS 2386:1963, Methods of testing aggregates for Concrete
10. IS 516:1959, Methods of test for strength of Concrete
11. ASTM C1585: Standard test method for measurement of absorption (sorptivity) of water by hydraulic Cement Concretes.
12. ASTM C642-13: Standard test method for density, absorption, and voids in hardened Concrete.

Authors: Nidhi Saxena, Bineet Gupta

Paper Title: Extended model for Privacy Enhanced Personalized Web Search Ranking System
Abstract: Our existing society is totally dependent on web search to fulfill our daily requirements. Therefore
millions of web pages are accessed every day. To fulfill user need number of websites and webpages are added
.The growing size of web data results to the difficulty in attaining useful information with a minimum clicks.
This results to the acquisition of personalization a major place in Web search. But the use of personalization
breaches privacy in searching. Personalization with privacy is leading issue in current web environment.
This paper aims at user satisfaction by using user identification based personalization approach in web search
engine. Beside personalization the proposed model creates privacy during personalization. The proposed system
will prove to be user friendly with less efforts and privacy concern.

Keywords: Personalization, Privacy ,Ranking, User Search Log.

References:

1. P. N. Bennett, R. W. White , W.Chu, S. T. Dumais, P. Bailey, F. Borisyuk and X. Cui, “Modeling the impact of short- and long-term
behavior on search personalization,” in Proc. ACM SIGIR Conference on Research and development in information retrieval, 2012.
2. M. Speretta, S. Gauch, “Personalized search based on user search histories,” in Proc. International Conference on Web Intelligence
IEEE/WIC/ACM, 2005.
3. H. Liu ,V. Keselj, “Combined mining of web server logs and web contents for classifying user navigation patterns and predicting
users future requests ,” Data & Knowledge engineering Elsevier, vol. 61, no. 2, 2007, pp. 304– 330.
4. F. Qiu , J. Cho, “Automatic identification of user interest for personalized search,” in Proc. ACM 15th International conference on
World Wide Web, 2006.
5. X. Shen , B. Tan, C. Zhai, “Implicit user modeling for personalized search,” in Proc. ACM 14th international conference on
Information and knowledge management, 2005.
566. 6. R. Agarwal, K. V. Arya, S. Shekhar, “An architectural framework for web information retrieval based on user’s navigational pattern,”
in Proc. IEEE 5th International Conference on Information Systems, 2010. 3271-
7. R. Khanchana , M. Punithavalli, “An efficient web page prediction based on access time length and frequency,” in Proc. IEEE 3rd 32
International Conference on Electronics Computer Technology, 2011. 75
8. N. Matthijs, F. Radlinski, “Personalizing web search using long term browsing history,” in Proc. ACM 4th International Conference
on Web Search and Data mining, 2011.
9. A. Borisov, M. Wardenaar, I. Markov, M. de Rijke, “A click sequence model for web search,” in Proc. SIGR’ 18th International ACM
SIGIR Conference on Research and Development in Information Retrieval, 2018, pp. 45-54.
10. A. Chuklin, I. Markov, M.de Rijke , “An introduction to click Models for web search,” in Proc. SIGIR 2015 38th International ACM
Conference on Research and Development in Information Retieval, 2015, pp. 1113-1115.
11. A. Chuklin , M. de Rijke “Incorporating clicks ,attention and satisfaction into a search engine result page evaluation model,” in Proc.
25th ACM International Conference on Information and Knowledge Management, 2016, pp. 175-184.
12. Y. Chen, Y. Liu, S. Ma, M. Zhang, “User satisfaction prediction with mouse movement information in heterogeneous environment,”
IEEE Transaction on Knowledge and Engineering, 2017.
13. Y. Liu, Y. Chen, J. Tang, J. Sun, M. Zhang, S. Ma and X. Zhu “Different users, different opinions: predicting search satisfaction with
mouse movement information,” in Proc. 38th International ACM Conference on Research and Development in Information Retieval,
2015, pp: 493-502.
14. I. Aapakis, L. A. Leiva, “Predicting user engagement with direct displays using mouse cursor information,” in Proc. 39th International
ACM SIGIR conference on Research and Development in Information Retieval, 2016, pp. 599-608.
15. Moshfeghi, K. Velinov, P. Triantafillou, “Improving search results with prior similar queries” in Proc. 25th ACM International
Conference on Information and Management, 2016, pp.1985-1988.
16. ]F. Cai, S. Wang, M.de Rijke, “Behavior based personalization in web search,”†Journal of the Association for Information Science and
Technology Wiley , vol. 68, no. 4, 2016.
17. W. Gasarch,” A survey on private information retrieval,” The bulletin of the European Association for Theoretical Computer Science
(EATCS), vol. 82 , 2004, pp. 72—107.
18. R. Agrawal, R. Skriant, “ Privacy preserving data mining,” ACM SIGMOD Conference on Management of Data (SIGMOD), Dallas,
Texas, May 2000.
19. A. Evfimievski, J. Gehrke and R. Srikant, “ Limiting privacy breaches in privacy preserving data mining,” ACM SIGMOD/PODS ,
San Diego, CA, 2003.
20. Tapia M, Alhalabi W S, Kubat M. ,”A mathematical formula for the search engine ranking efficiency evaluation Tool S.E.R.E.E.T”,
International journal of computer science & Emerging Technologies ,vol. 1, December 2010.

Authors: Atish Kumar, Harry Garg, B. S. Pabla


Paper Title: Estimation of Injection Molding Process for a Thin Fresnel lens By Plastic Flow Simulation
Abstract: This paper is based on the plastic flow simulation of a thin Fresnel lens to estimate the injection
molding process. Nowadays Fresnel lenses are made of transparent plastics materials instead of silica-based
glass to reduce handling and processing cost. For mass manufacturing of plastic parts, the injection molding
process is best suited. Thus in this study plastic flow analysis of a thin Fresnel lens is carried for the evaluation
567.
of injection molding process. Plastic flow analysis helps in estimating how molten plastic will flow during the 3276-
process Plastic flow analysis is also very helpful in evaluating the manufacturing defects such as air traps and 32
weld lines without real-time experimentation. The simulation results evaluate the values of the parameters such 82
as fill time, filing pressure, pack pressure, etc. Also, the manufacturing defects observed by the simulation
results are reasonable and met the design requirement.

Keywords: Fresnel lens, Injection molding simulation, Plastic Flow Analysis, Solidworks Plastics.
References:

1. I. Ullah, H. Lv, A. J. W. Whang, and Y. Su, “Analysis of a novel design of uniform illumination for Fresnel lens-based optical fiber
daylighting system,” Energy and Buildings, vol. 154, pp. 19–29, 2017.
2. A. Davis and F. Kühnlenz, “Optical Design using Fresnel Lenses: Basic Principles and some Practical Examples,” Optik & Photonik,
Wiley, no. 4, pp. 52–55, 2007.
3. V. Kumar, R. L. Shrivastava, and S. P. Untawale, “Fresnel lens: A promising alternative of reflectors in concentrated solar power,”
Renewable and Sustainable Energy Reviews, vol. 44, pp. 376–390, 2015.
4. J.R. Egger, “Use of Fresnel lenses in optical systems: some of some advantages and limitations,” Proceeding of SPIE, vol. 193, pp. 63–
69. 1979.
5. C-M Lin, H‑K Hsieh, “Processing optimization of Fresnel lenses manufacturing in the injection molding considering birefringence
effect,” Microsystem Technologies, vol. 23, pp 5689–5695, 2017.
6. R. Leutz, A. Suzuki, “Nonimaging Fresnel Lenses: Design and Performance of Solar Concentrators,” Springer, NewYork, 2001.
7. D. Loaldi, M. Calaon, D. Quagliotti, P. Parenti, M. Annoni and G. Tosello, “Tolerance verification of precision injection moulded
Fresnel lenses,” Proceeding of CIRP, vol. 75, pp. 137–142, 2018.
8. Q. Chuan-zhen, W. Yong-tao, Z. Jian and Z. Ya-jun, “Study of Injection Compression Molding of thin-wall Light-guide plates with
Hemispherical Micro structures,” Proceedings of the 1st International Conference on Mechanical Engineering and Material Science,
pp. 447–450 2012.
9. D. Loaldi, M. Calaon, D. Quagliotti, P. Parenti, M. Annoni and G. Tosello, “Manufacturing Signatures of Injection Molding and
Injection Compression Molding for Micro-Structured Polymer Fresnel Lens Production,” micromachines, vol. 9, pp. 653-675, 2018.
10. B. Zink, F. Szabo, I. Hatos, A. Suplicz, N.K. Kovacs, H. Hargitai, T.Tabi and J.G. Kovacs, “Enhanced Injection Molding Simulation of
Advanced Injection Molds,” polymers, vol. 9, pp. 77-88, 2017.
11. L. Zhang, J. Lei, Junle and X. Dai, “Design and Optimization of Injection Mold for Camera Shell Based on Mold Flow Analysis,”
Proceedings of the International Symposium on Big Data and Artificial Intelligence - ISBDAI '18, pp. 205-208, 2018.
X. Xiaofeng, S. Qi and X. Qiong, “Design of Spin-tub’s Hot Runner Injection Mold based on Pro/E,” Plastics, vol. 41(1), pp. 101-104,
2012

Authors: M. A. Jawale, A. B. Pawar, D. N. Kyatanavar

Paper Title: Smart Python Coding through Voice Recognition


Abstract: In today’s world, many artificial intelligence applications developed using programming languages
like Python, R and so on. Each language comes with its own programming structure and syntactical forms.
Programmers are broadly classified into three categories namely, novice users, knowledge intermittent and
expert one. For novice users, it is always a challenge to write a code without typographic errors though users
know theoretical knowledge of Programming language, its structure and syntax as well as logic of program.
Therefore, this paper explores use of voice recognition technique in the field of programming, specifically for
writing program with Python programming language. In experimental analysis, it found helpful for new Python
programmers and provide new learning curve for programmers wherein beginner can experience hassle free
program writing. This paper adds new way of creating interest in beginners for judging their coding paradigm
understanding and explore one of the area for user experience field for better programming Integrated
Development Environment Development (IDE).
568.
Keywords: Artificial Intelligence, Learning, User Experience, Voice Recognition. 3283-
32
References: 85
1. C. Andre, B. Jon “An automatic speech recognition system based on the scene analysis account of auditory perception”, Department of
Computer Science, University of Shield, 211 Portobello Street, Shield S1 4DP, United Kingdom, 7 November 2006.
2. Tiecheng Yu. The Development State of the Voice Identification [J]. The Development Communication World. 2005, pp.56-59
3. Zhiling Jiang. The System of Data Multiprogramming Collection and Transmission Using Lingyang Single chip Computer [J], Sichuan
University of Science and Technology, 2005, pp.69-72
4. Speaking in code: how to program by voice, July 2018, Available on: https://www.nature.com/articles/d41586-018-05588-x.
5. N. A. Nafis, Md. S. Hossain, “Speech to Text Conversion in Real-time”, vol. 17, no. 2, pp. 271-277, Aug. 2015, ISSN 2351-8014.
6. Mario Konecki, Robert Kudeli¢, Danijel Rado²evi¢, “Challenges of the blind programmers”, Available on:
https://bib.irb.hr/datoteka/484794.Challenges_of_the_blind_programmers.pdf, 2010.
7. D. Yu, L. Deng, "Automatic Speech Recognition" in A Deep Learning Approach II, London: Springer-Verlag, 2015.
8. F. Aguayo, "Blind learners programming through audio" in ACM CHI '05 extended abstracts on Human factors in computing systems,
Portland, OR, USA, pp. 1769-1772, 2015.
9. Mike Pultz, 2011, [online] Available: http://mikepultz.com/2011/03/accessing-google-speech-api-chrome-Ll.
10. James R. Evans, Wayne A. Tjoland and Lloyd G. .
Authors: N. Sanjeev, T. Sampath Kumar Reddy
Mechanical and Durability Properties of Fibre Reinforced Concrete made with OPC, GGBS and
Paper Title:
Metakaolin
Abstract: Concrete is a globally utilized material in the construction field. In the last few decades, Concrete
consumption has become multifold and usage has enhanced in massive scale due to the rapid growth of infra
sector. Generally, Concrete consists of cement, aggregate, and water; these ingredients become more expensive
day by day and additionally hard to please and is increasing widely. During the process of making Ordinary
569. Portland Cement(OPC) produces a large amount of greenhouse gases and the environment being polluted. To
3286-
minimize the cement utilization and environmental issues is essential to switch the cement by another alternate
32
materials such as pozzolanas. The various number of pozzolanic materials comes from industrial wastes are
90
Groundz Granulatedz Blastz furnacez Slagz (GGBS), xFlyqAsh (FA), zSilicazFume (SF), Metakaolin (MK) etc
are utilized in concrete. Similarly, the availability of river sand is getting drained furthermore it turns out
troublesome. In order to avoid this problem river sand is alter by zManufacturedkSand (M Sand). An attempt is
made in the present investigation to study on properties of fiber reinforced concrete (qsteelu fibers @ 1% of
binder) of M40 grade made with OPC, GGBS, MK and manufactured sand. In this study, OPC is replaced by
GGBS and MK in different proportions. By casting requisite number of cubes, cylinders then zMechanical
properties are determined such as fCompressivekstrength,sSplitdtensile strength tests and durability properties
are determined by conducting Water absorption and Sorptivity tests. Test results are compared between
controlled concrete and innovative concrete of M40 grade.It is observed that 30%(15%GGBS,15%MK)
replacement is optimum for strength and durability criteria.

Keywords: Compressivekstrength, GGBS, MK, OPC, Splitdtensile strength, steel fibers, Sorptivity, Water
absorption.

References:

1. D.satyanarayana “Optimization Of Partial Replacement Of Natural sand by Manufactured sand with Metakaolin” Novateur
Publications International Journal Of Research Publications In Engineering And Technology [IJRPET] ISSN: 2454-7875 VOLUME 2,
ISSUE 12, Dec. -2016.
2. Christina Mary V. and Kishore CH “Experimental Investigation On Strength And Durability Properties Of High Performance
Concrete Using GGBS And M Sand”ARPN Journal of Engineering and Applied Sciences ,ISSN 1819-6608 ,vol. 10, no. 11, june 2015
3. Kasunaveena and Ananta Lakshmi (2017) “partial replacement of cement with GGBS and metakaolin”, International Journal of
Advances in Mechanical and Civil Engineering .
4. B.Mangamma, Dr N.Victor babu,,”An Experimental Study on Behavior of Partial Replacement of Cement with Ground Granulated
Blast Furnace Slag”, Int. Journal of Engineering Research and Application Vol. 6, Issue 12, ( Part -3) December 2016, pp.01-04)
5. Vikas Srivastava , Rakesh Kumar “Effect of Silica fume and metakaolin combination on concretee ” International Journal Of Civil And
Structural Engineering Volume 2, No 3, 2012.
6. Dhanya R , Arasan G.V , Ganapathy Ramasamy “Study On Strength Properties Of Concrete Using Ggbs And Steel Fibre As Partial
Replacement Of Cement”, Jr. of Industrial Pollution Control 33(s2)(2017) pp 1255-1259.
7. IS 12269:1987 Specification For 53 Grade Ordinary Port Land Cement
8. Indian standard specifications for coarse and fine aggregate from natural sources for concrete IS 383-1970
9. IS 2386-1963 : methods of testing aggregates for concrete
10. IS: 280-2006 mild steel wire for general engineering purpose- Bureau of Indian Standards
11. IS 9103: Specification for Concrete Admixtures- Bureau of Indian Standards
12. IS 516-1959 Indian standard methods of tests for strength of concrete, Bureau of Indian standards, New Delhi. India
13. IS:10262-2009 Indian standard for concrete Mix proportioning-Guidelines, Bureau of Indian standards, New Delhi. India

Authors: Madhavan Devadas, T. Vijayakumar

Paper Title: Investment Decisions, Herd Behaviour and Retail Investors


Abstract: Behavioral finance explains that cognitive biases influences investor decision making. Due to the
influence of different behavioral biases investors do tend to make irrational decisions. Behavioral finance has
highlighted the failure of traditional finance theories to account for human emotions when making investment
decisions. While traditional finance theories disregard human element in decision-making, behavioral finance
theories take into account the human phycology while explaining theories. Many studies have found and
explained many biases that are exhibited by investors which lead to irrational investment decision making on
their part. One among the many the biases herding can be considered among the most important behavior which
leads to low quality investment decisions by investors. While compared to studies about herd behavior of
institutional investors, the studies about individual retail investors in less. The motive behind this study is to
clarify the role of demographic factors and psychological factors that influence herd behavior among individual
investors. In this study the impact of demographics and psychological factors on herd behavior was studied. For
this survey, primary data was collected using Judgment sampling technique and the results analyzed. Retail
investors in Chennai exhibited herd behavior with regard to investment decisions. Eight factors were found to
influence herd behavior.

Keywords: Behavioural Biases, Personal values, Investment decisions, Demographics.


570.
3291-
References: 32
94
1. Hersh Shefrin (1999) Irrational Exuberance and Option Smiles, Financial Analysts Journal, 55:6, 91-103
2. Lintner, G. (1998). Behavioural finance: Why investors make bad decisions. The Planner, 13(1), 7-8.
3. Abhijit V. Banerjee, A Simple Model of Herd Behavior, The Quarterly Journal of Economics, Volume 107, Issue 3, August 1992, Pages
797–817
4. Poshakwale, S., & Mandal, A. (2014). Investor Behaviour and Herding: Evidence from the National Stock Exchange in India. Journal of
Emerging Market Finance, 13(2), 197–216.
5. Lakshman, M. V., Basu, S., & Vaidyanathan, R. (2013). Market-wide Herding and the Impact of Institutional Investors in the Indian
Capital Market. Journal of Emerging Market Finance, 12(2), 197–237.
6. Prosad, J., Kapoor, S., & Sengupta, J. (2012). An Examination of Herd Behaviour: An Empirical Study on Indian Equity Market.
International Conference on Economics and Finance Research, pp. 11-15.
7. Lao, P., & Singh, H. (2011). Herding Behaviour in the Chinese and Indian Stock Markets. Journal of Asian Economics, 22(6), 495-528.
8. Agarwal, S., Chiu, I., Liu, C., & Rhee, S. (2011). The Brokerage Firm Effect in Herding: Evidence from Indonesia. Journal of Financial
Research, 34(3), 461-479.
9. Ayhan KAPUSUZOGLU (2011). Herding in the Istanbul Stock Exchange (ISE): A case of behavioral finance. African Journal of
Business Management Vol.5 (27), pp. 11210-11218.
10. Gunay, S., & Demirel, E. (2011). Interaction between Demographic and Financial Behaviour Factors in Terms of Investment Decision
Making. International Research Journal of Finance and Economics, 147-156.
11. Demirer, R., & Kutan, A. (2005). Does herding behaviour exist in Chinese stock market? Journal of International Financial Markets,
Institutionals and Money, 16, 123- 142.
12. John W.Creswell (2014) Research Design: Qualitative, Quantitative, and Mixed Methods Approaches.

571. Authors: Kamlesh V. Madavi, Ramesh D. Dod


Paper Title: Management of Construction & Demolition Waste In Pune City
Abstract: The construction boom in Pune is leading to generation of enormous of Construction & Demolition
(CDW) waste and this trend is likely to further increase in recent decades. Pune is fast paced city and is known
as IT and automobile hub of county with rapid growing population. A city with dynamic construction and real
estate industry reinforced by some public infrastructure project of transportation and utilities. Rapid
development has led to increase in construction activities in the city leading to increases in quantities of
construction and demolition waste generated in the city. In this paper, content analysis approach was adopted to
analyse the information collected from previous literature, government reports and information retrieved from
relevant Construction & Demolition (CDW) waste management rules. This paper focuses on quantity & source
of Construction & Demolition CDW waste; also reflects current scenario of disposal and its effects. It is
anticipated that the collection plan could help in management of construction & demolition waste and in
reduction of illegal dumping.
3295-
Keywords: Construction and demolition (CDW) Waste, Quantity & Source, illegal dumping, waste collection 32
plan. 98

References:

1. Hongping Yuan , Liyin Shen (2011) “Trend of the research on construction and demolition waste management” Waste Management 31
(2011) 670-679.
2. Fang Yuan , Li-yin Shen et al. (2011) “Emergy analysis of the recycling options for construction and demolition waste” waste
management 31 (2011) 2503-2511.
3. H.P. Yuan, L.Y. Shen (2011) “A model for cost–benefit analysis of construction and demolition waste management throughout the
waste chain” Resources, Conservation and Recycling 55 (2011) 604-612.
4. Muluken Yeheyis , Kasun Hewage et al (2013) “An overview of construction and demolition waste management in Canada: a lifecycle
analysis approach to sustainability” Clean Techn Environ Policy (2013) 15:81–91 .
5. Muluken Yeheyis , Kasun Hewage et al (2013) “An Overview of CDW Waste Management Regulations in the Central China” Smart
Construction and Management in the Context 45 of New Technology ASCE.
Authors: Mu. Annalakshmi, A. Padmapriya

Paper Title: Personalized Medical Information Filtering using Evidence Phrases


Abstract: Finding the required information in the field of medicine from the World Wide Web has been a
challenging task for the users since large number of medical research documents are added to it every day.
Personalization of web search would help the professionals or beginners in medicinal field in retrieving the
relevant information. The proposed method gathers the users’ browsing patterns from the browser and builds
evidence phrases based on factors like visit count, bookmarks or downloads. These evidence phrases determine
the rank of the websites in the search results. The proposed method is evaluated with the relevance data collected
from allied medical professionals. Evaluation shows that the proposed method ranks the user preferred pages in
the top of the search results. It helps the users from the field of medicine to find their information needs more
quickly without surfing all the search results of the query.

Keywords: User Personalization, User Profiling, Evidence Phrases, Information Filtering, Relevance

References:

1. K.SIVARAMAN, “Collaborative Filtering Based On Search Engine Logs”, International Journal of Innovative Research in Computer
and Communication Engineering, August 2014 Vol. 2, Issue 8.
2. Micro Speretta, Susan Gauch, 2005 “Personalizing Search Based on User Search Histories”, IEEE/WIC/ACM International
Conference on Web Intelligence, WI 2005. 2005. 622- 628. 10.1109/WI.2005.114.
572. 3. Kazunari Sugiyama, Kenji Hatano, Masatoshi Yoshikawa, “Adaptive Web Search Based on User ProfileConstructed without Any 3299-
Effort from Users”, WWW 2004, May 17–22, 2004, New York, New York, USA.ACM 1-58113-844-X/04/0005. 33
4. Naglaa Fathy, NagwaBadr, Mohamed Hashem, Tarek F. Gharib, “Enhancing Web Search with Semantic Identification of User
Preferences”, IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 2, November 2011. 07
5. M. Claypool , P. Le, M. Waseda, D. Brown,“Implicit Interest Indicators”, Proceedings of the 6th international conference on Intelligent
user interfaces (ACM), pp 33 - 40, 2001.
6. 6.H.R. Kim, P.K. Chan, “Learning implicit user interest hierarchy for context in personalization”, Proceedings of the 8th international
conference on Intelligent user interfaces, Miami, Florida, USA, 2003, pp. 101 - 108.
7. Francisco P. Romero, Jesus Serrano Guerrero, Jose A. Olivas, Mateus Ferreira Satler, "An Ontology-based Recommender System for
Health Information Management", Proceedings on the international Conference on Artificial Intelligence (ICAI) Steering Committee of
The World Congress in Computer Science Computer Engineering and Applied Computing (WorldComp), pp. 1, 2012 August.
8. https://www.nlm.nih.gov/research/umls accessed on 26.1.2019.
9. https://wordnet.princeton.edu/ accessed on 28.12.2018
10. Ioannis Papadakis, Michalis Stefanidakis, Sofia Stamou,Ioannis Andreou, “Semantifying queries over large-scale Web search engines
“, Journal of Internet Services and Applications,2012, Volume 3, Number 3, Page 255.
11. Nikita Gupta, Gunjan Pahuja, “An Improved Mining of Biomedical Data from Web Documents Using Clustering”, International
Journal of Science and Research Vol. 5 Issue 2, February 2016, pp. 1396 – 1400.
12. Mu. Annalakshmi, Dr.A. Padmapriya, “Search Factors used by search engines”, International Journal of Advanced Research Trends in
Engineering and Technology, Vol. 3, Special Issue 20, April 2016.
13. Mu. Annalakshmi, Dr.A. Padmapriya, “Term Based Weight Measure for Information Filtering in Search Engines”, International
Journal of Engineering and Technology Vol. 10 No. 1 Feb-Mar 2018 pp. 23-28.
14. Sachintha Pitigala, Cen Li, “Classification based Filtering for Personalized Information Retrieval”, Proceedings of International
Conference on Information and Knowledge Engineering 2015 pp. 125-131.
15. Danny POO, Brian CHNG,Jie-Mein GOH, “A Hybrid Approach for User Profiling”, Proceedings of the 36th Hawaii International
Conference on System Sciences (HICSS’03) IEEE Computer Society of India, 2002
16. https://www.lifewire.com/medical-information-sites-3482069 last accessed on 31.01.2019
17. https://www.ncbi.nlm.nih.gov/pubmed/last accessed on 01.02.2019
18. https://www.webmd.com/default.htm last accessed on 01.02.2019
19. http://www.the-best-medical-search-engine.org/content/view/4/6/last accessed on 01.02.2019
20. https://nlp.stanford.edu/IR-book/html/htmledition/evaluation-of-ranked-retrieval-results-1.html last accessed on 5.1.2019
21. Roman Y Shtykh, QunJin, “A human-centric integrated approach to web information search and sharing”, Human-centric Computing
and Information Sciences, 2011, Volume 1, Number 1, Page 1.
22. Mu. Annalakshmi, Dr.A. Padmapriya, “Structuring of Web Pages using XML Framework for Information Filtering”, Asian Journal of
Computer Science and Technology Vol.8 No.S2, 2019, pp. 35-38.
Ismail Elhassnaoui, Zineb Moumen, Issam Serrari, Ahmed Bouziane, Driss Ouazar, Moulay
Authors:
Idriss Hasnaoui
Generation of Synthetic Design Storm Hyetograph and Hydrologic Modeling under HEC HMS
Paper Title:
for Ziz Watershed
Abstract: This article proposes a methodology for generating hourly rainfall from daily rainfall data. It was
evolved as a tool for managing flood risks on Ziz catchment, by means of Intensity-duration-frequency curves
(IDF) and designed hyetograph of Chicago. The study area is located in the south-eastern part of Morocco, and
did not have a monitoring station for hourly rain measure, the methodomogy consist of determinating the rainfall
intensity for 24 h using IDF, then estimating the hourly rainfall using Chicago formula, in order to assess the
accuracy of the method the resulting hyetographs was introduced into the semi-distributed hydrological model
HEC HMS to simulate hourly flow, which was compared to the observed one. The obtaining results exhibit that
the observed value is positively correlated with those obtained by the above method, as shown by the correlation
coefficient and the Nash-Sutcliffe. This approach can deal with instantaneous water management issues by
tackling flood risks and providing an appropriate range of data for the dam’s management.

Keywords: chicago rainfall, Gumbel distribution, HEC HMS, IDF curves, SCS curve number, Ziz watershed.

References:

1. O. Tanouti, “Squaring the circle : Agricultural intensification vs . water conservation in Morocco,” vol. 192, pp. 170–179, 2017.
2. A. Alonso, N. Feltz, F. Gaspart, M. Sbaa, and M. Vanclooster, “Comparative assessment of irrigation systems ’ performance : Case
study in the Tri ff a agricultural district , NE Morocco,” Agric. Water Manag., vol. 212, no. August 2018, pp. 338–348, 2019.
3. V. Te Chow, Handbook of Applied Hydrology. New York: USAFrequency, 1964.
4. N. Guru and R. Jha, “Flood Frequency Analysis of Tel Basin of Mahanadi River System, India Using Annual Maximum and POT
Flood Data,” Aquatic Procedia, vol. 4. pp. 427–434, 2015.
5. B. Bobée, G. Cavadias, F. Ashkar, J. Bernier, and P. Rasmussen, “Towards a systematic approach to comparing distributions used in
flood frequency analysis,” J. Hydrol., vol. 142, no. 1–4, pp. 121–136, 1993.
6. H. A. Ewea, A. M. Elfeki, and N. S. Al-Amri, “Development of intensity–duration–frequency curves for the Kingdom of Saudi
Arabia,” Geomatics, Nat. Hazards Risk, vol. 8, no. 2, pp. 570–584, 2017.
7. F. A. K. Farquharson, J. R. Meigh, and J. V. Sutcliffe, “Regional flood frequency analysis in arid and semi-arid areas,” J. Hydrol., vol.
138, no. 3–4, pp. 487–501, 1992.
8. H. Bendjoudi, P. Hubert, and D. Schertzer, “Interphation multifractale des prkipitations Multifractal curves,” Sci. York, pp. 323–326,
1997.
573. 9. A. P. García-Marín, R. Morbidelli, C. Saltalippi, M. Cifrodelli, J. Estévez, and A. Flammini, “On the choice of the optimal frequency
analysis of annual extreme rainfall by multifractal approach,” Journal of Hydrology, vol. 575. pp. 1267–1279, 2019. 3308-
10. A. Hajani, Evan Rahman, “Design rainfall estimation : comparison between GEV and LP3 distributions and at-site and regional 33
estimates,” J. Artic., vol. 93, no. 1, pp. 67–88, 2018.
11. B. Mohymont and G. R. Demarée, “Courbes intensité-durée-fréquence des précipitations à Yangambi, Congo, au moyen de différents
19
modèles de type Montana,” Hydrol. Sci. J., vol. 51, no. 2, pp. 239–253, 2006.
12. A. Kingumbi and A. Mailhot, “Courbes Intensité-Durée-Fréquence (IDF): Comparaison des estimateurs des durées partielles et des
maximums annuels,” Hydrol. Sci. J., vol. 55, no. 2, pp. 162–176, 2010.
13. C. O. Cardoso, I. Bertol, O. J. Soccol, and C. A. De Paiva, “Generation of Intensity Duration Frequency Curves and Intensity Temporal
Variability Pattern of Intense Rainfall for Lages / SC,” pp. 1–10, 2009.
14. M. Rasel and S. M. Hossain, “Development of Rainfall Intensity Duration Frequency (R-IDF) Equations and Curves for Seven
Divisions in Bangladesh,” vol. 6, no. 5, pp. 96–101, 2015.
15. S. City, “Developing Rainfall Intensity-Duration-Frequency Relationship for Central Zone of International Journal of Advance
Engineering and Research Developing Rainfall Intensity-Duration-Frequency Relationship for Central Zone of Surat City , Gujarat ,
India,” no. April, 2017.
16. F. Cernesson, J. Lavabre, and J. Masson, “Stochastic model for generating hourly hyetographs,” vol. 42, pp. 149–161, 1996.
17. C. I. Pilgrim DH, Flood runoff. In Handbook of Hydrology, vol. 9. New York (NY): McGraw-Hill, 1993.
18. L. Alfieri, F. Laio, and P. Claps, “A simulation experiment for optimal design hyetograph,” no. March, 2008.
19. and V. T. C. Yen, B. C., “Design hyetographs for small drainage structures,” ASCE J. Hydraul. Div., vol. 106 (HY6), pp. 1055–1076,
1980.
20. S. V, “Entwicklung eines Berechnungsregens f¨ur die Bemessung von Kanalnetzen,” GWF-Wasser/Abwasser 114, vol. 114, pp. 435–
440, 1973.
21. and P. V. Veneziano, D., “Best linear unbiased design hyetograph,” Water Resour. Res., vol. 35 (9), pp. 2725–2738, 1999.
22. C. H. Keifer CJ, “Synthetic storm pattern for drainage design,” ASCE J. Hydraul. Div. 83(HY4), pp. 1–25, 1957.
23. S. Grimaldi and F. Serinaldi, “Best linear unbiased design hyetograph,” Hydrol. Sci. J., vol. 51, no. 2, pp. 223–238, 2006.
24. “Catchment scale controls the temporal connection of transpiration and diel fluctuations in streamflow,” Hydrol. Process., vol. 26, no.
November 2009, pp. 1–16, 2012.
25. T. Bahaj, I. Kacimi, M. Hilali, N. Kassou, and A. Mahboub, “Preliminary study of the groundwater geochemistry in the sub-desert area
in Morocco : case of the Ziz-Ghris basins,” Procedia Earth Planet. Sci., vol. 7, pp. 44–48, 2013.
26. D. Madsen, H., Rasmussen, P. F. & Rosbjerg, “Comparison of annual maximum series and partial duration series method for
modelling extreme hydrologic events: 1. at site modelling,” Water Resour. Res., vol. 33(4), pp. 747–757, 1997.
27. Chow VT, Applied hydrology. New York (NY): McGraw-Hill, 1988.
28. C. Chen, “Rainfall intensity-duration-frequency formulas,” J. Hydraul. Eng, vol. 109 (12), pp. 1603–1621, 1983.
29. F. . Bell, “Generalized relationships,” J. Hydraul. Eng, vol. 95 (HYI), pp. 311–327, 1969.
30. P. Alegre, “Cumulative equations for continuous time Chicago hyetograph method,” pp. 646–651, 2016.
31. D. Abdessamed and A. Bouanani, “Hydrological modeling in semi-arid region using HEC-HMS model. case study in Ain Sefra
watershed, Ksour Mountains (SW-Algeria),” no. October, 2017.
32. K. Kaffas, “Application of a continuous rainfall-runoff model to the basin of kosynthos river using the hydrologic software HEC-HMS
APPLICATION OF A CONTINUOUS RAINFALL-RUNOFF MODEL TO THE BASIN OF KOSYNTHOS RIVER USING THE
HYDROLOGIC SOFTWARE HEC-HMS,” no. April, 2015.
33. D. Halwatura and M. M. M. Najim, “Environmental Modelling & Software Application of the HEC-HMS model for runoff simulation
in a tropical catchment,” Environ. Model. Softw., vol. 46, pp. 155–162, 2013.
34. M. M. G. T. De Silva, S. B. Weerakoon, and S. Herath, “Modeling of Event and Continuous Flow Hydrographs with HEC–HMS: Case
Study in the Kelani River Basin, Sri Lanka,” J. Hydrol. Eng., vol. 19, no. 4, pp. 800–806, 2014.
35. W. Gumindoga, D. T. Rwasoka, I. Nhapi, and T. Dube, “Ungauged runoff simulation in Upper Manyame Catchment, Zimbabwe:
Applications of the HEC-HMS model,” Phys. Chem. Earth, 2016.
36. M. Wang, L. Zhang, and T. D. Baddoo, “Hydrological Modeling in A Semi-Arid Region Using HEC-HMS,” no. September, 2016.
37. M. Hydrology, “Modelling Hydrology and Sediment Transport in a Semi-Arid and Anthropized Catchment Using the SWAT Model :
The Case of the Tafna River.”
38. R. Bouabid and C. Elalaoui, “Impact of climate change on water resources in Morocco: The case of Sebou Basin,” Séminaires
Méditerranéens, vol. 95, pp. 57–62, 2010.
39. “Hydrological simulation (Rainfall-Runoff) of Kalaya watershed (Tangier, Morocco) using Geo-spatial tools,” J. Water Sci. Environ.
Technol., vol. 1, no. 1, pp. 10–14, 2016.
40. “Production of a Curve Number map for Hydrological simulation - Case study: Kalaya Watershed located in Northern Morocco,” Int.
J. Innov. Appl. Stud., vol. 9, no. 4, pp. 1691–1699, 2014.
41. Y. Tramblay et al., “Estimation of antecedent wetness conditions for flood modelling in northern Morocco,” Hydrol. Earth Syst. Sci.,
vol. 16, no. 11, pp. 4375–4386, 2012.
42. N. El Mahmouhi, M. El Wartiti, S. A. Wissem, S. Kemmou, and S. E. L. Bahi, “Utilisation des systèmes d ’ information géographiques
et des modèles hydrologiques pour l ’ extraction des caractéristiques physiques du bassin versant d ’ Assaka ( Guelmim , sud du Maroc
) [ The use of geographic information system for the extraction of,” vol. 16, no. 2, pp. 370–377, 2016.
43. Engineers U S Army Corps, “Hydrologic modeling system (HEC-HMS) application guide: version 4.0. 0,” Inst. Water Resour. Davis,
no. December, 2013.
44. X. Bo, W. Qing-hai, F. A. N. Jun, H. A. N. Feng-peng, and D. A. I. Quan-hou, “Application of the SCS-CN Model to Runoff
Estimation in a Small Watershed with High Spatial Heterogeneity ∗ 1,” Pedosph. An Int. J., vol. 21, no. 6, pp. 738–749, 2011.
45. H. Microwatershed, “APPLICATION OF SCS-CN METHOD FOR ESTIMATION OF RUNOFF IN A,” no. July, 2016.
46. USGS, “Estimating Basin Lagtime and Hydrograph-Timing Indexes Used to Characterize Stormflows for Runoff-Quality
Analysis.Scientific Investigations Report,” 2012.
47. P. O. Gupta, H. V., Sorooshian, S., & Yapo, “Status of automatic calibration for hydrologic models: Comparison with multilevel expert
calibration,” J. Hydrol. Eng., no. 4(2), pp. 135–143, 1999.
48. & V. Moriasi, Arnold, Van Liew, Bingner, Harmel, “Model evaluation guidelines for systematic quantification of accuracy in
watershed simulation,” Acad. Press, 2007.
49. H. FA, “Time distribution of rainfall in heavy storms,” Water Res Res, vol. 3(4), pp. 1007–1019, 1967.

Authors: Mallikarjuna Reddy V, Bhaskar B

Paper Title: Mechanical Behaviour of Self Compacting Concrete by using M-sand & Rice Husk ash
Abstract: Rice husk ash (RHA) is an agricultural based pozzolanic material, which contains high amount of
silica content. This experimental research was conducted on Self Compaction Concrete (SCC), to generate an
economical concrete by using Manufactured Sand (M-sand) and Rice Husk Ash. Natural River sand usage is
damaging the river beds, causing the drastic changes in ground water table and cost of river sand increasing day
by day. To overcome this problems manufactured sand is used in SCC production. Rice husk Ash is very
cheaper when compared to the Cement. It is extracted from Rice Husk which is a waste of Agricultural product.
This material can be useful to generate a sustainable construction material. This paper presents the experimental
results on development of mechanical properties of SCC with M-sand and Rice Husk Ash. Experiment
conducted on 6 different mixes. i.e Partial Replacement with RHA (0%, 5%, 10%, 15%, 20%, 25%). For each
mix Fresh properties (Slump flow & L-Box Test) & mechanical properties (Compressive strength, Split Tensile
strength and Flexural strength) for 7days, 28days and 60days along with Density comparisons are compared.

574. Keywords: Self compacting Concrete, Rice Husk Ash, M-sand.


3320-
References: 33
1. S.Baskar, T.Nelson Ponnu Durai, “Experimental Investigation of Self-compacting Concrete Using M-Sand”, Journal of Chemical and 23
Pharmaceutical Sciences.
2. Prof. Shriram H. Mahure& Dr. V. M. Mohitkar, “Effect of Rice Husk Ash on Fresh and Hardened Properties of Self Compacting
Concrete”, International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014.
3. Yogeshkumar Patel, DR.P.J.Patel, Prof. R.N.Ghosh, “Draw Out Optimum Content Of Rice Husk Ash For Self Compacting Concrete”,
International Journal of Advance Engineering and Research Development, Volume 2, Issue 2, February -2015.
4. B.Brinda Devi, R.sureshkumar, “A Study On Self Compacting Concrete And Ordinary Concrete With Rice Husk Ash As A Partial
Replacement For Cement”, IJRDO-Journal Of Mechanical And Civil Engineering.
5. Er. Ravi Bhushan, Sopan Gochhe, Er. Harneet Singh,Partial “Replacement of Cement By Rice Husk Ash, International Research
Journal of Engineering and Technology”, Volume: 04, Issue: 10, Oct -2017.
6. Ashwini B.V, G.K Supriya, Vijay kumar &Ashish Dubay B, An “Experimental Study on Rice Husk Ash as Partial Replacement for
Cement in Concrete”, International Journal of Innovative Research in Science, Engineering and Technology, Vol. 6, Issue 5, May 2017
7. K Praveen Kumar and Radhakrishna, “Characteristics of SCC with Fly Ash and Manufactured Sand”, IOP Conference Series:
Materials Science and Engineering.
8. S.Kalirajan & B.G.Vishnuram, “Development of Self Compacting Concrete Using Manufactured Sand”, International journal of Earth
Science and Engineering, Volume 07, No.05, October 2014.
9. K. Suseela & Dr. T.Baskaran, “Strength Analysis On Concrete With M-Sand As A Partial Replacement Of Fine Aggregate”,
International Journal of Civil Engineering and Technology, Volume 8, Issue 12, December 2017.
10. Er.S.Thirougnaname, Dr. T.Sundararajan, “Studies On Rice Husk Ash Cement Concrete”, International Journal of civil engineering
and technology (ijciet) volume 4, issue 6, november – december.
11. Parampreet kaur, Varinder Singh & Amit Arora, “Effect Of Agriculture Waste I.E. Rice Husk Ash On The Mechanical Properties Of
Concrete”, International Journal Of Advanced Research In Engineering And Technology (ijaret) Volume 9, Issue 6, November -
December 2018
12. Nan Sua,, Kung-Chung Hsu& His-Wen Chai, “A simple mix design method for self-compacting concrete”, Cement and Concrete
Research 31 (2001).

Authors: Shweta Sharma, Meenakshi Mittal

Paper Title: Detection and Prevention of De-authentication Attack in Real-time Scenario


Abstract: Wireless Local Area Network (WLAN) is an infrastructure network in which nodes are connected to
a centralized system to provide Internet access to mobile users by radio waves. But WLANs are vulnerable to
Medium Access Control (MAC) layer Denial of Service (DoS) attacks due to the susceptibility of the
management frames. An attacker can spoof the MAC address of the legitimate client and perform de-
authentication attack to disconnect WLANs users from the access point. Many free tools are available in Kali
Linux Operating System (OS) by which this attack can be performed and cause a security threat to WLAN users.
The consequences of de-authentication DoS attack are frequent disconnection from Internet, traffic redirection,
man-in-the-middle attack, and congestion. Despite enormous efforts in combating de-authentication DoS attack
in the past decade, this attack is still a serious threat to the security of the cyber world. Medium Access Control
Spoof Detection and Prevention (MAC SDP) DoS algorithm performs detection and prevention of de-
authentication attack caused by spoofing MAC address. This algorithm is modified to make it more immune to
the de-authentication attack and implemented in real-time scenario. The results show that the proposed technique
increases the packet flow rate by 20.36%, reduces the packet loss by 95.71%, and reduces the down time and
recovery time by 0.39 sec and 0.9 sec respectively as compared to MAC SDP DoS algorithm.

Keywords: WLAN, DoS attack, De-authentication attack, MAC layer, and Access Point.

References:

1. K. Pelechrinis, M. Iliofotou, and S. V Krishnamurthy, “Denial of Service Attacks in Wireless Networks : The Case of Jammers,” IEEE
Commun. Surv. TUTORIALS, vol. 13, no. 2, pp. 245–257, 2011.
575. 2. J. L. Feng and G. Gong, “WiFi-based Location Services Attack on Dual-band Hardware,” in International Symposium on
Electromagnetic Compatibility (EMC), 2014, pp. 155–158. 3324-
3. T. Farooq, D. Llewellyn-jones, and M. Merabti, “MAC Layer DoS Attacks in IEEE 802 . 11 Networks,” in The 11th Annual 33
Conference on the Convergence of Telecommunications, Networking and Broadcasting (PGNet 2010), 2010, pp. 1–7.
4. Netscout, “Eye on Networks - Wireless Security Series Part I: Deauthentication Attacks.” [Online]. Available:
30
http://enterprise.netscout.com/content/eyeonnetworks-wlan-security-and-analysis. [Accessed: 10-Feb-2016].
5. J. Bellardo and S. Savage, “802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions,” in Proceedings of the 12th
conference on USENIX Security Symposium, 2003, pp. 1–13.
6. J. Wright, “Detecting Wireless LAN MAC Address Spoofing,” Cisco Certif. Netw. Assoc., pp. 1–20, 2003.
7. K. Bicakci and Y. Uzunay, “Pushing the Limits of Address Based Authentication : How to Avoid MAC Address Spoofing in Wireless
LANs,” Int. J. Electr. Comput. Energ. Electron. Commun. Eng., vol. 2, no. 6, pp. 1092–1101, 2008.
8. T. N. Nguyen, B. N. Tran, and D. H. M. Nguyen, “A Lightweight Solution for Wireless LAN: Letter-Envelop Protocol,” in
Communications and Networking, 2008, pp. 1–5.
9. R. Cheema, D. Bansal, and S. Sofat, “Deauthentication / Disassociation Attack : Implementation and Security in Wireless Mesh
Networks,” Int. J. Comput. Appl., vol. 23, no. 7, pp. 7–15, 2011.
10. L. Wang and B. Srinivasan, “Analysis and Improvements over DoS Attacks against IEEE 802.11i Standard,” in Second International
Conference on Networks Security, Wireless Communications and Trusted Computing, 2010, pp. 109–113.
11. L. Arockiam and B. Vani, “Medium Access Control Spoof Detection and Prevention Algorithm (MAC SDP DoS) for Spoofing Attacks
in WLAN,” Int. J. Comput. Sci. Inf. Technol. Secur., vol. 3, no. 2, pp. 165–171, 2013.
12. R. Agrawal, T. Imieliński, and A. Swami, “Mining association rules between sets of items in large databases,” in International
conference on Management of data, 1993, pp. 207–216.
13. M. N. Shahidan and H. I. Mohammed, “An Automated Approach to Detect Deauthentication and Disassociation Dos Attacks on
Wireless 802.11 Networks,” Int. J. Comput. Sci. Issues, vol. 12, no. 4, pp. 10–112, 2015.
14. M. A. C. Aung and K. P. Thant, “Detection and Mitigation of Wireless Link Layer Attacks,” in International Conference on Software
Engineering Research, Management and Applications, 2017, pp. 173–178.
15. A. Arora, “Preventing wireless deauthentication attacks over 802.11 Networks,” arXiv Prepr. arXiv1901.07301, pp. 1–11, 2018.
16. V. Kumkar, A. Tiwari, P. Tiwari, A. Gupta, and S. Shrawne, “Vulnerabilities of Wireless Security protocols ( WEP and WPA2 ),” Int.
J. Adv. Res. Comput. Eng. Technol., vol. 1, no. 2, pp. 34–38, 2012.
17. “Wireshark,” 2019. [Online]. Available: https://www.wireshark.org/. [Accessed: 24-Jun-2019].
18. P. Biondi, “About Scapy,” 2019. [Online]. Available: https://scapy.readthedocs.io/en/latest/introduction.html. [Accessed: 20-Jun-2019]

Authors: Manish Tiwari, Vijayshri Chaurasia


Long Channel Keeper Based Open Loop Difference Amplifier Domino For Noise Tolerant Low
Paper Title:
Power Or Gates
Abstract: This paper proposes an open loop difference amplifier with long channel keeper technique for
domino logic circuits implemented as wide fan in OR gate. Currently OR gates suffer from high capacitive
576. loading and delays due to such loading. The proposed design uses single stage of comparison and dual keeper
3331-
arrangement to generate and hold the output logic state. This technique effectively reduces the high input
33
loading from capacitance and manages the power consumption by switching based on the generated difference
40
voltage. As compared to standard footerless domino SFLD, the proposed design OLDA has shown to reduce
power consumption by 42% in 64 bit configuration. It has increased average noise immunity by 2.03 times,
while maintaining same speed as compared to SFLD. All simulations are done in CMOS technology with 90nm
PTM LP models.

Keywords: Dynamic logic circuits, OR gate domino, Long channel keeper, Low power digital VLSI design.

References:

1. N.H.E. Weste, D.M. Harris, CMOS VLSI Design: A Circuits and Systems Perspective, Pearson/Addison-Wesley, Boston, 2010
2. R.J. Baker, CMOS: Circuit Design, Layout, and Simulation, John Wiley & Sons, NJ, 2011.
3. V. Kursun, E.G. Friedman, “Multi-Voltage CMOS Circuit Design”, Wiley, New York, 2006.
4. M.H. Anis, M.W. Allam, M.I. Elmasry, “Energy-efficient noise-tolerant dynamic styles for scaled-down CMOS and MTCMOS
technologies”, IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 10 (2) (2002) 71–78
5. H. Iwai, Roadmap for 22 nm and beyond, Microelectron. Eng. 86 (9) (2009) 1520–1528.
6. V. Kursun, E.G. Friedman, “Domino logic with variable threshold voltage keeper”, IEEE Trans. Very Large Scale Integr. (VLSI) Syst.
11 (6) (2003) 1080–1093.
A. Alvandpour, R. Krishnamurthy, K. Sourrty, S.Y. Borkar, A sub-130 nm conditional-keeper technique, IEEE J. Solid-State Circuits 37
(5) (2002) 633–638.
7. Y. Sun, V. Kursun, Carbon nanotubes blowing new life into NP dynamic CMOS circuits, IEEE Trans. Circuits Syst. I 61 (2) (2014)
420–428 (February).
A. Amirabadi, A. Afzali-Kusha, Y. Mortazavi, M. Nourani, Clock delayed domino logic with efficient variable threshold voltage keeper,
IEEE Transactions on VLSI Systems 15 (2007) 125–134.
8. F. Haj Ali Asgari, M. Ahmadi, J. Wu, “Low power high performance keeper technique for high fan-in dynamic gates”, in: Proceedings
of European Conference on Circuit Theory and Design (ECCTD), 2009, pp. 523–526.
9. S.O. Jung et al., “Skew-tolerant high-speed (STHS) domino logic”, in: Proceedings of ISCAS, vol. 4, 2001, pp. 154–157.
10. S.M. Sharroush et al., “Speeding-up wide-fan in domino logic using a controlled strong PMOS keeper”, in: Proceedings of the
International Conference on Computer and Communication Engineering, 2008, pp. 633–637.
11. P. R. Gray, P. J. Hurst, S. H. Lewis, and R. G. Meyer, Analysis and design of analog integrated circuits, 4th ed. New York: Wiley, 2001.
12. J. M. Rabaey, A. Chandrakasan, and B. Nicolic, Digital Integrated Circuits: A Design Perspective, 2 nd ed. Upper Saddle River, NJ:
Prentice Hall, 2003
13. R. Krambeck, C.M. Lee, H.F. Law, “High-speed compact circuits with CMOS”, IEEE J. Solid-State Circuits 17(1982)614–619.
14. M. Elgebaly, M. Sachdev, “A leakage tolerant energy efficient wide domino circuit technique”, in: Proceedings of the 45th Midwest
Symposium on Circuits and Systems, MWSCAS-2002, IEEE, 2002, vol.481, pp.I-487–490.
15. F. Moradi, T. VuCao, E.I. Vatajelu, A. Peiravi, H. Mahmoodi, D.T. Wisland, “Domino logic designs for high-performance and
leakage-tolerant applications”, Integration VLSI Journal 46(2013)247–254.
16. K. Roy, S. Mukhopadhyay, H. Mahmoodi-meimand, “Leakage tolerant mechanisms and leakage reduction techniques in deep-
submicron CMOS circuits”, Proceedings of the IEEE 91 (2003) 305–327.
17. F. Haj Ali Asgari, M. Ahmadi, J. Wu, “Low power high performance keeper technique for high fan-in dynamic gates”, in: Proceedings
of European Conference on Circuit Theory and Design (ECCTD), 2009, pp. 523–526.
18. P. Zhao, et al., “A Low power domino with differential-controlled-keeper”, IEEE International Symposium on Circuits and Systems
(ISCAS) (2007) 1625–1628.
19. J.R.G. David, N. Bhat, “A low power, process invariant keeper for high speed dynamic logic circuits”, IEEE International Symposium
on Circuits and Systems (ISCAS) (2008) 1668–1671.
20. J. Wang, W. Wu, N. Gong, L. Hou, “Domino gate with modified voltage keeper”, in: Proceedings of 11th International Symposium on
Quality Electronic Design, 2010, pp. 443–446.
21. S.M. Sharroush et al., “Speeding-up wide-fan in domino logic using a controlled strong PMOS keeper”, in: Proceedings of the
International Conference on Computer and Communication Engineering, 2008, pp. 633–637.
22. L. Wang, R. Krishwamurthy, K. Soumyanath, N.R. Shanbhag, “An energy-efficient leakage-tolerant dynamic circuit technique”, in:
Proceedings of the 13th Annual IEEE International ASIC/SOC Conference, IEEE, 2000, pp. 221–225.
23. H. Mahmoodi-Meimand, K. Roy, “Diode-footed domino: a leakage-tolerant high fan-in dynamic circuit design style”, IEEE Trans.
Circuits Syst. I: Regul. Pap. 51(2004)495–503.
24. Y. Lih, N. Tzartzanis, W.W. Walker, “A leakage current replica keeper for dynamic circuits”, IEEEJ. Solid-State Circuits 42(2007)48–
55
25. Peiravi, M. Asyaei, “Robust low leakage controlled keeper by current-comparison domino for wide fan-in gates”, Integr. VLSIJ.
45(2012)22–32.
26. Peiravi, M. Asyaei, “Current-comparison-based domino: new low-leakage high-speed domino circuit for wide fan-in gates”, IEEE
Trans. Very Large Scale Integr. (VLSI) Syst.21(2013)934–943.
27. H. Suzuki, C.H. Kim, K. Roy, “Fast tag comparator using diode partitioned domino for 64 bit microprocessors”, IEEE Trans. Circuits
Syst. I: Regul. Pap. 54 (2007)322–328.
28. Jan M. Rabaey, Massoud Pedram, “Low power design methodologies”, Kluwer Academic Publishers, 1996.
29. Banerjee K., Amerasekera A., and Hu C., “Characterization of VLSI circuit interconnect heating and failure under ESD conditions”,
International Reliability Physics Symposium, 1996.
30. D. Sylvester and K. Keutzer, “A Global Wiring Paradigm for deep submicron design”, IEEE Trans. on Computer-Aided Design of
Integrated Circuits and Systems, Volume 19, Issue 1, Feb 2000, pp. 242-252.
31. M. Alioto, G. Palumbo, and M. Pennisi, “Understanding the effect of process variations on the delay of static and domino logic,” IEEE
Trans. Very Large Scale (VLSI) Syst., vol. 18, no. 5, pp. 697–710, May 2010.
32. M. H. Anis, M. W. Allam, and M. I. Elmasry, “Energy-efficient noise-tolerant dynamic styles for scaled-down CMOS and MTCMOS
technologies,” IEEE Trans. Very Large Scale (VLSI) Syst., vol. 10, no. 2, pp. 71–78, Apr. 2002.
Abhishek Barua, Siddharth Jeet, Dilip Kumar Bagal, Pratyashi Satapathy, Pulkit Kumar
Authors:
Agrawal
Evaluation of Mechanical Behavior of Hybrid Natural Fiber Reinforced Nano Sic Particles
Paper Title:
Composite using Hybrid Taguchi-Cocoso Method
Abstract: For this present research investigation, hybrid natural fiber reinforced Nano SiC particles composite
was fabricated and their mechanical properties has been studied. Experiments have been planned as per
Taguchi’s Method. After preparing the composite material by hand layup technique and then the mechanical
577. characterizations are performed. Multi-response optimization has been carried out by employment of a recently
3341-
developed method for multi-criteria decision making (MCDM), i.e. combined compromise solution (CoCoSo)
33
method. For defining the relative significance of measured norms, pairwise comparison matrix was used.
45
Optimal results have been verified through confirmatory experiments. Based on the experimental observations
ultimate tensile strength (UTS), density and flexural strength, ANOVA result indicated that density has highest
impact for a better mechanical behaviour. This can be useful in different field of application for fabrication of
different structures, parts etc
Keywords: Palm-Wood-SiC Composite material, Taguchi’s method, COCOSO method, Strength analysis.

References:

1. G. Agarwal, A. Patnaik, R. K. Sharma, “Parametric Optimization and Three-Body Abrasive Wear Behavior of Sic Filled Chopped
Glass Fiber Reinforced Epoxy Composites”, International Journal of Composite Materials, vol. 3, no. 2, 2013, pp. 32-38.
2. B. Chanda, R. Kumar, S. Bhowmik, “Optimisation of Mechanical Properties of Wood Dust-reinforced Epoxy Composite Using Grey
Relational Analysis”, Proceedings of Fourth International Conference on Soft Computing for Problem Solving, Advances in Intelligent
Systems and Computing, vol 336, 2014, pp. 13-24.
3. M. Pathal, B. Parida, Sasmita Kar, “Fabrication and Mechanical Characterization of Jute-Glass-Silk Fiber Polymer Composites”,
Proceedings of National Conference on Emerging Trends in Engineering, Science and Manufacturing, International Journal of
Scientific & Engineering Research, vol. 9, no. 4, 2018, pp. 97-100.
4. M. Pathal, K. K. Ekka, “Study of Mechanical Behavior of Hybrid Polymer Nano Composite Using Taguchi Experimental Design”,
International Journal of Advanced Mechanical Engineering, vol. 8, no. 1, 2018, pp. 1-8.
5. B. Parida, A. Barua, S. Jeet and D. K. Bagal, “Fabrication and Mechanical Characterization of Jute-Glass-Silk Fiber Polymer
Composites Based on Hybrid RSM-GRA-FIS and RSM-TOPSIS Approach”, International Journal for Research in Engineering
Application & Management, vol. 4, no. 5, 2018, pp. 25-33.
6. B. Naik, S. Paul, A. Barua, S. Jeet, D. K. Bagal, “Fabrication and Strength Analysis of Hybrid Jute-Glass-Silk Fiber Polymer
Composites Based on Hybrid Taguchi-WASPAS Method”, International Journal of Management, Technology and Engineering, vol.
IX, no. IV, 2019, pp 3472-3479.
7. B. Naik, S. Paul, S. P. Mishra, S. P. Rout, A. Barua, D. K. Bagal, “Performance Analysis of M40 Grade Concrete by Partial
Replacement of Portland Pozzolana Cement with Marble Powder and Fly Ash Using Taguchi-EDAS Method”, JASC: Journal of
Applied Science and Computations, vol. VI, no. VI, 2019, pp. 733-743.
8. P. K. Dey, D. N. Ghosh and A. C. Mondal, “A MCDM approach for evaluating bowlers performance in IPL”, Journal of Emerging
Trends in Computing and Information Sciences, vol. 2 no. 11, 2011, pp. 563-573.
9. M. Madic, J. Antucheviciene, M. Radovanovic and D. Petkovic, “Determination of manufacturing process conditions by using MCDM
methods: Application in laser cutting”, Engineering Economics, vol. 27, no. 2, 2016, pp. 144–150.
10. M. Yazdani, P. Zarate, E. K. Zavadskas, Z. Turskis. “A combined compromise solution (CoCoSo) method for multi-criteria decision
making problems”, Management Decision, DOI: 10.1108/MD-05-2017-0458, 2018.
11. R. Mohammed, B. R. Reddy, A. S. Shaik, J. S. Suresh, “Hybridization Effect on Mechanical Properties and Erosion Wear of Epoxy-
Glass Composites”, International Journal of Innovative Technology and Exploring Engineering, vol. 8, no. 9, 2019, pp. 2703-2709.
12. T. S. Balaji, A. Shanmugasundaram, “Influence of Flyash & Silicon Nitride On Mechanical & Tribological Properties of AA7075
Hybrid Composite”, International Journal of Innovative Technology and Exploring Engineering, vol. 8, no. 9, 2019, pp. 2344-2350.
13. K. I. V. Vandana, K. N. S Suman, “Effect of Speed on Tribological Properties of Graphene Toughned Alumina (Al G) Composite”,
International Journal of Innovative Technology and Exploring Engineering, vol. 8, no. 9, 2019, pp. 2068-2074.
14. T. V. Kumar, M. Indu, A. S. Gopal, A. V. Krishna, D. V. Reddy, “Microstructure Study and Mechanical Testing of Al 6061-Si3n4
Metal Matrix Composites”, International Journal of Innovative Technology and Exploring Engineering, vol. 8, no. 9, 2019, pp. 3404-
3407.
15. T. N. Kumar, B. Murali, J. Arulmani, “Machining Characteristics of Natural Fiber Particle Reinforced Polymer Composite Material
using Artificial Neural Network”, International Journal of Innovative Technology and Exploring Engineering, vol. 8, no. 9, 2019, pp.
3350-3354.

Authors: Tushar Gupta, M. Emran Khan


Variation in Ignition Delay with Changing the Environment inside the Combustion Chamber for
Paper Title:
Different Sprays
Abstract: Ignition delay is very important parameter which influences the entire combustion process and
emissions generated inside the engine. An experimental study was conducted to observe the variation in ignition
delay with changing environment inside the combustion chamber for different sprays. Two types of nozzles
namely pintle nozzle and single hole nozzle were used for creating hollow cone spray and solid cone spray
respectively. This study was carried at different injection pressures (100 bar, 150 bar and 200 bar), different HST
(350°C, 450°C and 550°C) and different air pressures (10 bar, 15 bar, 20 bar and 25 bar) for obtaining the value
of ID. A digital Oscilloscope is used to record ID and optical method was used for detecting the flame. Results
of the experiments show that air pressure, injection pressure and HST all are responsible for variation in ID but
HST is more strongly affect the ID compared to other parameters. However at high value of HST and injection
pressures variation in ID is less. Variations in the values of ID are more for Solid cone spray than Hollow Cone
spray although ID is decreased for both sprays at almost all injection pressures. The dependency of types of
spray is more prominent in lower temperature ranges compared to higher temperature ranges.
578.
Keywords: Diesel Engine, Injection Pressure, Air Pressure, Ignition Delay, Hollow cone spray, solid cone 3346-
spray. 33
53
References:

1. Yusmady Bin M.A., “Diesel and Bio- diesel fuel deposits on a hot wall surface”, PhD Thesis, Department of mechanical system
engineering, Gunma University, Japan, August 2009.
2. Crua C., “Combustion Processes in C.I. Engines”, PhD Thesis, School of Engineering, University of Brighto in collaboration with
Ricardo Consulting Engineers, December 2002.
3. Heywood, J.B., “Internal Combustion Engines”, McGraw Hill International, New York, Second Edition, 1988.
4. Prakash V., “Measurement of the ignition delay of oxygenated fuels blend sprays at high pressure”, M.Tech. Thesis, Department of
Mechanical Engineering , Z H College of Engineering & Technology, Aligarh Muslim University, Aligarh, India, May 2011.
5. Wolfer, H.H., “Ignition Lag in Diesel Engines” VDI-Forschungsheft Library No.358, UDC 621-436.047, 1959.
6. Essam M. EL-Hannouny and Patrick V. Farrell, “Effect of Injection Parameters and Injection System on Spray Characteristics for
HSDI Diesel Engines”, Engine Research Center University of Wisconsin-Madison, WI 53706, July 2003.
7. Kuti O. A. et al, “Effect of Injection Pressure on Ignition, Flame Development and Soot Formation Processes of Biodiesel Fuel Spray”,
SAE International Journal of Fuels and Lubricants vol. 3 no. 2 1057-1070, December 2010.
8. Su W. et al, “Effect of injection pressure on spray characteristics and fuel distribution in diesel engine conditions by planar laser-
induced exciplex fluorescence (plief) technology” , State Key Laboratory of Engines, Tianjin University, Tianjin 300072, China., 2008.
9. Wang X. et al, “Effects of ultra-high injection pressure and micro-hole nozzle on flame structure and soot formation of impinging
diesel spray”, Applied Energy 88, November 2010
10. Nishioka Y., Tomoda H., Nishida K., Ogata Y., Kishorkumar G. et al "Combustion Characteristics of Diesel Spray with Temporally-
Splitting High-Pressure Injection" SAE 2015 small Engine Technolologies Conference & Exhibition, Technical Paper 2015-32-0825,
November 2015.
11. Kang S, Cho W et al "Influence of the Injector Geometry at 250MPa Injection in a Light-Duty Diesel Engine" SAE world congress
Experience, Technical Paper 2017-01-0693, March 2017.
12. Canakci M. et al, “Effect of Injection Pressure on the Combustion, Performance, and Emission Characteristics of a Diesel Engine
Fueled with Methanol-blended Diesel Fuel”, Energy & Fuels, Vol. 23, April 2009.
13. Bakar R.S. et al “Fuel injection pressure effect on performance of direct injection diesel engines based on experiment”, American
Journal of Applied Sciences 5 (3): 197-202, 2008.
14. Chumueang R., Laoonual Y., Chollacoop N. "Effects of Injection Timing and Injection Pressure on Combustion Characteristics and
Emissions of Ethanol ED95 under Partially Premixed Combustion Condition" SAE 2015 small Engine Technolologies Conference &
Exhibition, Technical Paper 2015-32-0826, November 2015.
15. Rehman S. "Sensors Based Measurement Techniques of Fuel Injection and Ignition Characteristics of Diesel Sprays in DI Combustion
System", AEJ - Alexandria Engineering Journal 55(3), May 2016.
16. Pal P., Probst D., et al "Numerical Investigation of a Gasoline-Like Fuel in a Heavy-Duty Compression Ignition Engine Using Global
Sensitivity Analysis" SAE world congress Experience, Journal Article 2017-01-0578, March 2017.
17. Rehman S., Zaidi K. "Experimental Study of Hot Surface Temperature Effect on Diesel and Blended Diesel Exhaust Emissions",
International Conference on Environment and Energy, At Hyderabad, December 2014.
18. Wakai K., “Spray and Ignition Characteristics of Dimethyl Ether injected by a D.I. Diesel Injector” Department of Mechanical
Engineering, University of Hiroshima, 1998.

Authors: Gulbakshee J Dharmale, Dipti D Patil

Paper Title: Evaluation of Phonetic System for Speech Recognition on Smartphone


Abstract: This paper presents detailed study and performance evaluation of phonetic system by comparing it
with various classification techniques of automatic speech recognition such as Neural Network, Hidden Markov
Model, Support Vector Machine and Gaussian Mixture Model. In the phonetic system, recognized speech is
processed by using language processing i.e. matching phonemes and hence generates more correct output text.
The accuracy of speech recognition of ASR classifier and phonetic system is evaluated on day to day human to
machine communications, using high-quality recording equipment, while the results for enhancement of existing
systems is done on everyday android phones, and evaluated for normal conversations in Hindi and English
language. Classifier is used to classify the fragmented phonemes or words after the fragmentation of the speech
signal. Different classification techniques are implemented and comparing accuracy of speech recognition of
different classifier. It is seen that GMM is better at the classification of signal data, outcomes of performance
evaluation shows that GMM outperforms the other three classifiers in terms of accuracy by more than 20%. This
result is compared with implemented phonetic system which shows that ASR accuracy, using phonetic system is
better than GMM. We observed 6% improvement in ASR accuracy with phonetic system.

579. Keywords: Automatic Speech Recognition (ASR), Mel Frequency Cepstral Coefficient (MFCC), Gaussian
Mixture Model (GMM), Speech Enhancement, Hidden Markov Model (HMM). 3354-
33
References: 59

1. T. Kamm, H. Hermansky, and A. G. Andrea, “ Learning the Mel-scale and optimal VTN mapping. Center for Language and Speech
Processing”, Workshop, 1997.
2. Jyoti B. Ramgire, Prof. Sumati M.Jagdale, “A Survey on Speaker Recognition with Various Feature Extraction and Classification
Techniques”, International Research Journal of Engineering and Technology (IRJET). Vol. 3, No. 4, 2016, pp. 709-712.
3. Pratik K. Kurzekar, Ratnadeep R. Deshmukh, Vishal B. Waghmare, Pukhraj P. Shrishrimal, “A Comparative Study of Feature
Extraction Techniques for Speech Recognition System”, International Journal of Innovative Research in Science, Engineering and
Technology. Vol. 3, No. 12, 2014, PP. 18006-180016.
4. Ms. R.D. Bodke, Prof. Dr. M. P. Satone,”A Review on Speech Feature Techniques and Classification Techniques”, International
Journal of Trend in Scientific Research and Development. Vol. 2, No. 4, 2018, pp. 1465-1469.
5. Lahdesmaki. H., and Shumleuch, A., “Learning the Structure of Dynamic Bayesian Networks from Time Series and Steady state
Measurements”, Machine Learning (ML). Vol. 71, No. 2, 2008, PP. 185-217.
6. Ms. Jasleen Kaur, Prof. Puneet Mittal., “On Developing an Automatic Speech Recognition System for Commonly used English Words
in Indian English”, International Journal on Recent and Innovation Trends in Computing and Communication. Vol. 5, No. 7, 2017, pp.
87-92.
7. Essa. E., Tolba, A., Elmougy. S., “Combined Classifier Based Arabic Speech Recognition”, International Journal in Speech
Recognition and Computer-Human Interaction. Vol. 4, No. 2, 2008, PP. 11-15.
8. Garg.A Rehg. V., “Audio-visual Speaker Detection Using Dynamic Bayesian Network”, Vol. 1, No. 1, 2011, pp. 19-27.
Authors: Preeti Gupta, Shimi S.L
Removal of Initial Phase Transient Current in DC-DC Boost Converter using Modified Switched
Paper Title:
Inductor
Abstract: This paper presents the removal of initial phase transient currents in an existing dc-dc boost
converter topology with the help of a modified switched inductor cell. In an earlier proposed topology, a novel
single switch boost converter was proposed with high voltage gain, which however gave a high initial transient
current of the order of 26kA on simulating in MATLAB Simulink environment. This initial phase current was
removed by placing a small valued inductor and a freewheeling diode in series with boost capacitor. The
inductor is placed in parallel with the diode and creates an open circuit initially, this arrangement limits the
current to a bearable value, i.e. approximately 180A, without compromising with the high gain of the cell. The
results of the proposed modifications are validated using MATLAB Simulink.

Keywords: dc-dc converter, switched inductor cell (SIC), switched inductor switched capacitor (SISC),
switched capacitor cell (SCC).
580.
3360-
References: 33
64
1. M. Z. Jacobson and M. A. Delucchi, "Providing all global energy with wind, water, and solar power, Part I: Technologies, energy
resources, quantities and areas of infrastructure, and materials," Energy policy, vol. 39, pp. 1154-1169, 2011.
2. T. Bennett, A. Zilouchian, and R. Messenger, "Photovoltaic model and converter topology considerations for MPPT purposes," Solar
Energy, vol. 86, pp. 2029-2040, 2012.
3. R. Singh and R. Banerjee, "Estimation of rooftop solar photovoltaic potential of a city," Solar Energy, vol. 115, pp. 589-602, 2015.
4. M. Forouzesh, Y. P. Siwakoti, S. A. Gorji, F. Blaabjerg, and B. Lehman, "Step-up DC–DC converters: a comprehensive review of
voltage-boosting techniques, topologies, and applications," IEEE Transactions on Power Electronics, vol. 32, pp. 9143-9178, 2017.
5. H. Fathabadi, "Novel high efficiency DC/DC boost converter for using in photovoltaic systems," Solar Energy, vol. 125, pp. 22-31,
2016.
6. S. Sivakumar, M. J. Sathik, P. Manoj, and G. Sundararajan, "An assessment on performance of DC–DC converters for renewable
energy applications," Renewable and Sustainable Energy Reviews, vol. 58, pp. 1475-1485, 2016.
7. B. S. Revathi and M. Prabhakar, "Non isolated high gain DC-DC converter topologies for PV applications–A comprehensive review,"
Renewable and Sustainable Energy Reviews, vol. 66, pp. 920-933, 2016.
8. M. A. Al-Saffar and E. H. Ismail, "A high voltage ratio and low stress DC–DC converter with reduced input current ripple for fuel cell
source," Renewable Energy, vol. 82, pp. 35-43, 2015.
9. K.-C. Tseng and C.-C. Huang, "High step-up high-efficiency interleaved converter with voltage multiplier module for renewable
energy system," IEEE transactions on industrial electronics, vol. 61, pp. 1311-1319, 2013.
10. Y. Ye, K. Cheng, and S. Chen, "A high step-up PWM DC-DC converter with coupled-inductor and resonant switched-capacitor," IEEE
Transactions on Power Electronics, vol. 32, pp. 7739-7749, 2016.
11. B. Axelrod, Y. Berkovich, and A. Ioinovici, "Switched-capacitor/ switched-inductor structures for getting transformerless hybrid DC–
DC PWM converters," IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 55, pp. 687-696, 2008.
12. G. Wu, X. Ruan, and Z. Ye, "Nonisolated high step-up DC–DC converters adopting switched-capacitor cell," IEEE Transactions on
Industrial Electronics, vol. 62, pp. 383-393, 2014.
13. E. H. Ismail, M. A. Al-Saffar, A. J. Sabzali, and A. A. Fardoun, "A family of single-switch PWM converters with high step-up
conversion ratio," IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 55, pp. 1159-1171, 2008.
14. L.-S. Yang, T.-J. Liang, and J.-F. Chen, "Transformerless DC–DC converters with high step-up voltage gain," IEEE Transactions on
Industrial Electronics, vol. 56, pp. 3144-3152, 2009.
15. H. M. Maheri, E. Babaei, M. Sabahi, and S. H. Hosseini, "High step-up DC–DC converter with minimum output voltage ripple," IEEE
Transactions on Industrial Electronics, vol. 64, pp. 3568-3575, 2017.
16. N. Tewari and V. Sreedevi, "A novel single switch dc-dc converter with high voltage gain capability for solar PV based power
generation systems," Solar Energy, vol. 171, pp. 466-477, 2018.
Authors: Soumit Chowdhury, Sontu Mistry, Nabin Ghoshal
Multi-Phase Digital Authentication of e-Certificate with Secure Concealment of Multiple Secret
Paper Title:
Copyright Signatures
Abstract: The work suggests a unique data security protocol for trusted online validation of e-documents like
university certificates to confirm its credibility on different aspects. The idea reliably validates such e-documents
from both the issuing authority and incumbent perspectives by strongly complying the security challenges like
authentication, confidentiality, integrity and non-repudiations. At the very beginning, the parent institute
physically issues the client copyright signature to the incumbent and stores this signature and biometric
fingerprint of the incumbent on the server database. Additionally, the server secretly fabricates ownership
signatures of parent institute and concern officer both within the e-document and this certified e-document is
kept on the server database. Importantly, these signature fabrications are governed by self-defined hash
computations on incumbent registration and certificate number respectively. Next, the server transmits this
signed e-document to the client after a successful login by the client. Now client conceals shared copyright
signature and taken thumb impression of the incumbent separately within this received e-document. Critically,
these client-side signature castings are employed through self-defined hash computations on the incumbent name
and obtained marks respectively. Finally, this authenticated e-document is validated at the server end by sensing
all authentic signatures from it through those same identical hash operations. For stronger authenticity each
signature is concealed by tracing its valid or authentic circular orientation of fragment sequences and embedding
locations both derived from respective hash operations. Also, each signature is dispersed in non-overlapping
581. manners on each separate region of the e-document promoting better signature recovery. Additional robustness 3365-
is further injected with variable encoding of signature bits on different transformed pixel byte components of the 33
e-Certificate image. Overall, the scheme confirms significant performance enhancements over exiting 80
approaches with exhaustive simulation results on image data hiding aspects and their standardized comparisons.

Keywords: e-Certificate Authentication, Hash-Based Validation, Multi-Signature Fabrication, Variable


Encoding.

References:

1. V. Anitha, R. Leela Velusamy, “Authentication of Digital Documents Using Secret Key Biometric Watermarking”, International
Journal of Communication Network Security, Vol 1, Issue 4, 2012. ISSN: 2231 – 1882.
2. K. N. Mishra, “AAdhar based smartcard system for security management in South Asia”, In the Proceedings of International
Conference on Control, Computing, Communication and Materials (ICCCCM), pp. 1-6, 2016, E. ISBN: 978-1-4673-9084-2. DOI:
10.1109/ICCCCM.2016.7918256
3. H. R. Hasan, “Copyright Protection for Digital Certificate using Blind Watermarking Technique”, Kurdistan Journal of Applied
Research, Vol 3, Issue 1, pp: 75-79, June 2018. ISSN: 2411-7706.
4. I. Nasir, Y. Weng, J. Jiang, S. Ipson, (2009). “Multiple spatial watermarking technique in color images”, Signal Image & Video
Processing (SiViP), Vol. 4, Issue. 2, pp. 145–154. doi: 10.1007/s11760-009-0106-7.
5. S. Behnia, M. Teshnehlab, P. Ayubi, “Multiple watermarking scheme based on improved chaotic maps”, Communication in Nonlinear
Science and Numerical Simulation, Vol. 15, Issue. 9, pp. 2469-78. 2010, doi:10.1016/j.cnsns.2009.09.042
6. G. Bhatnagar, Q. M. J. Wu, “A new robust and efficient multiple watermarking scheme”, Multimedia Tools & Application, Vol. 74,
Issue. 19, pp. 8421-8444, 2013, doi:10.1007/s11042-013-1681-8.
7. M. Babaei, K. Ng, H. Babei, H. G. Niknajeh, “Robust multi watermarking scheme for multiple digital input images in DWT domain”
International Journal of Computer and Information Technology, Vol. 3, Issue. 4, pp. 834-840, 2014
8. M. Natarajan, Y. Govindarajan, “Performance comparison of single and multiple watermarking techniques”, International Journal of
Computer Network and Information Security, vol. 6, Issue. 7, pp 28-34, 2014. DOI: 10.5815/ijcnis.2014.07.04
9. R.M. Thanki, K.R. Borisagar, “Compressive Sensing Based Multiple Watermarking Technique for Biometric Template Protection”,
International Journal of Image Graphics and Signal Processing, vol. 7, Issue. 1, pp 53-60, 2015. DOI: 10.5815/ijigsp.2015.01.07.
10. A.K. Singh, B. Kumar, M. Dave, A. Mohan, “Multiple watermarking on medical images using selective DWT coefficients”, Journal
of Medical Imaging and Health Informatics, vol. 5, Issue. 3, pp. 607-614, 2015. DOI: https://doi.org/10.1166/jmihi.2015.1432.
11. N. Mohananthini, G. Yamuna, “Image fusion process for multiple watermarking schemes against attacks”, Journal of Network
Communications and Emerging Technologies, vol. 1, Issue. 2, pp. 1–8, 2015. ISSN: 2395-5317.
12. N. Mohananthini, G. Yamuna, “Comparison of multiple watermarking techniques using genetic algorithms”, Journal of Electrical
Systems & Information Technology, vol. 3, issue 1, pp.68–80, 2016, DOI: https://doi.org/10.1016/j.jesit.2015.11.009
13. M. Natarajan, Y. Govindarajan, “Performance optimization of multiple watermarking using genetic algorithms”, International Journal
of Enterprise Network Management, vol. 7, Issue. 3, pp. 237-249, 2016, DOI: https://doi.org/10.1504/IJENM.2016.078970.
14. R. Sadh, N. Mishra, S. Sharma, “Dual plane multiple spatial watermarking with self encryption”, Sadhana, Indian Academy of
Sciences, Vol. 4, Issue. 1, pp. 1-14, 2016
15. S. Chowdhury, R. Mukherjee, N. Ghoshal, “Dynamic authentication protocol using multiple signatures”. Wireless Personal
Communications, Vol. 93, Issue. 3, pp. 1-32, 2017, doi:10.1007/s11277-017-4066-x.

Authors: Paida Chiranjeevi, B.Venkatesu

Paper Title: Low Power High Throughput Memory Less Adaptive Filter using Distributed Arithmetic
Abstract: This paper briefs an area efficient, low power and high throughput LMS adaptive filter using
Distributed Arithmetic architecture. The throughput is increased because of parallel updating of filter coefficient
and computing the inner product simultaneously. Here we have proposed memory-less design of distributed
arithmetic (MLDA) unit. The proposed design uses 2:1 multiplexer’s architecture to replace LUT of the
conventional DA to reduce the overall area of the filter. Enhanced compressor adder is used for accumulation of
the partial products, which further helps to reduce the area. Parallel updating of the generation and accumulation
enhance the throughput of the design. The proposed architecture requires more than half area that required for
the existing LUT based inner product block. The proposed design is implemented in synopsis design compiler
and the result shows that the area decreased by 52.7% and also the MUX based DA for the Adaptive filter
causes 69.25% less power consumption for filter tap N=16, 32 and 64. Proposed design provides 36.50% less
Area Delay Product (ADP).

582. Keywords: Adaptive Filter; Distributed Arithmetic; Inner Product Block; weight-increment.
3381-
References: 33
84
1. “Low-Power, High-Throughput, and Low-Area Adaptive FIR Filter Based on Distributed Arithmetic” Sang Yoon Park, Member,
IEEE, and Pramod Kumar Meher, Senior Member, IEEE
2. “Applications of Distributed Arithmetic to Digital Signal Processing: A Tutorial Review, Stanley A. White, IEEE ASSP Magazine,
July, 1989”
3. ]D. J. Allred, H. Yoo, V. Krishnan, W. Huang, and D. V. Anderson, “LMS adaptive filters using distributed arithmetic for high
throughput,” IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 52, no. 7, pp. 1327–1337, Jul. 2005.
4. NagaJyothi, Grande, and Sriadibhatla SriDevi. "Distributed arithmetic architectures for fir filters-a comparative review." 2017
International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET). IEEE, 2017
5. Grande, Naga Jyothi, and Sriadibhatla Sridevi. "Asic implementation of shared lut based distributed arithmetic in fir filter." 2017
International conference on Microelectronic Devices, Circuits and Systems (ICMDCS). IEEE, 2017.
6. Jyothi, Grande Naga, and Sridevi Sriadibhatla. "Asic implementation of low power, area efficient adaptive fir filter using pipelined
da." Microelectronics, Electromagnetics and Telecommunications. Springer, Singapore, 2019. 385-394.
7. NagaJyothi, Grande, and Sriadibhatla Sridevi. "High speed and low area decision feed-back equalizer with novel memory less
distributed arithmetic filter." Multimedia Tools and Applications (2019): 1-15.
8. Jyothi, Grande Naga, and Sriadibhatla Sridevi. "Low Power, Low Area Adaptive Finite Impulse Response Filter Based on Memory
Less Distributed Arithmetic." Journal of Computational and Theoretical Nanoscience 15.6-7 (2018): 2003-2008.

Authors: Niranjanamurthy M., Esha Jain, Bhawna Nigam, Sushmitha M

Paper Title: Efficient Implementation of Big Data Access Control Scheme with Privacy-Preserving Policy
Abstract: In the time of big data, cloud computing, an immense measure of information can be created rapidly
from different IT, non-IT related sources. Towards these big data, cloud computing, customary PC frameworks
are not up to required skilled to store and process this information. Due to the adaptable and flexible figuring
assets, distributed computing is a characteristic fit for putting away and preparing big data. With cloud
computing, end-clients store their information into the cloud server and depend on the advanced cloud server to
share their information to different clients. To share end-client's information to just approved clients, it is
important to configuration access control systems as indicated by the prerequisites of end clients. When re-
583.
appropriating information into the cloud, end-clients free the physical control, virtual physical control of their 3385-
information. In addition, cloud specialist co-ops are not completely trusted by end-clients, which make the 33
entrance control additionally testing. on the off chance that the conventional access control systems (e.g., Access 95
Control Lists) are connected, the cloud server turns into the judge to assess the entrance approach and settle on
access choice. Subsequently, end-clients may stress that the cloud server may settle on wrong access choices
purposefully or accidentally and uncover their information to some unapproved clients. To empower end-clients
to control the entrance of their own information, a proficient and fine-grained huge information access control
plot with protection saving strategy is proposed. In particular, the entire trait (as opposed to just its qualities) in
the entrance strategies are scrambled. To help information decoding, encoding, a novel Attribute Bloom Filter is
utilized [14][16] to assess whether a characteristic is in the entrance arrangement and find the accurate position
in the entrance approach on the off chance that it is in the entrance strategy. Just the clients whose traits fulfill
the entrance arrangement are qualified to unscramble the information.

Keywords: Big data, System Architecture, Procedural Design, encryption Module, User Interface Design,
MVC Architecture.

References:

1. Nishide, T., Yoneyama, K., & Ohta, K. (2008, June). Attribute-based encryption with partially hidden encryptor-specified access
structures. In International conference on applied cryptography and network security (pp. 111-129). Springer, Berlin, Heidelberg.
2. Malhotra, S., Doja, M. N., Alam, B., & Alam, M. (2017, May). Bigdata analysis and comparison of bigdata analytic approches. In 2017
International Conference on Computing, Communication and Automation (ICCCA) (pp. 309-314). IEEE.
3. Yamagiwa, S., Kawahara, Y., Tabuchi, N., Watanabe, Y., & Naruo, T. (2015, October). Skill grouping method: Mining and clustering
skill differences from body movement BigData. In 2015 IEEE International Conference on Big Data (Big Data)(pp. 2525-2534). IEEE.
4. Nguyen, T. L. (2018, December). A Framework for Five Big V’s of Big Data and Organizational Culture in Firms. In 2018 IEEE
International Conference on Big Data (Big Data) (pp. 5411-5413). IEEE.
5. Strang, K. D., & Sun, Z. (2016, December). Meta-analysis of big data security and privacy: Scholarly literature gaps. In 2016 IEEE
International Conference on Big Data (Big Data)(pp. 4035-4037). IEEE.
6. Liu, H. (2019, January). Research on Feasibility Path of Technology Supervision and Technology Protection in Big Data Environment.
In 2019 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS)(pp. 293-296). IEEE.
7. Albalawi, U. (2018, December). Countermeasure of Statistical Inference in Database Security. In 2018 IEEE International Conference
on Big Data (Big Data) (pp. 2044-2047). IEEE.
8. Li, H., Liu, D., Alharbi, K., Zhang, S., & Lin, X. (2015). Enabling Fine-grained Access Control with Efficient Attribute Revocation
and Policy Updating in Smart Grid. TIIS, 9(4), 1404-1423.
9. Yang, K., & Jia, X. (2013). Expressive, efficient, and revocable data access control for multi-authority cloud storage. IEEE transactions
on parallel and distributed systems, 25(7), 1735-1744.
10. Patil, H. K., & Seshadri, R. (2014, June). Big data security and privacy issues in healthcare. In 2014 IEEE international congress on big
data (pp. 762-765). IEEE.
11. Yang, K., Han, Q., Li, H., Zheng, K., Su, Z., & Shen, X. (2016). An efficient and fine-grained big data access control scheme with
privacy-preserving policy. IEEE Internet of Things Journal, 4(2), 563-571.
12. Lai, J., Deng, R. H., & Li, Y. (2011, May). Fully secure cipertext-policy hiding CP-ABE. In International conference on information
security practice and experience (pp. 24-39). Springer, Berlin, Heidelberg.
13. Ramireddy, G. & Mounica, BSS (2018). An Efficient Bloom Filter to Evaluate the Access Policy and Locate an Attribute. International
Journal & Magazine of Engineering, Technology, Management and Research, 5(2), 185-188. Retrieved from:
http://www.ijmetmr.com/olfebruary2018/GujjulaRamireddy-BSSMounica-24.pdf?cv=1
14. Verma, O. P., Jain, N., & Pal, S. K. (2019). Design and analysis of an optimal ECC algorithm with effective access control mechanism
for big data. Multimedia Tools and Applications, 1-27.
15. Bao, F., & Weng, J. (Eds.). (2011). Information Security Practice and Experience: 7th International Conference, ISPEC 2011,
Guangzhou, China, May 30-June 1, 2011, Proceedings(Vol. 6672). Springer Science & Business Media.
16. Sreenu, G., & Durai, M. S. (2018). Big Data Analytics: An Expedition Through Rapidly Budding Data Exhaustive Era. In HCI
Challenges and Privacy Preservation in Big Data Security(pp. 124-138). IGI Global.
17. Yilmaz, E., Ferhatosmanoglu, H., Ayday, E., & Aksoy, R. C. (2017). Privacy-preserving aggregate queries for optimal location
selection. IEEE Transactions on Dependable and Secure Computing, 16(2), 329-343.

Authors: K.Sutha, J. Jebamalar Tamilselvi

Paper Title: Machine Learning Based Supervised Feature Selection Algorithm for Data Mining
Abstract: Data Scientists focus on high dimensional data to predict and reveal some interesting patterns as well
as most useful information to the modern world. Feature Selection is a preprocessing technique which improves
the accuracy and efficiency of mining algorithms. There exist a numerous feature selection algorithms. Most of
the algorithms failed to give better mining results as the scale increases. In this paper, feature selection for
supervised algorithms in data mining are considered and given an overview of existing machine learning
algorithm for supervised feature selection. This paper introduces an enhanced supervised feature selection
algorithm which selects the best feature subset by eliminating irrelevant features using distance correlation and
redundant features using symmetric uncertainty. The experimental results show that the proposed algorithm
provides better classification accuracy and selects minimum number of features.

Keywords: Feature Selection, Supervised learning, Data mining.


584. References: 3396-
34
1. J.Tang, S.Alelyani and Huan Liu, “Feature Selection for Classification: A Review”, Data Classification: Algorithms and Applications, 01
Pages 37-64, 2014
2. J. Weston, A. Elisseff, B. Schoelkopf, and M. Tipping, “Use of the zero norm with linear
3. models and kernel methods”, Journal of Mach. Learning Research, 3:1439–1461, 2003.
4. J.G. Dy and C.E. Brodley. Feature selection for unsupervised learning. The Journal
5. of Mach. Learning Research, 5:845–889, 2004.
6. Z. Zhao and H. Liu, “Semi-supervised feature selection via spectral analysis”,
7. In Proceedings of SIAM International Conference on Data Mining, 2007
8. I. Guyon, J. Weston, S. Barnhill, and V. Vapnik,” Gene selection for cancer classification using support vector machines”, Machine
Learning, vol 46:389-422, 2002.
9. W You , Z Yang , G Ji,” Feature selection for high-dimensional multi-category data using PLS-based local recursive feature
elimination”, Pg No: 1463 - 1475
10. Hansheng Lei, Venu Govindaraju, “Speeding Up Multi-class SVM Evaluation by PCA and Feature Selection”, SIAM Int’l Conf. on
Data Mining, Pg No: 72-79, April 23, 2005.
11. Breiman, “Random Forests”, Machine Learning, 45(1), 5-32, 2001.
12. T A Alhaj , M Md Siraj,A Zainal, H T Elshoush,F Elhaj,”Feature Selection Using Information Gain for Improved Structural-Based
Alert Correlation”, 2016
13. Y.Sayes, I.Inza, P.Larranaga,” A Review of Feature Selection Techniques in Bioinformatics”, Bioinformatics, Vol 23,pp 2507-2517.
14. Z.Zhao, S.Sharma, F.Morstratter,S.Alelyani, A.Anand,H.Liu,”Advancing Feature Selection Research”,ASU Feature Selection
Repository,2010
15. S Maldonado, R Weber,”A wrapper method for feature selection using Support Vector Machines”, Information Sciences, 179 (2009)
2208–2217
16. R.Kohavi , G.H. John, “Wrappers for Feature Subset Selection”, Artificial Intellegence, vol.97, 273-324,1997.
17. H. Liu and R. Setiono, “Chi2: Feature selection and discretization of numeric attributes”, pg 388-391, IEEE Computer Society.1995
18. S T Ikram , A K Cherukuri , “Intrusion detection model using fusion of chi-square feature selection and multi class SVM”, (2017) 29,
pp 462–472
19. Chapman, Hall, “Data Classification Algorithms and Applications”, Data Mining and Knowledege Discovery Series.
20. D Roobaert, G Karakoulas, and N V. Chawla, “. Information Gain, Correlation and Support Vector Machines”, pp 463–470 (2006)
21. J Li, K Cheng, S Wang, F Morstatter, R P. Trevino, J Tang, H Liu,” Feature Selection: A Data Perspective”, Vol. 9, No. 4, 2010.
22. Ian H. Witten and E Frank, “Data Mining: Practical Machine Learning Tools and Techniques”, II ed, 2005.
23. Lei Yu, Huan Liu,”Feature Selection for High-Dimensional Data:A Fast Correlation-Based Filter Solution”, AZ 85287-5406, USA.
24. G. J. Szekely, M. L. Rizzo, N. K. Bakirov, "Measuring and testing independence by correlation of distances", Annals of
Statistics,2007, 35 (6):Pg. No: 2769–2794.
25. Arin Chaudhuri and Wenhao Hu,” A fast algorithm for computing distance Correlation”,IOT, SAS Institute Inc.,2018
26. C. H. Q. Ding and H. Peng. “Minimum redundancy feature selection from microarray gene expression data”.. In CSB, pages 523-529.
IEEE Computer Society, 2003.
27. I.Kononenko, “Estimating attributes : Analysis and extension of RELIEF”, pg 171-182, 1994
28. Q Song, J Ni, and G. Wang,” A Fast Clustering-based Feature Subset Selection Algorithm for High-Dimensional Data”, IEEE , Vol
25, No.1, Jan 2013.
Zulakbal Abd Karim, Rania Mahadi, Hazuan Hizan, Mirza Azny Mustafa, Zulezwan Ab Malik
Authors:
& Syed Kamaruzaman Syed Ali
Paper Title: Pre-Competitive Anxiety Of Malaysian Premier League And University Football Players
Abstract: This study aimed to identify the level of state anxiety among football players of a Malaysian premier
league and a university football players. This study involved 40 players aged between 18 to 32 years old. The
questionnaire used in this study was Competitive State Anxiety Inventory-2 Reverse Survey (CSAI-2R) to
measure the level of athlete's somatic anxiety, cognitive anxiety and self-confidence. The findings showed that
the premier league players has a lower level of somatic and cognitive anxiety than the university players.
Premier league players also were shown to have higher levels of self-confidence. Based on the findings,
experience and achievement level are the contributing factors in determining the level of anxiety and increasing
self-confidence. The more experience and skills the athlete has, the easier it is for athletes to control the level of
anxiety.

Keywords: State anxiety, pre-competitive, self-confidence, football players.

References:

1. Salleh, O.M., et al. Repeated sprint ability with inclusion of changing direction among veteran soccer players. in Journal of Physics:
Conference Series. 2018. IOP Publishing.
585. 2. Salleh, O.M., et al., Repeated sprint ability depending on the level of condition among university soccer players. International Journal
of Academic Research in Business and Social Sciences, 2017. 7(6): p. 506-514. 3402-
3. Pavlova, E. and G. Uzunova, A comparison of the PWC170 between volleyball and soccer players from adapted Margaria aerobic step 34
test. Jurnal Sains Sukan dan Pendidikan Jasmani, 2014. 3(1): p. 34-44.
4. Yusof, Z.M., S.A.E. bin Syed Ambon, and J. bin Mohamad, Physical fitness assessment of MSKPPM Kedah veteran football players. 04
Jurnal Sains Sukan dan Pendidikan Jasmani, 2016. 5(1): p. 49-64.
5. Lamat, S.A.B., et al., Coaching style and mental toughness among UiTM’s football players. Jurnal Sains Sukan dan Pendidikan
Jasmani, 2016. 5(1): p. 22-34.
6. Yusoff, N.H., Motivation and women involvement as football supporter in Malaysia. Jurnal Sains Sukan dan Pendidikan Jasmani,
2017. 6(1): p. 36-44.
7. Yusoff, N.H., Kepentingan kawalan sosial dalam menangani salah laku membabitkan penyokong bola sepak di Malaysia. Jurnal Sains
Sukan dan Pendidikan Jasmani, 2018. 7(1): p. 34-45.
8. Abdillah, E.M.A.T. and N. Jusoh, Kesan dehidrasi tahap rendah terhadap prestasi kognitif, mood dan skala subjektif dalam kalangan
atlet bola sepak lelaki. Jurnal Sains Sukan dan Pendidikan Jasmani, 2018. 7(2): p. 1-11.
9. Dahlan, N.D. and T.A. Muhamad, Mental toughness and academic achievement among footballers at National University of Malaysia
Jurnal Sains Sukan dan Pendidikan Jasmani, 2017. 6(1): p. 21-35.
10. Williams, A.M. and T. Reilly, Searching for the stars. 2000, Taylor & Francis.
11. Aziz, S.A., Mengaplikasi teori psikologi dalam sukan. 2001: Utusan Publications.
12. Hanton, S., O. Thomas, and I. Maynard, Competitive anxiety responses in the week leading up to competition: the role of intensity,
direction and frequency dimensions. Psychology of Sport and Exercise, 2004. 5(2): p. 169-181.
13. Eubank, M. and D. Collins, Coping with pre-and in-event fluctuations in competitive state anxiety: A longitudinal approach. Journal of
Sports Sciences, 2000. 18(2): p. 121-131.
14. Murray, N.P. and C.M. Janelle, Anxiety and performance: A visual search examination of the processing efficiency theory. Journal of
Sport and Exercise psychology, 2003. 25(2): p. 171-187.

Authors: Anupam Pandit, Ravi Sekhar, Pritesh Shah

Paper Title: Simulation Based Process Optimization for Additive Manufacturing


Abstract: Additive manufacturing is finding increasing applications in industries ranging from electronics to
aerospace and even medical sectors. However, these machines are very expensive which hinders researcher
586.
investigations. Thus it is important to have an alternative data source for such machines. A probable solution is 3405-
to develop a simulator to replicate such machine based on same input parameters and thus obtain results similar 34
to that from an actual machine. This would help developers and researchers investigate several aspects of 10
additive manufacturing without using the actual machine. This paper reports an investigation conducted to study
the behavior of a selective laser melting machine under different scenarios. Influences due to components such
as vacuum pump, reciprocating pump, gas inlet valve, vent valve, elevator and wiper have been included.
Experimental result data has been used to build codes in C# software to program the PLC simulator. Validation
experiments confirmed simulation output. The present work helps the end user to inspect real time simulations
such as vacuum creation, inert gas atmosphere progression. Thus, simulation results offer time and resource
savings to an additive manufacturing end user by him/her make informed decisions by supplying exact
parameter settings suitable to his/her manufacturing requirements.

Keywords: Selective Laser Melting; PLC simulator; Additive Manufacturing; 3D printing.

References:

1. W. Trochim,J. Davis "Computer Simulation for Program Evaluation." Evaluation Review Vol. 5. 10 No. 5, October 1986 pp. 609-634.
2. J. J. Beaman, C. R. Deckard, Selective laser sintering with assisted powder handling, US Patents No. 4938816.
3. C. Taltavull, B. Torres, A.J. Lopez, P. Rodrigo, E. Otero, J. Rams Selective laser surface melting of a magnesium–aluminium alloy
Mater Lett, 85 (2010), pp. 98–101
4. B.C. Zhang, N.E. Fenineche, H.L. Liao, C. Coddet Microstructure and magnetic properties of Fe–Ni alloy fabricated by selective laser
melting Fe/Ni mixed powder J Mater Sci Technol, 29 (8) (2013), pp. 757–760
5. Y.D. Wang, H.B. Tan, Y.L. Fang, H.M. Wang Microstructure and mechanical properties of hybrid fabricated 1Cr12Ni2WMoVNb
steel by laser melting deposition Chin J Aeronaut, 26 (2) (2013), pp. 481–486
6. D.D. Gu, Y.C. Hagedorn, W. Meiners, G. Meng, R.J.S. Batista, K. Wissenbach Densification behavior, microstructure evolution, and
wear performance of selective laser melting processed commercially pure titanium Acta Mater, 60 (9) (2012), pp. 3849–3860
7. H. Attar , M. Bonisch, M. Calin, L.C. Zhang, S. Scudino, J. Eckert, Selective laser melting of in situ titanium–titanium boride
composites: processing, microstructure and mechanical properties. Acta Mater 2014;76:13–22.
8. D.D. Gu, YF Shen,G.B. Meng, Growth morphologies and mechanisms of TiC grains during selective laser melting of Ti– Al–C
composite powder. Mater Lett 2009;63(29):2536–8.
9. F. Verhaeghe,T. Craeghs,J. Heulens, L. Pandelaers, A pragmatic model for selective laser melting with evaporation. Acta Mater
2009;57(20):6006–12.
10. C. Sutcliffe ,P. Fox., Manufacture of metal articles , US Patent - 20150135897 A1,(May 2015).
11. Y.N. Burali, PLC Based Industrial Crane Automation & Monitoring, International Journal of Engineering and Science, Vol. 1, Issue 3
(Sept 2012), PP 01-04.
12. M. Hook, L. Junchen,O. Noriaki, S. Snowden, ”Descriptive and predictive growth curves in energy system analysis” Natural Resources
Research, 2011, Vol. 20, Issue 2: 103-116.
13. M. Gulsen, A.E. Smith,D.M. Tate , A genetic algorithm approach to curve fitting, International Journal of Production Research ,1995;
33(7):1911-1923.
14. M.A. Farahat ,M. Talaat, Short-Term Load Forecasting Using Curve Fitting Prediction Optimized by Genetic Algorithms, International
Journal of Energy Engineering 2012, 2(2): 23-28.
15. B. Park , J.D. Schneeberger , Microscopic Simulation Model Calibration and Validation, Transportation Research Record 1856 , Paper
No. 03-2531.
16. M. Hofmann, On the Complexity of Parameter Calibration in Simulation Models, JDMS, Volume 2, Issue 4, October 2005 Pages 217–
226.

Authors: C. Mohan, P.Selvaraju ,S.Shanmugan

Paper Title: Markov Process in Varying Value in Production by Machinery with Two Components
Abstract: In this paper production and availability of machinery for production are considered. Here a
machinery of production with two components is considered and that production is full when the machinery is
working with both the components functioning well. But there is a chance that the whole machinery may
dysfunction because of failure of both components in which case the production comes to a standstill and it is
worst crisis. The other possibility is that one of the components may fail but still the machine continues
functioning but with less efficiency. The production may continue and if the other component also fails the
production completely stops and the situation is critical. When the machine is in one component failure, the
failed part may be a repaired and machine can be made to work with full efficiency. But when both components
fail, should be renewed as a package and then the production should start. Under such conditions found the
steady state probabilities and the rate of crisis and the expected cost of production.

Keywords: Markov Process, Two Components, Variations in Production. Mathematics Subject Classification:
587. 90B05.
3411-
References: 34
14
1. K. Arrow, S. Karlin and H. Scarf, “Studies in the Mathematical Theory of Inventory and Production”, Standard University Press,
Standard, California, 1958.
2. S.K. Bhattacharya, R. Biswas, M.M. Ghosh and P. Banerjee, “A study of risk factors of diabetes mellitus”, Indian. J Community Med.,
18, (1993)
3. J.K. Daniel and R. Ramanarayanan, “An (S, s) inventory system with rest periods to the Server”, Naval Research Logistics, 35 (1988),
119–123.
4. Kun-Shan Wu, Liang-Yuh Ouyang, “(Q, r, L) Inventory model with defective items”, Computers & Industrial Engineering, Vol. 39,
Iss 1–2, (2001), 173-185.
5. C.Mohan, P.Selvaraju, “Crisis rate of Analysis of Manufacturing concern subjected to Failure Of Machines and Production”, I. J. of
Pure and App. Maths.Vol116, NO.23 2017 87-92.
6. C.Mohan, P.Selvaraju, “The Analysis of Manpower Affecting Marketing with the Introduction detection location phase for review and
Recruitment”, Int. J. of Pure and Applied Mathematics.Volume116, NO.23, 2017, 93 - 97
7. S. Murthy and R. Ramanarayan, “One ordering and two ordering levels Inventory systems units with SCBZ lead times”, Int. J. of Pure
and Appl. Maths, 47(3) (2008), 427–447.
8. S. Murthy and R. Ramanarayanan, “Two ordering levels inventory system with different lead times and rest time to the server”, Inter.
J. of Applied Math., 21(2) (2008), 265–280.
9. S. Murthy and R. Ramanarayanan, “Two (s, S) inventories with perishable units”, The Journal of Modern Mathematics and Statistics,
2(3) (2008), 102–108.
10. S. Murthy and R. Ramanarayan, “Inventory system exposed to Calamity with SCBZ arrival property”, The Journal of Modern
Mathematics and Statistics, 2(3) (2008), 109–119.
11. S. Parvathi, R. Ramanarayanan and S. Srinivasaragavan, “General Analysis Of Two Products Inventory System With Seasonal
Production And Sales”, IJPAM, Vol. 87 No. 2 2013, 195-204
12. B. Raja Rao, “Life expectancy for setting the clock back to zero property”, Mathematical Biosciences, (1998), 251–271.
13. R. Ramanarayanan and M.J. Jacob, General analysis of (S, s) inventory systems with random lead time and bulk demand, Cashieru de
C.E.R.O., No-s: 3-4 (1988), 119-123.
14. K. Usha, Eswari Prem and Ramanarayanan.R, “Stochastic Process in Time to vital Organs failure of Gestational Diabetic Person”,
Applied Mathematical Sciences, 5(10), 477-493.

Authors: Swati Nautiyal, C Rama Krishna, Shruti Wadhwa


Mitigating Economic Denial of Sustainability (EDoS) in Cloud Environment using Genetic
Paper Title:
Algorithm and Artificial Neural Network
Abstract: Economic Denial of Sustainability (EDoS) is a latest threat in the cloud environment in which EDoS
attackers continually request huge number of resources that includes virtual machines, virtual security devices,
virtual networking devices, databases and so on to slowly exploit illegal traffic to trigger cloud-based scaling
capabilities. As a result, the targeted cloud ends with a consumer bill that could lead to bankruptcy. This paper
proposes an intelligent reactive approach that utilizes Genetic Algorithm and Artificial Neural Network (GANN)
for classification of cloud server consumer to minimize the effect of EDoS attacks and will be beneficial to small
and medium size organizations. EDoS attack encounters the illegal traffic so the work is progressed into two
phases: Artificial Neural Network (ANN) is used to determine affected path and to detect suspected service
provider out of the detected affected route which further consist of training and testing phase. The properties of
every server are optimized by using an appropriate fitness function of Genetic Algorithm (GA) based on energy
consumption of server. ANN considered these properties to train the system to distinguish between the genuine
overwhelmed server and EDoS attack affected server. The experimental results show that the proposed Genetic
and Artificial Neural Network (GANN) algorithm performs better compared to existing Fuzzy Entropy and
Lion Neural Learner (FLNL) technique with values of precision, recall and f-measure are increased by 3.37%,
10.26% and 6.93% respectively.

Keywords: Artificial Neural Network, Cloud Computing, EDoS attack, Genetic algorithm.

References:

1. Q. Zhang, L. Cheng and R. Boutaba. Cloud computing: state-of-the-art and research challenges, Journal of internet services and
applications, vol.1, pp.7-18, 2010.
2. S. Subashini and V. Kavitha. A survey on security issues in service delivery models of cloud computing, Journal of network and
computer applications, vol. 34, issue 1, pp. 1-11, 2011.
3. K. Bhushan and B. B. Gupta(2018). Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based
588. cloud computing environment, Journal of Ambient Intelligence and Humanized Computing, vol. 10, issue 5, pp. 1985-1997, May 2019.
4. A. Shawahna, M. Abu-Amara, A. Mahmoud, and Y. E. Osais. EDoS-ADS: An Enhanced Mitigation Technique Against Economic 3415-
Denial of Sustainability (EDoS) Attacks, IEEE Trans. on Cloud Computing, 2018 34
5. S. Bulla, B. B. Rao, K. G. Rao, and K. Chandan. An experimental evaluation of the impact of the EDoS attacks against cloud 21
computing services using AWS, International Journal of Engineering & Technology, vol. 7, pp. 202-208, 2018.
6. P. Daffu and A. Kaur. Energy Aware Supervised Pattern Attack Recognition Technique for Mitigation of EDoS Attacks in Cloud
Platform, International Journal of Wireless and Microwave Technologies, vol. 1, pp. 42-49, 2018
7. Q. Yan and F. R. Yu. Distributed denial of service attacks in software-defined networking with cloud computing, IEEE
Communications Magazine, vol.53, no.4, pp. 52-59, 2015.
8. O. Osanaiye, K. K. R. Choo and M. Dlodlo. Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud
DDoS mitigation framework. International Journal of Network and Computer Applications, vol.67, pp. 147-165, 2016.
9. M. Ficco and M. Rak. Economic denial of sustainability mitigation in cloud computing. in Organizational Innovation and Change
Springer-Cham, pp. 229-238, 2016.
10. F. Z. Chowdhury, L. B. M. Kiah, and M. M. Ahsan. Economic denial of sustainability (EDoS) mitigation approaches in cloud:
Analysis and open challenges. In Proc. 2017 IEEE Conf. Electrical Engineering and Computer Science (ICECOS), August 2017, pp.
206-211.
11. A. S. Bhingarkar and B. D. Shah. A survey: Securing cloud infrastructure against EDoS attack. in Proc. International Conference on
Grid Computing and Applications (GCA), p. 16, January 2015.
12. B. Waters, A. Juels, J. A. Halderman and E. W. Felten. New client puzzle outsourcing techniques for DoS resistance, in Proc. 11th
ACM conference on Computer and communications security, pp. 246-256, October 2004.
13. M. H. Sqalli, F. Al-Haidari and K. Salah. EDoS-shield-a two-steps mitigation technique against edos attacks in cloud computing, in
Proc. 2011 IEEE 4th International Conference on Utility and Cloud Computing (UCC), 2011, pp. 49-56.
14. F. Al-Haidari, M. Sqalli and K. Salah. Evaluation of the impact of EDoS attacks against cloud computing services, Arabian Journal for
Science and Engineering, vol.40, no.3, pp. 773-785, 2015.
15. F. Z. Chowdhury, M. Y. Idris, M. L. M. Kiah, and M. M. Ahsan. EDoS eye: A game theoretic approach to mitigate economic denial of
sustainability attack in cloud computing. in Control and System Graduate Research Colloquium (ICSGRC), 2017 IEEE 8th (pp. 164-
169). IEEE.
16. W.Shruti, K. C. Rama, S. Poonam. Prevention of EDoS attack using hybrid filtering technique (EDoS Guard). I J C T A. 9(40).519-
526, 2016.
17. S. Bhingarkar and D. Shah. FLNL: Fuzzy entropy and lion neural learner for EDoS attack mitigation in cloud computing. International
Journal of Modeling, Simulation, and Scientific Computing, vol. 9, no. 6, 2018.
18. K. Deb, A. Pratap, S. Agarwal, and T. Meyarivan. A fast and elitist Multiobjective genetic algorithm: NSGA-II. IEEE transactions on
evolutionary computation, vol.6, no.2, pp.182-197, 2002.
19. S. Dreiseitl and L. Ohno-Machado (2002). Logistic regression and artificial neural network classification models: a methodology
review, Journal of biomedical informatics, vol.35 (5-6), pp. 352-359, 2002.

Authors: Naveen Kumar H N, Jagadeesha S


589.
Paper Title: Subject Independent Automatic Facial Expression Recognition from Partially Occluded Still
Images by Employing Appearance Based Feature Extraction Schemes
Abstract: Facial expression recognition is the process of identifying human emotion through expressions. The
world around us is constantly changing and in this ever-changing scenario, development of a system which
performs automatic detection and recognition of facial expressions in a given scene is of paramount importance,
and at the same time highly challenging. It becomes even more challenging when the aforesaid scene is partially
occluded, thus limiting the facial area which could be explored. As such, expression recognition from partially
occluded images is still largely an unexplored area. The proposed work is an attempt towards subject
independent automatic expression recognition from partially occluded images. Salient features of the proposed
work involves careful approximation of contributions made by facial regions like eye, mouth, and nose towards
recognition of each basic expression; determination of a particular region in face which contributes the most
discriminative and abstract feature for recognition of a particular expression; identification of facial region
wherein expression recognition is independent of any occlusion happening with respect to that particular region.
The proposed work to begin with segments facial regions from a static facial image; discriminative and abstract
features extracted from so segmented facial regions are experimented upon to better understand the contribution
made by each region in recognition of a facial expression. Various appearance features such as HOG, LBP and
OGBP have been incorporated in the experimentation, and results obtained thereby infer that mouth region
convey lion’s share of the information about probabilistic determinant of an expression and its intensity when
compared to remaining regions. The proposed system outperforms holistic approaches in connection with facial
expression recognition.

Keywords: Feature extraction, Facial expression classification, Appearance features, Oriented gradients of
binary pattern.

References:

1. P. Weinberg, W. Gottwald, “Impulsive consumer buying as a result of emotions,” Journal of Business research, 10 (1) (1982) 43–57.
2. P. Ekman and W. Friesen, “Constants across cultures in the face and emotion,” Journal of personality and social psychology, Vol.17
no.2, p-124, 1971.
3. P. Ekman and W. Friesen, “The Facial Action Coding System (FACS): A Technique for the Measurement of Facial Movement”,
Consulting Psychologists Press, San Francisco, 1978.
4. Maja Pantic, Leon J. M. Rothkrantz, “Automatic analysis of facial expressions: the state of the art,” IEEE Transactions on Pattern
Analysis and Machine Intelligence, Vol.22, No. 12, 2000.
5. Z.Zeng, M.Pantic, G.I.Roisman and T. S. Huang,”A survey of affect recognition methods: Audio, visual and spontaneous expressions,” 3422-
IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol.31 no. 1, pp. 39-58, 2009.
6. Xiaoming Zhao and Shiqing Zhang, “A Review on Facial Expression Recognition: Feature Extraction and Classification,” IETE 34
Technical Review, Vol. 33 Issue- 5, 2016. 28
7. Evangelos Sariyanidi, Hatice Gunes, and Andrea Cavallaro, “Automatic Analysis of Facial Affect: A Survey of Registration,
Representation, and Recognition,” IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 37, No. 6, June 2015.
8. I. Kotsia and I. Pitas, "Facial Expression Recognition in Image Sequences Using Geometric Deformation Features and Support Vector
Machines," in IEEE Transactions on Image Processing, vol. 16, no. 1, pp. 172-187, Jan. 2007.
9. Zhang,Y.,Ji,Q., “Active and dynamic information fusion for facial expression understanding from image sequences”, IEEE
Transactions on Pattern Analysis and Machine Intelligence, Vol. 27,699–714.
10. S L Happy and Aurobinda Routray, “Automatic facial expression recognition using features of salient facial patches”, IEEE
Transactions on Affective Computing.
11. Maja Pantic, Ioannis Patras, “Dynamics of Facial Expression: Recognition of Facial Actions and their Temporal Segments from Face
Profile Image Sequences,” IEEE transactions on systems, man, and cybernetics, Vol. 36, No. 2, April 2006.
12. Turk M A, Pentland A P, “Face recognition using eigenfaces,” J Cognitive Neuroscience 1991;3(1):72–86.
13. Belhumeur PN, Hespanha JP, Kriegman DJ. Eigenfaces vs. fisherfaces: recognition using class specific linear projection”, IEEE
Transactions on Pattern Analysis and Machine Intelligence, 1997; 19(7):711–720.
14. Bartlett M, Sejnowski T J, “Independent components of face images: a representation for face recognition,” 4th Annual Joint
Symposium on Neural Computation; La Jolla (CA); 1997.
15. Viola, P. & Jones, M., “Robust real-time face detection” International Journal of Computer Vision (2004) 57: 137.
16. Navneet Dalal, Bill Triggs, “Histograms of Oriented Gradients for Human Detection”, International Conference on Computer Vision &
Pattern Recognition (CVPR '05), Jun 2005, San Diego, United States. pp. 886-893.
17. Cigdem Turan, Kin-Man Lam, “Histogram-based local descriptors for facial expression recognition (FER): A comprehensive study”,
Journal of visual communication and image representation, 55(2018) 331-341.
18. P. Carcagn, M. Coco, M. Leo, C. Distante, “Facial expression recognition and histograms of oriented gradients: a comprehensive study,
Springerplus 4 (1) (2015) 1. doi:10.1186/s40064-015-1427-3.
19. T. Ahonen, A, Hadid, and M. Pietikainen, “Face description with local binary patterns: Application to face recognition”, IEEE
Transactions on Pattern Analysis and Machine Intelligence, vol.28, pp. 2037-2041, 2006.
20. Xiaoming Zhao and Shiqing Zhang, “Facial expression recognition using local binary patterns and discrimant kernel locally linear
embedding”, EURASIP Journal on Advances in Signal Processing 2012.
21. Caifeng Shan a, Shaogang Gong, Peter W. McOwan, “Facial expression recognition based on Local Binary Patterns: A comprehensive
study, Image and Vision Computing 27 (2009) 803–816.
22. Zhao G, Pietikainen M, “Dynamic texture recognition using Local Binary Patterns with an application to facial expressions”, IEEE
Trans Pattern Analysis and Machine Intelligence 2007; 29(6):915–928.
23. Shan, Sh. Gong, P. W. McOwan, “Facial expression recognition based on local binary patterns: a comprehensive study”, Image and
Vision Computing, vol. 27, no. 6, pp. 803-816, 2009.
24. W. Hsu and C.-J. Lin, "A comparison of methods for multiclass support vector machines", IEEE Transactions on Neural Networks, vol.
13, no. 2, pp. 415-425, 2002.
25. P. Lucey, J.F. Cohn, T. Kanade, J. Saragih, Z. Ambadar and I. Matthews, "The Extended Cohn-Kanade Dataset (CK+): A complete
dataset for action unit and emotion-specified expression", in the Proceedings of IEEE workshop on CVPR for Human Communicative
Behavior Analysis, San Francisco, USA, 2010.

Authors: S. Uma Maheswari, S. S. Dhenakaran


590.
Paper Title: Sentiment Analysis on Social Media Big Data With Multiple Tweet Words
Abstract: The main objective of this paper is Analyze the reviews of Social Media Big Data of E-Commerce
product’s. And provides helpful result to online shopping customers about the product quality and also provides
helpful decision making idea to the business about the customer’s mostly liking and buying products. This
covers all features or opinion words, like capitalized words, sequence of repeated letters, emoji, slang words,
exclamatory words, intensifiers, modifiers, conjunction words and negation words etc available in tweets. The
existing work has considered only two or three features to perform Sentiment Analysis with the machine
learning technique Natural Language Processing (NLP). In this proposed work familiar Machine Learning
classification models namely Multinomial Naïve Bayes, Support Vector Machine, Decision Tree Classifier, and,
Random Forest Classifier are used for sentiment classification. The sentiment classification is used as a decision
support system for the customers and also for the business.

Keywords: Opinion Mining, Social Media, Big Data, Support Vector Machine, NLP.
3429-
References: 34
1. Mr Amritkumar Tupsoundarya1, Prof.Padma, S. Dandannavar, Sentiment Expression via Emoticons on Social Media: Twitter,
34
International Journal for Research in Applied Science & Engineering Technology (IJRASET), ISSN: 2321-9653; Volume 6 Issue VI,
June 2018.
2. Liang Wu, Fred Morstatter, Huan Liu, SlangSD: Building and Using a Sentiment Dictionary of Slang Words for Short-Text
Sentiment Classification, arXiv: 1608.05129v1 [cs.CL] 17 Aug 2016.
3. Naw Naw, Twitter Sentiment Analysis Using Support Vector Machine and K-NN Classifiers, International Journal of Scientific and
Research Publications, Volume 8, Issue 10, October 2018 407, ISSN 2250-3153.
4. Wareesa Sharif, Noor Azah Samsudin, Mustafa Mat Deris, Rashid Naseem, Muhammad Faheem Mushtaq, Effect of Negation in
Sentiment Analysis,International Journal of Computational Linguistics Research Volume 8 Number 2 June 2017.
5. Rini Wongso, Ferdinand Ariandy Luwinda, Brandon Christian Trisnajaya, Olivia Rusli Rudy, News Article Text Classification in
Indonesian Language, Procedia Computer Science 116 Elsevier (2017) 137–143.
6. Dibakar Ray, Lexicon Based Sentiment Analysis of Twitter Data, International Journal of Research in Applied science & Engineering
Technology, ISSN: 2321-9653; IC Value: 45.98; Volume 5 Issue X, October 2017
7. Rizal Setya Perdana and Aryo Pinandito, Journal of Telecommunication, Electronic and Computer Engineering, e-ISSN: 2289-8131
Vol. 10 No. 1-8. April- 2018.
8. Valmeekam Karthik, Dheeraj Nair, Anuradha J, Procedia Computer Science Volume 132 Elsevier 2018, Pages 167-173.

Authors: L.F. Kazanskaya, Yu.A. Belentsov


Methods of Assessing the Strength of Masonry to Ensure the Reliability of Reconstructed
Paper Title:
Structures
Abstract: The reliability of structures in the reconstruction of buildings depends on quality control methods
that can be destructive and non-destructive. Directions for improving the accuracy of methods for assessing
masonry as a complete construction system are proposed in the paper. The factors to be taken into account when
assessing the bearing capacity of the operating buildings have been stated. Margin of errors of a number of
parameters using different methods of strength assessment have been determined.

Keywords: Reliability of building structures, reconstruction, restoration, masonry, methods of strength


assessment, compressive strength.

References:

1. Shangina, N., Pukharenko, Y., Kharitonov, A., & Kharitonova, T. Dry mixes for the restoration: basic principles of design. In MATEC
Web of Conferences. 2017. (Vol. 106, p. 03021). EDP Sciences.
2. Asteris, P. G., Argyropoulos, I., Cavaleri, L., Rodrigues, H., Varum, H., Thomas, J., & Lourenço, P. B. Masonry Compressive Strength
Prediction using Artificial Neural Networks. In International Conference on Transdisciplinary Multispectral Modeling and Cooperation
for the Preservation of Cultural Heritage. 2018. (pp. 200-224). Springer, Cham.
3. Shakya, M., Varum, H., Vicente, R., & Costa, A. Empirical formulation for estimating the fundamental frequency of slender masonry
591. structures. International Journal of Architectural Heritage, 2016,10(1), 55-66.
4. Montazerolghaem, M., & Jäger, W. Reliability Verification of Unreinforced Masonry Wall. Modern Applied Science, 2016, 10(6). 3435-
5. Skrzypczak, I., Kujda, J., & Buda-Ożóg, L. The use of probabilistic methods in assessing the reliability of masonry structures. Procedia 34
Engineering, 2017, 193, 160-167. 39
6. Bakeer, T. Reliability assessment of vertically loaded masonry walls. Structural Safety, 2016, 62, 47-56.
7. Accidents of buildings and structures on the territory of the Russian Federation in 2003. Moscow, FCC, 2004 (in Russian)
8. Krasnoshchekov Yu. V. Probabilistic bases of calculation of building structures. Publishing center SibADI. Omsk, 2016, 214p. (in
Russian)
9. Smirnova O. Concrete mixtures with high-workability for ballastless slab tracks. Journal of King Saud University-Engineering
Sciences, 2017, 29(4), 381-387
10. Heravi A.A., Smirnova O., Mechtcherine V. Effect of strain rate and fiber type on tensile behavior of high-strength strain-hardening
cement-based composites (HS-SHCC). RILEM Bookseries. 2018. V. 15. pp.266-274.
11. Smirnova O.M. Obtaining the High-performance Concrete for Railway Sleepers in Russia. Procedia Engineering, Volume 172, 2017,
pp.1039-1043
12. Pichugin, S.F. Reliability estimation of industrial building structures. Magazine of Civil Engineering. 2018. 83(7). Pp. 24–37.
13. Smirnova O.M. Technology of Increase of Nanoscale Pores Volume in Protective Cement Matrix, International Journal of Civil
Engineering and Technology, 9(10), 2018, pp. 1991–2000.
14. Kharitonov A., Marina Korobkova, Olga Smirnova. The influence of low-hard dispersed additives on impact strength of concrete.
Procedia Engineering, Volume 108, 2015, pp.239-244.
15. Smirnova O. M. Rheologically Active Microfillers for Precast Concrete, International Journal of Civil Engineering and Technology,
9(8), 2018, pp. 1724–1732
16. Šoukal, F., Koplík, J., Ptáček, P., Opravil, T., Havlica, J., Palou, M. T., & Kalina, L. The influence of pH buffers on hydration of
hydraulic phases in system CaO–Al2O3. Journal of Thermal Analysis and Calorimetry, 2016, 124(2), 629-638.
17. Smirnova O. M. Evaluation of superplasticizer effect in mineral disperse systems based on quarry dust . International Journal of Civil
Engineering and Technology, 9(8), 2018, pp. 1733-1740.
18. Kazanskaya L. F., Grigoriev D. S., Makarov Yu. I. Micromechanical properties of the contact zone in concretes based on technogenic
raw materials. Natural and technical Sciences. 2014, 2 (70). pp. 292-295.
19. Efremov I. V., Rakhimova N. N. Reliability of technical systems and technogenic risk. 2013.Orenburg, OSU, 163 p. (in Russian)
20. Belentsov Yu.A., O.M. Smirnova. Influence of acceptable defects on decrease of reliability level of reinforced concrete structures.
International Journal of Civil Engineering and Technology, 2018, 9(11), pp. 2999–3005.
21. Smirnova O.M. Compatibility of Portland cement and polycarboxylate-based superplasticizers in high-strength concrete for precast
constructions. Magazine of Civil Engineering, No. 6, 2016. pp.12-22.
22. Kazanskaya L.F. and O.M. Smirnova. Supersulphated Cements with Technogenic Raw Materials. International Journal of Civil
Engineering and Technology, 9(11), 2018, pp.3006–3012.
23. Asteris, P. G., Moropoulou, A., Skentou, A. D., Apostolopoulou, M., Mohebkhah, A., Cavaleri, L., ... & Varum, H. Stochastic
Vulnerability Assessment of Masonry Structures: Concepts, Modeling and Restoration Aspects. Applied Sciences, 2019, 9(2), 243.
24. Shakya, M., Varum, H., Vicente, R., & Costa, A. Seismic vulnerability assessment methodology for slender masonry structures.
International Journal of Architectural Heritage, 2018,12(7-8), 1297-1326.
25. Sýkora, M., Diamantidis, D., Holický, M., Marková, J., & Rózsás, Á. Assessment of compressive strength of historic masonry using
non-destructive and destructive techniques. Construction and Building Materials, 2018, 193, 196-210.
26. Vasanelli, E., Calia, A., Colangiuli, D., Micelli, F., & Aiello, M. A. Assessing the reliability of non-destructive and moderately
invasive techniques for the evaluation of uniaxial compressive strength of stone masonry units. Construction and Building Materials,
2016, 124, 575-581.
27. Sahu, S., Sarkar, P., & Davis, R. Quantification of uncertainty in compressive strength of fly ash brick masonry. Journal of Building
Engineering, 2019, 100843.
28. Smirnova O. Compatibility of shungisite microfillers with polycarboxylate admixtures in cement compositions. ARPN Journal of
Engineering and Applied Sciences. 2019. Vol. 14, No. 3. pp.600-610.
29. Ulybin A.V., Fedotov S. D., Tarasova D. S. Determination of concrete strength during inspection of buildings and structures. The
world of construction and real estate. 2012. No. 45. pp. 2-5.
30. Kharitonov, A. M., Y. M. Tikhonov, and Y. A. Belentsov. "Influence of concrete strength evaluation method accuracy on reliability
levels of geotechnical structures." Geotechnics Fundamentals and Applications in Construction: New Materials, Structures,
Technologies and Calculations, (2019): 135.
31. Belentsov Yu.A. Increase of anisotropic materials production efficiency. Thesis of doctor of technical Sciences in the scientific
specialty "Building materials and products". Belgorod. 2010. 465p.
32. Smirnova O.M. and D.A.Potyomkin. Influence of Ground Granulated Blast Furnace Slag Properties on The Superplasticizers Effect,
International Journal of Civil Engineering and Technology, 9(7), 2018, pp. 874–880.
33. Rzhanitsyn A. R. Theory of calculation of building structures for reliability. Moscow. Stroizdat, 1978. 239p. (in Russian)
34. Rayzer V. D. Theory of reliability in structural design. Moscow. DIA, 1998. 304p. (in Russian)
35. Belentsov Yu. A., Kharitonov A.M. Determination of the safety factor in assessing the quality of brick structures. Bulletin of civil
engineers. 2016. 4 (57). pp. 105-110.
36. De Nardi, C., Brito de Carvalho Bello, C., Ferrara, L., & Cecchi, A. Self-healing lime mortars: an asset for restoration of heritage
buildings. In Sustainable Materials Systems and Structures SMSS, 2019, Vol. 128, pp. 652-659.
37. Shaybadullina Arina, Yuliya Ginchitskaya and Olga Smirnova. Decorative Coating Based on Composite Cement-Silicate Matrix. Solid
State Phenomena. 2018, Vol. 276, pp. 122-127
38. Koňáková, D., Čáchová, M., Vejmelková, E., Keppert, M., Jerman, M., Bayer, P., ... & Černý, R. Lime-based plasters with combined
expanded clay-silica aggregate: Microstructure, texture and engineering properties. Cement and Concrete Composites, 2017, 83, 374-
383.
39. Smirnova O.M. Development of Classification of Rheologically Active Microfillers for Disperse Systems With Portland Cement and
Superplasticizer. International Journal of Civil Engineering and Technology, 2018, 9(10), pp. 1966–1973.
40. Nogueira, R., Pinto, A. P. F., & Gomes, A. Design and behavior of traditional lime-based plasters and renders. Review and critical
appraisal of strengths and weaknesses. Cement and Concrete Composites, 2018, 89, 192-204.
41. Petrova, T., Smirnova, O. Influence of fine mineral fillers on properties of plasticized cement compositions. In Modern Building
Materials, Structures and Techniques. Proceedings of the International Conference, 2010, Vol. 10, p. 250. Vilnius Gediminas Technical
University, Department of Construction Economics & Property.
42. Kharitonov, A., Ryabova, A., & Pukharenko, Y. Modified GFRC for durable underground construction. Procedia engineering, 2016,
165, 1152-1161.
43. Smirnova O.M., Belentsov Y.A., Kharitonov A.M. Influence of polyolefin fibers on the strength and deformability properties of road
pavement concrete. Journal of Traffic and Transportation Engineering (English Edition). 2019. 6(4): 407-417.
44. Domański, T., & Matysek, P. The reliability of masonry structures–evaluation methods for historical buildings. Czasopismo
Techniczne, 2018, Vol. 9, 91108.
45. Marciukaitis G. V., Jonaitis B. B., Valavanis J. S., Gnip, I. Y. Evaluation of strength and deformability of masonry in compression
according to SNiP II-22–81 and Eurocode 6. Building materials, 2004, p. 48-49.

Authors: Sapna B.K, K L Sudha

Paper Title: Smart Joint Bank Locker Operation using Visual Cryptography
Abstract: Security has become the foremost vital facet in today’s banking system. As a result, banks are
committed to give secured banking services to their customers. Considering the case of a joint bank locker
operation, it needs a master key owned by the bank to open the vaults along with the key the customers have. To
avoid using the manual operation of keys, a visual cryptographic scheme is proposed to operate the vaults using
shares. Visual cryptography (VC) hides the details of the image used as a key by generating shares. Image
steganography embeds the shares with a cover image, which ensures secure storage of the shares. A completely
secured smart joint bank locker operation using a single share owned by the bank is introduced. The shares
592. generated by the bank for different customers are put together to create a unique share to open all the vaults. The
3440-
proposed approach guarantees not only absolute security than the traditional locker operation but also helps bank
34
a simplified way of maintaining lockers key. 45
Keywords: PSNR, Shares, Unique share, Visual cryptography.

References:

1. D.Binu, M.Arun Athithyan, G.K.Felins, A.Mohammed Anish, D.Sathish Kumar, 2017,"Secure Bank Locker System with Biometrics"
IJIRST, National Conference on Networks, Intelligence and Computing Systems
2. Raj Gusain, Hemant Jain, Shivendra Pratap, "Enhancing bank security system using Face Recognition, Iris Scanner and Palm Vein
Technology" 2018 3rd International Conference On Internet of Things: Smart Innovation and Usages (IoT-SIU), Date of Conference:
23-24 Feb.
3. Xingxing Jia, Daoshun Wang, Daxin Nie, Chaoyang Zhang, Member, 2016, “Collaborative Visual Cryptography Schemes”, 1051-8215
(c), IEEE Transactions on Circuits and Systems for Video Technology
4. Yogesh K. Meghrajani and Himanshu S. Mazumdar, 2016, “Universal Share for Multisecret Image Sharing Scheme Based on Boolean
Operation” IEEE Signal Processing Letters, VOL. 23, NO. 10, October 1429
5. Modigari Narendra, Dhanya Ben, C.P. Jetlin, Dr. L. Jani Anbarasi, 2017, “An Efficient Retrieval of Watermarked Multiple Color
Images using Secret Sharing”, 2017 4th International Conference on Signal Processing, Communications and Networking (ICSCN -
2017), March 16 – 18, Chennai, INDIA
6. Shemin P A, Prof. Vipinkumar K S, “ E –Payment System using Visual and Quantum Cryptography” International Conference on
Emerging Trends in Engineering, Science and Technology, 2016, ICETEST, 2212-0173
7. S.Rajaram, R.Suganya ,2017, “ Embedded Visual Cryptography for Secure Transmission of Bank cheque” Proceedings of 2017 IEEE
International Conference on Circuits and Systems (ICCS2017), 978-1-5090-6480-9/17, IEEE
8. Ankush V. Dahat , Pallavi V. Chavan, 2015, “ Secret Sharing Based Visual Cryptography Scheme Using CMY Color Space”
International Conference on Information Security & Privacy (ICISP2015), 11-12 December, Nagpur, INDIA, Procedia Computer
Science
9. Xiuqun Wang, Changlu Lin, and Yong Li, 2013,” Proactive Secret Sharing without a Trusted Party” 5th International Conference on
Intelligent Networking and Collaborative Systems, 978-0-7695-4988-0/13, 2013 IEEE
10. Shankar K, Eswaran P ,2015, “Sharing a Secret Image with Encapsulated Shares in Visual Cryptography” 4th International Conference
on Eco-friendly Computing and Communication Systems, ICECCS, Procedia Computer Science 70 ( 2015 ) 462
11. Jitendra Saturwar, D.N. Chaudhari, 2017, “Secure Visual Secret Sharing Scheme for Color Images Using Visual Cryptography and
Digital Watermarking “978-1-5090-3239-6/17, IEEE
12. K. Shankar, P. Eswaran, 2017, “RGB Based Multiple Share Creation in Visual Cryptography with Aid of Elliptic Curve Cryptography”
China Communications , February,119
13. Miss. Nuzhat Ansaria, Prof. Rahila Shaikhb, 2016, “A Keyless Approach for RDH in Encrypted Images using Visual Cryptography”
International Conference on Information Security & Privacy (ICISP2015), 11-12 December 2015, Nagpur, India, Procedia Computer
Science 78 , 125 – 131.
Authors: B.Rex Cyril, S.Britto Ramesh Kumar
Hybrid Text and Value Based Ncryption and Obfuscation (Tvbencobfus) To Safeguard Data in
Paper Title:
Cloud Storage Server
Abstract: The proposed hybrid encryption and obfuscation technique are more efficient than previously
proposed two algorithms. Because this technique considers all types of data which are ready to be uploaded to
the cloud. It integrates the independent two procedures into a single procedure and executes both procedures in a
parallel manner. For Example, if we consider data with a mixer of text and value-based, then, the proposed
algorithm is called the tbenc() and vbobfus() procedure for text and value-based data respectively.

Keywords: Cloud Computing, Security, value based, text-based,Encryption

References:

1. Sascha Fahl and Marian Harbach, “Confidentiality as a Service – Usable Security for the Cloud”, Proceedings of IEEE International
Conferenceon Trust, Security and Privacy inComputing and Communications, 2012, pp. 153-162.
2. Satyendra Singh Rawat and Niresh Sharma, “A Survey of Various Techniques to Secure Cloud Storage”, International Journal of
ComputerScience and Network Security, Volume 12 Issue 3, 2012, pp. 116-121.
593. 3. Pardeep Sharma, Sandeep K. Sood, and Sumeet Kaur, “Security Issues in Cloud Computing”, High Performance Architecture and
GridComputing Communications in Computer and Information Science, Volume 169, 2011, pp 36-45. 3446-
4. Shirole Bajirao Subhash and Dr Sanjay Thakur, “Data Confidentiality in Cloud Computing with Blowfish Algorithm”, International 34
journal of Emerging Trends in Science and Technology, Volume 1, Issue 1, 2014, pp. 01-06.
5. Shucheng Yu, Wenjing Lou, and Kui Ren, “Data Security in Cloud Computing”, Handbook on Securing Cyber-Physical Critical 50
Infrastructure, Chapter 15, Elsevier, Morgan Kaufmann Publisher, 2012, pp. 389-410.
6. Shweta Kaushik, Charu Gandhi. "Cloud data security with hybrid symmetric encryption", 2016 International Conference on
Computational Techniques in Information and Communication Technologies (ICCTICT), 2016.
7. Siani Pearson, Yun Shen and Miranda Mowbray, “A Privacy Manager for Cloud Computing”, Proceedings of International Conference
on Cloud Computing, Springer-Verlag Berlin, Heidelberg, LNCS Volume 5931, 2009, pp. 90-106.
8. Subashini S and Kavitha V., “A Survey on Security Issues in Service Delivery Models of Cloud Computing”, Elsevier Journal of
Network and Computer Applications, Volume 34, Issue 1, 2011, pp. 1-11.
9. Subhasri P. and Padmapriya A., “Multilevel Encryption for Ensuring Public Cloud”, International Journal of Advanced Research in
Computer Science and Software Engineering, Volume 3, Issue 7, 2013, pp. 527-532.
10. Sudha M and Monica M, “Enhanced Security Framework to Ensure Data Security in Cloud Computing Using Cryptography”, Advances
inComputer Science and its Applications, Volume 1, Issue 1, 2012, pp. 32-37.
11. Atiq, U.R. and M. Hussain, “Efficient cloud data confidentiality for DaaS”, International Journal of Advanced Science and
Technology, volume 35, 2011, pp.1-10.
12. Mather T., Kumaraswamy S. andShahed, L., “Cloud security and privacy”, Chapter 4, O’Reilly Media, Inc, 2009, pp.61-71.
13. William, S., “Cryptography and network security: principles & practices”, Fifth edition, Prentice Hall, 2005, pp. 6-56.
14. Sascha, F., Marian, H., Thomas, M and Matthew, S., “Confidentiality as a service – usable security for the cloud”, IEEE
International Conference on Trust, Security and Privacy in Computing and Communications, 2012, pp. 153-162.

Authors: Raj Kumar Goel, Shweta Vishnoi, Saurabh Shrivastava


Image Denoising by Hybridizing Preprocessed Discrete Wavelet Transformation and Recurrent
Paper Title:
Neural Networks
Abstract: In this paper, we are analyzing the performance of Recurrent Neural Network (RNN) for image
recalling with improved training sets by Discrete Wavelet Transformation (DWT). DWT has been used for
594. decomposing the images into four parts for low level feature extraction, to build the pattern information,
encoding the pattern. When all the patterns of these four level training sets are encoded, and given as input to 3451-
34
RNN to analyze the performance. This analysis is carried out in terms of successful and correct recalling of the
57
images by hybridizing of DWT and RNN. Now we introduce salt and pepper noise so that the distorted feature
vectors presented to the network. This gives a prototype pattern of noisy image and requires filtering of the
training set. This leads to recalled output of the network that produces the pattern information for each part of
the images. Now the integration is made possible if inverse discrete wavelet transformation (IDWT) to
amalgamate the recalled outputs corresponding to each part of the image and final image is recognized.

Keywords: Discrete wavelet transformation, auto associative memory, pattern storage networks, pattern
classification.

References:

1. Prieto A, Prieto B, Ortigosa EM, Ros E, Pelayo F, Ortega J, Rojas I , “Neural networks: An overview of early research, current
frameworks and new challenges”. Neurocomputing 2016; 214: 242-268.
2. Nagy, G., “Classification algorithms in pattern recognition”, IEEE Transactions on Audio and Electroacoustics, 1968, 16(2), 203–212.
3. Liu, D., Jiang, M., Yang, X., & Li, H. “Analyzing documents with Quantum Clustering: A novel pattern recognition algorithm based on
quantum mechanics”. Pattern Recognition Letters, 2016, 77, 8–13.
4. Lippmann, R.P, “Pattern Classification Using Neural Networks. IEEE Communications Magazine”, 1989, 27(11), 47-50.
5. Kumar, S., Singh, M. P., Goel, R., & Lavania, R., “Hybrid evolutionary techniques in feed forward neural network with distributed error
for classification of handwritten Hindi SWARS”. Connection Science, 2013, 25(4), 197–215.
6. Bhardwaj, A., Tiwari, A., Bhardwaj, H., & Bhardwaj, A., “A genetically optimized neural network model for multi-class classification.
Expert Systems with Applications”, 2016, 60, 211–221.
7. Wang, H., & Wang, L., “Modeling Temporal Dynamics and Spatial Configurations of Actions Using Two-Stream Recurrent Neural
Networks”. Cvpr, 2017, 499–508.
8. J.J. Hopfield. “Neural Networks and physical systems with emergent collective computational abilities”. Proc. Natl. Acad. Sci. USA,
1982; 79, 2554—2558.
9. Y.-T. Zhou, R. Chellappa, A. Vaid, and B. K. Jenkins, “Image restoration using a neural network,” IEEE Trans. Acoust., Speech, Signal
Processing, 1988, 36, 1141–1151.
10. J. K. Paik and A. K. Katsaggelos, “Image restoration using a modified Hopfield network,” IEEE Trans. Image Processing, 1992, 1, 49–
63.
11. Y. Sun and S.-Y. Yu, “A modified Hopfield neural network used in bilevel image restoration and reconstruction,” in Proc. Int. Symp.
Information Theory Application, vol. 3, Singapore, Nov. 16–20, 1992, 1412–1414.
12. Wu, Y., & Batalama, S. N., “An Efficient Learning Algorithm for Associative Memories”, IEEE TRANSACTIONS ON NEURAL
NETWORKS, 2000, 11(5), 1058–1066.
13. Singh, K., Ranade, S. K., & Singh, C., “Comparative performance analysis of various wavelet and nonlocal means based approaches for
image denoising”. Optik - International Journal for Light and Electron Optics, 2017,131, 423–437.
14. Lang, M., Guo, H., Odegard, J. E., Burrus, C. S., & Wells, R. O. “Noise reduction using an undecimated discrete wavelet transform”.
IEEE Signal Processing Letters, 1996, 3(1), 10–12.
15. Cheng, F.-H., & Chen, Y.-L., “Real time multiple objects tracking and identification based on discrete wavelet transform”. Pattern
Recognition, 2006, 39, 1126–1139.
16. Hussain, A. J., Al-Jumeily, D., Radi, N., & Lisboa, P. ‘Hybrid Neural Network Predictive-Wavelet Image Compression System”.
Neurocomputing, 2015, 151(P3), 975–984. https://doi.org/10.1016/j.neucom.2014.02.078
17. Lee, S. W., Kim, C. H., Ma, H., & Tang, Y. Y., “Multiresolution recognition of unconstrained handwritten numerals with wavelet
transform and multilayer cluster neural network”. Pattern Recognition, 1996, 29(12), 1953–1961.
18. Jaiswal, A., Upadhyay, J., & Somkuwar, A., “Image denoising and quality measurements by using filtering and wavelet based
techniques”. AEU - International Journal of Electronics and Communications, 2014, 68(8), 699–705.
19. P, S. V., &Rahiman, M. A. (2019). Steganalysis of Skin Tone Images Using Textural Features, International Journal of Engineering and
Advanced Technology (IJEAT), 8 (5), 2776–2783.
20. Sreedhar,T.,& Sathappan, S. (2019). Edge detection based on Improved Non-Maximum Suppression Method, International Journal of
Innovative Technology and Exploring Engineering (IJITEE),8 (9), 3264–3269.
21. S.-T. Bow, Pattern Recognition and Image Preprocessing, Marcel Dekker, Inc., New York, NY, 2002
22. Bhatnagar, S., & Gupta, R. (2019). Denoising of Mammographic Images from Quantum Noise in Wavelet Domain, International Journal
of Recent Technology and Engineering, volume 8 issue1, pp 435–440.
23. Mallat, S. A. “Time-Frequency Dictionaries”. A Wavelet Tour of Signal Processing, 1999 11–14
24. Gayathri, R., Sangeetha, D. P., & Yadav, U. B. (2019). High Density Noise Suppression Using Modified Weighted Average Filtering,
International Journal of Innovative Technology and Exploring Engineering (IJITEE),8 (7), 1258–1261
25. Sandirasegaram, N., English, R., “Comparative analysis of feature extraction (2D FFT & Wavelet) and classification (Lp metric
distances, MLP NN & HNet) algorithms for SAR imagery”, Proceedings of SPIE, 2005, 5808, 314-325.
26. Singh, M. P., & Dixit, R. S. “Optimization of stochastic networks using simulated annealing for the storage and recalling of compressed
images using SOM”. Engineering Applications of Artificial Intelligence, 2013, 26(10), 2383–2396.
Authors: Chandra Sekhar Vasamsetty, Siva Sankar Chandu, Janakidevi Maddala
Meta-Feature Classification to Explore Automatic Detection of Malware Using Segmentation
Paper Title:
Method
Abstract: Paper Anti-malware software producers are persistently tested to recognize and counter new
malware as it is discharged into nature. An emotional increment in malware generation as of late has rendered
the ordinary technique for physically deciding a mark for each new malware test unsound. This paper introduces
a versatile, mechanized methodology for identifying and arranging malware by utilizing design acknowledgment
calculations and measurable techniques at different phases of the malware examination life cycle with Meta
highlights. By utilizing a regular fragment examination, Mal-ID can dispose of malware parts that start from
595. kindhearted code. What's more, Mal-ID uses another sort of highlight, named Meta-include, to more readily
catch the properties of the dissected portions. In this paper, we introduce Ensemble Classifier technique to 3458-
handle malware uncovering based on meta features. Our system consolidates the static highlights of capacity 34
length and printable string data separated from malware tests into a solitary test which gives order results 62
superior to those accomplished by utilizing either include independently. In our testing, we information includes
data from near 1400 unloaded malware tests to various diverse grouping calculations. Utilizing k-overlap cross
approval on the malware, which incorporates Trojans and infections, alongside 151 clean records, we
accomplish a general characterization exactness of over 98%.

Keywords: Malware detection, classifier, security, Ensemble learning, meta-feature classification and
communication infrastructure.
References:

1. Suleiman Y. Yerima, “DroidFusion: A Novel Multilevel Classifier Fusion Approach for Android Malware Detection”, IEEE
TRANSACTIONS ON CYBERNETICS,2168-2267 c 2018 IEEE. Personal use is permitted, but republication/redistribution requires
IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
2. McAfee Labs Threat Predictions Report, McAfee Labs, Santa Clara, CA, USA, Mar. 2016.
3. Y. Zhou and X. Jiang, “Dissecting Android malware: Characterization and evolution,” in Proc. IEEE Symp. Security Privacy (SP),
San Francisco, CA, USA, May 2012, pp. 95–109.
4. D. Arp, M. Spreitzenbarth, M. Hubner, H. Gascon, and K. Rieck, “Drebin: Efficient and explainable detection of Android malware in
your pocket,” in Proc. 20th Annu. Netw. Distrib. Syst. Security Symp. (NDSS), San Diego, CA, USA, Feb. 2014, pp. 1–15.
5. A. Apvrille and R. Nigam. (Jul. 2014). Obfuscation in Android Malware and How to Fight Back Virus Bulletin. Accessed: Sep. 2017.
[Online]. Available: https://www.virusbulletin.com/virusbulletin/2014/07/obfuscation-android-malware-and-how-fight-back
6. Y. Jing, Z. Zhao, G.-J. Ahn, and H. Hu, “Morpheus: Automatically generating heuristics to detect Android emulators,” in Proc. 30th
Annu. Comput. Security Appl. Conf. (ACSAC), New Orleans, LA, USA, Dec. 2014, pp. 216–225.
7. T. Vidas and N. Christin, “Evading Android runtime analysis via sandbox detection,” in Proc. 9th ACM Symp. Inf. Comput. Commun.
Security, Kyoto, Japan, Jun. 2014, pp. 447–458.
8. T. Petsas, G. Voyatzis, E. Athanasopoulos, M. Polychronakis, and S. Ioannidis, “Rage against the virtual machine: Hindering dynamic
analysis of Android malware,” in Proc. 7th Eur. Workshop Syst. Security (EuroSec), Amsterdam, The Netherlands, Apr. 2014, p. 5.
9. F. Matenaar and P. Schulz. (Aug. 2012). Detecting Android Sandboxes. Accessed: Nov. 2017. [Online]. Available:
ttp://www.dexlabs.org/blog/btdetect
10. S. R. Choudhary, A. Gorla, and A. Orso, “Automated test input generation for Android: Are we there yet?” in Proc. 30th IEEE/ACM
Int. Conf. Autom. Softw. Eng. (ASE), Nov. 2015, pp. 429–440.
11. D.-J. Wu, C.-H. Mao, T.-E. Wei, H.-M. Lee, and K.-P. Wu, “DroidMat: Android malware detection through manifest and API calls
tracing,” in Proc. 7th Asia Joint Conf. Inf. Security (Asia JCIS), 2012, pp. 62–69.
12. S. Y. Yerima, S. Sezer, and I. Muttik, “Android malware detection: An eigenspace analysis approach,” in Proc. Sci. Inf. Conf. (SAI),
London, U.K., Jul. 2015, pp. 1236–1242.
13. S. Y. Yerima, S. Sezer, and I. Muttik, “Android malware detection using parallel machine learning classifiers,” in Proc. 8th Int. Conf.
Next Gener. Mobile Apps Services Technol. (NGMAST), Oxford, U.K., Sep. 2014, pp. 37–42
14. S. Y. Yerima, S. Sezer, and I. Muttik, “High accuracy Android malware detection using ensemble learning,” IET Inf. Security, vol. 9,
no. 6, pp. 313–320, Nov. 2015.
15. Kelly, C., Spears, D., Karlsson, C., and Polyakov, P., 2006. An Ensemble of Anomaly Classifiers for Identifying Cyber Attacks. Proc.
of the International SIAM Workshop on Feature Selection for Data Mining.
16. Kibler, D. A., 1991. Instance-based learning algorithms. Machine Learning, pp. 37-66.
17. Kienzle, D.M., and Elder, M.C., 2003. Internet WORMS: past, present, and future: Recent worms: a survey and trends. ACM
workshop on Rapid malcode (WORM03).
18. Kittler, J., Hatef, M., Duin, R., and Matas, J., 1998. On Combining Classifiers. IEEE Transactions on Pattern Analysis and Machine
Intelligence, 20(3) 226-239.
19. Kolter, J., Maloof, M., 2006. Learning to Detect and Classify Malicious Executables in the Wild. Journal of Machine Learning
Research, vol. 7, pp. 2721-2744.
20. Kuncheva L.I., 2005. Diversity in Multiple Classifier Systems (Editorial), Information Fusion, 6 (1) 3-4.
21. Mahoney, M.V., 2003 A machine learning approach to detecting attacks by identifying anomalies in network traffic. Ph.D. dissertation,
Florida Tech.
22. Menahem, E., 2008. Troika - An Improved Stacking Schema for Classification Tasks. MSc. Thesis in Information System Engineering
dep., Ben-Gurion University of the Negev,Israel.
23. Mitchell, T., 1997. Machine Learning. McGraw-Hill.
24. Moskovitch, R., Elovici,Y., and Rokach, L., 2008. Detection of Unknown Computer Worms based on Behavioral Classification of the
Host. Computational Statistics and Data Analysis, 52(9) 4544-4566.
25. Mukkamalaa, S., Sunga A.H., and Abrahamb, A., 2005. Intrusion Detection Using an Ensemble of Intelligent Paradigms. Journal of
Network and Computer Applications, vol. 28, pp. 167-182.
26. Opitz D. and Shavlik, J., 1996. Generating Accurate and Diverse Members of a Neural Network Ensemble. Advances in Neural
Information Processing Systems, vol. 8, pp. 535-541.
27. Quinlan, R., 1993. C4.5: Programs for Machine Learning. Morgan Kaufmann Publishers.
28. Schultz, M., Eskin, E., Zadok, E., and Stolfo, S., 2001. Data Mining Methods for Detection of New Malicious Executables. Proc. of the
IEEE Symposium on Security and Privacy, pp. 178-184.
Authors: Meiryani

Paper Title: Due Professional Care as a Moderating Variable to Independence Relationship to Audit Quality
Abstract: This study aims to obtain empirical evidence of Moderating Due Professional Care on Auditor
Independence. The population in this study are public accountants who work in the Public Accountant Office in
the DKI Jakarta area. Sampling is done using purposive sampling. The primary data collection method used is
the questionnaire method. Data were analyzed using Path Analysis with the structural equation model. The
results showed that the direct effect of independence had a positive effect on Audit Quality, while Due
Professional Care had no significant effect on Audit Quality. Research also shows that Due Professional Care
has an effect on Independence.

