95
International Journal of Innovative Technology and Exploring Engineering ISSN : 2278 - 3075 Website: www.ijitee.org Volume-8 Issue-4, FEBRUARY 2019 Published by: Blue Eyes Intelligence Engineering and Sciences Publication Published by: Blue Eyes Intelligence Engineering and Sciences Publication g ri n l o E p n x g E i d n n e a e r i y n g g o l o n h c e T e I v n i t t e a r v n o a n t i n o I n f o a l l a J n r u o Exploring Innovation www.ijitee.org IjItEe IjItEe E X P L O R IN G I N N O V A T ION

International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

  • Upload
    others

  • View
    7

  • Download
    0

Embed Size (px)

Citation preview

Page 1: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

International Journal of Innovative

Technology and Exploring Engineering

ISSN : 2278 - 3075Website: www.ijitee.org

Volume-8 Issue-4, FEBRUARY 2019

Published by: Blue Eyes Intelligence Engineering and Sciences Publication

Published by: Blue Eyes Intelligence Engineering and Sciences Publication

grin lo Ep nx gE id nn ea e riy ng golon

hce T e Iv nit tea rv no an tin oI nf o a l la Jnr uo

Exploring Innovation

www.ijitee.org

IjItEeIjItEe

EXPLORING INNOVA

TION

Page 2: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

Editor-In-Chief Chair Dr. Shiv Kumar

Ph.D. (CSE), M.Tech. (IT, Honors), B.Tech. (IT), Senior Member of IEEE

Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence (LNCTE), Bhopal

(M.P.), India

Associated Editor-In-Chief Chair Dr. Vinod Kumar Singh

Associate Professor and Head, Department of Electrical Engineering, S.R.Group of Institutions, Jhansi (U.P.), India

Associated Editor-In-Chief Members Dr. Hai Shanker Hota

Ph.D. (CSE), MCA, MSc (Mathematics)

Professor & Head, Department of CS, Bilaspur University, Bilaspur (C.G.), India

Dr. Gamal Abd El-Nasser Ahmed Mohamed Said

Ph.D(CSE), MS(CSE), BSc(EE)

Department of Computer and Information Technology , Port Training Institute, Arab Academy for Science ,Technology and Maritime

Transport, Egypt

Dr. Mayank Singh

PDF (Purs), Ph.D(CSE), ME(Software Engineering), BE(CSE), SMACM, MIEEE, LMCSI, SMIACSIT

Department of Electrical, Electronic and Computer Engineering, School of Engineering, Howard College, University of KwaZulu-

Natal, Durban, South Africa.

Scientific Editors Prof. (Dr.) Hamid Saremi

Vice Chancellor of Islamic Azad University of Iran, Quchan Branch, Quchan-Iran

Dr. Moinuddin Sarker

Vice President of Research & Development, Head of Science Team, Natural State Research, Inc., 37 Brown House Road (2nd Floor)

Stamford, USA.

Dr. Shanmugha Priya. Pon

Principal, Department of Commerce and Management, St. Joseph College of Management and Finance, Makambako, Tanzania, East

Africa, Tanzania

Dr. Veronica Mc Gowan

Associate Professor, Department of Computer and Business Information Systems,Delaware Valley College, Doylestown, PA, Allman,

China.

Dr. Fadiya Samson Oluwaseun

Assistant Professor, Girne American University, as a Lecturer & International Admission Officer (African Region) Girne, Northern

Cyprus, Turkey.

Dr. Robert Brian Smith

International Development Assistance Consultant, Department of AEC Consultants Pty Ltd, AEC Consultants Pty Ltd, Macquarie

Centre, North Ryde, New South Wales, Australia

Dr. Durgesh Mishra

Professor & Dean (R&D), Acropolis Institute of Technology, Indore (M.P.), India

Executive Editor Chair Dr. Deepak Garg

Professor & Head, Department Of Computer Science And Engineering, Bennett University, Times Group, Greater Noida (UP), India

Executive Editor Members Dr. Vahid Nourani

Professor, Faculty of Civil Engineering, University of Tabriz, Iran.

Dr. Saber Mohamed Abd-Allah

Associate Professor, Department of Biochemistry, Shanghai Institute of Biochemistry and Cell Biology, Shanghai, China.

Dr. Xiaoguang Yue

Associate Professor, Department of Computer and Information, Southwest Forestry University, Kunming (Yunnan), China.

Page 3: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

Dr. Labib Francis Gergis Rofaiel

Associate Professor, Department of Digital Communications and Electronics, Misr Academy for Engineering and Technology,

Mansoura, Egypt.

Dr. Hugo A.F.A. Santos

ICES, Institute for Computational Engineering and Sciences, The University of Texas, Austin, USA.

Dr. Sunandan Bhunia

Associate Professor & Head, Department of Electronics & Communication Engineering, Haldia Institute of Technology, Haldia

(Bengal), India.

Dr. Awatif Mohammed Ali Elsiddieg

Assistant Professor, Department of Mathematics, Faculty of Science and Humatarian Studies, Elnielain University, Khartoum Sudan,

Saudi Arabia.

Technical Program Committee Chair Dr. Mohd. Nazri Ismail

Associate Professor, Department of System and Networking, University of Kuala (UniKL), Kuala Lumpur, Malaysia.

Technical Program Committee Members Dr. Srilalitha Girija Kumari Sagi

Associate Professor, Department of Management, Gandhi Institute of Technology and Management, Visakhapatnam (A.P.) India.

Dr. Vishnu Narayan Mishra

Associate Professor, Department of Mathematics, Sardar Vallabhbhai National Institute of Technology, Ichchhanath Mahadev Dumas

Road, Surat (Gujarat), India.

Dr. Sripada Rama Sree

Vice Principal, Associate Professor, Department of Computer Science and Engineering, Aditya Engineering College, Surampalem

(Andhra Pradesh), India.

Dr. Ramzi Raphael Ibraheem Al Barwari

Assistant Professor, Department of Mechanical Engineering, College of Engineering, Salahaddin University – Hawler (SUH) Erbil –

Kurdistan, Erbil Iraq.

Dr. Kapil Chandra Agarwal

H.O.D. & Professor, Department of Applied Sciences & Humanities, Radha Govind Engineering College, U. P. Technical University,

Jai Bheem Nagar, Meerut, (U.P). India.

Convener Chair Mr. Jitendra Kumar Sen

Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd., Bhopal (M.P.), India

Editorial Chair Dr. Saeed Balochian

Associate Professor, Gonaabad Branch, Islamic Azad University, Gonabad, Iran.

Editorial Members Dr. Gyanesh Shrivastava

Associate Professor, Department of Information Technology, MATS University, Raipur (Chhattisgarh), India.

Dr. Swapnil B. Mohod

Assistant Professor, Department of Electrical Engineering, Prof. Ram Meghe College of Engineering & Management, Badnera,

Amravati (Maharashtra), India.

Dr. Subramani Roychoudri

Professor, Department of Computer Science and Engineering, Usha Rama College of Engineering and Technology, Telaprolu (Andhra

Pradesh), India.

Dr. KPNV Satyasree

Professor, Department of Computer Science and Engineering, Usha Rama College of Engineering and Technology, Telaprolu (Andhra

Pradesh), India.

Dr. Parul Mishra

Assistant Professor, Department of English, GD Goenka University Gurugram, Gurgaon (Haryana), India.

Page 4: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

S.

No

Volume-8 Issue-4, February 2019, ISSN: 2278-3075 (Online)

Published By: Blue Eyes Intelligence Engineering & Sciences Publication

Page

No.

1.

Authors: Ranjit Sadakale, R. A. Patil, N V K Ramesh

Paper Title: An Efficient AODV Routing Protocol for Vehicular Ad hoc Network

Abstract: Vehicular Ad-hoc Network (VANET) is considered as a sensor network with special characteristics

and some advance features. For VANET nodes treated with high mobility and fast topology change. These nodes

can sense its neighboring area to provide various services like traffic monitoring, speed of vehicle and some

environmental parameters monitoring. One of the advance reactive routing protocol is Ad Hoc on-demand

Distance Vector (AODV) is most commonly used routing protocol in topology based routing. This paper is

presenting improved AODV protocol, in order to consider different parameters like node mobility, sent packet rate,

delay and throughput. Results are implemented using Network Simulator-2.

Keywords: Cooperative Communication, Intelligent Transportation System (ITS), Packet combining, VANET.

References: 1. Jothi K R,Dr,Ebenezer Keyakumar A,”A Survey on Broadcasting Protocols in VANETs”,IJITEE, Vol.3 Nov 2013, ISSN 2278-3075.

2. Kulla E.,Morita S.,Katayama K., “Route lifetime prediction methos in VANET by using AODV routing protocol”, Advances in

Intelligent systems and computing, 772 pp.3-11, 2019 3. Abbasi I.A., Khan A.S., Ali S., “A Reliable Path Selection and Packet Forwarding Routing for Vehicular Ad hoc Networks”, EJWCN,

2018(1), 236.

4. S. Peters, A. Panah, K. Truong, and R. Heath, “Relay Architectures for 3GPP LTE Advanced,”, EURASIP Journal on Wireless Communications and Networking, May 2009.

5. T. Beniero, S. Redana, J. Hmlinen, and B. Raaf, “Effect of Relaying on Coverage in 3GPP LTE-Advanced,” IEEE Vehicular Technology

Conference, vol. 53, pp. 1–5, Apr. 2009. 6. J. Cho and Z. Haas, “On the Throughput Enhancement of the Downstream Channel in Cellular Radio Networks Through Multihop

Relaying,” IEEE Journal on Selected Areas in Communications, pp. 1206–1219, Sept. 2004.

7. R. Irmer and F. Diehm, “On coverage and capacity of relaying in LTE-advanced in example deployments,” IEEE Symposium on Personal, Indoor and Mobile Radio Communications, pp. 1–5, Sept. 2008.

8. Tarek Bejaoui,”Qos-Oriented High Dynamic Resource Allocation in Vehicular Communication Networks”, The Scientific World journal ,

vol 14 Article ID 718698. 9. IEEE 802.16 Broadband Wireless Access Working Group, “Amendment working document for Air Interface for Fixed and Mobile

Broadband Wireless Access Systems,” June 2009.

10. J. Laneman, D. Tse, and G. Wornell, “Cooperative Diversity in Wireless Networks: Efficient Protocols and Outage Behavior,” IEEE Transactions on Information Theory, vol. 50, pp. 3062–3080, Dec. 2004.

11. LI Yong,Hou Yi-bin,HUANNG Zhang-qin, WEI yi-fei, “High Throughput relay policy in wireless cooperative relaying networks on

stochastic control theory”, Elsevier, August 2011, 18(4). 12. Georgios Papadimitriou, Nikolas Pappas ,“ Network –level performance evaluation of a two-relay cooperative random access wireless

system”, Computer networks 88 (2015) 187-201.

13. Mohmad Feteiha, Hossam S Hassanein, “Decode-and –Forward cooperative vehicular relaying for LTE-A MIMO-downlink”, Vehicular communications 3 (2016) 12-20.

14. G.G. Md.Nawaz Ali,Edward Chan,Wenzhong Li, “On scheduling data access witj cooperative load balancing in vehicular adhoc

networks”, J Supercomput (2014) 67:438-468 15. Zeyu Zheng,Shengli Fu,Kejie Lu, “On the relay selection for cooperative wireless networks with physical layer network coding”,

Wireless Netw (2012) 18:653-665.

16. Kai Liu,Joseph K Y Ng, “Cooperative Data scheduling in Hybrid VANETs: VANET as a software Defined Network”, ACM transactions on Networking, Vol 24, No 3 June 2016.

17. Suman Saha,”Research Challenges of Position Based Routing Protocol in Vehiculat Adhoc Networks”, IOSRJEN, ISSN(e): 2250-

3021,Nov 2016,Vol 06,Issue 11. 18. S. Meko and P. Chaporkar, “Channel Partitioning and Relay Placement in Multi-hop Cellular Networks,” International Symposium on

Wireless Communication Systems, pp. 66–70, Sept. 2009.

19. J. Cioffi, “A Multicarrier Primer,” Nov. 1991. 20. Angelos Antonopolous, Christos Verikoukis, Charalabos Skianis and Ozgur B. Akan “Energy efficient network coding-based MAC for

cooperative ARQ wireless networks” Ad Hoc Networks 11 (2016) 190–200

1-4

2.

Authors: Hemant R. Deshmukh, Mahip M. Bartere

Paper Title: Enhancement of Image Stegnography Technique for Improvement of Security

Abstract: Steganography will pick up its significance because of the exponential development and mystery

correspondence of potential PC clients over the web. It can likewise be characterized as the investigation of

undetectable correspondence that ordinarily deals with the techniques for disguising the nearness of the bestowed

message. For the most part information implanting is accomplished in correspondence, picture, content, voice or

interactive media content for copyright, military correspondence, confirmation and numerous different purposes.

In picture Steganography, riddle correspondence is expert to introduce a message into cover picture (used as the

transporter to embed message into) and deliver a stego picture (created picture which is passing on a covered

message). In this paper we have on a very basic level researched diverse steganographic strategies. For hiding data

we used virtual key replacement technique which provides high data security in terms of payload, Image Quality

etc.

Keywords: Data Hiding, Security, Payload capacity.

References: 1. Hong Cao and Alex C. Kot, On Establishing Edge Adaptive Grid for Bilevel Image Data Hiding”, IEEE transactions on information

forensics and security, vol. 8, no. 9, September 2013.

5-8

Page 5: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of

the PNG Image With a Data Repair Capability, IEEE transactions on image processing, vol. 21, no. 1, January 2012.

3. Ming Li, Michel K. Kulhandjian, Dimitris A. Pados, Stella N. Batalama, and Michael J. Medley, Extracting Spread-Spectrum Hidden

Data From Digital Media, IEEE transactions on information forensics and security, vol. 8, no. 7, July 2013.

4. Chunfang Yang, Fenlin Liu, Xiangyang Luo, and Ying Zeng, Pixel Group Trace Model-Based Quantitative Steganalysis for Multiple

Least-Significant Bits Steganography, IEEE transactions on information forensics and security, vol. 8, no. 1, january 2013.

5. A. E. Mustafa, A.M.F. ElGamal, M.E. ElAlmi, Ahmed.BD, A Proposed Algorithm For Steganography In Digital Image Based on Least

Significant Bit , Issue No. 21, April. 2011.

6. D. C. Wu and W. H. Tsai, “A steganographic method for images by pixel-value differencing”, Pattern Recognition Letters, vol. 24, no. 9-

10, pp. 1613–1626, 2003.

7. Weiqi Luo, Fangjun Huang, Jiwu Huang, “Edge Adaptive Image Steganography Based on LSB Matching Revisited”, IEEE Transactions

on Information Forensics and Security, Vol. 5, No. 2, June 2010, pp. 201-214.

8. G.Karthigai Seivi, Leon Mariadhasan, K. L. Shunmuganathan, “Steganography using Edge Adaptive Image”, Proc. of the

International Conference on Computing, Electronics and Electrical Technologies (ICCEET), pp. 1023-1027, 2012.

9. Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang , Hung-Min Sun, “Adaptive Data Hiding in Edge Areas of Images With

Spatial LSB Domain Systems”, IEEE Transactions on Information Forensics and Security, Vol. 3, No. 3, September 2008, pp.488-497.

10. R. L. Tataru, D. Battikh, S. El Assad, H. Noura, O. Deforges, “Enhanced Adaptive Data Hiding in Spatial LSB Domain by using Chaotic

Sequences”, Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 85-88, 2012.

11. Zhu Liehuang, Li Wenzhuo, Liao Lejian , Li Hong, “A Novel Algorithm for Scrambling Digital Image Based on Cat Chaotic Mapping”,

International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 601-605, 2006.

12. Sahar Mazloom, Amir-Masud Eftekhari-Moghadam, “Color Image Cryptosystem using Chaotic Maps”, IEEE Symposium

on Computational Intelligence for Multimedia, Signal and Vision Processing, pp. 142-147, 2011.

13. Qian-chuan Zhong, Qing-xin Zhu , Ping-Li Zhang ,“A Spatial Domain Color Watermarking Scheme based on Chaos”,

International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA), pp. 137-142, 2008.

14. Chen Wei-bin, Zhang Xin, “Image Encryption Algorithm based on Henon Chaotic System”, International Conference on Image Analysis

and Signal Processing (IASP), pp. 94-97, 2009.

15. A. E. Mustafa, A.M.F. ElGamal, M.E. ElAlmi, Ahmed.BD, A Proposed Algorithm For Steganography In Digital Image Based on Least

Significant Bit , Issue No. 21, April. 2011.

16. Anuja Yeole, Mahip Bartere ,”An X-Or Base Image Encryption and Data Security through Higher LSB Data Hiding Approach: Result

Oriented”, International Journal of Engineering Science and Computing, April 2016 Volume 6 Issue No. 4.

17. Wu, D.C., and Tsai, W.H.: ‘A steganographic method for images by pixel-value differencing’, Pattern Recognit. Lett., 2003, 24, (9-10),

pp. 1613–1626

18. H.-C. Wu, N.-I. Wu, C.-S. Tsai and M.-S. Hwang,”Image steganographic scheme based on pixel-value differencing and LSB

replacement methods”IEE Proc.-Vis. Image Signal Process., Vol. 152, No. 5, October 2005.

19. Ran-Zan Wang and Yeh-Shun Chen,” High-Payload Image Steganography Using Two-Way Block Matching”, IEEE Signal Processing

Letters, Vol. 13, No. 3, March 2006 161.

20. Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang,” Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain

Systems”, IEEE Transactions On Information Forensics And Security, Vol. 3, No. 3, September 2008.

21. M.B. Ould Medeni,” A Novel Steganographic Method for Gray-Level Images With four-pixel Differencing and LSB Substitution”,978-

1-61284-732-0/11/$26.00 ©2010 IEEE.

3.

Authors: P.Meghana, S. SagarImambi, P. Sivateja, K. Sairam

Paper Title: Image Recognition for Automatic Number Plate Surveillance

Abstract: Automatic number plate recognition is a well known proposal in todays world due to the rapid growth

of cars, bikes and other vehicles. This automatic number plate recognition system uses image processing

technology for identification of the vehicles. This system can be used in highly populated areas and higly restricted

areas to easily identify traffic rule violated vehicles and owners name, address and other information can be

retrieved using this system. This system can be automated and it is used to recognize vehicles without

authorization ,vehicles that violated rules at populated areas like malls, universities, hospitals and other car

parking lots. This can also be used in the case of car usage in terrorist activites, smuggling, invalid number plates,

stolen cars and other illegal activities. It can also be used in highway electronic toll collection. Image of the car

number plate is captured and detection is done by image processing ,character segmentation which locate the alpha

numeric characters on a number plate.Then the segmented characters are translated into text entries using optical

character recognition(ocr).ANPR systems are already available but efficiency is not gained thoroughly. These

systems are developed using different methodologies butsome factors like vehicle speed, different font

styles,font sizes, language of vehicle number and light conditions are required to be explored .These can affect a

lot in the overall recognition rate. ANPR systems use (ocr) optical character recognition to scan the vehical number

plates, and it can be retrieved whenever required. The other details of the owners of the vehicles like address and

mobile number can be manipulated whenever necessary by contacting the system administrative. The purpose of

this paper is to recognize a car number plate using ann, image segmentation. We intended to develop a system in

mat lab which can perform detection as well as recognition of a car number plate.

Keywords: ANPR, histogram approach, OCR, template matching

References: 1. Rahim Panahi, Iman Gholampour. "Accurate Detection and Recognition of Dirty Vehicle Plate Numbers for High-Speed Applications",

IEEE Transactions on Intelligent Transportation Systems, 2017

2. H. Caner, H. S. Gecim, and A. Z. Alkar, “Efficient embedded neural network- based license plate recognition system,” IEEE Trans. Veh. Technol., vol. 57, no. 5, pp. 2675–2683, Sep. 2008.

3. Unsupervised Category Modeling, Recognition, and Segmentation in Images Sinisa Todorovic, Member, IEEE, and Narendra Ahuja,

Fellow, IEEE 4. V. Abolghasemi and A. Ahmadyfard, “An edge-based color-aided method for license plate detection,” Image Vis. Comput., vol. 27, no. 8,

pp. 1134–1142, Jul. 2009.

5. Semantic Image Segmentation with Contextual Hierarchical Models Mojtaba Seyedhosseini and Tolga Tasdizen, Senior Member, IEEE. 6. A Complete System for Vehicle Plate Localization, Segmentation and Recognition in Real Life Scene A.Conci, J. E. R. de Carvalho, T.

W. Rauber

9-12

Page 6: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

7. M. H. Glauberman, “Character recognition for business machines,” Electronics, vol. 29, pp. 132–136, 1956.

8. Automatic License Plate Recognition Shyang-Lih Chang, Li-Shien Chen, Yun-Chung Chung, and Sei-Wan Chen, Senior Member, IEEE

9. Automatic License-Plate Location and Recognition Based on Feature Salience Zhen-Xue Chen, Cheng-Yun Liu, Fa-Liang Chang, and Guo-You Wang

4.

Authors: Maram AL Muhisen, Hüseyin Gökçekuş, Mohammad Abazid

Paper Title: Study of Redesign for Commercial Environmental Building

Abstract: In recent times, sustainable construction is universally considered essential in structure developments,

specifically in the commercial fields. Moreover, a nationwide non-profit association, USGBC (United States Green

Building Council), was capable of establishing regulations and an assessment system for the sustainable structures

known as LEED or the Leadership in Energy and Environmental Design. The fundamental basis for green

structures is utilization of sustainable proficiency techniques either in newly constructed developments or

renovations of existing estates, so that the operating and maintenance expenditures are reduced. While the rental

cost or value of the structure is increased, the energy cost is minimized. Conversely, practical verification affecting

the valuing techniques of sustainable structures and properties is restricted. Hence, the objective of the

following study is to acknowledge the concerns linked to sustainable commercial developments and the rate-added

interval, in which the aspects that influence energy costs are examined. The rate- added interval depicts the

variations among the high value of construction value and energy rates, where a green profit is resembled by a

positive difference value.

Keywords: Sustainable, Structures, LEED, Rate-Added Interval, Green Building Council.

References: 1. Howe, J. C. (2010). Overview of green buildings. National Wetlands Newsletter,33 (1).

2. Samer, M. (2013). Towards the implementation of the Green Building concept in agricultural buildings: a literature review. Agricultural Engineering International: CIGR Journal, 15 (2), 25-46.

3. Boschmann, E. E., & Gabriel, J. N. (2013). Urban sustainability and the LEED rating system: case studies on the role of regional

characteristics and adaptive reuse in green building in Denver and Boulder, Colorado. Geographical Journal, 179 (3), 221-233 4. Ellison, L. and Sayce, S. (2007) Assessing Sustainability in The Existing Commercial Property Stock Establishing Sustainability Criteria

Relevant for The Commercial Property Investment Sector. Journal of Property Management, Vol. 25 No. 3, pp. 287-304.

5. Lzkendorf, T. and Lorenz, D. (2005) Sustainable Property Investment: Valuing Sustainable Buildings Through Property Performance Assessment, Building research and information, 33(3), 212-234.

6. Mansfield, J. (2009). The Valuation of Sustainable Freehold Property: A CRE Perspective. Journal of Corporate Real Estate, Vol. 11 No.

2 pp. 91-105. 7. Almuhisen, M. & Gökçekuş, H. (2018). Climate Change Impact on Economy. International Journal of Scientific & Engineering Research,

9(6), 1661-1669.

8. Abazid, M., & Harb, H. (2018). An Overview of Risk Management in The Construction Projects. Academic Research International, 9(2), 73–79.

9. Abazid, M. (2017). The Quality Control Implementation in the Construction Projects in Saudi Arabia.

10. Nouban, F. & Abazid, M. (2017). An Overview of The Total Quality Management in Construction Management. Academic Research International, 8(4), 68-74.

11. Abazid, M., & Gökçekus, H. (2019). Application of Total Quality Management on The Construction Sector in Saudi Arabia. International

Journal of Technology. 12. Abazid, M., Gökçekus, H. and Çelik, T. (2019). Study of the Quality concepts Implementation in the Construction of Projects in Saudi

Arabia by using building information Modelling (BIM). International Journal of Innovative Technology and Exploring Engineering, 8(3), 84-87.

13-17

5.

Authors: Gopi Dattatreya and K. K. Naik

Paper Title: Circular Patch on Rectangular Slits loaded Antenna with DGS for Biomedical Applications

Abstract: In recent times, sustainable construction is universally considered essential in structure developments,

specifically in the commercial fields. Moreover, a nationwide non-profit association, USGBC (United States Green

Building Council), was capable of establishing regulations and an assessment system for the sustainable structures

known as LEED or the Leadership in Energy and Environmental Design. The fundamental basis for green

structures is utilization of sustainable proficiency techniques either in newly constructed developments or

renovations of existing estates, so that the operating and maintenance expenditures are reduced. While the rental

cost or value of the structure is increased, the energy cost is minimized. Conversely, practical verification affecting

the valuing techniques of sustainable structures and properties is restricted. Hence, the objective of the

following study is to acknowledge the concerns linked to sustainable commercial developments and the rate-added

interval, in which the aspects that influence energy costs are examined. The rate- added interval depicts the

variations among the high value of construction value and energy rates, where a green profit is resembled by a

positive difference value.

Keywords: Sustainable, Structures, LEED, Rate-Added Interval, Green Building Council.

References:

1. S. Yano and A. Ishimaru, "A theoretical study of the input impedance of a circular microstrip disk antenna," IEEE Transactions on

Antennas and Propagation, vol. 29, pp. 77-83, 1981.

2. K. S. Kim, T. Kim, and J. Choi, "Dual‐frequency aperture‐coupled square patch antenna with double notches," Microwave and Optical

Technology Letters, vol. 24, pp. 370-374, 2000.

3. G. D. Ntouni, A. S. Lioumpas, and K. S. Nikita, "Reliable and energy-efficient communications for wireless biomedical implant

systems," IEEE journal of biomedical and health informatics, vol. 18, pp. 1848-1856, 2014. 4. K. K. Naik, P. A. V. Sri, and J. Srilakshmi, "Design of implantable monopole inset-feed c-shaped slot patch antenna for bio-medical

applications," in Progress in Electromagnetics Research Symposium-Fall (PIERS-FALL), 2017, 2017, pp. 2645-2649.

18-21

Page 7: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

5. A. Kiourti and K. S. Nikita, "Miniature scalp-implantable antennas for telemetry in the MICS and ISM bands: design, safety

considerations and link budget analysis," IEEE Transactions on Antennas and Propagation, vol. 60, pp. 3568-3575, 2012.

6. X. Tong, C. Liu, X. Liu, H. Guo, and X. Yang, "Switchable ON-/OFF-Body Antenna for 2.45 GHz WBAN Applications," IEEE Transactions on Antennas and Propagation, vol. 66, pp. 967-971, 2018.

7. S. A. Kumar and T. Shanmuganantham, "Design of implantable CPW fed monopole H-slot antenna for 2.45 GHz ISM band

applications," AEU-International Journal of Electronics and Communications, vol. 68, pp. 661-666, 2014.

8. Ketavath Kumar Naik and Dattatreya Gopi, "Flexible CPW-fed split-triangular shaped patch antenna for WiMAX applications,

"Progress In Electromagnetics Research M, vol. 70, pp. 157–166, 2018.

9. C. Liu, Y.-X. Guo, and S. Xiao, "Compact dual-band antenna for implantable devices," IEEE Antennas and Wireless Propagation Letters, vol. 11, pp. 1508-1511, 2012.

10. H. Younesiraad, M. Bemani, and S. Nikmehr, "A Dual-Band Slotted Square Ring Patch Antenna for Local Hyperthermia Applications,"

Progress In Electromagnetics Research, vol. 71, pp. 97-102, 2017.

6.

Authors: K. Haribabu, Ch. Umashankar, S.V.S Prasad

Paper Title: An IoT Detection of Milk Parameters using Raspberry PI and GSM for Diary Farmers

Abstract: The Raspberry pi development board controller which based to measure some of the parameters. It

will be very simple to measure the milk parameters of ph value fat and CLR value. The ph detector it will detects

the ph value levels in the milk and similarly in the same way the lactometer will measure how the milk purity

obtained. The milk purity will be studied deeply by purely qualitatively quantitatively. In this domain the sensors

will be interfaced to the raspberry pi controller. Every farmer will have Rfid interface user id and it will be

connected to farmer mobile number by the gsm module. The measured parameters of milk will be sms to the

connected to the farmer mobile number. The measured content will be uploaded to the webpage through internet

using the gprs with date and time it will be displayed in the lcd monitor. It can be a coffee price and economical

tool to sight purityness of the milk. With the assistance of GSM and GPRS method the milk can be easily traded

and reading parameter information of milk will be sent to the govt so it will be helpful to the govt about the illegal

things can be overcome such as milk impurity. The farmers swipes RFID the cardboard it reads the Milk

parameters like pH worth CLR and every RFID coupled with various farmer mobile variety, once mensuration

done of the Milk parameters SMS the parameters information to the farmer. By exploitation the GPRS technology

the knowledge will transfer to the server for the longer term analysis and records.

Keywords: Raspberry Pi, Rfid Reader Module, GSM Module, Ph Sensor, CLR(Corrected lactometer Reading),

IOT(Thing speak).

References: 1. Prof. S.V. Arote, Prof. S.B. Lavhate, Prof. V. S. 2. Phatangare, “Low value Milk Analyzing and asking System victimization Electronic Card”, International Journal of Computer

Technology and physical science Engineering-Volume two, Issue 2.Page no 5 to 13.

3. Sheryl S. Chougule, Mahesh S. Kumbhar, “To Develop processing System for farm Auto ----mation”,International Journal of

engineering and Electronics Engineering and Science Vol.No.05, May 2016.

4. Kejal monarch, Rajeshri Kelkar, Amruta fish genus, M .S. Chavan, “Photometric primarily based Sensor for Fat Detection in

contemporary Milk”, International Journal of Innovative Research in pc and communication Engineering.vol 3,Issue 4,April 2015. 5. Prof.A.S.Mali1, Arena A. Chougale, “Low Budget

6. System for measure of Milk Parameters and asking for Dairy” SSRG International Journal of Electronics

and Communication Engineering – Volume two, Issue 5, May 2015. 7. Ropak Chakravarty, a paper on IT at Milk Collection centres in cooperative Diaries:The National Dairy Development Board

Experience,pp 37-47.

22-24

7.

Authors: Gousiya Begum, S. Zahoor Ul Huq, A.P. Siva Kumar

Paper Title: Security Vulnerabilities in Hadoop Framework

Abstract: Apache Hadoop emerged as the widely used distributed parallel computing framework for Big Data

Processing. Apache Hadoop is an open source framework suitable for processing large scale data sets using

clusters of computers. Data is stored in Hadoop using Hadoop Distributed File System. Though Hadoop is widely

used for distributed parallel processing of Big Data, some security vulnerabilities does exist. As part of our

research we have investigated Hadoop Framework for possible security vulnerabilities and also demonstrated the

mechanism to address the identified security vulnerabilities. Our findings include the vulnerabilities in logging

mechanism, file system vulnerabilities, and addition of external jar files to the framework. we have addressed

these vulnerabilities using custom Map Reduce jobs.

Keywords: Custom Map Reduce, Hadoop Distributed File System, Hadoop Framework, Security vulnerabilities.

References: 1. Srinivasan, Madhan Kumar, and P. Revathy, "State-of-the-art Big Data Security Taxonomies," Proceedings of the 11th Innovations in

Software Engineering Conference, ACM, 2018.

2. Wang, Jiayin, et al. "Seina: A stealthy and effective internal attack in hadoop system," Computing, Networking and Communications (ICNC), 2017 International Conference on. IEEE, 2017.

3. Parmar, Raj R., et al. "Large-scale encryption in the Hadoop environment: Challenges and solutions," IEEE Access 5 (2017): 7156-7163.

4. Rao, P. Ram Mohan, S. Murali Krishna, and AP Siva Kumar. "Privacy preservation techniques in big data analytics: a survey," Journal of Big Data 5.1 (2018): 33.

5. Dou, Zuochao, et al. "Robust insider attacks countermeasure for Hadoop: Design and implementation,." IEEE Systems Journal 12.2

(2018): 1874-1885. 6. Cloud Security Overview https://www.cloudera.com/documentation/enterprise/5-12-x/PDF/cloudera-security.pdf

25-28

8.

Authors: T. Raghavendra Vishnu, D. Venkata Ratnam, P. Bhanu Priyanka, M. Sridhar, K. Padma Raju

Paper Title: Detection and Analysis of Cycle Slips from GNSS Observations

Page 8: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

Abstract: Global Positioning System (GPS) receiver’s high precision and high reliability has gained importance in

recent years as a result of continuous demand for GPS applications in various fields. In order to obtain accurate

positioning information the GPS receivers use carrier phase measurements for high-precision applications. Carrier

phase measurements are greatly affected by Cycle Slips (CS). In this paper, detection of the cycle slips analysis is

carried out using the raw carrier phase data recorded for the solar maximum year 2013 at Koneru Lakshmaiah (K

L) University, Guntur, India. Higher-order phase differencing scheme is used for the detection of the cycle slips.

At higher-order differences, the amplification of sudden jumps associated with the cycle slips can be observed

thereby improving the ability to detect cycle slips. It is found that cycle slips occurrence is high during the solar

maximum year (2013). The connection of cycle slip occurrence with ionospheric scintillations is also investigated.

During the geomagnetic storm event on 29 June, 2013, maximum S4 has been observed due to fall in C/N0 leading

to occurrence of cycle slips. Empirical Mode Decomposition-Detrended Fluctuation Analysis (EMD-DFA)

algorithm is used for mitigating the effects of ionospheric scintillations.

Keywords: Cycle slips, EMD-DFA, Scintillations

References: 1. Hoffmann-Wellenhof, B., H. Lichtenegger, and J. Collins (1994), GPS theory and practice, Springer-Verlag, New York. 2. Leick, A., L. Rapoport, and D. Tatarnikov (2015), GPS satellite surveying, John Wiley & Sons.

3. Dai, Z. (2012), MATLAB software for GPS cycle-slip processing, GPS solutions, 16(2), 267-272.

4. Skone, S., K. Knudsen, and M. De Jong (2001), Limitations in GPS receiver tracking performance under ionospheric scintillation conditions, Physics and Chemistry of the Earth, Part A: Solid Earth and Geodesy, 26 (6), 613-621.

5. Silva, P. (2013), Cycle Slip Detection and Correction for Precise Point Positioning, Proceedings of the Institute of Navigation ION GNSS,

22 (2015), 47. 6. Blewitt, G. (1990), Jet Propulsion Laboratory, California Institute of Technology, Pasadena, Geophysical Research Letters, 17(3), 199-

202.

7. de Lacy, M. C., M. Reguzzoni, F. Sansò, and G. Venuti (2008), The Bayesian detection of discontinuities in a polynomial regression and its application to the cycle-slip problem, Journal of Geodesy, 82(9), 527-542.

8. Sunda, S., R. Sridharan, B. Vyas, P. Khekale, K. Parikh, A. Ganeshan, C. Sudhir, S. Satish, and M. S. Bagiya (2015), Satellite‐based

augmentation systems: A novel and cost‐effective tool for ionospheric and space weather studies, Space Weather, 13 (1), 6-15.

9. Liu, Z. (2011), A new automated cycle slip detection and repair method for a single dual-frequency GPS receiver, Journal of Geodesy,

85(3), 171-183.

10. Dai, Z., S. Knedlik, and O. Loffeld (2009), Instantaneous triple-frequency GPS cycle-slip detection and repair, International Journal of Navigation and Observation.

11. Kim, D., and R. B. Langley, Instantaneous Real‐Time Cycle‐Slip Correction for Quality Control of GPS Carrier‐Phase Measurements

(2002), Navigation, vol. 49, pp. 205-222.

12. Banville, S., R. Langley, S. Saito, and T. Yoshihara (2010), Handling cycle slips in GPS data during ionospheric plasma bubble events, Radio Science, vol. 45.

13. Zhang, D., L. Cai, Y. Hao, Z. Xiao, L. Shi, G. Yang, and Y. Suo (2010), Solar cycle variation of the GPS cycle slip occurrence in China

low‐latitude region, Space Weather, 8(10).

14. Zhao, L., L. Li, Y. Liu, and N. Li (2014), Cycle slip detection and repair with triple frequency combination method, paper presented at

2014 IEEE/ION Position, Location and Navigation Symposium-PLANS 2014, IEEE. 15. Yue, X., W. S. Schreiner, N. M. Pedatella, and Y. H. Kuo (2016), Characterizing GPS radio occultation loss of lock due to ionospheric

weather, Space Weather, 14 (4), 285-299.

16. Dejie Yu, Junsheng Cheng, Yu Yang (2003), Application of EMD method and Hilbert spectrum to the fault diagnosis of roller bearings, doi:10.1016/S0888-3270(03)00099-2.

17. Yih Jeng, Ming-Juin Lin, Chih-Sung Chen, and Yu-Huai Wang (2007), Noise reduction and data recovery for a VLF-EM survey using a nonlinear decomposition method, Geophysics,Vol. 72, No. 5, P. F223–F235.

18. Kantelhardt, J. W., S. A. Zschiegner, E. Koscielny-Bunde, S. Havlin, A. Bunde, and H. E. Stanley (2002), Multifractal detrended

fluctuation analysis of nonstationary time series, Physica A: Statistical Mechanics and its Applications, 316(1), 87-114. 19. Saba, M. F., W. Gonzalez, and A. Clúa de Gonzalez (1997), Relationships between the AE, ap and Dst indices near solar minimum (1974)

and at solar maximum (1979), Annales Geophysicae, pp. 1265-1270.

20. Afraimovich, E. L., V. V. Demyanov, T. N. Kondakova (2003), Degradation of GPS performance in geomagnetically disturbed conditions, GPS Solutions, No.7, 109–119.

21. Koster, J. R., Equatorial scintillation (1972), Planetary and Space Science, vol. 20, pp. 1999-2014.

22. Burke, W., L. Gentile, C. Huang, C. Valladares, and S. Su, Longitudinal variability of equatorial plasma bubbles observed by DMSP and

ROCSAT‐1 (2004), Journal of Geophysical Research: Space Physics, vol. 109.

23. Tanna, H., and K. Pathak, Multifractality due to long-range correlation in the L-band ionospheric scintillation S 4 index time series (2014), Astrophysics and Space Science, vol. 350, pp. 47-56.

29-34

9.

Authors: Albert Allen D Mello, G. Ramanan, Dhanaya Prakash R Babu

Paper Title: Effect of Carbon Nanotube Layers on Change in Mechanical Characteristic of E-Glass Fiber

Reinforced Epoxy Composite

Abstract: Polymer composite reinforced with fiber materials have always proven its superior significant

enactment over numerous traditional materials, considering their incomparable strength to weight ratio and

stiffness. The Carbon nanotubes (CNTs) usage in glass-fiber reinforced polymer (GFRP) has high potential in

changing the characteristics of composite laminates. Carbon nanotubes (CNT) because of their outstanding

mechanical, electrical and thermal properties have engrossed composite fraternity in exploring the opportunity of

utilizing them as a supplementary reinforcement in fiber reinforced polymer composites. Reports of the fabrication

of GFRP with and without CNT are discussed in this paper. The target in this study is to examine the mechanical

characters of GFRP with and without Multi-walled carbon nanotubes (MWCNT). GFRP laminated composite are

fabricated by hand lay-up technique. Composite laminated layers are fabricated using epoxy resin without CNT

and with 0.5% and 1.5% MWCNT. The materials were tested to determine tensile, flexural and compression

properties. It is observed that carbon nanotubes can enhance the mechanical properties in the composite laminates.