596. Keywords: Independence, Due Professional Care, Professional Ethics, Audit Quality.
3463-
34
References:
69
1. Agoes, Sukrisno. 2017. "Auditing: Practical Guidelines for Auditing Accountants by Public Accountants". Book I & II, Issue 5.
Jakarta: Four Salemba.
2. Anugrah, Rico Juniar., And Nahumury, Joicenda. 2014. "The Effect of Professionalism, Independence and Auditor Competence on
Audit Quality". Journal of Managerial Accounting. Vol. 1, No.8. ISSN: 2550-6604.
3. Arens, Alvin A., Elder, Randal J., Besley, Mark S., and Chris, Hogan S. 2016. "Auditing and Assurance Service: An Integrated
Approach". 16th Edition. Singapore: Pearson Education.
4. Baron, Reuben M., Kenny, David A. 1986. "The Moderator-Mediator of Variable Distinctions in Social Psychological Research:
Conceptual, Strategic, and Statistical Consideration". Journal of Personality and Social Psychology. Vol. 51, No. 6. ISSN: 1173-1182.
5. Charendra, Oktaviana Dian., And Kurnia. 2017. "Effects of Auditor Competence and Independence on Audit Quality". Journal of
Accounting Science and Research. Volume 6, Number 9. ISSN: 2460-0585.
6. Dahlia, Lia., And Octavianty, Ellyn. 2016. "The Effect of Competence, Independence, and Professional Auditors on Audit Quality".
Faculty of Economics (JIAFE) Accounting Scientific Journal. Vol. 2, No. 1, Issue 2. ISSN: 2502-4159.
7. De Angelo, Linda Elizabeth. 1981. "Auditor Size and Audit Quality. International Journal of Accounting and Economics ". Volume 3,
Issue 3. Retrieved from http://sciencedirect.com/article/pii/ 0165410181900021.
8. Economy, News. 2015. "Phenomenon of Tax Fraud Cases". Accessed May 12, 2018. http://warta-ekonomi.com/artikel/12547785.
9. Ghozali, Imam. And Fuad. 2015. "Structural Equation Modeling (Concepts, Techniques and Applications) Using the Amos 22 SPSS
Program". Semarang: BP Diponegoro University.
10. Hair Jr., Joseph F., Black, William C., Babin, Barry J., and Anderson, Rolph E. 2010. "Multivariate Data Analaysis". 7th Ed.
Singapore: Pearson New International Edition.
11. IFAC. 2016. "Handbook of Ethics for Professional Accountants: IESBA Code of Ethics High Level Summary of Applicable to Audits
of Public Interest Entities". Retrieved and download from http://ethicsboard.org
12. Indotelko. 2017. "Function and Role of Independent Auditors". Accessed May 12, 2018. http://indotelko.com/artikel-
indonesia/00457340.
13. Kristianto, Oktavianus., Hermanto, Suwardi Bambang. 2017. "The Effect of Auditor Professionalism, Auditor Independence and
Auditor Competence on Audit Quality". Journal of Accounting Science and Research. Volume 6, Number 11. ISSN: 2460-0585.
14. Lufriansyah. 2017. "Due Professional Care in Mediating the Effects of Competence, Independence, and Motivation of Auditors on
Audit Quality". Journal of Accounting & Financial Studies. Vol. 1, No. 1. ISSN: 2597-7601.
15. Liu, J., Wang, Y. and Wu, L. 2011, "The Effect of Guanxi on Quality Audit in China". Journal of Business Ethics. Vol.103, pp.621-
638.
16. Meiryani. 2016. Influence Of Uncertainty and Risks On The Information System. International Business Management. Volume 10,
Issue 9 : 1575-1580, 2016. ISSN : 1993-5250.
17. Meiryani. 2017. The Influence of Business Process and Management Support on Accounting Information System. Journal of
Engineering and Applied Sciences. Volume 12. Issue 23. Pp. 7416-7421.
18. Meiryani; Bambang Leo Handoko; Sasya Sabrina; Edwin Hendra. 2017. The Influence of Leadership Styles on Accounting
Information Systems Quality and its Impact on Information Quality Survey on State-Owned Enterprises. IEEE Xplore, Ei Compendex.
2017- Oktober, pp. Page (s): 1989-1993.
19. Meiryani & Lusianah. 2018. The Influence of Business Process on Accounting Information System Quality. Pertanika Journal of Social
Sciences and Humanities. 26, pp. 209-218.
20. Mita, Dian Wiara. 2016. "The Effect of Competence and Independence on Audit Quality with Auditor Ethics as Intervening Variables
in Raihaqi & Partner Public Accountants". Journal of Managerial Accounting. Vol. 1, No. 2. ISSN: 2502-6704.
21. Ningtyas, Arum Widya., And Aris, Muhammad Abdul. 2016. "Independence, Competence, Work Experience, and Due Professional
Care: Its Impact on Audit Quality Moderated by Professional Ethics". Indonesian Financial Accounting Research Journal. Vol. 1, No.
1. ISSN: 2447-2878.
22. Nirmala, Rr Putri Arsika., And Cahyonowati, Nur. 2013. "The Effect of Independence, Experience, Due Professional Care,
Accountability, Audit Complexity, and Time Budget Pressure on Audit Quality (Empirical Study of KAP Auditors in Central Java and
DIY)". Diponegoro Journal of Accounting. Vol. 2, No. 3. ISSN: 2337-3806.
23. Priyambodo, Dwiky. 2015. "The Effect of Competence, Independence, Work Experience and Accountability on Audit Quality with
Auditor Ethics as Moderating Variables". Journal of Managerial Accounting. Vol. 2, No. 3. ISSN: 2502-6704.
24. Sekaran, Uma., And Bougie J. Roger. 2016. "Research Method For Business: A Skill Building Approach". 7th Edition. USA: Jhon
Wiley & Sons.
25. Sitorus, Bonita., Kadir, Natsir, and Usman, Asri. 2017. "Effect of Competence and Independence on Audit Quality with Ethics as
Moderation Variables". Scientific Journal of Economics. Vol. 6, No. 2. Issue 12. ISSN: 2088-6969.
26. Simanjuntak, Piter. 2008. "The Effect of Time Budget Pressure and Risk of Error on Audit Quality Decrease". Undip Accounting and
Auditing Journal. Vol. 1, No. 4. ISSN: 2337-3806.
27. Tuanakotta, Theodorus. M. 2015. "ISA-Based Audit (International Standards on Auditing)". Jakarta: Salemba Empat.
28. Watkins, A.L., Hillison, W. and Morecroft, S.E. 2004, "Quality Audit: A Synthesis of Theory and Empirical Evidence". Journal of
Accounting Literature. Vol. 23, pp. 153-193.
29. Wulandari, Zarra Ulfah. 2017. "Analysis of Factors Affecting Audit Quality". E-Journal of Accounting Muhammadiayah University.
Vol. 7, No. 2. ISSN: 2302-8556.
Authors: Arjun Dubey, Davinder Prakash

Paper Title: Performance Improvement of FSO Communication System using MIMO Technique
Abstract: In proposed simulation model, the effect of different MIMO system has been analyzed on
performance of free space optical (FSO) system concealed by various climatic conditions like clear, haze and
fog. FSO is a free space communication system where space acts as medium between transceivers which
provides a strong and efficient method for transmission and reception of information. The effect of different
weather conditions has been investigated for range of 1 and 2 km at frequency 193.1 GHz. The proposed
MIMO-FSO simulation system has been analyzed for different parameters like Q factor, height of eye, power
received and bit error rate. The designed 4X4 MIMO-FSO system provides better results as compared to the
2X2MIMO and SISO-FSO system.

Keywords: Radio Over Fiber, Differential Phase Shift Keying, Radio Frequency.
597.
References: 3470-
34
1. Y. Kovachev, Ts. Mitsev, Trends in increasing the channel capacity of FSO systems, Annual ICEST Conference, 26-28 June 2013, 72
Ohrid, Macedonia.
2. Bowman, M., Debray, S. K., and Peterson, L. L. 1993. Reasoning about naming systems.
3. Ding, W. and Marchionini, G. 1997 A Study on Video Browsing Strategies. Technical Report. University of Maryland at College Park.
4. Shubham Mahajan, Davinder Prakash, Harjeevan Singh “Performance Analysis of Free Space Optical System Under Different
Weather Conditions”, International Conference on Signal Processing & Integrated Networks, SPIN 2019, IEEE XPLORE DIGITAL
LIBRARY, DOI No.: - 10.1109/SPIN.2019.8711687.
5. K. Singh “A Review Paper On: Optical Fiber Communication” Volume 3, Issue 8, 2017.
6. G.P. Agrawal, Fiber Optics Communication System,Third Edition, by John Wiley & Sons, New York, 2002.
7. Farhana Hossain1, Zeenat Afroze, “Eliminating the Effect of Fog Attenuation on FSO Link by Multiple TX/RX System with
TravellingWave Semiconductor Optical Amplifier,” 2nd International Conference on Advances in Electrical Engineering (ICAEE
2013), 19-21 December, 2013, Dhaka, Bangladesh.
8. Hemani Kaushal, Georges Kaddoum, Virander Kumar Jain, Subrat Kar, “Experimental investigation of optimum beam size for FSO
uplink” Optics communications, Vol. 400, pp. 106– 114, 2017.
Authors: Lan Huong Nguyen, Quang Hung Nguyen

Paper Title: Sluice Safety Reliability Analysis - Application for Baovan Sluice in Vietnam
Abstract: The article summarizes the irrigation works designing methods in Vietnam and other countries.
While in Vietnamirrigation systemdesign method is deterministic and based on safety factors analysis, in other
countries it’s popular with random design and reliability analysis. This is a modern design model and widely
used in many fields in the world. Therefore, in this study, the authors presented how to develop sluice reliability
calculation method under system analysis approach: definition of sluice s, problem tree, reliability functions for
system simulation, calculation of reliability for works and works system, calculate reliability Bao Van sluice in
Thanh Hoa province according to the introduced calculation model and proposie solutions to improve the
reliability of the sluice if repaired or upgraded.

Keywords: sluice, sonfidence function, reliability, destruction mechanism, random variable.

References:

1. Nguyen Van Mao and others, Introductions and deisgn ground of irrigation works, Constructio Press, 2013
2. Nguyễn Chiến and others, Lecture: Works of irrigation system, Natural Sciences and Technology Press, 2012
3. Nguyen Van Mao, Nguyen Huu Bao, Nguyen Lan Huong, Dam safety probability calculation grounds, Construction Press, 2014
4. Pham Hong Cuong, Quang Hung Nguyen. Applying reliability theory to appraise quality of irrigation system in Vietnam. International
Journal of Innovative Technology and Exploring Engineering (IJITEE), Volume-8 Issue-8. 1277-1281. 2019 3473-
598. 5. Probabilistic design and risk assessment of large dams, 1996, J,K Virijling/ M, Hauer/ R,E, Jorissen. 34
6. Nguyen Quang Hung, Nguyen Van Mao . Reliability analysis of revetment using interlocking concrete blocks. Jurnal of water
resources and environmental engineering. Vol 44. 37-42. 2014. 77
7. Lan Huong Nguyen, Quang Hung Nguyen, Application of reliability theory in calculation of safety reservoir. International Journal of
Recent Technology and Engineering (IJRTE) Volume-8,Issue-2, July, 2019.
8. "Основные положения расчета причальных сооружений на надежность," М. В/О “Мортехинформреклама”, РД 31-31-35-85,
1986.
9. General explanation of Bao Van irrigation system in Thanh Hoa province, Consultancy and technology transfer consultancy company
of Water Resources University, 2001.
Authors: S.Padmapriya,N.Partheeban,N.Kamal,A.Suresh,S.Arun

Paper Title: Enhanced Cyber Security for Big Data Challenges


Abstract: In recent years mining of data from social media is attracting more attention due to the explosion in
the growth of Big Data. In security, Big Data deals with collection of huge digital information for analyzing,
visualizing and to draw the insights for the prediction & prevention of cyber attacks. The Big Data mined about
an enterprise from the data cloud, if properly analyzed reveals the private information which is highly risky.
Maintaining the privacy of users of social media is the major challenge with respect to the security issues. As the
data is generally stored in a data cloud, a boundary of trust must be established between the social media users
and the data bank owners. Hence there is requirement of developing an efficient protocol for sharing of data. To
secure the sensitive information of the user, data mining can be used along with an effective algorithm. This
paper proposes the technique of code inline parsing to make the data more secure from the attacks & cyber hacks
along with the SQL injections such that the data on the social media is secured. The proposed method secures
the platform of Big Data which protects the user’s sensitive information.

Keywords: Big Data , Privacy, Information Security, Social Media.

References:
599.
1. G Geethakumari Big Data Analysis for Implementation of Enterprise Data Security , IRACST - International Journal of Computer 3478-
Science and Information Technology & Security (IJCSITS), Vol. 2, No.4, August 2012 34
2. Cloud Security Alliance Big Data for Security Intelligence September 2013 81
3. LEI XU, CHUNXIAO JIANG, (Member, IEEE), JIAN WANG, (Member, IEEE) Information Security in Big Data: Privacy and Data
Mining, Received September 21, 2014, accepted October 4, 2014, date of publication October 9, 2014, date of current version October
20, 2014.
4. Mr. Mohammad Raziuddin & Prof. T.Venkata Ramana Literature Survey in Data Mining with Big Data International Journal of
Advanced Engineering and Global Technology I Vol-03, Issue-04, April 2015.
5. Review Article Big Data: Survey, Technologies, Opportunities, and Challenges , Volume 2014 http://dx.doi.org/10.1155/2014/712826
6. Roger Schell Security A Big Question for Big Data 2013 IEEE International Conference on Big Data.
7. IBM Big Data at the speed of Business, http://www-01.ibm.com/software/data/bigdata/2012.
8. http://bigdataarchitecture.com/
9. http://en.wikipedia.org/wiki/Apache_ Hadoop
10. Big Data is the Future of Healthcare Bill Hamilton cognizant 20-20 insights 2012
11. Sam curry ―big data fuels intelligence –driven security RSA Security brief 2013
12. Big Data for Health Javier Andreu-Perez, Carmen C. Y. Poon, Robert D. Merrifield, Stephen T. C. Wong, and Guang-Zhong Yang,
Fellow, IEEE
13. http://www.datacenterknowledge.com/archives/2016/01/19/nine-main-challenges-big-data-security/
14. Big Data, Black Book: Covers Hadoop 2, MapReduce, Hive, YARN, Pig, R and Data Visualization
15. Big Data A New World of Opportunities, NESSI White Paper, December 2012.
16. Samiddha Mukherjee, Ravi Shaw Big Data Concepts, Applications, Challenges and Future Scope Vol. 5, Issue 2 , February 2016
17. CLOUD SECURITY ALLIANCE Expanded Top Ten Big Data Security and Privacy Challenges, April 2013

600. Authors: Rakesh Kumar Pattanaik, M.Kathirvelu, T.Govinda rao


Paper Title: Design and Development of Smart Medicine Information System
Abstract: Now a day’s people are forgetting to take their medicine due to busy in their work or old age peoples
can’t remember the medicine timings and dosage of medicine. The healthcare services are using intelligent
equipment’s for continuous monitoring of in-house patients. To overcome this situation an intelligent home
based medicine box system with wireless connectivity along with an android application is proposed to help
patients by getting prescribed medicine in time automatically. In the proposed system, manually one can set the
medicine to be taken at different timings through the Android app and it will be transferred to microcontroller
through Bluetooth of Technology. The proposed system will have medicine tray and in build real time clock
which makes an alarm at the set period and controlling mechanism will open the corresponding boxes. The
alarm will be switched off automatically once the medicine is taken from the medicine box. The application
software will provide the voice message in case of patient is disabling in their eyes. The same information is
conveyed to the duty attendees and predefined guardian for necessary action through the Internet of Things.

Keywords: Smart medicine box, MIT aneroid app, HC-05, Rack and pinion, Bluetooth of Technology.

References:

1. Pang Z, Tian J, Chen Q. Intelligent packaging and intelligent medicine box for medication management towards the Internet-of-Things.
In16th International Conference on Advanced Communication Technology 2014 Feb 16 (pp. 352-360). IEEE.
2. Zhibo Pang, Qiang Chen, LirongZheng, "A Pervasive and Preventive Healthcare Solution for Medication Noncompliance and Daily
Monitoring", 2nd Inte. Symp. on Applied Sciences in Biomedical and Communication Technologies (ISABEL 2009), pp1-6, Nov. 3482-
2009.
3. JieGao, Zhibo Pang, Qiang Chen, LirongZheng, “'Interactive Packaging Solutions Based on RFID Technology and Controlled 34
DelaminationMaterial”, IEEE Inte.l Conf. on RFID, pp158-165, Apr 2010. 86
4. Zhibo Pang, LirongZheng, JunzheTian, Sharon Kao-Walter, Elena Dubrova ,Qiang Chen. “Design of a Terminal Solution for
Integration of In-home Healthcare Devices and Services towards the Internet-of-Things”, Enterprise Information Systems,
DOI:10.1080/17517575.2013.776118, April 2013.
5. Zhibo Pang, Qiang Chen; JunzheTian, LirongZheng, Elena Dubrova.“Ecosystem Analysis in the Design of Open Platform-based In-
Home Healthcare Terminals towards the Internet-of-Things”. International Conference on Advanced Communications Technology
(ICACT). Jan 2013, Pyeongchang, Korea.
6. Zhibo Pang, Qiang Chen; LirongZheng, Elena Dubrova. “An In-home Medication Management Solution Based on Intelligent
Packaging andUbiquitousSensing”. International Conference on AdvancedCommunications Technology (ICACT). Jan 2013,
Pyeongchang, Korea.
7. iPack VINN Excellence Center, (2010). A General Presentation on Ubiquitous Intelligence in Paper and Packaging. [on-line]
http://www.kth.se/ipack [accessed Dec 1, 2012]
8. JieGao, Zhibo Pang, Qiang Chen, LirongZheng, “'Interactive Packaging Solutions Based on RFID Technology and Controlled
Delamination
Material”, IEEE Inte.l Conf. on RFID, pp158-165, Apr 2010.
9. Antoun W, Abdo A, Al-Yaman S, Kassem A, Hamad M, El-Moucary C. Smart Medicine Dispenser (SMD). In2018 IEEE 4th Middle
East Conference on Biomedical Engineering (MECBME) 2018 Mar 28 (pp. 20-23). IEEE.
10. Yang, G., Xie, L., Mantysalo, M., Zhou, X., Pang, Z., Xu, L. D., … Zheng, L.-R. (2014). A Health-IoT Platform Based on the
Integration of Intelligent Packaging, Unobtrusive Bio-Sensor, and Intelligent Medicine Box. IEEE Transactions on Industrial
Informatics, 10(4), 2180–2191.doi:10.1109/tii.2014.2307795
11. Ullah K, Shah MA, Zhang S. Effective ways to use Internet of Things in the field of medical and smart health care. In2016
International Conference on Intelligent Systems Engineering (ICISE) 2016 Jan 15 (pp. 372-379). IEEE.
12. Mohamed AG, DilipG, Devi NR, Anusuya S. INTELLIGENT HEALTHCARE SYSTEM USING INTERNET OF THINGS.
International Journal of Pure and Applied Mathematics. 2017;115 (8):347-52.

Authors: Nur Diana Madinah Ab Hadi, Azlan Ismail, Nur Syazleen Rosli, Suzana Zambri

Paper Title: Converting from Service Level Agreement to Probabilistic Temporal Logic Specification
Abstract: The need for conversion method exists due to the limitation of manual conversion at design time
whenever the interested party must perform some assessments using an existing model checker tool. Manual
conversion of the related requirements into the respective specification language is time-consuming especially
when the person has limited knowledge and need to do the task repetitively with a different set of Service Level
Agreement (SLA) configurations. This paper aims to address the need to automatically capture non-functional
requirements specified in the SLA, namely, Service Level Objectives (SLO) and converting them into a specific
probabilistic temporal logic specification. We tackle this problem by proposing a conversion method that utilizes
a rule-based and template-based approach. The conversion method automatically extracts the required
information in SLA based on certain rules and uses the extracted information to replace the elements in the
601. prepared template. We focus on WS-Agreement language for SLA and probabilistic alternating-time temporal
logic with rewards specification (rPATL) for the properties specification used in PRISM-games model checker 3487-
tool. We then implement an initial proof-of concept of a conversion method to illustrate the applicability of 34
translating between targeted specifications. 93

Keywords: Software Conversion, Service Level Agreement, Probabilistic Temporal Logic, Quality of Service.

References:

1. Pichot A, Wieder P, Waldrich O, et al. Dynamic SLA-negotiation based on WS-Agreement; 2007. Technical Report TR-0082.
Available from: http://www.coregrid.net/mambo/images/stories/TechnicalReports/tr-0082.pdf.
2. Mayer P, Velasco J, Klarl A, et al. The Autonomic Cloud. In: Wirsing M, H¨olzl M, Koch N, et al., editors. Software engineering for
collective autonomic systems: The ascens approach. Cham: Springer International Publishing; 2015. p. 495–512. Available from:
http://dx.doi.org/10.1007/978-3-319-16310-916.
3. Garc´ıa Garc´ıa A, Blanquer Espert I, Hern´andez Garc´ıa V. SLA-driven dynamic cloud resource management. Future Generation
Computer Systems. 2014;31(1):1–11.
4. Calinescu R, Autili M, C´amara J, et al. Synthesis and Verification of Self-aware Comput¬ing Systems. In: Self-aware computing
systems. Cham: Springer International Publishing; 2017. p. 337–373. Available from: http://link.springer.com/10.1007/978-3-319-
47474-811.
5. Kwiatkowska M, Norman G, Parker D. PRISM 4.0: Verification of Probabilistic Real-Time Systems. (Lecture Notes in Computer
Science; Vol. 6806); 1. Springer; 2011. p. 585–591. Available from: http://dx.doi.org/10.1007/978-3-642-22110-147.
6. Andrieux A, Czajkowski K, Dan A, et al. Web services agreement specification (WS-Agreement). Vol. 128; 2007. p. 216.
7. Chen T, Forejt V, Kwiatkowska M, et al. Automatic verification of competitive stochastic systems. Formal Methods in System Design.
2013 8;43(1):61–92. Available from: http://dx.doi.org/10.1007/978-3-642-28756-522 http : //dx.doi.org/10.1007/s10703 − 013 − 0183
− 7.
8. Kwiatkowska M, Parker D, Wiltsche C. PRISM-games 2.0: A Tool for Multi-Objective Strategy Synthesis for Stochastic Games. In:
TACAS; 2016. Available from: http://www.prismmodelchecker.org/papers/tacas16pg2.pdf.
9. Mell P, Grance T. The NIST Definition of Cloud Computing. National Institute of Standards and Technology; 2009. Available from:
https://citadel-information.com/wp¬content/uploads/2012/08/NIST-SP800-145-definition-of-cloud-computing.pdf.
10. H¨ofer C, Karagiannis G. Cloud computing services: taxonomy and comparison. Journal of Internet Services and Applications.
2011;:1–14Available from: http://dx.doi.org/10.1007/s13174-011-0027-x.
11. Lamanna DD, Skene J, Emmerich W. SLAng: a language for defining service level agreements. In: Distributed Computing Systems,
2003. FTDCS 2003. Proceedings. The Ninth IEEE Workshop on Future Trends of; 2003. p. 100–106.
12. Keller A, Ludwig H. The WSLA Framework: Specifying and Monitoring Service Level Agreements for Web Services. Journal of
Network and Systems Management. 2003; 11(1):57–81. Available from: http://link.springer.com/10.1023/A:1022445108617.
13. Theilmann W, Yahyapour R. SLA@SOI -SLAs Empowering a Dependable Service Economy; 2010. Available from: https://ercim-
news.ercim.eu/en83/special/slasoi-slas¬empowering-a-dependable-service-economy.
14. Patel P, Ranabahu A, Sheth A. Service Level Agreement in Cloud Computing; 2009.
15. Serrano D, Bouchenak S, Kouki Y, et al. SLA guarantees for cloud services. Future Generation Computer Systems. 2016;54:233–246.
Available from: http://www.sciencedirect.com/science/article/pii/S0167739X15000801.
16. Metsch T, Edmonds A. Open cloud computing interface-infrastructure; 2011. Available from:
https://redmine.ogf.org/attachments/220/infrastructure.pdf.
17. Bohn RB, Messina J, Liu F, et al. NIST Cloud Computing Reference Architecture. In: 2011 IEEE World Congress on Services; 7.
IEEE; 2011. p. 594–596. Available from: http://ieeexplore.ieee.org/document/6012797/.
18. Buyya R, Calheiros R, Li X. Autonomic cloud computing: Open challenges and architectural elements. Emerging Applications of.
2012; Available from: http://ieeexplore.ieee.org/xpls/absall.jsp?arnumber = 6407847.
19. WSAG4J -WS-Agreement for Java; ???? Available from: http://wsag4j.sourceforge.net/site/index.html.
20. Jamshidi P, Pahl C, Mendonca NC. Managing Uncertainty in Autonomic Cloud Elasticity Controllers. IEEE Cloud Computing. 2016
5;3(3):50–60. Available from: http://ieeexplore.ieee.org/document/7503491/.
21. Kephart JO, Chess DM. The vision of autonomic computing. Computer. 2003;36(1):41– 50.
22. Kwiatkowska M. Quantitative verification: models techniques and tools. In: Proceedings of the the 6th joint meeting of the European
software engineering conference and the ACM SIGSOFT symposium on the foundations of software engineering -ESEC¬FSE ’07; 9;
New York, New York, USA. ACM Press; 2007. p. 449. Available from: http://dl.acm.org/citation.cfm?id=1287624.1287688.
23. Calinescu R, Ghezzi C, Kwiatkowska M, et al. Self-adaptive software needs quantitative verification at runtime. Communications of
the ACM. 2012;55(9):69–77.
24. Chen T, Forejt V, Kwiatkowska M, et al. PRISM-games: A model checker for stochastic multi-player games. Springer; 2013. p. 185–
191.
25. Mayer P, Klarl A, Hennicker R, et al. The Autonomic Cloud: A Vision of Voluntary, Peer-2-Peer Cloud Computing. In: 2013 IEEE 7th
International Conference on Self-Adaptation and Self-Organizing Systems Workshops; 9. IEEE; 2013. p. 89–94. Available from:
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6803264.
26. Celestini A, Lluch Lafuente A, Mayer P, et al. Reputation-Based Cooperation in the Clouds. In: Zhou J, Gal-Oz N, Zhang J, et al.,
editors. Trust management viii: 8th ifip wg 11.11 international conference, ifiptm 2014, singapore, july 7-10, 2014. proceedings. Berlin,
Heidelberg: Springer Berlin Heidelberg; 2014. p. 213–220. Available from: http://dx.doi.org/10.1007/978-3-662-43813-815.
27. Ludwig H. Web Service Level Agreement (WSLA) Language Specification Foundations of SLA Management for services and utility
computing View project Zenith View project; 2003.
28. Frankova G, Malfatti D, Aiello M. Semantics and Extensions of WS-Agreement. Journal of Software. 2006 7;1(1).
29. Dan AA, Ludwig H, Rofrano J. WS-Agreement Structure. 2004;(January).
30. Chen T, Forejt V, Kwiatkowska M, et al. On Stochastic Games with Multi¬ple Objectives. Springer, Berlin, Heidelberg; 2013. p. 266–
277. Available from: http://link.springer.com/10.1007/978-3-642-40313-225.
31. Ismail A, Kwiatkowska M. Synthesizing Pareto Optimal Decision for Autonomic Clouds Using Stochastic Games Model Checking. In:
2017 24th Asia-Pacific Software Engineering Conference (APSEC); 12. IEEE; 2017. p. 436–445. Available from:
http://ieeexplore.ieee.org/document/8305966/.
32. PRISM-games -Property Specification; Available from: https://www.prismmodelchecker.org/games/properties.php.
33. Baresi L, Morzenti A, Motta A, et al. From Interaction Overview Diagrams to Temporal Logic. Springer, Berlin, Heidelberg; 2011. p.
90–104. Available from: http://link.springer.com/10.1007/978-3-642-21210-99.
34. Baresi L, Morzenti A, Motta A, et al. A logic-based semantics for the verification of multi-diagram UML models. ACM SIGSOFT
Software Engineering Notes. 2012 7;37(4):1. Available from: http://dl.acm.org/citation.cfm?doid=2237796.2237811.
35. Ciapessoni E, Mirandola P, Coen-Porisini A, et al. From formal models to formally based methods: an industrial experience. ACM
Transactions on Software Engineering and Methodology. 1999 1;8(1):79–113. Available from:
http://portal.acm.org/citation.cfm?doid=295558.295566.
36. Pradella M, Morzenti A, San Pietro P. The symmetry of the past and of the future. In: Proceedings of the the 6th joint meeting of the
European software engineering conference and the ACM SIGSOFT symposium on the foundations of software engineering ¬ESEC-
FSE ’07; New York, New York, USA. ACM Press; 2007. p. 312. Available from:
http://portal.acm.org/citation.cfm?doid=1287624.1287669.
37. Meziani L, Bouabana-Tebibel T, Bouzar-Benlabiod L. From Petri Nets to UML Model: A New Transformation Approach. In: 2018
IEEE International Conference on Information Reuse and Integration (IRI); 7. IEEE; 2018. p. 503–510. Available from:
https://ieeexplore.ieee.org/document/8424751/.
38. Westergaard M. CPN Tools 4: Multi-formalism and Extensibility. Springer, Berlin, Heidelberg; 2013. p. 400–409. Available from:
http://link.springer.com/10.1007/978-3-642¬38697-822.
39. Gallotti S, Ghezzi C, Mirandola R, et al. Quality prediction of service compositions through probabilistic model checking. Springer;
2008. p. 119–134.
40. Baier C, Katoen J, Larsen K. Principles of model checking. ; 2008. Available from:
https://books.google.com.my/books?hl=enlr=id=5dvxCwAAQBAJoi=fndpg=PR13dq=+Principles+of+model+c
41. Krotsiani M, Spanoudakis CK, George. Validation of Service Level Agreements Using Probabilistic Model Checking. In: 2017 IEEE
International Conference on Services Computing (SCC); 6. IEEE; 2017. p. 148–155. Available from:
http://ieeexplore.ieee.org/document/8034979/.

Authors: L.Gowri, K.R.Manjula


602.
Paper Title: Evaluation of Various Vegetation Indices for Multispectral Satellite Images
Abstract: Vegetation indices play a predominant role in the field of Remote processing systems which
assimilate vital multispectral images. The digital numbers identify the spectral information in one or more
spectral bands. It focuses mainly on two or more spectral regions and obtains different types of surfaces like
vegetation, built-up, bare soil and water area. Different types of vegetation can be studied and analyzed using
LANDSAT images. In this paper, comparison has been made on ten major vegetation indices such as RVI, DVI,
NDVI, TNDVI, NDWI, MNDWI, NDBI, UI, SAVI, and NDMI using different spectral bands and different
features are detected and extracted with the help of ArcGIS and MATLAB tools. This study reveals better
classification accuracy.

Keywords: NDVI, NDBI, Landsat5, SAVI, UI.

References:

1. Chouhan R, Rao N. Vegetation detection in multispectral remote sensing images: Protective role-analysis of vegetation in 2004 indian 3494-
ocean tsunami. PDPM Indian Institute of Information Technology. 2011.
2. Gao BC. Normalized difference water index for remote sensing of vegetation liquid water from space. InImaging Spectrometry 1995
35
Jun 12 (Vol. 2480, pp. 225-237). International Society for Optics and Photonics. 00
3. Zha Y, Gao J, Ni S. Use of normalized difference built-up index in automatically mapping urban areas from TM imagery. International
journal of remote sensing. 2003 Jan 1;24(3):583-94.
4. Payero JO, Neale CM, Wright JL. Comparison of eleven vegetation indices for estimating plant height of alfalfa and grass. Applied
Engineering in Agriculture. 2004;20(3):385.
5. Barati S, Rayegani B, Saati M, Sharifi A, Nasri M. Comparison the accuracies of different spectral indices for estimation of vegetation
cover fraction in sparse vegetated areas. The Egyptian Journal of Remote Sensing and Space Science. 2011 Jun 1;14(1):49-56.
6. Jin Y, Yang X, Qiu J, Li J, Gao T, Wu Q, Zhao F, Ma H, Yu H, Xu B. Remote sensing-based biomass estimation and its spatio-
temporal variations in temperate grassland, Northern China. Remote Sensing. 2014 Feb 19;6(2):1496-513.
7. As-Syakur AR, Adnyana I, Arthana IW, Nuarsa IW. Enhanced built-up and bareness index (EBBI) for mapping built-up and bare land
in an urban area. Remote Sensing. 2012 Oct 2;4(10):2957-70
8. Chander G, Markham B. Revised Landsat-5 TM radiometric calibration procedures and postcalibration dynamic ranges. IEEE
Transactions on geoscience and remote sensing. 2003 Nov;41(11):2674-7.
9. Barsi JA, Barker JL, Schott JR. An atmospheric correction parameter calculator for a single thermal band earth-sensing instrument.
InGeoscience and Remote Sensing Symposium, 2003. IGARSS'03. Proceedings. 2003 IEEE International 2003 (Vol. 5, pp. 3014-
3016). IEEE.
10. https://www.usgs.com.

Authors: Alvin Alexander, Seng Hansun

Paper Title: UMN Site Traffic Prediction using Technical Method


Abstract: The Marketing division of Universitas Multimedia Nusantara has a role in attracting prospective
students to join and continue their next level of education. To help their task, the Marketing division needs an
application that can predict the site traffic profile visits for the next following day. Therefore, a website-based
application was created to assist the Marketing division. We used the Weighted Moving Average algorithm to
calculate the number of subsequent visitors and its future prediction number. We also used the Weighted Mean
Absolute Percentage Error after getting the prediction results to get the error rate of a prediction made. In the
implementation process that has been done, the percentage error is 2.57%. The built application also had been
evaluated by the UMN Marketing division employees by the means of questionnaires to find out how satisfied
the application was.

Keywords: Marketing, Universitas Multimedia Nusantara, Weighted Moving Average, Weighted Mean
Absolute Percentage Error.

References:
603.
3501-
1. UMN, “Beranda.” [Online]. Available: http://www.umn.ac.id/. 35
2. Semrush, “About Us.” [Online]. Available: https://www.semrush.com/.
3. G. M. Armstrong, P. Kotler, M. J. Harker, and R. Brennan, Marketing: An Introduction. UK: Pearson, 2018.
04
4. F. Nhita, “IMPLEMENTASI ALGORITMA WEIGHTED MOVING AVERAGE PADA (FUZZY EAs) UNTUK PERAMALAN
KALENDER MASA TANAM BERBASIS CURAH HUJAN,” Indones. J. Comput., vol. 1, no. 1, Mar. 2016.
5. F. Costantino, G. Di Gravio, and F. Nonino, “Project selection in project portfolio management: An artificial neural network model
based on critical success factors,” Int. J. Proj. Manag., vol. 33, no. 8, pp. 1744–1754, Nov. 2015.
6. T. Wilson, “Short-term forecast error of Australian local government area population projections,” Australas. J. Reg. Stud., vol. 21, no.
2, pp. 253–275, 2015.
7. R. Munap, S. N. B. Ahmad, S. A. Hamid, and M. F. B. M. Talib Beg, “The Influence of End User Computing System (EUCS) on User
Satisfaction: The Case of a Logistic and Courier Service Company,” Int. J. Soc. Sci. Humanit. Invent., vol. 5, no. 12, pp. 5103–5110,
Dec. 2018.
8. E. Domínguez-Escrig, F. F. M. Broch, R. Lapiedra, and R. Chiva, “Promoting radical innovation through end-user computing
satisfaction,” Ind. Manag. Data Syst., vol. 118, no. 8, pp. 1629–1646, Sep. 2018.
9. S. Hansun, M. B. Kristanda, and P. M. Winarno, “Big 5 ASEAN capital markets forecasting using WEMA method,” TELKOMNIKA
(Telecommunication Comput. Electron. Control., vol. 17, no. 1, p. 314, Feb. 2019.
10. S. Hansun and S. Subanar, “Brown’s Weighted Exponential Moving Average Implementation in Forex Forecasting,” TELKOMNIKA
(Telecommunication Comput. Electron. Control., vol. 15, no. 3, p. 1425, Sep. 2017.
11 S. Hansun and S. Subanar, “H-WEMA: A New Approach of DoubleExponential Smoothing Method,” TELKOMNIKA
(Telecommunication Comput. Electron. Control., vol. 14, no. 2, p. 772, Jun. 2016.

Authors: S. S. Thakare, S. N. Kale


604. Paper Title: Document Image Compression using DC-DWT
Abstract: Scanned Document Image compression is an important technology for digital image transmission 3505-
and storage. This study proposes a unique image compression system based on discrete curvelet transform & 35
discrete wavelet Transform (DC-DWT) with a varying pixels position. The discrete wavelet and the Curvelet 09
transform technique, which because of their outcomes and characteristics, DWT and CT are the most suitable
technology for the varied field of image processing. The position of a pixel in the document images and the
high-impact components are handled using the curve let transform technique during the compression of the
JPEG image. The Cuckoo search algorithm is used for image enhancement. Depending on two primary criteria
checks, excellent outcomes were achieved; the compression ratio and the quality of recreated scan document.

Keywords: Compression, Image Compression, Cuckoo Search Algorithm, Curvelet Transform, DCT, DWT,
Wavelet Transform.

References:

1. M. Mozammel Hoque Chowdhury and Amina Khatun, " Image Compression Using Discrete Wavelet Transform", IJCSI International
Journal of Computer Science Issues, 2012.
2. Salma Taou_q, " Image Compression Using Discrete Wavelet Transforms", al akhawayn university, spring 2016.
3. Anitha s, " Image Compression Using Discrete Cosine Transform & Discrete Wavelet Transform", International Journal of Scientific
& Engineering Research Volume 2, Issue 8, August-2011.
4. M.Shobana1 and R Poomurugan2, " An improved image compression using curvelet transform in iris images for authentication",
International Journal of Modern Trends in Engineering and Research (IJMTER) , 2016.
5. Sree Lekshmi A.N., Lekshmi Priya A.N., "Curvelet Based Image Compression", International Journal of Computer Science and
Information Technologies, 2017.
6. Chandresh K Parmar, Prof. Kruti Pancholi, "Image Compression Based On Curvelet Transform", International Journal of Engineering
Research & Technology, 2013.
7. Awais Mansoor, AtifBin Mansoor, "On image compression using digital curvelet transform", Center for Advanced Studies in
Engineering (CASE).
8. Ezhilarasi .P, Nirmalkumar.P, "A Combined Approach for Lossless Image Compression Technique using Curvelet Transform",
International Journal of Engineering and Technology, 2014.
9. Rohit Salgotra, Urvinder Singh , Sriparna Saha , " New cuckoo search algorithms with enhanced exploration and exploitation
properties", Expert Systems With Applications , 2018.
10. Soham Ghosh, Sourya Roy, Utkarsh Kumar, and Arijit Mallick, "Gray Level Image Enhancement Using Cuckoo Search Algorithm",
Springer International Publishing Switzerland , 2014.

Authors: Swati Kandoria, Garima Saini

Paper Title: Broadband Stacked Antenna Design with Hybrid Structure for C-band Communication
Abstract: Two low profile antennas using FR4 and Rogers RT/duroid 5880 as dielectric materials are proposed
in this manuscript. To obtain the broadband response the strip-slot hybrid structure is introduced. The two
antennas proposed in this manuscript consist of four strips that are segregated through three narrow tapered slots.
Using the aperture couple microstrip feed line proper impedance matching is obtained and the slotted patch
structure is excited. The simulated bandwidth of 45% is obtained by using the Rogers RT/duroid 5880 as
dielectric material with stacked patch structure and gain obtained to be 9.02dB resonating at 4.2GHz of
frequency. Proposed design using FR4 as the dielectric material has two resonance frequencies at 4.8GHz and
6.2GHz. The simulated bandwidth of 50% at 4.8GHz and 38.71% at 6.2GHz is obtained with gain of 6.040dB at
4.8GHz. A prototype of the same antenna using the FR4 as dielectric material is also constructed and tested, the
tested results shows an impedance bandwidth of 21.87%

Keywords: Antenna feed; Broadband antennas; C Band; microstrip antennas; stacked.

References:

605. 1. Constantine A. Balanis, “Antenna Theory: Analysis and Design”, Third Edition, John Wiley & Sons, pp. 1-70,283-365, 811-820, 865-
869, 2016. 3510-
2. A.A. Deshmukh, D. Singh, P. Zaveria, M. Galaa and K. P. Ray, “ Broadband Slot cut Rectangular Microstrip Antenna”, IEEE 6th 36
International Conference On Advances In Computing & Communications, pp. 53-59, 2016. 16
3. M. S. Ellis, Z. Zhao, J. Wu, X. Ding, Z. Nie, and Qing-Huo Liu, “A Novel Simple and Compact Microstrip-Fed Circularly Polarized
Wide Slot Antenna With Wide Axial Ratio Bandwidth for C-Band Applications”, IEEE Transactions on Antennas and Propagation,
Vol. 64, No. 4, pp. 1532-1555, 2016.
4. MD. M. Hasan, M. R.I. Faruque, and M. Tariqul Islam, “A Mirror Shape Chiral Meta Atom for C-Band Communication”, IEEE
Access, Vol. 5, pp. 21217-21222, 2017.
5. D. Cheng, J. Wang, Y. Wei, C.Y. Jin, K. Cui, M. Li, “Design of dual-band and high gain waveguide slot antenna”, International
Journal of Electronics and Communications ,pp. 208–212, 2019.
6. P. Chaurasia, B. K. Kanaujia, S. Dwari, M.K. Khandelwal, “Design and analysis of seven-bands-slot-antenna with small frequency
Ratio for different wireless applications”, International Journal of Electronics and Communications, pp. 100-109, 2019.
7. A. Kumar, S. Raghavan, “Design of a broadband planar cavity-backed circular patch antenna” International Journal of Electronics and
Communications, Vol. 82, pp. 413–419, 2017
8. A.A. Deshmukha, Shefali Pawar, Amita Mhatre and Vivek Chaudhary, “Design of Compact F-shape Microstrip Antenna for Dual
Polarized Broadband Response”, 8th International Conference on Advances in Computing and Communication, Vol. 143, pp. 80-86,
2018.
9. C.W. Hsiao and W. Chen, “Broadband Dual-Polarized Base Station Antenna for LTE/5G C-band Applications”, 2018 Cross Strait
Quad-Regional Radio Science and Wireless Technology Conference (CSQRWC), 2018
10. S. Kumar, T. Bhandari, “A Hexagonal Broadband Compact Microstrip Monopole Antenna for C Band, X Band and Ku Band
Applications”, International Conference on Computing, Communication and Automation, pp. 1532-1536, 2017.
11. M. Abdelwahab, A. Gomaa, M. Mohana and M. Hindy, “A Simple design of Broadband rectangular Microstrip patch antennas with
improved performance”, International Journal of Science, Engineering and Technology Research, Vol. 6, Issue 6, pp. 958-969, 2017.
12. 12.Ullah and S. Koziel, “A Broadband Circularly Polarized Wide-Slot Antenna with a Miniaturized Footprint”, IEEE Antennas and
Wireless Propagation Letters, Vol. 17, No. 12, pp. 2454-2458, 2018.
13. M.M. Ali, M. Tarikul Islam, M. Samsuzzaman, M.T. Islam, “Rectangular with Half Circle Cut-out Microstrip Patch Antenna for C-
Band Applications”, IEEE 4th International Conference on Advances in Electrical Engineering, pp. 90-93, 2017.
14. W. Li, Z. Zeng, Baiqiang, Longfang Ye, Yanhui Liu, and Qing Huo Liu, Fellow, IEEE, “Compact Dual-Polarized Printed Slot
Antenna”, IEEE Antennas and Wireless Propagation Letters, pp. 2816-1819, Vol. 16, 2017
15. 15.A. Kandwal, J.V. Chauhan , B. Luadang, “Coupled C-band stacked antenna using different dielectric constant substrates for
communication systems”, ELSEVIER International Journal of Engineering Science and Technology, Vol.19, pp. 1801–1807, 2016.
16. 16. W. Sun, Yue Li, Z. Zhang, and Z. Feng, “Broadband and Low-Profile Microstrip Antenna Using Strip-Slot Hybrid Structure”,
IEEE Antennas and Wireless Propagation Letters, Vol. 16, pp. 3118-3121, 2017.
17. 17.A. Anand , P. Suraj, “Design of a Stacked Microstrip Patch Antenna for X band Communication” 4th IEEE International
Conference on Recent Advances in Information Technology, 2018.
18. 18. L. Minz, R. Shahid Aziz, M. Tayyab Azim, S. Park, “Wideband Aperture-Coupled Stack-Patch Antenna Design with
Characteristic Mode Analysis,” IEEE International Conference on Consumer Electronics-Asia, 2018.
19. 19. K. Ravi, P. Yadav, “Designing of Microstrip Patch Antenna by Using via Hole for Bandwidth Enhancement in C and X Band
Application” IEEE Second International Conference on Intelligent Computing and Control Systems (ICICCS), pp. 388-393, 2018.
20. 20.P. Kumar, G. Saini, “Gain Enhancement of Modify 2x2 MIMO Antenna Using Superstrate Layer”, International Journal for
Scientific Research & Development, Vol. 5, No. 02, pp. 2039-2041, 2017.
Authors: MB Bramarambika, Seshashayee

Paper Title: Brain Tumor Detection and Identification Using Histogram Method
Abstract: Brain tumor is a collection of unwanted cells that grow abnormally in different parts of human brain.
Detection of this is done effectively by MR image scanning of human brain. Certain process can be carried out
to partition the input MR images into the regions. To convert these regions into coherent segments is done by
Histogram Method which can utilize peaks and valleys to analyze the regions into segment of the MR images.
This process can be done by program division method to detect the tumor in the earlier stages .This work aims at
it.

Keywords: Brain tumor, Histogram and Segmentation.

References:

1. AlAzawee, WarqaaShaher. "Computer Aided Brain Tumor Edge Extraction Using Morphological Operations." (2015).
2. Carl Sherman and et al. ," The Dana Alliance for Brain Initiatives ." (2015).
3. Kandewal, Roan, and Ashok Kumar. "An Automated System for Brain Tumor Detection and Segmentation." International Journal of
Advanced Research in Computer Science and Software Engineering 4.3 (2014): 97-100.
606. 4. Wang, Ping, et al. "Long non-coding RNA CASC2 suppresses malignancy in human gliomas by miR-21." Cellular signalling 27.2
(2015): 275-282. 3517-
5. Langbecker, Danette, and Patsy Yates. "Primary brain tumor patients’ supportive care needs and multidisciplinary rehabilitation, 35
community and psychosocial support services: awareness, referral and utilization." Journal of neuro-oncology 127.1 (2016): 91-102.
6. Huang, Li-Kuo, et al. "Simultaneous head and facial computed tomography scans for assessing facial fractures in patients with
21
traumatic brain injury." Injury (2017).
7. Ms. Sangeetha C and Ms. Shahin A," Brain Tumor segmentation using Artificial neural network." International Research Journal of
Engineering and Technology (IRJET) 2.4 (2015):
8. Malathi, R., and N. Kamal. " Brain Tumor Detection and Identification Using K-Means Clustering Technique." Proceedings of the
UGC Sponsored National Conference on Advanced Networking and Applications. 2015.
9. Geng, Dianzhong, et al. "Medulloblastoma with soft‑tissue and skeletal metastases in an adult: A case report." Oncology letters 10.4
(2015): 2295-2298.
10. Bhujbal, Swapnil V., Paul de Vos, and Simone P. Niclou. "Drug and cell encapsulation: alternative delivery options for the treatment
of malignant brain tumors." Advanced drug delivery reviews 67 (2014): 142-153.
11. Zhang, Yudong, et al. "A multilayer perceptron based smart pathological brain detection system by fractional Fourier entropy." Journal
of medical systems 40.7 (2016): 173.
12. Zhang, Yu-Dong, et al. "Pathological brain detection in MRI scanning by wavelet packet Tsallis entropy and fuzzy support vector
machine." SpringerPlus 4.1 (2015): 716.
13. Kanade, PranitaBalaji, and P. P. Gumaste. "Brain tumor detection using MRI images." Brain 3.2 (2015).
14. Simran Arora and Gurjit Singh, "A Study of Brain Tumor Detection Techniques." International Journal of Advanced Research in
Computer Science and Software Engineering 5.5 (2015).
15. Amanpreetkaur and Navjotkau, " Image Segmentation Techniques." International Research Journal of Engineering and Technology
(IRJET) 2.2 (2015).

Authors: R. Raja Kumar, G. Kishor Kumar, M.K. Koushik, M. Chennakesavulu

Paper Title: A Deep Learning Neural Network for Detecting the Diabetic Retinopathy
Abstract: Diabetic Retinopathy (DR) is the leading cause of disease to blindness of people globally. The retinal
screening examinations of diabetic patients is needed to prevent the disease. There are many untreated and
undiagnosed cases present in especially in India. DR requires smart technique to detect it. In this paper, we
proposed a deep learning based architecture for detecting the DR. The experiments are done on the DR Dataset
available in UCI machine Learning Repository. The results obtained from the experiments are satisfactory.
607.
3522-
Keywords: Diabetic Retinopathy, Deep Learning, Neural Network, UCI.
35
25
References:

1. Gargeya, R. and Leng, T., 2017. Automated identification of diabetic retinopathy using deep learning. Ophthalmology, 124(7),
pp.962-969.
2. Sellahewa L, Simpson C, Maharajan P, et al. Grader agreement, and sensitivity and specificity of digital photography in a community
optometry-based diabetic eye screening program. Clin Ophthalmol. 2014;8:1345-1349
3. Ting, Daniel Shu Wei, et al. "Development and validation of a deep learning system for diabetic retinopathy and related eye diseases
using retinal images from multiethnic populations with diabetes." Jama 318.22 (2017): 2211-2223.
4. Roychowdhury, Sohini, Dara D. Koozekanani, and Keshab K. Parhi. "DREAM: diabetic retinopathy analysis using machine
learning." IEEE journal of biomedical and health informatics18.5 (2014): 1717-1728.
5. Sinthanayothin, Chanjira, et al. "Automated detection of diabetic retinopathy on digital fundus images." Diabetic medicine 19.2
(2002): 105-112.
6. Niemeijer, Meindert, et al. "Automated detection and differentiation of drusen, exudates, and cotton-wool spots in digital color fundus
photographs for diabetic retinopathy diagnosis." Investigative ophthalmology & visual science 48.5 (2007): 2260-2267.
7. Krause, Jonathan, et al. "Grader variability and the importance of reference standards for evaluating machine learning models for
diabetic retinopathy." Ophthalmology 125.8 (2018): 1264-1272.
8. Yang, Yehui, et al. "Lesion detection and grading of diabetic retinopathy via two-stages deep convolutional neural
networks." International Conference on Medical Image Computing and Computer-Assisted Intervention. Springer, Cham, 2017.
9. 9. Lichman, Moshe. "UCI machine learning repository." (2013).
Authors: N. Adithya Valli, D. Elizabath Rani, C. Kavitha

Paper Title: Convolutional Windows for Side Lobe Reduction


Abstract: A lot of applications in radar systems necessitate low range side-lobe performance which is achieved
by pulse compression processing. Linear Frequency Modulation (LFM) signal is mainly used chirp signal for
this processing. The paramount drawback in LFM is the first side-lobe level of -13dB at the receiver side. In this
paper, LFM signal is modified by using simple two-stage piece wise linear frequency modulation (PWLFM)
functions. The autocorrelation function of this PWLFM signal exhibited low peak sidelobe level ratio (PSLR)
value compared to its counterpart LFM signal. An attempt is made to further reduce the side lobe values by
using novel Convolutional windows. The simulation results confirm a significant side lobe reduction by the
LFM signal designed using PWLFM functions when a more flexible Power of Cosine window function is
applied compared to all other window functions.

Keywords: Convolution windows, LFM, PSLR, PWLFM.

References:
608.
1. N. Van Khanh and M. D. E. Turley, "A Range Sidelobe Suppression Technique Based on Adaptive Spectral Shaping for LFM 3526-
Waveforms," 2018 International Conference on Radar (RADAR), Brisbane, QLD, 2018, pp.1-6. doi: 10.1109/RADAR.2018.8557251 35
2. J. Saeedi and K. Faez, “Synthetic aperture radar imaging using nonlinear frequency modulation signal,” IEEE Trans. Aerosp. Electron. 29
Syst., vol. 52, no. 1, pp. 99–110, Feb. 2016.
3. I. Vizitiu, L. Anton, F. Popescu and G. Iubu, "The synthesis of some NLFM laws using the stationary phase principle," 2012 10th
International Symposium on Electronics and Telecommunications, Timisoara, 2012, pp. 377-380.
4. N. Adithya valli, D. Elizabath Rani, “Modified PWNLFM Signal for Side-Lobe Reduction”. International Journal of Engineering &
Technology, v.7, n.4.20, p.4-7, Nov.2018. Doi: http://dx.doi.org/10.14419/ijet.v7i4.20.22110.
5. R. Ghavamirad and M. A. Sebt, “Sidelobe level reduction in ACF of NLFM waveform,” IET Radar, Sonar Navigator., vol. 13, no. 1,
pp. 74–80, Sep. 2018.
6. R. Ghavamirad, M. A. Sebt, and H. Babashah, “Phase improvement algorithm for NLFM waveform design to reduction of sidelobe
level in autocorrelation function,” Electron. Lett. vol. 54, no. 18, pp. 1091–1093, 2018.
7. A. W. Doerry, “Generating nonlinear FM chirp waveforms for radar,” Sandia Nat. Laboratories, Albuquerque, NM, USA, Sandia Rep.
SAND2006-5856, 2006.
8. Reljin, B. Reljin, V. Papic and P Kostic"New window functions generated by means of time convolution- spectral leakage error",
Electro technical Conference, MELECON 98., Vol.2,pp. 878-881,May 1998
9. J. Zhang, Y. L. Changhong and Y Chen, "A new family windows-convolution windows and their applications," Sci China Ser E-Tech
Sci, vol.48 no.4, pp. 468-480, 2005.
10. A. K. Sahoo and G. Panda, “Doppler tolerant convolutional windows for radar pulse compression,” International Journal of Electronics
Communication Eng. International Research Publication 4(1), 145–152 (2011).
Authors: Hong Son Nguyen, Quang Hung Nguyen

Paper Title: Bearing Capacity of Concrete-Filled Steel Tube Column Sections under Long-Term Loading
Abstract: This article presents the design methods for concrete filled circular columns subjected to long-term
axial compression and bending. . There are two approaches: stress-based and strain-based for formulations. Both
approaches are specified in Russian Code, SP 266.1325800.2016, and in European Code, EN 1994-1-1:2004. A
numerical example shows the procedures to calculate the strength of a given column according to two different
Codes, the influence of parameters such as steel contribution ratio, relative slenderness to the results in two
methods are consider.
3530-
609. Keywords: Concrete-filled steel, nonlinear deformation, long-term loading, stress-based, strain-based. 35
36
References:

1. SP 266.1325800.2016 Composite steel and concrete structues. Design rules


2. Eurocode 4 Design of composite steel and concrete structures Part 1-1 General rules and rules for buildings
3. SP 63.13330.2012 Concrete and Reinforce concrete construction. Design requirements
4. SP 16.13330.2016 Steel structures.Design requirements
5. EN 1992-1-1 (2004):Design of concrete structures – Part 1-1: General rules end rules for buildings
6. EN 1993-1-1 (2005): Design of steel structures - Part 1-1: General rules and rules for building
Authors: Satya Ranjan Biswal, Santosh Kumar Swain

610. Analyze The Effects of Quarantine And Vaccination on Malware Propagation in Wireless Sensor
Paper Title:
Network
Abstract: Malware (worm, virus, malicious signals, etc.) propagation in Wireless Sensor Network (WSN) is 3537-
one of the important concern. The WSN becomes unstable due to presence of malicious signals. Vulnerability of 35
WSN is very high because of the structural constraint of sensor nodes. The attackers target a sensor node of 43
WSN for malware attack. A single infected node starts to spread the malware in the entire network through
neighbouring nodes. Therefore, for controlling of malware propagation in WSN a mathematical model is
developed. The developed model is based on epidemic theory. The developed model consist of five states such
as Susceptible-Infectious-Quarantine-Vaccination-Dead (SIQVD). The quarantine is a method through which to
cease the infection spread in WSN. And through vaccination eliminate the malware from the network. The
combination of quarantine and vaccination technique improves the network stability. This technique prevents
malware propagation in WSN. The basic reproduction number (R_0) of the model is deduced. The stability of
the network depends on the value of basic reproduction number. It is found that if the value of R_0 is less than
one the network system exist in malware-fee state, otherwise in endemic state. The equilibrium points of the
system is obtained. The effects of quarantine and vaccination has been analyzed on system performance. The
theoretical findings are verified by simulation results. Attack Epidemic model Equilibrium point Malware
propagation Security Wireless Sensor Network

Keywords:

References:

1. Akyildiz, I.F.,Su, Weilian, Sankarasubramaniam, Y., and Cayirci, E.,“Wireless sensor networks: a survey",Computer Networks,
Elsevier Science B.V., vol.38(4), pp.393–422(2000).
2. Mishra,B.K.,and Keshri, N.,“ Mathematical model on the transmission of worms in Wireless Sensor Network", Applied Mathematical
Modelling,vol.37(6), pp.4103 - 4111 (2013).
3. López, M., Peinado, A., & Ortiz, A.,“A SEIS Model for Propagation of Random Jamming Attacks in Wireless Sensor Networks",
International Joint Conference SOCO’16-CISIS’16-ICEUTE’16 Advances in Intelligent Systems and Computing, pp. 668–
677,(2016), León, Spain.
4. Jacques, M. B.,Christophe G.,Mourad, H.,and Abdallah, Makhoul: Epidemiological approach for data survivability in unattended
wireless sensor networks., Journal of Network and Computer Applications,46,374 – 383 (2014)
5. De,Pradip.,Liu ,Yonghe., and Das, S. K.,“ An Epidemic Theoretic Framework for Vulnerability Analysis of Broadcast Protocols in
Wireless Sensor Networks", IEEE Transactions on mobile Computing,vol.8(3),pp.413–-425(2009).
6. De,P.,Liu, Y.,and Das, S. K.,“Deployment-aware modeling of node compromise spread in wireless sensor networks using epidemic
theory", ACM Transactions on Sensor Networks, vol.5(3),pp.1–33.(2009).
7. Ojha,R.P.,Sanyal, G.,Srivastava, P. K., and Sharma,K.: Design and analysis of modifed SIQRS model for performance study of
wireless sensor network, Scalable Computing: Practice and Experience18(3), 229–-241(2017).
8. Haghighi.,S., M., Wen, S.,Xiang,Y.,Quin, B., and Zhou, W.“On the Race of Worms and Patches: Modeling the Spread of Information
in Wireless Sensor Networks", IEEE Transactions on Information Forensics and Security, vol.11(12),pp.2854–2865 (2016).
9. Upadhyay,R.K.,and Kumari, S.,“ Bifurcation analysis of an e-epidemic model in wireless sensor network", International Journal of
Computer Mathematics,vol.95(9),pp.1775–1805,(2017).
10. Lin,C.Y., Tseng, Y.C., and Lai, T. H.,“ Exploiting Spatial Correlation at the Link Layer for Event-driven Sensor Networks", , Int. J. of
Sensor Networks, Vol. 1(3/4), pp.197–-212, (2012).
11. Kermack,W.,O., and McKendrick, A. G.,“A contribution to the mathematical theory of epidemics",The Royal Society,vol.115
(772),pp.700–721 (1927).
12. Upadhyay, R., K.,Kumari, S., and Misra, A., K.,“Modeling the virus dynamics in computer network with SVEIR model and nonlinear
incident rate",Journal of Applied Mathematics and Computing,vol.54(1),pp.485–509,(2017).
13. He,Z., Cai, Z., Yu, J.,Wang, X.,Sun,Y., and Li, Y.,“Cost-Efficient Strategies for Restraining Rumor Spreading in Mobile Social
Networks", IEEE Transactions on Vehicular Technology,vol.66(3),pp.2789–2800,(2017).
14. Song, Y., and Jiang, G. P., “Model and Dynamic Behavior of Malware Propagation over Wireless Sensor Networks",In: Zhou J. (eds)
Complex Sciences. Complex 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications
Engineering, vol 4., pp. 487-502(2009) Springer, Berlin, Heidelberg.
15. Tang, S., and Mark, B. L.,“ Analysis of Virus Spread in Wireless Sensor Networks: An Epidemic Model", Proceedings of the 2009 7th
International Workshop on the Design of Reliable Communication Networks, DRCN 2009,pp. 86–-91. November 2009,
Washington, DC, USA.
16. Wang,Y.Q., and Yang, X.,Y.,“ Virus spreading in wireless sensor networks with a medium access control mechanism",
Chin.Phys.B,vol.22pp.(4:040206),(2013).
17. Wang, X., M., and Li,Y.,“ An improved SIR model for analyzing the dynamics of worm propagation in wireless sensor networks",
Chinese Journal of Electronics, vol.18(1),pp.8–12,(2009).
18. Wang, X., Li, Q., & Li, Y.,“EiSIRS: A formal model to analyze the dynamics of worm propagation in wireless sensor networks",
Journal of Combinatorial Optimization, vol.20(1),pp.47–62,(2010).
19. Tang, S.,:A Modified SI Epidemic Model for Combating Virus Spread in Wireless Sensor Networks.,Int. J Wireless Inf Networks,18:
319–-326 (2011). : 10.1007/s10776-011-0147-z
20. Tang, S., and Li, W.,“An epidemic model with adaptive virus spread control for Wireless Sensor Networks", International Journal of
Security and Networks, vol.6(4),pp. 201–210,(2011).
21. Tang ,S., Myers, D., and Yuan, J.," Modified SIS epidemic model for of virus spread in wireless sensor networks", Int. J. Wireless and
Mobile Computing,vol.6(2),pp. 99–108,(2013).
22. Feng,L., Song, L., Zhao, Q., and Wang, H.,“Modeling and Stability Analysis of Worm Propagation in Wireless Sensor Network",
Mathematical Problems in Engineering,2015, 2015, 129598.
23. Srivastva, A.P., Awasthi, S., Ojha,R.P.,Srivastava,P.K., and Katiyar, S.,“Stability Analysis of SIDR Model for Worm Propagation in
Wireless Sensor Network",Indian Journal Of Science and Technology, Vol. 9(31), pp.1–5, August 2016.
24. Ojha,R.P., Srivastava,P.K., and Sanyal,G.,“Improving wireless sensor networks performance through epidemic model",International
Journal Of Electronics, Vol. 106, issue 6, pp.862–879, 2019.
25. Shakya R.K., Singh Y.N., and Verma N.K.,“A Correlation Model for MAC protocols in Event-driven Wireless Sensor Networks",
Proceedings IEEE Region 10 conference TENCON 2012, Cebu City, Philippines, (2012).
26. Shakya R.K., Singh Y.N., and Verma N.K., “A Novel Spatial Correlation Model for Wireless Sensor Network Applications",
Proceedings IEEE WOCN 2012, pp. 1–6. Indore City (MP), India, (2012).
27. Shakya R.K., Singh Y.N., and Verma N.K., “Generic Correlation Model for Wireless Sensor Network Applications", Journal of IET
Wireless Sensor Systems, vol.3(4), PP.266–276,(2013).
28. Driessche,P.,V., and Watmough,J., Reproduction numbers and sub-threshold endemic equilibria for compartmental models of disease
transmission,Mathematical Biosciences,180(1),29–48, https://doi.org/10.1016/S0025-5564(02)00108-6.
29. LaSalle,J.,: The stability of dynamical systems, CBMS-NSF Regional Conference Series in Applied Mathematics, pp 96-106, (1976)
https://doi.org/10.1137/1.9781611970432.
30. Yu, S.; Wang, G.; Zhou, W. Modeling malicious activities in cyber space. IEEE Netw. 2015, 29, 83–87.
31. del Rey A.M., Peinado A. (2018) Mathematical Models for Malware Propagation in Wireless Sensor Networks: An Analysis. In:
Daimi K. (eds) Computer and Network Security Essentials. Springer, Cham
32. He Z., Lin Y., Liang Y., Wang X., Vera Venkata Sai A.M., Cai Z. (2019) Modeling Malware Propagation Dynamics and Developing
Prevention Methods in Wireless Sensor Networks. In: Du DZ., Pardalos P., Zhang Z. (eds) Nonlinear Combinatorial Optimization.
Springer Optimization and Its Applications, vol 147. Springer, Cham
33. Khanh, N.H.: Dynamics of a worm propagation model with quarantine in wireless sensor networks, Appl. Math. Inf. Sci., 2016, 10, (5),
pp. 1739– 1746.
34. Ojha, R. P., Sanyal, G., Srivastava,P. K., and Sharma, K., Design and analysis of modifed SIQRS model for performance study of
wireless sensor network,” Scalable Computing: Practice and Experience, vol. 18, no. 3, pp. 229–241, 2017.
Authors: Prathik A, Anuradha J, Uma K

Paper Title: A Novel Algorithm for Soil Image Segmentation using Color and Region Based System
Abstract: In the recent research era data mining is a very essential research domain. The data mining
techniques are used to extract significant knowledge in agriculture management. These techniques are time
consuming and less expensive than the statistical techniques. Many Researchers develop efficient techniques to
improve the productivity of agriculture. This paper developed a new segment method to segment the soil region
from other information. This research introduced Color and Region Based segment method to separate the soil
region from its background. To evaluate the proposed segmentation the five metrics are used dice coefficient,
jaccard index, Sensitivity, Specificity and Precision. The new approach produced 98% accuracy, 98%
Sensitivity and 98% Specificity.

Keywords: Data Mining, Segmentation, Classification, Jaccard Index, Sensitivity, Specificity.

References:

1. Borselli, L. Segmentation of soil roughness profiles. Earth Surface Processes and Landforms, 24(1), 71-90, 1999.
2. Bushra Nazir, Md. Iqbal Qureshi. Soil image segmentation and texture analysis: a computer vision approach. International Journal of
Innovative Research in Science, Engineering and Technology, Vol. 5, 2016.
3. Charytanowicz, Małgorzata, and Piotr Kulczycki. "An image analysis algorithm for soil structure identification." In Intelligent Systems'
611. 2014, pp. 681-692. Springer, Cham, 2015.
4. Soh, Leen-Kiat, and Costas Tsatsoulis. "Segmentation of satellite imagery of natural scenes using data mining." IEEE Transactions on
3544-
Geoscience and Remote Sensing 37, no. 2,1086-1099, 1999. 35
5. Sofou, A., Evangelopoulos, G., & Maragos, P. Soil image segmentation and texture analysis: a computer vision approach. IEEE 50
Geoscience and Remote Sensing Letters, 2(4), 394-398, 2005
6. Pradeep Kumar Reddy, Bhavana,Soil Texture Classification And Analysis With Local Ternary Pattern (Ltp) Technique, Recent
Advances In Electronics And Communication Engineering-2017.
7. Cheng HD, Lui YM, Freimanis RI. A novel approach to micro calcification detection using fuzzy logic technique. IEEE Trans Med
Imaging; 17:442–450. 1998.
8. Manousakas N, Undrill PE, Cameron GG, et al. Split-and-merge segmentation of magnetic resonance medical images: performance
evaluation and extension to three dimensions. Comp Biomed Res; 31: 393–412, 1998.
9. Udupa K, Samarasekera S. Fuzzy connectedness and object definition: theory, algorithms and applications in image segmentation.
Graph Models Image Process; 58:246–261, 1996
10. Bezdek JC, Hall LO, Clarke LP. Review of MR image segmentation techniques using pattern recognition. Med Phys; 20:1033–1048.
1993.
11. Schalkoff J. Pattern recognition: statistical, structural and neural approach. New York: Wiley & Sons, 1992.
12. Zijdenbos AP, Dawant BM. Brain segmentation and white matter lesion detection in MR images. Crit Rev Biomed Eng; 22:401–465,
1994
13. Pham D. L., Xu C., and Prince J. L., A Survey of Current Methods in Medical Image Segmentation. Annual Review of Biomedical
Engineering, 1998.
14. Xu R., and Wunsch D. Survey of Clustering Algorithms. IEEE Transactions on Neural Networks, vol. 16, no. 3, May 2005.
15. Engr. V. C. Chijindu et.al.,Medical Image Segmentation Methodologies – A Classified Overview, African Journal of Computing &
ICT. ISSN 2006-1781, Vol 5. No. 5,2012.
16. Prathik, A., J. Anuradha, and K. Uma. "Survey on Spatial Data Mining, Challenges and Its Applications." Journal of Computational
and Theoretical Nanoscience 15, no. 9-10: 2769-2776.

Authors: N. Rajesh Kumar, P.D. Sathya

Paper Title: Design of RF Energy Harvesting Patch Antenna for Wireless Communications
Abstract: In this paper a single fed microstrip patch rectenna for harvesting ambient radio frequency energy is
presented. The antenna comprises of a clover shaped radiating patch operating at 2.4GHz ISM band. The
rectifier circuit is placed in the same plane of radiating patch to minimize the overall antenna profile. The
antenna is modelled and are fabricated on low loss roger dielectric substrate. Measured results show that the
antenna achieves a peak gain of 7.19 dB in the operating ISM band with maximum RF conversion efficiency of
79%. The proposed antenna is suitable for wireless energy harvesting applications operating in ISM band.
612.
Keywords: Energy harvesting, microstrip antenna, rectenna, rectifier. 3551-
35
References: 54

1. F. Xie, G. Yang and W. Geyi, "Optimal Design of an Antenna Array for Energy Harvesting," in IEEE Antennas and Wireless
Propagation Letters, vol. 12, pp. 155-158, 2013.
2. A. Mavaddat, S. H. M. Armaki and A. R. Erfanian, "Millimeter-Wave Energy Harvesting Using 4 x 4 Microstrip Patch Antenna
Array," in IEEE Antennas and Wireless Propagation Letters, vol. 14, pp. 515-518, 2015.
3. M. Arrawatia, M. S. Baghini and G. Kumar, "Differential Microstrip Antenna for RF Energy Harvesting," in IEEE Transactions on
Antennas and Propagation, vol. 63, no. 4, pp. 1581-1588, April 2015.
4. A. Bakkali, J. Pelegri-Sebastia, T. Sogorb, V. Llario, and A. Bou-Escriva, “A Dual-Band Antenna for RF Energy Harvesting Systems
in Wireless Sensor Networks”, Journal of Sensors, Vol 2016, Article ID 5725836, pp.1-8, 2016.
5. C. Song, Y. Huang, J. Zhou, P. Carter, S. Yuan, Q. Xu, and Z. Fei, "Matching Network Elimination in Broadband Rectennas for High-
Efficiency Wireless Power Transfer and Energy Harvesting," in IEEE Transactions on Industrial Electronics, vol. 64, no. 5, pp. 3950-
3961, May 2017.
6. S. Shen, C. Chiu and R. D. Murch, "A Dual-Port Triple-Band L-Probe Microstrip Patch Rectenna for Ambient RF Energy Harvesting,"
in IEEE Antennas and Wireless Propagation Letters, vol. 16, pp. 3071-3074, 2017.
7. R. Krishnamoothy and K. Umapathy, "Design And Implementation Of Microstrip Antenna For Energy Harvesting Charging Low
Power Devices," 2018 Fourth International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-
Informatics (AEEICB), Chennai, 2018, pp. 1-3.
8. Q. Awais, Y. Jin, H. T. Chattha, M. Jamil, H. Qiang and B. A. Khawaja, "A Compact Rectenna System With High Conversion
Efficiency for Wireless Energy Harvesting," in IEEE Access, vol. 6, pp. 35857-35866, 2018.
9. K. Shafique et al., "Energy Harvesting Using a Low-Cost Rectenna for Internet of Things (IoT) Applications," in IEEE Access, vol. 6,
pp. 30932-30941, 2018.
10. S. Adami et al., "A Flexible 2.45-GHz Power Harvesting Wristband With Net System Output From −24.3 dBm of RF Power," in IEEE
Transactions on Microwave Theory and Techniques, vol. 66, no. 1, pp. 380-395, Jan. 2018.
11. L. Yang, Y. J. Zhou, C. Zhang, X. M. Yang, X. Yang and C. Tan, "Compact Multiband Wireless Energy Harvesting Based Battery-
Free Body Area Networks Sensor for Mobile Healthcare," in IEEE Journal of Electromagnetics, RF and Microwaves in Medicine and
Biology, vol. 2, no. 2, pp. 109-115, June 2018.
Authors: Varsha Parekh, Pogaku Divya, K.Srilatha, P.Chitra

Paper Title: Design of the Configurable Watch Dog Timer using FPGA in Space Probe Application
Abstract: Watchdog timer is a simple timer circuit. It is an indispensable part and is of paramount importance
when coming to the embedded system. Most implementations of watch dog are simply based on simple feed dog
strategy covering merely limited abnormal states of program. There are different types of watch dog timers due
to the increasing need. They include Standard watchdog timer, Windowed watch dog timer, sequenced watch
dog timer. But an effective watch dog timer should be able to detect all abnormal software modes and bring the
system back to a known state. In addition to that, it must have its own clock and should be capable of providing
a hardware reset on timeout to all the peripherals which the current timers lag. Hence the windowed watchdog
timer where the window periods can be configured during the software initialization. In the watchdog timers
which are available right now is processor dependent due to which there is a increase in the timing but there is a
need of a watchdog timer which has capability to cut down or reduce timing hence watchdog timer which has
got service, frame and controller windows have been used, which is independent of the processor and hence the
timing is reduced effectively.

Keywords: Watchdog Timer, Field Programmable Gate Array, Service Window, Frame Window, Controller
613. Window. 3555-
35
References: 58
1. Ganssle, J. G. 2008. The Art of Designing Embedded Systems. Second Edition, Elsevier, 298.
2. Kochan, R.; Kopylchak, A. &Korkishko, T. 2002. Improved watchdog timer for control the IBM PC based autonomous computer
systems, in 'Modern Problems of Radio Engineering, Telecommunications and Computer Science. 181-182.
3. Giaconia, G.; Di Stefano, A. & Capponi, G. 2003. FPGA-based concurrent watchdog for real-time control systems, Electronics Letters
39(10), 769-770.
4. Pohronská, M. and Krajčovič, T. 2010. Fault-tolerant embedded systems with multiple FPGA implemented watchdogs. Proceedings of
the International Conference CYBERNETICS AND INFORMATICS. 37-44.
5. K.Ashok, K.Srilatha.2017.An implementation of the customer domain of the smart grid embedded in an internet of things” ARPN
Journal of Engineering and Applied Sciences. vol.12(19).5653-5657.
6. Lennon, W.K., &Passino, K. M.2009. Intelligent Control for Brake Systems,IEEE Transactions on Control Systems Technology,
Vol.7.188-202.
7. P. Garcia, K. Compton, M. Schulte, E. Blem, and W. Fu.2006.An overview of reconfigurable hardware in embedded systems,”
EURASIP Journalon Embedded Systems, vol. no. 1.13–13.
8. W.Sai Raghavendran, S.V.Raju, K.Srilatha. 2016. A novel approach to build a low cost architecture for offthe shelf target tracking
using wireless communication”, ARPN Journal of Engineering and Applied Sciences”,vol.11(15).9242-9250.
9. Pohronská, M. and Krajčovič, T. 2010. “Embedded Systems with Increased Reliability Using the Multiple Watchdog Timers
Approach, International Conference of Applied Electronics Proceedings. 273-276.

Authors: Robinson P. Paul, Vishvjit Thakar, Hetal N. Patel


A Simple And Novel Algorithm For State Estimation Of Continuous Time Linear Stochastic
Paper Title:
Dynamic Systems Excited By Random Inputs
Abstract: The major goal of this paper is to explore the effective state estimation algorithm for continuous
time dynamic system under the lossy environment without increasing the complexity of hardware realization.
Though the existing methods of state estimation of continuous time system provides effective estimation with
data loss, the real time hardware realization is difficult due to the complexity and multiple processing. Kalman
Filter and Particle Filer are fundamental algorithms for state estimation of any linear and non-linear system
614. respectively, but both have its limitation. The approach adopted here, detects the expected state value and
3559-
covariance, existed by random input at each stage and filtered the noisy measurement and replace it with
35
predicted modified value for the effective state estimation. To demonstrate the performance of the results, the
63
continuous time dynamics of position of the Aerial Vehicle is used with proposed algorithm under the lossy
measurements scenario and compared with standard Kalman filter and smoothed filter. The results show that the
proposed method can effectively estimate the position of Aerial Vehicle compared to standard Kalman and
smoothed filter under the non-reliable sensor measurements with less hardware realization complexity.

Keywords: Kalman Filter; Particle Filter; state estimation; lossy network; state- measurement update;
stochastic stability Multiple Model.

References:

1. X. Wan, Z. Wang, M. Wu, and X. Liu, “State Estimation for Discrete Time-Delayed Genetic Regulatory Networks With Stochastic
Noises Under the Round-Robin Protocols,” IEEE Trans. Nanobioscience, vol. 17, no. 2, pp. 145–154, Apr. 2018.
2. I. Abala, F. ezzahrae M’hamdi Alaoui, Y. Chhiti, F. Aguilar, E. Montero, and A. Sahibed-Dine, “Estimation PC-SAFT equation of
state parameters of ethanol, 1-propanol, 1-butanol and 1-nonanol,” in 2017 International Renewable and Sustainable Energy
Conference (IRSEC), 2017, pp. 1–6.
3. C. C. Mohammad Shaqura, “A Hybrid System Approach To Airspeed , Angle Of Attack And Sideslip Estimation In Unmanned Aerial
Vehicles,” Int. Conf. Unmanned Aircr. Syst., pp. 723–732, 2015.
4. L. X. Wang, “Modeling Stock Price Dynamics with Fuzzy Opinion Networks,” IEEE Trans. Fuzzy Syst., vol. 25, no. 2, pp. 277–301,
2017.
5. S. Di Cairano, W. P. M. H. Heemels, M. Lazar, and A. Bemporad, “Stabilizing Dynamic Controllers for Hybrid Systems: A Hybrid
Control Lyapunov Function Approach,” Autom. Control. IEEE Trans., vol. 59, no. 10, pp. 2629–2643, 2014.
6. R. P. Paul and V. Thakar, “Stochastic Hybrid System-State Estimation methods -A Survey,” Int. Conf. “Research Innov. Sci. Eng.
Technol., 2017.
7. R. Yang, Y. Bar-shalom, and G. W. Ng, “Altitude Estimation Using Multipath With a Two-Dimensional Radar Over Spherical Earth,”
IEEE Trans. Aerosp. Electron. Syst., vol. 54, no. 2, pp. 770–782, 2018.
8. C. Zhang and Y. Jia, “Distributed estimation for stochastic hybrid systems with event-triggered sensor schedule,” IET Control Theory
Appl., vol. 11, no. 2, pp. 173–181, 2017.
9. C. Jauffret, “IMM-UGHF-NJ for Continuous Wave Bistatic Sonar Tracking with Propagation Delay,” no. July, 2017.
10. J.-J. Leth, J. G. Rasmussen, H. Schiler, and R. Wisniewski, “A Class of Stochastic Hybrid Systems with State-Dependent Switching
Noise,” I E E E Conf. Decis. Control. Proc., pp. 4737–4744, 2013.
11. M. T. Andren and A. Cervin, “Event-based state estimation using an improved stochastic send-on-delta sampling scheme,” 2016 2nd
Int. Conf. Event-Based Control. Commun. Signal Process. EBCCSP 2016 - Proc., 2016.
12. Y. Bar-Shalom, X.-R. Li, and T. Kirubarajan, Estimation with Applications to Tracking and Navigation, vol. 9. John Wiley & Sons,
Inc., 2003.
13. S. Deshmukh, B. Natarajan, and A. Pahwa, “State Estimation Over a Lossy Network in Spatially Distributed Cyber-Physical Systems,”
IEEE Trans. Signal Process., vol. 62, no. 15, pp. 3911–3923, 2014.
14. A. K. Fletcher, S. Rangan, and V. K. Goyal, “Estimation from lossy sensor data: jump linear modeling and Kalman filtering,” in
Information Processing in Sensor Networks, 2004. IPSN 2004. Third International Symposium on, 2004, pp. 251–258.
15. H. Hsu, Probability, Random Variables and Random Processes, vol. 53, no. 9. 2013.
16. Q. Li, R. Li, K. Ji, and W. Dai, “Kalman Filter and Its Application,” in 2015 8th International Conference on Intelligent Networks and
Intelligent Systems (ICINIS) ,pp.74-77, 2015.
17. C. Lei, C. Qian, W. Tian, and R. Jia, “State estimation in computer virus epidemic dynamical systems using hybrid extended Kalman
filter,” in 2017 IEEE International Conference on Information and Automation (ICIA),pp.349-354, 2017.

Authors: Bhawna Nigam, Ramakrishnan M Ramanathaiah, Basavaprasad B

Paper Title: Improved Bat Algorithm using Super-Region Volume Segmentation for Medical Images
Abstract: Medical imaging has been the highly active research area from the past few dec-ades. With the
intention of consolidating the automatic approaches of power of the segmentation with the experienced and
capable of annotating biological sam-ples manually, provides a new board which is termed as Super-Region
Volume Segmentation (SuRVoS). SuRVoS purifies the estimation by utilizing Markov Random Field (MRF)
formulation, which in turn considers neighboring labels in order to estimate precisely consistent. Nevertheless,
in the MRF formulation model, various separations play a vital part in order to raise the exactness of out-put of
the segmentation. Hence, identifying that partition number is an important task and also it is a difficult problem.
In proposed work, the edge weight is seg-regated into two disjoints sets, which means cut and off into all
feasible disjoint segments. The proposed energy function is reduced by utilizing Enhanced Bat (EB) algorithm
over the MRF and the standard deviation calculation among two edges. In our work, the improved SuRVoS
gives good segmentation output by generating good objective function values in the form of best supervoxels.
So, it raises the accuracy of image segmentation greater instead of the earlier methods. The performance metrics
were computed namely accuracy, precision, recall, Peak Signal to Noise Ratio (PSNR), Mean Square Error
(MSE) and correlation values by utilizing the proposed method. The experimental output gives the greater seg-
615. mentation accuracy which is accomplished by the proposed method.
3564-
35
Keywords: Segmentation, BAT, SuRVoS,MRF,super-regions.
67
References:

1. Lucic, V., Rigort, A., Baumeister, W., 2013. Cryo-electron tomography: the challenge of doing structural biology in situ. J. Cell Biol.
202 (3)
2. Zhang, Kaihua, et al. "Active contours with selective local or global segmentation: a new formulation and level set method." Image and
Vision computing 28.4 (2010): 668-676.
3. T. Chan, L. Vese, Active contours without edges, IEEE Transaction on Image Processing 10 (2) (2001) 266–277.
4. A. Bosch, A. Zisserman, and X. Munoz. Image classification using random forests and ferns. In Proc. ICCV, 2007.
5. Son, Jeany, et al. "Tracking-by-segmentation with online gradient boosting decision tree." Proceedings of the IEEE International
Conference on Computer Vision. 2015.
6. J. H. Friedman. Greedy function approximation: A gradient boosting machine. Annals of Statistics, 29:1189–1232, 2000. 2.
7. Tzotsos, Angelos, and Demetre Argialas. "Support vector machine classification for object-based image analysis." Object-Based Image
Analysis. Springer Berlin Heidelberg, 2008. 663-677.
8. Kato, Zoltan, and Ting-Chuen Pong. "A Markov random field image segmentation model for color textured images." Image and Vision
Computing24.10 (2006): 1103-1114.
9. Ding, Lei, and Alper Yilmaz. "Interactive image segmentation using probabilistic hypergraphs." Pattern Recognition 43.5 (2010):
1863-1873.
10. Holtzman-Gazit, Michal, Dorith Goldsher, and Ron Kimmel. "Hierarchical segmentation of thin structures in volumetric medical
images." International Conference on Medical Image Computing and Computer-Assisted Intervention. Springer Berlin Heidelberg,
2003.
11. Alihodzic, Adis, and Milan Tuba. "Bat algorithm for image thresholding", RRT, Informatics, Electronics and Signal Processing (2013):
17-19.
12. Ayan Nigam, Bhawna Nigam, Chayan Bhaisare, Neeraj Arya, Classifying the bugs using multi-class semi supervised support vector
machine, International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012)
13. M Niranjanamurthy, B Nigam, Nithya, S Jagannatha- "Analysis of Blockchain technology: pros, cons and SWOT" Cluster Computing
The Journal of Networks, Software Tools and Applications ISSN: 1386-7857 (Print) 1573-7543 (Online)
https://doi.org/10.1007/s10586-018-2387-5 2018
14. M Niranjanamurthy, D Chahar - "The study of e-commerce security issues and solutions" International Journal of Advanced Research
in Computer and Communication Engineering Vol. 2, Issue 7, ISSN (Online) : 2278-1021 P:1-12 June 2013
15. Niranjanamurthy M, Bhawna Nigam, Niveditha N.M , Naresh E - "Efficient Implementation of Refund Process in Online
ShoppingIndustry Internal Tool-OMS" International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878,
Volume-7Issue-6, March 2019.

Authors: Anshul, Dipali Bansal, Rashima Mahajan


Performance Analysis of IIR & FIR Windowing Techniques in Electroencephalography Signal
Paper Title:
Processing
Abstract: A very small amplitude (μV) of the electroencephalography (EEG) signal is infected by diverse
artifacts. These artifacts have an effect on the distinctiveness of the signal because of which medical
psychoanalysis and data retrieval is difficult. Therefore, EEG signals are initially preprocessed to eliminate the
artifacts to produce signals that can serve as a base for further processing and analysis. Different filters are
implemented to eliminate the artifacts present in the EEG signal. Recent research shows that window technique
Finite Impulse Response (FIR) filter is usually used. In this paper, digital Infinite Impulse Response (IIR) filter
and different Finite Impulse Response (FIR) window filters (Hanning, Hamming, Kaiser, Blackman) of various
orders are implemented to eradicate the random noise added to EEG signals. Their performance analysis has
been done in Matlab (R2016a) by calculating the mean square error, mean absolute error, signal to noise ratio,
peak signal to noise ratio and cross-correlation. The results show that Kaiser Window based finite impulse
response filter outperforms in removing the noise from the electroencephalogram signal. This research focuses
on eradicating random noise in electroencephalogram signals but this approach will be extended to a different
source of electroencephalogram contamination.

Keywords: Blackman Window, FIR filter, Hamming Window, Hanning Window, IIR filter, Kaiser Window.

References:

1. N.E. Diana,U. Kalsum,A. Sabiq , W.Jatmiko and P.Mursanto , “Comparing Windowing Methods on Finite Impulse Response (FIR)
Filter Algorithm in Electroencephalography (EEG) Data Processing,” Journal of Theoretical and Applied Information
Technology,vol.88(3),2016,pp.558-567.
2. G.Repovs, “Dealing with Noise in EEG Recording and Data Analysis.” Informatica Medica Slovenica,vol.15(1),2010,pp.18-25.
3. Gerber, E. M., Sadeh, Boaz, Ward , Andrew , Knight, Robert T. and Deouell, Leon Y, “Non-Sinusoidal Activity Can Produce Cross
Frequency Coupling in Cortical Signals in the Absence of Functional Interaction between Neural Sources,” PLOS
ONE,vol.11(12),2016,pp.1-19.Available:10.1371/journal.pone.0167351
4. D.Bansal, R. Mahajan, S. Roy, D. Rathee, S. Singh, “Real Time Man Machine Interface and Control using Deliberate Eye
Blink,”International Journal of Biomedical Engineering and Technology,vol. 18(4),2015,pp.370-384.
616. 5. T.Johannisson, “Correlations between Personality Traits and Specific Groups of Alpha Waves in the Human EEG”PeerJ
PMC,vol.4,2016,e2245 . Available: 10.7717/peerj.2245. 3568-
6. T. K. Aich, “Absent Posterior Alpha Rhythm: An Indirect Indicator of Seizure Disorder? Indian Journal of Psychiatry,” 35
PMC.vol.56(1)2014,pp.61–66. Available: 10.4103/0019-5545.124715. 78
7. D.Bansal and R.Mahajan, “EEG based brain computer interface: Cognitive Analysis and Control Applications,” in Elsevier Academic
Press, 2019.
8. A.S. Al-Fahoum, A. Al-Fraihat, “Methods of EEG Signal Features Extraction Using Linear Analysis in Frequency and Time-
Frequency Domains,” Hindawi Publishing Corporation, ISRN Neuroscience, 2014,Article ID 730218, 1-7. Available
:https://doi.org/10.1155/2014/730218.
9. S.K.Goh, Abbass, Hussein A., Tan, Chen, Al-Mamun, Abdullah, Wang, Chuanchu and Guan, Cunta, “Automatic EEG Artifact
Removal Techniques by Detecting Influential Independent Components,” IEEE Transactions on Emerging Topics in Computational
Intelligence, vol.1(4),2017,pp.270 – 279. Available: 10.1109/TETCI.2017.2690913.
10. I. Mahmoud, Al-Kadi , B.I. Mamun, M.Reaz ,M.A. Alauddin, “ Evolution of Electroencephalogram Signal Analysis Techniques during
Anesthesia”,.Sensors,vol. 13,2013,pp. 6605-6635. Available:10.3390/s130506605.
11. R. Mahajan, D. Bansal and A.Khatter,. “EEG Based Cognitive Brain Mapping in Time Domain to Analyze EM Radiation Effect on
Human Brain. Advanced Informatics for Computing Research”, ICAICR 2018. Communications in Computer and Information
Science, Springer, Singapore. vol. 955,2019,pp.308-319
12. M. Z Parvez and M.Paul, “ Prediction and Detection of Epileptic Seizure by Analysing EEG Signals,” in Biomedical Image Analysis
and Mining Techniques for Improved Health Outcomes, . 1st ed. US: IGI Global.2015,pp.1-335.
13. R.Mahajan and D. Bansal, “Depression diagnosis and management using EEG-based affective brain mapping in real
time,” International Journal of Biomedical Engineering and Technology,vol. 18(2),2015,pp.115-138.
14. P.Podder,T.Z. Khan ,Mamdudul Haque, R.,M. Muktadir, “Comparative Performance Analysis of Hamming, Hanning and Blackman
Window”, International Journal of Computer Applications,vol.96(18),2014,pp.1-7.
15. J. G Proakis and D.G. Manolakis, Digital signal processing. 3rd ed. Upper Saddle River, N.J.: Prentice-Hall, 1996, pp.622-692.
16. A. Chandra and S.Chattopadhyay, “Design of hardware efficient FIR filter: A review of the state-of-the-art approaches,” An
International Journal of Engineering Science & Technology, Elsevier, vol.19(1), 2016,pp.212-226.
17. R. Mehboob,S.A. Khan, R. Qamar, R, “FIR filter design methodology for hardware optimized implementation” IEEE Transactions on
Consumer Electronics,vol.55(3),2009,pp.1669-1673. Available:10.1109/tce.2009.5278041.
18. P.Das ,S.K. Naskar, P. Narayan, Sankar, “An Approach to Enhance Performance of Kaiser Window Based Filter”2016 Second IEEE
International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)(25th-26th
Sep.2016),2016,pp.256-261, Available: 10.1109/ICRCICN.2016.7813666
19. N.Iqbal, A. Zerguine, Kaka, SanLinn, A. Al-Shuhail, “ Observation-Driven Method Based on IIR Wiener Filter for Microseismic Data
Denoising,”Pure and Applied Geophysics,vol.175(6), 2018,pp.2057-2075.
20. R. Shriram ,M. Sundhararajan , Shete, S.Daimiwal, Nivedita, “Statistical features based comparision of analysis and synthesis of
normal and epileptic electroencephalogram for various wavelets,”Turkish Journal of Electrical Engineering and Computer
Sciences,vol.25(3),2016,Available: 10.3906/elk-1511-254pp.1795-1806.
21. W.Zhou and C.B. Alan, “ Mean Squared Error: Love It or Leave It?”, IEEE Signal Processing magazine,.2009,pp.98-117.Available:
10.1109/MSP.2008.930649.
22. A.Goldberger et al, “PhysioBank, PhysioToolkit, and PhysioNet”, Circulation,2000,vol. 101(23).
23. A.L.Goldberger ,L.A. Amaral ,L. Glass, J.M.Hausdorff , P.C.Ivanov ,R.G. Mark ,J.E. Mietus ,G.B. Moody, C.K.Peng ,H.E. Stanley,
“PhysioBank, PhysioToolkit, and PhysioNet: Components of a New Research Resource for Complex Physiologic Signals,” Circulation
Pubmed,vol. 101(23),2000, e215-e220.
24. S. Zahoor,N. Shahzad and M.Wei , “Design and implementation of an efficient FIR digital filter”,Cogent
Engineeringvol.,4(1),2017. Available: 10.1080/23311916.2017.1323373.
25. V.Singh,K. Veer, R. Sharma and S. Kumar, “Comparative study of FIR and IIR filters for the removal of 50 Hz noise from EEG
signal,” International Journal of Biomedical Engineering and Technology, vol.22(3),2016, pp.250-257.
Authors: Prabhakaran A, Sanjivi Arul
Characterisation of Aluminium Alloy (Lm6) Metal Matrix Composite Reinforced With Copper
Paper Title:
Slag/Ferro Sand
Abstract: Metal matrix composites are found to be one of the promising materials for advanced engineering
application. It now has been produced commercially. Recent researches have shown an increased affinity
towards the usage of agricultural waste as well as industrial waste as a reinforcement in the composite
production which will have a momentous impact on the cost effectiveness of the composite manufacturing. This
also will help in sustainable waste management. One of such industrial waste is Copper slag (CS), huge quantity
of waste is left as land fill, the compositions of the CS is commensurable to the composition of the fly ash. This
entailed using CS as the reinforcement in this composite Fabrication. In this work Aluminium alloy is reinforced
with CS to produce a metal matrix composite using stir casting process, as it is one of the cost effective and
efficient method of making ALMMC. All the samples are prepared as per ASTM standards and the properties
such as Tensile strength, Elongation, Micro Hardness, Specific wear rate, Wear rate and microstructures are
examined.

Keywords: Copper Slag, LM6 Aluminium Alloy, Stir casting.

References:

1. J. M. Torralba, C. E. Da Costa, and F. Velasco, “P/M aluminum matrix composites: An overview,” J. Mater. Process. Technol., vol.
133, no. 1–2, pp. 203–206, 2003.
2. G. S. Cole and A. M. Sherman, “Light weight materials for automotive applications,” Mater. Charact., vol. 35, no. 1, pp. 3–9, 1995.
3. D. B. Miracle, “Metal matrix composites - From science to technological significance,” Compos. Sci. Technol., vol. 65, no. 15-16
SPEC. ISS., pp. 2526–2540, 2005.
4. A. Macke and B. F. Schultz, “Metal Matrix Composites Offer the Automotive Industry and Opportunity to Reduce Vehicle Weight,
Improve Performance,” Adv. Mater. Process., vol. 2, no. March, pp. 19–23, 2012.
5. C. M. Friend, “The effect of temperature on the tensile strength of short α-alumina fibre/aluminium alloy metal matrix composites,”
617. Scr. Metall., vol. 23, no. 1, pp. 33–37, 1989.
6. S. Johny James, K. Venkatesan, P. Kuppan, and R. Ramanujam, “Hybrid aluminium metal matrix composite reinforced with SiC and 3579-
TiB2,” in Procedia Engineering, 2014. 35
7. M. O. Bodunrin, K. K. Alaneme, and L. H. Chown, “Aluminium matrix hybrid composites: A review of reinforcement philosophies;
Mechanical, corrosion and tribological characteristics,” J. Mater. Res. Technol., vol. 4, no. 4, pp. 434–445, 2015.
83
8. A. A. Ahamed, R. Ahmed, M. B. Hossain, and M. Billah, “Fabrication and Characterization of Aluminium-Rice Husk Ash Composite
Prepared by Stir Casting Method,” Rajshahi Univ. J. Sci. Eng., vol. 44, no. 1, pp. 9–18, 2016.
9. J. J. Lewandowski, C. Liu, and W. H. Hunt, “Effects of matrix microstructure and particle distribution on fracture of an aluminum
metal matrix composite,” Mater. Sci. Eng. A, vol. 107, no. C, pp. 241–255, 1989.
10. I. A. Ibrahim, F. A. Mohamed, and E. J. Lavernia, “Particulate reinforced metal matrix composites - a review,” J. Mater. Sci., vol. 26,
no. 5, pp. 1137–1156, 1991.
11. S. Ilangovan, S. Arul, and A. Shanmugasundaram, “Effect of Zn and Cu Content on Microstructure, Hardness and Tribological
Properties of Cast Al-Zn-Cu Alloys,” Int. J. Eng. Res. Africa, vol. 27, pp. 1–10, 2016.
12. U. K. Annigeri and G. B. Veeresh Kumar, “Method of stir casting of Aluminum metal matrix Composites: A review,” in Materials
Today: Proceedings, 2017, pp. 1140–1146.
13. J. Hashim, L. Looney, and M. S. J. Hashmi, “Metal matrix composites: production by the stir casting method,” J. Mater. Process.
Technol., 1999.
14. G. G. Sozhamannan, S. B. Prabu, and V. S. K. Venkatagalapathy, “Effect of Processing Paramters on Metal Matrix Composites: Stir
Casting Process,” J. Surf. Eng. Mater. Adv. Technol., 2012.
15. S. B. Prabu, L. Karunamoorthy, S. Kathiresan, and B. Mohan, “Influence of stirring speed and stirring time on distribution of particles
in cast metal matrix composite,” J. Mater. Process. Technol., 2006.
16. T. S. Srivatsan, I. A. Ibrahim, F. A. Mohamed, and E. J. Lavernia, “Processing techniques for particulate-reinforced metal aluminium
matrix composites,” J. Mater. Sci., vol. 26, no. 22, pp. 5965–5978, 1991.
17. A. Kumar, S. Lal, and S. Kumar, “Fabrication and characterization of A359/Almetal matrix composite using electromagnetic stir
casting method,” J. Mater. Res. Technol., vol. 2, no. 3, pp. 250–254, 2013.
18. J. Hashim, L. Looney, and M. S. J. Hashmi, “The enhancement of wettability of SiC particles in cast aluminium matrix composites,” J.
Mater. Process. Technol., vol. 119, no. 1–3, pp. 329–335, 2001.
19. N. Radhika and R. Subramanian, “Effect of reinforcement on wear behaviour of aluminium hybrid composites,” Tribol. Mater.
Surfaces Interfaces, vol. 7, no. 1, pp. 36–41, 2013.
20. A. Shanmugasundaram, S. Arul, and R. Sellamuthu, “Investigating the Effect of WC on the Hardness and Wear Behavior of Surface
Modified AA 6063,” Mater. Today Proc., vol. 5, no. 2, pp. 6579–6587, 2018.
21. A. Shanmugasundaram, S. Arul, and R. Sellamuthu, “Effect of flyash on the surface hardness of AA 6063 using GTA as a heat
source,” Metall. Res. Technol., vol. 114, no. 5, p. 511, 2017.

Authors: Manoj Kumar Gupta, Pravin Chandra

Paper Title: HYBCIM: Hypercube Based Cluster Initialization Method for k-means
618. Abstract: Clustering is a data processing technique that is extensively used to find novel patterns in data in the 3584-
field of data mining and also in classification techniques. The k-means algorithm is extensively used for 35
clustering due to its ease and reliability. A major effect on the accuracy and performance of the k-means 87
algorithm is by the initial choice of the cluster centroids. Minimizing Sum of Squares of the distance from the
centroid of the cluster for cluster points within the cluster (SSW) and maximizing Sum of Square distance
between the centroids of different clusters (SSB) are two generally used quality parameters of the clustering
technique. To improve the accuracy, performance and quality parameters of the k-means algorithm, a new
Hypercube Based Cluster Initialization Method, called HYBCIM, is proposed in this work. In the proposed
method, collection of k equi-sized partitions of all dimensions is modeled as a hypercube. The motivation behind
the proposed method is that the clusters may spread horizontally, vertically, diagonally or in arc shaped. The
proposed method empirically evaluated on four popular data sets. The results show that the proposed method is
superior to basic k-means. HYBCIM is applicable for clustering both discrete and continuous data. Though,
HYBCIM is proposed for k-means but it can also be applied with other clustering algorithms which are based on
initial cluster centroids.

Keywords: Clustering; k-means; Cluster Initialization; Hypercube Based Cluster Initialization Method;
Unsupervised Learning.

References:

1. Han J, Kamber M, Pei J (2012) 'Data mining concepts and techniques', Elsevier, 3rd Edition.
2. Arora, R. and Gupta, M. (2017) "e-Governance using Data Warehousing and Data Mining", International Journal of Computer
Applications, Volume 169 - No.8, July 2017.
3. Jain, A. K. and Dubes, R. C. (1988) 'Algorithms for Clustering Data'. Prentice Hall, Englewood Cliffs, NJ.
4. Xu, J., Xu, B., Zhang, W., Zhang, W., Hou, J. (2009) "Stable Initialization Scheme for K-Means Clustering", Wuhan University
Journal of Natural Science, Vol. 14, No. 1, pp 24-28
5. Gupta, M.K. and Chandra, P (2019), A Comparative Study of Clustering Algorithms, In Proc. of the 13th INDIACom-2019; IEEE
Conference ID: 461816; 6th International Conference on "Computing for Sustainable Global Development".
6. Jain, A.K., Murty, M.N. and Flynn, P.J. (1999) 'Data clustering: a review' ACM Comput. Surv. 31, 3, 60 pages.
7. Jain, A.K. (2010), 'Data clustering: 50 years beyond K-means', Pattern Recognition Letters, Elsevier, vol. 31, pp. 651-666.
8. Aldahdooh, R.T. and Ashour, W. (2013), 'DIMK-means "Distance-based Initialization Methods for K-means Clustering Algorithms",
I.J. Intelligent Systems and Applications, Vol. 2. PP 41-51.
9. Gan, G., Ma, C., and Wu, J., (2007) 'Data Clustering: Theory, Algorithms, and Applications', American Statistical Association and the
Society for Industrial and Applied Mathematics, SIAM.
10. Gupta, M.K. and Chandra, P (2019), An Empirical Evaluation of k-means Clustering Algorithm using Different Distance/Similarity
Metrics, In Proc. of the International Conference on Emerging Trends in Information Technology (ICETIT-2019), Springer.
11. Forgy E. (1965) "Cluster Analysis of Multivariate Data: Efficiency vs. Interpretability of Classifications" [J]. Biometrics, 1965, 21(3):
768.
12. McQueen, J.B. (1967), 'Some methods for classification and analysis of multi-variate observation' Symposium on Mathematical
Statistics and Probability, University of California Press.
13. Kaufman, L. and Rousseeuw, P.J. (1990), 'Finding Groups in Data. An Introduction to Cluster Analysis' Wiley, Canada.
14. Katsavounidis, I, Kuo, C. Zhang, Z. (1994), 'A new initialization technique for generalized Lloyd iteration', IEEE, 1(10), 144-146.
15. Bradley, P.S. and Fayyad (1998), 'Refining initial points for K-Means clustering', Proc. 15th Intl. Conf. on Machine Learning, San
Francisco, CA, pp 91-99
16. Khan, S.S. and Ahmad, A. (2004), 'Cluster Centre Initialization Algorithm for k-means clustering', Pattern Recognition Letters 25(11),
pp 1293-1302.
17. Su, T. and Dy, J. (2004) "A Deterministic Method for Initializing K-means Clustering" Tools with Artificial Intelligence, 2004. ICTAI
2004. 16th IEEE International Conference, pp. 784 - 786, Nov 2004.
18. Arthur, D. and Vassilvitskii, S. (2007) "k-means++: The advantages of careful seeding," ACM-SIAM Symposium on Discrete
Algorithms (SODA 2007) Astor Crowne Plaza, New Orleans, Louisiana, pp. 1-11.
19. Arai, K. and Barakbah, A.R. (2007) "Hierarchical K-means: an algorithm for centroids initialization for K-means" Rep. Fac. Sci.
Engrg, Saga Univ. , vol. 36.
20. Maitra, R. (2009) "Initializing partition-optimization algorithms," IEEE/ACM Transactions on Computational Biology and
Bioinformatics, vol. 6, pp. 144-157.
21. Naldi, M.C., Campello, R.J.G.B., Hruschka, E.R. and Carvalho, A.C.P.L.F. (2011) "Efficiency issues of evolutionary k-means,"
Applied Soft Computing, vol. 11 , pp. 1938-1952.
22. Poomagal, S., Saranya, P., Karthik, S. (2016), A novel method for selecting initial centroids in K-means clustering algorithm,
International Journal of Intelligent Systems Technologies and Applications, Volume 15, Issue 3,
https://doi.org/10.1504/IJISTA.2016.078347
23. Sandhya N., Sekar M.R. (2018) Analysis of Variant Approaches for Initial Centroid Selection in K-Means Clustering Algorithm. In:
Satapathy S., Bhateja V., Das S. (eds) Smart Computing and Informatics. Smart Innovation, Systems and Technologies, vol 78.
Springer, Singapore
24. Kurada R.R., Kanadam K.P. (2019) A Novel Evolutionary Automatic Clustering Technique by Unifying Initial Seed Selection
Algorithms into Teaching-Learning-Based Optimization. In: Soft Computing and Medical Bioinformatics. Springer Briefs in Applied
Sciences and Technology. Springer, Singapore.

Authors: K. Satish Babu, P. S. Sarma, Y. Madhveelatha

Paper Title: Multi Spectral Coding in RADAR Signal Conditioning using Recurrent Spectral Mapping
Abstract: Observed varying interference in radar signal processing limits the accuracy of target detection.
Signal processing approaches using spectral coding are used in computing the Doppler. The spectral processing
are however computationally slower due to large processing coefficients. In this paper, a new selective process
619. for spectral bands is proposed using recurrent band mapping to derive a scale level selection in radar processing.
3588-
A stopping criterion developed, limits the additional computation overhead in radar signal processing, and
35
reduces the delay in computation of decision making. The simulation of the proposed approach validates the
93
Doppler profile and delay parameter under different data rate and fractional order of receiving signal.

Keywords: Multi spectral coding, radar signal processing, spectral mapping, recurrent coding.
References:

1. Sreenivasulu Reddy Thatiparthi, Ramachandra Reddy Gudheti, and Varadarajan Sourirajan, “MST Radar Signal Processing Using
Wavelet-Based Denoising’, IEEE Geoscience and Remote Sensing letters, Vol. 6, No. 4, October 2009.
2. K. P. Soman and K. I. Ramachandran, “Insight Into Wavelets From Theory to Practice”, New Delhi, India: Prentice-Hall India, 2004.
3. S. Varadarajan, K. Jithendra Reddy, and G. Ramachandra Reddy, “Wind profile detection of atmospheric radar signals using wavelets
and harmonic decomposition techniques,” Atmos. Sci. Lett., vol. 5, no. 7, pp. 152– 161, Dec. 2004.
4. K. Anandan, G. Ramachandra Reddy, and P. B. Rao, “Spectral analysis of atmospheric signal using higher orders spectral estimation
technique,” IEEE Trans. Geosci. Remote Sens., vol. 39, no. 9, pp. 1890–1895, Sep. 2001.
5. V. K. Anandan, C. J. Pan, T. Rajalakshmi, and G. Ramchandra Reddy, “Multitaper spectral analysis of atmospheric radar signal,”
Ann. Geophys., vol. 22, no. 11, pp. 3995–4003, Nov. 2004.
6. V. K. Anandan, P. Balamuralidhar, P. B. Rao, and A. R. Jain, “A method for adaptive moments estimation technique applied to MST
radar echoes,” in Proc. Prog. Electromagn. Res. Symp., 1996, pp. 360–365.
7. Guo Yongqiang, Wu yumin, Liu Hui , “Construction of Waveform Library In Cognitive Radar”, Polish Maritime Research, Special
Issue, Vol. 24, pp. 22-29, 2017.
8. A.A.A. Solyman, S. Weiss, J.J. Soraghan.: Low-Complexity LSMR Equalisation of FrFT-Based Multicarrier Systems in Doubly
Dispersive Channels. IEEE International Symposium on Signal Processing and Information Technology, ISSPIT 2011, p. 461-465,
2011
9. B. Jin.: Research on Target Tracking Methods in Cognitive Radar [D]. Xian, Xian Electronics Science and Technology University,
2014.
10. C.V. Ilioudis, C. Clemente, I. Proudler, J.J. Soraghan.: Performance Analysis of Fractional Waveform Libraries in MIMO Radar
Scenario. IEEE National Radar Conference - Proceedings, v 2015-June, June, p. 1119-1124
11. C.V. Ilioudis, C. Clemente, I. Proudler, J.J. Soraghan.: Radar Waveform Libraries Using Fractional Fourier Transform. in 2014 IEEE
Radar Conference, Cincinnati, Ohio, 19-23 May 2011.

Authors: D.Prabha, P.Manivannan, K.Balasubramanian

Paper Title: Deep neural network: Recognize Data Management of Artificial Intelligence in Retail
Abstract: Deep neural networks with the artificial intelligence on Machine Learning (ML) algorithms
constitute the best design specifically to deal with vast amount of data for retail business. The limited research
approach is referred towards reducing memory consumption on integrating ML algorithms on data management
system. This paper proposed combining data management and deep neural networks, ideas to build systems,
which vast amount data can share in the database system. Therefore, ML algorithm has a pattern with multi-
hidden layer that can use to synthesis different decision within a minimum processing. Finally, system precede
and follow a NoSQL layers of a model employs in-memory database compression techniques and executes data
management challenges with large datasets successfully.

Keywords: artificial intelligence, data management system, deep neural networks, machine learning.

References:

1. W. Wang, M. Zhang, G. Chen, H. V. Jagadish, B.C. Ooi, and K-L. Tan, “Database Meets Deep Learning: Challenges and
Opportunities,” SIGMOD Record, 45(2), 2016, pp.17-22.
2. A. Krizhevsky, I. Sutskever, and G. E. Hinton, “Imagenet classification with deep convolutional neural networks,” In Advances in
Neural Information Processing Systems vol.25, 2012, pp. 1097–1105.
3. T. Chen, B. Xu, C. Zhang, and C. Guestrin, “Training deep nets with sublinear memory cost,” arXiv preprint arXiv:1604.06174v2,
620. 2016. 3594-
4. J. Dean, G. Corrado, R. Monga, K. Chen, M. Devin, Q. V. Le, M. Z. Mao, M. Ranzato, A. W. Senior, P. A. Tucker, K. Yang, and A. Y.
Ng. Large scale distributed deep networks. In NIPS, 2012, 1232–1240.
35
5. P. Viviani, M. Drocco, D. Baccega, and M. Aldinucci, “Deep learning at scale,” In Proc. of 27th Euromicro International Conference 96
on Parallel Distributed and network-based Processing, IEEE, 2019.
6. T. Ben-Nun and T. Hoefler, “Demystifying Parallel and Dis-tributed Deep Learning: An In-Depth Concurrency Analysis,” CoRR, vol.
abs/1802.09941, 2018.
7. J. Schmidhuber, “Deep learning in neural networks: An overview,” Neural Networks, 61, 2015, 85–117,
8. D.Prabha, P.Manivanan, K. Devipriya and A. Priya, “Business Enterprise and Big Data: Evolving Database Challenges and
approaches,” International Journal of Pure and Applied Mathematics, 119(12), 2018, 627- 636
9. V. Ishakian, V. Muthusamy, and A. Slominski, “Serving deep learning models in a serverless platform,” In 2018 IEEE International
Conference on Cloud Engineering (IC2E), 2018, 257–262.
10. L. Deng, “A tutorial survey of architectures, algorithms, and applications for deep learning,” APSIPA Transactions on Signal and
Information Processing, 3(e2), 2014.
11. A. Kumar, M. Boehm and J. Yang (2017), “Data Management in Machine Learning: Challenges, Techniques, and Systems.”
SIGMOD’17, 2017, 14-19.
12. T. Kraska, Ameet Talwalkar, John Duchi, Rean Griffith, Michael J. Franklin, Michael Jordan, “MLbase: A Distributed Machine-
learning System,” 6th Biennial Conference on Innovative Data Systems Research (CIDR), Jan 2013, 6-9.
13. P. Domingos, “A Few Useful Things to Know About Machine Learning,” Communications of the ACM 55(10), 2012, pp.78–87.
14. M. Akdere, U. Cetintemel, M.Riondato, E. Upfal and S. Zdonik, “The Case for Predictive Database Systems: Opportunities and
Challenges,”5th Biennial Conference on Innovative Data Systems Research, 2011, pp.9-12.
15. M. Vartak, H. Subramanyam, W-E. Lee, S.Viswanathan, S. H.S. Madden and M. Zaharia, “MODELDB: A System for Machine
Learning Model Management,” SIGMOD Workshop HILDA, 2016.
16. F.F.Biessmann, D.Salinas, S. Schelter, P. Schmidt, and D. Lange, “ “deep” learning for missing value imputationin tables with non-
numerical data,” CIKM’18, 2018, 22-26.

Authors: D.Prabha, P.Manivannan, K.Balasubramanian

Paper Title: Deep neural network: Recognize Data Management of Artificial Intelligence in Retail
621. Abstract: Deep neural networks with the artificial intelligence on Machine Learning (ML) algorithms
3597-
constitute the best design specifically to deal with vast amount of data for retail business. The limited research
36
approach is referred towards reducing memory consumption on integrating ML algorithms on data management
02
system. This paper proposed combining data management and deep neural networks, ideas to build systems,
which vast amount data can share in the database system. Therefore, ML algorithm has a pattern with multi-
hidden layer that can use to synthesis different decision within a minimum processing. Finally, system precede
and follow a NoSQL layers of a model employs in-memory database compression techniques and executes data
management challenges with large datasets successfully.

Keywords: artificial intelligence, data management system, deep neural networks, machine learning.

References:

1. W. Wang, M. Zhang, G. Chen, H. V. Jagadish, B.C. Ooi, and K-L. Tan, “Database Meets Deep Learning: Challenges and
Opportunities,” SIGMOD Record, 45(2), 2016, pp.17-22.
2. A. Krizhevsky, I. Sutskever, and G. E. Hinton, “Imagenet classification with deep convolutional neural networks,” In Advances in
Neural Information Processing Systems vol.25, 2012, pp. 1097–1105.
3. T. Chen, B. Xu, C. Zhang, and C. Guestrin, “Training deep nets with sublinear memory cost,” arXiv preprint arXiv:1604.06174v2,
2016.
4. J. Dean, G. Corrado, R. Monga, K. Chen, M. Devin, Q. V. Le, M. Z. Mao, M. Ranzato, A. W. Senior, P. A. Tucker, K. Yang, and A. Y.
Ng. Large scale distributed deep networks. In NIPS, 2012, 1232–1240.
5. P. Viviani, M. Drocco, D. Baccega, and M. Aldinucci, “Deep learning at scale,” In Proc. of 27th Euromicro International Conference
on Parallel Distributed and network-based Processing, IEEE, 2019.
6. T. Ben-Nun and T. Hoefler, “Demystifying Parallel and Dis-tributed Deep Learning: An In-Depth Concurrency Analysis,” CoRR, vol.
abs/1802.09941, 2018.
7. J. Schmidhuber, “Deep learning in neural networks: An overview,” Neural Networks, 61, 2015, 85–117,
8. D.Prabha, P.Manivanan, K. Devipriya and A. Priya, “Business Enterprise and Big Data: Evolving Database Challenges and
approaches,” International Journal of Pure and Applied Mathematics, 119(12), 2018, 627- 636
9. V. Ishakian, V. Muthusamy, and A. Slominski, “Serving deep learning models in a serverless platform,” In 2018 IEEE International
Conference on Cloud Engineering (IC2E), 2018, 257–262.
10. L. Deng, “A tutorial survey of architectures, algorithms, and applications for deep learning,” APSIPA Transactions on Signal and
Information Processing, 3(e2), 2014.
11. A. Kumar, M. Boehm and J. Yang (2017), “Data Management in Machine Learning: Challenges, Techniques, and Systems.”
SIGMOD’17, 2017, 14-19.
12. T. Kraska, Ameet Talwalkar, John Duchi, Rean Griffith, Michael J. Franklin, Michael Jordan, “MLbase: A Distributed Machine-
learning System,” 6th Biennial Conference on Innovative Data Systems Research (CIDR), Jan 2013, 6-9.
13. P. Domingos, “A Few Useful Things to Know About Machine Learning,” Communications of the ACM 55(10), 2012, pp.78–87.
14. M. Akdere, U. Cetintemel, M.Riondato, E. Upfal and S. Zdonik, “The Case for Predictive Database Systems: Opportunities and
Challenges,”5th Biennial Conference on Innovative Data Systems Research, 2011, pp.9-12.
15. M. Vartak, H. Subramanyam, W-E. Lee, S.Viswanathan, S. H.S. Madden and M. Zaharia, “MODELDB: A System for Machine
Learning Model Management,” SIGMOD Workshop HILDA, 2016.
16. F.F.Biessmann, D.Salinas, S. Schelter, P. Schmidt, and D. Lange, “ “deep” learning for missing value imputationin tables with non-
numerical data,” CIKM’18, 2018, 22-26.
Authors: P. Pandian, K. Kavitha

Paper Title: Cost Sensitivity Ranges in Rough Set Interval Transportation Problem
Abstract: A new technique namely, upper-lower bound technique is projected for solving the cost sensitivity
analysis of fully rough integer transportation problem. Numerical sample is given to indicate the productivity of
the projected technique.

Keywords: Transportation problem (TP), rough integer intervals, upper-lower bound algorithm, sensitivity
analysis (SA).

References:

1. M.A.E E1-Sisy, Osman MSA and Eid MH, “On duality of Multi objective convex programming problem”, Applied and computational
mathematics, 4, 2015, pp.1-4.
2. Hengrong Ju, “Cost-sensitive rough set approach, Informatics and Computer Science”, Intelligent Systems, Applications, 355, 2016,
pp.282-298.
3. Hongwei Lu, Guohe Huang, Li He, “An inexact rough-interval fuzzy linear programming method for generating conjunctive water-
allocation strategies to agricultural irrigation systems”, Applied Mathematical Modelling, 35, 2011, pp. 4330-4340.
4. H.S.Kasana, K.D Kumar, “Introductory Operations Research: Theory and Applications”, Springer International Edition, New Delhi,
2005. 3603-
5. P. Kundu. S .Kar, M.Maiti, “Some solid transportation model with crisp and rough costs”, World Academy of Science, Engineering 36
Technology, 73, 2013, pp.185-192. 07
622. 6. B. Liu, Theory and practice of uncertain programming, Physical Verlag, Heidel berg, 2012.
7. M.s.Osman. E.F Lashein, E.A. Younes and T.E.M Attya, “Rough mathematical programming optimization”, A Journal of
Mathematical Programming and Operations Research, 58, 2009, pp.1-8.
8. P. Pandian, G. Natarajan, and A.Akilbasha, “Fully rough integer interval transportation problem”, International Journal of Pharmacy
and Technology, 8, 2016, pp.13866-13876.
9. P.Pandian, K. Kavitha, “Sensitivity analysis in solid transportation problem”,Applied Mathematical Sciences, 136, 2012, pp.6787-
6796.
10. Z. Pawlak, “Rough sets”, International Journal of Computer and Information Science, 11,1982, pp.341-356.
11. Shujiao Liao, Qingxin Zhu, and Fan Min, “Cost sensitive attribute reduction in decision-Theoretic rough set models”,2014, pp.1-9.
12. Shu Xiao, M.K. Edmund, Lai, “A rough programming approach to power-aware VLIW instruction schduling for digital signal
processors”, Proc ICASSP,2005,pp.141-144.
13. Subhakanta Dash, S.P Mohanty, “Transportation programming under uncertain environment”, International Journal of Engineering
Research and Development, 7, 2013, pp.22-28.
14. J.Xu, L.Yao, “A class of two person zero sum matrix game with rough payoffs”, International Journal of Mathematics and
Mathematical Sciences, 2010, pp.1-22.
15. J.Xu, B.Li, D. Wu, “Rough data development analysis and its application to supply chain performance evaluation”, International
Journal of Production and Economics, 122, 2009, pp.628-638.
16. E.Youness, “Characterizing solutions of rough programming problems”, European Journal of Operations Research, 168, 2006,
pp.1019-1029.

Authors: Sachin K Murali, A. Shanmugasundaram


Influence of Gr, MoS2 and BN on the Hardness and Wear resistance of AA2014 Hybrid
Paper Title:
Composite after Artificial Aging
Abstract: The main objective of this research work is to study the effect of tribological behaviors and
mechanical properties of Aluminium alloy 2014 (AA2014) hybrid composite reinforced with Boron Nitride
(BN), Molybdenum disulfide (MoS2) and graphite (Gr). Stir casting technique is used for the fabrication of this
composite material. The composite is subjected to three step ageing process which consists of solution heat
treatment, quenching and aging. The base alloy was reinforced with 4 wt.% of BN, 4wt.% MoS2 and 4, 6, 8
wt.% of Gr. The hardness of the composite steadily increased up to 6 wt. % of graphite and further increase in
graphite decreases the hardness. The sample with Graphite of 4 wt. % resulted in maximum hardness of 192
HV with respect to AA2014 base hardness. Addition of graphite up to 6% resulted in lower wear rate when
compared to the base metal. The wear rate of sample with Graphite of 4 wt. % is reduced by 49 % from that of
the base metal at maximum wear condition. Scanning Electron Microscope (SEM), Energy-dispersive X-ray
Spectroscopy (EDX) and X-Ray Diffraction (XRD) were used for the characterization of composite.

Keywords: Stir Casting, AA2014, Boron Nitride, Graphite.

References:

1. Prasad, N. Eswara, R.J.H Wanhill, Aerospace materials and Material Technologies, 1stedn. (Springer, Singapore, 2017), pp. 29-52.
2. B.VijayaRamnath, C.Elanchezhian, R M Annamalai, S Araving. T. SriAnandaAtreya, Vignesh and Subraamanian, Aluminium metal
matrix composites - a review,Rev.Adv.Mater.Sci.38, pp.55-60, 2014.
3. Prem Shankar Sahu and R. Banchhor, "Fabrication methods used to prepare Al metal matrix composites- A review" Int Res J. Engg.
Tech. , vol.03, pp.123-132,2016.
4. M.K Muhammed Favas, Thomas George Panicker and V. Umasankar," Synthesis and Testing of AA2014-Al2O3 (alpha)
5. Nano-Composite" J Chem Pharm Res, pp.14-17, 2017.
6. Sahin, " Preparation and some properties of SiC particle reinforced aluminium alloy composites"Mater. Des, vol.24, pp.671-679, 2003.
7. C. Mallikarjuna , S.M. Shashidhara, U.S. Mallik and K.I. Parashivamurthy," Grain refinement and wear properties evaluation of
aluminum alloy 2014 matrix-TiB2 in-situ composites" Mater. Des., vol. 32, pp.3554-3559, 2011.
8. M Ekambaram, M Vetrivel,DBalaji, Abdul ShahidAfrid, Bhuma,Naveenkumar, Daruga Raja Manikanta,DaraAmruthraj,
623. KalidasuJayaram and Krishna,"Tribological characteristics of Aluminium metal matrix with nano BN powder metallurgy composite",
Mater Sci Eng., pp.1-6, 2018. 3608-
9. R. Palanivel, I. Dinaharan, R.F. Laubscher and J. Paulo Davimb, " Influence of boron nitride nanoparticles on microstructure and wear 36
behavior of AA6082/TiB2 hybrid aluminum composites synthesized by friction stir processing"Mater. Des, vol.106, pp.195-204, 2016.
10. Jens Eichler and ChristophLesniak, " Boron nitride (BN) and BN composites for high-temperature applications" J. Eur. Ceram. Soc., 13
vol. 28, pp.1105-1109, 2008.
11. W O Winer, "Molybdenum Disulfide as a lubricant:A reviewof the fundamental knowledge" Wear. , vol10, pp.422-452, 1967
12. BhargaviRebbaa, N.Ramanaiahb," Evaluation of Mechanical Properties of Aluminium Alloy (Al-2024) Reinforced with Molybdenum
Disulphide (MOS2) Metal Matrix Composites" Proc Mat Sci, vol.6, pp.1161-1169, 2014.
13. KannappanSomasundaraVinoth, Ramanathan Subramanian, Somasundaram Dharmalingam and BaluAnandavel, " Mechanical and
Tribological characteristics of Stir-Cast Al-Si10Mg and Self lubricating Al-Si10Mg/MoS2 Composites", Mater Technol. vol.46 ,
pp.497-501, 2012.
14. Adel Mahmood Hassan," Effect of Graphite and/or Silicon Carbide Particles Addition on the Hardness and Surface Roughness of Al-4
wt% Mg Alloy" J. Compos. Mater., https://doi.org/10.1177/0021998306063804, 2007.
15. Slobodan Mitrovi, MiroslavBabi, BlažaStojanovi and Nenad
Miloradovi, "Tribological Potential of Hybrid Composites Based on Zinc and Aluminium Alloys Reinforced with SiC and Graphite
16. Particles" SERBIATRIB ’11, ISBN:9788686663740,2011.
W.Q Song, P Krauklis,A.PMouritz and SBAndyopadhyay," The effect of thermal ageing on the abrasive wear behaviour of
agehardening 2014 Al/Sic and 6061 Al/SIC composites",Wear., vol.185, pp125-130, 1995
17. R. Sadeler , Y. Totik, M. Gavgal and I. Kaymaz, " Improvements of fatigue behaviour in 2014 Al alloy by solution heat treating and
age-hardening" Mater. Des., vol.25, pp.439-445, 2004.
18. S. Mahathanabodee, T.Palathai , S.Raadnui , R.Tongsri and N.Sombatsompop, " Dry sliding wear behavior of SS316L composites
containing h-BN and MoS2 solid lubricants " Wear., vol.316, pp.37-48, 2014.
19. N.G Siddesh Kumar, V.M Ravindranath and G.S Shiva
Shankar," Mechanical and Wear Behaviour of Aluminium Metal
20. Matrix Hybrid Composites" Proc Mat Sci., vol.5, pp.908-917, 2014.
21. B. Kotiveera Chari and A. Chennakesava Reddy, " Interfacial Debonding of Boron Nitride Nanoparticle Reinforced 6061
Aluminum Alloy Matrix Composites" 2nd National
Conference on Materials and Manufacturing Processes, 2000.
22. A.Shanmugasundaram, Sanjivi Arul and R.Sellamuthu, " Study on the Effect of GTA Surface Melting and SiC Reinforcement
23. on the Hardness, Wear and Corrosion Properties of AA 5086", Mater. Today, vol.5, pp.6597-6606, 2018.
24. A. Shanmugasundaram, Sanjivi Arul and R. Sellamuthu," Investigating the Effect of WC on the Hardness and Wear
25. Behaviour of Surface Modified AA 6063" Trans Indian InstMet., vol.71, pp.117, 2017.
26. Johny James, Venkatesan, Kuppan and Ramanujam, " Hybrid Aluminium Metal Matrix Composite Reinforced With SiC
27. and TiB2" Procedia Eng., vol.97, pp.1018-1026, 2014.

Authors: N.I. Tukenova, R.G. Ramazanov, M.L. Gruzdeva, T.Zh. Baydildinov, Sh.A. Naubetova,

Paper Title: Methodology for Developing E-learning Courses in IT Education


Abstract: The development of educational processes in the universities of Kazakhstan in modern conditions
624. occur in the following areas: individualization of educational methods, the transition to a continuous educational
3614-
technology, the use of information technology in the educational process. The emergence of a new form of
36
distance learning has fundamentally changed the idea of organizing the educational process as a whole. The use
16
of modern educational technologies allows to increase the number of university students served. Relevance The
article describes the implementation of this process, which is associated with the solution of a number of issues
such as: developing an infrastructure for e-learning: developing new methods and training and sets of programs
to support a single information space: developing e-courses: training students in using e-learning tools for
training. Methods In the context of ubiquitous informatization, interactive forms of interaction are needed,
covering a large contingent of students, ensuring the mobility of the teaching staff. The only form corresponding
to these requirements is distance learning presented in the form of a whole range of technologies ensuring the
delivery of the main volume of the material being studied to students, interactive interaction of students and
teachers in the learning process, providing the learner with the opportunity for independent work on mastering
the material being studied as well as in the learning process. Results Remote educational technologies in
teaching students are one of the important activities of the university. The Faculty of Distance Learning provides
technological support for the educational process, conducts training for teaching staff in distance learning
technologies. Discussion The authors of the article describe the technology of remote learning using information
and communication tools of the Internet. Development of distance courses based on state standards of the
Republic of Kazakhstan and compiled taking into account the experience of European universities - leaders in
the field of e-learning. Conclusion The authors of the article believe that the increasingly widespread term “e-
learning” includes the use of information and communication technologies (ICT), which, potentially, can be
used in education, is rapidly expanding.

Keywords: e-learning, information and communication technologies (ICT), distance learning technologies.

References:

1. M.L. Gruzdeva, O.N. Prokhorova, A.V. Chanchina, E.A. Chelnokova, E.V. Khanzhina, (2018) Post-graduate information support for
graduates of pedagogical universities. Advances in Intelligent Systems and Computing, 622, pp. 143-151
2. Z.V. Smirnova, M.L. Gruzdeva, Z.V. Chaykina, O.S, Terekhina, A.A. Tolsteneva, N.H. Frolova, (2016) The role of students'
classroom independent work in higher educational institutions. Indian Journal of Science and Technology, 9(22), 95568.
3. N.T. Danayev, D.Zh. Ahmed-Zaki, M.E. Mansurova, A.U. Pyrkova E-LEARNING in the field of IT education Teaching aid. 2014
4. G. Gibbs, C. Simpson, (2004) Conditions under which assessment supports student’s learning. Learning and Teaching in Higher
Education, Vol. 1, pp.3-31.
N.I. Tukenova, G.A. Mursakimova, M.L. Gruzdeva, K.Zh. Chetiyeva, A.U. Elepbergenova, A.A.
Authors:
Iskakova
Paper Title: Educational Multimedia-Resources in Education
Abstract: Educational multimedia resources are included in the learning process as a "support" means. In this
case, information resources serve as a means of intensifying the training process, individualization of learning
and partial automation of routine work of the teacher related to the integration, monitoring and evaluation of
students' knowledge.Relevance The article discusses the fundamental changes occurring in all spheres of society
in connection with the introduction of information and communication technologies (ICT), not only open up
broad opportunities for the development and information support of the individual, but also pose new challenges
for the education system [1]. In the most general form, these tasks are aimed at the formation of the individual’s
readiness for life and professional activity in the information society. Thus, the modern social order requires the
improvement of professional training of specialists owning information and communication technologies,
including multimedia technologies.Methods The use of multimedia tools to control knowledge. Such tools can
be used both for intermediate knowledge testing (within the study of one topic of the course of database
fundamentals), and for the final knowledge test (after studying a section or course). As a rule, students have a
positive attitude towards tests submitted using a computer, and in determining the results there are no problems
with biased (formal) grading. Such tests depending on the level of complexity, the number of questions and
other parameters can be used at any stage of the study of the discipline.Results Students may encounter some
difficulties caused by lack of experience with the test form of control. Testing requires students not only
625. knowledge of a certain educational material, but also the ability to work with it, i.e. understand the specifics of 3617-
the test tasks. To do this, apply in the classroom interactive tests. The Internet is also used to solve tests in on- 36
line mode.Organized in the classroom and after school hours, working with interactive tests forms the students' 20
core information competencies, and for many they are the ones that are most relevant today and will be needed
in the future.Discussion The authors of the article describe the introduction of multimedia resources, their
presentation as a complex process leading to changes in the content of education, revision of the methods and
forms of organization of the educational process, the construction of holistic courses based on the use of
meaningful content of information sources in individual disciplines. Conclusion It is important to note that in
most universities of the Republic of Kazakhstan teachers and students are not developers of multimedia
resources used in education. Most often, teachers and trainees act as users of such tools. However, practice
shows that every year an increasing number of teachers can not stay away from the development of simple, but
electronic means of teaching. In this regard, it is advisable for a modern teacher to have an idea of how to
develop high-quality multimedia resources, and about hardware and software — tools for creating computer-
based learning tools.

Keywords: multimedia, multimedia resources, database management systems (DBMS).

References:

1. E.Y. Bidaybekov (2012) For the preparation of teachers in the field of informatization of education Proceedings of the 3rd International
Scientific and Practical Conference Informatization of Society. – Astana: ENU n.a.. L.N. Gumilev, pp..207-209
2. N.I. Tukenova (2010) The use of multimedia in teaching the basics of databases in the preparation of students in the specialty
"information systems". Dissertation cand. ped. sc. / Almaty. 124 p.
3. V.V. Grinshkun, S.G. Grigoryev (2006) Educational electronic publications and resources. Educational and methodical manual for
students of pedagogical universities and students of the system of advanced training of educational workers. Kursk: KSU, Moscow:
МSPU – 2006, 98 p.

Authors: Rudresh.B.Magadum, D.B.Kulkarni


Energy Loss Minimization by Optimal Siting and Sizing of DG with Network Reconfiguration in
Paper Title:
Distribution Networks
Abstract: The main aim of the distribution system is delivery the power to the consumers. Because of, aging of
electrical infrastructure, old control mechanism, increased power demand causing exploitation of the present
electrical networks leads to low voltage profile, more active and reactive power loss with various power quality
related issues causing poor network operation. In this method maximization of voltage profile with energy loss
minimization is carried using network reconfiguration along with optimal siting of the distributed generation
(DG). The proposed methodology is carried out on five bus system. The obtained results are impressive interms
of voltage stability and power loss reduction.

Keywords: Network reconfiguration; percentage power loss; Distributed generation; Voltage profile;
Conventional method; voltage stability; reliable; distributed network and power saving.

References:

1. Rudresh Magadum, D.B.Kulkarni, “Power loss reduction by optimal location of DG using fuzzy logic”, IEEE International Conference
on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM-2015), Vel-Tech
University, Chennai, T.N., India. May 6 – 8, 2015. pp.338-343.
2. John J Grainger, William D Stevenson, “Power system analysis”, McGraw Hills.
3. Rudresh B Magadum, D.B.Kulkarni, “Optimal Location and Sizing of Multiple DG for Efficient Operation of Power System”, 4th
IEEE International Conference on Electrical Energy Systems (ICEES-2018), SSN College of Engineering, Chennai, T.N., India.
February 7-9, 2018.
4. MiPower user manual by Power research Development and Consultants Bangalore.
5. Rudresh. B. Magadum, D.B.Kulkarni, “Optimal Placement of Distributed Transformer with STATCOM to Enhance the Efficiency of
the Distribution Networks”, International Journal of Recent Technology and Engineering (IJRTE), Volume-8, Issue-2, pp.3720-3725,
July 2019.
6. Alexandra von Meier, “Electric Power Systems: A Conceptual Introduction”, Wiley-IEEE Press , July-2006.
7. J. S. Savier and D. Das, “Impact of network reconfiguration on loss allocation of radial distribution systems”, IEEE Trans. Power Del.,
vol.2, no. 4, pp. 2473–2480, Oct. 2007.
8. Rudresh B Magadum, D.B.Kulkarni, “Optimal Placement of Capacitor to Enhance the Efficiency of the Distribution Network”,
International Journal of Innovative Technology and Exploring Engineering (IJITEE), Volume-8 Issue-9, pp 2877-2881, July 2019,
9. M. Mosbah, S. Arif, and R. D. Mohammedi, “Multi-Objective Optimization for Optimal Multi DG Placement and Sizes in Distribution
626. Network based on NSGA-II and Fuzzy Logic Combination” IEEE conference ICEE-2017. 3621-
10. Rudresh B Magadum, D.B.Kulkarni, “Improvement of Voltage Profile by using Line Reconfiguration and Distribution Transformer 36
Placement”, IEEE international conference on Energy Efficient Technologies (ICEET-2016), St.Xevier’s Catholic College of
Engineering, Nagercoil, T.N., India, April-2016, pp-330-335.
25
11. N. H. Ahmad, T. K. A. Rahman, and N. Aminuddin, “Multi-objective quantum-inspired Artificial Immune System approach for
optimal network reconfiguration in distribution system,” in 2012 IEEE International Power Engineering and Optimization Conference,
Melaka, Malaysia, 2012, pp. 384–388.
12. Rudresh B Megadum, D.B.Kulkarni, “Minimization of Power Loss with Enhancement of the Voltage Profile using Optimal Placement
of Distribution Transformer and Distributed Generator”, IEEE international conference on Communication and Signal Processing
(ICCSP-2019) Adhiparashakti College of Engineering, Melmavaruthur, T.N., India. April 4-6, 2019, pp-392-395.
13. G. Niazi and M. Lalwani, “PSO based optimal distributed generation placement and sizing in power distribution networks: A
comprehensive review,” in 2017 International Conference on Computer, Communications and Electronics (Comptelix), Jaipur, India,
2017, pp. 305–311.
14. Rudresh B Magadum, D.B.Kulkarni, “Optimal Placement and Sizing of Multiple Distributed Generators using Fuzzy Logic”, Fifth
IEEE International Conference on Electrical Energy Systems (ICEES-2019), SSN College of Engineering, Chennai, T.N., India.
February 21-22, 2019.
15. Mohan N., Ananthapadmanabha T., and A. D. Kulkarni, “A Weighted Multi-objective Index Based Optimal Distributed Generation
Planning in Distribution System,” Procedia Technology, vol. 21, pp. 279–286, 2015.
16. Rudresh B Magadum, Sateesh N Dodamani and D.B.Kulkarni, “Optimal Placement of Unified Power Flow Controller (UPFC) using
Fuzzy Logic”, Fifth IEEE International Conference on Electrical Energy Systems (ICEES-2019), SSN College of Engineering,
Chennai, T.N., India. February 21-22, 2019.
17. Tejaswi Timasani, Rudresh B Magadum, “Minimization of power loss in distributed networks by different techniques”, IJSER volume
3, issue-5 pp. 521-557
18. Thomas Allen Short, “Electric Power Distribution Equipment and Systems”, CRC publishers, Nov-2015.

Authors: T. Murali Krishna, K. KrishnaVeni, G. Suresh Babu, D. Sushma, C. Harish


Performance Evaluation of Induction Motor for Unipolar and Bipolar Pulse Width Modulation
Paper Title:
Techniques
Abstract: Inverter is an interface device between a dc source and ac loads which converts DC voltage to a
variable voltage, variable frequency AC voltage. While converting, it introduces harmonics in the output of the
627. system which results in additional heating of induction motors. Hence in order to diminish these harmonics,
different techniques are introduced viz. external and internal control techniques in which the latter is more 3626-
efficient. Out of the all proposed methods, the internal control of inverter which is also called as Pulse Width 36
Modulation (PWM) can be achieved either using unipolar modulation technique or bipolar modulation 29
technique. In this paper, the control circuitry to model unipolar and bipolar modulation methods is simulated
and their performance is checked on an induction motor and compared in MATLAB Simulink environment.
Keywords: Unipolar modulation, bipolar modulation, induction motor, total harmonic distortion, lower order
harmonics.

References:

1. Ali Algaddafi, Khalifa Elnaddab, Abdullah Al Ma’mari, and Abdelrahim Nasser Esgiar “Comparing the Performance of Bipolar and
Unipolar Switching Frequency to Drive DC-AC Inverter” IEEE International Renewable and Sustainable Energy Conference (IRSEC),
2016.
2. Amit Kumar Sharma , Ashok Kumar Sharma & Nidhi Vijay “Unipolar and Bipolar SPWM Voltage Modulation Type inverter for
Improved Switching Frequencies” , International journal of engineering sciences & research technology, Vol.3 Issue 8,August, 2014.
3. S.M. Ayob, Z.Salam, and A.Jusoh“ Trapezoidal PWM Scheme for Cascaded Multilevel Inverter” First International Power and Energy
Coference 2006
4. Satish Kumar Peddapelli “Pulse Width Modulation Analysis and performance in Multi level Inverter” De Gruyter Oldenbourg; 1
edition.
5. T. Murali Krishna, “Performance Analysis of Five Level Neutral Point Clamped Inverter with and Without Pulse Width Modulation”,
International Journal of Innovative Research & Studies, Vol.8, Issue.4, 2018.
6. T. Murali Krishna, “Effect of Pulse Width Modulation on the Performance of Hybrid Cascaded Five Level Inverter”, International
Journal of Science and Research, Vol.4, Issue.12, 2015.

Authors: K S R Murthy, K Umakantham, K S N Murthy, B T P Madhav


Design and Analysis of a Reconfigurable Antenna for Dual Band ISM Medical and Wi-Fi
Paper Title:
Applications
Abstract: A hybrid reconfigurable reception apparatus is intended to work in ISM medicinal band (2.5 GHz)
and Wi-Fi working groups (3.4 GHz). A winding sort of transmitting structure with absconded ground is taken
in the development of the proposed receiving wire show. The planned model is furnishing recurrence
reconfigurability and polarization reconfigurability with great impedance data transfer capacity and hub
proportion transmission capacity. The created model estimation results are giving incredible connection
reenactment results got from HFSS instrument. Explanatory examination as for the reflection coefficient,
radiation design with LHCP and RHCP and hub pro- portion are displayed in this work.

Keywords: Dual Band, Frequency Reconfigurability, Left Hand Circular Polarization, Polarization
Reconfigurability, Right Hand Circular Polarization.

References:

1. Lo Y.T., Lee S.W. Antenna hand Book, Theory, Applications, and Design, New York: Vav Nostrand Reinhold, ch. 21, 1988.
2. B. Sadasivarao, “Analysis of Hybrid Slot Antenna based on Substrate Permittivity”, ARPN Journal of Engineering and Applied
Sciences, ISSN 1819-6608, Vol. 9, No. 6, (2014), pp 885-890.
3. P Syam Sundar, Sarat K Kotamraju, T V Ramakrishna, Novel Min- iatured Wide Band Annular Slot Monopole Antenna, Far East
Jour- nal of Electronics and Communications, ISSN: 0973-7006, Vol 14, No 2, (2015), pp 149-159.
628. 4. P. Lakshmikanth, Kh Takeshore, Printed Log Periodic dipole antenna with Notched filter at 2.45 GHz Frequency for wireless 3630-
communication applications, Journal of Engineering and Applied Sciences, ISSN: 1816-949X, Vol 10, Issue 3, (2015), pp 40-44. 36
5. B.T.P. Madhav, D. Ujwala, Habibulla Khan, Multiband slot aperture stacked patch antenna for wireless communication applications, 34
International Journal of Computer Aided Engineering and Technol- ogy, ISSN: 1757-2657, Vol. 8, No. 4, (2016), pp 413-423
6. V. Sai Krishna, P. Pardhasaradhi, High Bandwidth Circularly Polarized X-Slot Antenna, Far East Journal of Electronics and
Communications, ISSN: 0973-7006, Volume 16, Number 3, (2016), Pages 561-572.
7. Y. S. V. Raman, Analysis of Circularly Polarized Notch Band Antenna With DGS, ARPN Journal of Engineering and Applied
Sciences, ISSN: 1819-6608, Vol. 11, No. 17, (2016).
8. Abdul Rahiman Sheik, Kalva Sri Rama Krishna, Circularly Polarized Defected Ground Broadband Antennas for Wireless
Communication Applications, Lecture Notes in Electrical Engineering, ISSN: 1876-1100, Vol 434, (2017), pp 419-427.
9. P. Poorna Priya, Habibulla Khan, Defected Ground Structure Circularly Polarized Wideband Antennas for Wireless Communication
Applications, Journal of Advanced Research in Dynamical and Control Systems, Vol 9, No 18, (2017), pp 122-130.
10. Pandey G. P., Kanaujia B. K., Gupta S. K., Gautam A. K. A Novel C Shape Antenna with Switchable Wideband Frequency Notch,
Wireless Personal Communications, (2015), 80, 471-482.
11. Singh D. K., Kanaujia B. K., Dwari S., Pandey G. P., Kumar S. Reconfigurable Circularly Polarized Capacitive Coupled Microstrip
Antenna, International Journal of Microwave and Wireless Tech- nologies, (2016), 9, 843-850.
12. Chang K., Bahl I., Nair V. RF and microwave circuit and component design for wireless system, New York: Wiley Inderscience,
(2002).
13. Sung Y.J., Jang T.U., Kim Y.S.; A reconfigurable Microstrip antenna for switchable polarization, IEEE Microwave and Wireless
Components Letters, (2004), 14, 534 – 36.
14. Chenn R.H., Row J.S. Single fed microstrip patch antenna with switchable polarization, IEEE Transactions on Antennas and Prop-
agation, (2008), 56, 922 – 26.
15. Kim B., Pan B., Kim Y.S., Papapolymerou J., Tentzeris M.M. A novel single feed circular microstrip antenna with reconfigurable
polarization capability, IEEE Transactions on Antennas and Propagation, 56-3, march (2008).

Authors: N.V.P.R. Durga Prasad, C. Radhakrishna


Paper Title: Substation Maintenance Optimization By Considering Ageing Equipment
Abstract: Distribution utilities are facing multitude of challenges like cost optimization, profit maximization,
increasing customer satisfaction, government subsidies and changing technology. These myriad of goals are
making the utilities to treat the operating and maintaining substations and their assets as a business process and it
629.
goal is to maximize the Return On Investment (ROI) on each asset. This is achieved by maintaining each asset at 3635-
its optimal condition with minimum maintenance cost so as to yield more revenue per asset. Maintenance is a 36
core process and a tweaking parameter in the asset management. Well optimized maintenance management 42
along with the structured life cycle asset management will guarantee the overall performance. Maintenance
optimization is carried out using the equipment models considering the effect of maintenance and deterioration
due to aging. Objective function for Optimization is minimizing the maintenance cost and cost due to
interruptions.

Keywords: About four key words or phrases in alphabetical order, separated by commas.

References:

1. Jana Galambosova and Vladimir Rataj “Design of condition – Based decision support system for preventive maintenance”, , 2017 Acta
Technologica Agriculturae, pp.19-22.
2. Alain lamarche and Pierre Samson, “Development of an Equipment Maintenance management support system 2008 International
oil spillconference, pp.454-458.
3. Mohammad zarei,hetic ,“Correct modeling for maintenance scheduling”, 2018 Iranian conference on electrical Engineering, pp.1356-
1361.
4. J. Endrenyi, S. Aboresheid, R.N. Allan, G.J. Anders, S. Asgarpoor, R Billinton, N. Chowdhury, E.N. Dialynas, M.Fipper, R.H.
Fletcher, and Ch. Singh, C. Grigg, J. Mccalley, S. Meliopoulos, T.C. Mielnik, P. Nitu, N. Rau, N.D. Reppen, L. Salvaderi and A.
Schneider, “The present status of maintenance strategies and the impact of maintenance on reliability”, 2001 IEEE Transactions on
power systems, pp.638-646.
5. Ling wang, Jian chu, Weijie mao and Yongfeng Fu ,“Advanced maintenance strategy for power plants – introducing intelligent
maintenance systems, 2006 the 6th world congress on intelligent control and automation, pp.7444-7448.
6. Y. Suzuki, H. Kojima, N. Hayakawa, F. Endo and H. Okubo, "Optimization of asset management in high voltage substation based on
equipment monitoring and power system operation," 2010 IEEE International Symposium on Electrical Insulation, San Diego, CA,
2010, pp. 1-5.
7. R. Billinton and G. Lian “Monte Carlo approach to substation reliability evaluation”, Volume 140, Issue 2, March 1993, p. 147 – 152.
8. Haifeng Ge “Maintenance Optimization for Substations with Aging Equipmen”, Phd Thesis.
9. Haifeng Ge, and Sohrab Asgrapoor, “Reliability and maintainability improvement of substations with aging infrastructure”,2012 IEEE
transactions on power delivery, pp.1868-1876.
10. N. Sudket and S. Chaitusaney, "Optimization of substation equipment maintenance by considering equipment deterioration," 2014
International Electrical Engineering Congress (iEECON), Chonburi, 2014, pp. 1-4.

Authors: R. Sivaranjani, A.V. Senthil Kumar

Paper Title: Efficient Health Monitoring Networks Using Secured Energy Aware (SEA) Scheme
Abstract: The volume of healthcare information is rapidly growing. Collecting and securing information
gathered through a Wireless Sensor Network (WSN) is an open challenge. The integrity and confidentiality of
the information is to be ensured, failing to do which will lead to fatal consequences. Further, conserving energy
is a challenge in WSN. Hence, in this paper a Secured Energy Aware (SEA) scheme is proposed. Only
authenticated nodes communicate to the Fusion Centres (FCs) which collect the data and forward to the Sink or
other FCs, thus avoiding redundancy. The propounded scheme offers better results in contrast to the existing
scheme in terms of Packet Delivery Ratio (PDR), Throughput, Residual Energy, Packet Loss Ratio (PLR) and
Routing Overhead.

Keywords: Security, Authentication, Residual Energy (RE).

References:

1. Abbasi, AA, & Younis, M 2007, ‘A survey on clustering algorithms for wireless sensor networks’, Journal of Computer
Communications, vol. 30, no.14, pp. 2826-2841.
2. Anitha, RU, & Kamalakkannan, P 2013, ‘Enhanced cluster based routing protocol for mobile nodes in wireless sensor network’,
Proceedings of the International Conference on Pattern Recognition, Information and Medical Engineering (PRIME), pp. 187 - 193.
3. Anno, J, Barolli, L, Durresi, A, Xhafa, F, & Koyama, A 2008, ‘Performance evaluation of two fuzzy-based cluster head selection
systems for wireless sensor networks’, Journal of Mobile Information Systems, vol. 4, no. 4, pp. 297-312.
4. Awwad, SA, Ng, CK, Noordin, NK, & Rasid, MFA 2011, ‘Cluster based routing protocol for mobile nodes in wireless sensor
network’, Journal of Wireless Personal Communications, vol. 61, no. 2, pp. 251-281.
630. 5. Bagci, H, & Yazici, A 2010, ‘An energy aware fuzzy unequal clustering algorithm for wireless sensor networks’, Proceedings of the 3643-
IEEE International Conference on Fuzzy Systems (FUZZ), pp. 1-8.
6. Bari, A, Wazed, S, Jaekel, A, & Bandyopadhyay, S 2009, ‘A genetic algorithm based approach for energy efficient routing in two-
36
tiered sensor networks’, Journal of Ad Hoc Networks, vol. 7, no. 4, pp. 665-676. 49
7. Bayraklı, S, & Erdogan, SZ 2012, ‘Genetic algorithm based energy efficient clusters (gabeec) in wireless sensor networks’, Procedia
Computer Science, vol. 10, pp. 247-254.
8. Bharti, A, & Sharma, K 2013, ‘Comparative Study of Clustering based Routing Protocols for Wireless Sensor Network’, Journal of
Computer Applications, vol. 66, no. 21.
9. Bhattacharjee, S, & Bandyopadhyay, S 2013, ‘Lifetime maximizing dynamic energy efficient routing protocol for multi hop wireless
networks’, Journal of Simulation Modelling Practice and Theory, vol. 32, pp.15-29.
10. Boyinbode, O, Le, H, & Takizawa, M 2011, ‘A survey on clustering algorithms for wireless sensor networks’, Journal of Space-Based
and Situated Computing, vol. 1, no. 2-3, pp. 130-136.
11. Chakra borty, A, Mitra, SK, & Naskar, MK 2011, ‘A Genetic algorithm inspired routing protocol for wireless sensor networks’,
Journal of Computational Intelligence Theory and Practice, vol. 6, no. 1, pp. 1-8.
12. Chebrolu, K, & Dhekne, A 2013, ‘Esense: Energy sensing-based cross-technology communication’, IEEE Transactions on Mobile
Computing, vol. 12, no.11, pp. 2303-2316.
13. Chinara, S, & Rath, SK 2009, ‘A survey on one-hop clustering algorithms in mobile ad hoc networks’, Journal of Network and
Systems Management, vol. 17, no. 1-2, pp. 183-207.
14. Dechene, DJ, Jardali, AE & Sauer, MLA 2007, ‘A Survey of Clustering Algorithms for Wireless Sensor Networks’, Journal of
Computer Communications.
15. Deng, S, Li, J, & Shen, L 2011, ‘Mobility-based clustering protocol for wireless sensor networks with mobile nodes’, Journal of IET
Wireless Sensor Systems, vol. 1, no. 1, pp. 39-47.
16. Deshpande, VV, & Patil, ARB 2013, ‘Energy efficient clustering in wireless sensor network using cluster of cluster heads’,
Proceedings of the tenth IEEE International Conference on Wireless and Optical Communications Networks (WOCN) , pp. 1-5.
17. Du, X, Xiao, Y, & Dai, F 2008, ‘Increasing network lifetime by balancing node energy consumption in heterogeneous sensor
networks’, Journal of Wireless Communications and Mobile Computing, vol. 8, no. 1, pp. 125-136.
18. Gupta, SK, Kuila, P, & Jana, PK 2013, ‘GAR: an energy efficient GA-based routing for wireless sensor networks’, Proceedings of the
International Conference on distributed computing and internet technology, Springer Berlin Heidelberg, pp. 267-277.
19. Huruială, PC, Urzică, A, & Gheorghe, L 2010, ‘Hierarchical routing protocol based on evolutionary algorithms for wireless sensor
networks’, Proceedings of the ninth IEEE International Conference on RoEduNet, pp. 387-392.
20. Kumar, V, Jain, S, & Tiwari, S 2011, ‘Energy efficient clustering algorithms in wireless sensor networks: A survey’, Journal of
Computer Science, vol.8, no. 5.
21. Li, XJ, & Chong, PHJ 2010, ‘Performance analysis of multihop cellular network with fixed channel assignment’, Journal of Wireless
Networks, vol. 16, no. 2, pp. 511-526.
22. Liu, A, Ren, J, Li, X, Chen, Z, & Shen, XS 2012, ‘Design principles and improvement of cost function based energy aware routing
algorithms for wireless sensor networks’, Journal of Computer Networks, vol. 56, no. 7, pp. 1951-1967.
23. Mitton, N, Sericola, B, Tixeuil, S, Fleury, E, & Lassous, IG 2011, ‘Self-stabilization in Self-organized Wireless Multihop
Networks?’, Ad Hoc & Sensor Wireless Networks, vol. 11, no. 1-2, pp. 1-34.
24. Nayak, P, & Devulapalli, A 2016, ‘A fuzzy logic-based clustering algorithm for WSN to extend the network lifetime’, IEEE Journal
on Sensors, vol. 16, no. 1, pp. 137-144.
25. Roundy, S, Rabaey, JM, &Wright, PK 2004, ‘Energy Scavenging for Wireless Sensor Networks’, Springer Verlag, LLC.
26. Sohraby, K, Minoli, D, & Znati, T 2007, ‘Wireless sensor networks: technology, protocols, and applications’, John Wiley & Sons, pp.
1-307.
27. Yick, J, Mukherjee, B, & Ghosal, D 2008, ‘Wireless sensor network survey’, Journal of Computer networks, vol. 52, no. 12, pp. 2292-
2330.
28. Zhang, P, Sadler, CM, Lyon, SA, & Martonosi, M 2004, ‘Hardware design experiences in ZebraNet’, Proceedings of the second ACM
International Conference on Embedded networked sensor systems, pp. 227-238.
29. Zhou, W, Chen, HM, & Zhang, XF 2007, ‘An energy efficient strong head clustering algorithm for wireless sensor networks’,
Proceedings of the IEEE International Conference on Wireless Communications, Networking and Mobile Computing , pp. 2584-2587.
30. Zhu, YH, Wu, WD, & Leung, VC 2011, ‘Energy-efficient tree-based message ferrying routing schemes for wireless sensor
networks’, Journal of Mobile Networks and Applications, vol. 16, no. 1, pp.58-70.

Authors: Sayali S. Rane, Mangesh M. Ghonge, Amol Potgantwar

Paper Title: Data Mining Based Outlier Cluster Detection Algorithm


Abstract: Outlier detection has been engaged and considered field as of late. Exception recognition is a
significant information mining movement with various applications, including MasterCard misrepresentation
location, disclosure of crimes in electronic trade, video reconnaissance, climate forecast, and pharmaceutical re-
search. The assignment of anomaly recognition is to distinguish the information objects from heaps of all
objects. Outlier mining normally utilized in different fields. The vast majority of the strategies gives more regard
for distinguish information objects from worldwide view which is in suitable for multidimensional information
sets. According to technology, outlier recognition will be troublesome by utilizing conventional arrangements. In
this, we are utilizing two calculations, for example, ODA and LOF. ODA used to locate the mean or exceptions
from multi-dimensional informational indexes. LOF used to discover the likelihood of that anomalies utilizing
thickness based calculations. Exception location is a significant undertaking in information mining. Nearby
anomalies contrasting with their nearby neighborhood rather than worldwide information. Anomaly discovery is
an essential assignment in information mining. Nearby exceptions contrasting with their neighborhood close
articles rather than worldwide information dissemination. The procedure segmented into two phases, online and
disconnected. Small scale groups are made in online stage and last bunches are produced in disconnected stage.
Exception location is a significant assignment in information mining. Nearby exceptions contrasting with their
neighborhood rather than worldwide information. Relative thickness of an item against its neighbors as the
marker of the level of the article being anomaly which is allotted to nearby exception factor.

Keywords: Data Set, Outlier Detection, Data Mining.

References:
631.
3650-
1. XujunZhao,JifuZhang,Xiao Qin : Expert System with Applications -LOMA , A local outlier mining algorithm based on attribute
relevanceanalysis, 272-280,2017. 36
2. Jinlong Huang, QingshengZhu,Lijun Yang, DongDongCheng,Quanwang Wu : Knowledge-Based Systems,1-9,2017. 55
3. Dr. S.Vijayarani,Ms. P Jothi : An Efficient Clustering Algorithm forOutlier Detection in Data Streams. International Journal of
AdvancedResearch in Computer and Communication Engineering, Vol. 2, Issue9,3657-3665,September 2013.
4. Markus M. Breunig, Hans-peter Kriegel, Raymond T. Ng,Jorg Sander: LOF : Identifying Density-Based Local Outliers.International
Confer-ence on Management of Data, 2000.
5. Bryan Perozzi,LemanAkoglu, Patricia Iglesias Sanchez,EmmanuelMuller : Focused Clustering and Outlier Detection in Large
AttributedGraphs,2000.
6. VilleHautamaki, IsmoKarkkainen and PasiFranti : Outlier DetectionUsing K-Nearest Neighbour Graph,2000.
7. ZhongPing Zhang, YongXinLiang : A Data Streams Outlier DetectionAlgorithm Based on reverse K nearest Neighbours,2011.
8. Sheng-Yi Jiang, Ai-Min Yang : Framework of Clustering-Based OutlierDetection, International Conference on Fuzzy Systems and
KnowledgeDiscovery,475-479,2009.
9. Bin-meiLIANG : A Hierarchical Clustering Based Global OutlierDetection Method.
10. Harshada C. Mandhare : A Comparative study of Cluster Based OutlierDetection, Distance Based Outlier Detection and Density Based
OutlierDetectionTechniques, International Conference on Intelligent Computingand Control Systems,931-935,2017.
11. RajendraPamula, Jatindra Kumar Deka, SukumarNandi : An OutlierDetection Method based on Clustering, International Conference
onEmerging Applications of Information Technology,2011.
12. Yunxin Tao, DechangPi : Unifying Density-Based Clustering andOutlier Detection, International Workshop on Knowledge Discovery
andData Mining,644-647.
13. Peng Yang, Biao Huang : An Outlier Detection Algorithm Based onSpectral Clustering, IEEE Pacific-Asia Workshop on
ComputationalIntelligence and Industrial Application,507-510,2008.
14. YueZhang,JieLiu,Bo Song, A New Algorithm for outlier DetectionBased on Offset, International Conference on Information
Assuranceand Security,3-6,2009.
15. Huang tao, Tan yanna: Research Outlier Detection Technique Baseon Clustering Algorithm, International Conference on Control
andAutomation,12-14,2014.
16. K. Thangavel, A. KajaMohideen,Semi Supervised K-means Clusteringfor Outlier Detection in Mammogram Classification,68-72.
17. Simon Hawkins, Hongxing He, Graham Williams and Rohan Bax-ter,Outlier Detection Using Replicator Neural Networks.
18. S.Ganapathy, N.Jaisankar, P.Yogesh and A.Kannan,An Intelligent Sys-tem for Intrusion Detection Using Outlier Detection, IEEE-
InternationalConference on Recent Trends in Information Technology,119-123,2011.
19. Zhou Mingqiang, Huang Hui, Wang Qian,A Graph-based ClusteringAlgorithm for Anomaly Intrusion Detection,International
Conference onComputer Science Education,1311-1314,2012.
20. Hongyi Zhang, Qingtao Wu and JiexinPu,A Novel Fuzzy KernelClusteringAlgorithm for Outlier Detection, International Conference
on Mechatronics and A utomation,2378-2382,2007.

Authors: Sugumar.D, Trinita Princy.S, Angelin Sarah.D, T. Anita Jones, M.S. Aezhisai Vallavi

Paper Title: Capacitive Disc Fed GPS Antenna Operating at L Band


Abstract: A rectangular antenna, to work in the operating frequency of L band is designed with capacitive disc
fed for GPS application. The antenna gain aimed to have 2dBi. The capacitive disc is utilized for the increment
of impedance bandwidth. It is designed using CADFEKO 7.0 and obtained the output with improved bandwidth
and good return loss. Moreover, much improved reflection coefficient of the proposed antenna is obtained and it
has been analyzed. With reference to simulation results, reflection coefficient at 1.13 GHz is attained as -34.18
dB with bandwidth of 140 MHz and at 1.34 GHz is -26.13 dB with the bandwidth of 230 MHz.

Keywords: GPS, Capacitive Disc, L Band.

References:

1. Sahar N M, Islam M T, and Misran N, “A reconfigurable multiband antenna for WLAN and WiMAX applications,” International
Conference on Computer, Communications, and Control Technology, Proceedings, 2014, pp. 156–160.
2. Abutarboush H F, Peter T, Raweshidy H, Nasr K M, and Budimir D, “A reconfigurable wideband and multiband antenna using dual-
patch elements for compact wireless devices,” IEEE Trans. Antennas Propag., vol. 60, no. 1, pp. 36–43, 2012.
632. 3. Pazin L and Leviatan Y, “Reconfigurable Slot Antenna for Switchable Multiband Operation in a Wide Frequency Range,” IEEE
Antennas Wirel. Propag. Lett., vol. 12, pp. 329–332, 2013. 3656-
4. Qin P, Guo Y J, Member S, and Ding C, “A Dual-Band Polarization Reconfigurable Antenna for WLAN Systems,” IEEE Trans. 36
Antennas Propag., vol. 61, no. 11, pp. 5706–5713, 2013.
5. Bao X L and Ammann M J, “Compact Concentric Annular-ring Patch Antenna for Triple Frequency Operation,” Electron. Lett., vol.
59
42, no. 1, pp. 24–33, 2006.
6. Paredes F, Zamora G, Herraiz-Martínez F J, Martín F, and Bonache J, “Dual-band UHF-RFID tags based on meander-line antennas
loaded with spiral resonators,” IEEE Antennas Wirel. Propag. Lett., vol. 10, pp. 768–771, 2011.
7. Kim D and Yeo J, “Dual-Band Long-Range Passive RFID Tag Antenna Using an AMC Ground Plane,” IEEE Trans. Antennas
Propag., vol. 60, no. 6, pp. 2620–2626, 2012.
8. Li R L, Quan X L, Cui Y H, and Tentzeris M M, “Directional triple-band planar antenna for WLAN/WiMax access points,” Electron.
Lett., vol. 48, no. 6, p. 305, 2012.
9. Lee Y, Ganguly S, and Mittra R, “Tri-band (L1, L2, L5) GPS Antenna with Reduced Back lobes,” Antenna, no. 1, pp. 1–4, 1999.
10. Ridgers G M, Odendaal J W, and Joubert J, “Efficient full-wave modeling of patch antenna arrays with new single-layer capacitive
feed probes,” IEEE Trans. Antennas Propag., vol. 53, no. 10, pp. 3219–3228, 2005.
11. Pan Y, Ma Y, Xiong J, and Hou Z, “A Compact Antenna with Frequency and Pattern Reconfigurable Characteristics,” Microw. Opt.
Technol. Lett., vol. 57, no. 11, pp. 2467–2471, 2015.
12. Wang X.-Y, Yang G.-M, and Geyi W., “A New Design of Focused Antenna Arrays,” Microw. Opt. Technol. Lett., vol. 56, no. 10, pp.
2464–2468, 2014.
13. Farooq W, Ur-Rehman M, Abbasi Q. H, and Qaraqe K, “A circular patch frequency reconfigurable antenna for wearable applications,”
IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications, 2015, 2015, pp. 103–106.
14. Falade O. P, Rehman M. U, Gao Y, Chen X, and Parini C. G, “Single feed stacked patch circular polarized antenna for triple band GPS
receivers,” IEEE Trans. Antennas Propag., vol. 60, no. 10, pp. 4479–4484, 2012.

Authors: Appu Kurian, Rameshan K.P, Ryne P.M, Benphil C Mathew

Paper Title: Experimental Analysis and Effects of Gasoline as an Additive in Compression Ignition Engine
Abstract: A compression ignition engine is a sort of engine where the fuel utilized is diesel. In this current
study, various influences on petrol-diesel mixture have been introduced in a mono cylinder vertical diesel engine
and investigated factually for various stages. Denouement of 0%, 4%, 8% and 12 % of gasoline by volume is
varied with diesel and the outcomes has been registered with the foundation of test perceptions at 1500(rpm).
Out of various trial experimental outcomes, it is found out that, with the addition of gasoline fuel the real brake -
power output rises at the rate of 4-9% and also the brake specific fuel consumption reduces by relatively 6%.
Also, the study found out that increase in the volume fraction of gasoline decreases the fuel density, surface
tension and kinematic viscosity. In addition, the various blending of petrol fuel causes a decrease in the size of
the droplet because the surface tension decreases with the inclusion of petrol, thereby generating an extension in
the instability of droplet. Meanwhile, petrol blending resulted in the development of the ignition delay period
633.
and also the formation of a comparatively higher homogeneous mixture. These peculiarities in the combustion 3660-
characteristics cause a drastic reduction of NOx. However, the Hydrocarbon and Carbon Monoxide emissions 36
were slightly increased. The boosting of burden in engine curtails the effect of gasoline blending on combustion 63
performance and exhaust fumes discharges.

Keywords: Brake horse power, Compression ignition engine, Gasoline volume, Blending of fuel, Emissions.

References:

1. Y.J. Kim, K.B. Kim, K.H. Lee, Effect of a 2-stage injection strategy on the combustion and flame characteristics in a PCCI engine,
International Journal of Automotive Technology 12 (2011) 639–644.
2. S. Jung, H. Ishida, S. Yammoto, H. Ueki, D. Sakaguchi, Enhancement of NOx-PM trade-off in a diesel engine adopting bio-ethanol
and EGR, International Journal of Automotive Technology 211 (2010) 611–616.
3. Sahiin Z. Experimental and theoretical investigation of the effects of gasoline blends on single-cylinder diesel engine performance and
exhaust emissions. Energy Fuels 2009; 23:1707– 17
4. P.B. Donbeck, R.D. Reitz, An experimental study of dual fuelling with gasoline port injection in a single-cylinder, air-cooled HSDI
diesel generator, in: SAE Tech Paper, SAE, 2010, (2010-01-0869).
5. Durgun O. Experimental methods in internal combustion engines. Karadeniz Technical University, Mechanical Engineering
Department, Lecturer notes; 1990.
6. Piaapagiannakis RG, Hountalas DT. Combustion and exhaust emission characteristics of a dual fuel compression ignition engine
operated with pilot diesel fuel and natural gas. Energy Convers Manage 2004; 45:2971–87.
7. Krishnan SR, Srinivasan KK, Midkiff KC. Phenomenological modelling of low temperature advanced low pilot-ignited natural gas
combustion. SAE techpaper 2007; SAE 2007-01:0942.
8. Arcoumanis C, Bae C, Crookes R, Kinoshita E. The potential of dimethyl ether (DME) as an alternative fuel for compression-ignition
engines. Fuel 2008;87:1014–30.
9. Ying W, Longbao Z, Hewu W. Diesel emission improvements by the use of oxygenated DME/diesel blend fuels. Atmos Environ 2006;
40:2313–20.
10. Canakci M. Combustion characteristics of a turbocharged DI compression ignition engine fueled with petroleum diesel fuels and
biodiesel. Bioresour Technology 2007; 98:1167–75.
Authors: Ch. Usha Kumari, N. Arun Vignesh, Asisa Kumar Panigrahy, L. Ramya, T.Padma
Fungal Disease in Cotton Leaf Detection and Classification using Neural Networks and Support
Paper Title:
Vector Machine
Abstract: Agriculture productivity is the main factor for improving economic status of India. Reduction in
production rate is mainly due to various diseases in plants. Identification of plant disease in early stage is the
main challenge for improving the production rate as well as economic status. This paper presents automatic
disease detection in cotton crop for three types of diseases Alternaria Leaf Spot Fungal Disease (ALSFD), Grey
Mildew Cotton Disease (GMCD), and Rust Foliar Fungal Disease (RFFD). The K-means clustering algorithm is
used for disease segmentation for cotton leaf. The diseased cluster is segmented into three clusters. From cluster
2 the features Mean , Contrast, Energy, Correlation, Standard Deviation, Variance , Entropy, and Kurtosis are
extracted. The extracted features for 30 samples are given to Artificial Neural Network (ANN) and Support
Vector Machine (SVM) classifiers for disease classification. The performance of these classifiers are compared.
The ALSF disease is classified 77.4% for ANN and 84.3% for SVM, GMC disease is 87.8% for ANN and
98.7% in SVM, RFF disease is 90.1%for ANN and 93.2% for SVM. The overall average accuracy of ANN
classifier is 85.1% for three diseases and overall average accuracy for SVM is 92.06% for three diseases. It is
clearly observed from the analysis SVM classifier gives accurate disease detection compared to ANN.

Keywords: Image segmentation, K-means clustering, Alternaria Leaf Spot Fungal Disease, Grey-Mildew-
Cotton Disease and Rust Foliar Fungal Disease, ANN, SVM.

References:

1. Sukhvir Kaur, Shreelekha Pandey, Shivani Goel, Semi-automatic leaf disease detection and classification system for soybean culture,
ISSN 1751-9659, IET Image Processing.
634. 2. Vijay Singh, A.K. Misra, Detection of plant leaf disease using image segmentation and soft computing techniques, Information
Processing in Agriculture 4 (2017) 4149. 3664-
3. Syafiqah Ishak, Mohd Hafiz Fazalul Rahiman, Siti Nurul Aqmariah Mohd Kanafiah, Hashim Saad, Leaf disease classification using 36
artificial neural network, Syafiqah Ishak et al. / Jurnal Teknologi (Sciences & Engineering) 77:17 (2015) 109-114.
4. Arti N. Rathod, Bhavesh A. Tanawala, Vatsal H. Shah, Leaf Disease Detection Using Image Processing And Neural Network,
67
IJAERD, Volume 1,Issue 6,June 2014, eISSN: 2348- 4470.
5. Jimita Baghel, Prashant Jain, K-Means Segmentation Method for Automatic Leaf Disease Detection ,IJERA, ISSN : 2248-9622, Vol.
6, Issue 3, ( Part -5) March 2016, pp.83-86.
6. Mr. Sachin B. Jagtap, Mr. Shailesh M. Hambarde, Agricultural Plant Leaf Disease Detection and Diagnosis Using Image Processing
Based on Morphological Feature Extraction , IOSR-JVSP, Volume 4, Issue 5, Ver. I (Sep-Oct. 2014), PP 24-30 eISSN: 2319-4200.
7. H. Al-Hiary, S. Bani-Ahmad, M. Reyalat, M. Braik and Z. ALRahamneh, Fast and Accurate Detection and Classification of Plant
Diseases, IJCA, 0975-8887,Volume 17? No.1, March 2011.
8. Ghaiwat, S.N., ParulArora,Detection and Classification of Plant Leaf Diseases Using Image processing Techniques: A Review.
International Journal of Recent Advances in Engineering and Technology, ISSN, pp.2347-2812.
9. Kumari, Ch Usha, and Tatiparti Padma. ”Energy-Effcient Routing Protocols for Wireless Sensor Networks.” In Soft Computing and
Signal Processing, pp. 377-384. Springer, Singapore, 2019.
10. Kumari, Ch Usha. ”Investigation: Life-Time and Stability Period in Wireless Sensor Network.” In 2018 3rd International Conference
for Convergence in Technology (I2CT), pp. 1-5. IEEE, 2018.
11. A. J. Tatem, D. J. Rogers, and S. I. Hay, ?Global transport networks and infectious disease spread,? Advancesin Parasitology,
vol.62,pp.293-343,2006.
12. Kumari, C.U., Rao, G.S.B. and Madhu, R., 2012. Erlang Capacity Evaluation InGsm And Cdma Cellular Systems. International
Journal Of Mobile Network Communications & Telematics (Ijmnct) Vol2, (5).
13. Kumari, C.U., Mounika, G. and Prasad, S.J., 2019, March. Identifying Obstructive, Central and Mixed
ApneaSyndrome Using Discrete Wavelet Transform. In International Conference on E-Business and Telecommunications (pp. 16-
22).Springer, Cham.
14. Kumari, C.U. and Padma, T., 2019. Energy-Efficient Routing Protocols for Wireless Sensor Networks. In Soft Computing and Signal
Processing (pp. 377-384).Springer, Singapore.
15. Kumari, C.U., 2018, April. Investigation: Life-Time and Stability Period in Wireless Sensor Network. In 2018 3rd International
Conference for Convergence in Technology (I2CT) (pp. 1-5). IEEE.
16. Kumari, C.U. and Krishna, R., M.: High performance wireless communication channel using LEACH protocols. Pak. J.
Biotechnol, 13, pp.52-56.
Authors: Shanky Goel, Gurpreet Singh Lehal

Paper Title: A Solution for Line Segmentation Problems in Sindhi Character Recognition System
635.
Abstract: The Sindhi language uses extended and modified set of the Arabic and Persian alphabets. It is the 3668-
largest extension of the Arabic alphabet. Thus, Arabic or any other Arabic script based language character 36
recognition system cannot recognize all characters of Sindhi. From character recognition point of view, Sindhi is 74
a tough script. Sindhi’s cursive, context-sensitive characteristics, a large set of characters, highly similar shapes
of the basic character, font-type variations, and size variations create high challenges for Sindhi character
recognition research. In addition, line segmentation is a hard task as we have non-uniformity in the line heights.
In this paper, we present an algorithm for segmenting the Sindhi text image into lines. The proposed algorithm
solves the over-segmentation and under-segmentation problems in the line segmentation for Sindhi documents.
The algorithm is tested on 100 text images of different Sindhi books and it has successfully segmented 99.95%
lines correctly.

Keywords: Sindhi, Under-Segmentation, Over-Segmentation, Segmentation Algorithm.

References:

1. Y. M. Alginahi, “A survey on Arabic character segmentation,” International Journal on Document Analysis and Recognition, vol. 16,
no. 2, 2013, pp. 105–126.
2. N. A. Shaikh, G. A. Mallah, Z. A. Shaikh, “Character Segmentation of Sindhi, an Arabic Style Scripting Language using Height Profile
Vector,” Australian Journal of Basic and Applied Sciences, Vol. 3, 2009, pp. 4160-4169.
3. A. M. Nizamani, N. H. Janjua, “Sindhi OCR using Back propagation Neural Networks,” International Journal of Advanced Computer
Science, Vol. 3, 2013, pp. 113-117.
4. D. N. Hakro, M. Memon, S. A. Awan, Z. A. Bhutto, M. Hameed, “Isolated Optical Character Recognition”, Sindh Univ. Res. Jour.
(Sci. Ser.), Vol. 48, no. 4, 2016, pp. 839-844.
5. D. N. Hakro, A. Z. Talib, Z. Bhatti, G. N. Mojai, “A Study of Sindhi Related and Arabic Script Adapted languages Recognition,” Sindh
Univ. Res. Jour. (Sci. Ser.), Vol. 46, no. 3, 2014, pp. 323-334.
6. D. N. Hakro, I. A. Ismaili, A. Z. Talib, Z. Bhatti, G.N. Mojai, “Issues and Challenges in Sindhi OCR,” Sindh University Research
Journal (Science Series). Vol. 46, no. 2, 2014, pp. 143-152.
7. D. N. Hakro, A. Z. Talib, “Printed Text Image Database for Sindhi OCR,” ACM Transactions on Asian and Low-Resource Language
Information Processing, Vol. 15, Issue 4, 2016, pp. 1-18.
Authors: Sachin M. Elgandelwar, Vinayak K. Bairagi

Paper Title: Role of EEG for Diagnosis of Alzheimer Disease


Abstract: In the recent years, costliest Alzheimer disease (AD) is now primary reason for the cause of death.
An early finding is essential as there is no cure for severe AD. Despite recent advances, early finding of
Alzheimer disease from electroencephalography (EEG) remains a difficult job. In this paper, we focus a spectral
and signal complexity measures through which such early findings can possibly be improved. Power spectral
and nonlinear features, which have been utilized for classification of Alzheimer disease subjects (ADS) from the
normal healthy subject (NHS). So far, the power in the various EEG bands has been intensely analyzed. The
main aim of this research article is to study the power and nonlinear analysis for the finding of AD to consider as
a probable biomarker to recognize AD subject and normal healthy subject. Relative power (RP) was
independently calculated from various EEG bands which indicate the slowing of EEG signals acknowledge the
Alzheimer disease subjects. In this study, EEGs signal had been acquired at the rest condition from 20 normal
healthy subject whose age around 60 years along with same number of Alzheimer disease subjects. The result
shows that relative power is increased towards lower frequencies while decreased towards higher frequencies in
AD. Such analysis of power may additionally explore to differentiate Alzheimer disease’s stages.

Keywords: Alzheimer diseases (AD), Electroencephalography (EEG), Relative power (RP), Bump modeling,
nonlinear analysis.

References:
636. 1. Mattson M., “Pathways towards and away from Alzheimer’s disease”, Nature, Vol. 430, pp. 631–639, Aug.2004.
2. Meek P.D., McKeithan K. and Shumock G.T., “Economics considerations of Alzheimer’s disease”, Pharmacotherapy, Vol. 18, pp.68–
3675-
73, March-April 1998. 36
3. World Health Organization and Alzheimer’s disease International Dementia: a public health priority, Technical report, 2012. 79
4. De Carli C, Kaye J. A, Horwitz B, Rapoport S.I., “Critical analysis of the use of computer-assisted transverse axial” Neurology. Vol.
40(6), pp.872-83, June 1990.
5. Bianchetti A, Trabucch M., “Clinical aspects of Alzheimer’s disease” Aging Clinical Exp Res, Vol 13, pp. 221–30. 2001.
6. Alz.co.uk. Dementia statistics Alzheimer's disease International. 2019. [Online] Available at: https://www.alz.co.uk/research/statistics.
7. Alzheimer's disease facts and figures. Alzheimer's & Dementia, 14(3), pp.367-429, 2018.
8. Elgandelwar S.M. and Bairagi v. k., “Analysis of EEG Signals for Diagnosis of Alzheimer Disease”. International Journal of Scientific
& Engineering Research, 7(1), pp 529-532, 2016.
9. Kulkarni N, Bairagi V. K., “Diagnosis of Alzheimer disease using EEG signals”. International Journal of Engineering Research &
Technology (IJERT) 3(4):1835–1838, 2014.
10. N. N. Kulkarni and V. K. Bairagi, “Electroencephalogram based diagnosis of Alzheimer disease,” in Proceedings of the IEEE
Sponsored International Conference on Intelligent Systems and Control (ISCO), Coimbatore, pp. 1–5, 2015.
11. Justin Dauwels, K. Srinivasan, M. Ramasubba Reddy, et al “Slowing and Loss of Complexity in Alzheimer’s EEG: Two Sides of the
Same Coin?” Hindawi Access of Research, International Journal of Alzheimer’s Disease, Volume1, Article ID 53962, 2011.
12. Pincus S.M., “Approximate entropy as a measure of system complexity”, Proceeding National Academy Science USA, Vol 88, pp.
2297–2301, March 1991.
13. Zhengjia Dai, Chaogan Yan, “Discriminative analysis of early Alzheimer Disease using multi-modal imaging and multilevel
characterization with multi-classifier (M3)”, Journal of Neuroimaging, Elsevier, Vol. 59, Issue.3, pp.2187-2195, February 2012.
14. Raymundo Cassani, Tiago H. Falk, Francisco J. Fraga, et al, “The effects of automated artifact removal algorithms on
electroencephalography-based Alzheimer’s disease diagnosis”, Frontiers in Aging Neuroscience, Volume 6, Article 55, pp. 1 – 13,
March 2014.
15. Tyler Staudinger, Robi Polikar, “Analysis of Complexity Based EEG Features for Diagnosis of Alzheimer Disease”, Proc Intl Conf
IEEE-EMBC, Boston, USA, pp. 2033 - 2036, 2011.
16. Co Melissant, Alexander Ypma, Edward E.E.” A method for the detection of Alzheimer’s Disease using ICA-enhanced EEG
measurements” Artificial intelligence in medicine, Vol. 33 No.3, pp.209-222, 2005.
17. Simon-Shlomo poil,WillemdeHaan, Wieesje M. et al “Integrative EEG biomarkers predict progression to Alzheimer’s Disease at the
MCI stage” Frontiers in aging Neuroscience Vol. 5, pp 1-6 ID 58, Oct 2013.
18. Jaeseung Jeong et al “EEG dynamics in patients with Alzheimer’s disease”, Artificial Intelligence in medicine, Vol 33 Issue1 pp 209-
222, 2005.
19. Robert Sneddon,” EEG detection of early Alzheimer’s disease using psychological task”, Journal of clinical EEG and Neuroscience
vol. 36 No.3 September 11-15, 2005.
20. V K Bairagi, “EEG signal analysis for early diagnosis of Alzheimer disease using spectral and wavelet-based features”, Springer
International Journal of Information Technology, Volume 10, Issue 3, pp 403–412, September 2018.
21. N. N. Kulkarni and V. K. Bairagi, “Extracting Salient Features for EEG based Diagnosis of Alzheimer Disease Using Support Vector
Machine Classifier”, Taylor and Francis - IETE Journal of Research, Vol 63, No 1, pp 11-22, Jan 2017. (Impact Factor 0.909)
Authors: P.Suresh, U.Saravanakumar, V.Karthikeyan, G.Vamsi Krishna, K.Sreekanth, G.Kumar Reddy
Design and Implementation of Real Time Data Acquisition System in All Programmable System
Paper Title:
on Chip
Abstract: In the recent era, the world has faced drastic improvement in automation industries and there is an
need of speedy multi-functional system with higher performance device. The demand for faster, smaller and
energy efficient computing systems for miniaturized devices is tremendously increased day by day. Over the
past decades, there is a drastic change in semiconductor industry due to its advantages and higher performance
of integrated circuits even there is more complexity in design and more expensive. The semiconductor industry
started to embrace new design and reuse policies are mutually discussed as system-on-chip (SoC) design. This
technology allows to develop a system with higher performance only with required blocks for different
applications. In this paper, it is proposed to implement SoC based data acquisition system to measure the
atmospheric parameters with different sensors in real time.

Keywords:

References:

1. International Techbology Roadmap for Semiconductors. [Online]. Available: http://www.public.itrs.net.


2. M. Keating and P. Bricaud, Reuse Methodology Manual: For System-on-a-Chip Designs, 3rd ed. Boston, MA: Kluwer, 2002.
3. R. Rajsuman, System-on-a-Chip Design and Test. Boston, MA: Kluwer, 2000.
4. H. Chang, L. Cooke, M. Hunt, G. Martin, A. McNelly, and L. Todd, Surviving the SOC Revolution: A Guide to Platform-Based
637. Design. Boston, MA: Kluwer, 1999.
5. G. Moore, BCramming more components onto integrated circuits,[ Electronics, vol. 38, pp. 114–117, Apr. 19, 1965. 3680-
6. X. Wang, and M. Leeser, “K-means Clustering for Multispectral Images using Floating-Point Divide,” Proc. IEEE FCCM Symp., Apr. 36
‘07. 84
7. O. Nibouche, “Fast Architectures for FPGA-Based Implementation of RSA Encryption Algorithm,” Proc. FPT’04, pp. 271-278, Dec.
‘04.
8. Y. Gu, and M. Herbordt, “FPGA-Based Multigrid Computation for Molecular Dynamics Simulations,” Proc. IEEE FCCM Symp., Apr.
‘07.
9. B. Fort, D. Capalija, Z. Vranesic, and S. Brown, “A Multithreaded Soft Processor for SoPC Area Reduction,” Proc. IEEE FCCM
Symp., pp. 131-142, Apr. ‘06.
10. P. Wolkotte, G. Smit, and J. Becker, “Energy-Efficient NoC for Best Effort Communication,” in Proc. FPL’05, pp. 197-202, Aug. ‘05.
11. A. Patel, M. Saldana, C. Comis, P. Chow, “A Scalable FPGA-based Multiprocessor, “Proc. IEEE FCCM Symp., pp. 111-120, Apr. ‘06.
12. A. Chandrakasan and R. Brodersen, Low Power Digital CMOS Design. Boston, MA: Kluwer, 1995.
13. Open Core Protocol Specification 2.1. OCP-IP Assoc. [Online]. Available: http://www.ocpip.org.
14. Virtual Socket Interface Alliance. [Online]. Available: http://www.vsi.org.
15. M. Richhetti, BOverview of proposed IEEE P1500 scalable architecture for testing embedded cores (slide presentation, presented at the
Design Automation Conf., Las Vegas, NV, 2001, pp. 1–26.
16. IEEE 1500 Standard. [Online]. Available: http://www.grouper.ieee.org/groups/1500.
17. R. Tummala and V. Madisetti, B System on chip or system on package?[. IEEE Des. Test Comput., vol. 16, no. 2, pp. 48–56, Apr.–Jun.
1999.
18. S. E. Schultz, “The New System-Level Design Language”, Integrated System Design, July 1998.
19. A.A. Jerraya, M. Romdhani, Ph. Le Marrec, F. Hessel, P. Coste, C. Valderrama, G. F. Marchioro, J.M. Daveau,and N.-E. Zergainoh,
“Multi-language Specification for System Design and Codesign”, System Level Synthesis, Kluwer Academic Publishers, 1999.
20. C.-W. Wu, “SOC testing methodology and practice,” in Proc. Design, Automation and Test in Europe (DATE), Munich, Mar. 2005.
21. Zybo Board Reference Manual, Digilent, Inc, 2013.
22. Zynq Processing System Reference Guide v12.3, Xilinx, Inc, 2010.

Authors: P.Suresh, U.Saravanakumar, V.Karthikeyan, G.Vamsi Krishna, K.Sreekanth, G.Kumar Reddy


Design and Implementation of Real Time Data Acquisition System in All Programmable System
Paper Title:
on Chip
Abstract: In the recent era, the world has faced drastic improvement in automation industries and there is an
need of speedy multi-functional system with higher performance device. The demand for faster, smaller and
energy efficient computing systems for miniaturized devices is tremendously increased day by day. Over the
past decades, there is a drastic change in semiconductor industry due to its advantages and higher performance
of integrated circuits even there is more complexity in design and more expensive. The semiconductor industry
638. started to embrace new design and reuse policies are mutually discussed as system-on-chip (SoC) design. This
3685-
technology allows to develop a system with higher performance only with required blocks for different
36
applications. In this paper, it is proposed to implement SoC based data acquisition system to measure the
90
atmospheric parameters with different sensors in real time.

Keywords:

References:
1. International Techbology Roadmap for Semiconductors. [Online]. Available: http://www.public.itrs.net.
2. M. Keating and P. Bricaud, Reuse Methodology Manual: For System-on-a-Chip Designs, 3rd ed. Boston, MA: Kluwer, 2002.
3. R. Rajsuman, System-on-a-Chip Design and Test. Boston, MA: Kluwer, 2000.
4. H. Chang, L. Cooke, M. Hunt, G. Martin, A. McNelly, and L. Todd, Surviving the SOC Revolution: A Guide to Platform-Based
Design. Boston, MA: Kluwer, 1999.
5. G. Moore, BCramming more components onto integrated circuits,[ Electronics, vol. 38, pp. 114–117, Apr. 19, 1965.
6. X. Wang, and M. Leeser, “K-means Clustering for Multispectral Images using Floating-Point Divide,” Proc. IEEE FCCM Symp., Apr.
‘07.
7. O. Nibouche, “Fast Architectures for FPGA-Based Implementation of RSA Encryption Algorithm,” Proc. FPT’04, pp. 271-278, Dec.
‘04.
8. Y. Gu, and M. Herbordt, “FPGA-Based Multigrid Computation for Molecular Dynamics Simulations,” Proc. IEEE FCCM Symp., Apr.
‘07.
9. B. Fort, D. Capalija, Z. Vranesic, and S. Brown, “A Multithreaded Soft Processor for SoPC Area Reduction,” Proc. IEEE FCCM
Symp., pp. 131-142, Apr. ‘06.
10. P. Wolkotte, G. Smit, and J. Becker, “Energy-Efficient NoC for Best Effort Communication,” in Proc. FPL’05, pp. 197-202, Aug. ‘05.
11. A. Patel, M. Saldana, C. Comis, P. Chow, “A Scalable FPGA-based Multiprocessor, “Proc. IEEE FCCM Symp., pp. 111-120, Apr. ‘06.
12. A. Chandrakasan and R. Brodersen, Low Power Digital CMOS Design. Boston, MA: Kluwer, 1995.
13. Open Core Protocol Specification 2.1. OCP-IP Assoc. [Online]. Available: http://www.ocpip.org.
14. Virtual Socket Interface Alliance. [Online]. Available: http://www.vsi.org.
15. M. Richhetti, BOverview of proposed IEEE P1500 scalable architecture for testing embedded cores (slide presentation, presented at the
Design Automation Conf., Las Vegas, NV, 2001, pp. 1–26.
16. IEEE 1500 Standard. [Online]. Available: http://www.grouper.ieee.org/groups/1500.
17. R. Tummala and V. Madisetti, B System on chip or system on package?[. IEEE Des. Test Comput., vol. 16, no. 2, pp. 48–56, Apr.–Jun.
1999.
18. S. E. Schultz, “The New System-Level Design Language”, Integrated System Design, July 1998.
19. A.A. Jerraya, M. Romdhani, Ph. Le Marrec, F. Hessel, P. Coste, C. Valderrama, G. F. Marchioro, J.M. Daveau,and N.-E. Zergainoh,
“Multi-language Specification for System Design and Codesign”, System Level Synthesis, Kluwer Academic Publishers, 1999.
20. C.-W. Wu, “SOC testing methodology and practice,” in Proc. Design, Automation and Test in Europe (DATE), Munich, Mar. 2005.
21. Zybo Board Reference Manual, Digilent, Inc, 2013.
22. Zynq Processing System Reference Guide v12.3, Xilinx, Inc, 2010.
Authors: N.Pugazhenthi , K.VinuLakshmi, V.Preneeth, K.Shrivani

Paper Title: Design and Fabrication of Robot for Surveillance using Arduino
Abstract: The World Is Full Of Surveillance, Which Was monitored by enemy countries. Especially, the
border region of any country was controlled and monitored by the own country for their safety purpose, for that
many technology was used to monitor the region. Earlier, the surveillance was done by human, which causes
many deaths by enemy country. To overcome the problem, the technology was introduced for surveillance with
the help of robot. But now, the technology was upgraded, which made us to make a new robot for surveillance,
bomb detector with automated gun. In this project, this was controlled using arduino with Wi-Fi module. The
camera was fixed and captures the video and monitored through it. The robot can move ups and downs of any
place for surveillance with the help of motors. This was one of the multipurpose robots for military use.

Keywords: surveillance, security, monitor, Arduino, Wi-Fi.


639.
References: 3691-
36
1. Jonathan Garcia, Ali Alsuwaylih and Sabri Tosunoglu; “Security Partolling Autonomous Robot”: Florida Conference on Recent 93
Advances in Robotics- 2015
2. Radhika.P, V.Gopika; “Human Surveillance and Landmine Detecting Robot using Labview”: International Journal of Advanced
Research in Electronics and Communication Engineering-2016
3. Dr.B.Subrahmanyeswara Rao, C.Soumya; “PC Controlled Bomb Detection and Diffusion Robot”: International Journal of Advanced
Research in Electrical, Electronics and Instrumentation Engineering – 2016
4. Priyanka D.Balapure, Darshana N.Wagh; “Intelligent Robot for Surveillance”: International Research Journal of Engineering and
Technology- 2018
5. Tarunpreet Kaur, Dilip Kumar; “Wireless Multifunctional Robot for Military Applications”: Proceedings of 2015 RAECS UIET
Panjab University Chandigarh 21-22nd December 2015
6. Widodo Budiharto; “Intelligent Surveillance Robot with Obstacle Avoidance Capabilities Using Neural Network”: Computational
Intelligence and Neuroscience
7. Anas f. Ahmed, Ruaa h. Ahmeed; “Design and Implementation Surveillance Robot Using ATmega328 Microcontroller”: Iraqi Journal
of Information Technology. V.8 N.4. 2018

Authors: Gayatri G. Bobade, A. G. Patil

Paper Title: Testing of Image Steganography with use of LSB and DCT Techniques
Abstract: In this growing internet world, secret data communication is increasing day by day. There are
various methods to communicate secretly. Steganography is one of those techniques in which data is concealed
within cover data such that it cannot get detected. Steganography is usually used today on pcs where digital data
is the high-speed distribution channels for carriers and networks. Steganography is the skill of understanding of
640. unnoticeable activity at intervals. Steganalysis is the science of concealed data detection. Steganography of data
3694-
which is of any form like images, audio, video or text information is done by various techniques. Image
36
steganography is done by various technique. Least Significant Bit (LSB) with XORing and Discrete Cosine
97
Transform (DCT) are used to test the image steganography. Images are converted to grey scale to get better
accuracy. Results are tested with mean square error (MSE) and peak signal-to-noise ratio (PSNR) values.

Keywords: Least Significant Bit; Discrete Cosine Transform; Mean Square Error; Peak Signal-to-Noise Ratio;
Secret Image; Cover Image; Stego Image.
References:

1. Bobade G. G. and Patil A. G., “Review: Transformation of the Steganography Image Process”, International Journal of Research and
Analytical Reviews (IJRAR) ISSN: 2349-5138, Volume-06, Issue-02, May-2019.
2. Mohamed Buker; Hakan Tora; Erhan Gokcay, “Effect of Secret Image Transformation on the Steganography Process,” 24th IEEE
International Conference on Electronics, Circuits and Systems (ICECS), pp. 351-355,2017.
3. Deepesh Rawat and Vijaya Bhandari, “A Steganography Technique for Hiding Image in an Image using LSB Technique for 24 Bit
Colour Image’’, International Journal of Computer Applications (0975-8887) Volume 64- No.20, February 2013.
4. Sheidaee, A., & Farzinvash, L., “A novel image steganography technique based on DCT and LSB,” 9th International Conference on
Information and Knowledge Technology (IKT), 2017.
5. Ms. G. S. Sravanti, Mrs. B. Sunitha Devi, S.M.Riyazoddin & M. Janga Reddy, “A Spatial Domain Image Steganography Technique
Based on Plan Bit Substitution Technique”, Global Journal of Computer Science and Technology Graphics & Vision Volume 12 Issue
15 Version 1.0 , 2012.
6. A.SaiKrishna Shankar Parimi G. Manikandan. Sairam. N, “A Clustering Based Steganographic Approach for Secure Data
Communication”, International Conference on Circuit, Power and Computing Technologies [ICCPCT], 2015.
7. Singh, A., & Singh, H., “An improved LSB based image steganography technique for RGB images”. IEEE International Conference on
Electrical, Computer and Communication Technologies (ICECCT) 2015.

Authors: Yasir Aslam, Santhi N, Ramasamy N, K. Ramar


Metallic Surface Coating Defect Detection Using Firefly Based Adaptive Thresholding and Level
Paper Title:
Set Method
Abstract: An innovative approach is introduced to detect surface defects on titanium coated steel surfaces with
varied size through the use of image processing techniques. This paper provides techniques which are useful to
discover numerous kinds of surface defects present on coating surface. For defect detection, Firefly Algorithm
(FA) based adaptive thresholding is proposed and is applied for the gray scale images. The FA ensuing nature
inspired algorithm utilized expansively in support of determining various optimization problems and from the
reconstructed image contours are extracted using level set method, the predictable images not including textures
besides defects contours be compassed. The morphological post processing removes the noise in image and
makes defects more distinguishable from the background. The speculative result persists in utilizing
synchronous images of metal surface and shows that the proposed method can efficiently segment surface
defects and obtain better performance than existing methods.

Keywords: Adaptive thresholding, Defect detection, Firefly Optimization, Level set method, Surface coating.

References:

1. Mai Thanh Nhat Truong, and Sanghoon Kim, “Automatic image thresholding using Otsu’s method and entropy weighting scheme for
surface defect detection”, Soft Computing, vol. 22, Issue 13, pp 4197–4203, July 2018.
2. Hwee Kwon Jung, Chang Won Lee, and Gyuhae Park, “Fast and non-invasive surface crack detection of press panels using image
processing”, Procedia Engineering, 6th Asia Pacific Workshop on Structural Health Monitoring, vol.188, pp.72-79, 2017.
3. Yasir Aslam , Santhi N , Ramasamy N , K. Ramar, “A Heuristic Fuzzy Clustering Approach for Defect Detection on Titanium Coated
Metal Surface”, Journal of Advanced Research in Dynamical & Control Systems, Vol. 10, No. 4, 2018.
4. Karl T. Fendt, Hubert Mooshofer, Stefan J. Rupitsch, and Helmut Ermert, “Ultrasonic Defect Characterization in Heavy Rotor Forgings
by Means of the Synthetic Aperture Focusing Technique and Optimization Methods”, IEEE Transactions on Ultrasonics, Ferroelectrics
and Frequency Control, vol. 63, no.6, June 2016.
641. 5. Gang Li, Xiaoxing Zhao, Kai Du, Feng Ru, and Yubo Zhang, “Recognition and evaluation of bridge cracks with modified active
contour model and greedy search-based support vector machine”, Automation in Construction, vol.78,pp.51-61, June 2017. 3698-
6. N. Otsu, “A threshold selection method from gray-level histograms,” Automatica, vol. 11, no. 285–296, pp. 23–27, 1975. 37
7. J. H. Xue and D. M. Titterington, “Median-based image thresholding,” Image Vis. Comput., vol. 29, no. 9, pp. 631–637, 2011.
8. Yasir Aslam , Santhi N , Ramasamy N , K. Ramar, “An Effective Surface Defect Detection Method Using Adaptive Thresholding
04
Fused With PSO Algorithm”, International Journal of. Simulation. Systems, Science & Technology,Volume 19, Number 6, Page 1,
December 2018.
9. Mustafa Servet Kıran, and Oguz Fındık, “A directed artificial bee colony algorithm”, Applied Soft Computing, vol.26, pp. 454-462, Jan
2015.
10. Yuan Chao, Min Dai, Kai Chen, Ping Chen, and Zhisheng Zhang, “A novel gravitational search algorithm for multilevel image
segmentation and its application on semiconductor packages vision inspection”, Optik, vol.127, Issue.14, pp.5770-5782, July 2016.
11. Yasir Aslam , Santhi N , Ramasamy N , K. Ramar, “A Modified Adaptive Thresholding Method using Cuckoo Search Algorithm for
Detecting Surface Defects”, International Journal of Advanced Computer Science and Applications, Vol. 10, No. 5, 2019.
12. Lei Chen, Chuangbai Xiao, Xueliang Li, Zhenli Wang, and Shoudong Huo, “A seismic fault recognition method based on ant colony
optimization”, Journal of Applied Geophysics, vol.152, pp.1-8, Feb 2018.
13. UrošMlakar, Božidar Potocnik, and Janez Brest, “A hybrid differential evolution for optimal multilevel image thresholding”, Expert
Systems with Applications, vol.65, pp.221–232, Aug 2016.
14. Javad Rahebi, and Fırat Hardalaç, “A new approach to optic disc detection in human retinal images using the firefly algorithm”,
Medical & Biological Engineering & Computing, vol.54, Issue.2–3, pp.453–461, March 2016.
15. Gang Cao, Lihui Huang, Huawei Tian, Xianglin Huang, Yongbin Wang, and Ruicong Zhi, “Contrast enhancement of brightness-
distorted images by improved adaptive gamma correction”, Computers and Electrical Engineering, vol.66, pp.569-582, Feb 2018.
16. Cecilia Pasquini, Giulia Boato, Naif Alajlan, and Francesco G.B. De Natale, “A Deterministic Approach to Detect Median Filtering in
1D Data”, IEEE Transactions on Information Forensics and Security, vol.11, pp.1425–1437,Issue.7 , July 2016.
17. Kaveh Ahmadi, Ahmad Y. Javaid, and Ezzatollah Salari, “An efficient compression scheme based on adaptive thresholding in wavelet
domain using particle swarm optimization”, Signal Processing: Image Communication, vol.32, pp.33–39, March 2015.
18. Mustapha Ammiche, Abdelmalek Kouadri, Laith M.Halabi, Amar Guichi, and Saad Mekhilef, “Fault detection in a grid-connected
photovoltaic system using adaptive thresholding method”, vol.174, pp.762-769, Nov 2018.
19. Javad Rahebi, and Fırat Hardalaç, “A new approach to optic disc detection in human retinal images using the firefly algorithm”,
Medical & Biological Engineering & Computing, vol. 54, Issue.2–3, pp.453–461, March 2016.
20. ArefYelghi, and CemalKose, “A modified firefly algorithm for global minimum optimization”, Applied Soft Computing, vol.62,
pp.29–44, Jan 2018.
21. Cheng Liu, Weibin Liu, and Weiwei Xing, “An improved edge based level set method combining local regional fitting information for
noisy image segmentation”, Signal Processing, vol.130, pp. 12–21, 2017.
22. Francesco G.B. De Natale, and Giulia Boato, “Detecting morphological filtering of binary images”, IEEE Transactions on Information
Forensics and Security, vol.12, Issue.5, pp.1207-1217 May 2017.

Authors: Debi Prasad Mishra, Satyasundara Mahapatra, Sateesh Kumar Pradhan

Paper Title: Performance Improvement of Intrusion Detection Systems


Abstract: Intrusion Detection Systems (IDSs) have been crucial in defending intrusive attacks (both active and
passive) in various application scenarios in recent trends. Over the years, many research activities have been
carried out on intrusion detection systems. The IDSs have been evolved over times with various detection
methodologies, approaches, and technology types. The IDSs after several evaluations and different approaches
still face a major challenge-performance improvement. This improvement can be quantified in two broad ways-
the detection rate and the rate of false positives. The improved performance involves the efficiency and accuracy
of detection. The efficiency can be attributed to performance in case of a very high amount of attacks and the
accuracy can be attributed to a significantly low amount of false positives. In the same context, we have found
that the IoT networks which are in high demand in recent trends also suffer from such types of attacks in
operational environments due to limited storage and processing capabilities. In order to protect the IoT
application, the scenario necessitates the need of IDS that is lightweight in implementation and provides a
significantly higher amount of accuracy which is at par with the IDSs implemented in conventional networks. In
this work, we have proposed an improved technique for performance improvement of IDSs in IoT domain.

Keywords: IDS, detection rate, false positives, IoT, performance improvement.

References:

1. Axelsson, S. (2000). Intrusion detection systems: A survey and taxonomy (Vol. 99). Technical report.
2. Stavroulakis, P., & Stamp, M. (Eds.). (2010). Handbook of information and communication security. Springer Science & Business
Media.
3. Liao, H. J., Lin, C. H. R., Lin, Y. C., & Tung, K. Y. (2013). Intrusion detection system: A comprehensive review. Journal of Network
and Computer Applications, 36(1), 16-24.
4. Kumar, V., Srivastava, J., & Lazarevic, A. (Eds.). (2006). Managing cyber threats: issues, approaches, and challenges (Vol. 5).
Springer Science & Business Media.
5. Xenakis, C., Panos, C., & Stavrakakis, I. (2011). A comparative evaluation of intrusion detection architectures for mobile ad hoc
networks. Computers & Security, 30(1), 63-80.
6. Kruegel, C., Valeur, F., Vigna, G., & Kemmerer, R. (2002). Stateful intrusion detection for high-speed network's. In Security and
Privacy, 2002. Proceedings. 2002 IEEE Symposium on (pp. 285-293). IEEE.
7. Judge, G. (2003). FPGA architecture ups intrusion detection performance. http://www. commsdesign. com/design_corner/showArticle.
jhtml? articleID= 16502099.
8. Deri, L. (2004, September). Improving passive packet capture: Beyond device polling. In Proceedings of SANE (Vol. 2004, pp. 85-93).
9. Schaelicke, Lambert, Kyle Wheeler, and Curt Freeland. "SPANIDS: a scalable network intrusion detection load balancer." Proceedings
642. of the 2nd Conference on Computing Frontiers. ACM, 2005. 3705-
10. Sekar, R., et al. "A high-performance network intrusion detection system." Proceedings of the 6th ACM Conference on Computer and 37
Communications Security. ACM, 1999.
11. Shafer, G. (1992). Dempster-shafer theory. Encyclopedia of artificial intelligence, 1, 330-331. 12
12. Charitakis, I., Anagnostakis, K., & Markatos, E. (2003, October). An active traffic splitter architecture for intrusion detection. In
Modeling, Analysis and Simulation of Computer Telecommunications Systems, 2003. MASCOTS 2003. 11th IEEE/ACM
International Symposium on (pp. 238-241). IEEE. Desai, N. (2002). Optimizing NIDS Performance.
13. Haagdorens, B., Vermeiren, T., & Goossens, M. (2004, August). Improving the performance of signature-based network intrusion
detection sensors by multi-threading. In International Workshop on Information Security Applications (pp. 188-203). Springer, Berlin,
Heidelberg.
14. Nguyen, H., Franke, K., & Petrovic, S. (2010, February). Improving effectiveness of intrusion detection by correlation feature
selection. In Availability, Reliability, and Security, 2010. ARES'10 International Conference on (pp. 17-24). IEEE.
15. Chou, T. S., Yen, K. K., Luo, J., Pissinou, N., & Makki, K. (2007, October). Correlation-based feature selection for intrusion detection
design. In Military Communications Conference, 2007. MILCOM 2007. IEEE (pp. 1-7). IEEE.
16. Katar, C. (2006). Combining multiple techniques for intrusion detection. Int J Comput Sci Network Security, 6(2B), 208-218.
17. Ye, Nong, et al. "Probabilistic techniques for intrusion detection based on computer audit data." IEEE Transactions on Systems, Man,
and Cybernetics-Part A: Systems and Humans 31.4 (2001): 266-274.
18. Thomas, C., & Balakrishnan, N. (2007, April). Selection of Intrusion Detection Threshold bounds for effective sensor fusion. In SPIE
Defense and Security Symposium (Vol. 6570).
19. Mahoney, M. V. (2003). A machine learning approach to detecting attacks by identifying anomalies in network traffic.
20. Smith, I. G. (Ed.). (2012). The Internet of things 2012: new horizons. CASAGRAS2.
21. Cole, P. H., & Ranasinghe, D. C. (2008). Networked RFID systems and lightweight cryptography. London, UK: Springer, 10, 978-3.
22. Bonaci, Tamara, Linda Bushnell, and Radha Poovendran. "Node capture attacks in wireless sensor networks: A system theoretic
approach." 49th IEEE Conference on Decision and Control (CDC). IEEE, 2010.
23. Okpe, O. A., John, O. A., & Emmanuel, S. (2018). INTRUSION DETECTION IN INTERNET OF THINGS (IOT). International
Journal of Advanced Research in Computer Science, 9(1).
24. Cho, Eung Jun, Jin Ho Kim, and Choong Seon Hong. "Attack model and detection scheme for botnet on 6LoWPAN." Asia-Pacific
Network Operations and Management Symposium. Springer, Berlin, Heidelberg, 2009.
25. Le, Anhtuan, et al. "Specification-based IDS for securing RPL from topology attacks." 2011 IFIP Wireless Days (WD). IEEE, 2011.
26. Misra, Sudip, et al. "A learning automata based solution for preventing distributed denial of service in internet of things." 2011
International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing. IEEE,
2011.
27. Santos, L., Rabadao, C., & Gonçalves, R. (2018, June). Intrusion detection systems in Internet of Things: A literature review. In 2018
13th Iberian Conference on Information Systems and Technologies (CISTI) (pp. 1-7). IEEE.
28. Lee, Tsung-Han, et al. "A lightweight intrusion detection scheme based on energy consumption analysis in 6LowPAN." Advanced
Technologies, Embedded and Multimedia for Human-centric Computing. Springer, Dordrecht, 2014. 1205-1213.
29. Oh, Doohwan, Deokho Kim, and Won Ro. "A malicious pattern detection engine for embedded security systems in the Internet of
Things." Sensors 14.12 (2014): 24188-24211.
30. Cervantes, Christian, et al. "Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things." 2015
IFIP/IEEE International Symposium on Integrated Network Management (IM). IEEE, 2015.
31. Pongle, P., & Chavan, G. (2015). Real time intrusion and wormhole attack detection in internet of things. International Journal of
Computer Applications, 121(9).
32. Le, Anhtuan, et al. "A specification-based IDS for detecting attacks on RPL-based network topology." Information 7.2 (2016): 25.
33. Summerville, Douglas H., Kenneth M. Zach, and Yu Chen. "Ultra-lightweight deep packet anomaly detection for Internet of Things
devices." 2015 IEEE 34th international performance computing and communications conference (IPCCC). IEEE, 2015.
34. Midi, Daniele, et al. "Kalis—A system for knowledge-driven adaptable intrusion detection for the Internet of Things." 2017 IEEE 37th
International Conference on Distributed Computing Systems (ICDCS). IEEE, 2017.
35. Shreenivas, Dharmini, Shahid Raza, and Thiemo Voigt. "Intrusion Detection in the RPL-connected 6LoWPAN Networks."
Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security. ACM, 2017.
36. Awad, A. I., Furnell, S., Hassan, A. M., & Tryfonas, T. (2019). Special issue on security of IoT-enabled infrastructures in smart cities.
Ad hoc networks.
37. Liu, Xiruo, et al. "A security framework for the internet of things in the future internet architecture." Future Internet 9.3 (2017): 27.
38. Trappe, Wade, Richard Howard, and Robert S. Moore. "Low-energy security: Limits and opportunities in the internet of things." IEEE
Security & Privacy 13.1 (2015): 14-21.
39. Raza, S., Wallgren, L., & Voigt, T. (2013). SVELTE: Real-time intrusion detection in the Internet of Things. Ad hoc networks, 11(8),
2661-2674.
40. Winter, Tim. "RPL: IPv6 routing protocol for low-power and lossy networks." (2012).
41. Hu, Y. C., Perrig, A., & Johnson, D. B. (2003, April). Packet leashes: A defense against wormhole attacks in wireless ad hoc
networks. In Proceedings of INFOCOM (Vol. 2003).
42. Wang, W., & Bhargava, B. (2004, October). Visualization of wormholes in sensor networks. In Proceedings of the 3rd ACM workshop
on Wireless security (pp. 51-60). ACM.
43. Kaplantzis, Sophia, et al. "Detecting selective forwarding attacks in wireless sensor networks using support vector machines." 2007 3rd
International Conference on Intelligent Sensors, Sensor Networks and Information. IEEE, 2007.
44. Livani, Mohammad Ahmadi, and Mahdi Abadi. "A PCA-based distributed approach for intrusion detection in wireless sensor
networks." 2011 International Symposium on Computer Networks and Distributed Systems (CNDS). IEEE, 2011.
45. Misra, S., Abraham, K. I., Obaidat, M. S., & Krishna, P. V. (2009). LAID: a learning automata‐based scheme for intrusion detection in
wireless sensor networks. Security and Communication Networks, 2(2), 105-115.
46. Kozushko, H. (2003). Intrusion detection: Host-based and network-based intrusion detection systems. Independent study.
47. Patil, Rajendra, Harsha Dudeja, and Chirag Modi. "Designing an efficient security framework for detecting intrusions in virtual
network of cloud computing." Computers & Security 85 (2019): 402-422.
48. Mirjalili, Seyedali, Seyed Mohammad Mirjalili, and Xin-She Yang. "Binary bat algorithm." Neural Computing and Applications 25.3-4
(2014): 663-681.

Authors: N. Sanjeev, Katta.Manoj

Paper Title: An Experimental Programme on Frc with Opc, Flyash, Ggbs, and Metakaolin
Abstract: The production of Ordinary Portland Cement (OPC) is increasing year by year world over. Further,
the production of every tonne of OPC generates one tonne of green house gases, (CO2) which results in Global
Warming. Usage of OPC is more in construction industry as it is a major ingredient in Concrete. As the usage of
Concrete is increasing year by year, more and more is the OPC production and hence the environment is getting
polluted; added to this undesirable scenario, the natural resources like lime stone used to manufacture cement
and river sand are getting depleted year by year. In order to prevent the usage of large amounts of OPC in
Concrete, mineral admixtures like Ground Granulated Blast furnace Slag (GGBS), Fly Ash and Metakaolin
which are pozzolanic and cementitious in nature are adopted to replace certain percentages of OPC.
Manufactured Sand (M-sand) is adopted to replace river sand. Experimental investigation is conducted on fiber
reinforced concrete with steel fibers @1% of weight of binder by casting requisite number of cubes and
cylinders of concrete of grade M25; in these mixes OPC is replaced with GGBS, Fly Ash and Metakaolin up to
45%. Mechanical properties are determined by conducting compressive strength and split tensile strength tests;
additionally some of the durability properties are established by conducting Water absorption and Sorptivity
tests. Test results are comparable between controlled concrete and innovative concrete of present investigation.

643. Keywords: Compressive strength, Fly Ash, GGBS, Metakaolin, split tensile strength, Water absorption and
Sorptivity tests. 3713-
37
References: 17

1. B.Mangamma, Dr N.Victor babu,”An Experimental Study on Behavior of Partial Replacement of Cement with Ground Granulated
Blast Furnace Slag”, Int. Journal of Engineering Research and Application Vol. 6, Issue 12, ( Part -3) December 2016, pp.01-04)
2. IS: 280-2006 mild steel wire for general engineering purpose- Bureau of Indian Standards
3. R. dhanya, Arasan.G.” Study on strength properties of concrete using ggbs and steelfiber as partial replacement of cement”. ,Jr of
Industrial pollution Control (2017)pp1255-1259
4. Sumeet gunnure ,”Study on composite concrete flyash and Msand and Fly ash aggregates 2017” Anveshanas international journal of
research in engineering and Applied sciences.
5. Vinod Goud, Niraj Soni “Partial Replacement of Cement with Fly Ash In Concrete And Its Effect”, International organization of
Scientific Research 2250-3021, ISSN (p): 2278-8719 Vol. 06, Issue 10(Oct. 2016)
6. Al-Obtaibi ,“durability of concrete incorporating GGBS activated by water glass construction and building materials”,
(2008),22(10):2059-2067
7. Kasunaveena and Ananta Lakshmi (2017) “partial replacement of cement with ggbs and metakaolin”, International Journal of
Advances in Mechanical and Civil Engineering
8. P. Usha, L.Chris Anto, Dr.N.S.Elangovan, D. Prasannan.” Strength Characteristics of Concrete Containing Metakaolin and GGBS- A
Review”, International Journal on Applications in Civil and Environmental Engineering Volume 2: Issue 6: June 2016, pp 7-12.
9. IS 9103: Specification for Concrete Admixtures- Bureau of Indian Standards
10. IS 5161-1959 Indian standard methods of tests for strength of concrete, Bureau of Indian standards, New Delhi. India
11. IS:10262-2009 Indian standard for concrete Mix proportioning-Guidelines, Bureau of Indian standards, New Delhi. India

Authors: Sarangam kodati, S Jeeva

Paper Title: Smart Agricultural using Internet of Things, Cloud and Big Data
Abstract: Internet of Things (IoT) plays a crucial role in smart agriculture is an emerging concept, because
IOT sensors are capable of providing information about agriculture fields and then act upon based on the user
input. A smart agricultural system represents the usage of contemporary technology IoT. Because IoT sensors
capable of providing information about their agriculture fields. The proposed aims making use of evolving
technology i.e. IoT and smart agriculture using automation big data architecture in combination with cloud
computing, mobile computing, big data, by access according to real-time information or data, forecasting, and
monitoring of physical items and IoT development is expected to make a notable change in agricultural
644. management and operations. This paper focuses filed monitoring using IoT devices which would provide live
soil moisture, humidity and temperature of the field to the farmers. 3718-
37
Keywords: Big-Data, Cloud computing, Internet of Things, Mobile Computing, Smart Agriculture. 22

References:

1. Wu, Ziyu, Shijun Li, Manhua Yu, and Juxin Wu. "The Actuality of Agriculture Internet of Things for Applying and Popularizing in
China." Proceedings of the 2015 International Conference on Advances in Mechanical Engineering and Industrial Informatics (2015),
1869-1873
2. Deeksha Jain, P. Venkata Krishna and V. Saritha, “A Study on Internet of Things based Applications”, 2012, 1-10
3. Sarangam kodati, Nara sreekanth, K.pradeep reddy, Sheshan r” Data mining and big data analysis of algorithms”, International Journal
of Engineering Research-Online, Vol.6., Issue.6, 2018 Nov-Dec, ISSN: 2321-7758,43-50.
4. D. Laney, “3-D Data Management: Controlling Data Volume, Velocity and Variety”, META Group Research Note, 2001.
5. Megan Stubbs. ―Big Data in U.S. Agriculture‖. Congressional Research Service, pp. 2-8. January 6, 2016,1-14
6. S.Shibusawa and C.Haché. ―Data Collection and Analysis meth-ods for Data from Field Experiments‖. Encyclopedia of Life Sup-port
Systems. ISBN : 978-1-84826-583-7
7. Chandra Sukanya Nandyala and Haeng-Kon Kim. ―Big and Meta Data Management for U-Agriculture Mobile Services‖.
International Journal of Software Engineering and Its Applications. Vol. 10, No. 2 (2016), 257-270.
8. https://farm.bot/ “FarmBot genesis”, [Online].

Authors: Rajnish kler

Paper Title: Changes in Financial Performance of Traditional Intermediatries for Financial Innovation
Abstract: The purpose of this thesis is to examine the impact of digital bank deposit, asset and loan growth on
selected traditional bank performance measures. In order to estimate whether a causal relationship between
digital bank measures and traditional bank performance exists, Granger causality method is selected as the main
empirical model. In addition, to determine the direction and strength of said relationship, OLS regressions are
performed. Research results lead to the conclusion that digital bank deposit and loan growth have a causal
relationship to traditional bank performance ratios. Deposit growth has a negative impact on traditional bank
performance ratios and loan growth shows both positive and negative impact on different ratios. This research
demonstrates some of the challenges that traditional banks are facing in the age of innovation.

Keywords: Financial innovation, digital banks, traditional financial intermediaries, granger causality.

References:

1. Alden, W. (2014). BBVA Buys Banking Start-Up Simple for $117 Million. Available at
http://dealbook.nytimes.com/2014/02/20/bbva-buys-banking-start-up-simple-for-117-million/.
2. Altenburg, J. (2013). A Changing Telecom Landscape. Available at http://cercisconsulting.com/a-changing-telecom-landscape/.
3. Appling, G., Pappalardo, G. (2010). The Rise of Mobile Application Stores Gateways to the World of Apps. (pp 1-17) Booz &
Company. Avaiable at . http://www.strategyand.pwc.com/media/file/The_Rise_of_Mobile_Application_Stores.pdf
4. Baer, J., Rexrode, C. (2016). Bank of America, Morgan Stanley Ready to Cut More Costs. Available at
http://www.wsj.com/articles/bank-of-america-morgan-stanley-ready-to-cut-costs-1453239624.
5. Baker, S. (2015). A Bank for People Who Hate Banks. Avaiable at http://www.bloomberg.com/news/articles/2015-08-
645. 18/mondo-s-ceo-wants-to-build-a-bank-for-people-who-hate-banks. 3723-
6. Blomfield, T. (2016). The bank of the future will be a marketplace. Avaiable at
https://getmondo.co.uk/blog/2016/02/04/marketplace-banking/.
37
7. Bondora. (2015). European FinTech trends: What opportunities are investors and startups going for? (part one). Available at 28
https://www.bondora.com/blog/european-fintech-trends-part-one/.
8. CB Insights. (2016). The Rise Of Fintech Mega-Rounds: $50M+ Deals Spike in 2015. Available at
https://www.cbinsights.com/blog/rise-fintech-mega-rounds-50m-deals-spike-2015/.
9. Erheriene, E., Patrick, M. (2016). Iranian Miniskirts, Bags of Cash Raise Doubts Over Controls at HSBC. Available at
http://www.wsj.com/articles/hsbc-struggles-to-bring-money-laundering-vigilance-up-to-snuff-1459279408?mod=e2tw.
10. FCA.(2016).NewBankStart-upUnitlaunchedbythefinancialregulators.Availableat https://www.fca.org.uk/news/new-bank-startup-
unit-launched-by-the-financial-regulators.
11. Forbes.(2015).BlackRock,VanguardPostBigGainsFromRecordETFInflowsWhileStateStreet Loses Its Way. Available at
http://www.forbes.com/sites/greatspeculations/2015/06/01/blackrock-vanguard-post-big-gains-from-record-etf-inflows-while-
state-street-loses-its-way/#488f202764ad.
12. Lindman, J., Rajala, R. (2012). How Open Source Has Changed the Software Industry: Perspectives from Open Source
Entrepreneurs. Available at http://timreview.ca/article/510.
13. Jenkins, P. (2015). Start-up threat to creaking banks. Available at https://next.ft.com/content/481671a4-61ca-11e5-9846-
de406ccb37f2#axzz3z1UMpyH7.
14. Jones, R. (2014). Bank current account switch sees Halifax and Santander come out on top. Avaiable at
http://www.theguardian.com/money/2014/oct/15/bank-current-account-switch-halifax-santander.
15. Krishnan,S.(2014).ThePowerandPotentialofMobileBanking.HowtoProfitfromtheRevolution in Retail Financial Services (pp. 1–
29). John Wiley & Sons, Inc. http://doi.org/10.1002/9781118932025.ch1
16. Monopoly, A. (2016). Alec Monopoly. Available at http://alecmonopoly.com.
17. Mougayar, W. (2015).The Global Landscape of Blockchain Companies in Financial Services. Available at
http://startupmanagement.org/2015/10/22/the-global-landscape-of-blockchain-companies-in-financial-services/.
18. Verity, A. (2016). BBC News. Who's afraid of the big bad rate rise? Available athttp://www.bbc.co.uk/news/business-35293442.
19. Williams, A. (2015). The Financial Times. Nutmeg customers caught in data breach. Available at
https://next.ft.com/content/0eef1d02-87a1-11e5-9f8c-a8d619fa707c.
20. Williams-Grut, O. (2016) App-only bank Mondo is valued at £30 million in an oversubscribed £6 million fundraise. Available at
http://uk.businessinsider.com/mondo-bank-valued-at-30-million-in-6-million-fundraise-2016-2.

Authors: Rama Sree S, Ramesh S.N.S.V.S.C, Prasada Rao Ch


An Effective Software Effort Estimation based on Functional Points using Soft Computing
Paper Title:
Techniques
Abstract: Still in this 21st century, it is a great challenge for the Project Managers to make the software
projects successful. The success of software projects relies on how accurately the estimates of effort, cost and
duration can be made. Most of the standard surveys stated that only 30-40% of software projects are successful
and the remaining are either challenged, cancelled or failed. One of the key reasons for failure of projects is
inaccurate estimations. Effort Estimation should be carried out in the early stage of Software Development Life
Cycle (SDLC) and it is an essential activity to establish scope & business case of software project management
activities. Over estimation or under estimation leads to failure of the software projects. Many of the stakeholders
are expecting the estimation of development effort in early stage for their better bidding. There are many
methodologies like KLOC, Use Case Points (UCP), Class Points, Story Points, Test Case Points, Functional
Points (FP), etc. to estimate effort in the software development. To estimate the effort in the early stage of
software development, UCP, Story Points and FP are more preferable. The methods for estimation may be
adopted based on the project complexity, functionality, approaches etc. In order to achieve an efficient and
reliable effort estimate and thereby have a proper execution of software development plan, Soft Computing
Techniques can be adopted in the various organizations and different research domains. In this paper,
Functional Points have been selected for effort estimation and implemented using soft computing techniques like
Neural Networks and Neuro Fuzzy techniques. After examination the results are evaluated using different error
measures like VAF,MMRE,RAE, RRSE and PRED. Basing on results it is observed that the Neuro Fuzzy
techniques provided better effort estimates

646. Keywords: Rama Sree S, Ramesh S.N.S.V.S.C, Prasada Rao Ch.


3729-
37
References:
33
1. Kjetil and Dr. Mark “ A reflection on why large public projects fail” in 2013
2. TSOI Ho-Leung “To Evaluate the Function Point Analysis-A Case Study”, International Journal of The Computer, the Internet and
Management Vol. 13#1 (January – April, 2005) pp 31 - 40
3. Amit Johnsonbabu “Reinventing the role of Project manager in the Artificial intelligence era” , Project management national
conference, india,2017.
4. Lavazza, Luigi, and Roberto Meli. "AnEvaluation of Simple Function Point as a Replacement of IFPUG Function Point", 2014 Joint
Conference of the International Workshop on Software Measurement and the International Conference on Software Process and
Product Measurement, 2014.
5. Garmus, David. "A Guide to Sizing and estimating Projects Using international Function Point Users Group Function Points",The
IFPUG Guide to IT and Software Measurement, 2012
6. Manideep Kaur, Sumeet Kaur “Particle Swarm Optimization Based Effort Estimation Using Function Point Analysis” Internationai
Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014
7. Tharwon Arnuphaptrairong “Early Stage Software Effort Estimation Using Function Point Analysis: An Empirical Validation”
international journal of design, analysis and tools for intergrated circuits and systems, vol. 4, no. 1, december 2013
8. Gianfranco Lanza “Function Point: how to transform them in effort? This is the problem!” Proceedings 5th Software Measurement
European Forum, Milan 2008
9. Luigi Lavazza and Sandro Morasca “An Empirical Evaluation of Two COSMIC Early Estimation Methods” Joint Conference of the
International Workshop on Software Measurement and the International Conference on Software Process and Product Measurement,
2016.
10. Prasad Reddy P.V.G.D , Sudha K. R , Rama Sree P “Prediction of Software Development Effort Using RBNN and GRNN” IJCSET |
May 2011 | Vol 1, Issue 4,185-190
11. Prabhakar and Maitreyee Dutta “Application of machine learning techniques for predicting software effort” Prabhakar et al./ Elixir
Comp. Sci. & Engg. 56 (2013) 13677-13682
12. Sultan Aljahdali “Estimating Software Effort and Function Point Using Regression, Support Vector Machine and Artificial Neural
Networks Models” IEEE,2015

Authors: K. Gomathi, Rajini.G

Paper Title: Organizational Ergonomics: Human Engineering Leading To Employee Well-Being


Abstract: Human engineering is the application of mental health and physiological principles to the structure
of products, procedures, and schemes. The aim of human engineering is to decrease human mistake, improve
productivity level, and increase safety and well-being with a particular focus on the association between the
human and the thing of intrigue. Practicing good ergonomics leads to increased productivity, improved health
and safety of workers, higher job satisfaction and retention of employees. Sampling technique is probability,
multistage sampling , sampling units garment companies, The multiple regression analysis was used to study the
647.
relationship between the factors influencing ergonomics, resilience, subjective and objective well-being. This 3734-
study was conducted in India’s Textile hub of Garment industry: Tiruppur District, Tamilnadu state. The data 37
was collected from 453 garment industry employees through a structured questionnaire. The finding of this study 43
organisational ergonomics, resilience, subjective well-being and objective well-being has strongly depends on
physical workplace environment and machines. Task, but doesn’t have an effect of psychosocial factor.
Subjective well-being strongly depends on Task, Organisational ergonomics, Resilience. Objective well-being is
depends on organisational ergonomics. Proper workplace environment and good condition machinery creates
better comfortable and safe workplace which leads to employee well-being. Human engineering factors
(Physical workplace environment, Machines, Task, and Psychosocial Factor) facilitated by organisational
ergonomics leads to a better employee well-being.

Keywords: Human engineering, Organizational Ergonomics, Resilience, Objective Well-being, Subjective


Well-being, Textile industry.

References:

1. Boswell, G.H, Kahana, E., and Dilworth-Anderson, P, “Spirituality and healthy lifestyle behaviors: Stress counter-balancing effects on
the well-being of older adults.” Journal of Religion & Health, 2006, pp587-602.
2. Chapanis, A, “Some reflections on progress. Proceedings of the human factors” 29th annual meeting. Santa Monica. USA,1-8, 1985.
3. Chandrasekar, A “workplace environment and its impact on organisational performance in public sector organisations.” International
journal of enterprise computing and business systems, vol.1 (1), 2011.
4. C.R. Kothari, “Research Methodology, 2 ed,New Delhi, India, 2004.
5. Eklund, J, “Relationships between ergonomics and quality in assembly work.” Applied Ergonomics, 26 (1), 1995, pp 15–20.
6. Hair, J.F, “Multivariate data analysis.” 6th edition. Pearson Prentice Hall, New york, 2006.
7. Hair JF, “ Research methods for business.” 2007.
8. International Ergonomics Association, What is Ergonomics. Retrieved 16 September 2013.
9. James, K., and Shaw, “A study of stress, its causes and factors for its mitication.” Air Command and staff college air university,
Maxwell Air Force Base, 1987.
10. Karwowski, W., Kantola, J., Rodrick, D. And Salvendy, G, “Macro ergonomics aspects of manufacturing. In Macro ergonomics: An
Introduction to Work System Design, H.W. Hendrick and B.M. Kleiner (Eds.), 2002, pp223 – 248 (Mahwah, NJ: Erlbaum).
11. Shrestha and Shruti, “Improving employee performance.” Journal of banking and finance, Vol.E90–D, No.10, 2007, pp. 1621-1629.
12. Makhbul, Z.M. and D. Idrus, “Work stress issues in Malaysia.” Malaysia Labour Revier, 3(2): 2009, pp13-26. View at Google Scholar
13. M. Hassall, T. Xiao, P. Sanderson, A. Neal, “Human Factors and Ergonomics.” International Encyclopaedia of the Social &
Behavioural Sciences, (Second Edition), 2015,pp: 297-305.
14. Murrell, K., “Ergonomics-Man in his Working Environment.” Springer, London, 1971.
15. Rafaeli, A., & Sutton, R. I, “The expression of emotion as part of the work role.” Academy of Management Review, 1987, pp23-37.
16. Rajini.G, “A Multivariate Analysis to determine Work life Balance for Nurses.” In Nirmal Kumar.R.T and Arul Rajan.K (eds)
Changing Perspectives of Management: Revisiting the Past, Analyzing the Present and Exploring the Future. India: HIS ,2011, pp. 617-
626
17. Sanders, Mark, S., and Ernest, J., and McCormick, “Human Factors in Engineering and Design.” New York, McGraw-Hill, 1987.
18. Sluchak, T.J, “Ergonomics: Origins, Focus and Implementation Considerations.” Journal of the American Association of Occupational
Health Nurses, 40(3), 1992, pp105-11.

Authors: K. Gomathi, Rajini.G

Paper Title: Organizational Ergonomics: Human Engineering Leading To Employee Well-Being


Abstract: Human engineering is the application of mental health and physiological principles to the structure
of products, procedures, and schemes. The aim of human engineering is to decrease human mistake, improve
productivity level, and increase safety and well-being with a particular focus on the association between the
human and the thing of intrigue. Practicing good ergonomics leads to increased productivity, improved health
and safety of workers, higher job satisfaction and retention of employees. Sampling technique is probability,
multistage sampling , sampling units garment companies, The multiple regression analysis was used to study the
relationship between the factors influencing ergonomics, resilience, subjective and objective well-being. This
study was conducted in India’s Textile hub of Garment industry: Tiruppur District, Tamilnadu state. The data
was collected from 453 garment industry employees through a structured questionnaire. The finding of this study
organisational ergonomics, resilience, subjective well-being and objective well-being has strongly depends on
physical workplace environment and machines. Task, but doesn’t have an effect of psychosocial factor.
Subjective well-being strongly depends on Task, Organisational ergonomics, Resilience. Objective well-being is
depends on organisational ergonomics. Proper workplace environment and good condition machinery creates
better comfortable and safe workplace which leads to employee well-being. Human engineering factors
(Physical workplace environment, Machines, Task, and Psychosocial Factor) facilitated by organisational
ergonomics leads to a better employee well-being.
648.
Keywords: Human engineering, Organizational Ergonomics, Resilience, Objective Well-being, Subjective 3744-
Well-being, Textile industry. 37
49
References:

1. Boswell, G.H, Kahana, E., and Dilworth-Anderson, P, “Spirituality and healthy lifestyle behaviors: Stress counter-balancing
effects on the well-being of older adults.” Journal of Religion & Health, 2006, pp587-602.
2. Chapanis, A, “Some reflections on progress. Proceedings of the human factors” 29th annual meeting. Santa Monica. USA,1-8,
1985.
3. Chandrasekar, A “workplace environment and its impact on organisational performance in public sector organisations.”
International journal of enterprise computing and business systems, vol.1 (1), 2011.
4. C.R. Kothari, “Research Methodology, 2 ed,New Delhi, India, 2004.
5. Eklund, J, “Relationships between ergonomics and quality in assembly work.” Applied Ergonomics, 26 (1), 1995, pp 15–20.
6. Hair, J.F, “Multivariate data analysis.” 6th edition. Pearson Prentice Hall, New york, 2006.
7. Hair JF, “ Research methods for business.” 2007.
8. International Ergonomics Association, What is Ergonomics. Retrieved 16 September 2013.
9. James, K., and Shaw, “A study of stress, its causes and factors for its mitication.” Air Command and staff college air university,
Maxwell Air Force Base, 1987.
10. Karwowski, W., Kantola, J., Rodrick, D. And Salvendy, G, “Macro ergonomics aspects of manufacturing. In Macro ergonomics:
An Introduction to Work System Design, H.W. Hendrick and B.M. Kleiner (Eds.), 2002, pp223 – 248 (Mahwah, NJ: Erlbaum).
11. Shrestha and Shruti, “Improving employee performance.” Journal of banking and finance, Vol.E90–D, No.10, 2007, pp. 1621-
1629.
12. Makhbul, Z.M. and D. Idrus, “Work stress issues in Malaysia.” Malaysia Labour Revier, 3(2): 2009, pp13-26. View at Google
Scholar
13. M. Hassall, T. Xiao, P. Sanderson, A. Neal, “Human Factors and Ergonomics.” International Encyclopaedia of the Social &
Behavioural Sciences, (Second Edition), 2015,pp: 297-305.
14. Murrell, K., “Ergonomics-Man in his Working Environment.” Springer, London, 1971.
15. Rafaeli, A., & Sutton, R. I, “The expression of emotion as part of the work role.” Academy of Management Review, 1987, pp23-
37.
16. Rajini.G, “A Multivariate Analysis to determine Work life Balance for Nurses.” In Nirmal Kumar.R.T and Arul Rajan.K (eds)
Changing Perspectives of Management: Revisiting the Past, Analyzing the Present and Exploring the Future. India: HIS ,2011,
pp. 617-626
17. Sanders, Mark, S., and Ernest, J., and McCormick, “Human Factors in Engineering and Design.” New York, McGraw-Hill, 1987.
18. Sluchak, T.J, “Ergonomics: Origins, Focus and Implementation Considerations.” Journal of the American Association of
Occupational Health Nurses, 40(3), 1992, pp105-11.
Authors: Mallika Verma, Ankur Bhardwaj

Paper Title: Implementation of FFT Architecture using Various Adders


Abstract: In 1965 a technique called Fast Fourier Transform (FFT) was invented to find the Fourier
Transform. This paper compares three architectures, the basic architecture/ non-reduced architecture of FFT,
decomposed FFT architecture without retiming and decomposed FFT architecture with retiming. In each case,
the adder used will be Ripple Carry Adder (RCA) and Carry Save Adder (CSA). A fast Fourier transform (FFT)
calculates the discrete Fourier transform (DFT) or the inverse (IDFT) of a sequence. Fourier analysis transforms
a signal from time to frequency domain or vice versa. One of the most burgeoning use of FFT is in Orthogonal
Frequency Division Multiplex (OFDM) used by most cell phones, followed by the use in image processing. The
synthesis has been carried out on Xilinx ISE Design Suite 14.7. There is a decrease in delay of 0.824% in Ripple
Carry Adder and 6.869% in Carry Save Adder, further the reduced architecture for both the RCA and CSA
architectures shows significant area optimization (approximately 20%) from the non-reduced counterparts of the
FFT implementation.

649. Keywords: Area optimization, CSA, Decomposition, DFT, FFT, IDFT, Non- Reduced, OFDM, RCA
3750-
References: 37
55
1. Xie Yan-lin. “Design and Implementation of a scalable pipeline FFT Processor Based on FPGA” D.Xi Dian University, 2007.
2. V. Mangaiyarkarasi, Dr. C.Kumar Charlie Paul, “Performance analysis between Radix2, Radix4, Mixed Radix4-2 and Mixed Radix8-2
FFT”, 2nd International Conference on Current Trends in Engineering and Technology, ICCTET’14
3. Chen, Y., Lin, Y.W. and Lee, C.Y., “A block scaling FFT/IFFT processor for WiMax applications,” in Proc. 2nd IEEE Asian Solid-State
Circuits Conf., Hangzhou, China, Nov.2006, pp. 203-206.
4. Alan V. Oppenheim, Ronald W. Schafer, and John R. Buck, Discrete-Time Signal Processing, 2nd edition (Upper Saddle River, NJ:
Prentice Hall, 1989).
5. R.Mahalakshmi , Dr.T.Sasilatha, “A power efficient carry save adder and modified carry save adder using CMOStechnology”, 2013
IEEE International Conference on Computational Intelligence and Computing Research, Enathi, 2013, pp. 1-5.
6. S. Nagaraj, G. M. S. Reddy and S. A. Mastani, "Analysis of different Adders using CMOS, CPL and DPL logic," 2017 14th IEEE India
Council International Conference (INDICON), Roorkee, 2017, pp. 1-6.
7. Saxena, P., Pan, P., & Liu, C. L, “The retiming of single-phase clocked circuits containing level-sensitive latches”. Proceedings Twelfth
International Conference on VLSI Design, Goa, India, 1999, pp. 402-407
8. C. E. Leiserson and J. B. Saxe, “Retiming synchronous circuitry,” Algorithmica, vol. 6, nos. 1–6, pp. 5–35, Jun. 1991.
9. Shashidhara. K. S, H.C. Srinivasaiah, “Low Power and Area efficient FFT architecture through decomposition technique”, International
Conference on Computer Communication and Informatics (ICCCI -2017), Jan. 05 – 07, 2017, Coimbatore, INDIA.

Authors: Jagadheeswaran Kathirvel, Elango Parasuraman

Paper Title: A QoS-Latency Aware Event Stream Processing with Elastic-FaaS


Abstract: Stream processing systems need to be elastically scalable to process and respond the unpredictable
massive load spike in real-time with high throughput and low latency. Though the modern cloud technologies
can help in elastically provisioning the required computing resources on-the-fly, finding out the right point-in-
time varies among systems based on their expected QoS characteristics. The latency sensitivity of the stream
processing applications varies based on their nature and pre-set requirements. For few applications, even a little
latency in the response will have huge impact, whereas for others the little latency will not have that much
impact. For the former ones, the processing systems are expected to be highly available, elastically scalable, and
fast enough to perform, whenever there is a spike. The time required to elasticity provision the systems under
FaaS is very high, comparing to provisioning the Virtual Machines and Containers. However, the current FaaS
systems have some limitations that need to be overcome to handle the unexpected spike in real-time. This paper
proposes a new algorithm called Elastic-FaaS on top of the existing FaaS to overcome this QoS latency issue.
Our proposed algorithm will provision required number of FaaS container instances than any typical FaaS can
provision normally, whenever there is a demand to avoid the latency issue. We have experimented our algorithm
with an event stream processing system and the result shows that our proposed Elastic-FaaS algorithm performs
better than typical FaaS by improving the throughput that meets the high accuracy and low latency requirements.
650.
Keywords: Data Stream Processing, Serverless, Function-as-a-Service, Elastic FaaS.

References:

1. B. Gedik, S. Schneider, M. Hirzel and K. Wu, "Elastic Scaling for Data Stream Processing," in IEEE Transactions on Parallel and
Distributed Systems, vol. 25, no. 6, pp. 1447-1463, June 2014. doi: 10.1109/TPDS.2013.295
2. Cervino, J.; Kalyvianaki, E.; Salvachua, J.; Pietzuch, P., "Adaptive Provisioning of Stream Processing Systems in the Cloud," Data
Engineering Workshops (ICDEW), 2012 IEEE 28th International Conference on, vol., no., pp.295,301, 1-5 April 2012
3. J. Kathirvel and E. Parasuraman, "Effective data stream mining using ensemble on cloud with load balancing (E2CL)," 2015
International Conference on Computing and Communications Technologies (ICCCT), Chennai, 2015, pp. 383-386. doi:
10.1109/ICCCT2.2015.7292780
4. Heinze, T., Ji, Y., Pan, Y., Grüneberger, F.J., Jerzak, Z., & Fetzer, C. (2013). Elastic Complex Event Processing under Varying Query
Load. BD3@VLDB.
5. B. Lohrmann, P. Janacik and O. Kao, "Elastic Stream Processing with Latency Guarantees," 2015 IEEE 35th International Conference
on Distributed Computing Systems, Columbus, OH, 2015, pp. 399-410. doi: 10.1109/ICDCS.2015.48
6. T. Heinze, V. Pappalardo, Z. Jerzak and C. Fetzer, "Auto-scaling techniques for elastic data stream processing," 2014 IEEE 30th
International Conference on Data Engineering Workshops, Chicago, IL, 2014, pp. 296-302.
doi: 10.1109/ICDEW.2014.6818344
7. Lorido-Botran, Tania et al. “A Review of Auto-scaling Techniques for Elastic Applications in Cloud Environments.” Journal of Grid
Computing 12 (2012): 559-592.
8. Brogi A., Mencagli G., Neri D., Soldani J., Torquati M. (2018) Container-Based Support for Autonomic Data Stream Processing
Through the Fog. In: Heras D. et al. (eds) Euro-Par 2017: Parallel Processing Workshops. Euro-Par 2017. Lecture Notes in Computer
Science, vol 10659. Springer, Cham
9. M. R. HoseinyFarahabady, A. Y. Zomaya and Z. Tari, "A Model Predictive Controller for Managing QoS Enforcements and
Microarchitecture-Level Interferences in a Lambda Platform," in IEEE Transactions on Parallel and Distributed Systems, vol. 29, no. 7,
pp. 1442-1455, 1 July 2018. doi: 10.1109/TPDS.2017.2779502
10. HoseinyFarahabady M., Lee Y.C., Zomaya A.Y., Tari Z. (2017) A QoS-Aware Resource Allocation Controller for Function as a
Service (FaaS) Platform. In: Maximilien M., Vallecillo A., Wang J., Oriol M. (eds) Service-Oriented Computing. ICSOC 2017. 3756-
Lecture Notes in Computer Science, vol 10601. Springer, Cham
11. Ali Kanso and Alaa Youssef. 2017. Serverless: beyond the cloud. In Proceedings of the 2nd International Workshop on Serverless 37
Computing (WoSC '17). ACM, New York, NY, USA, 6-10. DOI: https://doi.org/10.1145/3154847.3154854 62
12. Stefan Brenner and Rüdiger Kapitza. 2019. Trust more, serverless. In Proceedings of the 12th ACM International Conference on
Systems and Storage (SYSTOR '19). ACM, New York, NY, USA, 33-43. DOI: https://doi.org/10.1145/3319647.3325825
13. J. Kuhlenkamp and S. Werner, "Benchmarking FaaS Platforms: Call for Community Participation," 2018 IEEE/ACM International
Conference on Utility and Cloud Computing Companion (UCC Companion), Zurich, 2018, pp. 189-194.
doi: 10.1109/UCC-Companion.2018.00055
14. C. Pahl, "Containerization and the PaaS Cloud," in IEEE Cloud Computing, vol. 2, no. 3, pp. 24-31, May-June 2015.
doi: 10.1109/MCC.2015.51
15. W. Felter, A. Ferreira, R. Rajamony and J. Rubio, "An updated performance comparison of virtual machines and Linux
containers," 2015 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS), Philadelphia, PA,
2015, pp. 171-172. doi: 10.1109/ISPASS.2015.7095802
16. Cristina L. Abad, Edwin F. Boza, and Erwin van Eyk. 2018. Package-Aware Scheduling of FaaS Functions. In Companion of the 2018
ACM/SPEC International Conference on Performance Engineering (ICPE '18). ACM, New York, NY, USA, 101-106. DOI:
https://doi.org/10.1145/3185768.3186294
17. M. Sewak and S. Singh, "Winning in the Era of Serverless Computing and Function as a Service," 2018 3rd International Conference
for Convergence in Technology (I2CT), Pune, 2018, pp. 1-5. doi: 10.1109/I2CT.2018.8529465
18. Baldini I. et al. (2017) Serverless Computing: Current Trends and Open Problems. In: Chaudhary S., Somani G., Buyya R. (eds)
Research Advances in Cloud Computing. Springer, Singapore
19. J. Manner, M. Endreß, T. Heckel and G. Wirtz, "Cold Start Influencing Factors in Function as a Service," 2018 IEEE/ACM
International Conference on Utility and Cloud Computing Companion (UCC Companion), Zurich, 2018, pp. 181-188. doi:
10.1109/UCC-Companion.2018.00054
20. Serverless Architectures - Martin Fowler, https://martinfowler.com/articles/serverless.html
21. Batch Processing vs Real Time Processing – Comparison, https://data-flair.training/blogs/batch-processing-vs-real-time-processing/
22. Azure Functions scale and hosting, https://docs.microsoft.com/en-us/azure/azure-functions/functions-scale
23. Azure Functions Trigger – scaling, https://docs.microsoft.com/en-us/azure/azure-functions/functions-bindings-event-hubs#trigger---
scaling
24. Azure Function CLI, https://docs.microsoft.com/en-us/azure/azure-functions/functions-create-first-azure-function-azure-cli
25. AWS scaling, https://docs.aws.amazon.com/lambda/latest/dg/scaling.html
26. AWS concurrent executions, https://docs.aws.amazon.com/lambda/latest/dg/concurrent-executions.html
Authors: Rajesh S M, Suresh kumar K R
651.
Paper Title: User Satisfaction Detection System for Smart Healthcare using Multimedia
Abstract: Emotion plays a critical job ineffectively conveying one’s convictions and intentions. As an
outcome, identification of emotion has turned into focus point of few studies recently. Patient observing models
are getting to be significant in patient concern and can endow with helpful feedback related to health issues for
caregivers and clinicians. In this work, patient fulfilment recognition framework is proposed that uses image
frames extracted from the recorded visual-audio modality dataset. The images are treated with techniques such
as Local Binary Pattern (LBP) which is a ocular descriptor. The proposed framework incorporates feature
extraction from the images and then the Support Vector Machine (SVM) is applied for classification. The three
distinct types of emotions are whether the patient is happy, sad or neutral and the same are detected based on the
results. The result of such an analysis can be made use of by a group of analysts which include doctors,
healthcare experts and system experts to improve smart healthcare system in steps. The reliability of information
provided by such a system makes such upgradations more meaningful.

Keywords: Patient monitoring, Emotion detection, feature extraction, LBP, SVM.

References:

1. Orith Toledo-Ronen and Alexander Sorin, “Emotion Detection for Dementia Patients Monitoring”, IBM Research – Haifa.
2. Saeed Turabzadeh, Hongying Meng, Rafiq M. Swash, Matus Pleva and Jozef Juhar, “Facial Expression Emotion Detection for Real- 3763-
Time Embedded Systems”, Technologies 2018, 6, 17; doi:10.3390/technologies6010017. 37
3. Monika Dubey and Prof. Lokesh Singh, “Automatic Emotion Recognition Using Facial Expression: A Review”, International Research 66
Journal of Engineering and Technology (IRJET), Volume: 03 Issue: 02, Feb-2016.
4. Prachi Shukla and Sandeep Patil, “Survey Paper on Emotion Recognition”, International Journal of Engineering and Applied Sciences
(IJEAS) ISSN: 2394-3661, Volume-3, Issue-2, February 2016.
5. Assel Davletcharova, Sherin Sugathan, Bibia Abraham and Alex Pappachen James, “Detection and Analysis of Emotion From Speech
Signals”, Procedia Computer Science.
6. M. Alpert, E. R. Pouget, R.R. Silva, “Reflections of depression in acoustic measures of the patient’s speech,” Journal of Affective
Disorders, 66:59–69, 2001.
7. Ghulam Muhammad, Mansour Alsulaiman, Syed Umar Amin, Ahmed Ghoneim and Mohammed F. Alhamid, “A Facial-Expression
Monitoring System for Improved Healthcare in Smart Cities”, DOI 10.1109/ACCESS.2017.2712788, IEEE Access.
8. K.Wang, N. An, B. N. Li, Y. Zhang, and L. Li, “Speech emotion recognitionusing Fourier parameters,”IEEE Trans. Affect. Comput.,
vol. 6, no. 1,pp. 69_75, Jan. 2015.
9. H. Muthusamy, K. Polat, and S. Yaacob, “Improved emotion recognitionusing Gaussian mixture model and extreme learning machine
in speech andglottal signals,”Math. Problems Eng., vol. 2015, 2015, Art. no. 394083.
10. M. S. Hossain, “A patient's state recognition system for healthcareusing speech and facial expression,” J. Med. Syst., vol. 40, no. 12,pp.
272:1_272:8, Dec. 2016.
11. Atif Alamri, “Monitoring System for Patients Using Multimedia for SmartHealthcare”, DOI 10.1109/ACCESS.2018.2826525, IEEE
Access.
12. S. Datta, D. Sen, and R. Balasubramanian, “Integratinggeometric and textural features for facial emotion classificationusing SVM
frameworks,” Proc. Int. Conference on ComputerVision and Image Processing (CVIP), 2016, pp. 619-628.
13. Di Huang and Yunhong Wang, “Local Binary Patterns and Its Application to Facial Image Analysis: A Survey”, IEEE Transactions
on Systems Man and Cybernetics Part C (Applications and Reviews), November 2011.

Authors: Sukhvinder Singh Paposa, V.G. Ukinkar, Kamalpreet Kaur Paposa


Service Quality and Customer Satisfaction: Variation in Customer Perception Across
Paper Title:
Demographic Profiles in Life Insurance Industry
Abstract: There is a strong growth potential in the India’s Life Insurance Industry. The annual growth of the
industry is estimated at 12 to 15 percent for the upcoming years. This study investigates the impact that service
quality has on customer satisfaction in India’s Life Insurance Industry. Moreover, the study attempts to identify
the variation in perception of service quality among respondents in relation to demographic profiles. The study
also postulates the best approach to evaluate the quality of services in the life insurance industry through an in-
depth review of literature on the various model pertaining to the current times to measure service quality. The
sample consist of policy holders who receive services from life insurance companies in Durg region,
Chhattisgarh. The study employs the various attributes as stated in the SERVPERF model like tangibility,
reliability, assurance/safety, empathy, responsiveness along with an additional component of technology to
evaluate the perception of policy holders in relation to service quality. Results of the study confirms that quality
of services has a significant impact on satisfaction of the customer in life insurance industry. Age and occupation
652. are the two most important demographic variable, which have significant effect on the overall service quality
perception. From a managerial perspective, the research work gives a better understanding of how customers 3767-
assess the service quality and the parameters which the service providers need to take care of while delivering 37
services. 75

Keywords: Capacity enhancement, Line balancing, Value stream mapping.

References:

111. Sathish Kumar V. R., Anbuudayasankar S. P. and Thennarasu M., (2016). Design and development of simulation based model to rank
flow strategies, ARPN Journal of Engineering and Applied Sciences, Vol. 11, No. 9.
112. Priyaadarshini R.G., Sathish Kumar V. R., and Aishwarya Rajlakshmi.S., (2018). Study on lean thinking among MSMEs in the
Machine tool sector in India, IOP Conf. Ser. Mater. Sci. Eng., vol. 310, No. 1, 2018.
113. Sathish Kumar V. R. and Anbuudayasankar S. P., (2019) Optimization of a five echelon supply chain network using particle swarm
intelligence algorithms, International Journal of Innovative Technology and Exploring Engineering, Vol. 8 No. 9.
114. Garza-Reyes, J. A., Romero, J. T., Govindan, K., Cherrafi, A., & Ramanathan, U. (2018). A PDCA-based approach to environmental
value stream mapping (E-VSM). Journal of cleaner production, 180, 335-348.
115. Dadashnejad, A. A., & Valmohammadi, C. (2019). Investigating the effect of value stream mapping on overall equipment
effectiveness: a case study. Total Quality Management & Business Excellence, 30(3-4), 466-482.
116. Abdulmalek, F. A., & Rajgopal, J. (2007). Analyzing the benefits of lean manufacturing and value stream mapping via simulation: A
process sector case study. International Journal of production economics, 107(1), 223-236.
117. Gurumurthy, A., & Kodali, R. (2011). Design of lean manufacturing systems using value stream mapping with simulation: a case
study. Journal of manufacturing technology management, 22(4), 444-473.
118. Serrano, I., Ochoa, C., & Castro, R. D. (2008). Evaluation of value stream mapping in manufacturing system redesign. International
Journal of Production Research, 46(16), 4409-4430.
119. Meudt, T., Metternich, J., & Abele, E. (2017). Value stream mapping 4.0: Holistic examination of value stream and information
logistics in production. CIRP Annals, 66(1), 413-416.
120. Gangala, C., Modi, M., Manupati, V. K., Varela, M. L., Machado, J., & Trojanowska, J. (2017, April). Cycle time reduction in deck
roller assembly production unit with value stream mapping analysis. In World Conference on Information Systems and
Technologies (pp. 509-518). Springer, Cham.
121. Kumar, S., Dhingra, A. K., & Singh, B. (2018). Process improvement through Lean-Kaizen using value stream map: a case study in
India. The International Journal of Advanced Manufacturing Technology, 96(5-8), 2687-2698.
122. Buer, S. V., Strandhagen, J. O., & Chan, F. T. (2018). The link between Industry 4.0 and lean manufacturing: mapping current research
and establishing a research agenda. International Journal of Production Research, 56(8), 2924-2940.
123. Garza-Reyes, J. A., Kumar, V., Chaikittisilp, S., & Tan, K. H. (2018). The effect of lean methods and tools on the environmental
performance of manufacturing organisations. International Journal of Production Economics, 200, 170-180.
124. Bukchin, Y., & Raviv, T. (2018). Constraint programming for solving various assembly line balancing problems. Omega, 78, 57-68.
125. Pereira, J., & Álvarez-Miranda, E. (2018). An exact approach for the robust assembly line balancing problem. Omega, 78, 85-98.
126. Borba, L., Ritt, M., & Miralles, C. (2018). Exact and heuristic methods for solving the robotic assembly line balancing
problem. European Journal of Operational Research, 270(1), 146-156.
127. Ritt, M., & Costa, A. M. (2018). Improved integer programming models for simple assembly line balancing and related
problems. International Transactions in Operational Research, 25(4), 1345-1359.
128. Defersha, F. M., & Mohebalizadehgashti, F. (2018). Simultaneous balancing, sequencing, and workstation planning for a mixed model
manual assembly line using hybrid genetic algorithm. Computers & Industrial Engineering, 119, 370-387.
129. Dolgui, A., Kovalev, S., Kovalyov, M. Y., Malyutin, S., & Soukhal, A. (2018). Optimal workforce assignment to operations of a paced
assembly line. European Journal of Operational Research, 264(1), 200-211.
130. Saravanan, V., Nallusamy, S., & George, A. (2018). Efficiency enhancement in a medium scale gearbox manufacturing company
through different lean tools-A case study. In International Journal of Engineering Research in Africa (Vol. 34, pp. 128-138). Trans
Tech Publications.

Authors: Neha Agarwal, Ashok Kumar Verma


Measurement of Thickness of Foam layer and Entrance Region in a Bubble Column using Image
Paper Title:
Processing Technique
Abstract: Photographic method is a direct method for study of bubble behavior. Hydrodynamic study in a
rectangular bubble column (0.37m X 0.2m X 0.02m) for air-water system was studied using photographic
technique by recording movie at 120fps. Image processing tools were applied to measure regions of gas-liquid
dispersion, entrance, foam layer and bubble-bursting were identified. The foam layer thickness showed maxima
at Ug = 0.1 m s-1. It decreased with increasing static bed height. The width of entry region also passed through
maxima, though it was not sharp. The width of entry region increased with increasing settled bed height. Gas
holdup measured in terms of pixel density deviated from experimental values with increasing superficial gas
velocity due to overlapping bubbles. The average gas holdup decreased with increasing static bed height.

Keywords: Bubble column, Gas holdup, Hydrodynamics, Iimage processing, Multi-phase system.

References:
1. Y. Bando, T. Kuze, T. Sugimot, K. Yasda, M. Nakamura, “Development of Bubble Column for Foam Separation”. Korean J. Chem.
Eng. vol. 17(5),2002, pp.597-599.
2. Verma, A. K. “Process Modeling and Simulation in Chemical, Biochemical and Environmental Engineering. CRC Press, 2014, Boca
Raton.
3. C. Leonard, J. H. Ferrasse, O. Boutin, S. Lefevre, A. Viand, “Bubble column reactors for high pressures and high temperatures
operation”, Chem. Eng. Res. Des. vol. 100, 2015, pp.391-421.
4. S. Zhong, X. Zou, Z. Zhang, H. Tian, “A flexible image analysis method for measuring bubble parameters”. Chem. Eng. Sci. vol.
141,2016, pp.143–153.
5. M. A. Bennet, R. M. West, S. P. Luke, R. A. Williams, “The investigation of bubble column and foam processes using electrical 3776-
653. capacitance tomography”, Miner. Eng. vol. 15, 2002, pp.225-235. 37
6. U. P. Veera, K. L. Kataria, J. B. Joshi, “Effect of superficial gas velocity on gas hold-up profiles in foaming liquids in bubble column 81
reactors”, Chem. Eng. J. vol. 99,2004, pp.53-58.
7. F. Yamashita, “Effect of Foam Layer on Gas Holdup in a Bubble Column”. J. Chem. Eng. Jpn. vol. 28(6),1995, pp.837-840.
8. L. Pilon, A. G. Fedorov, R. Viskanta, “Steady-State Thickness of Liquid–Gas Foams”, J. Colloid Interface Sci. vol. 242, 2001, pp.425-
436.
9. L. Pilon, R. Viskanta, “Minimum Superficial Gas Velocity for onset of Foaming”, Chem. Eng. Process. vol. 43, 2004, pp.149-160.
10. A. Karn, C. Ellis, R. Arndt, J. Hong, “An integrative image measurement technique for dense bubbly flows with a wide size
distribution”, Chem. Eng. Sci. vol. 122, 2015, pp.240–249.
11. F. S. Ahmed, B. A. Sensenich, S.A. Gheni, D. Znerdstrovic, M. H. Al-Dahhan, “Bubble Dynamics in 2D Bubble Column: Comparison
between highspeed camera imaging analysis and 4-point optical probe”, Chem. Eng. Commun. vol. 202, 2013, pp.85–95.
12. Y. M. Lau, N. G. Deen, J. A. M. Kuipers, “Development of an image measurement technique for size distribution in dense bubbly
flows”, Chem. Eng. Sci. vol. 94, 213, pp.20–29.
13. Y. M. Lau, K. T. Sujatha, M. Gaeini, N. G. Deen, J. A. M. Kuipers, “Experimental study of the bubble size distribution in a pseudo-2D
bubble column”, Chem. Eng. Sci. vol. 98, 2013, pp.203–211.
14. Y. Fu, Y. Liu, “Development of a robust image processing technique for bubbly flow measurement in a narrow rectangular channel”, Int.
J. Multiphase Flow. vol. 84, 2016, pp. 217–228.
15. G. Besagni, F. Inzoli, “Comprehensive experimental investigation of counter-current bubble column hydrodynamics: Holdup, flow
regime transition, bubble size distributions and local flow properties”, Chem. Eng. Sci. vol. 146, 2016, pp.259–290.
16. G. Besagni, F. Inzoli, “Bubble size distributions and shapes in annular gap bubble column”, Exp. Therm Fluid Sci. vol. 74, 2016, pp.27–
48.
17. Zaruba, E. Krepper, H. M. Prasser, E. Schleicher, E. “Measurement of bubble velocity profiles and turbulent diffusion coefficients of the
gaseous phase in rectangular bubble column using image processing”, Exp. Therm. Fluid Sci. vol. 29, 2005, pp.851–860.
18. J. R. V.Cordero, D. Samano, R. Zenit, R. “Study of the properties of bubbly flows in Boger-type fluids”, J. Non-Newtonian Fluid Mech.
vol. 175–176, 2012, pp.1–9.
19. S. Amirnia, J. R. deBruyn, M. A. Bergougnou, A. Margaritis, “Continuous rise velocity of air bubbles in non-Newtonian biopolymer
solutions”, Chem. Eng. Sci. vol. 94, 2013, pp. 60–68.
20. G. Besagni, F. Inzoli, G. D. Guido, L. A. Pellegrini, “Experimental investigation on the influence of ethanol on bubble column
hydrodynamics”, Chem. Eng. Res. Des. Vol. vol. 112, 2016, pp.1–15.
21. S. Sasaki, K. Hayashi, K., A. Tomiyama, “Effects of liquid height on gas holdup in air–water bubble column”, Exp. Therm. Fluid Sci.
vol. 72, 2016, pp.67–74.

Authors: Sachin Kumar, Sukhdeep Singh Dhami

Paper Title: Effects of Forced Cooling In Laser Forming


Abstract: This paper presents the numerical bending studies of the alloy sheet of Magnesium M1A to achieve
the bigger bending angle in a single laser forming process. A three-dimensional model of finite elements was
created and different simulations were performed for sheet laser bending. Magnesium alloys are difficult-to-form
yet have huge applications in automobile and aerospace industries because of its high strength to weight ratio.
To study the sheet bending method and effect of various process parameters including laser scanning velocity,
beam diameter and laser power, a three-dimensional numerical model was developed. The developed numerical
model was designed with ABAQUS Simulia and validated with the published numerical model. On the validated
numerical model, a further number of simulations were performed to understand the effects of forced cooling
conditions in single scan laser forming process. This research work concluded that forced cooling conditions in
laser forming can be used to increase the bend angle in a single scan.

Keywords: laser forming, forced cooling, bending, magnesium alloy.

References:

1. Vollersten, F., (1994). An analytical model for laser bending. Lasers in Eng , 2 , pp. 261-276.
654. 2. Dixit, U.S., Joshi, S.N. and Kant, R., (2015). Laser forming systems: a review. International Journal of Mechatronics and
Manufacturing Systems, 8(3-4), pp.160-205. 3782-
3. Ramos, J., Magee, J. and Watkins, K. (2001). Microstructure and microhardness study of laser bent Al-2024-T3. Journal of Laser 37
Applications, 13(1), pp.32-40.
4. Edwardson, S., Griffiths, J., Dearden, G. and Watkins, K. (2010). Temperature gradient mechanism: Overview of the multiple pass
87
controlling factors. Physics Procedia, 5, pp.53-63.
5. Cheng, P. and Lin, S. (2000). An analytical model for the temperature field in the laser forming of sheet metal. Journal of Materials
Processing Technology, 101(1-3), pp.260-267.
6. Hu, Z., Labudovic, M., Wang, H. and Kovacevic, R. (2001). Computer simulation and experimental investigation of sheet metal bending
using laser beam scanning. International Journal of Machine Tools and Manufacture, 41(4), pp.589-607.
7. Watkins, K.G., Edwardson, S.P., Magee, J., Dearden, G., French, P., Cooke, R.L., Sidhu, J. and Calder, N.J., (2001). Laser forming of
aerospace alloys (No. 2001-01-2610). SAE Technical Paper.
8. Kant, R. and Joshi, S.N., 2016. Thermo-mechanical studies on bending mechanism, bend angle and edge effect during multi-scan laser
bending of magnesium M1A alloy sheets. Journal of Manufacturing Processes, 23, pp.135-148.
9. Cheng, P. and Yao, Y. L. (2005). The Influence of Sheet Metal Anisotropy on Laser Forming Process. Journal of Manufacturing Science
and Engineering, 127(3), pp.572-582.
10. Lambiase, F. and Di Ilio, A. (2013). A closed-form solution for thermal and deformation fields in laser bending process of different
materials. The International Journal of Advanced Manufacturing Technology, 69(1-4), pp.849-861.
11. Luo, Y., He, K. and Du, R., (2010). A new sheet metal forming system based on incremental punching, part 2: machine building and
experiment results. The International Journal of Advanced Manufacturing Technology, 51(5-8), pp.493-506.
12. Paramasivan, K., Das, S., Marimuthu, S. and Misra, D. (2017). Increment in laser bending angle by forced bottom cooling. The
International Journal of Advanced Manufacturing Technology, 94(5-8), pp.2137-2147.
13. Shen, H., Hu, J. and Yao, Z. (2010). Cooling Effects in Laser Forming. Materials Science Forum, 663-665, pp.58-63.
14. Kant, R. and Joshi, S.N., (2016). Numerical and Experimental Studies on the Laser Bending of Magnesium M1A Alloy. Lasers in
Engineering (Old City Publishing), Vol. 35, pp.39-62.
Authors: S. Kanagaraj, M.S. Hema, M. Nageswara Gupta

Paper Title: Machine Learning Techniques for Prediction of Parkinson’s Disease using Big Data
Abstract: The growth of data in the healthcare industry grows exponentially and the annual growth rate is
about 40%, managing this amount of data is challenging task. Big Data architecture and frameworks affords the
platform for data storage and processing of massive volume of data in healthcare industry. The paper aims to
provide Big Data technologies and Machine Learning algorithms to predict Parkinson’s Disease (PD). The
dataset from PPMI are used in the current study and observe the progression of the Parkinson’s Disease. The
Movement Disorder Society-Unified Parkinson’s Disease (MDS-UPDRS) features are used for the prediction
model. The current study focuses on machine learning algorithms from python libraries such as pandas, ski-kit
learn, numpy and matplotlib. The important features obtained are tremor, bradykinesia, facial expression is
655. observed as important features for classification. It is observed that logistic regression and multi class classifier
performed with accuracy of 99.04% than the other algorithms such as Naïve Bayes, k-Nearest Neighbor, SVM 3788-
and Neural Network. 37
91
Keywords: Parkinson’s Disease, Big Data, Machine Learning, Python, Jupyter Notebook, HDFS, Pandas,
Numpy, Sci-kit learn, Seaborn, Matplotlib, Classification.

References:

1. Gunjan Pahuja and TN Nagabhushan “Statistical Approach


towards Parkinson ’ s Disease Progression,” vol. 3, no. 2,2016.
2. L. V Kalia, A. E. Lang, and G. Shulman, “Parkinson ’ s
disease,” Lancet, vol. 386, no. 9996, pp. 896–912, 2015.
3. Y. Sarbaz and H. Pourakbari, “A review of presented mathematical models in Parkinson’s disease: black- and gray-box models,” Med.
Biol. Eng. Comput., vol. 54, no. 6, pp. 855–868, 2016.
4. A. Oussous, F. Z. Benjelloun, A. Ait Lahcen, and S. Belfkih, “Big Data technologies: A survey,” J. King Saud Univ. - Comput. Inf.
Sci., vol. 30, no. 4, pp. 431–448, 2018.
5. U. Sivarajah, M. M. Kamal, Z. Irani, and V. Weerakkody, “Critical analysis of Big Data challenges and analytical methods,” J. Bus.
Res., vol. 70, pp. 263–286, 2017.
6. N. Elgendy and A. Elragal, “Big Data Analytics in Support of the Decision Making Process,” Procedia Comput. Sci., vol. 100, pp.
1071–1084, 2016.
7. A. Gandomi and M. Haider, “Beyond the hype: Big data concepts, methods, and analytics,” Int. J. Inf. Manage., vol. 35, no. 2, pp.
137–144, 2015.
8. A. Genender-Feltheimer, “Visualizing High Dimensional and Big Data,” Procedia Comput. Sci., vol. 140, pp. 112–121, 2018.
9. D. R. Leff and G.-Z. Yang, “Big Data for Precision Medicine,” Engineering, vol. 1, no. 3, pp. 277–279, 2015.
10. F. Khennou, Y. I. Khamlichi, and N. E. H. Chaoui, “Improving the use of big data analytics within electronic health records: A case
study baseD OpenEHR,” Procedia Comput. Sci., vol. 127, pp. 60–68, 2018.
11. J. Archenaa and E. A. M. Anita, “A survey of big data analytics in healthcare and government,” Procedia Comput. Sci., vol. 50, pp.
408–413, 2015.
12. V. Palanisamy and R. Thirunavukarasu, “Implications of big data analytics in developing healthcare frameworks - A review,” J. King
Saud Univ. - Comput. Inf. Sci., 2017.
13. I. D. Dinov et al., “Predictive big data analytics: A study of Parkinson’s disease using large, complex, heterogeneous, incongruent,
multi-source and incomplete observations,” PLoS One, vol. 11, no. 8, pp. 1–28, 2016.
14. S. Grover, S. Bhartia, Akshama, A. Yadav, and K. R. Seeja, “Predicting Severity of Parkinson’s Disease Using Deep Learning,”
Procedia Comput. Sci., vol. 132, no. Iccids, pp. 1788–1794, 2018.
15. V. Anantharam, A. Kanthasamy, A. A Willette, S. Nilakanta, M. SenthilarumugamVeilukandammal, and B. Ganapathysubramanian,
“Big Data and Parkinson’s Disease: Exploration, Analyses, and Data Challenges.,” Proc. 51st Hawaii Int. Conf. Syst. Sci., vol. 9, pp.
2778–2783, 2018.
16. A. Blochberger and S. Jones, “Parkinson’s disease clinical features and diagnosis,” Clin. Pharm., vol. 3, no. 11, pp. 361–366, 2011.
17. D. Nyenhuis et al., “Movement Disorder Society-sponsored revision of the Unified Parkinson’s Disease Rating Scale (MDS-UPDRS):
Scale presentation and clinimetric testing results,” Mov. Disord., vol. 23, no. 15, pp. 2129–2170, 2008.
18. A. Schrag and N. Quinn, “Dyskinesias and motor fluctuations in Parkinson’s disease,” Brain, vol. 123, no. 11, pp. 2297–2305, 2002.
19. S. Kanagaraj, M.S. Hema, M. Nageswara Gupta, "Environmental Risk Factors and Parkinson‟s Disease – A Study Report",
International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-7 Issue-4S2, December 2018.

Authors: Amar Nath Patel, Shobhna Jain


Particle Swarm Optimization Algorithm Based Reactive Power Optimization in Distribution
Paper Title:
Network
Abstract: Minimization of power loss is the first priority of the power companies. Generally power loss is
directly proportional to the reactive power demand and minimization of this is known as reactive power
optimization (RPO). In this paper we are trying to minimize the reactive power loss with help of distributed
generation. Distributed generation provides active as well as reactive power locally so, there is no need of taking
the reactive power from the generator consequently reactive power loss minimizes. Now problem arises that
where to place the distributed generation to have minimum power loss. To find the optimal location of the
distributed generation, we have used particle swarm optimization algorithm (PSO). For that we have defined the
fitness function as well as constraints. Constraints limits the value of variable within the defined range. Fitness
function is sum of real power loss index, reactive power loss index and voltage deviation index. We have also
used genetic algorithm just to compare the results and to find which one is better out of genetic algorithm and
656.
PSO. RPO increases the power transfer capability, reduces the line loss and boost the system stability therefore it 3792-
can be applied in the distribution network. 37
96
Keywords: Distributed Generation, Genetic Algorithm, PSO, RPO.

References:

1. Chao Wang,“Reactive “Power Optimization Based on Particle Swarm Optimization Algorithm in 10kV Distribution Network,”
International Conference in Swarm Intelligence ICSI 2011: Advances in Swarm Intelligence pp 157-164
2. Gibson H.M. Sianipar, “Optimization of Reactive Power and Voltage Control in Power System Using Hybrid Artificial Neural
Network and Particle Swarm Optimization,” 2018 2nd International Conference on Applied Electromagnetic Technology (AEMT)
3. Hao Wang,“Reactive power optimization of power system based on improved particle swarm optimization,” 2011 4th International
Conference on Electric Utility Deregulation and Restructuring and Power Technologies (DRPT)
4. Wen Zhang,“Reactive power optimization based on PSO in a practical power system,” IEEE Power Engineering Society General
Meeting, 2004.

Authors: S. Sathish, SK. Khadar Babu and C.U. Tripura Sundari


Weather and Stochastic Forecasting Method for Generated Discharge Level Data at Sathanur
Paper Title:
Dam
Abstract: This article forecasts the future values using stochastic forecasting models for specified fitted values
by using downscaling data, which are collected from Sathanoor Dam gauging site. Due to the demand of the
water in this current scenario, this study analyzed the perdays Discharge level data collected from Sathanoor
Dam where the outcome is predicted in a downscaling data sets in hydrology, extended Thomas –Fiering,
657. ARIMA, MLE models, is used to estimate perdays discharge level data of each month. The error estimates
3797-
RMSE, MAE of forecasts from above models is compared to identify the most suitable approaches for
38
forecasting trend analysis.
02
Keywords: Stochastic process, Thomas –Fiering, ARIMA, MLE models, Forecast.

References:
1. S. Ahmad, I.H. Khan, and B.P. Parida, “Performance of Stochastic Approaches for Forecasting River Water Quality”, Water Resources
Res. Rep., 2001, vol. 35, no. 18, pp. 4261-4266.
2. L. See, and S. Openshaw, “Using Soft Computing Techniques to Enhance Flood Forecasting On the River Ouse. Proceeding Hydro
informatics” 98, 3rd International Conference on Hydro informatics, Copenhagen, Denmark. 1988, vol. 44, no. 5, pp. 819-824.
3. K.L. Hsu, H.V. Gupta, and Sorooshian, S. “Artificial Neural Network Modeling of The Rainfall-Runoff Process”, Water Resources
Research, 1995, vol. 31, no. 10, pp. 2517-2530.
4. K. Yurekli, A. Kurunc, and F. Ozturk, “Application of Linear Stochastic Models to Monthly Flow Data of Kelkit Stream”,
Ecological Modelling, 2005, vol. 183, no. 1, pp. 67-75.
5. K. Yurekli, A. Kurunc, and F. Ozturk, “Testing The Residuals of an ARIMA Model On The Çekerek Stream Watershed in Turkey”,
Turkish Journal of Engineering and Environmental Sciences. 2005, vol. 29, no. 2, pp. 61-74.
6. K. Yurekli, and F. Ozturk, “Stochastic Modeling of Annual Maximum and Minimum Streamflow of Kelkit Stream”, Water
International, 2003, vol. 28, no. 4, pp. 433-441.
7. A. Kurunc, K. Yurekli, and O. Cevik, “Performance of Two Stochastic Approaches for Forecasting Water Quality and Streamflow
Data from Yesilimak River”, Turkey, Environmental Modeling & Softwarel, 2005, , vol. 20, no. 9, pp. 1195-1200.
8. L.A. Walls, and A. Bendel, “Time Series Methods in Reliability Engineering”, 1987, 18, pp. 239-265.
9. S.L. Ho, M. Xie, “The Use of ARIMA Models for Reliability Forecasting and Analysis”, Computers and Industrial Engineering, 1998,
vol. 35, no. 1-2, pp. 213-216.
10. P.A.W. Lewis, B.K. Ray, “Nonlinear Modeling of Periodic Threshold Auto regressions Using TSMARS”. Journal of Time Series
Analysis, 2002, vol. 23, no. 4, pp. 459-471.
11. M. Chang, and D.G Boyer, “Estimates of Low Flows Using Watershed and Climatic Parameters”, Water Resources Research, 1977,
vol. 13, no. 6, pp. 997-1001.
12. V.Z. Antopoulos, D.M. Papamichail, and K.A. Mitsiou, “Statistical and Trend Analysis of Water Quality and Quantity Data for the
Strymon River in Greece”, Hydrology and Earth System Science, 2001, vol. 5, no. 4, pp. 679-691.
13. Baby, Sultana & Arrowsmith, Colin & Al-Ansari, Nadhir, “Application of GIS for Mapping Rainwater-Harvesting Potential” Case
Study Wollert, Victoria. Engineering, 2019, Vol.11,. pp. 14-21. 10.4236/eng.2019.111002.
14. D.A.K. Fernando, and A.W. Jayawardena, “Generation and Forecasting of Monsoon Rainfall Data”, 20th WEDC Conference,
Colombo, 1994, pp. 310-313.
15. R.M. Hirsch, J.R. Slack, and R.A. Smith, “Techniques of Trend Analysis for Monthly Water Quality Data”, Water Resources
Research, 1982, vol. 18, no. 1, pp. 107-121.
16. S. Sathish, and SK. Khadar Babu, “Markovian prediction of future values for food grains in the economic survey”, IOP Conf. Series:
Materials Science and Engineering, 2017, vol. 263, no. 042141.

Authors: Kanagaraj Narayanasamy, Padmapriya Arumugam

Paper Title: Symmetric Cryptographic Framework for Network Security


Abstract: In this rapidly developing digital environment, a single cryptographic algorithm becomes inefficient
and incapable to hold the secrecy of data. A symmetric cryptographic framework is proposed which provides the
platform for using the existing and future algorithms in a secured manner. In this research paper, totally six
algorithms have been taken into the framework, two algorithms for text, three algorithms for image, and one
algorithm for video. The algorithms are grouped into the proposed symmetric encryption framework which
provides better network security for the adopted environment. Cryptanalysis and brute force attack have been
done to assess the strength of the algorithms incorporated in the framework. Character repetition frequency and
brute force attack are analyzed for text encryption algorithms. Mean values, Entropy measure, Differential attack
and brute force attack are analyzed and used to assess the reliability of the image and video encryption
algorithms. The framework is designed in such a way to adopt the existing and future algorithms. The proposed
framework provides a bridge to achieve quality, upgradability, maintainability, and longer usability in applied
applications.

Keywords: cryptanalysis, framework, randomized framework, symmetric algorithms.

References:

1. A. C. Dascalescu, R. E. Boriga, "A novel fast chaos-based algorithm for generating random permutations with high shift factor suitable
658. for image scrambling. Nonlinear Dynamics", Vol.74, pp. 307–318, 2013. 3803-
2. A. L. A. Dalhoum, B. A. Mahafzah, A. A. Awwad, I. Aldamari, A. Ortega, M. Alfonseca, "Digital image scrambling using 2D cellular
automata", IEEE Transactions on Multimedia, Vol. 19, pp. 28–36, 2012.
38
3. Auguste Kerckhoffs, " La cryptographie militaire" Journal des sciences militaires, vol. IX, pp. 5–83, January 1883, pp. 161–191, 08
February 1883.
4. Bruce Schneier, Applied Cryptography, Second edition, Wiley, 1996, ISBN 0-471-11709-9
5. Diaconu, A. V., Costea, A., Costea, M. A.,"Color image scrambling technique based on transposition of pixels between RGB channels
using Knight’s moving rules and digital chaotic map", Mathematical Problems in Engineering, 2014.
6. http://in.mathworks.com/help/images/image-quality-metrics.html & http://in.mathworks.com/help/images/image-quality.html [Last
Accessed on: 13-07-2019]
7. https://www.researchgate.net/profile/Kanagaraj_Narayanasamy [Last Accessed on: 20-02-2019]
8. Kanagaraj Narayanasamy and Padmapriya Arumugam, “i-TEE – An Image Encryption Algorithm based on Multilevel Encryption using
a Randomly Generated Bitmap Image”. Aust. J. Basic & Appl. Sci., vol 10(2), pp. 150-155, 2016.
9. Kanagaraj Narayanasamy and Padmapriya Arumugam, “i-S2SLE: An Encryption methodology for Securing Image using Linear
Algebraic Equation”, International Journal of Advanced Research Trends in Engineering and Technology, ISSN (online): 2394-3785.
DOI: 10.20247/IJARTET.2016.S20040060.
10. Kanagaraj Narayanasamy, and Padmapriya Arumugam, “v-CSS: A video Encryption Algorithm based on Conversion, Shuffling and
Substitution using Randomly Generated Grayscale Image”, International Journal for Research in Engineering Application and
management, IJREAM publishing house, Vol 04, Issue no.:12, March 2019. ISSN: 2454 – 9150.
11. N. Kanagaraj and A. Padmapriya, “Cryptanalysis of S2SE and S2SLE”, NCDSE - National Conference on Data Science and Engineering,
South Travancore Hindu college, Nagercoil-629 002, Tamilnadu, India, published by Elsevier, August 2014. pp. 295-301. ISBN: 978-
93-5107-294-2
12. N. Kanagaraj and A. Padmapriya, “i-TSS: An Image Encryption Algorithm Based on Transposition, Shuffling and Substitution Using
Randomly Generated Bitmap Image”. In: Bjørner N., Prasad S., Parida L. (eds) Distributed Computing and Internet Technology. Lecture
Notes in Computer Science, Springer. vol 9581, pp.148-156, 2016. DOI: 10.1007/978-3-319-28034-9_20
13. N. Kanagaraj and A. Padmapriya, “S2SE: An Encryption Methodology”, in IJCA Proceedings on International Conference on
Computing and Information Technology 2013 IC2IT(2), December 2013. pp. 13-15. ISSN: 0975 – 8887
14. N. Kanagaraj and A. Padmapriya, “S2SLE: An Encryption Methodology for Securing Data using Linear Algebraic Equations”, in Journal
of Computer Science and Applications, Vol. 6 Number 1 (2014). pp. 309-312. ISSN : 2231-1270
15. S. S. Askar, A. A. Karawia, A. Alshamrani, "Image Encryption Algorithm Based on Chaotic Economic Model", Mathematical Problems
in Engineering, 2015.
16. Z. Lin and H. Wang, "Efficient image encryption using a chaos-based PWL memristor", IETE Technical Review, Vol. 27,pp. 318–325,
2010
17. Zhang, J., Fang, D., & Ren, H., "Image Encryption Algorithm Based on DNA Encoding and Chaotic Maps", Mathematical Problems in
Engineering, 2015.
Authors: Gunjan Chhabra, Ajay Prasad, Venkatadri Marriboyina

Paper Title: Future Trends of Artificial Intelligence in Human Biofield


Abstract: Human body structure is very complex, which contains various sub-components and makes it a
complicated system. There are various activities performed by humans which involves both mental and
physiological activities. Additionally, to monitor human health conditions various waves are examined like
brainwaves, heart waves and others, which are highly useful in clinical scrutiny. Likewise, there exists an
organized field of energy associated with every individual, termed as human biofield. This human biofield
comprises of pre-eminent information about one’s health and psychological state. Moreover, several studies
manifested the evidences of its existence and its benefits clinically together with numerous alliances. This
augments the importance of this field and reveals diversified applications in Complementary and Alternative
Medicine (CAM) for humans. Contrary to other biological signals for instance ECG, EEG and other, biofield
still is not being mapped i.e. no measurement techniques are available for calculating the impact of Biofield in
diagnosis and therapy, due to the uneven characteristics of biofield. This research article deals with the
description of hitherto journey of biofield, including its concepts, imaging and applications. Further, this paper
also imparts the need of Artificial intelligence stating new opportunities and challenges associated with it.
Particularly, this paper highlights the futuristic applications of biofield integrated with Artificial Intelligence.

Keywords: Human Biofield; Artificial Intelligence; Image Processing; Aura; Human Energy Field;
Electromagnetic Signals; Signal Processing; Bio-informatics.

References:

1. Beverly Rubik, Ph.D. and Harry Jabs, M.S. “ARTIFICIAL INTELLIGENCE AND THE HUMAN BIOFIELD: NEW
OPPORTUNITIES AND CHALLENGES”, Cosmos and History: The Journal of Natural and Social Philosophy, vol. 14, no. 1, 2018.
2. Chhabra, G.; Narayanan, A.; and Samantha, S. (2013). Human Aura: A New Vedic Approach in IT. International conference on
Mechanical and Industrial Engineering.
3. Dr. Konstantin Korotko, “Energy Fields Electrophotonic Analysis in Humans and Nature”, Translated from Russian by the author
Edited by Berney Williams and Lutz Rabe, ISBN-13: 978-1499216264 ISBN-10: 1499216264, 2014. (Available on-line)
4. Beverly Rubik, “Measurement of the Human Biofield and Other Energetic Instruments”, Chapter 20 of Energetics and Spirituality by
Lyn Freeman, Available on-line.
5. Chhabra, G.; Prasad, A.; and Marriboyina, V. (2019). IMPLEMENTATION OF AURA COLOURSPACE VISUALIZER TO
659. DETECT HUMAN BIOFIELD USING IMAGE PROCESSING TECHNIQUE. Journal of Engineering Science and Technology Vol. 3809-
14, No. 2 (2019) 892 - 908
6. W. R. Adey, and S. M. Bawin, “Brain interactions with weak electric and magnetic fields, “Neurosciences Research Program Bulletin, 38
vol. 15, pp. 1–129, 1977. 14
7. D. Brown, “The Energy Body and Its Functions, “Annals of the New York Academy of Sciences, vol. 1172, pp. 312–337, 2009.
8. Rubik, B. The biofield: bridge between mind and body. Cosmos and History: Journal of Natural and Social Philosophy 11(2) (2015):
83-95.
9. Hammerschlag, R., Levin, M., McCraty, R., Bat, N., Ives, J.A., Lutgendorf, S.K., Oschman, J. Biofield physiology: a framework for an
emerging discipline. Global Advances in Health and Medicine 4(Suppl.) (2015): 35-41.
10. Rubik, B. Measurement of the human biofield. In: Freeman, LW (ed.) Mosby’s Complementary and Alternative Medicine: A Research
Based Approach. St. Louis, MO: Mosby (Elsevier, Inc.) 2009: 555-573.
11. Kharadi, H., Jain, K. Aura-Bioenergy. Proceeding of International Conference on Emerging Technologies in Engineering, Biomedical,
Management, and Science. (ETEBMS-2016). 5-6 March 2016: 182-185.
12. Korotkov, K.G. Human Energy Field: Study with GDV Bioelectrography. Fair Lawn, New Jersey: Backbone Publishing Co., 2002.
13. Korotkov, K.G., Matravers P., Orlov, D.V., Williams, B.O. Application of Electrophoton Capture (EPC) Analysis Based on Gas
Discharge Visualization (GDV) Technique in Medicine: A Systematic Review. Journal of Alternative and Complementary Medicine.
16(1) (2010): 13-25
14. Diagnostic potential of GDV technique [Online] Available :http://kirlianresearch.com/kirlian_diagnostic.html
15. Polycontrast Interference Photography (PIP) [Online] Available :http://www.electrocrystal.com /pip.html
16. Resonant Field Imaging (RFI) Aura and Brain Imaging System [Online] Available :http://www.item-bioenergy.com/rfi/.
17. CW Leadbeater,Annie Besant,”Thought Forms”, Project Gutenberg Release #16269.
18. Subbhuraam, V.S., Kaw, G., Ng, E.Y.K., Rajendra, A.U., Chong, B.K. Use of skin surface electropotentials for breast cancer
detection—preliminary clinical trial results obtained using the biofield diagnostic system. Journal of Medical Systems 35; (2011): 79-
86.
19. Priyadarsini, K., Thangam, P., Gunasekaran, S. Kirlian images in medical diagnosis: a survey. Proceedings of International Conference
on Simulations in Computing Nexus (ICSCN-2014). International Journal of Computer Applications (2014): 5-7.
20. Rai Sachindra Prasad, “A look into the future of Biofield Application”, January 2016.
21. Color Psychology (2017). Human Aura colors and meanings, Retrieved April 5, 2018, from https://www.colorpsychology.org/aura-
colors/
22. Allport, G.W. Personality: A Psychological Interpretation. New York: M Holt, Rinehart, and Winston, 1937.
23. Charlie Rose interviews. . . a robot? CBS News, 60 Minutes, October 9, 2016. https://www.cbsnews.com/news/60-minutes-charlie-
rose-interviews-a-robot-sophia/ Retrieved December 30, 2017.
24. Saudi Arabia bestows citizenship on a robot named Sophia. TechCrunch, October 26, 2017. https://techcrunch.com/2017/10/26/saudi-
arabia-robot-citizen-sophia/ Retrieved December 30, 2017.
25. Creath, K.; and Schwartz, G. E. (2006). Measurement of bioluminescence and thermal fields from humans: Comparison of three
techniques for imaging biofields. Proceedings of SPIE - The International Society for Optical Engineering, Vol 6285.
26. Prakash, S.; Chowdhury, A. R.; and Gupta, A. (2015). Monitoring the Human Health by Measuring the Biofield "Aura": An Overview.
International journal of applied engineering research, Vol 10(25).
27. Wied, “Hormonal influences on motivation, learning, memory and psychosis”, In D. T. Krieger and J. C. Hughes (Eds.);
Neuroendocrinology, Sunderland, MA. Sinauer Associates, 1980.
28. H. Benson, J. B. Kotch, and K. D. Crassweller, “Historical and Clinical Considerations of the relaxation responses”, Am Sci; Vol 65:
1977; 441-500
29. M. A. Tanner et al, “The effects of transcendental program on mindfulness”, JOURNAL OF CLINICAL PSYCHOLOGY, Vol. 65(6),
574--589 (2009) & 2009 Wiley Periodicals, Inc. Published online in Wiley InterScience (www.interscience.wiley.com). DOI:
10.1002/jclp.20544.
30. C.K. Peng et al, “Heart rate dynamics during three forms of meditation,” International Journal of Cardiology 95 (2004) 19 – 27
Elsevier publication.
31. P. A. Balaji, S. R. Verne, and S. S.Ali,”Physiological Effects of Yogic Practices and Transcedental Meditation in Health and Disease”,
N Am J Med Sci. 2012 Oct; 4(10): 442–448.

Authors: Tamizh selvan. C, V. Vijayalkshmi

Paper Title: Secure and Authenticated Naming Scheme for IoT Devices in Heterogeneous Networks
Abstract: Naming the device is the main challenge in IoT and getting authentication from the sensors is
possible only with secured naming services. Naming a form of addressing the sensor nodes should be readable or
understandable by humans or M2M communications. Existing naming schemes have scalability and security
limitations. Hence, this paper proposes an efficient and secure distributed naming scheme for IoT in
heterogeneous network. Hyper -Elliptic Curve Diffie - Hellman Key Exchange (HECDH) is used in the naming
scheme for the exchange of keys. This technique reduces the communication and computation complexity. The
heterogeneous model of the proposed technique is simulated and the analysis has been carried out. Digital
Signature (i.e., Private Key) is used to verify the node authencity. Monitoring of the node in the network is
implemented using IP based Position monitoring and Intruder Detection system (IDS) is implemented for
detecting the attacks. The performance metrics such Energy consumption, PDR, Total Traffic, Delay, Average
Response Time and Throughput of the proposed model was simulated using Contiki / Cooja version 2.7
simulator.

Keywords: DIstrubed NAming Scheme (DINAS), Naming, Attacks, , HECDH, IDS.

References:

1. Michele Amoretti, Olivier Alphand, Gianluigi Ferrari, Franck Rousseau, Andrzej Duda,“DINAS: a DIstributed NAming Service for
All-IP Wireless Sensor Networks,” IEEE Internet of Things Journal, vol. 4, no. 3, pp. 1-14, 2017.
2. Lijun Dong, Guoqiang Wang, “ A Robust and Lieghtweight Name Resolution Approach for IoT data in ICN”, IEEE International
Conference on Ubiquitous and Future Networks, pp 61-65, 2017.
3. Keuntae Lee, Hyungsuk Kang, Jaehoon (Paul) Jeong, Hyoungshick Kim, and Jung-Soo Park, “Secure DNS Name Autoconfiguration
660. for IPv6 Internet-of-Things Devices”, International Conference on Information and Communication Technology Convergence, pp. 3815-
564-569, 2016.
4. Kai Ryu, Yuki Koizumi and Toru Hasegawa, “Name-based Geographical Routing/Forwarding Support for Location-based IoT
38
Services”, IEEE 24th International Conference on Network Protocols (ICNP), 2016. 20
5. Jordi Mongay Batalla, Piotr Krawiec, Mariusz Gajewski, and Konrad Sienkiewicz, “ID Layer for Internet of Things Based on Name-
Oriented Networking”, Journal of Telecommunications and Information Technology, pp. 40-48, 2013.
6. Ye Tian, Yang Liu, Zhiwei Yan, Shuangli Wu, Hongyu Li, “RNS-A Public Resource Name Service Platform for the Internet of
Things”, IEEE International Conference on Green Computing and Communications, Conference on Internet of Things, and
Conference on Cyber, Physical and Social Computing, pp. 234-239, 2012.
7. K. Wang, C. Chen, W. Fang and T. Wu, "A secure authentication scheme for Internet of Things", Pervasive and Mobile Computing,
vol. 42, pp. 15-26, 2017.
8. C. Maple, "Security and privacy in the internet of things", Journal of Cyber Policy, vol. 2, no. 2, pp. 155-184, 2017.
9. J. SathishKumar and D. R. Patel, "A Survey on Internet of Things: Security and Privacy Issues", International Journal of Computer
Applications, vol. 90, no. 11, pp. 20-26, 2014.
10. S. Kumar and R. Singh, "Secure authentication approach using Diffie-Hellman key exchange algorithm for WSN", International
Journal of Communication Networks and Distributed Systems, vol. 17, no. 2, p. 189, 2016.
11. L. Washington, "Review of Handbook of Elliptic and Hyperelliptic Curve Cryptography by H. Cohen and G. Frey", Chapman &
Hall/CRC, 2006.
12. D. Mukhopadhyay, A. Shirwadkar, P. Gaikar and T. Agrawal, "Securing the Data in Clouds with Hyperelliptic Curve Cryptography",
IEEE International Conference on Information Technology, 2014.
13. V. Jacobson, D. K. Smetters, J. Thornton, M. F. Plass, N. H. Briggs, and R. L. Braynard, “Networking Named Content,” ACM
International Conference on emerging Networking EXperiments and Technologies (CoNEXT), pp. 1–12, 2009.
14. Kovacevic, J. Ansari, and P. Mahonen, “NanoSD: A Flexible Service Discovery Protocol for Dynamic and Heterogeneous Wireless
Sensor Networks,” IEEE International Conference on Mobile Ad hoc and Sensor Networks (MSN), pp. 14–19, 2010.
15. B. Djamaa, M. Richardson, N. Aouf, and B. Walters, “Towards Efficient Distributed Service Discovery in Low-Power and Lossy
Networks,” Wireless Networks, vol. 20, no. 8, pp. 2437–2453, 2014.
16. Muneeb Ali and Zartash Afzal Uzmi ,” An Energy-Efficient Node Address Naming Scheme for Wireless Sensor Networks”
Networking and Communication Conference, pp. 25–30, Dec.2004.
17. Quazi Mamun, Muhammad Rana,“A partial key distribution protocol for WSNs in distributed IoT applications,” Information
Technology, Electronics and Mobile Communication Conference (IEMCON), pp. 248-254, 2017.
Authors: Mohd. Tahseenul Hasan, Vijay S. Chourasia, Sanjay M. Asutkar

Paper Title: A Forecasting tool for Air Quality Monitoring Built up on Cloud and IoT
Abstract: Air pollution has turned to no less than a monster and is becoming notorious with every passing day.
The human race has been solely responsible for taking the world to such a state. With ill effects of pollution
661.
becoming glaringly evident it has been instrumental in forcing the world to get up from the deep slumber and act 3821-
out. Air quality monitoring is a process in which the quality of air is monitored and on the basis of recorded 38
information, it is conveyed to general public about the quality of air they are breathing. Air pollution poses 32
serious problems to persons suffering respiratory disorders and there is a necessity to provide such target group
with a tool which helps them to be aware about the pollution scenario and also alarms them with the impending
critical situation well in advance. It is elementary for them to avoid situations where in lies a chance of exposure
to pollutants leading to attacks which could prove to be fatal at times. This advance information will go a long
way in helping such target audience to minimize their exposure to pollutants and thereby helping them to
mitigate their ordeal on exposure to pollutants. Apart from getting predictive alarm, it gives a fair idea of the
existing pollution scenario to the targeted stakeholders. This work discusses the implementation of cloud based
IoT system for air quality monitoring which is available as a web interface as well as in a form of an android
application.The developed system uses Nitrogen Dioxide, Sulphur dioxide, Particulate Matter 10 micrometers or
less in diameter (P.M.10) sensors along with the temperature and the humidity sensors to form a wireless sensor
node. An android application has also been developed which can be installed by the user. Once registered the
user can access the data from the application which allows the users to observe the data of sensors along with the
air quality index (AQI) and also provide the registered user with an alarm notification one day in advance about
the probable level of pollutants as well as the AQI.

Keywords: Air Pollution Monitoring , Air Quality Index, Android Application , ANFIS, Cloud, Health Care
P.M.10.

References:

1. Vox Media . Available: https://www.vox.com/energy-and-environment/2017/11/22/16666808/india-air-pollution-new-delhi Accessed


28 October 2018.
2. C.A. Pope, “Respiratory disease associated with community air pollution and a steel mill, Utah Valley” in Am Journal of Public
Health, 79(5), 623–628. PMID: 2495741
3. C.A.Pope , D.W.Dockery, “Acute health effects of PM 10 pollution on symptomatic and asymptomatic children” in The American
Review of respiratory disease,145(5),1123-1128. DOI:10.1164/ajrccm/145.5.1123
4. D.W. Dockery et.al, “ Changes in pulmonary function in children associated with air pollution episodes” in Journal of Air Pollution
Control Association,32(9),937-942.
5. M.S. Goldberg et.al , “ Association between Daily Mortality and Ambient Air Particle Pollution in Montreal” in Quebec: 2. Cause-
Specific Mortality. Environmental Research, 86(1), 26-36.
6. World Meteorological Organization in Global Conference on Air Pollution and Health(2018). Available:
https://public.wmo.int/en/media/news/wmo-joins-global-commitment-cut-air-pollution Accessed August 16 2018.
7. M.Sehgal,R.Suresh,V.P. Sharma, and S.K.Gautam, “Assessment of outdoor workers’ exposure to air pollution in Delhi (India)” in
International Journal of Environmental Studies, 72(1), 99–116. https://doi.org/10.1080/00207233.2014.965937
8. Institute for Health Metrics and Evaluation.Report on Global burden of disease.(2013). Available: http://www.healthdata.org/policy-
report/global-burden-disease-generating-evidence-guiding-policy Accessed December 15 2018.
9. World Meteorological Organization on “Impacts of megacities on air pollution and climate. WMO-GAW report.-205”. Available:
http://www.wmo.int/pages/prog/arep/gaw/documents/Final_GAW_205_web_31_January.pdf Accessed August 16 2018.
10. World Health Organization on “Air quality guidelines for particulate matter, ozone, nitrogen dioxide and sulfur dioxide Global update
2005 Summary of risk assessment”. Available:
a. http://apps.who.int/iris/bitstream/handle/10665/69477/WHO_SDE_PHE_OEH_06.02_eng.pdf;jsessionid=8812CC4CB731EC6E5FAC
8519BB8B685E?sequence=1 Accessed November 11 2018
11. K.Dimitriou, , A.K. Paschalidou and P.A.Kassomenos, “ Assessing air quality with regards to its effect on human health in the
European Union through air quality indices.” In Ecological Indicators, 27,108–115. https://doi.org/10.1016/j.ecolind.2012.11.023
12. World Health Organization .WHO Fact sheet number 206 on Bronchial Asthma.(2018). Available:
http://www.who.int/mediacentre/factsheets/fs206/en/ Accessed November 16 2018.
13. M. K.Hasan , M.Haque, N.Sakib, , R.Love and S. I.Ahamed, “Smartphone-based Human Hemoglobin Level Measurement Analyzing
Pixel Intensity of a Fingertip Video on Different Color Spaces” in Smart Health , 5(6), 26-39.
https://doi.org/10.1016/j.smhl.2017.11.003
14. M.Boukhechba, , A. R. Daros., K. Fua , P. I. Chow , B.A. Teachman and L.E. Barne, , “DemonicSalmon: Monitoring mental health
and social interactions of college students using smart phones” in Smart Health, 9(10), 192-203.
https://doi.org/10.1016/j.smhl.2018.07.005
15. D. Bandyopadhyay and J. Sen, “Internet of Things: Applications and Challenges in Technology and Standardization,” in Wirel. Pers.
Commun.,vol. 58, no. 1, pp. 49–69, May 2011
16. H. Kopetz, “Real-Time Systems: Design Principles for Distributed Embedded Applications.” Boston, MA: Springer US, 2011, ch.
Internet ofThings, pp. 307–323.
17. A. Gluhak, S. Krco, M. Nati, D. Pfisterer, N. Mitton, and T. Razafindralambo, “A Survey on Facilities for Experimental Internet of
Things Research,” IEEE Communications Magazine, vol. 49, no. 11, pp. 58–67, November 2011.
18. X. Li, R. Lu, X. Liang, X. Shen, J. Chen, and X. Lin, “Smart community: an internet of things application,” IEEE Communications
Magazine, vol. 49, no. 11, pp. 68–75, November 2011.
19. Rajesh Rangarajan, “Air quality monitoring regime in India ,An overview” . Available:
http://www.indiaenvironmentportal.org.in/files/Air%20pollution%20note_final.pdf
20. H.Huang, H. Bian, S.Zhu, & J.Jin, “A Greenhouse Remote Monitoring System Based on GSM.” in International Conference on
Information Management, Innovation Management and Industrial Engineering, 2,357 – 360. DOI: 10.1109/ICIII.2011.231
21. R.O. Ocaya, & S. R. Katashaya, “A low-cost embedded web-server for an institutional e-learning strategy” in 3rd International
Conference on Electronics Computer Technology, 1, 59 – 63. DOI: 10.1109/ICECTECH.2011.5941560
22. A. Drăghici, M.Andrei and D. Tudose, “POD — Real-time urban pollution monitoring using stationary devices” in 15th RoEduNet
Conference: Networking in Education and Research,1-6. DOI: 10.1109/RoEduNet.2016.7753238
23. P. P. Ray, “Internet of Things cloud based smart monitoring of air borne PM2.5 density level.” In International Conference on Signal
Processing, Communication, Power and Embedded System (SCOPES), 995 – 999. DOI: 10.1109/SCOPES.2016.7955590
24. J.Dutta, F.Gazi, S.Roy and C.Chowdhury, “AirSense: Opportunistic crowd-sensing based air quality monitoring system for smart city”
in IEEE SENSORS, 1 – 3. DOI: 10.1109/ICSENS.2016.7808730
25. M.T.Hasan, V.S.Chourasia and S.M. Asutkar, “A Comparative Analysis and Review of Various Air Pollution Monitoring Schemes” in
i-manager’s Journal on Embedded Systems, 5(1),30-43. DOI : https://doi.org/10.26634/jes.5.1.8249
26. Santosh Hariharan, “A Novel Integrated Instrumentation Technique for Air Pollution Monitoring” in International Conference on
Environmental Engineering and Applications,142 – 146. DOI: 10.1109/ICEEA.2010.5596113
27. V.Sivaraman, J.Carrapetta, K.Hu and B.G.Luxan , “ HazeWatch: A Participatory Sensor System for Monitoring Air Pollution in the
Sydney” in 38th Annual IEEE Conference on Local Computer Networks - Workshops, 56 – 64. DOI: 10.1109/LCNW.2013.6758498
28. R.Koga, M.Kosaka, and H.Sano, “A Fast Local Monitoring of Dilute NO by a Tunable Laser” in
IEEE Transactions on Instrumentation and Measurement,31(2), 91 – 96. DOI: 10.1109/TIM.1982.6312528
29. M.J Ikram, A.A.Akram and M.Amin, “A Low-Cost Solution for Urban Air Pollution Monitoring using Existing Infrastructure and
Loosely Connected Ground Based Sensing Equipment” in International Conference on Information and Communication
Technologies,164 – 169. DOI: 10.1109/ICICT.2005.1598577
30. D. C.Wolfe and R. L Byer, “Air Pollution Monitoring by Computed Tomography” in COMPSAC 79. Proceedings. Computer Software
and The IEEE Computer Society's Third International Applications Conference, 867 – 870. DOI: 10.1109/CMPSAC.1979.762617
31. J.J.Wilting and H. V. D.Berge, “Air Pollution Monitoring Network in the Netherlands.” In Computer , 4(4) , 22 – 27.
a. DOI: 10.1109/C-M.1971.216813.
32. N.T Hung , M. Ketzel, S.S.Jensen and N.T.K.Oanh, “Air Pollution Modeling at Road Sides Using the Operational Street Pollution
Model—A Case Study in Hanoi, Vietnam.” in Journal of the Air & Waste Management Association, 60(11), 1315-1326.
a. DOI: 10.3155/1047-3289.60.11.1315.
33. R. McGrath , “Analysis and Prediction of Air Pollution in the Dublin Area.” in Irish Geography,21(2),88-100.
https://doi.org/10.1080/00750778809478794
34. C.M.Bhumralkar, R.L. Mancuso, D.E.Wolf, W.B.Johnson, and J. Pankrath, “Regional air pollution model for calculating short-term
(daily) patterns and transfrontier exchanges of airborne sulfur in Europe” in Tellus, 33(2),142-161.
https://doi.org/10.3402/tellusa.v33i2.10704
35. I.S Park, S.J. Lee, C.H. Kim, C.Yoo and Y.H. Lee, “Simulating Urban-Scale Air Pollutants and Their Predicting Capabilities over the
Seoul Metropolitan Area” in Journal of the Air & Waste Management Association, 54(6),695-710.
https://doi.org/10.1080/10473289.2004.10470942
36. K.K. Khedo, R.Perseedoss and A.Mungur “A Wireless Sensor Network Air Pollution monitoring system” in International Journal of
Wireless & Mobile Networks (IJWMN), 2(2),31-45. DOI:10.5121/ijwmn.2010.2203
37. O.A.Postolache and P.M.B.S. Girão “Smart Sensors Network for Air Quality Monitoring Applications” in IEEE Transactions on
Instrumentation and Measurement, 58( 9), 3253-3262. DOI: 10.1109/TIM.2009.2022372
38. H.Zhi-gang and Cui Cai-hui, “The Application of Zigbee Based Wireless Sensor Network and GIS in the Air Pollution Monitoring” in
IEEE,International Conference on Environmental Science and Information Application Technology,546-549.
a. DOI: 10.1109/ESIAT.2009.192
39. J.Q.Y James, O. K. L Victor and Y.S. L Albert, “Sensor Deployment for Air Pollution Monitoring Using Public Transportation
System” in IEEE Congress on Evolutionary Computation,1–7. DOI: 10.1109/CEC.2012.6256495
40. S.Devendra, K.Verma and P.K.Barhai, “Design & Development of WINGSNET (Wireless Intelligent GPS based Sensor Network)
System for monitoring Air Pollution and Radiation based on WiFi & WiMAX Communication Network” in IEEE 11 th International
Conference on Mobile Ad Hoc and Sensor Systems,507-508. DOI: 10.1109/MASS.2014.118
41. H.A.H. Nograles, C.P.D. Agbay, ,I.S.L Flores, A.L Manuel, J.B.C. Salonga , “Low Cost Internet Based Wireless Sensor Network for
Air Pollution Monitoring using Zigbee Module”in IEEE 4 th International Conference on Digital Information and communication
Technology and its Applications (DICTAP),310-314. DOI: 10.1109/DICTAP.2014.6821702
42. Maharashtra Pollution Control Board in Ambient Air quality Monitoring Guidelines. Available:
http://mpcb.gov.in/images/pdf/Ambient_Air_quality_Monitoring_Guidlines.pdf
43. Central Pollution Control Board in National Ambient Air Quality Status.(2006). Available: http://cpcb.nic.in/cpcbold/newitems/3.pdf
44. K.Newell, C. Kartsonaki, K.B.H. Lam and O.P.Kurmi, “Cardiorespiratory health effects of particulate ambient air pollution exposure in
low-income and middle-income countries: a systematic review and meta-analysis” in THE LANCET: planetary health ,1(9), 368-380.
DOI:https://doi.org/10.1016/S2542-5196(17)30166-3
45. M.Shima and M.Adachi , “Effect of outdoor and indoor nitrogen dioxide on respiratory symptoms in school children” in International
journal of Epidemiology. 29(5),862-70. https://doi.org/10.1093/ije/29.5.862
46. Agency for Toxic Substances and Disease Registry in Toxicological Profiles. Available:
https://www.atsdr.cdc.gov/ToxProfiles/tp116.pdf Accessed 16 November 2018.
47. M. Guarnieri and J.R.Balmes, “Outdoor air pollution and asthma” in The LANCET SERIES ASTHMA , 383( 9928),1581-1592.
doi: [10.1016/S0140-6736(14)60617-6]
48. W.Kanchongkittiphon, M. J Mendell , J. M Gaffin, G.Wang and W Phipatanakul, “Indoor environmental exposures and exacerbation of
asthma: an update to the 2000 review by the Institute of Medicine” in Journal of Environmental Health Perspectives, 123(1), 6-20.
a. doi: 10.1289/ehp.1307922
49. C. A Pope, M.Ezzati and D. W. Dockery, “Fine-particulate air pollution and life expectancy in the United States” in New England
Journal of Medicine,360,376-386. DOI: 10.1056/NEJMsa0805646
50. Central Pollution Control Board in Air Quality Index.
a. http://cpcb.nic.in/displaypdf.php?id=bmF0aW9uYWwtYWlyLXF1YWxpdHktaW5kZXgvSG93X0FRSV9DYWxjdWxhdGVkLnBkZg
== Accessed November 16 2018.
51. Arduino.Introduction. Available:
a. https://www.arduino.cc/en/Guide/Introduction. Accessed on 30 November 2018
52. How to evaluate, choose and work securely with cloud service providers. Available:
53. https://searchcloudcomputing.techtarget.com/definition/Platform-as-a-Service-PaaS. Accessed on 26 July 2019.
54. Services Overview. Available:
a. https://developer.android.com/guide/components/services . Accessed on 26 July 2019
55. Data Access Object. Available:
a. https://en.wikipedia.org/wiki/Data_access_object Accessed on 26 July 2019
56. J.D. Wu, C.C. Hsu and G.Z. Wu , “Fault gear identification and classification using discrete wavelet transform and adaptive neuro-
fuzzy inference” in Expert Syst Appl 2009; 36: 6244-55.
57. SL Chiu “ Fuzzy model identification based on cluster estimation” in J Intell Fuzzy Syst 1994; 2: 267-78.
58. R.R. Yager and D.P. Filev, “ Generation of fuzzy rules by mountain clustering” in J Intell Fuzzy Syst 1994; 2: 209-19.
59. Maharashtra Pollution Control Board . Data Source. Available:
a. http://mpcb.gov.in/envtdata/demoPage1.php Accessed on 15 October 2017.
60. Maharashtra Pollution Control Board. Data Source
a. http://mpcb.gov.in/envtdata/demoPage1.php Accessed on 15 October 2017.