Composite laminate with 1.5wt% MWCNT exhibited good mechanical properties compared to that with 0.5wt%

MWCNT and without MWCNT.

35-40

Page 9: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

Keywords: CFRP Composites, Carbon nanotubes, Mechanical Characteristics, Bending moment

References: 1. Friedrich, K. Polymer composites for tribological applications. Advanced Industrial and Engineering Polymer Research. 1(1), 2018, pp.3-

39.

2. Saba, N., & Jawaid, M. A Review on Thermo mechanical Properties of Polymers and Fibers Reinforced Polymer Composites. J. of

Industrial and Engineering Chemistry, 67, 2018, pp.1-11.

3. Darwins, A. K., Satheesh, M., and Ramanan, G., Modelling and optimization of friction stir welding parameters of Mg-ZE42 alloy using

grey relational analysis with entropy measurement. IOP Conference Series: Materials Science and Engineering, 402(1), 2018, pp.12162.

4. Islam, M. E., Mahdi, T. H., Hosur, M. V., and Jeelani, S. Characterization of carbon fiber reinforced epoxy composites modified with

nanoclay and carbon nanotubes. Procedia Engineering, 105, 2015, pp.821-828.

5. Periyardhasan, R., and Devaraju, A. Mechanical Characterization of Steel Wire Embeded GFRP Composites. Materials Today:

Proceedings, 5(6), 2018, pp.14339-14344.

6. Ramanan, G., Dhas, J. E. R. Multi Objective Optimization of Wire EDM Machining Parameters for AA7075-PAC Composite Using Grey-

Fuzzy Technique. Materials Today: Proceedings, 5(2), 2018, pp.8280-8289.

7. Maciel, N. D. O. R., Ferreira, J. B., da Silva Vieira, J., Ribeiro, C. G. D., Lopes, F. P. D., Margem, and Silva, L. C. Comparative tensile

strength analysis between epoxy composites reinforced with curaua fiber and glass fiber. Journal of Materials Research and Technology,

2018, pp.136-148.

8. Rana, R. S., Rana, S., and Purohit, R. Characterization of Properties of epoxy sisal/Glass Fiber Reinforced hybrid composite. Materials

Today: Proceedings, 4(4), 2017, pp.5445-5451.

9. Sivasaravanan, S., and Raja, V. B. Impact characterization of epoxy LY556/E-glass fibre/nano clay hybrid nano composite

materials. Procedia Engineering, 97, 2014, pp.968-974.

10. Ramanan, G., Samuel, G.D., Sherin, S.M., Samuel, K.., Modeling and prediction of machining parameters in composite manufacturing

using artificial neural network, IOP Conference Series: Materials Science and Engineering, 402, 2018, pp.012163.

11. Naqi, A., Abbas, N., Zahra, N., Hussain, A., and Shabbir, S. Q. Effect of multi-walled carbon nanotubes (MWCNTs) on the strength

development of cementations materials. Journal of Materials Research and Technology, 2018, pp.156-163.

12. Masoumeh Nazem Salimi, Mehdi Torabi Merajin and Mohammad Kazem Besharati Givi, Enhanced mechanical properties of

multifunctional multiscale glass/carbon/epoxy composite reinforced with carbon nanotubes and simultaneous carbon nanotubes/nanoclays,

Journal of Composite Materials, 2016, pp.1–14.

10.

Authors: K.S Rajasekhar, T Ranga Babu

Paper Title: Analysis of Dermoscopic Images using Multiresolution Approach

Abstract: Abnormal growth of cells in any part of the body is called cancer. Cancer that is formed on skin is

called skin cancer. Life span of a cancer patient can be increased by the early detection of tumor part. This paper

deals with classification of dermoscopic images, i.e. benign or malignant based on coefficients extracted from

multiresolution analysis based wavelet functions and tetrolet transform. Statistical texture features such as Mean,

Standard Deviation, Kurtosis and Skewness are calculated from the coefficients of the multiresolution transfroms.

The Gray Level Co-occurence Matrix(GLCM) is calculated for the dermoscopic images from which features such

as homogenity, energy and entropy are calculated. In addition to these shape features are also taken into

consideration. K-Nearest Neighbor(KNN) classifier is used for classification of dermoscopic images. In this work,

dermoscopic images are obtained from the International Skin Imaging Archive (ISIC). The performance of the

system is evaluated using accu-racy, sensitivity and specificity. The area under the curve(AUC) demonstrates the

superiority of tetrolet transform.

Keywords: Dermoscopic images, Texture features, GLCM features, Shape features, KNN classifier, Accuracy,

Sensitivity, Specificity and AUC.

References: 1. http://www.skincancer.org/skin-cancer-information/skin-cancer-facts. 2. Sheha, Mariam A., Mai S. Mabrouk, and Amr Sharawy. "Automatic detection of melanoma skin cancer using texture analysis."

International Journal of Computer Applications 42.20 (2012): 22-26.

3. Dobrescu, Radu, et al. "Medical images classification for skin cancer diagnosis based on combined texture and fractal analysis." WISEAS Transactions on Biology and Biomedicine 7.3 (2010): 223-232.

4. Celebi, M. Emre, et al. "A methodological approach to the classification of dermoscopy images." Computerized Medical Imaging and

Graphics 31.6 (2007): 362-373.

5. Lau, Ho Tak, and Adel Al-Jumaily. "Automatically early detection of skin cancer: Study based on nueral netwok classification." Soft

Computing and Pattern Recognition, 2009. SOCPAR’09. International Conference of. IEEE, 2009.

6. Elgamal, Mahmoud. "Automatic skin cancer images classification." IJACSA) International Journal of Advanced Computer Science and Applications 4.3 (2013): 287-294..

7. Yuan, Xiaojing, et al. "SVM-based texture classification and application to early melanoma detection." Engineering in Medicine and

Biology Society, 2006. EMBS’06. 28th Annual International Conference of the IEEE. IEEE, 2006. 8. Yu, Lequan, et al. "Automated melanoma recognition in dermoscopy images via very deep residual networks." IEEE transactions on

medical imaging 36.4 (2017): 994-1004.

9. https://isic-archive.com. 10. Krommweh, Jens. "Tetrolet transform: A new adaptive Haar wavelet algorithm for sparse image representation." Journal of Visual

Communication and Image Representation 21.4 (2010): 364-374J. Jones. (1991, May 10). Networks (2nd ed.) [Online]. Available:

http://www.atm.com 11. (Haenssle, H. A., et al. "Man against machine: diagnostic performance of a deep learning convolutional neural network for dermoscopic

melanoma recognition in comparison to 58 dermatologists." Annals of Oncology (2018).

12. Bi, Lei, et al. "Dermoscopic image segmentation via multi-stage fully convolutional networks." IEEE Trans. Biomed. Eng 64.9 (2017): 2065-2074.

13. Rahman, Mahmudur, Nuh Alpaslan, and Prabir Bhattacharya. "Developing a retrieval based diagnostic aid for automated melanoma

recognition of dermoscopic images." 2016 IEEE Applied Imagery Pattern Recognition Workshop (AIPR). IEEE, 2016 14. Sultana, Nazneen N., and N. B. Puhan. "Recent Deep Learning Methods for Melanoma Detection: A Review." International Conference

on Mathematics and Computing. Springer, Singapore, 2018.

15. Adria Romero,Lopez et al. "Skin lesion classification from dermoscopic images using deep learning techniques." Biomedical Engineering (BioMed), 2017 13th IASTED International Conference on. IEEE, 2017.

41-48

Page 10: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

16. Codella, Noel, et al. "Deep learning, sparse coding, and SVM for melanoma recognition in dermoscopy images." International Workshop

on Machine Learning in Medical Imaging. Springer, Cham, 2015.

17. Yu, Lequan, et al. "Automated melanoma recognition in dermoscopy images via very deep residual networks." IEEE transactions on medical imaging 36.4 (2017): 994-1004.

18. Oliveira, Roberta B., Aledir S. Pereira, and João Manuel RS Tavares. "Skin lesion computational diagnosis of dermoscopic images:

Ensemble models based on input feature manipulation." Computer methods and programs in biomedicine 149 (2017): 43-53.

19. Yi, Xin, Ekta Walia, and Paul Babyn. "Unsupervised and semi-supervised learning with Categorical Generative Adversarial Networks

assisted by Wasserstein distance for dermoscopy image Classification." arXiv preprint arXiv:1804.03700 (2018).

20. Castillejos-Fernández, Heydy, et al. "An Intelligent System for the Diagnosis of Skin Cancer on Digital Images taken with Dermoscopy." Acta Polytechnica Hungarica 14.3 (2017).

21. Majtner, Tomas, Sule Yildirim-Yayilgan, and Jon Yngve Hardeberg. "Combining deep learning and hand-crafted features for skin lesion

classification." Image Processing Theory Tools and Applications (IPTA), 2016 6th International Conference on. IEEE, 2016

11.

Authors: K Ram Prasad, B Rajasekhar Reddy, C Hari Prasad, Dinakara Prasad Reddy P

Paper Title: Monarch Butterfly Optimization Algorithm for Capacitor Placement in Radial Distribution Systems

Abstract: Monarch butterfly optimization (MBO) is used for the optimal capacitor placement problem. Loss

Sensitivity method is used for optimal locations of capacitors. Capacitor sizes by MBO algorithm in radial

distribution systemscorresponding to maximum loss reductions are determined in this paper. The results are

presented with test system15-bus, 34-bus and 69-bus.

Keywords: Monarch butterfly optimization algorithm, Loss Sensitivity Method.

References: 1. Karimianfard, Hossein, and Hossein Haghighat. "Generic Resource Allocation in Distribution Grid." IEEE Transactions on Power

Systems 34, no. 1 (2019): 810-813.

2. Mandal, S., K. K. Mandal, B. Tudu, and N. Chakraborty. "A New Improved Hybrid Algorithm for Multi-objective Capacitor Allocation

in Radial Distribution Networks." In Soft Computing for Problem Solving, pp. 585-597. Springer, Singapore, 2019. 3. Cuevas, Erik, Emilio BarocioEspejo, and Arturo Conde Enríquez. "A Modified Crow Search Algorithm with Applications to Power

System Problems." In Metaheuristics Algorithms in Power Systems, pp. 137-166. Springer, Cham, 2019.

4. Reddy, P., et al. "An Efficient Distribution Load Flow Method for Radial Distribution Systems with Load Models." International Journal Of Grid And Distributed Computing 11.3 (20Reddy,

5. Veera, DinakaraPrasasd Reddy P. VC, and Reddy T. Gowri. "Ant Lion optimization algorithm for optimal sizing of." Electrical Power &

Energy Systems 28 (2017): 669-678. 6. DinakaraPrasasd Reddy, P. V. C., and T. Reddy Dr. "Optimal renewable resources placement in distribution." Electrical Power & Energy

Systems 28 (2017): 669-678.

7. Dinakara Prasad Reddy. "Sensitivity based capacitor placement using cuckoo search algorithm for maximum annual savings." IOSR Journal of Engineering 4.4 (2014): 6.

8. G. G. Wang, X. Zhao and S. Deb, "A Novel Monarch Butterfly Optimization with Greedy Strategy and Self-Adaptive," 2015 Second

International Conference on Soft Computing and Machine Intelligence (ISCMI), Hong Kong, 2015, pp. 45-50.

49-51

12.

Authors: Jyothi Budida, Sanjai Kumar Mortha, Sreerama Lakshmi Narayana

Paper Title: Constrained Optimization of Linear Antenna Arrays using Novel Social Group Optimization Algorithm

Abstract: Antenna array optimization is a major research problem in the field of electromagnetic and antenna

engineering. The optimization typically involves in handling several radiation parameters like Sidelobe level (SL)

and beamwidth (BW). In this paper, the linear antenna array (LAA) configuration is considered with symmetrical

distribution of excitation and special distribution. The objective of the design problem considered involves in

generating optimized patterns in terms of SLL and BW and check the robustness of the social group optimization

algorithm (SGOA). The analysis of the design problem is carried out in terms of radiation pattern plots. The

simulation is carried out in Matlab.

Keywords: Antenna array, optimization, SGOA

References: 1. Balanis, C. A., Antenna Theory: Analysis and Design, John Wileyand Sons, 1982

2. Cheng, K. D: Optimization techniques for antenna arrays. In: Proceedings of the IEEE, 59(12) 1664–1674 (1971) . 3. On the Linear Antenna Array Synthesis Techniques for Sum and Difference Patterns

4. Using Flower Pollination Algorithm V. V. S. S. S. Chakravarthy · P. S. R. Chowdary · Ganapati Panda ·Jaume Anguera · Aurora Andújar

· Babita Majhi Proceedings of Arabian Journal for Science and Engineering – Springer Nature Hub. 5. Ram, G.; Mandal, D.; Ghoshal, S.P.; Kar, R.: Nature-inspired algorithm- based optimization for beamforming of linear antenna array

system. In: Patnaik, S. et al. (eds.) Nature-Inspired Computing and Optimization 2017, pp. 185–215. Springer, Berlin. doi:10.1007/978-3-

319-50920-4_8 6. Performance of Beamwidth Constrained Linear Array Synthesis Techniques Using Novel Evolutionary Computing Tools CSR Paladuga,

CV Vedula, J Anguera, RK Mishra, AAndújar, applied computational electromagnetics society journal 33 (3),273-278

7. Saxena, P.; Kothari, A.: Linear Antenna Array Optimization Using Flower Pollination Algorithm. Springer, Berlin(2016). 8. Suresh Satapathy and Anima Naik.:Social group optimization (SGO): a new population evolutionary optimization technique. In: Complex

Intell. Syst., (2) 173–203 (2016).

9. Antenna Array Synthesis Using Social Group Optimization VS Chakravarthy, PSR Chowdary, SC Satpathy, SK Terlapu, J Anguera Microelectronics, Electromagnetics and Telecommunications,895-905.

52-56

13.

Authors: Suvarna Sharma, Amit Bhagat

Paper Title: Automation of Manual Seed URLs Cull Approach for Web Crawlers

Abstract: Web mining has become a more emerging topic these days and is speedily increasing with the

growth of data on web. It is playing an essential role in our life as it helps us providing quicker information by

using new trends and technologies to improve. Hyperlink structure analysis and web crawling provide scope for

more advanced research topics. If a system coverers various most relevant web pages in search engine

57-63

Page 11: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

environment, then it can improve the result of search engine. This URL’s set may be useful for extracting more

relevant information or improving on existing and may also be useful to manage crawling infrastructure to offer

quicker responses. Today, web crawling is an emerging issue in search engine which considers search quality,

accessing pages at various servers to extract features. In the current scenario, the user may only be interested in the

best result with some specific constraints. The constraint may define to the domain of search or importance of

relevant pages. Here, we consider important or useful pages for particular user in searching environment. We

proposed a framework, namely BUDG (Base URL’s Set for Directed Graph) which deals with URL’s hyperlink

structure and generates a min set of ‘K’ URLs and then discover the covered graph for directed graph.

Experimental results show that the proposed framework is working properly for different domain.

Keywords: Information Retrieval, Seed URLs, Web crawler, Web graph analysis, Web Mining.

References: 1. S. Brin, and L. Page , “The anatomy of a large-scale hypertextual web

2. search engine,” Computer networks and ISDN systems, vol. 30, no. 1,pp.107-117,Apr. 1998.

3. S. Sharma, A. Bhagat, “Research on Ranking Algorithms in Web Structure Mining,” International Journal of Knowledge Based Computer Systems, vol. 3, no. 2, pp.13-20, Dec. 2015.

4. S. Mirtaheri, M. E. Dincturk, S. Hooshmand, G. Bochmann and G.-V. Jourdan, “A Brief History of Web Crawlers,” Proc. of the 2013 Conf.

of the Center for Advanced Studies on Collaborative Research. IBM Corp, pp.40-54, Nov. 2013. 5. C. Olston and M. Najork, “Web crawling,” Foundations and Trends in Information Retrieval, vol. 4,no. 3, pp.175-246, Feb. 2010.

6. S. Zheng, P. Dmitriev, and C. Giles, “Graph based crawler seed selection,” In Proc. of the 18th ACM international Conf. on Information

and knowledge management, ACM, pp.1089-1090, Nov. 2009. 7. P. Dmitriev, “Host-based seed selection algorithm for web crawlers,” US Patent App. 12/259,164, Oct. 2008.

8. P. N. Priyatam, A. Dubey, K. Perumal, S. Praneeth, D. Kakadia, and V. Varma, “Seed Selection for Domain-Specific Search,” In Proc. of the 23rd International Conf. on World Wide Web, ACM, pp.923-928, April 2014.

9. Y. J. Du, Y. F. Hai, C. Z. Xie, and X. M. Wang, “An approach for selecting seed URLs of focused crawler based on user-interest ontology,”

Applied Soft Computing , (Elsevier) , vol.14, pp.663–676, Jan. 2014. 10. Weisstein and W. E., “Website of the Simple Directed Graph – from Wolfram Math world,” 1996

11. J. M. Kleinberg, “Authoritative sources in a hyperlinked environment,” Journal of the ACM, vol.46,no.5, pp.604-632, Sep. 1999.

12. TORONTO.EDU, “Website of the Datasets for Experiments on Link Analysis Ranking Algorithms,” http://www.cs.toronto.edu/tsap/experiments/datasets/index.html, 1986

14.

Authors: Pranta Sutradhar, Pritam Maity, Sayan Kar, Sourav Poddar

Paper Title: Modelling and Optimization of PSA (Pressure Swing Adsorption) Unit by using Aspen Plus® and

Design Expert ®

Abstract: Pressure swing adsorption (PSA) is a well-established technique for separation of components from

air, which is commonly known as Air Separation Unit (ASU), drying of gas and nitrogen and hydrogen

purification separation and etc. In PSA processes, the most important is adsorbent material depending upon its

properties. Generally, ASU is difficult to operate due to high degree of energy integration into itself. This research

article represents the separation of nitrogen from air. As separation of nitrogen is a very important in the field of

chemical engineering as it has wide applications in the various process industries. There are various techniques for

separation of nitrogen, amongst them the most common are reverse stirling cycle, LINDE-HAMPSON cycle, Joule

Thompson effect and etc. This article mainly focusses on the separation of nitrogen using PSA unit only. The

whole process was simulated using Aspen Plus ® and the simulated results were then optimized using Design

Expert ®. Various flowrates ranging from 50 kg/h to 200 kg/h were selected, depending upon the process

conditions. The output of the simulated results from Aspen Plus ® were then optimized using Box Behnken

method, in order to obtain the optimized flowrate of Nitrogen. The response pattern suggest that the flowrates of

nitrogen and other gases follows quadratic equation. The significance of the coefficients of the equation and the

adequacy of the fit were determined using Student-t test and Fischer F-test respectively. The final flowrates

obtained are interchanged in order to obtain the maximum conditions, except for nitrogen production other

production rates remain the same.

Keywords: Nitrogen, PSA (pressure swing Adsorption), Aspen Plus®, Design Expert®.

References: 1. Ming-Lung Li, Hao-Yeh Lee, Ming-Wei Lee and I-lung Chien,“ Simulation and Formula Regressionof an Air Separation Unit in China

Steel Corporation“ , ADCONP, 2014, pp. 213-218.

2. D.R.Vinson,“ Air separation control technology“, Computers and Chemical Engineering, 30, 2006, pp. 1436-1446 3. S.Ivanova, R. Lewis,“ Producing Nitrogen via Pressure swing Adsorption“, Chemical Engineering Progress,108(6), 2012, pp. 38 -42..

4. Z. Xu, J. Zhao, X. Chen, Z. Shao, J. Qian, L. Zhu, Z. Zhou, H. Qin,“ Automatic load change system of cryogenic air separation process“,

Separation and Purification Technology, 81, 2011, pp. 451-465. 5. Aspen Plus Tutorial #1: Aspen Basic. Available: https://www.aspentech.com

6. Aspen PlusTutorial #2: Thermodynamic Method. Available: https://www.aspentech.com

7. Stoecker W.F., “Design of Thermal stress”, Toronto, Tata McGraw Hill, 1986. 8. Aspen Tech, Aspen Physical Property System 11.1. Aspen Technology, Inc ,Cambridge, MA, USA, 2001, Available:

https://www.aspentech.com

9. http://www.statease.com/training.html (Stat-Ease Webinars) 10. Marcos Almeida Bezerra, Ricardo Erthal Santelli, Eliane Padua Oliveira, Leonardo SilveiraVillar, Luciane Amélia Escaleira, “Response

surface methodology (RSM) as a tool for optimization in analytical chemistry“, Talanta, 75(5), 2008, pp. 965 -977.

11. http://www.weibull.com/hotwire/issue130/hottopics130.htm (Box-Behnken Designs for optimizing Product Performance Designs for optimizing Product Performance)

12. Box, G. and Behnken, D., “Some New Three. Level Designs for the Study of Quantitative. Variables“, Technometrics, 2, 1960, pp. 455 – 475.

13. http://www.weibull.com/hotwire/issue130/hottopics130.htm (Box-Behnken Designs for optimizing Product Performance)

14. Chatterjee, S., B. Price, Regression Analysis by Example. 2nd Edition, John Wiley & Sons, New York, 1991, xvii, 278 pp., ISBN:

0‐471‐88479‐0, Available: https://onlinelibrary.wiley.com

64-69

Page 12: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

15. W.F. Castle, “Air separation and liquefaction: recent developments and prospects for the beginning of the new millennium”,

International Journal of Refrigeration, 25, 2002, pp. 158-172.

16. Randall F. Barron, Cryogenic systems, 2nd edition, Oxford University Press, 1985, ISBN-13: 978-0195035674, Available: https://www.amazon.com.

15.

Authors: N. Phani Madhuri, A. Meghana, PVRD. Prasada Rao, P.Prem Kumar

Paper Title: Ailment Prognosis and Propose Antidote for Skin using Deep Learning

Abstract: Nowadays The disease prediction by the using the machine learning has become very common.

With the end goal to accomplish a compelling method to distinguish skin disease at a beginning period without

playing out any pointless skin biopsies, advanced pictures of melanoma skin injuries have been explored. In this

paper, distinctive computerized pictures have been investigated dependent on unsupervised division strategies.

feature extraction systems are then connected on these portioned pictures. After this, a complete dialog has been

investigated dependent on the outcomes. Melanoma spreads through metastasis, and along these lines it has been

turned out to be exceptionally deadly. Feature that excess prologue to radiations from the sun dynamically

disintegrate melanin in the skin. Likewise, such radiations invade into the skin thusly pulverizing the melanocyte

cells. Melanomas are uneven and have sporadic edges, indented edges, and shading assortments, so examining the

shape, shading, and surface of the skin sore is basic for melanoma early acknowledgment. In this work, the

fragments of an advantageous steady non-invasive skin sore examination structure to help the melanoma

abhorrence and early disclosure are proposed. The initial segment is a constant caution to help customers with

anticipating skin duplicate caused by sunshine; a novel condition to enroll the perfect open door for skin to

duplicate is along these lines introduced. The second part is an automated picture examination including picture

obtainment, hair area and dismissal, damage division, feature extraction, and plan. The framework has been

created in a propelled application in Matlab. The preliminary outcomes show that the proposed structure is

compelling, achieving high plan correctness

Keywords: Melanoma, Skin Biopsies, Non-Invasive, Unsupervised Division Strategies, Sporadic Fringes.

References: 1. S. Suer, S. Kockara, and M. Mete, ``An improved border detection in dermoscopy images for density-based clustering,''BMC

Bioinformat., vol. 12, no. 10, p. S12, 2011.

2. M. Rademaker and A. Oakley, ``Digital monitoring by whole body photography and sequential digital dermoscopy detect thinner melanomas,'‘ J. Primary Health Care, vol. 2, no. 4, pp. 268272, 2010.

3. O. Abuzaghleh, B. D. Barkana, and M. Faezipour, ``SKINcure: A real-time image analysis system to aid in the malignant melanoma

prevention and early detection,'' in Proc. IEEE Southwest Symp. Image Anal. Interpretation (SSIAI), Apr. 2014, pp. 8588. 4. O. Abuzaghleh, B. D. Barkana, and M. Faezipour, ``Automated skin lesion analysis based on color and shape geometry feature set for

melanoma early detection and prevention,'' inProc. IEEE Long Island Syst., Appl. Technol. Conf. (LISAT), May 2014, pp. 16. 5. (Mar. 27, 2014). American Cancer Society, Cancer Facts & Figures. [Online]. Available:

http://www.cancer.org/research/cancerfactsstatistics/ cancerfactsgures2014/index

70-74

16.

Authors: Sabjan S.N, Maheshwar Pratap

Paper Title: The Implementation of TPM on Manufacturing Performance at FMCG Company

Abstract: The focus of this paper is to enlighten the commitments of Quality Maintenance Pillar of TPM in

increasing the product quality in a FMCG industry involved in the manufacturing of HDPE bottles and coconut oil.

QM pillar is a critical activity of the TPM approach which expects to delight the customer through zero defect

manufacturing. TPM that is effectively implemented increases the production efficiency with an ultimate aim of

achieving zero losses, zero breakdown and zero defects. The main aim of QM pillar is to eliminate the non-

conformances in a methodical way and maintain the equipment for high quality products. Activities involved with

QM pillar was able to decrease the customer complaints and regulatory complaints to zero. The targets put forward

by the QM pillar was effectively achieved by the industry, the targets included maintaining the customer

complaints at zero, reduce the in process defects by 50% and increase the production of Total value of goods worth

50 lakhs to one crore worth SKU.

Keywords: TPM, Quality Maintanance pillar

References: 1. Cua, K. O., McKone, K. E., & Schroeder, R. G. (2001). Relationships between implementation of TQM, JIT, and TPM and manufacturing

performance. Journal of operations management, 19(6), 675-694. 2. McKone, K. E., Schroeder, R. G., & Cua, K. O. (2001). The impact of total productive maintenance practices on manufacturing

performance. Journal of operations management, 19(1), 39-58.

3. Ahuja, I. P. S., & Khamba, J. S. (2008). An evaluation of TPM initiatives in Indian industry for enhanced manufacturing performance. International Journal of Quality & Reliability Management, 25(2), 147-172.

4. Ahuja, I. P. S., & Khamba, J. S. (2007). An evaluation of TPM implementation initiatives in an Indian manufacturing enterprise. Journal

of quality in maintenance engineering, 13(4), 338-352. 5. Ahuja, I. P. S., & Khamba, J. S. (2008). Strategies and success factors for overcoming challenges in TPM implementation in Indian

manufacturing industry. Journal of Quality in Maintenance Engineering, 14(2), 123-147.

6. Chan, F. T. S., Lau, H. C. W., Ip, R. W. L., Chan, H. K., & Kong, S. (2005). Implementation of total productive maintenance: A case study. International journal of production economics, 95(1), 71-94.

7. Tangen, S. (2003). An overview of frequently used performance measures. Work study, 52(7), 347-354.

8. Brah, S. A., & Chong, W. K. (2004). Relationship between total productive maintenance and performance. International Journal of Production Research, 42(12), 2383-2401.

9. Blanchard, B. S. (1997). An enhanced approach for implementing total productive maintenance in the manufacturing environment. Journal

of quality in Maintenance Engineering, 3(2), 69-80. 10. Seth, D., & Tripathi, D. (2006). A critical study of TQM and TPM approaches on business performance of Indian manufacturing

industry. Total Quality Management & Business Excellence, 17(7), 811-824.

75-87

Page 13: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

11. Eti, M. C., Ogaji, S. O. T., & Probert, S. D. (2004). Implementing total productive maintenance in Nigerian manufacturing

industries. Applied energy, 79(4), 385-401.

12. McKone, K. E., Schroeder, R. G., & Cua, K. O. (1999). Total productive maintenance: a contextual view. Journal of operations management, 17(2), 123-144.

17.

Authors: Riktesh Srivastava, Mohd. Abu Faiz

Paper Title: Reviews Analysis of Online Retail Stores in UAE: Analytical Study of Sentiments Through Social Media

Abstract: Text mining for social media has now become decisive tool for marketing, and many businesses

understand the supremacy of embracing technology into their marketing campaigns. These texts are the

“Consumer language”, owing to its spread and reach. There is no reservation that use of user generated texts has

stimulated the companies to identify them and use it for decision making, however, classifying sentiment analysis

through these texts is still a fresh sensation. Online retail companies in UAE are an early adopter of social media,

but how do they use text mining techniques is still a matter to wary upon. The study proposes a model to collect

reviews from multiple sources and identify sentiments and topics simultaneously. The model is the tested on 3

online retail companies in UAE and the results depicts productive outcomes.

Keywords: Sentiment Analysis, Liu Hu algorithm, Plutchik modeling, Latent Semantic Indexing.

References: 1. J. Marshall, “Companies Increasingly Trademark Hashtags,” Wall Street Journal, 30-Mar-2016. 2. W. G. Mangold and D. J. Faulds, “Social media: The new hybrid element of the promotion mix,” Bus. Horiz., vol. 52, no. 4, pp. 357–365,

Jul. 2009.

3. Read, “How to Increase Your Reach on Any Social Network,” 2015. [Online]. Available: https://blog.bufferapp.com/increase-reach. [Accessed: 10-Nov-2018].

4. J. Marshall, “Companies Increasingly Trademark Hashtags,” Wall Street Journal, 30-Mar-2016.

5. N. Patel, “How to Use Hashtags to Increase Your Online Presence,” 2014. [Online]. Available: https://www.quicksprout.com/2014/04/04/how-to-use-hashtags-to-increase-your-online-presence/. [Accessed: 10-Nov-2018].

6. Z. Yuzdepski, “Goodbye Stars, Hello Facebook Business Recommendations,” Vendasta Blog, 2018.

7. J. Jansen, M. Zhang, K. Sobel, and A. Chowdury, “Micro-blogging as online word of mouth branding,” in Proceedings of the 27th international conference extended abstracts on Human factors in computing systems - CHI EA ’09, Boston, MA, USA, 2009, p. 3859.

8. Y.-M. Li, C.-Y. Lai, and C.-W. Chen, “Identifying Bloggers with Marketing Influence in the Blogosphere,” in Proceedings of the 11th

International Conference on Electronic Commerce, New York, NY, USA, 2009, pp. 335–340. 9. L. Kolowich, “22 Customer Review Sites for Collecting Business & Product Reviews,” 2018. [Online]. Available:

https://blog.hubspot.com/service/customer-review-sites. [Accessed: 10-Nov-2018].

10. M. Hu and B. Liu, “Mining and Summarizing Customer Reviews,” in Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, New York, NY, USA, 2004, pp. 168–177.

11. N. Hu, I. Bose, N. S. Koh, and L. Liu, “Manipulation of online reviews: An analysis of ratings, readability, and sentiments,” Decis.

Support Syst., vol. 52, no. 3, pp. 674–684, Feb. 2012. 12. X. Hu, L. Tang, J. Tang, and H. Liu, “Exploiting Social Relations for Sentiment Analysis in Microblogging,” in Proceedings of the Sixth

ACM International Conference on Web Search and Data Mining, New York, NY, USA, 2013, pp. 537–546.

13. W. Ding, S. Yu, S. Yu, W. Wei, and Q. Wang, “LRLW-LSI: An Improved Latent Semantic Indexing (LSI) Text Classifier,” in Rough Sets and Knowledge Technology, 2008, pp. 483–490.

14. R. Ortega Bueno, A. Fonseca Bruzón, C. Muñiz Cuza, Y. Gutiérrez, and A. Montoyo, “UO_UA: Using Latent Semantic Analysis to Build

a Domain-Dependent Sentiment Resource,” in Proceedings of the 8th International Workshop on Semantic Evaluation (SemEval 2014), Dublin, Ireland, 2014, pp. 773–778.

15. Chiru, T. Rebedea, and S. Ciotec, “Comparison between LSA-LDA-Lexical Chains,” in WEBIST-2014, 2014, p. 8.

16. Haddi, X. Liu, and Y. Shi, “The Role of Text Pre-processing in Sentiment Analysis,” Procedia Comput. Sci., vol. 17, pp. 26–32, 2013. 17. K. Kenyon-Dean et al., “Sentiment Analysis: It’s Complicated!,” in Proceedings of the 2018 Conference of the North American Chapter

of the Association for Computational Linguistics: Human Language Technologies, Volume 1 (Long Papers), New Orleans, Louisiana,

2018, pp. 1886–1895. 18. Krouska, C. Troussas, and M. Virvou, “The effect of preprocessing techniques on Twitter sentiment analysis,” in 2016 7th International

Conference on Information, Intelligence, Systems Applications (IISA), 2016, pp. 1–5.

19. S. Guha, A. Joshi, and V. Varma, “Sentibase: Sentiment Analysis in Twitter on a Budget,” in Proceedings of the 9th International Workshop on Semantic Evaluation (SemEval 2015), Denver, Colorado, 2015, pp. 590–594.

20. R. Srivastava, “3 years - 3 moves Government verdicts to renovate Customary Bharat to Contemporary India: Evaluation of opinions from

citizens,” Int. J. Bus. Data Anal., vol. 1, no. 1, 2018. 21. B. Dickinson, M. Ganger, and W. Hu, “Dimensionality Reduction of Distributed Vector Word Representations and Emoticon Stemming

for Sentiment Analysis,” J. Data Anal. Inf. Process., vol. 03, p. 153, Nov. 2015.

22. S. M. Arif and M. Mustapha, “The Effect of Noise Elimination and Stemming in Sentiment Analysis for Malay Documents,” in Proceedings of the International Conference on Computing, Mathematics and Statistics (iCMS 2015), 2017, pp. 93–102.

23. C. Manning, P. Raghavan, and H. Schuetze, Introduction to Information Retrieval, 1st ed. England: Cambridge University Press, 2009.

24. Dempsey, “Porter2 Stemmer Documentation,” 2016. 25. Y. Lin, J. Zhang, X. Wang, and A. Zhou, “An Information Theoretic Approach to Sentiment Polarity Classification,” in Proceedings of

the 2Nd Joint WICOW/AIRWeb Workshop on Web Quality, New York, NY, USA, 2012, pp. 35–40. 26. R. Plutchik, “A psychoevolutionary theory of emotions,” Soc. Sci. Inf., vol. 21, no. 4–5, pp. 529–553, Jul. 1982.

27. R. Plutchik, “The Nature of Emotions: Clinical Implications,” in Emotions and Psychopathology, Springer, Boston, MA, 1988, pp. 1–20.

28. R. Srivastava and J. S. Rathore, “Content Analysis Concerning Online Shopping in UAE: Evaluation of Impact Score from News | International Journal of Business Analytics and Intelligence-Volume 6 Issue 1,” Int. J. Bus. Anal. Intell., vol. 6, no. 1, pp. 9–13, 2018.

88-92

18.

Authors: D. Rajesh, T. Jaya

Paper Title: Exploration on Cluster Related Energy Proficient Routing in Mobile Wireless Sensor Network

Abstract: Mobile Wireless Sensor Network is a encompassing of spatially conveyed self declaration frames

works with a correspondence for examining and recording circumstances at conflicting areas. Mobility based

wireless sensor network includes thousands of mobile sensor nodes in the heterogeneous network, wherever each

sensor nodes is associated with sensor node head. Mobility based wireless sensor network is arising and appealing

exploration region in which a few applications, for example, human services, agribusiness, and military are making

utilization of it. Energy proficiency is a standout amongst the most critical problem in mobility based wireless

sensor network. Clustering authorize high accessibility, overhead and parallel processing. A tactic is used in

93-97

Page 14: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

heterogeneous moveable sensor network is clustering to reduce the energy exploitation and boosts the duration of

network. Clustering approach weaken mobility stream, restrict energy exploitation, develop remaining energy and

increase the duration of the heterogeneous sensor network mobile sensor network. This article assimilates

exploration of unusual energy productive clustering protocols in mobility based wireless sensor network.

Keywords: Mobile Wireless Sensor Network MWSN, clustering, Cluster-Head, Energy Effectiveness,

Information gathering, Security.

References: 1. Vishal Singh, 2016, “A Survey of Energy-Efficient-Clustering Algorithms in Wireless Sensor Networks”, International Journal of

Engineering and Computer Science. 2. M.Sheik Dawood et al, 2015, “A Survey on Energy-Efficient-Clustering Protocols for Wireless Sensor Networks,” International Journal

of Computer Science and Mobile Computing.

3. Vinay Kumar, Sanjeey Jain and Sudarshan Tiwari, “Energy-Efficient-Clustering Algorithms in Wireless Sensor Networks: Survey, 2011,” IJCSI International Journal of Computer Science, Vol. 8, No 2, pg. 259-268.

4. Firoj Ahamad, Rakesh Kumar, 2015 “Energy-Efficient-Routing Protocols for Wireless Sensor Networks: A Review,” International

Journal of Innovations & Advancement in Computer Science, Vol. 4, pg. 165-171. 5. Swati Shamkumar, Vimal Shukla, 2014, “A Review on Energy-Efficient Routing Protocols in Wireless Sensor Networks,” International

Journal of Emerging Technology and Advanced Engineering, Vol. 4, Pg. 653-657.

6. Sissy Annamma Johnson, Josmy George, 2016 , “A Survey on Different Types of Clustering-Based-Routing Protocols in Wireless Sensor Networks,” Journal of Research, Vol. 2, pg. 13-16.

7. Santal Pal Singh, S.C. Sharma, 2015, “A Survey on Cluster-Based Routing-Protocols in Wireless Sensor Networks,” International

Confrence in Advanced Computing Technologies and Applications, pg. 687- 695. 8. Sanjeev Kumar Gupta, Neeraj Jain, Poonam Sinha, 2013, “Clustering Protocols in Wireless Sensor Networks: A Survey”, International

Journal of Applied Information, Vol. 5, No-2, pg. 41-50. 9. Xu-Xun Liu, 2012,“A Survey on Clustering-Routing Protocols in Wireless Sensor Networks”, School of Electronic and Information

Engineering, ISSN 1424-8220.

10. Kunkunuru Udayakumar et al, 2015, “Analysis of Various Clustering-Algorithms in Wireless Sensor Networks”, International Journal of Computer Science and Information Technologies.

11. Vandna Sharma, Payal Jain, 2013, “Various Hierarchical-Routing Protocols in Wireless Sensor Network: A Survey,” IJCSMC, Vol. 2,

Issue.5, pg. 63-72. 12. R.U. Anitha P. Kamalakkannan, 2013,“EEDBC-M: Enhancement of Leach-Mobile protocol with Energy-Efficient Density-based

Clustering for Mobile Sensor Networks (MSNs)”, International Journal of Computer Applications (0975 – 8887), Volume 74– No.14.

13. Punret Gurbani, Hansa Acharya, Anurag Jain, 2016, “Hierarchical-Cluster Based Energy- Efficient Routing-Protocol for Wireless Sensor Networks: A Survey”, International Journal of Computer Science and Information Technologies, Vol.7(2), pg.682-687.

14. Sangeeta Badiger, Mohan B A, 2015, “Secure and Energy-Efficient Clustering-Scheme (SAEECS) With Data-Aggregation in Mobile

Wireless Sensor Networks”, International Research Journal of Engineering and Technology (IRJET), Volume: 02 Issue: 03. 15. Dr. V. Ramesh, 2017, “Energy-Efficient Clustering Scheme (EECS) With Secure Data Aggregation for Mobile Wireless Sensor

Networks”, International Journal of Electrical Electronics & Computer Science Engineering, Volume 4, Issue 5

16. Awatef Benfradj Guiloufi, Nejeh Nasri, Abdennaceur Kachouri, 2014, “Energy-Efficient Clustering Algorithms for Fixed and Mobile Wireless Sensor Networks”, IEEE.