Authors: P.Prasanna Kumari, B.Prabhakara Rao


TB Diagnosis System using Genetic Particle Swarm Optimization Based Neural Network
Paper Title:
Classifier
Abstract: Classification of medical image is an important task in the diagnosis of any disease. It even helps
doctors in their diagnosis decisions. Tuberculosis (TB) is a disease caused by bacteria called Mycobacterium
tuberculosis. Recently, several techniques are applied to diagnosis the TB diseases. Unfortunately, diagnosing
662. TB is still a major challenge. Therefore, in this paper an efficient Tuberculosis diagnosis system is proposed
3833-
using Multi Kernel Fuzzy C Means Rough Set (MKFCMRS) based feature selection and optimal neural
38
network classifier. Our proposed method comprised of four stages namely, feature extraction, feature selection,
39
classification and Region identification. Initially the TB images are extracted from the given input database and
that each of the input images are given to feature extraction process, in which statistical, structural and gray level
dependent features are extracted. After that, the feature selection scheme is carried out through multi-kernel
FCM based rough-set theory. Then, selected features are given to optimal neural network classifier to optimize
the weight values of the neural network. In this work proposed classifier is Particle Genetic Swarm Neural
Network classifier (GPSO-NN) which Integrates the characteristics of both genetic and particle swarm methods.
The proposed system is implemented in the working platform of MATLAB. Compared to previous method our
proposed technique is improved in terms of accuracy, sensitivity and specificity.

Keywords: Tuberculosis, GPSO-NN, rough-set theory, multi-kernel FCM, feature extraction, feature selection.

References:

1. World Health Org., Global tuberculosis report 2018.


2. World Health Org., Global tuberculosis control 2017.
3. Vishnu Makkapati and Ravindra Agrawal, Raviraja Acharya, “Segmentation and classification of tuberculosis bacilli from ZN-stained
sputum smear images”, CASE 2009: 217-220
4. M.K. Osman Mashor, M.Y. Saad and H. Jaafar ,"Colour Image Segmentation of Tuberculosis Bacilli in Ziehl-Neelsen-Stained Tissue
Images Using Moving K-Mean Clustering Procedure", Fourth Asia International Conference on Mathematical/Analytical Modelling
and Computer Simulation, pp.215-220, 2010.
5. Alireza Osareh and Bita Shadgar, “A Computer Aided Diagnosis System for Breast Cancer” IJCSI International Journal of Computer
Science Issues, Vol. 8, no.2, 2011
6. G.N. Srinivasan G. Shobha, “Statistical Texture Analysis, in Proceedings of World Academy of Science”, Engineering and
Technology, 2008; 36: 1264-1269
7. Siena, Kusworo Adi, Rahmat Gernowo and Nelly Mirnasari, “Development of Algorithm Tuberculosis Bacteria Identification Using
Color Segmentation and Neural Networks”, International Journal of Video & Image Processing and Network Security Vol.12, 2012
8. John Shafer, Rakesh Agarwal, and Manish Mehta, “SPRINT: A scalable parallel classifier for data mining”, In Proceeding of the
VLDB Conference, Bombay, India.
9. Sunghwan Sohn and Cihan H. Dagli, “Ensemble of Evolving Neural Networks in classification”, Neural Processing Letters, 2004
10. Shahaboddin Shamshirband, Somayeh Hessam, Hossein Javidnia, Mohsen Amiribesheli , Shaghayegh Vahdat, Dalibor Petkovic,
Abdullah Gani and Laiha Mat Kiah, “Tuberculosis Disease Diagnosis Using Artificial Immune Recognition System”, international
journal of medical sciences, vol.11, no.5, pp. 508-514, 2014.
11. Rui Shen and Irene Cheng and Anup Basu, "A Hybrid Knowledge-Guided Detection Technique for Screening of Infectious Pulmonary
Tuberculosis From Chest Radiographs", IEEE Transactions on Biomedical Engineering, Vol. 57, No. 11, pp.2646-2656, 2010.
12. B.Widrow, D. E. Rumelhard and M. A. Lehr, “Neural networks: Applications in industry, business and science”, Commun, ACM, vol.
37, pp.93–105, 1994
13. Cortes and Vapnik, V., “Support-vector networks”, Machine Learning, vol.20, no. 2, pp.273-297, 1995
14. H.Yoshida, K.Doi, and R. M. Nishikawa, “Automated detection of clustered micro-calcifications,” in Digital Mammograms Using
Wavelet Transform Techniques, Medical Imaging Bellingham, pp. 868–886, 1994.
15. H. Cheng, Y. M. Liu, and R. I. Freimanis, “A novel approach to micro-calcifications detection using fuzzy logic techniques,” IEEE
Trans. Med. Imag., vol. 17, pp. 442–450, June 1998.
Authors: Mokshali Bawiskar, Vijayshri Injamuri

Paper Title: Aspect Based Mobile Recommendation System


Abstract: Now-a-days, there is a trend of changing mobile phone models in very short duration. To achieve
benefit of choosing a mobile phone satisfying our requirements, mobile phone recommendation system is of
great importance. As we know, there are many web sites that provide number of reviews and ratings for each
and every mobile phone model available in market. From this, we can understand the consumer opinions and
reviews about any mobile product. Existing systems were based on complete review of product as good or bad.
But, there is need to have a way with which we can review the product with view of each aspect such as camera,
battery, look etc. For this, we have developed a system which provides a recommendation of mobile phone
model by considering aspects with user’s choice. For this, we have used reviews, ratings provided by group of
users on social website, Amazon. The data is collected with the use of “Octoparse”, a web scraping software and
the text data collected is analyzed using Stanford's CoreNLP for sentiment analysis. Our approach provides
recommendation, considering user provided aspects (i.e. camera, battery, look etc.) with the use of apache
mahout and hybrid recommendation. Our approach showed outstanding performance for mobile phone
recommendation.

Keywords: Recommendation system, standfordsNlP, Octoparse, Apache mahout, customer reviews and
663. ratings. 3840-
38
References: 46
1. Wallin, “Sentiment analysis of Amazon reviews and perception of product features,” 2014.
2. Koji Yatani, Michael Novati, Andrew Trusty, Khai N. Truong,“Review Spotlight: A User Interface for Summarizing UserGenerated
Reviews using Adjective-Noun Word Pairs”, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, May
2011.
3. Kushal Dave, Steve Lawrence, David M. “Pennock, Mining the Peanut Gallery: Opinion Extraction and Semantic Classification of
Product Reviews,” Proceedings of the 12th international conference on World Wide Web, May 2003.
4. Lei Zhang Bing Liu “Aspect and entity extraction for opinion mining in Data Mining and Knowledge Discovery for Big Data Springer
pp. 1-40 2014
5. Blair-Goldensohn, Sasha., Kerry, Hannan., Ryan, McDonald., Tyler, Neylon., George A. Reis, Jeff, Reyna. 2008. Building Sentiment
Summarizer for Local Service Reviews In Proceedings of the Workshop of NLPIX . WWW, 2008
6. Mukherjee S., Bhattacharyya P. (2012)“Feature Specific Sentiment Analysis for Product Reviews. In: Gelbukh A. (eds) Computational
Linguistics and Intelligent Text Processing.” CICLing 2012. Lecture Notes in Computer Science, vol 7181. Springer, Berlin,
Heidelberg
7. Rain, C. (2013). “Sentiment Analysis in Amazon Reviews Using Probabilistic Machine Learning.” Swarthmore College.
8. Hatzivassiloglou, V., & Wiebe, J. M. (2000, July). “Effects of adjective orientation and gradability on sentence subjectivity.” In
Proceedings of the 18th conference on Computational linguistics-Volume 1 (pp. 299-305). Association for Computational Linguistics.
9. Gabrilovich, E., & Markovitch, S. (2005, July). “Feature generation for text categorization using world knowledge.” In IJCAI (Vol. 5,
pp. 1048-1053).
10. JT. K. Shivaprasad and J. Shetty. “Sentiment analysis of product reviews: A review.” 2017 International Conference on Inventive
11. Communication and Computational Technologies (ICICCT), Coimbatore, 2017, pp. 298-301.
12. R. Varghese and M. Jayasree. “Aspect based Sentiment Analysis using support vector machine classifier.” 2013 International
Conference on Advances in Computing, Communications and Informatics (ICACCI), Mysore, 2013, pp. 1581-1586.
13. D. V. N. Devi, C. K. Kumar and S. Prasad. “A Feature Based Approach for Sentiment Analysis by Using Support Vector Machine.”
2016 IEEE 6th International Conference on Advanced Computing (IACC), Bhimavaram, 2016, pp. 3-8.
14. Hutto, C.J. Gilbert, E.E. VADER: “A Parsimonious Rulebased Model for Sentiment Analysis of Social Media Text.” Eighth
International Conference on Weblogs and Social Media (ICWSM-14). Ann Arbor, MI, June 2014.
15. Yueping Wu and Jianguo Zheng, “A Collaborative Filtering Recommendation Algorithm Based on Improved Similarity Measure
Method”, Proc. of Progress in informatics and computing, 2010, pp.246- 249.
16. Xiwei Wang, Erik von der Osten, Xuzi Zhou, Hui Lin and Jinze Liu, “Case Study of Recommendation Algorithms”, Proc. of
International Conference on Computational and Information Sciences, 2011, pp.410 417.
17. Xue, W., B. Xiao, et al. (2015). “Intelligent mining on purchase information and recommendation system for e-commerce.” 2015 IEEE
International Conference on Industrial Engineering and Engineering Management (IEEM).
18. Zheng, Y., C. Liu, et al. (2016). “Neural Autoregressive Collaborative Filtering for Implicit Feedback. Proceedings of the 1st
Workshop on Deep Learning for Recommender Systems.” Boston, MA, USA, ACM: 2- 6.
19. Zhao, Q., Y. Zhang, et al. (2017).” Multi-Product Utility Maximization for Economic Recommendation.” Proceedings of the Tenth
ACM International Conference on Web Search and Data Mining. Cambridge, United Kingdom, ACM: 435-443.
20. Zheng, L., V. Noroozi, et al. (2017). “Joint Deep Modeling of Users and Items Using Reviews for Recommendation.” Proceedings of
the Tenth ACM International Conference on Web Search and Data Mining. Cambridge, United Kingdom, ACM: 425-434.

Authors: Asha Meena, Anita Garhwal, Kanad Ray

Paper Title: Double Fibonacci Spiral Microstrip Patch Antenna for Dual Band Applications
Abstract: Double Fibonacci spiral in a circle with microstrip line feeding technique is designed in the
frequency range from 0.1GHz to 6GHz. The antenna is designed and simulated in computer simulation
technology microwave studio software, substrate Fr-4 with thickness 1.59mm is used and antenna parameters
such as return loss, surface current, E-field, H-field and gain are calculated for Double Fibonacci spiral
microstrip patch (DFSM) antenna. The antenna is used for ISM (industrial, scientific and medical) frequency
band (2.45GHz) and a new unutilized band for next generation services, gain is 2.22dB and 3.16dB and
bandwidth is 25.94% and 22.83% on resonating frequencies.

Keywords: Circular patch, Fibonacci sequence, golden ratio, ISM band.

References:

1. C. A. Balanis, Antenna Theory, Analysis and Design, John Wiley & Sons, 2014.
2. I. Singh, V.S. Tripathi, Microstrip Patch Antenna And Its Application, Int. J. Comp. Tech. Appl.,2(5),Pp.1595-1599,2011.
3. David R. Jackson “introduction to antenna”, IEEE international symposium on antennas and propagation 2013.
4. Peebles, Peyton Z. Jr, (1998), Radar Principles, John Wiley and Sons, Inc., P 20.
5. North & South America-LyngSat.www.lyngsat.com. Archived From the original on 30 September 2017. Retrived 30 April 2018.
6. FCC Proposed Expanding Flexible Use Of Mid-Band Spectrum.
7. Intelsat, Ses, Eutelsat And Telesat Establish The C-Band Alliance (CBA), A Consortium To Facilitate Clearing Of U.S. Mid-Band
Spectrum For 5Gwhile Protecting U.S Content Distribution And Data Network”, SES. Sept 27, 2018.Retrived November 2, 2018.
8. C-Band Alliance. Accessed November 2, 2018.
9. Thomas Koshy, “Fibonacci and Loucas Numbers With Applications”, John Wiley & Sons, 2011.
10. Jesus albertoviveros Delgado and carlos Andres viterimera, “A Bioinpired Patch Antenna Array Using Fibonacci Sequences In Trees”,
IEEE Antennas and Propagation Magazine, Vol. 55, No. 5, October 2013.
11. Yunus Emre Ozmen, TahaImeci, “Spiral Patch Antenna at 12ghz”, IEEE 2017.
664. 12. Li Peng, Hai Zhang, Zeyan, Liu, Hui Wang, Huasheng Zhu, “Design Of Fibonacci Sequence RFID Antenna Using Differential
Evolution”, Proceedings Of The 37th Chinese Conference, July 25-27, 2018, Wuhan, China. 3847-
13. Monika Chauhan, Ajay K. Pandey, Biswajeet Mukherjee, “A Novel Cylindrical Dielectric Resonator Antenna Based On Fibonacci 38
Series Approach”, Microw Opt Technol Let. 2019; 1-7, Wiley Periodicals,Inc. 51
14. Cheng-Hsing Hsu, Hung-Son Dang, Thi-Anh-Tuyet Nguyen, “The Application Of Fibonacci Sequence And Taguchi Method For
Investigating The Design Parameters On Spiral Micro-Channel”, IEEE 2016.
15. Asha Meena, Anita Garhwal, Kanad Ray, “Natured Inspired Fibonacci Sequence Microstrip Patch Antenna Used For Energy
Harvesting Application”, International Journal Of Recent Technology And Engineering (IJRTE), volume -8, issue-2, July2019 .
16. Engy Alaa El Din Hanafy, Dr. Abdelmegid Allam, “Investigation For Breast Cancer Using Antennas in the ISM Frequency Band”,
IEEE 2014.
17. Oluwatosin J Babarinde M.F. Jamlos “UWB Microwave Imaging For Lung Tumar Detection In A Thorax Model”, 2014 IEEE
Symposium On Wireless Technology And Applications (ISWTA), Sept 28 - Oct 1, 2014, Kota Kinabalu, Malaysia.
18. C.J. Sanchez-Fernanadez, O. Quevedo-Teruel, J. Requena-Carrion, L.Inclan-Sanchez, E. Rajo-Lglesias, “Dual-Band Microstrip Patch
Antenna Based On Short-Circuited Ring And Spial Resonators For Implantable Medical Devices”, Iet Microwave, Antenna
&Propagation 2010, Vol-4, Issue-8, Pp. 1048-1055.
19. N.H.Abdul, K. Ismail, S.Sulaiman And M.A.Haron, “Design Of A Rectangular Spiral Antenna For Wi-Fi Application”, ISBN 978-89-
5519-154-7, Feb 13-16, 2011 ICACT 2011.
20. Basari, R. Azia, F.Y. Zulkifli, E.T. Rahardjo, “Dual-Arm Modified-Spiral Textile Antenna For Wearable Medical Communication
Applicatons”, IEEE 2016.
21. Ayia A.S.A. Jabar And Dhirgham K. Naji, “Design Of Miniaturized Quad-Band Dual-Arm Spiral Patch Antenna For RFID,WLAN
And Wimax Applications”, Progress In Electromagnetics Research C, Vol. 91, 97-113, 2019.
22. Patrick Labbe And David Bateman, “Fractal-Spiral Antenna For UWB Standard”, Proc. ‘EuCAP 2006’,Nice, France, 6-10 November
2006.
23. J.Valleau, H.Aubert, O.Ripoche, A.Bellicon, P.Potier, P.Pouliguen, “Pre-Fractal Resonant Rings For Compact Spiral Antennas”, IEEE
2014.
24. Anita Garhwal,et al, “Octagon And Decagon Shaped Fractal Patch Antenna For S, C and X Band Applications”, International Journal
Of Recent Technology And Engineering (IJRTE), Volume7, Issue 6, March 2019.
25. A Garhwal, M R Ahmad, B H Ahmad, S Rawat, P Singh, K Ray and A Bandyopadhya, “Circular and Elliptical Shaped Fractal Patch
Antennas For Multiple Applications”,International Jouranl Of Engineering And Advanced Technology (IJEAT),Volume8, Issue-5,
June 2019.
26. Anita Garhwal, M R Ahmad, B H Ahmad, Sanyog Rawat, Pushpendra Singh, Kanad Ray And Anirban Bandyopadhya, “Mechanically
Reconfigurable Hexagonal Fractal Patch Antenna For Ambient Computig”,International Journal Of Innovative Technology And
Exploring (IJITEE), Volume8, Issue-6, April 2019.
27. Pushpendra Singh, Kanad Ray, Sanyog Rawat, “Nature Inspired Sunflower Shaped Microstrip Antenna for Wideband Performance”,
International Journal of Computer Information Systems and Industrial Management Applications. ISSN 2150 - 7988 Volume 8 (2016)
pp. 364 - 371.
28. Ushaben Keshwala, Sanyog Rawat,Kanad Ray, “Nature Inspired Dual Band Sneezewort Plant Growth Pattern Shaped Antenna”
,Proceedings Of 2017 Asia Pacific Microwave Conference, IEEE 2017.

Authors: Ahmad Garba Khaleel, Mridul Dharwal


Simulating Hybrid Power Plants in Strategic Industrial Areas in Nigeria: Solar PV-Diesel Hybrid
Paper Title:
for Kano Free Trade Zone
Abstract: The review the power situation of one of Kano Free Trade Zone, one of the Federal Government of
Nigeria’s own Export Processing Zones and simulated a hybrid power plant for the Zone and nearby community.
It is found that, the power requirements of the Zone are current provided for through an unreliable Grid and
1MW diesel generator, which is quite expensive and unsatisfactory for a manufacturing site. The paper gathered
solar resources information of the site using Global Solar Atlas and use the HOMER Grid optimization feature
to simulate the most appropriate capacity to provide the recorded load of the Zone. The simulation proposed four
viable systems out of which two are considered and recommended for implementation at the Zone as they
provide the opportunity for the Zone to provide itself with renewable power using Grid Tied Solar-PV/Diesel
hybrid and even sell more power to the grid, nearby community and installations.

Keywords: Hybrid, power plant, export processing zone, Kano - Nigeria

References:

1. A2EI (2019) Putting an End to Nigeria’s Generator Crisis: The Path Forward, Access to Energy Insitute. Available at: https://a2ei.org/.
2. Abam, F. and Effiom, S. O. (2015) ‘Evaluation of Intensity and Structural Effects on Energy Consumption Trend in Nigeria Using the
3-D Decomposition Model’, International Journal of Engineering & Technology Sciences 3(6):372-, 3(6), pp. 372–381. Available at:
https://www.researchgate.net/publication/296195871_Evaluation_of_Intensity_and_Structural_Effects_on_Energy_Consumption_Tren
d_in_Nigeria_Using_the_3-D_Decomposition_Model.
3. Acakpovi, A. et al. (2017) ‘Exploring the fundamentals of solar photovoltaic technology and its modelling’, in KALE, S. A. (ed.)
RENEWABLE ENERGY SYSTEMS: RESEARCH, DEVELOPMENT AND POLICIES. New York: Nova Science Publishers, Inc.,
pp. 1–38. Available at: https://www.researchgate.net/publication/316216064%0AExploring.
4. Adaramola, M. S. (2012) ‘Feasibility Study of Off-grid Hybrid Energy Systems for Applications in Ondo State Nigeria’, Journal of
Engineering and Appl ied Sciences, 7(1), pp. 72–78. Available at: http://medwelljournals.com/abstract/?doi=jeasci.2012.72.78.
5. Adaramola, M. S., Paul, S. S. and Oyewola, O. M. (2014) ‘Assessment of decentralized hybrid PV solar-diesel power system for
applications in Northern part of Nigeria’, Energy for Sustainable Development, 19(1), pp. 72–82. doi: 10.1016/j.esd.2013.12.007.
6. Adeyanju, A. A. and Manohar, K. (2011) ‘Assessment of Solar Thermal Energy Technologies in Nigeria’, Research Journal of Applied
Sciences, 6(7–12), pp. 451–456. doi: 10.1109/GREEN.2011.5754862.
7. Agbetuyi, A. (2018) ‘The Vast Renewable Energy in Africa versus its Slow Pace of Harnessing’, International Electrical Engineering
Journal (IEEJ), 8(2), pp. 2507–2512. Available at: http://www.ieejournal.com/.
8. Akinwale, Y. O. and Adepoju, A. O. (2019) ‘Factors influencing willingness to adopt renewable energy technologies among micro and
665. small enterprises in Lagos State Nigeria’, International Journal of Sustainable Energy Planning and Management, 19, pp. 69–82. doi:
http://dx.doi.org/10.5278/ijsepm.2019.19.7. 3852-
9. Campbell, J. (2018) Electricity Distribution Is Holding Nigeria Back, Council on Foreign Relations. doi: 38
https://www.cfr.org/blog/electricity-distribution-holding-nigeria-back
10. Chakamera, C. and Alagidede, P. (2018) ‘Electricity crisis and the effect of CO2 emissions on infrastructure-growth nexus in Sub 56
Saharan Africa’, Renewable and Sustainable Energy Reviews, 94(March), pp. 945–958. doi: 10.1016/j.rser.2018.06.062.
11. Dagogo-Jack, B. (2012) ‘Status Report on the Nigeria Power Sector Reform’, Annual West African Power Industry Convention
(WAPIC) 2012. Available at: https://www.esi-africa.com/wp-content/uploads/Beks_Dagogo.pdf.
12. Ebhota, W. S. (2019) ‘Power accessibility, fossil fuel and the exploitation of small hydropower technology in sub-saharan africa’,
International Journal of Sustainable Energy Planning and Management, 19, pp. 13–28. doi: 10.5278/ijsepm.2019.19.3.
13. ECN (2012) Renewable Energy Master Plan (REMP), Energy Commission of Nigeria (ECN). Energy Commission of Nigeria (ECN).
14. Emodi, N. V. and Yusuf, S. D. (2015) ‘Improving electricity access in Nigeria: Obstacles and the way forward’, International Journal
of Energy Economics and Policy, 5(1), pp. 335–351. Available at: www.econjournals.com.
15. EREP (2012) ‘ECOWAS Renewable Energy Policy’, ECOWAS Centre for Renewable Energy and Energy Effieciency, p. 92.
Available at: http://www.ecreee.org/sites/default/files/documents/basic_page/151012_ecowas_renewable_energy_policy_final.pdf.
16. Felix, A. A. et al. (2012) ‘Wind Energy Potential in Nigeria’, International Electrical Engineering Journal (IEEJ), 3(1), pp. 595–601.
Available at: https://www.researchgate.net/publication/295546689.
17. FGN (2011) FEDERAL REPUBLIC OF NIGERIA POWER SECTOR OUTLOOK IN NIGERIA : Challenges, Constraints and
Opportunities. Government Renewed Priorities.
18. FME (2010) Draft National Policy and Guidelines on Renewable Energy, FEDERAL MINISTRY OF ENVIRONMENT - FME,
FEDERAL REPUBLIC OF NIGERIA.
19. FMPS (2006) Renewable Electricity Action Program (REAP), FEDERAL MINISTRY OF POWER AND STEEL - FMPS, FEDERAL
REPUBLIC OF NIGERIA. ABUJA.
20. Khaleel, A. G. and Chakrabartib, M. (2019) ‘Energy modelling as a tool for curbing energy crisis and enhancing transition to
sustainable energy system in Nigeria’, International Journal of Sustainable Energy Planning and Management, 21, pp. 3–18.
21. Mas’ud, A. A. et al. (2015) ‘An assessment of renewable energy readiness in Africa: Case study of Nigeria and Cameroon’, Renewable
and Sustainable Energy Reviews. Elsevier, 51(April), pp. 775–784. doi: 10.1016/j.rser.2015.06.045.
22. MoP (2015) Approved National Renewable Energy and Energy Efficiency Policy (NREEEP), Ministry of Power - MoP, Federal
Republic of Nigeria.
23. Movahediyan, Z. and Askarzadeh, A. (2019) ‘A multiobjective approach for design of an o?‐grid PV/Diesel system considering
reliability and cost’, Environmental Progress & Sustainable Energy, 38(4). Available at:
https://aiche.onlinelibrary.wiley.com/doi/abs/10.1002/ep.13101.
24. Nkordeh, N. et al. (2017) ‘Nigeria’s Power Generation: Analyzing the Cost Implication of Poor Generation in the Running Cost of
Telecom Business in Nigeria’, in World Congress on Engineering and Computer Science 2017 Vol I. San Francisco, USA: WCECS
2017, pp. 271–275. Available at: http://www.iaeng.org/publication/WCECS2017/WCECS2017_pp271-275.pdf.
25. Okorie, M. E. et al. (2018) ‘Renewable energy and African industrialization: A participatory integrated approach in assessing
concentrated solar power potential in Namibia’, International Journal of Mechanical Engineering and Technology, 9(509–524), pp.
509–524. Available at: https://www.scopus.com/inward/record.uri?eid=2-s2.0-
85059230703&partnerID=40&md5=0c754e6803d1cb32a6ce2546903a2935.
26. Olatomiwa, L. et al. (2015) ‘Techno-economic analysis of hybrid PV–diesel–battery and PV–wind–diesel–battery power systems for
mobile BTS: The way forward for rural development’, Energy Science and Engineering, 3(4), pp. 271–285. doi: 10.1002/ese3.71.
27. Olatomiwa, L. (2016) ‘Optimal configuration assessments of hybrid renewable power supply for rural healthcare facilities’, Energy
Reports. Elsevier Ltd, 2, pp. 141–146. doi: 10.1016/j.egyr.2016.06.001.
28. Oleka, E. U., Ndubisi, S. N. and Ijemaru, G. K. (2016) ‘Electric Power Transmission Enhancement: A Case of Nigerian Electric Power
Grid’, American Journal of Electrical and Electronic Engineering, 4(1), pp. 33–39. doi: 10.12691/ajeee-4-1-5.
29. Ouedraogo, N. S. (2017) ‘Africa energy future: Alternative scenarios and their implications for sustainable development strategies’,
Energy Policy. Elsevier Ltd, 106(March), pp. 457–471. doi: 10.1016/j.enpol.2017.03.021.
30. Oyedepo, S. O. et al. (2018) ‘Towards a Sustainable Electricity Supply in Nigeria: The Role of Decentralized Renewable Energy
System’, European Journal of Sustainable Development Research, 2(4), pp. 0–31. doi: 10.20897/ejosdr/3908.
31. Suberu, M. Y. et al. (2013) ‘Power sector renewable energy integration for expanding access to electricity in sub-Saharan Africa’,
Renewable and Sustainable Energy Reviews, 25(36), pp. 630–642. doi: 10.1016/j.rser.2013.04.033.
32. Trotter, P. A., McManus, M. C. and Maconachie, R. (2017) ‘Electricity planning and implementation in sub-Saharan Africa: A
systematic review’, Renewable and Sustainable Energy Reviews. Elsevier Ltd, 74(March), pp. 1189–1209. doi:
10.1016/j.rser.2017.03.001.
33. US-ITA (2018) Nigeria - Electrical Power Equipment, US-ITA Country Commercial Guide. doi:
https://www.export.gov/article?id=Nigeria-Electrical-Power-Equipment.
34. WEC (2017) World Energy Trilemma Index | 2017 MONITORING THE SUSTAINABILITY OF NATIONAL ENERGY SYSTEMS,
World Energy Council. Available at: https://www.worldenergy.org/wp-content/uploads/2017/11/Energy-Trilemma-Index-2017-
Report.pdf.
35. WPP (2019) Inadequate Power Generation – The Nigerian Power Sector, Worldwide Power Products. doi:
https://www.wpowerproducts.com/news/inadequate-power-generation-the-nigerian-power-sector/.

Authors: Hasnan Nafis, Rusdinal, Azwar Ananda, Khairani, Haris Satria


Influence Of Profesional Teacher Competence, Self Concept, Interest Learning, And Early To
Paper Title:
Learning Outcomes Mathemathics
Abstract: This research is motivated by the problem of low learning result of mathematics of Pariaman high
school students. Based on the observation and documentation, several factors that cause the low quality of
professional teachers in teaching, student self-concept of the basics, low learning interest, and the initial ability
of students who have not been awakened properly. The purpose of this study is to analyze the direct and indirect
influence of each exogenous variable on endogen and analyze the effect simultaneously between
variables.Thetype of this research is Path Analysis research, the research population is all students of SMA
Pariaman amounting 4,160 people. The sample was taken using stratified proportional random sampling
technique so that the number of samples taken was 100 people. Instruments used to retrieve data are
questionnaires and documentation. Data were analyzed using SPSS version 16 analysis.

Keywords: Professional Teacher Competence, Self Concept, Learning Interest, Initial Ability, Learning
Outcomes, Path Analysis, State Senior High School Pariaman.

References:

1. Bachrum, Much. 2004. Wawasan Global KianTidakBisaDitolak, MajalahGerbang, Edisi 8 tahunIII Yogyakarta: CahayaTimur Offset
2. Block , James H., 1974. Schools, Society,and Mastery Learning, (New York: Holt, Rinehart and Winston,Inc.
3. Bloom, Benyamin. 1974. “An Introduction to Mastery Learning Theory” Schools, Society and Mastery Learning, Editor James H.
Block (New York: Holt Rinehart and Winston, Inc., Thomas L.
4. Brent Davis. 2002. Curriculum Framework-Mathematics (New York: http:www.outfo/mathematics/index
5. ConnyR.Semiawan. 1999. PeningkatanKemampuanManusiaSepanjang Hayat SeoptimalMungkin. Jakarta: PT.Grasindo
6. Crow, Lester D. Crow & Alice Educational Psychology (New York: American Book Co., 1973)
7. Depdiknas, 2003 StatistikPersekolahan SMU 2002/2003. Jakarta: Balitbangpusat data daninformasipendidikan
666. 8. Gagne, Robert. 1975. Essentials of Learning for Instruction Hinsdale, Illinois: The Dryden Press
9. Guilford, .P. Personality (New York: McGraw Hill Book Company, 1969)
3857-
10. Hamalik, Oemar. 1990. Psikologi Belajar dan Mengajar .Bandung: Sinar Baru 38
11. Hamalik, Oemar. 2002. Perencanaan Pengajaran Berdasarkan Pendekatan Sistem. Jakarta: Bumi Aksara 62
12. Hamzah. 2006. Teori Motivasi dan Pengukuran. Gorontolo: Bumi Aksara
13. Harmin, L.E. Raths, Merrill & Sidney B. Simon, Value and Teaching:
14. Working with Values in the Classroom (Columbus, Ohio: Charles E. Merrill Publishing Co., 1966)
15. Hurlock, Elizabeth B. Child Devplopment (Singapore: McGraw-Hill International Book Company, 1981)
16. Jatmika, Sidik. 2004. PendidikandanDunia yang TerusBerubah, majalahGerbang, edisi 8 tahun III Yogyakarta: CahayaTimur Offset
Kebudayaan Proyek Pembinaan Tenaga Kependidikan Tinggi
17. Jujun S. Suriasumantri. 1988. FilsafatIlmu. Jakarta: PustakaSinarHarapan
18. Klausmeier, Herbert J. Educational Psychology (New york: Harper & Row Publishers, 1985)
19. Moore, Biggs. 1993. The Process of Learning Sydney: Prencite Hall,1993
20. Nagai, Michio. 1993PergulatanJepangdalamModernisasiPendidikan.Jakarta: GramediaPustakaUtama
21. Nasution, Noehi. 1992. Psikologi Pendidikan. Jakarta: Departemen Pendidikan dan Uno,
22. Purwanto. 1991. Psikologi Pendidikan. Bandung : Remaja Rosdakarya.
23. PusatKurikulum, BalitbangDepdiknas. 2002. KurikulumBerbasisKompetensi, KompetensiDasar Mata PelajaranMatematika SMA &
MA Jakarta: BalitbangDepdiknas
24. Rakmat, Jalaluddin. PsikologiKomunikasi (Bandung: RemajaRosdakarya, 1994)
25. Raper, Stringer. 1987. Encouraging Primary Science: An Introduction to the Development of Science in Primary Schools( London:
Cassel Publisher Limited, 1987
26. Riyanto, Yatim. 2009. Paradigma Baru Pembelajaran. Jakarta : Prenada Media Grup.
27. Rusyan, Kusdinar, dkk. 1992. Pendekatan dalam Proses Belajar dan Mengajar. Bandung: Remaja Rosdakarya
28. Sax, Gilbert Principles of Educational and Psychological Measurement and Evaluation (San Francisco: Wadsworth Publishing
Company Inc., 1980)
29. Syah, MuhibbinPsikologiPendidikanSuatuPendekatanBaru (Bandung: RemajaRosdakarya, 1995)
30. Soekamto, ToetiPerancangandanPengembanganSistemInstruksional (Jakarrta: Intermedia, 1993)
31. Skinner, Charles E., Educational Psychology (New Delhi: Prentice-Hall of India Private Limited, 1977)
32. Soedijarto. 2000.PendidikanNasional. SebagaiWahanaMencerdaskanKehidupanBangsadanMembangunPeradaban Negara-bangsa
(Jakarta: CINAPS, 2000)
33. Soemanto, Wasty. 1990. Psikologi Pendidikan. Jakarta: Rineka Cipta
34. Soedjadi. 2000. KiatPendidikanMatematika di Indonesia:KonstatasiKeadaanMasaKiniMenujuHarapanMasaDepan. Jakarta: Dirjen-
Dikiti, Depdiknas
35. Sudrajat. Akhmad. 2008. Teori-Teori Motivasi. Jakarta
36. Trianto. 2010. Mendesain Model Pembelajaran Inovatif dan Progresif. Jakarta: Prenada Media Group.
37. Tuhuleley, Said. 2003. PeningkatanKualitas SDM, SuatuKeniscayaan, MajalahGerbangedisi 8 tahunII . Yogyakarta: CahayaTimur
Offset
38. Youse, Bevan K. 1971. An Introduction of Mathematics . Boston: Allyn and Bacon
39. 2002. Media KomunikasiPendidikanNasional, edisiIII Jakarta: SekjenDikn

Authors: Aman Jain, Simran Sharma, Hrishav Kumar, Deepak Parashar

Paper Title: Geographical Information System Based Safe Path Recommender


Abstract: The threat to women safety, especially on road, has become a major concern these days and the
problem is increasing dramatically. Women are unsafe not just in the night but also in the day, they fear getting
assaulted not only in public transport but also while travelling in cars and two-wheelers. People are harassed on
road in various ways like robberies, killings, etc., but women go through even bigger traumas. Cases like, rape in
moving cars, sexual assault and robberies by forcefully stopping the vehicle, teasing women on two-wheelers,
etc. have increased to an alarming level. This study is an initiative to safe-guard the self-esteem of our women
and prevent them from any ugly experience, while on road. It aims to find and suggest the safest path for women
and tells the level of crime of the locations in that path, while travelling from one place to another. The system
determines the various paths from source to destination, as entered by the user on the map interface, by
calculating the danger index. This index is found on the basis of the crime rate of the grouped locations. These
locations are grouped by clustering them on the basis of the crime history of that location. The app as a result
suggests the best three paths in different colours (Green, Red, Yellow).

Keywords: crime against women; safest path; maps; location; clustering of locations.

References:

1. ORACLE+Datascience.com- https://www.datascience.com
2. Research India Publication- http://www.ripublication.com
667. 3. Akaash Vishal Hazarika, G Jagadeesh Sai Raghu Ram, Eeti Jain, Deegoju Sushma, Anju, Cluster Analysis of Delhi Crimes using
Different Distance Metrics, International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS- 3863-
2017). 38
4. Adel Ali Alkhaibari and Ping-Tsai Chung “Cluster Analysis for Reducing City Crime Rates”, IEEE Long Island Systems, Applications 68
and Technology Conference (LISAT), 2017.
5. KM Archana Patel and Prateek Thakral, “The Best Clustering Algorithms in Data Mining”, International Conference on
Communication and Signal Processing, April 6-8, 2016, India.
6. Jyoti Agarwal, Renuka Nagpal and Rajni Sehgal “Crime Analysis using K-Means Clustering”, International Journal of Computer
Applications (0975 – 8887) Volume 83 – No4, December 2013.
7. Bavin Ondieki and Chaitanya Patchava, “Safe Path Recommender: Using Crime Statistics”, Stanford University.
8. Chhaya Chauhan, Smriti Sehgal, “A REVIEW: CRIME ANALYSIS USING DATA MINING TECHNIQUES AND ALGORITHMS”,
2017 International Conference on Computing, Communication and Automation (ICCCA2017).
9. Ren Jingbiao and Yin Shaohong, “Research and Improvement of Clustering Algorithm in Data Mining”, 2010 2nd International
Conference on Signal Processing Systems (ICSPS).
10. Sunil Yadav, Meet Timbadia, Ajit Yadav, Rohit Vishwakarma and Nikhilesh Yadav, “Crime Pattern Detection, Analysis &
Prediction”, International Conference on Electronics, Communication and Aerospace Technology ICECA 2017.
11. Moni Arora, Nisha Kaushik, Tanya Jain, Baljeet Kaur, Pooja Vashisth, Kamakshi Khosla, Suruchi Bhatia, “HumSafar: An Android
App enabling a Safer Way to Travel", 2016 Fourth International Conference on PDGC.
12. LalithaSarojaThota, MohrahAlalyan, AL-OtaibiAwatif Khalid, FabihaFathima, Suresh BabuChangalasetty, Mohammad Shiblee,
“Cluster based Zoning of Crime Info”.
13. Mark Robert M. Aldecimo, Marlene M. De Leon, “Development of an OpenStreetMap Based Safe zone Routing System for West
Valley Fault Earthquake Disaster in the Makati Central Business District, Philippines”.
14. Richard Frank, Bryan Kinney, “How Many Ways Do Offenders Travel – Evaluating the Activity Paths of Offenders”, 2012 European
Intelligence and Security Informatics Conference.
15. Yunkai Liu, Christopher Magno, “A Case Study to Apply Mobile Technology into Individual’s Local Community”, 2015 IEEE
International Conference on Big Data.
16. Mugdha Sharma, “Z - CRIME: A Data Mining Tool for the Detection of Suspicious Criminal Activities Based on Decision Tree”.
17. Carlos Caminha, “Impact of Human Mobility on Police Allocation”.

Authors: Amardeep A. Shirolkar, S. V. Sankpal

Paper Title: Performance Analysis of Cooperative Spectrum Sensing In Different Case Scenarios
Abstract: Cooperative relay based spectrum sensing techniques are primarily available techniques in the field
of research in cognitive radio networks. Even such techniques are available there is need to consider
fundamental effects on spectrum sensing with various combination of scenarios that lead to false alarm
detection. In this paper we have compared the three cases of cooperative spectrum sensing to analyze the effects
668. and to form the direction of further research expectations in the field of cooperative spectrum sensing.
3869-
Keywords: cooperative spectrum sensing, path loss exponent, hidden node issue, shadowing effect, probability 38
of detection, threshold of detection. 72

References:

1. S. Atapattu, C. Tellambura and H. Jiang, "Energy Detection Based Cooperative Spectrum Sensing in Cognitive Radio Networks," in
IEEE Transactions on Wireless Communications, vol. 10, no. 4, pp. 1232-1241, April 2011.
2. K. B. Letaief and W. Zhang, "Cooperative Communications for Cognitive Radio Networks," in Proceedings of the IEEE, vol. 97, no. 5,
pp. 878-893, May 2009.
3. N. Zarin, S. A. Mahmud and I. Khan, "Relay based cooperative spectrum sensing in cognitive radio networks over rayleigh fading
channel with path loss effects," 2012 15th International Multitopic Conference (INMIC), Islamabad, 2012, pp. 291-296.
4. Y. Zou, Y. Yao and B. Zheng, "A Selective-Relay Based Cooperative Spectrum Sensing Scheme without Dedicated Reporting
Channels in Cognitive Radio Networks," in IEEE Transactions on Wireless Communications, vol. 10, no. 4, pp. 1188-1198, April
2011.
5. X. Wu, N. Fu and F. Labeau, "Relay-Based Cooperative Spectrum Sensing Framework Under Imperfect Channel Estimation," in IEEE
Communications Letters, vol. 19, no. 2, pp. 239-242, Feb. 2015.
6. L. Zhang, J. Yang, H. Zhou and X. Jian, "Optimization of Relay-Based Cooperative Spectrum Sensing in Cognitive Radio Networks,"
2011 7th International Conference on Wireless Communications, Networking and Mobile Computing, Wuhan, 2011, pp. 1-4.
7. D. Seo and H. Nam, "A Parallel Multi-Channel Cooperative Spectrum Sensing in Cognitive Radio Networks," 2018 International
Symposium on Antennas and Propagation (ISAP), Busan, Korea (South), 2018, pp. 1-2.
8. Smriti and C. Charan, "Double Threshold Based Cooperative Spectrum Sensing with Consideration of History of Sensing Nodes in
Cognitive Radio Networks," 2018 2nd International Conference on Power, Energy and Environment: Towards Smart Technology
(ICEPE), Shillong, India, 2018, pp. 1-9.
9. Y. Fu, Z. He and F. Yang, "A simple quantization-based multibit cooperative spectrum sensing for cognitive radio networks," 2017
14th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), Chengdu,
2017, pp. 220-223.
10. X. Wu, L. Wang, S. Zhang and G. Zhang, "Phase-compensation-based cooperative spectrum sensing algorithm for cognitive cloud
networks," 2018 International Conference on Information Networking (ICOIN), Chiang Mai, 2018, pp. 755-759.
11. L. Wang, S. Zhang and L. Gu, "Reliability-based cooperative spectrum sensing algorithm in cognitive radio networks," 2016 24th
International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, 2016, pp. 1-5.

Authors: Sachin Gupta, Arvind Gupta, Munish Gupta


Performance Improvement of a Fin-Tube Heat Exchanger Using Rectangular Winglet as Vortex
Paper Title:
Generator
Abstract: Heat transfer performance of fin-tube heat exchanger can be augmented by using longitudinal vortex
generators. Numerical simulations have been performed in the present work for investigating the effect of
punching a rectangular winglet having hole from fin surface, on the heat transfer and flow resistance
characteristics in a fin-tube heat exchanger. The concept of punching out a rectangular winglet having hole from
the fin-plate surface is being proposed here and studied in two configurations namely, common flow down and
common flow up. Comparisons on the basis of heat transfer and flow resistance characteristics have been drawn
for all the configurations under consideration using Colburn’s factor (j), friction factor (f) and performance
evaluation criterion (PEC) also known as area goodness factor (j/f). Investigations have been performed
considering Reynolds number in the range of 1500 to 9000 and angle of attack as 45°. The result clearly
indicates that punched out rectangular winglet with hole having common flow down configuration at upstream
location as exhibiting the best thermal performance, followed by common flow up at upstream location and,
common flow down at downstream location.

Keywords: Rectangular Winglet, Vortex generator, Numerical Investigation, Fin-tube heat exchanger.
669.
References: 3873-
38
1. A. M. Jacobi and R. K. Shah, “Heat transfer surface enhancement through the use of longitudinal vortices: A review of recent 79
progress,” Exp. Therm. Fluid Sci., vol. 11, no. 3, pp. 295–309, 1995.
2. G. Biswas, N. K. Mitra, and M. Fiebig, “Heat transfer enhancement in fin-tube heat exchangers by winglet type vortex generators,” Int.
J. Heat Mass Transf., vol. 37, no. 2, pp. 283–291, 1994.
3. A. Valencia, M. Fiebig, and N. K. Mitra, “Heat Transfer Enhancement by Longitudinal Vortices in a Fin-Tube Heat Exchanger
Element With Flat Tubes,” J. Heat Transfer, vol. 118, no. 1, p. 209, 1996.
4. M. Fiebig, “Vortices, generators and heat transfer,” Chem. Eng. Res. Des., vol. 76, no. 2, pp. 108–123, 1998.
5. S. Tiggelbeck, N. K. Mitra, and M. Fiebig, “Comparison of Wing-Type Vortex Generators for Heat Transfer Enhancement in Channel
Flows,” J. Heat Transfer, vol. 116, no. 4, p. 880, 2008.
6. B. Lotfi, B. Sundén, and Q. Wang, “An investigation of the thermo-hydraulic performance of the smooth wavy fin-and-elliptical tube
heat exchangers utilizing new type vortex generators,” Appl. Energy, vol. 162, pp. 1282–1302, 2016.
7. W. R. PAULEY and J. K. EATON, “Experimental study of the development of longitudinal vortex pairs embedded in a turbulent
boundary layer,” AIAA J., vol. 26, no. 7, pp. 816–823, 2008.
8. L. T. Tian, Y. L. He, Y. G. Lei, and W. Q. Tao, “Numerical study of fluid flow and heat transfer in a flat-plate channel with
longitudinal vortex generators by applying field synergy principle analysis,” Int. Commun. Heat Mass Transf., vol. 36, no. 2, pp. 111–
120, 2009.
9. S. M. Pesteei, P. M. V. Subbarao, and R. S. Agarwal, “Experimental study of the effect of winglet location on heat transfer
enhancement and pressure drop in fin-tube heat exchangers,” Appl. Therm. Eng., vol. 25, no. 11–12, pp. 1684–1696, 2005.
10. G. Zhou and Z. Feng, “International Journal of Thermal Sciences Experimental investigations of heat transfer enhancement by plane
and curved winglet type vortex generators with punched holes,” Int. J. Therm. Sci., vol. 78, pp. 26–35, 2014.
Abdulkhalyk Sadykhozhaevich Nabiev, Lyazzat Tuleuvna Nurkusheva, Kymbat Kasymovna
Authors:
Suleimenova, Gaukhar Kasenovna Sadvokasova, Zhanerke Askhatovna Imanbaeva
Paper Title: Virtual Reconstruction of Historical Architectural Monuments: Methods and Technologies
Abstract: The paper examines and shows the relevance of the reconstruction of architectural monuments at the
present stage. Moreover, methodological techniques of historical heritage reconstruction, including using
670. computer technology, are thoroughly analyzed. Scientific publications and data on the topic of virtual
reconstruction of architectural monuments are closely studied. The role of literary and documentary descriptions 3880-
38
of historical monuments is defined as the main method used in virtual reconstruction. As a result of an in-depth
87
analysis of the issue, it is predicted that the virtual method of reconstruction will become the leading scientific
and research system for the restoration of historical and cultural heritage. It enhances the level of scientific
research by involving more researchers in the study of architectural monuments of the past. Conceptual methods
and the possibility of their introduction into programs of educational institutions of the architectural profile are
considered. Technical accessibility and availability of the results of academic research will provide one with an
opportunity to become familiar with the architectural monuments of other countries. Moreover, virtual
reconstruction creates the basis for the formation of virtual museum spaces, which contributes to the
enhancement of the intellectual and educational process on the global level.

Keywords: reconstruction, restoration, conservation, virtual reconstruction, architectural monuments,


imaginary architectural spaces, spatial models, easel architecture, paper architecture.

References:

1. Melechovahttp://www.ejst.tuiasi.ro/Files/71/Contents%2014_4_2018.pdf
2. A.V. Popov. The Impact of Architectural and Space-Planning Design of Student Accommodation (Dormitories, Campuses) on the
Time Budget of The Student Youth. International Journal of Engineering and Advanced Technology, vol. 8(3), 2019, pp. 128-133.
3. K.M. Baypakov. Medieval cities of Kazakhstan. Almaty, 1998.
4. A.V. Makhiyanova, O.L. Panchenko, E.S. Akhmetova, D.K. Shigapova, D.F. Sadretdinov. City Population as a Subject of Urban
Ecosystem’s Development. JARDCS, vol. 11 (05), 2019, pp. 1916-1923.
5. I.V. Grevtsova. Projects of complex reconstruction and musealization of historic quarters in European cities: Main directions and new
trends. University of Barcelona, Barcelona, Spain, 2012.
6. Archaeological research of the Alkei Margulan Institute of Archeology on the site of Kayalyk in 2004. Almaty, 2005.
7. K.M. Baypakov, K.A. Akishev, L.B Erzakovich. Otrar in the XIII-XV centuries. Alma-Ata, 1987.
8. K.M. Baypakov. Ancient and medieval Otrar in Collection: City of Turkestan. Almaty, 1999.
9. K.A. Akishev, L.B. Erzakovich. Security work on Otrar near the mosque. Report. Institute of History, Archeology and Ethnography of
the Academy of Sciences of Kazakh SSR, Almaty, 1990.
10. P.L. Vail. Genii mesta [The genius of place]. Moscow: KoLibri Publ, 2006.
11. Virtual reconstruction of the historical and cultural heritage in the formats of scientific research and educational process: Collection of
scientific articles. Ed. L.I. Borodkina, M.V. Rumyantseva, R.A. Barysheva. Krasnoyarsk: Siberian Federal University, 2012.
12. I. Calvino. Invisible Cities. San Diego: Harcourt, 1974.
13. Imaginary Architectural Spaces. – Аlmaty: Kоmpleks, 2000. – P. 15. – 300 pp.
14. D.A. Amandykova, B.K. Shilderkhanov, N.Z. Issakhov, Y.G. Popov, V.P. Trofimov. Compositional features of ethnic interior design.
Astra Salvensis, vol. 6, 2018, pp. 569-580.
15. D.A. Amandykova, D.B. Kabylov, M. Moldabekov, K. Koshenov, T.A. Gvozdikova, A.A. Bryantsev. Compositional aspects of the
urban environment organization. Man in India, vol. 97, 2017, pp. 281-297.
16. D.A. Amandykova, Z.A. Imanbayeva, A.M. Assylbekova, L.T. Nurkusheva, I.I. Ostapenko. On the history of the studying museum
complexes. Astra Salvensis, vol. 6, 2018, pp. 311-320.
17. E.V. Asse. Lessons of “Architectural”: Exhortations on Architectural Design. Tatlin mono: Topic: ARHKLASS. Workshop
Experimental Educational Design of the MARHI, vol. 5 (23), 2010.
Authors: Surabhi Ghatole, Harshali Zodpe

Paper Title: FPGA Based Engine Control Module for Fuel Injection System
Abstract: Fuel injection system is an indispensible part of the present day automobiles. The depletion of the
fuels along with continuous surge in the fuel prices has made it imperative to use fuel economically and
restricting the wastage to a minimum. Contrary to the carburetor, using predefined amount of fuel irrespective of
the environment, Fuel Injection System uses just the required amount of fuel based on the operating conditions
as sensed by the Engine Control Module (ECM). Numerous parameters are required to be sensed by the ECM to
achieve optimum efficiency of the engine. To handle the processing of such large number of parameters, a
robust architecture is required. This paper presents the design and implementation of ECM utilized in Electronic
Fuel Injection (EFI) system on a Field Programmable Gate Array. The ECM architecture discussed in the
proposed system is computationally efficient enough to fulfill ever-increasing functionalities of the ECM. The
main objective of this research is to sense the parameters required for the ECM analysis and to interpret and
analyze this data and accordingly control the solenoid (actuator). The CAN controller is also deployed in an
FPGA to facilitate the communication between ECM and Human Machine Interface (HMI) to indicate the
parameters sensed by the sensor on the LCD. The target device (FPGA) for this work is Xilinx Spartan 3E and
the design tool is Xilinx ISE 14.7 with the ECM and CAN controller being modeled in Verilog Hardware
671. Description Language (HDL).
3888-
Keywords: Engine Control Module (ECM), Electronic Fuel Injector (EFI), FPGA, Sensors, Solenoid, CAN 38
Controller. 92

References:

1. Jonas Bereisa. Applications of Microcomputers in Automotive Electronics.Transactions on Industrial Electronics, IE-30(2):87{96,


May 1983.
2. Shreejith Shanker, Enhancing Automotive Embedded
3. Systems with FPGAs, Nanyang Technological University, April 2016.
4. Ilakkiya B, Vanitha V, “A Survey on Engine Control Unit”, IJARIIE, 2016.
5. Suresh Chandra Sathapathy,Vikrant Bhateja, Amit Joshi, “ Proceedings of the international Conference on data Engineering and
Communication Technology”, ICDET,2016.
6. Texas Instrument “LM35 Precision Centigrade Temperature Sensors”, LM35-Datasheet, August 1999 [Revised December 2017]
7. Interlink Electronics, “FSR 400 Series Round Force Sensing Resistor” Force sensing resistor Datasheet.
8. Microchip Technology, “2.7V 4-Channel/8-Channel 12-Bit A/D Converters with SPI Serial Interface”, MCP3204-Datasheet.
9. Logsun Systems, “FPGA SPARTEN 3E WITH UNIVERSAL BOARD”.
10. RatanR. Tatikonda, Vinayak B. Kulkarni, “FPGA based Exhaust Gas Analysis for Automotive Vehicles” IEEE International
Conference on Internet of Things and Applications (IOTA), 22-24 Jan 2016, India.
11. Vaibhav Bhutada1, Shubhangi Joshi2, Tanuja Zende3, “Design and Implementation of CAN Bus Controller on FPGA”, International
Journal for Research in Applied Science & Engineering Technology (IJRASET), December 2017.
12. Dong Hui, Huang Bo, Wang Dafang, Zhao Guifan, ‟The ECU control of Diesel Engine based on CAN”, International Conference on
Intelligent Computation Technology and Automation (ICICTA), pp734-736,2011.

Authors: Jeberson Retna Raj, T.Sasipraba

Paper Title: An Integrated Model of IoT and Cloud for Detecting Green House Gas Emissions
Abstract: Chennai is one of the oldest metropolitan city in India which consists of 15 zones and more than 200
wards. Chennai has the population of more than 8 million people and more than 20 tons of garbage collected and
dumped into the two of the dumpyards Kodunkaiyur and Perungudy. These two dumpyards are catering the
needs of the garbage and landfills collected from these zones, in which they are used to burn and disposed. The
burning of waste is resulted into emission of higher amount of CO2. The decayed waste is one of the source for
generating Methane and other greenhouse gases. This is dangerous for human lives and affects the environment.
There is no such system has available to detect the CO2 and CH4 level automatically at these dumpyards. If a
system automatically detects the level of CO2 and CH4 and make it available in a public domain, it will be
helpful to the city administration to take the precautionary steps. Therefore, the need of the hour is to design a
cloud enabled IoT based system to monitor the level of CO2 and CH4 and upload these data in the cloud for
further processing. The sensor is installed in 20 of different places of these two dumpyard for monitoring the
level of CO2 and CH4. The data is collected and uploaded in the cloud. The open source cloud platform
672. Openstack is used to store all the recorded data into the cloud. The webpage www.chennaighgemissions.in is
3893-
designed and the sensed data is available for public use. The system is successfully implemented and tested, and
38
the test result is promising.
96
Keywords: Green House Gas, IoT, Openstack Cloud.

References:

1. Li, Y., Ding, Y., Li, D., & Miao, Z. (2018). Automatic carbon dioxide enrichment strategies in the greenhouse: A review. Biosystems
Engineering, 171, 101–119.
2. Hung, C. C. W., Hsu, S.-C., & Cheng, K.-L. (2019). Quantifying city-scale carbon emissions of the construction sector based on multi-
regional input-output analysis. Resources, Conservation and Recycling, 149, 75–85.
3. Surya, S. (2016). Landscape Ecological Urbanism for Restoration of Pallikaranai Marsh Land, Chennai, Tamil Nadu. Procedia
Technology, 24, 1819–1826.
4. Hamid R.Amini.,Debra R.Reinhart ., AnttiNiskanen.: Comparison of first-order-decay modeled and actual field measured municipal
solid waste landfill methane data. Waste Management, Vol.9.(2013)
5. Thomas Plocoste , Sandra Jacoby-Koaly, Rose-Helen Petit and André Roussas.: Estimation of Methane Emission from a Waste Dome
in a Tropical Insular Area. Int J Waste Resour, Vol.6:2 (2016).

Authors: Yufiarti, Wuryani, Fitri L Issom, Gumgum Gumelar

Paper Title: Development of Thematic Multi Media-Based Learning Model to Increase Clean Life Skills
Abstract: This study aims to develop multi-media based products on thematic learning sub themes "cleanliness
at home". This research was applied in class II of elementary school. Multimedia products produced are short
animations with the theme of hand washing. This research method uses Research and Development (R & D)
with the Borg and Goal model. Three stages of development research are: first, preliminary research into the two
development models and third the model dissemination. The results of the preliminary study concluded that
multi-media based applications are needed for thematic learning in elementary schools. The development of
multi-media animation by giving a message of six steps of hand washing was developed through the stages of
product development. The first stage of expert judgment is carried out by media, material and language experts.
The second stage is one to one and small group. This study produced a valid multi-media assisted thematic
learning model applied to elementary school students.

Keywords: Thematic learning, Multi-media animation, Hand washing skills.

673. References: 3897-


38
1. Yazar, Tarik, and Gokce Arifoglu. "A research of audio visual educational aids on the creativity levels of 4-14 year old children as a
process in primary education." Procedia-Social and Behavioral Sciences 51 (2012): 301-306. 99
2. Ulfsdotter, Malin, Pia Enebrink, and Lene Lindberg. "Effectiveness of a universal health-promoting parenting program: a randomized
waitlist-controlled trial of All Children in Focus." BMC public health 14.1 (2014): 1083.
3. Gall, Meredith D., Joyce P. Gall, Walter R. Borg, and Meredith (Mark) D. Gall. Applying educational research: How to read, do, and
use research to solve problems of practice. Pearson, 2014.
4. Abdel-Khalek, Ahmed M. "Happiness, health, and religiosity: Significant relations." Mental Health, Religion & Culture 9.1 (2006): 85-
97.
5. Nuh, Muhammad. "Kurikulum 2013." Sumber: http://www. kemdiknas. go. id (2013).
6. Zhu, Xihe, Justin A. Haegele, and Haichun Sun. "Health-related fitness knowledge growth in middle school years: Individual-and
school-level correlates." Journal of Sport and Health Science (2019).
7. Mayer, Susanne, Aggie TG Paulus, Agata Łaszewska, Judit Simon, Ruben MWA Drost, Dirk Ruwaard, and Silvia MAA Evers.
"Health-related resource-use measurement instruments for intersectoral costs and benefits in the education and criminal justice sectors."
Pharmacoeconomics 35, no. 9 (2017): 895-908.
8. Ministry of Health Indonesia. Peraturan Menteri Kesehatan No. 2269/Menkes/Per/XI/2011 tentang Pedoman Pembinaan Perilaku
Hidup Bersih dan Sehat. Jakarta: Pusat Promosi Kesehatan Kementerian Kesehatan RI; 2011.
9. Wade, Terrance J., Mona E. Mansour, Kristin Line, Tracy Huentelman, and Kathryn N. Keller. "Improvements in health-related quality
of life among school-based health center users in elementary and middle school." Ambulatory Pediatrics 8, no. 4 (2008): 241-249.
10. Susanto, Tantut, Lantin Sulistyorini, Emi Wuri Wuryaningsih, and Syahroni Bahtiar. "School health promotion: a cross-sectional study
on clean and healthy living program behavior (CHLB) among Islamic Boarding Schools in Indonesia." International Journal of Nursing
Sciences 3, no. 3 (2016): 291-28.
11. Guo, Jia, Jane K. Dixon, Robin hittemore, and Guo‐Ping He. "Psychometric testing of the Health Quotient questionnaire: a measure of
self‐reported holistic health." Journal of advanced nursing 66, no. 3 (2010): 653-663.

Authors: V. Sai Sri Krishna, Yogesh Misra, G. Anantha Rao


FPGA Implementation of Variable Feed Rate Algorithm for a Three Input Fuzzy Controller to
Paper Title:
Maintain the Cane Level
Abstract: Fuzzy logic which is one of methodology of soft computing has provided to be brilliant choice for
the many control system application. Fuzzy logic is practical to numerous fields. One of the uses of fuzzy logic
is in sugar mill. It is very important to produce sugar at low cost. Irregular supply of sugar cane decreases the
efficiency of cane juice extraction during manufacturing of sugar. To increase the efficiency of cane juice
extraction it is necessary to sustain the cane height at desired level inside Donnelly chute. A methodology to
develop a variable feed rate algorithm for three inputs fuzzy controller sustains the cane height at desired level
and was developed with fuzzy logic tool box of MATLAB software. The developed fuzzy controller can be
implemented by using HDL language and Xilinx Vivado 2016.2.

Keywords: fuzzy logic, fuzzy controller, HDL language.

674. References:
3900-
1. D.P Kulkarni, Cane Sugar Manufacture, The Sugar technologists association of India, New Delhi, 2002-03. 39
2. A jha, “India’s sugar policy and world sugar economy” in proc. FAO International sugar conference, Fiji, August 2012. 15
3. Indian Sugar Mills Association (ISMA), 2010, “Important Events” (online) at: http://www.indiansugar.com/EventDetails.
4. S. Ahmed, Indian Sugar Industry, Centre for management studies, Jamia Millia Islamia, New Delhi, India, Unpublished.
5. Kent, Geoffrey A, “Increasing the capacity of Australian raw sugar factory milling units”, PhD. Dissertation, school of Engineering,
Mechanical Engineering Department, James Cook University, Brisbane, 2003.
6. Seturaman, P, “Design of an experimental apparatus to analyze bagasse behaviour in a chute”, M.E Dissertation, Queensland
University of Technology, Brisbane, 2012.
7. Murry, C.R, Holt, J. E and Munro, B.M “An investigation of factory feed chutes” proc. Qd. Soc. Sug. Cane Tech. 29th conf., pp. 143,
1962.
8. Yogesh Misra, H R Kamath, “Implementation and Performance Analysis of a Three Inputs Conventional Controller to Maintain the
Cane Level During Cane Crushing in FPGA using VHDL” International Journal of Engineering Research & Technology (IJERT)
Vol.3, Issue9, September 2014.
9. Yogesh Misra, H R Kamath, “Analysis and Design of a Three Inputs Fuzzy System for Maintaining the Cane Level during Sugar
Manufacturing” journal of Automation and Control, 2014, Vol.2, No.3, pp.62-78.
10. Yogesh Misra, H R Kamath, “Development of Variable Feed Rate Algorithm for Three Inputs Fuzzy System to Maintain the Cane
Level during Sugar Juice Extraction” Cooperative Sugar Journal, Vol.48, No.7, March 2015.

Authors: Maligi Anantha Sunil, Sagar Simha K T

Paper Title: WSN Based Flood Estimations and Early Cautioning System using IoT
Abstract: Wireless Sensor Networks (WSN ) provides virtual layer where knowledge regarding actual world
can be retrieved by any computational arrangement as these operate as digital skin. These are irreplaceable
possessions used for comprehending ideas of IoT as they are used to gather information about physical
phenomenon. IoT offers virtual interpretation through Internet Protocol towards a huge variation of real-life
objects from buses to saucer, from building to trees in woods. Its appeal is the universal widespread access to the
status and location of anything we may be interested in. The Internet of Things (IoT) is the network of physical
objects, devices, vehicles, buildings and other items which are embedded with electronics, software, sensors, and
network connectivity, which enables these objects to collect and exchange data. WSNs are combined into the
“IoT”, where sensor nodes join the Internet vigorously and use it to collaborate and carry out their tasks.
Wireless sensor networks (WSN) are well suited for long-term environmental data acquisition for IoT
representation. Weather conditions monitoring is made by gathering quantifiable information regarding
prevailing condition of atmospheric procedure to venture how will it progress in that location.

675. Keywords: WSN, ThingSpeak, KNN, GSM.


3916-
References: 39
19
1. Ivan Stoianov, Lama Nachman, Sam Madden. PIPENET: A Wireless Sensor Network for Pipeline Monitoring. IPSN’07, April 25-27,
2007.
2. Lívia C. Degrossi, Guilherme G. do Amaral, Eduardo S. M. de Vasconcelos, João P. de Albuquerque, Jó Ueyama.Using Wireless
Sensor Networks in the Sensor Web for Flood Monitoring in Brazil. Proceedings of the 10th International ISCRAM Conference. May
2013.
3. Yu, Liyang, Neng Wang, and Xiaoqiao Meng. "Realtime forest fire detection with wireless sensor networks." Wireless
Communications, Networking and Mobile Computing, 2005. Proceedings. 2005 International Conference on. Vol. 2. IEEE, 2005. A.K.
Mohanty. Fluid Mechanics. Prentice-Hall of India Private Limited, Second edition 2004.
4. K.C. Patra. Hydrology & Water resources engineering. 2 editions. Alpha Science Intl Ltd August 12, 2008.
5. Flood Prediction and Disaster Risk Analysis using GIS based Wireless Sensor Networks, A Review.
6. Design of Early Warning Flood Detection Systems for Developing Countries Elizabeth Basha, Member, IEEE, and Daniela Rus,
Member, IEEE
7. Ministry of land, infrastructure, transport and tourism (MLIT), http://www.river.go.jp/, 2013.
8. Tomioka, H. "Maintaining Communications Capabilities during Major Natural Disasters and other Emergency Situations” Ministry of
internal affairs and communications, Japan, 2011.
9. She, H. “Network-Calculus-based Performance Analysis for Wireless Sensor Networks”. Ph.D. Diss. of KTH Royal Institute of
Technology, 2009.
10. Grid Stix: Supporting Flood Prediction using Embedded Hardware and Next Generation Grid Middleware.

Authors: C.S.Sasikumar, A.Kumaravel

Paper Title: E-Learning Attributes Selection Through Rough Set Theory and Data Mining
Abstract: Recent research makes wide efforts on attribute selection methods for making effective data
preprocessing. The field of attribute selection spreads out both vertical and horizontal, due to increasing
demands for dimensionality reduction. The search space is reduced very much by pruning the insignificant
attributes. The degree of satisfaction on the selected list of attributes will only be increased through verification
of more than one formal channel. In this paper, we look for two completely independent areas like Rough Set
theory and Data Mining/Machine Learning Concepts, since both of them have distinct ways of determining the
selection of attributes. The primary objective of this work is not only to establish the differences of these two
distinct approaches, but also to apply and appreciate the results in e-learning domain to study the student
engagement through their activities and the success rate. Hence our framework is based students’ log file on the
portal page for e-learning courses and results are compared with two different tools WEKA and ROSE for the
purpose of elimination of irrelevant attributes and tabulation of final accuracies.

Keywords: E-Learning, Data mining, Rough Set Theory, Classifications, Selection of Attributes, Search
methods, WEKA, ROSE.

References:

1. “Computational Methods of Feature Selection” edited by Huan Liu, Hiroshi Motoda.


2. N. Holmes, “Engaging with assessment: increasing student engagement through continuous assessment,” Active Learning in Higher
Education, vol. 19, no. 1, pp. 23–34, 2018.
3. F. Blin and M. Munro, “Why hasn’t technology disrupted academics’ teaching practices? Understanding resistance tochange through
the lens of activity theory,” Computers &Education, vol. 50, no. 2, pp. 475–490, 2008.
4. J. Kuzilek, M. Hlosta, D. Herrmannova, Z. Zdrahal, andA. Wolff, “OU analyse: analysing at-risk students at the OpenUniversity,” in
Proceedings of First International Workshop onVisual Aspects of Learning Analytics and Knowledge Conference(LAK 2015), pp. 1–
16, Poughkeepsie, NY, USA, March2015.
5. Dataset: (https://analyse.kmi.open.ac.uk/open_dataset)
676. 6. J. Kuzilek, M. Hlosta, and Z. Zdrahal, “Open university learning analytics dataset,” Scientific Data, vol. 4, article170171, 2017. 3920-
7. Pawlak, Z., Rough sets, J. Comput. Information Sciences, vol.11, pp.341-345, 1982.
8. Z. Pawlak, Rough Sets – Theoretical Aspects of Reasoning about Data. Boston, London, Dordrecht: Kluwer, 1991.
39
9. ROSE Software <http://idss.cs.put.poznan.pl/site/rose.html> 24
10. Available from: http://weka.sourceforge.net/doc.dev/weka/attributeSelection.
11. Available from: https://www.cs.waikato.ac.nz/ml/weka/
12. Grzymala-Busse, J.W. &Stefanowski, J., (2001), Three Discretization Methods for Rule Induction. International Journal of Intelligent
Systems, 16, 29-38.
13. Y. Bengio and Y. Grandvalet, "No Unbiased Estimator of the Variance of K-Fold Cross-Validation," Journal of Machine Learning
Research, vol. 5, pp.1089–1105, 2004.
14. C.S.Sasikumar, A.Kumaravel, Design of Cost Sensitive Classifiers for E-Learning Datasets tuning with cost ratio, International Journal
of Engineering & Technology, 7 (4.39) (2018) 980-984.
15. C.S.Sasikumar, A.Kumaravel, Yet another Approach for Construction of Cost Sensitive Classifiers for E-Learning Datasets,
International Journal of Engineering & Technology, 7 (4.39) (2018)1047-1052.
16. C.S.Sasikumar, A.Kumaravel, Attribute Selection on Student Academic and Social Attributes Based on Randomized And Synthetic
Dataset, International Journal of Engineering & Technology, 7 (4.39) (2018), 1069-107.
17. H. M. Harb and M. A. Moustafa, "Selecting optimal subset of features for student performance model," Int J Comput Sci, p. 5, 2012.
18. M. Doshi, "Correlation Based Feature Selection (Cfs) Technique To Predict Student Perfromance," International Journal of Computer
Networks & Communications, vol. 6, p. 197, 2014.
19. W. Punlumjeak and N. Rachburee, "A comparative study of feature selection techniques for classify student performance," in
Information Technology and Electrical Engineering (ICITEE), 2015 7th International Conference on, 2015, pp. 425-429.
20. D. Koller and M. Sahami, "Toward optimal feature selection," Stanford InfoLab1996.
21. P. Mitra, C. Murthy, and S. K. Pal, "Unsupervised feature selection using feature similarity," IEEE transactions on pattern analysis and
machine intelligence, vol. 24, pp. 301-312, 2002.
22. E. Osmanbegović, M. Suljić, and H. Agić, "DETERMINING DOMINANT FACTOR FOR STUDENTS PERFORMANCE
PREDICTION BY USING DATA MINING CLASSIFICATION ALGORITHMS," Tranzicija, vol. 16, pp. 147-158, 2015.
23. A. M. Shahiri and W. Husain, "A review on predicting student's performance using data mining techniques," Procedia Computer
Science, vol. 72, pp. 414-422, 2015.
24. C. Romero and S. Ventura, "Educational data mining: a review of the state of the art," IEEE Transactions on Systems, Man, and
Cybernetics, Part C (Applications and Reviews), vol. 40, pp. 601-618, 2010.
25. M. Ramaswami and R. Bhaskaran, "A study on feature selection techniques in educational data mining," arXiv preprint
arXiv:0912.3924, 2009.
26. A. Mueen, B. Zafar, and U. Manzoor, "Modeling and Predicting Students' Academic Performance Using Data Mining Techniques,"
International Journal of Modern Education and Computer Science, vol. 8, p. 36, 2016.

Authors: Himanshu Agarwal


Mathematical Formula of Performance of Watermarking System with Repetition of Bits of
Paper Title:
Watermark
Abstract: The performance of a watermarking system depends on all of its factors, such as watermark
embedding strength, size of watermark and repetition of watermark bits. In this paper, a mathematical formula is
677. designed, that governs the relation of performance of watermarking system with amount of the repetition of
3925-
watermark bits. Performance of the watermarking system is measured by using the extracted watermark bit
39
accuracy rate. The designed formula is verified experimentally. A spatial domain watermarking scheme is used
29
for experimental verification. Further, verification is done for different kind of attacks such as cropping,
Gaussian filter, Gaussian noise and salt & pepper noise. Accuracy rate by using the mathematical formula and
experimental observations are very near. This supports that the designed mathematical formula is reliable.
Keywords: Watermarking, Extracted bit accuracy rate (EBAR), Watermark bit redundancy (WBR), Extracted
watermark bit accuracy rate (EWBAR), (PEWBAR: predicted EWBAR), OEWBAR (observed EWBAR).

References:

1. I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, “Digital Watermarking and Steganography”, 2nd ed. San Francisco, CA, USA:
Morgan Kaufmann Publishers Inc., 2007.
2. C.-T. Hsu and J.-L. Wu, “Multiresolution watermarking for digital images,” IEEE Transactions on Circuits and Systems-II Analog and
Digital Signal Processing, vol. 45, no. 8, pp. 1097–1101, August 1998.
3. M.-C. Hua, D.-C. Loub, and M.-C. Changb, “Dual-wrapped digital watermarking scheme for image copyright protection,” Elsevier
Computers & Security, vol. 26, no. 4, pp. 319–330, June 2007.
4. D. Kundur and D. Hatzinakos, “Digiatl watermarking for telltale tamper proofing and authentication,” Proceddings of IEEE, vol. 87,
no. 7, pp. 1167–1179, July 1999.
5. D. Kundur and D. Hatzinakos, “Toward robust logo watermarking using multiresolution image fusion principles,” IEEE Transactions
on Multimedia, vol. 6, no. 1, pp. 185–198, February 2004.
6. H. Lu, R. Shen, and F. L. Chung, “Fragile watermarking scheme for image authentication,” Electronics Letters, vol. 39, no. 13, pp.
898–900, June 2003.
7. W. Lua, H. Lua, and F.-L. Chungb, “Robust digital image watermarking based on subsampling,” Elsevier Applied Mathematics and
Computation, vol. 181, no. 2, pp. 886–893, October 2006.
8. S. Rawat and B. Raman, “A publicly verifiable lossless watermarking scheme for copyright protection and ownership assertion,”
Elsevier AEU - International Journal of Electronics and Communications, vol. 66, no. 11, pp. 955–962, November 2012.
9. P. W. Wong and N. Memon, “Secret and public key image watermarking schemes for image authentication and ownership
verification,” IEEE Transactions on Image Processing, vol. 10, no. 10, pp. 1593–1601, October 2001.
10. X. Wua and Z.-H. Guana, “A novel digital watermark algorithm based on chaotic maps,” Elsevier Physics Letters A, vol. 365, no. 5-6,
pp. 403–406, June 2007.
11. H. Agarwal, B. Raman, P. K. and M. Kankanhalli, “Analysis of comparators for binary watermarks, Proceedings of International
Conference on Computer Vision and Image Processing Springer, pp. 399-410, 2017.
12. www.imageprocessingplace.com/root files v3/image databases.htm, last accessed on 28 th July 2019.
Authors: P. Punitha Ilayarani, M. Maria Dominic

Paper Title: Smart Firefighting System for Smart Cities Adopting Fog/Edge Computing
Abstract: Security ought to be the highest concern for everyone’s sovereignty from prospective destruction
caused by unusual incidents or intruders. Constant monitoring mostly refers to protection against hostile forces.
Home security confirms smart decision making at the peak time, activated alarms and detectors are to be avail
24/7. Highest inspiration of this proposed system is to notify the emergency incidents to the appropriate
authorities like fire station, police station and the residence owner if the owner is not in house. To prove the
domino effect support Vector Machines (SVM) algorithms are implemented and tested. In this paper we explore
close watch and stay connected devices and also peace of mind through controlling and monitoring our homes
by adopting Fog/Edge computing technologies.

Keywords: Fog Computing, Edge Computing, Detectors, Alarms and Control Panels, Support Vector Machines
(SVM) Algorithms.

References:

1. Albert W. Jones Anthony P. Hamins, Nelson P. Bryner and Galen H. Koepke. [n. d.]. Research Roadmap for Smart Fire Fighting. ([n.
d.]). Retrieved July 1st, 2017 from https://www.nist.gov/publications/research-roadmap-smart-fire-fighting? pub_id=918636.
2. https://www.plantemoran.com/explore-our-thinking/insight/2018/04/thinking-about-becoming-a-smart-city-10-benefits-of-smart-cities
3. https://www.nfpa.org/-/media/Files/News-and-Research/Resources/Research-Foundation/Current-projects/Smart-
FF/SmartFirefightingReport.pdf
678. 4. M. J. Karter, Fire loss in the United State during 2013, National Fire Protection Association(Quincy, MA, 2014).
5. Platt, Fast Training of support vector machines using sequential minimal optimization, in Proc. of Advances in Kernel Methods
3930-
Support Vector Learning (MIT Press, 1998). 39
6. Bredensteiner and K. P. Bennett, Multicategory classi¯cation by support vector machines, Comput. Optim. Appl. 12 (1999) 53–79. 36
7. Crammer and Y. Singer, On the algorithmic implementation of multiclass kernel-based vector machines, J. Mach. Learn. Res. 2 (2002)
265–292.
8. Bernstein, E. Ludvigson, K. Sankar, S. Diamond, M. Morrow, Blueprint for the intercloud - protocols and formats for cloud computing
interoperability, in: Proceedings of the 4th International Conference on Internet and Web Applications and Services, 2009, pp. 328–
336.
9. Fog Computing Challenges: A Systematic Review Avirup Dasgupta School of Software University of Technology Sydney Sydney,
AustraliaEmail:avirup.dasgupta@student.uts.edu.au Asif Qumer Gill School of Software University of Technology Sydney Sydney,
Australia Email: asif.gill@uts.edu.au.
10. IEEE INTERNET OF THINGS JOURNAL, VOL. 3, NO. 5, OCTOBER 2016 637 Edge Computing: Vision and Challenges
Weisong Shi,IEEE, Quan Zhang, Student Member, IEEE, Youhuizi Li, and Lanyu Xu.
11. Murphy, R. R. 2013. A roadmap for the adoption of unmanned systems into public safety. 2013 IEEE International Conference on
Technologies for Homeland Security (HST), 350–353.
12. IOT based control of Appliances by Ravi Kishore Kodali, SreeRamya Soratkal and Lakshmi Boppana.International Conference on
Computing, Communication and Automation (ICCCA2016)
13. R. K. Kodali, S. Soratkal and L. Boppana, ”IOT based control of appliances,” 2016 International Conference on Computing,
Communication and Automation (ICCCA), Noida, 2016, pp. 1293-1297. doi: 10.1109/CCAA.2016.7813918
14. N. Landwehr, M. Hall and E. Frank, Logistic model trees, Mach. Learn. 59 (2005) 161–205.
15. T. Tou and R. C. Gonzalez, Pattern Recognition Principles (Addison-Wesley, London,
16. P. Bennett and O. L. Mangasarian. Multicategory di scrimi nation vialinear program ming. Optimization Methods and Software, 3:27–
39, 1994.
17. Cortes and V. N. Vapnik. Support vector networks. Machine Learning, 20:273–297, 1995.
18. Vapnik, V.N.: An Overview of Statistical Learning Theory, IEEE Trans. Neural Network, 10(5) (1999) 988–999
19. Wang, Xiangying; Zhong, Yixin; Statistical learning theory and state of the art in SVM. Cognitive Informatics, 2003. Proceedings. The
Second IEEE International Conference on 18-20 Aug. 2003 Page(s):55 – 59.
20. Statistical Learning Theory and Support Vector Machines Dewi Nasien Soft Computing Research Group Universiti Teknologi
Malaysia Johor Bahru, Malaysia dwien82@gmail.com Siti S. Yuhaniz Soft Computing Research Group Universiti Teknologi Malaysia
Johor Bahru, Malaysia sophia@utm.my Habibollah Haron Soft Computing Research Group Universiti Teknologi Malaysia Johor
Bahru, Malaysia sophia@utm.
21. https://www.youtube.com/watch?v=Xm8frqTZRVI[IoT]
22. https://www.youtube.com/watch?v=IZj8hLrkABs
23. https://www.youtube.com/watch?v=Xm8frq TZRAVI&feature=youtu.be
24. Smart Fire Detection System with Early Notifications Using Machine Learning Mohammad Sultan Mahmud*, Md. Shohidul Islam†
and Md. Ashiqur Rahman‡ Department of Computer Science and Engineering World University of Bangladesh Dhaka 1205,
Bangladesh.
25. Stojmenovic and S. Wen, “The Fog Computing Paradigm: Scenarios and Security Issues,” Proc. 2014 Federated Conf. Computer
Science and Info. Systems, 2014, pp. 1–8.
26. Atzori, A. Iera, G. Morabito, The internet of things: A survey, Computer Networks 54 (15) (2010) 2787–2805.
27. T. Kleinberger, M. Becker, E. Ras, A. Holzinger, and P. Muller, ¨ “Ambient intelligence in assisted living: enable elderly people to
handle future interfaces,” in Universal Access in HumanComputer Interaction. Ambient Interaction: 4th International Conference on
Universal Access in Human-Computer Interaction, UAHCI 2007 Held as Part of HCI International 2007 Beijing, China, July 22–27,
2007 Proceedings, Part II, vol. 4555 of Lecture Notes in Computer Science, pp. 103–112, Springer, Berlin, Germany, 2007.
28. R. Bellazzi, S. Montani, A. Riva, and M. Stefanelli, “Webbased telemedicine systems for home-care: technical issues andexperiences,”
Computer Methods and Programs in Biomedicine, vol. 64, no. 3, pp. 175–187, 2001.

Authors: Kumaresan Murugesan, Sumathi Sowrirajan, Balasubramanian Kalpattu Kuppusamy

Paper Title: Photochemical Behavior of Allyl ethers of Vicinal Hydroxynaphthophenones


Abstract: In this research work, hitherto unreported photochemical studies on allyl ethers of 1-hydroxy-2-
naphthophenone, 2-hydroxy-1-naphthophenone and 3-hydroxy-2-naphthophenone are presented. While allyl
ethers of 1-hydroxy-2-naphthophenone were photoactive at 330 nm and the other two ethers were photostable.

Keywords: Photolysis, Claisen rearrangement, Hydroxynaphthophenones.

References:

1. T. Sumathi and K.K. Balasubramanian, Tetrahedron Lett., 1990, 1, 3775; T. Sumathi (1992) Synthesis and Photo- chemical Studies on
ethers of o-hydroxybenzo- phenones and Synthesis of Spirobenzofurans (Doctoral dissertation, Indian Institute of Technology Madras,
Chennai, India). (b) T. Sumathi and K.K. Balasubramanian, Tetrahedron Lett., 1992, 33, 2213. (c) G.A. Kraus, P.J. Thomas and M.D.
Schwinden, Tetrahedron Lett., 1990, 31, 1819. (d) M. T. Omirzak, R. Sh. Erkasov, B. G. Sukhov, and T. V. Ganenko, Russ. Chem. Bull.,
Int. Ed., 2013, 62, 2442. (e) P. Wagner. In Handbook of Organic Photochemistry and Photobiology, 2nd ed., W. M. Horspool, F. Lenci
(Eds.), Chap. 58, CRC Press, Boca Raton (2004). Edward C. Lathioor, William J. Leigh, Photochemistry and Photobiology, 2006, 82,
679. 291; Cosme G. Francisco, Antonio J. Herrera, and Ernesto Suárez, J. Org. Chem., 2002, 67, 7439; Angeles Martín, Inés Pérez-Martín, and
Ernesto Suárez, Org. Lett., 2005, 7, 2027 (f) Luca Capaldo, Davide Ravelli, Eur. J. Org. Chem., 2017, 2056. 3937-
2. P. J. Wagner, Acc. Chem. Res., 1989, 22, 83. 39
3. E.M. Sharshira, S. Shimada, M. Okamura, E. Hasegawa, T. Horaguchi, J. Heterocyclic chem., 1996, 33, 1797. 40
4. E.M. Sharshira, and T. Horaguchi; J. Heterocyclic chem., 1997, 34, 1837. (b) E.M. Sharshira, M. Okamura, E. Hasegawa and T.
Horaguchi, J. Heterocyclic chem., 1997, 34, 861.
5. E.M. Sanford, C.C. Lis, N.R. McPherson, J. Chem. Educ., 2009, 86, 1422; J. P. Ryan, P. R. O'Connor J. Am. Chem. Soc., 1952, 74, 5866.
6. M.S. Kharasch, G. Stampa, W. Nudenberg, Science, 1952, 116, 309. (b) F. A. Carroll and G. S. Hammond, Isr. J Chem., 1972, 10, 613.
(c) A. Saito, A. Kanno and Y. Hanzawa. Angew. Chem., 2007, 119, 4005; P.T. Wong, E.W. Roberts, S. Tang, J. Mukherjee, J. Cannon,
A.J. Nip, K. Corbin, M.F. Krummel, and S.K. Choi, ACS Chem. Biol., 2017, 12, 1001. (d) D.P. Kelly and J.T. Pinhey, Tetrahedron Lett.,
1964, 5, 3427. (e) A.L. Pincock, J.A. Pincock and R. Stenfanova, J. Am. Chem. Soc., 2002, 124, 9766. (f) K. Schmid and H. Schmid,
Helv. Chim. Acta, 1953, 36, 687; H.R. Waespe, H. Heimgartner, H. Schmid, H-J. Hansen, H. Paul and H. Fischer, Helv. Chem. Acta,
1978, 61, 401. (g) G. Pohlers, S. Grimme and H. Dreeskamp, J. Photochem, Photobiolgy A; Chem., 1994, 79, 153. (h) G. Koga, N.
Kikuchi and N. Koga, Bull. Chem. Soc. Jpn., 1968, 41, 745. (i) F. Galindo. J. Photochem. Photobiol. C; Photochem Rev. 2005, 6, 123.
7. K. Pitchumani, M. Warrier, V. Ramamurthy, J. Am. Chem. Soc., 1996, 118, 9428. (b) A.M. Sanchez, A.V. Veglia, R.H. de Rossi, Can. J.
Chem., 1997, 75, 1151.
8. G. Pohlers, S. Grimme and H. Dreeskamp. J. Photochem. Photobiol. A. Chem., 1996, 95, 41.
9. Y. Suzuki, Y. Okita, T. Morita and Y. Yoshimi, Tetrahedron Lett., 2014, 55, 3355. (b) C.M. Gonzalez and J.A. Pincock, Can. J. Chem.,
2008, 86, 686. (c) J. T. Pinhey and K. Schafner, Aus. J. Chem., 1968, 21, 2265. (d) E. Shahbazali, T. Noël, V. Hessel, J. Flow Chem.,
2016, 6, 252.
10. F.A. Carroll, G.S. Hammond, J. Am. Chem. Soc., 1972, 94, 7151.

Authors: Satyasundara Mahapatra, Rati Ranjan Dash, Niroj Kumar Pani

Paper Title: Activity Scheduling on Identical Parallel Processors


Abstract: The efficiency of parallel processors is achieved for the purpose of quick computing is mainly
depending on the scheduling of activity. The most important factor for scheduling of activities are depend on the
waiting time which is directly influence the computation time of overall activity. Minimizing the Variance of
Waiting Time otherwise known as Waiting Time Variance (WTV) is one of the metrics of Quality of Services
(QoS) which enhance the efficiency of activity scheduling. Allocate the activity from a set of activity pool and
schedule them for each identical parallel processor for execution in a large scale by minimizing WTV is the
680.
main focusing area of this paper. In case of large scale computing activities are complex in nature. A prior 3941-
knowledge of each activity must be known before the preparation of activity scheduling for efficient and rapid 39
computing. A snake walks style of activity distribution among the parallel processor is presented in this paper 48
for P_m |prec|WTV minimization problem. The minimization of WTV is measured with the help of three
heuristic intend methods named as RSS, VS and BS. The results of the experiment are compared with current
conspires and demonstrate the new snake style conspire is presenting the best practices for proven conspires and
challenges in a wide range of activity. The algorithm's predictable findings appear as illustrated with graph.

Keywords: Activity, Combinatorial, Deterministic, Identical Parallel Processors, Scheduling, Waiting Time
Variance.

References:

1. Singh N, Kaur G, Kaur P, Singh G. “Analytical Performance Comparison of BNP Scheduling Algorithms”, Global Journal of
Computer Science and Technology, Hardware & Computation, Volume 73, Issue 10, 2012, pp. 17-24.
2. Nong Ye, Li X, Farley T, Xu X. “Job scheduling methods for reducing waiting time variance.”, Computer & Operations Research
(Elsevier) , Volume 18, 2007, pp. 3069-3083.
3. Mahapatra S, Dash R R, Pradhan S K. “RSS Algorithm for Job Scheduling in Single Machine, A Novel Approach”, International
Journal of Advanced Computer Engineering and Communication Technology (IJACECT), ISSN (Print): 2319-2526, Volume-3, Issue
3, 2014, pp.24-30.
4. Mahapatra S, Dash R R, Pradhan S K. “A Heuristic Job Scheduling Algorithm for minimizing the Waiting Time Variance”,
International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE), Amity University,
Greater Noida, IEEE Xplore Digital Library, Print ISBN: 978-1-4799-8432-9, 25-27 February, 2015, pp. 446 – 451.
5. Chen B, Potts CN, Woeginger GJ (1998) A review of machine scheduling: Complexity, algorithms and approximability. In: Du D-Z,
Pardalos PM (ed) Handbook of Combinatorial Optimization, Kluwer, Dordrecht, The Netherlands, vol. 3, 1998, pp. 21-169.
6. Senthilkumar P. and Narayanan S., “Simulated Annealing Algorithm to Minimize Makespan in Single Machine Scheduling Problem
with Uniform Parallel Machines,” Intelligent Information Management, Volume 3, Issue 1, 2011, pp. 22-31.
7. Nowicki E, Smutnicki C. “A Fast Taboo Search Algorithm for the Job Shop Problem”, Management Science, Issue 6, 1996, pp. 797-
813.
8. Watson J P, Howe A E, Darrell Whitley L. “Deconstructing Nowicki and Smutnicki”s I-Tsab Tabu Search Algorithm for the Job-Shop
Scheduling Problem”, Computers and Operations Research, Volume 2, Issue 9, 2006, pp. 2623-2644.
9. Yamada T, Reeves C. “Permutation Flowshop Scheduling by Genetic Local Search”, 2nd IEE/IEEE Int. Conf. on Genetic Algorithms
in Engineering Systems (GALESIA “97). Glasglow, UK, Volume 34, 1997, pp. 232-238.
10. Murata T., Ishibuchi H., Tanaka H., “Genetic Algorithms for Flowshop Scheduling Problems”, Computers & Industrial Engineering,
Volume 30, Issue 4, 1996, pp. 1061-1071.
11. Merten A G, Muller M E. “Variance Minimization in Single Machine Sequencing Problems”, Management Science, Volume 38, Issue
9, 1972, pp. 518-528.
12. Farley Ye N, Li X, Harish B. “Batch Scheduled Admission Control for Computer and Network Systems”, Information Knowledge
Systems Management, Volume 5, Issue 4, 2007, pp. 211-226.
13. Eilon S, Chowdhury I G, “Minimizing Waiting Time Variance in the Single Machine Problem”, Management Science, Volume 34,
Issue 6, 1977, pp. 567-575.
14. Schrage L. “Minimizing the Time-in-System Variance For A Finite Jobset”, Management Science, Volume 207, Issue 5, 1975, pp.
540-543.
15. Chakraborty U K, Laha D. “An improved heuristic for permutation flowshop scheduling”, International Journal of Information &
Communication Technology, Volume 6, 2007, pp. 89-97.
16. Rios-Solis Y A, Sourd F. “Exponential neighbourhood search for a parallel machine scheduling problem”, Computers & Operations
Research, Volume 1, 2008, pp.1697-1712.
17. Jozefowska J, Mika M, Rozycki R, Waligora G, Weglarz J. “An almost optimal heuristic for preemptive Cmax  scheduling of
dependent tasks on identical parallel processors.”, Annals of Operation Research, Volume 129, Issue 129, 2004, pp. 205-216.
18. Akyol D E. “Identical Parallel Machine Scheduling with Dynamical Networks using Time-Varying Penalty Parameters”,
Multiprocessor Scheduling: Theory and Applications, Book edited by Eugene Levner, ISBN 978-3-902613-02-8, Itech Education and
Publishing, Vienna, Austria, 2007, pp. 293-314.
19. Pinedo M. “Scheduling theory, algorithms and systems”, Englewood Cliffs, NJ: Prentice-Hall; 1995.
20. Hall N G, Kubiak W. “Proof of a conjecture of Schrage about the completion time variance problem”, Operations Research Letters,
Volume 27, 1991, pp.467-472.
21. Xu X , Ye N. “Minimization of job waiting time variance on identical parallel machines”, IEEE transactions on Systems, Man, and
Cybernetics - Part C: Applications and Reviews, Volume 37, Issue 5, 2007, pp. 917-927.

Authors: Harsh Modi, Daniyah Ammarah, Aditya Rai, Sweta Jain

Paper Title: Classification of Facial Images into Adult or Minor Categories using Facial Features
Abstract: Facial images have always been used for various analytical and research purposes as they contain
abundant information about personal characteristics, including identity, emotional expression, gender, age, etc.
A human image is often defined as a complex signal composed of many facial attributes such as skin colour and
geometric facial features. Nowadays the real-world applications of facial images have brought in a new dawn in
the field of biometrics, security and surveillance, and these attributes play a crucial role in the same. Unrestricted
and unintended access to certain resources and information to the minors has a history of physical and
psychological implications, which makes age, in particular, more significant among these attributes. Consider a
scenario where users may require an age‐specific human computer interaction system that can estimate age for
secure system access control or intelligence gathering. Automatic human age estimation using facial image
analysis will come as a rescue with its potential applications in the field of Age Specific Human Computer
Interactions and numerous real‐world applications which include human computer interaction and multimedia
681. communication. Here, we aim to identify and classify images provided as input into two main categories, adults 3949-
and minors. This classification would act as an access controller to the desired resources or information. 39
MATLAB was used to identify the younger and older images. Initially we got the databases of features extracted 52
from the input images using different feature extraction methods. Later we compared the several trained
databases to get a specific range for younger and older images. This range then became the basis for identifying
the young and the old.

Keywords: Classification, Feature analysis, Human- Computer Interaction, Security, Surveillance.

References:

1. Jayant Jagtap, Manesh Kokare, “Human Age Classification using Facial Skin Analysis and Multiclass Support Vector Machine”, IEEE,
INSPEC Accession Number: 1667423
2. M.Z.Lazarus, K.Srilakshmi, Sandeep V.M., “Age Classification based on Wrinkle Analysis”, IJRITCC, ISSN 2321-8169, Vol: 1 Issue:
3,119-124, March 2013
3. S.Jayaraman, S Esakkirajan, T Veerakumar, “Digital Image Processing”, ISBN: 9780070144798, 007014
4. Senthilkumar T.K, S.Rajalingam, S.Manimegalai, V.Giridhar Srinivasan,"Human Facial Emotion Recognition Through Automatic
Clustering Based Morphological Segmentation And Shape/Orientation Feature Analysis", 2016 IEEE International Conference on
Computational Intelligence and Computing Research (ICCIC)
5. Ranjan Jana, Debaleena Datta, Rituparna Saha, "Age Group Estimation using Face Features", International Journal of Engineering and
Innovative Technology (IJEIT), Volume 3, Issue 2, August 2013
6. Subarna Shakya, Suman Sharma1/Abinash Basnet2, "Human Behavior Prediction using Facial Expression Analysis", International
Conference on Computing, Communication and Automation (ICCCA2016)
7. Bhupinder Verma, "Age Classification from Facial Images", Computer Vision and Image Understanding, Vol. 74, No. 1, April, pp. 1–
21, 1999

Wan Nur ‘Izzati Wan Md Hatta, Fairul Azni Jafar, Farizan Mohd Nor, Ahamad Zaki Mohamed
Authors:
Noor
Paper Title: Machinibility Performance of CNC Turning Based on Automated Coolant Supply System
Abstract: CNC machine is an industrial manufacturing machine that is used to improve quality and
productivity of a product. Good tool life and surface finish of this CNC machining product are produced by
applying wet cooling technique. However, this technique had affected the workpiece, tooling, health and
environment. Also, there is only 10% to 15% of coolants used from the total amount of supply in the system and
this lead to waste and increase productivity cost. Hence, the idea of using Programmable Logic Control (PLC)
that inspired the control system of coolant supply plays an important role in developing the modern technology
and industry for machining. The purpose is to develop a time-based automated coolant supply system and to test
the system performance through evaluation of the roughness of the workpiece surface. The adjusted device to
control the coolant supply employed a washing machine inlet control valve. Basically, the used of PLC is able to
fulfil the function of the valve operation to control the flow of the coolant through the ON-OFF sequence based
on time. Results from the experiment prove that better surface roughness is achieved through the application of
automated coolant supply system. Hence, relationship between surface roughness and reduction in consumption
of coolant in this system is also obtainable.

Keywords: Automated Coolant Supply, Time-based, Surface Finishing, Turning Machining.

References:

1. A.H. Ansar, M.A. Hussain, S.M. Alamoodi, S. Mahreen, T. Sultana, M. Abdul, and R. Uzair, “Features and applications of CNC
machines and systems,” International Journal of Science, Engineering and Technology Research, vol. 5, 2016, pp. 717–726.
682. 2. C. Courbon, D. Kramar, P. Krajnik, F. Pusavec, J. Rech, and J. Kopac, “Investigation of machining performance in high-pressure jet
assisted turning of Inconel 718: An experimental study,” International Journal of Machine Tools and Manufacture, vol. 49, 2009, pp. 3953-
1114–1125. 39
3. M. Mia. and N.R. Dhar, “Effect of high pressure coolant jet on cutting temperature, tool wear and surface finish in turning hardened 57
(Hrc 48) steel,” Journal of Mechanical Engineering, vol. 45, no. 1, 2015, pp. 1-6.
4. S. Sartori, A. Ghiotti, and S. Bruschi, “Temperature effects on the Ti6Al4V machinability using cooled gaseous nitrogen in semi-
finishing turning,” Journal of Manufacturing Processes, vol. 30, 2017, pp. 187–194.
5. Unist, “Improving tool life with minimum quantity lubrication,” Technical Report, 2012.
6. N.H.B Ambrizal, A. Farooqi, O.I. Alsultan, and N.B. Yusoff, “Design and development of CNC robotic machine integrate-able with
Nd-Yag laser device,” Procedia Engineering, vol. 184, 2017, pp. 145–155.
7. Y. Yildiz and M. Nalbant, “ A review of cryogenic cooling in machining processes,” International Journal ofMachine Tools & Manuf,
vol. 48, , 2008, pp. 947–964.
8. T. Tawakoli, M.J. Hadad, M.H. Sadeghi, A. Daneshi, S. Stöckert, and A. Rasifard, “An experimental investigation of the effects of
workpiece and grinding parameters on minimum quantity lubrication-MQL grinding,” International Journal of Machine Tools and
Manufacture, vol. 49, 2009, pp. 924–932.
9. A.H.M. Fazle Elahi, Z.A. Nisha, and I.U. Ferdous, “Inteligent cooling system for machining,” Proceedings of the International
Conference on Mechanical Engineering and Renewable Energy, 2015.
10. P.S. Sreejith, “Machining of 6061 aluminium alloy with MQL, dry and flooded lubricant conditions,” Materials Letters, vol. 62, 2008,
pp. 276–278.
11. D.U. Braga, A.E. Diniz, G.W.A. Miranda, and N.L. Coppini, “Using a minimum quantity of lubricant (MQL) and a diamond coated
tool in the drilling of aluminium-silicon alloys,” Journal of Material Processing Technology, vol. 122, 2002, pp. 127–138.
12. E. Brinksmeier and A. Walter, “Einsatzbeispiele f¨ur Minimalmengenk¨uhlschmierung und Trocken-bearbeitung,” Proceedings of the
10th International Colloquium, Technische Akademie Esslingen Tribologie on Solving Friction and Wear Problems, 1996, pp. 23–43.
13. B.L. Tai, D.A. Stephenson, R.J. Furness, and A.J. Shih, “Minimum quantity lubrication (MQL) in automotive powertrain machining,”
Procedia CIRP, vol. 14, 2014, pp. 523-528.
14. I. Dumitru, N. Arghira, I. Fagarasan, and S. Iliescu, “A fuzzy PLC control system for a servomechanism,” IFAC Worksyop on
Intelligent Control Systems, vol. 43, no. 22, 2010, pp. 69-74.
15. Q. Liang and L. Li, “The study of soft PLC running system,” Procedia Engineering, vol. 15, 2011, pp. 1234-1238.
16. A.T. Ergenç and D.Ö. Koca, “PLC controlled single cylinder diesel-LPG engine,” Fuel, vol. 130, 2014, pp. 273-278.
Authors: S. Meenakshi, D. Amsaveni

Paper Title: Intuitionistic Fuzzy Digital Continuous and Connected Maps


Abstract: The geometrical and topological possessions among the fragments of a digital picture play a massive
role in image processing. Together Intuitionistic fuzzy logic has many applications in image processing. This
article aims at such a property of continuity. It introduces intuitionistic fuzzy digital continuous maps between
683.
any two intuitionistic fuzzy digital images defined by the intuitionistic fuzzy digital regular sets and to study 3958-
some of its properties. Besides, the concept of intuitionistic fuzzy digital connected maps is established by 39
giving some restrictions on intuitionistic fuzzy digital continuous maps and derived many interesting results. 62

Keywords: IFD connected maps, IFD connected sets, IFD continuous maps, IFD homeomorphisms.
References:

1. Atanassaov. K. T and Stoeva. S, Intuitionistic Fuzzy Sets, in: Polish Symp. On Internal and Fuzzy Mathematics, Poznan (August
1983), 23-26.
2. Atanassaov. K. T, , Ed., VII Intuitionistic Fuzzy Sets, in: V.Sgurev ITKR’s Session, Sfia (une 1983 Central Sci. and Techn. Library,
Bulg. Academy of Sciences, 1984).
3. Atanassaov. K.T, Intuitionistic Fuzzy Sets, Fuzzy Sets and Systems, 20(1986), 87-96.
4. Kong. T.Y and Rosenfeld. A, Digital topology, Introduction and Survey, Computer Vision, Graphics and Image Processing 48 (1989)
357 – 393.
5. Meenakshi. S, and Amsaveni. D, Intuitionistic Fuzzy Digital Structure Convexity and Concavity, Proceedings of the conference, Wide
views on analysis and its applications, Oct.2016, 60-69.
6. Meenakshi. S, Tamilmani. J and Amsaveni. D, Intuitionistic Fuzzy Digital Structure Convex Envelopes and Simplexes, Journal of
Analysis (Springer), 1-9, 2017.
7. Meenakshi. S, Tamilmani. J and Amsaveni. D, Intuitionistic Fuzzy Digital C-Maps an Convex Envelopes, Global Journal of Pure and
Applied Mathematics, Vol 13, No.2, 21-30, 2017.
8. Meenakshi. S, Tamilmani. J and Amsaveni. D, Intuitionistic Fuzzy Digital Convexity, IJCAM, 2017.
9. Rosenfeld. A, “Digital Topology”, American Mathematical Monthly, Vol.86, pp.621-630, 1979.
10. Rosenfeld. A, Fuzzy digital topology, Inform. And Control 40(1) (1979) 76 – 87.
11. Rosenfeld. A, On Connectivity properties of gray scale pictures, Pattern Recognition Letters 16 (1983) 47-50.
12. Zadeh. L.A, Fuzzy Sets, Information and Control, 9 (1965) 338 – 353.

Authors: Chetan J. Awati, Suresh K. Shirgave

Paper Title: Stable Confident Rating Prediction in Collaborative Filtering


Abstract: Stability of matrix factorization is estimated in terms of gradient descent estimation at each iteration
which ultimately defines the stability of recommendations in collaborative filtering techniques. Also, stability is
inversely proportional to total number of iterations used for estimating ratings. This gives rise to the need of the
method which possesses better rating predictability within less number of iterations. The accuracy of rating
prediction is found to be better when user to user trust score is estimated using similarity of individual rated
items. The trust estimation is also prone to sparsity due to irregularity of ratings in large volume of data sets (big
data). Based on the experimentation strategy and platform requirements, the method of trust evaluation is
proposed in this positional paper. The Lyapunov stability solver functions can be used directly in obtaining
solution for the trust score amongst users which can bring sufficient stability in learning stages of matrix
factorization process and hence better performance in predicting the ratings of non-rated items. Here, the results
obtained possess the sufficient gravity for consideration of predicted ratings which also keeps errors in
prediction at lowest level for rated items. The papers are addressed from similar domain in related work section
to compare proposed work in terms of novelty and performance. The results obtained are satisfactory, which are
assessed in terms of mean absolute error (MAE).

Keywords: Lyapunov solver, Kronecker product, trust estimation, matrix factorization, collaborative filtering.

References:

1. Soude Fazeli, Babak Loni, Alejandro Bellogin, Hendrik Drachsler, and Peter Sloep, “Implicit vs. explicit trust in social matrix
factorization”, In Proceedings of the 8th ACM Conference on Recommender systems (RecSys '14). ACM, New York, NY, USA, 2014,
317-320.
2. Xiangnan He, Hanwang Zhang, Min-Yen Kan, and Tat-Seng Chua, “Fast Matrix Factorization for Online Recommendation with
684. Implicit Feedback”. In Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information 3963-
Retrieval, 2016 39
3. Dheeraj Bokde, Sheetal Girase, Debajyoti Mukhopadhyay, “Matrix Factorization Model in Collaborative Filtering Algorithms: A
Survey”, Procedia Computer Science, Volume 49, 2015, Pages 136-146. 68
4. Y. Lo, W. Liao, C. Chang and Y. Lee, “Temporal Matrix Factorization for Tracking Concept Drift in Individual User Preferences,” in
IEEE Transactions on Computational Social Systems, vol. 5, no. 1, pp. 156-168, March 2018.
5. L. Zhang, T. Luo, F. Zhang and Y. Wu, “A Recommendation Model Based on Deep Neural Network,” in IEEE Access, vol. 6, pp.
9454-9463, 2018.
6. WANG, C., LIU, Q., WU, R., CHEN, E., LIU, C., HUANG, X., HUANG Z. “Confidence-Aware Matrix Factorization for
Recommender Systems”. AAAI Conference on Artificial Intelligence, North America, April 2018.
7. X. Luo, M. Zhou, S. Li, Z. You, Y. Xia and Q. Zhu, “A Nonnegative Latent Factor Model for Large-Scale Sparse Matrices in
Recommender Systems via Alternating Direction Method,” in IEEE Transactions on Neural Networks and Learning Systems, vol. 27,
no. 3, pp. 579-592, March 2016.
8. Z. Zhang, Y. Liu and Z. Zhang, “Field-Aware Matrix Factorization for Recommender Systems,” in IEEE Access, vol. 6, pp. 45690-
45698, 2018.
9. X. Guan, C. Li and Y. Guan, “Matrix Factorization with Rating Completion: An Enhanced SVD Model for Collaborative Filtering
Recommender Systems,” in IEEE Access, vol. 5, pp. 27668-27678, 2017.
10. X. Luo et al., “An Incremental-and-Static-Combined Scheme for Matrix-Factorization-Based Collaborative Filtering,” in IEEE
Transactions on Automation Science and Engineering, vol. 13, no. 1, pp. 333-343, Jan. 2016.
11. Oleksandr Krasnoshchok, Yngve Lamo, “Extended Content-boosted Matrix Factorization Algorithm for Recommender Systems”,
Procedia Computer Science, Volume 35, 2014, Pages 417-426.
12. T. V. Aa, I. Chakroun and T. Haber, “Distributed Bayesian Probabilistic Matrix Factorization”, 2016 IEEE International Conference on
Cluster Computing (CLUSTER), Taipei, 2016, pp. 346-349.
13. Ashish K. Sahu, Pragya Dwivedi, “Matrix factorization in Cross-domain Recommendations Framework by Shared Users Latent
Factors”, Procedia Computer Science, Volume 143, 2018, Pages 387-394.
14. J. Bobadilla, R. Bojorque, A. Hernando Esteban and R. Hurtado, “Recommender Systems Clustering Using Bayesian Non Negative
Matrix Factorization,” in IEEE Access, vol. 6, pp. 3549-3564, 2018.
15. R. Badeau, N. Bertin and E. Vincent, “Stability Analysis of Multiplicative Update Algorithms and Application to Nonnegative Matrix
Factorization,” in IEEE Transactions on Neural Networks, vol. 21, no. 12, pp. 1869-1881, Dec. 2010.
16. C. Bishop, “Pattern Recognition and Machine Learning”, Springer, 2006.
17. D. Zhou, O. Bousquet, J.Weston, and B. Sch¨olkopf. “Learning with local and global consistency”, In Advances in Neural Information
Processing Systems 16, 2004.
18. X. Zhu, Z. Ghahramani, and J. Lafferty, “Semi-supervised learning using Gaussian fields and harmonic functions”, In Proceedings of
the 20th International Conference on Machine Learning (ICML), 2003.
19. J. Basilico and T. Hofmann, “Unifying collaborative and content-based filtering”, In Proceedings of the 21st International Conference
on Machine Learning (ICML), 2004.
20. A. Ben-Hur and W. S. Noble, “Kernel methods for predicting protein-protein interactions”, Bioinformatics, 21(Suppl. 1):i38–i46, 2005.
21. S. Oyama and C. D. Manning, “Using feature conjunctions across examples for learning pairwise classifiers”, In Proceedings of the
15th European Conference on Machine Learning (ECML), pages 322–333, 2004.
22. G. H. Golub and C. F. V. Loan, “Matrix computations (3rd ed.)”, Johns Hopkins University Press, 1996.
23. A. J. Laub, “Matrix Analysis for Scientists and Engineers. Society for Industrial and Applied Mathematics”, 2005.
24. Hisashi Kashima, Tsuyoshi Kato, Yoshihiro Yamanishi,, Masashi Sugiyama, “Link Propagation: A Fast Semi-supervised Learning
Algorithm for Link Prediction”, Proceedings of the 2009 SIAM International Conference on Data Mining, 2009 .
Hamoud Alenezi, Sharifah Rafidah Wan Alwi, Zainuddin Abdul Manan, Dayang Norulfairuz
Authors:
Abang Zaidel
Paper Title: Recent Developments on Ethylene Dimerization with Focus on Alphabutol Optimization
Abstract: Butene-1 is an essential compound or co-monomer typically used to regulate and control the density
of both high-density polyethylene (HDPE) and linear low-density polyethylene (LLDPE). The production of
Butene-1 has become a significant area of interest to the industrial and educational-research sectors. Alphabutol
technology is one of the Butene-1 production processes. This paper attempts to find a problem that has not been
addressed by previous research on production of Butene-1 by using ethylene demineralization route focussing on
Alphabutol Technology. The first part of this paper is on the ethylene dimerization techniques available in the
literature. Most research on the ethylene dimerization technique emphasized on how to enhance the selectivity of
Butene-1 from ethylene using different types of catalyst. The second part of this paper reviews the operational
processes used to minimise fouling reported in the literature review. Most of the literatures focused ethylene
dimerization and not on the operational issues to be overcome during chemical reactions to enhance the
selectivity of Butene-1. Fouling problem in Alphabutol process is still an area that is not adequately addressed in
the literature. There is also no literature on operating or maintenance procedure to address these problems of the
technology. Therefore, there is still room for improvement on the ethylene dimerization research technology,
particularly in the operational process and conditions where the improvement in the reaction parameters of the
Alphabutol reactor can improve selectivity of butene-1, extend the run time of the heat exchanger and reduce the
time required to clean the heat exchanger fouling.

Keywords: Butene-1 Production, Aphabutol technology, Fouling, Ethylene Dimerization.

References:

1. M. Stürzel, S. Mihan, and R. Mülhaupt, “From Multisite Polymerization Catalysis to Sustainable Materials and All-Polyolefin
Composites,” Chem. Rev., vol. 116, no. 3, pp. 1398–1433, Feb. 2016.
2. G. P. Belov, “Selective dimerization, oligomerization, homopolymerization and copolymerization of olefins with complex
organometallic catalysts,” Russ. J. Appl. Chem., vol. 81, no. 9, pp. 1655–1666, Sep. 2008.
3. S. M. Pillai, G. L. Tembe, M. Ravindranathan, and S. Sivaran, “Dimerization of ethylene to 1 - butene catalyzed by titanium alkoxide -
triethylaluminum system,” J. Ind. Eng. Chem. Res, vol. 27, pp. 1971–1977, 1988.
685. 4. V. I. Zhukov, G. V. Val’kovich, B. N. Skorik, Y. M. Patrov, and Gennadiy Petrovich Belov, “Selective dimerization of ethylene to
butene-1 under the conditions of industrial process, I. Influence of temperature and pressure on the rate of the process in a bubbling 3969-
type reactor,” Russ. J. Appl. Chem., vol. 80, no. 1195–1200, 2007. 39
5. A. M. Al-Jarallah, J. A. Anabtawi, M. A. B. Siddiqui, A. M. Aitani, and A. W. Al-Sa’Doun, “Ethylene dimerization and 75
oligomerization to butene-1 and linear α-olefins,” Catal. Today, vol. 14, no. 1, pp. 1–121, Apr. 1992.
6. R. R. Schrock and J. D. Fellmann, “Multiple metal-carbon bonds. 8. Preparation, characterization, and mechanism of formation of the
tantalum and niobium neopentylidene complexes, M(CH2CMe3)3(CHCMe3),” J. Am. Chem. Soc., vol. 100, no. 11, pp. 3359–3370,
May 1978.
7. E. A. and and K. Al-humaizi, “Temperature Control of Ethylene to Butene-1 Dimerization Reactor,” Ind. Eng. Chem. Res, vol. 39, no.
5, pp. 1320–1329, 2000.
8. C. O. Carter, “Olefin dimerization. US Patent 4242531. 1980,” 30-Dec-1980.
9. D. M. Maschmeyer, A. E. Fowler, S. A. Sims, and E. G. White, “Process for making a mixture of ethylene and butene-1. US Patent
4484016. 1984,” 20-Nov-1984.
10. A. Krzywicki and K. Johnstone, “Ethylene Dimerization,” Stud. Surf. Sci. Catal., vol. 73, pp. 155–160, 1992.
11. F. A. Al-Sherehy, “IFP-SABIC process for the selective ethylene dimerization to butene-1,” Stud. Surf. Sci. Catal., vol. 100, pp. 515–
523, Jan. 1996.
12. T. Agapie, “Selective ethylene oligomerization: Recent advances in chromium catalysis and mechanistic investigations,” Coord. Chem.
Rev., vol. 255, no. 7–8, pp. 861–880, Apr. 2011.
13. K. I. Alhumaizi, “Stability Analysis of the Ethylene Dimerization Reactor for the Selective Production of Butene-1,” Chem. Eng. Res.
Des., vol. 78, no. 3, pp. 492–498, Apr. 2000.
14. A. Finiels, F. Fajula, and V. Hulea, “Nickel-based solid catalysts for ethylene oligomerization – a review,” Catal. Sci. Technol., vol. 4,
no. 8, pp. 2412–2426, Jul. 2014.
15. Cecil O. Carter and Wann Okla, “Surface conditioning in olefin dimerization reactors. US Patent 4538018. 1983.,” 1983.
16. A. W. Al-Sa’doun, “Dimerization of ethylene to butene-1 catalyzed by Ti(OR’)4-AlR3,” Appl. Catal. A Gen., vol. 105, no. 1, pp. 1–40,
Nov. 1993.
17. Seyed Hamed Mahdaviani, Davood Soudbar 2, and Matin Parvari, “Selective ethylene dimerization toward 1-butene by a new highly
efficient catalyst system and determination of its optimum operating condition in a Buchi reactor,” Int. J. Chem. Eng. Appl., vol. 1, no.
3, pp. 276–281, 2010.
18. S. H. Mahdaviani, M. Parvari, and D. Soudbar, “Ethylene Dimerization by a Homogeneous Ti-Based Three-Component Catalyst
System: Process Evaluation and Optimization of Parametric Performance,” Procedia Eng., vol. 42, pp. 616–622, Jan. 2012.
19. P. Bigdeli, M. Abdouss, and S. Abedi, “Ti alkoxide-based catalyst system in selective ethylene dimerization: High performance
through modifying by alkylsilanes,” Chem. Eng. Commun., vol. 205, no. 1, pp. 102–109, Jan. 2018.
20. R. Robinson, D. S. McGuinness, and B. F. Yates, “The Mechanism of Ethylene Dimerization with the Ti(OR′) 4 /AlR 3 Catalytic
System: DFT Studies Comparing Metallacycle and Cossee Proposals,” ACS Catal., vol. 3, no. 12, pp. 3006–3015, Dec. 2013.
21. J. A. Suttil and D. S. McGuinness, “Mechanism of Ethylene Dimerization Catalyzed by Ti(OR′) 4 /AlR 3,” Organometallics, vol. 31,
no. 19, pp. 7004–7010, Oct. 2012.
22. J. Ye, L. Gagliardi, C. J. Cramer, and D. G. Truhlar, “Single Ni atoms and Ni4 clusters have similar catalytic activity for ethylene
dimerization,” J. Catal., vol. 354, pp. 278–286, Oct. 2017.
23. D. Chandran, C. Bae, I. Ahn, C.-S. Ha, and I. Kim, “Neutral Ni(II) complexes based on keto-enamine salicylideneanilines active for
selective dimerization of ethylene,” J. Organomet. Chem., vol. 694, no. 9–10, pp. 1254–1258, Apr. 2009.
24. Donald M. MaschmeyerAllan E. FowlerSteve A. SimsG. Eldon White, “Process for making a mixture of ethylene and butene-1,” Jul.
1983.
25. S. M. Pillai, G. L. Tembe, M.
26. Ravindranathan, and S. Sivaram, “Dimerization of ethylene to 1-butene catalyzed by the titanium alkoxide-trialkylaluminum system,”
Ind. Eng. Chem. Res., vol. 27, no. 11, pp. 1971–1977, Nov. 1988.
27. Ernest A Zuech, “Dimerization of olefins with chromium halide complex catalyst systems. US Patent. 3627700,” US3627700A, 22-
Nov-1968.
28. E Zuech, “Dimerization of olefins with chromium halide complex catalysts systems,” 29-Mar-1971.
29. Z. Xu et al., “Ethylene Dimerization and Oligomerization to 1-Butene and Higher Olefins with Chromium-Promoted Cobalt on Carbon
Catalyst,” ACS Catal., vol. 8, no. 3, pp. 2488–2497, Mar. 2018.
30. H. Al-Haj Ibrahim, A. Safwat, and N. Hussamy, “Investigation of the fouling mechanisms in the heat exchangers of a hydrotreater,”
Eng. J. Univ. Qatar, vol. 18, pp. 9–14, 2005.
31. E. Diaz-Bejarano, E. Behranvand, F. Coletti, M. R. Mozdianfard, and S. Macchietto, “Organic and inorganic fouling in heat
exchangers – Industrial case study: Analysis of fouling state,” Appl. Energy, vol. 206, pp. 1250–1266, Nov. 2017.
32. A. P. Watkinson, “Critical Review of Organic Fluid Fouling. Argonne National Laboratory Report No. ANL/CNSV-TM-208, 1988,”
1988.
33. A. P. Watkinson, “Chemical reaction fouling of organic fluids,” Chem. Eng. Technol., vol. 15, no. 2, pp. 82–90, Apr. 1992.
34. Ronald Schmidt, Mohammed Alhazmi, Mohammed Alanzi; Catalyst composition for selective Dimerization of Ethylene, US Patent
US20160310936A1, 2016.
35. Gábor, V., György, T., Gábor, M., András, B., and László, S. HeI Photoelectron Spectroscopy of Trialkylaluminum and
Dialkylaluminum Hydride Compounds and Their Oligomers. Organometallics, 2002, 21(13), 2751-2757.
36. Axens IFP Group Technologies. LC 2253. Available from: <http://www.axens.net/product/catalysts-a-adsorbents/104/lc-2253.html>
[15 January 2017].
Authors: Sanya Sreenath, Gowtham Shantan M, Rohini B

Paper Title: Substation Monitoring and Control using Rs485 Transceiver


Abstract: Through this project, prioritization of distribution of two power stations by monitoring and detecting
the power imbalance at the earliest and reversing the data’s so it can be rectified. RS485 is utilized as the solid
layer underlying several routine protocols employed to execute industrial control systems. This system is
programmed to also convey the real time electrical parameters recurrently and thus enable the main substation to
monitor the parameters. This main station apparatus is developed to cut off subsequent substation power
whenever the voltage or current exceeds the predefined limits.

Keywords: Substation, Monitoring, Transformer, Power Stations.

References:

1. Amol Ram Kate, Girish BabanDongare , Microcontroller Based Substation Monitoring and Control System with Gsm Modem, IOSR
Journal of Electrical and Electronics Engineering (IOSRJEEE), August 2014
2. Amol Ram Kate, Girish BabanDongare ,KrishanaMarotiJanwade , PayalBurande, Narendra P. Zinjad, Substation Monitoring System,
(IJRASET May 2018)
3. Jyotishman Pathak, Yuan Li, Vasant Honavar and James D. McCalley, "A Service-Oriented Architecture for Electric Power
Transmission System Asset Management", In ICSOC Workshops, pp: 26-37, 2006.
4. Srinivasnaik, S., Suganthy, M., Kumar, S. M., & Jegadeeswari, V. Monitoring of Population Dynamics of Black Aphid, Toxoptera
Aurantii Infesting Cocoa, Theobroma Cacao L. using Sticky Light Traps in Tamil Nadu.
5. QipengSong , Wanxing Sheng , Lingfeng Kou , Smart substation integration technology and its application in distribution power grid ,
CSEE Journal of Power and Energy Systems, Volume: 2 , December 2016 .
6. GhousBukshNarejo, Shahyan Pervez Bharucha, Danny ZarirPohwala, Remote Microcontroller Based Monitoring of Substation and
686. Control System through GSM Modem, International Journal of Scientific & Engineering Research, Volume 6, Issue 1, January-2015
7. Montano-Soto, T., Arellano-García, E. V. A. R. I. S. T. A., & Camarena-Ojinaga, L. (2014). Genotoxic biomonitoring and exposure to
3976-
pesticides in women laborers at maneadero valley in Baja California, Mexico. International Journal of Applied and Natural 39
Sciences, 3(2), 89-96. 79
8. An Efficient Monitoring of Transformers Using Microcontroller Based System, K. Raja Saranya and K. Ram Prasad, Bonfring
International Journal of Man Machine Interface, Vol. 2, Special Issue 1, February 2012.
9. Substation Automation for the Smart Grid, white paper, Cisco.
10. Ranju, R., Bindu, L., & Jayaprakas, V. Use of Ciliates in Pollution Monitoring and Bioremediation in Vembanad Lake, India.
11. Microcontroller Based Substation Monitoring and Control System with Gsm Modem Amit Sachan Department of Energy & Power
Engineering NIMS University, Jaipur, Rajasthan OSR Journal of Electrical and Electronics Engineering (IOSRJEEE) ISSN: 2278-1676
Volume 1, Issue 6 (July-Aug. 2012), PP 13-21
12. Zaghloul, M. S. (2014). Design of Open Architecture Ship Alarm, Monitoring and Control System. International Journal of Research
in Engineering & Technology, 2(1).
13. Wang.M, Vandermaar A.J and Srivastava K.D, “Review of condition assessment of Power Transformer in service”, IEEE Electrical
insulation magazine Vol: 18, No.6, pp 12-25, NovDec 2002.
14. Tyagi, R., Tomar, N., Tyagi, R. S., & Tyagi, S. K. (2014). Monitoring of particulate matter (SPM, RSPM and dust fall) in ambient air
of Ghaziabad and Meerut area of National Capital Region, India. International journal of research in applied, natural and social
sciences, 2(1), 13-22.
15. Siemens Energy Sector, Power engineering guide edition 7

Authors: Sindhumathi E

Paper Title: Filler slab with partial replacement of cement by Eggshell powder
Abstract: Currently India has taken a major initiative in developing the infrastructure to meet the requirements
687.
of globalization in the construction industry. Considering building element like slab, more concrete is wasted in 3980-
the tension zone, since the tensile forces are taken by the steel reinforcement. To overcome this wastage of 39
concrete in tension zone, a new cost effective method called as Filler slab technique is used. Low price and 84
lightweight filler substance like Mangalore tiles, that will decrease the dead weight in addition to the total cost of
this slab to some degree. Being environmentally accountable, the utilization of waste substances is a Vital step in
creating a sustainable future. The Eggshell, which is usually disposed as a poultry waste can be used as an
alternate of cement in powdered form, since the shell is made up of Calcium having a chemical composition
same as limestone. Partial replacement of cement by eggshell powder is done in different proportions like 2.5%,
5%, 7.5% & 10%. In this paper, the filler slab has been created additional cost effective with the addition of
eggshell powder because partial replacement of cement. Following a healing period of 28 days, there's a version
in compression and flexural strength of concrete using eggshell powder compared to conventional concrete.

Keywords: Filler Slab Technique, Mangalore Tiles, Sustainable, Egg Shell Powder, Compression and Flexural
Strength Of Concrete.

References:

1. Amarnath Yerramala, (2014) “Properties of Concrete with Eggshell Powder as Cement Replacement”, The Indian Concrete Journal,
pp. 94-102.
2. Amit D Chougule, Manoj H. Mota, Ushadevi S Patil., (2015) “To study the Filler Slab as alternative construction technology”, Journal
of Information and Research in Civil Engineering, Vol. 3, Issue 2, pp. 199-202.
3. Ayush Srivastava, (2015) “Filler slab as a continuous T-beam slab”, International Journal for Scientific Research &amp; Development,
Vol. 2, Issue 11, pp. 293-295.
4. Dhanalakshmi M, Dr. Sowmya N J, Dr. Chandrashekar A, (2015) “A comparative study on egg shell concrete with partial replacement
of cement by fly ash”, International Journal for Research in Applied Science &amp; Engineering Technology, Vol. 3, Issue 11,pp. 12-
20.
5. Emarah, A. M., Metwally, K. G., & Zaghw, A. I. Comparative Analytical Study of Reinforced Concrete Wall Subjected to Blast
Loading Pattern.
6. Gambhir. M. L, (2016) “Design of Reinforced Concrete Structures”, PHI Learning Private Limited, New Delhi.
7. IS 456 : 2000, “Code of Practice for Plain and Reinforced Concrete”, Bureau of Indian Standards, New Delhi.
8. IS 10262 : 2009, “Concrete Mix Proportioning”, Bureau of Indian Standards, New Delhi.
9. IS 383 : 1970, “Specification for Coarse and Fine Aggregates from Natural Sources for Concrete”, Bureau of Indian Standards, New
Delhi.
10. IS 12269 : 2013, “Ordinary Portland Cement 53 Grade - Specification”, Bureau of Indian Standards, New Delhi.
11. Krishna Raju. N, (2015) “Design of Reinforced Concrete Structures”, 3 rd edition, CBS Publishers &amp; Distributors, New Delhi.
Modupeola, A. G., & Olutoge, F. A. (2014). The effect of seawater on shrinkage properties of concrete. Int. J. Res. Eng.
Technol., 2(10), 1-12.
12. M. S. Shetty, (2015) “Concrete Technology”, S. Chand &amp; Company PVT. Ltd., New Delhi Patel, V., & Shah, N. Durability-Key
Factor of New Generation Concrete Preparations.
13. Rawaa A.Al-Safy, (2015) “Experimental Investigation on Properties of Cement Mortar Incorporating Eggshell Powder”, Journal of
Engineering and Development, Vol. 19, pp. 198-209. Singh, D. E. V. I. N. D. E. R., & Singh, J. A. S. P. A. L. (2016). Use of agrowaste
in concrete construction. Int J Environ Ecol Family Urban Stud, 6(1), 119-130.
14. SP 16 : 1980, “Design Aids for Reinforced Concrete to IS : 456-1978”, Bureau of Indian Standards, New Delhi.
15. Varghese. P. C, (2015) “Limit State Design of Reinforced Concrete”, 2 nd edition, PHI Learning Private Limited, New Delhi.

Authors: Gurrala Chandrashekar Reddy, T.Jaya, Arun Raaza


Research Experimentation on Channel Characteristics with Different Channel Models for the
Paper Title:
Better Packet Delivery Ratio for the Auv Search Applications using Vbf Based Model
Abstract: Vector based forwarding (VBF) directing protocol is an area based vitality effective steering
convention intended for submerged acoustic sensor systems (UASNs). In this paper a VBF-enhanced directing
convention is proposed, which utilizes the data of area as well as the remaining vitality and the quantity of
retransmission in last cycle to settle on choice whether to make information sending. The channel attributes for
various channel models are examined and a superior parcel conveyance proportion is gotten. As per the
reproduction results, all the more equitably vitality utilization and solid information transmission are
accomplished in our proposed convention.

Keywords: UASN; routing protocol; VBF; reliability; energy efficiency.

References:

1. Shahrabi, and T. Boutaleb, “Void-handling tech-niques for routing protocols in underwater sensor networks: Survey and challenges,”
688. IEEE Communications Surveys & Tutorials, vol. 19, no. 2, 800–827, 2017.
2. F. Alfouzan, A. Shahrabi, S. M. Ghoreyshi, and T. Boutaleb, “Efficient depth-based scheduling mac protoco for underwater sensor 3985-
networks,” in Ubiquitous and Future Networks (ICUFN), 2017 Ninth InternationalConference on, pp. 827–832, IEEE, 2017. 39
3. S. Yoon and C. Qiao, “Cooperative search and survey using autonomous underwater vehicles (auvs),” IEEE Transactions on Parallel 89
and Dis-tributed Systems, vol. 22, no. 3, pp. 364–379, 2011.
4. Soomro, M. W., Memon, M. A., & Abro, M. I. (2012). Performance analysis of routing protocols in MANET with static and mobile
nodes using HTTP traffic. International Journal of Electronics and Communication Engineering (IJECE), 1(2), 23-31.
5. S. M. Ghoreyshi, A. Shahrabi, and T. Boutaleb, “An underwater rout-ing protocol with void detection and bypassing capability,” in
31stInternational Conference on Advanced Information Networking and Applications (AINA), Taipei, Taiwan, pp. 530–537, IEEE,
2017.
6. Sundaramurthy, A., & Chitra, V. (2016). Big data gathering in wireless sensor network using hybrid dynamic energy routing protocol.
BEST: International Journal of Management, Information Technology and Engineering (BEST: IJMITE), 4(4), 59-68.
7. S. M. Ghoreyshi, A. Shahrabi, and T. Boutaleb, “An inherently void avoidance routing protocol for
8. underwater sensor networks,” in TwelfthInternational Symposium on Wireless Communication Systems, Brussels, Belgium, pp. 1–6,
IEEE, 2016.
9. J. U. Khan and H.-S. Cho, “Data-gathering scheme using auvs in large-scale underwater sensor networks: A multihop approach,”
Sensors, vol. 16, no. 10, p. 1626, 2016.
10. Sutariya, D. (2016). Performance evaluation of multicast routing protocols in mobile ad hoc networks. In proceedings of International
Journal of Computer Networking, Wireless and Mobile Communications (IJCNWMC) (Vol. 6, No. 2, pp. 45-54).
11. Bhowmik, M. A. H. U. A., Dupalli, S. U. M. A., Saindane, D. H. A. N. A. S. H. R. I., & Murumkar, G. I. T. A. N. J. A. L. I. (2014).
Performance analysis of RF model of wireless sensor networks. Int. J. Res. Eng. Technol, 2, 1-8.
12. N. Javaid, N. Ilyas, A. Ahmad, N. Alrajeh, U. Qasim, Z. A. Khan, T. Liaqat, and M. I. Khan, “An efficient data-gathering routing
protocol for underwater wireless sensor networks,” Sensors, vol. 15, no. 11, 29149–29181, 2015.
13. M. Akbar, N. Javaid, A. H. Khan, M. Imran, M. Shoaib, and A. Vasi-lakos, “Efficient data gathering in 3d linear
14. underwater wireless sensor networks using sink mobility,” Sensors, vol. 16, no. 3, p. 404, 2016.
15. Y.-S. Chen and Y.-W. Lin, “Mobicast routing protocol for underwater sensor networks,” IEEE Sensors Journal, vol. 13, no. 2, pp. 737–
749, 2013.

Authors: Jetty Bangaru Siddhartha, T.Jaya, P Swaminathan


Development of Appropriate Under Water Channel Model for Limited Acoustic Network of
Paper Title:
Underwater Survey Application with Comparison of Rmac, Uwaloha and Uwanmac Algorithms
Abstract: Commonly UnderAqua Sensor Networks (UWSNs) comprise of sensor hubs that utilization acoustic
flag for information transmission. Because of the idea of the earth where these systems are conveyed, there is a
need to execute a dependable, vitality productive, and proliferation defer mindful MAC convention. In this
paper, the normal components influencing the execution of three dispute based MAC conventions for submerged
condition, RMAC, UWALOHA and UWANMAC, for example, normal start to finish deferral, throughput, and
generally speaking vitality utilization, are thought about and assessed. These conventions are actualized in a NS-
2 based test system, Aqua-Sim. In the reenactment, the measurements to be specific piece rate, number of hubs
and topology are fluctuated so as to assess the general MAC convention execution. For ideal execution,
UWANMAC gives greatest attractive quality. At the point when there is a requirement for more information to
be sent yet vitality utilization is of lesser significance, UWALOHA can be utilized.

Keywords: MAC protocols; RMAC; Underwater Sensor Networks; UWSN.

References:

1. v.kavitha, s,balaji, R.jeeva , “RMAC — A new encryption scheme for Arithmetic Coding to evade CCA attacks,” 2011 Third
International Conference on Advanced Computing
2. sumi A. Sarnad, S.K. Shenoy, G.Santhosh Kumar, “RMAC-M: Extending the R-MAC protocol for an energy efficient, delay tolerant
689. underwater acoustic sensor network application with a mobile data mule node” IEEE Communications Surveys & Tutorials, Vol. 16,
No. 3, Third Quarter 2014. 3990-
3. M. Keshtgary, R. Javidan, and R Mohammadi, “ RMAC- a reliable multicast MAC protocol for wireless ad hoc networks,” 2011 39
International Symposium on Ocean Electronics
4. W.Si , C.Li “Second preimage attack method on various MAC constructions and its application with AES-128.” International
93
Conference on Parallel Processing, 2004. ICPP 2004.
5. Rajaram, S.Balaji, R.Jeeva, “XRMAC-an extended RMAC scheme to evade hacking by dynamic sizing”, 2013 Fifth International
Conference on Advanced Computing (ICoAC)
6. Young-Shik Kim ; Jihong Lee ; Sung-Kook Park ; “Path tracking control for underactuated AUVs based on resolved motion
acceleration control,” 2009 4th International Conference on Autonomous Robots and Agents Sharma, U. K., & Kumawat, K. Multi-
Histogram Equalization using Error Back Propogation Network (MHEBPN).
7. Young Ik Kim ; Bum-Gon Choi ; Chang Seup Kim, “A synchronized MAC protocol considering packet generation intervals in wireless
sensor networks,” TENCON 2009 - 2009 IEEE Region 10 Conference
8. Surve, B., Kelotra, A., & Despande, M. Location Base-Monthwise Estimation of PV Module Power Output by using Neural Network
which Operates on Spatio-Temporal GIS Data.[8] S. Du ; A. K. Saha ; D. B. Johnson, "RMAC: A Routing-Enhanced Duty-Cycle
MAC Protocol for Wireless Sensor Networks
a. “IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications
b. Mayuri, A. V. R. Downlink Cochannel Interference Mitigation in Wireless Cellular Networks.
9. Jenith L. Banluta ; Lilet D. Balbuena MS-Comparison of contention-based MAC protocols for Underwater Sensor Networks”, 2017
International Conference on Information Networking (ICOIN) RMAC - A Routing-Enhanced Duty-Cycle MAC Protocol for Wireless
Sensor Networks Afolabi, I. T., Oni, A. A., & Worlu, R. E. (2014). An Empirical Analysis of Customer Satisfaction with Mobile
Network Service for Competitive Business Advantage. IMPACT: International Journal of Research in Business Management
(IMPACT: IJRBM).
10. Senthil.T ; Bifrin Samuel.Y, “Energy efficient hop extended MAC protocol for wireless sensor networks,” 2014 IEEE International
Conference on Advanced Communications, Control and Computing Technologies Pandya, A. U., Trapasiya, S. D., & Chinnam, S. S.
(2013). Comparative analysis of al-fec raptor and raptorq over 3gpp embms network. International Journal of Electronics and
Communication Engineering (IJECE), 2(2), 169-178.
Authors: Vankayalapati Nagaraju, T.Jaya, Arun Raaza
Development of Software Defined Radio Algorithm using Mimo OFDM for Short Range
Paper Title:
Communication
Abstract: In the recent past, the software defined radio (SDR) using Multiple-Input-Multiple-Output
Orthogonal Frequency Division Multiplex (OFDM) is implemented to improve the data rate and channel
estimation with high spectrum and maximum throughput for short range communication. The short range of
communication is established to communicate the data between different nodes placed in the appropriate
position using localization technique using SDR MIMO OFDM. The 256-M Array Quadrature Amplitude
Modulation (256 M-Ary Quartrature Amplitude Modulation) is applied to SDR MIMO OFDM to reduce
690. Modulation Error Rate (MER) for efficient transmission of data through SDR. The high data rate is achieved by
3994-
applying the beam-forming equalization technique by applying beam-forming between transmitter and receiver
40
of SDR. The Zero-forcing-beam-forming (ZFBF) equalizer is used in frequency domain to correlate transmitter
03
and receiver to improve the spectrum efficiency better. The synchronization error is reduced in the transceiver of
SDR by reducing Carrier Frequency Offset (CFO) mismatch and Sampling Time Offset (STO). The simulation
results have proved that the proposed algorithm have better performance in data rate improvement with
elimination of CFO mismatch problem to improve the spectrum efficiency and higher range of channel
estimation.

Keywords: SDR, short range communication, MIMO OFDM, ZFBF, CFO and SFO.
References:

1. Tore Ulversøy, “Software Defined Radio: Challenges and Opportunities”, IEEE COMMUNICATIONS SURVEYS & TUTORIALS,
VOL. 12, NO. 4, FOURTH QUARTER 2010.
2. Julien Perruisseau, “Versatile Reconfiguration of Radiation Patterns, Frequency and Polarization: a Discussion on the Potential of
Controllable Reflectarrays for Software-defined and Cognitive Radio Systems”, 978-1-4244-5753-3/10/$26.00 ©2010 IEEE.
3. P. M. Cabral, L. Cabria, J. A. Garcia2, and J. C. Pedro, “Polar Transmitter Architecture Used in a Software Defined Radio Context”,
978-1-4244-5753-3/10/$26.00 ©2010 IEEE.
4. Michael Inggs, Gordon Inggs, Alan Langman and Simon Scott, “Growing Horns: Applying the Rhino Software Defined Radio System
to Radar”, 978-1-4244-8902-2/11/$26.00 ©2011 IEEE.
5. Madhuram Mishra, Anjali Potnis, Prashant Dwivedy and Sunil Kumar Meena, “Software Defined Radio Based Receivers Using RTL -
SDR: A Review”, ISBN 978-1-5090-4760-4/17/$31.00©2017 IEEE.
6. Francois Rivet, Yann Deval, Jean-Baptiste Begueret, Dominique Dallet, Philippe Cathelinand Didier Belot, “From Software-Defined to
Software Radio: Analog Signal Processor Features”, 978-1-4244-2699-7/09/$25.00 ©2009 IEEE
7. Jayaram, K., Arun, C., & Sakthivel, B. Design Of Parallel Pipelined Feed Forward Architecture For Zero Frequency & Minimum
Computation (Zmc) Algorithm Of Fft.
8. William C. Liu, Kevin M. McNeill, Michael Cook and Basil Krikeles, “ADVANCED MODEL-BASED SOFTWARE
ENGINEERING TECHNOLOGIES FOR SOFTWARE
9. Jaggi, S. H. I. K. H. A., & Yadav, A. S. (2014). Distribution of ABO and Rh (D) Allele Frequency Among Four Endogamous
Populations of Haryana. International Journal of Research in Applied, Natural and Social Sciences, 2(2), 77-80
10. DEFINED RADIO CONFIGURATION”, The 2010 Military Communications Conference - Unclassified Program - Systems
Perspectives Track.

Authors: Ashima Sindhu Mohanty, Krishna Chandra Patra, Akshya Kumar Sahoo
Paper Title: Detection of Human Brain Activities in a Normal Human being
Abstract: Detection of artifacts produced in EEG data by eye blinks is a very common problem in EEG
research. In this paper we address the detection of eye blink artifacts in a motor imagery (MI) EEG data.
Artifacts are nothing but some kind of disturbances present in the brain signal whose origin is not the brain itself.
Detection of unwanted artifacts plays a crucial role to acquire artifact free and clean brain EEG signals to
analyze and detect brain activities. There are generally two ways of generation of artifacts. From a recorded
signal most common and important artifacts in the form of eye blinks are recognized and encapsulated. In this
paper a new software tool named BRAINSTORM is introduced for the detection of eye blink artifacts.

Keywords: EEG, MI data, artifacts, BRAINSTORM.


691.
References: 4004-
40
1. Sornmo L, Laguna P. Bioelectrical signal processing in cardiac and neurological applications, Elsevier Academic Press, 2005. ISBN: 0- 07
12-437552-9
2. Fisch, BJ. EEG PRIMER Basic principles of digital and analog EEG,3rd edition, Elsevier Academic Press, 1999. ISBN: 0-444-82147-3
3. Binnie C, Cooper R, Mauguire F, Osselton J, Prior P, Tedman B. Clinical Neurophysiology, Elsevier Academic Press, 2003. ISBN: 0-
444-51257-8
4. https://physionet.org/
5. Francois Tadel, Sylvain Baillet, John C.Mosher,Dimitrios Pantazis,and Richard M. Leahy. Brainstorm: A User-Friendly Application
for MEG/EEG Analysis. Hindawi Publishing Corporation, Computational Intelligence and Neuroscience Volume 2011, Article ID
879716, 13 pages doi:10.1155/2011/879716.
6. https://neuroimage.usc.edu/brainstorm
7. Antti Savelainen , An introduction to EEG artifacts, 63220J ,20 February 2010.
8. Vernon Lawherna, W. David Hairstonb, Kaleb McDowellb, Marissa Westerfieldc, Kay Robbinsa. Detection and classification of
subject-generated artifacts in EEG signals using autoregressive models. Journal of Neuroscience Methods 208 (2012) 181– 189
Authors: A. Muthusamy, Jansi Rani. P
The Development Rate and the Commitment of Different Chose Parts towards the Collision of
Paper Title:
FDI Inflow in India
Abstract: Post the monetary changes of 1991, the FDI course in India ended up simpler. Likewise, for a
creating nation some of the time residential sources may not be sufficient. Henceforth, outside capital can help
fill the holes between local reserve funds and speculation necessities. FDI is one of the vital devices of financial
development for a creating country like India. From this study, FDI inflow growth will be analyzed through the
various determinants like Metallurgical Industries, Mining, Power, Non-Conventional Energy, Coal Production,
Petroleum & Natural Gas, Boilers and Steam Generating Plants, Prime Mover (Other Than Electrical
Generators), Electrical Equipments, Computer Software & Hardware, Electronics, Tele Communications. For
692. analyzing the FDI inflow growth two stages least square analyze were used to analysis the data. The period of
the study was from 2000-2001 to 2016-2017. Model 1 and Model 2 shows the same result that there is a 4008-
significant relationship between FDI inflows and its determinants in India. The study exposed that the 40
comparison of two stages of least square regression analysis model 2 shows the perfect integrator's towards FDI 14
inflow growth in India. Metallurgical Industries, Power, Non-Conventional Energy, Boilers & Steam Generating
Plants, and Computer Software and Hardware sector were highly correlated with the growth of FDI at LOG
point of view so that the study concluded with model 2 has best for FDI inflow growth in India.

Keywords: FDI, Sector, Inflows, Least Square, Regression.

References:
1. Ahmed, H. (2014). Foreign Direct Investment in India. International Journal of Scientific Research, 2(6), 132–134.
https://doi.org/10.15373/22778179/june2013/43
2. Antwi, S., Fiifi, E., Atta, E., & Zhao, X. (2013). Impact of foreign direct investment on economic growth : Empirical evidence from
Ghana. 3(1), 18–25.
3. Approach, A. A. (2016). Impact of Foreign Direct Investment on Economic Growth of Pakistan-.
4. Awan, M. Z., Khan, B., & Zaman, K. (2011). Economic determinants of foreign direct investment ( FDI ) in commodity producing
sector : A case study of. 5(2), 537–545. https://doi.org/10.5897/AJBM10.767
5. Ayanwale, A. B. (2007). FDI and Economic Growth : Evidence from Nigeria By.
6. Bhattacharyya, R. (2015). The Opportunities and Challenges of FDI in Retail in India. 5(5), 99–109.
7. Chakraborty, C., Nunnenkamp, P., & Economy, W. (2008). Economic Reforms , FDI , and Economic Growth in India : A Sector Level
Analysis. 36(7), 1192–1212. https://doi.org/10.1016/j.worlddev.2007.06.014
8. Easterly, W., & Levine, R. (2016). The European origins of economic development. Journal of Economic Growth.
https://doi.org/10.1007/s10887-016-9130-y
9. Gupta, J., & Chaturvedi, R. (2017). A Study to Analyze FDI Inflow to India. 8(5), 44–52. https://doi.org/10.9790/5933-0805024452
10. Hanousek, J. (n.d.). CERGE-EI.
11. Khadraoui, N. (2013). International Journal of Advances in Management and Economics Available online at
www.managementjournal.info Financial Globalisation and Crisis Occurrence : Does Threshold Effect of Financial Development
Matter ? 2(1).
12. Kokko, A., Tansini, R., & Zejan, M. C. (n.d.). The Journal of Development Local technological capability and productivity spillovers
from FDI in the Uruguayan manufacturing sector. (April 2015), 37–41. https://doi.org/10.1080/00220389608422430
13. Lipsey, R. E. (2006). No Title.
14. Malhotra, B. (2014). Foreign Direct Investment: Impact on Indian Economy. Global Journal of Business Management and Information
Technology, 4(1), 2278–3679. Retrieved from http://www.ripublication.com/gjbmit/gjbmitv4n1_03.pdf
15. Masharu, U., & Nasir, M. A. (2018). Policy of foreign direct investment liberalisation in India: implications for retail sector.
International Review of Economics, 65(4), 465–487. https://doi.org/10.1007/s12232-018-0306-y
16. Merican, Y., Yusop, Z., Mohd Noor, Z., & Siong Hook, L. (2007). Foreign direct investment and the pollution in Five ASEAN nations.
International Journal of Economics and Management, 1(2), 245–261.
17. Ministry of Finance. (2018). Economic Survey of India 2017-18 Chapter 09: Services Sector. Retrieved from
http://mofapp.nic.in:8080/economicsurvey/pdf/152-166_Chapter_09_Economic_Survey_2017-18.pdf
18. Rao, K. S. C., & Dhar, B. (n.d.). India’s Recent Inward Foreign Direct Investment An Assessment Institute for Studies in Industrial
Development. Retrieved from http://isid.org.in
19. Sekar, K. (2015). Assessment of Impact of Foreign Direct Investment in India FDI in Banking and Finance. Journal of
Entrepreneurship & Organization Management, 04(01), 1–4. https://doi.org/10.4172/2169-026x.1000127
20. Singh, K., & Delhi, N. (2005). Foreign Direct Investment in India : A Critical Analysis of FDI from 1991-2005.
21. Title : “ The Scenario of FDI in Infrastructure of India ” Akinchan Buddhodev Sinha Education Officer Institute of Company
Secretaries of India New Delhi , India Email : akinchanbsinha@gmail.com Contact No : + 91-9393709307. (n.d.).
22. Tvaronavičiene, M., & Grybaite, V. (2010). Impact of FDI on Lithuanian economy : Insight into development of main economic
activities. 1699.
23. Tvaronavičiene, M., & Kalašinskaite, K. (2010). Whether globalization in form of FDI enhances national wealth : Empirical evidence
from Lithuania. 1699.

Authors: Nitin Kumar Sharma, Abhimanyu Nain, Kuldeep Singh, Nisha Rani, Anuj Singal

Paper Title: Impedimetric Sensors: Principles, Applications and Recent Trends


Abstract: This work figures the conceptual background of impedimetric measurements. Impedance
measurement is a convenient approach for exploring the change in electrical behavior of diverse materials. An
overview of in practice impedance analysis on CHI660D electrochemical work station is presented. Detection of
microorganism causing foodborne diseases using IDE and other methods, toxic metal ion quantification,
environment pollutant monitoring are described applications in this work. This work also reviewed the
noticeable development in impedance measurement devices based on AD5933 such as bio-impedance
measurement and explosive material detection. Biological signals are detected by transducing them into
electrical analogy, detection of which is not a big issue. The main challenges are to convert biological signal into
electrical information. Electrochemical sensors present captivating techniques to determine the content of
sample under test. Electrochemical sensing platforms come up with an appealing methodology to interpret the
concentration of biological sample as these sensors directly translate biological information to an electronic one.
Huge amount of sensing platforms and corresponding devices has been developed. EIS is a rapid and easily
computerized technique used to characterize biomolecules, inorganic materials, having a wide range of
applications. The measured impedance spectra are generally fitted to an analogous electrical circuit model which
693. constitutes an electrical documentation of the SUT by disclosing its behavior and properties. Quick, highly 4015-
selective/specific and sensitive techniques to quantify biological and biochemical molecules and other target 40
species are of great importance in biomedical and biotechnological application. Recent developments trends for 25
handy, portable, fast and precise impedance analyzer is discussed. AD5933 evolution kit is reviewed.

Keywords: AD5933, Biomolecules, CHI660d, EIS, Electrochemical sensors, IDE.

References:

1. Lee Y.H, Mutharasan R. (2005), Biosensors, Sensor Technology Handbook (pp. 161-180).
2. Thévenot DR, Toth K, Durst RA, Wilson GS. Electrochemical biosensors: recommended definitions and classification. Analytical
Letters. 2001 Mar 31;34(5):635-59.
3. Grieshaber D, MacKenzie R, Voeroes J, Reimhult E. Electrochemical biosensors-sensor principles and architectures. Sensors.
2008;8(3):1400-58. https://doi.org/10.3390/s80314000
4. Yang L, Bashir R. Electrical/electrochemical impedance for rapid detection of foodborne pathogenic bacteria. Biotechnology advances.
2008 Mar 1;26(2):135-50.
5. Stradiotto NR, Yamanaka H, Zanoni MV. Electrochemical sensors: a powerful tool in analytical chemistry. Journal of the Brazilian
Chemical Society. 2003 Apr;14(2):159-73.
6. Bhalla N, Jolly P, Formisano N, Estrela P, Introduction to Biosensors, Eassy in BioChemistry, 2016.
7. Yilong Z, Dean Z, Daoliang L. Electrochemical and other methods for detection and determination of dissolved nitrite: A review. Int. J.
Electrochem. Sci. 2015 Feb 1;10:1144-68.
8. Grossi M, Riccò B. Electrical impedance spectroscopy (EIS) for biological analysis and food characterization: a review. Journal of
Sensors and Sensor Systems. 2016;6:303-25.
9. Park SM, Yoo JS. Peer reviewed: electrochemical impedance spectroscopy for better electrochemical measurements
10. Daniels JS, Pourmand N. Label‐free impedance biosensors: Opportunities and challenges. Electroanalysis: An International Journal
Devoted to Fundamental and Practical Aspects of Electroanalysis. 2007 Jun;19(12):1239-57.
11. Ruan C, Yang L, Li Y. Immunobiosensor chips for detection of Escherichia coli O157: H7 using electrochemical impedance
spectroscopy. Analytical Chemistry. 2002 Sep 15;74(18):4814-20.
12. Guan JG, Miao YQ, Zhang QJ. Impedimetric biosensors. Journal of bioscience and bioengineering. 2004 Jan 1;97(4):219-26.
13. Wang X, Zhao Z, Wang Y, Lin J. A Portable Impedance Detector of Interdigitated Array Microelectrode for Rapid Detection of Avian
Influenza Virus. InInternational Conference on Computer and Computing Technologies in Agriculture 2014 Sep 16 (pp. 247-256).
Springer, Cham.
14. Dong J, Zhao H, Xu M, Ma Q, Ai S. A label-free electrochemical impedance immunosensor based on AuNPs/PAMAM-MWCNT-Chi
nanocomposite modified glassy carbon electrode for detection of Salmonella typhimurium in milk. Food chemistry. 2013 Dec
1;141(3):1980-6.
15. Ghosh Dastider S, Barizuddin S, Yuksek NS, Dweik M, Almasri MF. Efficient and rapid detection of Salmonella using microfluidic
impedance based sensing. Journal of Sensors. 2015;2015.
16. Li Y, Zhao M, Wang H. Label-free peptide aptamer based impedimetric biosensor for highly sensitive detection of TNT with a ternary
assembly layer. Analytical and bioanalytical chemistry. 2017 Nov 1;409(27):6371-7.
17. Pal N, Sharma S, Gupta S. Sensitive and rapid detection of pathogenic bacteria in small volumes using impedance spectroscopy
technique. Biosensors and Bioelectronics. 2016 Mar 15;77:270-6. https://doi.org/10.1016/j.bios.2015.09.037
18. Zulkifli SN, Rahim HA, Lau WJ. Detection of contaminants in water supply: A review on state-of-the-art monitoring technologies and
their applications. Sensors and Actuators B: Chemical. 2018 Feb 1;255:2657-89.
19. Jasim I, Shen Z, Mlaji Z, Abdullah A, Liu J, Ghosch S, El-Dweik M, Zhang S, Almasri M. An impedance biosensor for simultaneous
detection of low concentration of Salmonella serogroups in poultry and fresh produce samples. Biosensors and Bioelectronics. 2019
Feb 1;126:292-300.
20. Li Q, Yang Y, Hu F, Cai Y, Liu X, He X. Rapid detection of Escherichia coli O157: H7 by a fluorescent microsphere-based
immunochromatographic assay and immunomagnetic separation. Analytical biochemistry. 2019 Jan 1;564:32-9.
21. Mazlan NS, Ramli MM, Abdullah MM, Halin DS, Isa SS, Talip LF, Danial NS, Murad SA. Interdigitated electrodes as impedance and
capacitance biosensors: A review. InAIP Conference Proceedings 2017 Sep 26 (Vol. 1885, No. 1, p. 020276). AIP Publishing.
22. Pandey A, Gurbuz Y, Ozguz V, Niazi JH, Qureshi A. Graphene-interfaced electrical biosensor for label-free and sensitive detection of
foodborne pathogenic E. coli O157: H7. Biosensors and Bioelectronics. 2017 May 15;91:225-31.
23. Yang L, Li Y, Erf GF. Interdigitated array microelectrode-based electrochemical impedance immunosensor for detection of
Escherichia c oli O157: H7. Analytical chemistry. 2004 Feb 15;76(4):1107-13. https://doi.org/10.1021/ac0352575
24. Ribeiro DV, Abrantes JC. Application of electrochemical impedance spectroscopy (EIS) to monitor the corrosion of reinforced
concrete: a new approach. Construction and Building Materials. 2016 May 15;111:98-104.
25. Hamdy AS, El-Shenawy E, El-Bitar T. Electrochemical impedance spectroscopy study of the corrosion behavior of some niobium
bearing stainless steels in 3.5% NaCl. International Journal of Electrochemical Science. 2006 Aug 1;1(4):171-80.
26. Shitanda I, Okumura A, Itagaki M, Watanabe K, Asano Y. Screen-printed atmospheric corrosion monitoring sensor based on
electrochemical impedance spectroscopy. Sensors and Actuators B: Chemical. 2009 Jun 4;139(2):292-7.
27. Goudar SK, Das BB, Arya SB. Combined Effect of Marine Environment and pH on the Impedance of Reinforced Concrete Studied by
Electrochemical Impedance Spectroscopy. InSustainable Construction and Building Materials 2019 (pp. 635-649). Springer,
Singapore.
28. Gomes MP, Costa I, Pébère N, Rossi JL, Tribollet B, Vivier V. On the corrosion mechanism of Mg investigated by electrochemical
impedance spectroscopy. Electrochimica Acta. 2019 Mar 14. https://doi.org/10.1016/j.electacta.2019.03.080
29. Shi L, Liang G, Li X, Liu X. Impedimetric DNA sensor for detection of Hg 2+ and Pb 2+. Analytical Methods. 2012;4(4):1036-40.
https://doi.org/10.1021/ac2014096
30. Avuthu SG, Narakathu BB, Eshkeiti A, Emamian S, Bazuin BJ, Joyce M, Atashbar MZ. Detection of heavy metals using fully printed
three electrode electrochemical sensor. InSENSORS, 2014 IEEE 2014 Nov 2 (pp. 669-672). IEEE.
31. Petovar B, Xhanari K, Finšgar M. A detailed electrochemical impedance spectroscopy study of a bismuth-film glassy carbon electrode
for trace metal analysis. Analytica chimica acta. 2018 Apr 3;1004:10-21. https://doi.org/10.1016/j.aca.2017.12.020
32. Patil HK, Deshmukh MA, Bodkhe GA, Shirsat MD. Sensitive detection of heavy metal ions: An electrochemical approach.
International Journal of Modern Physics B. 2018 Jul 30;32(19):1840042.
33. Bansod B, Kumar T, Thakur R, Rana S, Singh I. A review on various electrochemical techniques for heavy metal ions detection with
different sensing platforms. Biosensors and Bioelectronics. 2017 Aug 15;94:443-55.
34. Cao RG, Zhu B, Li J, Xu D. Oligonucleotides-based biosensors with high sensitivity and selectivity for mercury using electrochemical
impedance spectroscopy. Electrochemistry Communications. 2009 Sep 1;11(9):1815-8.
35. Wei Y, Yang R, Zhang YX, Wang L, Liu JH, Huang XJ. High adsorptive γ-AlOOH (boehmite)@ SiO 2/Fe 3 O 4 porous magnetic
microspheres for detection of toxic metal ions in drinking water. Chemical Comm. 2011;47(39):11062-4.
36. Gumpu MB, Sethuraman S, Krishnan UM, Rayappan JB. A review on detection of heavy metal ions in water–an electrochemical
approach. Sensors and actuators B: chemical. 2015 Jul 5;213:515-33.
37. Wuana RA, Okieimen FE. Heavy metals in contaminated soils: a review of sources, chemistry, risks and best available strategies for
remediation. Isrn Ecology. 2011 Oct 24;2011.
38. Ferreira J, Seoane F, Ansede A, Bragos R. AD5933-based spectrometer for electrical bioimpedance applications. InJournal of Physics:
Conference Series 2010 (Vol. 224, No. 1, p. 012011). IOP Publishing.
39. Chang BY, Park SM. Electrochemical impedance spectroscopy. Annual Review of Analytical Chemistry. 2010 Jul 19;3:207-29.
https://doi.org/10.1146/annurev.anchem.012809.102211
40. Ghaffari S, Caron WO, Loubier M, Rioux M, Viens J, Gosselin B, Messaddeq Y. A wireless multi-sensor dielectric impedance
spectroscopy platform. Sensors. 2015 Sep;15(9):23572-88.
41. Hefele M, Wirths W, Brischwein M, Grothe H, Kreupl F, Wolf B. Measuring fluorescence-lifetime and bio-impedance sensors for cell
based assays using a network analyzer integrated circuit. Biosensors and Bioelectronics. 2019 Mar 15;129:292-7.
42. Pliquett U, Barthel A. Interfacing the AD5933 for bio-impedance measurements with front ends providing galvanostatic or
potentiostatic excitation. InJournal of Physics: Conference Series 2012 (Vol. 407, No. 1, p. 012019). IOP Publishing.
http://dx.doi.org/10.1088/1742-6596/407/1/012019
43. Al-Ali A, Elwakil AS, Ahmad A, Maundy B. Design of a Portable Low-Cost Impedance Analyzer. InBIODEVICES 2017 Feb (pp.
104-109).
44. Garcia A, Sabuncu AC. Electrical System for Bioelectric Impedance using AD5933 Impedance Converter. SMU Journal of
Undergraduate Research. 2019;2(1):3.
45. AD5933 Evolution board user guide UG-364, Analog Devices https://www.analog.com/media/en/technical-documentation/user-
guides/UG-364.pdf
46. Hussain J, Husain I, Arif M, Gupta N. Studies on heavy metal contamination in Godavari river basin. Applied Water Science. 2017
Dec 1;7(8):4539-48.
47. Hu W, Min X, Li X, Yang S, Yi L, Chai L. DNAzyme catalytic beacons-based a label-free biosensor for copper using electrochemical
impedance spectroscopy. Rsc Advances. 2016;6(8):6679-85. http://dx.doi.org/10.1039/C5RA20641C
48. Zhang D, Jiang J, Chen J, Zhang Q, Lu Y, Yao Y, Li S, Liu GL, Liu Q. Smartphone-based portable biosensing system using impedance
measurement with printed electrodes for 2, 4, 6-trinitrotoluene (TNT) detection. Biosensors and Bioelectronics. 2015 Aug 15;70:81-8.

Authors: Sangeeta Gupta, Ashwani Kumar

Paper Title: Secret Image Digitization Over Public Cloud Through Cbtv Based Image Fusion
Abstract: Data security in the modern world is a challenging aspect faced by common man in almost every
field-either technical or non-technical. Particularly in Public Clouds where the data is openly available across the
internet, customers are not much exposed to the working environment and the diverse spread of data across
world wide geographic locations. Intruders attempt to misuse this data to serve their own commercial purpose.
The government of India proposed NAD (National Academic Depository) which is a secure zone for people to
deposit their valuable certificates rather than carrying to places. Towards this end, the goal of current work is to
strengthen the security of certificates being loaded into the depositories by applying Image fusion technique
through CBTV (Cloud Based Threshold Value). The proposed method gives a unique solution to prove
authenticity of users by generating the secret image using image fusion technique integrated with public key
infrastructure on the cloud prior to outsourcing. This is particularly useful to protect the patient health care
reports to hide the disease description etc, which may otherwise have unintended consequences. The entire
fusion is not disclosed at the cloud server end. The performance of the proposed approach, can be measure by
calculating the robustness of the secret image (fused image) against different types of image processing attacks
such as salt & pepper noise, Gaussian noise, JPEG compression, speckle noise, geometric noise etc. is calculated
while stored at the cloud and effective results are achieved.

Keywords: Image fusion, Cloud computing, National academic Depository, Cloud based threshold value.

References:

1. National Academic Depository (NAD), (2016, October 27 ) Available: http://nad.gov.in/


2. CVL is a subsidiary of Central Depository Services Limited (CDSL), which is a leading security depository in the country, (2017)
Available: https://www.cvlindia.com
3. NDML is a subsidiary of National Securities Depository Limited (NSDL), Ministry of Human Resources Development and University
Grants Commission, (2017, July) Available: https://nad.ndml.in
4. Armbrust M, Fox A, Griffith R, Joseph A.D, Katz R, Konwinski A, Lee G., Patterson D, Rabkin A, Stoica I, & Zaharia M, A view of
cloud computing, In: Communications of the ACM, Vol. 53, No. 4, pp. 50–58, April, 2010.
5. Mukosi A, Mukwevho, & Celik, T. Toward A Smart Cloud: A Review Of Fault-Tolerance Methods In Cloud Systems, in IEEE
Transactions on Services Computing, pp. 1-18, March 2018.
6. Z. Xia, X. Wang, L. Zhang, Z. Qin, X. Sun, and K. Ren, A privacy-preserving and copy–deterrence content-based image retrieval
scheme in cloud computing, IEEE Trans. Inf. Forensics Security, Vol .11, No. 11, pp. 2594–2608, July 2016.
7. Kumar A., Paras Jain, Jabir Ali, Shrawan Kumar, G. John Samuel Babu, A Lightweight Buyer-Seller Watermarking Protocol Based On
Time-Stamping and Composite Signal Representation”, International Journal of Engineering & Technology, Vol. 7, No. 4.6, pp. 39-41,
694. 2018. 4026-
8. Kumar A., Satya Prakesh Ghrera, & Vipin Tyagi, Modified Buyer Seller Watermarking Protocol based on Discrete Wavelet Transform
and Principal Component Analysis, Indian Journal of Science and Technology, Vol. 8, No. 35, pp. 1-9, December 2015. 40
9. Kumar A., Satya Prakesh Ghrera, & Vipin Tyagi, A new and efficient buyer-seller digital Watermarking protocol using identity based 31
technique for copyright protection, Third International Conference on Image Information Processing (ICIIP), Waknaghat, India, pp.
531-535, Dec. 2015.
10. Ashwani Kumar, Satya Prakesh Ghrera, & Vipin Tyagi, Implementation of wavelet based modified buyer-seller watermarking
protocol, WSEAS Transactions On Signal Processing. Vol. 10, No. 1, pp. 212-220, 2014.
11. Kumar, Ashwani, Design of Secure Image Fusion Technique Using Cloud for Privacy-Preserving and Copyright Protection,
International Journal of Cloud Applications and Computing (IJCAC), Vol. 9, No. 3, pp. 22-36, July-September 2019.
12. Ashwani Kumar, Sangeeta Gupta, A Secure Technique of Image Fusion Using Cloud Based Copyright Protection for Data Distribution,
2018 IEEE 8th International Advance Computing Conference (IACC), Greater Noida, India, pp. 14-15 Dec. 2018.
13. Aishwary K. Pandey, Priyanka Singh, Nishant Agarwal, Balasubramanian Raman, SecMed: A secure approach for proving rightful
ownership of medical images in encrypted domain over cloud, In IEEE Conference on Multimedia Information Processing and
Retrieval, Miami, FL, USA, pp. 390-395, April 2018.
14. Tchernykh, A., Schwiegelsohn, U., Talbi, E.g., & Babenko, M, Towards understanding uncertainty in cloud computing with risks of
confidentiality, integrity, and availability. Journal of Computational Science. JOCS, 581, pp.1-9, November 2016.
15. Gupta., S., & Narsimha., G, Secure Nosql for the social networking and e-commerce based big data applications deployed in cloud,
International Journal of Cloud Application and Computing, Vol. 8, No. 2, pp. 113-129, April-June 2018.
16. Memon, N., & Wong, P.W, A buyer-seller watermarking protocol. IEEE Transactions on Image Processing, Vol. 10, No. 4, pp. 643–
649, Apr 2001.
17. Subramanyam, A.V., Emmanuel, S., & Kankanhalli, M.S, Robust watermarking of compressed and encrypted jpeg2000 images, IEEE
Transactions on Multimedia, Vol. 14, No. 4, pp. 703-716, December 2011.
18. Sverdlov, A., Dexter, S., & Eskicioglu, A.M, Robust DCT-SVD Domain Image Watermarking for Copyright Protection: Embedding
Data in All Frequencies. 13th European Signal Processing Conference, Antalya, Turkey, pp.1-4, Sept. 2005.
19. Lai, C.C., Tsai, & C.C, Digital Image Watermarking Using Discrete Wavelet Transform and Singular Value Decomposition. IEEE
Transactions on Instrumentation and Measurement, Vol. 59, No. 11, pp.3060-3063, September 2010.
20. Gupta S., & Bhattacharya., S, Invisible watermarking using a novel MRA based Image Fusion method. in proceeding of Annual IEEE
India Conference (INDICON), Kochi, India, pp. 567-571, Dec. 2012.
21. Kumar A., Ghrera S.P., Tyagi V, A Comparison of Buyer-Seller Watermarking Protocol (BSWP) Based on Discrete Cosine Transform
(DCT) and Discrete Wavelet Transform (DWT), In: Satapathy S., Govardhan A., Raju K., Mandal J. (eds) Emerging ICT for Bridging
the Future - Proceedings of the 49th Annual Convention of the Computer Society of India (CSI) Volume 1. Advances in Intelligent
Systems and Computing, vol 337. Springer, Cham, pp. 401-408, 2015.
22. Kumar., A., Ghrera., S.P., & Tyagi., V, An ID-based Secure and Flexible Buyer-seller Watermarking Protocol for Copyright
Protection. Journal of Science & Technology Pertanika, Vol. 25, No. 1, pp. 57 – 76, January 2017.
23. Agarwal., J., & Beedi., S. S, Implementation of hybrid image fusion technique for feature enhancement in medical diagnosis, Human-
centric Computing and Information Sciences, Vol. 5, No. 1, pp. 1-17, February 2015.
24. Yoonsuk Choi, Ershad Sharifahmadian, Shahram Latifi, Quality Assessment of Image Fusion methods in transform domain,
International Journal on Information Theory (IJIT), Vol.3, No.1, pp. 7-18, January 2014.
25. M. Marwan, A. Kartit, and H. Ouahmane, Using cloud solution for medical image processing: Issues and implementation efforts, 3rd
International Conference of Cloud Computing Technologies and Applications (CloudTech), Rabat, Morocco, pp. 1–7, Oct. 2017.
26. Zhan Qin, Jian Weng, Yong Cui, Kui Ren, Privacy-Preserving Image Processing in the Cloud In: IEEE Cloud Computing, Vol. 5,pp.
48-57, January 2018.

Authors: Ashok More, Santosh More

Paper Title: Enriched Rapid Composting Techniques for Agro Industrial Organic Solid Waste

Abstract: The main aim of this project based paper is to provide technological solution for composting process
with will help to minimize the composting process and the technology will be easy to adopt. We are facing waste
management problems in all areas. Agriculture and Industrial waste management is one of them. There are lot of
methodologies available in the market for processing the raw material and making compost. The various
methods differ location to location and season to season. The researchers are doing continuous research on the
process optimization and to find minimum time to produce compost. Thus, a sound technology is required to
improve the quality of manures in the shortest possible time, where farmers can prepare the compost easily and
improve its nutritional quality by the addition of cheap amendments as additives in composting. Therefore
appropriate composting technology which is economically viable, eco-friendly and socially acceptable is
essential. Development of Rapid composting techniques to produce organic fertilizers will help to minimize soil
pollution due to chemical fertilizers and will help in Agricultural and Industrial organic solid waste management.
We have done few experiments on accelerating composting processes. Use of activated sludge with other
additives have helped to improve compost process time and its nutrients. In this paper we have given detail
methodology and results obtained from the experiments.

Keywords: Organic Manure, Rapid Composting, Additives in compost. Organic waste management.

References:

1. The science of composting – eBook.


2. The Art and Science of Composting: A resource for farmers and compost producers.
695. 3. Composting and Its Applicability in Developing Countries - Daniel Hoornweg, Laura Thomas, and Lambert Otten Published for the
Urban Development Division The World Bank, Washington DC. 4032-
4. Additives aided composting of green waste: Effects on organic matter, degradation, compost maturity, and quality of the finished 40
compost - Jagdish Gabhane, National Environmental Engineering Research Institute.
5. Rapid composting technology in the Philippines
36
its role in producing good-quality organic fertilizers - Virginia C. Cuevas, Institute of Biological Sciences (IBS), College of Arts and
Sciences, University of the Philippines
6. Comparative Evaluation of Compost Quality, Process Convenience and Cost under Different Composting Methods to assess their
Large Scale Adoptability Potentials also Complemented by Compost Quality Index - Bera, R, Inhana Organic Research Foundation,
Kolkata, India
7. International Journal of Scientific and Research Publications, Volume 3, Issue 6, June 2013 9 ISSN 2250-3153
8. A Literature Review on the Composting, Saleh Ali Tweib, Dept of Chemical Engineering, University Kebangsaan Malaysia
9. Rapid production of organic fertilizer from degradable waste by thermochemical processing C. R. Sudharmaidev, Int J Recycl Org
Waste Agricult
10. Characterization and Recycling of Organic Waste after Co-Composting − A Review Z. Anwar, M. Irshad, Institute of Information
Technology, Abbottabad, Pakistan
11. Rapid Composting Methods-IISC, Indian Institute of Soil Science (Indian Council of Agricultural Research) Nabibagh, Berasia Road,
Bhopal-462038 (M.P.)
12. Financial sustainability of modern composting: the economically optimal scale for municipal waste composting plant in developing
Asia - Andante Hadi Pandyaswargo, Dickella Gamaralalage, Jagath Premakumara.
13. Compost quality standards & guidelines by William F. Brinton, Ph.D. Woods End Research Laboratory, US. Project Manager
14. Institute of Biological Sciences (IBS) Rapid Composting Technology
15. IJSE – May 2014, vol 5, issue 5.
16. IJSR – Vol. 3, issue 6, June 2013.
17. IJCR – Vo. 3, Issue 12, Dec 2011
18. http://compostingcouncil.org/
19. http://www.homecompostingmadeeasy.com/
20. https://www.gardeningknowhow.com
21. https://homeguides.sfgate.com/composting-nitrogen-phosphorus-71777.html
22. https://ag.umass.edu/vegetable/fact-sheets/compost-use-soil-fertility
23. http://www.ijirset.com/upload/2014/february/90_Characterization.pdf.

Authors: Pratik Ghosh, Ratna Banerjee, Vinay Kandpal, Jacob T. Verghese


Process Map of a Unified Data Platform for Operational Intelligence and Analysis of Power
Paper Title:
Sector
Abstract: The research tries to define “Process Map” for a Unified Data Platform for the power sector and its
interoperations. Data mining and analytics are playing a key role in every modern industrial and process system.
The tremendous growth in the field of information technology, communication protocols and support of high
performing processors of modern day computer has led to a layer of data and information which can be utilized
696. for management and operational excellence. The different data system, communication protocols, hardware and
4037-
software applications were studied to identify the factors for designing the process map.The information layer
40
added to the conventional power sector network is studied which is an ever increasing source of data. Additional
46
data is being added by the new generation smartgrid with its automation system that are having numerous
sensors embedded in the existing power system for controlling, monitoring and operational activities. The
research was important as the last few decades have seen an organic growth in the power sector data which
needs a defined framework and process map for Operational Intelligence and Analysis.
Keywords: Process Linking, Extensible Unified System, Information Technology, Data Platform, Design
Engineering.

References:

1. R. Bonetto and M. Rossi, “Smart grid for the smart city,” in Designing, Developing, and Facilitating Smart Cities. Springer, 2017, pp.
241–263.
2. S. G. C. CEN-CENELEC-ETSI, “Group.(2012),” Smart Grid Reference Architecture, pp. 1–107, 2012
3. M. Eremia, L. Toma, and M. Sanduleac, “The smart city concept in the 21st century,” Procedia Engineering, vol. 181, pp. 12–19, 2017
4. K. Geisler, “The relationship between smart grids and smart cities,”IEEE newsletter, May, 2013
5. “IEC61850, IEC61400-25, and IEC 61970: Information model and information exchange for electrical power systems”, Schwarz
consulting company Germany
6. NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 1.0, National Institute of Standards and
Technology, Jan 2010
7. A Brief History of Data Visualization, Friendly, Michael, Handbook of Data Visualization, Springer Handbooks, 2008.
8. A Personal Data Store for an Internet of Subjects, Kirkham, T., S. Winfield, S. Ravet, and S. Kellomaki, International Conference on
Information Society, 2011
9. A promising phenomenon of open data: A case study of the Chicago open data project, Government Information Quarterly, Kassen,
Maxat, 2013.
10. Acting on the Deluge of Newly Created Automation Data: Using Big Data Technology and Analytics to Solve Real Problems, CJ
Parisi, Dr. Siri Varadan, P.E., and Mark Wald, Utility Integration Solutions, Inc. (UISOL), 2014
11. Addressing the Big Data Concern in the Utilities Sector, Bret Farrar and Mark Luigs
12. Al-Tuaimeh, Samia Fares. "Building a Proposed Model for Supply Chain Decisions Support System in Express Shipping Companies in
Jordan : A Comparative Analysis Study", Middle East University, 2011
13. Analytics in Action: Breakthroughs and Barriers on the Journey to ROI, Accenture, 2013
14. Big data can drive big energy savings, Supplement to Control Engineering
15. Big Data Challenges to Validate Safe, Secure Energy Infrastructure, Brent G. Stanley, Chief Operating Officer, Haystac LLC, Boston,
MA
16. Big Data Creates Predictive Maintenance Opportunities, Jim Chappell, InStep Software, ELP.com
17. Big Data deluge threatens utilities, Keith Harrison, Utilities Unbundled – E&Y, 2012
18. Big Data Spectrum and Architecture, Infosys
19. Big Data, Big Impact: New Possibilities for International Development, World Economic October 2013.
20. Big Data: The Next Frontier for Innovation, Competition, and Productivity | McKinsey & Company. McKinsey & Company, Manyika,
James, Michael Chui, Brad Brown, Jacques Bughin, Richard Dobbs, Charles Roxburgh, and Angela Hung Byers May 2011.
21. Brave New Open Data World?” International Journal of Spatial Data Infrastructures Research, Kulk, Stefan and Bastiaan Van Loenen,
May 2012.
22. Broken Promises of Privacy: Responding to the Surprising
23. Combining Social and Government Open Data for Participatory Decision-Making, Kalampokis, Evangelos, Michael Hausenblas, and
Konstantinos Tarabanis, edited by Efthimios Tambouris, Ann Macintosh, and Hans de Bruijn, 2011.
24. Data Management and Analytics for Utilities, Jason Deign and Carlos Márquez Salazar, Research manager
25. Demand Side Management, Infosys
26. Demystifying Big Data: A Practical Guide to Transforming the Business of Government, TechAmerica Foundation’s Federal Big Data
Commission, 2013.
27. Designing the Personal Data Stream: Enabling Participatory Privacy in Mobile Personal Sensing, Shilton, Katie, Jeff Burke, Deborah
Estrin, Ramesh Govindan, Mark Hansen, Jerry Kang, and Min Mun. 2009.
28. Digital Fuel of the 21st Century: Innovation through Open Data and the Network Effect, Kundra, Vivek, Joan Shorenstein Center on
the Press, Politics and Public Policy, Harvard College: Discussion Paper Series, January 2012.
29. Do You See What I Mean? [Data Visualization], IEEE Computer Graphics and Applications (2005)
30. Duke, D.J., K.W. Brodlie, D.A. Duce, and I. Herman.
31. Economics of Power Sector – 2015 by Anoop Singh
32. For better energy management, tap into your data historian, Sidney Hill, Jr., is a CFE Media Contributing Content Specialist,
Supplement to Control Engineering
33. From Data to Decisions II: Building an Analytics Culture, The Partnership for Public Service and the IBM Center for The Business of
Government, October 2012.
34. How utilities are profiting from Big Data Analytics, Article in Engineering & Technology Magazine 20 January 2014 Martin Courtney
35. IBM Energy Management, Brad Brech
36. Information Management and Big Data A Reference Architecture, Oracle Whitepaper 2013
37. Innovations Reshaping the Energy Efficiency Market, report by Greentech Efficiency, 2013
38. Intelligent Efficiency: Innovations Reshaping the Energy Efficiency Market, Stephen Lacey, June 2013
39. J. P. Conti, “Let the grid do the thinking”, IET Power Engineer, April - May 2006, Vol. 20, pp. 34-37
40. Jeffrey D.Taft, “Blueprint for the intelligent powergrid in the electric utility of the future, Executive overview”, IBM
41. Linked Open Government Data: Lessons from Data.gov.uk, IEEE Intelligent Systems (May 2012), Shadbolt, Nigel, Kieron O’Hara,
Tim Berners-Lee, Nicholas Gibbins, Hugh Glaser, Wendy Hall, and m.c. schraefel.
42. Managing big data for smart grids and smart meters, IBM Whitepapers, 2012
43. Maximizing the Returns from Big Data, Debasish Mukherjee and Karthik Krishnamurthy, Cognizanti bi-annual journal produced by
Cognizant
44. Oracle Utilities Analytics, Oracle
45. Oracle Utilities Operational Solutions, Oracle Operational Excellence
46. Power From Big Data - are europe’s utilities ready for the age of data? , Andrew Bilecki, chief information officer, UK Power
Networks, UK, Stephen Fitzpatrick, chief executive officer, Ovo Energy, UK, Ben van Gils, leader, Global Power and Utilities Centre,
Ernst & Young, Europe Eirik Gundegjerde, executive vice president, Smart Utility and Business Development, Lyse Energi, Norway
Olaf Köppe, partner, KPMG, Germany Philip Lowe, director general for Energy, European Commission, Belgium Andrew Richards,
severe risk analyst, National Grid, UK, Claes Wallnér, head of information technology, Vattenfall, Sweden, T-Systems Research, 2013
47. Power Grid Corporation of Indian Limited, “Unified Load Despatch & Communications Scheme”
48. Richard Soley, “Model Driven Architecture”, Object Management Group, White Paper
49. Role of Interoperability in the Indian Power Sector by Yemula Pradeep and Abhiroop Medhekar, Science, 2013
50. Sensor Information Fueling Open Data, Oliver, M., M. Palacin, A. Domingo, and V. Valls, Computer Software and Applications
Conference Workshops, IEEE, 2012.
51. Six Provocations for Big Data, Boyd, Danah, and Crawford, Kate, 2013.
52. Smart Analytics for the Utility Sector, Business Analyst – Capgemini, 2012
53. Smart Analytics Improve Operations, Reduce Risk, Story by Samuel Glasser, Black & Veatch, Jennifer James, Scott Stallard, Jeff
Neemann, Rob Young
54. Smart Cities at the Forefront of the Future Internet, Hernández-Muñoz, José M., Jesús Bernat Vercher, Luis Muñoz, José A. Galache,
Mirko Presser, Luis A. Hernández Gómez, and Jan Pettersson.
55. Smart Cities Built on Resilient Cloud Computing and Secure Internet of Things, Suciu, G., A. Vulpe, S. Halunga, O. Fratu, G.
Todoran, and V. Suciu, 2013 19th International Conference on Control Systems and Computer Science, 2013.
56. Smart Cities of the Future, Batty, M., K. W. Axhausen, F. Giannotti, A. Pozdnoukhov, A. Bazzani, M. Wachowicz, G. Ouzounis, and
Y. Portugali, November 2012.
57. Smart Grid Analytics: All That Remains to be ready is You, Elliott McClements, IBM Krishan Gupta
58. The 2013 OECD Privacy Guidelines. OECD, 2013.
59. The Case for an Industrial Big Data Platform, GE
60. The Deciding Factor: Big Data & Decision Making, Capgemini Whitepaper
61. The Evolution of Big Data as a Research and Scientific, Gali Halevi, MLS, PhD, Dr. Henk Moed, 30th issue of Research Trends
62. The Industrial Internet and Big Data Analytics: Opportunities and Challenges, Jeff Kelly, August 2013
63. The Promise and Peril of Big Data, Bollier, David, The Aspen Institute, 2010
64. The Semantic Web, Scientific American (2001), Berners-Lee, Tim, James Hendler, and Ora Lassila.
65. THE SOFT GRID 2013-2020: Big Data & Utility Analytics for Smart Grid, GTM and SAS Global Research
66. The Use of Data Visualization in Government, IBM Center, Stowers, Genie, 2013.
67. Transforming Energy & Utilities with Big Data Analytics, David Shipman Industry Marketing Manager - Energy & Utilities, IBM,
2012
68. Turn Big Data Into Budget Dollars, Allison Hannon, Co founder, Root3 Technologies; and Sumit Ray, director of utilities and
engineering, University of Chicago, June 2013
69. Understanding Smart Data Disclosure Policy Success: The Case of Green Button, Sayogo, Djoko Sigit, and Theresa A. Pardo, 14th
Annual International Conference on Digital Government Research, 2013.
70. Utilities and Big Data: A Seismic Shift is Beginning, An Oracle Utilities White Paper September 2013
71. Utilities and Big Data: Accelerating the Drive to Value, Study by Oracle
72. Utilities Dumbstruck By Big Data From Smarter Grid, Jeff McMahon, Sep 2013
73. Visualization Tools for Open Government Data, Graves, Alvaro, and James Hendler, Annual International Conference on Digital
Government Research, 2013.
74. What's All the Hype about Big Data and Energy Analytics?, Jack McGowan, CEM, DGCP, is president of Energy Control Inc. (ECI),
an Optera Energy Company, and chairman emeritus of the DOE'S GridWise Architecture Council.

Authors: Suvarna Nandyal, Shireen Kausar

Paper Title: Raspberrypi Based Assistive Communication System for Deaf, Dumb and Blind Person
Abstract: Assisting to the people with visual, hearing, vocal impairment through the modern system is a
challenging job. Nowadays researchers are focusing to address the issues of one of the impairment but not all at
once. This work is mainly performed to find the unique solution/ technique to assist communication for the
people with visual, hearing, vocal impairment. This system helps the impaired people to have the
communication with each other and also with the normal person. The main part of the work is Raspberrypi on
which all the activities are carried out. The work provide the assistance to visually impaired person by letting
them to hear what is present in the text format. The stored text format is spoke out by the speaker. For the people
with hearing impairment the audio signals are converted into text format by using speech to text conversion
technique. This is done with the help of AMR voice app which makes them to understand what the person says
can be displayed as the text message . And for people with vocal impairment, their words are conveyed by the
help of speaker.

Keywords: Raspberrypi, Tesseract OCR(optical character recognition technique), epeak, speech to text,
Bluetooth device, LCD display, AMR voice app.

References:
697.
1. Asha G. Hagargund, Sharsha Vanria Thota, Mitadru Bera, Eram Fatima Shaik, “Image to Speech Conversion for Visually Impaired”, 4047-
International Journal of Latest Research in Engineering and Technology, Volume 03, Issue 06, June 2017. 40
2. Chucai Yi, Student Member, IEEE , Yingli Tian, Senior Member, IEEE , and Aries Arditi “Portable Camera-Based Assistive Text and 51
Product Label Reading From Hand-Held Objects for Blind Persons” 2013 IEEE.
3. K. Lakshmi, Mr. T. Chandra Sekhar Rao, “ Design and Implantation Of Text To Speech Conversion Using Raspberry PI”,
International Journal of Innovative Technology and Research, Volume No. 4, Issue No. 6, October-November, 2016.
4. Martin Goldberg CUNY Graduate Center New York, NY. USA for “Assisting Visually Impaired People with Mobility through
Technology in the Age of Context” in 2015.
5. Nagaraja L., Nagarjun RS, Nishanth M Anand, Nithin D, Veena S Murthy, “Vision based Text Recognition using Raspberry Pi”,
International Journal of Computer Applications, National Conference on Power Systems & Indutrial Automation.
6. Pankaj Pathak Dept. of CSE Shri Vaishnav Institute of Computer science Indore, India,” Speech Recognition Technology:
Applications & Future,” International Journal of Advanced Research in Computer Science Vol. 1, No.4, Nov-Dec 2012.
7. Rithika H., B. Nithya Santhoshi, “Image Text To Speech Conversion In The Desired Language By Translating With Raspberry Pi”.
8. S.B.Shroke, Nandar Dehpande, Prashant Deshmukh, Sanjay Kumar Mathapati. ”Assistive Transulator For Deaf And Dumb People”-in
July-2014.
9. Shraddha R. Ghorpade, Surendra K. Waghamare, “Full Duplex Communication System for Deaf & Dumb People,” International
Journal of Emerging Technology and Advanced Engineering (IJETAE), Volume 5, Issue 5, May 2015, ISSN 2250-2459.
10. Shwan Hadi and Oğuzhan Özdemir for “Development of Learning Software for Deaf: A Sample of Language Learning Material”
Software Engineering Department,College of Technology, Computer Education and Instructional Technology Department, College of
Education, Firat University, Elazig, Turkey Vol. 6 Issue 06, June – 2017.
11. Srilakshmi S, Dr. Shabana Sultana for “Interactive Gesture Based System with Email Access and Voice Command for the People with
Visual, Hearing and Speech Impairment Using IoT” International Research Journal of Engineering and Technology (IRJETVolume:
05 Issue: 05 May-2018.
12. Vasanthi.G and Ramesh Babu.Y Department of ECE, DMI College of Engineering, Chennai, India.“Vision Based Assistive System for
Label Detection with Voice Output”Jan-2014.
Authors: Suvarna Nandyal, Lakshmi

698. Paper Title: Artificial Intelligence based Human Facial Action Recognition by Deep Learning Neural Network
Abstract: The modern era of digital devices which will be equipped with the dedicated machine will have the 4052-
built in features to perform the special needs of the human. The mobile devices comes with the special cameras 40
which will produces the high quality images. Human face and the facial expression system has been in the 56
interesting field due to the great level of application it possesses. The face unlock, face detection in security
areas and also the facial expression recognition has been in demand of development. The human exhibits the
multiple type of expressions anger, sad, surprise, happy and many more. These expressions have special notation
based on the human feelings and scenario. The Digital image processing technology has provided the tools to
work with the images and will use the edge features, skin mapping and supervised knowledge based classifier to
recognize the expressions posed by the human to assist the need.

Keywords: Face, GLCM(Gray Level Co-occurrence Matrix), Skin mapping, SVM(Support Vector Machine).

References:

1. Adria Ruiz, Joost Van de Weijer and Xavier Binefa, “From Emotions to Action Units with Hidden and Semi-Hidden-Task Learning”,
5th IEEE International Conference on Computer Vision, pp. 1550-5499, 2015.
2. Gil Levi and Tal Hassner. “Emotion recognition in the wild via convolutional neural networks and mapped binary patterns”, In
Proceedings of the 2015 ACM on International Conference on Multimodal Interaction,” pages 503–510. ACM, 2015.
3. Kaili Zhao, Wen-Sheng Chu, “Joint Patch and Multi-label Learning for Facial Action Unit Detection”, p 4673-6964, 2015.
4. Mina Bishay and Ioannis Patras, “Fusing Multilabel Deep Networks for Facial Action Unit Detection,” IEEE 12th International
Conference on Automatic Face & Gesture Recognition, vol.17, no.25, pp.5090-5094, 2017.
5. Ping Liu, Shizhong Han, Zibo Meng , and Yan Tong, “Facial Expression Recognition via a Boosted Deep Belief Network”, IEEE
Conference on Computer Vision and Pattern Recognition, pp. 1063-1069 ,2014.
6. Seyedehsamaneh Shojaeilangari, Wei-Yun Yau, Karthik Nandakumar, Jun Li, and Eam Khwang Teoh. “Robust representation and
recognition of facial emotions using extreme sparse learning”, IEEE Transactions on Image Processing, 24(7):2140–2152, 2015.
7. Stefanos Eleftheriadis and Ognjen Rudovic “Multi-conditional Latent Variable Model for Joint Facial Action Unit Detection” p 4889-
4899, 2015.
8. Yachen Zhu, Shangfei Wang, “Multiple-Facial Action Unit Recognition by Shared Feature Learning and Semantic Relation
Modeling”, 22nd International Conference on Pattern Recognition, pp.1051-4651, 2014.
Authors: Shubham Agarwal, Kushagra Goel, Anirudh Jain, Pratibha Singh
Automated Vehicle Security System using Convolutional Neural Networks and Support Vector
Paper Title:
Machine
Abstract: With the rise in the infrastructure in the global economy, there is a need to impact the growth of
security systems such as enhancing the security of vehicles at public places, societies or places with crowd. This
could be done by keeping up with the monitoring of vehicles through vehicle License Plate Recognition (LPR).
Since the numbers of vehicles are increasing on road day by day, it is essential to bring automation in its
detection and recognition procedure. The objective of this presented work is to model a real time application to
recognize license plate from a vehicle at parking of any society or public places via surveillance cameras. This
paper mainly focuses on implementing the concept of component security which is marked by the presence of a
blended system with car license plate recognizer as well as face recognizer recognizing its real owner. In
proposed Automated Vehicle Security System (AVSS), the achievable model accuracy for Automated LPR
model is 94% marked with the use of Tyserract for character recognition and model accuracy for facial
recognition is raised to a mark of 83%. This model provides remarkable results and a need of another system
where the owner or permitted drivers for a vehicle are mapped to vehicle license plate which could be made to
use as collaboration to make it a real life deployable application.

Keywords: Convolutional Neural Network, Face Recognition, License Plate detection, MobileNet
699. Architecture, Optical Character Recognition, Support Vector Machine, Tesseract.
4057-
References: 40
63
1. Hui Li, Peng Wang, Mingyu You, Chunhua Shen, “Reading Car License Plates Using Deep Neural Networks”, Image and Vision
Computing, 2018
2. Wichai Puarungroj, Narong Boonsirisumpun “Thai License Plate Recognition Based on Deep Learning”, Computer Science Department,
Faculty of Science and Technology, Loei Rajabhat University, Loei, 42000, Thailand, 3rd International Conference on Computer Science
and Computational Intelligence 2018
3. Kruti Goyal, Kartikey Agarwal, Rishi Kumar, “Face Detection and Tracking using OpenCV”, International Conference on Electronics,
Communication and Aerospace Technology 2017
4. "Image Text Recognition in Python", http://francescopochetti.com/ text-recognition-natural-scenes/
5. "Developing a License Plate Recognition System with Machine Learning in Python", https://blog.devcenter.co/developing-a-license-
plate- recognition-system-with-machine-learning-in-python-787833569ccd
6. Tensorflow, https://www.tensorflow.org
7. OpenCV, https://opencv.org
8. Baza Slika,www.zemris.fer.hr/papers/LicensePlates/english/ baza_slika.
9. Chars74K dataset, http://www.ee.surrey.ac.uk/CVSSP/demos/chars74k/
10. LetterRecognition.data.Z, 26 capital letters in 20 fonts in csv format, https://archive.ics.uci.edu/ ml/datasets/letter+recognition/
11. A basic approach and hands-on tutorial for object detection and COCO model, https://www.oreilly.com/ideas/object-detection-with-
tensorflow/
12. Tesseract-OCR: github library and documentation, https://github.com/ tesseract-ocr/
13. Howard, Andrew G., Menglong Zhu, Bo Chen, Dmitry Kalenichenko, Weijun Wang, Tobias Weyand, Marco Andreetto, and Hartwig
Adam. "Mobilenets: Efficient convolutional neural networks for mobile vision applications." arXiv preprint arXiv:1704.04861 (2017).
Authors: John martin A, \Maria Dominic M

700. Adaptation using Machine Learning for Personalized eLearning Environment based on Students
Paper Title:
Preference
Abstract: Information gathering is a lifelong process of human being and the learning takes place from womb 4064-
to tomb. Learners acquire, recognize, map the gathered information to knowledge and use it in day to day life. 40
Advancement in ICT and the utilization of ICT in teaching and learning process has contributed an exponential 69
growth. An eLearning solution has almost reached maturity, where the teaching and learning community have
the proper digital infrastructure, smart phones, tablet computers and the best software platform. An innovation
in teaching and learning sector has become an integral part and is mandatory. Hence the challenge is to suggest
quality and appropriate learning materials to the learners. The research aims to categorize the learner according
to their learning ability and to find the learning path to facilitate the learner to have appropriate and quality
learning objects with the help machine learning techniques. The focus of this work is to come up with a system
architecture which predicts and adapts the learner style, find the learning path and to provide the suitable
learning objects in eLearning environment based on their preferences. Personalization will assist learner to
improve their learning performance.

Keywords: Adaptive Learning System, Clustering, eLearning, Personalization, Learning Object.

References:

1. Learning. Retrieved from http:// en.wikipedia.org/wiki/Learning


2. Kirkwood, A. and Price, L, “Technology-enhanced learning and teaching in higher education: what is ‘enhanced’ and how do we
know? A critical literature review,” 2014, Learning, media and technology, 39(1), pp.636.
3. Aamir, M. and Bhusry, M., “Recommendation System: State of the Art Approach,” 2015, International Journal of Computer
Applications, 120(12).
4. Anita Finke and Janis Bicansm, “E-Learning System Content and Architecture Evolution”, Proceedings of 16 International
Conferences on Information and Software Technologies, Druskininkai, Lithuania, 2010.
5. K. Tarus, Z. Niu, A. Yousif, “A hybrid recommender system for e-learning based on context awareness and sequential pattern mining,”
2017, Soft Computing 72, 37–48
6. Wolf., C. iWeaver, (2003). Towards learning style-based eLearning in computer science education. Proceedings of the fifth
Australasian conference on Computing education. Darlinghurst, Australia, 273-279.
7. Essalmi, F., Jemni Ben Ayed, L., Jemni, M., Kinshuk., and Graf S., (2010). A fully personalization strategy of eLearning scenarios.
Computers in Human Behavior, 26(4), 581–59.
8. Latham, A., Crockett, K., and McLean, D. (2014). An adaptation algorithm for an intelligent natural language tutoring system.
Computers & Education, 71, 97–110.
9. Richard Gross, Psychology: The Science of Mind and Behaviour 6E, Hachette UK, ISBN 978-1-4441-6436-7.
10. Jan De Houwer & Dermot Barnes-Holmes & Agnes Moors,. (2013 January). What is learning? On the nature and merits of a functional
definition of learning, Psychon Bull Rev doi: 10.3758/s13423-013-0386-3.
11. Wilfrid Laurier University, (2008). Study Skills & Supplemental Instruction Centre “Understanding your learning style”. Retrieved
from https://downloads.wlu.ca
12. Katherine D. Arbuthnott, Gregory P. Krätzig., (2015). Effective Teaching: Sensory Learning Styles versus General Memory Processes,
Innovative Teaching, Volume 4, Article 2.
13. Coffield, Frank; Moseley, David; Hall, Elaine; Ecclestone, Kathryn, (2004). Learning styles and pedagogy in post-16 learning: a
systematic and critical review, London: Learning and Skills Research Centre. ISBN 1853389188. OCLC 505325671.
14. Kolb, D.A. (1984). Experiential learning: experience as the source of learning and development (11th ed). New Jersey-Hall.
15. Felder, R., and Silverman, L., (1988). Learning and teaching styles in engineering education. Engineering Education, 87(7), 674-684.
16. Soles, C and Moller, L,. (2001). Myers-Briggs type preferences in distance learning education. International journal of Educational
Technology, 2(2), 180-187.
17. Devajit Mahanta., Majidul Ahmed,. ELearning Objectives, Methodologies, Tools and its Limitation,.Retrieved from
https://pdfs.semanticscholar.org.
18. Chun-Hui Wu, You-Shyang Chen, Ta-Cheng Chen. (2017, October). An Adaptive eLearning System for Enhancing Learning
Performance: Based on Dynamic Scaffolding Theory.
19. Yao Jung Yang., Chuni Wua,. (2008). An attribute-based ant colony system for adaptive learning object recommendation. Retrieved
from https://pdfs.semanticscholar.org
20. P. Brusilovsky, (2001, March). Adaptive Hypermedia, User Model. User-Adapt. Interact., vol. 11, no. 1, pp. 87–110.
21. S. Kulaglić, S. Mujačić, I. K. Serdarević, and S. Kasapović, (2013). Influence of learning styles on improving efficiency of adaptive
educational hypermedia systems, 12th International Conference on Information Technology Based Higher Education and Training
(ITHET).
22. DamindaHerath and LakshmanJayaratne, “A Personalized Web Content Recommendation System for E-Learners in E-Learning
Environment,” 2017, National Information Technology Conference (NITC), 13-15 September, Colombo, Sri Lanka.
23. SongJieGong, “A Collaborative Filtering Recommendation Algorithm Based on User Clustering and Item Clustering ,“ 2010,
JOURNAL OF SOFTWARE, VOL. 5, NO. 7.
24. MojisolaErdt, Alejandro Fernandez, and ChristophRensing, “Evaluating Recommender Systems for Technology Enhanced Learning: A
Quantitative Survey” 2015, IEEE Transactions on Learning Technologies, pp. 326-344.
25. Thai-Nghe N., Drumond L., Krohn-Grimberghe A and Schmidt-Thieme L., “Recommender system for predicting student
performance,” 2010, In Procedia Computer Science, Volume 1, Issue 2, pp 2811-2819.
26. Hazra Imran, Mohammad Belghis-Zadeh, Ting-Wen Chang, Kinshuk, Sabine Graf, “PLORS: a personalized learning object
recommender system,” 2016, Vietnam Journal of Computer Science, Volume 3, NO. 1, pp 3–13
27. Brusilovsky. (1996).Methods And Techniques Of Adaptive Hypermedia. User Modeling and User-Adapted Interaction, 6(2-3), p.
87129.
28. Christiani, N & S.T. (2000). Support Vector Machines. pages 11-18
29. Daminda Herath and Lashman Jayarathne, “Intelligent Recommendations for e-Learning Personalization Based on Learner’s Learning
Activities and Performances”, 2018, International Journal of Computer Science and Software Engineering (IJCSSE), Volume 7, Issue
6, Page: 130-137.
30. Norasmah Othmana , Mohd Hasril Amiruddinb , (2010). Different Perspectives of Learning Styles from VARK Model, International
Conference on Learner Diversity.
31. A. John Martin, M. Maria Dominic (2018), Personalization Using BFS for Personalized eLearning System, JETIR August 2018,
Volume 5, Issue 8
Authors: Nidhi R. Chaurasia, Meghana A. Hasamnis
Development of a Low Cost Heart Rate Monitoring and Transmission System using PPG Signal
701. Paper Title:
Processing for Wearable Devices
4070-
Abstract: Photoplethysmography (PPG) technique is used in most of the fitness tracking devices
40
available now-a-days, due to its low cost and simplicity. These PPG signals are obtained from the 77
variations in the blood flow with the help of pulse rate sensor. In this paper, PPG signal is acquired
from two PPG sensors worn in the finger and the wrist to get the heart rate and its various parameters.
The signal noise is removed with the help of MATLAB with various filters to get the smooth signal.
The peak detection is done for heart rate (HR) and peak interval calculation, the spectral estimation is
done, the first and second derivatives and the heart rate variability are obtained. The low cost Arduino
nano and the Bluetooth module is used for the development and the transmission of HR value from the
wearable device through an application developed for it, as well as the values are transmitted remotely
with the help of the Global System for Communication (GSM) built in the mobile phone, which can
display the value and can also transmit it to any particular person or remote physician who can
monitor the person’s HR remotely. The complete system developed provides a low cost solution for
heart rate detection and monitoring of a person from a distance.

Keywords: MATLAB, Photoplethysmography (PPG) signal Processing, pulse rate sensor, pulse transit time,
Resting Heart Rate.

References:

1. S. V. More; P. C. Chaudhari, “Development of non-invasive diagnostic tool for diseases using photoplethysmography”, WiSPNET,
IEEE, Chennai, India, 23-25 March 2016, INSPEC Accession Number: 16303950. DOI: 10.1109/WiSPNET.2016.7566387.
2. Moraes J.L.,et.al.,“Advances in photopletysmography signal analysis for biomedical applications”, Sensors (Basel). 2018 Jun 9,18(6).
pii: E1894. doi: 10.3390/s18061894. Available online: https://www.ncbi.nlm.nih.gov/pubmed/29890749.
3. G. Janjua, D. Guldenring, D. Finlay, J. McLaughlin, “Wireless chest wearable vital sign monitoring platform for hypertension”,IEEE,
Seogwipo, South Korea, EMBC, 11-15 July 2017, doi: 10.1109/EMBC.2017.8036950
4. A. K.Bhoi,K. S. Sherpa, J. S.. Tamang, D Phurailatpam, A. K. Gupta, “Real time acquisition and analysis of peg and ppg
signals”,IEEE, Melmaruvathur, India, ICCSP, 2-4 April 2015, DOI: 10.1109/ICCSP.2015.7322558
5. P. Canale, A. Fontanella, E. Torti, G. Danese, F. Leporati, “Development of a real-time heart rate estimation algorithm on a low-power
device”, IEEE, Bar, Montenegro, MECO, 11-15 June 2017. DOI: 10.1109/MECO.2017.7977199
6. M.Johnson, R. Jegan, X. Anitha, Mary A, “Performance measures on blood pressure and heart rate measurement from ppg signal for
biomedical applications”,IEEE, Coimbatore, India, ICEEIMT, 3-4 Feb. 2017, DOI: 10.1109/ICIEEIMT.2017.8116856.
7. A. Ukil,S. Bandyoapdhyay, C. Puri, A. Pal, K. Mandana, “Cardiac condition monitoring through photoplethysmogram signal denoising
using wearables: can we detect coronary artery disease with higher performance efficacy?”, IEEE,Vancouver, BC, Canada Computing
in Cardiology Conference, 11-14 Sept. 2016.
8. S. Alam, R. Gupta, “Portable photoplethysmogram acquisition and analysis instrument”,IEEE, Kolkata, India, 28-30 Jan.
2016DOI: 10.1109/CIEC.2016.7513775
9. M. Elgendi, on the analysis of fingertip photoplethysmogram signals, Curr Cardiol Rev. 2012 Feb; 8(1): 14–
25.doi: 10.2174/157340312801215782. PMCID: PMC3394104.Available: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3394104/
10. T. Tamura ,Y. Maeda, M. Sekine and M. Yoshida, “Wearable photoplethysmographic sensors-past and present”,Electronics 2014, 3(2),
282-302, 25 Feb 2014 https://doi.org/10.3390/electronics3020282 Available : https://www.mdpi.com/2079-9292/3/2/282/htm
11. N. Daimiwal, M. Sundhararajan and R. Shriram, “Respiratory Rate, Heart Rate and ContinuousMeasurement of BP Using PPG”, IEEE,
India, International Conference on Communication and Signal Processing, April 3-5, 2014DOI: 10.1109/ICCSP.2014.6949996
12. Allen J., “Photoplethysmography and its application in clinical physiological measurement”, Physiol Meas. 2007 Mar;28(3):R1-39.
Epub 2007 Feb 20.doi:10.1088/0967-3334/28/3/R01https://iopscience.iop.org/article/10.1088/0967-3334/28/3/R01/meta
13. A. A. Alian, K. H. Shelley, “Photoplethysmography”, http://dx.doi.org/10.1016/j.bpa.2014.08.006, 395-406, Elsevier Ltd.,2014
14. A. Gaurav, M. Maheedhar, V. N. Tiwari, R. Narayanan, “Cuff-less PPG based continuous blood pressure monitoring- a smartphone
based approach”, EMBC,IEEE, Orlando, FL, USA, 16-20 Aug., 2016DOI: 10.1109/EMBC.2016.7590775
15. G. Angius, L. Raffo, “Cardiovascular disease and sleep apnoea: A wearable device for PPG acquisition and research aims”,Computing
in Cardiology, IEEE, Krakow, Poland,9-12 Sept.,2012
16. I. Reyes, H. Nazeran, M. Franco, E. Haltiwanger, “Wireless Photoplethysmographic Device for Heart Rate VariabilitySignal
Acquisition and Analysis”, 34th Annual International Conference of the IEEE, EMBS, IEEE, San Diego, California, USA, 28 Aug-1
Sep, 2012
17. N. Kumar, A. Agrawal, S. Deb, “Cuffless BP measurement using a correlation study of pulse transient time and heart rate”, ICACCI,
IEEE, New Delhi, India, 24-27 Sept. 2014DOI: 10.1109/ICACCI.2014.6968642
18. MATLAB®, R2019a, Signal Processing Toolbox™, Documentation, The MathWorks, Inc. ©1994-2011.

Authors: S. Gupta, G. Bandyopadhyay, M. Bhattacharjee, S. Biswas

Paper Title: Portfolio Selection using DEA-COPRAS at Risk – Return Interface Based on NSE (India)
Abstract: Portfolio formation holds paramount importance in the process of the investment decision making
since, a single door investment (SDI) option is much riskier than a multiple door investment (MDI) option.
Among available financial instruments, the stock market (SM) has allured investors because of its liquidity and
growth opportunities. However, the effectiveness of the investment decision is largely reflected in the selection
of the constituent elements of the portfolio by an investor while trading off risk and return. In this paper, after an
initial level selection of for formulating a possible portfolio by using Perceptual Map (PM), we have applied
702. DEA to calculate the efficiency of the stocks at the risk-return interface based on the market performance. In
4078-
order to ascertain that the stock selection is logical and worthwhile, we further probe the fundamental
40
performances over a time period of five consecutive financial years using the method of Multi-Criteria Decision
87
Analysis (MCDA) framework based on the Complex Proportional Assessment (COPRAS) method, where, the
criteria weights are calculated by using the entropy method. A consistency is visible in the yearly fundamental
performances and a significant pattern with regard to the portfolio selection.

Keywords: Portfolio Selection, Stock Market, Perceptual Mapping, Data Envelopment Analysis (DEA),
Complex Proportional Assessment (COPRAS).
References:

1. Abad, C., Thore, S. A., & Laffarga, J. (2004). Fundamental analysis of stocks by two‐stage DEA. Managerial and Decision
Economics, 25(5), 231-241
2. Altman, E. I. (1968). Financial ratios, discriminant analysis and the prediction of corporate bankruptcy. The journal of finance, 23(4),
589-609.
3. Baležentis, A., Baležentis, T., & Misiunas, A. (2012). An integrated assessment of Lithuanian economic sectors based on financial
ratios and fuzzy MCDM methods. Technological and Economic Development of Economy, 18(1), 34-53.
4. Ballestero, E., & Plà–Santamaría, D. (2003). Portfolio selection on the Madrid exchange: A compromise programming
model. International Transactions in Operational Research, 10(1), 33-51.
5. Banihashemi, S., & Sanei, M. (2015). Portfolio performance evaluation in modified mean-variance models. International Journal of
Applied, 5(4), 103-117.
6. Banker, R. D., Charnes, A., Cooper, W. W., & Clarke, R. (1989). Constrained game formulations and interpretations for data
envelopment analysis. European Journal of Operational Research, 40(3), 299-308.
7. Beardsley, X. W., Field, B., & Xiao, M. (2012). Mean-variance-skewness-kurtosis portfolio optimization with return and
liquidity. Communications in Mathematical Finance, 1(1), 13-49.
8. Bhattacharyya, R., Kar, S., & Majumder, D. D. (2011). Fuzzy mean–variance–skewness portfolio selection models by interval
analysis. Computers & Mathematics with Applications, 61(1), 126-137.
9. Bhattacharyya, R., & Kar, S. (2011). Multi-objective fuzzy optimization for portfolio selection: an embedding theorem
approach. Turkish Journal of Fuzzy Systems, 2(1), 14-35.
10. Briec, W., Kerstens, K., & Jokung, O. (2007). Mean-variance-skewness portfolio performance gauging: a general shortage function
and dual approach. Management science, 53(1), 135-149.
11. Charnes, A., Cooper, W. W., & Rhodes, E. (1978). Measuring the efficiency of decision making units. European journal of operational
research, 2(6), 429-444.
12. Chatterjee, P., & Chakraborty, S. (2014). Flexible manufacturing system selection using preference ranking methods: A comparative
study. International Journal of Industrial Engineering Computations, 5(2), 315-338.
13. Chunhachinda, P., Dandapani, K., Hamid, S., & Prakash, A. J. (1997). Portfolio selection and skewness: Evidence from international
stock markets. Journal of Banking & Finance, 21(2), 143-167.
14. Deep, K., Singh, K. P., Kansal, M. L., & Mohan, C. (2009). A fuzzy interactive approach for optimal portfolio
management. Opsearch, 46(1), 69-88.
15. Dincer, H. (2015). Profit-based stock selection approach in banking sector using Fuzzy AHP and MOORA method. Global Business
and Economics Research Journal, 4(2), 1-26.
16. Edirisinghe, N. C., & Zhang, X. (2007). Generalized DEA model of fundamental analysis and its application to portfolio
optimization. Journal of banking & finance, 31(11), 3311-3335.
17. Ehrgott, M., Klamroth, K., & Schwehm, C. (2004). An MCDM approach to portfolio optimization. European Journal of Operational
Research, 155(3), 752-770.
18. Fabozzi, F. J., Gupta, F., & Markowitz, H. M. (2002). The legacy of modern portfolio theory. The Journal of Investing, 11(3), 7-22.
19. Ferreira, N., & Souza, A. M. (2015). Efficiency in stock markets with DEA: evidence from PSI20. Efficiency in stock markets with
DEA: evidence from PSI20, (1), 861-865.
20. Ghaffari-Nasab, N., Ahari, S., & Makui, A. (2011). A portfolio selection using fuzzy analytic hierarchy process: A case study of
Iranian pharmaceutical industry. International Journal of Industrial Engineering Computations, 2(2), 225-236.
21. Ginevičius, R. (2008). Normalization of quantities of various dimensions. Journal of business economics and management, (1), 79-86.
22. Guha, B., Dutta, A., & Bandyopadhyay, G. (2016). measurement of risk vs return of Indian sectoral indices. Journal of Advanced
Management Science Vol, 4(2).
23. Gupta, S., Bandyopadhyay, G., Biswas, S., & Upadhyay, A. (2019). A Hybrid Machine Learning and Dynamic Nonlinear Framework
for Determination of Optimum Portfolio Structure. In Innovations in Computer Science and Engineering (pp. 437-448). Springer,
Singapore.
24. Khadafi, M., Heikal, M., & Ummah, A. (2014). Influence analysis of return on assets (ROA), return on equity (ROE), net profit margin
(NPM), debt to equity ratio (DER), and current ratio (CR), against corporate profit growth in automotive in Indonesia Stock
Exchange. International Journal of Academic Research in Business and Social Sciences, 4(12).
25. Joro, T., & Na, P. (2006). Portfolio performance evaluation in a mean–variance–skewness framework. European Journal of Operational
Research, 175(1), 446-461.
26. Kaklauskas, A., Zavadskas, E. K., & Raslanas, S. (2005). Multivariant design and multiple criteria analysis of building
refurbishments. Energy and Buildings, 37(4), 361-372.
27. Kaklauskas, A., Zavadskas, E. K., Raslanas, S., Ginevicius, R., Komka, A., & Malinauskas, P. (2006). Selection of low-e windows in
retrofit of public buildings by applying multiple criteria method COPRAS: A Lithuanian case. Energy and buildings, 38(5), 454-462.
28. Karmakar, P., Dutta, P., & Biswas, S. (2018). Assessment Of Mutual Fund Performance Using Distance Based Multi-Criteria Decision
Making Techniques-An Indian Perspective. Research Bulletin, 44(1), 17-38.
29. Konno, H., Shirakawa, H., & Yamazaki, H. (1993). A mean-absolute deviation-skewness portfolio optimization model. Annals of
Operations Research, 45(1), 205-220.
30. Konno, H., & Suzuki, K. I. (1995). A mean-variance-skewness portfolio optimization model. Journal of the Operations Research
Society of Japan, 38(2), 173-187.
31. Kundakcı, N., & Işık, A. (2016). Integration of MACBETH and COPRAS methods to select air compressor for a textile
company. Decision Science Letters, 5(3), 381-394.
32. Li, X., Wang, K., Liu, L., Xin, J., Yang, H., & Gao, C. (2011). Application of the entropy weight and TOPSIS method in safety
evaluation of coal mines. Procedia Engineering, 26, 2085-2091.
33. Madić, M., Marković, D., Petrović, G., & Radovanović, M. (2014). Application of COPRAS method for supplier selection. In The
Fifth International Conference Transport and Logistics-TIL 2014, Proceedings (pp. 47-50).
34. Madlener, R., Antunes, C. H., & Dias, L. C. (2009). Assessing the performance of biogas plants with multi-criteria and data
envelopment analysis. European Journal of Operational Research, 197(3), 1084-1094.
35. Maikaew, P., & Yanpirat, P. (2012, September). Stochastic TOPSIS Employment in Stock Ranking for the Stock Exchange of
Thailand. In Proceedings of International Conference on Business and Management (pp. 57-72).
36. Mansouri, A., Naser, E., & Ramazani, M. (2014). Ranking of companies based on TOPSIS-DEA approach methods (case study of
cement industry in Tehran stock exchange). Pakistan Journal of Statistics and Operation Research, 10(2).
37. Markowitz, H. (1952). Portfolio selection. The journal of finance, 7(1), 77-91.
38. Morey, M. R., & Morey, R. C. (1999). Mutual fund performance appraisals: a multi-horizon perspective with endogenous
benchmarking. Omega, 27(2), 241-258.
39. Ogryczak, W. (2000). Multiple criteria linear programming model for portfolio selection. Annals of Operations Research, 97(1-4), 143-
162.
40. Poklepović, T., & Babić, Z. (2014). Stock selection using a hybrid MCDM approach. Croatian Operational Research Review, 5(2),
273-290.
41. Qu, S., Li, H., & Guo, X. (2011). Application Of Interval-Promethee Method For Decision Making In Investing. ORSC & APORC,
314-321.
42. Rajan, R. G., & Zingales, L. (1995). What do we know about capital structure? Some evidence from international data. The journal of
Finance, 50(5), 1421-1460.
43. Rubinstein, M. (2002). Markowitz's “Portfolio Selection”: A Fifty‐Year Retrospective. The Journal of finance, 57(3), 1041-1045.
44. Samuelson, P. A. (1975). The fundamental approximation theorem of portfolio analysis in terms of means, variances and higher
moments. In Stochastic Optimization Models in Finance(pp. 215-220). Academic Press.
45. Shannon, C. E. (1948). A mathematical theory of communication. Bell system technical journal, 27(3), 379-423.
46. Shen, K. Y., Yan, M. R., & Tzeng, G. H. (2014). Combining VIKOR-DANP model for glamor stock selection and stock performance
improvement. Knowledge-Based Systems, 58, 86-97.
47. Steinbach, M. C. (2001). Markowitz revisited: Mean-variance models in financial portfolio analysis. SIAM review, 43(1), 31-85.
48. Stone, B. K. (1973). A linear programming formulation of the general portfolio selection problem. Journal of Financial and
Quantitative Analysis, 8(4), 621-636.
49. Tiryaki, F., & Ahlatcioglu, B. (2009). Fuzzy portfolio selection using fuzzy analytic hierarchy process. Information Sciences, 179(1-2),
53-69.
50. Tsao, C. T. (2003). Evaluating investment values of stocks using a fuzzy TOPSIS approach. Journal of Information and Optimization
Sciences, 24(2), 373-396.
51. Ustinovichius, L., Zavadkas, E. K., & Podvezko, V. (2007). Application of a quantitative multiple criteria decision making (MCDM-1)
approach to the analysis of investments in construction. Control and cybernetics, 36(1), 251.
52. Vilutienė, T., & Zavadskas, E. K. (2003). The application of multi-criteria analysis to decision support for the facility management of a
residential district. Journal of Civil Engineering and Management, 9(4), 241-252.
53. Viteikiene, M., & Zavadskas, E. K. (2007). Evaluating the sustainability of Vilnius city residential areas. Journal of civil engineering
and management, 13(2), 149-155.
54. Xidonas, P., Askounis, D., & Psarras, J. (2009). Common stock portfolio selection: a multiple criteria decision making methodology
and an application to the Athens Stock Exchange. Operational Research, 9(1), 55.
55. Zavadskas, E. K., Kaklauskas, A., & Sarka, V. (1994). The new method of multicriteria complex proportional assessment of
projects. Technological and economic development of economy, 1(3), 131-139.
56. Zavadskas, E. K., Kaklauskas, A., Turskis, Z., & Tamošaitienė, J. (2009). Multi-attribute decision-making model by applying grey
numbers. Informatica, 20(2), 305-320.
57. Zavadskas, E. K., Kaklauskas, A., & Kvederytė, N. (2001). Multivariant design and multiple criteria analysis of a building life
cycle. Informatica, 12(1), 169-188.
58. Zavadskas, E. K., Kaklauskas, A., Banaitis, A., & Kvederyte, N. (2004). Housing credit access model: The case for
Lithuania. European Journal of Operational Research, 155(2), 335-352.
59. Zavadskas, E. K., & Turskis, Z. (2008). A new logarithmic normalization method in games theory. Informatica, 19(2), 303-314.
60. Zavadskas, E. K., Kaklauskas, A., Turskis, Z., & Tamošaitiene, J. (2008). Selection of the effective dwelling house walls by applying
attributes values determined at intervals. Journal of civil engineering and management, 14(2), 85-93.
Zohdi, M., Marjani, A. B., Najafabadi, A. M., Alvani, J., & Dalv, M. R. (2012). Data envelopment analysis (DEA) based performance
evaluation system for investment companies: Case study of Tehran Stock Exchange. African Journal of Business Management, 6(16),
5573-5577.
Authors: Sameer Khaliq, Mohammad Irshad Malik, Jagdeep Singh
Influence of Lime and Brick Dust on Compaction and Strength Properties of Clay Soil When
Paper Title:
Mixed With Ldpe
Abstract: Soil is an essential part of construction and forms a base for all the essential activities of
construction. Soil is not same at all places and sometimes lacks in various properties. So, to improve its various
qualities and to meet the engineering requirements like quality, durability, etc., we can achieve it by adding
suitable admixtures such as, lime, cement, fly ash, plastic, gypsum etc. This not only improves the properties of
soil but also reduces the quantities of waste in the environment. The aim of this study is to experimentally
investigate the effects of adding Lime, Brick dust and Plastic and low density polyethylene to Clayey Soil. The
low density polyethylene is a vital environmental pollutant and its biodegradation is the focus of the present
study. The clay soil used was taken near Baddi, Himachal Pradesh. The optimum contents of Lime, Brick dust
and LDPE in the Clay soil was found by Standard Proctor Test and CBR test, and the results showed by adding
20% lime , 8% Brick dust and 1.5% LDPE in the Clay soil, we get the maximum Bearing Capacity of the
mixture.

Keywords: Clayey soil, low density polyethylene, lime, brick-dust, soil compaction, California bearing ratio.

References:
703. 1. Tanveer Asif Zerdi, Md Mashaq Pasha, Mohd Khaliq Ahmed, Vijay Kumar, Mehreen Naaz Zerdi,” Soil Stabilization Using Lime and 4088-
Brick Dust”, Indian journal of research, Volume : 5 | Issue : 5 | May 2016 ISSN - 2250-1991 | IF : 5.215 | IC Value : 77.65
2. Divya Patle, Mamta Burike, Sayli D. Madavi, Suvarna Raut, “stabilization of soil using waste plastic”, International Journal of 40
Research In Science & Engineering e-ISSN: 2394-8299 Volume: 3 Issue: 2 March-April 2017 p-ISSN: 2394-8280 92
3. Vijay Kumar Patidar1, Dr. Suneet Kaur2, “ Use of Waste Plastic to Improve Geotechnical Properties of Soil”, International Research
Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 06 | June-2016 www.irjet.net p-ISSN: 2395-
0072
4. Kumar Sabat. January-2012. “A Study on Some Geotechnical Properties of Lime Stabilized Expansive Soil – Quarry Dust Mixes”
Issue 2, vol.1.1
5. Ankit Singh Negi, Mohammed Faizan, Devashish Pandey Siddharth, Rehanjot singh, “Soil stabilization using Lime”, International
Journal of Innovative Research in Science, Engineering and Technology,Vol. 2, Issue 2, February 2013
6. Nikhil Tiwari1, C.D.Prasad2“Effect Of Lime And Brick Dust On Compaction And Swelling Property Of Black Cotton Soil”© IJEDR
2018 | Volume 6, Issue 2 | ISSN: 2321-9939
7. N Venkata Hussain Reddy, P Manjusha, T Kulayyappa, “Utilization of waste bottle plastic strips and lime as a soil in construction of
flexible pavement”, International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 04
| Apr -2017 www.irjet.net p-ISSN: 2395-0072
8. Jennifer L. Jordan1 • Daniel T. Casem2 • Jermaine M. Bradley3 • Ajmer K. Dwivedi4Mechanical Properties of Low Density
Polyethylene, J. dynamic behavior mater. (2016) 2:411–420 DOI 10.1007/s40870-016-0076-0
9. Parul Rawat Ajit Kumar,study of CBR behavior of soil reinforced with HDPE Strips Indian Geotechnical Conference IGC2016 15-17
December 2016, IIT Madras, Chennai, India
10. Safia M. Khodary, Amir Z. Elwakil, Ahmed Tawafik, Effect of Hdpe on the engineering properties of clay ,Proceedings of 72nd The
IRES International Conference, Mecca, Saudi Arabia, 23rd-24th June 2017
11. Er. Aly K, Prof. Stephen Joseph Nigli, Dr. Antony Balan, Bearing Capacity of High Density Polyethylene (HDPE) Reinforced Sand
Using Plate Load Test International Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue
6, ( Part -4) June 2015, pp.07-13
12. 12.Viktória Vargha, Gabriella Rétháti, Tamás Heffner, Krisztina Pogácsás, László Korecz, Zsolt László, “Behavior of Polyethylene
Films in Soil, Periodica Polytechnica Chemical Engineering60(1), pp. 60-68, 2016 DOI: 10.3311/PPch.8281.

Authors: Vinothkumar. C, Esakkiappan. C


Level Control of Nonlinear Hopper Tank Process in Pharmaceutical Industry using Ziegler
Paper Title:
Nicholas and Cohen Coon Tuning Techniques
Abstract: In this paper, the design and simulated results of conventional controllers on non linear hopper tank
system are presented to attain a desired level of a process tank. The hopper tank non linear systems are used for
this analysis which is also used in the field of Pharmaceutical, Petro chemical industries. Evacuation of products
without wastage is possible due to non-linearity of hopper tank’s cross sectional behavior of the process. The
open loop performance are determined to obtain the desired level control with conventional PI, PID controllers
for various tuning techniques like step response based Ziegler Nicholas and open loop Cohen coon tuning
method. The major advantage of this method is simplicity. The relationship between these two tuning systems is
reproduced by Matlab Simulink model & Compared the presentation of controllers with hopper process tank.

Keywords: Controller Tuning, First Order plus Dead Time, Hopper Tank System, Level Control, Nonlinear
Process.

References:

1. Jauregui. C, Duarte-Mermoud. M.A, Oróstica, R. et al. “Conical tank level control using fractional order PID controller-a simulated
and experimental study”, Control Theory Technology Vol.14 (4), 2016, pp. 369-384.
2. Anand. S, et al "Simple tuned adaptive PI controller for conical tank process", International conference on recent advancements in
Electrical Electronics and Control Engineering, 2011, pp.263-267.
3. Anandanatarajan. R, Chidambaram. M, and Jayasingh. T,“Design of controller using variable transformations for a nonlinear process
with dead time”, ISA transactions, Vol.44, No.1, 2005, pp.81-91
704. 4. Marshiana.D and Thirusakthimurugan.P, “Control of Level in Chemical Industry for a Nonlinear conical tank process”, Research
journal of pharmaceutical, Biological and chemical sciences, Vol.6, No.3, 2015, pp.1322-1328. 4093-
5. Marshiana, D., and P. Thirusakthimurugan. "Design of Deadbeat Algorithm for a Nonlinear Conical Tank System", Procedia Computer 40
Science, Vol. 57, 2015, pp.1351-1358. 96
6. Arijit Biswas, et al. “Tuning Of PID And PIλDδ Controllers Using The Integral Time Absolute Error Criterion”, Engineering
Applications of Artificial Intelligence, Vol. 22, 2009, pp.343–350.
7. Roy. P, Kar. B, Kumar. A and Roy. B. K, “Level control of two tank system by fractional order integral state feedback controller tuned
by PSO with experimental validation”, IEEE First International Conference on Control, Measurement and Instrumentation, 2016,
pp.224-228.
8. Nithya.S, K.Vijayarekha, N.Sivakumaran, T.Balasubramanian and N.Anantharaman, “Controllers implementation based on
softcomputing for non-linear process”, 34th Annual Conference of IEEE in Industrial Electronics, 2008, pp.126-132.
9. Pushpaveni.T, S.Srinivasulu Raju, N.Archana, and M. Chandana, "Modeling and Controlling of Conical tank system using adaptive
controllers and performance comparison with conventional PID", International Journal of Scientific and Engineering
Research,Vol.4(5), 2013, pp.629-635.
10. Dhanalakshmi.R and R.Vinodha, "Design of control schemes to adapt PI controller for conical tank process", International Journal of
Advanced Soft Computing Application, Vol.5, No.3, 2013, pp.1-20.
11. Mercy.D and S.M.Girirajkumar, "Tuning of controllers for non linear process using intelligent techniques", International Journal of
Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol.2, No.9, 2013, pp.4410-4419.
12. Vadivazhagi.S and Dr.N.Jaya, "Modelling and Simulation of Interacting Conical Tank Systems", International Journal of Innovative
Research in Science, Engineering and Technology, Vol.3, No. 6, 2014, pp.13201-13207.
13. Hassan Fazilah, Argyrios C. Zolotas, and Tim Smith,"Optimized Ziegler-Nichols based PID control design for tilt
suspensions", Journal of Engineering Science and Technology Review, Vol.10, No. 5, 2017, pp.17- 24.
14. Suresh Manic Kesavan, Tvn Padmesh And Chan Woei Shyan, “Controller Tuning For Nonlinear Hopper Process Tank – A Real Time
Analysis”, Journal Of Engineering Science And Technology, Special Issue, August 2014, pp.59 – 67.
15. Ravi.V.R and Thangavelu Thyagarajan, “Adaptive Decentralized PI controller for two conical tank interacting level system”, Arabian
Journal for science and Engineering, Vol.39, No12, 2014, pp.8433-8451.
16. Marshiana.D, et al., “Footstep power production using piezoelectric sensors”, Research J. Pharm. and Tech. Vol. 9(7), July2016,
pp.831-834.

Authors: S.U. Saoji, Naveen kumar, Jayakumar, Vaibhav Gupta, Prakhar Agarwal, Parth Astogi

Paper Title: Attendance Management System using Deep Learning and Facial Recognition Technique
Abstract: Big data could be a term acclimated converse with the investigation and utilizations of data sets that
are unreasonably entangled for conventional information handling application programming framework to
sufficiently alter. AI is a use of (AI) that enables frameworks to precisely take in and improve from aptitude
while not being explicitly customized. AI centers around the occasion of pc programs which will get to data and
use it learn for themselves. The technique for learning starts with perceptions or data, similar to precedents,
direct skill, or guidance, in order to appear for examples in data and manufacture higher decisions inside the
future bolstered the models that square measure gave. One in everything about applications is programmed face
705.
acknowledgment bunch activity framework to a great extent used in Workplaces or gifted workspaces. ID or 4097-
Verification done by catching an image of client's face through a camera that progressively stamps bunch 41
activity. This propelled face acknowledgment bunch activity biometric framework enlists the particular and 02
changeless facial fine purposes of staff and records them inside the data as stencils. When the enrollment
strategy is finished, you just should investigate the camera to confirm your character and furthermore the
programmed face acknowledgment bunch activity framework precisely denotes your gathering activity for your
sake. Face acknowledgment bunch activity framework is a right innovation for overseeing bunch activity since it
scarcely gives mistakes.

Keywords: facial recognition, big data, attendance, biometrics.


References:

1. Ekta Chhatbar Heeral Chauhan Shubham Gokhale Sompurna Mukherjee Prof.Nikhil Jha, Department of 7 Computer Science and
Engineering S.B. Jain Institute of Technology, Management and Research, Nagpur IJIRST – International Journal for Innovative
Research in Science & Technology|| Issue 10 | March 2017
2. Aziza Ahmedi- M. tech in Computer Science and Engineering Poojya Dodappa Appa College of Engineering, Kalaburagi, Karnataka,
India. Dr Suvarna Nandyal- HOD of Department of Computer Science and Engineering Poojya Dodappa Appa, College of
Engineering, Kalaburagi, Karnataka, India.The International Journal Of Engineering And Science (IJES) || PP -01-08|| 2015 ||
3. Seyyed Mojtaba Banaei- Bozorgmehr University, Ghayen, Iran Hossein Kardan Moghaddam- Birjand University of Technology,
Birjand, Iran Open Journal of Marine Science, Published Online October 2014 in SciRes.
4. Pooja G.R, Poornima M, Palakshi S, M. Bhanu Prakash Varma, Krishna A NDept. Of Cse, Sjbit, India International Journal of
Advanced Networking & Applications (IJANA)
5. Christopher Crick Computer Science Department Oklahoma State University Stillwater, Oklahoma Sridhar Vemula Computer Science
Department Oklahoma State University Stillwater, Oklahoma
6. Venkata Kalyan Polamarasetty, Muralidhar Reddy Reddem, Dheeraj Ravi,Mahith Sai Madala, Velagapudi RamaKrishna Siddhartha
Engineering College, India International Research Journal of Engineering and Technology (IRJET) Issue: 04 | Apr-2018
7. Nirmalya Kar, Mrinal Kanti Debbarma, Ashim Saha, and Dwijen Rudra Pal International Journal of Computer and Communication
Engineering, Vol. 1, No.2, July 2012
8. Rakesh Rathi , Manish Choudhary ,Bhuwan Chandra Department of Computer Engineering & I.T., Govt. Engineering College, Ajmer,
India IJCTA | JAN-FEB 2012
9. S.U.Saoji,Saresj Athawdle,Deepak Patil,Tejal Birajdar “Object Detection in a Smartphone for Visually impaired users”,IJARCST-
2015,Vol-3,issue Jan-March 2015.
10. R.E. Burkard and E. C¸ ela, “Linear Assignment Problems and Extensions”, In Handbook of Combinatorial Optimization, Du
11. Z, Pardalos P (eds). Kluwer Academic Publishers: Dordreck, 1999, pp. 75-149.
12. M. H. Yang, N. Ahuja, and D. Kriegmao, “Face recognition using kernel eigenfaces,” IEEE International Conference on Image
Processing, vol. 1, pp. 10-13, Sept. 2000.
13. Y. Zhang and C. Liu, “Face recognition using kemel principal component analysis and genetic algorithms,” IEEE Workshop on Neural
Networks for Signal Processing, pp. 4- 6 Sept. 2002.
14. W. Zhao, R. Chellappa, P. J. Phillips, and A. Rosenfeld, “Face recognition: A literature survey,” ACM Computing Surveys, 2003, vol.
35, no. 4, pp. 399-
Authors: P.Nagaveni, M.Siva RamKumar, M.Nivetha, A.Amudha, G.Emayavaramban
Paper Title: Electrical Energy Audit –An Experience in a Small Scale Textile Mill
Abstract: Electrical Energy has become a one of the vital factor in deciding the total production cost and
maintenance cost . Day by day, energy demand keeps rising in the industrial sectors because of this reason it is
essential to reduce energy consumption for that energy conservation is must needed action. Energy Audit is the
prime tool for finding the energy conservation oppourtunities. It helps us to make attempts to balance the total
energy inputs with its use and serves to identify all the energy flow in a facility. Energy auditing will not only
save money but it also improves the quality of electrical energy supply. Energy Conservation and Energy
efficiency in industry has to be improved, this is the prime motive for Government of India. This paper shares
the experiences of the authors on Electrical Energy Conservation Projects carried out in a Textile Industry
situated in Tamilnadu State. We have used Load Manager for the observation of electrical datas during normal
working load condition itself. These datas helps us to gain the electrical energy audting experience in the
industry.

Keywords: Energy; Electrical Energy Audit; Power quality analyzer; Textile industry ; Environmental
improvement; Payback period.

References:

1. Kluczek, A., and P. Olszewski . (2017). Energy audits in industrial processes. Journal of Cleaner Production 142: 3437-3453.
706. doi.org/10.1016/j.jclepro.2016.10.123.
2. 0Li, M. J., and W. Tao. Q. (2017). Review of methodologies and polices for evaluation of energy efficiency in high energy-consuming 4102-
industry. Applied Energy 187:203- 215 . doi.org/10.1016/ j.apenergy. 2016.11.039. 41
3. Giuseppe Ingarao. (2017). Manufacturing strategies for efficiency in energy and resources use- The role of metal shaping processes 07
.Journal of Cleaner Production 142:2872-2886. doi.org/10.1016/ j.jclepro. 2016.10.182
4. May, G., I.Barletta, B.Stahl, and M.Taisch.( 2015). Energy management in production. A novel method to develop key performance
indicators for improving energy efficiency. Applied Energy149:46-61.doi.org/10.1016/j. apenergy .2015. 03. 065
5. Schmidt, C., Li. W, S.Thied, B. Kornfeld, S. Kara, and C.Herrmann. (2016) . Implementing Key Performance Indicators for energy
efficiency in manufacturing. Procedia CIRP 57:758-763. doi.org/10.1016/j.procir.2016.11.131
6. AlFaris, F., A.Juaidi, and F.Manzano-Agugliaro. (2016). Improvement of efficiency through an energy management program as a
sustainable practice in schools. Journal of Cleaner Production 135, 794 805.doi.org/10.1016/j.jclepro.2016.06.172
7. Fresner, J., F.Morea , C.Krenn, J.A Uson, and F. Tomasi. (2017). Energy efficiency in small and medium enterprises: Lessons learned
from 280 energy audits across Europe.Journal of Cleaner Production, 142:1650-1660. doi.org /10.1016/ j.jclepro. 2016.11.126
8. Francis, J.R., (2004). What do we know about audit quality?.The British accounting review, 36(4),345-368.doi.org /10.1016 /j
.bar.2004 .09.003
9. Reichelt, K.J., and D.Wang.(2010). National and office-specific measures of auditor industry expertise and effects on audit quality.
Journal of Accounting Research.48,647-686. doi.org/10.1111/j.1475-679X.2009.00363.x
10. Zhang, J., Y. Zhang, S. Chen, and S. Gong,.(2011). How to reduce energy consumption by energy audits and energy management: The
case of province Jilin in China. In 2011 Proceedings of PICMET'11: Technology Management in the Energy Smart World
(PICMET) .IEEE.1-5.
11. Umesha, K., and M. Mieee. (2013). Energy Audit Report on a Technical Institute. IOSR Journal of Electrical and Electronics
Engineering (IOSR-JEEE) 4(1):23-37.
12. Bureau of Energy Efficiency (BEE). (1999).General Aspects of Energy Management and Energy Audit. Guide Books-01.
13. Palanichamy, C., N.S. Babu, R.K. Chelvan and C.Nadarajan. (1999). Restructuring the Indian power sector with energy conservation
as the motive for economic and environmental benefits. IEEE Transactions on Energy Conversion. 14(4): 1589-1596.
doi.org/10.1109/60.815110
14. IEEE Bronze Book for Recommended practice in energy conservation and cost effective planning in industries. New York. IEEE,
1993.
15. Duarte, S. X., and N.Kagan,.(2010). A power-quality index to assess the impact of voltage harmonic distortions and unbalance to three-
phase induction motors. IEEE Transactions on Power Delivery, 25(3): 1846-1854. https://doi. org/10.1109/ TPWRD. 2010.2044665
16. Singh, B., K.Al-Haddad, and A. Chandra.(1999). A review of active filters for power quality improvement. IEEE transactions on
industrial electronics, 46(5): 960-971. https://doi. org/10.1109 / 41. 793345
17. Berg, S. V., J.Adams, and B.Niekum. (1983). Power factors and the efficient pricing and production of reactive power. The Energy
Journal, 4, 93-102.
18. Palanichamy, C., Nadarajan, C., Naveen, R. and Babu, N.S., (2001). Budget constrained energy conservation-an experience with a
textile industry. IEEE Transactions on Energy Conversion, 16(4), pp.340-345.
19. M.Sivaram Krishnan and M.Siva Ramkumar “POWER MANAGEMENT OF A HYBRID SOLAR-WIND ENERGY SYSTEM” in
‘International Journal of Engineering Research & Technology’ 2 (1) pp 1988-1992.
20. M Gowrishankar, P Nagaveni, P Balakrishnan, Transmission line fault detection and classification using discrete wavelet transform
and artificial neural network, Middle-East J. Sci. Res 24 (4), 1112-1121.
21. M. Sivaram Krishnan M. Siva Ramkumar and A. Amudha “FREQUENCY DEVIATION CONTROL IN HYBRID RENEWABLE
ENERGY SYSTEM USING FC-UC “ in International Journal of Control Theory and Applications (IJCTA) 10 (2) pp 333-344
22. M Siva RamKumar, Dr.A Amudha, R.Rajeev “OPTIMIZATION FOR A NOVEL SINGLE SWITCH RESONANT POWER
CONVERTER USING GA TO IMPROVE MPPT EFFICIENCY OF PV APPLICATIONS” in International Journal of Applied
Engineering Research (IJAER) 11(9) pp 6485-6488.
Olga Bagno, Sergey Shevchenko, Antonina Shevchenko, Ekaterina Izhmulkina, Oleg Prokhorov,
Authors:
Alina Petruchenko
Paper Title: Egg Productivity in the Quails Fed on the Extract of Calendula Officinalis
Abstract: In the last decades, in the majority of the developed countries of the world, one of the trends in
obtaining food products, including those of animal origin, has been obtaining organic products that do not
contain artificial ingredients: antibiotics, growth promoters, GMOs, or any other biologically active substances
of other than the natural origin. Currently, phytobiotics, i.e., active components of various plants are successfully
used as their substitutes for preserving the health of animals and poultry, and for improving their productivity.
The authors have studied the effect of the extract of Calendula Officinalis obtained at the Agroecology scientific
laboratory of the Kemerovo SAI using the method of water-ethanol extraction followed by low temperature
drying on the egg productivity of Manchurian quails. It has been found that out of the three dosages of the
preparation used in the experiment (800 mg, 1,600 mg and 2,400 mg per 1 kg of feed) the maximum positive
effect on the studied parameters (egg production, morphological and chemical composition of eggs, feed used
for the production of 10 eggs, poultry preservation rate) was observed for the dosage of Calendula Officinalis
being equal to 800 mg/kg of feed.

Keywords: quails, extract of Calendula Officinalis, egg production.

References:

1. O. A. Bagno, O. N. Prokhorov, S. A. Shevchenko, A. I. Shevchenko, T. V. Dadikina. Fitobiotiki v kormlenii selskokhozyaistvennykh


zhivotnykh [Phytobiotics in the feeding of agricultural animals ]. Agricultural biology, No. 4, 2018, pp. 687 – 697.
707.
2. M.O. Hasan. Effect of Aloe vera and vitamin C on productive performance and qualities trails of eggs in Japanese laying quails. 4108-
Euphrates J of Agri. Sci, vol. 6, 2014, pp. 17-29.
3. N. Mirzah, A. Djulard. Marigold flower extract as a feed additive in the poultry diet: Effects on laying quail performance and egg
41
quality. International Journal of Poultry Science, vol. 16, 2017, pp. 11-15. doi: 10.3923/ijps.2017.11.15 12
4. O.O.K Oko, P.O. Ozung and F.B. Abang. Influence of ethanolic extract of Aspilia africana leaf on the performance and egg qualities of
japanese quails. Global journal of pure and applied sciences, vol. 24, 2018, pp. 135-140. doi: https://dx.doi.org/10.4314/gjpas.v24i2.2
5. Nuraini, Mirzah and Ade Djulardi. Effect of Turmeric (Curcuma domestica, Val) Extract as a Feed Additive on Performance and Egg
Quality of Quail. International Journal of Poultry Science, vol. 18, 2019, pp. 88-92. doi: 10.3923/ijps.2019.88.92
6. Ü. G. Şimşek, M. Çiftçi, M. Özçelik, M. A. Azman, F. Tonbak, N. Özhan. Effects of cinnamon and rosemary oils on egg production,
egg quality, hatchability traits and blood serum mineral contents in laying quails (Coturnix coturnix Japonica). Ankara Üniv Vet Fak
Derg, vol. 62, 2015, pp. 229-236.
7. S. A. Imangulov, I. A. Egorov, T. M. Okolelova [et al.]. Metodika provedeniya nauchnykh i proizvodstvennykh issledovanii po
kormleniyu selskokhozyaistvennoi ptitsy: rekomendatsii [The methodology of scientific and industrial research studies in feeding
poultry: recommendations]. Sergiev Posad: VNITIP, 2004.
8. O. A. Bagno, Y. N. Fedorov, S. A. Shevchenko, A. I. Shevchenko, A. I. Petruchenko. Yaichnaya produktivnost selskokhozyaistvennoi
ptitsy pri skarmlivanii razlichnykh doz organicheskoi formy selena i ioda [Egg productivity of poultry fed with various dosages of
organic forms of selenium and iodine]. Agrarian Bulletin of the Upper Volga region, No. 3, 2018, pp. 70 – 76.
9. FS.2.5.0030.15 Marigold flowers (pharmacopoeial article). The State Pharmacopoeia of the Russian Federation, edition XIII (13),
Moscow, 2015.
10. Fitobioticheskie kormovye dobavki na osnove ekstraktov lekarstvennykh rastenii [Phytobiotic feed supplements based on extracts from
medicinal plants]. Terms of reference: TU 930000 – 1899178 – 002 – 201. Kemerovo, 2018.
11. V. A. Tutelian, B. P. Sukhanov. Sovremennye podkhody k obespecheniyu kachestva i bezopasnosti biologicheski aktivnykh dobavok k
pishche [Modern approaches to ensuring the quality and safety of biologically active food supplements]. Moscow pharmacies, No. 4,
2008, pp. 5 – 6.
12. Ufele Angela Nwogor and Ebenebe Cordelia Ifeyinwa. The Effect of Moringao oleifera on the Growth Performance, Packed Cell
Volume (PCV) and Laying Capacity Of Young Growing Quails. American Journal of Zoological Research, vol. 5, no. 2, 2017, pp. 33-
37. doi: 10.12691/ajzr-5-2-3.
Authors: E.A. Kishnyaykina, K.V. Zhuchaev, O.A. Bagno, O. H. Prokhorovt, E.V. Ulrich, E.A. Izhmulkina
Slaughter Qualities and Chemical Composition of the Meat of the Broiler Chickens Fed with
Paper Title:
Thyme Extract
Abstract: The effect of various dosages of the extract of the thyme medicinal plant on the slaughter qualities
708. and the chemical composition of the meat of broiler chickens has been studied. The preparation was obtained by
4113-
the method of water-ethanol extraction followed by low-temperature drying at the Agroecologia research
41
laboratory of the Kuzbass State Agricultural Academy. The scientific economic experiment with the duration of
17
40 days was performed with broiler chickens of the Hubbard ISA F 15 cross at the broiler farm. One reference
and five experimental groups of day-old broiler chickens were formed, 37 chickens in each group. The chickens
in the reference group received basic diet, while the broilers in the experimental groups additionally received
thyme extract in the following daily dosages: the first — 2 mg/kg, the second — 4 mg/kg, the third — 6 mg/kg,
the fourth — 8 mg/kg, and the fifth — 10 mg/kg of body weight. At the end of the studies, the positive effect of
feeding thyme extract on the characteristics of anatomical dissection of broiler chickens' carcasses was found. In
the third, the fourth, and the fifth experimental groups, no significant differences were found, compared to the
reference group. By the results of dispersion analysis of the data, a significant effect of thyme extract on the
contents of lysine, threonine, and methionine has been found by the amino acid composition of the meat of
broiler chickens.

Keywords: broiler chickens, thyme extract, slaughter quality, meat chemical composition, amino acid
composition.

References:

1. N. M. Kazachkova, S. R. Ishbulatova, G. K. Duskaev. Alternativa antibiotikoterapii v zhivotnovodstve – primenenie lekarstvennykh


rastenii [An alternative to antibiotics in livestock breeding — the use of medicinal plants]. International Student Scientific Bulletin, No.
4(3), 2017. Available: https://www.eduherald.ru/ru/article/view?id=17512
2. W. Windisch, K. Schedle, C. Plitzner, A. Kroismayr. Use of phytogenic products as feed additives for swine and poultry. J. anim. sci.,
vol. 86, 2008, pp. E140-E148 (DOI: 10.2527/jas.2007-0459).
3. M. Naderi, M.R. Akbari, E. Asadi-Khoshoei, K. Khaksar, F. Khajali. Effects of Dietary Inclusion of Turmeric (Curcuma longa) and
Cinnamon (Cinnamomum verum) Powders on Performance, Organs Relative Weight and Some Immune System Parameters in Broiler
Chickens. Poult. Sci. J., vol. 2(2), 2014, pp. 153-163.
4. S.H. Khan. The use of green tea (Camellia sinensis) as a phytogenic substance in poultry diets. Onderstepoort J. Vet. Res., vol. 81,
2014, pp. 1-8. doi: 10.4102/ojvr.v81i1.706.
5. V.K. Karangiya, H.H. Savsani, S.S. Patil, D.D. Garg, K.S. Murthy, N.K Ribadiya, and S.J. Vekariya. Effect of dietary supplementation
of garlic, ginger and their combination on feed intake, growth performance and economics in commercial broilers. Vet. World, vol. 9,
2016, pp. 245-250.
6. A. Kirubakaran, M. Moorthy, R. Chitra and G. Prabakar. Influence of combinations of fenugreek, garlic and black pepper powder on
production traits of the broilers. Vet. World, vol. 9, 2016, pp. 470-474.
7. V. S. Pashtetsky, N. V. Nevkrytaya. Ispolzovanie efirnykh masel v meditsine, aromaterapii, veterinarii i rastenievodstve [The use of
essential oils in medicine, aromatherapy, veterinary and crop production]. Tavria bulletin of agricultural science, No.1(13), 2018, pp.
16 – 38
8. B. Kiczorowska, W. Samolińska, A.R.M. Al-Yasiry, P. Kiczorowski, A. Winiarska-Mieczan. The natural feed additives as
immunostimulants in monogastric animal nutrition – a review. Annals of animal science, Vol. 17, No. 3, 2017, pp. 605-625.
9. S. A. Imangulov, I. A. Egorov, T. M. Okolelova et al. Metodika provedeniya nauchnykh i proizvodstvennykh issledovanii po
kormleniyu selskokhozyaistvennoi ptitsy: rekomendatsii [The methodology of scientific and industrial research in feeding poultry:
recommendations]. Sergiev Posad: VNITIP, 2004.
10. V. A. Tutelian, B. P. Sukhanov. Sovremennye podkhody k obespecheniyu kachestva i bezopasnosti biologicheski aktivnykh dobavok k
pishche [Modern approaches to ensuring the quality and safety of biologically active food supplements]. Moscow pharmacies, No. 4,
2008, pp. 5 – 6.
11. M. V. Zabolotnykh, A. A. Dikikh et al. Aminokislotnyi sostav myasa broilerov pri primenenii kormovoi dobavki "Mikofiks" [The
amino acid composition of the meat of broiler chickens with the use of the Mycofix food additive]. Bulleting of RUDN. Series:
Agronomy and Animal Husbandry, No. 2, 2016, pp. 54 – 57.
12. S. N. Udintsev, T. P. Zhilyakova, D. P. Melnikov. Rastitelnye kormovye dobavki. Perspektivy primeneniya travy i shrota chabretsa
[Vegetative feed additives. Perspectives of using herbs and thyme meal]. Pig Breeding, No. 5, 2010, pp. 18 – 21.
13. S. Popović, L. Kostadinović, O. Đuragić, M. Aćimović. Influence of medicinal plants mixtures (Artemisia absinthium, Thymus
vulgaris, Menthae piperitae, and Thymus serpyllum) in broilers nutrition on biochemical blood status. Journal of Agronomy,
Technology and Engineering Management, Vol. 1(1), 2018, pp. 91-98.

Authors: Manu Singh, Vibhakar Shrimali


Exploring Statistical Parameters of Machine Learning Techniques for Detection and
Paper Title:
Classification of Brain Tumor
Abstract: A computerized system can improve the disease identifying abilities of doctor and also reduce the
time needed for the identification and decision-making in healthcare. Gliomas are the brain tumors that can be
labeled as Benign (non- cancerous) or Malignant (cancerous) tumor. Hence, the different stages of the tumor are
extremely important for identification of appropriate medication. In this paper, a system has been proposed to
detect brain tumor of different stages by MR images. The proposed system uses Fuzzy C-Mean (FCM) as a
clustering technique for better outcome. The main focus in this paper is to refine the required features in two
steps with the help of Discrete Wavelet Transform (DWT) and Independent Component Analysis (ICA) using
three machine learning techniques i.e. Random Forest (RF), Artificial Neural Network (ANN) and Support
Vector Machine (SVM). The final outcome of our experiment indicated that the proposed computerized system
709. identifies the brain tumor using RF, ANN and SVM with 100%, 91.6% and 95.8%, accuracy respectively. We
have also calculated Sensitivity, Specificity, Matthews’s Correlation Coefficient and AUC-ROC curve. Random 4118-
forest shows the highest accuracy as compared to Support Vector Machine and Artificial Neural Networks. 41
24
Keywords: Brain Tumor, Classification, Discrete wavelet Transform, Independent Component Analysis,
Magnetic Resonance Imaging.

References:

1. American Society of Clinical Oncology (ASCO), http://www.asco.org/.


2. Gonzalez, R. C., & Woods, R. E. (2008). Digital image processing (3rd ed.). Pearson Prentice Hall (Prentice Hall, 2002).
3. E.-S. A. El-Dahshan, H. M. Mohsen, K. Revett, & A.-B. M. Salem, “Computer-aided diagnosis of human brain tumor through MRI: A
survey and a new algorithm”, Expert Systems with Applications, vol. 41, pp. 5526–5545, 2014.
4. F. P. Polly, S. K. Shil, M. A. Hossain, A. Ayman, & Y. M. Jang, “Detection and Classification of HGG and LGG Brain Tumor Using
Machine Learning”, International Conference on Information Networking (ICOIN), pp. 813-817, 2018.
5. E. Dandil, M. Cakiroglu, Z. Eksi, “Computer-aided diagnosis of malign and benign brain tumors on MR images”, International
Conference on ICT Innovations, pp. 157–166, 2014.
6. Midas: healthy human brain database. Available online: http://www.insightjournal.org/midas/collection/view/27
7. Brainweb (2014). Brainweb: Simulated brain database.<http://brainweb.bic.mni.mcgill.ca/cgi/brainweb2>
8. M. A. Balafar, “Fuzzy C-mean based brain MRI segmentation algorithms”, Artificial Intelligence Review, vol. 41, pp. 441- 449, 2014.
9. Gasmi, K., Kharrat, A., Messaoud, M. B., & Abid, M., “Automated segmentation of brain tumor using optimal texture features and
support vector machine classifier”, International Conference on Image Analysis and Recognition LNCS, pp. 230–239, 2012.
10. Jafari, M., & Kasaei, S., “Automatic brain tissue detection in MRI images using seeded region growing segmentation and neural network
classification”, Australian Journal of Basic and Applied Sciences, vol. 5(8), pp.1066–1079, 2011.
11. Masulli, F., & Schenone, A., “A fuzzy clustering based segmentation system as support to diagnosis in medical imaging”, Artificial
Intelligence in Medicine, vol.16, pp.129– 147, 1999.
12. Tabatabai, G., Stupp, R., Bent, M. J., Hegi, M.E., Tonn, J.C., Wick, W., & Weller, M., “Molecular diagnostics of gliomas: the clinical
perspective”, Acta Neuropathologica, vol. 120, pp. 585– 592, 2010.
13. Chaplot, S., Patnaik, L.M., & Jagannathan, N.R., “Classification of magnetic resonance brain images using wavelets as input to support
vector machine and neural network”, Biomedical Signal Processing and Control, vol. 1, pp. 86-92, 2006.
14. Van Meir, E.G., Hadjipanayis, C.G., Norden, A.D., Shu, H.K., Wen, P.Y., & Olson, J.J., “Exciting new advances in neuro- oncology:
theavenue to a cure for malignant glioma”, A Cancer Journal for Clinicians, vol. 60, pp. 166–193, 2010.
15. Phillips, R. Velthuizen,S. Phupanich, L. Hall, L. Clarke, & M. Silbiger, “Application of fuzzy C-means segmentation technique for
tissue differentiation in MR images of a hemorrhagic glioblastoma multiform”, Magnetic Resonance Imaging, vol. 29, pp. 277–290,
1995.
16. Khotanlou, H., Colliot, O., Atif, J., & Bloch, I., “3D brain tumor segmentation in MRI using fuzzy classification, symmetry analysis and
spatially constrained deformable models”, Fuzzy Sets and System, vol. 160, pp. 1457-1473, 2009.
17. A. E. Lashkari, “A Neural Network based Method for Brain Abnormality Detection in MR Images Using Gabor Wavelets”, International
Journal of Computer Applications, vol. 4, pp.841- 1140, 2010.
18. Pauline, J., “Brain Tumor Classification Using Wavelet and Texture Based Neural Network”, International Journal of Scientific &
Engineering Research, vol. 3, pp.1–7, 2012.
19. Kolen, J.F., Hutcheson, T., “Reducing the time complexity of the fuzzy c-means algorithm”, IEEE Transactions on Fuzzy Systems, vol.
10, pp.263–267, 2002.
20. Murugavalli, S., Rajamani, V., “A high speed parallel fuzzy c- mean algorithm for brain tumor segmentation”, Bioinform. Medical
Engineering Journal, vol. 6, pp.29–34, 2006.
21. Zacharaki, E.I., Wang, S., Chawla, S., Yoo, D.D., Wolf, R., Melhem, E.R., & Davatzikos, C., “Classification of Brain Tumor Type and
Grade Using MRI Texture and Shape in a Machine Learning Scheme”, Magnetic Resonance in Medicine, vol. 62, pp. 1609–1618, 2009.
22. Gambino, O., Daidone, E., Sciortino, M., Pirrone, R., & Ardizzone, E., “Automatic Skull Stripping in MRI based on Morphological
Filters and Fuzzy C-means Segmentation”, Annual International Conference of the IEEE Engineering in Medicine and Biology Society,
pp.5040-5043, 2011.
23. Bahadure, N.B., Ray, A.K., & Thethi, H.P., “Image Analysis for MRI Based Brain Tumor Detection and Feature Extraction Using
Biologically Inspired BWT and SVM”, Hindawi International Journal of Biomedical Imaging, vol. 2017, pp. 1- 12, 2017.
24. AyseDemirhan, Mustafa Toru, InanGuler, “Segmentation of Tumor and Edema Along with healthy tissues of brain using Wavelets and
Neural Networks”, IEEE Journal of Biomedical and Health Informatics, vol.19, pp.1451-1458, 2015.
25. Dipali M Joshi, Rana N K & Misra VM, “Classification of Brain Cancer Using Artificial Neural Network”, IEEE Conference on
Electronic Computer Technology(ICECT), pp.112-116, 2010.
26. L. Breiman, Random forests, Machine learning, vol. 45, pp. 5- 32, 2001.
27. S. Haykin, Neural Networks: A Comprehensive Foundation, second ed., PHI, 1994.
28. D. M. W. Powers, Evaluation: From Precision, Recall and F- Measure to ROC, Informedness, Markedness & Correlation, 2011, vol. 2,
pp. 37-63.
29. T. Fawcett. (2006, June). An Introduction to ROC Analysis. Pattern Recognition Letters. vol. 27, pp. 861-874.

Authors: Neetish Kumar, Deepa Raj

Paper Title: A New Pentagon Search Algorithm for Fast Block-Matching Motion Estimation
Abstract: The impact of search pattern is a crucial part in the block-based motion estimation for finding the
motion vector. An issue of distortion performance and search speed heavily depends upon the size and shape of
search strategy applied. Performing the deep analysis for motion vector distribution on standard test videos, it is
desirable to have such type of algorithm that meets the requirement of searching motion vector in less time.
Hence, a new kind of Pentagon algorithm is proposed in this paper for fast block-matching motion estimation
(BMME). It is an easy and efficient technique for finding motion vector. Experimental results expose the
proposed Pentagon algorithm sparsely surpass the noted Diamond search (DS) algorithm. The new Pentagon
search algorithm is examined with the previously proposed Diamond search algorithm in terms of performance
measure; the proposed algorithm attains better performance with the less complexity. The experimental
examination also depicts that the pentagon algorithm is better than the previously proposed Diamond search
(DS) in terms of mean-square error performance and required the number of search points. The overall speed
improvement rate (SIR) is about 31% with respect to the DS.
710.
4125-
Keywords: : Diamond Search, motion estimation, PSNR, search points . 41
30
References:

1. Vayalil, Niras Cheeckottu, and Yinan Kong.: ‘VLSI Architecture of Full-Search Variable-Block-Size Motion Estimation for HEVC
Video Encoding.’ IET Circuits, Devices & Systems 11.6 2017: 543-548.
2. Paramkusam, A. V.: ‘Efficient motion estimation algorithm on the layers.’ Electronics Letters 53.7 2017: 467-469.
3. Jia, Hongjun, and Li Zhang.: ‘Directional Cross Diamond Search Algorithm for Fast Block Motion Estimation.’ arXiv preprint
arXiv:0806.0689, 2008.
4. Chau, Lap-Pui, and Ce Zhu.: ‘A fast octagon-based search algorithm for motion estimation.’ Signal Processing 83.3 , 2003, 671-675.
5. Chauhan, Shahida. : ‘Comparative study on diamond search algorithm for motion estimation.’ , 2015.
6. Nie, Yao, and Kai-Kuang Ma.: ‘Adaptive rood pattern search for fast block-matching motion estimation.’ IEEE Transactions on image
processing 11.12, 2002, 1442-1449.
7. Zhu, Shan, and Kai-Kuang Ma.: ‘ A new diamond search algorithm for fast block-matching motion estimation.’ IEEE transactions on
Image Processing 9.2, 2000, 287-290.
8. Zhu, Ce, Xiao Lin, and Lap-Pui Chau.: ‘Hexagon-based search pattern for fast block motion estimation.’ IEEE Trans. Circuits Syst.
Video Techn. 12.5, 2002, 349-355.
9. P. T. Kovács, Z. Nagy, A. Barsi, et. al : ‘Overview of the applicability of H.264/MVC for real-time light-field applications’ 2014 3DTV-
Conference: The True Vision - Capture, Transmission and Display of 3D Video (3DTV-CON), Budapest, 2014, pp. 1-4,.
10. Neetish Kumar, Dr Deepa Raj, ‘Video Processing and its Applications: A survey’ International Journal of Emerging Trends &
Technology in Computer Science (IJETTCS), 2017, ISSN 2278-6856,.
11. Neetish Kumar, Dr Deepa Raj, ‘A Study and Analysis of Images in Different Color Models’, International Journal Of Advanced Studies
In Computer Science And Engineering IJASCSE 2018, Volume 7, Issue 1,.
12. Kulkarni, S. M., D. S. Bormane, and S. L. Nalbalwar. : ‘Coding of video sequences using three step search algorithm.’ Procedia
Computer Science 49, 2015, 42-49.
13. Nguyen, Tung, Philipp Helle, Martin Winken, et al.: ‘Transform coding techniques in HEVC.’ IEEE Journal of Selected Topics in
Signal Processing 7, no. 6, 2013, 978-989.
14. Ugur, K., Liu, H., Lainema, J., Gabbouj, et a : ‘ Parallel encoding-decoding operation for multiview video coding with high coding
efficiency. 3DTV Conference, 2007 (pp. 1-4). IEEE.
15. Stankowski, J., Grajek, T., Wegner, K., et al.: ‘ Video quality in multiple HEVC encoding-decoding cycles.’ 20th International
Conference on Systems, Signals and Image Processing (IWSSIP),2013, (pp. 75-78). IEEE.
16. Xiong, Zixiang, Beong-Jo Kim, and William A. Pearlman.: ‘Multiresolutional encoding and decoding in embedded image and video
coders.’ Acoustics, Speech and Signal Processing, 1998. Proceedings of the 1998 IEEE International Conference on. Vol. 6. IEEE, 1998
17. Yi, Kang, You-Han Lee, and Jeong-Hyun Joo. "A Fast Video Decoding Technique by Means of Converting Input Video Stream into
Forward-Oriented Format Stream in Little-Endian Systems." 2015 7th International Conference on Multimedia, Computer Graphics and
Broadcasting (MulGraB). 2015, IEEE.

Authors: T. Sree Kala, V. Rajakumaran, S. Saradha


Detecting IP Spoofing Attack with SDN-Based Integrated Architecture using Distributed Packet
Paper Title:
Filtering
Abstract: Hoodlums have since quite a while ago utilized the strategy of veiling their actual character, from
masks to nom de plumes to guest id blocking. It should not shock anyone at that point, that crooks who lead their
accursed exercises on systems and PCs should utilize such methods. IP ridiculing is one of the most widely
recognized types of on-line cover. In IP ridiculing, an assailant increases unapproved access to a PC or a system
by causing it to give the idea that a malignant message has originated from a confided in machine by
"caricaturing" the IP address of that machine. IP mocking is a strategy used to increase unapproved access to
PCs, whereby the aggressor sends messages to a PC with a manufacturing IP address demonstrating that the
message is originating from a confided in host. IP ridiculing has been utilized in circulated refusal of-
administration (DDoS) assaults and interruptions. It is additionally vital for reflector DDoS assaults, where
servers answer to ridiculed demands and these answers overpower the unfortunate casualty whose address was
abused.

Keywords: Cyber-security, IP address validation, software-defined networking.


711.
References: 4131-
41
1. P. Ferguson and D. Senie,“Network Ingress Filtering: Defeating Denial of Service Attacks which employs IP Source Address 36
Spoofing”, The Internet Society,Jan 1998.
2. R. Beverly and S. Baue,“The Spoofer Project: Inferring the Extent of Internet Source Address Filtering on the Internet” In Proc. of
SRUTI, 2006.
3. D. Moore, C. Shannon, D. J. Brown, G. M. Voelker, and S. Savage,“Inferring Internet denial-of-service Activity”, ACM Transactions
on Computer Systems (TOCS), , May 2006.
4. D. Kawamoto,“DNS recursion leads to nastier DoS attacks”, ZDNet.co.uk, March 2006.
5. Haining Wang, , Cheng Jin, and Kang G. Shin, “Defense Against Spoofed IP Traffic Using Hop-Count Filtering”,IEEE/ACM
Transactions on Networking, Vol. 15, No. 1, February 2007.
6. K. Park and H.Lee, “On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law
Internets”. In Proc. of ACM SIGCOMM, 2006.
7. Z. Duan, X. Yuan, and J. Chandrashekar,“Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates”. In
Proc. of INFOCOM, 2006.
8. A. Bremler-Barr and H. Levy, “Spoofing Prevention Method”, In Proc. of INFOCOM, 2005.
9. X. Liu, X. Yang, D. Wetherall, and T. Anderson, “Efficient and Secure Source Authentication with Packet Passports”, In Proc. of
SRUTI, 2006.
10. ArpitaNarayan ,UpendraKumar, “A Defence Mechanism: DNS based DDoS Attack”, International Journal of Computer Trends and
Technology (IJCTT) , VOL. 33, NO. 1, March 2016.

Authors: M V S SNagendranath, A. Ramesh Babu


Paper Title: Effective Routing Protocol And Analysing Various Attacks In The Manet Network
Abstract: Mobile Ad-hoc Network is the self-configuring structure less network for transmitting the
information from one node to another node because of the independent node direction. During the information
transmission in the network one of the main challenges is to maintain the intermediate node information for
making the effective transmission. In addition the intermediate person may be hacking the information by
performing the Wormhole and Black hole attacks. So, in this paper proposes an effective Neighboring
Relationship based Clustering protocol. The protocol analyzes the neighboring relationship between the
712.
transmitted node information protocols. Each similar node information is grouped into the cluster. At the time 4136-
cluster head and neighboring node topology has been updated continuously for avoiding the middle man attacks 41
like, wormhole and black hole. Further the energy consumption is managed by applying the Fireflies algorithm 40
based Energy efficient routing protocol with efficient manner. Then the efficiency of the system is analyzed
using the experimental results like, packet delivery ratio, energy utilization factor and percentage of attack free
routing efficiency.

Keywords: Black hole, Fireflies algorithm based Energy efficient routing protocol ,Mobile Ad-hoc networks,
Neighboring Relationship based Clustering protocol.
References:

1. Ruay-Shiung Chang and Chia-JouKuo , " An Energy Efficient Routing Mechanism for Wireless Sensor Networks", Proceedings of
the 20thInternational Conference on Advanced Information Networking and Applications , Vienna, Austria ,pp. 308 - 312 , April
2006.
2. Choi, P. Shah and S. K. Das,“ A Framework for Energy-Saving Data Gathering Using Two-Phase Clustering in Wireless Sensor
Networks,” Proceeding of the Mobile and Ubiquitous Systems, Boston, pp.203- 212,August 2004.
3. Sheela , G. Mahadevan, Mollifying the Effect of Cloning, Sink Hole and Black Hole Attacks in Wireless Sensor Networks using
Mobile Agents with Several Base Stations, International Journal of Computer Applications (0975– 8887) Volume 55– No.9, October
2012.
4. MahaAbdelhaq, Rosilah Hassan, Mahamod Ismail, Raed Alsaqour, DaudIsraf, Detecting Sleep Deprivation Attack over MANET
Using a Danger Theory –Based Algorithm, International Journal on New Computer Architectures and Their Applications (IJNCAA)
1(3): 534-541 The Society of Digital Information and Wireless Communications, 2011 (ISSN: 2220-9085).
5. Gagandeep, Aashima, Pawan Kumar, Analysis of Different Security Attacks in MANETs on Protocol Stack A Review ,International
Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-1,Issue-5, June 2012.
6. Tarek M. Mahmoud, Abdelmgeid A. Aly, Omar Makram,“A Modified AODV Routing Protocol to Avoid Black Hole Attack in
MANETs”, International Journal of Computer Applications (0975 – 8887), Volume 109 – No. 6, 2015.
7. Sonal R. Jathe, Dakhane, “Detection of Sinkhole Attack against DSR Protocol MANET”, International Journal of Advanced Research
in Computer Science and Software Engineering”, Volume 2, Issue 4, April 2012.
8. Mohammad Al-Shurman, Seong-Moo Yoo, Seungjin Park, “Black hole attack in mobile Ad Hoc networks”, ACM-SE 42
Proceedings of the 42nd annual Southeast regional conference, Pages 96-97.
9. Chaitas Shah,Prof. Manoj Patel, “Improving ZRP Protocol against Blackhole Attack”,
https://www.ijedr.org/papers/IJEDR1402103.pdf.
10. Dharman, G. Venkatachalam, “Detection of Gray Hole Attack in AODV for MANETs by using Secure Message Digest”, South Asian
Journal of Engineering and Technology Vol.2, No.17 (2016) 321–329.
11. PrachiGoyal, Chitvan Gupta, “An Approach for Security Measures of Black Hole Attack in MANET”, International Journal of
Emerging Trends in Science and Technology.
12. Qin and R. Zimmermann, “An Energy-efficient Voting-basedClustering Algorithm for Sensor Networks,” Proceedings of the Sixth
International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First
ACIS International Workshop on Self-Assembling Wireless Networks(SNPD/SAWN’05), pp. 444-451 ,Maryland, USA, May 2005.
13. Younis and S. Fahmy, “Distributed Clustering for Scalable, Long Lived Sensor Networks,” Proceedings of the 9th Annual
International Conference on Mobile Computing and Networking, ACMMobiCom,San Diego, CA, September 2003.
14. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, “Providing robust and ubiquitous security support for mobile ad-hoc networks,” in
Proc. 9th International Conference on Network Protocols (ICNP).Riverside, California: IEEE, Nov. 2001, pp. 251–260.
15. Mingqiang, E. R. Inn-Inn and K. G. S. Winston, “Analysis of Clustering and Routing Overhead for Clustered Mobile Ad Hoc
Networks”, (ICDCS'06) 26th IEEE International Conference on Distributed Computing Systems, pp.46, 2006.

Authors: V Anandkumar, Kalaiarasan T R, Ratheesh Kumar A M

Paper Title: Impact of Finding Selfish Nodes in Manet


Abstract: The nodes that operate in the self-organized functions of Mobile Ad hoc Networks (MANETs)
participate in the network but increase the energy and resources consumption. As some nodes are non-
cooperative with others in the network, it is necessary that those nodes have to be removed. Active researches
are conducted to deal with those selfish nodes that are non-cooperative. Methods/ Statistics: Our paper analyzes
by comparing the 2ACK method simulated using hash chain one-way scheme with digital signature and DSR
methods. Findings: The simulation analysis suggest that a considerable percentage of packets delivered of 2ACK
method is greater when compared with Digital signature or any other DSR methods but has the capability in
finding a considerable number of selfish nodes present in the network. Applications/ Improvements: the 2ACK
scheme can be used to control the network overhead using the authentication schemes and can be enhanced to
monitor the video traffic can be monitored.

Keywords: MANET, misbehaving Nodes, Digital Signature, MAC layer, one way hash chain.

References:
713.
1. V.Anandkumar and S.Subramanian, ‘Security Based on Context -Aware Adaptive Routing in Delay Tolerant Mobile Ad Hoc
4141-
Networks’, Australian Journal of Basic and Applied Sciences, vol. 9, no. 7, pp. 669 –676,2015 41
2. V. Anandkumar, S. Subramanian and P.Thangam, ”Improving the Performance Using Shared Spread Protocol in Issue Guarantee 44
Protocol over Delay Tolerant Networks’, International Journal of Applied Engineering Research, ISSN 0973-4562, vol.10, no.23, pp.
43737-43740,2015.
3. L.M. Feeney and Nilsson, “Investigating the Energy Consumption of a Wireless Network Interface in an AdHoc Networking
Environment,” Proc. IEEE INFOCOM, 2001.
4. S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Proc. MobiCom, Aug.2000.
5. S. Buchegger and J.-Y. Le Boudec Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes, Fairness in Dynamic
Ad-Hoc Networks,” Proc. MobiHoc, June 2002.
6. D. Johnson, D. Maltz, Y.C. Hu, and J. Jetcheva, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR),”Internet
draft, Feb. 2002.
7. S. Buchegger and J.-Y. Le Boudec, “Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes, Fairness in Dynamic
Ad-Hoc Networks,” Proc. MobiHoc, June 2002.
8. R.L. Rivest, “RFC 1321—The MD5 Message-Digest Algorithm,” technical report, MIT Laboratory for Computer Science and RSA
Data Security,Inc.,Apr.1992.
9. D. Eastlake and P. Jones, “RFC 3174—US Secure Hash Algorithm 1(SHA1),” technical report, Motorola and Cisco Systems,
Sept.2001.
10. Kalaiarasan T R, Anandkumar V, Ratheesh Kumar A M,” Sales Forecasting using RNN”, International Journal of Innovative
Technology and ExploringEngineering(IJITEE)
ISSN: 2278-3075, Volume-8 Issue-9, July 2019.

714. Authors: Nagarjuna Appana, Udaya Raju P


Paper Title: Secure and Access Control Data Monitoring in Vehicular Ad Hoc Network
Abstract: Present days innovation identifies with internet of Vehicles (IOV) has been expanded to break down
traffic in the board frameworks. It is utilized to portray traffic examination and improve proficiency of the
vehicle traffic. The stage can take care of the issue of capacity, investigation and multi terminal dispersion of
mass information, give traffic data administrations to traffic the board offices and people in general, it is a
helpful endeavor to apply propelled data innovation to the transportation business. Causing the broad worries in
the exploration network. To empower credible and classified correspondences among a gathering of haze hubs,
in this paper, we propose a productive key exchange protocol based on cipher text policy attribute-based
encryption (CP-ABE) to set up secure interchanges among the members. To accomplish classification,
verification, certainty, and access control, we consolidate CP-ABE and computerized signature strategies. We
investigate the productivity of our convention regarding security and execution. We likewise execute our
convention and contrast it and the endorsement based plan to delineate its practicality.

Keywords: Wireless sensor networks, Internet of Things, Road side Unit, attribute based encryption.

References:

1. SHREE KRISHNA SHARMA,” Live Data Analytics With Collaborative Edge and Cloud Processing in Wireless IoT Networks”,
Received January 31, 2017, accepted February 27, 2017, date of publication March 20, 2017, date of current version April 24, 2017.
2. S. K. Sharma, T. E. Bogale, S. Chatzinotas, X. Wang, and L. B. Le, ``Physical layer aspects of wireless IoT,'' in Proc. Int. Symp.
Wireless Commun. Syst. (ISWCS), Sep. 2016, pp. 304_308.
3. P. Fan, ``Coping with the big data: Convergence of communications, computing and storage,'' China Commun., vol. 13, no. 9, pp.
203_207, Sep. 2016.
4. H. Liu, Z. Chen, and L. Qian, ``The three primary colors of mobile systems,'' IEEE Commun. Mag., vol. 54, no. 9, pp. 15_21, Sep. 4145-
2016. 41
5. S. Andreev et al., ``Exploring synergy between communications, caching, and computing in 5G-grade deployments,'' IEEE Commun.
Mag., vol. 54, no. 8, pp. 60_69, Aug. 2016.
49
6. J. Tang and T. Q. S. Quek, ``The role of cloud computing in contentcentric mobile networking,'' IEEE Commun. Mag., vol. 54, no. 8,
pp. 52_59, Aug. 2016.
7. P. Corcoran and S. K. Datta, ``Mobile-edge computing and the Internet of Things for consumers: Extending cloud computing and
services to the edge of the network,'' IEEE Consum. Electron. Mag., vol. 5, no. 4, pp. 73_74, Oct. 2016.
8. X. Masip-Bruin, E. Marn-Tordera, G. Tashakor, A. Jukan, and G. J. Ren, ``Foggy clouds and cloudy fogs: A real need for coordinated
management of fog-to-cloud computing systems,'' IEEE Wireless Commun., vol. 23, no. 5, pp. 120_128, Oct. 2016.
9. C. Vallati, A. Virdis, E. Mingozzi, and G. Stea, ``Mobile-edge computing come home connecting things in future smart homes using
LTE deviceto- device communications,'' IEEE Consum. Electron. Mag., vol. 5, no. 4, pp. 77_83, Oct. 2016.
10. M. Satyanarayanan, ``The emergence of edge computing,'' Computer, vol. 50, no. 1, pp. 30_39, Jan. 2017.
11. S. H. Park, O. Simeone, and S. Shamai (Shitz), ``Joint optimization of cloud and edge processing for fog radio access networks,'' IEEE
Trans. Wireless Commun., vol. 15, no. 11, pp. 7621_7632, Nov. 2016.
12. M. Chiang and T. Zhang, ``Fog and IoT: An overview of research opportunities,'' IEEE Internet Things J., vol. 3, no. 6, pp. 854_864,
Dec. 2016.
13. S. Yin and O. Kaynak, ``Big data for modern industry: Challenges and trends [point of view],'' Proc. IEEE, vol. 103, no. 2, pp.
143_146, Feb. 2015.
14. H. Hu, Y. Wen, T.-S. Chua, and X. Li, ``Toward scalable systems for big data analytics: A technology tutorial,'' IEEE Access, vol. 2,
pp. 652_687, Jul. 2014.
15. S. Bi, R. Zhang, Z. Ding, and S. Cui, ``Wireless communications in the era of big data,'' IEEE Commun. Mag., vol. 53, no. 10, pp.
190_199, Oct. 2015.
16. Y. He, F. R. Yu, N. Zhao, H. Yin, H. Yao, and R. C. Qiu, ``Big data analytics in mobile cellular networks,'' IEEE Access, vol. 4, pp.
1985_1996, 2016.
17. H. Cai, B. Xu, L. Jiang, and A. V. Vasilakos, ``IoT-based big data storage systems in cloud computing: Perspectives and challenges,''
IEEE Internet Things J., vol. 4, no. 1, pp. 75_87, Feb. 2017.
18. D. Puthal, S. Nepal, R. Ranjan, and J. Chen, ``Threats to networking cloud and edge datacenters in the Internet of Things,'' IEEE Cloud
Comput., vol. 3, no. 3, pp. 64_71, May 2016.
19. J. A. Stankovic, ``Research directions for the Internet of Things,'' IEEE Internet Things J., vol. 1, no. 1, pp. 3_9, Feb. 2014.

Authors: Parvathapuram Pavan Kumar, T.Jaya, P.Swaminathan


Implementation of Software Controlled Radio for Long Range Communication with High Data
Paper Title:
Rate and Optimal Capacity
Abstract: In the recent past, the software controlled radio (SCR) plays major role in wireless communication
for long range communication. The wireless communication based SCR has communicated the information for a
short distance due to the low data rate and poor capacity of frequency modulation scheme. The OFDM
technology has adapted the SCR for providing elimination of error due to the communication of information for
long range. The synchronization error is highly reduced by applying the matched filter between transmitter and
receiver antennas. The distributed antenna system is implemented with OFDM SCR communication for
715. information transfer through the wireless channels. The AWGN, Rayleigh and Rician fading channels are used
for long range communication of SCR information. The number of base stations (BS) is reduced by finding the 4150-
energy efficient transmission using SCR for long range communication. The heuristic approach is used for 41
improving the capacity of the SCR system in terms of Mbps. The Inter Symbol Interference (ISI) and Inter 58
Carrier Interference (ICI) are reduced by applying the cyclic prefix of OFDM by applying an Advanced Per
Subcarrier Channel Equalizer (APSCE). The equalizer technique is used to provide reduced Bit Error Rate
(BER) with improved Signal to Noise Ratio (SNR).

Keywords: SCR, OFDM, ISI, ICI, APSCE.

References:
1. A. F. B. Selva, A. L. G. Reis, “Introduction to the Software-defined Radio Approach,” IEEE LATIN AMERICA TRANSACTIONS,
VOL. 10, NO. 1, JAN. 2012.
2. Jan Craninckx, imec, “CMOS Software-Defined RadioTransceivers: Analog Design in Digital Technology,” 0163-6804/12/$25.00 ©
2012 IEEE IEEE Communications Magazine • April 2012.
3. Xiaojing Huang, Y. Jay Guo, “Sample Rate Conversion Using B-Spline Interpolation for OFDM Based Software Defined Radios,”
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 60, NO. 8, AUGUST 2012.
4. Wai-Kong Lee, Martin J. W. Schubert, “Multi-source Energy Harvesting and Storage for Floating Wireless Sensor Network Nodes
With Long Range Communication Capability,” 0093-9994 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution
requires IEEE permission.
5. Stefan Aust, R. Venkatesha Prasad, “Outdoor Long-range WLANs:A Lesson for IEEE 802.11ah,” DOI
10.1109/COMST.2015.2429311, IEEE Communications Surveys & Tutorials.
6. Jienan Chen, Junfei Xie, “Long-Range and Broadband Aerial Communication using Directional Antennas (ACDA): Design and
Implementation,” Citation information: DOI 10.1109/TVT.2017.2723802, IEEE Transactions on Vehicular Technology.
7. Lina Al-Kanj, Zaher Dawy, “Energy-Aware Cooperative Content Distribution over Wireless Networks: Design Alternatives and
Implementation Aspects, IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 15, NO. 4, FOURTH QUARTER 2013.
8. Dengkui Zhu, Boyu Li, “A Novel Hybrid Beamforming Algorithm with Unified Analog Beamforming by Subspace Construction
Based on Partial CSI for Massive MIMO-OFDM Systems,” information: DOI 10.1109/TCOMM.2016.2625794, IEEE Transactions on
Communications.
9. Zhaoquan Li and Xin Wang, “Utility Maximization over Ergodic Capacity Regions of Fading OFDMA Channels,” IEEE
TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 11, NO. 7, JULY 2012.
10. Yongjun Xu1, 2,*, Yuan Hu1, “Optimal Power Allocation for Multiuser OFDM-Based Cognitive Heterogeneous Networks,” China
Communications • September 2017.
11. V. I. Rodríguez, J. Sánchez, “Empowering Software Radio: IT++ As A GNU Radio Out-Of-Tree Implementation,” EEE LATIN
AMERICA TRANSACTIONS, VOL. 12, NO. 2, MARCH 2014. Rida, J. F. A., Bhardwaj, A., & Jaiswal, A. (2014). Design
optimization of optical communication systems using carbon nanotubes (CNTs) based on optical code division multiple access
(OCDMA). Int. J. Comp. Sci. Network Security, 14, 102-112.
12. Amiya Ranjan Panda, Debahuti Mishra, “FPGA Implementation of Software Defined Radio Based Flight Termination
System,”Citation information: DOI 10.1109/TII.2014.2364557, IEEE Transactions on Industrial Informatics.
13. David Carey, Robert Lowdermilk, “Testing Software Defined and Cognitive Radios using Software Defined Synthetic Instruments,”
IEEE Instrumentation & Measurement Magazine 1094-6969/15/$25.00©2015IEEE. Ali, K. M. Telecommunication Planning and
Maintenance for Electrical Network in Unstable Environments.
14. Rodolfo Alvizu, Sebastian Troia, “Matheuristic With Machine-Learning- Based Prediction for Software-Defined Mobile Metro-Core
Networks,” VOL. 9, NO. 9/SEPTEMBER 2017/J. OPT. COMMUN. NETW.
15. Mustafa Y. Arslan, Karthikeyan Sundaresan, “Software-Defined Networking inCellular Radio Access Networks: Potential and
Challenges,” IEEE Communications Magazine • January 2015.
16. FU Yonghong1,2,3, BI Jun1,3, “A Dormant Multi-Controller Model for Software Defined Networking,” China Communications •
March 2014.
Umesh, K. S., Pravin, V. K., & Rajagopal, K. (2014). Experimental Investigation and CFD Analysis of Multi-Cylinder Four Stroke SI
Engine Exhaust Manifold for Optimal Geometry to Reduce Back Pressure and to Improve Fuel Efficiency. International Journal of
Automobile Engineering Research and Development, 4, 13-20.
17. Valentin Goverdovsky, David C. Yates, “Modular Software-Defined Radio Testbed for Rapid Prototyping of Localization
Algorithms,” IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT.
18. Licai Fang, Defeng (David) Huang, “Neumann Series Expansion Based LMMSE Channel Estimation for OFDM Systems,” DOI
10.1109/LCOMM.2016.2526624, IEEE Communications Letters.
19. Mahdi Khosravi, Saeed Mashhadi, “Joint Pilot Power & Pattern Design for Compressive OFDM Channel Estimation,” DOI
10.1109/LCOMM.2014.2371036, IEEE Communications Letters. Das, S., & Agarwal, A. Optimal Portfolio Construction of
Pharmaceutical Companies-A Study on CNX Pharma Index.
20. Slavche Pejoski, Venceslav Kafedziski, “Estimation of Sparse Time Dispersive Channels in Pilot Aided OFDM Using Atomic Norm,”
IEEE WIRELESS COMMUNICATIONS LETTERS, VOL. 4, NO. 4, AUGUST 2015.Jebaseeli, M. E., & Dhayabaran, D. P. (2013).
Optimal Solution To Fully Fuzzy Time Cost Trade Off Problem. International Journal of Applied Mathematics & Statistical
Sciences, 2(2), 27-34.
21. Slavche Pejoski, Venceslav Kafedziski, “Asymptotic Capacity Lower Bound for an OFDM System with Lasso Compressed Sensing
Channel Estimation for Bernoulli-Gaussian Channel,” IEEE COMMUNICATIONS LETTERS, VOL. 19, NO. 3 MARCH
2015.Hassaan, G. A. Optimal design an anti-accidents vehicle–buffer. International journal of Research in Engineering and
Technology (Impact: IJRET) ISSN (E), 2321-8843.
22. Jianping Zheng, Ru Chen, “Linear Processing for Intercarrier Interference in OFDM Index Modulation Based on Capacity
Maximization,” DOI 10.1109/LSP.2017.2687471, IEEE Signal Processing Letters.

Authors: Madhav Rana, Supervisor ER. Nitin Verma

Paper Title: Dynamic Analysis of Steel Frame Structure (Regular in Plan) using Curved Bracing Systems
Abstract: Steel structures provide better resistance against lateral and various other combinations of loads.
Steel structures have various advantages over RCC structures as they have high strength to weight ratio,
uniformity, elasticity flexibility and take minimum time for erection (as large prefabricated structures are
available). Steel is recyclable too. Bracing systems are well known to increase the stiffness of any type of
structure. Using bracing system in steel structures increases the stiffness of the structures to a large extent. In
present paper, the evaluation of different kinds of curved bracing system was carried out for steel framed
structure while performing dynamic seismic analysis as per IS:1893:2016. The behavior and performance of
716. various shaped of curved bracing was analyzed in software staad.pro and results were collected and represented
4159-
in the form of tables, graphs and figures. For this purpose, 14 storey regular building was chosen and different
41
geometric and design parameters were taken as per the codal provisions. The height of each floor was considered
65
as 3.6m. Whereas, the plan of the building entails 6 x 6 bays in both the direction and the size of each panel was
taken as 5 x 5m. After scrutinizing the results gathered, it can be concluded that ‘AV Arc’ bracing system is the
most effective bracing system and it can be used effectively to resist lateral loads such as earthquake loads.

Keywords: Dynamic Seismic Analysis Curved Bracing, High-Rice Building, Steel Building.

References:
1. Muhammad UmairSaleem and Hisham Jahangir Qureshi, “Design Solutions for Sustainable Construction of Pre Engineered Steel
Buildings”, International Journal of Research Sciences and Advanced Engineering, doi:10.3390/su10061761, pp-1-16, 2018.
2. Jyothi D N, “Comparative analysis of RCC and steel structure”, International Research Journal of Engineering and Technology
(IRJET), Vol.05 Issue 02 ,pp. 345-347, 2018.
3. Prasad, V., & Philip, N. (2014). Effectiveness of inclusion of Steel bracing in existing RC framed structure. Impact Journals, 2(9), 81-
88.
4. Raghav Gupta et. al.; “Comparative Analysis between Flat Slab and Grid Slab of High Rise Buildings with Varying Geometry under
Seismic and Wind Loading Condition”, Journal of Ceramics and Concrete Sciences, Vol. 3, Issue 1, pp. 1-7, 2018.
5. Kuldeep Kumar Chaudhary et. al.;“ Analytical Study on the Structure Behaviour of Regular and Irregular Space Frame by Staad.Pro
V8i”, International Journal of Recent Scientific Research Research, Vol. 9, pp. 26749-26754, 2018.
6. KM, A. F., & VARGHESE, S. (2014). Behavioural study of steel fiber and polypropylene fiber reinforced concrete. Int. J. Res. Eng.
Technol., 2(10).
7. KurapatiNikhila , A Srikanth; “Study of Nonlinear Behaviour of a Braced Structure in all Seismic Zones”, International Journal of
Advanced Research in Science, Engineering and Technology, Vol. 4, Issue 6 , pp. 4095-4109,2017.
8. Sunitha, K. R., & Jacob, B. (2015). Dynamic Buckling Of Steel Water Tank Under Seismic Loading. International Journal of Civil
Engineering (IJCE), 4(6), 81-90.
9. Abdul Juned Siddiqui et. al.; “Analysis and Strengthing of Soft Storey Building with Equivalent Diagonal Strut at Center under
Earthquake and Wind Load”, International Journal of Engineering Research, Vol.5, Issue No.2, pp. 162- 171 ,2016.
10. K. Ramakrishna Reddy, Dr. S. Vijaya Mohan Rao, “Seismic Analysis of High Raised Building by Response Spectrum Method”,
International journal of Advance Technology and Innovative Research, Vol. 08, pp. 4111-4118, 2016.
11. Salem R.S Ghdoura, Vikas Srivastava, “Analysis of Steel Framed Structure using STAAD Pro and ROBOT Software”, International
Journal of Scientific Engineering and Technology Research, Vol.05, IssueNo.07, pp. 1442-1449 , 2016.
12. Mantha, V., & SS, S. (2016). Comparison between Seismic Analysis and Non-Seismic Analysis of G+ 17 Building Using
Sap2000. International Journal of Earthquake Engineering and Geological Science,(IJEEGS), 6(2).
13. A.Sattainathan Sharma, “Comparative study of cost and time evaluation in RCC, steel & Composite high rise building”, Journal of
Chemical and Pharmaceutical Sciences, Vol. 8,Issue 4, pp. 911-915, 2015.
14. AbhyudayTitiksh, Dr. M.K. Gupta, “A Study of the Various Structural Framing Systems Subjected to Seismic Loads”, SSRG
International Journal of Civil Engineering (SSRG-IJCE),Vol. 2,Issue 4, 2015.
15. Kintali Sai Nanda Kishore et al.; “Comparative Study of Wind Analysis with Horizontal Irregularities in Multi-Storied Buildings using
STAAD.PRO”, IJSTE - International Journal of Science Technology &Engineering , Vol.2, Issue 01, 2015.
16. Nezami, M., & Rahi, M. (2016). Fragility Analysis of Existing Steel Building and Possible Rehabilitation by Fuzzy Expert Systems
Under Blast and Dynamic Loads. International Journal of Civil, Structural, Environmental and Infrastructure Engineering Research
and Development (IJCSEIERD) ISSN (P), 2249-6866.
17. S.M. Dhawade , P.S. Pajgade, “Consideration of Seismic Design of Multistoried Steel Structure” International Journal of Civil
Engineering Research, Vol. 5, pp. 177-182 , 2014.
18. B Sri Harsha, J Vikranth, “Study And Comparison Of Contruction Sequence Analysis With Regular Analysis By Using Etabs”,
International Journal of Research Sciences and Advanced Engineering, Volume 2 , Issue 8, PP: 218 – 227, 2014.
19. K. Rama Raju et. al.; “Analysis and Design of RC Tall Building Subjected to Wind and Earthquake Loads” The Eighth Asia-Pacific
Conference on Wind Engineering, pp. 844-852, 2013.
20. A. Jesumi, M.G. Rajendran, “Optimal Bracing System for Steel Towers” International Journal of Engineering Research and
Applications (IJERA),Vol. 3, Issue 2, pp.729-732, 2013.
21. M.G.Kalyanshetti, G.S. Mirajkar, “Comparison Between Conventional Steel Structures And Tubular Steel Structures”, International
Journal of Engineering Research and Applications (IJERA), Vol. 2, Issue 6, pp.1460-1464, 2012.

Authors: Thaha.H.S, T.Ruban Deva Prakash

Paper Title: Reduction of Power Quality Issues in Micro-Grid using GA Tuned PI Controller Based DVR
Abstract: In the present energy scenario, one of major problems is with Power quality. Power quality came to
more relevant, focused, with the addition of suitable equipment, where its behavior is very much important to the
power supply quality. Power quality issue is a phenomenon noted as a not usual standard current, frequency or
voltage which may results in a failure of sophiscated devices. The main issue focuses at the power swell & sag.
In the paper, authors present a novel methodology for the prevention of voltage sag & swell. To rectify this
issue, customized power equipments are adopted. Among them, Dynamic Voltage Restorer (DVR), the best as
well as right advanced customized power equipment used in power distribution networks. The advantages
include reduced price, low size, and its good transient response to the interferences. This work explain the
MATLAB results of a Dynamic Voltage Restorer (DVR) modeling and analysis. Here, conventional controller
like PI type and GA Tuned PI controller are used for comparison. In the offered method, PI controller
parameters using GA Tuned implemented is being replaced by the traditional PI controller in order to develop
the performance of the plant. The aim of the controller is made faster than conventional technique based
controller. By MATLAB simulation tool, the performance can be studied.
717.
4166-
Keywords: DVR, Genetic Algorithm (GA), Solid State Devices, Power Quality.
41
72
References:

1. Yun Wei Li, Frede Blaabjerg, D. Mahinda Vilathgamuwa, and Poh Chiang Loh, “Design and Comparison of High Performance
Stationary-Frame Controllers for DVR Implementation” IEEE Transactions on Power Electronics, Vol. 22, No. 2, March 2007.
2. Ezhilarasan S., Balasubramanian G., DVR for Voltage Sag Mitigation Using Pi with Fuzzy Logic Controller, International Journal of
Engineering Research and Application, Vol. 3. 2013.
3. Y. Zhao. (Nov. 11, 2016). Electrical Power Systems Quality. Anusha, S., Karpagam, G., & Bhuvaneswarri, E. (2014). Comparison of
tuning methods of PID controller. International J. of Management, Information Technology and Engineering, 3, 1-8.
4. R. Bayindir, E. Hossain, E. Kabalci, and R. Perez, ``A comprehensive study on micro grid technology,'' Int. J. Renew. Energy Res.,
vol. 4, no. 4, pp. 1094-1107, 2014.
5. Thaha H S, Ruben Deva Prakash, “Reduction of Power Quality Issues in Dispersed Generation & Smart Grids”, Journal of
Advanced Research in Dynamical and Control Systems Vol. 9. Sp– 18 / 2017. Jhapte, R., & Krishnan, K. Modelling Of Electric Arc
Furnace And Control Algorithms Using Dstatcom With Fuzzy Logic For Improvement Of Power Quality.
6. Nagaraj B., Subha S., and Rampriya B “Tuning Algorithms for PID Controller Using Soft Computing Techniques”, IJCSNS
International Journal of Computer Science and Network Security, Vol.8 No.4, pp.278-281, 2008.
7. Gao Jun-shan, Mu Xiao-guang, and Yang Jia-xiang, “ PID controller based on GA and Neural network”, Electric Machines and
Control, Vol 8, No 2, pp.108-111.
8. Melanie Mitchell. (1999), “An introduction to genetic algorithms”, Fifth printing, MIT Press.

Anusuya, V., & Kavitha, R. A New Hybrid Ant Based Genetic Algorithm–Fuzzy Shortest Path Problem.
9. Ge S.S., Lee T. H., and Zhu G. (1996), “Genetic algorithm tuning of Lyapunov-based controllers: An Application to a Single-Link
flexible Robot System”, IEEE transaction on industrial electronics, Vol. 43, No.5.
10. Thaha H S, Ruben Deva Prakash, “Reduction of Power Quality Issues in Micro-Grid Using Fuzzy Logic Based DVR”, International
Journal of Applied Engineering Research, ISSN 0973 -4562, Vol 13, Number 11 (2018) pp. 9746-9751.Kanwar, P. S., & Sharma, R.
Power Quality And Voltage Stability Of Transmission Line Using Statcom And Sssc.
11. Bingsen Wang, Giri Venkataramanan and Mahesh Illindala, “Operation and Control of a Dynamic Voltage Restorer Using Transformer
Coupled H-Bridge Converters”, IEEE Transactions on Power Electronics, Vol. 21, No. 4, July 2006.
12. Bingsen Wang and Giri Venkataramanan, “Dynamic Voltage Restorer Utilizing a Matrix Converter and Flywheel Energy Storage”
IEEE Transactions on Industry Applications, Vol. 45, No. 1, January/February 2009.
13. Changjiang Zhan, Vigna Kumaran Ramachandaramurthy, Atputharajah Arulampalam, Chris Fitzer,Stylianos Kromlidis, Mike Barnes
and Nicholas Jenkins, “Dynamic Voltage Restorer Based on Voltage-Space-Vector PWM Control” IEEE Transactions on Industry
Applications, Vol. 37, No. 6, November/December 2001.Eashwaramma, N., Praveen, J., & Vijayakumar, M. (2018). Modelling and
Designing of Cascaded 9 Level Voltage Source Converter Based on DVR for Mitigating Harmonics in Distributed Power System
Using Unit Vector. International Journal of Electrical and Electronics Engineering Research (IJEEER), 8(1), 11-20.
14. Changjiang Zhan, Atputharajah Arulampalam and Nicholas Jenkins, “Four-Wire Dynamic Voltage Restorer Based on a Three-
Dimensional Voltage Space Vector PWM Algorithm”, IEEE Transactions on Power Electronics, Vol. 18, No. 4, July 2003.
15. Chris Fitzer, Atputharajah Arulampalam, Mike Barnes and Rainer Zurowski, “Mitigation of Saturation in Dynamic Voltage Restorer
Connection Transformers“,IEEE Transactions on power electronics, vol. 17, no. 6, november 2002.
16. Hirofumi akagi, Yoshihira kanazawa and Akira nabae, “Instantaneous Reactive Power Compensators Comprising Switching
Devices without Energy Storage Components”, IEEE Transactions on industry applications, vol. ia-20, no. 3, may/june 1984.
17. H. Ezoji, M.Fazlali, A.Ghatresamani and M.Nopour, “A Novel Adaptive Hysteresis Band Voltage Controller for Dynamic Voltage
Restorer”.European Journal of Scientific Research ISSN 1450-216X Vol.37 No.2 (2009), pp.240-253.
Park, S. M., & Park, S. Y. (2014). Versatile control of unidirectional AC–DC boost converters for power quality mitigation. IEEE
Transactions on Power Electronics, 30(9), 4738-4749.
18. Jing Shi, Yuejin Tang, Kai Yang, Lei Chen, Li Ren, Jingdong Li and Shijie Cheng,“SMES Based Dynamic Voltage Restorer for
Voltage Fluctuations Compensation”, IEEE Transactions on Applied Superconductivity, Vol. 20, No. 3, June 2010.
19. Mostafa I. Marei, Ehab F. El-Saadany, and Magdy M. A. Salama, “A New Approach to Control DVR Based on Symmetrical
Components Estimation” IEEE Transactions on Power Delivery, Vol. 22, No. 4, October 2007.
20. Pedro Roncero-Sanchez, Enrique Acha, Jose Enrique Ortega- Calderon, Vicente Feliu, and Aurelio García-Cerrada. “A Versatile
Control Scheme for a Dynamic Voltage Restorer for Power-Quality Improvement” IEEE Transactions on Power Delivery, Vol. 24, No.
1, January 2009.
21. S.R. Naidu D.A. Fernandes, “Dynamic voltage restorer based on a four-leg voltage source converter” IET Gener. Transm. Distrib.,
2009, Vol. 3, Iss. 5, pp. 437–447.
22. Teke K. Bayindir and M. Tumay, “Fast sag/swell detection method for fuzzy logic controlled Dynamic Voltage Restorer” IET Gener.
Transm. Distrib., 2010, Vol. 4, Issue. 1, pp. 1–12.
Authors: Tamanna Siddiqui, Ausaf Ahmad

Paper Title: Mining Software Repositories for Software Metrics (MSR-SM): Conceptual Framework
Abstract: A number of software metrics estimate the complexity of software program by a couple of
substantial software attributes and trends. Metric for measuring the reliability is extraordinary among the
presently available complexity metrics by contemplating a non-physical attributes i.e. readability. Readability
may be a key quality attribute for managing software source codes. Readability of the source code is mainly
concerned with code maintainability which is a significant characteristic of software quality, mainly from the
developers’ perspective. As the code is readable, the easier it is to modify, lesser errors, copious maintainable,
easy to reuse and even more reliable. Readability is employed to enhance source codes for subsequent
maintenance and extensibility. But code readability is not simply computable while dealing with open source
software as contributors access the code and modify its structure according to his/her style of coding. This
nature of development begins problems for the new contributors to understand the code structure. To enhance
code readability, In this paper, we proposed a conceptual model of mining software repositories for software
metrics in which we proposed a set of metrics for readability of the code that is easier to use and helpful to
understand the code structure. We also mention a mechanism to validate the proposed metrics by the data
extracted from the mining software repositories and comparing it with a survey conducting from experts
working in industries.
718.
Keywords: Mining Software Repositories, Software Metrics, Readability, Measurement. 4173-
41
References: 77

1. The Gunning’s Fog Index (or FOG) Readability Formula”, http://www.readabilityformulas.com/gunning-fogreadabilityformula.php,


retrieved December, (2018).
2. Andrey Nikishaev, “13 Simple Rules for Good Coding”, https://hackernoon.com/few-simple-rules-for-good-coding-my-15-years-
experience-96cb29d4acd9.Retrieved January, (2019).
3. J. E. Ganey, Metrics in software quality assurance, Proceedings of the ACM CSCER '81 conference, pp 126-130, (1981).
4. D. N. and W. W. Agresti. “Comments on Resolving the Software Science Anomaly.” J. Syst.and Software 7 (1), pp. 83-84, (1987)
5. Muhamediyeva, D. T., Abduraimov, D., & Primova, K. A. (2016). Development of software complexes of text data recognition. BEST:
International Journal of Management, Information Technology and Engineering (BEST: IJMITE); ISSN (Print): 2348-0513; ISSN
(Online): 2454-471X; Impact Factor (JCC): 1.5429; Index Copernicus: 3.0, 4, 27.
6. R. S. Pressman, Software Engineering: A Practitioner's Approach,McGrawHill, (1996).
7. Albrecht, A. J. and J. E. Gaffney, Jr. “Software Source Lines of Code, and Development Effort Prediction: A Software Science
Validation “.IEEE Trans. Software Eng. SE-9, 6 (Nov. 1983)
8. Arthur, L. J. Measuring Programmer Productivity and Software Quality. New York: John Wiley, (1985).
9. B. Boehm and V.R. Basili, “Software Defect Reduction Top 10 List,” Computer, vol. 34, no. 1, pp. 135-137, Jan. (2001).
10. L.E. Deimel, Jr., “The Uses of Program Reading,” ACM SIGCSE Bull., vol. 17, no. 2, pp. 5-14, (1985).
11. The SMOG Readability Formula, a Simple Measure of Gobbledygook. http://www.readabilityformulas.com/smog-readability-
formula.php, Retrieved January, (2019).
12. MOHAMED, S. I. INNOVATIVE SOFTWARE DELIVERY FRAMEWORK TO WARDS SOFTWARE APPLICATIONS
MODERNIZATION.
13. K. Aggarwal, Y. Singh, and J.K. Chhabra, “An Integrated Measure of Software Maintainability,” Proc. Reliability and Maintainability
Symp., pp. 235-241, Sept. (2002).
14. D.R. Raymond, “Reading Source Code,” Proc. Conf. Center for Advanced Studies on Collaborative Research, pp. 3-16, (1991).
15. Lavrischeva, E. M. (2018). The Scientific basis of Software Engineering. International Journal of Applied and Natural Sciences
(IJANS), 7(5), 15-32.
16. J.L. Elshoff and M. Marcotty, “Improving Computer Program Readability to Aid Modification,” Comm. ACM, vol. 25, no. 8, pp.512-
521, (1982).
17. S. Rugaber, “The Use of Domain Knowledge in Program Understanding,” Ann. Software Eng., vol. 9, nos. 1-4, pp. 143-192, (2000).
18. Flesch-Kincaid Readability Index "http://www.mang.canterbury.ac.nz/writing_guidewriting/flesch.shtml. Retrieved December, (2018).
19. J.C. Knight and E.A. Myers, “Phased Inspections and Their Implementation,” ACM SIGSOFT Software Eng. Notes, vol. 16, no. 3,pp.
29-35, (1991).
20. N.J. Haneef, “Software Documentation and Readability: A Proposed Process Improvement,” ACM SIGSOFT Software Eng. Notes,
vol. 23, no. 3, pp. 75-77, (1998).
21. E.W. Dijkstra, A Discipline of Programming. Prentice Hall PTR, (1976).
22. TAMIMI, M., ALGHAMDI, F., & YASEEN, A. A SYSTEMATIC SNAPSHOT REVIEW OF CUSTOM-MADE SOFTWARE
ENTERPRISES FROM THE DEVELOPMENT PERSPECTIVES.
23. .The Automated Readability Index (ARI), http://www.readabilityformulas.com/automated-readability-index.php, retrieved January,
(2019).
24. P.A. Relf, “Tool Assisted Identifier Naming for Improved Software Readability: An Empirical Study,” Proc. Int’l Symp. Empirical
Software Eng., Nov. (2005).
25. Coleman-Liau Index" http://en.wikipedia.org/w/index.php?title=Meri_Coleman&ac tion=edit&redlink=1, Retrived, December, (2018).
26. T. Siddiqui and A. Ahmad. "Data mining tools and techniques for mining software repositories: A systematic review." In Big Data
Analytics, pp. 717-726. Springer, Singapore, (2018).
27. Ausaf Ahmad, Tamanna Siddiqui, Najeeb Ahmad Khan, "A Detailed Phasewise Study on Software Metrics: A Systematic Literature
Review ", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT),
ISSN: 2456-3307, Volume 3, Issue 3, pp.1696-1705, (2018).
28. T. Siddiqui and A. Ahmad, “Complexity Clarification through Code Metrics” Proceedings of the 12th INDIACom; INDIACom-2018,
5th International Conference on “Computing for Sustainable Global Development”, pp.3746-3749, March, (2018).
Authors: Kavita Singh, Naveen Kumar Band, M. Anji Reddy

Paper Title: Watershed Management using Remote Sensing and Gis of Maheshwaram Watershed
Abstract: Conservation of integrated watershed management essential resources plays an active role in
reduction of unfavorable effects like soil erosion, production of food determining the exact water potential zones
etc. Land potential is the main basis of managing watershed. Watershed management studies demand is
increasing in the recent years. The study is not limited to drought prone areas, but also in humid and semi humid
areas in order to maintain the survival of the crops in critical stages. The main objective of the current study area
is management of Maheshwaram Watershed based on the rainfall data. In the study area the rainfall data is
collected for the 10 years span (2006-2015) from ARI (Agricultural Research Institute) from Rajendra Nagar
Hyderabad. Topographic maps are collected from Survey of India in order to prepare base map, digital elevation
model (DEM), contour map, drainage map. The Second main objective of the study area is approximation on
annual and monthly run-off by using rainfall data. Further Base map, DEM(Digital Elevation Model), contour
map, drainage map, slope map, land use and Land cover map, TIN(Triangulated Irregular Network) maps were
generated by Survey of India toposheet maps to prepare maps by using ArcGIS Software. Analysis of the study
719. helps the decision makers to provide sustainable planning of the environment and economy in the future.
4178-
Keywords: Watershed Management, GIS, Remote Sensing, ArcGIS, DEM, Land use/Land Cover 41
83
References:

1. Suhas P Wani and Kaushal K Garg, Watershed Management Concept and Principles (ICRISAT) January 2009
2. Ingavale R.R., Jadhav V.V. and Raut P.D., Studies on Watershed Management in Shivaji University, Kolhapur, India IRJES ISSN
2319–1414 Vol. 2(7), 35-38, July (2013).
3. Recep nisanci1, Volkan Yildirim, Tahsin Yomralioglu, Nihat Enver Ulger, Ali Erdem Ozcelik, GIS-based drinking water watershed
management a case study of the Galyan watershed in Turkey. Environmental Engineering and Management Journal December 2015,
Vol.14, No. 12, 2919-2927 November, 2012.
4. Parag R.Thakare, Raj A. Jadhav, Hastmal S. Kumawat, Watershed Management-A case study of Satara Tanda Village International
Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-3, Issue-3, August 2013.
5. Thorat MM, Watershed Management Int. Res. J. of Science & Engineering, 2017; Vol. 5 (5): 81-83 ISSN: 2322-0015
6. Biplab Das, Aditiya Bandyopadhyay, A Model of Watershed Management Process-A Case Study of Rarh Region in Gangetic Delta
IJERD Volume 6, Issue 3 (March 2013), PP. 28-34
7. Molla Mekonnen Alemu, Integrated Watershed Management and Sedimentation Journal of Environmental Protection, 2016, 7, 490-494
, 9 March 2016.