17. ChanglinMa, Nian Liu, and Yuan Ruan, 2013, “A Dynamic and Energy-Efficient Clustering Algorithm in Large-Scale Mobile Sensor

Networks”, International Journal of Distributed Sensor Networks. 18. Muhammad Arshad, Mohamad Y. Aalsalem, Farhan A. Siddiqui, 2014, “Energy-Efficient Cluster Head Selection In Mobile Wireless

Sensor Networks”, Journal of Engineering Science and Technology.

19. Rajesh. D, M. Firoja Banu, D. Stella, Ansila. P. Grace, 2016 “Ch Panel Based Routing Scheme for Mobile Wireless Sensor Network”, International Journal of MC Square Scientific Research, Vol.8, No.1.

19.

Authors: Malan D. Sale, V. Chandra Prakash

Paper Title: Dynamic Dispatching of Elevators in Elevator Group Control System: Research and Survey

Abstract: With an increase in the population and demand for elevators in high-rise buildings, there is a need for

installing more number of elevators to transport passengers efficiently. In tall buildings, Elevator Group Control

System (EGCS) is the system for managing vertical transportation facility. The paper presents a survey of different

techniques used to schedule and dispatch elevators in EGCS. The research study focuses on the dynamic

scheduling of elevators for all up and down landing calls that aims to overcome the limitations and weaknesses of

the existing works. The main aim of the research work is to reduce the waiting time of passengers for a car call on

a specific floor and save power consumption of the elevators or lifts. Fuzzy algorithms, neural network algorithms,

and genetic algorithms are the primary methods used to dispatch elevators in the control system. The study

compares experimental results generated by various methods.

Keywords: EGCS, Elevators, up-peak traffic, down-peak traffic

References: 1. Fernandez, J., et al., "Dynamic Fuzzy Logic Elevator Group Control System with Relative Waiting Time Consideration," Industrial

Electronics, IEEE Transactions on 61.9 2014: 4912-4919.

2. Fu, Lijun, and Tiegang Hao., "Analysis and simulation of passenger flow model of elevator group control system," Fuzzy F Systems S and Knowledge K Discovery D, 2012 9th International Conference on. IEEE, 2012.

3. Qiu, JianDong, and ZhaoYuan Jiang, "The research and simulation on the elevator group control system EGCS scheduling algorithm,"

Electrical and Control Engineering (ICECE), 2011 International Conference on. IEEE, 2011. 4. Yang, Suying, Jianzhe Tai, and Cheng Shao, "Dynamic partition of elevator group control system with destination floor guidance in up-

peak traffic," journal of computers 4.1 2009: 45-52.

5. Fernández, Joaquín, et al., "Dynamic fuzzy logic (EGCS) elevator group control system for energy optimization," International Journal of Information Technology & Decision Making 12.03 (2013): 591-617.

6. Liting, Cao, Zhang Zhaoli, and Hou Jue, "Dynamic Optimized Dispatching System for Elevator Group Based on Artificial Intelligent

Theory," Electronic Measurement and Instruments, 2007. ICEMI'07. Eighth International Conference on. IEEE 2007.

7. Sun, Jin, Qian-Chuan Zhao, and Peter B. Luh, "Optimization of group elevator scheduling with advance information," Automation

Science and Engineering, IEEE Transactions on 7.2 2010: 352-363.

8. Wang, Donghua, and Baofeng Li., "An Optimization Model of Elevators Group Zoning Dispatching and It’s Application," Cryptography

98-102

Page 15: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

and Network Security, Data Mining and Knowledge Discovery, E-Commerce & Its Applications and Embedded Systems (CDEE), 2010

First ACIS International Symposium on. IEEE 2010.

9. Cortés, Pablo, et al., "Fuzzy logic based controller for peak traffic detection in elevator systems, "Journal of computational and theoretical nanoscience. 9.2 2012: 310-318.

10. Chen, Ta Cheng, et al., "GA Based Hybrid Fuzzy Rule Optimization Approach for Elevator Group Control System," Applied Mechanics

and Materials. Vol. 284. 2013.

11. Cao, Liting, Shiru Zhou, and Shuo Yang, "Elevator Group Dynamic Dispatching System Based on Artificial Intelligent Theory,"

Intelligent Computation Technology and Automation (ICICTA), 2008 International Conference on. Vol. 1. IEEE 2008.

12. Liu, Yaowu, et al., "Energy saving of elevator group control based on optimal zoning strategy with interfloor traffic," Information Management, Innovation Management and Industrial Engineering (ICIII), 2010 International Conference on. Vol. 3. IEEE 2010.

13. Rashid, M. M., et al., "Design of fuzzy based controller for modern elevator group with floor priority constraints," Mechatronics (ICOM),

2011 fourth International Conference On. IEEE 2011. 14. Zhang, Yine, Yun Yi, and Jian Zhong, "The Application of the Fuzzy Neural Network Control in Elevator Intelligent Scheduling

Simulation," Information Science and Engineering (ISISE), 2010 International Symposium on. IEEE 2010.

15. Sorsa, J., Ehtamo, H., Kuusinen, JM., et al.,” Modeling uncertain passenger arrivals in the elevator dispatching problem with destination control,” Optim Lett (2018) 12: 171. https://doi.org/10.1007/s11590-017-1130-0

16. Albert So, et. at.,” Traffic analysis of a three-dimensional elevator system,” building services engineering research and technology,2017

DOI: 10.1177/0143624417710106 17. You Zhou et al. ,“ An Elevator Monitoring System Based On the Internet of Things,” 8th International Congress of Information and

Communication Technology (ICICT-2018) Procedia Computer Science 131 (2018) 541–544

18. Shuo-Yan Chou et al., ”Improving Elevator Dynamic Control Policies Based on Energy and Demand Visibility,” 2018 3rd International Conference on Intelligent Green Building and Smart Grid (IGBSG) 22-25 April 2018

19. Liu, Weipeng, et al.," Dispatching algorithm design for elevator group control system with Q-learning based on a recurrent neural

network," Control and Decision Conference (CCDC), 2013 25th Chinese. IEEE, 2013. 20. Li, Zhonghua, Zongyuan Mao, and Jianping Wu. , "Research on dynamic zoning of elevator traffic based on an artificial immune

algorithm," Control, Automation, Robotics, and Vision Conference, 2004. ICARCV 2004 8th. Vol. 3. IEEE, 2004.

20.

Authors: Manoj Kumar Shukla, Kamal Sharma

Paper Title: Enhanced Dispersion and Tensile Properties of Graphene/CNT Epoxy Composites by Varying the Filler

Ratio

Abstract: In this study a three phase hybrid composite is fabricated comprising of graphene and carbon

nanotube (CNT) nano-fillers reinforced in epoxy resin. The filler contents were maintained 0 and 1 wt. % and the

ratio of graphene and CNT fillers were 1:1, 1:3 and 3:1. Effect of filler ratio on dispersion and tensile properties of

hybrid composite mixture are investigated. Observations of the samples by Dynamic Light Scattering (DLS),

Scanning Electron Microscopy (SEM), and Image Analysis (IA) confirmed formation 3-D hybrid nanostructure.

The best dispersion is observed for graphene: CNT content 1:3 indicating good bonding between both the fillers

and epoxy matrix. The maximum tensile strength of 50.28 MPa and elastic modulus of 2848 MPa is observed for

filler ratio 1:3 (graphene: CNT) which is 57 and 40 % increase as compared with pristine epoxy composite. For

this configuration homogeneous mixture with Poly Dispersity Index (PDI) of 0.513 is investigated for the sample.

The value of PDI is observed to be lowest by both Particle Size Distribution (PSD) analysis methods which make

agreement of results. Analysis of PSD of composite mixture provides a direction for selecting appropriate filler

content and fabrication process.

Keywords: Particle size distribution (PSD), hybrid nano-composite, Image analysis (IA), tensile strength, elastic

modulus.

References: 1. S. K. Srivastava and I. P. Singh, “Hybrid epoxy nanocomposites: lightweight materials for structural applications,” Polym. J., vol. 44,

no. 4, pp. 334–339, 2012.

2. V. Singh, D. Joung, L. Zhai, S. Das, S. I. Khondaker, and S. Seal, “Graphene based materials: Past, present and future,” Prog. Mater. Sci., vol. 56, no. 8, pp. 1178–1271, 2011.

3. S. Chatterjee, F. Nafezarefi, N. H. Tai, L. Schlagenhauf, F. A. Nüesch, and B. T. T. Chu, “Size and synergy effects of nanofiller hybrids

including graphene nanoplatelets and carbon nanotubes in mechanical properties of epoxy composites,” Carbon N. Y., vol. 50, no. 15, pp. 5380–5386, 2012.

4. G. Zhang, F. Wang, J. Dai, and Z. Huang, “Effect of functionalization of graphene nanoplatelets on the mechanical and thermal

properties of silicone rubber composites,” Materials (Basel)., vol. 9, no. 2, p. 92, 2016. 5. P. K. Singh and K. Sharma, “Mechanical and Viscoelastic Properties of In-situ Amine Functionalized Multiple Layer Grpahene / epoxy

Nanocomposites,” pp. 1–11, 2018.

6. Y. J. Wan et al., “Grafting of epoxy chains onto graphene oxide for epoxy composites with improved mechanical and thermal properties,” Carbon N. Y., vol. 69, no. November, pp. 467–480, 2014.

7. J. Li, P. S. Wong, and J. K. Kim, “Hybrid nanocomposites containing carbon nanotubes and graphite nanoplatelets,” Mater. Sci. Eng. A,

vol. 483–484, no. 1–2 C, pp. 660–663, 2008. 8. R. Pecora, “Dynamic light scattering measurements of nanometer particles in liquids,” J. Nan. Part. Res., vol. 2, pp. 123–131, 2000.

9. F. Ross Hallett, “Particle size analysis by dynamic light scattering,” Food Res. Int., vol. 27, no. 2, pp. 195–198, 1994.

10. G. A. Yakaboylu and E. M. Sabolsky, “Determination of a homogeneity factor for composite materials by a microstructural image analysis method,” vol. 00, no. 0, pp. 1–10, 2017.

11. A. Braun and V. Kestens, “RESEARCH PAPER A new certified reference material for size analysis of nanoparticles,” 2012.

12. J. A. V. Gonçalves, D. A. T. Campos, G. de J. Oliveira, M. de L. da S. Rosa, and M. A. Macêdo, “Mechanical properties of epoxy resin based on granite stone powder from the Sergipe fold-and-thrust belt composites,” Mater. Res., vol. 17, no. 4, pp. 878–887, 2014.

13. H. Nolte, C. Schilde, and A. Kwade, “Determination of particle size distributions and the degree of dispersion in nanocomposites,”

Compos. Sci. Technol., vol. 72, no. 9, pp. 948–958, 2012. 14. B. Krause, M. Mende, P. Pötschke, and G. Petzold, “Dispersability and particle size distribution of CNTs in an aqueous surfactant

dispersion as a function of ultrasonic treatment time,” Carbon N. Y., vol. 48, no. 10, pp. 2746–2754, 2010.

15. C. A. Schneider, W. S. Rasband, and K. W. Eliceiri, “NIH Image to ImageJ: 25 years of image analysis,” Nat. Methods, vol. 9, no. 7, pp. 671–675, 2012.

103-107

21.

Authors: Manoj Kumar Shukla, Kamal Sharma

Paper Title: Microstructure and Elemental Investigation of Graphene/ CNT Epoxy Composite

Page 16: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

Abstract: Epoxy based graphene/ CNT reinforced hybrid composite was prepared using sonication method

with equal ratio of nano-fillers at weight percent of 0 and 0.25 wt. % are fabricated. In the present work, the

influence of graphene/ CNT substitution on the microstructure and element distribution on hybrid epoxy composite

is reported. The composite was characterized for their morphological properties by Scanning Electron Microscopy

(SEM). The distribution of elements and elemental composition was also evaluated using Energy Dispersive X-

Ray Spectroscopy (EDX). The reaction progress and compositions of elements were analyzed as a function of

microstructure. The presence of functionalized filler and formation of copolymerization of polymer was

confirming with the help of the EDX spectra of the hybrid composite. Hybrid composite confirmed the presence of

Carbon, Chlorine, Silicon and other elements. Variation in the ratio of elements present in pristine and hybrid

epoxy composite confirms the occurrence of chemical reaction during processing of composite sample. SEM-EDX

analysis show better adhesion in hybrid composite as compared to pristine composite. The detailed results will be

presented and discussed.

Keywords: Graphene, CNT, epoxy, hybrid composite, EDX, SEM.

References: 1. R. Atif and F. Inam, “Influence of Macro-Topography on Damage Tolerance and Fracture Toughness of Monolithic Epoxy for

Tribological Applications,” World J. Eng. Technol., no. May, pp. 335–360, 2016.

2. Z. Anwar, A. Kausar, I. Rafique, and B. Muhammad, “Advances in Epoxy/Graphene Nanoplatelet Composite with Enhanced Physical

Properties: A Review,” Polym. Plast. Technol. Eng., vol. 2559, no. January, p. 03602559.2015.1098695, 2015. 3. A. K. Geim and K. S. Novoselov, “The rise of graphene.,” Nat. Mater., vol. 6, no. 3, pp. 183–91, 2007.

4. H. Nolte, C. Schilde, and A. Kwade, “Determination of particle size distributions and the degree of dispersion in nanocomposites,”

Compos. Sci. Technol., vol. 72, no. 9, pp. 948–958, 2012. 5. S. Chatterjee, F. Nafezarefi, N. H. Tai, L. Schlagenhauf, F. A. Nüesch, and B. T. T. Chu, “Size and synergy effects of nanofiller hybrids

including graphene nanoplatelets and carbon nanotubes in mechanical properties of epoxy composites,” Carbon N. Y., vol. 50, no. 15, pp.

5380–5386, 2012. 6. U. Szeluga, B. Kumanek, and B. Trzebicka, “Synergy in hybrid polymer/nanocarbon composites. A review,” Compos. Part A Appl. Sci.

Manuf., vol. 73, pp. 204–231, 2015.

7. J. Wang et al., “Graphene and Carbon Nanotube Polymer Composites for Laser Protection,” J. Inorg. Organomet. Polym. Mater., vol. 21, no. 4, pp. 736–746, 2011.

8. Z. A. Ghaleb, M. Mariatti, and Z. M. Ariff, “Synergy effects of graphene and multiwalled carbon nanotubes hybrid system on properties

of epoxy nanocomposites,” J. Reinf. Plast. Compos., vol. 0(0) 1–11, 2017. 9. P. J. Lu et al., “Methodology for sample preparation and size measurement of commercial ZnO nanoparticles,” J. Food Drug Anal., vol.

26, no. 2, pp. 628–636, 2018.

10. C. Zhao, “Enhanced strength in reduced graphene oxide/nickel composites prepared by molecular-level mixing for structural applications,” Appl. Phys. A Mater. Sci. Process., vol. 118, no. 2, pp. 409–416, 2014.

11. C. C. C.S. Sipaut, N. Ahmed, R.Adnan, I. Rahman, MA Bakar, J Ismail, “2007 Properties and Morphology of Bulk Epoxy Composite

filled with modified fumed silica-epoxy nanocomposite,” J. Appl. Sci., vol. 7, no. (1), pp. 27–34, 2007.

108-111

22.

Authors: Poornaiah Billa, Anandbabu Gopatoti

Paper Title: 3D MR Images Denoising using Adaptive Blockwise Approached Non-Local Means (ABNLM) Filter for

Spatially Varying Noise Levels

Abstract: The uniform noise distribution over the image is assumed in most of the filtering techniques. The

resulting filtering technique becomes problematic when noise not uniformly distributed. Magnetic Resonance

images with spatially varying noise levels were produced by Sensitivity-encoded, intensity inhomogeneity and

surface coil based acquisition techniques. To adapt these spatial variations in noise levels, we propose a new

Adaptive Blockwise approached NL-Means Filter where denoising capability of filter is adjusted based on the

local image noise level. Image Noise levels are spontaneously acquired from the MR images using a proposed new

adaptive technique. To reduce the computational burden of NLM Filter, an Adaptive Blockwise Non-Local Means

Filter is proposed to speed up the denoising process. With adaptive soft wavelet coefficient mixing, a

multiresolution framework is adapted to ABNLM filter for denoising of 3-Dimensional MR images. The proposed

Multiresolution filter adapts the filtering parameters automatically based on image space-frequency resolution. The

outcome of the stated multiresolution Adaptive Blockwise Non-Local Means Filter shows better performance in

considering the non uniform noise when compared to Rician NL-means filters where the noise parameters has to

be specified initially.

Keywords: Non-Local Mean Filter, Blockwise approach, Magnetic Resonance (MR) Image, Wavelet Transform

and denoising.

References: 1. G. Gerig, R. Kikinis, O. K¨ubler, and F. Jolesz, “Nonlinear anisotropic filtering of MRI data,” IEEE Transactions on Medical Imaging,

vol. 11, pp. 221–232, June 1992.

2. R. Nowak, “Wavelet-based rician noise removal for magnetic resonance imaging,” IEEE Transactions on Image Processing, vol. 8,pp.

1408–1419, October 1999.

3. Pizurica, W. Philips, I. Lemahieu, and M. Acheroy, “A versatile wavelet domain noise filtration technique for medical imaging,” IEEE

Trans. Medical Imaging, vol. 22, pp. 323–331, 2003.

4. M. E. Alexander, R. Baumgartner, A. R. Summers, C. Windischberger, M. Klarhoefer, E. Moser, and R. L. Somorjai, “A wavelet-based

method for improving signal-to-noise ratio and contrast in MR images.,” Magn Reson Imaging, vol. 18, pp. 169–180, February 2000.

5. S. Aja-Fernandez, M. Niethammer, M. Kubicki, M. E. Shenton, and C. F. Westin, “Restoration of dwi data using a rician lmmse

estimator,” Medical Imaging, IEEE Transactions on, vol. 27, no. 10, pp. 1389–1403, 2008.

6. P. Coup´e, P. Yger, S. Prima, P. Hellier, C. Kervrann, and C. Barillot, “An Optimized Blockwise NonLocal Means Denoising Filter for

3-D Magnetic Resonance Images,” IEEE Transactions on Medical Imaging, vol. 27, pp. 425–441, April 2008.

7. P. Coup´e, P. Hellier, S. Prima, C. Kervrann, and C. Barillot, “3D wavelet subbands mixing for image denoising,” Journal of Biomedical

Imaging, vol. 2008, no. 3, pp. 1–11, 2008.

8. Buades, B. Coll, and J.-M. Morel, “A review of image denoising algorithms, with a new one,” Multiscale Modeling and Simulation, vol.

112-118

Page 17: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

4, no. 2, pp. 490–530, 2005.

9. Gopatoti, A., Gopathoti, K.K., Shanganthi, S.P., Nirmala, C. “Deep CNN based image denoising under different noise conditions”,

Journal of Advanced Research in Dynamical and Control Systems,10(3) (2018), pp. 1094-1101.

10. Gopatoti, A., Ramadass, N. “Performance of adaptive subband thresholding technique in image denoising”, Journal of Advanced Research

in Dynamical and Control Systems, Vol. 9, No. 12, (2017), pp.151-157.

11. Pruessmann KP, Weiger M, Scheidegger MB, Boesiger P. SENSE:sensitivity encoding for fast MRI. Magn Reson Med 1999;42: 952–

962.

12. Griswold MA, Jakob PM, Heidemann RM, et al. Generalized autocalibrating partially parallel acquisitions (GRAPPA). Magn Reson Med

2002;47:1202–1210.

13. Gopatoti, A., Naik, M.C., Gopathoti, K.K.” Convolutional Neural Network based image denoising for better quality of images”,

International Journal of Engineering and Technology(UAE), Vol.7, No.3.27, (2018), pp. 356-361.

14. Gopatoti, A., Veeranjaneyulu, G. and Naik, M.C. Impulse Noise Removal in Digital Images by using Image Fusion Technique. Journal of

Advanced Research in Dynamical and Control Systems 10 (6) (2018).

15. Z.Wang, A. Bovik, H. Sheikh, and E. Simoncelli, “Image quality assessment: from error visibility to structural similarity,” Image

Processing, IEEE Transactions on, vol. 13, pp. 600–612, April 2004.

16. Samsonov A, Johnson C. Noise-adaptive nonlinear diffusion filtering of MR images with spatially varying noise levels. Magn Reson Med

2004;52:798–806.

17. Delakis I, Hammad O, Kitney RI. Wavelet-based de-noising algorithm for images acquired with parallel magnetic resonance imaging

(MRI). Phys Med Biol 2007;52:3741–3751.

18. Mahmoudi M, Sapiro G. Fast image and video denoising via nonlocal means of similar neighborhoods. IEEE Signal Process Lett

2005;12:839–842.

19. Kervrann C, Boulanger J, Coupe´ P. Bayesian non-local means filter, image redundancy and adaptive dictionaries for noise removal. In:

Proc Conf Scale-Space and Variational Meth, Ischia, Italy; 2007. p 520–532.

20. Brox T, Kleinschmidt O, Cremers D. Efficient nonlocal means for denoising of textural patterns. IEEE Trans Image Process 2008;

17:1083–1092.

23.

Authors: Bhupesh Kumar Dewangan, Amit Agarwal, Venkatadri M, Ashutosh Pasricha

Paper Title: Sla-Based Autonomic Cloud Resource Management Framework By Antlion Optimization Algorithm

Abstract: Service level agreement SLA is a key to attract the user to opt service from the cloud. The quality of

service QoS and SLA plays vital role towards the trust to use the services of any application/infrastructure. If SLA

violation rate is high then it directly affect to cost and user distraction. In this paper, we have done state-of-art

survey on various SLA-aware resource management frameworks and obtain the different objective function and

the utilization percentage from year 2014 to 2018. The objective of this paper is to propose SLA-based autonomic

resource management technique SMART through antlion optimization algorithm to maximize the resource

utilization based on SLA and QoS satisfaction. The execution time, cost and SLA violation rate, objective

functions computed for this framework and compare with two existing frameworks. The framework is implements

in cloudsim toolkit and the results recorded the utmost performance. The experimental results confirm that cost,

execution time, and resource cost are increasing while SLA violation rate is increasing.

Keywords: Autonomic Computing, Resource Management, SLA Violation Rate, Resource Utilization.

References: 1. Wu L. et al., “SLA-based resource provisioning for hosted software-as-a-service applications in cloud computing environments,” IEEE

Transactions on services computing, vol. 7, no. 3, pp. 465-485, 2014. 2. Kohne A., “Evaluation of SLA-based decision strategies for VM scheduling in cloud data centers,” in 3rd Workshop on CrossCloud

Infrastructures & Platforms, 2016.

3. Antonescu A. F., “Simulation of SLA-based VM-scaling algorithms for cloud-distributed applications,” Future Generation Computer Systems, vol. 54, no. 1, pp. 260-273, 2016.

4. Garg S. K., “SLA-based virtual machine management for heterogeneous workloads in a cloud datacenter,” Journal of Network and

Computer Applications, vol. 45, pp. 108-120, 2014. 5. B. R. Zhao Y., “SLA-based resource scheduling for big data analytics as a service in cloud computing environments,” in 44th

International Conference on Parallel Processing (ICPP), 2015.

6. S. P. Serrano D., “SLA guarantees for cloud services,” Future Generation Computer Systems, vol. 54, no. 1, pp. 233-246, 2016. 7. Singh S., “ STAR: SLA-aware autonomic management of cloud resources,” IEEE Transactions on Cloud Computing, pp. 1-22, 2017.

8. Cai X., “SLA-aware energy-efficient scheduling scheme for Hadoop YARN,” The Journal of Supercomputing, vol. 73, no. 38, pp. 3526-

3546, 2017. 9. Beloglazov A..Washington, DC: U.S. Patent and Trademark Office Patent 9,363,190, 2016.

10. Mosa A., “Optimizing virtual machine placement for energy and SLA in clouds using utility functions,” Journal of Cloud Computing, vol.

5, no. 1, pp. 1-17, 2016. 11. Panda S. K., “SLA-based task scheduling algorithms for heterogeneous multi-cloud environment,” The Journal of Supercomputing, vol.

73, no. 6, pp. 2730-2762, 2017.

119-123

24.

Authors: Mohan Gupta, Kamal Sharma

Paper Title: Experimental Observation of Heat Exchange and Pressure Drop By Using Many Inserts in a Round

Tube

Abstract: The capability of a convectional heat exchanger (HE) in transferring heat requires improvement for

conveying a considerable proportion of energy at cheaper rate and amount. For augmenting the heat transfer

coefficient, different means have been employed. However, the use of inserts has become an assured method in

enhancing heat transfer through endurable escalation of frictional losses. The objective of the study is the

examination of a round pipe fitted along with multiple inserts with regard to its characteristics related to energy

transfer and water flow; these inserts are organized in clockwise and anticlockwise attitudes.

Keywords: ”Nu”,”Re”, “F”, “Twisted tape inserts”.

References: 1. S. E-ard, C. Thianpong, P. Promvonge, Experimental investigation of heat transfer and flow friction in a circular tube fitted with

124-130

Page 18: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

regularly spaced twisted tape elements, Int. Commun. Heat Mass Transfer 33 (2006) 1225–1233.

2. Smith E-ard , Pongjet Promvonge, Heat transfer characteristics in a tube fitted with helical screw-tape with/with no core-rod inserts,

International Communications in Heat and Mass Transfer 34 (2007) 176–185. 3. Chinaruk Thianpong, Petpices E-ard, Khwanchit Wongcharee, Smith E-ard, Compound heat transfer enhancement of a dimpled tube with

a twisted tape swirl generator, International Communications in Heat and Mass Transfer 36 (2009) 698–704.

4. S. E-ard, K. Wongcharee, P. E-ard, C. Thianpong, Heat transfer enhancement in a tube using delta-winglet twisted tape inserts, Applied

Thermal Engineering 30 (2010) 310–318.

5. S. E-ard, C. Thianpong, P. E-ard, Turbulent heat transfer enhancement by counter/co-swirling flow in a tube fitted with twin twisted tapes,

Experimental Thermal and Fluid Science 34 (2010) 53–62. 6. Smith E-ard, Pongjet Promvonge, Performance assessment in a heat exchanger tube with alternate CW and CCW twisted-tape inserts,

International Journal of Heat and Mass Transfer 53 (2010) 1364–1372.

7. Khwanchit Wongcharee, Smith E-ard, Heat transfer enhancement by twisted tapes with alternate-axes and triangular, rectangular and trapezoidal wings, Chemical Engineering and Processing 50 (2011) 211–219.

8. S. Pethkool, S. E-ard, S. Kwankaomeng, P. Promvonge, Turbulent heat transfer enhancement in a heat exchanger using helically

corrugated tube, International Communications in Heat and Mass Transfer 38 (2011) 340–347. 9. K. Wongcharee, S. E-ard, Friction and heat transfer characteristics of laminar swirl flow through the round tubes inserted with alternate

clockwise and counter-clockwise twisted-tapes, International Communications in Heat and Mass Transfer 38 (2011) 348–352.

10. Smith E-ard, Khwanchit Wongcharee, Pongjet Promvonge, Influence of Nonuniform Twisted Tape on Heat Transfer Enhancement Characteristics, Chem. Eng. Comm., 199:1279–1297, 2012.

11. K. Nanan, C. Thianpong, P. Promvonge, S. E-ard, Investigation of heat transfer enhancement by penetrate helical twisted-tapes,

International Communications in Heat and Mass Transfer 52 (2014) 106–112. 12. P. Promvonge, S. E-ard, Heat transfer behaviors in a tube with combined conical-ring and twisted-tape insert, International

Communications in Heat and Mass Transfer 34 (2007) 849–859.

13. [V. Kongkaitpaiboon, K. Nanan, S. E-ard, Experimental investigation of heat transfer and turbulent flow friction in a tube fitted with perforated conical-rings, International Communications in Heat and Mass Transfer 37 (2010) 560–567.

14. Ji-An Meng, Xin-Gang Liang, Ze-Jing Chen, Zhi-Xin Li, Experimental study on convective heat transfer in alternating elliptical axis

tubes, Experimental Thermal and Fluid Science 29 (2005) 457–465. 15. M. Faizal, M.R. Ahmed, Experimental studies on a corrugated plate heat exchanger for small temperature difference applications,

Experimental Thermal and Fluid Science 36 (2012) 242–248.

16. Smith E-ard, Vichan Kongkaitpaiboon and Kwanchai Nanan, Thermohydraulics of Turbulent Flow Through Heat Exchanger Tubes Fitted with Circular-rings and Twisted Tapes, Chinese Journal of Chemical Engineering, 21(6) 585—593 (2013).

17. C. Thianpong, P. E-ard, P. Promvonge, S. E-ard, Effect of perforated twisted-tapes with parallel wings on heat transfer enhancement in a

heat exchanger tube, Energy Procedia 14 (2012) 1117 – 1123. 18. S. E-ard, P. Somkleang, C. Nuntadusit, C. Thianpong, Heat transfer enhancement in tube by inserting uniform/non-uniform twisted-tapes

with alternate axes: Effect of rotated-axis length, Applied Thermal Engineering 54 (2013) 289-309.

19. Smith E-ard, Pongjet Promvonge, Thermal characteristics in round tube fitted with serrated twisted tape, Applied Thermal Engineering 30(2010)1673-1682.

20. Jian Guo, Aiwu Fan, Xiaoyu Zhang, Wei Liu, A numerical study on heat transfer and friction factor characteristics of laminar flow in a

circular tube fitted with center-cleared twisted tape, International Journal of Thermal Sciences 50 (2011) 1263-1270. 21. S. E-ard, P. Promvonge, Experimental investigation of heat transfer and friction characteristics in a circular tube fitted with V-nozzle

turbulators, International Communications in Heat and Mass Transfer 33 (2006) 591–600.

22. S.W. Chang, K.-W. Yu, M.H. Lu, Heat transfers in tubes fitted with single, twin, and triple twisted tapes, Exp. Heat Transfer 18 (4) (2005) 279–294.

23. S.W. Chang, Y.J. Jan, J.S. Liou, Turbulent heat transfer and pressure drop in tube fitted with serrated twisted tape. Int. J. Therm. Sci. 46

(5) (2007) 506-518. 24. S.W. Chang, T.L. Yang, J.S. Liou, Heat transfer and pressure drop in tube with broken twisted tape insert. Exp. Therm. Fluid Sci. 32 (2)

(2007) 489-501.

25. M. Rahimi, S.R. Shabanian, A.A. Alsairafi, Experimental, CFD studies on heat transfer and friction factor characteristics of a tube equipped with modified twisted tape inserts. Chem. Eng. Process. 48 (3) (2009) 762-770.

26. P. Bharadwaj, A.D. Khondge, A.W. Date, Heat transfer and pressure drop in a spirally grooved tube with twisted tape insert. Int. J. Heat

Mass Transfer 52 (7e8) (2009) 1938-1944. 27. S. E-ard, P. Promvonge, Thermal characteristics in round tube fitted with serrated twisted tape, Appl. Therm. Eng. 30 (13) (2010) 1673–

1682. 28. S. E-ard, K.Wongcharee, P. E-ard, C. Thianpong, Thermohydraulic investigation of turbulent flow through a round tube equipped with

twisted tapes consisting of centre wings and alternate-axes, Exp. Thermal Fluid Sci. 34 (8) (2010) 1151–1161.

29. S. E-ard, P. Seemawute, K. Wongcharee, Influences of peripherally-cut twisted tape insert on heat transfer and thermal performance characteristics in laminar and turbulent tube flows, Experimental Thermal and Fluid Science 34 (2010) 711–719.

30. P. Murugesan, K. Mayilsamy, S. Suresh, Turbulent heat transfer and pressure drop in tube fitted with square-cut twisted tape, Chin. J.

Chem. Eng. 18 (4) (2010) 609–617. 31. [31] P. Murugesan, K. Mayilsamy, S. Suresh, P.S.S. Srinivasan, Heat transfer and pressure drop characteristics in a circular tube fitted

with and with no V-cut twisted tape insert, International Communications in Heat and Mass Transfer 38 (2011) 329–334

32. K. Wongcharee and S. E-ard, Heat transfer enhancement by twisted tapes with alternate axes and triangular, rectangular and trapezoidal

wings, Chemical Engineering and Processing 50 (2011) 211–219.

25.

Authors: Amandeep, Sanjeev Kumar, Vikas Chauhan, Prem Kumar

Paper Title: LTE-A Heterogeneous Networks using Femtocells

Abstract: For the improvement of coverage and services of quality, Femtocells play important role in

heterogenous Networks in LTE-A networks. Femtocells are used to provide good indoor voice, increase network

capacity and high data coverage in LTE-A. the problem of Cross-Tier interference is a large problem in Femtocells

Networks. Cross-Tier interference is an interference between Femtocells base station and Microcell’s base station

in a network structure. Throughput is increased while Cross-Tier interference can be decreased using Femtocell in

any Networks. In this paper, we also show experiment results obtain by a simulation framework which shows how

Femtocells can increase the throughput and reduce the interference.

Keywords: Heterogeneous Network, Experiment, Femtocells, LTE, Interference, Throughput, Pathloss, SINR.

References: 1. Yamamoto, T., & Konishi, S. (2013). “Impact of small cell deployments on mobility performance in LTE-Advanced systems”. In

Personal, Indoor and Mobile Radio communications Workshops, IEEE 24th International Symposium, pp. 189-193, 2013.

2. Bouras, C., Kokkinos, V., Kontodimas, K., & Papazois, A.. A simulation framework for LTE-A systems with femtocell overlays. In Proceedings of the 7th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks, pp.

131-134

Page 19: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

85-90, (2012).

3. Trestian, R., Vien, Q. T., Shah, P., & Mapp, G. (2015, October). Exploring energy consumption issues for multimedia streaming in LTE

HetNet small cells. In Local Computer Networks (LCN), 2015 IEEE 40th Conference on (pp. 498-501). IEEE. 4. Kosta, C., Hunt, B., Quddus, A. U., & Tafazolli, R.. On interference avoidance through inter-cell interference coordination (ICIC) based

on OFDMA mobile systems. IEEE Communications Surveys & Tutorials, 15(3), 973-995, (2013).

5. Stanze, O., & Weber, A. (2013). Heterogeneous networks with LTE‐Advanced technologies. Bell Labs Technical Journal, 18(1), 41-58.

6. http://www.3gpp.org/technologies/keywords-acronyms/98-lte.

7. http://www.3gpp.org/technologies/keywords-acronyms/97-lte-advanced. 8. Zhou, Hao, Yusheng Ji, Xiaoyan Wang, and Shigeki Yamada. "eICIC configuration algorithm with service scalability in heterogeneous

cellular networks." IEEE/ACM Transactions on Networking (TON) 25, no. 1 (2017): 520-535.

9. Alexiou, A., Bouras, C., Kokkinos, V., Kontodimas, K., & Papazois, A. (2011, October). Interference behavior of

integrated femto and macrocell environments. In Wireless Days (WD), 2011 IFIP (pp. 1-5). IEEE.

10. Claussen, Holger. "Performance of macro-and co-channel femtocells in a hierarchical cell structure." In Personal, Indoor and Mobile

Radio Communications, 2007. PIMRC 2007. IEEE 18th International Symposium on, pp. 1-5. IEEE, 2007. 11. https://en.wikipedia.org/wiki/LTE_(telecommunication)

12. http://www.3glteinfo.com/lte-advanced-heterogeneous-networks/

13. http://www.2cm.com.tw/technologyshow_content.asp?sn=0912230018 14. De La Roche, G., Valcarce, A., López-Pérez, D., & Zhang, J. “Access control mechanisms for femtocells”. IEEE Communications

Magazine, 2010.

15. Slamnik, N., Okic, A., & Musovic, J. “Conceptual radio resource management approach in LTE heterogeneous networks using small cells number variation”. In Telecommunications (BIHTEL), XI International Symposium, pp. 1-5, IEEE, 2016.

16. Seidel, E., & Saad, E. (2010). LTE Home Node Bs and its enhancements in Release 9. Nomor Research, 1-5.

26.

Authors: Vandana Agrawal

Paper Title: Parameterization of Unorganized Point Cloud Data for B-Spline Surface Fitting

Abstract: In the present work an algorithm is presented for the parameterization of unorganized point cloud

data such that a smooth B-spline surface can be fitted. Points belonging to various surfaces and edges are identified

during segmentation. Further edges bounding to segmented region are represented by curves. In the present work

initially B-spline curves are constructed with C1 smoothness by interpolating the measured points lying on the

edges. For each segmented region four such curves named as boundary curves are constructed to enclose it. Using

these boundary curves Coons surface is constructed which serves as base surface for each segmented region. Each

Coons surface is divided into grids and for each measured point the nearest grid vertex is found out. The

parameters of this vertex are used as the parameters of the measured point. Finally, an algorithm using an iterative

approach is given to further improve the parameterization.

Keywords: parameter, data points, curve, surface

References: 1. Puttre M., "Capturing design data with digitizing systems", Mechanical Engineering 1994,116(1),62-65

2. Wohlers T., "The technology behind 3D digitizing", Computer Graphics World 1997,3(20), 47-54 3. Rogers DF, Adams JA, "Mathematical elements for computer graphics", Tata Mc Graw Hill, Second edition 2002

4. Tiller Wayne, Piegl L, "The NURBS Book", New York, Springer-Verlag 1995

5. De Boor C, "A practical guide to splines", New York, Springer-Verlag 1978 6. Bartels RH, Beaty JC and Barskey BA, "An introduction to splines for use computer graphics and geometric modeling", Morgan Kaufman

1987

7. Piegl L, "On NURBS: A survey", IEEE Trans. Computer Graphics and Applications 1991, 11(5) 8. Yamaguchi F, "Curves and surfaces in computer aided geometric design", New York, Springer Verlag 1988

9. Cohen FS, Wang JY, "Modeling image curves using invariant 3D object curve model- A path to 3D recognition and shape estimation

from image contours", IEEE Trans. Pattern analysis and machine intelligence 1994, 16(1),13-21 10. Wang JY, Cohen FS, "3D object recognition and shape estimation from image contours using B-splines, shape invariant matching and

neural network", IEEE Trans. Pattern Analysis and machine Intelligence 1994, 16(1), 13-21

11. Cohen FS, Huang Z, Yang Z, "Matching and identification of curves using B-splines curve representation", IEEE Trans. Image Processing 1995, 4(1), 1-10

12. Huang Z, Cohen FS, "Affine invariant moments and B-splines for object recognition from image curves", IEEE Trans. Image Processing

1996, 5(10), 1473-1480 13. Milroy M, Bradley C, Vickers G, Weir D, "G1 continuity of the B-splines surface patches in reverse engineering", Computer Aided

Design 1995, 27, 471-478

14. Krishnamurthy V, Levoy M, "Fitting smooth surfaces to dense polygon meshes" Proceeding SIGGRAPH, Computer Graphics Proc., Ann. Conf. Series 1996, 313-324

15. Andersson E, Andersson R, Boman M, Elmroth T, Dahlberg B, Johansson B, "Automatic construction of surfaces with prescribed shape",

Computer Aided Design 1988, 317-324 16. Ma W, Kruth J, "Parameterization of randomly measured points for least squares fitting of B-splines curves and surfaces", Computer

Aided Design 1995, 27, 663-675

17. Eck M, Hoppe H, "Automatic reconstruction of B-spline surface of arbitrary topology type", Proceeding SIGGRAPH’96, Comp. Graphics Proc., Ann. Conf. Series 1996, 325-334

18. Cohen FS, "Ordering and parameterizing scattered 3D data for B-spline surface approximation", IEEE Transactions on Pattern analysis and machine intelligence 2000, 22(6)

19. Kuo CC, Yau HT, "A Delaunay based region growing approach to surface reconstruction from unorganized points", Computer Aided

Design 2005, 37,825-835 20. Woo H, Kang E, Wang S, Lee KH, "A new segmentation method for point cloud data", Int. J. of Machine Tools and manufacture 2002,

42, 167-178

21. NAG, "Fortran Library Manual Mark" 15 Numerical Algorithm Group Limited 1991, chapter F04 22. De Boor C, "A practical guide to splines" Springer 1978

23. Cox MG, "Linear algebra support modules for approximation and other software" Scientific software systems, Chapman and Hall 1990,

21-29

135-140

27.

Authors: Deepak Bharadwaj, Manish Prateek

Paper Title: Kinematics and Dynamics of Lower Body of Autonomous Humanoid Biped Robot

Page 20: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

Abstract: This paper presents the mathematical modeling of ten degree of freedom of manipulator. Workspace

of each leg calculated by applying the method of Denavit_Hatretnberg notation scheme. Forward and inverse

kinematics obtained for the manipulator of lower body of humanoid robot. Static forces on the joint calculated for

the joint to hold the particular position of the lower body. Dynamics torque obtained by applying the principles of

Lagrangian dynamics. A nonlinear feedback measured from the output end to control the movement of leg. A

computed control torque approach has been used to avoid the oscillation of the system. Several experiment done of

the mat lab to verify the analytical and simulation result

Keywords: Humanoid Robot, Transform approach, Partitioned-proportional derivative

References: 1. Jun Morimoto, Gordon Cheng,et al, “A Simple Reinforcement Learning Algorithm For Biped Walking” Proceedings of the 2004 IEEE

International Conference on Robotics &Automation New Orleans. LA * April 2004

2. Marlon Fernando Velásquez-Lobo, Juan Manuel,etal, “ Modeling a Biped Robot on Matlab/SimMechanics” CONIELECOMP 2013, 23rd

International Conference on Electronics, Communications and Computing, 11-13 March 2013 3. Amarpreet Singh & Ashish Sigla, [2017], Kinematic Modeling of Robotic Manipulators,Proceeding @ The National Academy of Scince,

India ,Sect.A phys.Sci(July-September 2017) 87(3):303-319

4. M.Himanth & L.M Bharath, [2017], Intrenational Journal of Robotics & Automation, Vol3,Issue2, IJRA(2017)21-28 5. Zongxing Lu,1 Chunguang Xu,et al,[2015] Inverse Kinematic Analysis and Evaluation of a Robot for Nondestructive Testing

Application, Journal of Robotics, Volume 2015, Article ID 596327, 7 pages, Hindawi Publishing Corporation

6. N. Latif A. Shaari, Ida S. Md Isa,et al [2015], Torque Analysis Of The lower limb exoskeleton robot design, ARPN Journal of Engineering and Applied Sciences, VOL. 10, NO. 19, OCTOBER 2015

7. C.Hernandez-Santos, E-Rodriguez_leal,et al,[2012]Kinematics and dynamics of a new 16-DOF Humanoid Biped Robot with active toe joint, Intrenational Journal of Advanced robotics system,INTECH,17 Aug,2012.

8. Zhe Li, Gongfa Li, Ying Sun,et al,[2017],Development of articulated robot trajectory planning,Int. J. Computing Science and

Mathematics, Vol. 8, No. 1, 2017 9. GilJin Yang, Byoungwook Choi,et al.[2013], Implementation of Joint Space Trajectory Planning for Mobile Robots with Considering

Velocity Constraints on Xenomai, International Journal of Control and Automation, 7(9):1-3 · October 2013

10. G Maliotis, “A Hybrid Model Reference Adaptive Control/Computed Torque Control Scheme for Robotic Manipulators”, Proceeding of the institute of mechanical engineers,PartI;Journal of systems and control engineering,

Volume: 205 issue: 3, page(s): 215-221,Issue published: August 1, 1991 ,Received: November 21, 1990; Accepted: July 26, 1991

11. MD. Ahhtaruzzaman, Amir Akramin Shafie, [2016], Gait Analysis: Systems, Technologies, And Importance, Journal of Mechanics in Medicine and Biology, Vol. 16, No. 7 (2016) 1630003 (45 pages) °c World Scientific Publishing Company

12. .J-P ,Merlet, Jacobian, manipulability, condition number and accuracy of parallel robots, INRIA , BP 93,06902 Sophia-Antipolis, France

13. Anthony A. Maciejewski * Charles A.Klein,[1989], The Singular Value Decomposition: Computation and Application to Robotics, The international Journal of Robotics Research , Vol8, No 6, December1989,@1989 Massachusetts Institute of Technology

14. J.Denavit, R.S Hartenberg, et al.[2011], Velocity, Acceleration , and static forces analyses of Spatial Linkages, Journal of Applied

Mechanics,Vol 32, Issue 4,903-910,sept15,2011 15. Nikos G.Tsagarakis and Bram Vanderborght, et al[2009], The Mechanical Design of the New Lower Body for the Child Humanoid robot

‘iCub, The 2009 IEEE/RSJ International Conference on Intelligent Robots and Systems October 11-15, 2009 St. Louis, USA

16. Brenna D. Argall, Brett Browning, et al., Mobile Robot Motion Control from Demonstration and Corrective Feedback, The research is

partly sponsored by the Boeing Corporation under GrantNo. CMU-BA-GTA-1, BBNT Solutions under subcontract No. 950008572, via

prime Air Force contract No. SA-8650-06-C-7606, the United States Department of the Interior under Grant No.NBCH-1040007

17. Jianxian Cai, Lixin Li, [2013],Autonomous Navigation Strategy in Mobile Robot, Journal Of Computers, VOL. 8, NO. 8, AUGUST 2013, 18. Robert Platt, Robert Burridge, et al.[2013], Humanoid Mobile Manipulation Using Controller Refinement, Dexterous Robotics Laboratory

Johnson Space Center, NASA,july 2013

141-146

28.

Authors: M Sai Prasanthi,Venkata Bharath Katragadda, Hrushik Perumalla, Bandla Sowmya

Paper Title: Hybrid Approach for Securing the IoT Devices

Abstract: Today the Internet has turned out to be omnipresent, has touched every edge of the globe, and is

influencing human life in incredible ways. We are presently entering a period, where different kind’s appliances

are associated with the web. We are entering a time of the IoT. Internet of Things enables the appliances to

communicate and perform their activities based on network activity. Today, a PC is substantially less helpful

without an association of internet; tomorrow, that will be the situation with apparatuses like a fridge. To put it

plainly, these apparatuses should convey to one another. Sensors in the perception layer gather the information

from the sources. This information will be transmitted through the system layers over the web to the cloud. Today

IoT deals with huge amount of data. This information may be exceptionally touchy and their protection and

security must not be endangered. Here comes the requirement for security algorithms to protect the information. In

this paper, we provide a hybrid approach of security algorithms (AES along with RSA) to secure the data in

network layer.

Keywords: Cryptography, Symmetricencryption, Asymmetric encryption, AES,RSA,Image slicer.

References: 1. Abdelali El Bouchti, Samir Bahsani, Trik Nahhal “Encryption As A Service For Data Healthcare Cloudsecurity. “

2. C. Perera, A. Zaslavsky, P. Christen, D. Georakopoulos,“Context Aware Computing For The Internet Of Things.”

3. J. Gubbi, R. Buyya, S. Marusic, And M. Palaniswami, “Internet Of Things (Iot): A Vision, Architectural Elements, And Future

Directions.”

4. Ch. Qiang, G.Quan, B.Yu, L.Yang, “Research On Security Issues Of The Internet Of Things.”

5. M. Friedemann, And C. Floerkemeier. "From The Internet Of Computers To The Internet Of Things."

6. Y.Challal, E. Natalizio, S.Sen, And A.Maria Vegni “Internet Of Things Security And Privacy: Design Methods And Optimization”, Add

Hoc Network

7. L. Tawalbeh, M. Mowafi And W. Aljoby, "Use Of Elliptic Curve Cryptography For Multimedia Encryption," In Iet Information Security.

8. L. A. Tawalbeh, Y. Jararweh And A. Moh’md. “An Integrated Radix-4 Modular Divider/Multiplier Hardware Architecture For

Cryptographic Applications”.

147-151

Page 21: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

9. Iot Ecosystem Components: The Complete Connectivity Layer

10. konink Lijke Phulips: Meethu Personal Wireless Light-ing,(2013).

11. "Cellular Automata For Dynamic S-Boxes In Cryptog-raphy."

12. Implementation Of Multi Mode Aes Algorithm Using Verilog"

13. A Novel Approach To Secure Data Sharing Scheme For Dynamic Members Through Different Secure Methods.

14. A Survey On Applications And Security Issues Of Internet Of Things

15. R. L. Rivest, A. Shamir And L. Adleman, "A Method For Obtaining Digital Signatures And Public-Key Cryptosys-tem”.

16. An Hybrid Of Rsa Token And Iterated Hash Algorithm For Secured Data Transfer

29.

Authors: N. Krishna Jyothi, V. Anitha

Paper Title: Design of Multiple U Slotted Microstrip Antenna for Wimax and Wideband Applications

Abstract: A novel miniaturized configuration of a different U-slotted micro-strip radio wire is outlined in

view of focus recurrence about 4. 7 GHz with dielectric steady (εr) for 4. 4 also substrate thicknesses from

claiming 2. 4mm. The suggested radio wire might meet the interest from claiming WiMax and wideband

requisitions. The way parameters like return loss, VSWR, gain, directivity would simulated, broke down and

optimized utilizing high back structure test system. The recommended radio wire is created and tried utilizing the

Rhode Also Schwarz vector organizes analyzer R&S® ZVL-13 and its execution aspects would got. Those

Outcomes indicate that the Inclination offers Inclination of the recommended radio wire could make incredibly

progressed contrasted with customary micro-strip patavium antennas.

Keywords: Microstrip antennas, WiMaX, Return Loss, VSWR.

References: 1. Implementation and development of single feed design using multiple U slotted patch antenna for wireless applications Vikram Thakur,

International Journal of Engineering Research & technology (IJERT).

2. C. A. Balanis, “Antenna Theory, Analysis and Design”,John Wiley & Sons, New York, 1997.

3. Indrasen Singh, V.S. Tripathi, “Microstrip patch antenna and its applications: A Survey”, International journal of Computer Technology

and Applications, Vol. 2(5), pp.1595-1599, 2011.

4. I.J. Bahl, P. Bhartia, “Microstrip Antennas”, Artech House, 1980.

5. Keith R. Carver, “James W. Mink, “Microstrip Antenna Technology”, IEEE Transactions on antennas and propogations,Vol.AP-29,

No.1, January 1981.

6. R.E Collin, “Foundations for Microwave Engineering” ,IEEE Press 2nd Edition, 2002.

7. S. E James, M.A. Jusoh, M. H. Mazwir and S.N.S. Mahmud, “Finding The Best Feeding Point Location of Patch Antenna using HFSS”,

ARPN Journal of Engineering and Applied Sciences, Vol.10, No. 23, December 2015

8. Vinaybankey,N.AnveshKumar,’’Designand performance issue of microstrip patch antennas’’,International journal of Scientific and

Engineering Research volume6,Issue 3,March-2015 1572

152-155

30.

Authors: Usha N., G. Devakumar

Paper Title: Development of a Model for the Sustainability of Agri Engineering Manufacturing Companies in

Karnataka, India

Abstract: Indian agriculture sector contributes 18% of GDP to the country’s economy and provides

employment about 50% of the workforce. Agriculture sector is facing challenges to get integrated with the

business sector and to getting timely and convenient information to increase the productivity. Agricultural

mechanization helps to overcome this problem. Agri Engineering Manufacturing Companies (AEMC) plays a

major role in effective implementation of Agricultural mechanization. Agricultural mechanization has been

accepted as an important element of modernization of agriculture by the world. Hence this article focused on the

ways to address the contemporary issues for sustainability of AEMC. In this article quantitative research has been

carried out and a thorough literature review has been carried out through scholarly Scopus Indexed journals to

identify the factors for sustainability of AEMC for the purpose of conducting pilot study. The critical factors such

as Entrepreneurial Competency (EC), Business Model (BM), Innovation and Technology (IT) were arrived based

on the rating and ranking scale calculation. Survey questionnaire was developed and validated based on the

feedback given by the entrepreneurs, academicians, subject experts and industry experts. A total population of 372

numbers of AEMC has been identified through agricultural department websites, trade websites and agricultural

events in the state of Karnataka. Census method of sampling has been adopted and the sample was categorised

based on their manufacturing activity such as Equipment and implements, Irrigation, Farm Machineries and

Processing Machineries. The primary data has been collected through face to face interview, telephonic interview

and Google spreadsheet. The collected data has been analysed using Statistical Package for the Social Sciences 25

(SPSS 25) and Analysis of Moment Structures 25 (AMOS 25) software. The data reliability and validity has been

analysed through Cronbach alpha value of 0.785 and KMO value of 0.703 respectively which are well within the

limit. Further Structural Equation Modelling (SEM) has been used to develop a model consisting of the identified

factors such as EC, BM and IT. The obtained Goodness of fit statistics values are well within the acceptable limit.

The output of this research is recommended to implement in AEMC such as farm equipment, machineries and

irrigation equipment manufacturing companies. As per the research finding, it is recommended to concentrate on

the unmet customer need so as to increase the market share and sustain business. Department restructuring enable

the entrepreneurs to adopt the new technology as well as meet the growing needs of the customers. Adoption of

technological forecasting helps the entrepreneurs to sense the future requirement of the market and be equipped to

face the competition. It is suggested to the entrepreneurs to participate in the national and international trade fairs

and exhibitions to secure maximum market share to attain sustainability.

156-164

Page 22: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

Keywords: Agri Engineering Flexible Manufacturing Companies, Business Sustainability, Entrepreneurial

Competency, Innovation and Technology.

References: 1. A. Caloffi, F. Rossi, and M. Russo, “What makes SMEs more likely to collaborate? Analysing the role of regional innovation policy”.

European Planning Studies, vol. 23(7), 2015, pp. 1245-1264.

2. A. K. Klevorick, R. C. Levin, R. R. Nelson, and S. G. Winter, “On the sources and significance of inter industry differences in

technological opportunities”, Research Policy, 24(2), 1995, pp. 185–205. 3. A. Spithoven, W. Vanhaverbeke, and N. Roijakkers, “Open innovation practices in SMEs and large enterprises”, Small Business

Economics, vol. 41, 2013, pp. 537-562.

4. B. Bird, “Towards a theory of entrepreneurial competency”, Advances in Entrepreneurship, Firm Emergence and Growth, vol. 2, 1995, pp. 51-72.

5. Baden, C. Fuller, and M. S. Morgan, “Business models as models”, Long Range Planning, vol. 43(2/3), 2010, pp. 156–171.

6. D. George, and M. Paul, IBM SPSS Statistics 23 Step by Step, New York, Routledge, 2016, pp. 231-260. 7. D. L. Brannon, and J. Wiklund, “An analysis of business models : Firm characteristics , innovation and performance”, Academy of

entrepreneruship journal, vol. 22(1), 2016, pp.1–21.

8. D. M. Lambert, and M. C. Cooper, “Issues in supply chain management”, Ind Mark Manage, vol. 29(1), 2000, pp. 65–83. 9. D. S. Diana, “Exploratory or confirmatory Factor Analysis”, Proc. of SUGI 31, 2006, pp.200-23, San Francisco, California.

10. E. Autio, L. Dahlander, and L. Frederiksen, “Information exposure, opportunity evaluation, and entrepreneurial action: An investigation

of an online user community”, Academy of Management Journal, vol. 56, 2013, pp. 1348–1371. 11. E. Zancul, “Product Life Cycle Management: PLM Systems Selection Based on Reference Models”, São Carlos: Escola de Engenharia de

São Carlos, Universidade de São Paulo. 2009.

12. G. Devakumar, and G. Barani, “Marketing strategies for competitive advantage: structural equation modelling approach on agricultural sector industry in South India”, Int. J. Business Excellence, vol. 9(2), 2016, pp.225-239.

13. G. Hosseininia, and A. Ramezani, “Factors Influencing Sustainable Entrepreneurship in Small and Medium-Sized Enterprises in Iran: A

Case Study of Food Industry” Sustainability, vol. 8, 1010, 2016, pp. 1-20. 14. G. Lay, M. Schroeter, and S. Biege, “Service based business concepts: a typology for business to business markets”, European

Management Journal, vol. 27(6), 2009, pp. 442–455.

15. G. Singh, and B. Zhao, “Agricultural mechanization situation in Asia and the Pacific region”, Agricultural Mechanization in Asia, Africa, and Latin America, vol. 47(2), 2016, pp.15-25.

16. G. T. Valderrama, and M. Mendigorri, “Content validation of a measure of R and D effectiveness”, R and D Management, vol. 35(3),

2005, pp. 311-331. 17. H. Daire, C. Joseph and R. M. Michael “Structural Equation Modelling: Guidelines for Determining Model Fit”, Electron Journal of

Business Research Methods, vol. 6(1), 2008, pp. 53-60.

18. H. J. P. Schoemaker, S. Heaton, and D. Teece, “Innovation, dynamic capabilities, and leadership”, California Management Review, 61(1), 2018, pp. 15-42.

19. H. M. Morris, W. J. Webb, J. Fu, and S. Singhal, “A competency-based perspective on entrepreneurship education: Conceptual and

Empirical Insights”, Journal of Small Business Management, vol. 51(3), 2013, pp. 352-369. 20. H. Volberda, and A. Lewin, “Co-evolutionary dynamics within and between firms: From evolution to co-evolution”, Journal of

Management Studies, vol. 40, 2003, pp. 2111-2136.

21. I. Mani, and P. K. Sahoo, “Present status and future prospects of agricultural machinery research in India” Agricultural Mechanization in Asia, Africa and Latin America, vol. 47(2), 2016, pp.36-40.

22. J. D. Thompson, and I. C. MacMillan, “Business models: creating new markets and societal wealth”, Long Range Planning, vol. 43(2/3),

2010, pp. 291–307. 23. J. F. Hair, R. E. Anderson, and R. L. Tatham, Multivariate data analysis, New Jersey, Prentice Hall, 2006.

24. J. F. Hair, R. E. Anderson, R. L. Tatham, and W. C. Black, Multivariate Data Analysis, Prentice- Hall, Upper Saddle River: New Jersey,

1998. 25. K. Koschatzky, and T. Stahlecker, “A new challenge for regional policy-making in Europe? Chances and risks of the merger between

cohesion and innovation policy”, European Planning Studies, vol. 18(1), 2010, pp. 1-19.

26. K. Laursen, and A. Salter, “Open for innovation: The role of openness in explaining innovative performance among UK manufacturing firms”, Strategic Management Journal, vol. 27(2), 2006, pp. 131–150.

27. K. Muff., and T. Dylick, “An organisational roadmap of business sustainability”, April 30, 2014, Available: SSRN: https://ssrn.com/abstract=2442211 or http://dx.doi.org/10.2139/ssrn.2442211

28. L. J. Cronbach, “Estimate alpha and the internal structure of tests”, Psychometrika, vol. 16(3), 1951, pp. 297–334.

29. L. T. Hu, and P. M. Bentler, “Cutoff Criteria for Fit Indexes in Covariance Structure Analysis: Conventional Criteria versus New Alternatives”, Structural Equation Model, vol. 6(1), 1999, pp. 1-55.

30. M. D. Gomez, R. Baxter, R. Roy, and M. Kalta. “Trough-Life Integration Using PLM. Proceeding of the 19th CIRP Design”,

Conference–Competitive Design, Cranfield University, Cranfield, 2009. 31. M. E. Porter, and M. R. Kramer, “Creating shared value”, Harvard Business Review January/February: 63–77, 2011.

32. M. Spence, and H. L. Essoussi, “SME brand building and management: an exploratory study”, European Journal of Marketing, vol.

44(7/8), 2010, pp. 1037-1054.

33. M. Taylor, and A. Murphy, “SMEs and e-business”, Journal of Small Business and Enterprise Development, vol. 11(3), 2004, pp. 280 –

289.

34. N. Bendary, and E. A. Minyawi, “Entrepreneurial competencies effect on Small and Medium Enterprises performance through the mediation effect of psychological contracting of outsourcing”, International Journal of Business and Economic Development, vol. 3(2),

2015, pp. 23-38.

35. P. Anderson, and M. L. Tushman, “Technological discontinuities and dominant designs: A cyclical model of technological change”, Administrative Science Quarterly, vol. 35, 1990, pp. 604–633.

36. P. C. Grindley, and D. J. Teece, “Managing intellectual capital: Licensing and cross-licensing in semiconductors and electronics”

California Management Review, vol. 39(2), 1997, pp. 8–41. 37. P. S. G. D. Oliveira, D. D. Silva, L. F. D. Silva, M. D. S. Lopes, and A. L. Helleno, “Factors that influence product life cycle management

to develop greener products in the mechanical industry”, International Journal of Production Research, vol. 54(15), 2016, pp. 4547-4567.

38. P. Skarzynski, and J. R. Latre, “Lessons to jumpstart disruptive innovation”, Strategy & Leadership, 39(1), 2011, pp. 5-10. 39. R. Amit, and C. Zott, “Value creation in E-Business”, Strategic Management Journal, vol. 22, 2001, pp. 493-520.

40. R. G. McGrath, “Business models: a discovery driven approach”, Long Range Planning, vol. 43(2), 2010, pp. 247–261.

41. R. K. Huet, and D. J. Freyman, “What sustainable entrepreneurship looks like: An exploratory study from a student perspective”, In Social Entrepreneurship Leveraging Economic, Political, and Cultural Dimensions, Springer: Berlin, Germany, 2011, pp. 155–178.

42. R. Katila, and G. Ahuja, “Something old, something new: A longitudinal study of search behavior and new product introduction”

Academy of Management Journal, vol. 45(6), 2002, pp. 1183–1194. 43. R. R. Nelson, and S. G. Winter, An evolutionary theory of economic change. Cambridge, MA: Harvard University Press, 1982.

44. S. A. Kumara, and C. Sahasranam, “Entrepreneurial characteristics among business management students: an empirical study”, The

Icfaian Journal of Management Research, vol. 8(6), 2009, pp. 7-29. 45. S. Evans et. al., “Business model innovation for sustainability: towards a unified perspective for creation of sustainable business models”,

Page 23: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

Business Strategy and the Environment, vol. 26, 2017, pp. 597-608.

46. S. Grodal, A. Gotsopoulos, and F. F. Suarez, “The co evolution of technologies and categories during industry emergence”, Academy of

Management Review, vol. 40(3), 2015, pp. 423-445. 47. S. M. Giarratana, M. Mariani, and I. Weller, “Rewards for patents and inventor”, Behaviours in Industrial Research and Development,

vol. 61(1), 2018, pp. 264-292.

48. S. M. Tsai, C. M. Tsai, and C. C. Chang, “The Direct and Indirect Factors on Affecting Organizational Sustainability” Journal of Management and Sustainability, vol. 3(4), 2013, pp. 67-76.

49. S. Mitchelmore, and J. Rowley, “Entrepreneurial competencies : A Literature Review and Development Agenda”, International journal of

entrepreneurial behaviour and research, vol. 16(2), 2010, pp. 92-111. 50. S. S. Webber, “Leadership and trust facilitating cross-functional team success”, Journal of Management Development, vol. 21(3), 2002,

pp. 201 – 214.

51. S. Schaltegger and M. Wagner, “Sustainable entrepreneurship and sustainability innovation: categories and interactions”, Business Strategy and the Environment, vol. 20(4), 2011, pp. 222–237.

52. S. Schaltegger, L. F. Freund, and G. E. Hansen, “Business models for sustainability: A co-evolutionary analysis of sustainable

entrepreneurship, innovation, and transformation”, Organization and Environment, 2016, pp. 1-26. 53. S. Shadfar, and I. Malekmohammadi, “Application of Structural Equation Modelling (SEM) in restructuring state intervention strategies

toward paddy production development”, International Journal of Academic Research in Business and Social Sciences, vol. 3(12), 2013,

pp. 576-618. 54. S. Tehseen, and T. Ramayah, “Entrepreneurial competencies and SMEs business success: The contingent role of external integration”,

Mediterranean Journal of Social Sciences, vol. 6(1), 2015, pp. 50-60.

55. T. Krasnicka, and T. Ingram, “Effects of innovation and their measurement in small and medium sized enterprises”, International Journal of Contemporary Management, vol. 12(3), 2013, pp. 50-65.

56. U. Lichtenthaler, and H. Ernst, “Developing reputation to overcome the imperfections in the markets for knowledge”, Research Policy,

vol. 36(1), 2007, pp. 37–55. 57. W. Stubbs, and C. Cocklin, “Conceptualizing a ‘sustainability business model”, Organization Environment, vol. 21(2), 2008, pp. 103–

127.

58. Y. W. Fan, and E. Ku, “Customer focus, service process fit and customer relationship management profitability: the effect of knowledge sharing”, The Service Industries Journal, vol. 30(2), 2010, pp. 203-223.

31.

Authors: P. Lakshmi Prasanna, D. Rajeswara Rao

Paper Title: Probabilistic Recurrent Neural Network for Topic Modeling

Abstract: Data storing, and retrieving is the most important task in the current situation. Storing can be done

based on the topic that the document describes. To know the topics, we have to classify the documents, to classify

we are using topic modeling. In this paper we proposed probabilistic recurrent neural network (PRORNN) gives

the most prominent result in the classification. it's a Recurrent neural network (RNN)-based language model

designed to directly capture the worldwide linguistics which means relating words during a document via latent

topics. owing to their consecutive nature, RNNs square measure smart at capturing the native structure of a word

sequence – each linguistics and syntactical – however would possibly face problem basic cognitive process long-

range dependencies. As recurrent neural network fails to remember large dependencies, we are using topic

modeling merged with probabilistic recurrent neural network which is called PRORNN. This PRORNN consists of

all the merits of RNN and latent topic models. Thus, it gives most accurate classification as the result. The

proposed PRORNN model integrates the merits of RNNs and latent topic models. In this paper we take the 20

news groups data set in that we take 2000 documents and we can labeled to two topics. to classify this 2000

documents and assigned 2 topics to for that documents and use the rnn package to execute recurrent neural

network in R Tool.

Keywords: PRORNN, Classification, Topic Modeling, local, RNN.

References: 1. Topicrnn: A Recurrent Neural Network With Long-Range Semantic Dependency By Adji B. Dieng, Chong Wang, Jianfeng Gao, John

Paisley.

2. Recurrent And Convolutional Neural Networks By Ji Young Lee, Franck Dernoncourt.

3. Neural Network Approach For Text Classification Usinf+G Relevance Factor As Term Weighted Method By Anuradha Patra And Divakar Singh.

4. Automatic Text Categerization Using Neural Networks By Mignel E.Ruiz.

5. Text Classification Using Artificial Neural Networks By Fraser Murray 6. Hierarchical Text Categorisation Based On Neural Networks And Dempster-Shafer Theory Of Evidence By Gertrud Jeschke And Mounia

Lalmas

7. Generative And Discriminative Text Classification With Recurrent Neural Networks By Dani Yogatama, Chris Dyer, Wang Ling, And Phil Blunsom.

8. Fuzzy Approach Topic Discovery In Health And Medical

9. Corpora By Amir Karami _ Aryya Gangopadhyay _ Bin Zhou _ Hadi Kharrazi 10. Discovering Scientific Influence Using Cross-Domain Dynamic Topic Modeling By Jennifer Sleeman, Milton Halem, Tim Finin, Mark

Cane 11. Textual Document Clustering Using Topic Models By Xiaoping Sun

12. Analysis Of Initialization Method On Fuzzy C-Means Algorithm Based On Singular Value Decomposition For Topic Detection By

Ichsani Mursidah, Hendri Murfi 13. Analyzing Sentiments In One Go: A Supervised Joint Topic Modeling Approach By

14. Zhen Hai, Gao Cong, Kuiyu Chang, Peng Cheng, And Chunyan Miao

15. Topic Models For Unsupervised Cluster Matching By Tomoharu Iwata, Tsutomu Hirao, And Naonori Ueda. 16. Bag-Of-Discriminative-Words (Bodw) Representation Via Topic Modeling By Yueting Zhuang, Hanqi Wang, Jun Xiao, Fei Wu, Yi

Yang,Weiming Lu, And Zhongfei Zhang.

17. Sequential Short-Text Classification With Recurrent And Convolutional Neural Networks By Ji Young Lee ,Franck Dernoncourt_ 18. An Unsupervised Cross-Lingual Topic Model Framework For Sentiment Classification By Zheng Lin, Xiaolong Jin, Xueke Xu,

Yuanzhuo Wang, Xueqi Cheng, Weiping Wang, And Dan Meng.

19. Trending Topic Discovery Of Twitter Tweets Using Clustering And Topic Modeling Algorithms By Ma. Shiela C. Sapul, Than Htike

Aung And Rachsuda Jiamthapthaksin.

20. Impact Of Topic Modelling Methods And Text Classification Techniques In Text Mining: A Survey By Mino George, P. Beaulah

Soundarabai, Karthik Krishnamurthi

165-168

Page 24: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

32.

Authors: Jayanti Mehra, RS Thakur

Paper Title: Probability Density Based Fuzzy C Means Clustering for Web Usage Mining

Abstract: The World Wide Web is huge repository and it is growing exponentially. It contains vast amount of

information which is growing and updating rapidly. Various organizations, institutes, government agencies and

service centers update their information regularly. The World Wide Web provides its services to the varieties of

web users. Web users may have different interests, needs and backgrounds. Clustering is one of the most important

tasks in the active areas of Web Usage Knowledge Discovery. It assures to handle the difficulty of information

overload on the Internet while many users are connected on the social media. Clustering is utilized for grouping

information into comparative access design for discovering client interest. There are two drawbacks of FCM

algorithm, firstly the requirements of no. of clusters c and secondly assigning the primary relationship matrix. Due

to these two drawbacks the FCM algorithm is hard to decide about the suitable no. of cluster and this algorithm is

insecure. The determination of desirable preliminary cluster is an important problem, therefore a new technique

called PDFCM algorithm is described.

Keywords: Clustering, FCM, Probability Based Fuzzy c means Clustering (PDFCM), Web Log Mining.

References: 1. A. Gupta and A. Khandekar, "Development of Weblog Mining Based on Improved Fuzzy C-Means Clustering Algorithm", International

Journal of Science, Engineering and Technology Research, Vol.5 (3), pp.688-693, March 2016.

2. A. Kapoor and A. Singhal, "A comparative study of K-Means, K-Means++ and Fuzzy C-Means clustering algorithms", In Proc. of 3rd International Conference on Computational Intelligence & Communication Technology, IEEE, pp. 1-6, 2017.

3. A. Zahid, A. V. Babuy, W Ahmed and M F Azeemz, "A fuzzy set theoretic approach to discover user sessions from web navigational

data", In Proc. of Recent Advances in Intelligent Computational Systems, IEEE, pp. 879-884, 2011. 4. B. Chandra, M. Gupta, and M.P. Gupta, "A multivariate time series clustering approach for crime trends prediction", In Proc of

International Conference on Systems, Man and Cybernetics, IEEE, pp. 892-896, 2008.

5. B. Maheswari and P. Sumathi, "A New Clustering and Preprocessing for weblog mining" In Proc. of World Congress on Computing and Communication Technologies, IEEE, pp. 25-29, 2014.

6. B. S. Shedthi, Shetty and M. Siddappa, "Implementation and comparison of K-means and fuzzy C-means algorithms for agricultural

data", In Proc. of International Conference on Inventive Communication and Computational Technologies, IEEE, pp. 105-108, 2017. 7. C. Baviskar and S. Patil, "Improvement of data object's membership by using Fuzzy K-Means clustering approach", In Proc. of

International Conference on In Computation of Power, Energy Information and Communication, IEEE, pp. 139-147, 2016.

8. C. T. Baviskar and S. S. Patil, "Improvement of data object's membership by using Fuzzy K-Means clustering approach", In Proc. of International Conference on Computation of Power, Energy Information and Communication (ICCPEIC)IEEE, pp. 139-147, 2016.

9. C. Yanyun, Q. Jianlin, G. Xiang, C. Jianping, J. Dan and C. Li, "Advances in research of Fuzzy c-means clustering algorithm", In Proc.

of International Conference on Network Computing and Information Security, IEEE, vol. 2, pp. 28-31, 2011. 10. Chen, Y.L. and Huang, C.K., “Discovering fuzzy time-interval sequential patterns in sequence databases”, IEEE Transactions on Systems,

Man and Cybernetics, Vol. 35(5), pp. 959-972, 2005. 11. D. Koutsoukos, G. Alexandridis, G. Siolas, and A. Stafylopatis, "A new approach to session identification by applying fuzzy c-means

clustering on weblogs", In Proc. of Symposium Series on Computational Intelligence, IEEE, pp. 1-8, 2016.

12. G. S. Chandel, K. Patidar and M. S. Mali, "A Result Evolution Approach for Web usage mining using Fuzzy C-Mean Clustering Algorithm", In Proc. of International Journal of Computer Science and Network Security, Vol.16(1). pp.135-140, 2016.

13. H. Gulat, and P. K. Singh, "Clustering techniques in data mining: A comparison", In Proc. of 2nd International Conference on Computing

for Sustainable Global Development, IEEE, pp.410-415, 2015. 14. H. X. Pei, Z. R. Zheng, C. Wang, C. Li, and Y. H. Shao, "D-FCM: Density based fuzzy c-means clustering algorithm with application in

medical image segmentation", Procedia Computer Science, Vol.122(1), pp. 407-414, 2017.

15. K. Suresh, R. M. Mohana, A. Rama Mohan Reddy, and A. Subramanyam, "Improved FCM algorithm for clustering on web usage mining." In Proc. of International Conference on Computer and Management, pp. 1-4. 2011.

16. P. Sampath and M. Prabhavathy, "Web Page Access Prediction Using Fuzzy Clustering by Local Approximation Memberships (Flame)

Algorithm”, Vol.10 (7), pp.3217-3220, 2006. 17. S. K. Dwivedi and B. Rawat, "A review paper on data preprocessing: A critical phase in web usage mining process", In Proc. of

International Conference on Green Computing and Internet of Things, IEEE, pp. 506-510, 2015.

18. V. Anitha and P. Isakki, "A survey on predicting user behavior based on web server log files in a web usage mining", In Proc. of International Conference on Computing Technologies and Intelligent Data Engineering, IEEE, pp. 1-4, 2016.

19. V. Chitraa, and A. S. Thanamani, "Weblog Data Analysis by Enhanced Fuzzy C Means Clustering”, International Journal on

Computational Sciences & Applications, Vol.4 (2), pp. 81-95, 2014. 20. Y. Hu, Chuncheng Y. Y. Zuo, and F. Qu, "A cluster validity index for fuzzy c-means clustering", In System Science, In Proc. of

International Conference on Engineering Design and Manufacturing Informatization (ICSEM) IEEE, vol. 2, pp. 263-266, 2011.

21. Z. Ansari, S. A. Sattar, A.V. Babu, and M. F. Azeem, “Mountain density-based fuzzy approach for discovering web usage clusters from

weblog data, Fuzzy Sets and Systems”, Vol.279 (1), pp.40-63, 2015.

169-173

33.

Authors: Bingu Rajesh, Puvvada Nagesh, Koppada Gowtham, Gorantla Vivek, N.Srinivasu

Paper Title: A New Scheme to Safeguard Data for Cloud Integrated Internet Things

Abstract: In our day-to-day life people use many electronic gadgets to control things around, which in turn

those things communicate with other things around and get the requested work done, this is Internet of Things. As

there would be enormous amount of data generated by Internet of Things why not we store it in cloud? Here, in

this paper, we discuss how to secure data for cloud integrated Internet of Things. In two main steps we can ensure

the data cannot be tampered. First, the CP-ABE (Cipher text Policy – Attribute Based Encryption) produces a

secret key and encrypts the data. The data can only be decrypted when the secret key is correctly produced. The

second way uses threshold cryptography where secret key is further encrypted by RSA and then generated key is

divided internally and giving to a group of users. Shared key can be produced only if all the authorized users come

together. Above proposed scheme not only provides confidentiality but also helps in reducing number of keys and

prevents unauthorized/malicious users to access our data.

Keywords: CP-ABE (Cipher text Policy – Attribute Based Encryption), Threshold cryptography, Confidentiality,

174-178

Page 25: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

Malicious users.

References: 1. Jiguo Li, Wei Yao, Yichen Zhang, Huiling Qian, and Jinguang Han, “Flexible and Fine-Grained Attribute-Based Data Storage in Cloud

Computing”, IEEE,2017.

2. Hongwei Li, Yuanshun Dai1, Ling Tian, “Identity based authentication for cloud computing”, Springer-Verlag Berlin Heidelberg.

3. Changji wang, Xuan Liu,Wentao Li,”Implementing a Personal Health Record Cloud Platform using Ciphertext-Policy Attribute Based

Encryption”, International Confercne on Intelleigent Networking and Collaborative Systems. 4. Threshold cryptography-based data security in cloud computing. IEEE International Conferenceon Computational Intelligence &

Communication Technology 2015.

5. A. Shamir. How to share a secret. Commun. ACM, 22, pp. 612-613, November 1979. 6. Ravleen Kaur, Pragya Kashmira, Kanak Meena, Dr. A.K.Mohapatra “Survey on Different Techniques of Threshold Cryptography”, IOSR

Journal of Electronics and Communication Engineering (IOSR-JECE).

7. Achieving efficient and secure data acquisition for cloud-supported IoT in smart grid, 2017 IEEE. 8. Secure Data Access in Cloud Computing, Sunil Sanka ,2010.

9. Jitender Grover1, Shikha 2, Mohit Sharma3, “Cloud Computing and Its Security Issues - A Review “, IEEE – 33044 , Dec 2015.

10. H. Zhong, and H. Zhen, An Efficient Authenticated Group Key Agreement Protocol,” Security Technology, 2007 41st Annual IEEE International Carnahan Conference on, vol., no., pp.250-254, 8-11 Oct. 2007.

34.

Authors: Pushpendra Kumar, Ramjeevan Singh Thakur

Paper Title: Early Detection of the Liver Disorder from Imbalance Liver Function Test Datasets

Abstract: Aim of this research is to develop a model for early detection of liver disorder from imbalance Liver

Function Test (LFT) results’ datasets that assists the practitioners in diagnosing the liver disease efficiently.

Because in the initial stage symptoms of the diseases are vague so the medical practitioners often fail to detect the

disease. This study used two datasets of Liver Function Test (LFT) for building the systems, one is ILPD dataset

(secondary) taken from UCI repository and second dataset (Primary) is collected form Madhya Pradesh region of

India. We have used Support Vector Machine and K-Nearest Neighbour (KNN) algorithms to implement the

system and Synthetic Minority Oversampling Technique (SMOTE) to balance the datasets. We have compared the

results of both the algorithm on the different parameter for both the imbalanced and balanced datasets. We get the

improved result for accuracy, specificity, precision, false positive rate (FPR) parameters on balanced datasets using

SVM whereas using KNN we get improve results for accuracy, specificity, sensitivity, FPR and FNR parameters

on balanced datasets. We can conclude that the proposed system gives the improve result on balance dataset on

most of the parameter. Proposed system helps the healthcare practitioners in diagnosing the liver disease efficiently

at the early stage.