Authors: Jayakrupa G.J, Latha.R


720.
Paper Title: Mindscapes in Contemporary Architecture - Colors of Creativity
Abstract: “Style is knowing what you are, what you want to say, and not giving a damn”-Gore Vidal The paper
attempts to define the various mindscapes in Contemporary architecture and design. What is style? Who are the
icons who patronized it? This paper aims to create a chronological journey using the visual medium to establish
the position of color in design. Color has subtly played an essential role in defining style by the use of it; the
absence of it; or simply by its inherent existence in the material usage. A journey through Contemporary
Architecture and design highlights moments of hi-style, where icons created fashion statements, sometimes
colorful, sometimes colorless, but nonetheless of impact. The following aims to inspire and initiate some
creative cycles that endorse more Style Statements.

Keywords: architectural, between, colors, style.


4184-
References: 41
89
1. Ayn Rand’s Fountainhead
2. https://shodhganga.inflibnet.ac.in/bitstream/10603/110750/12/15_conclusion.pdf
3. http://collections.crest.ac.uk/9833/8/File%208%20Conclusion%2014.01.09.pdf
4. https://en.wikipedia.org/wiki/Deconstructivism
5. https://www.thoughtco.com/what-is-metabolism-in-architecture-177292
6. https://www.becomingminimalist.com/what-is-minimalism/
7. https://en.wikipedia.org/wiki/Postmodernism
8. http://www.ushistory.org/civ/5e.asp
9. https://en.wikipedia.org/wiki/Contemporary_art
10. https://en.wikipedia.org/wiki/Visual_arts
11. https://www.arch2o.com/famous-architecture-quotes-time/

Authors: Thamilvanan G, Mohanasundaram K

Paper Title: Quick Response Code as a Communication Medium


Abstract: Quick Response (QR) Codes are tiny compatible printed pattern on solid surface to transfer a data
from a printed medium to a digital medium. The coding information cannot be viewed by the naked eye thus the
manipulation of printed pattern is very difficult. In general, QR code is printed in the two-dimension using white
and block named QR code modules or data pixels. Static and Dynamic QR codes are available now a days. More
than 3000 characters can be encoded over a very tiny space using QR graphics. The data are encoded by QR
generator using ISO/IEC 18004:2006. Various types of data can be restored using QR codes and every QR Code
contains segment devoted to informing the reader what sort of data it holds and used for coding and decoding the
data easily. The most common data types of QR codes are SMS, Email address, phone number, plain text, geo
location etc. Nowadays the QR codes are used in various fields. For example, it is used in the marketing and
industries to provide the information about the products. In education it is used to register the information about
721. the students in their certificates and to access the information in a website. 4190-
41
Keywords: QR Code; Learning; 92
References:
1. Anna Mauk . (2017). QR Codes in the classroom. Retrieved on 3.10.18 from www.weareteachers.com/qr-codes-in-the-classroom/
2. Jessica Boschen. (2016). QR Codes in the classroom. Retrieved on 3.10.18 from www.whatihavelearnedteaching.com/ using-qr-
codes- in- the- classroom
3. Mohanasundaram, K., & Kumaran, D, “Web-based Instruction: An Innovative Teaching Strategy”, University News, 39 (47),
2001, pp.8-11.
4. Mohanasundaram, K., & William, R.C, “Information and Communication Technology in Education”, Trichy: His Grace
Educational Prints, 2006.
5. Mohanasundaram, K., & Sivasankar, A., “Blended Learning: A New Horizon”, University News, 48 (03), 2010, pp.1-4.
6. Mohanasundaram, K., & Sivasankar, A, “Effective Blends and Economical Blogs: Successful change agents of Higher Education
to meet new challenges”, University News, 48 (28), 2010, pp.86 -90.
7. SCERT, Science. 9th Term I Volume III. Chennai: Tamil Nadu Textbook and Educational Services Corporation, 2018.

Authors: E.Veeramanipriya, AR. Umayal Sundari, R. Asaithambi


Numerical Modelling of Drying Kinetics of Banana Flowers using Natural and Forced
Paper Title:
Convection Dryers
Abstract: In the modern scenario insufficient of nutrition food is a major problem for the fast increasing
population in many developing countries. Banana flowers contain high level of dietary fibre. The comparative
analysis of drying kinetics of banana flowers using natural and forced convection solar dryers is the aim of this
present study. Drying of banana flowers in forced convection solar dryer aided with evacuated tube collector
(ETC) decreases the moisture content from 97.2 (wb%) to 8.4 (wb%) in 11 hours. This is compared with solar
722. cabinet dryer and natural sun drying which takes 15 hours and 19 hours respectively. Ten developed
4193-
mathematical models are used to evaluate the suitability of fit which identifies the drying kinetics of banana
41
flowers for both solar dryers using IBM SPSS 23 package. The result exhibits that, Midilli et al model has the
97
high value of correlation coefficient (R2) and least value of reduced chi – square and root mean square error
(RMSE) for the designed dryers showing the suitability of fit for drying of banana flowers. Also it is observed
that, the quality and appearance of the solar dried banana flowers using ETC is more acceptable than the natural
and cabinet dried Banana flowers.

Keywords: Forced convection drying, Banana Flowers, Evacuated Tube Collector, Mathematical Modelling.
References:

1. Shilpi Singh, “ Banana Blossom – An Understated Food with high Functional Benefits”, International Journal of Current Research.
2017. 9(1). pp : 44516 – 44519.
2. Judith. A.M, McBurney. MI. And Salvin. JL, “Health implification of dietary fibre”, Journal of American Diabetic Association. 102.
pp : 993 – 1000.
3. Plich. S, “ Physiological effects and health consequences of dietary fibre”, Bethesda, MD : Life Science Research Office. Federation of
American Societies for Experimental Biology.
4. Elaveniya. E and Jayamuthunagai. J. “ Functional, Physicochemical and Anti – oxidant properties of Dehydrated Banana Blossom
powder and its Incorporation in Biscuits”, International Journal of ChemTech Research, 2014. Vol 6(9), pp : 4446 – 4454.
5. Marikkar. JMN, Tan. S.J, Salleh. A, Azrina. A and Shukri. M.A.M, “ Evaluation of banana (Musa Sp) flowers of selected varieties for
their antioxidative and anti – hyperglycaemic potentials”, International Food Research Journal. 2016. 23(5). pp : 1988 – 1995.
6. Timsina. B and Nadumane. VK, “ Anti – cancer potential of banana flower extract : An invtro study”, Bangladesh Journal of
Pharmocology. 2014. 9 (4). pp : 628 – 635.
7. Sutikno, Ngurah Made Dharmaputera and Sri Rahaya, “ Fbrication and Characterization of Banana Flower Extract Anthocyanin -
Based Organic Solar Cell”, Journal of Advanced Agricultural Technologies. 2014. Vol 1 (2).
8. Ertekin . C and Yaldiz. O, “ Drying of Eggplant and Selection of a Suitable Thin Layer Drying Model”, Journal of Food Engineering.
63. 349 – 359.
9. Ezekoye. BA and Enebe. OM, “ Developement and Performance Evaluation of Modefied Integrated Passive Solar Grain Dryer”, The
Pacific Journal of Science and Technology. 2006. 185 – 190.
10. Hossain. MA and Bala. BK, “ Drying of Got Chilli using Solar Tunnel Dryer”, Solar Energy. 2007. 81. 85 – 92.
11. Chavan. B.R, Yakupitiyage. A and Kumar.S, “ Mathematical Modelling of Drying Characteristics of Indian Mackerel (Rastrilliger
Kangura) in Solar – Biomass Hybrid Cabinet Dryer”, Drying Technology : An International Journal. 26:12, 1552 – 1562. DOI :
10.1080//07373930802466872.
12. Umayal Sundari. AR and Veeramanipriya. E, “ A Reviwe of Solar Dryers for Drying Agricultural Products”, Indian Journal of
Scientific Research. 2017. 14(1). 311 – 317. ISSN : 0976 – 2876.
13. Ayyappan. S and Mayilsami. K, “Experimental investigation on a Solar Tunnel Drier for Copra Drying”, Journal of Scientific and
Industrial research. 2010. 69(8). 635 – 638.
14. Moradi. M and Zomorodian, “ Thin layer solar drying of cuminum cyminum grains by means of solar cabinet dryer”, American –
Eurasian Journal of Agricultural and Environmental Science. 2009. 5(3). 409 – 413.
15. Lamnatou. Chr, Papanocolaou. P, Belessiotis. V and Kyriakis. N, “Experimental Investigation and Thermodynamic Performance
Analysis of a Solar Dryer using an Evacuated – Tube Air Collector”, Applied Energy. 2012. 94. 232 – 243.
16. Kavak Akpinar. E, “ Drying of parsley Leaves in a solar dryer and under open sun : Modeling, Energy and Exergy Aspects”, Journal of
Food Process Engineering. 2011. 34. 27 – 48.
17. Wankhade. P.K, Dr. R.S. Sapkal and Dr. V.S. Sapkal, “ Drying Characteristics of Okra Slices on Drying in Hot Air Drying”, Procedia
Engineering. 2013. 51. 371 – 374.
18. Aregbesola. O.A, Ogunsina. B.S, Sofolahan. A.E and Chime. N.N, “Mathematical modelling of thin layer drying characteristics of dika
(Irvingia gabonensis) nuts and Kernels”, Nigerian Food Journal. 2015. 33. 83 – 89.
19. Ilknur Alibas, “Selection of a the Best Suitable Thin – Layer Drying Mathematical Model for Vacuum Dried Red Chilli Pepper”,
Journal of Biology Environmental Science.2012. 6(17). 161 – 170.
20. Kamenan Blaise Koua, Wanignon Ferdinand Fassinau, Prosper Gbaha and Siaka Toure, “ Mathematical Modeling of the Thin Layer
Solar Drying of Banana, Mango and Cassava”, Energy. 2009. 34. 1594 – 1602.
21. Umayal Sundari. AR and Subramanian. C.V, “Comparative Study of Solar Drying Characteristics and thin – layer Mathematical
Modelling of Mango and Cluster Beans in two types of Solar Driers”, International Journal of Latest Engineering Research and
Applications”, 2017. 2(11). 2455 – 7137. ISSN : 49 – 58.
22. Lahsasni. S, Kouhila. M, Mahrouz. M, AitnMohamed. L and Agorram. B, “Characteristics Drying Curve and Mathematical Modelling
of Thin – Layer Solar Drying of Pricky Pear Cladode”, Journal of Food Process Engineering. 2004. 27. 103 – 117.
23. Gokhan Gurlek, Neerdet Ozbalta and Ali Gungor, “Solar Tunnel Drying Characteristics and mathematical Modelling of Tomato”,
Journal of Thermal Science and Technology. 2009. 15 – 23.
24. Umayal Sundari. AR, Neelamegam. P and Subramanian. C.V, “Study and Analysis of Drying Characteristics of Ginger using Solar
Drier with Evacuated Tube Collectors”, Research Journal of Pharmaceutical, Biological and Chemical Sciences. 2013. 43. 1258 –
1267.
25. Umayal Sundari. AR, Neelamegam. P and Subramanian. C.V, “An Experimental Study and Analysis on Solar Drying of Bitter Gourd
using an Evacuated Tube Air Collector in Thanjavur, Tamil Nadu, India”, Conference papers in Energy. 2013.
26. Songehai Wiriyaumpaiwong and Jindapron Jamradloedluk, “Forced Convection Solar Drying : Experimental Investigation and
Mathematical Modeling of Pork Strips”, KKU Engineering Journal. 2007. 342. 243 – 250.
27. Chanchal Loha, Reeta Das, Biplab Choudhury and Pradip K Chatterjee, “Evaluation of Air Drying Characteristics of Sliced Ginger in a
Forced Convective Air Dryer and Thermal Conductivity Measurement”, Journal of Food Processing Technology.2012. 36.
Authors: Binod Kumar Sahu, Pradeep Kumar Mohanty
Design and implementation of Fuzzy-PID Controller with Derivative Filter for AGC of two-area
Paper Title:
interconnected Hybrid Power System
Abstract: The huge band variation in wind speed causes unpredictable swing in power generation and hence
large divergence in system frequency leading to unpredictable situation for standalone applications. To
overcome the above difficulties, WTG (wind turbine generator) is integrated with conventional thermal power
system along with other distributed generation units such as FC (fuel cell), DEG (diesel engine generator), AE
(aqua-electrolyser) and BESS (battery energy storage system) which form a hybrid power system. This paper
concerns with automatic generation control (AGC) of an interconnected two area hybrid power system as
723. mentioned above. Design and implementation of suitable controllers for AGC of above hybrid power system is a
4198-
challenging job for operational and design engineers. Various control schemes proposed in this paper are
42
conventional PID & PID controller with derivative filter (PIDF) and fuzzy-PID controller without (fuzzy-PID)
12
and with derivative filter (fuzzy-PIDF) to achieve improved performance of AGC system in terms of frequency
profile. The values of gain parameters of proposed controllers are designed using hybrid LUS-TLBO (Local
Unimodal Sampling-Teaching Learning Based Optimization) algorithm. Superiority of fuzzy-PIDF controller
over other proposed controllers are addressed. Robustness study of proposed fuzzy-PIDF controller is
thoroughly demonstrated with change in system parameters and loading pattern. The work is further extended to
analyze the transient phenomena of the AGC for a 3-area interconnected system having nonlinearities such as
reheat turbine, governor dead band along with generation rate constraint for the thermal generating units.
Keywords: Automatic Generation Control (AGC), Proportional-Integral-Derivative (PID), PID with derivative
filter (PIDF), Local Unimodal Sampling (LUS), Teaching Learning Based Optimization (TLBO).

References:

1. M. A. Laughton, G. W. Brundrett, P. L. Surman, R. H. Taylor, Electrical engineer’s reference book. 16th edition 2003, pp. 1–32, 2003.
2. L. D. James, Gil Melese-d’Hospital, “Energy supply and demand: strategies and alternatives for energy management,” Energy
Conversation Management, vol. 20, No.4, 1980, pp. 223–232, 1980.
3. L. Wang, D. J. Lee, W. J. Lee, Z. Chen, “Analysis of a novel autonomous marine hybrid power generation/energy storage system with
a high-voltage direct current link,” Journal of Power Sources, vol. 185, 2008, pp. 1284-1292.
4. W. Li, W. Joos, “Comparison of energy storage system technologies and configurations in a Wind Farm,” IEEE Power Electronics
Specialists Conference (PESC), 2007, pp. 1280–1285.
5. I. Ngamroo, “Robust frequency control of wind–diesel hybrid power system using superconducting magnetic energy storage,”
International Journal of Emerging Electric Power System, Vol. 10, No. 2, 2009, pp. 1-26.
6. M. Uzunoglu, M. S. Alam, “Dynamic modeling, design and simulation of a combined PEM fuel cell and ultra-capacitor system for
stand-alone application,” IEEE Transaction on Energy Conversion, Vol. 21, No.3, 2006, pp. 767–775.
7. M. Uzunoglu, M. S. Alam, M. “Modeling and analysis of an FC/UC hybrid vehicular power system using a novel wavelet based load
sharing algorithm,”, IEEE Transaction on Energy Conversion, Vol. 23, No.1, 2008, pp. 263–272.
8. P. Kundur, Power System Stability and Control, McGraw-Hill, 1994.
9. G. Ellis, Control systems design guide, Academic Press, London, 1991.
10. J. G. Ziegler, N. B. Nichols, “Optimum Settings for Automatic Controller,” Transaction of ASME, Vol. 64 1942, pp. 759-768.
11. G. H. Cohen, G. A. Coon, “Theoretical considerations of retarded control,” Transactions of ASME, Vol. 75, 1953, pp. 827-834.
12. D. Rerkpreedapong, A. Hasanovic, A. Feliachi, “Robust Load Frequency Control Using Genetic Algorithms and Linear Matrix
Inequalities,” IEEE Transactions on Power Systems, Vol. 18, No.2, 2003, pp. 855-861.
13. G. D. Olio, M. Sforna, C. Bruno, M. Pozzi, “A pluralistic LFC scheme for online resolution of power congestions between market
zones,” IEEE Transactions on Power Systems, Vol. 20, No. (4), 2005, pp. 2070-2077.
14. A. Khodabakhshian, R. Hooshmand, “A new PID controller design for automatic generation control of hydropower system,”
International Journal of Electrical Power and Energy Systems, Vol. 32, No. 5, 2010, pp. 375-382.
15. M. L. Kothari, J. Nanda, D. P. Kothari, S. Das, “Discrete mode automatic generation control of two areas reheat thermal system with
new area control error,” IEEE Transactions on Power Systems, vol. 4, No. 2, 1989, pp. 730-738.
16. B. Tyagi, S. C. Srivastava, “A LQG Based Load Frequency Controller in a Competitive Electricity Environment,” International
Journal of Emerging Electric Power Systems, Vol. 2, No. 2, 2005, pp. 1-15.
17. S. Bhongade, H. O. Gupta, B. Tyagi, “Performance of SMES unit on Artificial Neural Network based Multi-area AGC scheme,”
Journal of Power Electronics & Power Systems, Vol. 1, No. 1, 2011.
18. K. R. Sudha, R. VijayaSanthi, “Robust decentralized load frequency control of interconnected power system with Generation Rate
Constraint using Type-2 fuzzy approach,” International Journal of Electrical Power and Energy Systems, Vol. 33, No. 3, 2011, pp.
699-707.
19. B. Mohanty, S. Panda, P. K. Hota, “Controller parameters tuning of differential evolution algorithm and its application to load
frequency control of multi-source power system,” International Journal of Electrical Power and Energy Systems, Vol. 54, 2014, pp.
77–85.
20. B. K. Sahu, S. Pati, S. Panda, “Hybrid differential evolution particle swarm optimisation optimised fuzzy proportional-integral-
derivative controller for automatic generation control of interconnected power system,” IET Generation, Transmission & Distribution,
Vol. 8, No. 11, 2014, pp. 1789-1800.
21. B. K. Sahu, S. Pati, P. K. Mohanty, S. Panda, “Teaching–learning based optimization algorithm based fuzzy-PID controller for
automatic generation control of multi-area power system,” Applied Soft Computing, Vol. 27, 2015, pp. 240-249.
22. Y. Arya, N. Kumar, “Fuzzy gain scheduling controllers for AGC of two-area interconnected electrical power systems,” Electric Power
Components Systems, Vol. 44, No. 7, 2016, pp. 737–751.
23. Y. Arya, N. Kumar, “Design and analysis of BFOA-optimized fuzzy PI/PID controller for AGC of multi-area traditional/restructured
electrical power systems,” Soft Computing, DOI: 10.1007/s00500-016-2202-2, June 2016.
24. Y. Arya, N. Kumar, “BFOA-scaled fractional order fuzzy PID controller applied to AGC of multi-area multi-source electric power
generating systems,” Swarm and Evolutionary Computation, Vol. 32, 2017, pp. 202–218.
25. T. Senjyu, T. Nakaji, K. Uezato, T. Funabashi, “A hybrid power system using alternative energy facilities in isolated island,” IEEE
Transaction on Energy Conversion, Vol. 20, No. 2, 2005, pp. 406-414.
26. D. J. Lee, L. Wang, “Small-signal stability analysis of an autonomous hybrid renewable energy power generation/energy storage
system part I: time-domain simulations,” IEEE Transaction on Energy Conversion, Vol. 23, No. 1, 2008, pp. 311-320.
27. P. Ray, S. Mohanty, N. Kishor, “Proportional integral controller based small signal analysis of hybrid distributed generation system,”
Energy Conversion and Management, Vol. 52, 2011, pp. 1943-54.
28. D. C. Das, A. K. Roy, N. Sinha, “GA based frequency controller for solar-thermal-diesel-wind hybrid energy generation/energy storage
system,” International Journal of Electrical Power and Energy Systems, Vol. 43, 2012, pp. 262-279.
29. V. Singh, S. Mohanty, N. Kishor, P. Ray, “H-infinity robust load frequency control in hybrid distributed generation systems,”
International Journal of Electrical Power and Energy Systems, Vol. 46, 2013, pp. 294-2305.
30. S. K. Pandey, N. Kishor, S. R. Mohanty, “Frequency regulation in hybrid power system using iterative proportional–integral–derivative
H  controller,” Electrical Power Component and Systems, Vol. 42, 2014, pp 132-148.
31. K. R. Mudi, R. N. Pal, “A robust self-tuning scheme for PI-and PID type fuzzy controllers,” IEEE Transactions on fuzzy systems, Vol.
7, No. 1, 1999, pp 2-16.
32. P. K. Mohanty, B. K. Sahu, S. Panda, “Tuning and Assessment of Proportional–Integral–Derivative Controller for an Automatic
Voltage Regulator System Employing Local Unimodal Sampling Algorithm,” Electrical Power Component and Systems, Vol. 42, No.
9, 2014, pp. 959-969.

Authors: S.Praveen Chakkravarthy, V.Arthi, Leeban Moses

Paper Title: Performance Analysis of 60 Ghz Wireless Communications For Wigig Networks
Abstract: The demand for faster wireless connectivity and uses of high definition multimedia content has
increased the scope of research in wireless communication. To meet the requirements of future wireless
724.
networks, in terms of high speed connectivity and provisioning, WiGig networks are considered. A 60 GHz mm 4213-
wave band paves a road to the future wireless ecosystem. To cater the infotainment choices to the consumer, 42
WiGig Standard has been proposed. The work concentrates on analyzing the propagation time delay, path loss 16
with respect to T-R separation and received power. With the advantage of the propagation characteristics of the
60GHz spectrum, WiGig will certainly provide high data connectivity and provisioning with minimum
modifications in the RF front end receiver

Keywords: WiGig networks, 60GHz spectrum, propagation time delay, path loss.

References:

1. S.Praveen Chakkravarthy, N.Nagarajan, Ms.V.Arthi ‘A Novel Multiuser Interference Cancellation method for Multicarrier Direct
Sequence CDMA System using Maximum Likelihood Sequential Decoding’, Journal of Theoretical and Applied Information
Technology Vol.68.Issue 2 October 2014
2. V.Arthi, R.Ramya & Dr.S.Praveen Chakkravarthy, 2015, ‘An Optimized Energy Detection Scheme For Spectrum Sensing In
Cognitive Radio’, International Journal of Engineering Research and Development, vol.11, no. 04, pp.66-71.
3. An Efficient Paradigm for Multiband WiGig D2D Networks, Ehab Mahmoud Mohamed ; Mahmoud Ahmed
Abdelghany ; Mahdi Zareei
4. IEEE Access, Year: 2019, Volume: 7,Journal Article.
5. Wi-Fi/WiGig Coordination for Optimal WiGig Concurrent Transmissions in Random Access Scenarios, Ehab Mahmoud
Mohamed ; Kei Sakaguchi ; Seiichi Sampei 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring) Year: 2016, Conference
Paper, Publisher: IEEE.
6. Enabling seamless WiGig/WiFi handovers in tri-band wireless systems Yao-Yu Li ; Chi-Yu Li ; Wei-Han Chen ; Chia-Jui
Yeh ; Kuochen Wang 2017 IEEE 25th International Conference on Network Protocols (ICNP) Year: 2017,Conference
Paper,Publisher: IEEE.
7. Enhancements for Very High Throughput in the 60 GHz Band, IEEE Standard 802.11ad, Dec. 2012.
8. Y. Ghasempour, C. R. C. M. da Silva, C. Cordeiro, and E. W. Knightly, ‘‘IEEE 802.11ay: Next-Generation 60 GHz Communication
for 100 Gb/s Wi-Fi,’’ IEEE Commun. Mag., vol. 55, no. 12, pp. 186–192, Dec. 2017.
9. T. S. Rappaport, F. Gutierrez, Jr., E. Ben-Dor, J. N. Murdock, Y. Qiao, and J. I. Tamir, ‘‘Broadband millimeter-wave propagation
measurements and models using adaptive-beam antennas for outdoor urban cellular communications,’’ IEEE Trans. Antennas Propag.,
vol. 61, no. 4, pp. 1850–1859, Apr. 2013.
10. A. Alkhateeb, O. El Ayach, G. Leus, and R. W. Heath, Jr., ‘‘Channel estimation and hybrid precoding for millimeter wave cellular
systems,’’ IEEE J. Sel. Topics Signal Process., vol. 8, no. 5, pp. 831–846, Oct. 2014.
11. A. Abdelreheem, E. M. Mohamed, and H. Esmaiel, ‘‘Location-based millimeter wave multi-level beamforming using compressive
sensing,’’ IEEE Commun. Lett., vol. 22, no. 1, pp. 185–188, Jan. 2018.
Authors: Sama Rupa, CHVRS Gopala Krishna, L. Nageswara Rao

Paper Title: Development of Dual Band Feed


Abstract: In this paper, Development of dual band feed operating in C and Ku bands to obtain high
illumination and spill over efficiencies and high cross polarization discrimination, maximum gain and low side
lobes for shaped Cassegrain Antenna of larger diameter is presented. The Design envisages a common aperture
C and Ku band corrugated horn. Corrugated horn of suitable dimensions for the propagation of hybrid modes in
both C and Ku bands having equal beam widths in principal planes (E&H) and pattern of rotationally symmetric
radiation will be illuminating the shaped sub reflector in modified Cassegrain geometry. The corrugated horn is
designed to operate over a frequency range of C (3.4-4.8 GHz) and Ku (10.7-12.75 GHz) bands. CHAMP is
725. used to simulate and analyze the designed model.
4217-
Keywords: Corrugated horn, reflector antennas and cross polarization discrimination. 42
22
References:

1. A. F. Kay, "A horn with a wide angle of flare. A novel feed for low noise broadband and high aperture efficiency an-tennas, "Laborato-
ries US Airforce Cambridge Research, Rep. 62-757, October 1962
2. A.J. Simons and A. F. Kay, “The scalar feed – a high performance feed for large paraboloidal reflectors,” in IEE Conference, pp. 213-
217, 1966
3. A.D. Olver, P.J.B. Clarricoats, A.A. Kishk and L. Shafai, “Microwave Horns and Feeds”, IEE Electromagnetic waves series 39, The
Institution of Electrical Engineers, 1994.
4. P.D. Potter, “A new horn antenna with suppressed sidelobes and equal beamwidths”, Microwave Journal, 6, pp. 71-78, 1963.

Authors: Sheetal S. Kamble, Ramesh D. Dod


Paper Title: Management Of Coal Mine Overburden And Fly Ash using Bamboo Cultivation
Abstract: Coal mine in India is one of the biggest source of energy production. Coal is the major component
used in thermal power plants which helps in consuming 71% of electricity generated by these thermal power
plants in India. In opencast coal mining excavation of coal is done and huge area is abandoned after coal is being
excavated. The OBD soil which is present at these mine sites is very poor in nutrients that it is usually
unfavorable for any type of plantation to be carried out. Keeping this in mind another factor comes across is that
thermal power plants are located nearby coal mines which gives fly ash as combustion product of coal and
disposal of this fly ash is very crucial. Therefore, this fly ash can be used along with coal mine OBD soil which
726. it has efficiency in improving soil fertility in many ways. Revegetation is one of the most accepted way of soil 4223-
reclamation and reduction in soil erosion. The suitability of soil for growth of bamboo is checked by planting 42
bamboo saplings in an area of 3 x 3 feet having depth 1 foot in a systematic manner by attempting field trial. 26

Keywords: bamboo plantation, coal mine overburden, fly ash disposal.

References:

1. Anand Narain Singh, J.S. Singh (1998) “Biomass, net primary production and impact of bamboo plantation on soil redevelopment in a
dry tropical region” Forest Ecology and Management 119 (1999) 195-207.
2. A.N. Singh, A.S. Raghubanshi, J.S. Singh (2003) “Impact of native tree plantations on mine spoil in a dry tropical environment” Forest
Ecology and Management 187 (2004) 49–60.
3. Anup Kumar Gupta and Biswajit Paul (2015) “Ecorestoration of coal mine overburden dump to prevent environmental degradation”
Research Journal of Environmental Sciences September 2015.
4. A. S. Rathore, Manoj Pradhan and Shirish V. Deo(2017)“Mixing of fly ash in coal mine overburden dump: an eco-friendly method of
fly ash disposal” International Proceedings of Chemical, Biological and Environmental Engineering, V0l. 100 (2017) .
5. Arvind Kumar Rai, Biswajit Paul et al. (2010) “A study on the Bulk density and its effect on the growth of selected grasses in coal
mine overburden dumps, Jharkhand, India”international journal of environmental sciences Volume 1, No 4 ,ISSN 0976 – 4402 . 38

Authors: Apurv Yadav, Abhishek Verma, P.K. Bhatnagar, V.K. Jain, Vivek Kumar

Paper Title: Enhanced Thermal Characteristics of NG Based Acetamide Composites


Abstract: Fatty acids are a distinguished category of phase change materials (PCM). However, their inferior
thermal conductivity value restricts their potential for thermal energy storage system. Carbonaceous
nanomaterials have emerged as promising thermal conductivity enhancer materials for organic PCMs. The
present study focuses on preparing a novel PCM nanocomposite comprising of small amount of nanographite
(NG) in molten acetamide, an organic PCM, for elevation of the thermal characteristics and examining the trend
of the nanocomposite through the course of charging / discharging process. These PCM-nanocomposites are
prepared by dispersing NG in molten acetamide with weight fractions of 0.1, 0.2, 0.3, 0.4 and 0.5 %. The
scanning electronic microscopic (SEM) analysis was conducted for the characterization of PCM nanocomposite.
The energy storage behaviour of the prepared nanocomposites were analyzed with the help of differential
scanning calorimeter instruments, which showed that there is no observable variation in the melting point of the
nanocomposite, and a decline in the latent heat values. Furthermore, thermal conductivity trend of the
nanocomposites caused by NG addition was investigated, which indicated enhancement of thermal conductivity
with increasing NG concentration. Further, nanocomposites with a 0.4 wt. % of NG, displayed appreciable
increase in rate of heat transfer, reducing melting time and solidification time by 48 and 47 %, respectively. The
prepared PCM nanocomposites displayed superior heat transfer trend, permitting substantial thermal energy
storage.

Keywords: Acetamide, Energy storage, Heat transfer, Nanographite, Phase change material.

References:

1. B Zalba, JM Marın, LF Cabeza, H Mehling, “Review on thermal energy storage with phase change: materials, heat transfer analysis
and applications.” Applied thermal engineering, 23(3), 2003, pp.251-283.
2. P Verma P, SK Singal, “Review of mathematical modeling on latent heat thermal energy storage systems using phase-change
material.” Renewable and Sustainable Energy Reviews, 12(4), 2008, pp.999-1031.
3. AF Regin, SC Solanki, JS Saini, “Heat transfer characteristics of thermal energy storage system using PCM capsules: a review.”
Renewable and Sustainable Energy Reviews 12(9), 2008, pp.2438-2458.
4. A Sharma, VV Tyagi, CR Chen, D Buddhi, “Review on thermal energy storage with phase change materials and applications.”
Renewable and Sustainable energy reviews, 13(2), 2009, pp.318-345.
727. 5. MM Farid, AM Khudhair, SAK Razack, S Al-Hallaj S, “A review on phase change energy storage: materials and applications.” Energy
conversion and management, 45(9), 2004, pp.1597-1615. 4227-
6. D Feldman, MM Shapiro, D Banu, CJ Fuks, “Fatty acids and their mixtures as phase-change materials for thermal energy storage.” 42
Solar energy materials, 18(3-4), 1989, pp.201-216. 31
7. A Hasan, AA Sayigh, “Some fatty acids as phase-change thermal energy storage materials.” Renewable energy, 4(1), 1994, 69-76.
8. ASK Kaygusuz, “Thermal energy storage system using some fatty acids as latent heat energy storage materials.” Energy Sources,
23(3), 2001, pp.275-285.
9. A Sarı, “Thermal reliability test of some fatty acids as PCMs used for solar thermal latent heat storage applications.” Energy
Conversion and Management, 44(14), 2003, pp.2277-2287.
10. D Rozanna, TG Chuah, A Salmiah, TS Choong, M Sa'arim, “Fatty acids as phase change materials (PCMs) for thermal energy storage:
a review.” International Journal of Green Energy, 1(4), 2005, pp.495-513.
11. A Sharma, SD Sharma, D Buddhi, “Accelerated thermal cycle test of acetamide, stearic acid and paraffin wax for solar thermal latent
heat storage applications.” Energy Conversion and Management 43(14), 2002, pp.19-1930.
12. A Yadav, B Barman, V Kumar, A Kardam, SS Narayanan, A Verma, D Madhwal, P Shukla, VK Jain, “A Review on Thermophysical
Properties of Nanoparticle-Enhanced Phase Change Materials for Thermal Energy Storage.” In Recent Trends in Materials and
Devices, 2017, (pp. 37-47). Springer International Publishing.
13. CY Zhao, ZG Wu, “Heat transfer enhancement of high temperature thermal energy storage using metal foams and expanded graphite.”
Solar Energy Materials and Solar Cells, 95(2), 2011, pp. 636-643.
14. AA Ranjbar, S Kashani, SF Hosseinizadeh, M Ghanbarpour, “Numerical heat transfer studies of a latent heat storage system containing
nano-enhanced phase change material.” Thermal science, 15(1), 2011, pp.169-181.
15. DH Choi, J Lee, H Hong, YT Kang, “Thermal conductivity and heat transfer performance enhancement of phase change materials
(PCM) containing carbon additives for heat storage application.” International journal of refrigeration, 42, 2014, pp.112-120.
16. ZT Yu, X Fang, LW Fan, X Wang, YQ Xiao, Y Zeng, X Xu, YC Hu, KF Cen, “Increased thermal conductivity of liquid paraffin-based
suspensions in the presence of carbon nano-additives of various sizes and shapes.” Carbon, 53, 2013, pp.277-285.
17. LW Fan, X Fang, X Wang, Y Zeng, YQ Xiao, ZT Yu, X Xu, YC Hu, KF Cen, “Effects of various carbon nanofillers on the thermal
conductivity and energy storage properties of paraffin-based nanocomposite phase change materials.” Applied Energy, 110, 2013,
pp.163-172.
18. A Yadav, B Barman, V Kumar, A Kardam, SS Narayanan, A Verma, D Madhwal, P Shukla, VK Jain, “Solar thermal charging
properties of graphene oxide embedded myristic acid composites phase change material.” In AIP Conference Proceedings 1731(1),
2016 p. 030030). AIP Publishing.
19. A Yadav, B Barman, A Kardam, SS Narayanan, A Verma, VK Jain, “Thermal properties of nano-graphite-embedded magnesium
chloride hexahydrate phase change composites.” Energy & Environment, 28(7), 2017, pp.651-660.
20. M Li, “A nano-graphite/paraffin phase change material with high thermal conductivity.” Applied energy, 106, 2013, pp.25-30.
21. F Yavari, HR Fard, K Pashayi, MA Rafiee, A Zamiri, Z Yu, R Ozisik, T Borca-Tasciuc, N Koratkar, “Enhanced thermal conductivity
in a nanostructured phase change composite due to low concentration graphene additives.” The Journal of Physical Chemistry C,
115(17), 2011 pp.8753-8758.
22. A Kardam, SS Narayanan, N Bhardwaj, D Madhwal, P Shukla, A Verma, VK Jain, “Ultrafast thermal charging of inorganic nano-
phase change material composites for solar thermal energy storage. RSC Advances, 5(70), 2015, pp.56541-56548.
23. SS Narayanan, A Kardam, V Kumar, N Bhardwaj, D Madhwal, P Shukla, VK Jain, “Development of sunlight-driven eutectic phase
change material nanocomposite for applications in solar water heating.” Resource-Efficient Technologies, 3(3), 2017, pp.272-279.
24. AR Akhiani, M Mehrali, S Tahan Latibari, M Mehrali, TMI Mahlia, E Sadeghinezhad, HSC Metselaar, “One-step preparation of form-
stable phase change material through self-assembly of fatty acid and graphene.” The Journal of Physical Chemistry C, 119(40), 2015,
pp.22787-22796.
25. Z Huang, X Gao, T Xu, Y Fang, & Z Zhang, “Thermal property measurement and heat storage analysis of LiNO3/KCl–expanded
graphite composite phase change material.” Applied Energy, 115, 2015, pp.265-271.

Authors: M. Chaitanya, V. Kannan

Paper Title: Design And Analysis Of RHBD Memory Cells And 4x4 RHBD 10T Memory Cell Architecture
Abstract: CMOS technology plays an important role in the modern electronics world. CMOS technology also
plays significant role in aerospace applications. To store data, memories are widely used as the medium in
aerospace applications. SRAM cells are the memories made by the CMOS technology. The most vital issues
faced by memories are due to single event upsets (SEUs) which are induced by radiation particles. The SEU’s
due to increase in densities and SEU’s. There is a decrease in critical charge and supply voltage in CMOS
process technology. There is a need for a technique which can to tolerate these SEU’s in such aerospace
applications. Which are in the environment of complex celestial radiation? The technique which is considered
for such environment is radiation-hardened by design (RHBD) with soft error robustness. This paper aims at is
proposing an area efficient and high reliable RHBD memory cell for the above said application using 45nm
technology in Cadence Tool. Depending on power, write/read time, the layout area of 14T, 12T and 10T RHBD
memory cells and their performance on power for read/write operations are observed. A comparative study is
also done on these memory cells based the parameters considered.

Keywords: Architecture, CMOS, RHBD.


728.
4232-
References: 42
37
1. E. Ibe, H. Taniguchi, Y. Yahagi, K.-I. Shimbo, and T. Toba, “Impact of scaling on neutron induced soft error in SRAMs from a 250
nm to a 22 nm design rule,” IEEE Trans. Electron Devices, vol. 57, no. 7, pp. 1527–1538, Jul. 2010.
2. C. Boatella, G. Hubert, R. Ecoffet, and S. Duzellier, “ICARE on-board SAC-C: More than 8 years of SEU and MCU, analysis and
prediction,” IEEE Trans. Nucl. Sci., vol. 57, no. 4, pp. 2000–2009, Aug. 2003.
3. Sánchez-Macián, P. Reviriego, and J. A. Maestrso, “Combined SEU and SEFI protection for memories using orthogonal Latin square
codes,” IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 63, no. 11, pp. 1933–1943, Nov. 2016.
4. Yan, Z. Huang, M. Yi, X. Xu, Y. Ouyang, and H. Liang, “Double node- upset-resilient latch design for nanoscale CMOS technology,”
IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 25, no. 6, pp. 1978–1982, Jun. 2017.
5. R. Giterman, L. Atias, and A. Teman, “Area and energy-efficient complementary dual-modular redundancy dynamic memory for space
applications,” IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 25, no. 2, pp. 502–509, Feb. 2017.
6. S. Lin, Y. B. Kim, and F. Lombardi, “Analysis and design of nanoscale CMOS storage elements for single-event hardening with
multiple-node upset,” IEEE Trans. Device Mater. Rel., vol. 12, no. 1, pp. 68–77, Mar. 2012.
7. Guo, J., Zhu, L., Sun, Y., Cao, H., Huang, H., Wang, T., Mao, Z. (2018). Design of Area-Efficient and Highly Reliable RHBD 10T
Memory Cell for Aerospace Applications. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 26(5), 991–994.
8. J. Guo et al., “Novel radiation-hardened-by-design (RHBD) 12T memory cell for aerospace applications in nanoscale CMOS
technology,” IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 25, no. 5, pp. 1593–1600, May 2017.
9. Peng, C., Huang, J., Liu, C., Zhao, Q., Xiao, S., Wu, X., Zeng, X. (2018). Radiation-Hardened 14T SRAM Bitcell With Speed and
Power Optimized for Space Application. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 1–9.
Authors: Gaurav S. Narlawar, N. B. Chaphalkar, Sayali Sandbhor
Time and Resource Management of Residential Apartment Construction using Building
Paper Title:
Information Modeling
Abstract: To complete a project under the complicated situations, it is important to follow effective ways to
use available tools and methods, taking into account present technology and management. Also, it is challenging
to prepare accurate and achievable plans in large construction projects. Visualizing forms at an early stage in
building design improves the ability of designers to deliver ideas and the capability to inspect and assess the
methods helps to predict and optimize the actual presentation of the construction project. These different features
form the basis for Building Information Modeling (BIM). The archetypal problems like budget overflow, lack of
communication, cost overruns, overtime delays, rework can be minimized with the use of Building Information
Modeling (BIM) tools for building design & resource management. In this paper, the concept of Building
Information Modelling (BIM) is used for 3D modeling, which involves 4th dimension as Time (4D), 5th
dimension of Cost (5D) of the project. A case study of G+5 residential apartment is presented for 3D BIM
729. modeling and quantity take-off with the commercial software Autodesk Revit 2019. The 4D BIM carried out
using Primavera P6 is explained with methodology for a case study. Further, Autodesk Navisworks Manage 4238-
2019 is used for 5D BIM, which includes a graphical presentation of the construction schedule and cost 42
estimation of the case study. 46

Keywords: Building Information Modelling (BIM), Construction Management, 3D BIM, 4D BIM, 5D BIM.

References:

1. A. Kastor and K. Sirakoulis (2009). “The Effectiveness of Resource Levelling Tools for Resource Constraint Project Scheduling
Problem.” International Journal of Project Management, 27, pp. 493–500.
2. S. Nagaraju, B. Reddy and A. Chaudhari (2012). “Resource Management in Construction Projects – A Case Study.” Engineering
Science and Technology: An International Journal, 2(4), pp. 660-665.
3. M. Sajad, M. Sadiq, K. Naveed and M. Iqbal (2016). “Software Project Management: Tools assessment, Comparison and suggestions
for future development.” International Journal of Computer Science and Network Security, 16(1), pp. 31-42.
4. S. Ragavi and R. Uma (2017). “Planning and Scheduling of an Apartment Building by Comparison of MS Project and Primavera.”
International Academy of Science, Engineering and Technology, 6(4), pp. 21-32.
5. S. Azhar, (2011). “Building Information Modeling (BIM): Trends, Benefits, Risks, and Challenges for the AEC Industry.” Leadership
and Management in Engineering, 11(3), pp. 241-252.
6. S. Rokooei (2015). “Building Information Modelling in Project Management: Necessities, Challenges and Outcomes.” International
Conference on Leadership, Technology, Innovation and Business Management, Procedia - Social and Behavioral Sciences 210, pp. 87–
95.
7. D. Migilinskas, V. Popov, V. Juocevicius, and L. Ustinovichius (2013). “The Benefits, Obstacles, and Problems of Practical BIM
Implementation.” 11th International Conference on Modern Building Materials, Structures and Techniques, Procedia Engineering 57,
pp. 767-774.
8. I. Czmoch and A. Pekala (2014). “Traditional Design versus BIM Based Design.” Theoretical Foundation of Civil Engineering
(23RSP) Procedia Engineering 91, pp. 210-215.
9. A. Khanzode and M. Moin Uddin (2014). “Examples of How Building Information Modeling Can Enhance Career Paths in
Construction.” Practice Periodical on Structural Design and Construction (ASCE), 19(1), pp. 95-102.
10. L. Chen and H. Luo (2014). “A BIM-based construction quality management model and its applications.” Automation in Construction
46, 64-73.
11. A. Fazli, S. Fathi, H. Enferadi, M. Fazli, and B. Fathi (2014). “Appraising effectiveness of Building Information Management (BIM) in
project management.” International Conference on Project Management 16, pp. 1116-1125.
12. P. Smith (2014). "BIM & the 5D Project Cost Manager." 27th IPMA World Congress Procedia - Social and Behavioral Sciences 119,
pp. 475-484.
13. C. Chang-liu, K. Wei-wei, and Y. Shuai-hua (2018). “Research on the application of BIM technology in the whole life cycle of
construction projects.” 2nd International Workshop on Renewable Energy and Development 2018, IOP Conf. Series: Earth and
Environmental Science 153, pp. 1-6.

Authors: George Gabriel Richard Roy, S. Britto Ramesh Kumar


A Security Framework for A Sustainable Smart Ecosystem using Permissioned Blockchain:
Paper Title:
Performance Evaluation
Abstract: This world always revolves around technology. There is always some disruptive technology that
topples down any technology that people normally consider as a de-facto standard or norm. The Internet was one
of these disruptive technologies which turned the whole way of how people were communicating with each
other. It has revolutionized computing and communication. After a few decades of disruption, today people have
accustomed to make their jobs easier with automation, remote control over the Internet, unsupervised actuation
etc., This is all feasible with the advent of Internet of Things (IoT). IoT is one of the disruptive technologies of
this era. Consumers of IoT are of different sorts ranging from, normal home automation to space engineering.
These consumers share important details in these IoT networks which are susceptible to attacks from intruders
who abuse the flaws of the IoT network for their own benefit. IoT security is one of the major concerns among
all the issues of implementing an IoT based solution. Blockchain another disruptive technology is amalgamated
to form a robust secure Smart Home Ecosystem. An Ecosystem is designed to incorporate IoT and Blockchain
seamlessly. Where services could be automated and operated in a secure manner. This paper proposes the
performance results of a Security framework for a Sustainable Smart Ecosystem using permissioned Blockchain.

Keywords: Blockchain, IoT Security, Smart Ecosystem, Disruptive Technologies.


730.
References: 4247-
42
1. M. Shyamala Devi, R. Suguna, Aparna Shashikant Joshi, and Rupali Amit Bagate, “Design of IoT Blockchain Based Smart Agriculture 50
for Enlightening Safety and Security,” Springer Nature Singapore Pte Ltd ICETCE 2019, CCIS 985, pp. 7–19, 2019.
2. Qin Wang, Xinqi Zhu, Yiyang Ni, Li Gu, Hongbo Zhu, “Blockchain for the IoT and industrial IoT: A review,” Internet of Things,
Elsevier, July 2019 (Accepted for Publication – In Press).
3. Ali Dorri, Salil S. Kanhere, and Raja Jurdak, “Blockchain in Internet of Things: Challenges and Solutions,” arxiv, 2016.
4. Kumar Pundir, Ashok & Devpriya, Jadhav & Chakraborty, Mrinmoy & Ganpathy, L, “Technology Integration for Improved
Performance: A Case Study in Digitization of Supply Chain with Integration of Internet of Things and Blockchain Technology,”
CCWC 2019, pp. 0170-0176, 2019.
5. Y. Sun, L. Zhang, G. Feng, B. Yang, B. Cao and M. A. Imran, "Blockchain-Enabled Wireless Internet of Things: Performance Analysis
and Optimal Communication Node Deployment," in IEEE Internet of Things Journal, vol. 6, no. 3, pp. 5791-5802, June 2019.
6. Bo Tang, Hongjuan Kang, Jingwen Fan, Qi Li, and Ravi Sandhu, “IoT Passport: A Blockchain-Based Trust Framework for
Collaborative Internet-of-Things,” In Proceedings of the 24th ACM Symposium on Access Control Models and Technologies
(SACMAT '19), ACM, New York, USA, 83-92, 2019.
7. Dorri, Ali & Kanhere, Salil & Jurdak, Raja & Gauravaram, Praveen., “Blockchain for IoT Security and Privacy: The Case Study of a
Smart Home,” 10.1109/PERCOMW.2017.7917634, 2017.
8. Volkan Dedeoglu, Raja Jurdak, Guntur D. Putra, Ali Dorri and Salil S. Kanhere, “A Trust Architecture for Blockchain in IoT,”
arXiv:1906.11461v1 [cs.CR] 27 June 2019.
9. George Gabriel Richard Roy, Britto Ramesh Kumar. S, “A Security Framework for a Sustainable Smart Home Ecosystem using
Permissioned Blockchain,” JETIR, Volume 6, Issue 3, pp 489-497, March 2019.
10. A. Baliga, N. Solanki, S. Verekar, A. Pednekar, P. Kamat and S. Chatterjee, "Performance Characterization of Hyperledger Fabric,"
2018 Crypto Valley Conference on Blockchain Technology (CVCBT), Zug, 2018, pp. 65-74.

Authors: Sanika H. Shinde, Mousami V. Munot, Prashant Kumar, Surabhi Boob


Paper Title: Intelligent Companion for Blind: Smart Stick
Abstract: Blindness is a state of lacking the visual perception due to physiological or neurological factors.
According to World Health Organization, approximately 1.3 billion people live with some form of visual
731. impairment with 36 million people being completely blind. These people face great difficulty in independent and 4251-
safe mobility. Almost 89% of such people live in low and middle income countries, and are unable to afford 42
existing mobility aid devices. Addressing these difficulties, the proposed research aims to design a low-cost and 56
user- friendly guidance system “Smart Stick” which serves as an Electronic travel Aid and as a Position Locator
Device. It helps to improve the mobility of both blind and visually impaired people, enabling them to navigate
safely by avoiding any obstacles that may encounter and providing facility to communicate its current location to
any of his/her relative. This device is tested under natural environmental conditions, and has performed excellent
under low and high light environments too. The proposed design achieves reduction in cost by 44% in
comparison to existing devices.

Keywords: Visually impaired, obstacle-detection, conveying position, Smart Stick, Ultrasonic ranger.

References:

1. Abbas Riazi, Fatemeh Riazi, Rezvan Yoosfi, and Fatemeh Bahmeeic; Outdoor difficulties experienced by a group of visually impaired
Iranian people, Journal of current Opthalmology, Vol 28, issue 2, June 2016
2. WHO blindness statistics[Oct 2018][3]: https://www.who.int/news-room/fact-sheets/detail/blindness-and-visual-impairment.
3. Bourne RRA, Flaxman SR, Braithwaite T, Cicinelli MV, Das A, Jonas JB, et al.; Vision Loss Expert Group. Magnitude, temporal
trends, and projections of the global prevalence of blindness and distance and near vision impairment: a systematic review and meta-
analysis. Lancet Glob Health. 2017 Sep;5(9):e888–97.
4. Peter Ackland, Serge Resnikoff, and Rupert Bourne; World blindness and visual impairment: despite many successes, the problem is
growing, Community Eye Health, Vol 30, issue 100, 2017
5. Kun (Linda) Li; Project Report Electronic-Travel-Aids-for-Blind-Guidance-Kun-Li, [Dec 2015]
6. http://www.gdp-research.com.au/minig\_1.htm
7. Elmannai W, Elleithy K; Sensor-Based Assistive Devices for Visually-Impaired People: Current Status, Challenges, and Future
Directions, Sensors (Basel), Vol 17, issue 3, 2017 Mar 10
8. https://www.ultracane.com/about\_the\_ultracane
9. http://assistech.iitd.ernet.in/smartcane.php
10. http://www.ti.com/microcontrollers/msp430-ultra-low-power-mcus/overview.html
11. Kunal Maurya, Mandeep Singh, Neelu Jain ; Real Time Vehicle Tracking System using GSM and GPS Technology-An Anti-theft
Tracking System, International Journal of Electronics and Computer Science Engineering, Vol 1, Number 3, June 2012
12. Amit Kumar,Rusha Patra, M. Manjunatha, J. Mukhopadhyay and A. K. Majumdar An electronic travel aid for navigation of visually
impaired, Communication Systems and Networks (COMSNETS), 2011 Third International conference on 4-8 jan 2011.
13. Anu Arora and Anjali Shetty; Common Problems Faced By Visually Impaired People, International Journal of Science and Research
(IJSR), Vol 3, issue 10, Oct 2014.

Authors: A.Prabhu Chakkaravarthy, A.Chandrasekar


A Linear Filtering on Automatic Decomposition and Reconstruction of Dermoscopy Images using
Paper Title:
Global Thresholding
Abstract: One of the fastest growing cancers in human cell is skin cancer. Initially starts from the outer layer
of human body and spreads unevenly all over by increasing in diameter. The formation of skin cancer depends
on the weakness of skin cell. To find the perfect diagnosis, dermatologist should use the computational method.
The identification of skin cancer is not easy on the first stage by the dermatologist but the computational method
describes out perfectly. The proposed work describes in extracting the skin lesion using Otsu Thresholding with
inverse discrete 2D wavelet transform. The proposed work initiated by pre-processing is to enhance the image,
followed by segmentation to extract skin lesion with decomposition of fore ground and background image and
terminates with post processing to extract feature like uneven boundary. The performance measure between
proposed segmentation and ground truth image, described with accuracy up to 96.69% for ISIC 2016 dataset.

Keywords: Gaussian Filter, 2D Discrete Wavelet Transform, Otsu Threshold, 2D Inverse Wavelet Transform,
Canny Edge Detection, Morphological Open, Principal Component Analysis.

References:

1. Jose Fernandez Alcon, calinaCiuhu, Warner ten Kate, Adrienne Heinrich, NatalliaUzunbajakava, GertruudKrekels, Denny Siem, and
Gerard de Haan, “Automatic Imaging System with Decision Support for Inspection of Pigmented Skin Lesions and Melanoma
Diagnosis”, IEEE Journal Of Selected Topics In Signal Processing, 3(1), 2009.
732. 2. B. Bozorgtabar, S. Sedai, P. Kanti Roy, R. Garnavi , “Skin lesion segmentation using deep convolution networks guided by local
unsupervised learning”, IBM J. RES. & DEV.61(5), 2017.
4257-
3. FaouziAdjed, Syed Jamal SafdarGardezi, FakhreddineAbabsa, IbrahimaFaye ,Sarat Chandra Dass , “Fusion of structural and textural 42
features for melanoma recognition”, IET Computer Vision 2018,12(2). 63
4. N C F. Codella, Q.-B. Nguyen, S. Pankanti, D. A. Gutman, B. Helba, A. C. Halpern, J. R. Smith, “Deep learning ensembles for
melanoma recognition in dermoscopy images”, IBM J. RES. & DEV.61(5), 2017.
5. HaraldGanster, Axel Pinz, ReinhardRöhrer, Ernst Wildling, Michael Binder, and HaraldKittler,”Automated Melanoma Recognition,
IEEE Transactions On Medical Imaging,20(3), 2001.
6. SaptarshiChatterjee, DebangshuDey, SugataMunshi , “Optimal selection of features using wavelet fractal descriptors and automatic
correlation bias reduction for classifying skin lesions.”, Biomedical Signal Processing and Control 2018.
7. Jingyun Liang, JinlinGuo ,Xin Liu , SongyangLao,”Fine-Grained Image Classification With Gaussian Mixture Layer”, IEEE
Access(6).
8. Steven Schoenecker ,TodLuginbuhl,”Characteristic Functions of the Product of Two Gaussian Random Variables and the Product of a
Gaussian and a Gamma Random Variable”, IEEE Signal Processing Letters, 23(5), 2016.
9. Peng-Lang Shui , Li-Xiang Shi , Han Yu , Yu-Ting Huang,”Iterative Maximum Likelihood and Outlier-robust Bipercentile Estimation
of Parameters of Compound-Gaussian Clutter With Inverse Gaussian Texture”, IEEE Signal Processing Letters, 23(11), 2016.
10. MiladNiknejad, Isfahan, HosseinRabbani ,MassoudBabaie-Zadeh,”Image Restoration Using Gaussian Mixture Models With Spatially
Constrained Patch Clustering”, IEEE Transactions on Image Processing, 24(11),2015.
11. Lucas P. Queiroz , Francisco Caio M. Rodrigues , Joao Paulo P. Gomes , Felipe T. Brito , Iago C. Chaves , “A Fault Detection Method
for Hard Disk Drives Based on Mixture of Gaussians and Nonparametric Statistics”, IEEE Transactions on Industrial Informatics,
13(2), 2017.
12. EwedaEweda , Neil J. Bershad , José Carlos M. Bermudez,”Stochastic Analysis of the LMS and NLMS Algorithms for
Cyclostationary White Gaussian and Non-Gaussian Inputs”, IEEE Transactions on Signal Processing, 66(18), 2018.Wen Wang ,
Ruiping Wang , Zhiwu Huang , Shiguang Shan , Xilin Chen,” Discriminant Analysis on Riemannian Manifold of Gaussian
Distributions for Face Recognition With Image Sets”, IEEE Transactions on Image Processing , 27( 1), 2018.
13. M. Yusaf , R. Nawaz , J. Iqbal,”Robust seizure detection in EEG using 2D DWT of time-frequency distributions”, Electronics Letters,
52(11),2016.
14. ThamizharasiAyyavoo, Jayasudha John Suseela,” Illumination pre-processing method for face recognition using 2D DWT and
CLAHE”,IET Biometrics , 7(4), 2018.
15. Changkun Wu , Wei Zhang , Qi Jia , YanyanLiu,”Hardware efficient multiplier-less multi-level 2D DWT architecture without off-chip
RAM”, IET Image Processing , 11(6), 2017.
16. AmanGhasemzadeh, Hasan Demirel,”3D discrete wavelet transform-based feature extraction for hyperspectral face recognition”, IET
Biometrics, 7(1), 2018.
17. Wolfgang Schnurrer , NiklasPallast , Thomas Richter , Andre Kaup,”Temporal Scalability of Dynamic Volume Data Using Mesh
Compensated Wavelet Lifting”, IEEE Transactions on Image Processing, 27(1), 2018.
18. Y. Zhang , T. Y. Ji , M. S. Li , Q. H. Wu,”Identification of Power Disturbances Using Generalized Morphological Open-Closing and
Close-Opening”, IEEE Transactions on Industrial Electronics,63(4), 2016.
19. Sung-JeaKo , A. Morales , Kyung-HoonLee,”Block basis matrix implementation of the morphological open-closing and close-
opening”, IEEE Signal Processing Letters, 2(1),1995.
20. Sung-JeaKo , A. Morales , Kyung-Hoon Lee,” A fast implementation algorithm and a bit-serial realization method for grayscale
morphological opening and closing”, IEEE Transactions on Signal Processing,43(12), 1995.
21. Kyung-HoonLee , A. Morales , Sung-JeaKo,”Adaptive basis matrix for the morphological function processing opening and closing”,
IEEE Transactions on Image Processing ( Volume: 6 , Issue: 5 , May 1997 ), Page(s): 769 – 774.
22. NingMa ,JianxinWang,”Dynamic threshold for SPWVD parameter estimation based on Otsu algorithm”, Journal of Systems
Engineering and Electronics 24(6),2013.
23. G.Y. Zhang , G.Z. Liu , H. Zhu , B. Qiu,” Ore image thresholding using bi-neighbourhood Otsu's approach”, Electronics Letters46(25),
2010.
24. Jing-HaoXue , D. Michael Titterington,” t-Tests,F-Tests and Otsu's Methods for Image Thresholding”, IEEE Transactions on Image
Processing , 20(8), 2011.
25. A.K. Khambampati , D. Liu , S. K. Konki , K. Y. Kim,” An Automatic Detection of the ROI Using Otsu Thresholding in Nonlinear
Difference EIT Imaging”, IEEE Sensors Journal, 18(12), 2018.
26. P. Bao , Lei Zhang , XiaolinWu,”Canny edge detection enhancement by scale multiplication”, IEEE Transactions on Pattern Analysis
and Machine Intelligence , 27(9), 2005.
27. Dey N, Rajinikanth V, Ashour AS, Tavares JMRS. Social group optimization supported segmentation and evaluation of skin melanoma
images. Symmetry.2018; 10(2):51.
28. Rajinikanth V, Satapathy SC, Dey N, Fernandes SL, Manic KS. Smart Innovation, Systems and Technologies. 2019; 104:193-202.
29. Kowsalya N, Kalyani A, Shree TDV, Raja NSM, Rajinikanth V. Skin-Melanoma Evaluation with Tsallis’s Thresholding and Chan-
Vese Approach. In. International Conference on System, Computation, Automation and Networking.IEEE.2018; 1-5. Doi:
10.1109/ICSCAN.2018.8541178.
30. Y. Zhang , P.I. Rockett,” The Bayesian Operating Point of the Canny Edge Detector”, IEEE Transactions on Image Processing, 15(11),
2016.
Authors: Siva Naga Lakshmi Pavani Kallam, BVNR Siva Kumar

Paper Title: Applicability of Blockchain Technology in Communication of Data using Raspberry Pi as Server
Abstract: The main things we used to build the project in this paper are one raspberry pi as server, two
Arduino’s as two nodes which are configured to connect to Wi-Fi using ESP8266 (node mcu). We will connect
temperature and humidity sensor to one Arduino and RFID Reader module to another Ardunio Board to
demonstrate the entire process. The working follows as the data is taken from DTH sensor and RFID Reader
module which is sent to Raspberry Pi. Arduino’s acts as nodes from which data transmission starts. The
Raspberry Pi acts as gateway between two Arduino’s and it is the server. All the components are connected to
the Wi-Fi. The data from the sensors is taken and will be sent to server in hash, hash includes all the previous
data and we already know that block chain is a decentralized network. We cannot manipulate the values of data
at any point because of their data contains both previous and local hash. This is why usage of block chain
provides more security to IOT devices. Henceforth, we implemented this exceptional way of blockchain
technology for communication of data for safety and immense security.

733. Keywords: Blockchain Technology, Cryptographic hash, IoT, peer to peer communication.
4264-
42
References:
68
1. L. Law, S. Sabett, and J. Solinas, “How to make a mint: the cryptography of anonymous electronic cash,” American University Law
Review, vol. 46, no. 4, pp. 1131-1162, 1996.
2. F. Tschorsch and B. Scheuermann, “Bitcoin and beyond: a technical survey on decentralized digital currencies,” IEEE
Communications Surveys & Tutorials, vol. 18, no. 3, pp. 2084-2123, March 2016.
3. S. Nakamoto, “Bitcoin: a peer-to-peer electronic cash system,” 2008, available at: https://bitcoin.org/bitcoin.pdf
4. R. Merkle, “A digital signature based on a conventional encryption function,” In: Pomerance C. (eds) Advances in Cryptology —
CRYPTO ’87. CRYPTO 1987. Lecture Notes in Computer Science, vol 293. Springer, Berlin, Heidelberg, pp. 369-378, 1987.
5. Y. Sompolinsky and A. Zohar, “Secure high-rate transaction processing in Bitcoin,” Financial Cryptography, pp. 507-527, 2015.
6. T. Dryja, “Hashimoto: I/O bound proof of work,” 2014.
7. G. Wood, “Ethereum: a secure decentralised generalised transaction ledger, Byzantium version,” 2018, available at:
https://ethereum.github.io/yellowpaper/paper.pdf
8. S. Underwood, “Blockchain beyond bitcoin,” Commun. ACM, vol. 59, no. 11, pp. 15–17, 2016.
9. W. E. Summary and S. Plants, “Power and the Industrial Internet of Things ( IIoT ),” no. January, pp. 1–14, 2015. [
10. K. Delmolino, M. Arnett, A. E. Kosba, A. Miller, and E. Shi, “Step by Step Towards Creating a Safe Smart Contract: Lessons and
Insights from a Cryptocurrency Lab.,” IACR Cryptol. ePrint Arch., vol. 2015, p. 460, 2015

Authors: Rajnish Kumar Sharma, G. Irusapparajan, D.Periyaazhagar


Three-Phase Symmetric Cascading Z-Source Seven Levels Multilevel Inverter Excited by Multi
Paper Title:
Carrier Sinusoidal Pulse Width Modulation Scheme
734. Abstract: The Multilevel Z sources Inverter have been documented as attractive topologies used for elevated
voltage adaptation. As the digit of levels improved, the synthesized set of steps output waveform have many 4269-
42
ladder, imminent the preferred sine waveform but the major weakness of MLI be its amplitude of ac output
74
voltage is imperfect to DC input sources voltage summing up. To conquer this drawback seven level cascading
symmetric multilevel inverter based Z source inverter have been projected. This work focuses on different multi-
carrier sinusoidal PWM scheme for the seven level three phase Z source symmetric cascading inverter.
Performance parameters of seven level three phase Z source symmetric cascading inverter has been analyzed. A
simulation circuit model of seven level three phase Z source symmetric cascading inverter urbanized using
MATLAB/SIMULINK and its presentation have been urbanized.

Keywords: Multi-level Inverter, symmetric multilevel inverter. Z source, Root Mean Square.

References:

1. Prabaharan N, Palanisamy K. A comprehensive review on reduced switch multilevel inverter topologies, modulation, techniques and
applications. Renew Sus Energy Reviews.2017, 76,pp.1248–1282.
2. G. Irusapparajan, D. Periyaazhagar, N. Prabaharan and A. Rini ann Jerin, “Experimental verification of trinary DC source cascaded H-
bridge multilevel inverter using unipolar pulse width modulation”, Automatika Journal for Control, Measurement, Electronics,
Computing and Communications, 2019, vol. 60, no. 1, pp.19–27.
3. L.M. Tolbert and F.Z. Peng, “Multilevel Converters as a Utility Interface for Renewable Energy System”, IEEE Proceedings-Power
Eng. Soc. Summer Meeting, Seattle, pp. 1271-1274. s
4. K. Corzine and Y. Familiant, “A New Cascaded Multilevel H-Bridge Drive”, IEEE Transactions Power Electron., Vol. 17, No.1, 2002,
pp. 125-131.
5. M. Reza Banaei and A.R. Dehghanzadeh, ―A Z-Source novel based multilevel inverter for renewable sources fed DVR‖, IEEE
International Conference, Power Quality Conference pp.1-6, 2011.
6. Prabaharan N, Palanisamy K. Analysis and integration of multilevel inverter configuration with boost converters in a photovoltaic
system. Energy Conv Manag. 2016;128:327–342.
7. Prabaharan N, Palanisamy K. A single phase grid connected hybrid multilevel inverter for interfacing photovoltaic system. Energy
Procedia. 2016;103:250–255.
8. Prabaharan N, Palanisamy K. Modeling and analysis of a quasi-linear multilevel inverter for photovoltaic application. Energy Procedia.
2016;103:256–261.
9. F. Z. Peng, “Z-source inverter,” IEEE Trans. Ind. Appl., vol. 39, no. 2, pp. 504–510, Mar./Apr. 2003.
10. D. A. Rendusara, E. Cengelci, P. N. Enjeti, V. R. Stefanovic, and J. W.Gray, “Analysis of common mode voltage – „neutral shift‟ in
medium voltage PWM adjustable speed drive (MV-ASD) systems,” IEEE Trans. Power Electron, vol. 15, no. 6, pp. 1124–1133, Nov.
2000.
11. B.Shanthi and S.P.Natarajan, “Comparative study on various unipolar PWM strategies for single phase five level cascaded inverter,
“International Journal of Power Electronics (IJPELEC), Special issue on: Power Converters: Modelling, Simulation, Analysis,
Topologies, Secondary issues and Applications, Inder Science Pubilication, Switzerland, pp.36-50,2009.
12. Prabaharan N, Palanisamy K. Comparative analysis of symmetric and asymmetric reduced switch MLI topologies using unipolar pulse
width modulation strategies. IET Power Electron. 2016;9(15):2808–2823.
13. Periyaazhagar D, Irusapparajan G. Comparative study on three phase cascaded inverter for various bipolar PWM techniques. Int J Model
Identif Control. 2016;25:261–0272.
14. Periyaazhagar D, Irusapparajan G. Asymmetrical cascaded multi level inverter using control freedom pulse width modulation
techniques. Int J Power Electron Drive Sys. 2016;7:848–856.
15. Prabaharan N, Palanisamy K. Analysis of cascaded H-bridge multilevel inverter configuration with double level circuit. IET Power
Electron. 2017;10(9): 1023–1033.
16. Prabaharan N, Palanisamy K, Rini Ann Jerin A. Asymmetric multilevel inverter structure with hybrid PWM strategy. Int J Appl Eng
Res. 2015;10(55):2672–2676.

Authors: M.J. Bharathi, V.N. Rajavarman, R. Shobarani

Paper Title: A Secured Data Retrieval Architecture for WBAN using Elliptic Curve Digital Signature
Abstract: The big data is proposed a secure scheme of data collection that to deal the problems in WBAN
(Wireless Body Area Network). To start with to register the sensor nodes using CA (Certification Authority)
connect the Network of Big data center. After the preprocessing stage, the sensors are correlated with big data
center through authentication on both sides by ECDSA (Elliptic Curve Digital Signature Algorithm). The sensor
node designed using distributed storage and the collected data transfer with improved security protection

Keywords: Wireless body area network, Elliptic curve digital signature algorithm, Certificate Authority,
Sensors, Hadoop.

References:

1. Chunqiang Hu, Hongjuan Li, Xiuzhen Cheng and Xiaofeng Liao, “Secure and Efficient data communication protocol for Wireless Body
Area Networks”, IEEE Transactions On Multi-Scale Computing Systems, Vol. , No. , 11. 2015
2. Limin Ma · Yu Ge · Yuesheng Zhu, “ TinyZKP: A Lightweight Authentication Scheme Based on Zero-Knowledge Proof for Wireless
Body Area Networks”, Wireless Pers Commun (2014) 77:1077–1090
3. Amrita Roy Chowdhurya , Tanusree Chatterjeeb , Sipra DasBita,” LOCHA: A Light-Weight One-way Cryptographic Hash Algorithm
735. for Wireless Sensor Network”. The 5th International Conference on Ambient Systems, Networks and Technologies (ANT-2014).
4275-
4. Kyung-Ah Shim, Young-Ran Lee ⇑ , Cheol-Min Park,” EIBAS: An efficient identity-based broadcast authentication scheme in wireless 42
sensor networks”, SciVerse ScienceDirect, Ad Hoc Networks 11 (2013) 182–189 79
5. Sanskruti Patel and Atul Patel,” A Big Data Revolution In Health Care Sector: Opportunities, Challenges And Technological
Advancements”, International Journal of Information Sciences and Techniques (IJIST) Vol.6, No.1/2, March 2016
6. Isabel de la Torre, Begoña García-Zapirain, Miguel López-Coronado,” Analysis of Security in Big Data Related to Healthcare,” Journal
of Digital Forensics, Security and Law Volume 12 | Number 3 Article 5
7. Muhammad Sheraz Arshad Malik, Muhammad Ahmed, Tahir Abdullah, Naila Kousar, Mehak Nigar Shumaila” Wireless Body Area
Network Security and Privacy Issue in E-Healthcare”, (IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 9, No. 4, 2018
8. Manikanthan, S.V., Padmapriya, T, A secured multi-level key management technique for intensified wireless sensor network.
International Journal of Recent Technology and Engineering, V.7, No.6S2, 2019.
Authors: Jackulin Sam Gini.A, A.Chandrasekar

Paper Title: Experimental Analysis for Semantic based Large Scale Service Composition using Deep Learning
Abstract: In Service Oriented Architecture (SOA) web services plays important role. Web services are web
application components that can be published, found, and used on the Web. Also machine-to-machine
communication over a network can be achieved through web services. Cloud computing and distributed
computing brings lot of web services into WWW. Web service composition is the process of combing two or
more web services to together to satisfy the user requirements. Tremendous increase in the number of services
and the complexity in user requirement specification make web service composition as challenging task. The
automated service composition is a technique in which Web Service Composition can be done automatically
with minimal or no human intervention. In this paper we propose a approach of web service composition
methods for large scale environment by considering the QoS Parameters. We have used stacked autoencoders to
learn features of web services. Recurrent Neural Network (RNN) leverages uses the learned features to predict
the new composition. Experiment results show the efficiency and scalability. Use of deep learning algorithm in
web service composition, leads to high success rate and less computational cost.

Keywords: Web services, web service composition, semantic web, Deep Learning.

References:
736. 1. Alex Krizhevsky and Geoffrey E. Hinton. 2011. Using very deep autoencoders for content-based image retrieval. In ESANN 2011, 19th
4280-
European Symposium on Artificial Neural Networks, Bruges, Belgium, April 27-29, 2011, Proceedings.
2. Yu Lei, Zhou Jiantao, Wei Fengqi, Gao Yongqiang and Yang Bo, “Web Service Composition Based on Reinforcement Learning”, 2015 42
IEEE International Conferenceon Web Services, DOI 10.1109. 83
3. Hamza Labbaci, BrahimMedjahed, Faisal Binzagr, YoucefAklouf “A Deep Learning Approach forWeb Service
Interactions”,Proceedings of the International Conference on Web Intelligence, Pages 848-854
4. Qi Gu, Jian Cao, and Qianyang Peng. 2016. Service Package Recommendation for Mashup Creation via Mashup Textual Description
Mining. In IEEE International Conference on Web Services, ICWS 2016, San Francisco, CA, USA, June 27 - July 2,2016. 452–459.
5. YoshuaBengio, Pascal Lamblin, Dan Popovici, and Hugo Larochelle. 2006. Greedy Layer-Wise Training of Deep Networks. In
Advances in Neural Information Processing Systems 19, Proceedings of the Twentieth Annual Conference on Neural Information
Processing Systems, Vancouver, British Columbia, Canada, December4-7, 2006. 153–160.
6. DumitruErhan, Pierre-Antoine Manzagol, YoshuaBengio, SamyBengio, and Pascal Vincent. 2009. The Difficulty of Training Deep
Architectures and the Effect of Unsupervised Pre-Training.. In AISTATS, Vol. 5. 153–160.
7. Lei Yu1, Wang Zhili1, MengLingli, Wang Jiang , Luoming Meng1, Qiu Xue-song1, “Adaptive Web Services Composition Using Q-
learning in Cloud”, 2013 IEEE Ninth World Congress on Services
8. Hongbing Wang(B), Mingzhu Gu1, Qi Yu, HuanhuanFei, JiajieLiand Yong Tao1, “Large-Scale and Adaptive Service
CompositionUsing Deep Reinforcement”, International Conference on Service-Oriented Computing ICSOC 2017: Service-Oriented
Computing pp 383-391
9. Joel Christian, Mohammed Hussain Bohara, “Multi-agent Web Service Composition using Partially Observable Markov Decision
Process”, AICTC '16 Proceedings of the International Conference on Advances in Information Communication Technology &
Computing Article No. 70.
10. Yang Yu, Jian Chen , Shangquan LinYing Wang, “A Dynamic QoS-Aware Logistics Service Composition Algorithm Based on Social
Network”IEEE Transactions on Emerging Topics in Computing , volume 2,no.4,December 2014
11. Al-Masri, E., and Mahmooud, Q.H.: Investigating Web Services on the World Wide Web, 17th International Conference on World Wide
Web (WWW), Beijing, April 2008, pp. ss795-804.

Authors: A. Seethalakshmy, N. Srinivasan

Paper Title: Solving Real-Life Problem Using Transportation


Abstract: Herewith a methodology is proposed towards obtaining optimum level as solution for the real-life
problem using Transportation. This paper is composed for a travel agency company to get maximum profit and
also to minimize the transportation cost. In the proposed method maximum value is marked both in row-wise
and column-wise for maximization type and minimum valueis marked both in row-wise and column-wise for
minimization type and the greatest maximum value is given allocation. Here a New algorithm is used to solve
the transportation model to make maximum profit for the Company. This method gives the optimal solution in
less iteration.

Keywords: Optimal solution, drivers, cars, transportation,Capacity,Demand,optimization.


737.
4284-
References: 42
87
1. Adlakha, V. and Kowalski, K. “An Alternative Solution Algorithm for Certain Transportation Problems”, IJMEST, Vol. 30, pp.
719-728, 1999.
2. Adlakha, V., Kowalski, K. and Lev, B. “Solving Transportation Problem with Mixed Constraints”, JMSEM, No.1, pp.47-52, 2010.
3. Ahmed, M.M. “Algorithmic Approach to Solve Transportation Problems:s Minimization of Cost and Time”, M. Phil. Thesis, Dept. of
Mathematics, Jahangirnagar University, Savar, 2014.
4. Gass, S.I. “On solving the transportation problem”, Journal of Operational Research Society, Vol. 41, No. 4, pp. 291-297, 1990.
5. Goyal, S.K. “Improving VAM for the Unbalance Transportation Problem”, J Opl Res Soc, Vol. 35, pp. 1113-1114, 1984.
6. Gupta, P.K. and Hira, D.S. “Operation Research”, S. Chand & Company Limited,14th Edition, 1999.
7. NagarajBalakrishnan. “Modified Vogel’s Approximation method for the Unbalanced Transportation Problem”, Applied Mathematical
Letter, Vol.3, No.2, pp. 9-11, 1980.
8. Pandian, P. and Anuradha, D. “A New Approach for solving bi-objective transportation problems”, Australian Journal of Basic and
Applied Sciences, Vol. 5, pp. 67-74, 2011.
9. Pandian, P. and Natarajan, G. “A New Method for finding an Optimal More for Less Solution of Transportation Problems with Mixed
Constraints”, Int. J.Contemp. Math.Sciences, Vol.5, No.19, pp. 931-942, 2010.
10. Pandian, P. and Natarajan, G. “A New Method for finding an Optimal Solution of Fully Interval Integer Transportation Problems”,
Applied Mathematical Sciences, Vol. 4, No.37, pp. 1819-1830, 2010.
11. Pandian, P. and Natarajan, G. “A New method for finding an Optimal solution For TP”, International Journal of Math Science and
Engineering. Appls (IJMSEA), Vol. 4, pp. 59-65, 2010
12. Sharma, R.R.K. and Sharma, K.D. “A new dual based procedure for the transportation problem”, European Journal of Operational Res.,
Vol. 122, pp. 611-624, 2000.
13. Srinivasan, N. and Iranian, D. “An Innovative Approach for finding the optimal Solution for Transportation Problem”, International
Journal of Engineering and Management Research, Vol. 6, No. 3, 2016.
14. Srinivasan, N. and Iranian, D. “A new approach for solving assignment problem with optimal solution”, International Journal of
Engineering and Management Research, Vol. 6, No. 3, 2016.
15. Sudhakar, V.J., Arunsankar, N. and Karpagam, T. “A New Approach for finding an optimal solution for TP”, European Journal of
Scientific Research, ISSN 14216x, Vol.68, No. 2, pp.254-257, 2012.
16. Taha, H.A. “Operations research-Introduction”, Prentince hall of
17. India New Delhi, 8th edition, 2007.
18. Vivek Joshi, Rekha. “Optimization Techniques for Transportation Problems of Three variables”, IOSR Journal of Mathematics, Vol.9,
pp. 46-50, 2013.
Authors: K.Manivannan, L.Lakshminarasimman, M.Janaki Rani
Design of High-Speed Desensitized FIR Filter Employing Reduced Complexity SQRT Carry
Paper Title:
Select Adder
Abstract: In this research, a highly efficient desensitized FIR filter is designed to enhance the performance of
digital filtering operation. With regard to FIR filter design, Multiplication and Accumulation component (MAC)
forms the core processing entity. Half-band filters employing Ripple Carry Adder (RCA) based MAC structures
have a sizeable number of logical elements, leading to high delay and high power consumption. To minimize
these issues, a modified Booth multiplier encompassing SQRT Carry Select Adder (CSLA) based MAC
component is proposed for the desensitized filter with reduced coefficients and employing lesser number of
logical elements forgiving optimum performance with respect to delay and power consumption. The suggested
FIR filter is simulated and assessed using EDA simulation tools from Modelsim 6.3c and Xilinx ISE. The results
obtained from the proposed Desensitized FIR filter employing the modified booth multiplier with reduced
complexity based SQRT CSLA show encouraging signs with respect to 12.08% reduction in delay and 2.2%
reduction in power consumption when compared with traditional RCA based digital FIR filter.

Keywords: MAC, SQRT CSA, RCA, Desensitized FIR filter, Half band filter.

References:

1. Harris, F., Chen, X. and Venosa, E., "An efficient cascade of half-band filters for software defined radio transmitters", IEEE Conference
on Signals, Systems and Computers, pp. 990-994, 2011,ISBN:978-1-4673-0323-1.
2. Mariammal, K., Rani, S.J.V. and Kohila, T., "Area efficient high-speed low power multiplier architecture for multirate filter design",
IEEE International Conference on Emerging Trends in Computing, Communication and Nanotechnology (ICECCN 2013), pp. 109-116,
2013,ISBN:978-1-4673-5036-5. 4288-
738. 3. Deng, T.B.,"Low-complexity design of 2-D half-band filters", IEEE International Symposium on Communications and Information 42
Technology, pp. 602-604, 2009,ISBN: 978-1-4244-4521-9. 96
4. Harris, F., Venosa, E., Chen, X., Kumar, P. and Dick, C.,"Comparison of standard low pass filter types in two-path half-band IIR filter
structures", IEEE International Symposium on Signals, Circuits and Systems (ISSCS), pp. 1-4, 2013,ISBN:978-1-4799-3193-4.
5. Willson, A.N., "Desensitized half-band filters", IEEE Transactions on Circuits and Systems I, Vol. 57, No. 1, pp.152-167,
2010,ISSN:1549-8328.
6. Jorgensen, I.H.H., Pracny, P. and Bruun, E.,"Hardware-efficient implementation of half-band IIR filter for interpolation and
decimation", IEEE Transactions on Circuits and Systems II, Vol. 60, No.12, 2013,ISSN:1549-7747.
7. Mehrnia, A. and Willson, A.N.,"Optimal factoring of FIR filters", IEEE Transactions on Signal Processing, Vol. 63, No. 3, pp.647-661,
2015,ISSN:1053-587X.
8. Chen, J. Chang, C. H. Fen, F. Ding, W. and Ding, J. "Novel Design Algorithm for Low Complexity Programmable FIR Filters
Based on Extended Double-Base Number System" IEEE Transaction on Circuits and Systems, Vol. 62, No.1, pp. 1-10,
2014,ISSN:1549-8328.
9. Mohanty, B.K. & Patel, S.K." Area–Delay–Power Efficient Carry Select Adder" IEEE Transactions on Circuits and Systems-II, Vol. 61,
No. 6, pp.418-422, 2014,ISSN:1549-7747.
10. Alexander, S.,”A Review of Different Multipliers in Digital Circuits”, International Journal of MC Square Scientific Research, Vol. 4,
No. 1, pp. 1-6, 2012.
K. Ramash Kumar, K. Aswin, S. Hariharan, S. Mohamed Rilwan, Tamil Poonkundran,
Authors:
A. Vinothni, V. Karmugil, K. Narentheran, L. Naveen j, N. Yuvaraj, V. Tamilselvan
Paper Title: Design and Fabrication of Electric Vehicle for Physically Challenged Person
Abstract: This article studies on a design and fabrication of Electric Vehicle (EV) for physically challenged
person. In current scenario, a physically challenged person has facing a problem of transportation during their
travel from one place to another place without safety and convenience. They find it difficult to react to situation
739. in front of them. In order to solve these problems, an Electric Vehicle (EV) is designed where they can travel
easily and safely. The major components of EV consist of battery, electronic commutator with control unit, 4297-
BLDC motor and mechanical structure. The main merits of developed EV has no pollution, no fuel cost, less 43
weight, modified mechanical structure, high pulling capacity, comfortable spacing for person travel, easy 00
maintenance, less number components in comparison with existing EV. The gross weight of designed vehicle
with load (person) has 300 kg (approximately). The performance of the developed EV is validated at different
running conditions for monitoring the battery back-up and time durations.
Keywords: BLDC motor with controller, E-Vehicle, Mechanical Structure.

References:

1. International Energy Outlook 2016-Transporation Sector Energy Consuption-Energy Infromation Administation. Available online:
https://www.eia.gov/outlooks/ieo/transportation.cfm (accessed on 15 April 2017).
2. K. S. Reddy, S.Aravind-han and Tapas K. Mallick: Electric Auto-Rickshaw for a Sustainable Transport System, MDPI, Energies,
2017, 10, 754; doi:10.3390/en10060754.
3. Dhanashri Sonar, Shantanu Sonar, Rohan Katariya: Design of Solar Tricycle For Handicapped People, International Research Journal of
Engineering and Technology (IRJET), 2017, Vol. 4, No.8, pp.1115-1129.
4. T. Faraz and A. Azad: Solar Battery Charging Station and Torque Sensor Based Electrically Assisted vehicle, IEEE conference Global
Humanitarian Technology Conference, 2012. DOI: 10.1109/GHTC.2012.62.
5. Swati Dhamale, Rahul Jaiwal, Mayur Jadhav, Anvay Patha: Design and fabrication of eco- friendly vehicle for physically handicapped
person, International Research Journal of Engineering and Technology, Vol. 05, Iss. 05, 2018, pp.3787-3791.
6. Jayaprabakar J, Saikiran K, Paranthaman P, Nirmal Raj R, Arunkumar T: Design of Affordable Electric Vehicle for Handicapped,
International Journal on Design & Manufacturing Technologies, Vol. 10, No. 2, July 2016, pp.4-6.
7. K Ramash Kumar, Implementation of sliding mode controller plus proportional double integral controller for negative output elementary
boost converter, Alexandria Engineering Journal, Vol.55, Iss.2, pp.-1429-1445.
8. K Ramash Kumar, D Kalyankumar, V Kirubakaran, An Hybrid Multi Level Inverter Based DSTATCOM Control, Majlesi Journal of
Electrical Engineering, Vol.5, Iss.2.

Authors: S. Poongothai, C. Dharuman, P. Venkatesan

Paper Title: Performance of Fuzzy Rough Sets and Fuzzy Evolutionary Classifiers using Medical Databases
Abstract: As the technology improving, the problems of mankind, regarding health issues also increasing day
by day. Nowadays high dimensionality data are available for various health problems which is very difficult to
handle manually. The aim of this paper is to construct algorithms for extracting the relevant information from
the large amount of data and classifying using various hybrid techniques like Fuzzy-Rough set and Fuzzy
Evolutionary Algorithms. The efficiency of Fuzzy classifiers has been improved by hybridization method. This
paper proposes a comparison of fuzzy hybrid techniques like Fuzzy Rough set and Fuzzy EA for the diagnosis of
Hepatitis taken from UCI repository. The results of comparison and classification shows that the proposed
technique performs better than other normal methods.

Keywords: Fuzzy logic, Rough sets, Evolutionary algorithms, Hybrid techniques.

References:

1. R. Bellman, Adaptive Control Processes: A Guided Tour, Princeton University Press,961.


2. G.V. Trunk, .A Problem of Dimensionality: A Simple Example,. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1(3),
306- 307, 1979.
3. Zadeh L .A, Fuzzy sets, Information and Control, Vol 8, 1965, pp. 338–353.
4. K.B.Mankad, and P.S.Sajja, Measuring human intelligence by applying soft computing techniques: A genetic fuzzy approach , in
Diagnostic Test Approaches to Machine Learning and Common-sense Reasoning Systems, X.A. Naidenova and D. Ignatov, Eds.
5. Hershey, PA: IGI Global, pp.128-153,July 2012. [Online].Available:http://www.irmainternational.org/viewtitle/69407/ [Accessed Dec
2014].
6. del Jesus, M., Hoffmann, F., Navascues, L., and Sánchez, L. (2004). Induction of fuzzy rule- based classifiers with evolutionary
boosting algorithms. IEEE Transactions on Fuzzy Systems, 12(3), 296.308.
740. 7. Pawlak Z. (1982): Rough sets. | Int. J. Comp. Sci., Vol.11, pp.341-356.
Rechenberg ,“Evolutionary strategies” 1960. 4301-
8. Holland, J.H., 1975. Adaptation in Natural and Artificial Systems. Ann Arbor: University of Michigan Press. (A 2nd edn was published 43
in 1992. MIT Press, Cambridge 183 pp. 04
9. Goldberg, D.E., 1989. Genetic Algorithms in Search, Optimization, and Machine Learning. Addison-Wesley 412 pp.
10. D.Boixader, J.Jacas, J.Recasens, Upper and lower approximations of fuzzy sets, International Journal of General Systems 29 (2000)
555–568.
11. D.G.Chen, S.Y.Zhao, Local reduction of decision system with fuzzy rough sets, Fuzzy Sets and Systems 161(2010)1871–1883.
12. M.D.Cock, C.Cornelis, E.E.Kerre, Fuzzy rough sets: The forgotten step, IEEE Transactions on Fuzzy Systems15(2007)121–130.
13. C.Cornelis, G.Deschrijver, E.E.Kerre, Implication inintuitionistic fuzzy and interval- Valued fuzzy set theory: Construction,
classification, application, International Journal of Approximate Reasoning35(2004)55–95.
14. Q.H.Hu, D.R.Yu, W.Pedrycz, D.G.Chen, Kernelized fuzzy rough sets and their applications, IEEE Transactions on Knowledge and
Data Engineering 23(2011)1649– 1667.
15. Q.H.Hu, L.Zhang,S. An, D.Zhang, D.R.Yu, On robust fuzzy rough set models, IEEE Transactions on Fuzzy Systems 20 (2012) 636–
651.
16. Q.H.Hu, L.Zhang, D.G.Chen, W.Pedrycz, D.R.Yu, Gaussian kernel based fuzzy rough sets: Model, uncertainty measures and
applications, International Journal of Approximate Reasoning 51 (2010) 453–471.
17. R.Jensen, Q.Shen, Fuzzy-rough attributes reduction with application to web categorization, Fuzzy Sets and Systems 141(2004)469–
485.
18. R.Jensen, Q.Shen, Semantics-preserving dimensionality reduction: Rough and fuzzy rough based approaches, IEEE Transactions on
Knowledge and Data Engineering 16 (2004) 1457–1471.
19. R.Jensen, Q.Shen,Fuzzy-rough sets assisted attribute selection, IEEE Transactions on Fuzzy Systems 15(2007)73–89.
20. R.Jensen, Q.Shen, New approaches to fuzzy- rough feature selection, IEEE Transactions on Fuzzy Systems 17 (2009) 824–838.
21. Kasemsiri, W., & Kimpan, C. (2001). Printed thai character recognition using fuzzy- rough sets. In TENCON 2001. Proceedings of
IEEE Region 10 International Conference on Electrical and Electronic Technology (Vol. 1, pp. 326-330). IEEE..
22. Rajen B. Bhatt, M.Gopal. On Fuzzy Rough Set Approach To Feature selection, IEEE Transaction on Fuzzy Systems, volume 15, pages
73-89, 2007.
23. D. Dubois, H. Prade, Rough fuzzy set and fuzzy rough sets, International Journal of General Systems 17 (1990) 191–209.
24. Palm, R., Driankov, D.: Model based fuzzy control. Springer, Berlin (1997)
25. Pedrycz, W. (ed.): Fuzzy modelling: paradigms and practice. Kluwer Academic Press, Dordrecht (1996).
26. Kuncheva, L.: Fuzzy classifier design. Springer, Berlin (2000)
27. Voigt, H.M.: Fuzzy evolutionary algorithms. Technical Report tr-92-038, International Computer Science Institute (ICSI), Berkeley
(199UCI Machine Learning Repository, http://archive.ics.uci.edu/ml/index.html.

Authors: B Gowri Sankaran, B Karthik, S P Vijayaragavan

Paper Title: Image Compression Utilizing Wavelet Transform


Abstract: Image stress diminishes the season of transmits in the gadget and increases the transmission pace. In
Lossless approach of image pressure, no data wander off at the same time as doing the stress. To recognize those
forms of issues distinct techniques for the photo stress are utilized. Currently questions like how to do mage
stress and second one is which kinds of innovation is utilized, might be emerges. Therefore normally sorts’ of
methodologies are clarified known as as lossless and the lossy image strain strategies. These techniques are easy
in their packages and consume nearly no reminiscence. A calculation has additionally been acquainted and
linked with p.c. snap shots and to decompress them lower back, via using the huffman encoding methods.

Keywords: Strain Strategies, Decode and Encode.

References:

1. Ccitt rec. T.81, (iso/iec 10918-1, 1994), digital compression and coding of continuoustone still images – requirements and guidelines
(jpeg), 1992.
741. 2. Iso/iec 15444-1, jpeg 2000 image coding system: core coding system. 2004. 4305-
3. Christopoulos c, skodras a, ebrahimi t. The jpeg2000 still image coding system: an overview. Ieee transactions on consumer electronics,
46(4), 1103-1127, 2000. 43
4. Itu-t rec. T.832, (iso/iec 29199-2, 2010), jpeg xr image coding system: image coding specification. 2009. 08
5. Iso/iec 15948:2004, information technology -- computer graphics and image processing -- portable network graphics (png): functional
specification, 2004.
6. Ahmed n, natarajan t, rao kr. Discrete cosine transform. Ieee transactions on computers, 23(1): 90-93, 1974.
7. Mallat s. A theory for multiresolution signal decomposition: the wavelet representation. Ieee pattern analysis and machine intelligence.
11(7), 674-693, 1989.
8. Qiufu Li, Derong Chen, Wei Jiang, Bingtai Liu, and Jiulu Gong, Generelization of wavelet:set partition coding system, IEEE
transactions on image processing, vol. 25, no. 2, february 2016.
9. Zahangwei, An improved image encoding algorithm based on EZW and Huffman joint encoding, Ninth International Conference on
P2P, Parallel, Grid, Cloud and Internet Computing, 2014.
10. Karthik B., Kumar T.K., Dorairangaswamy M.A., Logashanmugam E., Removal of high density salt and pepper noise through modified
cascaded filter, Middle - East Journal of Scientific Research, V-20, I-10, 1222-1228, 2014.
11. Kiran Kumar T.V.U., Karthik B., Bharath Kumaran E., Visual secret sharing scheme for JPEG compressed images, Middle - East
Journal of Scientific Research, V-12, I-12, 1873-1880, 2012.
12. Karthik B., Kiran Kumar T.V.U., Noise removal using mixtures of projected gaussian scale mixtures, World Applied Sciences Journal,
V-29, I-8, 1039-1045, 2014.
13. V.S.Shingate, T.R. Sotakke&S.N.Talbar, “Still Image Compression using Embedded Zerotreewavelet Encoding”, Inrenational Journal of
Computer Science & Communication, Vol.1,No.1, January-June 2010,pp.21-24.

Authors: Dinokumar Kongkham, M Sundararajan

Paper Title: Distributed Wideband Sensing Method for Faded Dynamic Spectrum Access
Abstract: A conveyed compressive inspecting method is proposed for agreeable wideband spectrum sensing
which requires fewer quantities of estimations whereas conquering time-changeability of range inhabitance and
the shrouded station issue. Initially, we demonstrate that the wideband range inhabitance data could most likely
be recouped with a decreased quantity of range estimations. Second, we suggest detecting framework plan which
increases the spectrum detecting recuperation precision. Utilizing simulations, we affirm our theoretic outcomes
and demonstrate that collaboration prompts high identification likelihood, even with every auxiliary client taking
just little estimation. We likewise demonstrate that it is adequate to think about a subset of near to optional
clients to get equivalent exhibitions.

Keywords: Heterogeneous Wideband Access, Appropriated Compressive Examining, Cooperative Spectrum


742. Sensing. 4309-
References: 43
1. Amal S Kannan ; Ebin M. Manuel;," Performance analysis of blind spectrum sensing in cooperative environment" (ICCC),2013.
12
2. HasanKartlak ; NiyaziOdabasioglu ; Aydin Akan,"Optimumrelay selection for cooperative spectrum sensing and transmission
incognitive networks" 2014.
3. YongkuiMa, Jiaxin Liu, Yulong Gao, "Cooperative spectrum sensing based on the compressed sensing"2015.
4. N. Shribala ; P. Srihari ; B.C. Jinaga, "Improvement of a secure and Distributed Cooperative Spectrum Sensing protocol"2015.
5. DonghoSeo ; Haewoon Nam, "A Parallel Multi- Channel Cooperative spectrum sensing in cognitive radio networks” 2018.
6. DongfengZhao ; Haiying hao, "A cooperative compressive sensing scheme for power spectrum reconstruction" 2015.
7. JunfangLi ; Jingyu Feng ; Shaoli Kang ; YongmingGuo, " An incentive mechanism based on social selfishness
for cooperative spectrumsensing”, 2013.
8. ArashAzarfar ; Chun-Hao Liu ; Jean-François Frigon; BrunildeSansò ; DanijelaCabric,"Joint transmission
and cooperative spectrum sensing scheduling optimization in multi-channel dynamic spectrum access networks"2017.
9. Smriti ; ChhaganCharan, "Double Threshold Based Cooperative Spectrum Sensing with Consideration of History of Sensing Nodes in
Cognitive Radio Networks",2018.
10. RuiyanDu ; Fulai Liu ; Qinqin Zhao, "Adaptive cooperative spectrum sensing based on multiple measurement vectors", 2017.

743. Authors: B Gowri Sankaran, B Karthik, S P Vijayaragavan


Paper Title: Weight Ward Change Region Plummeting Change for Square based Image Huffman Coding
Abstract: Image weight is an execution of the data weight which encodes genuine picture with specific bits.
The purpose of the image weight is to lessen the redundancy and superfluity of picture data to be capable to
record or send data in an incredible structure. Thusly the image weight lessens the period of transmit in the
framework and raises the transmission speed. In Lossless technique of picture weight, no data get lost while
doing the weight. To handle these sorts of issues various techniques for the image weight are used. By and by
inquiries like how to do mage weight and second one is which sorts of development is used, may be rises. In this
way normally two sorts' of strategies are explained called as lossless and the lossy picture weight approaches.
These techniques are straightforward in their applications and eat up alongside no memory. A count has
similarly been familiar and associated with pack pictures and to decompress them back, by using the huffman
encoding frameworks.

Keywords: Image Weight, Huffman Encoding, Lossy and Lossless.

References:

1. Ccitt rec. T.81, (iso/iec 10918-1, 1994), digital compression and coding of continuoustone still images – requirements and guidelines
(jpeg), 1992.
4313-
2. Iso/iec 15444-1, jpeg 2000 image coding system: core coding system. 2004. 43
3. Christopoulos c, skodras a, ebrahimi t. The jpeg2000 still image coding system: an overview. Ieee transactions on consumer 16
electronics, 46(4), 1103-1127, 2000.
4. Itu-t rec. T.832, (iso/iec 29199-2, 2010), jpeg xr image coding system: image coding specification. 2009.
5. Iso/iec 15948:2004, information technology -- computer graphics and image processing -- portable network graphics (png): functional
specification, 2004.
6. Ahmed n, natarajan t, rao kr. Discrete cosine transform. Ieee transactions on computers, 23(1): 90-93, 1974.
7. Mallat s. A theory for multiresolution signal decomposition: the wavelet representation. Ieee pattern analysis and machine intelligence.
11(7), 674-693, 1989.
8. Deutsch lp. Deflate compressed data format specification version 1.3. Ietf network working group, request for comments 1951, 1996.
9. A primer Eric J.stollzitze, Tony D.Derose, David salesin university of Washington Wavelet for computer graphics: – part-I IEEE, May
1995.
10. Peterschrodezer California institute of technology Wavelet in computer graphics, 2005.
11. Marc Antonini, Michel Berlaud, Member, IEEE, pierreMarthieu, Ingrid Daubechies, Image coding using wavelet transform, , IEEE,
Vol-1, No.2 ,April 1992.
12. Karthik B., Kumar T.K., Dorairangaswamy M.A., Logashanmugam E., Removal of high density salt and pepper noise through
modified cascaded filter, Middle - East Journal of Scientific Research, V-20, I-10, 1222-1228, 2014.
13. Kiran Kumar T.V.U., Karthik B., Bharath Kumaran E., Visual secret sharing scheme for JPEG compressed images, Middle - East
Journal of Scientific Research, V-12, I-12, 1873-1880, 2012.
14. Karthik B., Kiran Kumar T.V.U., Noise removal using mixtures of projected gaussian scale mixtures, World Applied Sciences Journal,
V-29, I-8, 1039-1045, 2014.

Authors: N Kandavel, A Kumaravel

Paper Title: Offloading Computation for Efficient Energy in Mobile Cloud Computing
Abstract: Mobile Cloud is giving offices of capacity and remote application facilitating. A few mobile
applications are excessively computation concentrated so control utilization issue is basic issue in mobile
gadgets. Offloading highlight in Mobile Cloud Computing (MCC) decreased power utilization issues of mobile
gadgets. Existing examination works have either utilized fixed mobile gadget speed or does not consider mobile
gadget speed in estimation of nearby execution energy. Speed of mobile gadget assumes a noteworthy job in
assurance of neighborhood execution energy and it is influenced by parallel running applications and clock
recurrence of mobile gadget. Since when there are applications running in parallel, execution speed of mobile
isn't fixed. So as to counter these issues, this work misuses Exponential Weighted Mean Moving Average to
foresee gadget speed as per load on mobile gadget. We have contrasted proposed work and two kinds of
frameworks: Fixed CPU Speed framework where CPU speed of mobile gadget is fixed all through all offloading
choices, and Oracle which accept to know definite speed of mobile gadget ahead of time. Assessment of all 4317-
frameworks is conveyed by utilizing manufactured outstanding tasks at hand. 43
744. 20
Keywords: Cloud Computing, Efficient Energy, Offloading Computation and Smart Phone.

References:

1. Sowndhrya V, Suganthi V, Jayachitra J, (2017) “Secured way of Offloading Mobile Cloud Process for Smart Phone”, International
Research Journal of Engineering and Technology, Volume 4, Issue 3, pp.1394-1398.
2. Khadija A, Micheal G, Hamid H, (2018) “MCC for computation offloading: Issues and Challenges,” Applied Computing and
Informatics, Elsevier, 14 (1), pp.1-16.
3. Yang K, Ou S, Chen H H, (2008) “On effective offloading services for resource-constrained mobile devices running heavier mobile
internet applications, Commun. Mag., IEEE, 46 (1), pp.56–63.
4. Nikki, Kumar J, (2011) “Predictive Approach for Energy Efficient Computation Offloading in Mobile Cloud Computing,” International
Journal of Computer Science and Engineering, vol. 6, no. 8, pp. 62–67.

Authors: M Venkata Dasu, Dr P V N Reddy, Dr S Chandra Mohan Reddy

745. Paper Title: Classification of Landsat-8 Imagery Based On Pca And Ndvi Methods
Abstract: Remote sensing is an important issue in satellite image classification. In developing a significant 4321-
sustainable system in agriculture farming, the major concern for remote sensing applications is the crop 43
classification mechanism. The other important application in remote sensing is urban classification which gives 25
the information about houses, roads, buildings, vegetation etc. A superior indicator for the presence of
vegetation can be computed from the vegetation indices of a satellite image. This indicator supports in
describing the health of vegetation through the image attributes like greenness and density. The other parameter
in detecting objects or region of interest is an image is the texture. A satellite image contains spectral
information and can be represented by more spectral bands and classification is very tough task. Generally,
Classification of individual pixels in satellite images is based on the spectral information. In this research paper
Principle component analysis and combination of PCA and NDVI classification methods are applied on Landsat-
8 images. These images are acquired from USGS. The performance of these methods is compared in statistical
parameters such as Kappa coefficient, overall accuracy, user’s accuracy, precision accuracy and F1 accuracy. In
this work existing method is PCA and proposed method is PCA+NDVI. Experimental results shows that the
proposed method has better statistical values compared to existing method.

Keywords: Classification, Kappa coefficient, Multispectral images, NDVI, PCA.

References:

1. D.Jeeva lakshmi, S.Naraana Reddy,” Land Cover Classification based on NDVI using LANDSAT8 Time Series: A Case Study
Tirupati Region”, in International Conference on Communication and Signal Processing, April 6-8, 2016,pp.1332-1335.
2. Malgorzata VER_NE WOJTASZEK, Aniko KLUJBER, Erzsebet VECSEI, “Comparison of Different Image Classification Methods in
Urban Environment,” International Scientific Conference on Sustainable Development & Ecological Footprint, March, 2012 Sopron,
Hungary.
3. Bhandari AK, Kumar A, Singh G.K, “Feature Extraction using Normalized Difference Vegetation Index (NDVI): a Case Study of
Jabalpur City,” Procedia Technology, 6, pp.612-621.
4. Meera Gandhi.G, S.Parthiban, Nagaraj Thummalu and Christy. A, “Ndvi: Vegetation change detection using remote sensing and GIS –
A case study of Vellore District,” 3rd International Conference on Recent Trends in Computing 2015 (ICRTC-2015), ScienceDirect,
Procedia Computer Science 57 (2015) 1199 – 1210
5. Liu, L.; Zhang, Y. “Urban Heat Island Analysis Using The Landsat TM Data And Aster Data: A Case Study In Hong Kong,” Remote
Sens. 2011, 3, 1535-1552; doi:10.3390/rs3071535. Ndvi
6. Kun Jia , Shunlin Liang , Xiangqin Wei, Yunjun Yao, Yingru Su, Bo Jiang and Xiaoxia Wang, “Land Cover Classification of Landsat
Data
7. with Phenological Features Extracted from Time Series MODIS NDVI Data,” Remote Sensing, 6(11): 11518–11532. doi:
10.3390/rs61111518.
8. Ardavan Ghorbani, Amir Mirzaei Mossivand and Abazar Esmali Ouri, land/canopy cover mapping in Khalkhal County (Iran),”
Scholars Research “Utility of the Normalised Difference Vegetation Index (NDVI) for Library, Annals of Biological Research, 2012, 3
(12):5494-5503.
9. David Gómez-Palacios,” Flood mapping through principal component analysis of multitemporal satellite imagery considering the
alteration of water spectral properties due to turbidity conditions”,In Geomatics, Natural Hazards And Risk, 2017, Vol. 8, No. 2, 607–
623.
10. Estornell J, Mart_ı-Gavil_a M, Sebasti_a MT, Mengual J. 2013. Principal component analysis applied to remote sensing. MSEL. 6:83–
89.
11. Fraser SJ. 1991. Discrimination and identification of ferric oxides using satellite thematic mapper data: a Newman case study. Int J
Remote Sens. 12:635–641.
12. Dhaka of Bangladesh using remote sensing and GIS techniques. Water Resour Manag. 21:1601–1612. Estornell J, Mart_ı-Gavil_a M,
Sebasti_a MT, Mengual J. 2013. Principal component analysis applied to remote sensing. MSEL. 6:83–89.
13. Dai X, Khorram S. 1998. The effects of image misregistration on the accuracy of the remotely sensed change detection. IEEE Trans
Geosci Remote Sen. 36:1566–1577.
14. Green AA, Berman M, Switzer P, Craig MD. 1988. A transform for ordering multispectral data in terms of image quality with
implications for noise removal. IEEE Trans Geosci Remote Sens. 26:65–74
15. Gupta RP, Tiwari RK, Saini V, Srivastava N. 2013. A simplified approach for interpreting principal component images. Adv Remote
Sens. 2:111–119.
16. Ingebritsen SE, Lyon RJP. 1985. Principal components analysis of multitemporal image pairs. Int J Remote Sens. 6:687–696.
17. Jain SK, Singh RD, Jain MK, Lohani AK. 2005. Delineation of flood-prone areas using remote sensing techniques. Water Resour
Manag. 19:333–347.
18. Jain SK, Saraf AK, Goswami A, Ahmad T. 2006. Flood inundation mapping using NOAA AVHRR data. Water Resour Manag.
20:949–959.
Authors: Nisha Rani, Kuldeep Singh, Nitin Kumar Sharma, Anuj Singal

Paper Title: Recent Updates on Electrochemical Detection of Perchlorate Ions


Abstract: Perchlorate is a highly toxic compound. It has both chemical and physical properties. Perchlorate is
not easily degradable compound by both bio and non-bio degradation process because of its high stability,
highly water soluble compound and low absorption. That’s why perchlorate reduction becomes a big challenge.
In this research work we studied different type of electrochemical technique and effect of different electrodes on
these techniques. In present days, many techniques were developed for the detection or reduction of perchlorate
such as bio-degradation, optical, chemical, electrochemical and microbial technique. This article gives
746. information about application of electrochemical technique for the detection or reduction of perchlorate. The
4326-
electrochemical techniques have various types for the detection of ion. These techniques grouped on the behalf
43
of various types of electrical signal such as potential or voltage, current and impedance which were produce in
35
the presence of perchlorate into aqueous solution. Electrochemical technique such as impedance spectroscopy,
this technique was performed on the electrochemical work station by applied a constant range of frequency. In
cyclic voltammetry technique we were given a constant potential range and found results in the form of
oxidation and reduction current. In the reduction of perchlorate history various researcher was found results
using different electrochemical technique on different types of electrodes. The perchlorate salts and perchlorate
have some useful application in the defense field, batteries, automobile airbags, rocket propellants and fuels.
Perchlorate contamination is become a worldwide health problems. In many western states perchlorate was
found in ground and surface water. It disturbs the thyroid gland to uptake iodine the human body. So its
prevention technique was needed. However, the electrochemical techniques have more advantage such as low
cost, user friendly, label free and real time monitoring over all other techniques. So we focus on electrochemical
detection technique for the perchlorate.

Keywords: Perchlorate treatment, electrochemical detection, electrochemical work station, electrochemical


techniques, electrodes.

References:

19. Lv L, Xie Y, Liu G, Liu G, Yu J. Removal of perchlorate from aqueous solution by cross-linked Fe (III)-chitosan complex. Journal of
Environmental Sciences. 2014 Apr 1; 26(4):792-800. https://doi.org/10.1016/S1001-0742(13)60519-7
20. Xie Y, Ren L, Zhu X, Gou X, Chen S. Physical and chemical treatments for removal of perchlorate from water–a review. Process
Safety and Environmental Protection. 2018 May 1; 116:180-98. https://doi.org/10.1016/j.psep.2018.02.009
21. Mendez W, Dederick E, Cohen J. Drinking water contribution to aggregate perchlorate intake of reproductive-age women in the United
States estimated by dietary intake simulation and analysis of urinary excretion data. Journal of Exposure Science and Environmental
Epidemiology. 2010 May; 20(3):288. https://doi.org/10.1038/jes.2009.50
22. Yang Q, Yao F, Zhong Y, Wang D, Chen F, Sun J, Hua S, Li S, Li X, Zeng G. Catalytic and electrocatalytic reduction of perchlorate in
water–a review. Chemical Engineering Journal. 2016 Dec 15; 306:1081-91. https://doi.org/10.1016/j.cej.2016.08.041
23. Brown GM, Gu B. The chemistry of perchlorate in the environment. In Perchlorate 2006 (pp. 17-47). Springer, Boston, MA.
https://doi.org/10.1007/0-387-31113-0_2
24. Shrout JD, Struckhoff GC, Parkin GF, Schnoor JL. Stimulation and molecular characterization of bacterial perchlorate degradation by
plant-produced electron donors. Environmental science & technology. 2006 Jan 1; 40(1):310-7. https://doi.org/10.1021/es051130g
25. Zhao HP, Van Ginkel S, Tang Y, Kang DW, Rittmann B, Krajmalnik-Brown R. Interactions between perchlorate and nitrate reductions
in the biofilm of a hydrogen-based membrane biofilm reactor. Environmental science & technology. 2011 Nov 7; 45(23):10155-62.
https://doi.org/10.1021/es202569b
26. Xu X, Gao B, Jin B, Zhen H, Wang X, Dai M. Study of microbial perchlorate reduction: considering of multiple pH, electron acceptors
and donors. Journal of hazardous materials. 2015 Mar 21; 285:228-35. https://doi.org/10.1016/j.jhazmat.2014.10.061
27. Shrout JD, Parkin GF. Influence of electron donor, oxygen, and redox potential on bacterial perchlorate degradation. Water research.
2006 Mar 1; 40(6):1191-9. https://doi.org/10.1016/j.watres.2006.01.035
28. Luo YH, Chen R, Wen LL, Meng F, Zhang Y, Lai CY, Rittmann BE, Zhao HP, Zheng P. Complete perchlorate reduction using
methane as the sole electron donor and carbon source. Environmental science & technology. 2015 Feb 2; 49(4):2341-9.
https://doi.org/10.1021/es504990m
29. Yoon IH, Meng X, Wang C, Kim KW, Bang S, Choe E, Lippincott L. Perchlorate adsorption and desorption on activated carbon and
anion exchange resin. Journal of hazardous materials. 2009 May 15; 164(1):87-94. https://doi.org/10.1016/j.jhazmat.2008.07.123
30. Urbansky ET, Schock MR. Issues in managing the risks associated with perchlorate in drinking water. Journal of Environmental
Management. 1999 Jun 1; 56(2):79-95. https://doi.org/10.1006/jema.1999.0274
31. Hourani M, Wieckowski A. Single crystal electrochemistry of rhodium: Anion effects and order/disorder transitions of clean and silver
coated Rh (111) surfaces. Journal of electroanalytical chemistry and interfacial electrochemistry. 1988 Apr 8; 244(1-2):147-61.
https://doi.org/10.1016/0022-0728(88)80102-5
32. Mahmudov R, Huang CP. Perchlorate removal by activated carbon adsorption. Separation and Purification Technology. 2010 Jan 12;
70(3):329-37. https://doi.org/10.1016/j.seppur.2009.10.016
33. Gu B, Brown GM, Chiang CC. Treatment of perchlorate-contaminated groundwater using highly selective, regenerable ion-exchange
technologies. Environmental science & technology. 2007 Sep 1; 41(17):6277-82. https://doi.org/10.1021/es0706910
34. Xie YH, Wu YL, Qin YH, Yi Y, Liu Z, Lv L, Xu M. Evaluation of perchlorate removal from aqueous solution by cross-linked
magnetic chitosan/poly (vinyl alcohol) particles. Journal of the Taiwan Institute of Chemical Engineers. 2016 Aug 1; 65:295-303.
https://doi.org/10.1016/j.jtice.2016.05.022
35. Qu D, Zhu X, Zheng D, Zheng Y, Liu D, Xie Z, Tang H, Wen J, You X, Xiao L, Lei J. Improve electrochemical hydrogen insertion on
the carbon materials loaded with Pt nano-particles through H spillover. Electrochemical Acta. 2015 Aug 20; 174:400-5.
https://doi.org/10.1016/j.electacta.2015.06.020
36. Tierney HL, Baber AE, Kitchin JR, Sykes EC. Hydrogen dissociation and spillover on individual isolated palladium atoms. Physical
review letters. 2009 Dec 10; 103(24):246102. https://doi.org/10.1103/PhysRevLett.103.246102
37. Hurley KD, Shapley JR. Efficient heterogeneous catalytic reduction of perchlorate in water. Environmental science & technology. 2007
Mar 15; 41(6):2044-9. https://doi.org/10.1021/es0624218
38. Zhang Y, Mu S, Deng B, Zheng J. Electrochemical removal and release of perchlorate using poly (aniline-co-o-aminophenol). Journal
of Electroanalytical Chemistry. 2010 Mar 15; 641(1-2):1-6. https://doi.org/10.1016/j.jelechem.2010.01.021
39. Rusanova MY, Polášková P, Muzikař M, Fawcett WR. Electrochemical reduction of perchlorate ions on platinum-activated nickel.
Electrochemical acta. 2006 Apr 1; 51(15):3097-101. https://doi.org/10.1016/j.electacta.2005.08.044
40. Backus SM, Klawuun P, Brown S, D’sa I, Sharp S, Surette C, Williams DJ. Determination of perchlorate in selected surface waters in
the Great Lakes Basin by HPLC/MS/MS. Chemosphere. 2005 Nov 1; 61(6):834-43. https://doi.org/10.1016/j.chemosphere.2005.04.054
41. Smith PN, Theodorakis CW, Anderson TA, Kendall RJ. Preliminary assessment of perchlorate in ecological receptors at the Longhorn
Army Ammunition Plant (LHAAP), Karnack, Texas. Ecotoxicology. 2001 Oct 1; 10(5):305-13.
https://doi.org/10.1023/A:1016715502717
42. Rao B, Anderson TA, Redder A, Jackson WA. Perchlorate formation by ozone oxidation of aqueous chlorine/oxy-chlorine species:
Role of Cl x O y radicals. Environmental science & technology. 2010 Mar 26; 44(8):2961-7. https://doi.org/10.1021/es903065f
43. Cao F, Jaunat J, Sturchio N, Cancès B, Morvan X, Devos A, Barbin V, Ollivier P. Worldwide occurrence and origin of perchlorate ion
in waters: A review. Science of the Total Environment. 2019 Jan 14. https://doi.org/10.1016/j.scitotenv.2019.01.107
44. Kang N, Anderson TA, Jackson WA. Photochemical formation of perchlorate from aqueous oxychlorine anions. Analytica Chimica
Acta. 2006 May 10; 567(1):48-56. https://doi.org/10.1016/j.aca.2006.01.085
45. Dasgupta PK, Martinelango PK, Jackson WA, Anderson TA, Tian K, Tock RW, Rajagopalan S. The origin of naturally occurring
perchlorate: the role of atmospheric processes. Environmental Science & Technology. 2005 Mar 15; 39(6):1569-75.
https://doi.org/10.1021/es048612x
46. Qin X, Zhang T, Gan Z, Sun H. Spatial distribution of perchlorate, iodide and thiocyanate in the aquatic environment of Tianjin, China:
Environmental source analysis. Chemosphere. 2014 Sep 1; 111:201-8. https://doi.org/10.1016/j.chemosphere.2014.03.082
47. Rajagopalan S, Anderson T, Cox S, Harvey G, Cheng Q, Jackson WA. Perchlorate in wet deposition across North America.
Environmental science & technology. 2008 Dec 30; 43(3):616-22. https://doi.org/10.1021/es801737u
48. Andraski BJ, Jackson WA, Welborn TL, Böhlke JK, Sevanthi R, Stonestrom DA. Soil, plant, and terrain effects on natural perchlorate
distribution in a desert landscape. Journal of environmental quality. 2014; 43(3):980-94. doi:10.2134/jeq2013.11.0453
49. Trumpolt CW, Crain M, Cullison GD, Flanagan SJ, Siegel L, Lathrop S. Perchlorate: sources, uses, and occurrences in the
environment. Remediation Journal: The Journal of Environmental Cleanup Costs, Technologies & Techniques. 2005 Dec; 16(1):65-89.
https://doi.org/10.1002/rem.20071
50. Zhang B, Huang L, Tang M, Hunter KW, Feng Y, Sun Q, Wang J, Chen G. A nickel nanoparticle/nafion-graphene oxide modified
screen-printed electrode for amperometric determination of chemical oxygen demand. Microchimica Acta. 2018 Aug 1; 185(8):385.
https://doi.org/10.1007/s00604-018-2917-0
51. Srinivasan R, Sorial GA. Treatment of perchlorate in drinking water: a critical review. Separation and Purification Technology. 2009
Sep 15; 69(1):7-21. https://doi.org/10.1016/j.seppur.2009.06.025
52. Motzer WE. Perchlorate: problems, detection, and solutions. Environmental Forensics. 2001 Dec 1; 2(4):301-11.
https://doi.org/10.1006/enfo.2001.0059
53. Scanlon BR, Gates JB, Reedy RC, Jackson WA, Bordovsky JP. Effects of irrigated agroecosystems: 2. Quality of soil water and
groundwater in the southern High Plains, Texas. Water Resources Research. 2010 Sep 1; 46(9).
https://doi.org/10.1029/2009WR008428
54. Barron L, Nesterenko PN, Paull B. Rapid on-line preconcentration and suppressed micro-bore ion chromatography of part per trillion
levels of perchlorate in rainwater samples. Analytica Chimica Acta. 2006 May 10; 567(1):127-34.
https://doi.org/10.1016/j.aca.2006.01.038
55. Poghosyan A, Sturchio NC, Morrison CG, Beloso Jr AD, Guan Y, Eiler JM, Jackson WA, Hatzinger PB. Perchlorate in the Great
Lakes: isotopic composition and origin. Environmental science & technology. 2014 Sep 12; 48(19):11146-53.
https://doi.org/10.1021/es502796d
56. Calderón R, Palma P, Parker D, Molina M, Godoy FA, Escudey M. Perchlorate levels in soil and waters from the Atacama Desert.
Archives of environmental contamination and toxicology. 2014 Feb 1; 66(2):155-61. https://doi.org/10.1007/s00244-013-9960-y
57. Jackson WA, Böhlke JK, Gu B, Hatzinger PB, Sturchio NC. Isotopic composition and origin of indigenous natural perchlorate and co-
occurring nitrate in the southwestern United States. Environmental science & technology. 2010 Jun 3; 44(13):4869-76.
https://doi.org/10.1021/es903802j
58. Böhlke JK, Sturchio NC, Gu B, Horita J, Brown GM, Jackson WA, Batista J, Hatzinger PB. Perchlorate isotope forensics. Analytical
Chemistry. 2005 Dec 1; 77(23):7838-42. https://doi.org/10.1021/ac051360d
59. Andrew Jackson W, Kumar Anandam S, Anderson T, Lehman T, Rainwater K, Rajagopalan S, Ridley M, Tock R. Perchlorate
occurrence in the Texas southern high plains aquifer system. Groundwater Monitoring & Remediation. 2005 Feb; 25(1):137-49.
https://doi.org/10.1111/j.1745-6592.2005.0009.x
60. Bao H, Gu B. Natural perchlorate has a unique oxygen isotope signature. Environmental Science & Technology. 2004 Oct 1;
38(19):5073-7. https://doi.org/10.1021/es049516z
61. Howard BJ, Voigt G, Segal MG, Ward GM. A review of countermeasures to reduce radioiodine in milk of dairy animals. Health
physics. 1996 Nov; 71(5):661-73. DOI: 10.1097/00004032-199611000-00005
62. Rajagopalan S, Anderson TA, Fahlquist L, Rainwater KA, Ridley M, Jackson WA. Widespread presence of naturally occurring
perchlorate in high plains of Texas and New Mexico. Environmental science & technology. 2006 May 15; 40(10):3156-62.
https://doi.org/10.1021/es052155i
63. Rao B, Anderson TA, Orris GJ, Rainwater KA, Rajagopalan S, Sandvig RM, Scanlon BR, Stonestrom DA, Walvoord MA, Jackson
WA. Widespread natural perchlorate in unsaturated zones of the southwest United States. Environmental Science & Technology. 2007
Jul 1; 41(13):4522-8. https://doi.org/10.1021/es062853
64. Clavilier J, Wasberg M, Petit M, Klein LH. Detailed analysis of the voltammetry of Rh (111) in perchloric acid solution. Journal of
Electroanalytical Chemistry. 1994 Aug 29; 374(1-2):123-31. https://doi.org/10.1016/0022-0728(94)03363-3
65. Jian JM, Fu L, Ji J, Lin L, Guo X, Ren TL. Electrochemically reduced graphene oxide/gold nanoparticles composite modified screen-
printed carbon electrode for effective electrocatalytic analysis of nitrite in foods. Sensors and Actuators B: Chemical. 2018 Jun 1;
262:125-36. https://doi.org/10.1016/j.snb.2018.01.164
66. Kosaka K, Asami M, Matsuoka Y, Kamoshita M, Kunikane S. Occurrence of perchlorate in drinking water sources of metropolitan
area in Japan. Water research. 2007 Aug 1; 41(15):3474-82. https://doi.org/10.1016/j.watres.2007.05.011
67. Her N, Jeong H, Kim J, Yoon Y. Occurrence of perchlorate in drinking water and seawater in South Korea. Archives of environmental
contamination and toxicology. 2011 Aug 1; 61(2):166-72. https://doi.org/10.1007/s00244-010-9616-0
68. Wu Q, Zhang T, Sun H, Kannan K. Perchlorate in tap water, groundwater, surface waters, and bottled water from China and its
association with other inorganic anions and with disinfection byproducts. Archives of environmental contamination and toxicology.
2010 Apr 1; 58(3):543-50. https://doi.org/10.1007/s00244-010-9485-6
69. Lybrand RA, Bockheim JG, Ge W, Graham RC, Hlohowskyj SR, Michalski G, Prellwitz JS, Rech JA, Wang F, Parker DR. Nitrate,
perchlorate, and iodate co-occur in coastal and inland deserts on Earth. Chemical Geology. 2016 Nov 28; 442:174-86.
https://doi.org/10.1016/j.chemgeo.2016.05.023
70. Parette R, Cannon FS. The removal of perchlorate from groundwater by activated carbon tailored with cationic surfactants. Water
Research. 2005 Oct 1; 39(16):4020-8. https://doi.org/10.1016/j.watres.2005.07.024
71. Roquebert V, Booth S, Cushing RS, Crozes G, Hansen E. Electrodialysis reversal (EDR) and ion exchange as polishing treatment for
perchlorate treatment. Desalination. 2000 Dec 20; 131(1-3):285-91. https://doi.org/10.1016/S0011-9164(00)90026-2
72. Gu B, Ku YK, Brown GM. Sorption and desorption of perchlorate and U (VI) by strong-base anion-exchange resins. Environmental
science & technology. 2005 Feb 1; 39(3):901-7. https://doi.org/10.1021/es049121f
73. Yoon J, Yoon Y, Amy G, Her N. Determination of perchlorate rejection and associated inorganic fouling (scaling) for reverse osmosis
and nanofiltration membranes under various operating conditions. Journal of Environmental Engineering. 2005 May; 131(5):726-33.
https://doi.org/10.1061/(ASCE)0733-9372(2005)131:5(726)
74. Yoon J, Yoon Y, Amy G, Cho J, Foss D, Kim TH. Use of surfactant modified ultrafiltration for perchlorate (ClO4−) removal. Water
research. 2003 May 1; 37(9):2001-12. https://doi.org/10.1016/S0043-1354(02)00600-0
75. Logan BE. Peer reviewed: assessing the outlook for perchlorate remediation. https://doi.org/10.1021/es012564o
76. Nerenberg R, Rittmann BE, Najm I. Perchlorate Reduction in a Hydrogen‐Based Membrane–Biofilm Reactor. Journal‐American Water
Works Association. 2002 Nov; 94(11):103-14. https://doi.org/10.1002/j.1551-8833.2002.tb10234.x
77. Cao J, Elliott D, Zhang WX. Perchlorate reduction by nanoscale iron particles. Journal of Nanoparticle Research. 2005 Oct 1; 7(4-
5):499-506. https://doi.org/10.1007/s11051-005-4412-x
78. Moore AM, Young TM. Chloride interactions with iron surfaces: Implications for perchlorate and nitrate remediation using permeable
reactive barriers. Journal of Environmental Engineering. 2005 Jun; 131(6):924-33. https://doi.org/10.1061/(ASCE)0733-
9372(2005)131:6(924)
79. Wang DM, Lin HY, Shah SI, Ni CY, Huang CP. Indirect electrochemical reduction of perchlorate and nitrate in dilute aqueous
solutions at the Ti–water interface. Separation and Purification Technology. 2009 Jun 2; 67(2):127-34.
https://doi.org/10.1016/j.seppur.2009.03.008
80. Colom F, Gonzalez-Tejera MJ. Reduction of perchlorate ion on ruthenium electrodes in aqueous solutions. Journal of electroanalytical
chemistry and interfacial electrochemistry. 1985 Aug 9; 190(1-2):243-55. https://doi.org/10.1016/0022-0728(85)80090-5
81. Horvat-Radošević V, Kvastek K. Hydrogen/anion electrosorption at rhodized electrodes as revealed by electrochemical impedance
spectroscopy. Journal of Electroanalytical Chemistry. 2004 May 15; 566(2):451-65. https://doi.org/10.1016/j.jelechem.2003.12.011
82. Lee C, Batchelor B, Park SH, Han DS, Abdel-Wahab A, Kramer TA. Perchlorate reduction during electrochemically induced pitting
corrosion of zero-valent titanium (ZVT). Journal of hazardous materials. 2011 Dec 15; 197:183-9.
https://doi.org/10.1016/j.jhazmat.2011.09.072
83. Láng GG, Sas NS, Ujvári M, Horányi G. The kinetics of the electrochemical reduction of perchlorate ions on rhodium. Electrochimica
Acta. 2008 Oct 30; 53(25):7436-44. https://doi.org/10.1016/j.electacta.2007.12.007
84. Horányi G, Vértes G. Catalytic and electrochemical reduction of perchlorate ions on platinum in aqueous solution. Journal of
Electroanalytical Chemistry and Interfacial Electrochemistry. 1975 Sep 25; 64(2-3):252-4. https://doi.org/10.1016/S0022-
0728(75)80021-0
85. Vega M, Nerenberg R, Vargas IT. Perchlorate contamination in Chile: Legacy, challenges, and potential solutions. Environmental
research. 2018 Jul 1; 164:316-26. https://doi.org/10.1016/j.envres.2018.02.034
86. Bard, Allen J. ‘Electrochemical methods: fundamentals and applications / Allen J. Bard, Larry R.Faulkner — 2nd ed. 2001’ p. cm.
Includes index. ISBN 0-471-04372-9 (cloth: alk. paper) 1. Electrochemistry. I. Faulkner, Larry R., 1944- II. Title.
87. Bansod B, Kumar T, Thakur R, Rana S, Singh I. A review on various electrochemical techniques for heavy metal ions detection with
different sensing platforms. Biosensors and Bioelectronics. 2017 Aug 15; 94:443-55. https://doi.org/10.1016/j.bios.2017.03.031
88. Nicholas P, Pittson R, Hart JP. Development of a simple, low cost chronoamperometric assay for fructose based on a commercial
graphite-nanoparticle modified screen-printed carbon electrode. Food chemistry. 2018 Feb 15; 241:122-6.
https://doi.org/10.1016/j.foodchem.2017.08.077
89. Bakos I, Horányi G. Study of the relationship between voltammetric behaviour and electrocatalytic activity in the reduction of ClO4−
ions at platinized platinum electrodes. Journal of Electroanalytical Chemistry. 1993 Apr 2; 347(1-2):383-91.
https://doi.org/10.1016/0022-0728(93)80102-N
90. Horanyi G, Bakos I, Szabó S, Rizmayer EM. New observations in the field of the electrochemistry of technetium and rhenium:
electrocatalytic reduction of ClO4− ions at electrosorbed and electrodeposited Tc and Re layers in acid medium. Journal of
Electroanalytical Chemistry. 1992 Oct 10; 337(1-2):365-9. https://doi.org/10.1016/0022-0728(92)80550-N
91. Almeida CM, Giannetti BF, Rabockai T. Electrochemical study of perchlorate reduction at tin electrodes. Journal of Electroanalytical
Chemistry. 1997 Feb 15; 422(1-2):185-9. https://doi.org/10.1016/S0022-0728(96)04894-2
92. Wasberg M, Horanyi G. The Reduction of ClO4− ions on Rh electrodes. Journal of Electroanalytical Chemistry. 1995 Mar 21;
385(1):63-70. https://doi.org/10.1016/0022-0728(95)03775-C
93. Lang GG, Horányi G. Some interesting aspects of the catalytic and electrocatalytic reduction of perchlorate ions. Journal of
Electroanalytical Chemistry. 2003 Jul 30;552:197-211 https://doi.org/10.1016/S0022-0728(02)01302-5
94. Láng G, Inzelt G, Vrabecz A, Horányi G. Electrochemical aspects of some specific features connected with the behavior of iron group
metals in aqueous perchloric acid/perchlorate media. Journal of Electroanalytical Chemistry. 2005 Aug 15; 582(1-2):249-57.
https://doi.org/10.1016/j.jelechem.2005.01.006
95. Horányi G, Rizmayer EM. A radiotracer study of the adsorption of Cl-ions on rhodized electrodes. Journal of Electroanalytical
Chemistry. 1986 Feb 10; 198(2):379-91. https://doi.org/10.1016/0022-0728(86)90012-4
96. Rhee CK, Wasberg M, Horanyi G, Wieckowski A. Strong anion/surface interactions: perchlorate reduction on Rh (100) electrode
studied by voltammetry. Journal of Electroanalytical Chemistry and Interfacial Electrochemistry. 1990 Sep 25; 291(1-2):281-7.
https://doi.org/10.1016/0022-0728(90)87197-R
97. Rhee CK, Wasberg M, Zelenay P, Wieckowski A. Reduction of perchlorate on rhodium and its specificity to surface crystallographic
orientation. Catalysis letters. 1991 May 1; 10(3-4):149-64. https://doi.org/10.1007/BF00772067
98. Horányi G, Bakos I. Experimental evidence demonstrating the occurrence of reduction processes of ClO4− ions in an acid medium at
platinized platinum electrodes. Journal of Electroanalytical Chemistry. 1992 Jan 1; 331(1-2):727-37. https://doi.org/10.1016/0022-
0728(92)85002-K
99. Bakos I, Horányi G, Szabó S, Rizmayer EM. Electrocatalytic reduction of ClO4− ions at an electrodeposited Re layer. Journal of
Electroanalytical Chemistry. 1993 Nov 15; 359(1-2):241-52. https://doi.org/10.1016/0022-0728(93)80412-B
100. Horányi G, Bakos I. Combined radiometric and electrochemical study of the behaviour of Tc (VII) ions at gold and platinized
surfaces in acidic media. Journal of applied electrochemistry. 1993 Jun 1; 23(6):547-52. https://doi.org/10.1007/BF00721944
Authors: K . P. Sai Rama Krishna, K. Sravani

Paper Title: Advanced Machine Learning Models to Handle Unifying Attacks in Images
Abstract: Critical advancement has been made with profound neural systems as of late. Sharing prepared
models of profound neural systems has been a significant in the fast advancement of innovative work of these
frameworks. In digital environment, there are different types of applications face security related attack
sequences from third parties. Most of the machine learning related approaches was introduced to describe
security in wind and vulnerable attack sequences. Digital Watermarking is one of the approach to handle
adversary related security approach to handle attacks appeared in digital environment. But it has some
limitations to describe efficient security behind the web related applications appeared in real time environment.
So that in this paper, we propose and implement advanced machine learning approach i.e Neural Network based
Click Prediction (NNBCP) to handle web related attack sequences in real time environment. It uses Integrated
CAPTCHA procedure to provide machine learning based captcha generation for user login and registration to
handle different types of attacks in digital systems.

Keywords: Machine learning, embedding watermarking, neural networks, digital watermarking.

References:
747.
1. Erwin Quiring, Daniel Arp and Konrad Rieck, "Forgotten Siblings: Unifying Attacks onMachine Learning and Digital Watermarking", 4336-
in IEEE International Conference on Acoustics, Speech, and Signal Processing, 2013, pp. 8682–8686. 43 3 9
2. B. Biggio, I. Corona, Z. He, P. P. K. Chan, G. Giacinto, D. S. Yeung, and F. Roli, “One-and-a-half-class multiple classifier systems for
secure learning against evasion attacks at test time,” in Proc. of International Workshop on Multiple Classifier Systems (MCS), 2015.
3. B. Biggio, I. Corona, D. Maiorca, B. Nelson, N. ˇ Srndi´c, P. Laskov, G. Giacinto, and F. Roli, “Evasion attacks against machine
learning at test time,” in Machine Learning and Knowledge Discovery in Databases. Springer, 2013, pp. 387–402.
4. B. Biggio, B. Nelson, and P. Laskov, “Support vector machines under adversarial label noise,” in Proc. of Asian Conference on
Machine Learning (ACML), 2011, pp. 97–112
5. N. Carlini and D. A. Wagner, “Towards evaluating the robustness of neural networks.” in Proc. of IEEE Symposium on Security and
Privacy, 2017, pp. 39–57.
6. H. Dang, Y. Huang, and E.-C. Chang, “Evading classifiers by morphing in the dark.” in Proc. of ACM Conference on Computer and
Communications Security (CCS), 2017, pp. 119–133.
7. R. Collobert, K. Kavukcuoglu, and C. Farabet. Torch7: A matlab-like environment for machine learning. In Proc. Of NIPS Workshop
on BigLearn, 2011.
8. I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker. Digital Watermarking and Steganography. Morgan Kaufmann Publishers Inc., 2
edition, 2008.
9. Y. Dauphin, R. Pascanu, C. Gulcehre, K. Cho, S. Ganguli, and Y. Bengio. Identifying and attacking the saddle point problem in high-
dimensional non-convex optimization. In Proc. of NIPS, 2014.
10. L. Fei-Fei, R. Fergus, and P. Perona. Learning generative visual models from few training examples: an incremental bayesian approach
tested on 101 object categories. In Proc. of CVPR Workshop on Generative-Model Based Vision, 2004.
11. J. Haitsma and T. Kalker. A highly robust audio fingerprinting system. In Proc. of ISMIR, pages 107–115, 2002.
12. S. Han, X. Liu, H. Mao, J. Pu, A. Pedram, M. A. Horowitz, and W. J. Dally. Eie: Efficient inference engine on compressed deep neural
network. In Proc. of ISCA, 2016.
13. S. Han, H. Mao, and W. J. Dally. Deep compression: Compressing deep neural networks with pruning, trained quantization and
huffman coding. In Proc. of ICLR, 2016.
14. S. Han, J. Pool, J. Tran, and W. J. Dally. Learning both weights and connections for efficient neural networks. In Proc. of NIPS, 2015.
15. F. Hartung and M. Kutter. Multimedia watermarking techniques. Proceedings of the IEEE, 87(7):1079–1107, 1999.
16. K. He, X. Zhang, S. Ren, and J. Sun. Deep residual learning for image recognition. In Proc. of CVPR, 2016.
17. G. Hinton, O. Vinyals, and J. Dean. Distilling the knowledge in a neural network. In Proc. of NIPS Workshop on Deep Learning and
Representation Learning, 2014.
18. S. Hochreiter and J. Schmidhuber. Long short-term memory. Neural Computation, 9(8):1735–1780, 1997.
19. Y. Jia, E. Shelhamer, J. Donahue, S. Karayev, J. Long, R. Girshick, S. Guadarrama, and T. Darrell. Caffe: Convolutional architecture
for fast feature embedding. In Proc. of MM, 2014.
20. A. Joly, C. Frelicot, and O. Buisson. Content-based video copy detection in large databases: a local fingerprints statistical similarity
search approach. In Proc. of ICIP, pages 505–508, 2005.
21. J. Kodovsky, J. Fridrich, and V. Holub. Ensemble classifiers for steganalysis of digital media. IEEE Trans. on Information Forensics
and Security, 7(2):432–444, 2012.
22. Yusuke Uchida, Yuki Nagai, "EmbeddingWatermarks into Deep Neural Networks", rXiv:1701.04082v2 [cs.CV] 20 Apr 2017.
VenkataYashwanthGoduguluri, SoniyaNuthalapati, Addanki Naveen Murthy, Duggi
Authors:
Sreeramasai, Bandi Sowmya Adda, Naga Sai Manisha
Artifact Elimination in EEG Signal using Block and Sign Based Normalized Least Mean Square
Paper Title:
Techniques
Abstract: In this research the efficient and low computation complex signal acclimatizing techniques are
projected for the improvement of Electroencephalogram (EEG) signal in remote health care applications. In
clinical practices the EEG signal is extracted along with the artifacts and with some small constraints. Mainly in
remote health care situations, we used low computational complexity filters which are striking. So, for the
improvement of the EEG signal we introduced efficient and computation less Adaptive Noise Eliminators
(ANE’s). These techniques simply utilize addition and shift operations, and also reach the required convergence
speed among the other predictable techniques. The projected techniques are executed on real EEG signals which
are stored and are compared with the effecting EEG arrangement. Our realizations visualize that the projected
techniques offer the best concert over the previous techniques in terms of signal to noise ratio, mathematical
complexity, convergence rate, Excess Mean Square error and Mis adjustment. This approach is accessible for the
brain computer interface applications.

Keywords:

References:

1. Gavin Giovannoni , “Brain health Time matters in multiple sclerosis”, ISBN 978-1-903539-13-2, Oxford PharmaGenesis Ltd, 2017.
2. David N. Louis, “The 2016 World Health Organization Classification of Tumors of the Central Nervous System: a summary”,
Springer-Verlag Berlin Heidelberg, Acta Neuropathol, DOI 10.1007/s00401-016-1545-1, may, 2016.
3. Rita Levi-Montalcini, “The World Health Report: Neurological Disorders public health challenges”, ISBN 92 4 156336 2, World
Health Organization, 2015.
4. The World Health Report: Mental Health: New Understanding, New Hope, ISBN 92 4 156201 3, World Health Organization, 2001.
5. Ian Daly, “On the Automated Removal of Artifacts Relatedto Head Movement From the EEG,” IEEE Transactions On Neural Systems
And Rehabilitation Engineering, vol. 21, no. 3, May 2013,pp.427-434.
6. Sim Kuan Goh,” Automatic EEG Artifact Removal Techniques byDetecting Influential Independent Components”, IEEE Transactions
748. On Emerging Topics In Computational Intelligence,vol.1, no.4,August 2017,pp.270-279.
7. Md Kafiul Islam,” A Wavelet-Based Artifact Reduction from Scalp EEG for Epileptic Seizure Detection”, IEEE Journal of Biomedical 4340-
And Health Informatics, 2015. 43
8. Nadia Mammone,” Automatic Artifact Rejection From MultichannelScalp EEG by Wavelet ICA”, IEEE Sensors Journal, vol. 12, no. 46
3, March 2012,pp.533 – 542.
9. Yuan Zou,”Automatic Identification of Artifact-related Independent Components for Artifact Removal in EEG Recordings”, Journal of
Biomedical and Health Informatics,2013.
10. Kees Hermans,” Effectiveness of reference signal basedmethods for removal of EEG artifacts dueto subtle movements during fMRI
scanning”, IEEETransactions on Biomedical Engineering, 2016.
11. Mehdi Bagheri Hamaneh,” Automated Removal of EKG Artifact From EEG Data Using Independent Component Analysis and
Continuous Wavelet Transformation”, IEEE Transactions on Biomedical Engineering, 2013.
12. Esther M. ter Braack, “Reduction of TMS Induced Artifacts in EEG Using Principal Component Analysis”, IEEE Transactions On
Neural Systems And Rehabilitation Engineering, vol. 21, no. 3, May 2013, pp.376-382.
13. Xun Chen,”The Use of Multivariate EMD and CCA forDenoising Muscle Artifacts FromFew-Channel EEG
Recordings”,vol.67,no.2,February 2018, pp.359-370
14. Xun Chen,“Removing Muscle Artifacts From EEG Data: Multichannel or Single-Channel Techniques”,1986
15. Xun Chen,”Independent Vector Analysis Applied to RemoveMuscle Artifacts in EEG Data”,2017
16. Qinglin Zhao,”Automatic Identification and Removal of OcularArtifacts in EEG—Improved Adaptive PredictorFiltering for Portable
Applications”,vol.13,no.2,JUNE 2014, pp.109-117
A. Guerrero-Mosquera,”Automatic removal of ocular artefacts using adaptivefiltering and independent component analysis
forelectroencephalogram data”,vol.6,lss.2, pp.99-106
17. Shuyan Hu,”Driver fatigue detection from electroencephalogramspectrum after electrooculography artefact
removal”,vol.7,lss.1,pp.105-113
18. Saleha Khatun,”Comparative Study of Wavelet Based UnsupervisedOcular Artifact Removal Techniques for SingleChannel EEG
data”,2015
19. Ajay Kumar Maddirala,”Removal of EOG Artifacts from Single ChannelEEG Signals using Combined Singular SpectrumAnalysis and
Adaptive Noise Canceler”,2016
20. Xinyang Li,”Discriminative Ocular Artifact Correction forFeature Learning in EEG Analysis”,2015
21. Hong Peng,”Removal of Ocular Artifacts in EEG—An ImprovedApproach Combining DWT and ANCfor Portable
Applications”,vol.17,no.3,May 2013,pp.600-607
22. Borna Noureddin,”Online Removal of Eye Movement and Blink EEGArtifacts Using a High-Speed Eye Tracker”,vol.59,no.8,August
2012,pp.2103-2110
23. Foad Ghaderi,”Removal of Ballistocardiogram Artifacts Using theCyclostationary Source Extraction Method”,vol.57,no.11,November
2010,pp.2667-2676
24. Partha Pratim Acharjee,”Independent Vector Analysisfor Gradient Artifact Removal in Concurrent EEG-fMRI Data”,2015
25. Pierre LeVan,”EEG-fMRI Gradient Artifact Correction byMultiple Motion-Related Templates”,2016
26. Chin-Teng Lin,”Noninvasive Neural ProsthesesUsing Mobile and Wireless EEG”,vol.96,no.7,July 2008,pp.1167-1183
27. Bin Hu,”Signal Quality Assessment Model for WearableEEG Sensor on Prediction of Mental Stress”,2015
28. Vojkan Mihajlovic,”Wearable, Wireless EEG Solutions in Daily LifeApplications: What are we missing?” ,2013
29. Jaeyoung Shin,”Open Access Dataset for EEG+NIRSSingle-Trial Classification”,2016
30. Luise Wagner,”The cochlear implant EEG artifact recorded from anartificial brain for complex acoustic stimuli”,2017
31. Virginie Attina,”A new method to test the efficiency of CochlearImplant artifacts removal from Auditory EvokedPotentials”,2017
32. Ian Daly,”FORCE: Fully Online and automated artifactRemoval for brain-Computer interfacing”,2013
33. Hong Peng,”Removal of Ocular Artifacts in EEG—An ImprovedApproach Combining DWT and ANCfor Portable
Applications”,vol.17,no.3,May 2013,pp.600-607
34. Shuyan Hu,”Driver fatigue detection from electroencephalogramspectrum after electrooculography artefact
removal”,vol.7,lss.1,pp.105-113
35. Gundlapalli Venkata Sai Karthik,”Efficient Signal Conditioning Techniques for BrainActivity in Remote Health Monitoring
Network”,vol.13,no.9,September 2013,pp.3276-3283
36. Shafi Shahsavar Mirza,”Efficient Adaptive Filtering Techniques for Thoracic Electrical Bio-Impedance Analysis inHealth Care
Systems”, Soumya,”Efficient Block Processing of Long Duration Biotelemetric Brain Data for Health Care Monitoring”,2015
37. Saideh Ferdowsi,”Removing Ballistocardiogram Artifact From EEGUsing Short- and Long-Term Linear Predictor”,vol.60,no.7,July
2013,pp.1900-1911
38. S. Selvan,”Removal of Ocular Artifacts from EEGUsing an Efficient Neural Network Based Adaptive Filtering
Technique”,vol.6,no.12,December 1999,pp.330-332
39. Kevin T. Sweeney,”A Methodology for Validating Artifact RemovalTechniques for Physiological Signals”,vol.16,no.5,September
2012,pp.918-926
40. Gang Wang,”The Removal of EOG Artifacts from EEG SignalsUsing Independent Component Analysis andMultivariate Empirical
Mode Decomposition”,2015.

Authors: Vishwa Bhanu, P. Sudhakar Rao

Paper Title: Gaussian Energy Distribution of a RC-Circuit Based Single Discharge Pulse in Micro-EDM
Abstract: Owing to the non-isoenergetic nature of discharge pulses in resistance-capacitance (RC) based
micro-EDM (µEDM), the volume of micro-crater generated by each pulse varies significantly. This fact has
driven the researchers in this work to propose an electrothermal principle-based analytical model to approximate
dimensional (diameter and depth) accuracies of such micro-craters. An investigation has been done to robustly
apprehend the nature of energy distribution during single discharge micromachining in µEDM. The study
gradually substantiates the theoretical nature of energy distribution during a single discharge. The predicted
nature of energy distribution helps in comprehending the volume removed from the workpiece, energy loss, and
machining efficiency.

Keywords: Data Acquisition, MATLAB, µEDM, RC Circuit, and Single Discharge.

References:

1. T.K.K.R. Mediliyegedara, A. K.M. De Silva, D. K. Harrison, J. A. McGeough. "Chapter 8 Applications of Artificial Intelligence in the
Process Control of Electro Chemical Discharge Machining (ECDM)", IGI Global, 2007, pp 343-352.
2. Kibria, G., Jahan, M. and Bhattacharyya, Micro-electrical discharge machining processes, 2019, pp 185-208.
3. Kharola, Ashwani. "Analysis of Various Machining Parameters of EDM on Hard Steels using Cu and Al Electrodes," International 4347-
749. Journal of Engineering and Manufacturing, 2015, pp 1-14. 43
4. Patel NK. Parametric Optimization of Process Parameters for Electrode Discharge Machining of Stainless Steel 304. M.Tech Thesis,
NIT Rourkela, 2014. 50
5. Bhattacharya A., New Technology, The Institution of Engineers (India), Calcutta, 1973, pp-123-132.
6. S K Singh, H S Mali. "Microfeatures and microfabrication: current role of micro-electric discharge machining," Journal of
Micromechanics and Microengineering, 2019, pp 1-24.
7. Nirala CK, Saha P. “Evaluation of μEDM-drilling and μEDM-dressing performances based on online monitoring of discharge gap
conditions,” Int J Adv Manuf Technol, 2015, pp 1995–2012.
Authors: Battula Balnarsaiah, T.S.Prasad, P.Laxminarayana

Paper Title: Pixel Based Sar Image Classification using Random Forest Algorithm
Abstract: Synthetic Aperture Radar (SAR) images (Microwave data) were classified using Multi-Layer Feed
Forward, Cascade Forward Neural Networks and Random Forest (RF) algorithms. For the Random Forest, a
general model for classification of Remotely Sensed Radar dual-polarization data based on RF is implemented
and classified of SAR image (microwave data) classifications. The RF model exploits spatial context between
neighbouring pixels in an image, and temporal class dependencies between different images of the same region,
in the case of multi-temporal data. Based on the well-founded experimental on basis of random forest techniques
for classification tasks and the encouraging experimental results in RF algorithm , the authors conclude that the
proposed RF algorithm is useful for classification of SAR (Sentinel 1A) imagery and evaluate its accuracy and
750.
kappa coefficient. 4351-
43
Keywords: Cascade feed forward neural network, Multilayer Feed forward, Random Forest, Synthetic Aperture 56
Radar (SAR) Image Classifications.

References:

1. Amitrano, D., Cecinati, F., Di Martino, G., Iodice, A., Mathieu, P.P., Riccio, 480 D., Ruello, G., 2018. Feature extraction from multi
temporal SAR images 481 using self organizing map clustering and object-based image analysis. IEEE 482 Journal of Selected Topics in
Applied Earth Observations and Remote Sensing .
2. Ma, X.; Liu, S.; Hu, S.; Geng, P.; Liu, M.; Zhao, J. SAR image edge detection via sparse representation. Soft Comput. 2017,
doi:10.1007/s00500-017-2505-y
3. Muangnak N, Aimmanee P, Makhanov S (2017) Automatic optic disk detection in retinal images using hybrid vessel phase portrait
analysis. Med Biol. Eng. Comput. https://doi.org/10.1007/s11517-017-1705-z.
4. Otto, D. Wang and A. K. Jain “Clustering Millions of Faces by Identity” arXiv:1604.00989, 2016
5. Depizzol, D.B., Montalv~ao, J., Lima, F.d.O., et al. Feature selection for optical network design via a new mutual information
estimator", Expert Systems with Applications, 107, pp. 72-88 (2018).
6. Novoa J, Chokmani K and Lhissou R 2018 A novel index for assessment of riparian strip efficiency in agricultural landscapes using high
spatial resolution satellite imagery Science of The Total Environment 644 1439–51.
7. Zhang, J. Gu, C. Chen, J. Han, X. Su, X. Cao, and J. Liu. One-two-one network for compression artifacts reduction in remote sensing.
ISPRS Journal of Photogrammetry and Remote Sensing, 2018.
8. Ni, G., Moser, G., Wray, N. R. & Lee, S. H. Estimation of genetic correlation using linkage disequilibrium score regression and genomic
restricted maximum likelihood. American Journal of Human Genetics 102, 1185–1194 (2018).
9. Rostami A., Anbaz M.A., Gahrooei H.R.E., Arabloo M., Bahadori A. (2017) Accurate estimation of CO 2 adsorption on activated
carbon with multi-layer feed-forward neural network (MLFNN) algorithm, Egypt. J. Petrol. doi:10.1016/ j.ejpe.2017.01.003
10. Ansari HR, Zarei MJ, Sabbaghi S, Keshavarz P (2018) A new comprehensive model for relative viscosity of various nanofluids using
feed-forward back-propagation MLP neural networks. IntCommun Heat Mass 91:158–164.
11. Zou, W., Yao, F., Zhang, B., & Guan, Z. (2018). Back Propagation Convex Extreme Learning Machine. In Proceedings of ELM-2016
(pp. 259-272). Springer, Cham.
12. Sumit Goyal and Gyandera Kumar Goyal Cascade and Feedforward Backpropagation Artificial Neural Network Models For Prediction
of Sensory Quality of Instant Coffee Flavoured Sterilized Drink. Canadian Journal on Artificial Intelligence, Machine Learning and
Pattern Recognition Vol. 2, No. 6, August 2011
13. Zhu, M.; Xia, J.; Jin, X.; Yan, M.; Cai, G.; Yan, J.; Ning, G. Class Weights Random Forest Algorithm for Processing Class Imbalanced
Medical Data. IEEE Access 2018, 6, 4641–4652.
14. C.H. Chen, “Signal and Image Processing for Remote Sensing”, CRC publ., Taylor & Francis, 2011, pp. 328 – 329

Authors: Rima Deka, Sanya Anees

Paper Title: Cascaded Rf-Fso-Vlc System using Df Relays


Abstract: This paper presents performance analysis of cascaded radio frequency-free space optical
communication-visible light communication (RF-FSO-VLC) system. The proposed model comprises of the RF
link as the core network, a terrestrial optical link for providing last mile connectivity with the indoor cell users
communicating through VLC environment. The RF link undergoes Nakagami-m distributed fading, while
the terrestrial optical link is modeled by Double Generalized Gamma (DGG) distributed turbulence and
Rayleigh-distributed misalignment losses. VLC links are characterized by the randomness in users’ position.
Using statistical properties of system signal-to-noise ratio (SNR), outage and error performance of the proposed
system is evaluated depending on whether the relays and the destination decode either perfectly or erroneously.
The numerical results show that the system performance varies depending on field-of view (FOV) of the detector
and user’s position. This is because as FOV increases along with the height of the LED, the outage probability of
the system increases. Error probability depends on the type of detection techniques, where a heterodyne
detection system performs better than a direct detection system. Moreover, through results it is inferred that
severe fading and misalignment losses result in poor error performance of the considered system errors on the
performance of the considered cooperative system.