Keywords: K Nearest Neighbor (KNN), Liver Function Test (LFT), SMOTE, Support Vector Machine (SVM).

References: 1. J. Han, J. Pei, and M. Kamber, Data mining: concepts and techniques. Elsevier, 2011. 2. M. Abdar, M. Zomorodi-Moghadam, R. Das, and I.-H. Ting, "Performance analysis of classification algorithms on early detection of liver

disease," Expert Systems with Applications, vol. 67, pp. 239-251, 2017.

3. M. Hassoon, M. S. Kouhi, M. Zomorodi-Moghadam, and M. Abdar, "Rule Optimization of Boosted C5. 0 Classification Using Genetic Algorithm for Liver disease Prediction," in Computer and Applications (ICCA), 2017 International Conference on, 2017, pp. 299-305:

IEEE.

4. K. Nagaraj and A. Sridhar, "NeuroSVM: A Graphical User Interface for Identification of Liver Patients," arXiv preprint arXiv:1502.05534, 2015.

5. J. Hopkins. (11/05/2018). Liver: Anatomy and Functions.

6. B. S. A. Benjamin Wedro. (11/05/2018). Liver Disease Facts. 7. K.-C. Cheng, W.-Y. Lin, C.-S. Liu, C.-C. Lin, H.-C. Lai, and S.-W. Lai, "Association of different types of liver disease with demographic

and clinical factors," Biomedicine, vol. 6, no. 3, 2016.

8. M. S. P. B. a. N. B. V. Bendi Venkata Ramana. Machine Learning Repository [Online]. 9. S. Bahramirad, A. Mustapha, and M. Eshraghi, "Classification of liver disease diagnosis: a comparative study," in Informatics and

applications (ICIA), 2013 second international conference on, 2013, pp. 42-46: IEEE.

10. M. ABDAR, "A survey and compare the performance of IBM SPSS modeler and rapid miner software for predicting liver disease by using various data mining algorithms," Cumhuriyet Science Journal, vol. 36, no. 3, pp. 3230-3241, 2015.

11. D. Alemayehu and M. L. Berger, "Big Data: transforming drug development and health policy decision making," Health services and

outcomes research methodology, vol. 16, no. 3, pp. 92-102, 2016. 12. S. N. N. Alfisahrin and T. Mantoro, "Data Mining Techniques for Optimization of Liver Disease Classification," in Advanced Computer

Science Applications and Technologies (ACSAT), 2013 International Conference on, 2013, pp. 379-384: IEEE.

13. A. Hammad and S. AbouRizk, "Knowledge discovery in data: A case study," Journal of Computer and Communications, vol. 2, no. 05, p. 1, 2014.

14. M. B. Priya, P. L. Juliet, and P. Tamilselvi, "Performance Analysis of Liver Disease Prediction Using Machine Learning Algorithms," 2018.

15. M. Abdar, N. Y. Yen, and J. C.-S. Hung, "Improving the Diagnosis of Liver Disease Using Multilayer Perceptron Neural Network and

Boosted Decision Trees," Journal of Medical and Biological Engineering, pp. 1-13, 2017. 16. X. Zhou, Y. Zhang, M. Shi, H. Shi, and Z. Zheng, "Early detection of liver disease using data visualisation and classification method,"

Biomedical Signal Processing and Control, vol. 11, pp. 27-35, 2014.

17. . V. Ramana, M. P. Babu, and N. Venkateswarlu, "A critical comparative study of liver patients from USA and INDIA: an exploratory analysis," International Journal of Computer Science Issues, vol. 9, no. 2, pp. 506-516, 2012.

18. S. Kant and I. A. Ansari, "An improved K means clustering with Atkinson index to classify liver patient dataset," International Journal of

System Assurance Engineering and Management, vol. 7, no. 1, pp. 222-228, 2016. 19. C. Cortes and V. Vapnik, "Support-vector networks," Machine learning, vol. 20, no. 3, pp. 273-297, 1995.

20. R. Saxena. (2017, 11/05/2018). SVM CLASSIFIER, INTRODUCTION TO SUPPORT VECTOR MACHINE ALGORITHM.

21. S. Ray. (2015 11/05/2018). Understanding Support Vector Machine algorithm. 22. R. Saxena. (2016, 11/05/2018). KNN CLASSIFIER, INTRODUCTION TO K-NEAREST NEIGHBOR ALGORITHM.

23. H. Patel and G. S. Thakur, "Classification of imbalanced data using a modified fuzzy-neighbor weighted approach," International Journal

of Intelligent Engineering and Systems, vol. 10, no. 1, pp. 56-64, 2017. 24. [24] H. Patel and G. S. Thakur, "Improved Fuzzy-Optimally Weighted Nearest Neighbor Strategy to Classify Imbalanced Data," 2017.

179-186

Page 26: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

25. [25] N. V. Chawla, K. W. Bowyer, L. O. Hall, and W. P. Kegelmeyer, "SMOTE: synthetic minority over-sampling technique," Journal of

artificial intelligence research, vol. 16, pp. 321-357, 2002.

26. H. He and E. A. Garcia, "Learning from imbalanced data," IEEE Transactions on knowledge and data engineering, vol. 21, no. 9, pp. 1263-1284, 2009.

27. Y. Xu, C. Wu, K. Zheng, X. Niu, and Y. Yang, "Fuzzy–synthetic minority oversampling technique: Oversampling based on fuzzy set

theory for Android malware detection in imbalanced datasets," International Journal of Distributed Sensor Networks, vol. 13, no. 4, p.

1550147717703116, 2017.

28. Z. Zheng, Y. Cai, and Y. Li, "Oversampling method for imbalanced classification," Computing and Informatics, vol. 34, no. 5, pp. 1017-

1037, 2016. 29. R. Das and A. Sengur, "Evaluation of ensemble methods for diagnosing of valvular heart disease," Expert Systems with Applications, vol.

37, no. 7, pp. 5110-5115, 2010.

30. J. Brownlee. (2016, 11/05/2018). Confusion Matrix in Machine Learning.

35.

Authors: Pankaj Kumar Sharma

Paper Title: Model for Detection and Prevention of MANET Anomalies

Abstract: MANET is a self-configured network of devices in wireless linked network, in an arbitrary topology.

Each node is an independent node, which can play a role of host, router & receiver. The connectivity is established

by operating system hosted on participating nodes. Routing algorithm establishes routes and forwarding

information as packets to and from source to sink station. Many routing techniques attempt to achieve optimal

performance, however modifications are still required in existing routing protocols to improve the performance of

MANET. An efficient MANET leads to fulfillment of three key performance metrics (PDR, AE2ED, and

Overhead). There exist some predominant anomalies in Mobile Ad-hoc Network in terms of above performance

metrics. Anomalies in MANET arise due to various environmental factors like variation in number of connections

among participating nodes, mobility of nodes, pause time of node, rate of data packet forwarded by nodes and total

density of nodes, adversely affecting its performance. In order to overcome some predominant anomalies, in this

research a systematic approach has been used to develop an intelligent system model, which controls the

performance adaptively.

Keywords: MANET, PDR, AE2ED, Overhead, Fuzzy

References: 1. V. Venkata Ramana et al., ” Bio Inspired Approach to Secure Routing in MANETs”, International Journal of Artificial Intelligence &

Applications (IJAIA), Vol.3, No.4, July 2012.

2. S. Umamaheswari and G. Radhamani,” An Improved ACO Based Algorithm for EnhancingPerformance in Wireless Adhoc Network”,

American Journal of Scientific Research ;ISSN 1450-223X Issue 54 (2012), pp. 68-80; © EuroJournals Publishing, Inc. 2012 ;

3. Jun-Zhao Sun, Mobile Ad Hoc Networking: An Essential Technology for pervasive Computing Mediate team, Machine Vision and

Media Processing unit ,info Tech Unit, InfoTech Oulu P.O.Box 4500, FIN-90014 University of Oulu, Finland.

4. Caixia li, Sreenatha Gopalarao Anavatti and Tapabrata Ray, “ Analytical Hierarchy Process using Fuzzy Inference Techniques for

real – time route Guidance system , IEEE Transaction on Intelligent Transportation Systems , vol 15 No 1 February 2014

5. C.-K Toh, Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad hoc Networks‖, , 2001

,IEEE.

6. R. L. Flood and M.C. Jackson , "Creative problem solving". John Wiley and Sons, Chichester, (1991), ISBN 0-471-93052-0.

7. Siddesh Gundagatti Karibasappa , K.N Muralidhara, “ Neuro Fuzzy Based Routing International Conference on

Industrial and Information Systems, ICIIS 2011, Aug. 16 19, 2011 IEEE

8. Dr .C. Suresh Gnana Dhass and N. Kumar, Power Aware Routing protocols in in Mobile Ad hoc Networks-Survey, International

Journal of advanced research in Computer Science and Software Engineering, 2012,Vol. 2, Issue 9.

9. N. Battat and H. Kheddouci, “HMAN: Hierarchical Monitoring for Ad Hoc Network,” in IEEE/IFIP EUC, 2011.

10. K. Kwak, G. Huerta-Canepa, Y. Ko, D. Lee, and S. J. Hyun, “An Overlay-Based Resource Monitoring Scheme for Social Applications in

MANET,” in IEEE COMPSAC, 2009.

11. K. Ramachandran, E. Belding-Royer, and K. Almeroth, “DAMON: A Distributed Architecture for Monitoring Multi-hop Mobile

Networks,” in IEEE SECON, 2004.

12. R. Riggio, M. Gerola, D. Miorandi, A. Zanardi, and F. Jan, “A Distributed Network Monitoring Framework for Wireless Networks,” in

IFIP/IEEE IM, 2011.

13. K. Graffi, D. Stingl, J. Rueckert, A. Kovacevic, and R. Steinmetz, “Monitoring and Management of Structured Peer-to-Peer Systems,” in

IEEE P2P, 2009.

14. M. Jelasity, A. Montresor, and O. Babaoglu, “Gossip-Based Aggregation in Large Dynamic Networks,” ACM Transactions on Computer

Systems, vol. 23, no. 3, pp. 219–252, 2005.

15. R. van de Bovenkamp, F. Kuipers, and P. Van Mieghem, “Gossip-based Counting in Dynamic Networks,” in IFIP NETWORKING,

2012.

16. P. Yalagandula and M. Dahlin, “A Scalable Distributed Information Management System,” ACM SIGCOMM Computer Communication

Review, vol. 34, no. 4, pp. 379–390, 2004.

17. Muhammad Aamir_ and Mustafa A. Zaidi, A Buffer Management Scheme for Packet Queues in MANET, TSINGHUA SCIENCE AND

TECHNOLOGY ISSNll1007- 0214ll01/10llpp543-553 Volume 18, Number 6, December 2013

18. Anita Yadav • Y. N. Singh • R. R. Singh, Improving Routing Performance in AODV with Link Prediction in Mobile Adhoc Networks,

Wireless PersCommun DOI 10.1007/s11277-015-2411-5, Springer Science+Business Media New York 2015.

19. ShariqMahmood Khan • R. Nilavalan • Abdulhafid F. Sallama, A Novel Approach for Reliable Route Discovery in Mobile Ad-Hoc

Network, Wireless PersCommun DOI 10.1007/s11277-015-2461-8, Springer Science+Business Media New York 2015. Networks, ACM

MSWIM’04, October 4–6, 2004, Venezia, Italy.

187-191

36.

Authors: Geeta Chhabra, VasudhaVashisht, Jayanthi Ranjan

Paper Title: Improving Accuracy For Cancerclassification With Gene Selection

Abstract: The article presents a detail overview of different classification techniques for colon cancer prediction 192-199

Page 27: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

by gene expression dataand evaluated their performance based on classification accuracy, computational time

&proficiency to reveal gene information. The gene selection methods have been introduced also and evaluated

with respect to their statistical significance to cancer classifier.The purpose is to build a multivariate model for

tumour classification with genetic algorithm.The multivariate models were constructed using nearest centroid, k-

nearest neighbours, support vector machine, maximum likelihood discriminant functions, neural networks and

random forest classifiers combined with genetic algorithm applied to the colon cancer publicly available dataset.It

has been observed from the experimental analysis that Maximum Likelihood Discriminant Functions (MLHD)

performs better and accuracy has been further been improved by using most frequent genes using the forward

selection method. Also, maximum likelihood discriminant functions are cost effective and faster than neural

networks (NNET), nearest centroid (Nearcent) and random forest (RF). Thus, the experiments show that

classification accuracy is affected with the selection of genes that contributes to the accuracy of the model. It will

remove the irrelevant genes thus will reduce the size and make the algorithm fast.

Keywords: data mining; genetic algorithm; machine learning algorithms.

References: 1. AdamsL. J., BelloG. A., Dumancas G.Development and Application of a Genetic Algorithm for Variable Optimization and Predictive

Modeling of Five-Year Mortality Using Questionnaire Data.Bioinformatics and Biology Insights.2015;3(3):31-41.

2. Amancio D.R., Comin C.H., Casanova D., Travieso G., Bruno O.M., Rodrigues, A.F., Costa L. F. A Systematic Comparison of

Supervised Classifiers. PLoS ONE. 2014; 9(4): e94137. Available from Doi:10.1371/journal.pone.0094137 3. Bennet J., Ganaprakasam C.,Kumar N. A. Hybrid Approach for Gene Selection and Classification using Support Vector Machine. The

International Arab Journal of Information Technology. 2015;12(6A):695-700.

4. Bhola A., Tiwari A. K. Machine Learning Based Approaches for Cancer Classification Using Gene Expression Data. Machine Learning and Applications:An International Journal.2015;2(3/4). Available from DOI:10.5121/mlaij.2015.2401.

5. Chen H., Zhao H., Shen J., Zhou R., Zhou Q. Supervised Machine Learning Model for High Dimensional Gene Data in Colon Cancer

Detection. IEEE International Congress on Big Data.2015;134-141. 6. Dagliyan O.,Uney-YuksektepeF., Kavakli IH, Turkay M. Optimization Based Tumor Classification from Microarray Gene Expression

Data. PLoS ONE. 2011; 6(2). Available from https://doi.org/10.1371/journal.pone.0014579.

7. Galván-TejadaC., Zanella-Calzada L., Galván-Tejada J., Celaya-Padilla J.M., Gamboa-Rosales H., Garza-Veloz I., Martinez-Fierro M.L. Multivariate Feature Selection of Image Descriptors Data for Breast Cancer with Computer-Assisted Diagnosis. Diagnostics.

2017;7(1):9.Available from https://doi.org/10.3390/diagnostics7010009

8. Guia J. M. De, Devaraj M. Analysis of Cancer Classification of Gene Expression Data: A Scientometric Review. International Journal of Pure and Applied Mathematics. 2018; 119(12):12505-12513.

9. Kourou K., Exarchos T. P., Exarchos K. P., Karamouzis M. V., Fotiadis D. I. Machine learning applications in cancer prognosis and

prediction. Computational and Structural Biotechnology Journal.2014; 13:8-17. 10. Lu Y., Han J., Cancer classification using gene expression data.Information Systems. 2003; 28: 243–268.

11. Maher B. A., Mahmoud A. M., El-Horbaty El-S., SalemM. Abdel-B. Classification of Two Types of Cancer Based on Microarray Data.

Egyptian Computer Science Journal. 2014; 38(2):56-66. 12. Merk S.colonCA: exprSet for Alon et al. (1999) colon cancer data. R package version 1.22.0. 2018.

13. Moorthy K., Mohamad M. S., Deris S. A Review on Missing Value Imputation Algorithms for Microarray Gene Expression Data.Current

Bioinformatics.2014;9:18-22. 14. Mashhour M. E.,Houby E.M.F, Wassif T. K.,Salah A.I. Survey on different Methods for Classifying Gene Expression using Microarray

Approach. International Journal of Computer Applications.2016; 150(1):12-21.

15. Novakovic J. Dj., Veljovic A., Ilic S.S., Papic Z., Tomovic M. Evaluation of Classification Models in Machine Learning. Theory and Applications of Mathematics & Computer Science. 2017; 7(1):39 – 46.

16. Reena S. G., Rajeswari P. A Survey of Human Cancer Classification using Micro Array Data. International Journal of Computer

Technology and Applications. 2011; 2 (5):1523-1533. 17. Siang T. C., Soon T.W., Kasim S., Mohamad M. S., Howe C. W., Deris S.,Zakaria Z., Shah A.Z., Ibrahim Z. A review of cancer

classification software for gene expression data. International Journal of Bio-Science and Bio-Technology.2015;7(4):89-108. 18. Tarek S., Elwahab R. A., Shoman M. Gene expression-based cancer classification. Egyptian Informatics Journal.2016; 18:151-159.

19. Trevino V., Falciani F.GALGO:An R package for Genetic Algorithm Searches. Bioinformatics.2006.

20. Torrente A., Lukk M., Xue V., Parkinson H., RungJ., Brazma A. Identification of Cancer Related Genes Using a Comprehensive Map of Human Gene Expression. PLOS ONE. 2016;11(6):1-20. Available from DOI:10.1371/journal.pone.0157484.

21. Venkatesan E.V., Velmurugan T.Performance Analysis of Decision Tree Algorithms for Breast Cancer Classification. Indian Journal of

Science and Technology.2015;8(29). Available from DOI: 10.17485/ijst/2015/v8i29/84646. 22. Worrawat E., Chan J.H. Apriori gene set-based microarray analysis for disease classification using unlabeled data. Procedia Computer

Science. 2013; 23:137-145.

23. Zhang H., Wang H., Dai Z., Chen M.,Chen M.S., Yuan Z. Improving accuracy for cancer classification with a new algorithm for genes

selection. BMC Bioinformatics.2012;13:298. Available from https://doi.org/10.1186/1471-2105-13-298.

24. Meyer D., DimitriadouE., Hornik K., WeingesselA., LeischF. e1071: Misc Functions of the Department of Statistics, Probability

TheoryGroup. 2017. Available fromhttps://CRAN.R-project.org/package=e1071.

37.

Authors: Venkatesh. P, R Sivaprakasam.

Paper Title: Studies on the Effect of Turning Operation on Mean Cutting Force and Cutting Power of AISI 3415

Alloy Steel

Abstract: This exploration is conceded to reveal the outcome of machining factors such as cutting velocity,

depth of cut and feed rate on the mean cutting force and the cutting power on turning AISI 3415 cylindrical steel

alloy components. The experiments are planned based on the (33) full factorial design and conducted on an All

Geared Lathe with TiN coated cutting tool insert of 0.8mm nose radius, simultaneously cutting forces such as feed

force, thrust force and tangential force are observed using a calibrated lathe tool dynamometer adapted in the tool

holder. A mathematical expression representing mean cutting force and cutting power is created by means of non-

linear regression examination. The outcome of each machining factors on the mean cutting force and the cutting

power is studied and presented accordingly.

Keywords: AISI 3415 steel alloy; Cutting force; Cutting power; Full factorial design; Lathe; Regression analysis

References:

200-204

Page 28: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

1. Tomé, L.I., Baião, V., da Silva, W. and Brett, C.M., 2018. Deep eutectic solvents for the production and application of new

materials. Applied Materials Today, 10, pp.30-50.

2. Selvam, M.D., Senthil, P. and Sivaram, N.M., 2017. Parametric optimisation for surface roughness of AISI 4340 steel during turning under near dry machining condition. International Journal of Machining and Machinability of Materials, 19(6), pp.554-569.

3. Hassanalian, M. and Abdelkefi, A., 2017. Classifications, applications, and design challenges of drones: A review. Progress in Aerospace

Sciences, 91, pp.99-131.

4. Selvam, M.D. and Senthil, P., 2016. Investigation on the effect of turning operation on surface roughness of hardened C45 carbon

steel. Australian Journal of Mechanical Engineering, 14(2), pp.131-137.

5. Salamati, M., Soltanpour, M., Fazli, A. and Zajkani, A., 2018. Processing and tooling considerations in joining by forming technologies; part A—mechanical joining. The International Journal of Advanced Manufacturing Technology, pp.1-55.

6. Dennison, M.S., Sivaram, N.M. and Meji, M.A., 2018. A Comparative Study on the Tool-Work Interface Temperature Observed during

the Turning Operation of AISI 4340 Steel in Flooded, Near Dry, and Dry, Machining Conditions. i-Manager's Journal on Future Engineering and Technology, 13(4), p.34.

7. DENNISON, M.S. and MEJI, M.A., 2018. A Comparative Study on the Surface Finish Achieved During Face Milling of AISI 1045 Steel

Components. i-Manager's Journal on Mechanical Engineering, 8(2), p.18. 8. Stephenson, D.A. and Agapiou, J.S., 2016. Metal cutting theory and practice. CRC press.

9. Selvam, M.D., Dawood, D.A.S. and Karuppusami, D.G., 2012. Optimization of machining parameters for face milling operation in a

vertical CNC milling machine using genetic algorithm. IRACST-Engineering Science and Technology: An International Journal (ESTIJ), 2(4).

10. Selvam, M.D. and Sivaram, N.M., 2017. The effectiveness of various cutting fluids on the surface roughness of AISI 1045 steel during

turning operation using minimum quantity lubrication system. i-Manager's Journal on Future Engineering and Technology, 13(1), p.36. 11. Selvam, M.D., Srinivasan, V. and Sekar, C.B., 2014. An Attempt To Minimize Lubricants In Various Metal Cutting

Processes. International Journal of Applied Engineering Research, 9(22), pp.7688-7692.

12. Selvam, M.D. and Sivaram, N.M., 2018. A comparative study on the surface finish achieved during turning operation of AISI 4340 steel in flooded, near-dry and dry conditions. Australian Journal of Mechanical Engineering, pp.1-10.

13. Khorasani, A.M., Gibson, I., Goldberg, M., Nomani, J. and Littlefair, G., 2016. Machinability of Metallic and Ceramic Biomaterials: A

review. Science of Advanced Materials, 8(8), pp.1491-1511. 14. Thakur, A., Gangopadhyay, S., Maity, K.P. and Sahoo, S.K., 2016. Evaluation on effectiveness of CVD and PVD coated tools during dry

machining of Incoloy 825. Tribology Transactions, 59(6), pp.1048-1058.

15. Bhattacharya, A., Das, S., Majumder, P. and Batish, A., 2009. Estimating the effect of cutting parameters on surface finish and power consumption during high speed machining of AISI 1045 steel using Taguchi design and ANOVA. Production Engineering, 3(1), pp.31-40.

16. Aggarwal, A., Singh, H., Kumar, P. and Singh, M., 2008. Optimizing power consumption for CNC turned parts using response surface

methodology and Taguchi's technique—a comparative analysis. Journal of materials processing technology, 200(1-3), pp.373-384. 17. Nur, R., Noordin, M.Y., Izman, S. and Kurniawan, D., 2017. Machining parameters effect in dry turning of AISI 316L stainless steel

using coated carbide tools. Proceedings of the Institution of Mechanical Engineers, Part E: Journal of Process Mechanical

Engineering, 231(4), pp.676-683. 18. Cakir, M.C., Ensarioglu, C. and Demirayak, I., 2009. Mathematical modeling of surface roughness for evaluating the effects of cutting

parameters and coating material. Journal of materials processing technology, 209(1), pp.102-109.

19. Asiltürk, I., Neşeli, S. and Ince, M.A., 2016. Optimisation of parameters affecting surface roughness of Co28Cr6Mo medical material during CNC lathe machining by using the Taguchi and RSM methods. Measurement, 78, pp.120-128.

38.

Authors: Nadeem Gulzar Shahmir, Manzoor Ahmad Tantray

Paper Title: Life Cycle Cost Analysis of Translucent Concrete

Abstract: Translucent concrete permits the daylight specifically to go starting with one of its end then onto the

next end. This is to be finished by embedding plastic optical filaments in concrete which is chiefly utilized for

correspondence reason and the optical strands take a shot at the premise of Nano optics; in this paper cost

examination on execution of translucent concrete in room (translucent concrete room) is talked about. The

examination depends on the estimations and analyses, computations are done on the suppositions that plastic

optical filaments of 2mm width are utilized in the room having specific measurements. By using these plastic

optical filaments in concrete was checked for the expense as well as checked for the light force going crosswise

over casted concrete blocks. Lux meter was utilized for estimating power of light and sizes of (150mm x 150mm)

(22500mm sq. surface zone) with thickness of 75mm solid 3D shapes was cast to check the outcomes. By utilizing

translucent concrete in room won't just keep up the quality of the room yet will likewise enable the light to go into

the room bringing about immense measure of vitality sparing and giving different advantages of daylight. Base on

the presumptions of utilizing these casted cuboids in the room the last expense of the room was determined and

was contrasted with the expense of regular room and last outcomes rely upon the measure of vitality that gets

spared by utilizing translucent concrete in room and different advantages of utilizing translucent concrete in room

and it was found to be economical and energy efficient source to utilize translucent concrete in rooms or buildings.

Keywords: Translucent solid, plastic optical filaments, lux meter, daylight, vitality sparing, concrete samples,

translucent concrete room..

References: 1. Experimental Analysis of Translucent Concrete by using Optical Fibres by Nikhil, Umer farooq, Silal ahmed, Juraige, Shabeeba omar

march 2016 SSRG International Journal of Civil Engineering. 2. Computational Modelling of Translucent Concrete Panels by Aashish Ahuja; Khalid M. Mosalam and Tarek I. Zohdi in November 2014

journal of architectural engineering.

3. Analysis of Transparent Concrete as an Innovative Material Used in Civil Engineering by Monika Zielińska, Albert Ciesielski in 2018 IOP Conference Series: Materials Science and Engineering.

4. Experimental study of light transmitting concrete by Abdulmajeed altomate, Faisal Alatshan , Mohmad Jadan in 2016 International

Journal of Sustainable Building Technology and Urban Development. 5. Translucent Concrete: Test of Compressive Strength and Transmittance A Karandikar N. Virdhi A. Deep.

6. Effect of Plastic Optical Fibre on Some Properties of Translucent Concrete by Dr. Shakir Ahmed Salih, Dr. Hasan Hamodi Joni , Safaa

Adnan Mohamed in November 2014 Eng. &Tech. Journal, Vol. 32, Part (A), No.12, 2014 7. Compressive strength of translucent concrete by Salmabanu Luhar, Urvashi Khandelwal in Sept 2015 International Journal of

Engineering Sciences & Emerging Technologies

8. Litracon by Shreyas.K in Sept 2018 International Journal of New Technologies in Science and Engineering. 9. Translucent concrete: Test of compressive strength and transmittance by A. Karandikar in 2015 International journal of engineering

205-207

Page 29: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

research and technology

10. Experimental Study of Light Transmitting Concrete Using Optical Fibre by Sachin Sahu, Amlan Kumar Sahoo, Aman Kumar Singhal,

Kuramana Stephen, Tamo Talom, Subham Saroj Tripathy, Sidhant Das in 2018 11. Experimental Evaluation on Light Transmittance Performance of Translucent Concrete by Awetehagn Tuaum, Stanley Muse Shitote and

Walter Odhiambo Oyawa in 2018 international journal of applied engineering research.

12. A novel translucent concrete panel with waste glass inclusions for architectural applications by Valerio R.M. Lo Verso, Simonetta L.

Pagliolico and Laura Ligi in july 2015 the indian concrete journal.

13. Evaluation of The Mechanical Properties of Translucent Concrete by Dr. Shakir Ahmed Salih , Dr. Hasan Hamodi Jonj , Safaa Adnan

Mohamad in april 2018 International Journal of Engineering Trends and Technology (IJETT) 14. Study of Translucent Glass Concrete by Sisira Sugunan , Nisha Babu, Sowparnika M. in 2016 IOSR Journal of Mechanical and Civil

Engineering

39.

Authors: Mohd Azlishah Othman, Abd Shukur Jaafar, Nurmala Irdawaty Hassan

Paper Title: Development of Broadband EMF Sensors for Energy Harvesting using RF and Microwave Signals

Abstract: Telecommunication Tower has been built for giving the wide coverage on UHF for communication

devices. The radiation power from the tower gives awareness that radiation by the cellular tower might affect the

human health. Hence, this contribution leads to invention of EMF Meter exists specifically focus on power

radiation which is known as RF power meter. The RF power meter is use to detect broadband frequency of UHF in

ranging from 300 MHz to 3 GHz radiation power. Within the UHF range, Radio Energy Harvesting technology

was introduced. This gives the innovative opportunity of Radio Energy harvesting application on RF power meter.

By combining both technologies, the RF power meter could detect the power radiation while harvesting RF energy

at the same time. The solution provide on having devices able to power up with less consumption on power supply.

In this project, RF power meter was programmed by Arduino and RF energy harvesting was designed. The RF

power meter able to achieve 98.6% accuracy and at the input power level of -10 dBm, the measured result shows a

RF to DC conversion efficiency achieving 63.3% with the corresponding DC output voltage of 2.11 V.

Keywords: About; Broadband EMF Sensor, Harvest RF Energy, 1.8 GHz to 2.4 GHz, Voltage Multiplier

Circuit.

References: 1. Flint, X. Lu, N. Privault, D. Niyato, and P. Wang, “Performance Analysis of Ambient RF Energy Harvesting with Repulsive Point

Process Modeling,” pp. 1–21, 2015.

2. X. Lu, P. Wang, D. Niyato, D. I. Kim, and Z. Han, “Wireless Networks with RF Energy Harvesting: A Contemporary Survey,” vol. 17,

no. 2, pp. 757–789, 2014. 3. Q. M. Bashayreh, A. a. Omar, and A. M. Alshamali, “The effect of RF radiation on human health using stratified human head model,”

2010 IEEE Radar Conf., pp. 178–182, 2010.

4. Ahmad, R. Ariffin, N. M. Noor, and M. A. Sagiruddin, “1.8 GHz Radio Frequency signal radiation effects on human health,” 2011 IEEE Int. Conf. Control Syst. Comput. Eng., pp. 546–550, 2011.

5. G. Kumar and I. I. T. Bombay, “Cell Phone / Tower Radiation Hazards & Solutions,” no. July, 2012.

6. M. M. Dawoud, “High Frequency Radiation and Human Exposure,” no. October, pp. 1–7, 2003. 7. T. Le, K. Mayaram, and T. Fiez, “Efficient far-field radio frequency energy harvesting for passive powered sensor networks,” IEEE J.

Solid-State Circuits, vol. 43(5), no. 5, pp. 1287–1302, 2008.

8. H. Kanaya, “Multi-Band Miniaturized Slot Antenna with Multi-Band Impedance Matching Circuit,” vol. 0, pp. 551–554, 2014. 9. B. Dixon, “Radio Frequency Energy Harvesting,” pp. 2–3, 2014.

10. X. Lu, P. Wang, D. Niyato, and Z. Han, “Resource Allocation in Wireless Networks with RF Energy Harvesting and Transfer,” no.

December, pp. 68–75, 2014. 11. N. Degrenne et al., “Self-Starting DC : DC Boost Converter for Low-Power and Low-Voltage Microbial Electric Generators To cite this

version : Self-Starting DC : DC Boost Converter for Low-Power and Low-Voltage Microbial Electric Generators,” Ecce, pp. 889–896,

2011. 12. Q. Yuan and S. Suzuki, “B-21-2 Exact Approach to Design Matching Circuit with Element Ohmic Loss,” vol. 2, no. 3, p. 2016, 2016.

13. S. S. Chouhan and K. Halonen, “A modified cross coupled rectifier based charge pump for energy harvesting using RF to DC

conversion,” Circuit Theory Des. (ECCTD), 2013 Eur. Conf., no. 1, pp. 1–4, 2013. 14. J. Emery, “Cockcroft-Walton Voltage Multiplier,” pp. 1–8, 2013.

15. N. M. Waghamare and R. P. Argelwar, “High Voltage Generation by using Cockcroft-Walton Multiplier,” vol. 4, no. 2, pp. 256–259,

2015. 16. R. Thakare, S. B. Urkude, and R. P. Argelwar, “Analysis of Cockcroft - Walton Voltage Multiplier,” vol. 5, no. 3, pp. 3–5, 2015.

17. P. Rengalakshmi, “Rectifier for RF Energy Harvesting,” vol. 143, no. 10, pp. 14–17, 2016.

18. Michelon et al., “Performance Analysis of Ambient RF Energy Harvesting with Repulsive Point Process Modeling,” 2016 17th Int. Symp. Antenna Technol. Appl. Electromagn. ANTEM 2016, vol. 17, no. 5, pp. 5–6, 2016.

19. Khansalee, Y. Zhao, and E. Leelarasmee, “A Dual-Band Rectifier for RF Energy Harvesting Systems,” pp. 0–3, 2014.

20. Chaour, S. Bdiri, A. Fakhfakh, and O. Kanoun, “Modified Rectifier Circuit for High Efficiency and Low Power RF Energy Harvester,” pp. 619–623.

21. P. Haddad, S. Member, G. Gosset, and J. Raskin, “Automated Design of a 13 . 56 MHz 19 µ W Passive Rectifier With 72 % Efficiency Under 10 µ A load,” vol. 51, no. 5, pp. 1290–1301, 2016.

22. C. Liou, S. Member, M. Lee, and S. Huang, “High-Power and High-Ef fi ciency RF Recti fi ers Using Series and Parallel Power-Dividing

Networks and Their Applications to Wirelessly Powered Devices,” vol. 61, no. 1, pp. 616–624, 2013. 23. V. Kuhn, C. Lahuec, F. Seguin, and C. Person, “A Multi-Band Stacked RF Energy Harvester With RF-to-DC Efficiency Up to 84 %,”

vol. 63, no. 5, pp. 1768–1778, 2015.

24. Michelon, E. Bergeret, A. Di Giacomo, and P. Pannier, “RF Energy Harvester with Sub-threshold Step-up Converter,” 2016.

208-211

40.

Authors: Yogesh Kumar, Rahul Rishi

Paper Title: A Robust Pattern Based Re-engineering Model Guided by MODA and ELM for Software Testing

Effort Estimation

Abstract: Software Testing Effort (STE) plays a big role in code development method that highly contributes

in complete development effort. Reducing the testing effort while not altering the standard/quality of the final code

is always imperative; thus, STE measure is incredibly essential to conduct code testing method in associate

economical manner. In this paper, a MODA aided Pattern based re-engineering (PBRE) model has been proposed

for the selection of desirable number of projects with their respective features from within company and cross-

212-218

Page 30: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

company projects. The five input features selected by the MODA for Software Testing Effort (STE) estimation

prior to development are Project Duration, Development Personnel, Test Cases, Function Points and Project Cost.

We subjected the selected projects and features to train an ELM model for estimating STE using the k-fold cross

validation approach. Outcomes shows that the anticipated model for estimating STE from cross-company projects

and within-company projects yielded similar results to actual effort.

Keywords: Software Testing Effort (STE), Multi-objective Dragonfly algorithm (MODA), Pattern based

reengineering (PBRE), Extreme Learning Machine (ELM), Root Means Square Estimation (RMSE).

References: 1. Chemuturi M, “Mastering software quality assurance: best practices, tools and techniques for software developers”, 2010. 2. Bardsiri VK, Jawawi DN, Hashim SZ, Khatibi E, “Increasing the accuracy of software development effort estimation using projects

clustering”, IET software,Vol.6,No.6,pp.461-473,2012.

3. Benestad HC, Anda B, Arisholm E, “Understanding cost drivers of software evolution: a quantitative and qualitative investigation of change effort in two evolving software systems”, Empirical Software Engineering, Vol.15, No.2, pp.166-203, 2010.

4. Pai DR, McFall KS, Subramanian GH, “Software effort estimation using a neural network ensemble”, Journal of Computer Information

Systems, Vol.53, No.4, pp.49-58, 2013. 5. Jorgensen M, Shepperd M, “A systematic review of software development cost estimation studies”, IEEE Transactions on software

engineering, Vol.33, No.1, pp.33-53, 2007.

6. Jorgensen M, Shepperd M, “A systematic review of software development cost estimation studies”, IEEE Transactions on software engineering, Vol.33, No.1, pp.33-52, 2007.

7. Seyedali Mirjalili, “Dragonfly algorithm : a new meta-heuristic optimization technique for solving single-objective, discrete, and multi-

objective problems”, Neural Computing and Application, Vol. 27, Issue 4, pp 1053-1073, May-2016. 8. Hieu, Trung, Huynh, Yonggwan and Won, “Regularized online sequential learning algorithm for single-hidden layer feedforward neural

networks”, Pattern Recognition Letters, Volume 32, Issue 14, 15 October 2011, Pages 1930-1935.

9. WeiweiZong, Guang-BinHuang and Yiqiang Chen, “Weighted extreme learning machine for imbalance learning”, Neurocomputing, Volume 101, 4 February 2013, Pages 229-242.

10. Zhifei, Shao and Meng Joo, “An online sequential learning algorithm for regularized Extreme Learning Machine”, Neurocomputing,

Volume 173, Part 3, 15 January 2016, Pages 778-788. 11. Yogesh Kumar, Rahl Rishi, “Dragonfly algorithm guided extreme learning machine based prediction model for software testing effort

estimation”, in Journal of advanced research in dynamical and control system, Special Issue-07, 2018. Pp. 1948-1958.

12. Yogesh Kumar, “Comparative analysis of software size estimation techniques in project management”, in International journal for research in applied science & engineering technology, Vol. 5, Issue VIII, Aug-2017. Pg 1470-1477.

13. Tannu, Yogesh Kumar, “Comparative Analysis of Different Software Cost Estimation Methods”, International Journal of Computer

Science and Mobile Computing, Volume 3, Issue 6, 04 July 2014, pg.547-557.

41.

Authors: Rajarajan.S, Sivaprakasam.R

Paper Title: Optimisation of Machining Factors for Surface Roughness and Mean Cutting Force of AISI 52100 Steel

During Turning Under Microlubrication Condition

Abstract: This research work is conducted inorder to find the best practicable turning factors to achieve enhanced

surface quality cylindrical AISI52100 steel components under microlubrication condition. The turning operation is

performed in a turning centre (All Geared Lathe) with CBN insert of 0.8mm nose radius. The turning factors

namely feed rate, cutting velocity and depth of cut are preferred to accomplish the experimentation based on

Taguchi’s L25(53) orthogonal array, simultaneously the cutting forces such as feed force, tangential force and

thrust force are observed using a calibrated lathe tool dynamometer adapted in the tool holder. The surface

roughness of the turned steel alloy components is deliberated by means of a precise surface roughness apparatus. A

prediction model in lieu of average surface roughness and mean cutting force is created by means of nonlinear

regression examination with the aid of MINITAB software. The most favorable machining settings for surface

roughness and mean cutting force are recognized by Taguchi’s method and verified with a confirmation trial.

Keywords: AISI52100; Microlubrication condition; Surface roughness; Cutting force; Lathe; Regression

analysis; Taguchi method.

References: 1. Ali, S.M., Dhar, N.R. and Dey, S.K., 2011. Effect of minimum quantity lubrication (MQL) on cutting performance in turning medium

carbon steel by uncoated carbide insert at different speed-feed combinations. Advances in Production Engineering & Management, 6(3).

2. Selvam, M.D. and Senthil, P., 2016. Investigation on the effect of turning operation on surface roughness of hardened C45 carbon steel. Australian Journal of Mechanical Engineering, 14(2), pp.131-137.

3. Leppert, T., 2011. Effect of cooling and lubrication conditions on surface topography and turning process of C45 steel. International

Journal of Machine Tools and Manufacture, 51(2), pp.120-126. 4. Sharma, A.K., Tiwari, A.K. and Dixit, A.R., 2016. Effects of Minimum Quantity Lubrication (MQL) in machining processes using

conventional and nanofluid based cutting fluids: A comprehensive review. Journal of Cleaner Production, 127, pp.1-18.

5. Selvam, M.D., Dawood, D.A.S. and Karuppusami, D.G., 2012. Optimization of machining parameters for face milling operation in a vertical CNC milling machine using genetic algorithm. IRACST-Engineering Science and Technology: An International Journal

(ESTIJ), 2(4).

6. Dennison, M.S., Sivaram, N.M. and Meji, M.A., 2018. A Comparative Study on the Tool-Work Interface Temperature Observed during the Turning Operation of AISI 4340 Steel in Flooded, Near Dry, and Dry, Machining Conditions. i-Manager's Journal on Future

Engineering and Technology, 13(4), p.34.

7. Selvam, M.D. and Sivaram, N.M., 2017. The effectiveness of various cutting fluids on the surface roughness of AISI 1045 steel during turning operation using minimum quantity lubrication system. i-Manager's Journal on Future Engineering and Technology, 13(1), p.36.

8. Kurgin, S., Dasch, J.M., Simon, D.L., Barber, G.C. and Zou, Q., 2012. Evaluation of the convective heat transfer coefficient for

minimum quantity lubrication (MQL). Industrial Lubrication and Tribology, 64(6), pp.376-386. 9. Selvam, M.D., Srinivasan, V. and Sekar, C.B., 2014. An Attempt To Minimize Lubricants In Various Metal Cutting

Processes. International Journal of Applied Engineering Research, 9(22), pp.7688-7692. 10. Debnath, S., Reddy, M.M. and Yi, Q.S., 2014. Environmental friendly cutting fluids and cooling techniques in machining: a

review. Journal of cleaner production, 83, pp.33-47.

11. Dureja, J.S., Singh, R. and Bhatti, M.S., 2014. Optimizing flank wear and surface roughness during hard turning of AISI D3 steel by Taguchi and RSM methods. Production & Manufacturing Research, 2(1), pp.767-783.

219-225

Page 31: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

12. Selvam, M.D., Senthil, P. and Sivaram, N.M., 2017. Parametric optimisation for surface roughness of AISI 4340 steel during turning

under near dry machining condition. International Journal of Machining and Machinability of Materials, 19(6), pp.554-569.

13. Liao, Y.S., Liao, C.H. and Lin, H.M., 2017. Study of oil-water ratio and flow rate of MQL fluid in high speed milling of Inconel 718. International Journal of Precision Engineering and Manufacturing, 18(2), pp.257-262.

14. Ramasamy, K., Dennison, M.S. and Baburaj, E., 2018. Surface Finish Achieved in Producing Pneumatic Piston Rod: An Experimental

Investigation. i-Manager's Journal on Mechanical Engineering, 8(3), p.9.

15. Sarhan, A.A., Sayuti, M. and Hamdi, M., 2012. Reduction of power and lubricant oil consumption in milling process using a new SiO 2

nanolubrication system. The International Journal of Advanced Manufacturing Technology, 63(5-8), pp.505-512.

16. Rahim, E.A. and Sasahara, H., 2011. A study of the effect of palm oil as MQL lubricant on high speed drilling of titanium alloys. Tribology International, 44(3), pp.309-317.

17. Boubekri, N., Shaikh, V. and Foster, P.R., 2010. A technology enabler for green machining: minimum quantity lubrication

(MQL). Journal of Manufacturing Technology Management, 21(5), pp.556-566. 18. Vijayakumar, E. and Selvam, M.D., 2018. The Effect of Cutting Fluid on Surface Roughness of AISI 4340 Steel during Turning

Operation. International Journal of ChemTech Research, 11(03), pp.227-230.

19. DENNISON, M.S. and MEJI, M.A., 2018. A Comparative Study on the Surface Finish Achieved During Face Milling of AISI 1045 Steel Components. i-Manager's Journal on Mechanical Engineering, 8(2), p.18.

20. Sharma, J. and Sidhu, B.S., 2014. Investigation of effects of dry and near dry machining on AISI D2 steel using vegetable oil. Journal of

cleaner production, 66, pp.619-623. 21. Selvam, M.D. and Sivaram, N.M., 2018. A comparative study on the surface finish achieved during turning operation of AISI 4340 steel

in flooded, near-dry and dry conditions. Australian Journal of Mechanical Engineering, pp.1-10.

42.

Authors: Sukanya Ledalla, Tummala Sita Mahalakshmi

Paper Title: Sentiment Analysis using Legion Kernel Convolutional Neural Network with LSTM

Abstract: Social media is growing as a communication medium where people can express their feelings online

and opinions on a variety of topics in ways they rarely do in person. Detecting sentiments in texts have gained a

considerable amount of attention in the last few years. Thus, the terms sentiment analysis have taken their own

path to become essential elements of computational linguistics and text analytics. These terms are designed to

detect peoples’ opinions that consist of subjective expressions across a variety of products or political decisions. In

recent years, in India, opinions are expressed using multi-lingual words. This has become a new challenge in the

area of sentiment analysis. Machine learning techniques, such as neural networks, have proven success in this task;

however, there is room to advance to higher-accuracy networks. In this paper, a novel sentiment analysis system is

developed which uses Legion Kernel Convolutional Neural Network with Long Short-Term Memory (LSTM). In

this investigation U. S. English, Hindi dialects and datasets like twitter sentiment corpus, transliteration pairs,

English word- frequency list, Hindi word-frequency list and various public opinion datasets are used. The

proposed network can achieve the highest known accuracy of 92.25%. Thus the proposed network’s success can be

extended to other fields also.

Keywords: Convolutional Neural Network; Long Short-Term Memory; Sentiment Analysis; Subjective

Expressions; Multi-Lingual Sentence; F-Score

References: 1. Szegedy, C., Ioffe, S., Vanhoucke, V., & Alemi, A. A. (2017). Inception-v4, Inception- ResNet and the Impact of Residual Connections

on Learning. In AAAI (pp. 4278- 4284).

2. Tripathy, A., Agrawal, A., & Rath, S. K. (2016). Classification of sentiment reviews using n-gram machine learning approach. Expert Systems with Applications, 57, 117-126.

3. Verma, A. & Liu, Y. (2017). Hybrid Deep Learning Ensemble Model for Improved Large-Scale Car Recognition. IEEE Smart World

Congress 4. Al-Barazanchi, H. A., Qassim, H., & Verma, A. (2016, October). Novel CNN architecture with residual learning and deep supervision for

large-scale scene image categorization. In Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), IEEE

Annual (pp. 1-7). IEEE. 5. Vo, H. H., & Verma, A. (2016, December). New Deep Neural Nets for Fine-Grained Diabetic Retinopathy Recognition on Hybrid Color

Space. In Multimedia (ISM), 2016 IEEE International Symposium on (pp. 209-215). IEEE.

6. Bojanowski, P., Grave, E., Joulin, A., & Mikolov, T. (2016). Enriching word vectors with subword information. arXiv preprint arXiv:1607.04606

7. Wang, J., Yu, L. C., Lai, K. R., & Zhang, X. (2016, August). Dimensional sentiment analysis using a regional CNN-LSTM model. In

ACL 2016—Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics. Berlin, Germany (Vol. 2, pp. 225-230).

8. Zhang, K., Chao, W. L., Sha, F., & Grauman, K. (2016, October). Video summarization with long short-term memory. In European

Conference on Computer Vision (pp. 766-782). Springer International Publishing. 9. Madhu Bala Myneni, L V Narasimha Prasad, J Sirisha Devi (2017). In A Framework for Sementic Level Social Sentiment Analysis

Model. Journal of Theoretical and Applied Information Technology

10. Medel, J. R., & Savakis, A. (2016). Anomaly detection in video using predictive convolutional long short-term memory networks. arXiv preprint arXiv:1612.00390.

11. J Sirisha Devi, Siva Prasad Nandyala, P Vijaya Bhaskar Reddy (2019). A Novel Approach for Sentiment Analysis of Public Posts. In Innovations in Computer Science and Engineering

12. Rahman, L., Mohammed, N., & Al Azad, A. K. (2016, September). A new LSTM model by introducing biological cell state. In Electrical

Engineering and Information Communication Technology (ICEEICT), 2016 3rd International Conference on (pp. 1-6). IEEE.

226-229

43.

Authors: M. Bindusri, S. Koteswara Rao

Paper Title: Sunspot Data Denoising using Wavelet

Abstract: In data analysis, signal processing plays a prominent role since the received sunspot data continuously

fluctuates. Sunspot number data is corrupted with Gaussian noise and for statistical analysis; the noise needs to be

filtered using wavelet transform. Traditional methods, Fourier transform and Kalman filter has limitations when

analyzing the sunspot number data. A Wavelet transform is a promising tool that provides the time-frequency

representation of the data. Daily sunspot number data from 2001 to 2018 is analyzed using Daubechies wavelet

transform. Daubechies wavelet transform provides flexibility and is used for wide ranges of data using different

230-236

Page 32: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

denoising techniques such as Rigrsure, Sqtwolog, Heursure, Minimaxi thresholding methods. Results showed

Sqtwolog (Universal (or) global threshold) and Heursure gave the better- denoised results compared with the other

two denoising threshold methods for the sunspot number data.

Keywords: Denoising methods- Heursure, Minimaxi, Rigrsure, Sqtwolog, Sunspot number, wavelets.

References: 1. HAN YANBEN, HAN YONGGANG (30-Aug 2013). Wavelet analysis of sunspot relative numbers.

2. ASWATHY MARY PRINCE, Dr. SANISH THOMAS, Er. RAVI JOHN, Dr.D.P. JAYAPANDIAN (2013). A study on themed range

periodicity of sunspot number during solar cycles 21, 22, 23and 24, International journal of scientific and research publications. 3. Sunspots essay research paper.

4. SATISH KUMAR KASDE, DEEPAK KUMAR SONDHIYA, ASHOK KUMAR GWAL (September 2016), Volume 5. Analysis of

sunspot time series during the ascending phase of solar cycle24 using the wavelet transform 5. S. POSTALCLOGLU, K. ERKAN, E.D. BOLAT. Comparison of Kalman filter and wavelet filter for denoising.

6. P.M. BENTLEY, J.T.E. MC DONNEL, Wavelet transforms an introduction, Volume 6.

7. BABATUNDE S. EMMANUEL. Discrete wavelet mathematical transformation method for non-stationary heart sound signal analysis ( August 2012), Vol: 7, No: 8.

8. I.M. DREMIN, O.V. IVANOV, V.A.NECHITAILO LEBEDEV physical institute, Moscow117294, Russia. Wavelets and their use.

9. BURHAN ERGEN, FIRAT University, TURKEY. Signal and Image denoising using wavelet transform. 10. LEI LEI, CHAO WANG, XIN LIU (2013), Vol:7, No:9. Discrete wavelet transform decomposition level determination exploiting

sparseness measurement.

11. C EDRIC VONNESCH, THIERRY BLU, MICHAEL UNSER (20-Aug-2007). Generalized Daubechies wavelet families, Volume 55. 12. S.C SHIRALASHETTI (2014). An application of the Daubechies orthogonal wavelets in power system engineering, Recent advances in

Information technology. 13. LU JNG-YI, LIN HONG, YE DONG, ZHANG YAN-SHENG (2016). A new wavelet threshold function and denoising application,

http://dx.doi.org/10.1155/2016/3195492.

14. BARTOSZ KOZLOWSKI, Journal of Telecommunications and Information technology, 2005. Time series denoising with wavelet transforms.

15. E.HOSTALKOVA, A. PROCHAZKA. Wavelet signal and Image denoising.

16. PIOTR LIPINSKI, MYKHAYLO YATSYMIRSKYY. Efficient 1D and 2D Daubechies wavelet transforms with application to signal processing.

17. M. PITCHAMMAL, N. RIGANA FATHIMA, S. SHAJUN NISHA (2016). Emprical evaluation of wavelet transforms using Shrinkage

thresholding techniques with medical images., Vol:6. 18. MARIO MASTRIANI. Denoising and compression in wavelet domain via projection onto approximation coefficients.

19. YALI LIU (2015). Image denoising method based on threshold, wavelet transform and genetic algorithm, Vol: 8, No: 2.

20. VAISHALI V. THORAT, ELECTRONICS and TELECOMMUNICATION ENGINEERING department, SAVITRIBHAI PHULE Pune University. Study of Denoising algorithms- Review paper.

21. M. STNDAG, A. SENGR, M. GKBULUT and F. ATA, “PRZEGLD ELEKTRO TECHNICZNY (2012), Vol: 89, No 5, pp 2047-2052.

Performance comparison of wavelet thresholding techniques on weak ECG signals denoising. 22. JEENA ROY, SALCE PETER, NEETHA JOHN (2013),Vol-2. Denoising using soft thresholding.

23. DANIEL VALENCIA, Member IEEE, DAVID OREJUALA, JEFERSON SALAZAR, JOSE VALENCIA, Member IEEE. Comparison

analysis between Rigrsure, Sqtwolog, Heursure and Minimaxi techniques using Hard and Soft thresholding methods.

44.

Authors: Poonthamil R, Maheshwar Pratap

Paper Title: “Optimization of Instrumental Workflow in CSSD” at Hospital Sector

Abstract: Theobjective of this paper is to analyze the existing instrument workflow of CSSD [Central Sterile

Supply Department] and to suggest the optimized workflow solutions for the hospital. We need to study about

CSSDand what are the various activities which takes placethere along with the timings they required for each

activity. By knowing those, we need to find out the critical and non-critical activities to create a map.The basic

outline of the map is that the instruments from OT [Operation Theatre] to TSSD [Theatrical Sterile Supply

Department], TSSD to CSSD, then CSSD to TSSD and TSSD to OT store. In detail, we will study about each area

how the instruments are moving, and how much time it consumes.For that we need to create an existing workflow

with the lean tool called VSM [Value Stream Mapping] and in that pick out the critical and non–critical activities.

We can remove the non–critical activities and create a new workflow.With the new workflow we will form the

Program Evaluation & Review Technique model which helps to know the percentage of efficiency has been

improved in accordance to the existing workflow. With this solution, we can propose a new workflow of

Instruments with the minimized critical activity and time period for the activities which takes place in CSSD of the

hospital sector.

Keywords: Value Stream Mapping, Program Evaluation and Review Technique, Optimized Workflow.

References: 1. Ben-Tovim, D. I., Bassham, J. E., Bolch, D., Martin, M. A., Dougherty, M., &Szwarcbord, M. (2007). Lean thinking across a hospital:

redesigning care at the Flinders Medical Centre. Australian Health Review, 31(1), 10-15. 2. Du, G., Zheng, L., & Ouyang, X. (2017). Real-time scheduling optimization considering the unexpected events in home health

care. Journal of Combinatorial Optimization, 1-25.

3. Lummus, R. R., Vokurka, R. J., &Rodeghiero, B. (2006). Improving quality through value stream mapping: A case study of a physician's clinic. Total Quality Management, 17(8), 1063-1075.

4. Cima, R. R., Brown, M. J., Hebl, J. R., Moore, R., Rogers, J. C., Kollengode, A., ...& Team, S. P. I. (2011). Use of lean and six sigma

methodology to improve operating room efficiency in a high-volume tertiary-care academic medical center. Journal of the American College of Surgeons, 213(1), 83-92.

5. Toussaint, J. S., & Berry, L. L. (2013, January). The promise of Lean in health care. In Mayo clinic proceedings (Vol. 88, No. 1, pp. 74-

82). Elsevier. 6. Gill, P. S. (2012). Application of value stream mapping to eliminate waste in an emergency room. Global Journal of Medical

Research, 12(6).

7. Gwadz, M. V., Collins, L. M., Cleland, C. M., Leonard, N. R., Wilton, L., Gandhi, M., ...& Ritchie, A. S. (2017). Using the multiphase optimization strategy (MOST) to optimize an HIV care continuum intervention for vulnerable populations: a study protocol. BMC public

237-242

Page 33: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

health, 17(1), 383.

8. Van de Klundert, J., Muls, P., &Schadd, M. (2008). Optimizing sterilization logistics in hospitals. Health care management

science, 11(1), 23-33. 9. Kushwaha, N., & Pant, M. (2018). Fuzzy magnetic optimization clustering algorithm with its application to health care. Journal of

Ambient Intelligence and Humanized Computing, 1-10.

10. Lin, Q. L., Liu, H. C., Wang, D. J., & Liu, L. (2015). Integrating systematic layout planning with fuzzy constraint theory to design and

optimize the facility layout for operating theatre in hospitals. Journal of Intelligent Manufacturing, 26(1), 87-95.

11. Schwarz, P., Pannes, K. D., Nathan, M., Reimer, H. J., Kleespies, A., Kuhn, N., ...&Zügel, N. P. (2011). Lean processes for optimizing

OR capacity utilization: prospective analysis before and after implementation of value stream mapping (VSM). Langenbeck's archives of surgery, 396(7), 1047.

12. Doğan, N. Ö., &Unutulmaz, O. (2016). Lean production in healthcare: a simulation-based value stream mapping in the physical therapy

and rehabilitation department of a public hospital. Total Quality Management & Business Excellence, 27(1-2), 64-80. 13. Henrique, D. B., Rentes, A. F., GodinhoFilho, M., &Esposto, K. F. (2016). A new value stream mapping approach for healthcare

environments. Production Planning & Control, 27(1), 24-48.

14. Lorence, D., & Wu, L. F. (2012). Meeting US Health Reform Mandates with Computerized Health Services Utilization Matching and Optimization. Journal of medical systems, 36(3), 2047-2055.

15. Mallor, F., &Azcárate, C. (2014). Combining optimization with simulation to obtain credible models for intensive care units. Annals of

Operations Research, 221(1), 255-271. 16. Masterson, B. J., Mihara, T. G., Miller, G., Randolph, S. C., Forkner, M. E., &Crouter, A. L. (2004). Using models and data to support

optimization of the military health system: A case study in an intensive care unit. Health Care Management Science, 7(3), 217-224.

17. Meisami, A., Deglise-Hawkinson, J., Cowen, M. E., & Van Oyen, M. P. (2018). Data-driven optimization methodology for admission control in critical care units. Health care management science, 1-18.

18. Goh, M. M., Tan, A. B., & Leong, M. H. (2016). Bar Code‐Based Management to Enhance Efficiency of a Sterile Supply Unit in

Singapore. AORN journal, 103(4), 407-413.

19. Fuhrer, P., &Guinard, D. (2006). Building a smart hospital using RFID technologies: use cases and implementation. Fribourg, Switzerland: Department of Informatics-University of Fribourg.

20. Scholl, J., Syed-Abdul, S., & Ahmed, L. A. (2011). A case study of an EMR system at a large hospital in India: challenges and strategies

for successful adoption. Journal of biomedical informatics, 44(6), 958-967. 21. Vetter, T. R., Uhler, L. M., &Bozic, K. J. (2017). Value-based healthcare: Preoperative assessment and global optimization (PASS-GO):

Improving value in total joint replacement care. Clinical Orthopaedics and Related Research®, 475(8), 1958-1962.

22. Kleinberg, S., &Hripcsak, G. (2011). A review of causal inference for biomedical informatics. Journal of biomedical informatics, 44(6), 1102-1112.

23. Holzinger, A., Kosec, P., Schwantzer, G., Debevc, M., Hofmann-Wellenhof, R., &Frühauf, J. (2011). Design and development of a

mobile computer application to reengineer workflows in the hospital and the methodology to evaluate its effectiveness. Journal of biomedical informatics, 44(6), 968-977.

24. Xing, J., Burkom, H., &Tokars, J. (2011). Method selection and adaptation for distributed monitoring of infectious diseases for

syndromic surveillance. Journal of biomedical informatics, 44(6), 1093-1101. 25. Chunning, Z., & Kumar, A. (2000). JIT application: process-oriented supply chain management in a health care system. In Management

of Innovation and Technology, 2000. ICMIT 2000. Proceedings of the 2000 IEEE International Conference on (Vol. 2, pp. 788-791).

IEEE. 26. AbuKhousa, E., Al-Jaroodi, J., Lazarova-Molnar, S., & Mohamed, N. (2014). Simulation and modeling efforts to support decision

making in healthcare supply chain management. The Scientific World Journal, 2014.

27. Acheampong, P., Zhiwen, L., Antwi, H. A., Boateng, F., Akomeah, M. O., &Boadu, A. B. (2017). Engaging Constructive Modelling

Concepts to Augment Supply Chain Management Decisions in Ghana's Health Sector. European Journal of Contemporary

Research, 6(1).

45.

Authors: Amandeep, Sanjeev Kumar, Vikas Chauhan, Prem Kumar

Paper Title: LTE-A Heterogeneous Networks Using Femtocells

Abstract: For the improvement of coverage and services of quality, Femtocells play important role in

heterogenous Networks in LTE-A networks. Femtocells are used to provide good indoor voice, increase network

capacity and high data coverage in LTE-A. the problem of Cross-Tier interference is a large problem in Femtocells

Networks. Cross-Tier interference is an interference between Femtocells base station and Microcell’s base station

in a network structure. Throughput is increased while Cross-Tier interference can be decreased using Femtocell in

any Networks. In this paper, we also show experiment results obtain by a simulation framework which shows how

Femtocells can increase the throughput and reduce the interference.

Keywords: Heterogeneous Network, Experiment, Femtocells, LTE, Interference, Throughput, Pathloss, SINR.

References: 1. Yamamoto, T., & Konishi, S. (2013). “Impact of small cell deployments on mobility performance in LTE-Advanced systems”. In

Personal, Indoor and Mobile Radio communications Workshops, IEEE 24th International Symposium, pp. 189-193, 2013.

2. Bouras, C., Kokkinos, V., Kontodimas, K., & Papazois, A.. A simulation framework for LTE-A systems with femtocell overlays. In

Proceedings of the 7th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks, pp. 85-90, (2012).

3. Trestian, R., Vien, Q. T., Shah, P., & Mapp, G. (2015, October). Exploring energy consumption issues for multimedia streaming in LTE HetNet small cells. In Local Computer Networks (LCN), 2015 IEEE 40th Conference on (pp. 498-501). IEEE.

4. Kosta, C., Hunt, B., Quddus, A. U., & Tafazolli, R.. On interference avoidance through inter-cell interference coordination (ICIC) based

on OFDMA mobile systems. IEEE Communications Surveys & Tutorials, 15(3), 973-995, (2013).

5. Stanze, O., & Weber, A. (2013). Heterogeneous networks with LTE‐Advanced technologies. Bell Labs Technical Journal, 18(1), 41-58.

6. http://www.3gpp.org/technologies/keywords-acronyms/98-lte. 7. http://www.3gpp.org/technologies/keywords-acronyms/97-lte-advanced.

8. Zhou, Hao, Yusheng Ji, Xiaoyan Wang, and Shigeki Yamada. "eICIC configuration algorithm with service scalability in heterogeneous

cellular networks." IEEE/ACM Transactions on Networking (TON) 25, no. 1 (2017): 520-535. 9. Alexiou, A., Bouras, C., Kokkinos, V., Kontodimas, K., & Papazois, A. (2011, October). Interference behavior of integrated femto and

macrocell environments. In Wireless Days (WD), 2011 IFIP (pp. 1-5). IEEE.

10. Claussen, Holger. "Performance of macro-and co-channel femtocells in a hierarchical cell structure." In Personal, Indoor and Mobile Radio Communications, 2007. PIMRC 2007. IEEE 18th International Symposium on, pp. 1-5. IEEE, 2007.

11. https://en.wikipedia.org/wiki/LTE_(telecommunication)

12. http://www.3glteinfo.com/lte-advanced-heterogeneous-networks/ 13. http://www.2cm.com.tw/technologyshow_content.asp?sn=0912230018

14. De La Roche, G., Valcarce, A., López-Pérez, D., & Zhang, J. “Access control mechanisms for femtocells”. IEEE Communications

243-246

Page 34: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

Magazine, 2010.

15. Slamnik, N., Okic, A., & Musovic, J. “Conceptual radio resource management approach in LTE heterogeneous networks using small cells

number variation”. In Telecommunications (BIHTEL), XI International Symposium, pp. 1-5, IEEE, 2016. 16. Seidel, E., & Saad, E. (2010). LTE Home Node Bs and its enhancements in Release 9. Nomor Research, 1-5.

46.

Authors: K. Himaja, K. S. Ramesh, S.Koteswara Rao

Paper Title: Analysis of Seismic Signal using Maximum Entropy Method

Abstract: Seismogenic disturbances are unpredictable hard knocks and are inevitable in nature. Earthquakes

are one of the major seismic disturbances that are generated due to the sudden movement of the tectonic plates

resulting in great loss to humanity. During the earthquake, abnormal energy is suddenly emanated into the earth’s

lithosphere thereby generating the seismic waves. Seismic signals thus generated travel through the earth layers

and are highly combined with locally generated noise. The noise thus associated with seismic signals can be

eliminated using FIR based band pass filter. In this paper an attempt is made to apply Maximum Entropy Method

for deriving the frequency components of the seismic signals, for which the power spectrum of the seismic signals

is analyzed.

Keywords: Adaptive signal processing, Applied statistics, Maximum Entropy Method, Seismology, Stochastic

Signal Processing.

References: 1. Monson H. Hayes, “Statistical Digital Signal Processing and Modeling”, John Wiley & Sons, INC, New York, 1976. 2. Dr. N. Purnachandra Rao, “Earthquakes” Andhra Pradesh Akademi of Sciences (APAS) publishers.

3. Donelan. M, A. Babanin, E. Sanina, D. Chalikov, “A Comparison Of Methods For Estimating Directional Spectra Of Surface Waves”,

2015. 4. Wail A. Mousa , Abdullatif A. Al-Shuhail, “Processing of Seisemic Reflection data using Matlab”, Synthesis Lectures On Signal

Processing., Morgon & Claypool Publishers.

5. Sverre holm, “Spectral Moment Matching- A Rational For Maximum Entropy Analysis”, Elsevier, pp.479-482, 1983. 6. Miguel A. Lagunas-Hernandez, M. Eugenia Santamaria-Perez, Anibal R. Figueiras-vidal, “ARMA Model Maximum Entropy Power

Spectral Estimation”, IEEE Transactions on Acoustics, Speech, And Signal Processing, Vol. ASSP-32, No. 5, pp.984-990,Oct.1984.

7. L.H. Feng and G.Y. Luo “Maximum Entropy Method And Seismic Frequency – Magnitude Relation”, Department of Geography, Zhejiang Normal University, Jinhua 321004, China 2008.

8. Edwin T.Janes, “On the Rationale of Max-Ent Method”, Proceedings of The IEEE, Vol.70, No.9, pp.939-952, Sep.1982.

9. Sverre holm and Jens M. Hovem, “Estimation of Scalar Ocean Wave Spectra by Maximum Entropy Method”, IEEE journal on Oceanic Engineering, Vol. OE-4, No.3, pp.76-83, Jul.1979.

10. B.V.K. Vijaya Kumar & S.K. Mullick “Power Spectrum Estimation Using Maximum Entropy Method”, IETE Journal of Research 2015.

11. Abdussalam Addeeb, Abdulmagid Omar and Charles Slivinsky, “Maximum Entropy Method for Estimating Seismic Wave Amplitude”, IEEE, pp.1041-1046, 1989.

12. Petre Stoica and Randolph Moses, “Spectral Analysis Of Signals”, Prentice Hall, Inc, 2005. 13. G. Manolakis and Vinay k. Ingle, “Statistical And Adaptive Signal Processing” McGraw-Hill, 2000.

14. Sverre Holm, “Spectral Moment Matching in the Maximum Entropy Spectral Analysis Method”, IEEE transactions on information

theory, vol. it-29, no. 2, march 1983. 15. S. J. Johnsen And N. Andersen, “On Power Estimation In Maximum Entropy Spectral Analysis”, Geophysics, Vol. 13. No. 4, June 1978.

16. B.V.K. Vijaya Kumar & S.K. Mullick, “Power Spectrum Estimation Using Maximum Entropy Method”, IETE Journal of Research.

17. S. Haykin and S. Kc&r, “Prediction-error filtering and maximum entropy spectral estimation,” in Nonlinear Methods of Spectral Analysis, S.Haykin, Ed. New York: Springer-Verlag, 1979, pp. 9-72.

18. Abies (J G), “Notes on Maximum Entropy Spectral Analysis”.Astron Astrophys, Suppl. 15, 1974.

19. Akaike (H). “Power Spectrum Estimation through Autoregressive Model Fitting”. Ann. Inst. Star. Math. 21, 3; 1969; 407-419. 20. S.F. Gull and J. Skilling, “Maximum entropy method in image processing” IEEE Proceedings, Vol. 131, Pt. F, No. 6, OCTOBER 1984.

247-251

47.

Authors: Umit Isikdag

Paper Title: An Evaluation of Barriers to E-Procurement in Turkish Construction Industry

Abstract: What: E-procurement provides chances for enhancing the traditional procurement approaches of the

construction industry. Both suppliers and buyers in the supply chain utilize e-procurement methods as these help in

the processes through providing opportunities for better communication and coordination. E-procurement expands

the marketplace for all parties, which take part in the process. With e-procurement, the buyer gains the strategic

advantage of i.) reaching more and more suppliers and ii.) the products of lower cost, while the supplier gets the

advantage of reaching new customers in the online markets. In contrast to the globalization of procurement in

many of the production sectors, research indicates that the advancement of e-procurement in the construction

industry is slow and mostly occurs at the national level. This current situation is mainly caused by the barriers to e-

procurement that appear from both supplier and buyer sides. How: This paper explores the barriers to e-

procurement in relation to the Construction Industry based on the data gathered from Turkey. The study involves

an extensive literature review and a web-based questionnaire survey and interviews to determine the key barriers to

e-procurement in the construction industry. 64 stakeholders including engineers, architects from the public and

private organizations (such as contractors, sub-contractors), and the providers of e-procurement services in Turkey

participated in the study. Why: The findings indicated that the construction business organizations still seem to

have not benefited from most values of e-procurement. The results of the study indicated the lack of trust between

the parties and inadequacy of legal infrastructure as the most critical barriers. Another key barrier appears as the

fear of unauthorized access to the critical project information. Efforts towards enhancing the security such as

implementation of blockchain technologies and development of the legal infrastructure supporting these

technologies can a key step towards overcoming key barriers to e-procurement.

Keywords: Construction, e-Procurement, e-Commerce, Turkey, Barriers

252-259

Page 35: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

References: 1. European Commission “ICT Uptake, Working Group 1. ICT Uptake Working Group draft Outline Report”, October. Retrieved March

2008 from http://ec.europa.eu/enterprise/ict/policy/taskforce/wg/wg1_report.pdf.

2. BERR “Supporting Innovation in Services, Department for Business”, Enterprise and Regulatory Reform, Crown copyright, URN 08/1126.

3. Eadie R, Perera S, Heaney G. “A cross-discipline comparison of rankings for e-procurement drivers and barriers within UK construction

organizations”, Journal of Information Technology in Construction (ITcon), 15, 217-233. 4. Martin J. “E-Tendering about time too”, RICS paper http://www.rics.org/site/scripts/download_info.aspx?downloadID=254&fileID=264

5. McIntosh, G., Sloan, B. “The potential impact of electronic procurement and global sourcing within the UK construction industry.” In

proceedings of the 17th ARCOM Annual Conference, 5-7. 6. Love, P.E.D., Irani, Z., Li,H., Cheng, E.W.L., Tse, R.Y.C. "An empirical analysis of the barriers to implementing e-commerce in small-

medium sized construction contractors in the state of Victoria, Australia", Construction Innovation: Information, Process, Management,

1, 31 – 41.

7. Kong, C.W., Li, H., Love, P.E.D. "An e‐commerce system for construction material procurement", Construction Innovation, 1(1), 43-54

8. Tserng H.P., Lin P.H. “An accelerated subcontracting and procuring model for construction projects”, Automation in Construction,

11(1), 105–125.

9. Chao, L., Hua, G.B. “Process modelling of E-procurement in the Singapore construction industry”, In the Proceedings of Distributing Knowledge In Building, Arhus, Denmark.,2002

10. Li, H., Kong, C., Pang, Y., Shi, W., and Yu, L. "Internet-Based Geographical Information Systems System for E-Commerce Application

in Construction Material Procurement." J. Constr. Eng. Manage., 10.1061/(ASCE)0733-9364 129:6(689), 689-697. 11. Wamelink, H., Teunissen, W. “E-Business in the construction industry: a search for practical applications using the Internet”.

International Association for Automation and Robotics in Construction. available at http://www.iaarc.org/publications/fulltext/isarc2003-

93.pdf, 543-547. 12. Dzeng, R.-J., Lin, Y.-C., “Intelligent agents for supporting construction procurement negotiation”, Expert Systems with

Applications,(27), 107–119.

13. Kong, S.C.W., Li, Heng, Liang., Y. Hung, T. Anumba, C., Chen,Z. “Web services enhanced interoperable construction products catalogue”, Automation in Construction, 14(3) , 343-352

14. Hadikusumo, B., Petchpong, S., & Charoenngam, C. “Construction material procurement using Internet-based agent system.”

Automation in Construction, 14(6), 736-749. 15. Luu, D.T., Ng, S.T., Chen, S.E., Jefferies, M. "A strategy for evaluating a fuzzy case-based construction procurement selection system",

Advances in Engineering Software, 37(3), 159-171.

16. Stephenson, P., Chia, P. P. “E-Procurement: An Assessment of UK Practice In. Construction”, In proceedings of the CCIM2006 Sustainable Development through Culture and Innovation, Dubai, UAE, 592-601.

17. Perera, S., Eadie, R., Heaney, G., Carlisle, J. “Methodology for Developing a Model for the Analysis of E-Procurement Capability

Maturity of Construction Organisations”, In proceedings of the Joint International Conference on Construction Culture, Innovation, and Management (CCIM), British University in Dubai, 634-644

18. Eadie R., Perera S., Heaney G., Carlisle J. “Drivers and Barriers To Public Sector E-Procurement Within Northern Ireland’s

Construction Industry”, Journal of Information Technology in Construction, Journal of Information Technology in Construction (ITcon), 12, 103-120.

19. Vitkauskaitė, E., Gatautis, R. “E-Procurement perspectives in construction sector SMEs”, Journal of Civil Engineering and Management,

14(4), 287–294. 20. Alarcón, L.F., Muturana, S., Schonherr, I. “Benefits of Using E-Marketplace in Construction Companies: A Case Study”, in:

Construction Supply Chain Management Handbook, London: CRC Press, Taylor & Francis Group, 17.1 – 17.19.

21. Eadie, R., Perera, S., Heaney, G. “Identification of e-procurement drivers and barriers for UK construction organisations and ranking of these from the perspective of quantity surveyors”, Journal of Information Technology in Construction (ITcon), 15, 23-43.

22. Hashim N., Said I., Idris N. H. “Exploring e-Procurement value for construction companies in Malaysia”, Procedia Technology, Vol. 9,

2013, pp. 836−845. 23. Ibem E. O., Laryea S. “e-Procurement use in the South African construction industry”, Journal of Information Technology in

Construction, Vol. 20, 2015, pp. 364−384.

24. Aduwo E. B., Ibem E. O., Tunji-Olayeni P., Uwakonye O. U., Ayo-Vaughan E. K. “Barriers to the uptake of e-Procurement in the Nigerian building industry”, International Journal of Applied Theoretical and Applied Information Technology, Vol. 89, No. 1, 2016, pp.

133−147.

48.

Authors: T. Charan Singh, K. Raghu Ram, B.V. Sanker Ram

Paper Title: Transient Stability Analysis of Six Phase Transmission System with Integration of WPGS and

STATCOM with Smart Grid

Abstract: In recent times Transient stability analysis has become a major concern in the operation of power

systems due to the rising stress on power system networks. These difficulties require assessment of a power

system’s ability to with stand instability while maintaining the excellence of service. Many different techniques

have been projected for transient stability analysis in power systems, especially for a multi machine system. This

paper describes simulation of six phase multi-machine power system (MMPS) with wind power generator

integration in dynamic operation. By the introduction of wind power generation system (WPGS) in multi-machine

at weak bus in parallel with STATCOM can improve the generator load angle deviation during fault condition. The

MMPS performance is analysed by placing six phase line between different buses. The replacement of

transmission line can reduces the line impedances, which results in reduced angle distortion of machines and

improved stability .The proposed WPGS based MMPS phase angle and frequency variations are analyzed during

symmetrical and asymmetrical fault conditions. The MATLAB/Simulation software is used to test the behavior of

proposed system.

Keywords: Wind system, six phase transmission line, STATCOM, multi-machine system, stability.

References: 1. D. Basic, J. G. Zhu, and G. Boardman, “Transient performance study of a brushless doubly fed twin stator induction generator,” IEEE

Trans. energy Convers., vol. 18, no. 3, pp. 400–408, 2003.

2. G. K. Singh, “Modeling and experimental analysis of a self-excited six-phase induction generator for stand-alone renewable energy generation,” Renew. energy, vol. 33, no. 7, pp. 1605–1621, 2008.

3. J. R. Stewart and D. D. Wilson, “High phase order transmission--a feasibility analysis part I--steady state considerations,” IEEE Trans.

Power Appar. Syst., no. 6, pp. 2300–2307, 1978. 4. T. L. Landers, R. J. Richeda, E. Krizanskas, J. R. Stewart, and R. A. Brown, “High phase order economics: constructing a new

transmission line,” IEEE Trans. Power Deliv., vol. 13, no. 4, pp. 1521–1526, 1998.

260-266

Page 36: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

5. J. M. Arroyo and A. J. Conejo, “Optimal response of a power generator to energy, AGC, and reserve pool-based markets,” IEEE Trans.

Power Syst., vol. 17, no. 2, pp. 404–410, 2002.

6. J. R. Stewart, E. Kallaur, and I. S. Grant, “Economics of EHV high phase order transmission,” IEEE Trans. power Appar. Syst., no. 11, pp. 3386–3392, 1984.

7. N. G. Hingorani, L. Gyugyi, and M. El-Hawary, Understanding FACTS: concepts and technology of flexible AC transmission systems,

vol. 1. IEEE press New York, 2000.

8. G. Cai, Q. Sun, C. Liu, P. Li, and D. Yang, “A new control strategy to improve voltage stability of the power system containing large-

scale wind power plants,” in Electric Utility Deregulation and Restructuring and Power Technologies (DRPT), 2011 4th International

Conference on, 2011, pp. 1276–1281. 9. L. Wang and C.-T. Hsiung, “Dynamic stability improvement of an integrated grid-connected offshore wind farm and marine-current farm

using a STATCOM,” IEEE Trans. power Syst., vol. 26, no. 2, pp. 690–698, 2011.

10. S. S. Venkata, W. C. Guyker, W. H. Booth, J. Kondragunta, N. K. Saini, and E. K. Stanek, “138-kV, six-phase transmission system: fault analysis,” IEEE Trans. Power Appar. Syst., no. 5, pp. 1203–1218, 1982.

11. A. P. Apostolov and R. G. Raffensperger, “Relay protection operation for faults on NYSEG’s six-phase transmission line,” IEEE Trans.

Power Deliv., vol. 11, no. 1, pp. 191–196, 1996. 12. N. B. Bhatt, S. S. Venkata, W. C. Guyker, and W. H. Booth, “Six-phase (multi-phase) power transmission systems: fault analysis,” IEEE

Trans. Power Appar. Syst., vol. 96, no. 3, pp. 758–767, 1977.

13. R. J. Vidmar, “On the use of atmospheric plasmas as electromagnetic reflectors,” IEEE Trans. Plasma Sci, vol. 21, no. 3, pp. 876–880, 1992.

49.