Keywords: Decode-and-forward, free space optical communication, subcarrier intensity modulation, outage
probability, visible light communication.

References:

1. L. C. Andrews and R. L. Phillips, Laser Beam Propagation through


Random Media. Orlando, FL: SPIE PRESS, 2005.
751. 2. Z. Ghassemlooy, W. Popoola, and S. Rajbhandar, Optical Wireless 4357-
Communications: System and Channel Modelling with MATLAB. Boca
Raton, USA: CRC Press, 2017 43
3. M. A. Khalighi and M. Uysal, “Survey on free space optical communication: A communication theory perspective,” IEEE 62
Commun.SurveysTuts., vol. 16, no. 4, pp. 2231–2258, 2014.
4. Z. Ghassemlooy, L. N. Alves, S. Zvanovec, and M. A. Khalighi, Visible
Light Communications: Theory and Applications. Boca Raton, USA:
CRC Press, 2017.
5. T. Komine and M. Nakagawa, “Fundamental analysis for visible -
light communication system using LED lights,” IEEE Trans. Consum.
Electron, vol. 50, no. 1, pp. 100–107, 2004.
6. A. Bekkali, C. B. Naila, K. Kazaura, K. Wakamor, and M. Matsumoto,
“Transmission analysis of OFDM-based wireless services over turbulent radio-on-FSO links modeled by Gamma-Gamma
distribution,” IEEE Photon. J., vol. 2, no. 3, pp. 510–520, 2010.channels with pointing errors,” IEEE/OSA J. Opt. Commun. Netw.,
vol. 5, no. 9, p. 11, Sept. 2013.
7. I. E. Lee, Z. Ghassemlooy, W. P. Ng, and A. Khalighi, “Green-inspired
hybrid FSO/RF wireless backhauling and basic access signalling for next generation metrozones,” 2012 2nd Int. Symp. On Env.
Friendly Energies & App., pp. 230–236, 2012.
8. S. Anees and M. R. Bhatnagar, “Performance of an amplify-and-forward dual-hop asymmetric RF-FSO communication system,” IEEE
J.Opt.Comm. Netw, vol. 7, no. 2, pp. 124–135, 2015.
9. ——, “Performance evaluation of decode-and-forward dual-hop asymmetric radio frequency-free space optical communication
system,” IETOptoelectronics, vol. 9, no. 5, pp. 232–240, 2015.
10. E. T. Michailidis, N. Nomikos, P. Bithas, D. Vouyioukas, and A. G.
Kanatas, “Outage probability of triple-hop mixed RF/FSO/RF stratospheric communication systems,” SPACOMM, pp. 1–7, 2018.
11. S. Anees and M. R. Bhatnagar, “Exact performance analysis of DF based mixed triple-hop RF/FSO/RF communication system,” 2017
IEEE 28th PIMRC, pp. 1–5, 2018.
12. H. Alquwaiee, I. S. Ansari, and M. S. Alouini, “On the performance
of free-space optical communication systems over Double Generalized
Gamma channel,” IEEE Journal On Selected Areas In Com., vol. 33,
no. 9, pp. 1829–1830, 2015.
13. A. Gupta, N. Sharma, P. Garg, and M. S. Alouini, “Cascaded FSO-VLC communication system,” IEEE Wireless Comm. Let., vol. 6,
no. 6, pp. 810–813, 2017.
14. I. S. Ansari, S. A. Ahmadi, F. Yilmaz, M. Alouini, and
H. Yanikomeroglu, “A new formula for the BER of binary modulations with dual-branch selection over Generalized-K composite
fading channels,” IEEE Trans. Commun, vol. 59, no. 10, pp. 2654–2658, 2011.
15. Prudnikov, B. A.P., M. Y.A., and O.I., Integrals and Series. New York, USA: Gordon and Breach Science Publishers, 1990.
16. http://functions.wolfram.com/hypergeometricfunctions/meijerg.

Authors: Ch V Ravi Sankar, P V Y Jayasree

Paper Title: Design of Planar and Conformal Microstrip Patch Antenna for Avionics Applications
Abstract: Microstrip patch antennas have an important role on Communication applications on satellites,
aircrafts, missiles and other vehicles comparing to other types of antenna because of their conformability nature.
In this paper several EM simulations performed on planar and conformal antenna for avionic applications. The
design of the proposed planar antenna configuration is analyzed by using IE3D simulation software, it is MOM
(Method of Moments) based and conformal antenna is analyzed by using HFSS simulator which is finite element
method.In addition we are achieving circular polarization.

Keywords: planar microstrip patch, conformability, Method of Moment,IE3D,HFSS.


752.
References: 4363-
43
1. FerhatHaroun, Hongda Lu, Yu Sun, XinLv,” Design of a Spherical Array by Orthogonal Projection of a Planar Microstrip Antenna 65
Array” 2013 International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC) Dec 20-22, 2013,
Shenyang, China
2. Prateekchopra, meghabandri” conformal antenn using circular microstrip patch in c band “2016 SPIN international conference.
3. Narayan agnihotri, karthekeya G S “Super Wideband Conformal Antenna Array On cylindrical Surface” 978-1-5090-2214-4/16/
©2016 IEEE
4. . Lalmohanbhoumik, criagarminto, “Design and Analysis of Conformal Ku-Band Microstrip Patch Antenna Arrays” 978-1-4673-1127-
4/12/ ©2013 IEEE
5. .Benjamin D,Masud A,Braaten “Half-Power Beamwidth of a Self-Adapting Conformal 1 X 4 Microstrip Array” 978-1-4673-0462-
7/12/ ©2012 IEEE
6. TamásGál, Jorge L. Salazar-Cerreno, Gordon Farquharson, and YasuoKuga, "Design of a C-band Conformal Series-Fed Phased-Array
Antenna for Airborne Synthetic Aperture Radar"; pp. 97, 2014 IEEE .
Authors: D. Logendran, M.K.Aravindan and A. Abraham Eben Andrews
Manufacturing and Research of Mechanical Properties of Natural Grit Reinforced Hybrid
Paper Title:
Polymer Composites
Abstract: The fundamental goal of this postulation is to craft and explore mechanical properties of Cotton
regular grit strengthened polymer compounds and half and half (Cotton + Flax + Coconut) characteristic grit
fortified polymer compounds. Half and half compounds is generated by including 35% of Cotton, 35% of Flax
and 30% of Coconut grit. Mechanical possessions, for example, Tensile possessions (rigidity, malleable),
Flexural possessions, Impact excellence when visible to shifting loads of grit (0.4 grams) were resolved.

Keywords: Bio-degradable Polymer, Cotton; Flax; Coconut; Hybrid composites.

References:

1. R.Prasannasrinivas and Chandramohan.D., “Analysis of Natural Fiber Reinforced Composite Material for the Helmet Outer shell”,
International Journal of current Research, Vol.4,No.3,137-141,2012.
2. B.Murali and Chandramohan.D., “Fabrication of Industrial Safety Helmet by using Hybrid Composite Materials”, Journal of Middle
East Applied Science and Technology, 15,584-587,2014.
3. Murali, B., Chandra Mohan, D. Chemical treatment on hemp/polymer composites, Journal of Chemical and Pharmaceutical
Research,6(9), pp. 419-423.
4. Pandyaraj, V., Ravi Kumar, L., Chandramohan, D. Experimental investigation of mechanical properties of GFRP reinforced with coir
753. and flax, International Journal of Mechanical Engineering and Technology,9, pp. 1034-1042,2018.
5. Murali, B., Chandra Mohan, D., Nagoor Vali, S.K., Muthukumarasamy, S., Mohan, A. Mechanical behavior of chemically treated 4366-
jute/polymer composites, Carbon - Science and Technology,6(1), pp. 330-335. 43
6. K Gurusami, K et.al.,(2019): A Comparative Study on Surface Strengthening Characterization and Residual Stresses of Dental Alloys 69
using Laser Shock Peening, International Journal of Ambient Energy, DOI: 10.1080/01430750.2019.1614987.
7. Sathish, T., Chandramohan, D. Experimental study and model development for on-line drill wear monitoring system using lab view,
International Journal of Recent Technology and Engineering,7(6), 281-286,2019.
8. Sathish, T and Chandramohan, D, Teaching methods and methodologies used in laboratories, International Journal of Recent
Technology and Engineering Volume 7, Issue 6, March 2019, Pages 291-293.
9. Chandramohan, D et al. Mechanical, Moisture Absorption, and Abrasion Resistance Properties of Bamboo–Jute–Glass Fiber
Composites. Journal of Bio- and Tribo-Corrosion (2019) 5:66. DOI: https://doi.org/10.1007/s40735-019-0259-z
10. Chandramohan, D., Bharanichandar, J., Karthikeyan, P., Vijayan, R., Murali, B. ,Progress of biomaterials in the field of orthopaedics,
American Journal of Applied Sciences, 11 (4),623-630,2014.
11. Chandramohan, D.and Marimuthu, K., Natural fibre particle reinforced composite material for bone implant, European Journal of
Scientific Research, Vol.54, No.3,384-406,2011.
12. Chandramohan, D, et.al., “Applications of CT/CAD/RPT in the Futurestic Development of Orthopaedics and Fabrication of Plate and
Screw Material from Natural Fibre Particle Reinforced Composites for Humerus Bone Fixation – A Future Drift”, Malaysian Journal
of Educational Technology, Vol.10,No.12,73-81,2010.
13. Chandramohan, D and John Presin Kumar A. Fibre reinforced composites: A promising material for artificial limp. Data-Enabled
Discovery and Applications. 1-9. 2017.
14. DOI: https://doi.org/10.1007/s41688-017-0010-1
15. Chandramohan, D., Bharanichandar, J, Impact test on natural fiber reinforced polymer composite materials, Carbon - Science and
Technology,5(3), pp. 314-320,2013.
16. Chandramohan, D., Murali, B., Machining of composites - A review, Academic Journal of Manufacturing Engineering,12(3), 67-
71,2014.
17. Chandramohan.D., “Analysis On Natural Fiber Bone Plates”, European Journal of Experimental Biology, 4(2):323-332,2014.
18. Chandramohan, D., Rajesh, S,Study of machining parameters on natural fiber particle reinforced polymer composite material,
Academic Journal of Manufacturing Engineering12(3),72-77,2014.
19. D Chandramohan, K Marimuthu, Bio composite materials based on bio polymers and natural fibers-contribution as bone implants,
International Journal Of Advanced Medical Sciences And Applied Research, Vol No. 1, Issue No. 1, 009 – 012,2011.
20. Chandramohan, D., Marimuthu, K. Applications of natural fiber composites for replacement of orthopaedic alloys, Proceedings of the
International Conference on Nanoscience, Engineering and Technology, 6167942, pp. 137-145,2011.
21. Chandramohan, D., Rajesh, S., Increasing combusting resistance for Hybrid composites, International Journal of Applied Engineering
Research,9(20), 6979-6985,2014.
22. Chandramohan, D. and Marimuthu, K., “Contribution of Biomaterials to Orthopaedics as Bone Implants – A Review”, International
Journal of Materials Science, Vol.5, No.3,445-463,2010.
23. Chandramohan.D., and A.Senthilathiban. Effects of chemical treatment on jute fiber reinforced composites, International Journal of
Applied Chemistry, 10 (1),153-162,2014.
24. S.Dinesh kumar and K. Purushothaman (2018): Enhancement of thermal conductivity in a plate heat exchanger by using nano particles
CNT, Al2O3,surfactant with De-ionised water as coolant, International Journal of Ambient Energy,
DOI:10.1080/01430750.2018.1562979.
25. Chandramohan, D., Bharanichandar, J. Natural fiber reinforced polymer composites for automobile accessories, American Journal of
Environmental Sciences,9(6), 494-504,2014.
26. Sathish,T., Periyasamy,P., Chandramohan,D., Nagabhooshanam, N., Modelling K-nearest neighbour technique for the parameter
prediction of cryogenic treated tool in surface roughness minimization, International Journal of Mechanical and Production
Engineering Research and Development, Volume 2018, Issue Special Issue, 2018, Article number IJMPERDSPL201883, Pages 705-
710.
27. S. Dinesh Kumar, K. Purushothaman, D. Chandramohan et al., ANN-AGCS for the prediction of temperature distribution and required
energy in hot forging process using finite element analysis, Materials Today: Proceedings,
DOI:https://doi.org/10.1016/j.matpr.2019.05.426.
28. Sathish, T., Chandramohan, D. Design and analysis of wind box segment in travelling grate stoker boiler using CFD, International
Journal of Recent Technology and Engineering,7(6), 287-290,2019.
29. Sathish,T., Periyasamy,P., Chandramohan,D., Nagabhooshanam, N., Modelling of cost based optimization system E-O-L disassembly
in reverse logistics, International Journal of Mechanical and Production Engineering Research and Development, Volume 2018, Issue
Special Issue, 2018, Article number IJMPERDSPL201883, Pages 711-716.
30. Chandramohan, D and John Presin Kumar A. Experimental data on the properties of natural fiber particle reinforced polymer
composite material, Data in Brief,13, pp. 460-468,2017.
31. Raja Ganesan Prabhakaran Vasantha-Srinivasan, Sengodan Karthi, Muthiah Chellappandian, Athirstam Ponsankar, Annamalai
Thanigaivel, Sengottayan Senthil-Nathan, Devarajan Chandramohan, Aspergillus flavus (Link) toxins reduces the fitness of dengue
vector Aedes aegypti (Linn.) and their non-target toxicity against aquatic predator, Microbial pathogenesis,128,281-287,2019.
DOI:https://doi.org/10.1016/j.micpath.2019.01.014.
32. J Bharamichandar, D Chandramohan, B Murali, Natural fibre reinforced polymer composite in synthetic bone grafting-a new approach,
J Mid East Appl Sci Technol,16,588-596, 2014
33. Karthick, S. TDP: A Novel Secure and Energy Aware Routing Protocol for Wireless Sensor Networks, In International Journal of
Intelligent Engineering and Systems, Vol. 11, No. 2, pp. 76-84. 2018.
34. Sathish, T., Muthukumar, K., Palani Kumar, B. A study on making of compact manual paper recycling plant for domestic purpose,
International Journal of Mechanical and Production Engineering Research and Development, Vol. 8, No. Special Issue 7, pp. 1515-
1535, 2018.
35. Sathish, T., Jayaprakash, J. Multi period disassembly-to-order of end-of-life product based on scheduling to maximise the profit in
reverse logistic operation, International Journal of Logistics Systems and Management, Vol. 26, No. 3, pp. 402-419, 2017.
36. Sathish, T., Muthulakshmanan, A. Modelling of Manhattan K-nearest neighbor for exhaust emission analysis of CNG-diesel engine,
Journal of Applied Fluid Mechanics, Vol. 11, No. Special issue, pp. 39-44, 2018.
37. Sathish, T., Vijayakumar, M.D., Krishnan Ayyangar, A. Design and Fabrication of Industrial Components Using 3D Printing,
Materials Today: Proceedings, Vol. 5, No. 6, pp. 14489-14498, 2018.
38. Madan, D., Sivakandhan, C., Sagadevan, S., Sathish, T. Ocean wave energy scenario in India, International Journal of Mechanical and
Production Engineering Research and Development, Vol. 2018, No. Special Issue, pp. 582-590, 2018.

Authors: T. Naresh Kumar, D. David and S. Shankaranarayanan

Paper Title: Experimental Research on Abaca/Agave/Fly ash Nano Powder Reinforced Hybrid Composites
Abstract: Regular grit are those which are made normally, for example, Abaca, Jute, Hemp, cotton, hair,
fleece coir and etc. Because of numerous points of interest Ordinary grit are supplanting glass grit and carbon
grit, for example, its biodegradable nature so it dumps it beyond all detectable inhibitions space after it takes
retirement, and its simplicity of accessibility, low weight, and better quality in multi hub support with including
Nano powder particles with it. In this examination work motorized conduct of Flyash Nano
powder/Abaca/Agave grit strengthened epoxy based half and half compounds and its creation has been
considered. Work has been done to examine the flexural properties,tensile quality, hardness, and effect quality of
the compounds. It has been seen that effect quality is improved with the expansion in the weight portion of
normal strands to certain degree. The morphology of compounds is contemplated by utilizing Scanning Electron
Microscope (SEM).

Keywords: Abaca, Agave, Flyash nanopowder, Scanning Electron Microscope.


4370-
754. 43
References:
74
131. R.Prasannasrinivas and Chandramohan.D., “Analysis of Natural Fiber Reinforced Composite Material for the Helmet Outer shell”,
International Journal of current Research, Vol.4,No.3,137-141,2012.
132. B.Murali and Chandramohan.D., “Fabrication of Industrial Safety Helmet by using Hybrid Composite Materials”, Journal of Middle
East Applied Science and Technology, 15,584-587,2014.
133. Murali, B., Chandra Mohan, D. Chemical treatment on hemp/polymer composites, Journal of Chemical and Pharmaceutical
Research,6(9), pp. 419-423.
134. Pandyaraj, V., Ravi Kumar, L., Chandramohan, D. Experimental investigation of mechanical properties of GFRP reinforced with coir
and flax, International Journal of Mechanical Engineering and Technology,9, pp. 1034-1042,2018.
135. Murali, B., Chandra Mohan, D., Nagoor Vali, S.K., Muthukumarasamy, S., Mohan, A. Mechanical behavior of chemically treated
jute/polymer composites, Carbon - Science and Technology,6(1), pp. 330-335.
136. K Gurusami, K et.al.,(2019): A Comparative Study on Surface Strengthening Characterization and Residual Stresses of Dental Alloys
using Laser Shock Peening, International Journal of Ambient Energy, DOI: 10.1080/01430750.2019.1614987.
137. Sathish, T., Chandramohan, D. Experimental study and model development for on-line drill wear monitoring system using lab view,
International Journal of Recent Technology and Engineering,7(6), 281-286,2019.
138. Sathish, T and Chandramohan, D, Teaching methods and methodologies used in laboratories, International Journal of Recent
Technology and Engineering Volume 7, Issue 6, March 2019, Pages 291-293.
139. Chandramohan, D et al. Mechanical, Moisture Absorption, and Abrasion Resistance Properties of Bamboo–Jute–Glass Fiber
Composites. Journal of Bio- and Tribo-Corrosion (2019) 5:66.DOI: https://doi.org/10.1007/s40735-019-0259-z
140. Chandramohan, D., Bharanichandar, J., Karthikeyan, P., Vijayan, R., Murali, B. ,Progress of biomaterials in the field of orthopaedics,
American Journal of Applied Sciences, 11 (4),623-630,2014.
141. Chandramohan, D.and Marimuthu, K., Natural fibre particle reinforced composite material for bone implant, European Journal of
Scientific Research, Vol.54, No.3,384-406,2011.
142. Chandramohan, D, et.al., “Applications of CT/CAD/RPT in the Futurestic Development of Orthopaedics and Fabrication of Plate and
Screw Material from Natural Fibre Particle Reinforced Composites for Humerus Bone Fixation – A Future Drift”, Malaysian Journal
of Educational Technology, Vol.10,No.12,73-81,2010.
143. Chandramohan, D and John Presin Kumar A. Fibre reinforced composites: A promising material for artificial limp. Data-Enabled
Discovery and Applications. 1-9. 2017. DOI: https://doi.org/10.1007/s41688-017-0010-1
144. Chandramohan, D., Bharanichandar, J, Impact test on natural fiber reinforced polymer composite materials, Carbon - Science and
Technology,5(3), pp. 314-320,2013.
145. Chandramohan, D., Murali, B., Machining of composites - A review, Academic Journal of Manufacturing Engineering,12(3), 67-
71,2014.
146. Chandramohan.D., “Analysis On Natural Fiber Bone Plates”, European Journal of Experimental Biology, 4(2):323-332,2014.
147. Chandramohan, D., Rajesh, S,Study of machining parameters on natural fiber particle reinforced polymer composite material,
Academic Journal of Manufacturing Engineering12(3),72-77,2014.
148. D Chandramohan, K Marimuthu, Bio composite materials based on bio polymers and natural fibers-contribution as bone implants,
International Journal Of Advanced Medical Sciences And Applied Research, Vol No. 1, Issue No. 1, 009 – 012,2011.
149. Chandramohan, D., Marimuthu, K. Applications of natural fiber composites for replacement of orthopaedic alloys, Proceedings of the
International Conference on Nanoscience, Engineering and Technology, 6167942, pp. 137-145,2011.
150. Chandramohan, D., Rajesh, S., Increasing combusting resistance for Hybrid composites, International Journal of Applied Engineering
Research,9(20), 6979-6985,2014.
151. Chandramohan, D. and Marimuthu, K., “Contribution of Biomaterials to Orthopaedics as Bone Implants – A Review”, International
Journal of Materials Science, Vol.5, No.3,445-463,2010.
152. Chandramohan.D., and A.Senthilathiban. Effects of chemical treatment on jute fiber reinforced composites, International Journal of
Applied Chemistry, 10 (1),153-162,2014.
153. S.Dinesh kumar and K. Purushothaman (2018): Enhancement of thermal conductivity in a plate heat exchanger by using nano particles
CNT, Al2O3,surfactant with De-ionised water as coolant, International Journal of Ambient Energy,
DOI:10.1080/01430750.2018.1562979.
154. Chandramohan, D., Bharanichandar, J. Natural fiber reinforced polymer composites for automobile accessories, American Journal of
Environmental Sciences,9(6), 494-504,2014.
155. Sathish,T., Periyasamy,P., Chandramohan,D., Nagabhooshanam, N., Modelling K-nearest neighbour technique for the parameter
prediction of cryogenic treated tool in surface roughness minimization, International Journal of Mechanical and Production
Engineering Research and Development, Volume 2018, Issue Special Issue, 2018, Article number IJMPERDSPL201883, Pages 705-
710.
156. S. Dinesh Kumar, K. Purushothaman, D. Chandramohan et al., ANN-AGCS for the prediction of temperature distribution and required
energy in hot forging process using finite element analysis, Materials Today: Proceedings,
DOI:https://doi.org/10.1016/j.matpr.2019.05.426.
157. Sathish, T., Chandramohan, D. Design and analysis of wind box segment in travelling grate stoker boiler using CFD, International
Journal of Recent Technology and Engineering,7(6), 287-290,2019.
158. Sathish,T., Periyasamy,P., Chandramohan,D., Nagabhooshanam, N., Modelling of cost based optimization system E-O-L disassembly
in reverse logistics, International Journal of Mechanical and Production Engineering Research and Development, Volume 2018, Issue
Special Issue, 2018, Article number IJMPERDSPL201883, Pages 711-716.
159. Chandramohan, D and John Presin Kumar A. Experimental data on the properties of natural fiber particle reinforced polymer
composite material, Data in Brief,13, pp. 460-468,2017.
160. Raja Ganesan Prabhakaran Vasantha-Srinivasan, Sengodan Karthi, Muthiah Chellappandian, Athirstam Ponsankar, Annamalai
Thanigaivel, Sengottayan Senthil-Nathan, Devarajan Chandramohan, Aspergillus flavus (Link) toxins reduces the fitness of dengue
vector Aedes aegypti (Linn.) and their non-target toxicity against aquatic predator, Microbial pathogenesis,128,281-287,2019.
161. DOI:https://doi.org/10.1016/j.micpath.2019.01.014.
162. J Bharamichandar, D Chandramohan, B Murali, Natural fibre reinforced polymer composite in synthetic bone grafting-a new approach,
J Mid East Appl Sci Technol,16,588-596, 2014.
163. Karthick, S. TDP: A Novel Secure and Energy Aware Routing Protocol for Wireless Sensor Networks, In International Journal of
Intelligent Engineering and Systems, Vol. 11, No. 2, pp. 76-84. 2018.
164. Sathish, T., Muthukumar, K., Palani Kumar, B. A study on making of compact manual paper recycling plant for domestic purpose,
International Journal of Mechanical and Production Engineering Research and Development, Vol. 8, No. Special Issue 7, pp. 1515-
1535, 2018.
165. Sathish, T., Jayaprakash, J. Multi period disassembly-to-order of end-of-life product based on scheduling to maximise the profit in
reverse logistic operation, International Journal of Logistics Systems and Management, Vol. 26, No. 3, pp. 402-419, 2017..
166. Sathish, T., Muthulakshmanan, A. Modelling of Manhattan K-nearest neighbor for exhaust emission analysis of CNG-diesel engine,
Journal of Applied Fluid Mechanics, Vol. 11, No. Special issue, pp. 39-44, 2018.
167. Sathish, T., Vijayakumar, M.D., Krishnan Ayyangar, A. Design and Fabrication of Industrial Components Using 3D Printing,
Materials Today: Proceedings, Vol. 5, No. 6, pp. 14489-14498, 2018.
Madan, D., Sivakandhan, C., Sagadevan, S., Sathish, T. Ocean wave energy scenario in India, International Journal of Mechanical and
Production Engineering Research and Development, Vol. 2018, No. Special Issue, pp. 582-590, 2018

Authors: D. Logendran, A. Abraham Eben Andrews and S. Gopinath

Paper Title: Assessing Mechanical Properties of NFRPC Material


755. Abstract: Inspiration for the contemporaneous work has come from the energy to grow sure transient
4375-
compound ingredients for residential or mechanical applications abuse plant filaments and gums. The wide
43
accessibility of strands has roused the occasion of normal grit compounds. This theory goes for acquainting new
79
normal strands with be utilized as fillers in an exceedingly synthetic compound lattice, facultative generation of
value effective, biodegradable and light-weight compounds for burden conveying structures. Abaca grit, one
such kind, is well off in polyose, relatively modest and extremely advertised. During this examination, extraction
of Abaca grit was appropriated and examinations on mechanical possessions were controlled by
experimentation. Fillers were thought of as added substances. Their significant commitment was in bringing
down the estimation of ingredients by substitution the dearer synthetic compound. Fillers will improve
mechanical possesions. Fillers increment the bond between the rosin and grit.

Keywords: Fabrication, Composite ingredients, Tensile examine.

References:

1. R.Prasannasrinivas and Chandramohan.D., “Analysis of Natural Fiber Reinforced Composite Material for the Helmet Outer shell”,
International Journal of current Research, Vol.4,No.3,137-141,2012.
2. B.Murali and Chandramohan.D., “Fabrication of Industrial Safety Helmet by using Hybrid Composite Materials”, Journal of Middle
East Applied Science and Technology, 15,584-587,2014.
3. Murali, B., Chandra Mohan, D. Chemical treatment on hemp/polymer composites, Journal of Chemical and Pharmaceutical
Research,6(9), pp. 419-423.
4. Pandyaraj, V., Ravi Kumar, L., Chandramohan, D. Experimental investigation of mechanical properties of GFRP reinforced with coir
and flax, International Journal of Mechanical Engineering and Technology,9, pp. 1034-1042,2018.
5. Murali, B., Chandra Mohan, D., Nagoor Vali, S.K., Muthukumarasamy, S., Mohan, A. Mechanical behavior of chemically treated
jute/polymer composites, Carbon - Science and Technology,6(1), pp. 330-335.
6. K Gurusami, K et.al.,(2019): A Comparative Study on Surface Strengthening Characterization and Residual Stresses of Dental Alloys
using Laser Shock Peening, International Journal of Ambient Energy, DOI: 10.1080/01430750.2019.1614987.
7. Sathish, T., Chandramohan, D. Experimental study and model development for on-line drill wear monitoring system using lab view,
International Journal of Recent Technology and Engineering,7(6), 281-286,2019.
8. Sathish, T and Chandramohan, D, Teaching methods and methodologies used in laboratories, International Journal of Recent
Technology and Engineering Volume 7, Issue 6, March 2019, Pages 291-293.
9. Chandramohan, D et al. Mechanical, Moisture Absorption, and Abrasion Resistance Properties of Bamboo–Jute–Glass Fiber
Composites. Journal of Bio- and Tribo-Corrosion (2019) 5:66.
10. DOI: https://doi.org/10.1007/s40735-019-0259-z
11. Chandramohan, D., Bharanichandar, J., Karthikeyan, P., Vijayan, R., Murali, B. ,Progress of biomaterials in the field of orthopaedics,
American Journal of Applied Sciences, 11 (4),623-630,2014.
12. Chandramohan, D.and Marimuthu, K., Natural fibre particle reinforced composite material for bone implant, European Journal of
Scientific Research, Vol.54, No.3,384-406,2011.
13. Chandramohan, D, et.al., “Applications of CT/CAD/RPT in the Futurestic Development of Orthopaedics and Fabrication of Plate and
Screw Material from Natural Fibre Particle Reinforced Composites for Humerus Bone Fixation – A Future Drift”, Malaysian Journal
of Educational Technology, Vol.10,No.12,73-81,2010.
14. Chandramohan, D and John Presin Kumar A. Fibre reinforced composites: A promising material for artificial limp. Data-Enabled
Discovery and Applications. 1-9. 2017.
15. DOI: https://doi.org/10.1007/s41688-017-0010-1
16. Chandramohan, D., Bharanichandar, J, Impact test on natural fiber reinforced polymer composite materials, Carbon - Science and
Technology,5(3), pp. 314-320,2013.
17. Chandramohan, D., Murali, B., Machining of composites - A review, Academic Journal of Manufacturing Engineering,12(3), 67-
71,2014.
18. Chandramohan.D., “Analysis On Natural Fiber Bone Plates”, European Journal of Experimental Biology, 4(2):323-332,2014.
19. Chandramohan, D., Rajesh, S,Study of machining parameters on natural fiber particle reinforced polymer composite material,
Academic Journal of Manufacturing Engineering12(3),72-77,2014.
20. D Chandramohan, K Marimuthu, Bio composite materials based on bio polymers and natural fibers-contribution as bone implants,
International Journal Of Advanced Medical Sciences And Applied Research, Vol No. 1, Issue No. 1, 009 – 012,2011.
21. Chandramohan, D., Marimuthu, K. Applications of natural fiber composites for replacement of orthopaedic alloys, Proceedings of the
International Conference on Nanoscience, Engineering and Technology, 6167942, pp. 137-145,2011.
22. Chandramohan, D., Rajesh, S., Increasing combusting resistance for Hybrid composites, International Journal of Applied Engineering
Research,9(20), 6979-6985,2014.
23. Chandramohan, D. and Marimuthu, K., “Contribution of Biomaterials to Orthopaedics as Bone Implants – A Review”, International
Journal of Materials Science, Vol.5, No.3,445-463,2010.
24. Chandramohan.D., and A.Senthilathiban. Effects of chemical treatment on jute fiber reinforced composites, International Journal of
Applied Chemistry, 10 (1),153-162,2014.
25. S.Dinesh kumar and K. Purushothaman (2018): Enhancement of thermal conductivity in a plate heat exchanger by using nano particles
CNT, Al2O3,surfactant with De-ionised water as coolant, International Journal of Ambient Energy,
DOI:10.1080/01430750.2018.1562979.
26. Chandramohan, D., Bharanichandar, J. Natural fiber reinforced polymer composites for automobile accessories, American Journal of
Environmental Sciences,9(6), 494-504,2014.
27. Sathish,T., Periyasamy,P., Chandramohan,D., Nagabhooshanam, N., Modelling K-nearest neighbour technique for the parameter
prediction of cryogenic treated tool in surface roughness minimization, International Journal of Mechanical and Production
Engineering Research and Development, Volume 2018, Issue Special Issue, 2018, Article number IJMPERDSPL201883, Pages 705-
710.
28. S. Dinesh Kumar, K. Purushothaman, D. Chandramohan et al., ANN-AGCS for the prediction of temperature distribution and required
energy in hot forging process using finite element analysis, Materials Today: Proceedings,
DOI:https://doi.org/10.1016/j.matpr.2019.05.426.
29. Sathish, T., Chandramohan, D. Design and analysis of wind box segment in travelling grate stoker boiler using CFD, International
Journal of Recent Technology and Engineering,7(6), 287-290,2019.
30. Sathish,T., Periyasamy,P., Chandramohan,D., Nagabhooshanam, N., Modelling of cost based optimization system E-O-L disassembly
in reverse logistics, International Journal of Mechanical and Production Engineering Research and Development, Volume 2018, Issue
Special Issue, 2018, Article number IJMPERDSPL201883, Pages 711-716.
31. Chandramohan, D and John Presin Kumar A. Experimental data on the properties of natural fiber particle reinforced polymer
composite material, Data in Brief,13, pp. 460-468,2017.
32. Raja Ganesan Prabhakaran Vasantha-Srinivasan, Sengodan Karthi, Muthiah Chellappandian, Athirstam Ponsankar, Annamalai
Thanigaivel, Sengottayan Senthil-Nathan, Devarajan Chandramohan, Aspergillus flavus (Link) toxins reduces the fitness of dengue
vector Aedes aegypti (Linn.) and their non-target toxicity against aquatic predator, Microbial pathogenesis,128,281-287,2019.
33. DOI:https://doi.org/10.1016/j.micpath.2019.01.014.
34. J Bharamichandar, D Chandramohan, B Murali, Natural fibre reinforced polymer composite in synthetic bone grafting-a new approach,
J Mid East Appl Sci Technol,16,588-596, 2014
35. Karthick, S. TDP: A Novel Secure and Energy Aware Routing Protocol for Wireless Sensor Networks, In International Journal of
Intelligent Engineering and Systems, Vol. 11, No. 2, pp. 76-84. 2018.
36. Sathish, T., Muthukumar, K., Palani Kumar, B. A study on making of compact manual paper recycling plant for domestic purpose,
International Journal of Mechanical and Production Engineering Research and Development, Vol. 8, No. Special Issue 7, pp. 1515-
1535, 2018..
37. Sathish, T., Jayaprakash, J. Multi period disassembly-to-order of end-of-life product based on scheduling to maximise the profit in
reverse logistic operation, International Journal of Logistics Systems and Management, Vol. 26, No. 3, pp. 402-419, 2017..
38. Sathish, T., Muthulakshmanan, A. Modelling of Manhattan K-nearest neighbor for exhaust emission analysis of CNG-diesel engine,
Journal of Applied Fluid Mechanics, Vol. 11, No. Special issue, pp. 39-44, 2018.
39. Sathish, T., Vijayakumar, M.D., Krishnan Ayyangar, A. Design and Fabrication of Industrial Components Using 3D Printing,
Materials Today: Proceedings, Vol. 5, No. 6, pp. 14489-14498, 2018.
40. Madan, D., Sivakandhan, C., Sagadevan, S., Sathish, T. Ocean wave energy scenario in India, International Journal of Mechanical and
Production Engineering Research and Development, Vol. 2018, No. Special Issue, pp. 582-590, 2018.

Authors: D. Logendran, T. Naresh Kumar and A. Abraham Eben Andrews

Paper Title: Experimental Research on Natural Fiber Reinforced Polymer Composite Material Composites
Abstract: In this examination, common strands like Abaca, Coir and Flax , Abaca and Coir (half breed) , Flax
and Coir (cross breed) and Flax and Abaca (crossover) are manufactured with bio epoxy tar utilizing forming
technique. In this paper the ideal blending of fortitude and sap is accomplished by utilizing Taguchi strategy. In
this effort, flexural unbending nature and rigidity of Abaca besides Coir (half and half), Flax and Coir
(hybridand Flax and Abaca (cross breed) composite at dry and wet conditions were considered. Hardness test
remained directed utilizing rigidity testing machine. In this effort small scale edifice of the examples are
examined by the Skim through Electron Hand-held microscope.

Keywords: Natural strands, Bio epoxy tar, Experimental Research, Taguchi technique.

References:
1. R.Prasannasrinivas and Chandramohan.D., “Analysis of Natural Fiber Reinforced Composite Material for the Helmet Outer shell”,
International Journal of current Research, Vol.4,No.3,137-141,2012.
2. B.Murali and Chandramohan.D., “Fabrication of Industrial Safety Helmet by using Hybrid Composite Materials”, Journal of Middle
East Applied Science and Technology, 15,584-587,2014.
3. Murali, B., Chandra Mohan, D. Chemical treatment on hemp/polymer composites, Journal of Chemical and Pharmaceutical
Research,6(9), pp. 419-423.
4. Pandyaraj, V., Ravi Kumar, L., Chandramohan, D. Experimental investigation of mechanical properties of GFRP reinforced with coir
and flax, International Journal of Mechanical Engineering and Technology,9, pp. 1034-1042,2018.
5. Murali, B., Chandra Mohan, D., Nagoor Vali, S.K., Muthukumarasamy, S., Mohan, A. Mechanical behavior of chemically treated
jute/polymer composites, Carbon - Science and Technology,6(1), pp. 330-335.
6. K Gurusami, K et.al.,(2019): A Comparative Study on Surface Strengthening Characterization and Residual Stresses of Dental Alloys
using Laser Shock Peening, International Journal of Ambient Energy, DOI: 10.1080/01430750.2019.1614987.
7. Sathish, T., Chandramohan, D. Experimental study and model development for on-line drill wear monitoring system using lab view,
International Journal of Recent Technology and Engineering,7(6), 281-286,2019.
8. Sathish, T and Chandramohan, D, Teaching methods and methodologies used in laboratories, International Journal of Recent
Technology and Engineering Volume 7, Issue 6, March 2019, Pages 291-293.
9. Chandramohan, D et al. Mechanical, Moisture Absorption, and Abrasion Resistance Properties of Bamboo–Jute–Glass Fiber
756. Composites. Journal of Bio- and Tribo-Corrosion (2019) 5:66. 4380-
10. DOI: https://doi.org/10.1007/s40735-019-0259-z
11. Chandramohan, D., Bharanichandar, J., Karthikeyan, P., Vijayan, R., Murali, B. ,Progress of biomaterials in the field of orthopaedics,
43
American Journal of Applied Sciences, 11 (4),623-630,2014. 85
12. Chandramohan, D.and Marimuthu, K., Natural fibre particle reinforced composite material for bone implant, European Journal of
Scientific Research, Vol.54, No.3,384-406,2011.
13. Chandramohan, D, et.al., “Applications of CT/CAD/RPT in the Futurestic Development of Orthopaedics and Fabrication of Plate and
Screw Material from Natural Fibre Particle Reinforced Composites for Humerus Bone Fixation – A Future Drift”, Malaysian Journal
of Educational Technology, Vol.10,No.12,73-81,2010.
14. Chandramohan, D and John Presin Kumar A. Fibre reinforced composites: A promising material for artificial limp. Data-Enabled
Discovery and Applications. 1-9. 2017.
15. DOI: https://doi.org/10.1007/s41688-017-0010-1
16. Chandramohan, D., Bharanichandar, J, Impact test on natural fiber reinforced polymer composite materials, Carbon - Science and
Technology,5(3), pp. 314-320,2013.
17. Chandramohan, D., Murali, B., Machining of composites - A review, Academic Journal of Manufacturing Engineering,12(3), 67-
71,2014.
18. Chandramohan.D., “Analysis On Natural Fiber Bone Plates”, European Journal of Experimental Biology, 4(2):323-332,2014.
19. Chandramohan, D., Rajesh, S,Study of machining parameters on natural fiber particle reinforced polymer composite material,
Academic Journal of Manufacturing Engineering12(3),72-77,2014.
20. D Chandramohan, K Marimuthu, Bio composite materials based on bio polymers and natural fibers-contribution as bone implants,
International Journal Of Advanced Medical Sciences And Applied Research, Vol No. 1, Issue No. 1, 009 – 012,2011.
21. Chandramohan, D., Marimuthu, K. Applications of natural fiber composites for replacement of orthopaedic alloys, Proceedings of the
International Conference on Nanoscience, Engineering and Technology, 6167942, pp. 137-145,2011.
22. Chandramohan, D., Rajesh, S., Increasing combusting resistance for Hybrid composites, International Journal of Applied Engineering
Research,9(20), 6979-6985,2014.
23. Chandramohan, D. and Marimuthu, K., “Contribution of Biomaterials to Orthopaedics as Bone Implants – A Review”, International
Journal of Materials Science, Vol.5, No.3,445-463,2010.
24. Chandramohan.D., and A.Senthilathiban. Effects of chemical treatment on jute fiber reinforced composites, International Journal of
Applied Chemistry, 10 (1),153-162,2014.
25. S.Dinesh kumar and K. Purushothaman (2018): Enhancement of thermal conductivity in a plate heat exchanger by using nano particles
CNT, Al2O3,surfactant with De-ionised water as coolant, International Journal of Ambient Energy,
DOI:10.1080/01430750.2018.1562979.
26. Chandramohan, D., Bharanichandar, J. Natural fiber reinforced polymer composites for automobile accessories, American Journal of
Environmental Sciences,9(6), 494-504,2014.
27. Sathish,T., Periyasamy,P., Chandramohan,D., Nagabhooshanam, N., Modelling K-nearest neighbour technique for the parameter
prediction of cryogenic treated tool in surface roughness minimization, International Journal of Mechanical and Production
Engineering Research and Development, Volume 2018, Issue Special Issue, 2018, Article number IJMPERDSPL201883, Pages 705-
710.
28. S. Dinesh Kumar, K. Purushothaman, D. Chandramohan et al., ANN-AGCS for the prediction of temperature distribution and required
energy in hot forging process using finite element analysis, Materials Today: Proceedings,
DOI:https://doi.org/10.1016/j.matpr.2019.05.426.
29. Sathish, T., Chandramohan, D. Design and analysis of wind box segment in travelling grate stoker boiler using CFD, International
Journal of Recent Technology and Engineering,7(6), 287-290,2019.
30. Sathish,T., Periyasamy,P., Chandramohan,D., Nagabhooshanam, N., Modelling of cost based optimization system E-O-L disassembly
in reverse logistics, International Journal of Mechanical and Production Engineering Research and Development, Volume 2018, Issue
Special Issue, 2018, Article number IJMPERDSPL201883, Pages 711-716.
31. Chandramohan, D and John Presin Kumar A. Experimental data on the properties of natural fiber particle reinforced polymer
composite material, Data in Brief,13, pp. 460-468,2017.
32. Raja Ganesan Prabhakaran Vasantha-Srinivasan, Sengodan Karthi, Muthiah Chellappandian, Athirstam Ponsankar, Annamalai
Thanigaivel, Sengottayan Senthil-Nathan, Devarajan Chandramohan, Aspergillus flavus (Link) toxins reduces the fitness of dengue
vector Aedes aegypti (Linn.) and their non-target toxicity against aquatic predator, Microbial pathogenesis,128,281-287,2019.
33. DOI:https://doi.org/10.1016/j.micpath.2019.01.014.
34. J Bharamichandar, D Chandramohan, B Murali, Natural fibre reinforced polymer composite in synthetic bone grafting-a new approach,
J Mid East Appl Sci Technol,16,588-596, 2014.
35. Karthick, S. TDP: A Novel Secure and Energy Aware Routing Protocol for Wireless Sensor Networks, In International Journal of
Intelligent Engineering and Systems, Vol. 11, No. 2, pp. 76-84. 2018.
36. Sathish, T., Muthukumar, K., Palani Kumar, B. A study on making of compact manual paper recycling plant for domestic purpose,
International Journal of Mechanical and Production Engineering Research and Development, Vol. 8, No. Special Issue 7, pp. 1515-
1535, 2018.
37. Sathish, T., Jayaprakash, J. Multi period disassembly-to-order of end-of-life product based on scheduling to maximise the profit in
reverse logistic operation, International Journal of Logistics Systems and Management, Vol. 26, No. 3, pp. 402-419, 2017.
38. Sathish, T., Muthulakshmanan, A. Modelling of Manhattan K-nearest neighbor for exhaust emission analysis of CNG-diesel engine,
Journal of Applied Fluid Mechanics, Vol. 11, No. Special issue, pp. 39-44, 2018.
39. Sathish, T., Vijayakumar, M.D., Krishnan Ayyangar, A. Design and Fabrication of Industrial Components Using 3D Printing,
Materials Today: Proceedings, Vol. 5, No. 6, pp. 14489-14498, 2018.
40. Sathish, T. BCCS Approach for the Parametric Optimization in Machining of Nimonic-263 alloy using RSM, Materials Today:
Proceedings, Vol. 5, No. 6, pp. 14416-14422, 2018.
Authors: T. Naresh Kumar, M.K. Aravindan and A. Abraham Eben Andrews

Paper Title: Tensile, Flexural and Surface Hardness Properties of Wool Grit/Silicone Polymer Composites
Abstract: Grit fortified polymer Compounds obligate numerous tenders as a class of auxiliary ingredients as a
result of the instance of manufacture, generally minimal effort of generation. The grit which fills in as a
fortification in strengthened plastics might be engineered or regular. An examination has been completed to
utilize Wool grit which is a characteristic grit copiously accessible in India. The target of the contemporary graft
is to think about the impact of grit stacking and mechanical conduct of Wool grit fortified Silicone Polymer
Compoundss. This paper demonstrates the assessment of elasticity, flexural quality and external rigidity of the
Wool-Silicone Polymer Compounds. It likewise finishes up the impact of grit stacking on elasticity, flexural
quality and external rigidity of the Wool Silicone Polymer Compounds.

Keywords: Wool Grit; Silicone Polymer; Tensile test; Flexural test; Hardness test.

References:

1. R.Prasannasrinivas and Chandramohan.D., “Analysis of Natural Fiber Reinforced Composite Material for the Helmet Outer shell”,
International Journal of current Research, Vol.4,No.3,137-141,2012.
2. B.Murali and Chandramohan.D., “Fabrication of Industrial Safety Helmet by using Hybrid Composite Materials”, Journal of Middle
East Applied Science and Technology, 15,584-587,2014.
3. Murali, B., Chandra Mohan, D. Chemical treatment on hemp/polymer composites, Journal of Chemical and Pharmaceutical
Research,6(9), pp. 419-423.
757. 4. Pandyaraj, V., Ravi Kumar, L., Chandramohan, D. Experimental investigation of mechanical properties of GFRP reinforced with coir 4386-
and flax, International Journal of Mechanical Engineering and Technology,9, pp. 1034-1042,2018.
5. Murali, B., Chandra Mohan, D., Nagoor Vali, S.K., Muthukumarasamy, S., Mohan, A. Mechanical behavior of chemically treated
43
jute/polymer composites, Carbon - Science and Technology,6(1), pp. 330-335. 88
6. K Gurusami, K et.al.,(2019): A Comparative Study on Surface Strengthening Characterization and Residual Stresses of Dental Alloys
using Laser Shock Peening, International Journal of Ambient Energy, DOI: 10.1080/01430750.2019.1614987.
7. Sathish, T., Chandramohan, D. Experimental study and model development for on-line drill wear monitoring system using lab view,
International Journal of Recent Technology and Engineering,7(6), 281-286,2019.
8. Sathish, T and Chandramohan, D, Teaching methods and methodologies used in laboratories, International Journal of Recent
Technology and Engineering Volume 7, Issue 6, March 2019, Pages 291-293.
9. Chandramohan, D et al. Mechanical, Moisture Absorption, and Abrasion Resistance Properties of Bamboo–Jute–Glass Fiber
Composites. Journal of Bio- and Tribo-Corrosion (2019) 5:66.
10. DOI: https://doi.org/10.1007/s40735-019-0259-z
11. Chandramohan, D., Bharanichandar, J., Karthikeyan, P., Vijayan, R., Murali, B. ,Progress of biomaterials in the field of orthopaedics,
American Journal of Applied Sciences, 11 (4),623-630,2014.
12. Chandramohan, D.and Marimuthu, K., Natural fibre particle reinforced composite material for bone implant, European Journal of
Scientific Research, Vol.54, No.3,384-406,2011.
13. Chandramohan, D, et.al., “Applications of CT/CAD/RPT in the Futurestic Development of Orthopaedics and Fabrication of Plate and
Screw Material from Natural Fibre Particle Reinforced Composites for Humerus Bone Fixation – A Future Drift”, Malaysian Journal
of Educational Technology, Vol.10,No.12,73-81,2010.
14. Chandramohan, D and John Presin Kumar A. Fibre reinforced composites: A promising material for artificial limp. Data-Enabled
Discovery and Applications. 1-9. 2017.
15. DOI: https://doi.org/10.1007/s41688-017-0010-1
16. Chandramohan, D., Bharanichandar, J, Impact test on natural fiber reinforced polymer composite materials, Carbon - Science and
Technology,5(3), pp. 314-320,2013.
17. Chandramohan, D., Murali, B., Machining of composites - A review, Academic Journal of Manufacturing Engineering,12(3), 67-
71,2014.
18. Chandramohan.D., “Analysis On Natural Fiber Bone Plates”, European Journal of Experimental Biology, 4(2):323-332,2014.
19. Chandramohan, D., Rajesh, S,Study of machining parameters on natural fiber particle reinforced polymer composite material,
Academic Journal of Manufacturing Engineering12(3),72-77,2014.
20. D Chandramohan, K Marimuthu, Bio composite materials based on bio polymers and natural fibers-contribution as bone implants,
International Journal Of Advanced Medical Sciences And Applied Research, Vol No. 1, Issue No. 1, 009 – 012,2011.
21. Chandramohan, D., Marimuthu, K. Applications of natural fiber composites for replacement of orthopaedic alloys, Proceedings of the
International Conference on Nanoscience, Engineering and Technology, 6167942, pp. 137-145,2011.
22. Chandramohan, D., Rajesh, S., Increasing combusting resistance for Hybrid composites, International Journal of Applied Engineering
Research,9(20), 6979-6985,2014.
23. Chandramohan, D. and Marimuthu, K., “Contribution of Biomaterials to Orthopaedics as Bone Implants – A Review”, International
Journal of Materials Science, Vol.5, No.3,445-463,2010.
24. Chandramohan.D., and A.Senthilathiban. Effects of chemical treatment on jute fiber reinforced composites, International Journal of
Applied Chemistry, 10 (1),153-162,2014.
25. S.Dinesh kumar and K. Purushothaman (2018): Enhancement of thermal conductivity in a plate heat exchanger by using nano particles
CNT, Al2O3,surfactant with De-ionised water as coolant, International Journal of Ambient Energy,
DOI:10.1080/01430750.2018.1562979.
26. Chandramohan, D., Bharanichandar, J. Natural fiber reinforced polymer composites for automobile accessories, American Journal of
Environmental Sciences,9(6), 494-504,2014.
27. Sathish,T., Periyasamy,P., Chandramohan,D., Nagabhooshanam, N., Modelling K-nearest neighbour technique for the parameter
prediction of cryogenic treated tool in surface roughness minimization, International Journal of Mechanical and Production
Engineering Research and Development, Volume 2018, Issue Special Issue, 2018, Article number IJMPERDSPL201883, Pages 705-
710.
28. S. Dinesh Kumar, K. Purushothaman, D. Chandramohan et al., ANN-AGCS for the prediction of temperature distribution and required
energy in hot forging process using finite element analysis, Materials Today: Proceedings,
DOI:https://doi.org/10.1016/j.matpr.2019.05.426.
29. Sathish, T., Chandramohan, D. Design and analysis of wind box segment in travelling grate stoker boiler using CFD, International
Journal of Recent Technology and Engineering,7(6), 287-290,2019.
30. Sathish,T., Periyasamy,P., Chandramohan,D., Nagabhooshanam, N., Modelling of cost based optimization system E-O-L disassembly
in reverse logistics, International Journal of Mechanical and Production Engineering Research and Development, Volume 2018, Issue
Special Issue, 2018, Article number IJMPERDSPL201883, Pages 711-716.
31. Chandramohan, D and John Presin Kumar A. Experimental data on the properties of natural fiber particle reinforced polymer
composite material, Data in Brief,13, pp. 460-468,2017.
32. Raja Ganesan Prabhakaran Vasantha-Srinivasan, Sengodan Karthi, Muthiah Chellappandian, Athirstam Ponsankar, Annamalai
Thanigaivel, Sengottayan Senthil-Nathan, Devarajan Chandramohan, Aspergillus flavus (Link) toxins reduces the fitness of dengue
vector Aedes aegypti (Linn.) and their non-target toxicity against aquatic predator, Microbial pathogenesis,128,281-287,2019.
33. DOI:https://doi.org/10.1016/j.micpath.2019.01.014.
34. J Bharamichandar, D Chandramohan, B Murali, Natural fibre reinforced polymer composite in synthetic bone grafting-a new approach,
J Mid East Appl Sci Technol,16,588-596, 2014
35. Karthick, S. TDP: A Novel Secure and Energy Aware Routing Protocol for Wireless Sensor Networks, In International Journal of
Intelligent Engineering and Systems, Vol. 11, No. 2, pp. 76-84. 2018.
36. Sathish, T., Muthukumar, K., Palani Kumar, B. A study on making of compact manual paper recycling plant for domestic purpose,
International Journal of Mechanical and Production Engineering Research and Development, Vol. 8, No. Special Issue 7, pp. 1515-
1535, 2018.
37. Sathish, T., Jayaprakash, J. Multi period disassembly-to-order of end-of-life product based on scheduling to maximise the profit in
reverse logistic operation, International Journal of Logistics Systems and Management, Vol. 26, No. 3, pp. 402-419, 2017.
38. Sathish, T., Muthulakshmanan, A. Modelling of Manhattan K-nearest neighbor for exhaust emission analysis of CNG-diesel engine,
Journal of Applied Fluid Mechanics, Vol. 11, No. Special issue, pp. 39-44, 2018.
39. Madan, D., Sivakandhan, C., Sagadevan, S., Sathish, T. Ocean wave energy scenario in India, International Journal of Mechanical and
Production Engineering Research and Development, Vol. 2018, No. Special Issue, pp. 582-590, 2018.
40. Sathish, T. BCCS Approach for the Parametric Optimization in Machining of Nimonic-263 alloy using RSM, Materials Today:
Proceedings, Vol. 5, No. 6, pp. 14416-14422, 2018.

Authors: Sarada Prasad Parida, Pankaj Charan Jena

Paper Title: Design and Finite Element analysis of Thick walled Laminated Composite Pressure Vessel
Abstract: Composite materials in general offer a high potential for manufacturing of structures with featuring
an interesting mechanical performance, mainly with regards to specific stiffness, specific strength, damage
tolerance and energy absorption capability. In current analysis, glass fibre reinforced in epoxy resin to form a
laminated composite walled pressure vessel(filament winding) is considered for design. The purpose of this
work is primarily to perform finite element analysis (FEA) of a composite walled pressure vessel (CPV) under
different loads. Different design stresses and strains are evaluated using Lame’s equation. These outcomes are
tabulated and examined with the results of the steel walled pressure vessel used for LPG. It is foundthat CPV is a
suitable vessel for LPG storage and it can be replaced current LPG steel walled vessel to CPV.

Keywords: design, cylinder, composite walled, vessel.


4389-
References: 43
94
1. auchert, T.R. Optimum Design of A Reinforced Cylindrical Pressure Vessel, Journal of Composite Materials, 1981, 15: pp.390–402.
2. Eckold, G.C. (1985). A Design Method for Filament Wound GRP Vessels and Pipework, Composites, 16:pp. 41–47
3. Adali, S., Sumers, E.B. and Verijenko, V.E. Optimization of Laminated Cylindrical Pressure Vessels under Strength Criterion,
Composite Structures, 1993, 25(3): pp.305–312
4. Cohen D., Influence of Filament Winding Parameters on Composite Vessel Quality and Strength, Compos Part A-ApplSciManufac
1997; pp.1035-47
5. Cohen D., Mantell. S.C., Zhao. L., The Effect of Fiber Volume Fraction on Filament Wound Composite Pressure Vessel
758. Strength.composites Part B; 32; 2001; pp.413-429
6. Xu S.Q &.Yu, M.H, “Shakedown Anaysis of thick walled cylinders subjected to internal pressure with the inified strength criterion”,
International Journal of Pressure vessels & piping, 2005;Vol 82, ; pp.706-712.
7. Naser, S.A.I, and Osama, M.A.H.,Composite LPG Cylinders asan Alternative to Steel Cylinders: Finite Element Approach,
International Conference on Manufacturing and Materials Processing (ICMM 2006), Kuala Lumpur, Malaysia, 2006, ; pp.363-368
8. Antunes . P. J., Dias G. R., Nunes J. P. and Van Hattum . F. W. J., Finite Element Modelling of Thermoplastic Matrix Composite Gas
Cylinders, Journal of Thermoplastic Composite Materials, Vol. 21—September 2008 , ; pp. 411
9. Yue Z., Li. X., Numerical Simulation of All-Composite Compressed Natural Gas (CNG) Cylinders for Vehicle, Procedia Engineering
37 , 2012 ; pp.31 – 36
10. TaheriF. ,Advanced fiber-reinforced polymer (FRP) composites for the manufacture and rehabilitation of pipes and tanks in the oil and
gas industry. In: Bai J, editor. Advanced fiber-reinforced polymer (FRP) composites for structural applications. Sawston: Woodhead
Publishing Limited., 2013; pp. 662–704
11. Lepikhin, P. P. , Romashchenko, V. A. , and Bakhtina, E. V., Methods And Findings of Stress-Strain And Strength Analyses of
Multilayer Thick-Walled Anisotropic Cylinders Under Dynamic Loading (Review). Part 1. Experimental Studies, Strength of
Materials, Vol. 45, No. 1, January, 2013
12. Hemmatnezhad, M., Rahimi . G.H., Tajik M., Pellicano F., Experimental, numerical and analytical investigation of free vibrational
behavior of GFRP-stiffened composite cylindrical shells, Composite Structures, 120.10.1016/j.compstruct.2014.10.011.
13. Guz I.A., Menshykova M., Paik J.K., Thick-walled composite tubes for offshore applications: an example of stress and failure analysis
for filament-wound multi-layered pipes, Ships and Offshore Structures, 2015
14. Davies P., choqueuse D., Bigourdan B., Chachot P., Composite Cylinders for Deep Sea Applications: An Overview, Journal of
Pressure Vessel Technology, Dec 2016, Vol. 138 / 060904-1
15. Ahmad, M.I.G., Hoa, S.V., Flexural stiffness of thick walled composite tubes , Composite Structures, Volume 149, 1 August 2016, ;
pp.125-133
16. Ahmadi, I., Interlaminar stress analysis in general thick composite cylinder subjected to nonuniform distributed radial pressure,
Mechanics of Advanced Materials and Structures , Volume 24, 2017 - Issue 9, ; pp.773-788
17. Ramos, I., Park, Y.H., Sanchez, J.U., Analytical and Numerical Studies of a Thick Anisotropic Multilayered Fiber-Reinforced
Composite Pressure Vessel , J. Pressure Vessel Technology, 141(1), 011203 (Dec 07, 2018)
18. Arhant, M. ,Briancon, C., Burtin, C., Davis, P., Carbon/polyamide 6 thermoplastic composite cylinders for deep sea applications,
Composite StructuresVolume 212, 15 March 2019, ; pp.535-546.

Authors: Nageswara Rao Gottipati, A. Rama Prasath


A Multi-Agent Bio- Inspired System to Map Learners with Learning Resources using Clustering
Paper Title:
Based Personalization
Abstract: The work makes an examination of clustering methods in a multi-agent system which is fully
decentralized. This has the goal of grouping agents that have similar data or objectives as in the case of
traditional clustering. But, this adds to some more additional constraints wherein the agent will have to be in the
same place as opposed to being collected within a centralized database. For doing this, it will connect to agents
within a random network and will search for them in a peer-to-peer based fashion for the other agents that are
similar. The primary aim here was to tackle the basic problem in clustering on the Internet scale thus creating
methods where the agents may be grouped thus forming coalitions. For the purpose of investigating the
decentralized approaches and their feasibility, the work presents the K-means clustering, the multi-agent Firefly
Algorithm, (FA) and the Differential Evolution (DE). This is done for a reasonable number to times and will be
surprisingly good. The results of the experiment prove that the multi-agent firefly clustering has better
performance compared to that of a multi-agent K-Means clustering or a multi-agent DE clustering.

Keywords: Clustering, Data Mining, Differential Evolution (DE), Multi Agent Systems (MAS), K-Means
Clustering, Clustering and Firefly Algorithm (FA).

References:

1. Chaimontree, S., Atkinson, K., &Coenen, F. (2011, May). A multi-agent based approach to clustering: harnessing the power of agents.
In International Workshop on Agents and Data Mining Interaction (pp. 16-29). Springer, Berlin, Heidelberg.
2. Chaimontree, S., Atkinson, K., &Coenen, F. (2012). A framework for multi-agent based clustering. Autonomous Agents and Multi-
Agent Systems, 25(3), 425-446.
3. Wooldridge, M., & Jennings, N. R. (1995). Intelligent agents: Theory and practice. The knowledge engineering review, 10(2), 115-152.
4. Sycara, K. P. (1998). Multiagent systems. AI magazine, 19(2), 79.
5. Nandigam, D., Tirumala, S. S., &Baghaei, N. (2014, December). Personalized learning: Current status and potential. In e-Learning, e-
Management and e-Services (IC3e), 2014 IEEE Conference on (pp. 111-116). IEEE.
6. Cai, N., Diao, C., & Khan, M. J. (2015). A Novel Clustering Approach Based on Group Quasi-Consensus of Unstable Dynamic Linear
High-Order Multi-Agent Systems. arXiv preprint arXiv:1501.02588.
7. Santos, D. S., De Oliveira, D., &Bazzan, A. L. (2009). A multiagent, multiobjective clustering algorithm. In Data mining and multi-
agent integration (pp. 239-249). Springer, Boston, MA.
8. Kubalik, J., Tichy, P., Sindelar, R., &Staron, R. J. (2010). Clustering methods for agent distribution optimization. IEEE Transactions
on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 40(1), 78-86.
9. Ozaeta, L., & Graña, M. (2017, June). Finding Communities in Recommendation Systems by Multi-agent Spatial Dynamics. In
International Conference on Hybrid Artificial Intelligence Systems (pp. 577-587). Springer, Cham. 4395-
759. 10. Melesko, J., & Kurilovas, E. (2018, June). Semantic Technologies in e-Learning: Learning Analytics and Artificial Neural Networks in 44
Personalised Learning Systems. In Proceedings of the 8th International Conference on Web Intelligence, Mining and Semantics (p. 34). 03
ACM.
11. Selvi, C., &Sivasankar, E. (2018). A novel Adaptive Genetic Neural Network (AGNN) model for recommender systems using
modified k-means clustering approach. Multimedia Tools and Applications, 1-28.
12. Lin, P., Wang, Y., Qi, H., & Hong, Y. (2018). Distributed Consensus-Based K-Means Algorithm in Switching Multi-Agent Networks.
Journal of Systems Science and Complexity, 31(5), 1128-1145.
13. Choudhary, N., & Bharadwaj, K. K. (2018). Evolutionary learning approach to multi-agent negotiation for group recommender
systems. Multimedia Tools and Applications, 1-23.
14. Jin, J., Zhong, M., Lin, X., &Changhui, T. (2016). A New Cluster Analysis Based on Combinatorial Particle Swarm Optimization
Algorithm. International Conference on Education, Management, Computer and Society, 476-479.
15. Inkaya, T., Kayaligil, S., &Özdemirel, N. E. (2015). Ant colony optimization based clustering methodology. Applied Soft Computing,
28, 301-311.
16. Abbasian, M. A., Nezamabadi-pour, H., &Amoozegar, M. (2015). A clustering based archive multi objective gravitational search
algorithm. FundamentaInformaticae, 138(4), 387-409.
17. Fister, I. (2017). Multi-agent system based on self-adaptive differential evolution for solving dynamic optimization problems.
Proceedings of the 2017 4th Student Computer Science Research Conference, 35-41.
18. Ogston, E., Overeinder, B., Van Steen, M., & Brazier, F. (2003, July). A method for decentralized clustering in large multi-agent
systems. In Proceedings of the second international joint conference on Autonomous agents and multiagent systems (pp. 789-796).
ACM.
19. Mobascher, B., Dai, H., Luo, T., Sun, Y., & Zhu, J. (2000). Combining Web usage and content mining for more effective
personalization. In Proceedings of the International Conference on E-Commerce and Web Technologies.
20. Gomathi, D., &Tajunisha, N. (2012). Improving the accuracy and efficiency of k-means algorithm by using less similarity based
clustering technique for better initial centroids. International Journal of Computer Science and Management Research, 1 (4), 698-706.
21. Altayeva, A., &Im Cho, Y. (2016). Multi-agent based on K-means Algorithm for Intelligent Decision Making Model. Korean Institute
of Intelligent Systems, 26(1), 87-88.
22. Khan, D. M., &Mohamudally, N. (2010, June). A multiagent system (MAS) for the generation of initial centroids for k-means
clustering data mining algorithm based on actual sample datapoints. In Software Engineering and Data Mining (SEDM), 2010 2nd
International Conference on (pp. 495-500). IEEE.
23. Wang, X. M., & Wang, J. B. (2013). Research and Improvement on K-Means Clustering Algorithm. In Advanced Materials Research
(Vol. 756, pp. 3231-3235). Trans Tech Publications.
24. Hosseini, M., Sadeghzade, M., &Nourmandi-Pour, R. (2014). An efficient approach based on differential evolution algorithm for data
clustering. Decision Science Letters, 3(3), 319-324.
25. Yang, X. S., & He, X. (2013). Firefly algorithm: recent advances and applications. arXiv preprint arXiv:1308.3898.
26. Zhang, L., Liu, L., Yang, X. S., & Dai, Y. (2016). A novel hybrid firefly algorithm for global optimization. PloS one, 11(9), e0163230.
27. Hassanzadeh, T., &Meybodi, M. R. (2012, May). A new hybrid approach for data clustering using firefly algorithm and K-means. In
Artificial Intelligence and Signal Processing (AISP), 2012 16th CSI International Symposium on (pp. 007-011). IEEE.
Authors: N S R Phanindra Kumar, P.V.G.D Prasad Reddy, G. Srinivas
2-D histogram Based Multilevel Thresholding for Image Segmentation by Hybrid Bacterial
Paper Title:
Foraging Optimization and Particle Swarm Optimization
Abstract: The objective of image segmentation is to extract meaningful clusters in given image. Meaningful
clusters are possible with perfect threshold values which are optimized by assuming Renyi entropy as an
objective function. A 1-D histogram based multilevel thresholding is computationally complex and segmented
image visual quality comparatively low because of equal distribution of energy over the entire histogram plan.
To overcome the problem, a 2-D histogram based multilevel thresholding is proposed in this paper by
maximizing the Renyi entropy with a novel Hybrid Bacterial Foraging Optimization Algorithm and Particle
Swarm Optimization (hBFOA-PSO) and the obtained results are compared with state of art optimization
techniques. The results of the proposed model have been evaluated on a standard image dataset. The results
obtained after implementing a 2-D histogram suggest hBFOA-PSO can be effectively used won multilevel
thresholding problems resulting in a high accuracy.

Keywords: Image segmentation; 2-D histogram, Image thresholding; Ryeni entropy; Bacterial Foraging
Optimization Algorithm and Particle Swarm Optimizations.

References:

1. De Luca. A, S. Termini, A definition of non-probabilistic entropy in the setting of fuzzy sets theory, Inf. Control 20 (1972) 301–312.
2. Sezgin. M, B. Sankur, Survey over image thresholding techniques and quantitative performance evaluation, J. Electron. Imaging 13 (1)
(2004) 146–165.
3. Kapur. J. N, P.K.Sahoo, A.K.C Wong, A new method for gray-level picture thresholding using the entropy of the histogram”, Computer
Vision Graphics Image Process. 29 (1985) 273 – 285.
4. Otsu. N, “A threshold selection from gray level histograms” IEEE Transactions on System, Man and Cybernetics 66, 1979.
5. Sathya. P. D and R. Kayalvizhi, “Optimal multilevel thresholding using bacterial foraging algorithm”, Expert Systems with 4404-
Applications, Vol. 38, pp. 15549–15564, 2011.
6. Mbuyamba. M, J. Cruz-Duarte , J. Avina-Cervantes, C. Correa-Cely, D. Lindner, and C. Chalopin, “Active contours driven by Cuckoo 44
Search strategy for brain tumour images segmentation”, Expert Systems With Applications, Vol. 56, pp. 59–68, 2016. 11
7. Ye. Z, M. Wang, W. Liu, S. Chen, “Fuzzy entropy based optimal thresholding using bat algorithm”, Applied Soft Computing, Vol. 31,
pp. 381–395, 2015.
8. Agrawal. S, R. Panda, S. Bhuyan, B.K. Panigrahi, “Tsallis entropy based optimal multilevel thresholding using cuckoo search
algorithm”, Swarm and Evolutionary Computation, Vol. 11 pp. 16–30, 2013.
760. 9. Horng. M and T. Jiang, “Multilevel Image Thresholding Selection based on the Firefly Algorithm”, Symposia and Workshops on
Ubiquitous, Autonomic and Trusted Computing, pp. 58–63, 2010.
10. Bhandari. A. K, A. Kumar, G. K. Singh, "Tsallis entropy based multilevel thresholding for colored satellite image segmentation using
evolutionary algorithms”, Expert Systems With Applications, Vol. 42, pp. 8707–8730, 2015.
11. Naidu. M.S.R, Rajesh Kumar. P, “Tsallis Entropy Based Image Thresholding for Image Segmentation”, Computational Intelligence in
Data Mining, Vol. 556, pp 371-379, 2017.
12. Naidu. M.S.R, Rajesh Kumar. P, Karri. C, “Shannon and Fuzzy Entropy based Evolutionary Image Thresholding for Image
Segmentation” Alexandria Engineering Journal, doi.org/10.1016/j.aej.2017.05.024, 2017.
13. Rényi, A, “On measures of information and entropy”, In Proceedings of the 4th Berkeley symposium on mathematics, statistics and
probability, pp.547–561, 1960.
14. Soham S and Swagatam Das, “Multilevel Image Thresholding Based on 2D Histogram and Maximum Tsallis Entropy A Differential
Evolution Approach”, IEEE Transactions On Image Processing, Vol. 22, No. 12, pp. 4788, 2013.
15. Passino KM (2002). Biomimicry of bacterial foraging for distributed optimization and control, IEEE Control Systems Magazine, 22: 52–
67.
16. Kennedy J, Eberhart RC (1995). A new Optimizer using Particle Swarm Theory, in Proceedings of Sixth International Symposium on
Micro Machine and Human Science, Nagoya, Japan, 6: 39-43.
17. Karri. C and Jena. UR, “Hybrid gravitational search and pattern search–based image thresholding by optimizing Shannon and fuzzy
entropy for image compression”, International Journal of Image and Data Fusion, Vol. 8, No. 3, 2017.
18. Rényi, A, “On measures of information and entropy”, In Proceedings of the 4th Berkeley symposium on mathematics, statistics and
probability, pp.547–561, 1960.
19. Kumar N.S.R., Phanindra & Reddy P.V.G.D., Prasad. (2019). Evolutionary Image Thresholding for Image Segmentation. International
Journal of Computer Vision and Image Processing. 9. 17-34. 10.4018/IJCVIP.2019010102.

Authors: Shruti Patil, Shashank Joshi


761. Paper Title: Demystifying User Data Privacy in the World of IOT
Abstract: Internet of Things (IoT) would touch upon almost all aspects of everyday life, as a consequence of 4412-
which, everything (i.e. living and non-living things) will have a counterpart virtual identities on the internet 44
which would be readable, addressable and locatable. Although it would empower its users with 24×7 18
connectivity around the global world, unknowingly they would also provide it permission to peep into user’s
personal world, which can generate a huge risk on the usability of IoT by users. Thus analyzing the framework
of IOT from the perspective of user data protection is a very crucial self-test which is required for IoT
implementation. Often the term security and privacy are used interchangeably, but in the IoT environment, both
these concept would play a crucial but differentiating role. In this paper, we have scanned the IoT environment
with the perspective of privacy requirements, possible threats and the mitigating solutions which are currently in
use.

Keywords: Data Privacy, Anonymization, Differential Privacy, Security, Access Control.

References:

1. Sundmaeker, Harald, et al. "Vision and challenges for realising the Internet of Things." Cluster of European Research Projects on the
Internet of Things, European Commision 3.3 (2010): 34-36.
2. Bandyopadhyay, Soma, et al. "Role of middleware for internet of things: A study." International Journal of Computer Science and
Engineering Survey 2.3 (2011): 94-105.
3. Ziegeldorf, Jan Henrik, Oscar Garcia Morchon, and Klaus Wehrle. "Privacy in the Internet of Things: threats and challenges." Security
and Communication Networks 7.12 (2014): 2728-2742.
4. Ren, K., Wang, C., & Wang, Q. (2012). Security challenges for the public cloud. IEEE Internet Computing, (1), pp. 69-73.
5. Atzori, Luigi, Antonio Iera, and Giacomo Morabito. "The internet of things: A survey." Computer networks 54.15 (2010): 2787-2805
6. Bekara, Chakib. "Security Issues and Challenges for the IoT-based Smart Grid." Procedia Computer Science 34 (2014): 532-537.
7. Mahalle, Parikshit N., Bayu Anggorojati, Neeli R. Prasad, and Ramjee Prasad. "Identity authentication and capability based access
control (iacac) for the internet of things." Journal of Cyber Security and Mobility 1, no. 4 (2013): 309-348.
8. Sicari, S., A. Rizzardi, L. A. Grieco, and A. Coen-Porisini. "Security, privacy and trust in Internet of Things: The road ahead."
Computer Networks 76 (2015): 146-164.
9. Stankovic, John. "Research directions for the internet of things." Internet of Things Journal, IEEE 1, no. 1 (2014): 3-9.
10. Suo, Hui, Jiafu Wan, Caifeng Zou, and Jianqi Liu. "Security in the internet of things: a review." In Computer Science and Electronics
Engineering (ICCSEE), 2012 International Conference on, vol. 3, pp. 648-651. IEEE, 2012.
11. Yan, Zheng, Peng Zhang, and Athanasios V. Vasilakos. "A survey on trust management for Internet of Things." Journal of network and
computer applications 42 (2014): 120-134.
12. Aleisa, Noura, and Karen Renaud. "Privacy of the internet of things: a systematic literature review." Proceedings of the 50th Hawaii
International Conference on System Sciences. 2017.
13. Ferrag, Mohamed Amine, et al. "Authentication protocols for Internet of Things: A comprehensive survey." Security and
Communication Networks 2017 (2017).
14. Kim, Hokeun, and Edward A. Lee. "Authentication and Authorization for the Internet of Things." IT Professional 19.5 (2017): 27-33.
15. Deng, Mina, et al. "A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements."
Requirements Engineering 16.1 (2011): 3-32.
16. Appari, Ajit, and M. Eric Johnson. "Information security and privacy in healthcare: current state of research." International journal of
Internet and enterprise management 6.4 (2010): 279-314.
17. Rao, P. Ram Mohan, S. Murali Krishna, and AP Siva Kumar. "Privacy preservation techniques in big data analytics: a survey." Journal
of Big Data 5.1 (2018): 33.
18. Abouelmehdi, Karim, Abderrahim Beni-Hessane, and Hayat Khaloufi. "Big healthcare data: preserving security and privacy." Journal
of Big Data 5.1 (2018): 1.
19. Huang, Qinlong, Yixian Yang, and Licheng Wang. "Secure data access control with ciphertext update and computation outsourcing in
fog computing for Internet of Things." IEEE Access 5 (2017): 12941-12950.
20. Zheng, Xu, Zhipeng Cai, and Yingshu Li. "Data linkage in smart internet of things systems: A consideration from a privacy
perspective." IEEE Communications Magazine 56.9 (2018): 55-61.
21. Ambrosin, Moreno, et al. "On the feasibility of attribute-based encryption on internet of things devices." IEEE Micro 36.6 (2016): 25-
35.
22. Mushtaq, Muhammad Faheem, et al. "Cloud computing environment and security challenges: A review." International Journal of
Advanced Computer Science and Application 8.10 (2017): 183-195.
23. Al-Garadi, Mohammed Ali, et al. "A survey of machine and deep learning methods for internet of things (IoT) security." arXiv preprint
arXiv:1807.11023 (2018).
24. Mehrotra, Sharad, et al. "TIPPERS: A privacy cognizant IoT environment." 2016 IEEE International Conference on Pervasive
Computing and Communication Workshops (PerCom Workshops). IEEE, 2016
25. Liu, Yuhong, et al. "A survey of security and privacy challenges in cloud computing: solutions and future directions." Journal of
Computing Science and Engineering 9.3 (2015): 119-133.
26. Shaikh, Azharuddin, and Shruti Patil. "Role of Differential Privacy in a New Age Data Privacy Environment." International Journal of
Pure and Applied Mathematics 118.24 (2018).
27. Dey, Sumita, et al. "A Survey of the Internet of Things." IOSR Journal of Computer Engineering 18.1 (2016): 80-85.

Authors: K Asokan, G Brindha, S Valarmathi


A Preliminary Exploration on Health Care Professionals (Doctors) Stress due to Competition,
Paper Title:
Advancement of Technology & Environment at Chennai
Abstract: Due to the advancement of technological changes in the health care sector, health care professionals
such as doctors, nurses, technicians, etc, are expected to work more intensely and successfully deliver more. The
present study focuses on stress among young doctors due to rapid technological advent and intense
industrialisation, especially in the metropolitan city Chennai. Data was collected from eighty seven young
762. doctors through structured questionnaire. In the modern era, people who reside in the metropolitan city like
4419-
Chennai are well educated, wealthy and aware of new innovative and sophisticated equipments, medicine,
44
facilities, etc. and these are inevitable part of technological development. Hence the doctors have to update
20
themselves in all field related technologies. They feel stressed physically and mentally when there is a lacuna in
the competitive environment.

Keywords: Stress, Technology, Health Care Professionals.


References:

1. Sharma E. Role Stress among doctors. Journal of Health Management. April 2005;7(1):151-156.
2. Familoni OB. An overview of stress in medical practice. Afr Health Sci. 2008;8(1):6–7.
3. Kakunje A. Stress Among Health Care Professionals - The Need for Resiliency. Online J Health Allied Scs. 2011;10(1):1.
4. Firth-Cozens J. Doctors, their wellbeing, and their stress. BMJ 2003 Mar 29; 326:670-671.
5. A study on Personal causes among Women in Software Industry A. Sumathi.
6. Workplace Stress among Doctors in Government Hospitals – InfanaBaba,U.P.

Authors: Jagadeesh Bodapati, Atava G V Karthik Raju, Durgachandramouli Yenugu

Paper Title: Estimation of Energy in Complementary Metal Oxide Semiconductor using VLSI Design
Abstract: Expanding interest for versatile gadgets for figuring and correspondence, just as different
appliances, has required longer life span, low credence, and low control utilization. So as to fulfill these
necessities, inquire about exercises concentrating on small energy/less voltage intend systems are in progress.
While control is currently solitary of the devise choice factors, the extended devise area requisite for lower
energy has additionally expanded the intricacy of an as of now non-trifling assignment. Lower energy devise
fundamentally includes two accompanying errands: control estimation and investigation and energy
minimization. These undertakings should be completed at every one of the levels in the design chain of
command, to be specific, the social, and engineering, rationale. During this overview of the present condition of
the pasture, a significant number of the notable energy assessment and reduction strategies suggested for lower
energy VLSI devise are audited. In this research work, correlation of intensity evaluation of different
fundamental CMOS cell configurations on different innovations is done. The exploration concerns so as to
763. create the lower energy devise are likewise examined in the article. 4421-
44
Keywords: Energy Dissipation, CMOS and VLSI Design. 23
References:

1. Kanika K, Arti N, “Power Estimation Analysis for CMOS Cell Structures”, Int. Jou. of Advances in Engg. & Tech., Vol. 3, Issue 2, pp.
293-301, 2012.
2. Bakoglu H, “Circuits, Interconnections, and Packaging for VLSI”, Addison-Wesley, Menlo Park, CA, 1990.
3. Lee K W, Sechen C, “A new global router for row-based layout", In Proc. of the IEEE Int. Conf. on Computer Aided Design, pp.180-
183, 1988.
4. Lillis J, Cheng C K, Lin T T Y, "Optimal wire sizing and buffer insertion for low power and a generalized delay model", In Proc. of the
Int. Conf. on Computer Design, pp.138-143, 1995.
5. Prasad S C, Roy K, "Circuit optimization for minimization of power consumption under delay constraint", In Proc. of the 1994 Int.
Workshop on Low Energy Design, pp.15-20, 1994.
6. Hong X L, Huang J, Cheng C K, Kuh E S, "FARM: an efficient feed-through pin assignment algorithm”, In Proc. of the 29th Design
Automation Conference, pp.530-535, 1992.

Authors: Atul Bansal, Aysha Faraj Mohamed Abualroos


A Technical Recitation on Efficiency of Islamic and Traditional Banking System in Kingdom of
Paper Title:
Bahrain
Abstract: Banking industry plays a vital role in the for economic development of a country. This research aims
at identifying which banking regime proves to be more efficient and its significance using Financial Ratio
Analysis (FRA), composed of cost efficiency, revenue efficiency and profit efficiency ratios along with the One-
way ANOVA test. The traditional banking system governs the financial sector by dealing with the majority of
financial transactions of a country and the existence of Islamic and conventional banks has contributed for the
development of the economy. The present study focuses on the comparative analysis of financial performance of
Islamic and traditional banks in terms of cost and income in Bahrain. The study uses financial tools like
profitability, liquidity and solvency, commitment to economy and community, efficiency and productivity of
both streams of banks. The findings indicate that the traditional banking system is superior in terms of cost,
revenue and profit efficiencies, furthermore, the results of the multiple regression analysis on the banks’ return
on assets and return on equity imply that the efficiency of Islamic banks have more influence on their
profitability compared to their traditional counterparts. Inflation had minimal effect on the efficiency of both
764. banking system.
4424-
44
Keywords: Islamic banks; Traditional banks; Performance analysis; Ratio analysis; trendanalysis.
31
References:
1. Ahmad, E. F., Shihama, M., Tarmizi, M., Ashikin, N., Jibril, S. M., Djama, S. I., &Muneeza, A. (2017). Tawarruq as a product for
financing within the Islamic banking system: a case study of Malaysian Islamic banking system. International journal of management
and applied research, 4(1), 31-43. Retrieved from: http://www.ijmar.org/v4n1/17-004.pdf
2. Aliyu, S., Hassan, M. K., Mohd Yusof, R., &Naiimi, N. (2017). Islamic banking sustainability: A review of literature and directions for
future research. Emerging Markets Finance and Trade, 53(2), 440-470. Retrieved from:
http://download.xuebalib.com/xuebalib.com.30529.pdf
A. Samad (2004) “Performance Of Interest-Free Islamic Banks Vis-À-Vis Interest-Based Conventional Banks Of Bahrain,” IIUM Journal
of Economics and Management.
3. Bashir, Abdel-Hameed M. (2001)"Assessing the performance of Islamic banks: Some evidence from the Middle East.".
4. Fletcher, A. J. (2017). Applying critical realism in qualitative research: methodology meets method. International Journal of Social
Research Methodology, 20(2), 181-194. Retrieved from:
http://www.academia.edu/download/43243901/Fletcher__IJSRM_2016__Critical_Realism_Accepted_Manuscript.pdf
5. Hawaldar, I.T., Lokesha, K. A. Kumar, Pinto, P., Sison,S.M. (2017). “Performance Analysis of Commercial Banks in the Kingdom of
Bahrain (2001-2015)”, International Journal of Economics and Financial Issues, 7(3), 1-9. Available at http: www.econjournals.com
6. Iqbal, M., & Molyneux, P. (2016). Thirty years of Islamic banking: History, performance and prospects. Springer. Retrieved from:
http://www.academia.edu/download/45443106/20.pdf
7. Iqbal, Z., &Quibtia, M. (2017). Theoretical Differences between Islamic Banking and Conventional Banking. International Journal of
Business and Social Science, 8(1). Retrieved from: https://su.diva-portal.org/smash/get/diva2:914434/FULLTEXT01.pdf
8. Kumar, R. (2019). Research methodology: A step-by-step guide for beginners. Sage Publications Limited. Retrieved from:
https://books.google.co.in/books?hl=en&lr=&id=J2J7DwAAQBAJ&oi=fnd&pg=PP1&dq=research+methodology&ots=cuqkFBMHm
h&sig=xq79glZpSCXui3qyZh4WAF2RMO0
9. M. Hanif, (2014) “Differences and Similarities in Islamic and Conventional Banking.” International Journal of Business and Social
Sciences, vol.2.
10. McCusker, K., &Gunaydin, S. (2015). Research using qualitative, quantitative or mixed methods and choice based on the
research. Perfusion, 30(7), 537-542. Retrieved from:
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.968.2338&rep=rep1&type=pdf
11. Waemustafa, W., &Sukri, S. (2016). Systematic and unsystematic risk determinants of liquidity risk between Islamic and conventional
banks. Retrieved from:
https://www.researchgate.net/profile/Waeibrorheem_Waemustafa/publication/309664710_Systematic_and_Unsystematic_Risk_Deter
minants_of_Liquidity_Risk_Between_Islamic_and_Conventional_Banks/links/582d1dd808aef19cb8104a1b/Systematic-and-
Unsystematic-Risk-Determinants-of-Liquidity-Risk-Between-Islamic-and-Conventional-Banks.pdf
12. Walliman, N. (2017). Research methods: The basics. Routledge. Retrieved from:
http://instructor.sdu.edu.kz/~alimzhan/Research%20Tools%20and%20Methods/Books/Nicholas%20Walliman-
Research%20Methods_%20The%20Basics%20-Routledge%20(2010).pdf.
Authors: Vanaja Shivakumar

Paper Title: Reduced Complexity Trellis for Coded Modulation on Channels Subjected to ISI
Abstract: The objective in this paper is to analyze the structural complexity of the non-binary coded
modulation schemes for transmission over the digital communication channels which are band-limited and
subjected to Intersymbol Interference (ISI). The design of reduced complexity M-QAM Coded Modulation
schemes are analyzed algebraically. The performance is demonstrated through simulation.

Keywords: M-QAM; Reduced-Complexity; Structural-Complexity; non-binary; Analyze.

References:

1. Ungerboeck. G., “Trellis-Coded Modulation with Redundant Signal Sets -Part I: Introduction,” IEEE Commun. Mag., Vol. 25,
No. 2, pp. 5-21, Feb 1987.
2. Eyuboglu M.V. and Qureshi S. U. H., “Reduced-State Sequence Estimation with Set Partitioning and Decision Feedback,” IEEE
765. Trans. Commun., Vol. 36, pp. 13-20, Jan. 1988. 4432-
3. Chevillat P. R. and Eleftherious. E., “Decoding of Trellis-Encoded Signals in the Presence of Intersymbol Interference and Noise,”
IEEE Trans. Commun., Vol. COM-37, No. 7, pp. 669-676, July 1989.
44
4. Eyuboglu M.V. and Qureshi S.U.H., “Reduced-State Sequence Estimation for coded Modulation of Intersymbol Interference 36
Channels,” IEEE J. Selected Areas in Communications., Vol. 7, pp. 989-995, Aug 1989.
5. R. Raheli; A. Polydoros; Ching-Kae Tzou, “Per-Survivor Processing: a general approach to MLSE in uncertain environments,” IEEE
Transactions on Communications, Volume: 43, Issue: 2/3/4, Feb./March/April 1995.
6. Albert M. Chan, Gregory W. Wornell, “A class of Block-Iterative Equalizers for Intersymbol Interference Channels: Fixed Channel
Results,” IEEE Trans. on Commun., Vol. 49, No.11, Nov. 2001.
7. Qi Wang, Lei Wei, and Rodney A. Kennedy, “Iterative Viterbi Decoding, Trellis Shaping, and Multilevel Structure for High-rate
Parity-Concatenated TCM,” IEEE Trans. Commun., Vol. 50, No. 1,pp. 48-55, Jan 2002.
8. Maunder. R. G., Kliewer. J., S. X. Ng, Wang. J., Yang. L -L., Hanzo. L., “Joint Iterative Decoding of Trellis-Based VQ and
TCM,” IEEE Transactions on Wireless Communications, Vol. 6, pp. 1327-136, April. 2007.
9. Fabian Schuh and Johannes B. Huber, “Low Complexity Decoding for Higher Order Punctured Trellis-Coded Modulation Over
Intersymbol Interference Channels,” IEEE Trans. Commun., Vol. 43, Issue 2/3/4, 27 May, 2014
10. V. Prasanth, Rubbia Tasneem, “Speed and Power Optimization of FPGA’S Based on Modified Viterbi Decoder,”
International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, ISSN Online (2278-8875),
Print (2320-3765), Vol.3, Issue 11, Nov.14.

Authors: D Ramesh, B Rama


A Light Weight Cryptographic Technique for Secure Outsourcing and Retrieval of Data in Cloud
Paper Title:
Computing
Abstract: Outsourcing large volumes of data to public cloud has the potential benefits to consumers. It also
brings security issues as the cloud is treated as untrusted from the user point of view. Security issues may arise
due to many reasons such as virtualization, resource pooling, elasticity, hidden hardware problems besides
internal and external attacks launched by adversaries. Service Level Agreements (SLAs) between Cloud Service
Provider (CSP) and cloud consumer are to be honoured for better social welfare. Therefore, it is indispensable to
have mechanisms to ensure security to outsourced data when it is at rest and when it is in transit as well.
Towards this end, many solutions came as found in the literature. However, most of the cryptographic methods
766. employed were expensive. It is still an open challenge to develop light weight cryptographic methods for secure
4437-
storage and retrieval or search for outsourced encrypted data. In this paper we proposed a methodology for light
44
weight encryption which proved to be effective and suitable for cloud computing environments. An algorithm
43
named Hybrid Lightweight Data Encryption (HLDE) is proposed and implemented. Empirical study is made on
the same to validate our approach. The experimental results revealed that the proposed method is better than the
state of the art in terms of high performance and strong security to outsourced data in cloud computing.

Keywords: Cloud computing, security issues in cloud computing, data storage security, lightweight encryption,
secure outsourcing.

References:
1. Fu, Z., Sun, X., Linge, N., & Zhou, L. (2014). Achieving effective cloud search services: multi-keyword ranked search over encrypted
cloud data supporting synonym query. IEEE Transactions on Consumer Electronics, 60(1), 164–172.
2. Wang, J., Ma, H., Tang, Q., Li, J., Zhu, H., Ma, S., & Chen, X. (2013). Efficient verifiable fuzzy keyword search over encrypted data in
cloud computing. Computer Science and Information Systems, 10(2), 667–684.
3. Fu, Z., Sun, X., Ji, S., & Xie, G. (2016). Towards efficient content-aware search over encrypted outsourced data in cloud. IEEE
INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications. P1-9.
4. Zheng, Q., Xu, S., & Ateniese, G. (2014). VABKS: Verifiable attribute-based keyword search over outsourced encrypted data. IEEE
INFOCOM 2014 - IEEE Conference on Computer Communications. P1-9.
5. Fu, Z., Wu, X., Guan, C., Sun, X., & Ren, K. (2016). Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data
with Accuracy Improvement. IEEE Transactions on Information Forensics and Security, 11(12), 2706–2716.
6. Wang, B., Yu, S., Lou, W., & Hou, Y. T. (2014). Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud.
IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
7. Fu, Z., Ren, K., Shu, J., Sun, X., & Huang, F. (2016). Enabling Personalized Search over Encrypted Outsourced Data with Efficiency
Improvement. IEEE Transactions on Parallel and Distributed Systems, 27(9), 2546–2559.
8. Wang, C., Ren, K., Shucheng Yu, & Urs, K. M. R. (2012). Achieving usable and privacy-assured similarity search over outsourced
cloud data. 2012 Proceedings IEEE INFOCOM. P1-9.
9. Ming Li, Shucheng Yu, Ning Cao and Wenjing Lou. (2010). Authorized Private Keyword Search over Encrypted Personal Health
Records in Cloud Computing, p1-12.
10. FU, Z., SUN, X., LIU, Q., ZHOU, L., & SHU, J. (2015). Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search
over Encrypted Cloud Data Supporting Parallel Computing. IEICE Transactions on Communications, E98.B(1), 190–200.
11. Wang, C., Cao, N., Ren, K., & Lou, W. (2012). Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data.
IEEE Transactions on Parallel and Distributed Systems, 23(8), 1467–1479.
12. Xia, Z., Wang, X., Sun, X., & Wang, Q. (2016). A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud
Data. IEEE Transactions on Parallel and Distributed Systems, 27(2), 340–352.
13. Wang, C., Cao, N., Li, J., Ren, K., & Lou, W. (2010). Secure Ranked Keyword Search over Encrypted Cloud Data. 2010 IEEE 30th
International Conference on Distributed Computing Systems. P1-10.
14. Cao, N., Wang, C., Li, M., Ren, K., & Lou, W. (2014). Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data.
IEEE Transactions on Parallel and Distributed Systems, 25(1), 222–233.
15. Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., & Lou, W. (2010). Fuzzy Keyword Search over Encrypted Data in Cloud Computing.
2010 Proceedings IEEE INFOCOM. P1-5.
16. Selvakumar, C., Rathanam, G. J., & Sumalatha, M. R. (2013). PDDS - Improving cloud data storage security using data partitioning
technique. 2013 3rd IEEE International Advance Computing Conference (IACC). P1-5.
17. Fu, Z., Huang, F., Ren, K., Weng, J., & Wang, C. (2017). Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs
Over Encrypted Outsourced Data. IEEE Transactions on Information Forensics and Security, 12(8), 1874–1884.
18. Khan, N. S., Krishna, C. R., & Khurana, A. (2014). Secure ranked fuzzy multi-keyword search over outsourced encrypted cloud data.
2014 International Conference on Computer and Communication Technology (ICCCT). P1-9.
19. Fu, Z., Huang, F., Sun, X., Vasilakos, A., & Yang, C.-N. (2016). Enabling Semantic Search based on Conceptual Graphs over
Encrypted Outsourced Data. IEEE Transactions on Services Computing, 1–1.
20. Koo, D., Hur, J., & Yoon, H. (2013). Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud
storage. Computers & Electrical Engineering, 39(1), 34–46
21. Mohd Rizuan Baharon, Qi Shi and David Llewellyn-Jones. (2015). A New Lightweight Homomorphic Encryption Scheme for Mobile
Cloud Computing. IEEE, p1-9.
22. Singh, S., Sharma, P. K., Moon, S. Y., & Park, J. H. (2017). Advanced lightweight encryption algorithms for IoT devices: survey,
challenges and solutions. Journal of Ambient Intelligence and Humanized Computing. P1-18.
23. Changing Liang, Ning Ye, Malekian, R., & Ruchuan Wang. (2016). The hybrid encryption algorithm of lightweight data in cloud
storage. 2016 2nd International Symposium on Agent, Multi-Agent Systems and Robotics (ISAMSR). P1-7.
24. Pitchai, R., Jayashri, S., & Raja, J. (2016). Searchable Encrypted Data File Sharing Method Using Public Cloud Service for Secure
Storage in Cloud Computing. Wireless Personal Communications, 90(2), 947–960.
25. Li, M., Jia, W., Guo, C., Sun, W., & Tan, X. (2015). LPSSE: Lightweight Phrase Search with Symmetric Searchable Encryption in
Cloud Storage. 2015 12th International Conference on Information Technology - New Generations. P1-5.
26. Tahir, S., Ruj, S., Rahulamathavan, Y., Rajarajan, M., & Glackin, C. (2017). A New Secure and Lightweight Searchable Encryption
Scheme over Encrypted Cloud Data. IEEE Transactions on Emerging Topics in Computing, 1–14.
27. Vengadapurvaja, A. M., Nisha, G., Aarthy, R., & Sasikaladevi, N. (2017). An Efficient Homomorphic Medical Image Encryption
Algorithm for Cloud Storage Security. Procedia Computer Science, 115, 643–650.
28. Bogdanov, A., Mendel, F., Regazzoni, F., Rijmen, V., & Tischhauser, E. (2014). ALE: AES-Based Lightweight Authenticated
Encryption. Lecture Notes in Computer Science, 447–466.
29. Xu, J., Wei, L., Zhang, Y., Wang, A., Zhou, F., & Gao, C. (2018). Dynamic Fully Homomorphic encryption-based Merkle Tree for
lightweight streaming authenticated data structures. Journal of Network and Computer Applications, 107, 113–124.
30. Zegers, W., Chang, S.-Y., Park, Y., & Gao, J. (2015). A Lightweight Encryption and Secure Protocol for Smartphone Cloud. 2015
IEEE Symposium on Service-Oriented System Engineering. P1-10.
31. Venkateshwarlu Velde, B. Rama (2018),A Framework for User Priority Guidance based Scheduling for Load Balancing in Cloud
Computing, published in International Journal of Systems, Science and Technology, 2018, pp. 1473-8031.
32. Vurukonda, N., & Thirumala Rao, B. (2019). DC-MAABE: Data Centric Multi-Authority Attribute Based Encryption on Cloud
Storage. Journal of Computational and Theoretical Nanoscience, 16(5-6), 1893-1901.
33. Venkatakotireddy, G., Rao, B. T., & Vurukonda, N. (2018). A Review on Security Issue in Security Model of Cloud Computing
Environment. In Artificial Intelligence and Evolutionary Computations in Engineering Systems (pp. 207-212). Springer, Singapore.
34. Rao, B. T. (2016). A study on data storage security issues in cloud computing. Procedia Computer Science, 92, 128-135.
35. Naveen Kumar, R., Vege, H.K. & Sreeram, G. 2019, "Patient treatment interval used in forecast algorithm and solicitations in hospital
queuing management", International Journal of Innovative Technology and Exploring Engineering, ISSN:2278-3075, vol. 8, no. 7, pp.
3003-3007.
36. Reddy, L.H., Thamognudu, Y. & Sreeram, G. 2019, "Deployment of a secured web application using cryptanalysis in cloud
environment", International Journal of Engineering and Advanced Technology, ISSN:2249-8958, vol. 8, no. 4, pp. 1841-1844.
37. Sreeram, G., Kanumuri, M.K. & Bodduluri, M. 2019, "Improving cloud data storage performance based on calculating score using data
transfer rate between the internetwork drives", International Journal of Engineering and Advanced Technology, ISSN:2249-8958, vol.
8, no. 4, pp. 1830-1835.
38. Naveen Kumar, R., Vege, H.K. & Sreeram, G. 2019, " A Perspective of Probabilistic Misbehavior Detection Scheme in Vehicular Ad-
hoc Networks", International Journal of Innovative Technology and Exploring Engineering,ISSN:2278-3075, vol. 8, no. 6, pp.1098-
1102.
Authors: Vinoothna Manohar Botcha, Bhanu Prakash Kolla
767. Paper Title: Predicting Breast Cancer using Modern Data Science Methodology
Abstract: Breast Cancer is the mass occurring cancer in women according to the World Health 4444-
Organization(WHO), But the early prediction of breast cancer helps in the recovery for the effected one's. 44
Reasons for breast cancer were Hormone replacement therapy or getting explore to harmful radioactive rays and 46
due to late childbearing. The aim is to diagnose cancer by using a machine learning technique, Random Forest,
for accurate solutions. The dataset we used is the Wisconsin Breast Cancer dataset. The output which the error
rate was only about "0.0177".

Keywords: Breast Cancer Prediction. Machine Learning, Data Science, Random Forest.

References:

1. Maity, N. G. (2017). Machine learning for improved diagnosis and prognosis in healthcare. EEE Aerospace Conference, 1-9.
2. M. R. Al-Hadidi, A. A. (2016). Breast Cancer Detection Using K-Nearest Neighbor Machine Learning Algorithm. 9th International
Conference on Developments in eSystems Engineering (DeSE), 35-39.
3. A. Q. (2014). Breast cancer mass localization based on machine learning. IEEE 10th International Colloquium on Signal Processing
and its Applications, Kuala Lumpur, 31-36.
4. J. A. Bhat, V. G. (2015). Cloud Computing with Machine Learning Could Help Us in the Early Diagnosis of Breast Cancer. Second
International Conference on Advances in Computing and Communication Engineering, Dehradun, 644-648.
5. Repository, U. (n.d.). UCI Breast Cancer Wisconsin (Original)Dataset
6. Breiman, L. (2001). Machine Learning24(2). 123-140.
7. Ho, T. K. (1995). Random Decision Forests. Proceedings of the 3rd International Conference on Document Analysis and Recognition,
278–282.
8. Kolla, B.P., Dorairangaswamy, M.A. & Rajaraman, A. 2010, "A neuron model for documents containing multilingual Indian texts",
2010 International Conference on Computer and Communication Technology, ICCCT-2010, pp. 451.
9. Kolla, B.P. & Raman, A.R. 2019, Data Engineered Content Extraction Studies for Indian Web Pages.
10. Prakash, K.B. 2018, "Information extraction in current Indian web documents", International Journal of Engineering and
Technology(UAE), vol. 7, no. 2, pp. 68-71.
11. Prakash, K.B. 2017, "Content extraction studies using total distance algorithm", Proceedings of the 2016 2nd International Conference
on Applied and Theoretical Computing and Communication Technology, iCATccT 2016, pp. 673.
12. Prakash, K.B. 2015, "Mining issues in traditional Indian web documents", Indian Journal of Science and Technology, vol. 8, no. 32.
13. Prakash, K.B. 2015, "Mining issues in traditional indian web documents", Indian Journal of Science and Technology, vol. 8, no. 32, pp.
1-11.
14. Prakash, K.B., Ananthan, T.V. & Rajavarman, V.N. 2014, "Neural network framework for multilingual web documents", Proceedings
of 2014 International Conference on Contemporary Computing and Informatics, IC3I 2014, pp. 392.
15. Prakash, K.B. & Dorai Rangaswamy, M.A. 2019, Content extraction studies for multilingual unstructured web documents.
16. Prakash, K.B. & Dorai Rangaswamy, M.A. 2016, "Content extraction studies using neural network and attribute generation", Indian
Journal of Science and Technology, vol. 9, no. 22, pp. 1-10.
17. Prakash, K.B., Dorai Rangaswamy, M.A. & Ananthan, T.V. 2014, "Feature extraction studies in a heterogeneous web world",
International Journal of Applied Engineering Research, vol. 9, no. 22, pp. 16571-16579.
18. Prakash, K.B., Dorai Rangaswamy, M.A., Ananthan, T.V. & Rajavarman, V.N. 2015, "Information extraction in unstructured
multilingual web documents", Indian Journal of Science and Technology, vol. 8, no. 16.
19. Prakash, K.B., Dorai Rangaswamy, M.A. & Raman, A.R. 2010, "Text studies towards multi-lingual content mining for web
communication", Proceedings of the 2nd International Conference on Trendz in Information Sciences and Computing, TISC-2010, pp.
28.
20. Prakash, K.B., Kumar, K.S. & Rao, S.U.M. 2017, "Content extraction issues in online web education", Proceedings of the 2016 2nd
International Conference on Applied and Theoretical Computing and Communication Technology, iCATccT 2016, pp. 680.
21. Prakash, K.B. & Rajaraman, A. 2016, "Mining of Bilingual Indian Web Documents", Procedia Computer Science, pp. 514.
22. Prakash, K.B., Rajaraman, A. & Lakshmi, M. 2017, "Complexities in developing multilingual on-line courses in the Indian context",
Proceedings of the 2017 International Conference On Big Data Analytics and Computational Intelligence, ICBDACI 2017, pp. 339.
23. Prakash, K.B., Rajaraman, A., Perumal, T. & Kolla, P. 2016, "Foundations to frontiers of big data analytics", Proceedings of the 2016
2nd International Conference on Contemporary Computing and Informatics, IC3I 2016, pp. 242.
24. Prakash, K.B. & Rangaswamy, M.A.D. 2016, "Content extraction of biological datasets using soft computing techniques", Journal of
Medical Imaging and Health Informatics, vol. 6, no. 4, pp. 932-936.
25. Prakash, K.B., Rangaswamy, M.A.D. & Raja Raman, A. 2012, ANN for multi-lingual regional web communication.
26. Prakash, K.B., Rangaswamy, M.A.D. & Raman, A.R. 2013, "Attribute based content mining for regional web documents", IET
Seminar Digest, pp. 368.
27. Prakash, K.B., Rangaswamy, M.A.D. & Raman, A.R. 2012, Statistical interpretation for mining hybrid regional web documents.

Authors: Pratulya Rajan S.M., Vinusha D.G., Pushkala Gopikrishnan, Jensin Joshua
Design and Computational Fluid Dynamic Analysis of a Medium Haul Commercial Aircraft
Paper Title:
Wing and Fuselage
Abstract: Medium haul commercial aircrafts are used by airliners for medium range flights which includes
domestic and international routes, below 4000 km but not less than 1500 km. These are widely used type of
aircrafts for airliners. It is a very challenging process to design such an aircraft and there are a lot of processes
and parameters which need to be assessed before finalizing a design. The aircraft is designed to seat a hundred
passengers and one of the main requirements of such medium haul aircrafts is that they are designed to carry the
heavy loads for longer durations and yet provide a smooth flying experience. The design aspects include the
768. selection of airfoil and engines. The airfoil selected has high lift capabilities and has a gentle stall quality
providing for a perfect fit for this category of aircraft and the fuselage has been analysed in order to withstand 4447-
the various aerodynamic forces that the aircraft might endure during flight. The design of the Wing was 44
performed on CATIA V5,the design of the fuselage was performed on SOLIDWORKS Inc. and the analysis of 51
the wing and fuselage were performed on ANSYS R19.2(Student Version).The design is said to provide better
lift capabilities with the help of the airfoil chosen which could provide for a better performance on modern day
aircrafts.

Keywords: Medium haul, airfoil, airliners, analysis, aircrafts.

References:
1. Anderson, John D. Jr., (1999) “Aircraft Performance and Design”, McGraw-Hill, New York-ISBN:978-0070-01685-2.
2. Anderson, John D. Jr., (2001) “Introduction to Flight”, McGraw-Hill, New York-ISBN:978-0070-01685-9.
3. Ball, R.E (2003)” The fundamentals of aircraft combat survivability analysis and design”, second edition AIAA Educational series-
ISBN:978-1563-47582-0.
4. Green W. (compiler) (1981) “The observer’s book of aircraft” Fredrick Warne-ISBN:978-0723-21687-2.
5. Lloyd R. Jenkinson & James F. Marchman III-Aircraft Design Projects-ISBN:978-0080-49895-9.
6. Prof. E.G. Tulapurkara-Airplane design (Aerodynamic)-ISBN:978-0124-19953-8.
7. Raymer, Daniel P. (1992) “Aircraft Design : A Conceptual Approach”, AIAA Education Series, Washington, DC-ISBN:978-1-5634-
7830-7.
8. Roskam, J. (1985) “Airplane Design”, Roskam Aviation and Engineering Corp. Ottawa, Kansas-ISBN:978-1-8848-8524-2.
9. Taylor,J, (2004) “Jane’s All the World’s Aircraft”, Jane’s, London, UK-ISBN:978-0710-63275-3.
10. Theory of Wing Section – Ira H. Abbott & Albert E. von Doenhoff-ISBN:978-3319-22114-4.

Authors: Naresh Kumar Sripada, Shwetha Sirikonda, Nampally Vijay Kumar, Vahini Siruvoru

Paper Title: Support Vector Machines to Identify Information towards Fixed-Dimensional Vector Space
Abstract: Support vector machines have actually consulted with significant success in various real-world
learning jobs. The Support Vector Machine (SVM) is a thoroughly utilized classifier. Along with yet, obtaining
the finest outcomes along with SVMs needs an understanding of their procedures as well as the different implies
a consumer can influence their preciseness. We supply the individual with a fundamental understanding of the
concept behind SVMs and also concentrate on their usage in technique. This paper is concentrated on the useful
concerns being used to support vector machines to identify information that is currently supplied as functions in
some fixed-dimensional vector space.

Keywords: Neural networks, Machine Learning, Support Vector Learning.

References:

769. 1. C. Cortes, V. Vapnik, in Artificial intelligence, pp. 273-- 297 (1995 ).


2. N. Cristianini, J. Shawe-Taylor, An intro to assist Vector Ma- chines: as well as various other kernel-based learning approaches. 4452-
Cambridge Educational Institution Press, New York City, NY, U.S.A. (2000 ). 44
3. J. Shawe-Taylor, N. Cristianini, Kernel Systems for Style Analysis. Cambridge Educational Institution Push, The Big Apple, NY, 55
UNITED STATES (2004 ).
4. C. J. C. Burges, Data Exploration and Expertise Finding 2, 121 (1998 ).
5. C. M. Bishop, Pattern Awareness and Machine Learning (Details Scientific Research and Data). Springer (2006 ).
6. D. McAllester. PAC-Bayesian style averaging. In Procedures of the Twelfth Annual Meeting on Computational Discovering Theory,
1999.
7. A. McCallum. Head: A toolkit for analytical language choices in, content access, classification and concentration.
www.cs.cmu.edu/˜mccallum/bow, 1996.
8. A. McCallum and also K. Nigam. Utilizing EM in pool-based energetic learning for text classi- fication. In Procedures of the Fifteenth
International Seminar on Artificial Intelligence. Morgan Kaufmann, 1998.
9. T. Mitchell. Reason as search. Artificial Cleverness, 28:203-- 226, 1982.
10. J. Rocchio. Significance comments in details retrieval. In G. Salton, publisher, The CLEVER access device: Practices in automatic
paper handling. Prentice-Hall, 1971.
11. Chetla Anusha, Ch.Sandeep, “IMPLEMENTATION OF DATA SHARING IN MOBILE BASED DTN" in International Journal For
Technological Research I, Volume 3, Issue 4, Page No(s)633 - 636, DEC. 2015, [ISSN(Print):2347-4718]
12. Dr.Seena Naik, “Designing Energy-Aware Adaptive Routing for Wireless sensor networks" in Springer Publications, Volume 2,
Issue 3, Page No(s) 441 - 445, DEC. 2015, [ISSN(Print):2194-5357, ISSN(Online): 2194-5357], DOI: 10.1007/978-3-319-13.

Authors: Priyanka Israni

Paper Title: Breast Cancer Diagnosis (BCD) Model Using Machine Learning
Abstract: In the recent years, breast cancer research has made a significant growth however there is still a
scope of advancement. Breast cancer increases the statistics of mortality among women. In concern to this issue,
treatment of cancer should be started at the earlier stage, to increase the chances of survival of the patient. Thus,
there is a need to diagnose breast cancer at the early stage using the features from the mammograms. This paper
proposes an efficient BCD model to detect breast cancer by using Support Vector Machine (SVM) with 10-fold
cross validation. The complexity of the problem increases if there are many input features for the diagnosis of
cancer. Thus, Principal Component Analysis (PCA) is used to reduce the feature space from a higher dimension
to a lower dimension. Experiment result shows that the PCA increases the accuracy of the model. The proposed
BCD model is compared with other supervised learning algorithms like Decision trees (DT), Random Forest, k-
770. Nearest Neighbors(k-NN), Stochastic Gradient Descent (SGD), AdaBoost, Neural Network (NN), and Naïve
Bayes. Evaluation parameters like F1 measure, ROC curve, Accuracy, Lift curve and Calibration Plot proves 4456-
that proposed BCD model outperforms and gives the highest accuracy among other compared algorithms. 44
63
Keywords: Accuracy, Breast cancer, Classification, Features, Machine learning.

References:

1. B. M. Abed, B.M., Shaker, K., Jalab, H.A., Shaker, H., Mansoor, A.M., Alwan, A.F. and Al-Gburi, “A hybrid classification algorithm
approach for breast cancer diagnosis,” in Proceedings of IEEE Industrial Electronics and Applications Conference (IEACon 2016),
Malaysia, pp. 269-274, 2016.
2. L. G. Ahmad, A. T. Eshlaghy, A. Poorebrahimi, M. Ebrahimi and A. R. Razavi, “Using Three Machine Learning Techniques for
Predicting Breast Cancer Recurrence,” Journal of Health & Medical Informatics, vol. 4, no. 2, pp.1-3, 2013.
3. M. R. Al-Hadidi, A. Alarabeyyat and M. Alhanahnah, “Breast Cancer Detection Using K-Nearest Neighbor Machine Learning
Algorithm,” in Proceedings of the 9th International Conference on Developments in e Systems Engineering (DeSE), 2016.
4. H. Asria, H. Mousannif, H. Moatassimec and T. Noeld, “Using Machine Learning Algorithms for Breast Cancer Risk Prediction and
Diagnosis,” in Proceedings of the 6th International Symposium on Frontiers in Ambient and Mobile Systems, pp. 1064 – 1069, 2016.
5. Borges and Lucas Rodrigues, “Analysis of the Wisconsin Breast Cancer Dataset and Machine Learning for Breast Cancer Detection,”
in Proceedings of the XI Workshop de Visão Computacional, 2015.
6. P. Drotár and Z. Smékal, “Comparative study of machine learning techniques for supervised classification of biomedical data,” in
Proceedings of the Acta Electrotechnica et Informatica, vol. 14, no. 3, pp. 5-10, 2014.
7. A. Fred and M. Agarap, “On Breast Cancer Detection: An Application of Machine Learning Algorithms on the Wisconsin Diagnostic
Dataset,” in Proceedings of the 2nd International Conference on Machine Learning and Soft Computing, 2018
8. J. Ivancáková, F. Babic and P. Butka, “Comparison of Different Machine Learning Methods on Wisconsin Dataset,” in Proceedings of
the 16th IEEE World Symposium on Applied Machine Intelligence and Informatics, pp.173-178, 2018.
9. H. Jouni, M. Issa, A. Harb, G. Jacquemod and Y. Leduc, “Neural Network Architecture for Breast Cancer Detection and
Classification,” in Proceedings of the IEEE International Multidisciplinary Conference on Engineering Technology (IMCET),2016.
10. A. Lashkari, F. Pak, M. Firouzmand “Breast thermal images classification using optimal feature selectors and classifiers,” The Journal
of Engineering, vol. 2016, no. 7, pp. 237–248, 2016.
11. M. Li and Z. Zhou, “Improve Computer-Aided Diagnosis with Machine Learning Techniques Using Undiagnosed Samples,” IEEE
Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, vol. 37, no. 6, 2007.
12. M. Montazeri, M. Montazeri, M. Montazeri and A. Beigzadeh, “Machine learning models in breast cancer survival prediction,”
Technology and health care, vol. 24, no. 1, pp. 31-42, 2016.
13. G. D. Rashmi, A. Lekha and N. Bawane, “Analysis of Efficiency of Classification and Prediction Algorithms (Naïve Bayes) for
Breast Cancer Dataset,” in Proceedings of the IEEE International Conference on Emerging Research in Electronics, Computer Science
and Technology, pp.108-113, 2015.
14. A. A. Raweh, M. Nassef and A. Badr, “A Hybridized Feature Selection and Extraction Approach for Enhancing Cancer Prediction
Based on DNA Methylation,” IEEE Access, vol. 6, pp. 15212 – 15223, 2018.
15. G. I. Salama, M. B. Abdelhalim, and M. A. Zeid, “Experimental Comparison of Classifiers for Breast Cancer Diagnosis,” Proceedings
of the 7th International IEEE conference on Computer Engineering & Systems, pp.180-185, 2012.
16. A. F. Seddik and D. M. Shawky, “Logistic Regression Model for Breast Cancer Automatic Diagnosis,” in Proceedings of the SAI
Intelligent Systems Conference, pp. 150-154, 2015.
17. L. Yang and Z. Xu, “Feature extraction by PCA and diagnosis of breast tumors using SVM with DE-based parameter tuning,”
International Journal of Machine Learning & Cybernetics, pp. 1-11, 2017.
18. W. Yue, Z. Wang, H. Chen, A. Paynand and X. Liu, “Machine Learning with Applications in Breast Cancer Diagnosis and
Prognosis”, Journal of Engineering Design, vol. 2, no. 13, pp 1-17, 2018.
19. W. Zhanga and J. Chenb, “Relief Feature Selection and Parameter Optimization for Support Vector Machine based on Mixed Kernel
Function,” International Journal of Performability Engineering, vol. 14, no. 2, pp. 280-289, 2018.
20. Ch. Shravya, K. Pravalika and Shaik Subhani, “Prediction of Breast Cancer Using Supervised Machine Learning Techniques”,
International Journal of Innovative Technology and Exploring Engineering (IJITEE), Vol.8, No.6, pp.1106-1110, 2019.
21. Fawcett, Tom, "An Introduction to ROC Analysis", Pattern Recognition Letter , Vol.27 , No.8, pp. 861–874, 2006.
22. “Breast Cancer Wisconsin Dataset”, Available at: https://archive.ics.uci.edu/ml/datasets/Breast+Cancer+Wisconsin+Original
23. “Cancer Research UK. Breast cancer survival statistics”, Available at: https://www.cancerresearchuk.org/health-professional/cancer-
statistics/statistics-by-cancer-type/breast-cancer/survival#heading-Three
24. “India now has 3rd highest number of cancer cases among women”, Available at: https://timesofindia.indiatimes.com/india/india-
now-has-3rd-highest-number-of-cancer-cases-among-women/articleshow/60812041.cm
25. Ting, Kai Ming (2011). Encyclopedia of machine learning. Springer. ISBN 978-0-387-30164-8.
Authors: Ragavi Priyadharshani Raja, Geetha Kathiresan, R. Ilavarasi

Paper Title: Nano Titanium Dioxide -An Effective Photocatalyst for Emerging Applications
Abstract: Titanium dioxide (TiO2) is a widely studied material and exists in three major crystal structures:
rutile, brookite and anatase. Due to its advantages in high chemical and thermal stability, non-toxicity, high
catalytic activity, resistance to corrosion, and high reactivity under ultraviolet light (<387 nm),it can be used in
many applications such as photo catalysis, photovoltaics, sensors, hydrogen generators batteries, self-cleaning,
electrochromic devices and also used in some biomedical application for site specific drug delivery . These
applications in various fields depends not only on the properties of the TiO2 material but also it involves in
modifying TiO2 structure and doping of other element on it which will show adverse impact in application of
TiO2 with the surrounding environment. In this review, we are discussing about the synthesis, properties, and
applications of titanium dioxide nanoparticle (TiO2 NP) in various fields.

Keywords: TiO2 Synthesis, Properties, Photocatalyst, Photo Electrochemical detection.

References:
771. 1. F. Jinhui, L. Yueyun. G. Zengqiang, L. Hui, Z. Xiaobo, F. Dawei, W. Qin, “Visible –light driven label-free photoelectrochemical 4464-
immunosensor based on TiO2/S-BiVO4@Ag2S nanocomposites for sensitive detection OTA,” Biosensors and Bioelectronics, 17, 44
S0956-5663, 2017. http://dx.doi.org/10.1016/j.bios.2017.07.029
2. R. Martin, H. Pengwai, S. Marcel, A. Nela, T. Ivana, M. Lenka, L. Jaroslav, S. ladislav, K. Piotr, R. Michel, P. Petr, K. Kamila, “Novel 72
TiO2/C3N4 Photocatalysts for Photocatalytic Reduction of CO2 and for Photocatalytic Decomposition of N2O” The Journal of Physical
Chemistry, 2016. 10.1021/acs.jpca.6b07236
3. S. Xiaolu, G. Chaomin, Z. Lina, Y. Mei, Y. Jinghua, G. Shenguang, “Photoelectrochemical sensor based on molecularly imprinted
film modified hierarchical branched titanium dioxide nanorods for chlorpyrifos detection,” Sensors and Actuators B, 17, S0925-4005,
2017. http://dx.doi.org/doi:10.1016/j.snb.2017.04.130
4. S. Y. Mendiola-Alvarez, J. L.Quzman-Mar, G. Turnes-Palomino, F. Maya-Alejandro, A.Calallero-Quintero, A. Hernandez Ramirez.,
L. Hinojosa-Reyes, “Synthesis of Cr3+-doped TiO2 nanoparticles: characterization and evaluation of their visible photocatalytic
performance and stability,” Environ Technol, 1-10, 2017. 10.1080/09593330.2017.1380715
5. M. Weiguang, H. DongXue, G. Shiyu, N. Zhang, L. Shiwei, W. Tongsun, Z. Qixian, D. XIandui, L. Niua, “Rapid and specific sensing
of gallic acid with a photoelectrochemical platform based on polyaniline–reduced graphene oxide–TiO2” Chem. Commun, 49, 7842-
7844, 2013. 10.1039/c3cc43540g
6. B. Madhumita, M. Arjun, G. Vinod Kumar, “ Synthesis and characterization of Fe0/TiO2nanocomposites for ultrasound assisted
enhanced catalytic degradation of reactive black 5 in aqueous solutons” Journal of Colloid and Interface Science, 17, S0021-9797,
2017. http://dx.doi.org/10.1016/j.jcis.2017.07.016,2017
7. V. Kavithayeni, K. Geetha, S. Akash Prabhu, “ A review on dye reduction mechanisms using nano absorbents in waste water,”
IJRET,7, 2019.
8. K. Geetha, Kanimozhi, N. Arulnathan, “ Silver Nanoparticle : A bacterial agent for pathogenic poultry bacteria,” IJRET, 7, 2019.
9. S. Ajay, R.K. Karn, S.K. Pandian, “Synthesis of TiO2 Nanoparticles by Sol-gel Method and Their Characterization,” Journal of Basic
and Applied Engineered Research, 1, 2350-0255, 2014. http://www.krishisanskriti.org/jbaer.html
10. Z. Xiaoguang, G. Xin, W. Cheng, “Synthesis of Titania in Ethanol/Acetic Acid Mixture Solvents: Phase and Morphology Variations,”
Crystal Growth & Design, 9, 4301 – 4307, 2009. 10.1021/cg801015b
11. Z. Ming, Y. Bando, K. Wada, “Sol-gel template preparation of TiO2 nanotubes and nanorods,” Journal Of Materials Science Letters.
20, 167– 170, 2001.
12. C. Xiaobo, S.M. Samuel, “Titanium Dioxide Nanomaterials: Synthesis, Properties, Modifications, and Applications,” Chem. Rev, 107,
2891-2959, 2007. 10.1021/cr0500535
13. Q. Jijun, Y. Weidong, G. Xiangdong, L. Xiaomin, “Sol–gel assisted ZnO nanorod array template to synthesize TiO2 nanotube arrays,”
Nanotechnology, 17, 4695-4698, 2006. 10.1088/0957-4484/17/18/028
14. G. Chaomin, W. Yanhu, U. shuai, X. Jie, C. Binqiang, Y. Jinghua, “Engineering anatase hierarchically cactus-like TiO2 arrays for
photoelectrochemical and visualized sensing platform,” Biosemsors and Bioelectronics, 90, 336-342, 2017.
http://dx.doi.org/10.1016/j.bios.2016.12.002
15. J. Seokwoo, P.V. Braun, “Hydrothermal Synthesis of Er-Doped Luminescent TiO2 Nanoparticles,” Chem.Mater, 15, 1256-1263, 2003.
10.1021/cm0207402
16. Y. L. Jin, L. Hai-Peng, C. Homg-Yan, K. Dai-Bin, S. Cheng-Yong, “High-performance dye-sensitized solar cells based on hierarchical
yolk–shell anatase TiO2 beads” J.Mater.Chem, 22, 1627, 2012. 10.1039/c1jm14489h
17. T. Eakkasit, V. Naratio, S. Panpailin, “Surface modification of TiO2 particles with the sono-assisted exfoliation method,” Ultrasonics
Sonochemistry, 17, S1350-4177, 2017. http://dx.doi.org/10.1016/j.ultsonch.2017.06.002
18. A. Poorkarimi, A. Karimi-Jashni, S. Javadpour, “Optimization of toluene removal over W-doped TiO2 nano-photocatalyst under
visible light irradiation,” Environ Technol, 1-14, 2017. 10.1080/09593330.2017.1375021
19. C. InSun, C. Zhebo, J. F. Arnold, R. K. Dong, M.R. Pratap, F. J. Thomas, Z. Xialin, “Branched TiO2 Nanorods for
Photoelectrochemical Hydrogen Production” Nano let, 11, 4978-4984, 2011. 10.1021/nl2029392
20. Z. Min, L. Yuanzhi, M. Mingyang, B. Jilin, L. Ren, Z. Xiu jian, “Synergetic Effect between Photocatalysis on TiO2 and
Thermocatalysis on CeO2 for Gas-Phase Oxidation of Benzene on TiO2/CeO2 Nanocomposites,” ACS Catal, 5, 3278-3286, 2015.
10.1021/acscatal.5b00292
21. A. Anila, M. Imran, N.M. Riffet, I. Hicham, A.N. Muhammad, “Principles and mechanisms of photocatalytic dye degradation on
TiO2 based photocatalysts: a comparative overview,” RSC Adv, 4, 37003-37026, 2014. 10.1039/c4ra06658h
22. X. Yue, S. Junli, Y. Xia, Y. JianYong, D. Bin, “Functional modification of breathable polyacrylonitrile/polyurethane/TiO2 nanofibrous
membranes with robust ultraviolet resistant and waterproof performance,” Journal of Colloid and Interface Science, 17, S0021-9797,
2017. http://dx.doi.org/10.1016/j.jcis.2017.08.055
23. Z. Heng Zhong, F. B. Jillian, “Understanding Polymorphic Phase Transformation Behavior during Growth of Nanocrystalline
Aggregates: Insights from TiO2,” J.Phys, Chem. B, 104, 3481-3487, 2000. 10.1021/jp000499j
24. M.G. Keith, R.C. James, “Structural and electronic properties of titanium dioxide,” Physical Review B, 46, 1992.
25. M. Shang-Di, W.Y. Ching, “Electronic and optical properties of three phases of titanium dioxide: Rutile, anatase, and brookite,”
Physical Review B, 51, 1995.
26. O. Crap, C.L. Huisman, A. Rellar, “Photoinduced reactivity of titanium dioxide, Progress in Solid State Chemistry,” Progress in Solid
State Chemistry, 32, 33-177, 2004.
27. W. Puhong, I. Hiroshi, T. Weiping, F. Qi, “Single Nanocrystals of Anatase-Type TiO2 Prepared from Layered Titanate Nanosheets:
Formation Mechanism and Characterization of Surface Properties,” Langmuir, 23, 11782-11790, 2007. 10.1021/la701632t
28. N. Rahimeh, O. Ali, S. Sahar, “Preparation of an antibacterial , hydrophilic and photocatalytically active polyacrylic coating using
TiO2 nanoparticles sensitized by graphene oxide,” Materials Science and Engineering C, 80, 642-651, 2017.
29. A. I . Fawzia, A.A. Medhat, K. A. Mohamed, F.A. Ibrahim, “Optimization and in line potentiometric monitoring of enhanced
photocatalytic degradation kinetics of gemifloxacin using TiO2 nanoparticles/H2O2,” Environ Sci Pollut Res, 24, 23880-23892, 2017.
10.1007/s11356-017-0045-8
30. G. Waldner, M. Pourmodjib, R. Bauera, S.M. Neumann, “Photoelectrocatalytic degradation of 4-chlorophenol and oxalic acid on
titanium dioxide electrodes,” Chemosphere, 50, 989-998, 2003.
31. T. Jian, S. Yuanhua, Z. Zhenhuan, Z. Weijia, W. Dongzhou, K. Xueliang, L. Hong, W. Jiyang, C. Shaowei, C. Huaqiang, H. Hui,
“Enhanced photocatalytic performances of CeO2/ TiO2 nanobelt heterostructures,” Photocatalysis, 2013. 10.1002/smll.201202346
32. L. Yang, Z. Huijie, Y. Mujie, “TiO2 nanoparticles supported on PMMA nanofibers for photocatalytic degradation of methyl orange,”
Journal of Colloid and Interface Science, 17, S0021-9797, 2017. http://dx.doi.org/10.1016/j.jcis.2017.08.076
33. Z. Amir, Q. Yang, A. Sharafat, S. Ning, L. Hongwei, Y. Rui, Z. Xiliang, J. Liqiang, “Improved visible-light activities for degrading
pollutants on TiO2/g-C3N4 nanocomposites by decorating SPR Au nanoparticles and 2,4-dichlorophenol decomposition path,” Journal
of Hazardous Materials, 17, S0304-3894, 2017. http://dx.doi.org/10.1016/j.jhazmat.2017.09.005
34. W. Xiaojun, X. Xiaoan, Z. Xiaogang, M. Weijia, Y. Chen, G. Meiqing, “Nonenzymatic glucose sensor based on Ag&Pt hollow
nanoparticles supported on TiO2 nanotubes,” Materials Science & Engineering C, 16, S0928-4931, 2017. 10.1016/j.msec.2017.05.137
35. C. T. L. Stephanie, D. Jedol, S.S. Coswald, F. M. Rachel, “Development in Photoanode Materials for High Efficiency Dye Sensitized
Solar Cells,” International Journal of Renewable Energy Research, 3, 2014.
36. M. Xiaohuan, P. Kai, L. Yongping, Z. Wei, P. Oingjiang, T. Guohui, W. Guofeng, “Controlled synthesis of mesoporous anatase
TiO2microspheres as a scattering layer to enhance the photoelectrical conversion efficiency,” J.Mater.Chem.A, 1, 9853, 2013.
10.1039/c3ta11625e
37. L. Qi, Z. Chenxi, D. Xueshuang, Z. Hongbing, L. Zhiqiang, W. Zengbo, C. Xiaohong, H. Sumei, “Plasmonic Effects of Metallic
Nanoparticles on Enhancing Performance of Perovskite Solar Cells,” ACS Paragon Plus Environment, 40, 34821-34832, 2017.
10.1021/acsami.7b08489
38. K. Ankita, K. K. Ramesh, K. Ankarao, M. Issac, K.P. Prabir, G. Partha, D. Melepurath, “New Antimony Selenide / Nickel Oxide
Photocathode Boosts the Efficiency of Graphene Quantum Dots Co-sensitized Solar Cell,” ACS. Appl. Mater. Interfaces, 9, 34915-
34926, 2017. 10.1021/acsami.7b09754
39. Z. Yanli, Z. Qian, T. Jian, J. Fuyi, “TiO2 Nanobelt@Co9S8 Composites as Promising Anode Materials for Lithium and Sodium Ion
Batteries,” Nanomaterials, 7, 252, 2017. 10.3390/nano7090252
40. M. Fabio, C. Gilberto, C. Fausto, T. Roberto, N. Francesco, “Anatase-TiO2 as low-cost and sustainable buffering filler for nanosize
Silicon anodes in Lithium-ion batteries,” Chem Sus Chem, 23, 4771-4777, 2017. 10.1002/cssc.201701431
41. W. Liding, Q. Tieyua, W. Juan, Z. Shihan, X. Huining, M. Yongliang, “Uniform dispersion of cobalt nanoparticles over nonporous
TiO2 with low activation energy for magnesium sulfate recovery in a novel magnesia based desulfurization process,” Journal of
Hazardous Materials, 342, 579-588, 2018.
42. X. Yue, S. Junlu, Y. Xia, Y. Jianyong, D. Bin, “Functional modification of breathable polyacrylonitrile/polyurethane/TiO2 nanofibrous
membranes with robust ultraviolet resistant and waterproof performance,” Journal of Colloid and Interface Science, 17, S0021-9797,
2017. http://dx.doi.org/10.1016/j.jcis.2017.08.055
43. L. Junzhou, T. Jun, W. Juanjuan, W. Chenxi, G. Bruce, G.K. Philip, W. Yonghong, “Functional sustainability of periphytic biofilms in
organic matter and Cu2+ removal during prolonged exposure to TiO2 nanoparticles,” Journal of Hazardous Materials, 17, S0304-3894,
2017. http://dx.doi.org/10.1016/j.jhazmat.2017.08.068
44. N. C. Wenjun, L. Meng, C. Jiayi, X. Zipeng, L. Zhenzi, W. Xiaoyan, S. Erlin, G. Mencheng, Z. Wei, “808 nm light triggered black
TiO2 nanoparticles for killing of bladder cancer cells,” Materials Science & Engineering C, 81, 252-260, 2017.
http://dx.doi.org/10.1016/j.msec.2017.08.020
45. S. Sainulabdeen, S. Sathyabhama, S. D. Rukhmini, B. Sreedharan, S. S. Rema, A. Annie, “In vitro and in vivo pharmacokinetics and
toxicity evaluation of curcumin incorporated titanium dioxide nanoparticles for biomedical applications,” Chemico-Biological
Interactions, 17, S0009-2797, 2017. 10.1016/j.cbi.2017.07.022.

Authors: Akash Prabhu S, Geetha Kathiresan, Suganthy R

Paper Title: Synthesis of Nano Copper Shell for Conductive Ink in Wearable Electronics
Abstract: Number of emerging synthesis techniques were revealed to synthesize the copper nanoparticles
(CuNp) with reduced oxide states to improve the conductivity by various researchers. This research work
highlights about the synthesis of surface oxide layer free copper nanoparticles (CuNp) using less expensive
chemical reduction method by reducing the oxide states. Poly Vinyl Pyrolidone were used as a capping agent
and Ascorbic acid as reducing agents for minimizing the oxide layer of CuNp. SEM, XRD, FTIR and Zeta
Potential by particle size analyzer of synthesized powder were characterized.SEM images shows the particle size
in the range of 100-300nm. XRD peaks expressed at 43.3482, 50.4653 and 74.1109 correspondence to the planes
of (111), (200) and (220) confirms the presence of nanocopper in the sample. Particle size analyzer results
exhibits the average particle size of CuNp as 141.2 nm. The peaks of FTIR spectrum at 3747 cm-1, 1887 cm-1,
and 1690 cm-1 confirm the presence of polyhydroxyl groups, which indicates the high dispersion rate of CuNp
in the taken solvent. Further, the work reviewed to find the suitable binding agent to fabricate nanoconductive
ink. The outcome of the study takes us closer towards to fabricate nano conductive ink using CuNp for flexible
electronics.

Keywords: Conductive Binder, Copper Nanoparticle (CuNp), Flexible Electronics, Nano Conductive Ink.

References:

1. S. Azoubel, S. Shemesh and S. Magdassi, 'Flexible electroluminescent device with inkjet-printed carbon nanotube electrodes',
Nanotechnology, vol. 23, no. 34, p. 344003, 2012.
2. Kamyshny and S. Magdassi, 'Conductive Nanomaterials for Printed Electronics', Small, vol. 10, no. 17, pp. 3515-3535, 2014.
3. Blayo and B. Pineaux, 'Printing processes and their potential for RFID printing', Proceedings of the 2005 joint conference on Smart
objects and ambient intelligence innovative context-aware services: usages and technologies - sOc-EUSAI '05, 2005.
4. Y. Li, D. Lu and C. Wong, Electrical conductive adhesives with nanotechnologies. New York: Springer, 2009.
5. R. Doering and Y. Nishi, Handbook of semiconductor manufacturing technology. Boca Raton: CRC/Taylor & Francis, 2007.
6. J. Song, L. Wang, A. Zibart and C. Koch, 'Corrosion Protection of Electrically Conductive Surfaces', Metals, vol. 2, no. 4, pp. 450-477,
2012.
7. D. Hecht, L. Hu and G. Irvin, 'Emerging Transparent Electrodes Based on Thin Films of Carbon Nanotubes, Graphene, and Metallic
Nanostructures', Adv. Mater., vol. 23, no. 13, pp. 1482-1513, 2011.
8. S. Hellstrom, H. Lee and Z. Bao, 'Polymer-Assisted Direct Deposition of Uniform Carbon Nanotube Bundle Networks for High
Performance Transparent Electrodes', ACS Nano, vol. 3, no. 6, pp. 1423-1430, 2009.
9. J. Chen, C. Jang, S. Xiao, M. Ishigami and M. Fuhrer, 'Intrinsic and extrinsic performance limits of graphene devices on SiO2', Nature
Nanotech, vol. 3, no. 4, pp. 206-209, 2008.
772. 10. G. Hanson, 'Dyadic Green’s functions and guided surface waves for a surface conductivity model of graphene', J. Appl. Phys., vol. 103,
no. 6, p. 064302, 2008. 4473-
11. Ayesha Khan, Audil Rashid, Rafia Younas, Ren Chong , “A chemical reduction approach to the synthesis of copper nanoparticles”, Int 44
Nano Lett (2016) 6:21–26. 77
12. Shikha Jain, Niharika Nagar and Vijay Devra, “Synthesis and characterization of highly efficient copper nanoparticles and their catalytic
application in oxidative kinetic study”, Advances in Applied Science Research, 2015, 6(6): 171-180.
13. Dung Dang, Thi My, “Synthesis and optical properties of copper nanoparticles prepared by a chemical reduction method” , Adv. Nat.
Sci: Nanosci. Nanotechnol. 2 015009, 2011.
14. Jhon L. Cuya Huaman, Kimitaka Sato, Satoshi Kurita, Takatoshi Matsumotoc and Balachandran Jeyadevan, “Copper nanoparticles
synthesized by hydroxyl ion assisted alcohol reduction for conducting ink” J. Mater. Chem., 2011, 21, 7062.
15. Hyun-Jun Hwang1, Wan-Ho Chung1 and Hak-Sung Kim , “In situ monitoring of flash-light sintering of copper nanoparticle ink for
printed electronics” , Nanotechnology 23 (2012)
16. Felix LewisOscar, Davoodbasha MubarakAli, Chari Nithya, Rajendran Priyanka, Venkatraman Gopinath, Naiyf S. Alharbi and
Nooruddin Thajuddin, “One pot synthesis and anti-biofilm potential of copper nanoparticles (CuNPs) against clinical strains of
Pseudomonas aeruginosa”, Biofouling, 2015, Vol. 31, No. 4, 379–391.
17. Hongyan Liu, Tingting Wang and Heping Zeng, “CuNPs for Effi cient Photocatalytic Hydrogen Evolution”, Part. Part. Syst. Charact.
2015, 32, 869–873.
18. Manoj B. Gawande, Anandarup Goswami, Francois-Xavier Felpin, Tewodros Asefa, Xiaoxi Huang, Rafael Silva, Xiaoxin Zou, Radek
Zboril and Rajender S. Varm, “Cu and Cu-Based Nanoparticles: Synthesis and Applications in Catalysis”, Chem. Rev. 2016, 116, 3722-
3811.
19. Supriya A. Patil, Chung-Hyeon Ryu, and Hak-Sung Kim, “Synthesis and Characterization of Copper Nanoparticles (Cu-Nps) using
Rongalite as Reducing Agent and Photonic Sintering of Cu-Nps Ink for Printed Electronics”, International Journal Of Precision
Engineering And Manufacturing-green Technology, vol. 5, no. 2, pp. 239-245, 2018.
20. Venkata Abhinav K, Venkata Krishna Rao. R, Karthik P.S, Surya Prakash Singh, “Copper Conductive Inks: Synthesis and its Utilization
in Flexible Electronics”, RSC, 2015.
21. Swihart, M. T., “Vapor-Phase Synthesis of Nanoparticles,” Current Opinion in Colloid & Interface Science, Vol. 8, No. 1, pp. 127-133,
2003.
22. Song, X., Sun, S., Zhang, W., and Yin, Z., “A Method for the Synthesis of Spherical Copper Nanoparticles in the Organic Phase,”
Journal of Colloid and Interface Science, Vol. 173, No. 2, pp. 463- 469, 2004.
23. Huang, L., Jiang, H., Zhang, J., Zhang, Z., and Zhang, P., “Synthesis of Copper Nanoparticles Containing Diamond-Like Carbon Films
by Electrochemical Method,” Electrochemistry Communications, Vol. 8, No. 2, pp. 262-266, 2006.
24. Johansson, A., Törndahl, T., Ottosson, L., Boman, M., and Carlsson, J. O., “Copper Nanoparticles Deposited Inside the Pores of
Anodized Aluminium Oxide Using Atomic Layer Deposition,” Materials Science and Engineering: C, Vol. 23, No. 6, pp. 823-826,
2003.
25. Mott, D., Galkowski, J., Wang, L., Luo, J., and Zhong, C.-J.,
“Synthesis of Size-Controlled and Shaped Copper Nanoparticles,”
Langmuir, Vol. 23, No. 10, pp. 5740-5745, 2007.
26. Hong, Z. S., Cao, Y., and Deng, J. F., “A Convenient Alcohothermal Approach for Low Temperature Synthesis of CuO Nanoparticles,”
Materials Letters, Vol. 52, No. 1, pp. 34-38, 2002.
27. Lindberg, B. J., “Studies on Sulfinic Acids. VI. The IR-Spectra of Aromatic Sodium Sulfinates and Sulfonates,” Acta Chemica
Scandinavica, Vol. 21, pp. 2215-2234, 1967.
28. Tang, R. Y., Zhong, P., and Lin, Q. L., “Sulfite-Promoted One-Pot
Synthesis of Sulfides by Reaction of Aryl Disulfides with Alkyl
Halides,” Synthesis, Vol. 1, pp. 85-91, 2007.
29. Kim, H. S., Dhage, S. R., Shim, D. E., and Hahn, H. T., “Intense
Pulsed Light Sintering of Copper Nanoink for Printed Electronics,”
Applied Physics A, Vol. 97. No. 4, pp. 791-798, 2009.
30. Ryu, J., Kim, H. S., and Hahn, H. T., “Reactive Sintering of Copper Nanoparticles Using Intense Pulsed Light for Printed Electronics,”
Journal of Electronic Materials, Vol. 40, No. 1, pp. 42-50, 2011.
31. Hwang, H. J., Chung, W. H., and Kim, H. S., “In Situ Monitoring of Flash-Light Sintering of Copper Nanoparticle Ink for Printed
Electronics,” Nanotechnology, Vol. 23, No. 48, Paper No. 485205, 2012.
32. Han, W.-S., Hong, J.-M., Kim, H.-S., and Song, Y.-W., “MultiPulsed white Light Sintering of Printed Cu Nanoinks,” Nanotechnology,
Vol. 22, No. 39, Paper No. 395705, 2011.

Authors: Sindhu B, B Sujatha

Paper Title: Voice Recognition System Through Machine Learning


Abstract: Human voice recognition by computers has been ever developing area since 1952. It is challenging
task for a computer to understand and act according to human voice rather than to commands or programs. The
reason is that no two human’s voice or style or pitch will be similar and every word is not pronounced by
everyone in a similar fashion. Background noises and disturbances may confuse the system. The voice or accent
of the same person may change according to the user’s mood, situation, time etc. despite of all these challenges,
voice recognition and speech to text conversion has reached a successful stage. Voice processing technology
deserves still more research. As a tip of iceberg of this research we contribute our work on this are and we
propose a new method i.e., VRSML (Voice Recognition System through Machine Learning) mainly focuses on
Speech to text conversion, then analyzing the text extracted from speech in the form of tokens through Machine
Learning. After analyzing the derived text, reports are created in textual as well graphical format to represent the
vocabulary levels used in that speech. As Supervised learning algorithm from Machine Learning is employed to
classify the tokens derived from text, the reports will be more accurate and will be generated faster.

Keywords: Machine Learning, Speech Recognition, Speech to text conversion, Text analysis, Vocabulary.

References:

1. Rabiner Lawrence ,Juang Biing-Hwang, “Fundamental of speech recognition ”,AT & T,1993.
2. Anne Johnstone Department of Artificial Intelligence Edinburgh University Hope Park Square, Meadow Lane Edinburgh EHB 9LL,
(GB) Gerry Altmann “Automated speech recognition:a framework for research”.
773. 3. IJARCCE www.ijarrcce.com Speech recognition system for english languagems. Vrinda ,Mr. Chander Shekhar Astt.Professor,Deptt of
Computer Science& Engineering, M. V N University,Palwal, India 4478-
4. C. Eaton, D. Deroos, T. Deutsch, G. Lapis and P.C. Zikopoulos, Understanding Big Data: Analytics for Enterprise Class Hadoop and 44
Streaming Data, Mc Graw-Hill Companies, 978-0-07-179053-6, 2012 83
5. R.D. Schneider, Hadoop for Dummies Special Edition, John Wiley&Sons Canada, 978-1-118-25051-8, 2012
6. Intel IT Center, "Planning Guide: Getting Started with Hadoop", Steps IT Managers Can Take to Move Forward with Big Data
Analytics, June 2012
7. S. Singh and N. Singh, "Big Data Analytics", 2012 International Conference on Communication, Information & Computing
Technology Mumbai India, IEEE, October 2011
8. http://en.wikipedia.org/wiki/Big_data , last access 11.03.2013
9. J. Manyika, M. Chui, B. Brown, J. Bughin, R. Dobbs, C. Roxburgh and A.H. Byers, "Big data: The next frontier for innovation,
competition, and productivity", mckinsey Global Institute,2011,
10. B.Gerhardt, K. Griffin and R. Klemann, "Unlocking Value in the Fragmented World of Big Data Analytics", Cisco Internet Business
Solutions Group, June 2012,
11. http://www.humanfaceofbigdata.com/ , last access 11.03.2013
12. C. Tankard, "Big Data Security", Network Security Newsletter, Elsevier, ISSN 1353-4858, July 2012
13. G. A. Lakshen, S. Vraneš and V. Janev, "Big data and quality: A literature review," 2016 24th Telecommunications Forum (TELFOR),
Belgrade, 2016, pp. 1-4. http://ieeexplore.ieee.org/stamp/stamp.jsp?Tp=&arnumber=7818902& isnumber=7818703
14. S. Angra and S. Ahuja, "Machine learning and its applications: A review," 2017 International Conference on Big Data Analytics and
Computational Intelligence (ICBDAC), Chirala,2017,pp.57-60.
15. Supervised machine learning approaches: a survey iqbal muhammad1and zhu yan2school of Information Sciences and Technology,
Southwest Jiaotong University, China
16. https://www.edureka.co/blog/machine-learning-algorithms/
17. Qbal muhammad and zhu yan: Supervised machine learning approaches: a survey doi: 10.21917/ijsc.2015.0133
18. https://medium.com/@Mandysidana/machine-learning-types-of-classification-9497bd4f2e14
19. https://machinelearningmastery.com/confusion-matrix-machine-learning/
20. https://www.oreilly.com/library/view/practical-statistics-for/9781491952955/ch04.html
21. https://machinelearningmastery.com/supervised-and-unsupervised-machine-learning-algorithms/
22. https://www.geeksforgeeks.org/k-nearest-neighbours/

Authors: Harchana Bhoopathi, B Rama


A Methodology for Discovering Upstream and Downstream Causal Relationships in Stock
Paper Title:
Market
Abstract: Causal relationships between events pertaining to stock market have potential to influence the
stakeholders of the companies associated with those events. Understanding causal relationships in stock markets
help in making intelligent decisions. Traditional prediction approaches cannot estimate the upstream and
774.
downstream causal relationships. Therefore, it is inevitable to consider portfolios that exhibit causal 4484-
relationships. Simple correlation between variables may not reflect causal relationships unless there is an event 44
that is the result of occurrence of another event. Finding upstream and downstream causal relationships is 90
challenging. In the literature it is found that inter-transactional details can help in finding causal relationships.
Based on this idea, in this paper, we planneda methodology to mine upstream and downstream causal
relationships. An algorithm by name Upstream Downstream - Causal Relationship Mining (UD-CRM) is
proposed to achieve this. The framework and underlying algorithm produce specific rules that are used to
conclude causal relations. Experiments are made with stock dataset using a prototype application built. The
experimental results revealed that the proposed framework is useful and performance better than existing
approach.

Keywords: Data mining, causal relationships, upstream and downstream causal relationships.

References:

1. Chaido DritsakiI and Melina Dritsaki-Bargiota. (2015). The Causal Relationship between Stock, Credit Market and Economic
Development: An Empirical Evidence for Greece. Economic Change and Restructuring, p1-16.
2. Imran Ali1, Kashif Ur Rehman, Ayse Kucuk Yilmaz, Muhammad Aslam Khan and Hasan Afzal. (2010). Causal relationship between
macro-economic indicators and stock exchange prices in Pakistan. ISSN. 4 (.), p1-8.
3. Valeriano. Garica and Lin Liu. (1999).Macroeconomic Determinants of Stock Market Development. Journal of Applied Economics. 2,
p1-31.
4. Dr. Naliniprava Tripathy. (2011). Causal Relationship between Macro-Economic Indicators and Stock Market in India. Asian Journal of
Finance & Accounting. 3, p1-19.
5. Dharmendra Singh1. (2005). Causal Relationship Between Macro-Economic Variables and Stock Market: A Case Study for
India. PJSS., p1-12.
6. Cristobal Romero and Sebastian Ventura. (2013). Data mining in education. DOI. 3, p1-16.
7. Paul Alagidede, Theodore Panagiotidis and Xu Zhang. (2010). Causal Relationship between Stock Prices and Exchange Rates. IEEE, p1-
22.
8. Paul and Tetlock. (2007). Giving Content to Investor Sentiment: The Role of Media in the Stock Market. FINANCE. LXI, p1-30.
9. Basabi Bhattacharya and Jaydeep Mukherjee. (2010). The Nature of the Causal Relationship between Stock Market and Macroeconomic
Aggregates in India: An Emparical Analysis.IEEE., p1-21.
10. Y.L. Hsieh, Don-Lin Yang, and Jungpin Wu. (2006). Using Data Mining to Study Upstream and Downstream Causal Relationship in
Stock Market. IEEE., p1-5.
11. Sarvnaz Karimi and Chen Wang and Alejandro Metke-Jimenez and Raj Gaire and Cecile Paris, Csiro. (2015). Text and Data Mining
Techniques in Adverse Drug Reaction Detection. ACM., p1-40.
12. Ryan S.J.D. Baker. (2009). The State of Educational Data Mining in 2009: A Review and Future Visions. Journal of Educational Data
Mining, 1, p1-14.
13. H. Witten and Eibe Frank. (2009). Data Mining: Practical Machine Learning Tools and Techniques with Java
Implementations. SIGMOD. 31, p1-3.
14. Ben Shneiderman. (2002). Inventing discovery tools: combining information visualization with data mining. ACM, p1-18.
15. Marti A. Hearst. (2009). Untangling Text Data Mining. ACM, p1-8.
16. Roxana Girju. (2009). Automatic Detection of Causal Relations for Question Answering. ACM, p1-8.
17. Sushmita Mitra, Senior Member, Sankar K. Pal, Fellow, and Pabitra Mitra. (2002). Data Mining in Soft Computing Framework: A
Survey. IEEE. 13 (.), p1-12.
18. E.W.T. Ngai, Li Xiu b, D.C.K. Chau a. (2009). Application of data mining techniques in customer relationship management: A literature
review and classification. Expert Systems with Applications., p1-11.
19. Clark Glymour, David Madigan, Daniel Pregibon and Padhraic Smyth. (2009). Statistical Inference and Data Mining. cmu, p1-18.
20. David Heckerman. (1997). Bayesian Networks for Data Mining. IEEE., p1-41.
21. Rahim Dehkharghani, Hanefi Mercan, Arsalan Javeed and Ycel Saygn. (2014). Sentimental Causal Rule Discovery from Twitter. ISSN,
p1-8.
22. Ryan S.J.d. Baker. (2010). Educational Data Mining and Learning Analytics. International Journal of Computer Applications., p1-19.
23. Kalpana Raja, Suresh Subramani and Jeyakumar Natarajan. (2013). PPInterFinder—a mining tool for extracting causal relations on
human proteins from literature. ACM., p1-11.
24. Philippe Fournier-Viger, Usef Faghihi, Roger Nkambou, and Engelbert Mephu Nguifo2. (2012). CMRules: Mining Sequential Rules
Common to Several Sequences. ACM., p1-18.
25. Antony Galtonb, Patrick Laubec and Jarod LyondSusanne Bleischa, Matt Duckhama, Antony Ga. (2012). Susanne Bleischa, Matt
Duckhama, Antony Galtonb, Patrick Laubec, Jarod Lyond. Mining candidate causal relationships in movement patterns, p1-21.
26. Tony C. Smith and Eibe Frank. (2016). Introducing Machine Learning Concepts with WEKA. IEEE, p1-26.
27. Giulio Caravagnaa, Alex Graudenzia, DanieleRamazzottia, Rebeca Sanz-Pamplonad, Luca De Sanoa, Giancarlo Mauria, Victor
Morenod, Marco Antoniottia and Bud Mishra. (2016). Algorithmic methods to infer the evolutionary trajectories in cancer
progression. IEEE, p1-10
28. Yu-Lung Hsieh, Don-Lin Yang, Jungpin Wuand Yi-Chung Chen. (2016). Efficient Mining of Profit Rules from Closed Inter-Transaction
Itemsets. Journalof Information Science and Engineering. 32, p575-595.
29. Keito Yoshimura, TakeshiOkanoue, HayaoEbise, Tsuyoshi Iwasaki, Masayuki Mizuno, ToshihideShima, Junji Ichihara and Kazuto
Yamazaki. (2016). Identification of Novel Noninvasive Markers for Diagnosing Nonalcoholic Steatohepatitis and Related Fibrosis by
Data Mining. Hepatology. 63 (2), p1-12.
30. Julia Stoyanovich, Bill Howe, Serge Abiteboul, Gerome Miklau, Arnaud Sahuguet, Gerhard Weikum. (2017). Fides: Towards a Platform
for Responsible Data Science. IEEE, p1-14.
31. Thuc Duy Le. (2017). Causal inference methods and applications in Bioinformatics. IEEE, p1-16.
32. Yuvraj Wadghule, I.R. Shaikh. (2017). Neural Network Approach for Stock Prediction using Historical Data. International Journal of
Engineering Technology, Management and Applied Sciences. 5 (7), p1-8.
33. Ruslan Mavlyutov, CarloCurino, BorisAsipov, Philippe Cudre-Mauroux. (2017). Dependency-Driven Analytics: A Compass for
Uncharted Data Oceans. IEEE, p1-9.
34. Yaguang Li, Rose Yu, Cyrus Shahabi, Yan Liu. (2018). Diffusion Convolutional Recurrent Neural Network: Data-Driven Traffic
Forecasting. IEEE, p1-16.
35. Yaguang Li, Cyrus Shahabi. (2018). A Brief Overview of Machine Learning Methods for Short-term Traffic Forecasting and Future
Directions. IEEE, p1-7.
36. Harchana Bhoopathi and B. Rama. (2017). Causal rule mining for knowledge discovery from databases. International Conference on
Intelligent Computing and Control Systems. p1-25.
37. Harchana Bhoopathi and B. Rama. (2017). A novel framework for stock trading analysis using causal relationship mining. Third
International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics, p1-25.
38. Vurukonda, S., Ranadheer, G., Mounika, B., & Reddy, S. (2013). A survey on tree based association rules (TARs) from XML
Documents. Proceedings of International Journal of Research and Computational Technology, 5.
39. Naveen Kumar, R., Vege, H.K. & Sreeram, G. 2019, "Patient treatment interval used in forecast algorithm and solicitations in hospital
queuing management", International Journal of Innovative Technology and Exploring Engineering, ISSN:2278-3075, vol. 8, no. 7, pp.
3003-3007.
40. Reddy, L.H., Thamognudu, Y. & Sreeram, G. 2019, "Deployment of a secured web application using cryptanalysis in cloud
environment", International Journal of Engineering and Advanced Technology, ISSN:2249-8958, vol. 8, no. 4, pp. 1841-1844.
41. Sreeram, G., Kanumuri, M.K. & Bodduluri, M. 2019, "Improving cloud data storage performance based on calculating score using data
transfer rate between the internetwork drives", International Journal of Engineering and Advanced Technology, ISSN:2249-8958, vol. 8,
no. 4, pp. 1830-1835.
42. Naveen Kumar, R., Vege, H.K. & Sreeram, G. 2019, " A Perspective of Probabilistic Misbehavior Detection Scheme in Vehicular Ad-
hoc Networks", International Journal of Innovative Technology and Exploring Engineering,ISSN:2278-3075, vol. 8, no. 6, pp.1098-1102

Authors: Dadi Rama Prasad, Dumpa Venkateswarlu

Paper Title: Seismic Analysis of Steel Structures with and Without Bracings in Different Seismic Zones
Abstract: In the present study four G+5 steel structures were modeled without bracings and having X, V
bracings and diagonal bracings with foundation depth of 2m support conditions are assumed to be pinned at the
bottom or at the supports/footings, seismic loads are applied as per IS:1893-2002 The structures having length =
28.2 m, width = 17m and height = 20m. The structures modeled in STAAD.Pro“structural analysis and design
software by considering various loads and load combinations by their relative occurrence are considered the
material properties considered are” Fe250 rolled steel sections structures were considered in seismic zones 2, 3,
4 and 5 X type bracings systems are observed to better in high seismic zones.