Authors: K Durga Prasad, D Vasumathi

Paper Title: Privacy Preserving Data Analysis using Decision Tree learning Algorithm through Additive

Homomorphic Encryption

Abstract: Privacy preserving is an emerging concern in the field of data mining. The Randomization technique

protects privacy with loss of accuracy. The secure multi-party computation increases the accuracy and conserves

privacy but the computational complexity is more. The encryption of data using cryptography makes the data

secure without loss of accuracy and reduces the communication complexity. The proposed technique is privacy

preserving decision tree algorithm using cryptographic approach. The data miner collects frequencies and

combined frequencies from the users and learns the classification rules from the decision tree. The data miner

learns only frequencies of the sensitive data. The experimental result shows that proposed privacy preserving

decision tree algorithm is computationally efficient and the accuracy is more than the randomization models. The

communication complexity is less compared with the secure multi-party computation models.

Keywords: Cryptographic encryption, Data Analysis, Decision Tree and Privacy Preserving.

References: 1. Evfimievski A, “Randomization in privacy-preserving Data mining”. ACM Sigkdd Explorations Newsletter, vol.4, no. 2, pp43-48, 2002.

2. Oded Goldreich, “Secure Multi-Party Computation” 2002 with reference to better exposition provided in Chapter 7 of (Volume 2 of)

Foundations of Cryptography. ISBN 0-521-83084-2, Published in the US in May 2004. 3. Lindell Y & Pinkas B, “Secure multiparty computation for privacy-preserving data mining”, Journal of Privacy and Confidentiality, vol.

1, no.1, pp.5 – 27,2009

4. Krishnamurty Muralidhar & Rathindra Sarathy, “Data Shuffling –A New Masking Approach for Numerical Data Management science”, 2006, Sci.52,658-670. DOI=http://dx.doi.org/10.1287/mnsc.1050.0503.

5. Kargupta H, Datta H, et. al. “On the privacy preserving properties of random data perturbation techniques”, 2003, In The Third IEEE

International Conference on Data Mining. 6. A. C. Yao, "Protocols for secure computations" 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)(FOCS), vol.

00, no. , pp. 160-164, 1982. doi:10.1109/SFCS.1982.88

7. B Pinkas, ”Cryptographic techniques for privacy-preserving data mining” ACM SIGKDD, Volume 4 Issue 2, Pages 12-19, doi - 10.1145/772862.772865,2002.

8. Vaidya J & Clifton C ”Privacy preserving naive Bayes classifier on vertically partitioned data”, SIAM International Conference on Data

Mining,2004. 9. Craig Gentry, “Fully homomorphic encryption using ideal lattices” In Proceedings of the forty-first annual ACM symposium on Theory

of computing. ACM, New York, NY, USA, 169-178. DOI: https://doi.org/10.1145/1536414.1536440, 2009.

10. Zhiqiang Yang & Sheng Zhong et al “Privacy-Preserving Classification of User Data without Loss of Accuracy”, PG - 92-102, Proceedings of the 2005 SIAM International Conference on Data Mining, 2005,doi - 10.1137/1.9781611972757.9.

11. Agarwal R & Srikant R, “Privacy preserving data mining” In Proc. of ACM SIGMOD Conference on Management of Data, ACM Press,

pages 439-450,2000. 12. Du W & Zhan Z, “Using randomized response techniques for privacy-preserving data mining”, In Proc.of the Ninth ACM SIGKDD

International Conference on Knowledge Discovery and Data Mining pages 505-510. ACM Press., 2003,doi>10.1145/956750.956810.

13. Zhan J “Using Homomorphic Encryption For Privacy-Preserving Collaborative Decision Tree Classification”, IEEE Symposium on Computational Intelligence and Data Mining, 2007.

14. Chen Tingting & Zhong Sheng, “Privacy-preserving backpropagation neural network learning”, IEEE Transactions, 20(10):1554–1564,

DOI: 10.1109/TNN.2009.2026902,2009. 15. Louis J M Aslett & Esperanca M, et al “A review of homomorphic encryption and software tools for encrypted statistical machine

learning”, arXiv:1508.06574, 2015b. , 2015.

16. Kaleli C & Polat H “Privacy-Preserving Naïve Bayesian Classifier–Based Recommendations on Distributed Data”, Computational Intelligent,Vol. 31, 2015.

17. Huai Mengdi, Huang Liusheng, et al “Privacy Preserving Naive Bayes Classification” In Proc. of International Conference Knowledge

Science, Engineering and Management, Volume 9403, pages 627-638, 2015. 18. Agarwal D, and Agarwal C “On the design and quantification of privacy preserving data mining algorithms” In Proc. of the 20th ACM

SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, ACM Press, pages 247-255,

2001,doi>10.1145/375551.375602. 19. Kantarcioglu M & Vaidya J “Architecture for privacy-preserving mining of client information”, In IEEE ICDM Workshop on Privacy,

Security and Data Mining, pages 37-42, 2002.

20. Rebecca Wright and Zhiqiang Yang “Privacy-preserving Bayesian network structure computation on distributed heterogeneous data”, In Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining (KDD'04),ACM,NewYork,

NY, USA,713-718,2014, DOI=http://dx.doi.org/10.1145/1014052.1014145. 21. Durga Prasad k, et al “Privacy-preserving Data Analysis over Naive Bayesian Classifier for Continuous and Discrete Data”(accepted

paper), 2018.

22. Archer, D. W., Bogdanov, D., Lindell, Y., Kamm, L., Nielsen, K., Pagter, J. I., Wright, R. N. “ From Keys to Databases—Real-World Applications of Secure Multi-Party Computation.” The Computer Journal. doi:10.1093/comjnl/bxy090,2018.

267-272

Page 37: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

23. Lindell, Yehuda & Pinkas, Benny.. “Secure Multiparty Computation for Privacy-Preserving Data Mining.” IACR Cryptology ePrint

Archive. 2008. 197. 10.29012/jpc.v1i1.566., 2008.

24. Orlandi, C. “Is multiparty computation any good in practice?” 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). doi:10.1109/icassp.2011.5947691,2011.

50.

Authors: Karanam Deepak.

Paper Title: Design and Analysis of High Speed and Low Power Reversible Vedic Multiplier Incorporating with

QSDN Adder

Abstract: This present work deals with a reversible Vedic type multiplier using the earliest Urdhva

Tiryagbhyam sutras of Vedic type mathematics combine with the QSD adder (Quaternary Signed digit number

adder). There are three activities be intrinsic into duplication halfway items age, fractional items decrease and

expansion. Quick snake design in this way enormously upgrades the speed of the general procedure. A pass on free

math errand be able to be cultivated use a top radix number formation, for instance, QSD adder. In QSD, each one

number can be address by a digit as of - 3 to 3. Pass on complimentary development as well as distinctive exercises

on incalculable, for instance, 64, 128, or more can be executed with consistent deferment and less multifaceted

nature. The proposed multiplier configuration is contrasted and a reversible Vedic multiplier consolidates a QSD

Quaternary Signed digit number adder viper among a transformation section for quaternary to paired change. The

proposition demonstrates a most extreme speed enhancement.

Keywords: Arithmetic Multiplier, Quaternary Signed Digit adder [QSD], UrdhvaTiryagbhyam, Vedic type

Mathematics, Carry free addition, QSD, Redundancy.

References: 1. S. TahmasbiOskuii, P. G. Kjeldsberg, and O. Gustafsson, “Transition activity aware design of reduction-stages for parallel multipliers,” in

Proc. 17th Great Lakes Symp.On VLSI, March 2007, pp. 120–125. 2. M. Perkowski, P. Kerntopf, A. Buller, M. Chrzanowska-Jeske, A. Mishchenko, X. Song,A. Al-Rabadi, L. Jozwiak, A. Coppola and B.

Massey, “Regular realization of symmetric functions using reversible logic”, in Proceedings of EUROMICRO Symposium on Digital

Systems Design (Euro-Micro’01),Warsaw, Poland, pp. 245–252, September 2001 3. Ayman A. Fayed, Magdy A. Bayoumi, "A Novel Architecture for Low Power Design of Parallel type of Multipliers," wvlsi, pp.0149,

IEEE Computer Society Workshop on VLSI 2001.

4. C.-Y. Han, H.-J.Park, and L.-S. Kim. A low-power array multiplier using separated multiplication technique. IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing. vol.48, pp. 866- 871 (2001)

5. S. Shah, A. Al-Khalili, and D. Al-Khalili. Comparison of 32-bit multipliers for various performance measures. Proceedings of the 12th

IEEE International Conference on Microelectronics, (2000) 6. K. Thakre, S. S. Chiwande and S. D. Chafale, "Design of low power multiplier using reversible logic gate," 2014 International

Conference on Green Computing Communication and Electrical Engineering (ICGCCEE), Coimbatore, 2014, pp. 1-6.

7. M.Anitha, A.Rajani, N.Pushpalatha, “Optimized multiplier using reversible logic gates: a vedic Mathematical approach”, (IJARCET) Volume 3 Issue 10, October 2014.

8. Gowthami P, RVS Satyanarayana, “Design of Digital Adder Using Reversible Logic”, IJERA, Vol. 6, Issue 2, (Part - 1), pp.53-57,

February 2016.

273-279

51.

Authors: S.P. Sundar Singh Sivam, Ganesh Babu Loganathan, K. Saravanan

Paper Title: Impact of Point Angle on Drill Product Quality and Other Responses When Drilling EN- 8: A Case

Study of Ranking Algorithm

Abstract: In the present work Drilling parameters has been advanced for EN-8 combination steel utilizing

GRA (Grey Relational Examination). The parameters advanced are axle speed (SS - 3000, 3500 and 4000 rpm),

feed rate (FR - 0.18, 0.20 and 0.22 mm/rev) and cemented Carbide twist drill of 14.5 mm width with Three flutes

point angle (PA - 118,127 and 1350) And Lubrications Used Dry, Wet and Air on bases of surface harshness, Hole

distance across, Thrust Force and Burr Size precision reactions. It is performed with the assistance of established

carbide contort drills. On the bases of GRA alongside recognizable proof, huge commitment of parameters has

been completed by utilizing ANOVA. Out of three factors considered point edge has huge impact on reactions as

contrast with other parameters.

Keywords: Drilling, Lubrications, Ranking Algorithm

References: 1. Davim Paulo J., Conceic C.A.¸ & Antonio (2000). Optimal drilling of particulate metal matrix composites based on experimental and

numerical procedures, International Journal of Machine Tools & Manufacture, Vol.41,pp. 21–31. a. TosunNihat (2005). Determination of optimum parameters for multi-performance characteristics in drilling by using grey relational

analysis, Int J Adv Manuf Technol, Vol.28, pp. 450–455.

2. S.P. Sundar Singh Sivam et al.,. “Orbital cold forming technology - combining high quality forming with cost effectiveness - A review”. Indian Journal of Science and Technology. Vol 9(38), October 2016, DOI: 10.17485/ijst/2016/v9i38/91426.

3. Sutherland, J. W., Kulur, V. N., King, N. C., 2000, An Experimental Investigation of Air Quality in Wet and Dry Turning, Annals of the

CIRP, 49/1: 61-64. 4. S.P.Sundar Singh Sivam et al., “Frequently used Anisotropic Yield Criteria for Sheet Metal Applications: A Review”, Indian Journal of

Science and Technology. Indian Journal of Science and Technology. Volume 9, Issue 47, December 2016. DOI:

10.17485/ijst/2015/v8i1/92107. 5. Daniel, C. M., Olson, W. W., Sutherland, J. W., 1997, Research Advances In Dry and Semi-dry Machining, SAE Technical Paper No.

970415 and SAE Transactions, Journal of Materials and Manufacturing, 106: 373-383.

6. S.P. Sundar Singh Sivam et al.,,An Experimental Investigation And Optimisation Of Ecological Machining Parameters On Aluminium 6063 In Its Annealed And Unannealed Form, Journal Of Chemical And Pharmaceutical Sciences. Page No Page (46 – 53), 2015.

7. König, W., 1999, Fertigungsverfahren I – Drehen, Fräsen, Bohren, Springer-Verlag, BerlinHeidelberg.

8. S.P.Sundar Singh Sivam et al., “Frequently used Anisotropic Yield Criteria for Sheet Metal Applications: A Review”, Indian Journal of Science and Technology. Indian Journal of Science and Technology. Volume 9, Issue 47, December 2016. DOI:

10.17485/ijst/2015/v8i1/92107. 9. P. Sundar Singh Sivam, et al., (2018). Comparison of Manufacturing Data Analysis For 5 & 3-Axis Vertical Machining Center for the

Time and Tool Benefits of Industries. International Journal of Engineering & Technology, 7(4.5), 196-201.

280-282

Page 38: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

doi:http://dx.doi.org/10.14419/ijet.v7i4.5.20044.

10. P. Sundar Singh Sivam et al.,. (2018). Development of Vibrator Feeding Mechanism Using Two Sets of Rollers for the Separation of

Ball Grading For Industry Benefits. International Journal of Engineering & Technology, 7(4.5), 202-206. doi:http://dx.doi.org/10.14419/ijet.v7i4.5.20045

11. S.P. Sundar Singh Sivam et al., “Investigation exploration outcome of Heat Treatment on Corrosion Resistance of AA 5083 in Marine

Application”. International Journal of Chemical Sciences (ISSN 0972-768 X). Page No Page (15 – 22), 2015.

12. SIVAM, S. P. Sundar Singh et al.”Multi Response Optimization of Setting Input Variables for Getting Better Product Quality in

Machining of Magnesium AM60 by Grey Relation Analysis and ANOVA." Periodica Polytechnica Mechanical Engineering, [S.l.],

2017. ISSN 1587-379X. https://doi.org/10.3311/PPme.11034. 13. S.P. Sundar Singh Sivam et al.,.” Analysis of residual stresses, thermal stresses, cutting forces and other output responses of face milling

operation on ze41 magnesium alloy." International Journal of Modern Manufacturing Technologies, Pp. No 92-100. ISSN 2067–3604,

Vol. X, No. 1 / 2018. 14. Sivam, S. P. S. S., et al., “The Grey Relational Analysis and Anova to Determine the Optimum Process Parameters for Friction Stir

Welding of Ti and Mg Alloys”, Periodica Polytechnica Mechanical Engineering. doi: https://doi.org/10.3311/PPme.12117.

15. S. P. S. S. Sivam et al.,"Competitive study of engineering change process management in manufacturing industry using product life cycle management — A case study," 2017 International Conference on Inventive Computing and Informatics (ICICI), Coimbatore, 2017,

pp. 76-81. doi: 10.1109/ICICI.2017.8365247

16. S. P. Sundar Singh Sivam et al., (2019) A study of cooling time, copper reduction and effects of alloying elements on the microstructure and mechanical properties of SG iron casting during machining, Australian Journal of Mechanical Engineering, DOI:

10.1080/14484846.2018.1560679

17. S.P. Sundar Singh Sivam et al., (2018) "THICKNESS DISTRIBUTION AND NUMERICAL MODELLING OF CONVENTIONAL SUPERPLASTIC FORMING IN AA2024 ALLOY", International Journal of Modern Manufacturing Technologies, ISSN 2067–

3604,76,85, Vol. X, No. 2 / 2018

52.

Authors: Venkata Ramana N, Chandra Sekhar Kolli, Ravi Kumar T, P Nagesh

Paper Title: Hybrid K-Mir Algorithm to Predict Type of Lung Cancer Among Stoicism

Abstract: Health care is the maintenance of health via the prevention, diagnosis, and treatment of disease. The

disease that persists over a long period of time is known as Chronic Disease. Chronic diseases may create

additional activity restrictions. Common chronic conditions include lung disease, heart stroke, cancer, obesity, and

diabetes. Chronic diseases usually show no symptoms and hence not diagnosed in advance. Hence it is necessary

to predict the patient-specific chronic diseases in early stage for effective prevention. Machine learning being the

vital component of Data Analytics that facilitates the medical domain for malignancy predictions. Patients

suffering from misdiagnosed and undiagnosed chronic diseases can be easily recognized with the help of these

hospital systems. These systems enable the doctors to take precautionary measures and thereby minimizing the

chances of a patient being affected. A new hybrid K-MLR framework using K-means and Multiple Linear

Regression has been proposed for diagnosing the type of lung cancer among the patients. As most of the real

datasets are high-dimensional, this hybrid framework uses K-Means clustering algorithm that eliminates the noise

from the image based dataset at the initial stage. Afterward to reduce the dimensionality it detects the features of

nodules in 3D lung CT scans and partitions the data to form the clusters. Finally it reads the new patient data with

malignant nodules to predict the type of associated cancer based on the intensity of the nodule features extracted

from each CT scan report using Multiple Linear Regression Analysis. Clustering prior to classification makes the

hybrid approach beneficial.

Keywords: Lung cancer, pulmonary nodules, CT scan, Prediction, K-means, and Regression

References: 1. Rubin, G. D. (2015). Lung nodule and cancer detection in CT screening. Journal of thoracic imaging, 30(2), 130.

2. Wang H, Guo XH, Jia ZW, Li HK, Liang ZG, Li KC, He Q. Multilevel binomial logistic prediction model for malignant pulmonary nodules based on texture features of CT image. Eur J Radiol 2010;74:124-9.

3. Gibbs P, Turnbull LW. Textural analysis of contrast-enhanced MR images of the breast. Magn Reson Med 2003;50:92-8.

4. Cavouras D, Prassopoulos P, Pantelidis N. Image analysis methods for solitary pulmonary nodule characterization by computed tomography. Eur J Radiol 1992;14:169-72.

5. McNitt-Gray MF, Wyckoff N, Sayre JW, Goldin JG, Aberle DR. The effects of co-occurrence matrix based texture parameters on the

classification of solitary pulmonary nodules imaged on computed tomography. Comput Med Imaging Graph 1999;23:339-48. 6. Dujardin M, Gibbs P, Turnbull LW. Texture analysis of 3T high resolution T2 weighted images in ovarian cystadenoma versus borderline

tumor. Proc Intl Soc Magn Reson Med 2014;22:2218. Available

online: http://cds.ismrm.org/protected/14MPresentations/abstracts/2218.pdf 7. Chae HD, Park CM, Park SJ, Lee SM, Kim KG, Goo JM. Computerized texture analysis of persistent part-solid ground-glass nodules:

differentiation of preinvasive lesions from invasive pulmonary adenocarcinomas. Radiology 2014;273:285-93.

8. Ganeshan B, Abaleke S, Young RC, Chatwin CR, Miles KA. Texture analysis of non-small cell lung cancer on unenhanced computed tomography: initial evidence for a relationship with tumour glucose metabolism and stage. Cancer Imaging 2010;10:137-43.

9. Ganeshan B, Goh V, Mandeville HC, Ng QS, Hoskin PJ, Miles KA. Non-small cell lung cancer: histopathologic correlates for texture parameters at CT. Radiology 2013;266:326-36.

10. V.Krishnaiah “Diagnosis of Lung Cancer Prediction System Using Data Mining Classification Techniques” International Journal of

Computer Science and Information Technologies, Vol. 4 (1), 39 – 45 www.ijcsit.Com ISSN: 0975-9646, 2013. 11. Zakaria Suliman zubi “Improves Treatment Programs of Lung Cancer using Data Mining Techniques” Journal of Software Engineering

and Applications, 7, 69-77, February 2014.

12. K. Balachandran “Classifiers based Approach for PreDiagnosis of Lung Cancer Disease” International Journal of Computer Applications® (IJCA) (0975 – 8887), proceedings on National Conference on Emerging Trends in Information & Communication Technology (NCETICT

2013).

13. Anam Tariq, M. Usman Akram and M. Younus Javed, “Lung Nodule Detection in CT Images using Neuro Fuzzy Classifier”, Fourth International Workshop on Computational Intelligence in Medical Imaging (CIMI), pp:49-53, 2013.

14. Ada R. Wolfsen, William D. Odell, ProACTH: Use for early detection of lung cancer, The American Journal of Medicine, Volume 66,

Issue 5, Pages 765–772, May 1979. 15. Dechang Chen “Developing Prognostic Systems of Cancer Patients by Ensemble Clustering” Hindawi publishing corporation, Journal of

Biomedicine and Biotechnology Volume, Article Id 632786, 2009.

16. Vesal, S., Ravikumar, N., Ellman, S., & Maier, A. (2018). Comparative Analysis of Unsupervised Algorithms for Breast MRI Lesion Segmentation. In Bildverarbeitung für die Medizin 2018 (pp. 257-262). Springer Vieweg, Berlin, Heidelberg.

283-287

Page 39: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

17. Gao, X., Chu, C., Li, Y., Lu, P., Wang, W., Liu, W., & Yu, L. (2015). The method and efficacy of support vector machine classifiers based

on texture features and multi-resolution histogram from 18F-FDG PET-CT images for the evaluation of mediastinal lymph nodes in

patients with lung cancer. European journal of radiology, 84(2), 312-317. 18. Soni Lanka., Madhavi M. R., Abusahmin, B.S., Puvvada, N., Lakshminarayana, V., (2017), "Predictive data mining techniques for

management of high dimensional big-data". Journal of Industrial Pollution Control vol 33, pp 1430-1436.

19. Venkata Ramana N , Seravana Kumar P. V. M , Puvvada Nagesh .” Analytic architecture to overcome real time traffic control as an

intelligent transportation system using big data”. International Journal of Engineering & Technology, 7 (2.18) (2018) 7-11

20. N. VenkataRamana , Puvvada Nagesh , Seravana Kumar P. V. M , U Vignesh “IoT Based Scientific design to conquer constant movement

control as a canny transportation framework utilizing huge information available in Cloud Networks ”. Jour of Adv Research in Dynamical & Control Systems, Vol. 10, 07-Special Issue, 2018

21. Venkata Ramana N., Nagesh P., Lanka S., Karri R.R. (2019), "Big Data Analytics and IoT Gadgets for Tech Savvy Cities". In: Omar S.,

Haji Suhaili W., Phon-Amnuaisuk S. (eds) Computational Intelligence in Information Systems. CIIS 2018. Advances in Intelligent Systems and Computing, vol 888. pp 131-144, Springer Nature.

22. U. Vignesh, Sivakumar, N. Venkata Ramana “Survey and implementation on classification algorithms with approach on the environment”.

International Journal of Engineering & Technology, 7 (2.33) (2018) 438-440 23. Soni Lanka., Madhavi M. R., Abusahmin, B.S., Puvvada, N., Lakshminarayana, V., (2017), "Predictive data mining techniques for

management of high dimensional big-data". Journal of Industrial Pollution Control vol 33, pp 1430-1436.

53.

Authors: Sanjeev Kumar Gupta, R. C. Mehta, Piyush Singhal

Paper Title: Experimental Evaluation and Empirical Formulation of Hydraulic Jump Characteristics in Sloping

Prismatic Channel

Abstract: Hydraulic jump is frequently used for dissipation excess energy downstream of hydraulic structure.

This abundance energy, whenever left unchecked, will have unfavorable impact on the banks and downstream of

the channel bed. In this paper hydraulic jump characteristics are experimentally evaluated and empirical

correlations for depth ratio and relative height are produced in sloping channel by adopting the impact of both

strategy Froude number and approaching Reynolds number and neglecting the frictional effect. The developed

empirical correlations are validated using Gandhi (2014) data. The present correlation of jump characteristics gives

better agreement with experimental data and can be used for preliminary design.

Keywords: hydraulic jump, Froude number, Reynolds number, energy dissipation etc

References: 1. W. H. Hager, “Energy Dissipators and Hydraulic Jump”, Kluwer Academic Publishers, London, 1992.

2. E.A. Elevatorski, “Hydraulic Energy Dissipator” McGraw Hill, New York, 1959.

3. W. H. Hager, and R. Bremen, “Classical hydraulic jump: Sequent depths”, J. Hydraul. Res., 27(5), 1989, pp. 565–585. 4. B. A.Bakhmeteff, and A. E Matzke, "The Hydraulic Jump in Terms of Dynamic Similarity, Transactions, ASCE, Vol. 101, Paper No.

1935, 1936, pp. 630-680.

5. J. N. Bradley, and A. J Peterka,"The hydraulic design of stilling basins," Journal of Hydr. Div., ASCE, 82(5), 1957, paper 1401. 6. V. T. Chow, “Open-Channel Hydraulics” McGraw Hill, New York, 1959.

7. R. Silvester,. Hydraulic Jump in All Shape of Horizontal Channels, J. Hydraulic Division 90(1), 1964, pp:23–55.

8. N. Rajaratnam and K. Subramanya, “Profile of Hydraulic Jump”, Journal of Hydraulic Division, ASCE, Vol.94, No.3, 1968, pp. 663 – 673.

9. K. Herbrand, ”The Spatial Hydraulic Jump”, Journal of Hydraulic Research, Vol.11, No.3, 1973, pp. 205 – 218.

10. I. Ohtsu and Y. Yasuda, “Characteristics of Supercritical Flow below Sluice Gate”, Journal of Hydraulic Engineering, ASCE, Vol.120, No.3, 1994, pp. 332 – 346

11. 11. H. Chanson and T. Brattberg, “Experimental Study of the Air-Water Shear Flow in a Hydraulic Jump”, Department of Civil

Engineering, the University of Queensland, Brisbane, Australia. International Journal of Multiphase Flow, Vol 26, No 4, 2000, pp.583-607.

12. Noor Afzal and A. Bushra,” Structure of Turbulent Hydraulic Jump in a Trapezoidal Channel”, Journal of Hydraulic Research, Vol – 40,

No – 2, 2002, pp. 168-174. 13. S. Kucukali, H.Chanson, “Turbulence measurements in the bubbly flow region of hydraulic jumps”, Experimental Thermal and Fluid

Science Vol. 33, 2008, pp. 41–53.

14. M. Naseri and F. Othman, “Determination of the length of hydraulic jumps using artificial neural networks”, Advances in Engineering Software, Vol. 48, 2012, pp 27–31.

15. Gupta SK, Mehta RC, Dwivedi VK. Modeling of relative length and relative energy loss of free hydraulic jump in horizontal prismatic

channel. Procedia Engineering. 2013 Jan 1; 51:529-37. 16. Gupta SK, Mehta RC, Dwivedi VK. Modeling of relative length and relative energy loss of hydraulic jump in sloping prismatic channels

for environmental hazards control. 2nd Intern. InConf. on Climate Change & Sustainable Management of Natural Resources, CP–77

2010 Dec (pp. 05-07).

17. N. Y. Saad and E. M. Fattouh, Hydraulic characteristics of flow over weir with circular openings, Ain Shams Engineering Journal,

Volume 8, Issue 4, 2016, pp 515-522.

18. S. Gandhi, “Characteristics of Hydraulic Jump”, International Journal of Mathematical, Computational, Physical, Electrical and Computer Engineering Vol:8, No:4, 2014, pp. 693-697.

288-292

54.

Authors: J Sirisha Devi, Siva Prasad Nandyala

Paper Title: Electroencephalography and Physiological Signals for Emotion Analysis

Abstract: A novel method for Electroencephalography (EEG) based emotion analysis using Gray Level Co-

occurrence Matrix1 (GLCM) features contrast, correlation, energy, and homogeneity has been discussed with

peripheral physiological signals. Emotions are classified using Linear Discriminant Analysis (LDA) and obtained

an accuracy of 93.8. The proposed novel method discussed the effect of distances, and direction on GLCM features

for different emotions. This paper concluded that GLCM features are an effective measure to discriminate the

emotions and give significant knowledge for each emotion. The proposed novel methodology can be used as a tool

for emotion analysis and it can also be useful for observing brain lobe variation globally.

Keywords: Electroencephalography, Gray Level Co-occurrence Matrix1, physiological signals, Linear

Discriminant Analysis

293-297

Page 40: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

References: 1. Moataz El Ayadi, Mohamed S Kamel, and Fakhri Karray. Survey on speech emotion recognition: Features, classification schemes, and

databases. Pattern Recognition, 44(3):572–587, 2011.

2. Ira Cohen, Ashutosh Garg, Thomas S Huang, et al. “Emotion recognition from facial expressions using multilevel HMM”, in Neural information processing systems, volume 2. Citeseer, 2000.

3. Yedatore V Venkatesh, Ashraf A Kassim, Jun Yuan, and Tan Dat Nguyen on, “The simultaneous recognition of identity and expression

from bu-3dfe datasets” Pattern recognition letters, 33(13):1785–1793, 2012 4. Bert Arnrich, Cornelia Setz, Roberto La Marca, Gerhard Tr¨oster, and Ulrike Ehlert. What does your chair know about your stress level?

IEEE Transactions on Information Technology in Biomedicine, 14(2):207–214, 2010.

5. Wanhui Wen, Guangyuan Liu, Nanpu Cheng, Jie Wei, Pengchao Shangguan, and Wenjin Huang. Emotion recognition based on multi-variant correlation of physiological signals. IEEE Transactions on Affective Computing, 5(2):126–140, 2014.

6. M Tuceryan and AK Jain. Texture analysis. the handbook of pattern recognition and computer vision, river edge, 1998.

7. Sander Koelstra, Christian Muhl, Mohammad Soleymani, Jong-Seok Lee, Ashkan Yazdani, Touradj Ebrahimi, Thierry Pun, Anton Nijholt, and Ioannis Patras. Deap: A database for emotion analysis; using physiological signals. IEEE Transactions on Affective

Computing, 3(1):18–31, 2012.

8. James A Russell. A circumplex model of affect. Journal of Personality and Social Psychology, 39(6):1161–1178, 1980. 9. Thea Andersen, Gintare Anisimovaite, Anders Christiansen, Mohamed Hussein, Carol Lund, Thomas Nielsen, Eoin Rafferty, Niels C

Nilsson, Rolf Nordahl, and Stefania Serafin. A preliminary study of users’ experiences of meditation in virtual reality. In Virtual Reality

(VR), 2017 IEEE, pages 343–344. IEEE, 2017 10. Zeynab Mohammadi, Javad Frounchi, and Mahmood Amiri. Wavelet-based emotion recognition system using EEG signal. Neural

Computing and Applications, 28(8):1985–1990, 2017.

11. N Murali Krishna, J Sirisha Devi, Y Srinivas. A Novel Approach for Effective Emotion Recognition Using Double Truncated Gaussian Mixture Model and EEG.I.J. Intelligent Systems and Applications, 2017

12. N Murali Krishna, J Sirisha Devi, N Siva Prasad. Emotion Recognition Using Skew Gaussian Mixture Model for Brain–Computer

Interaction. Soft Computing in Data Analytics, Advances in Intelligent Systems and Computing, 2019

55.

Authors: P.Sakthi Shunmuga Sundaram, N.Hari Basker, L.Natrayan

Paper Title: Smart Clothes with Bio-Sensors for ECG Monitoring

Abstract: Aging society leads to more demands on health care system. The study shows that cardiovascular

diseases are the most common and threatening diseases to the elderly. Moreover, more and more elderly live alone

recently. Therefore, a total solution for elderly home care leads the way. In this study, we develop smart clothes to

record three lead electrocardiography (ECG). Our system consists of (1) the conductive fiber clothes with four

electrodes to acquire physiological signals, (2) a gateway to digitize, process and upload raw data to the server, and

(3) the service server to analyze data and make a health profile. The system had been applied to the elderly

community to evaluate performance. The experiment results show the average accuracy of ECG data is 86.82%.

Thirty-five volunteers (age > 65, 15 male and 20 female) feel the smart clothes comfortable and easy to use than

the traditional medical device.

Keywords: Smart Wearable Device; Smart Clothes; Long-Term Care; Electrocardiography; Bio-Sensor

References: 1. Anonymous, “Trends in aging–united states and worldwide,” MMWR Morb Mortal Wkly, vol. 52, no. 6, pp. 101–104, 2003. 2. L. Natrayan and M. Senthil Kumar. Study on Squeeze Casting of Aluminum Matrix Composites-A Review. Advanced

Manufacturing and Materials Science. Springer, Cham, 2018. 75-83. (https://doi.org/10.1007/978-3-319-76276-0_8.)

3. M. Senthil Kumar et. al, Experimental investigations on mechanical and microstructural properties of Al2O3/SiC reinforced hybrid metal matrix composite, IOP Conference Series: Materials Science and Engineering, Volume 402, Number 1, PP 012123.

(https://doi.org/10.1088/1757-899X/402/1/012123)

4. C. C. Lin, M. J. Chiu, C. C. Hsiao, R. G. Lee, and Y. S. Tsai, “A wireless healthcare service system for elderly with Dementia,” IEEE Trans. Inf. Technol. Biomed., vol. 10, no. 4, pp. 696–704, 2006.

5. L.Natrayan et al. Optimization of squeeze cast process parameters on mechanical properties of Al2O3/SiC reinforced hybrid metal

matrix composites using taguchi technique. Mater. Res. Express; 5: 066516. (DOI: 10.1088/2053-1591/aac873,2018) 6. S.Yogeshwaran, R.Prabhu, Natrayan.L, Mechanical Properties Of Leaf Ashes Reinforced Aluminum Alloy Metal Matrix

Composites, International Journal of Applied Engineering Research ISSN 0973-4562 Volume 10, Number 13, 2015.

7. S. Sneha and U. Varshney, “A wireless ECG monitoring system for pervasive healthcare,” Int. J. Electron. Healthcare, vol. 3, no. 1, pp. 32–50, 2007.

8. J. Muhlsteff, O. Such, R. Schmidt, M. Perkuhn, H. Reiter, J. Lauter, J. Thijs, G. Musch, and M. Harris, “Wearable approach for

continuous ECG–and activity patient-monitoring,” in the Proceedings of the 26th Annu. Int. Conf.EMBC. 2004, pp. 2184–2187. 9. L.Natrayan et al. An experimental investigation on mechanical behaviour of SiCp reinforced Al 6061 MMC using squeeze casting

process. Inter J Mech Prod Engi Res Develop., 7(6):663–668, 2017.

10. T. Pawar, N. S. Anantakrishnan, S. Chaudhuri and S. P. Duttagupta, “Impact analysis of body movement in ambulatory ECG,” in the Proceedings of the Engineering in Medicine and Biology Society. 2007, pp. 5453-5456.

11. M. S. Santhosh, R. Sasikumar, L. Natrayan, M. Senthil Kumar, V. Elango and M. Vanmathi. (2018). Investigation of mechanical

and electrical properties of kevlar/E-glass and basalt/E-glass reinforced hybrid Composites. . Inter J Mech Prod Engi Res Develop., 8(3): 591-598.

298-301

56.

Authors: D. Lavanya, N.Thirupathi Rao, Debnath Bhattacharyya, Tai-Hoon Kim

Paper Title: Generalized Detection of Colloid Cyst in Brain using MRI Scan/CT Scan

Abstract: Brain is one of the most important organs in the human body. The working of this organ decides the

human being work and his life to success. In order to lead the good life, one should have the brain and its related

parts under good condition, i.e., not affected with any diseases or any serious problems. The presence of cyst in the

brain is one of the important issues to be considered and identification of such cyst in good time is very important

for the health of a human being. If the cyst is not identified in appropriate times, the brain will be suffered with

serious issues and it may lead to the loss of the human being. Hence, in this article a new approach is taken to

consideration for identification of the cyst in the brain through MRI/CT scan images. In the current work, a new

approach of matrix method with the combination of monochrome images was considered for identification of the

cyst presence with MRI/CT scan images. A new algorithm was also proposed to find the presence of cyst in the

302-306

Page 41: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

brain with more accurate performance. The performance of the current model was verified with two sets of scan

images and the results are displayed in the result section.

Keywords: Neuroepithelial Cyst, Magnetic Resonance Images (MRI), Computed Tomography (CT), Fixed

Threshold Method.

References: 1. Q. Javed and A. Dutta, “Third Ventricular Colloid Cyst and Organic Hypomania”, Progress in Neurology and Psychiatry, (2014), pp.18.

2. http://www.medicalnewstoday.com/articles/181727.php[Accessed 17.06.2018].

3. http://www.abta.org/secure/resource-one-sheets/cysts.pdf[Accessed 18.06.2018]. 4. K. Sheikh, V. Sutar and S. Thigale, “Clustering based Segmentation Approach to Detect Brain Tumor from MRI Scan”, International

Journal of Computer Applications (0975 – 8887), vol. 118, no. 8, (2015), pp.36-39.

5. E. E. Mohd, A. Muhd, M. Mohd, H. Z. Z. Htike and S. L. Win, “Brain Tumor Convergence and Services (IJITCS), vol. 4, no. 1, (2014), pp.1-11.

6. V. D. Dharmale and P. A. Tijare, “Segmentation and Canny Edge Method in MRI Brain Cyst Detection”, International Journal of

Advanced Computer Research, vol. 3, no. 4, (2013), pp.289-293. 7. L. P. Bhaiya, S. Goswami and V. Pali, “Classification of MRI Brain Images using NeuroFuzzy Model”, International Journal of

Engineering Inventions, Vol. 1, no. 4, (2012), pp.27-31.

8. M. Tariq, A. Khawajah and M. Hussain, “Image Processing with the specific focus on early tumor detection”, International Journal of Machine Learning and Computing, vol. 3, no. 5, (2013), pp. 404- 407.

9. C. Mamourian, L. D. Cromwell and R. E. Harbaugh, “Colloid Cyst of third Ventricle: Sometimes More Conspicuous on CT than MR”,

AJNR Am J Neuroradiol, (1998), pp.875-878.[Accessed 02.07.2018]. 10. https://www.researchgate.net/publication/286816381_A_Comparative_Analysis_on_Edge

11. detection_ofColloid_Cyst_A_Medical_Imaging_Approach [Accessed 03.07.2018]. 12. http://www.ncbi.nlm.nih.gov/pmc/articles/PMC1550234/[Accessed 03.07.2018].

13. https://en.wikipedia.org/wiki/Image_noise#Low_and_high-ISO_noise_examples [Accessed 05.07.2018].

14. http://mstrzel.eletel.p.lodz.pl/mstrzel/pattern_rec/filtering.pdf[Accessed 06.07.2018]. 15. http://www.mecs-press.org/ijisa/ijisa-v5-n11/IJISA-V5-N11-3.pdf[Accessed 07.07.2018].

16. V. Kshirsagar and J. Panchal, “Segmentation of Brain Tumor and Its Area Calculation”, International Journal of Advanced Research in

Computer Science and Software Engineering, vol. 4, no. 5, (2014), pp. 528-529. 17. https://en.wikipedia.org/wiki/Cyst[Accessed 16.07.2018].

18. Debapriya Hazra, Debnath Bhattacharyya, Hye-Jin Kim, “Detection of Colloid Cyst in Brain through Image Processing Techniques”,

International Journal of Multimedia and Ubiquitous Engineering, Vol.11, No.9 (2016), Pp.343-354.

57.

Authors: Nagi Reddy. B, A. Pandian, O. Chandra Sekhar, M. Ramamoorty

Paper Title: Performance and Dynamic Analysis of Single Switch AC-DC Buck-Boost Buck Converter

Abstract: Dynamic analysis of proposed single switch ac-dc buck-boost buck converter is presented in this

paper. The proposed converter is an integrated converter contains two inductors, one is at input side and other one

is at output side. To achieve unity power factor at input terminals, the input inductor is designed for discontinuous

mode (DCM). This condition will eliminate extra control technique for power factor correction (PFC). The output

side inductor is operated in DCM to reduce the bus capacitor voltage, thereby reducing the capacitance size. A PI

controller is designed to regulate the pulses for the converter. The proposed converter is designed in MATLAB

software for 60V output voltage. The analysis has been done for three different cases (variable frequency, variable

input and variable load) to verify the converter performance.

Keywords: Single switch, ac-dc converter, buck-boost, power factor correction (PFC), dynamic analysis.