775. Keywords: bracings, seismic analysis, buildings. 4491-


44
References: 94
1. IS 1893(Part1):2002,"Criteria for earthquake resistant design of structures -General provisions and buildings", Bureau of Indian
Standards, New Delhi, India.
2. Is 800:2007, General Construction in Steel — Code of Practic
3. Vishnu Sharma, Raj Kumar, Hemant Singh3, Waseem Ahmad4, Yogendra Pratap5 International Research Journal of Engineering and
Technology (IRJET), Volume: 04 Issue: 04 | Apr -2017, e-ISSN: 2395 -0056
1* ,
4. Dhanaraj M. Patil and Keshav K. Sangle Civil Engineering, Architecture and Environmental Engineering for Sustainable
Development” ISBN: 978-81-930585-7-2
5. Moein Amini & M. Majd, M. Hosseini A Study on the Effect of Bracing Arrangement in the Seismic Behavior Buildings with Various
Concentric Bracings by Nonlinear Static and Dynamic Analyses
Authors: Sudha Dukkipati, A V G A Marthanda, G G Rajasekhar, Malligunta Kiran Kumar

Paper Title: Design Analysis and Implementation of a Three Phase Seven Level PV & Wind based Microgrid
Abstract: This paper proposes an “arrangement of converters for the incorporation of a huge photovoltaic (PV)
plant with an utility AC lattice. “The framework involves a focal seven-level voltage-bolstered inverter (VFI)
and a substantial number of PV modules with module-incorporated DC-DC converter. The seven-level VFI
comprises of three-stage, three-level VFI units associated in parallel on the AC-side. This paper additionally
proposes another sun based power age framework, which is made out of a DC/DC and DC/AC control converter
and another seven-level inverter”. This new seven-level inverter is arranged utilizing a capacitor choice circuit
and a full-connect control converter, associated in course. Seven dimension changes over sustained with PV
modules give a practical answer for moderating consonant related issues brought about by diode or thyristor
rectifier front-closes. To deal with the huge remuneration flows and give better warm administration, at least two
paralleled semiconductor exchanging gadgets can be utilized. The proposed PV based seven dimension topology
can likewise create seven voltage levels, which fundamentally diminishes the exchanging current swell and the
measure of inactive components.The execution of the proposed power converters framework is considered
utilizing MATLAB/Simulink.

Keywords: PV, DC/DC Converter, voltage bolstered inverter.

References:
776.
4495-
1. A Review of Single-Phase Grid-Connected Inverters for Photovoltaic Modules Soeren Baekhoej Kjaer, Member, IEEE, John K. 44
Pedersen, Senior Member, IEEE, and Frede Blaabjerg, Fellow, IEEE
2. C. W. Chou is with the Department of Microelectronic Engineering, National Kaohsiung Marine University, Kaohsiung, Taiwan, 98
R.O.C.
3. M. Hanif, M. Basu, K. Gaughan., “Understanding the operation of a Z- source inverter for photovoltaic application with a design
example,” IET Power Electron., Vol. 4, No. 3, pp.278-287, 2011.
4. J, M. Shen, H. L. Jou, J. C. Wu, “Novel Transformer-less Grid-connected Power Converter with Negative Grounding for Photovoltaic
Generation System,” IEEE Trans. Power Electronics, Vol. 27, No. 4, pp.1818-1829, 2012.
5. N. Mohan, T. M. Undeland, W. P. Robbins, Power Electronics Converters, Applications and Design, Media Enhanced 3rd ed. New
York: John Wiely& Sons, 2003.
6. K. Hasegawa, H. Akagi, “Low-Modulation-Index Operation of a Five-Level Diode-Clamped PWM Inverter With a DC-Voltage-
Balancing Circuit for a Motor Drive ,” IEEE Trans. Power Electron., Vol. 27, No. 8, pp.3495-3505, 2012.
7. J. Huang and K. A. Corzine, “Extended operation of flying capacitor multilevel inverters,” IEEE Trans. Power Electron., vol. 21, no. 1,
pp. 140– 147, Jan. 2006.
8. P. Xiao, K. A. Corzine, and G. K. Venayagamoorthy, “A novel sevenlevel shunt active filter for high-power drive systems,” in Proc.
IEEE Ind. Electron. Soc. Conf., Paris, France, Nov. 2006, pp. 2262–2267.
9. Vellanki Mehar Jyothi, T. Vijay Muni, S V N L Lalitha, “An Optimal Energy Management System for PV/Battery Standalone System,”
International Journal of Electrical and Computer Engineering, vol. 6, pp. 2538, 2016.
10. T. Vijay Muni, D. Priyanka, S V N L Lalitha, “Fast Acting MPPT Algorithm for Soft Switching Interleaved Boost Converter for Solar
Photovoltaic System”, Journal of Advanced Research in Dynamical & Control Systems, Vol. 10, 09-Special Issue, 2018.
11. T Vijay Muni, SVNL Lalitha, B Krishna Suma, B Venkateswaramma, “A new approach to achieve a fast acting MPPT technique for
solar photovoltaic system under fast varying solar radiation”, International Journal of Engineering & Technology, Volume7, Issue 2.20,
pp-131-135.
12. T Vijay Muni, S V N L Lalitha, “Power Management Strategy in Solar PV System with Battery Protection Scheme”, International
Journal of Innovative Technology and Exploring Engineering, Volume 8, Issue 6, pp-960-964.
13. T Vijay Muni, S V N L Lalitha, “Fast Acting MPPT Controller for Solar PV with Energy Management for DC Microgrid”,
International Journal of Engineering and Advanced Technology, Volume 8, Issue 5, pp-1539-1544.
14. T. Vijay Muni, K. Venkata Kishore, Experimental Setup of Solar-Wind Hybrid Power System Interface to Grid System. International
Journal for Modern Trends in Science and Technology, Vol 2, Issue 1, January 2016

Authors: K S L N S Subrahmanyam, A V N Murthy

Paper Title: Major Determinants of Profitability on Banking Industry (An Empirical Research)
Abstract: Banking industry is a backbone of any country including developed, developing and under
developed countries. The prosperity of a country depends upon all important sectors that are responsible for
promoting trade, industry, agriculture and commerce. In other words it can be said that the banking industry’s a
key player of and country. Today, the meaning of banking has gone beyond the basic function of receiving
deposits and lending advances. Banks promote good Indian as well as foreign trade. The basic objective of this
research is to assess impact of important determinant on the financial performance and profitability. Since, the
term research is limit less the focus is being reduced to a few selected private sector banks to know that they are
playing a crucial role in determining important factors on the financial performance and profitability of the said
banks during the period of 2014 to 2017. The period was selected because the new Government during the
period took important decisions on demonetization and goods and services tax Act.
777. Keywords: Profitability, Nationalized banks, Correlation, Multiple Regression, Paired T test. 4499-
45
References: 11
1. Thiagarajan S., Ayyappan S., Ramachandran A. &Sakthivadivel M (2011): “An Analysis of Determinants of Profitability in Public and
Private Sector Banks in India” Research Journal of Social Science & Management vol. 01, No.6, October 2011.
2. Dr.KajalChaudhary& Monika Sharma ,Performance of Indian Public Sector & Private Sectors banks a Comparative Study
,International Journal Of Innovation ,Management & Technology ,Vol 2,No 3,June 2011,PP- 249-256.
3. Gupta SB. Monetary economics: institutions, theory and policy. New Delhi: S Chand and Company; 2001.
4. Koeva P. e performance of Indian banks during financial liberali-sation. International Monetary Fund Working Paper; 2003.
5. Kumbhakar SC, Sarkar S. De-regulation, ownership and efficiency in India banking. Arthaniti. 2004; 2(1–2):1–26.
6. Sensarma R. Cost and profit efficiency of Indian Banks during 1986-2003. Econ Polit Weekly. 2005 Mar; 40(12):198–09.
7. Rizvi HS, Rajan RS. Banking sector reforms in global economy. Manag Account. 2006 Aug; 16(5):617–21.
8. Singla HK. Financial performance of banks in India. e ICFAI Journ of Bank Manag. 2008 Feb; 7(1):50–62.
9. Ahmed J. Management of non-performing assets of commercial banks in India. Manag Account. 2009 Jun; 20(4):470–8.
10. Goel SK. Financial performance of commercial banks in India in post reforms era - an empirical study. Germany: LAP LAMBERT
Academic Publishing; 2012. ISBN: 978–3–659–19176–3.

Authors: Repudi Veerendra Kumar, Gummadidala Venkata Rao

Paper Title: Reducing the Delay by Optimizing the Via in Compact Automatic Metal Routing Algorithm
Abstract: The Very Deep Submicron Technology (VDSM) shrinking rapidly, we have 22nm, 14nm, 7nm and
now research going on 5nm technology. That means size of the transistor shrinking, and number of
interconnections increased as well. Resulting interconnections playing a major role in delay, IR drop, area etc.
To reduce the delay, we are utilizing higher metal layers. Further we gone for Compact Automatic Metal
Routing, nothing but Over the cell channel routing to efficiently perform routing, but the problem for such type
of routing technique, stacked vias needed and that results increased resistance, delay, IR drop will degrade the
performance. That may be obstacle to meet timing in Clock Tree Synthesis stage (CTS). This paper mainly focus
on reducing the delay further by designing the via structure by using the tool cadence encounter.

778. Keywords: Via, Routing, Physical Design, VDSM.


4512-
References: 45
15
1. Bhaskar Das , Ashim kumar Mahato , Ajoy Kumar Khan, “A Novel Approach for Constrained Via Minimization
Problem in VLSI Channel Routing” 2015 International Conference on Electronic Design, Computer Networks & Automated
Verification (EDCAV). Doi: 10.1109/EDCAV.2015.7060556
2. Deepti Khugre. Pratik Prashant Kulkarni, Vinay Sharma, “Compact Automatic Metal Routing Algorithm in DSM technologies”, 2017
International Conference on Computing, Communication, Control and Automation (ICCUBEA). Doi:
10.1109/ICCUBEA.2017.8463788
3. M. Marek-Sadowska, "Automated Routing for VLSI: Kuh's Group Contributions," in IEEE Circuits and Systems Magazine, vol. 16,
no. 2, pp. 35-49, Secondquarter 2016. doi: 10.1109/MCAS.2016.2549948
4. Naveed A. Sherwani “Algorithms for VLSI Physical
Design Automation” third edition, ©2002 Kluwer Academic
Publishers
5. www.cadence.com

Authors: T Hima Bindu, P. Dedeepya

Paper Title: A Simple Two-Level Channel Estimation Scheme for OFDM System
Abstract: Due to its robustness to multipath delay spread and impulse noise, and also elevated spectral
779. efficiency like characteristics, OFDM technology has been commonly adopted in contemporary wireless 4516-
communication systems like LTE. The heart of an OFDM system is Channel estimator and the efficiency of 45
channel estimation (CE) has a direct impact on the bit error rate performance of the system also the CE 20
performance itself depends on effective estimation of fading channel hence the channel estimation problem has
to be addressed. The popular LS based CE method is accepted for its simplicity but is found to be vulnerable to
noise whereas the simple MMSE based CE that provides fine-tuned estimation still suffers from complexity as it
depends on the knowledge of channel statistics (KCS). Hence a two level channel estimation technique that is a
combination of kalman filter and thresholding scheme which denoises the LS initial estimates is proposed. The
kalman filter tracks the estimates with initial data as LS estimates and threshold helps in selecting the significant
data thus denoising the estimates and also filters the redundancy in estimated data. On comparing the existed CE
techniques with that of the proposed scheme, the MSE performance of proposed scheme is found to be optimal
and simple to that of the LMMSE technique.

Keywords: Channel Estimation, Kalman filter, OFDM system, threshold and two level schemes.

References:

1. M.Rahnema, April 1993, “Overview of the GSM system and protocol architecture”, IEEE communication magazine, 31(4), pp.92-100.
2. Amit Dixit Aanchal Garg,Sap 2014, “A study on cellular GSM &CDMA based for New Generation Mobile Radio system”, pp. 419-
426.
3. Hasan M, Thakur J.M and Podder P,Apr 2016, “Design and implementation of FHSS and DSSS for secure Data
Transmission”,International Journal of Signal Proc.,4(2).
4. Sukhpal singh and Harmanjot singh, 2015, “Review paper on OFDM concepts and applications”, IJEDR, 3(3).
5. Coleri S, Ergen M, Puri A and Bahai,2002, “A channel estimation technique based on pilot arrangement in OFDM systems”, IEEE
Trans.on Broadcasting, 48(3), pp. 223-229.
6. Jan-Jaap Van de Beek, Ove E, Magnus S, Sarah K W and Per O Borjesson , July 1995, “On channel estimation in OFDM systems”,
IEEE Vehicular Tech. conference (VTC’96) in chicago, pp. 815-819.
7. Hlaing Minn and Vijay K B, 2000, “An Investiagtion into time domain approach for OFDM channel estimation”, IEEE Trans. On
Broadcasting, pp. 240-248.
8. Raghavendra and Giridhar K, Jan 2005, “Improving Channel Estimatiion in OFDM systems for sparse multipath channels”,IEEE signal
Process. Letters, pp. 52-55.
9. A. Alnuaimy, Ismail M and Ali M,2010, “Successive data schism and interpolation for channel estimation in OFDM using Wavlet
denoising”, in 12th International Conf. on Advanced Comm. Tech, pp.661-665.
10. Stefano R, Giovanni E.C and Alessandro V-C,2012, “OFDM channel estimation based on impulse response decimation: analysis and
novel algorithms”, IEEE Transaction Comm.
11. Zijian T, Rocco C C and Paolo B May 2007, “Pilot-Assisted Time-Varying Channel Estimation for OFDM sytems”,IEEE Transaction
signal process., 55(5), pp. 2226-2238.
12. Zijian T, Geert Leus, Rocco C C and Paolo Banelli,2006, “Pilot assisted time varying OFDM channel estimation”, Proc.
13. Osvalso S, Yeheskel Bar-Ness and Spagnolini, “Pilot-Based channel estimation for OFDM systems by tracking the delay-subspace,”
IEEE Transaction on wireless comm., 3(1), pp. 315-325.
14. Min H, Xiang Chen, Shidong Zhou and Jing W,2006, “Low-complexity Subspace Tracking Based Channel Estimation method for
OFDM systems in Time-varying channels” IEEE Int. Conf. Comm., Istanbul, Turkey, pp. 4618-4623.
15. Evripidis K, Kin L and Wei D, “Tracking dynamic sprase signals using hierarchical Bayesian Kalman Filters”, IEEE Int. Conf. on
Acoustics, Speech and signal process., pp. 6546-6550.
16. John Proakis Digital communications,1989, McGraw-Hill.
17. Zakia J and Leila N A, Dec 2017“Fast Fading Channel Estimation by Kalman Filtering and CIR support Tracking”, IEEE Trans. On
Broadcasting, 63(4), pp. 635-643.
18. Van de Beek, Sandell M and p.O.Borjesson, Jul 1997, “ML Estimationof time and frequency offset in OFDM systems”, IEEE Trans.
On Signall Process.,45(7), pp. 1800-1805.
19. Ove Edfors, Magnus S, J.-J. Van de Beek, Sarah K. Wilson and Per O. Borjesson, Apr 1996, “OFDM Channel estimation by Singular
value decomposition”, IEEE Veh. Tech. Conf.,Atalanta, USA,pp. 923-927.
20. Omar M Elbadri and Ahmed S. Elbarsha, “Kalman-Filter Channel Estimation for OFDM systems in time varying channel”.

Authors: Roshini R, P. N. Chandramouli

Paper Title: Incorporation of Long Term Climate Changes in Hydrological Modelling


Abstract: One of climate change's most important concerns at the moment is its impact on hydrology as it has
direct links with agriculture, vegetation, and livelihood. This study tries to analyze potential future climate
change in the Kumaradhara river basin. This study involved three steps: (1) acquiring and using general
circulation model (GCM) to project future global climate scenarios; (2) establishing statistical relationships
between GCM data and observed data using Statistical Downscaling Model (SDSM); (3) downscaling the
second generation Canadian Earth system Model (CanESM2)GCM output based on the established statistical
relationship. The statistical downscaling is carried out for three scenarios used in the fifth evaluation report of
the recent Intergovernmental Panel on Climate Change (IPCC) viz., Representative Concentration Pathways
(RCPs) 2.6, 4.5 and 8.5. The statistical downscaling Model (SDSM) results showed that the mean annual daily
780. precipitation is altered in the basin under all the scenarios but it will be different in different time periods
depending on scenarios and the basin will experience the reduced precipitation levels in summer. Also the 4521-
precipitation will marginally rise in all the time slices with reference to baseline data. We can conclude from the 45
results that this region's climate will affect future farming as the availability of water is bound to change. This 26
study should, however, be followed up by a larger study incorporating multiple CMIP5 models such that
changes in hydrological-regimes can be examined appropriately.

Keywords: climate change impacts; general circulation model; CanESM2; RCPs; Statistical downscaling;
SDSM.

References:

1. Chong-yu Xu, (1999), “ From GCMs to river flow: a review of downscaling methods and hydrologic modelling approaches.” Progress
in Physical Geography , 23, 229–249.
2. Deepashree Raje, Mujumdar P. P, (2011), “A Comparison Of Three Methods For Downscaling Daily Precipitation In The Punjab
Region.” Hydrological Processes, 25, 3575–3589.
3. Dildar Hussain Kazmi, Ghulam Rasul, Jianping Li, Suhail Babar Cheema, (2014), “Comparative Study for ECHAM5 and SDSM in
Downscaling Temperature for a Geo Climatically Diversified Region, Pakistan.” Applied Mathematics, 5, 137-143.
4. Erle Kristvik, Guro Heimstad Kleiven, Jardar Lohne and Tone Merete Muthanna, (2018), “Assessing the robustness of raingardens
under climatechange using SDSM and temporal downscaling.” Water Science & Technology, 77.6, 1640-1650.
5. Koukidis E. N. and Berg A. A, (2010),“Sensitivity of the Statistical Downscaling Model (SDSM) to reanalysis products.” Atmosphere-
Ocean, 47:1, 1-18.
6. Md Shahriar Pervez, Geoffrey M. Henebry, (2014), “Projections of the Ganges Brahmaputra precipitation—downscaled from GCM
predictors.” Journal of Hydrology, 517, 120–134.
7. Meenu R, Rehana S and Mujumdar P. P, (2012), “Assessment of hydrologic impacts of climate change in Tunga–Bhadra river basin,
India with HEC-HMS and SDSM.” Hydrological Processes.
8. Rashid Mahmood, Mukand S Babel, (2014), “Future changes in extreme temperature events using the statistical downscaling model
(SDSM) in the trans-boundary region of the Jhelum river basin.” Weather and Climate Extremes.
9. Sachindra D.A, Perera B. J. C, (2016), “Statistical Downscaling of General Circulation Model Outputs to Precipitation Accounting for
Non-Stationarities in Predictor-Predictand Relationships.” PLoS ONE 11, 12, 1-21.
10. Shivam Tripathi, V.V. Srinivas, Ravi S. Nanjundiah, (2006), “Downscaling of precipitation for climate change scenarios: A support
vector machine approach.” Journal of Hydrology, 330, 621– 640.
11. Subimal Ghosh, (2010), “SVM‐PGSL coupled approach for statistical downscaling to predict rainfall from GCM output.” JOURNAL
OF GEOPHYSICAL RESEARCH, 115, 1-18.
12. Taie Semiromi M and Koch M, (2014),” Prediction of Climate Change Impacts on Groundwater Storage by Analysis and Modeling of
Hydrograph Recession Curves: Application to the Bar Watershed, Iran.” 809-817.
13. Tao Jiang, Yongqin David Chen, Chong-yu Xu, Xiaohong Chen, Xi Chen,Vijay P. Singh, (2007), “Comparison of hydrological
impacts of climate change simulated by six hydrological models in the Dongjiang Basin, South China.” Journal of Hydrology, 336,
316– 333.
14. Tao Yang, Huihui Li, Weiguang Wang, Chong-Yu Xu, and Zhongbo Yu, (2012), “Statistical downscaling of extreme daily
precipitation, evaporation, and temperature and construction of future scenarios.” Hydrological Processes, 26, 3510–3523.
15. William Kininmonth, Anthony Lupo, “Global Climate Models and Their Limitations.” Climate Change Reconsidered II,
16. Yu Wang, Jianmin Bian, Yongsheng Zhao, Jie Tang & Zhuo Jia, (2018), “Assessment of future climate change impacts on nonpoint
source pollution in snowmelt period for a cold area using SWAT.” Scientific Reports, 8:2402.

Authors: R. Jayaraj, T.Suresh

Paper Title: Channel Occupancy Ratio Based TCP Congestion Control in Adhoc Networks
Abstract: Wireless Network is been used widely in the recent years due to its low-cost nature. More number of
real time applications have been used by varied segments of users across the world. The advancements in the
mobile technology have made ad hoc networks as important and active field of communication and networks.
Most of the time the network cannot handle the traffic in the network which ultimately affects the Quality of
Service (QoS). The conventional Transmission Control Protocol (TCP) cannot handle this huge volume of traffic
and control the congestion in the network. This issue in the wireless network is been addressed by various
researchers in the world but still the scope and need for improvements are more. This paper analyzes many TCP
congestion control mechanisms and proposes an efficient approach for congestion control by estimating Channel
Occupancy Ratio (COR). The COR is estimated based on machine learning algorithm which is trained using the
historical data extracted from MAC layer. This cross layer based approach is found to be more efficient when
compared to other methods proposed in the literature.

Keywords: Quality of service, transmission control protocol, channel occupancy ratio, machine learning.

References:

781. 1. Bisoy, Sukant Kishoro, and Prasant Kumar Patnaik. "Interaction between internet based TCP variants and routing protocols in
MANET." Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013. 4527-
Springer, Cham, 2014. 45
2. Seddik-Ghaleb, Alaa, Yacine Ghamri-Doudane, and Sidi-Mohammed Senouci. "TCP WELCOME TCP variant for Wireless
Environment, Link losses, and COngestion packet loss ModEls." Communication Systems and Networks and Workshops, 2009.
32
COMSNETS 2009. First International. IEEE, 2009.
3. Yang, Peng, et al. "TCP congestion avoidance algorithm identification." IEEE/Acm Transactions On Networking 22.4 (2014): 1311-
1324.
4. Jain, Monal, Deepak Singh Tomar, and Shiv Kumar Singh. "A Survey on TCP Congestion Control Schemes in Guided Media and
Unguided Media Communication." International Journal of Computer Applications 118.3 (2015).
5. Youssef Bassil, "TCP Congestion Control Scheme for Wireless Networks based on TCP Reserved Field and SNR Ratio" International
Journal of Research and Reviews in Information Sciences (IJRRIS), ISSN: 2046-6439, Vol. 2, No. 2, June 2012.
6. A Khurshid, M.H. Kabir, M.A.T Prodhan, "An improved TCP congestion control algorithm for wireless networks ", IEEE Pacific Rim
Conference on Communications, Computers and Signal Processing (PacRim), pp. 382-387, 23-26 August 2011.
7. Kun Tan, Qian Zhang, XueminShen, " Congestion Comtrol in Multihop Wireless Network", IEEE Transaction on Vehicular
Technology.
8. ManjeetKaur Bedi1, Kendar Pratap2 and Raj Kumari "A New Approach for Congestion Control In Wireless Network and analyze it for
TCP" International Journal of Application or Innovation in Engineering & Management (IJAIEM), Volume 1, Issue 2, October 2012.
9. YeguiCai, Shengming Jiang, Quansheng Guan, F Richard Yu, "Decoupling congestion control from TCP (semi-TCP) for multi-hop
wireless networks", Springer EURASIP Journal on Wireless Communications and Networking, pp. 1-14, 2013.
10. T.Padmapriya, S.V. Manikanthan, “LTE-A Intensified Voice Service Coder using TCP for Efficient Coding Speech”, International
Journal of Innovative Technology and Exploring Engineering, Vol. 8, issue 7s, 2019.
11. David Q. LIU, Williana Jean Baptiste, "On Approaches to Congestion Control over Wireless Networks", International Journal of
Communications Network and System Sciences, pp. 169-247, 2009.
12. D. Yuvaraj, Shuib Basri, “Prevention, Reduction and Recognition of Wormhole Attack by Coordination in the Wireless Adhoc
Network”, International Innovative Research Journal of Engineering and Technology, v4, i3, 2019.

782. Authors: M. Musa, M. A. Othuman Mydin, A. N. Abdul Ghani


Influence of Oil Palm Empty Fruit Bunch (EFB) Fibre on Drying Shrinkage in Restrained
Paper Title:
Lightweight Foamed Mortar
Abstract: Currently, the attention on natural fibre reinforced concrete based materials could be seen
increasingly rising around the world in the quest for economic and environmental importance in the construction
sector and built environment. Hence this research will focus on inclusion of oil palm empty fruit bunch (EFB)
fibre on drying shrinkage of lightweight foamed mortar (LFM). There were three densities of LFM was
considered which were 800kg/m³, 1100kg/m³ and 1400kg/m³.The size for the empty fruit bunch (EFB) fibre was
between 15-19mm with diverse volume fractions of 0.15%, 0.30%, 0.45% and 0.60% by LFM mix volume. The
drying shrinkage test was performed according to American Standard ASTM C157. The test specimen
dimension is a 75mm x 75mm x 275 mm prism shaped utilising a standard stainless mould which conforms to
ASTM C490. The experimental results revealed that the inclusion of 0.3% EFB fibre in 800 kg/m3 density,
0.45% EFB fibre in 800 kg/m3 and 1400 kg/m3 densities possess the lowest percentage value of drying
shrinkage at the final age of testing compared to control specimen and other EFB fibre volume fraction. In
addition, EFB fibre exhibits a micrometer level diameter and hydrophilicity attributes which make it highly
dispersible. It also has a capability to be distributed homogeneously along with the synchronicity of a great
fibres quantity in unit volume of LFM.

Keywords: foamed mortar, shrinkage, crack, concrete, fibre, oil palm.

References:

1. J. Kerienė, M. Kligys, A. Laukaitis, G. Yakovlev, A. Špokauskas, and M. Aleknevičius, “The influence of multi-walled carbon
nanotubes additive on properties of non-autoclaved and autoclaved aerated concretes,” Construction and Building Materials, vol. 49, pp.
527–535, 2013
2. A.A. Hilal, N. H. Thom and A. R. Dawson, “On void structure and strength of foamed concrete made without/with additives,”
Construction and Building Materials, vol. 85, pp. 157-164, 2015
3. J. Norgaard, M.A. OthumanMydin, “Drywall Thermal Properties Exposed to High Temperatures and Fire Condition, JurnalTeknologi,”
vol. 62, no. 1, pp. 63-68, 2013
4. S. Soleimanzadeh and M.A. OthumanMydin, “Influence of High Temperatures on Flexural Strength of Foamed Concrete Containing Fly
Ash and Polypropylene Fiber,” International Journal of Engineering, vol. 26, no, 1, pp. 365-374, 2013
5. M.A. OthumanMydin, N. Md. Noordin, N. Utaberta, M.Y. MohdYunos and S. Segeranazan, “Physical Properties of Foamed Concrete
Incorporating Coconut Fibre,” JurnalTeknologi, vol. 78, no. 5, pp. 99-105, 2016
6. S.F. Korenkova and Y.V. Sidorenko, “Improving durability of cement composite materials,” Procedia Engineering, vol. 111, pp. 420– 4533-
424, 2015 45
7. S.-Y. Chung, M. A. Elrahman, J.-S. Kim, T.-S. Han, D. Stephan and P. Sikora, “Comparison of lightweight aggregate and foamed
concrete with the same density level using image-based characterizations,” Construction and Building Materials, vol. 211, pp. 988–999,
38
2019
8. E. K. Nambiar, K. Ramamurthy, “Air–void characterisation of foam concrete,” Cement and Concrete Research, vol. 37, pp. 221–230,
2007
9. M.R. Jones and A. McCarthy, “Preliminary views on the potential of foamed concrete as a structural material,” Magazine of Concrete
Research, vol. 57, no. 1, pp. 21-31, 2005
10. Y. H. Amran, N. Farzadnia, A. A. Ali, “Properties and applications of foamed concrete; a review,” Construction and Building Materials,
vol. 101, pp. 990–1005, 2015
11. K.C. Brady, G.R.A. Watts and M.R. Jones, “Specification for Foamed Concrete,” p. 78, 2001.
12. E. Serri, M.A. OthumanMydin and M.Z. Suleiman, “Thermal Properties of Oil Palm Shell Lightweight Concrete with Different Mix
Designs,” JurnalTeknologi, vol. 70, no, 1, pp. 155‐159, 2014
13. I.A.R. Noraini, M. Zahari, A. Mujahid and A. Zaidi, “Foamed Concrete: Potential Application in Thermal Insulation,” Proceedings of
MUCEET2009 Malaysian Technical Universities Conference on Engineering and Technology, pp. 47–52, 2009
14. ASTM C157, “Standard Test Method for Length Change of Hardened Hydraulic-Cement Mortar and Concrete,” ASTM International,
2017.
15. ASTM C490, “Standard Practice for Use of Apparatus for the Determination of Length Change of Hardened Cement Paste, Mortar, and
Concrete,” ASTM International, 2017.
16. D. Saje, B. Bandelj, J. Sustersic, J. Lopatic, and F. Saje, “Shrinkage of Polypropylene Fibre-Reinforced High-Performance Concrete,”
Journal of Materials in Civil Engineering, vol. 23, no. 7, pp. 941-952, 2011
17. B. Roohollah, R.P. Hamid, A.H. Sadeghi, L. Masoud, A.M. Ali, “An investigation on adding polypropylene fibres to reinforce
lightweight cement composites (LWC),” Journal of Engineered Fibres and Fabrics, vol. 7, no. 4, pp. 13-21, 2012
18. M.A. Othuman Mydin, N.A. Rozlan and S. Ganesan, “Experimental study on the mechanical properties of coconut fiber reinforced
lightweight foamed concrete,” Journal of Materials and Environmental Science, vol. 6, no. 2, pp. 407-411, 2015
19. K. Ramamurthy, E. K. Nambiar and G. Ranjani, “A classification of studies on properties of foam concrete”, Cement and Concrete
Composites, vol. 31, pp. 388-396, 2009
20. M.A. Othuman Mydin, M. Musa and A.N. Abdul Ghani, “Fiber Glass Strip Laminates Strengthened Lightweight Foamed Concrete:
Performance Index, Failure Modes and Microscopy Analysis,” AIP Conference Proceedings, vol. 2016 (September), pp. 1-8, 2018
21. A. Just and B. Middendorf, “Microstructure of high-strength foam concrete,” Mater. Charact., vol. 60, pp. 741–748, 2009
22. M.A. Othuman Mydin, Y.C. Wang, “Thermal and mechanical properties of lightweight foamed concrete at elevated temperatures,”
Magazine of Concrete Research, vol. 64, no. 3, pp. 213-224, 2012
23. Padmapriya, T., Saminadan, V., “QoE based carrier aggregation techniques in LTE-Advanced networks”, Proceedings of the
International Conference on Intelligent Sustainable Systems, ICISS 2017, 2018.
24. J.S. Ruben and G. Baskar, “Experimental Study of Coir Fiber as Concrete Reinforcement Material incement Based Composites,”
Engineering Research and Applicatio n, vol. 4, no. 1, pp. 128–131, 2014.

Authors: Ruqiya, CHVRS Gopala Krishna, L.Nageswara Rao

Paper Title: Design of Te21 Mode Coupler in Ka Band for Antenna Feeds
783.
Abstract: In this paper, a compact TE21 mode coupler is designed for tracking Low Earth Orbit Satellites. The 4539-
tracking feed has to be employed to provide the error signal to servo systems feedback mechanism. The design 45
incorporates the circular and eight rectangular waveguides with 13 asymmetric circular apertures on a single 42
rectangular arm. The arrangement is small in size provides good return loss and VSWR The designed
configuration presents return loss is better than -30dB and VSWR around 1.06 for frequency range of 25.5-
27GHz. The designed model is simulated and analysed using CST.

Keywords: Autotracking TE21 mode coupler, coupling aperture, satellite communication.

References:

5. Seyed H Mohseni Armaki “Optimum shape and size of slots for TE21 tracking mode coupler” IEICE Electronics vol.8, No.9,657-662,
2011
6. Ying-Yi He; Chuan-Fei She; Xian-Fa Tang; Biao L “Design of a TE21-Mode Coupler for Antenna Feeds “978-1-4244-5708-
3/10/$26.00©2010IEE
7. D. Savini, “ An improved automatic tracking system dor linear and circular polarizations”, 10 th European microwave conference, pp.
480-484, 1980
8. Zhi Xu1,2 and Changhong Liang “Ka/S Dual band antenna for satellite communication”. MICROWAVE AND OPTICAL
TECHNOLOGY LETTERS / Vol. 54, No. 5, May 2012.
Authors: Ujjawal, Yogesh Chaba

Paper Title: Mobility Management Techniques in 5G Wireless Networks


Abstract: Current innovation in the field of Mobile and Wireless network will increase the use of mobile
devices which procreated in an outburst of traffic passing through the internet. Due to the explosion of traffic
mobility management has become a challenge in future mobile and wireless networks. To deal with such an
explosion, mobile networks are becoming flatter as compared to previous hierarchical mobile networks. This
paper presents a detailed survey of solutions for currently mobility management such as Centralized mobility
management techniques for mobile and wireless networks, described the limitation of Centralized Mobility
Management which is hierarchical and centralized in nature and discussed an approach which removes the
limitation of Centralized mobility management called as Distributed mobility management. This paper also
discussed two different approaches of Distributed mobility management such as Client based Distributed
mobility management and Network based Distributed mobility management.

Keywords: IP Mobility Management, Centralized mobility management, Distributed Mobility Management,


5G Wireless Networks.

References:

1. Akhil Gupta, Rakesh Kumar Jha, “A Survey of 5G Network: architecture and Emerging Technologies”, IEEE Journals &Magazines,
Vol. 3, pp. 1206-1232, July 2015.
2. “Looking ahead to 5G Building a virtual zero latency gigabit experience”, White Paper by Nokia Networks,2014.
3. Jaydip Sen, “Mobility and Handoff Management in Wireless Networks”, Trends in Telecommunications Technologies, Nov 2010.
4. H Anthony Chan, “Distributed Mobility Management with Mobile IP”, IEEE International Conference on Communication, pp. 6850-
6854, June 2012.
5. D. Liu, Z. Cao, P. Seite, and H. Chan, “Distributed mobility management,” IETF draft-liu-distributed mobility - 02, July 2010.
6. H. Chan , D. Liu , P. Seite, H. Yokota, and J. Korhonen, “Requirements for Distributed Mobility Management” draft-ietf-dmm-
requirements 04, May 2013.
784. 7. H. Anthony Chan, “Distributed mobility management with mobile IP,” in International Communication Conference (ICC), Workshop
on Telecommunications: from Research to Standards, 2012 IEEE, 2012, pp.6850-6854. 4543-
8. Liu Yu, Zhao Zhijun, Lin Tao, Tang Hui, “Distributed Mobility Management Based on Flat Network Architecture”, IEEEICST 45
WICON, pp. 1-6, June 2010. 47
9. H Anthony Chan, Hidetoshi Yokota, Jiang Xie, Pierrick Seite, Dapeng Liu, “Distributed and Dynamic Mobility Management in Mobile
Internet: Current Approaches and Issues”, Journal of Communications, Vol. 6, No.1, February 2011.
10. Carlos J. Bernardos, Juan Carlos Z´uniga, Alex Reznik, “Towards Flat and Distributed Mobility Management: a 3GPP Evolved
Network Design”, IEEE International Conference on Communication, pp. 6855-6861, January 2012.
11. Jong-Hyouk Lee, Jean-Marie Bonnin, Pierrick Seite, H.Anthony, “Distributed IP Mobility Management from the Perspective of the
IETF: Motivations, Requirements, Approaches, Comparison sand Challenges”, IEEE Wireless Communication, Vol. 20, Issue:5 , pp.
159-168, Oct 2013.
12. D. Liu, J. Zuniga, P. Seite, H. Chan, and C. Bernardos, “Distributed Mobility Management: Current practices and gap analysis,” 2014,
draftietf-dmm-best-practices-gap-analysis-07.
13. Juan Carlos Zuniga, Carlos J. Bernardosy, TelemacoMeliaz, Antonio de la Olivay, RuiCostaz, Alex Reznikx, “Distributed Mobility
Management: A Standards Landscape”, IEEE Communication Magazine,Vol. 51, Issue:3, pp 80-87, March 2013.
14. Dong-Hoon,Shin,Danny Moses and Muthaiah Venkatachalam, “Distributed Mobility Management for Efficient Video Delivery over
All-IP Mobile Networks: Competing Approaches”, IEEE Network, Vol. 27, Issue:2, pp. 28-33, April 2013.
15. H. Chan et al., “Requirements for Distributed Mobility Management,” RFC 7333, Apr. 2014.
16. Jong-Hyouk Lee, Kamal Deep Singh,Jean-Marie Bonnin, Sangheon Pack, “Mobile Data Offloading: A Host-Based Distributed
Mobility Management Approach”, IEEE Internet Computing, Vol. 18, Issue:1, pp. 20-30, June 2014.
17. P. Louin, and P. Bertin, “Network and Host Based Distributed Mobility,” International Symposium on Wireless Personal Multimedia
Communications (WPMC), IEEE, Oct. 2011.
18. Fabio Giust, Luca Cominardi, and Carlos J. Bernardos, “Distributed Mobility Management for Future 5G Networks: Overview and
Analysis of Existing Approaches”, IEEE Commun. Mag.,Vol. 53, Issue:1,pp. 142-149, January 2015.
19. C. J. Bernardos, A. De La Oliva, and F. Giust, “A PMIPv6-based solution for Distributed Mobility Management,” Jan. 2014, IETF
draft, draft-bernardos-dmm-pmip-03.
20. Heeyoung JUNG, Moneeb GOHAR , Ji-In KIM,Seok-Joo KOH, “Distributed Mobility Control in Proxy Mobile IPv6 Networks”,
IEICE Transaction on Communication Vol.E94-B No.8, pp.2216-2224, Aug 2011.
21. Ji In Kim, Seok Joo Koh , “Distributed Mobility Management in Proxy Mobile IPv6 using Hash Function”, The International
Conference on Information Networking” p.p. 107 – 112, 2013.
22. Johanna Heinonen, Pekka Korjay, Tapio Parttiz, Hannu Flinckx and Petteri PöyhönenJi, “Mobility Management Enhancements for 5G
Low Latency Services”, IEEE ICC 2016-Workshops: W01-Third Workshop on 5G Architecture (5GArch 2016).
23. Tiago Condeixa, Susana Sargento, “Distributed Mobility Management in Future Networks: Tunneling or Host Routing?”, IEEE
Symposium on Computers and Communication (ISCC) 2016.
24. Ibrahim Elgendi, Kumudu S. Munasinghe, Abbas Jamalipour, “A Three-Tier SDN Based Distributed Mobility Management
Architecture for DenseNets” IEEE ICC - Mobile and Wireless Networking Symposium, 2016.
25. Tien-Thinh Nguyen, Christian Bonnet, and Jerome Harri, “SDN-Based Distributed Mobility Management for 5G Networks”, IEEE
Wireless Communications and Networking Conference (WCNC) 2016.
26. Shouman Barua, Robin Braun, “Mobility Management of D2D Communication for the 5G Cellular Network System: A Study and
Result”, 17th International Symposium on Communications and Information Technologies (ISCIT),2017.
27. Yuanguo Bi, Guangjie Han, Chuan Lin, Qingxu Deng, Lei Guo, and Fuliang Li, “Mobility Support for Fog Computing:
An SDN Approach”, IEEE Communications Magazine , May 2018.

Authors: Ninni Singh, Neelu Jyothi Ahuja

Paper Title: Implementation and Evaluation of Intelligence Incorporated Tutoring System


Abstract: This research article elaborates the explication of domain knowledge into a tutorable form and
illustrates the prediction of tutoring strategy prior to beginning of the tutoring session. The proposed intelligent
tutoring system is christened as SeisTutor. It impersonates human intelligence by adjudging best tutoring
strategy for the learner. An empirical analysis has been performed on group of applicants having fundamental
knowledge of the domain. Experimental analysis reveals that the learners who have undergone tutoring through
‘SeisTutor’ embedded with intelligence present an overall 44.5 % learning gain as against that of 24.8 % shown
by learners who underwent tutoring through the ‘SeisTutor’, while it does not impersonate intelligence by
choosing content and style for the learner.

Keywords: Course Dependency Graph, , Fuzzy Inference System, Intelligent tutoring system Knowledge
management, Knowledge Repository.

References:

1. Nwana, H. S. (1990). Intelligent tutoring systems: an overview. Artificial Intelligence Review, 4(4), 251-277.
2. https://link.springer.com/article/10.1007/BF00168958
3. Qi-rong, C. (2010, April). Research on intelligent tutoring system based on affective model. In Multimedia and Information Technology
(MMIT), 2010 Second International Conference on (Vol. 1, pp. 7-9). IEEE.
4. http://ieeexplore.ieee.org/abstract/document/5474414/
5. 3. Mahmoud, N. E. J. I., & ALIMI, A. M. (2005). The integration of an emotional system in the Intelligent Tutoring System.
6. https://mycomputer.computer.org/csdl/proceedings/aiccsa/2005/8735/00/01387134.pdf
7. Wu, Y., Liu, W., & Wang, J. (2008, January). Application of emotional recognition in intelligent tutoring system. In Knowledge
Discovery and Data Mining, 2008. WKDD 2008. First International Workshop on (pp. 449-452).
IEEE.http://ieeexplore.ieee.org/abstract/document/4470435/
8. Ahuja, N. J., & Diwan, P. (2012). An expert system for Seismic data interpretation using visual and analytical tools. International Journal
785. of Scientific & Engineering Research, 3(4), 1-13.https://www.ijser.org/researchpaper/AN-EXPERT-SYSTEM-FOR-SEISMIC-DATA-
INTERPRETATION.pdf 4548-
9. Conati, C., & Maclare, H. (2004, August). Evaluating a probabilistic model of student affect. In International Conference on Intelligent 45
Tutoring Systems (pp. 55-66). Springer, Berlin, Heidelberg. 58
10. https://link.springer.com/chapter/10.1007/978-3-540-30139-4_6
11. Skinner, B. F. (1958). Teaching machines. Science, 128(3330), 969-977.
12. http://www.jstor.org/stable/1755240
13. Woolf, B., & McDonald, D. D. (1985). Building a Computer Tutor: Design Issues. AEDS monitor, 23, 10-
18.https://eric.ed.gov/?id=EJ320161
14. Gertner, A. S., & VanLehn, K. (2000, June). Andes: A coached problem solving environment for physics. In International conference on
intelligent tutoring systems (pp. 133-142). Springer, Berlin, Heidelberg.https://link.springer.com/chapter/10.1007/3-540-45108-0_17
15. Wang, T., & Mitrovic, A. (2002, December). Using neural networks to predict student's performance. In Computers in Education, 2002.
Proceedings. International Conference on (pp. 969-973). IEEE.
16. http://ieeexplore.ieee.org/abstract/document/1186127/
17. Baffes, P., & Mooney, R. (1996). Refinement-based student modeling and automated bug library construction. Journal of Interactive
Learning Research, 7(1), 75.https://search.proquest.com/openview/26442b58f07f96f2165164088378db76/1?pq-
origsite=gscholar&cbl=2031153
18. Evens, M. W., Chang, R. C., Lee, Y. H., Shim, L. S., Woo, C. W., Zhang, Y., ... & Rovick, A. A. (1997, March). CIRCSIM-Tutor: An
intelligent tutoring system using natural language dialogue. In Proceedings of the fifth conference on Applied natural language
processing: Descriptions of system demonstrations and videos (pp. 13-14). Association for Computational
Linguistics.https://dl.acm.org/citation.cfm?id=974289
19. Khuwaja, R. A., Evens, M. W., Rovick, A. A., & Michael, J. A. (1994, June). Architecture of CIRCSIM-tutor (v. 3): A smart
cardiovascular physiology tutor. In Computer-Based Medical Systems, 1994., Proceedings 1994 IEEE Seventh Symposium on (pp. 158-
163). IEEE.
20. http://ieeexplore.ieee.org/abstract/document/316004/
21. Chakraborty, S., Roy, D., & Basu, A. (2010). Development of knowledge based intelligent tutoring system. Advanced Knowledge Based
Systems: Model, Applications & Research, 1, 74-100.
22. http://www.tmrfindia.org/eseries/ebookV1-C5.pdf
23. Sleeman, D., & Brown, J. S. (1982). Intelligent tutoring systems (pp. 345-pages). London: Academic Press.https://hal.archives-
ouvertes.fr/hal-00702997/
24. Zapata-Rivera, J. D., & Greer, J. E. (2004). Interacting with inspectable bayesian student models. International Journal of Artificial
Intelligence in Education, 14(2), 127-163.
25. https://content.iospress.com/articles/international-journal-of-artificial-intelligence-in-education/jai14-2-01

Authors: Ninni Singh, Neelu Jyothi Ahuja


Empirical Analysis of Explicating the Tacit Knowledge Background, Challenges and
Paper Title:
Experimental findings
786. Abstract: Tacit knowledge is undocumented knowledge, gained by an individual by virtue of his/her
experience on an activity. It rests with the individual, is hard to discover, express and articulate. It is a valuable 4559-
body of knowledge, hence is essential to solicit, gather and explicate, so as to facilitate its percolation to the 45
younger generation. In this paper, characteristics of tacit knowledge, the issues and mechanisms of explicating 68
have been presented. Seismic data interpretation, as a tacit knowledge domain has been identified, issues faced
in its explication and process followed in development of explicit knowledge capsule is detailed. In order to infer
the tacit knowledge sharing behavior of an individual a large approximate 5000 survey responses from
participant base of individuals from IT firms, Educational Institutions, Government Organizations, Research
Organization and Students Community were obtained. The validity and reliability of the measure were verified.
Exploratory factor analysis and confirmatory factor analysis was conducted on received valid responses. Based
on the analysis, the concrete inference was deliberated.

Keywords: e-Learning, Intelligent tutoring system, Knowledge Management; Knowledge Acquisition.

References:
1. Wagner, E.C., Sternberg, W.M. (1985) Practical Intelligence in real-world pursuits: the role of tacit knowledge, Journal of Personality
and Social Psychology, 49, pp. 436-458.http://psycnet.apa.org/record/1986-00947-001
2. Polanyi, M. (1966) The Tacit Dimensions, London: Poutledge Johnson, W.H.A. (2007) Mechanisms of tacit knowledge: pattern
recognition and synthesis, Journal of Knowledge Management, 11(4), pp. 123-139
4.http://www.emeraldinsight.com/doi/abs/10.1108/13673270710762765
3. Nelson, Richard R. and Sidney G. Winter (1982), An Evolutionary Theory of Economic Change. Belknap Press/Harvard University
Press: Cambridge. http://inctpped.ie.ufrj.br/spiderweb/pdf_2/Dosi_1_An_evolutionary-theory-of_economic_change..pdf
4. Eden, C., Jones, S., Sims, D. and Smithen, T. (1981). ‘The intersubjectivity of issues and issues of intersubjectivity’. Journal of
Management Studies, 18, 1, 37–47.http://onlinelibrary.wiley.com/doi/10.1111/j.1467-6486.1981.tb00090.x/abstract
5. Eden, C. (1990). ‘Strategic thinking with computers’. Long Range Planning, 23, 6, 35–
43.https://www.sciencedirect.com/science/article/pii/002463019090100I
6. Huff, A. S. (1990). ‘Mapping strategic thought’. In Huff, A. S. (Ed.), Mapping Strategic Thought. Chichester: John Wiley, 11–49.
https://www.jstor.org/stable/258654
7. Bougon, M., Baird, N., Komogar, J. M. and Ross, W. (1989). ‘Identifying strategic loops: the self-Q interviews’. In Huff, A. S. (Ed.),
Managing Strategic Thought. Chichester: John Wiley, 327–54.
8. Martin, J. (1982). ‘Stories and scripts in organizational settings’. In Hastorf, A. H. and Isen, A. M. (Eds), Cognitive Social Psychology.
New York: Elsevier, 255–305.
9. https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=%E2%80%98Stories+and+scripts+in+organizational+settings%E2%80
%99.+In+Hastorf%2C+A.+H.+and+Isen%2C+A.+M.+%28Eds%29%2C+Cognitive+Social+Psychology.+&btnG=
10. Neelu. Jyothi. A, Parag. D, “An Expert System for Seismic Data Interpretation using Visual and Analytical tools ”, International
Journal of Scientific & Engineering Research, 2012, Vol. 3(4), pp. 1-13.
11. https://www.ijser.org/researchpaper/AN-EXPERT-SYSTEM-FOR-SEISMIC-DATA-INTERPRETATION.pdf
12. Martin .D. , “Knowledge (Explicit and Implicit): Philosophical Aspects”, Knowledge, Education and Skills, Geology of pp 8126-
8132, 1999.
13. http://www.mkdavies.net/Martin_Davies/Papers_files/KnowledgeExpImp.pdf
14. Jana .K., “tacit knowledge in stories of expert teacher”, procedia- social and behavioral sciences, 171(2015), pp 837-846.
15. https://www.sciencedirect.com/science/article/pii/S1877042815002293
16. Zhang. M, Zhao .Y., Zhou .Z., Guo . X., “Research on Intensive facts about explicit case of tacit knowledge”, procedia- engineering,
174(2017), pp 317-323.
17. https://www.sciencedirect.com/science/article/pii/S1877705817301455
18. Emna .M., Ernesto, E, Khalil D, “a Collaborative methodology for tacit knowledge management: applications to scientific research”.
Future Generation Computer Systems,2015.
19. https://www.sciencedirect.com/science/article/pii/S0167739X1500182X
20. Veronique .A. , “Tacit Knowledge: some suggestions for operationalization”, Journal of management studies 2001, Vol 38 (6).
21. http://onlinelibrary.wiley.com/doi/10.1111/1467-6486.00260/abstract
22. Andrea .P. and Riccardo .V., “Cognition, Types of ‘‘Tacit Knowledge’’ and Technology Transfer”, contributions to economic analysis,
Vol 280, 2007.
23. http://www.emeraldinsight.com/doi/abs/10.1016/S0573-8555%2806%2980010-6
24. Orzea I, “the importance of tacit knowledge within the organization”, 2009.
25. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.621.8764&rep=rep1&type=pdf
Authors: Ashu Tilwe, R.C.Gurjar, D.K.Mishra

Paper Title: Low Phase Noise Current Starved Ring VCO on MOS Capacitance
Abstract: In Wireless communication system VCO is major part which regulates the frequency according to
the voltage. Ring oscillator of one type of VCO is used. The topology of Ring oscillator is current starved Ring
VCO, is used. In this topology the oscillation frequency is regulated by MOS capacitance. MOS capacitance is
added at the end of every stage of inverter.180 nm CMOS technology is used in this paper. The supply voltage is
1.8V and control voltage is varied from 0V to 1.8V. The simulated results are shown that good tuning range
from 2.06GHz to 2.62 GHz. which is used in application of wireless system. The phase noise is measured -
112dbc/Hz at 1MHz.

Keywords: VCO, MOS Capacitance, tuning range, Phase noise.


787.
References: 4569-
45
1. R. R. Jagtap and S. D. Pable, “Design of low power current starved VCO with improved frequency stability,”Int. Conf. Recent Adv. 74
Innov. Eng. ICRAIE 2014, 2014.
2. J. Jalil, M. B. I. Reaz, M. A. M. Ali, and T. G. Chang, “A Low Power 3-Stage Voltage-Controlled Ring Oscillator in 0 .18 μm CMOS
Process for Active RFID Transponder,” pp. 69 – 72, 2013.
3. Rafiul Islam, Ahmad Nafis Khan Suprotik,” Design and Analysis of 3 Stage Ring Oscillator Based on MOS Capacitance for Wireless
Applications”in International Conference onElectrical, Computer and Communication Engineering (ECCE), Cox’s Bazar, Bangladesh,
pp.723-727.
4. S. Lee, B. Kim, and K. Lee, “A Novel High-Speed Ring Oscillator for Multiphase Clock Generation Using Negative Skewed Delay
Scheme,” vol. 32, no. 2, pp. 289 – 291, 1997.
5. A. Mishra, “Design of Power Optimal, Low Phase Noise Three,” pp. 1 – 5, 2014.
6. Gudlavalleti Rajahari, Yashu Anand Varshney, and Subash Chandra Bose, “A Novel Design Methodology for High Tuning Linearity
and Wide Tuning Range RingVoltage Controlled Oscillator”, Springer- Verlag Berlin Heidelberg 2013, CCIS 382, pp. 10–18, 2013.
7. Shruti Suman, Monika Bhardawaj Prof. B. P. Singh, “An Improved performance Ring Oscillator Design”, in International Conference
on Advance Computing and Communication Technology, Rohtak, India, IEEE digital library, pp. 236-239, Jan. , 2012.
8. C. Sánchez-Azqueta, S. Celma, and F. Aznar, “A 0.18um CMOS ring VCO for clock and data recovery applications,”
9. Microelectron. Reliab., vol. 51, no. 12, pp. 2351 – 2356, 2011.
10. B. Razavi, “Design Of Analog Cmos Integrated Circuits”. H. Shizhen, L. Wei, W. Yutong, Z. Li, and A. C.
11. Circuit,“Design Of A Voltage-controlled Ring Oscillator Based On MOS Capacitance,” vol. II, pp. 18 – 20, 2009.
Shruti Suman, Monika Bhardawaj & Prof. B. P. Singh (2012), “An Improved performance Ring Oscillator Design” in International
12. Conference on Advance Computing and Communication Technology, Rohtak, India, IEEE digital library,236-239.
Vaishali, Shruti Suman, K. G. Sharma, P. K. Ghosh, “ Design of Ring Oscillator based VCO with Improved Performance,” in.
13. Innovative Systems Design and Engineering- IISTE, Vol. 5, no. 2, February 2014, pp. 31-41.
14. Stephen Docking and Manoj Sachdev “A Method to Derive an Equation for the oscillation Frequency of a Ring Oscillator” IEEE
Transaction in Circuits and Circuits and Systems-I: Fundamental Theory andapplications,Vol.50,No.2,February2003.
15. M. R Halesh, K. R Rasane, and H. Rohini “Design and Implementation of Voltage Control Oscillator (VCO) Using 180 nm
Technology”, Springer - Verlag Berin Heidelberg, CCIS125,pp.472-483.

Authors: Kankipati Ajay Kumar, A.V.N.Murty

Paper Title: Impact Of Camel Model In Determining The Health Status Of Indian Banking Industry
Abstract: The banking industry is the one which can contribute more to the development of the nation’s GDP.
The monitoring of the banks and supervising their performance has become very crucial due to the material
changes happens in the nonperforming assets of the banks in the recent past. In order to ensure the financial
stability of the nation, we need to follow a systematic approach to evaluate the performance of the banks. the
present paper made an attempt to find the financial performance of the banks by using the CAMELS Ranking
Model. With this research paper we can provide a solution to rank the banks financial status as well as by using
this method or approach we came to how efficient our indian banks based on their performance. This research
paper evaluates the bank's performance by using the CAMELS model.

Keywords: CAMELS, financial stability, banks, Ranking Methodology, ANOVA.

References:

1. K. A. Kumar, “Performance of MSMEs Sectors in India,” SSRG Int. J. Econ. Manag. Stud., vol. 4, no. 3, pp. 11–15, 2017.
2. K. A. Kumar, “Financial Performance of Selected Public and Private Sector Banks Based on Camel Model With Reference To Indian
Banking Sector,” IJMSS Int. J. Manag. Soc. Sci. Int. J. -Included Int. Ser. Dir. Int. J. Manag. Soc. Sci., vol. 05, no. 04, pp. 99–107,
2017.
788. 3. K. A. Kumar, “an Analysis of Recent Developments in Neuro Financing and Carbon Financing in India,” Int. J. Res. Dev. Technol., 4575-
vol. 7, no. 6, pp. 18–21, 2017.
4. K. A. Kumar, “A Journey of Goods and Services Tax (GST) and Structural Impact of GST on the Growth of GDP in India,” Adv. Sci.
45
Humanit., vol. 3, no. 5, p. 50, 2017. 81
5. K. A. Kumar, “a Journey of Goods and Services Tax (Gst) and Structural Impact of Gst on the Growth of Gdp in India,” Int. J. Journal.
Commun., vol. 2, no. 2, pp. 19–22, 2017.
6. R. Sinha, “A CAMEL Approach Using Financial Accuracy of Public and Private Sector Banks in India,” vol. 2, no. 1, pp. 192–201,
2016.
7. G. Sharma and A. K. Arora, “Study of performance of Indian banks : A camel model approach,” Int. J. Commer. Manag. Res., vol. 2,
no. 6, pp. 14–18, 2016.
8. K. A. Kumar, “A RESEARCH ON THE RETURNS AND VOLATILITY OF INDIAN BANKING SECTOR INDEX WITH
REFERENCE TO BSE SENSEX,” EPRA Int. J. Multidiscip. Res., vol. 3, no. september, pp. 34–39, 2017.
9. S. S. Shukla, “Analysing Financial Strength of Public and Private Sector Banks: A CAMEL Approach,” Pacific Bus. Rev. Int., vol. 7,
no. 8, pp. 44–50, 2015.
10. S. Imran, N. Ali, A. Quality, P. P. Employee, E. Efficiency, and N. Interest, “A Study of Ten Indian Commercial Bank ’ s Financial
Performance using CAMELS Methodology,” IMS Manthan, vol. VII, no. 1, pp. 1–14, 2012.
11. P. K. Aspal and N. Malhotra, “Performance Appraisal of Indian Public Sector Banks,” World Journal Soc. Sci., vol. 3, no. 3, pp. 71–
88, 2013.
12. M. Rostami, “Camels’ Analysis in Banking Industry,” Glob. J. Eng. Sci. Res. Manag., vol. 2, no. 11, pp. 10–26, 2015.
13. K. A. Kumar, “An Empirical Study on Technology Entrepreneurship Ecosystem in India,” Int. J. Res. Appl. Sci. Eng. Technol., vol. 5,
no. 12, pp. 2409–2415, 2017.
14. K. A. Kumar, “International Journal of Trend in Scientific Research and Development ( IJTSRD ) Risk in n Internet Banking : A
Theoretical Approach,” Int. Int. J. Trend Sci. Res. Res. Dev., vol. 1, no. 6, pp. 1263–1267, 2017.

Authors: S.M Meenaatchi, K.Rajeswari


Psychiatry on Heart Issue and Different Data Classification Prediction with Scheduled Cause of
Paper Title:
Diabetes
Abstract: Despite the fact existence of an express heartrending world, living prototype and culture of Human
applied with various states of affairs, the traditional view of accepted wisdom with a different ideology based on
their own procession of thoughts to survive their life with high mental stress. Data Classification approaches and
methodologies are studied over them and planned to apply new methodologies in the future. Nowadays,
Diabetes plays a very important role, which affects based on all age categories of people easily. Once debate is
identified, the whole routine culture gets distressed. Infections towards some organs unvoiced in the human
body, some evidence is required to apply and classify the system easily and safeguard human life as much as 4582-
safe, to avoid heart-related issues. 45
84
Keywords: Diabetes, Classification, Heart issue, Visualization.
789.
References:

1. Chitra R, Chenthil Jegan TMEzhilarasu ,”Analysis of myocardial infarction risk factors in heart disease data set” , BiolMed Case Rep
2017 Volume 1 Issue 1
2. Cecilia C. Low Wang, MD; Connie N. Hess, MD, MHS; William R. Hiatt, MD;Allison B. Goldfine, MD ,” Clinical Update:
Cardiovascular Disease in Diabetes Mellitus Atherosclerotic Cardiovascular Disease and Heart Failure in Type 2 Diabetes Mellitus –
Mechanisms, Management, and Clinical Considerations”, DOI: 10.1161/CIRCULATIONAHA.116.022194
3. K. FOX AND P. LEFÈBVRE,” Diabetocardiology: Heart Disease in Diabetes”, A journal of medical information and international
communication from Servier, Vol 29, No.3, 2007
4. Aspreet Singh Phul, Sonia Vatta,” DIAGNOSE AND PREDICT DIABETIC HEART DISEASES USING DATA MINING
CLASSIFICATION TECHNIQUES “,International journal of advance research in science and engineering, volume no 5, Issue no 11,
November 2016
5. K.Viswanathan,P. Mayilvahanan,” Analyzing the Efficiency of Heart Diseases Prediction in Diabetic Patients Using Data Mining
Techniques”,International Journal of Pure and Applied Mathematics,Volume 117 No. 7 2017, 207-218.
6. S.Madhumalar,R.Revathi S.Sivakumar, R.Murugesan,” Neural network based risk level prediction of diabetic heart disease patients
using frequent item set mining”, International Journal of Computational and Applied Mathematics. ISSN 1819-4966 Volume 12,
Number 1 (2017)
7. http://ndep.nih.gov
8. http://www.cdc.gov/diabetes
9. https://www.cdc.gov/dhdsp/data_statistics/fact_sheets/hds_index.htm
10. http://www.cs.ccsu.edu/~markov/ccsu_courses/DataMining-8.html
11. https://www.tutorialspoint.com/data_mining/dm_rbc.htm.
Authors: A. Kanaka Ramya, A. V. Phani Manoj, G.T.N. Veerendra, P.Kodanda Rama Rao
Strength and Durability Properties of Concrete with Partially Replaced Cement with Egg Shell
Paper Title:
Powder and Fine Aggregate with Quarry Dust
Abstract: In present scenario concrete is highly consumed material in construction field due to its advantages,
because of this the natural resources are depleting day by day at an alarming rate and there is an immediate need
for finding alternate materials to the natural materials in concrete. In this paper an effort is made to find alternate
partial replacement materials for cement and fine aggregate (FA). M40 grade concrete is adopted and the cement
was replaced with egg shell powder with different percentages of 5%, 10% and 15%. The optimum percentage
egg shell powder (ESP) is obtained at 10%. At optimum ESP the FA is replaced with Quarry Dust (QD) with
percentages of 25%, 50%and75%. The maximum strength properties are obtained at 10% ESP and 50% QD and
the concrete is also durable at 10% ESP and 50% QD with Water Cement Ratio is 0.38.

Keywords: Egg Shell Powder (ESP), Quarry dust (QD), Cement, Fine aggregate, Coarse aggregate, Specific
gravity (SG).

References:
790. 1. G. Balamurugan, Dr .P. Perumal, “Use of Quarry Dust to Replace Sand in Concrete-An Experimental Study”, International Journal of
Scientific and Research Publications, Volume 3,December-2013. 4585-
2. Amarnath Yerramala, “Properties of Concrete With Eggshell Powder as Cement Replacement”, The Indian Concrete Journal, October- 45
2014. 90
3. Joseph.O. Ukpata and Maurice. E. Ephraim, “Flexural and Tensile Strength Properties of Concrete Using Lateritic Sand and Quarry
Dust as Fine Aggregate”, ARPN Journal of Engineering and Applied Sciences, Volume 7,March- 2012.
4. R. Ilangovana, N. Mahendrana and K. Nagamanib, “Strength and Durability Properties of Concrete Containing Quarry Rock Dust As
Fine Aggregate”, ARPN Journal of Engineering and Applied Sciences, Volume 3, October-2008.
5. M. Shahul Hameed and A. S. S. Sekar, “Properties Of Green Concrete Containing Quarry Rock Dust and Marble Sludge Powder as
Fine Aggregate”, ARPN Journal of Engineering and Applied Sciences, Volume 4, June 2009.
6. M. Sivakumar, Dr.N. Mahendran, “Strength and Permeability Properties of Concrete Using Fly Ash(FA), Rise Husk Ash (RHA) and
Egg Shell Powder (ESP)”, Journal of Theoretical and Applied Information
7. O.O. Amu, A.B. Fajobi and B.O. Oke, “Effect of Egg shell Powder on the Stabilizing Potential of Lime on an Expansive Clay Soil”,
Journal of Applied Sciences.
8. Chandana Sukesh, Katakam Bala Krishna, P. Sri Lakshmi Sai Teja, S. Kanakambara Rao, “ Partial Replacement of Sand with Quarry
Dust in Concrete”, International Journal of Innovative Technology and Exploring Engineering, Volume 2, May-2013
9. N. Parthasarathi, M. Prakash, K.S. Satyanarayanan, “Experimental Study on Partial Replacement of Cement With Egg Shell Powder
and Silica Fume”, Rasayan Journal of Chemistry, Volume 10, April-June 2017.
10. Gowsika, S. Sarankokila, K. Sargunan, “Experimental Investigation of Egg Shell Powder as Partial Replacement with Cement in
Concrete”, International Journal of Engineering Trends and Technology, Volume 14, August- 2014.
11. Joseph O. Ukpata, Maurice E. Ephraim and Godwin A. Akeke , “Compressive Strength of Concrete Using Lateritic Sand and Quarry
Dust as Fine Aggregate”, ARPN Journal of Engineering and Applied Sciences, Volume 7, January-2012.
Nik Alif Amri Nik Hashim, Abdullah Muhamed Yusoff, Zaimatul Awang, Roslizawati Che Aziz,
Authors:
Shah Iskandar Fahmie Ramlee, Nurzehan Abu Bakar, Mohd Asyraf Mohd Noor, Boyd Sun Fatt
Paper Title: The Effect of Domestic Tourist Perceived Risk on Revisit Intention in Malaysia
Abstract: Tourism research identified that the risk element has a significant impact on tourist intention to
travel and tourist destination choice criteria. The connection between domestic tourists perceived risk and revisit
intention has not been widely explored mainly in Malaysia context, but the existing studies suggest a close
connection among them.This study aims to examine the affect tourist perceived risk toward their revisit intention
to visit tourist destination in Malaysia. A total of 384 sample valid responses were obtained.The sampling
791. method for domestic tourist was convenience sampling method. Data collection instrument was a questionnaire
4591-
which adapting the self-administered questionnaire distributionThe Partial Least Square Structural Equation
45
Model (SEM-PLS) was used to analyze the information. A Partial Least Square findings verified model fitness
96
in the population studied. Similarly, the results of the path analysis found that the intention of visiting tourist
destination in Malaysia was affected by physical and financial risk.

Keywords: Domestic Tourist, Perceived risk, Revisit Intention, Malaysia.

References:
1. Adam, I. (2015). Backpackers' Risk Perceptions and Risk Reduction Strategies in Ghana.Tourism Management 49, 99-108.
2. Aminuddin, N., Soumin, J., Razak, I.R.A. &Tarmudi, S. (2017). The effect of information source on destination image and behavioral
intention of non-visitors to Sabah.Journal of Tourism, Hospitality & Culinary Arts, 9(2), 85-96.
3. Aschauer, W. (2010). Perceptions of tourists at risky destinations: A model of psychological influence factors. Tourism Review, 65(2),
4–20.
4. Artuger, S. (2015).The Effect of Risk Perceptions on Tourists’ Revisit Intentions.European Journal of Business and Management, 7(2),
36-43
5. Bagans, L., &Tapola, H. (2011).Crises in the tourism industry and their effect on young travelers.Bachelor's Thesis Degree Programmed
in Tourism, HAAGE HELIA University of Applied Science.
6. Basala, S., &Klenosky, D. (2001). Travel style preferences for visiting a novel destination: A conjoint investigation across the novelty-
familiarity continuum. Journal of Travel Research, 40(2), 172– 182.
7. Bauer, R. A. (1960). Consumer behaviour as a risk taking.In R. S. Hancock (Ed.), Dynamic marketing for a changing world (pp. 389-
398). Chicago: American Marketing Association
8. Boksberger, P. E., Bieger, T., &Laesser, C. (2007).Multidimensional analysis of perceived risk in commercial air travel.Journal of Air
Transport Management, 13(2), 90–96.
9. Brunt, P., Mawby, R., &Hambly, Z. (2000).Tourist victimization and the fear of crime on holiday.Tourism Management, 21(4), 417–424
10. Chew, E. Y. T., &Jahari, S. A. (2014). Destination image as a mediator between perceived risks and revisit intention: A case of post-
disaster Japan. Tourism Management, 40(0), 382-393.
11. Cheung, H. Y., Wu, J., & Tao, J. (2013). Risk perception and risk-taking attitude: A comparison between Hong Kong and Mainland
Chinese undergraduate students. Asia Pacific Education Researcher, 22(4), 497-506.
12. Chi, C. G., &Qu, H. (2008).Examining the structural relationships of destination image, tourist satisfaction and destination loyalty: An
integrated approach.Tourism Management, 29(4), 624–636.
13. Deng, R & Ritchie, B.W. (2018) International university students’ travel risk perceptions: an exploratory study, Current Issues in
Tourism, 21:4, 455-476
14. Department of Foreign Affairs and Trade, Australia (2015) Travel Advice – Malaysia.Retrieved October, 15, 2015, from:
http://www.smartraveller.gov.au/ zwcgi/view/Advice/Malaysia.
15. Department of Foreign Affairs and Trade, UK (2018) Travel Advice – Malaysia. Retrieved December, 30, 2018, from
https://www.gov.uk/foreign-travel-advice/Malaysia
16. Dowling, G. R., &Staelin, R. (1994).A Model of Perceived Risk and Intended Risk-Handling Activity.Journal of Consumer Research,
21(1), 119-134.
17. Eitzinger, C., &Wiedemann, P. (2007).Risk perceptions in the alpine tourist destination Tyrol – an exploratory analysis of residents’
views.Tourism Management, 28(3), 911–916.
18. Fachinger, J. (2006). Behavior of HTR fuel elements in aquatic phases of repository host rock formations.Nuclear Engineering &
Design,236, 54.
19. Fishbein, M. A. &Ajzen (1975).Believe, attitude, intention and behavior. An introduction to theory and research.Dalam Quintal, V.
&Phau, I. (2015).The role of movie images and its impact on destination choice.Tourism Review, 70(2), 97-115.
20. Floyd, M., Gibson, H., Pennington-Gray, L., &Thapa, B. (2004).The effect of risk perceptions on intentions to travel in the aftermath of
September 11, 2001.Journal of Travel & Tourism Marketing, 15(2-3), 19-38.
21. Fowler, D.C., Lauderdale,M.K., Goh,B.K. &Yuan,J. (2012) "Safety concerns of international shoppers in Las Vegas", International
Journal of Culture, Tourism and Hospitality Research, 6 (3), 238-249
22. Fuchs, G. and Reichel, A. (2006). Tourist Destination Risk Perception: The Case of Israel. Journal of Hospitality and Leisure Marketing,
14 (2), 83-108.
23. Gallarza, M. G., & Gil Saura, I. (2006). Value dimensions, perceived value, satisfaction and loyalty: An investigation of university
students’ travel behaviour. Tourism Management, 27(3), 437–452
24. Hall, C. (2003). Travel safety, terrorism and the media: The significance of the issue attention cycle. Applied Science Publication, 24,
207-214.
25. Kozak, M. (2007). Tourist harassment: A marketing perspective. Annals of Tourism Research, 34(2), 384–399.
26. Krejcie, R., and Morgan, D. (1970).Determining sample size for research activities.Educational and Psychological Measurement, 30,
607-610.
27. Larsen, S., Ogaard, T., &Brun, W. (2011).Backpackers and mainstreamers realities and myths.Annals of Tourism Research, 38(2), 690–
707.
28. Lawton, G., & Page, S. (1997). Evaluating travel agents’ provision of health advice to travellers.Tourism Management, 18(2), 89–104.
29. Lepp, A. and Gibson, H. (2003).Tourist roles, perceived risk and international tourism.Annals of Tourism Research, 30 (3), 606-624.
30. Lepp, A., Gibson, H., & Lane C. (2011). Image and perceived risk: A study of Uganda and its official tourism website. Tourism
Management, 32, 675–684.
31. Mansfeld, Y., &Pizam, A. (2006).Tourism, security and safety: from theory to practice. New York: Routledge.
32. Moutinho, L. (1987). Consumer Behavior in Tourism.European Journal of Marketing. 21(10), 3-44.
33. Mowen, J. C., & Minor, M. (2000). Consumer behaviour: A framework. Englewood Cliffs, NJ: Prentice Hall.
34. New Zealand Foreign Affairs & Trade. (2016). Travel Advisories risk level. Retrieved on June, 23, 2016 from:
https://www.safetravel.govt.nz/Malaysia
35. NikHashim, N. A. A., Mohd Noor, M. A., Awang, Z., Che Aziz, R.., &MuhamedYusoff, A. (2018). TheInfluence of Tourist Perceived
Risk towards Travel Intention: A Conceptual Paper.International Journal ofAcademic Research in Business and Social Sciences, 8(16),
92–102.
36. NikHashim, N.A.A., Ritchie, B.W. &Tkaczynski, A. (2017). The Determinants Of Tourist Travel Intention In Malaysia: The Role Of
Perceived Risk And Destination Image. 1st Connect-Us Conference (CuC 2017).Sustainable Society Development: Human,
Environmental and Economic Vitality,78-82
37. OSAC (2017).Malaysia 2018 Crime & Safety Report. Retrieved from
https://www.osac.gov/pages/ContentReportDetails.aspx?cid=23774
38. Pearce, P. L. (2005). Studying tourist behaviour. In C. Cooper, C. Michael Hall, & D. Timothy (Eds.), Tourist behaviour: Themes and
conceptual schemes (pp. 1–17). Clevedon: Channel View Publications.
39. Police nab Myanmar man, woman over Grab driver's murder (2018,June, 2018). TheSunDaily.Retrieved from
http://www.thesundaily.my/news/2018/06/26/police-nab-myanmar-man-woman-over-grab-drivers-murderProstitution tops crime list
(2017, June 1). The Star Online.Retrieved from https://www.thestar.com.my/news/nation/2017/06/01/prostitution-tops-crime-list-many-
foreigners-tend-to-be-involved-in-sex-work-statistics-find/
40. Reichel, A., Fuchs, G., &Uriely, N. (2007). Perceived risk and the non-institutionalized tourist role: The case of Israeli student ex-
backpackers. Journal of Travel Research, 46(2), 217–226.
41. Reisinger, Y., &Mavondo, F. (2006). Cultural differences in travel risk perception. Journal of Travel & Tourism Marketing, 20(1), 13–
31.
42. Rittichainuwat, B. N., &Chakraborty, G. (2009). Perceived travel risks regarding terrorism and disease: The case of Thailand. Tourism
Management, 30(3), 410–418.
43. Roehl, W. S., &Fesenmaier, D. R. (1992). Risk Perceptions and Pleasure Travel: An Exploratory Analysis. Journal of Travel Research,
30(4), 17-26.
44. Seddighi, H., Nuttall, M., &Theocharous, A. (2001). Does cultural background of tourists influence the destination choice? An empirical
study with special reference to political instability.Tourism Management, 22(2), 181–191.
45. Sekaran, U., Bougie, R. (2017). Research Methods for Business: A Skill Building Approach. United Kingdom: John Wiley & Sons, Ltd,
Publication.
46. Sharifpour, M., Walters, G., & Ritchie, B. W. (2014). Risk Perception, Prior Knowledge, and Willingness to Travel Investigating the
Australian Tourist Market’s Risk Perceptions towards the Middle East. Journal of Vacation Marketing, 20(2), 111-123.
47. Simpson, P. M., &Siguaw, J. A. (2008). Perceived travel risks: The traveller perspective and manageability. International Journal of
Tourism Research, 10(4), 315–327.
48. Sonmez, S. F., &Sirakaya, E. (2002).A distorted destination image?The case of Turkey.Journal of Travel Research, 41(2), 185-196.
49. Sonmez, S. F., &Graefe, A. R. (1998b). Determining future travel behavior from past travel experience and perceptions of risk and
safety. Journal of Travel Research, 37(2), 171- 177.
50. Tourism Malaysia (2017). Retrieved from https://www.tourism.gov.my
U.S. Department of State – Bureau of consular affair. (2016). Malaysia: Embassy Message: Safety and Security. Retrieved on June, 23,
2016 from:https://travel.state.gov/content/passports/en/country/malaysia.html.

Authors: A. Amir Anton Jone, T. Anita Jones Mary


A Novel Compact Microstrip UWB Rectangular Stair Slot Antenna for the Analysis of Return
Paper Title:
Losses
Abstract: This article deals with the various designs of a novel compact microstrip fed UWB antenna to
investigate the corresponding return losses of different structures. The dimension of the designed antenna is 33 x
19 x 1.9 mm3 with FR4 substrate and it can be operated from 2.846 - 11.7458 GHz. The effects of varying the
structure of antenna are to exhibit the investigation of corresponding return losses. Different structures of
antenna are simulated in Ansoft HFSS simulator. The results of return losses and radiation patterns are explored
with the ultra wide band (UWB) rectangular Stair slot antenna. The modified structure of antenna shows the
minimized return loss with an enhanced bandwidth that satisfies good UWB characteristics. Antenna
performance can also be explored from the radiation behavior of the antenna which is relatively omni-directional
pattern for rectangular Stair slot antenna.

Keywords: UWB, rectangular stair slot antenna, return loss, Bandwidth enhancement, radiation pattern,
microwave imaging.

References:

1. N. S. Hassaine, L. Mersad, S. M. Meriah, and F. T. Bendimerad, “UWB bowtie slot antenna for breast cancer detection”, International
Journal of Biomedical and Biological Engineering, vol. 6, No. 11, 2012.
2. K. Halili, M. Ojaroudi, and N. Ojaroudi, “Ultra-wide band monopole antenna for use in a circular cylindrical microwave imaging
system”, Microwave and Optical Technology Letter, vol. 54, pp. 2202-22.5, 2012.
3. Magthoom Fouzia Y and K. M. Jeyanthi, “Design of a novel microstrip patch antenna for microwave imaging systems”, International
Journal of Engineering and Technical research, 119-123, 2014.
4. Suresh Subramanian, B. Sundrambal, and D. Nirmal, “Investigation on simulation based specific absorption rate in ultra-wide antenna
for breast cancer detection”, IEEE sensors, DOI: 10.1109/JSEN.2018.2875621. 4597-
5. Gautam A. K, Richa Chandel, and Binod Kr Kanaujia, “A CPW fed hexagonal shape monopole-like UWB antenna”, Microwave and 46
Optical Technology Letter, vol, 55, no. 11, 2013. 03
6. Santanu Mondal, and Partha P. Sarkar, “A novel design of compact wide hexagonal antenna”, Indian Journal of pure and applied
physics, vol. 52, pp. 1-4, 2014.
7. Mazhar, W, Tarar, M. A, Tahir, F. A, Ullah, Shan, Bhatti, F. A.: 'Compact Microstrip Patch Antenna for Ultra-wideband Applications',
PIERS Proceedings, Aug2013, pp 1100-1104.
8. Suresh Subramanian and K.R.Shankar Kumar.: 'Design of a Novel compact printed Ultrawideband Monopole Microstrip Antenna for
Breast Cancer Detection', Journal of medical Imaging and Health Informatics, Dec. 2016, 6, (8), pp 1918-1924.
9. Aswathy Sam, Mr.Amir Anton Jone.A.: 'A Survey on UWB Antennas Used For Breast Cancer Detection', International Journal of
Computer Trends and Technology (IJCTT), 2013 , pp 281-284.
792. 10. Ojaroudi N., Ojaroudi M., and Y. Ebazadeh, “UWB/ Omni-directional microstrip monopole antenna for microwave imaging
applications”, Progress in Electromagnetics Research C, vol. 47, pp. 139-146, 2014.
11. Zahirul Alam, A. H. M. I. Md. Rafiqul, and S. Khan, “Tuning fork UWB antenna with unsymmetrical feed line”, PIERS Proceedings,
1457-1460, 2012.
12. Baskaran Kasi, Lee Chia Ping, Chandan Kumar Chakrabarty.: 'A Compact Microstrip Antenna for Ultra Wideband Applications',
European Journal of Scientific Research, ISSN 1450-216X Vol.67 No.1 (2011), pp. 45-51.
13. Abhishek Choubey, Rachna Pal.: 'Hexagonal Shaped Ultra Wide Band Patch Antenna with a Square Fractal in Ground Plane for Breast
Cancer Detection', International Journal of Engineering Research & Technology (IJERT), 2012, pp 1-3.
14. Neeba George and B. Lethakumary.: 'A Compact Microstrip Antenna For Uwb Applications', Microwave And Optical Technology
Letters, C 2015 Wiley Periodicals, Inc, 2015.
15. Suresh Subramanian and K.R.Shankar Kumar.: 'Design of a Novel compact printed Ultrawideband Monopole Microstrip Antenna for
Breast Cancer Detection', Journal of medical Imaging and Health Informatics, Dec. 2016, 6, (8), pp 1918-1924.
16. T.Kalaimani, B.Pakiaraj, R.Mohanamurali, “A Compact Coplanar Feed Slotted Antenna for Wireless Applications”, International
Innovative Research Journal of Engineering and Technology, v1, i2, 2015.
17. V. N. Koteswara Rao. Devana.: 'A Novel UWB Monopole Antenna with Defected Ground Structure', International Journal of Signal
Processing, Image Processing and Pattern Recognition, 2017, pp 89-98.

Authors: B.K.Karunakar Rao, K. Vaisakh


Crucial Voltage Identification of a Seven Level Multilevel Inverters using AMM for Microgrid
793. Paper Title:
Applications
Abstract: This paper presents a single-phase efficient and generalized basic topology that is adaptable for 4604-
multilevel inverters. The proposed structure is run by a switching pattern of the power switches i.e, subharmonic 46
pulse width modulation (SHPWM) or comparison of triangular carrier high-frequency waveforms with a 11
sinusoidal reference waveform. This chapter shows an asymmetric modulation method (AMM) hybrid
modulation inverter with its working and performance verified through the simulation studies conducted in
MATLAB Simulink software. A test for crucial voltage identification has also been carried out that recognizes
the most important voltage source that must be maintained constant, else it would adversely effect the circuit’s
operation.

Keywords: converter; hybrid inverter; novel topology.

References:

1. Zhang, F., Du, L., Peng, F.Z., Qian, Z.: ‘A new design method for high power high-efficiency switched-capacitor DC–DC converters’,
IEEE Trans. Power Electron. 2008, 23, pp. 832–840.
2. Hammond, P.W.: ‘Medium voltage PWM drive and method’. US Patent 5 625 545, 1997.
3. Corzine, K., Familiant, Y.: ‘A new cascaded multilevel H-bridge drive’, IEEE Trans. Power Electron., 2002, 17, pp. 125–131.
4. Rodriguez, J., Moran, L., Pontt, J., et al.: ‘High-voltage multilevel converter with regeneration capability’, IEEE Trans. Ind. Electron.,
2002, 49, pp. 839–846.
5. Nabae, A., Takahashi, I., Akagi, H.: ‘New neutral-point-clamped PWM inverter’, IEEE Trans. Ind. Appl., 1981, IA-17, pp. 518–523.
6. Meynard, T.A., Foch, H.: ‘Multi-level conversion: high voltage choppers and voltage-source inverters’. 23rd Annual IEEE Power
Electronics Specialists Conf., PESC ’92 Record, 1992, vol. 1, pp. 397–403.
7. Suh, B.-S., Hyun, D.-S.: ‘New N-level high voltage inversion system’, IEEE Trans. Ind. Electron., 1997, 44, pp. 107–115.
8. Green, R.M., Boys, J.T.: ‘Implementation of pulse width modulated inverter modulation strategies’, IEEE Trans. Ind. Appl., 1982, IA-
18, pp. 138–145.
9. Agelidis, V.G., Calais, M.: ‘Application specific harmonic performance evaluation of multicarrier PWM techniques’. 29th Annual IEEE
Presented at Power Electronics Specialists Conf. 1998, PESC ’98 Record, 1998.
10. Holmes, D.G., Lipo, T.A.: ‘Pulse width modulation for power converters: principles and practice’ (IEEE Press, Hoboken, Wiley-
Interscience, Piscataway, NJ, 2003).
11. Ben-Brahim, L., Tadakuma, S.: ‘A novel multilevel carrier-based PWM control method for GTO inverter in low index modulation
region’, IEEE Trans. Ind. Appl., 2006, 42, pp. 121–127.
12. Mwinyiwiwa, B., Wolanski, Z., Ooi, B.-T.: ‘Microprocessor implemented SPWM for multi converters with phase-shifted triangle
carriers’, IEEE Trans. Ind. Appl., 1998, 34, pp. 487–494.
13. Tolbert, L.M., Fang Zheng, P., Habetler, T.G.: ‘Multilevel converters for large electric drives’, IEEE Trans. Ind. Appl., 1999, 35, pp.
36–44.
14. Carrara, G., Gardella, S., Marchesoni, M., Salutari, R., Sciutto, G.: ‘A new multilevel PWM method: a theoretical analysis’, IEEE Trans.
Power Electron., 1992, 7, pp. 497–505.
15. sTeodorescu, R., Blaabjerg, F.: ‘Multilevel converter – a survey’. Presented at EPE ’99, CD-ROM, 1999.
16. Rodriguez, J., Lai, J.-S., Peng, F.Z.: ‘Multilevel inverters: a survey of topologies, controls, and applications’, IEEE Trans. Ind. Electron.,
2002, 49, pp. 724–738.
17. Wenxi, Y., Haibing, H., Zhengyu, L.: ‘Comparisons of space-vector modulation and carrier-based modulation of multilevel inverter’,
IEEE Trans. Power Electron., 2008, 23, pp. 45–51.
18. Zhichao, W., Yunping, Z., Ding, K.: ‘An evaluation of spectral characteristic of novel hybrid asymmetric modulated 9-level inverter’.
IEEE 36th Conf. on Power Electronics Specialists, 2005, pp. 855–860.
19. Ding, K., Yunping, Z., Zhan, W., Zhichao, W., Yun, Z.: ‘Novel hybrid diode-clamp cascade multilevel converter for high power
application’. Proc. Chinese Society of Electrical Engineering, 2004, vol. 24, pp. 62–67.
20. Manjrekar, M.D., Steimer, P.K., Lipo, T.A.: ‘Hybrid multilevel power conversion system: a competitive solution for high-power
applications’, IEEE Trans. Ind. Appl., 2000, 36, pp. 834–841.
21. Rech, C., Pinheiro, J.R.: ‘Impact of hybrid multilevel modulation strategies on input and output harmonic performances’, IEEE Trans.
Power Electron., 2007, 22, pp. 967–977.
22. Zhang, F., Du, L., Peng, F.Z., Qian, Z.: ‘A new design method for high power high-efficiency switched-capacitor DC–DC converters’,
IEEE Trans. Power Electron., 2008, 23, pp. 832–840.
23. Hammond, P.W.: ‘Medium voltage PWM drive and method’. US Patent 5 625 545, 1997.
Authors: Joshua Arumbakan, Kanchapogu Vaisakh

Paper Title: Three Phase 9-Level Hybridised Cascaded Multi-Level Inverter for Use in Smart Grid
Abstract: Smart grid technology can be best utilized by having proper grid supporting equipment. This paper
demonstrates the use of a three-phase, 9-level, hybridised cascaded multi-level inverter topology in a smart grid.
A pulse width modulation scheme with phase disposition is employed in this inverter to control the firing signals
to operate this circuit. These firing signals can be monitored and controlled for optimal usage in smart grid
operation. Operational principles with switching equations are described in detail. Crucial voltage identification
has been performed by analyzing the THD in output during source shortages by performing Fast Fourier
transform analysis. Least THD of 15.82% is attained in the output voltage waveform of the proposed three phase
inverter topology.

794. Keywords: inverter; hybridised, cascaded, 9-level; grid; smartgrid. 4612-


46
References: 18
1. FangxingLi ; Wei Qiao ; Hongbin Sun ; Hui Wan ; Jianhui Wang ; Yan Xia ; Zhao Xu ; Pei Zhang,‘Smart Transmission Grid: Vision
and Framework’, IEEE Transactions on Smart Grid (Volume:1, Issue: 2, Sept. 2010), pp.168-177
2. Hammond, P.W.: ‘A new approach to enhance power quality for medium voltage drives’. Proceedings 1995 IEEE-IAS Petroleum and
Chemical Industry Committee, 1995, pp. 231–235
3. Lai, J.S., Peng, F.Z.: ‘Multi-level converters—a new breed of power converters’. Conf. Rec. 1995 IEEE-IAS Annual Meeting, 1995, pp.
2348–2356
4. Nabae, A., Takahashi, I., Akagi, H.: ‘A new neutral-point-clamped PWM inverter’, IEEE Transactions on Industry Applications, 1981,
17, (5), pp. 518–523
5. Choi, N.S., Cho, J.G., Cho, G.H.: ‘A general circuit topology of multi-level inverter’. Conf. Rec. 1991 IEEE Power Electronics
Specialists Conference, 1991, pp. 96–103
6. Meynard, T.A., Foch, H.: ‘Multi-level conversion: high-voltage chopper and voltage-source inverters’. Conf. Rec. 1992 IEEE Power
Electronics Specialists Conference, 1992, pp. 397–403
7. Fang Zheng Peng ; J.W. McKeever ; D.J. Adams: ‘A power line conditioner using cascade multilevel inverters for distribution systems’,
IEEE Transactions on Industry Applications, 1998, 34, (6), pp. 1293-1298
8. Zhang, J. ‘High performance control of a 3 level IGBT inverter fed AC drive’. Conf. Rec. 1995 IEEE Industry Applications Society
Annual Meeting, 1995, pp. 22–28
9. Menzies, R.W., Steimer, P., Steike, J.K.: ‘Five-level GTO inverters for large induction motor drives’. Conf. Rec. 1993 IEEE Industry
Applications Society Annual Meeting, 1993, pp. 595–601
10. Marchesoni, M., Mazzucchelli, M.: ‘Multi-level converters for high power AC drives: a review’. Proc. IEEE International Symposium
on Industrial Electronics’93, Budapest, Hungary, 1993, pp. 38–43
11. Hochgraf, C., Lasseter, R., Divan, D., Lipo, T.A.: ‘Comparison of multi-level inverters for static var compensation’. Conf. Rec. 1994
IEEE- Industry Applications Society Annual Meeting, 1994, pp. 921–928
12. M.H.J. Bollen ; A. Sannino, “Voltage control with inverter-based distributed generation”, IEEE Transactions on Power Delivery, Vol.20
(9), 2005, pp.519-520
13. Tolbert, L.M., Peng, F.Z.: ‘Multi-level converters for large electric drives’. Proceedings of IEEE Applied Power Electronics
Conference’98, 1198, vol. 2, pp. 530–536
14. Bernert, S.: ‘Recent developments of high power converters for industry and traction application’, IEEE Transactions on Power
Electronics, 2000, 15, (6), pp. 1102–1117
15. Carrara, G., Gardella, S., Marchesoni, M., Salutari, R., Sciutto, G.: ‘A new multi-level PWM method: a theoretical analysis’, IEEE
Transactions on Power Electronics, 1992, 7, (3), pp. 497–505
16. McGrath, B.P., Holmes, D.G., Meynard, T.: ‘Reduced PWM harmonic distortion for multi-level inverters operating over a wide
modulation range’, IEEE Transactions on Power Electronics, 2006, 21, (4), pp. 941–949
17. Kouro, S., Lezana, P., Angulo, M., Rodriguez, J.: ‘Multicarrier PWM with DC-link ripple feedforward compensation for multi-level
inverters’, IEEE Transactions on Power Electronics, 2008, 23, (1), pp. 52–59
18. Celanovic, N., Boroyevich, D.: ‘A fast space-vector modulation algorithm for multi-level three-phase converters’, IEEE Transactions on
Industry Applications, 2001, 37, (2), pp. 637–641
19. Gupta, A.K., Khambadkone, A.M.: ‘A general space-vector PWM algorithm for multi-level inverters, including operation in
overmodulation range’, IEEE Transactions on Power Electronics, 2007, 22, (2), pp. 517–526
20. Fazel, S.S., Bernet, S., Krug, D., Jalili, K.: ‘Design and comparison of 4-kV neutral-point-clamped, flying-capacitor, and series-
connected H-bridge multi-level converters’, IEEE Transactions on Industry Applications, 2001, 37, (2), pp. 637–641, 2007, 43, (4), pp.
1032–1040
21. McGrath, B.P., Holmes, D.G.: ‘Analytical modelling of voltage balance dynamics for a flying capacitor multi-level converter’, IEEE
Trans. Power Electron., 2008, 23, (2), pp. 543–550
22. Sadigh, A.K., Hosseini, S.H., Sabahi, M., Gharehpetian, G.B.: ‘Double flying capacitor multicell converter based on modified phase-
shifted pulsewidth modulation’, IEEE Trans. Power Electron., 2010, 25, (6), pp. 1517–1526
23. Rech, C., Pinheiro, J.R.: ‘Hybrid multi-level converters: Unified analysis and design considerations’, IEEE Trans. Ind. Electron., 2007,
54, (2), pp. 1092–1104
24. Rech, C., Pinheiro, J.R.: ‘Line current harmonics reduction in multipulse connection of asymmetrically loaded rectifiers’, IEEE Trans.
Ind. Electron., 2005, 52, (3), pp. 640–652
25. Rodriguez, J., Franquelo, L.G., Kouro, S., et al.: ‘Multi-level converters: an enabling technology for high-power applications’, Proc.
IEEE, 2009, 97, (11), pp. 1786–1817
26. Malinowski, M., Gopakumar, K., Rodriguez, J., Perez, M.: ‘A survey on cascaded multi-level inverters’, IEEE Trans. Ind. Electron.,
2010, 57, (7), pp. 2197–2206
27. Charles I. Odeh, Damain B. N. Nnadi, “Single-phase 9-level hybridised cascaded multi-level inverter”, IET Power Electronics, 2013,
pp.468-477.
28. https://www.nist.gov/engineering-laboratory/smart-grid
29. https://www.iitk.ac.in/ime/anoops/for15/ppts/
30 Amanda Saint “Where next for the internet of things? [Information Technology Internet of Things]”, Engineering & Technology, IEEE,
Volume:10, Issue:1,2015, pp. 72-75.
Authors: Navendu Nitin, J. A. Ansari, Neelesh Agrawal, Devesh Tiwari, Abhishek Kumar Saroj

Paper Title: Deca Band Inset Fed Cross Slot Loaded Patch Antenna for LTE Applications
Abstract: The cross slot loaded patch antenna with inset feed is designed and fabricated on FR4 substrate to
get deca band. This proposed antenna consists of a cross slot on a rectangular patch with inset feeding, on a
dielectric substrate. The simulated results of proposed antenna have ten resonating frequencies (2.30, 3.90, 5.30,
6.10, 8.70, 10.0, 12.9, 14.10,16.20, 19.0 GHz) while measured results of proposed antenna have eleven
resonating frequencies (2.3089, 4.1079, 5.3073, 6.2069, 8.8056, 10.1050, 11.8041, 12.5038,14.3028, 16.1019,
19.1004 GHz). The frequency bands are useful for S band, C band, X band, Ku band, K band and for LTE
applications. Frequency bands like 2.30, 5.30, 8.70 can be useful for LTE applications while other frequency
bands can be used for different applications such as WIFI, WiMAX, satellite communication, radar
communication etc. The simulation for desired antenna is performed with the help of software HFSS.

Keywords: LTE (long-term evolution), Cross Slot, Inset Feeding, Microstrip Antennas (MSA).
795.
4619-
References:
46
1. Y. Hong, J. Tak, J. Baek, B. Myeong, and J. Choi, “Design of a Multiband Antenna for LTE/GSM/UMTS Band Operation,” 29
International Journal of Antennas and Propagation, vol. 2014, pp. 1-9, 2014.
2. H. Huang, Y.Liu, and S. Gong, “A Novel Dual-Broadband and Dual-Polarized Antenna for 2G/3G/LTE Base Stations,” IEEE Trans.
on Antennas and Propag., vol. 64, no. 9, pp. 4113-4118, 2016.
3. P. R.Ulibarri and T. Bertuch, “Microstrip-fed complementary Yagi–Uda Antenna,” IET Microwaves, Antennas & Propagation,
vol.10, no.9, pp.926-931,2016.
4. R. Khan, M. H. Jamaluddin, J. U. R. Kazim, J. Nasir, and O. Owais, “Multiband-dielectric resonator antenna for LTE application,” IET
Microwaves, Antennas & Propagation, pp. 1–4, 2015.
5. Y.-L. Ban, Y.-F. Qiang, Z. Chen, K. Kang, and J.-H. Guo, “A Dual-Loop Antenna Design for Hepta-Band WWAN/LTE Metal-
Rimmed Smartphone Applications,” IEEE Trans. on Antennas and Propag., vol. 63, no. 1, pp. 48-58, 2015.
6. J. -H. Lu and Y. -S. Wang, “Planar Small-Size Eight-Band LTE/WWAN Monopole Antenna for Tablet Computers,” IEEE Trans. on
Antennas and Propag., vol. 62, no. 8, pp. 4372- 4377, 2014.
7. J.-H. Lu and J.-L. Guo, “Small-Size Octaband Monopole Antenna in an LTE/WWAN Mobile Phone,” IEEE Antennas and Wireless
Propagation Letters, vol. 13, pp. 548- 551, 2014.
8. Y. Wang and Z. Du, “A Printed Dual-Antenna System Operating in the GSM1800 / GSM1900 / UMTS / LTE2300 / LTE2500 / 2.4-
GHz WLAN Bands for Mobile Terminals,” IEEE Antennas and Wireless Propagation Letters, vol. 13, pp. 233- 236, 2014.
9. S. S. A. Bawri, M. F. Jamlos, P. J. Soh, S. A. A. S. Junid, M. A. Jamlos, A. Narbudowicz, “Multiband slot-loaded dipole antenna for
WLAN and LTE-A applications,” IET Microwaves, Antennas & Propagation, vol.12, no.1, pp.63-68, 2017.
10. Z.-Q. Xu, Q.-Q. Zhou, Y.-L. Ban, and S. S. Ang, “Hepta- Band Coupled-Fed Loop Antenna For LTE/WWAN Unbroken Metal-
Rimmed Smartphone Applications,” vol. 17, no. 2, pp. 311-314, 2018.
11. R. Garg, P. Bhartia, I. Bahl, and A. Ittipiboon,“Microstrip Antenna Design Handbook,” Artech House, Norwood, 2001.
12. C. A. Balanis, “Antenna Theory Analysis and Design,” John Wiley and Sons, 3rd Edition, pp. 811-872, 2005.

Authors: P. Sirish Kumar, K. Krishnam Raju , G.Sateesh Kumar, M. Bala Krishna, P. Krishna Rao
Evaluation of Radar Cross Section in Aerial Operations by using POFACETS for a standard
Paper Title:
Unmanned Aerial Vehicle (UAV)
Abstract: In military and common applications, radar assumes an exceptionally noteworthy job in exploring
the vehicle, recognizing for flying machines, ships and so on. Radar cross section is a measure of a target's
ability to reflect radar signals in the direction of the receiver. It is obvious that RCS depends on the shape of the
reflecting objects. In this paper, a brief overview of various radars used in surveillance applications and radar
cross section (RCS) measurement techniques are presented. The objective of this paper is to illustrate methods
for obtaining the Radar Cross Section (RCS) of a typical Unmanned Aerial Vehicle (UAV) for various
frequencies in radar bands. UAV technologies have advanced tremendously and are being developed
successfully. These features lead UAV to patrol even in civil airspace for civilian applications. These objects
operate with small radar cross-section and/or on low altitude which imposes security threat. Keeping this view
the RCS of a UAV which are flying in civilian airspace has to be determined drastically for security purposes.
Several shapes are considered for the estimation of RCS. The results on the variations of RCS for the above
objects as a function of frequency, aspect angle are presented. The POFACETS plays a crucial role and provides
the user an easy–to–use GUI that allows the input of all necessary parameters, while preventing erroneous data
input and other user errors. In this paper the RCS of sphere, ellipsoid and UAV are determined.

796. Keywords: Radar, RCS, UAV, POFACETS, Ellipsoid.


4630-
References: 46
33
1. Knott E., Shaeffer, J., and Tuley, M., Radar Cross Section: Its Prediction, Measurement and Reduction, Artech House, Norwood,
Massachusetts, 1985.
2. Skolnik, Merill I., Introduction to Radar Systems, 3rd Edition, McGraw Hill, New York, 2001.
3. Wadell, J. M., Scattering From Rough Surfaces, Master’s Thesis, Naval Postgraduate School, Monterey, California, September 1995.
4. Knott E., Shaeffer, J., and Tuley, M., Radar Cross Section: Its Prediction, Measurement and Reduction, Artech House, Norwood,
Massachusetts, 1985.
5. Faros, N., Radar Cross Section Synthesis for Planar Resistive Surfaces, Master’s Thesis, Naval Postgraduate School, Monterey,
California, December 1994.
6. Chapman, Stephen J., MATLAB Programming for Engineers, 2nd Ed., Brooks/Cole, Pacific Grove, California, 2002.
7. “Annual review of aircraft accident data: U.s. air carrier operations calendar year 1994.” National Transportation Safety Board, Report
No. NTSB/ARC/96/01, 1996.
8. P. L. Franchi, “Predator UAV to gain interim sense and avoid capability,” Flight International, June 2006.
9. J. McCandless, “Detection of aircraft in video sequences using a predictive optical flow algorithm,” Optical Engineering, vol. 3, pp.
523 – 530, 1999.
10. R. Carnie, R. Walker, and P. Corke, “Image processing algorithms for UAV “sense and avoid”,” in Proceedings of ICRA 2006, May
2006.
11. M. Skolnik, “Improvements for air-surveillance radar,” in Radar Conference, April 1999.
12. Levy, M. F. and P. P. Borsboom, “Radar cross-section computations using the parabolic equation method,” Electron. Lett., Vol. 32,
1234–1235, 1996.

Authors: S. Leoni Sharmila, C. Dharuman, P.Venkatesan

Paper Title: A Fuzzy Based Classification – An Experimental Analysis


Abstract: Soft Computing has become popular in developing systems that encloses human expertise. Imaging
technologies and clinical cytology has improved in disease diagnosis. Exact detection is extremely important for
proper treatment and cure of disease. Two soft computing technique Neural Network and Support Vector
Machine are used for classification of Caridotocography data set. This paper clearly explains the advantages of
hybrid technique, when Fuzzy is combined with Neural Network and Support Vector Machine it is clearly
noticed that there is an increase in accuracy of classification rate.

Keywords: Neural Network, SVM, Fuzzy Neural Network, Fuzzy SVM.


797.
References: 4634-
46
1. Carl G. Looney, “Pattern Recognition Using Neural Networks”, Oxford University Press, Oxford/NY, 1997. 38
2. I.Fazekas: Neural Networks, University of Debrecen, Faculty of Informatics, TÁMOP- 4.1.2.A/1-11/1-2011-0103 (2013)
3. T. Borsavölgyi, T. Mankovits, I. Kocsis: The Application of SVM for the Optimization of Technical Tasks, Technical Science in the
Eastern Hungarian Region (2011) pp. 499-507.
4. V. N. Vapnik: Statistical Learning Theory, AT&T Research Laboratories, A Wiles-Intercience Publication, John Wiles & Sons In.,
1998, ISBN 0-471-03003-1.
5. E. Spyrou, G. Stamou, Y. Avrithis, S. Kollias: Fuzzy Support Vector Machines for Image Classification fusion MPEG-7 visual
descriptors url: http://doras.dcu.ie/353/1/lncs_3697.pdf Download: 2015.01.17
6. X.G. Zhang, “Using class-center vectors to build support vector machines”, In Proc.IEEE Signal Process. Soc. Workshop. NewYork:
IEEE Press, (1999) 3–11.
7. C.F. Lin, S.D. Wang, “Fuzzy support vector machines”, IEEE Transaction on Neural Networks. 13(2) (2002) 464–471.
8. C .F. Lin, S.D. Wang, “Training algorithms for fuzzy support vector machines with noisy data”, Pattern Recognition Letters. 25(14)
(2004) 1647–1656.
9. X.F. Jiang, Y. Zhang, J.C. Lv, “Fuzzy SVM with a new fuzzy membership function”,Neural Comput. Appl. 15 (2006) 268–276.
10. C. Senol, T.Yildirim, “Thyroid and Breast Cancer Disease Diagnosis using Fuzzy-Neural Networks”, IEEE transcations on Electrical
and Electronics Engineering, 2009, p. II 390 - II393.
11. Leoni Sharmila. S, Dharuman. C , Venkatesan. P, A Novel Neuro- Fuzzy System for Classification, Global Journal of Pure and
Applied Mathematics , 2016;12:267-270.
12. Leoni Sharmila. S, Dharuman. C , Venkatesan. P, Disease Classification Using MachineLearning Algorithms - A Comparative Study,
International Journal of Pure and Applied Mathematics , 2017;114 No.6,1-10.
13. [13] NegarZiasabounchi, ImanAskerzade “ANFIS Based Classification Model for Heart Disease Prediction”, International Journal of
Electrical & Computer Sciences (IJECS- IJENS), Vol.14, No.2, April 2014.
14. Jyh-Shing and Jang, R. “ANFIS: Adaptive-Network-Based Fuzzy Inference System, computer methods and programs in biomedicine”,
IEEE Transactions on Systems, 1993.
15. P.M. Patil and T.R. Sontakke, “Rotation, scale and tanslation invariant handwritten Devanagari numeral character recognition using
general fuzzy neural network,” Pattern Recognition 40, 2110-2117, 2007.
16. X. Zhang, S. Tan, C.-C. Hang, and P.-Z. Wang, “An efficient computational algorithm for min-max operations,”Fuzzy Sets and
Systems 14, 297-304, 1999.
17. C.T. Lin, C.-M. Yeh, S.-F. Liang, J.-F. Chung and N.Kumar, “Support vector based fuzzy neural network for pattern classification,”
IEEE Trans. Neural Networks14(1),31-41, 2006.
18. B. Gabrys and A. Burgiela, “General fuzzy min-max neural network for clustering and classification,” IEEE Trans. Neural Networks
11(3), 769-783, 2000.
19. H. M. Lee, C. M. Chen and Y. L. Jou, “An efficient fuzzy classifier with feature selection based on fuzzy entropy,” IEEE Trans. SMC-
B 31(3), 426-432, 2001.
20. C.F. Lin, S.D. Wang, “Fuzzy support vector machines”, IEEE Transaction on Neural Networks. 13(2) (2002) 464–471.
21. www.ics.uci.edu/pub/ml-repos/machine-learningdatabases/cardiotocograph-disease/

Authors: N. Revathi, P. Sengottuvelan

Paper Title: Real-Time Irrigation Scheduling Through IoT in Paddy Fields


Abstract: Considering the water utilization and conservation needs in agriculture it would be essential to have
very accurate water irrigation schedule to save water. Appropriate bonding of water to the paddy field would be
essential to meet the moisture demand unto 75% to reduce the risk of plant stress and yield loss. Data features
such as Evapotranspiration; Permeability of the soil, Drainage, The length of the growing season, the levelness
of the soil surface has to be considered to recommend the irrigation scheduling. In this paper we are developing
a model which would base on Seasonal data and other data determine the water scheduling requirements for the
day or week ahead. This would also help in planning the water needs well ahead. The research identifies delta
and non-delta regions of TamilNadu to determine the evapotranspiration based on the climatic data available and
discusses the architecture components required for the real time data acquisition and ingestion mechanism. It
determines the ET0 and maps it with the FAO based reference model for the implementation.

Keywords: Paddy Cultivation, Big Data, Recommendation System, AWS, Irrigation scheduling factors.

References:

1. B.A.M. Bouman, R.M. Lampayan, and T.P. Tuong. 2007. Water Management in Irrigated Rice: Coping with Water Scarcity. Los
Baños, Philippines: International Rice Research Institute.
2. Brouwer, C. 1989. Irrigation Scheduling. English. Food and Agricultural Organization- Land and Water Development Division.
3. C.B.S., Teh. 2018. "Development and Validation of an unsaturated soil water flow model for oil palm." Tropical Agriculture Science
787-800.
4. Carlos Cambra Baseca, Sandra Sendra,Jaime Lloret, Jesus Tomas. 2019. "A Smart Decision System for Digital Farming." MDPI,
Agronomy 9 (216): 1-19. doi:10.3390/agronomy9050216.
5. Dhawan, Dr. Vibha. 2017. Water and Agriculture in India. Federal ministry of Food & Agriculture. 4639-
6. 2009. Irrigation water management in paddy. ICAR, NAIP. 03 24. Accessed 05 11, 2019. http://agropedia.iitk.ac.in/content/irrigation- 46
water-management-paddy.
7. k. yella reddy, l. narayan reddy , sekhar nagothu and sai bhaskar reddy nakka. 2016. "sensors for water monitoring for improved on
47
farm water management." (2nd world irrigation forum) 1-8.
8. kirtan jha, aalap doshi and poojan patel. 2018. "intelligent irrigation system using artificial intelligence and machine learning: a
comprehensive review." (international journal of advanced research) 6 (10): 1493-1502.
9. Lawrence, Mark G. 2005. "The relationship between relative humidity and the dewpoint temperature in moist air: A simple conversion
and applications." Bulletin of the American Meteorological Society, 225-233. http;//dx.doi.org/10.1175/BAMS-86-2-225.
10. Lee Teang Shui, M. Aminul Haque and Huang Yuk Feng. 2006. "Modeling water balance components in Rice field irrigation."
(Journal - The Institution of Engineers,) 67 (4).
11. Li, Y.H., and Yuanlai Cui. 1996. "Real-time forecasting of irrigation water requirements of paddy fields." Agricultural Water
Management 31 (3): 185-193. Accessed 5 15, 2019. https://sciencedirect.com/science/article/pii/0378377496012528.
12. M.B. Hossain, S. Yesmin, M. Maniruzzaman and J.C. Biswas. 2017. "Irrigation Scheduling of Rice (Oryza sativa L.) Using
798. CROPWAT Model in the Western Region of Bangladesh." (The Agriculturists, A Scientific Journal of Krishi Foundation) 15 (1): 19-
27.
13. Maclean, J. L., D. C. Dawe, B. Hardy, and G. P. Hettel. 2002. Rice almanac Source book for the most important economic activity on
earth Third edition. Accessed 5 16, 2019. https://eurekamag.com/research/035/670/035670717.php.
14. Manoj Singh, Swati Vitkar. 2018. "Automation of Irrigation Monitoring Using Artificial Neural Network." (IOSR Journal of Business
and Management (IOSR-JBM)) 43-48.
15. N H RAO, K L Rao. 2018. "Big Data and Climate Smart Agriculture - Status and Implications for Agricultural Research and
Innovation in India." (Proc Indian Natn Sci Acad) 84 (3): 625-640. doi:10.16943/ptinsa/2018/49342.
16. Raihana, Samsudin Nur. 2011. Canal Irrigation Control System In Paddy Field. Accessed 5 15, 2019. http://eprints.utem.edu.my/6217.
17. Saleem, Syed Khusro, Dilini Delgoda, S K Ooi, Kithsiri B. Dassanayake, L Liu, Malka N. Halgamuge, and Hector Malano. 2013.
"Model Predictive Control for Real-Time Irrigation Scheduling." IFAC Proceedings Volumes 46 (18): 299-304. Accessed 5 15, 2019.
https://sciencedirect.com/science/article/pii/s1474667015350011.
18. WalterMaldonado, Júnior Taynara, Tuany Borges, ValerianoGlaucode ,Souza Rolim. 2019. "EVAPO: A smartphone application to
estimate potential evapotranspiration using cloud gridded meteorological data from NASA-POWER system." Computers and
Electronics in Agriculture 187-192.
Authors: Neeraj Kumar, Varsha Sharma

Paper Title: A Hybrid Classification and Prediction Methodology for the Diagonosis of Osteoporosis
Abstract: With the advent of technology medical science is growing very fast . Disease diagonosis using
machine learning technique is quite cumbersome. But efforts are made by the innovative minds to develope an
optimal and efficient prediction model for the prediction of the disease viz, bone disease . Bone disease
prediction is also a broad area of research where machine learning techniques can be used. Better prediction and
analysis can be helpful to cure such disease . Osteoporosis is an osteo- metabolic disease characterized by low
bone mineral density (BMD) and deterioration of the micro- architecture of the bone tissues, causing an increase
in bone fragility and consequently leading to an increased risk of fractures.. Machine learning algorithms play
important role for predicting and analyzing such disease using available algorithms and by modifying them .
There are many algorithms such as SVM (Support vector machine), Genetic Algorithm, Naive bayes classifier
and other tree based classifiers which are proposed in traditional scenario for prediction of expected data from
an image. The goal of this paper is to discuss about a proposed hybrid analysis and prediction approach for
diagonosing osteoporosis. This paper also discuss about various prediction models viz, svm prediction model as
the efficient one while processing the textual data for symptoms analysis. Here symptoms are called predictors .
A comparison using the Accuracy and training time is performed. The approach shows the efficiency of
proposed model over textual data as well as graphical image data analysis.

Keywords: Bone disease, Osteoporosis, Image processing, Machine Learning, Prediction model.

References:

1. D. Herumurti , A.Z Arifin, R. Sulaeman, A. Asano, A Taguchi, T. Nakamoto , K. Uchimura, Weighted Fuzzy ARTMAP for
Osteoporosis Detection, sixteenth Korea-Japan Joint Workshop on Frontiers of Computer Vision, 2008.
799. 2. R. E. Cole, DO, CCD, Improving clinical decisions for women in threat of osteoporosis: Dual-Femur bone mineral thickness testing, J
Am Osteopath Assoc, vol 108, 2008, pp.289-295. 4648-
3. C. Ordóñez a , J.M. Matías b , J.F. de Cos Juez c , P.J. García, Machine learning techniques associated with the confirmation of 46
osteoporosis rate in post-menopausal women, Elsevier, Mathematical and Computer Modeling 50 (2009) 673–679. 53
4. M. G. Roberts , J. Graham , H. Devlin, Improving the revelation of osteoporosis from dental radiographs using Active Appearance
Models, Biomedical Imaging: From Nano to Macro, 2010 IEEE International Symposium on 14-17 April 2010 440 – 443; ISSN 1945-
7928; Rotterdam; 10.1109/ISBI.2010.5490314.
5. Norma Pilar Castellanos, Elisa Martínez, and Josefina Gutierrez, Improving Osteoporosis Diagnosis in Children using Image Texture
Analysis, 33rd Annual International Conference of the IEEE EMBS Boston, Massachusetts USA, August 30 - September 3, 2011.
6. Abdessamad Tafraouti, Mohammed El Hassouni, Hechmi Toumi, Eric Lespessailles and Rachid Jennane, Osteoporosis Diagnosis
using Fractal Analysis and Support Vector Machine, IEEE 2014 Tenth International Conference on Signal-Image Technology and
Internet-Based Systems.
7. E.I Sela, S. Hartati, A. Harjoko, R. Wardoyo, and Munakhir MS, Feature assurance of the mix of penetrable trabecular with
anthropometric features for osteoporosis screening, IJECE, vol.5, no.1, pp 78-83, ISSN: 2088-8708, DOI: 10. 11591/ijece v5i1. 6922,
2015.
8. Tafraouti, An., El Hassouni, M., Toumi, H., Lespessailles, E., and Jennane, R. (2015, November). Osteoporosis assurance using
steerable pyramid rot and fragmentary Brownian development. In Image Processing Theory, Tools and Applications (IPTA), 2015
International Conference on (pp. 309-312). IEEE.
9. Tejaswini E1,Vaishnavi , Sunitha , Detection and Prediction of Osteoporosis using Impulse response framework and Artificial Neural
Network, 2016 Intl. Meeting on Advances in Computing, Communications and Informatics (ICACCI), Sept. 21-24, 2016, Jaipur, India
10. El Hassouni, M., Tafraouti, A., Toumi, H., Lespessailles, E., and Jennane, R. (2016). Fragmentary Brownian Motion and Geodesic Rao
Distance for Bone X-bar Image Characterization. IEEE Journal of Biomedical and Health Informatics.
11. Simeon Ribagin, Olympia Roeva , Tania Pencheva , Generalized Net Model of Asymptomatic Osteoporosis Diagnosing, 2016 IEEE
eighth International Conference on Intelligent Systems.
12. Atia Rahman, Shamimur Rahman Akanda, Raihan Hussain, Monon Mahboob,4 Md. Ashiqur Rahman, Analysis of mechanical and
scaled down scale essential properties of trabecular bones with real review of osteoporosis among females in Bangladesh, IEEE 2016.
13. Reshmalakshmi C., Sasikumar M., Fuzzy impedance structure for Osteroporosis recognizable proof, IEEE 2016 Global Humanitarian
Technology Conference, 2016 IEEE.
14. Abdessamad Tafraouti , Mohammed El Hassouni , Hechmi Toumi, Eric Lespessailles and Rachid Jennane, Osteoporosis assurance
using repeat division and fragmentary Brownian development, 2017 IEEE.
15. Abdessamad Tafraouti, Mohammed El Hassouni, Hechmi Toumi, Eric Lespessailles and Rachid Jennane, Osteoporosis assurance using
repeat division and fragmentary Brownian development, IEEE 2017.

Authors: A.Y Prabhakar, Shruti K Oza, Chaitanya Gautam

Paper Title: Distributive System for Congestion Control in WSN directing through IoT
Abstract: This paper is presented to bring a very important issue in the data transmission realm ‘congestion’.
Regardless of the type and priority of the data it may happen that a lot of signals generate by the system of
sensors arrive at the ‘root’ destination at the same time. Regardless of the processing power sometimes it has
been observed that spectrum gets saturated. This saturation can be compared with large crowd trying to get into
stadium through one entry point. To solve this problem various algorithms have been introduced, in this paper
800. we have given emphasis on one algorithms one is signal-type priority reception. The Quality-of-Service (QoS)
4654-
of the primary applications is of vital issue in order to ensure its efficiency and robustness. WSN's with limited
46
resources, congestion in WSN will further reduce the expected QoS by degrading its services and contributions
56
in monitoring systems. In this state, efficient use of the scarce resources is an important to ensure seamless data
transmission. At a sensor node the power consumption can be reduced by reducing the packet retransmission
rate which can be caused by congestion. The nodes deployed in the area monitored will be clustered groups with
a cluster head. The proposed technique is able to reduce congestion thus improve the overall performance. This
algorithm will give a major boost to WSN system employing ‘n’ number of sensors and be able to boost up
efficiency and cut down the time delay and hence enhancing the productivity of the system itself.
Keywords: WSN, IoT, QoS.

References:

1. Rutherford, J. J. (2010). Wearable Technology. IEEE Engineering in Medicine and Biology Magazine, 29(3), 19–24.
2. Wanjari, N. D., & Patil, S. C. (2016). Wearable devices. 2016 IEEE International Conference on Advances in Electronics,
Communication and Computer Technology (ICAECCT).
3. Liu, D., Wang, H., Peng, X., McCann, S., Fang, P., Duan, X., … Lu, L. (2014). WLAN new technologies in IEEE 802.11. 2014
XXXIth URSI General Assembly and Scientific Symposium (URSI GASS).
4. Bannatyne, R., & Viot, G. (n.d.). Introduction to microcontrollers. I. Wescon/98. Conference Proceedings (Cat. No.98CH36265).
Authors: C.Lavanya, S.Sridhar
Sensor less Speed Estimation of an Foc Induction Motor Drive using Mras Speed Controller and
Paper Title:
Fuzzy Current Controller
Abstract: This paper mainly presents fuzzy current controller depending on speed estimator of MRAS with
field oriented controlled induction motor drives. This paper consists of three main techniques used for
configurations of MRAS speed estimators that is Rotor Flux, Back - EMF and Instantaneous Reactive power.
The MRAS estimators are then included into a direct field oriented controller and also a comparison is done
between PI and fuzzy current controllers completely tested on MATLAB/SIMULINK. The resulting controller
achieves an acceptable level of execution over wide range of good operating conditions.

Keywords: Fuzzy Logic Controller (FLC), Field Oriented Control (FOC), Model Reference Adaptive System
(MRAS), Sensor Less Speed Control.

References:

1. B.K. Bose, Modern Power Electronics and AC Drives, New Delhi, India: Prentice-Hall, 2006, ch. 8, pp. 350-440.
2. H.MadadiKojabadi, L.Chang, and R.Doriaswami, “ Recent Progress in Sensorless Vector-Controlled Induction Motor Drives,”
Proceedings of the Large Engineering Systems Conference on Power Engineering, IEEE 0-78037520-3, pp. 80- 85, 2002.
3. Ahmad RazaniHaron, NikRumziNikIdris, “ Simulation of MRAS-based Speed Sensorless Estimation of Induction Motor Drives using
MATLAB/SIMULINK ,” First International Power and Energy Conference, Putrajaya, Malaysia, pp. 411-415, 2006.
4. Lin-Yu Lu, Tzu-Wei Yeh, Chia-Chi Chu, “ Back-EMFBased Model-Reference Adaptive Sensorless Control for Grid- Connected
DFIGs,” IEEE 978-1-4799-1303-9/13, 2013.
5. Keyuan Huang, Ying Zhang, Shoudao Huang, Lei Xiao, “A MRAS Method for Sensorless Vector Control of Induction Motor Based
on Instantaneous Reactive Power,” Hunan University, Changsha, China.
6. Cao-Minh Ta, Toshyuki Uchida, Yoichi Hori, “ MRASbased Speed Sensorless Control for Induction Motor Drives Using
801. Instantaneous Reactive Power,” The 27th Annual Conference of the IEEE Industrial Electronics Society, pp. 1417-1422, 2001. 4657-
7. V. Vasic, S. N. Vukosavic, and E. Levi, “A stator resistance estimation scheme for speed sensor less rotor flux oriented induction
motor drives,” IEEE Transactions on Energy Conversion, vol. 18, no. 4, pp. 476–483, Dec. 2003. 46
8. H. Kubota and K. Mats use, “Speed sensor less fieldoriented control of induction motor with rotor resistance adaptation,” IEEE 61
Transactions on Industry Applications, vol. 30, no. 5, pp. 1219–1224, Sep. 1994.
9. M. S. Zaky, “Stability analysis of speed and stator resistance estimators motor for sensor less induction drives,” IEEE Transactions
on Industrial Electronics, vol. 59, no. 2, pp. 858–870, Feb. 2012.
10. S. H. Jeon, K. K. Oh, and J. Y. Choi, “Flux observer with online tuning of stator and rotor resistances for induction motors,” IEEE
Transactions on Industrial Electronics, vol. 49, no. 3, pp. 653–664, Jun. 2002.
11. S. Mir, M. E. Elbuluk, and D. S. Zinger, “Pi and fuzzy estimators for tuning the stator resistance in direct torque control of induction
machines,” IEEE Transactions on Power Electronics, vol. 13, no. 2, pp. 279–287, Mar. 1998.
12. G. Guidi and H. Umida, “A novel stator resistance estimation method for speed-sensor less induction motor drives,” IEEE Transactions
on Industry Applications, vol. 36, no. 6, pp. 1619–1627, Nov. 2000.
13. Birachi Narayan Kar, K.B Mohanty,” Indirect field oriented control of induction motor using fuzzy logic controller”, IEEE
Transactions on Industrial Electronics, vol.61,no.5, pp.61-70,mar 2011.
14. S.Mohan Krishna, J.L Febindaya,” MRAS speed estimator with fuzzy and pi controller speed estimation adaptation for sensorless
induction motor drive”, IEEE Transactions on Industrial Electronics,vol.122, no.8,pp 122-126,april 2016.
15. H.Ashapour - Alamdari, y.Alinejad - Bermomi and H.Yaghobi, ”A fuzzy based speed control for improvement of induction motor
drive performance”, IEEE Transactions on industrial applications,vol.13, no.2,pp.61-70 ,2016.
16. Tripura p, Srinivasakishorebabu,” fuzzy logic speed control of three phase induction motor drive”, world academy of science,
engineering and technology 2011.
17. AbdelrahamanYousifEshagLesan, MamadouLamineDoumbia, Pierre Sicard, “Comparative study of speed estimation techniques for
sensor less vector control of induction machine”, IEEE 978-1-4673-2421-2/12, PP.4298-4303, 2012.
18. R.Kumar, S.Das, P.Syam and A.K Chattopadhyay, “Review on model reference adaptive system for sensor less vector control of
induction motor drives, “IET Electric power Applications, vol.9 ,no.7, pp.496-511, 2015.
19. M.Barut, R.Demir, E.Zerdali, and R.Inan, “Real time implementation of bi input extended kalman filter based estimator for speed
sensor less control of induction motors”, IEEE Transactions on power electronics,vol.59, no.11, pp.4197-4206, Nov 2012.
20. S.R. Bowes, A.Sevinc, and D.Holliday, “New natural observer applied to speed sensor less dc servo and induction motors”, IEEE
Transactions on industrial electronics, vol.51, no.5, pp.1025-1032 Oct 2004.
Authors: M.Musa, M.A. Othuman Mydin, A.N. Abdul Ghani

Paper Title: Thermal Properties of Foamed Concrete with Addition of Empty Fruit Bunch (EFB) Fiber
Abstract: The key players in the construction industry around the globe are very enthusiastic in producing
better construction materials that are cost-effective, durable, excellent thermal insulation, lightweight and long
802.
lasting without jeopardizing the environment. One of the best ways in producing such building materials are by 4662-
incorporating industrial waste materials such as Empty Fruit Bunch (EFB) fiber in foamed concrete (FC). In 46
recent years, the spotlight has been given towards the use of natural fiber reinforced concrete-based materials 70
especially in Malaysia in a quest of economic and environmental upkeep particularly in the construction sector
itself. Hence, this study intended to recognize the influence of Empty Fruit Bunch (EFB) fiber of four different
contents (0.15%, 0.30%, 0.45% and 0.60 %) by mix volume on thermal properties of FC. There were three
densities of 800kg/m3, 1100kg/m3 and 1400kg/m3 we cast and tested. The mix design of FC (sand: cement:
water) is fixed at the ratio of 1:1.5:0.45. The investigation focuses on three parameters which were thermal
conductivity, thermal diffusivity and specific heat capacity. Results showed that the addition of EFB in FC plays
an important role to improve the thermal performance holistically. The results demonstrated a great potential
possesses by the EFB fiber to be utilized in cement-based materials such as the FC mix which is beneficial in
reducing the thermal property or the transfer of heat in a produced concrete.

Keywords: Thermal conductivity, diffusivity, specific heat capacity, foamed concrete, concrete, mortar.

References:

1. K. Ramamurthy, E. K. Nambiar and G. Ranjani, “A classification of studies on properties of foam concrete”, Cement and Concrete
Composites, vol. 31, pp. 388-396, 2009
2. S. Soleimanzadeh and M.A. Othuman Mydin, “Influence of High Temperatures on Flexural Strength of Foamed Concrete Containing
Fly Ash and Polypropylene Fiber,” International Journal of Engineering, vol. 26, no, 1, pp. 365-374, 2013
3. S.-Y. Chung, M. A. Elrahman, J.-S. Kim, T.-S. Han, D. Stephan and P. Sikora, “Comparison of lightweight aggregate and foamed
concrete with the same density level using image-based characterizations,” Construction and Building Materials, vol. 211, pp. 988–999,
2019
4. M.A. Othuman Mydin, N.A. Rozlan and S. Ganesan, “Experimental study on the mechanical properties of coconut fiber reinforced
lightweight foamed concrete,” Journal of Materials and Environmental Science, vol. 6, no. 2, pp. 407-411, 2015
5. J. Norgaard, M.A. Othuman Mydin, “Drywall Thermal Properties Exposed to High Temperatures and Fire Condition, Jurnal
Teknologi,” vol. 62, no. 1, pp. 63-68, 2013
6. Y. H. Amran, N. Farzadnia, A. A. Ali, “Properties and applications of foamed concrete; a review,” Construction and Building
Materials, vol. 101, pp. 990–1005, 2015
7. A. A. Hilal, N. H. Thom and A. R. Dawson, “On entrained pore size distribution of foamed concrete,” Construction and Building
Materials, vol. 75, pp. 227–233, 2015
8. H. S. Yan and W.R. Chen, "On the output motion characteristics of variable input speed servo-controlled slider-crank mechanisms,"
Mechanism and Machine Theory, vol. 35, no. 4, pp. 541-561, 2000
9. M.A. Othuman Mydin, M. Musa and A.N. Abdul Ghani, “Fiber Glass Strip Laminates Strengthened Lightweight Foamed Concrete:
Performance Index, Failure Modes and Microscopy Analysis,” AIP Conference Proceedings, vol. 2016 (September), pp. 1-8, 2018
10. E. K. Nambiar, K. Ramamurthy, “Air–void characterisation of foam concrete,” Cement and Concrete Research, vol. 37, pp. 221–230,
2007
11. M.A. Othuman Mydin, N. Md. Noordin, N. Utaberta, M.Y. MohdYunos and S. Segeranazan, “Physical Properties of Foamed Concrete
Incorporating Coconut Fiber,” JurnalTeknologi, vol. 78, no. 5, pp. 99-105, 2016
12. T. Nguyen, A. Ghazlan, A. Kashani, S. Bordas and T. Ngo, “3D meso-scale modelling of foamed concrete based on X-ray computed
tomography,” Construction and Building Materials, vol. 188, pp. 583-598, 2018.
13. E. Serri, M.A. Othuman Mydin and M.Z. Suleiman, “Thermal Properties of Oil Palm Shell Lightweight Concrete with Different Mix
Designs,” Jurnal Teknologi, vol. 70, no, 1, pp. 155‐159, 2014
14. M.A. Othuman Mydin, Y.C. Wang, “Thermal and mechanical properties of lightweight foamed concrete at elevated temperatures,”
Magazine of Concrete Research, vol. 64, no. 3, pp. 213-224, 2012
15. A. A. Hilal, N. H. Thom and A. R. Dawson, “On void structure and strength of foamed concrete made without/with additives,”
Construction and Building Materials, vol. 85, pp. 157-164, 2015
16. T. Sihabut , N. Laemsak, “Feasibility of producing insulation boards from oil palm fronds and empty fruit bunches,” Thai National
AGRIS Centre, vol. 32, no. 1, pp. 63-69, 2010.

Authors: Vijaya Lakshmi Singh, Dr. Dinesh Rai


Implementation and Performance Analysis of Multi Hop Ad Hoc Cloud Network and Servers
Paper Title:
using Ad Hoc Network Protocols
Abstract: Wireless technologies such as Ad hoc network and cloud network are popular in the present era, so
is the emerging technology ad hoc cloud is gaining popularity. This article implements the ad hoc network that
runs the cloud services that is termed as Ad hoc cloud. To implement this concept, five adhoc network protocols
used are TORA, DSR, AODV, GRP and OLSR. Performance of the network as well as the applications are
monitored and analyzed and based on the results, an optimal solution is proposed. Optimized Network
Engineering Tool is used to perform the simulations.

Keywords: Ad hoc network, Ad hoc On-Demand Distance Vector (AODV), Ad hoc cloud, cloud network,
Dynamic Source Routing (DSR), Geographic Routing Protocol (GRP), Optimized Link State Routing (OLSR),
Temporally Ordered Routing Algorithm (TORA).

References: 4671-
46
1. Singh V.L., Rai D. (2018) Performance Comparison Simulation Model of Ad Hoc Cloud Network with Cloud Servers. In: Woungang I., 81
Dhurandher S. (eds) International Conference on Wireless, Intelligent, and Distributed Environment for Communication. WIDECOM
2018. Lecture Notes on Data Engineering and Communications Technologies, vol 18. Springer, Cham.
2. Singh V., Rai D., Simulation of Network with Cloud Servers Using OPNET Modeler, International Journal of Advance Research and
Innovation, 2017, 5(3),p. 315-319.
3. Singh V.L., Rai D. (2019) Experimental Performance Evaluation of Cloud Servers in Ad Hoc Cloud Network. In: Ray K., Sharan S.,
803. Rawat S., Jain S., Srivastava S., Bandyopadhyay A. (eds) Engineering Vibration, Communication and Information Processing. Lecture
Notes in Electrical Engineering, vol 478. Springer, Singapore
4. Bhardwaj, P.K., Sharma, S. and Dubey, V., Comparative analysis of reactive and proactive protocol of mobile ad-hoc network,
International Journal on Computer Science and Engineering, 2012, 4(7), p.1281.
5. Goyal, V., Rani, S. and Singh, P., Performance Investigation of Routing Protocols for Database and Voice Data in MANETS,
International journal of Emerging Trends and Techonology in Computer Science, 2013, 2(4).
6. Mehmood, M.A., Buttar, A.M. and Ashraf, M., Experimental based Performance Analysis of Proactive OLSR, Reactive Tora and Hybrid
GRP Routing Protocols in MANET, Int. J. Comput. Appl, 2014, 89(15), pp.0975-8887.
7. Rana, G., Ballav, B. and Pattanayak, B.K, Performance Analysis of Routing Protocols in Mobile Ad Hoc Network, In International
Conference onInformation Technology (ICIT), 2015 (pp. 65-70). IEEE.J.
8. Aneiba, A. and Melad, M., Performance Evaluation of AODV, DSR, OLSR, and GRP MANET Routing Protocols Using OPNET,
International Journal of Future Computer and Communication, 2016. 5(1), p.57

Authors: Jagdish B. Sapkale

Paper Title: Socio-Economic Status of the Warna Basin Villages: Analysis using GIS Techniques
Abstract: The assessments of the socio-economic impacts of the Warna dam for the villages of basin area
have been attempted. The secondary data in the form of census data and revenue data has been used for all the
villages of Warna river basin. Besides, this to cross check the actual status of the villages in terms of socio-
economic development, field investigations have undertaken in some sites likely to be impacted by Chandoli
dam . During the field work and even number of visits in the villages of the study area, it has observed that prior
to dam construction the agricultural activities were totally dependent on the natural rainfall. Now after dam
construction the water is being used for agricultural activities and agro based industries. Agricultural
productivity also increased in the study area after the dam construction. GIS based differentiate techniques have
used for the analysis of socio economic characteristics in the present research work.

Keywords: Chandoli dam, Composite Socio Economic Index, GIS techniques, Socio-economic development..

References:

804. 1. Sapkale, J.B., 2016. The Socio-Economic and Environmental Effect of Chandoli (Warna) Dam And The Problem Of Displaced People:
A Case Study Of Warna Basin. Maharashtra, ICSSR Major Research Project Report, pp.1-218. 4680-
2. Sapkale, J.B., 2016. Rehabilitation-The Problem of Dam Affected Displaced People: A Study of Warna River Basin, 46
Maharashtra. International Journal of Science and Research (IJSR), 5(12), pp.1917-1925. 86
3. Sapkale, J.B., 2017. Socio-Economic Impact of Chandoli Dam: Perception Based Study of the Selected Villages of Warna River
Basin. International Journal of Engineering and Techniques, 3(6), pp.662-669.
4. Shinde, M.V. (December, 2006): Impact of Jangamhatti Irrigation Project on Agricultural Development of Chandagad taluka.
Unpublished M.phil. Thesis, Shivaji University, Kolhapur
5. Bhosale, S.M. (March, 2007): A Study of Economics of Water Conservation in Khanapur Taluka of Sangali District. Unpublished
Ph.D. Thesis, Shivaji University, Kolhapur
6. Ward, F.A. and Pulido-Velazquez, M., 2008. Water conservation in irrigation can increase water use. Proceedings of the National
Academy of Sciences, 105(47), pp.18215-18220.
7. Pretty, J.N., Morison, J.I. and Hine, R.E., 2003. Reducing food poverty by increasing agricultural sustainability in developing
countries. Agriculture, ecosystems & environment, 95(1), pp.217-234.
8. Bell, N., Schuurman, N. and Hayes, M.V., 2007. Using GIS-based methods of multicriteria analysis to construct socio-economic
deprivation indices. International Journal of Health Geographics, 6(1), p.17.
9. Swetnam, R.D., Fisher, B., Mbilinyi, B.P., Munishi, P.K., Willcock, S., Ricketts, T., Mwakalila, S., Balmford, A., Burgess, N.D.,
Marshall, A.R. and Lewis, S.L., 2011. Mapping socio-economic scenarios of land cover change: A GIS method to enable ecosystem
service modelling. Journal of environmental management, 92(3), pp.563-574.
10. Jensen, J.R. and Cowen, D.C., 1999. Remote sensing of urban/suburban infrastructure and socio-economic attributes. Photogrammetric
engineering and remote sensing, 65, pp.611-622.
11. Ramotra, K.C. (2008): Development and The Scheduled caste, Rawat Publications p- 166-167, 235-347.

Authors: Jagdish B. Sapkale

Paper Title: Socio-Economic Status of the Warna Basin Villages: Analysis using GIS Techniques
Abstract: The assessments of the socio-economic impacts of the Warna dam for the villages of basin area
have been attempted. The secondary data in the form of census data and revenue data has been used for all the
villages of Warna river basin. Besides, this to cross check the actual status of the villages in terms of socio-
economic development, field investigations have undertaken in some sites likely to be impacted by Chandoli
dam . During the field work and even number of visits in the villages of the study area, it has observed that prior
to dam construction the agricultural activities were totally dependent on the natural rainfall. Now after dam
construction the water is being used for agricultural activities and agro based industries. Agricultural
productivity also increased in the study area after the dam construction. GIS based differentiate techniques have
used for the analysis of socio economic characteristics in the present research work.

Keywords: Chandoli dam, Composite Socio Economic Index, GIS techniques, Socio-economic development.
805.
4687-
References:
46
1. Sapkale, J.B., 2016. The Socio-Economic and Environmental Effect of Chandoli (Warna) Dam And The Problem Of Displaced People: 94
A Case Study Of Warna Basin. Maharashtra, ICSSR Major Research Project Report, pp.1-218.
2. Sapkale, J.B., 2016. Rehabilitation-The Problem of Dam Affected Displaced People: A Study of Warna River Basin,
Maharashtra. International Journal of Science and Research (IJSR), 5(12), pp.1917-1925.
3. Sapkale, J.B., 2017. Socio-Economic Impact of Chandoli Dam: Perception Based Study of the Selected Villages of Warna River
Basin. International Journal of Engineering and Techniques, 3(6), pp.662-669.
4. Shinde, M.V. (December, 2006): Impact of Jangamhatti Irrigation Project on Agricultural Development of Chandagad taluka.
Unpublished M.phil. Thesis, Shivaji University, Kolhapur
5. Bhosale, S.M. (March, 2007): A Study of Economics of Water Conservation in Khanapur Taluka of Sangali District. Unpublished
Ph.D. Thesis, Shivaji University, Kolhapur
6. Ward, F.A. and Pulido-Velazquez, M., 2008. Water conservation in irrigation can increase water use. Proceedings of the National
Academy of Sciences, 105(47), pp.18215-18220.
7. Pretty, J.N., Morison, J.I. and Hine, R.E., 2003. Reducing food poverty by increasing agricultural sustainability in developing
countries. Agriculture, ecosystems & environment, 95(1), pp.217-234.
8. Bell, N., Schuurman, N. and Hayes, M.V., 2007. Using GIS-based methods of multicriteria analysis to construct socio-economic
deprivation indices. International Journal of Health Geographics, 6(1), p.17.
9. Swetnam, R.D., Fisher, B., Mbilinyi, B.P., Munishi, P.K., Willcock, S., Ricketts, T., Mwakalila, S., Balmford, A., Burgess, N.D.,
Marshall, A.R. and Lewis, S.L., 2011. Mapping socio-economic scenarios of land cover change: A GIS method to enable ecosystem
service modelling. Journal of environmental management, 92(3), pp.563-574.
10. Jensen, J.R. and Cowen, D.C., 1999. Remote sensing of urban/suburban infrastructure and socio-economic attributes. Photogrammetric
engineering and remote sensing, 65, pp.611-622.
11. Ramotra, K.C. (2008): Development and The Scheduled caste, Rawat Publications p- 166-167, 235-347.

Authors: Khaja Zaffer, Pulla Sammaiah

Paper Title: Improvement of Electrical Insulation in Silicone Rubber by Adding Al2O3


Abstract: Polymer Nano composite in recent time has shown high improvement in mechanical, chemical and
electrical properties. Granting all these, the use of polymer nano-composites has only recently begun starting
explorer. In recent times, polymer materials has shown remarkable improvement in electrical insulation because
of their numerous advantages in out-door insulation systems because of their negligible weight, better pollution
performance, low cost, good dielectric properties with easy processing. In polymer materials, silicone rubber is
one of the lead polymer currently used and has high ending properties like high voltage insulator, thermal
stability, excellent UV resistance and hydrophobicity. Therefore, Silicone rubber with fillers can overcome few
drawbacks such as low strength and insulating properties.Oxides with different properties can help silicone
rubber to enhance its properties. Oxides such as alumina, zirconia are being widely used in silicone rubber.
Alumina which has strong thermal conductive and compressive strength with good electrical is used in silicone
rubber. Here Silicone rubber nano composites are prepared by incorporating Al2O3 nano partic les. Electrical,
Chemical properties like NaCl, HCl, and corrosion tests were conducted to know the performance of silicone
rubber insulation at pollutant conditions. Dielectric tests were also done to know whether Al2O3 has made any
effect with silicone rubber. Tensile strength and Hardness test were carried out to determine mechanical strength
of the rubber.

Keywords: silicone rubbers, aluminium oxide, electrical insulation, mechanical properties.

References:

1. Princy KG, Joseph R, Kartha CS (1998) Studies on conductive siliconerubbercompounds.JApplPolymSci69(5):1043–1050


2. J.F. Hall, History and bibliography of polymeric insulators for outdoor applications,IEEE Trans. Power Deliv. 8 (1993) 376–385.
3. Mark JE, Erman B, Eirich FR (1994) Science and technology of rubber, 2nd edn. Academic, SanDiego
806. 4. A review on silicone rubber by Shubas C, Shit, Pathik Shah
5. S. Kumagai and N. Yoshimura, In: Proc. 1998 international symposium on electrical insulating materials (Toyohashi, Japan, 1998) C3. 4695-
6. Super-hydrophobic zinc oxide/silicone rubber nanocomposite surfacesAna Isabel Mendozaa, Rosana Morianaa,b,c, Henrik Hillborgd, 46
Emma Strömberga,⁎ 98
7. Hydrophobicity of silicone rubber used for outdoor insulation -Mohammad Amin, Mohammad Akbar and Salman Amin.
8. D.-H. Han, D.-J. Kang, D.-P. Kang, K.-E. Min, Characteristics of electrical insulationin PDMS-ATH composite for high voltage
insulators, Polym. Bull. 61 (2008)611–617.
9. Hamdani, S.; Longuet, C.; Lopez-Cuesta, J.M.; Ganachaud, F. Calcium and aluminium-based fillers as flame-retardant additives in
silicone matrices. I. Blend preparation and thermal properties. Polym. Degrad. Stab. 2010, 95, 1911–1919
10. Hu, S.; Chen, F.; Li, J.G.; Shen, Q.; Huang, Z.X.; Zhang, L.M. The ceramifying process and mechanical properties of silicone
rubber/ammonium polyphosphate/aluminium hydroxide/mica composites. Polym. Degrad. Stab. 2016, 126, 196–203.
11. H. Hillborg, U.W. Gedde, Hydrophobicity recovery of polydimethylsiloxane afterexposure to corona discharges, Polymer 39 (1998)
1991–1998.
12. Raji Sundararajan, Areef Muhammad, Noppom Chaipanit, Tim Karcher and Zhenquan Liu // IEEE trans on dielectric and electrical
insulation 11 (2004) 348.
13. J. Lambrecht, R. Basch, S.M. Guhski and M.A. Fernando, In: Proc.1998 IEEE international conference on conduction and breakdown
in solid dielectrics (1998, Vasteris, Sweden) p. 430.
14. K. Naito R. Matsuoka, T. Irie and K. Kondo // IEEE. transactions on dielectric and electrical insulation 6 (1999) 732.
15. S. Shihab, V.Melik, L.Zhou, G.Melik and N.Alame, In: Proceedings of the 4th international conference on properties and applications
of dielectric materials (Brisbane, Australia, 1994) p. 530.
16. V.M. Moreno-Villa, M. A. Ponce-Velez, E. VaIIe-Jaime and J.L. Fierro-Chavez // IEE Proc.-Gener. Transm. 145 (I998) 675
17. Polymer Data Handbook (Oxford University Press, Inc, 1999).
18. X. Wang, S. Kumagai and N. Yoshimura, In: Proc. of 1998 International symposium on electrical insulating materials (Toyohashi,
Japan, 1998) p. 619.
19. K. Seog-Hyeon, E.A. Cherney, R. Hackam, K.G. Rutherford, Chemical changes at thesurface of RTV silicone rubber coatings on
insulators during dry-band arcing,
20. A Suzuki, T. Kumai, M. Hidaka, R. Kishida, N. Toshima, Y. Koshino, K. Sakanish, Y. Utsumi and Higashi Ku, deterioration diagnosis
technique of housing rubber for composite hollow insulator (NGK review overseas, edition No. 27, Dec. 2003).
21. E Sherif and C. Andreasson, Results from long term tests with long rod composite insulators exposed to natural pollution (NordIS 84,
1984
22. H Homma, T. Kuroyagi, K. Izumi, C. L. Mirley, J. Ronzello and S. A. // IEEE transactions on power delivery 15 (2000).
T.G. Gustavsson, S.M. Gubanski, H. Hillborg, S. Karlsson, U.W. Gedde, Aging ofsilicone rubber under ac or dc voltages in a coastal
environment, Dielectr. Electr.Insul. IEEE Trans. 8 (2001) 1029–1039
Authors: Hari Nugroho, Suripin, Iwan K. Hadihardaja
The Water Level and Outflow Prediction Using the Artificial Neural Network (ANN)
Paper Title:
for the Management of the Reservoir Flooding
Abstract: The aim of operation reservoir during flood is to prevent overflow that endangers the dams. It is also
807. to prevent flooding in the downstream of the dam, which leads to loss of life and property.This aim can be
4699-
achieved with optimal reservoir management which is influenced by the reservoir’s condition during flooding
47
such as: rain, reservoir storage, inflow, water level, and discharge of reservoir water released to the downstream.
06
The successfully of the reservoir management depends on the accuracy of the estimated a). water level (due to
the inflow of the reservoir) and b). outflow from the reservoir. One of the models which can be used to predict
the water level and reservoir water released during flooding is the Artificial Neural Network (ANN). ANN can
simulates flood events that are similar in fact to the previous occurence In this study a backpropagation ANN
model was applied to the Wonogiri Reservoir in Central Java, Indonesia. The optimal ANN architecture
produced in this study are the Input Pattern of 5-3-4 (which has a rain input recorded 1 – 5hours earlier, a water
level input recorded 1 – 3 hours earlier and a release input recorded 1 – 4 hours earlier). 27 pieces hidden
layer, total epoch which is 200 and the learning rate of 0.01. The output is predicting the water level, the
Outflow and Gate Opening of Reservoir. The current flood data was applied to the above model and it was
concluded that the network can follow the flood management pattern adequately. In addition, the network is
extra flexible with a lower flood discharge rate; and has the final elevation of the reservoir slightly lower than
the normal operation.

Keywords: Artificial Neural Network, optimal model, reservoir operation during flood.

References:

1. Atiya, A.F., Shahen, S.I., (1999). “A Comparison between Neural Network Forecasting Techniques”, IEEE Trans on Neural Network
10: pp56-71.
2. Bagis, A., and Haktanir, T., (2004). “Technical Notes : Fuzzy Logic Based Operation of Spillway Gates of Reservoirs during Floods”,
Journal of Hydrologic Engineering, Vol. 9, No. 6, November 1, ASCE, ISSN 1084-0699/2004, pp544-549.
3. Chen, Y.C., (2001). “A Counter propagation Fuzzy-Neural Network Modeling Approach to Real Time Streamflow Prediction”,
Journal of Hydrology. pp153-164.
4. Hadihardaja, I.K., (2003). Model Pengoperasian Waduk Tunggal dengan Jaringan Syaraf Tiruan, Jurnal Keairan ISSN 0854-4549,
Akreditasi No. 395/DIKTI/KEP/2000 No. 2 Tahun 10, hal 24-33.
5. Hadihardaja, I.K., dan Saragih, D., (2003). Pemodelan Multivariant Deret Waktu Sumberdaya Air menggunakan Jaringan Syaraf
Tiruan, Jurnal Keairan ISSN 0854-4549, Akreditasi No. 395/DIKTI/KEP/2000, No. 1 Tahun 10 - Juli 2003, hal 58-75.
6. Haykin, S., (1994). “Neural Network A Comprehensive Foundation”, Macmilian College, Publishing Company Inc., USA.
7. JICA. 2007a, Volume I : Executive Summary The Study On Countermeasures For Sedimentation in The Wonogiri Multipurpose Dam
Reservoir In The Republic Of Indonesia, Dirjen SDA Kementerian Pekerjaan Umum Republik Indonesia.
8. Margiantoro, A., (2003). Prediksi Debit Sungai Cikapundung menggunakan Jaringan Syaraf Tiruan [tesis], Program Magister Teknik
Instrumentasi dan Kontrol, ITB. Bandung.
9. Mays, L.W., and Yeou-Koung, T., (1992). Hydrosystems Engineering & Management, Water Resources Publications, Mc. Graw Hill
Inc., Princeton, New York.
10. Mediero, L., et al. (2006). Probabilistic Modelling of Reservoir Operation During Floods, Department of Civil Engineering:
Hydraulics and Energetic, Geophysical Research Studies, European Geosciences Union, Madrid.
11. Ngo, L.L., and Rosbjerg, D., (0000). “A Combined Flow Prediction And Reservoir Control System For Optimising Hydropower
Production”, Institute of Environment & Resources, Technical University of Denmark, Kongens Lyngby, Denmark.
12. Phien, N.H., Sureerathanan, S. (1997). “Back Propagation Network for Daily Stream flow Forecasting”, Research Report. India. 13.
13. Rivera, H.D., (2004). Flood Control Reservoir Operations For Conditions of Limited Storage Capacity, PhD. Dissertation in Civil
Engineering, Submitted Graduate The School of Engineering, Texas A & M University
14. Solomatine, D.P., and Torres, A., (1996). “Neural Network Approximation of a Hydrodynamic Model in Optimizing Reservoir
Operation”, Journal Engineering and Environmental Science, Erciyes University, Department of Civil Engineering, Kayseri, Turkey,
September 1996.
15. Sudjarwadi, (1989). Operasi Waduk, Pusat Antar Universitas Ilmu Teknik, Universitas Gadjah Mada, Jogjakarta, Maret 1989.
16. Suharyanto, (1995). “Application of Australia.Stochastic Dynamic Programming in Reservoir Operation Rule Generation”, Paper
Research Student Civil Engineering Department and Building, James Goldston Faculty of Engineering, Central Queensland University,
Rockhampton,
17. Suharyanto, (2002). “Improved Reservoir Operating Policy Through Use of Fuzzy Set Theory”, PhD. Dissertation, Swinburne
University of Technology, Melbourne Australia.
18. Suharyanto, (2004). “Pengoperasian Waduk dalam Rangka Penanganan Bahaya Kekeringan dan Banjir”, Media Komunikasi Teknik
Sipil, BMPTTSSI, Vol. 13, No. 1 Edisi XXXI, Pebruari 2005, hal 60-70.
19. Valdes, J.B., and Marco, J.B., (1995). Managing Reservoirs For Flood Control, Department of Civil & Engr. Mechanics University of
Arizona, Tucson, USA, November 1995.
20. Venkatesh, M., (2001). “Stochastic Optimization in Reservoir Planning and Design - A Literature Review”, Material of Course Work
for Civil Engineering, CE 385D, pp1 -21.
21. Wurbs, R.A., (1996). Modeling and Analysis of Reservoir System Operations, PTR Prentice Hall, New Jersey, xvi + 356p.
22. Yakowitz, S., (1982). Dynamic Programming Application in Water Resources, Journal Water Resources Research, Vol. 18, No.4,
pages 673 -696, August 1982. 23. Yeh, W.G.W., (1985). Reservoir Management and Operations Models : A State-of-the-Art Review,
Water Resources Research, Vol. 21, No. 2, pp.1797-1818.

You might also like