References: 1. M. Brkovic and S. Cuk, “Novel single stage ac-to-dc converters with magnetic amplifiers and high power factor,” in Proc. IEEE Appl.

Power Electron. Conf., 1995, pp. 447–453. 2. Nagi Reddy. B, O. Chandra Sekhar, M. Ramamoorty, “Analysis and implementation of single-stage buck-boost buck converter for

battery charging applications”; Journal of Advanced Research in Dynamical and Control Systems (JARDCS), Vol. 10, No. 4, April 2018,

pp 462-475. 3. M. T. Madigan, R.W. Erickson, and E. H. Ismail, “Integrated high quality rectifier-regulators,” IEEE Trans. Ind. Electron., vol. 46, no. 4,

pp. 749–758, Aug. 1999.

4. R. Redl, L. Balogh, and N. O. Sokal, “A new family of single stage isolated power factor correctors with fast regulation of the output voltage,” in Proc. IEEE Power Electron. Spec. Conf., 1994, pp. 1137–1144.

5. M. M. Jovanovic, D. M. Tsang, and F. C. Lee, “Reduction of voltage stress in integrated high quality rectifier regulators by variable

frequency control,” in Proc. IEEE Appl. Power Electron. Conf., 1994, pp. 569–575. 6. M. J. Willers, M. G. Egan, J. M. D. Murphy, and S. Daly, “A BIFRED converter with a wide load range,” in Proc. IEEE Int. Conf. IECON,

1994,

7. pp. 226–231. 8. Nagi Reddy. B, A. Pandian, O. Chandra Sekhar, M. Rammoorty, “Design of Non-isolated integrated type AC-DC converter with extended

voltage gain and high power factor for Class-C&D applications”. International Journal of Recent Technology and Engineering (IJRTE),

Vol. 7, No. 5, Jan 2019, pp 230-236. 9. Nagi Reddy. B, O. Chandra Sekhar, M. Ramamoorty, “Implementation of zero-current switch turn-ON based buck-boost buck type rectifier

for low power applications”. International Journal of electronics – Taylor & Francis publication (Accepted for publication).

307-313

58.

Authors: Richa Gupta, Radhika Goel

Paper Title: A Necessary and Sufficient Condition for the Existence of Asymmetrical Reversible VLCs

Abstract: Affix-free codes are widely used in multimedia communications because of its error tolerance

capbility. Reversible Variable Length Code (RVLC) is a type of affix-free code. In literature, there are many

construction algorithms available for RVLCs. But unlike Variable Length Codes (VLCs), RVLCs lack in the area

of its mathematical development in the form of lower bound or upper bound on average codeword length, bounds

on existence, and related Theorems. Only few mathematicians have done some work on this. In 2014, Richa and

Radhika have proposed and discussed the necessary and sufficient condition on the number of codewords for a

314-317

Page 42: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

particular (bit length vector) required for the existence of symmetrical RVLCs. This paper is an extension of the

earlier published paper on the similar ground, but for asymmetrical RVLCs. This paper derives and discusses

necessary and sufficient condition, on bit length vector (the number of codewords for a particular length), required

for the existence of asymmetrical RVLCs over the given D-ary code alphabet.

Keywords: Affix-free codes, Symmetrical RVLC, asymmetrical RVLCs, mathematical bound on RVLC, bit

length vector, Kraft inequality.

References: 1. D. Huffman, “A method for the Construction of Minimum Redundancy Codes”, Proceedings of IRE, 40, 1962, pp. 1098-1101.

2. ISO/IEC JTC1/SC29/WG11/N3908, “MPEG-4 video verification model,” Vers. 18.0, Jan. 2001. 3. ITU-T Recommendation H.263, “Video coding for low bit rate communication,” Annex D, Feb. 1998.

4. H. Wang, S. N. Koh, and W.W. Chang, “Application of reversible variable-length codes in robust speech coding,” IEEE Proc. Commun.,

vol. 152, no. 3, June 2005, pp. 272-276. 5. Y. Takishima, M. Wada, and H. Murakami, “Reversible variable length codes,” IEEE Trans. Commun., vol. 43, Feb.-Apr. 1995, pp.

158–162.

6. C. W. Tsai and J. L. Wu, "Modified symmetrical reversible variable-length code and its theoretical bounds," IEEE Trans. Inform. Theory, vol. 47, Sept. 2001, pp. 2543-2548.

7. W. H. Jeong and Y. S. Ho, “Design of Symmetrical Reversible Variable Length Codes from the Huffman Code,” Picture Coding

Symposium, 2003, pp. 135-138. 8. R.Goel and R. Gupta. "Redesigning of the Construction of Symmetrical RVLCS Based On Graph Model.", International Journal of

Information & Computation Technology, vol. 4, no. 11, 2014, pp. 1063-1068.

9. H. J. Yan, C. Y. Lin, L. Zhong , “On constructing symmetrical reversible variable-length codes independent of the Huffman code, ’’The National Key Laboratory on Integrated Service Networks, Xidian University, Xi’an 710071, China, accepted Feb. 22, 2006.

10. S. Golomb, “Run Length Encodings,” IEEE Transactions on Information Theory, vol. 12, no. 3, 1966, pp. 399-401. 11. Abedini, S. P. Khatri, and S. A. Savari, “A SAT-based scheme to determine optimal fix-free codes,” Proc. of the 2010 IEEE Data

Compression Conference, Snowbird, Utah, March 2010, pp. 169-178.

12. S. M. Hossein, T. Yazdi and S. A. Savari, “On the Relationships among Optimal Symmetric Fix-Free Codes,” IEEE Data Compression Conference, 2013, pp. 391-400.

13. A. Savari, “On optimal reversible-variable-length codes,” Proc. Information Theory and Applications Workshop, La Jolla, CA, February

10, 2009, pp. 311-317. 14. K. Sayood, Introduction to data compression, New Delhi: Elsevier, 2011.

15. L.G. Kraft, A device for quantizing, grouping and coding amplitude modulated pulses, Master’s thesis, Dept. of Electrical Engineering,

M.I.T., Cambridge, Mass., 1949. 16. Goel, R., and Gupta, R. Necessary and sufficient condition for the existence of symmetrical Reversible Variable Length Codes, based on

Kraft's inequality. In IEEE Conference publication Recent Advances and Innovations in Engineering (ICRAIE), May, 2014, pp. 1-3.

59.

Authors: R A Veer, L C Siddanna Gowd

Paper Title: A Novel Classification Approach for MIMO-OFDM

Abstract: The expanding unpredictability of designing cellular networks recommends that machine learning

(ML) can successfully enhance 5G advances. Machine learning has proven successful a performance that scales

with the measure of accessible data. The absence of vast datasets restrains the twist of machine learning

applications in remote interchanges. The transmission state is thought to be a component of the highlights of a

channel situation like the obstruction and noise, the relative motion between the transmitter and the receiver and

this capacity is acquired by the machine learning strategy. The preparation dataset is produced by recreations on

the channel condition. The Jrip, J48 and Naïve Bayes are the three algorithms implemented in this research work.

This research work test if machine learning methods can predict the transmission states with a high accuracy

compared to conventional approaches.

Keywords: Machine Learning, Jrip, MIMO, J48, OFDM, CRC and Naïve Bayes.

References:

1. Omri and R. Bouallegue, New Transmission Scheme for MIMO-OFDM System, International Journal of Next-Generation Networks (IJNGN) Vol.3, No.1, March 2011.

2. Sumitra N. Motade,; Anju V. Kulkarni. Channel Estimation and Data Detection Using Machine Learning for MIMO 5G Communication

Systems in Fading Channel, Technologies, 2018, 6, 72.

3. https://pdfs.semanticscholar.org/d091/af5c2f1e693b5a66ccb76f93956c3199f152.pdf

4. Seppo Hämäläinen, Peter Slanina, Magnus Hartman, Antti Lappeteläinen, Harri Holma, and Oscar Salonaho. A novel interface between

link and system level simulations. In Proceedings of the ACTS Mobile Telecommunications Summit, volume 97, pages599–604, 1997. 5. Joseph Mitola. Cognitive radio—an integrated agent architecture for software definedradio. 2000.

6. Charles Clancy, Joe Hecker, Erich Stuntebeck, and Tim O’Shea. Applications of machine learning to cognitive radio networks. IEEE

Wireless Communications, 14(4), 2007. 7. Tobias Gruber, Sebastian Cammerer, Jakob Hoydis, and Stephan ten Brink. On deep Learning-based channel decoding. arXiv preprint

arXiv:1701.07738, 2017.

8. Emre Telatar. Capacity of multi-antenna gaussian channels. European transactions on telecommunications, 10(6):585–595, 1999. 9. Gerard J Foschini. Layered space-time architecture for wireless communication in a fading environment when using multi-element

antennas. Bell labs technical journal, 1 (2):41–59, 1996.

10. Vahid Tarokh, Hamid Jafarkhani, and A Robert Calderbank. Space-time block codes from orthogonal designs. IEEE Transactions on information theory, 45(5):1456–1467, 1999.

318-320

60.

Authors: Ramjeevan Singh Thakur

Paper Title: Associative Analysis among Attribute of ILPD Medical Datasets Using ARM

Abstract: Early detection of liver disease plays a major role in efficient diagnosis the disease. It significantly

increases the chance of effective treatment. The liver is one of the largest organs in the human body. It plays an

important role in digestion, as detoxifying chemicals in the digestion process. A dreadful fact of liver disease is

that, the liver maintains a normal functionality even after partially damage. The major challenge in liver disease is

321-328

Page 43: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

to find the hidden patterns of liver disorder. The proposed approach analysis the patterns on the selected features

using association rule mining (ARM) technique. The performance of the proposed approach is tested on the well-

renowned ILPD dataset from the UCI repository. ILPD dataset consists of different clinical examination

parameter like total bilirubin, direct bilirubin, SGPT, SGOT, alkphos, total protein, albumin etc. The proposed

approach selected the essential features from ILPD and ARM is applied to find the association among attributes to

detect pattern.

Keywords: Indian Liver Patient Datasets, Association rule mining, Liver Disorder, Associative Analysis.

References: 1. Ben-Cohen, E. Klang, A. Kerpel, E. Konen, M. M. Amitai, and H. Greenspan, "Fully convolutional network and sparsity-based dictionary

learning for liver lesion detection in CT examinations," Neurocomputing, vol. 275, pp. 1585-1594, 2018.

2. R.-H. Lin and C.-L. Chuang, "A hybrid diagnosis model for determining the types of the liver disease," Computers in Biology and

Medicine, vol. 40, no. 7, pp. 665-670, 2010. 3. M. Frid-Adar, I. Diamant, E. Klang, M. Amitai, J. Goldberger, and H. Greenspan, "GAN-based Synthetic Medical Image Augmentation

for increased CNN Performance in Liver Lesion Classification," arXiv preprint arXiv:1803.01229, 2018.

4. Z. Janikow, "Fuzzy decision trees: issues and methods," IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), vol. 28, no. 1, pp. 1-14, 1998.

5. T. R. Baitharu and S. K. Pani, "Analysis of Data Mining Techniques for Healthcare Decision Support System Using Liver Disorder

6. Dataset," Procedia Computer Science, vol. 85, pp. 862-870, 2016. 7. Y. Kumar and G. Sahoo, "Prediction of different types of liver diseases using rule based classification model," Technology and Health

Care, vol. 21, no. 5, pp. 417-432, 2013.

8. S. Dhamodharan, "Liver disease prediction using bayesian classification," in 4th National Conference on Advanced Computing, Applications & Technologies, 2014, pp. 1-3.

9. N. Nahar and F. Ara, "Liver disease prediction by using different Decision Tree techniques," International Journal of Data Mining &

Knowledge Management Process (IJDKP), vol. 8, no. 2, 2018. 10. P. Rajeswari and G. S. Reena, "Analysis of liver disorder using data mining algorithm," Global journal of computer science and

technology, vol. 10, no. 14, pp. 48-52, 2010.

11. Pathan, D. Mhaske, S. Jadhav, R. Bhondave, and K. Rajeswari, "Comparative Study of Different Classification Algorithms on ILPD Dataset to Predict Liver Disorder.", IJRASET, vol. 06, pp. 388-394, 2018P.

12. Thangaraju and R. Mehala, "Performance Analysis of PSO-KStar Classifier over Liver Diseases," International Journal of Advanced

Research in Computer Engineering, vol. 04, no. 07, pp. 3132-3137, 2015. 13. R. Agrawal and R. Srikant, "Fast algorithms for mining association rules in large databases, In Proc. of the 20th VLDB Conference, 1994,

pp. 487-499.

14. R. Srikant and R. Agrawal, "Mining generalized association rules," Future generation computer systems 13, no. 2-3, pp.161-180, 1997. 15. R. Srikant, "Fast algorithms for mining association rules and sequential patterns," PhD diss., University of Wisconsin, Madison, 1996.

16. R. V. Priya, A. Vadivel, and R. Thakur, "Frequent pattern mining using modified CP-tree for knowledge discovery," in International

Conference on Advanced Data Mining and Applications, 2010, pp. 254-261: Springer. 17. Sabnis, N. Khare, R. Thakur, and K. Pardasani, "Karnaugh Map Model for Mining Association Relationships in Web Content Data:

Hypertext," Data Mining and Knowledge Engineering, vol. 4, no. 11, pp. 579-587, 2012.

18. V. Tiwari and R. S. Thakur, "P²MS: a phase-wise pattern management system for pattern warehouse," International Journal of Data

Mining, Modelling and Management, vol. 7, no. 4, pp. 331-350, 2015.

19. V. Tiwari and R. S. Thakur, "Towards important issues of pattern retrieval: pattern warehouse," International Journal of Data Science,

vol. 2, no. 1, pp. 1-14, 2017. 20. V. Tiwari and R. Thakur, "A Level Wise Tree Based Approach for Ontology-Driven Association Rules Mining," Data Mining and

Knowledge Engineering, vol. 4, no. 5, pp. 252-259, 2012.

21. S. Rajput, R. S. Thakur, and G. S. Thakur, "An Integrated Approach and Framework for Document Clustering Using Graph Based Association Rule Mining," in Proceedings of the Second International Conference on Soft Computing for Problem Solving (SocProS

2012), December 28-30, 2012, pp. 1421-1437: Springer. 22. J. Han, J. Pei, and M. Kamber, Data mining: concepts and techniques. Elsevier, 2011.

23. ILPD Dataset: https://archive.ics.uci.edu/ml/datasets/ILPD+(Indian+Liver+Patient+Dataset).

61.

Authors: Kulkarni Rashmi Manik, S Arulselvi, B Karthik

Paper Title: Designing Network Interface Component for Peripheral IP cores in Networks-on-chip

Abstract: The Network-Interface-Componant (NIC) is required for IP cores for interconnecting IPs to Routers

in NoC. In implementation of NoC, Interface Component is very crucial for adapting IPs in NoC. NIC as a

software component occupies processor’s considerable execution time. Processor can be relieved from this

overload by introducing separate hardware as NIC. A hierarchical topology for NoC is considered in this research

article. In hierarchical topology, each router can connect to eight nodes (IP) of same hierarchy and to a router in

next hierarchy. Each node is connected to router port with NIC. The fixed address based routing is implemented in

the NOC. The network packet switching based transactions among various nodes is assumed. The implementation

of NIC design with options for different IPs (considering existing bus based interfaces) is attempted in this work.

Keywords: NoC, NIC, IPs, PE, ASIC and NS/CS.

References: 1. Brahim Attia, Abdelkrim Zitouni, Kholdoun Torki and Rached Tourki “A Low Latency and Power ASIC Design of ModularNetwork

Interfaces for Network on Chip”, IJCSES International Journal of Computer Sciences and Engineering Systems, Vol. 5, No. 4, October

2011. 2. Masoud Daneshtalab, Masoumeh Ebrahimi, Juha Plosila, Hannu Tenhunen, “CARS: Congestion-Aware Request Scheduler forNetwork

Interfaces in NoC-based Manycore Systems”.

3. Wang Jian, Yang Zhijia,“Design of network adapter compatible OCP for high-throughput NOC”, Applied Mechanics and Materials Vols. 313-314 pp 1341-1346, Trans Tech Publications, Switzerland, 25 March 2013.

4. Azad Fakhari, “Designing Customizable Network-on-Chip withsupport for Embedded Private Memory for Multi-Processor System-on-

Chips”, Thesesand Dissertations,University of Arkansas, Fayetteville, May 2014

5. Masoumeh Ebrahimi, Masoud Daneshtalab, N P Sreejesh, Pasi Liljeberg, Hannu Tenhunen, “Efficient Network Interface Architecture

forNetwork-on-Chips”, Department of Information Technology, University of Turku, Turku, Finland.

6. Leandro Fiorin, Mariagiovanna Sami, “Fault-Tolerant NetworkInterfaces for Networks-on-Chip”, IEEE Transactionson Dependableand

329-336

Page 44: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

Secure Computing, VOL. 11, NO. 1, Jan/Feb 2014.

7. Tung Nguyeny, Duy-Hieu Buiy, Hai-Phong Phany, Trong-Trinh Dangand Xuan-Tu Trany, “High-Performance Adaption of ARM

Processorsinto Network-on-Chip Architectures”, ySIS Laboratory, VNU University of Engineering and Technology,Cau Giay, Hanoi, Vietnam.

8. Rachid Dafali, Jean-Philippe Diguetand Jean-Charles Creput “Self-Adaptive Network-on-Chip Interface”, Submittedto IEEE Embedded

Systemsletters, Vol. X, No. X, Month Year.

9. Ahmed H.M. Soliman, E.M. Saad, M. El-Bablyand Hesham M. A. M. Keshk, “Designing a WISHBONE Protocol Network Adapter for

an Asynchronous Network-on-Chip”,IJCS (International Journal of Computer Science), Issues, Vol. 8, Issue 4, No 2, University of

Helwan, Cairo, Egypt 11795, Helwan, July 2011. 10. Vijaykumar R Urkude1, Dr. P. Sudhakara Rao, “Low Power 2-D Mesh Network-on-Chip Router using Clock Gating Techniques”,IOSR

Journal of VLSI and Signal Processing (IOSR-JVSP) Volume 6, Issue 6, Ver. I, PP 85-91,Nov -Dec 2016.

11. Alexandros Daglis, Stanko Novakovi´c, Edouard Bugnion, Babak Falsafi, Boris Groty,”Manycore Network Interfaces for In-Memory Rack-Scale Computing” In Proceedings of the 42nd International Symposium on Computer Architecture (ISCA 2015), EcoCloud, EPFL

yUniversity of Edinburgh

12. Marcelo Ruaro, Felipe B. Lazzarotto, César A. Marcon, Fernando G. Moraes “DMNI: A Specialized Network Interface for NoCbasedMPSoCs” PUCRS University, Computer Science Department, Porto Alegre, Brazil

13. Ruxandra Pop and Shashi Kumar, “A Survey of Techniques forMapping andScheduling Applications toNetwork on Chip Systems”, ISSN

1404 – 0018, Research Report 04:4, Embedded Systems Group, Department of Electronics and Computer Engineering, School of Engineering, Jönköping University, Jönköping, SWEDEN

14. Brahim Attia,Abdelkrim Zitouni and Rached Tourki, “Design andimplementation of network interfacecompatible OCP For packet based

NOC”, International Conference on Design & Technology of Integrated Systems in Nanoscale Era, Faculty of Sciences of Monastir, Laboratory of Electronic and Micro-Electronic (LAB-IT06), Monastir, 5019, Tunisia, 2010.

15. Sujay Gejji & Tripti Kulkarni, “DesignofreconfigurableandmodularNOCinterfacewithadvancednetworking functionalities”,Department of

E&C, PESIT,IRD India Bangalore, Karnataka. 16. Jens Spars, “Design of Networks-on-Chip for Real-TimeMulti-ProcessorSystems-on-Chip”, Department of Informatics and Mathematical

ModellingTechnical University of Denmark.

17. Nauman Jalil, Adnan Qureshi, Furqan Khan, and Sohaib Ayyaz Qazi, “Routing Algorithms, Process Model for Quality ofServices (QoS) and Architectures forTwo-Dimensional4 x 4 Mesh Topology Network-on-Chip”, International Journal of Computer Theory and

Engineering, Vol. 4, No. 1, February 2012.

18. Ryuya Okada, Prof. Abderazek Ben Abdallah “Design of Core Network Interface for Distributed Routing in OASISNoC”, ASL - Parallel Architecture Group, 2012.

19. Calin Ciordas, Kees Goossens, Twan Basten, Andrei Radulescu, Andre Boon, “Transaction Monitoring in Networks on Chip:The On-

Chip Run-Time Perspective” 20. Design Methodology for Electronic Systems, Eindhoven University of Technology, Eindhoven, Embedded Systems Architectures on

Silicon, Philips ResearchLaboratories, Prof. Holstlaan 4, NL-5656 AA Eindhoven.

21. Chenxin Zhang & Xiaodong Liu, “A presentation on Network-on-Chip(NoC)” 22. P. Gratz, C. Kim, R. McDonald, S.-W. Keckler, and D. Burger, “Implementation and evaluation of on-chip network architectures”,

Proceedings of the International Conference on Computer Design, pages 477–484, October 2006.

23. Glovanni De Michel, Luca Benini, “Networks on chips”, Morgan Koufmann Publications 24. Masoud Oveis-Gharan, Gul N. Khan, “Statistically adaptive multi FIFO buffer architecture for Netwrok on chip, Microprocessor and

Microsystems 39(2015).

25. Jason Cong, Michael Gill, Yuchen Hao, Glenn Reinman, Bo Yuan, “On chip interconnection network for Accelerator-Rich Architectures”. DAC’15.

26. Wan-Ting Su, Jih-Sheng Shen, Pao-Ann Hsiung, “Network on chip router design with buffer stealing”, 2011 IEEE.

27. Sudeep Pasricha, Nikil Dutt, Fadi J. Kurdahi, “Dynamically Re-configurable On-Chip Communication Architectures for Multi Use-Case Chip Multiprocessor Applications”, 2009 IEEE.

28. Zhonghai Lu, Ming Liu, Axel Jantsch, “Layered Switching for Network On Chips”, DAC 2007.

62.

Authors: G Jahnavi Chowdary , S. Palani Kumar

Paper Title: Advance Control Scheme for Correction of Power Factor and Voltage Stability by Using Electric

Spring

Abstract: A novel smart technology has been introduced in the demand side management which can be used

in real time i.e., electric spring. This electric spring provides voltage, power stability and found to be useful in

maintaining the voltage supply in spite of the fluctuations caused by the intermediate nature of renewable energy

sources and implemented in conjunction with non-critical loads and critical loads like electric heaters,

refrigerators, laptops, building security systems. To get better power factor correction, voltage support, power

balance in loads, using the properties of PLL through single phase d-q transformation scheme is developed. In

order to improve power-factor and voltage stability, fuzzy control scheme is proposed in this paper. By using

Fuzzification control scheme, power factor at loads, voltage stability of the system can be achieved. The

integration of electric spring in sequence to non-critical loads forms a smart load. Thereby alteration of active

power and reactive power is done automatically near non-critical loads. Simulation results are carried out for ES

based on PLL control by using fuzzy logic controller and their results are analyzed.

Keywords: Fuzzification, Electric Spring, Critical loads, Non-critical loads, Voltage stability, Renewable energy

sources, Power quality.

References: 1. M. Parvania and M. Fotuhi - Firuzabad, “Demand response scheduling by stochastic SCUC,” IEEE Trans. Smart Grid, vol.1,no.1, pp.89-

98,2010.

2. “Electric springs- A New Smart Grid Technology,” Shu Yuen (Ron) Hui, Fellow, IEEE, Chi Kwan Lee, Member, IEEE, and Felix F. Wu, Fellow, IEEE.

3. C. K. Lee, K. L. Cheng, and W. M. Ng, “Load characterization of electric spring,” in Proc. 2013 IEEE Energy Convers. Congr. Expo.,

Sep. 2013,pp. 4665–4670. 4. C. K. Lee, S. C. Tan, F. F. Wu, S. Y. R. Hui, and B. Chaudhuri, “Use

of Hooke’s law for stabilizing future smart grid—The electric spring

concept,” in Proc. IEEE Energy Convers. Congr. Expo., Sep. 2013, pp. 5253–5257.

5. C. K. Lee, B. Chaudhuri, and S. Y. Hui, “Hardware and control implementation of electric springs for stabilizing future smart grid with

intermittent renewable energy sources,” IEEE J. Emerg. Sel. Topics Power Electron.,vol. 1, no. 1, pp. 18–27, Mar. 2013. 6. K. T. Mok, S. C. Tan, and S. Y. R. Hui, “Decoupled power angle and voltage control of electric springs,” IEEE Trans. Power Electron.,

337-342

Page 45: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

vol. 31,no. 2, pp. 1216–1229, Feb. 2016

7. Q. Wang, M. Cheng, and Z. Chen, “Steady-state analysis of electric springs with a novel delta control,” IEEE trans. Power electron.,

vol.30,no.12, pp.7159-7169,dec 2015. 8. C. K. Lee and S. Y. Hui, “Reduction of energy storage requirements in future smart grid using electric springs,” IEEE Trans. Smart Grid,

vol. 4, no. 3, pp. 1282–1288, Sep. 2013.

9. J. Soni and S. K. Panda, “Electric spring for voltage and power stability and power factor correction,” in Proc. 2015 9th Int. Conf. Power Electron.,Jun. 2015, pp. 2091–2097

10. J. Soni, K. R. Krishnanand, and S. K. Panda, “Load-side demand management in buildings using controlled electric springs,” in Proc.

40th Annu. Conf. IEEE Ind. Electron. Soc., Oct. 2014, pp. 5376–5381. 11. F. Xiao, L. Dong, L. Li, and X. Liao, “A frequency-fixed SOGI based PLL for single-phase grid-connected converters,” IEEE Trans.

Power Electron.,vol. 32,

12. Electric Spring for Voltage and Power Stability and Power Factor Correction Jayantika Soni, Student Member, IEEE, and Sanjib Kumar Panda, Senior Member, IEEE no. 3, pp.

1713–1719, Mar. 2016.

13. S. R. Arya, B. Singh, A. Chandra, and K. Al-Haddad, “Power factor correction and zero voltage regulation in distribution system using DSTATCOM,” in Proc. 2012 IEEE Int. Conf. Power Electron., Drives,Energy Syst., Dec. 2012, pp. 1–6.

63.

Authors: M. Jagannath, C. Madan Mohan, Aswin Kumar, M.A. Aswathy, N. Nathiya

Paper Title: Design and Testing of a Spirometer for Pulmonary Functional Analysis

Abstract: Chronic Obstructive Pulmonary Disease (COPD) is considered as one of the greatest life-threatening

syndromes worldwide, and it is estimated that over 600 million are afflicted with the disease. The objective of this

study is to design and develop a spirometer which is functionally as well as cost effective. Authors have planned to

keep the cost below 100$. The proposed spirometer has four main components – spirometer body, Circuitry,

Computer and Software. The spirometer body includes a differential pressure sensor and a pilot tube through

which the patient blows. The output is transmitted to the microcontroller. The analog to digital convertor within

the microcontroller is employed for the conversion. Then the pressure difference output from the pressure sensor is

converted into mass flow rate which is subsequently converted into volume. The microcontroller relays this data

via a Universal Serial Bus (USB) connection to a computer which transmits this to the JavaScript based graphical

user interface. This interface is used to display the flow and volume data in real-time. Then this experiment has

proceeded further with this study by testing it on people. A spirometric test was conducted on 20 individuals of

different ages, heights and gender. Their test results were tabulated and inferences on their breathing condition

were drawn accordingly. The results show that lung capacity decreases with age. Although the current design is

not able to meet clinical accuracy, with professional manufacturing, such a design could yield a device capable of

meeting clinical accuracy without a significant increase in price.

Keywords: Chronic obstructive pulmonary disease; Microcontroller; Spirometer; Universal Serial Bus.

References: 1. https://www.nih.gov/news-events/news-releases/new-survey-suggests-growing-awareness-copd-nations-fourth-leading-killer Last

accessed on January 2019.

2. Á.A. Cruz, R. Stelmach and E.V. Ponte, “Asthma prevalence and severity in low‐resource communities,” Current Opinion in Allergy

and Clinical Immunology, vol. 17, pp. 188–93, 2017.

3. V. Agarwal and N.C.S. Ramachandran, “Design and development of a low-cost spirometer with an embedded web server,” International Journal of Biomedical Engineering and Technology, vol. 1, no. 4, pp. 439-452, 2008.

4. R.O. Crapo, “Pulmonary Function Testing” in Baum’s Textbook of Pulmonary Diseases, 7th ed., Philadelphia:

Lippincott Williams and Wilkins, 2004.

5. A.D. Gascoigne, P.A. Corris, J.H. Dark and G.J. Gibson, “The biphasic spirogram: a clue to unilateral narrowing of a mainstem bronchus,” Thorax, vol. 45, pp. 637-38, 1990.

6. G.T. Ferguson, P.L. Enright, A.S. Buist and M.W. Higgins, “Office spirometry for lung health assessment in adults,” Chest, vol. 117,

pp. 1146-61, 2000. 7. C.W. Lin, D.H. Wang, H.C. Wang and H.D. Wu, “Prototype development of digital spirometer,” Proc. IEEE conference on

Engineering in Medicine and Biology, vol. 20, no. 4, pp. 1786–1788, 1998.

8. G.P.K. Economou, P.D. Goumas and K. Spiropoulos, “A novel medical decision support system,” IEEE Control and Computing Journal, pp. 177–183, 1993.

9. W.G. Downing Jr., “Electronic measurements of pulmonary mechanics,” WESCON ‘95. Conference Record, November, pp.644–649,

1995.

10. J.L. Hankinson, J.R. Odencrantz and K.B. Fedan, “Spirometric reference values from a sample of the general U.S. population,” The

American Journal of Respiratory and Critical Care Medicine, vol.159, pp. 179–187, 1999.

11. M.R. Miller, J. Hankinson, V. Brusasco, F. Burgos, R. Casaburi, A. Coates et al., “Standardisation of spirometry,” The European Respiratory Journal, vol.26, pp. 319-38, 2005.

12. W. Barud, S. Ostrowski, A. Wojnicz, J.A. Hanzlik, B. Samulak and J.J. Tomaszewski, “Evaluation of lung function in male population from vocational mining schools of the Lublin Coal Basin,” Annales Universitatis Mariae Curie-Sklodowska Mathematica, vol. 46, pp.

39-43, 1991.

13. Y. Tang, M.J. Turner, J.S. Yem and A.B. Baker, “Calibration of pneumotachographs using a calibrated syringe,” The Journal of Applied Physiology, vol. 95, pp. 571-76, 2003.

14. S. Stanojevic, A. Wade and J. Stocks, “Reference values for lung function: past, present and future,” The European Respiratory

Journal, vol. 36, pp. 12–19, 2010. 15. F. Al-Ashkar, R. Mehra and P. J. Mazzone, “Interpreting pulmonary function tests: Recognize the pattern, and the diagnosis will

follow,” Cleveland Clinic Journal of Medicine, vol. 70: 866–881, 2003.

343-347

64.

Authors: I V S Venugopal, D Lalitha Bhaskari, M N Seetaramanath

Paper Title: A Progressive Classification Framework for Detecting SPAM emails and Identification of Authors

Abstract: Emails are the most popular form of communication in the space of cyber communications. In the

recent past, many of the instances were observed, where the mode of communication were shifted to instance

communication methods such as instance messages or video-based services for interaction. Nevertheless, for a

detailed communication, there is no replacement of email communications. A number of surveys have reported

348-359

Page 46: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

that the amount of emails exchanged daily ranges between 200 to 250 million every day including the personal,

business or promotional emails. Considering such a massive space for information exchange, it is regardless to

mention that this space becomes the target for information misuses. One of the biggest threat to the email

collaboration is spam emails containing unsolicited information or many of the cases asking for critical

information of the recipients. Most of the email service providers helps the users by incorporating a spam filtering

process to prevent spamming in the email servers. Nonetheless, due to the critical nature of language used in

communication makes the spam detection highly difficult. The fundamental strategies followed by most of the

filters are to detect the spam emails based on specified key words. Regardless to mention, that in different domains

of business or studies, some of the keywords carry different significance and cannot be blacklisted. Also, the

inappropriate detection of the email as spam may lead to severe information loss. A good amount of research

attempts is made in the recent past to build a framework for detection of spams as perfect as possible. However,

due to the mentioned restriction the bottleneck still persists in between email filtration and detection of spam

accuracy. Thus, this work proposes a novel automatic framework for detecting the spam emails on a wide range of

domains. The obtained accuracy is significantly high for this framework due to the multiple layered approach

adapted. The framework deploys classification of the emails in various domains and further applies the keyword-

based filtration process with analysis of term frequency along with identification of the nature of the sender for

confirmation of the process resulting into progressive classification in order to make the world of email

communication highly secure and satisfiable.

Keywords: Spam filtering, Term Frequency, Term Relation, Domain Knowledge, Author identification,

progressive classification

References: 1. R. Team, "Email statistics report 2015-2019", Mar. 2015.

2. J. D. Brutlag, C. Meek, "Challenges of the email domain for text classification", Proc. ICML, pp. 103-110, 2000.

3. W. W. Cohen, "Learning rules that classify e-mail", Proc. AAAI Spring Symp. Mach. Learn. Inf. Access, pp. 25, 1996. 4. E. Blanzieri, A. Bryl, "A survey of learning-based techniques of email spam filtering", Artif. Intell. Rev., vol. 29, pp. 63-92, Sep. 2008.

5. T. S. Guzella, W. M. Caminhas, "A review of machine learning approaches to spam filtering", Expert Syst. Appl., vol. 36, pp. 10206-

10222, Oct. 2009. 6. S. Abu-Nimeh, D. Nappa, X. Wang, S. Nair, "A comparison of machine learning techniques for phishing detection", Proc. Anti-Phishing

Work Groups 2nd Annu. Ecrime Res. Summit, pp. 60-69, 2007.

7. A. Almomani, B. B. Gupta, S. Atawneh, A. Meulenberg, E. Almomani, "A survey of phishing email filtering techniques", IEEE Commun. Surveys Tuts., vol. 15, pp. 2070-2090, 4th Quart. 2013.

8. Y. W. Wang, Y. N. Liu, L. Z. Feng, X. D. Zhu, "Novel feature selection method based on harmony search for email classification",

Knowl.-Based Syst., vol. 73, pp. 311-323, Jan. 2015. 9. M. R. Schmid, F. Iqbal, B. C. M. Fung, "E-mail authorship attribution using customized associative classification", Digit. Investigat., vol.

14, pp. S116-S126, Aug. 2015.

10. M. T. Banday, S. A. Sheikh, "Multilingual e-mail classification using Bayesian filtering and language translation", Proc. Int. Conf.

Contemp. Comput. Informat., pp. 696-701, 2015.

11. M. Mohamad, A. Selamat, "An evaluation on the efficiency of hybrid feature selection in spam email classification", Proc. 2nd Int. Conf.

Comput. Commun. Control Technol., pp. 227-231, 2015. 12. N. A. Novino, K. A. Sohn, T. S. Chung, "A graph model based author attribution technique for single-class e-mail classification", Proc.

14th IEEE/ACIS Int. Conf. Comput. Inf. Sci. (ICIS), pp. 191-196, Sep. 2015.

13. W. Li, W. Meng, Z. Tan, Y. Xiang, "Towards designing an email classification system using multi-view based semi-supervised learning", Proc. 13th IEEE Int. Conf. Trust Secur. Privacy Comput. Commun. (TrustCom), pp. 174-181, Sep. 2015.

14. W. Li, W. Meng, "An empirical study on email classification using supervised machine learning in real environments", Proc. IEEE Int.

Conf. Commun. (ICC), pp. 7438-7443, Jun. 2015. 15. Z. J. Wang, Y. Liu, Z. J. Wang, D. L. Liu, X. B. Zhu, K. L. Xu, D. M. Fang, "E-mail filtration and classification based on variable

weights of the Bayesian algorithm" in Applied Science Materials Science and Information Technologies in Industry, Zürich,

Switzerland:Trans Tech Publications Ltd, vol. 513, pp. 2111-2114, 2014. 16. S. A. Saab, N. Mitri, M. Awad, "Ham or spam? A comparative study for some content-based classification algorithms for email filtering",

Proc. (MELECON), pp. 439-443, 2014.

17. M. R. Islam, J. Abawajy, M. Warren, Multi-Tier Phishing Email Classification with an Impact of Classifier Rescheduling, New York, NY, USA:IEEE, 2009.

18. A. A. Akinyelu, A. O. Adewumi, "Classification of phishing email using random forest machine learning technique", J. Appl. Math., vol.

2014, pp. 1-6, Apr. 2014. 19. J. C. Gomez, M. F. Moens, "PCA document reconstruction for email classification", Comput. Statist. Data Anal., vol. 56, pp. 741-751,

Sep. 2012.

20. N. Al Fe’ar, E. Al Turki, A. Al Zaid, M. Al Duwais, M. Al Sheddi, N. Al Khamees, E-Classifier: A Bi-Lingual Email Classification System, New York, NY, USA:IEEE, 2008.

21. E. K. Jamison, I. Gurevych, "Headerless quoteless but not hopeless? Using pairwise email classification to disentangle email threads",

Proc. 9th Int. Conf. Recent Adv. Natural Lang. Process., pp. 327-335, 2013. 22. J. Ratkiewicz et al., "Detecting and Tracking Political Abuse in Social Media", Proc. 5th Int’l AAAI Conf. Weblogs and Social Media,

2011

23. P.-A. Chirita, J. Diederich, W. Nejdl, "Mailrank: Using Ranking for Spam Detection", Proc. 14th ACM Int’l Conf. Information and Knowledge Management, pp. 373-380, 2005

24. H. Yu et al., "Sybillimit: A Near-Optimal Social Network Defense against Sybil Attacks", IEEE/ACM Trans. Networking, vol. 18, no. 3,

pp. 885-898, 2010. 25. J. Ratkiewicz et al., "Truthy: Mapping the Spread of Astroturf in Microblog Streams", Proc. 20th Int’l Conf. Comp. World Wide Web, pp.

249-252, 2011.

26. X. Hu et al., "Social Spammer Detection in Microblogging", Proc. 23rd Int’l Joint Conf. Artificial Intelligence, pp. 2633-2639, 2013. 27. Shivam Aggarwal,Vishal Kumar and S.D.Sudarshan,“Identification and Detection of Phishing Emails Using Natural Language

Processing Techniques”, Proceedings of the 7th International Conference on Security of Information and Networks,2014. 28. A. Pandian and Mohamed Abdul Karim, “Detection of Fraudulent Emails by Authorship Extraction”,International Journal of Computer

Applications (0975 – 8887), Volume 41– No.7, March 2012.

29. Hongming Che, Qinyun Liu and Lin Zou “A Content-Based Phishing Email Detection Method”, IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C),2017.

30. H. Alghamdi, "Can Phishing Education Enable Users To Recognize Phishing Attacks" in Dublin Institute of Technology, Dublin, Ireland,

2017.

Page 47: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

65.

Authors: Kadali lakshmi, Anakapalli Suresh, Arshini Gubbala

Paper Title: Development of FPGA Based Multi-Channel Temperature Controller using Thermistors for under

Water Vehicles

Abstract: Under water vehicles with electrical propulsion such as underwater autonomous vehicles are designed

to propel with high energy batteries. These batteries are the main source of power to motor and other electronic

subsystems. Temperature of the batteries is one of the critical parameter that gives the information about the health

of the battery and whether the battery is able to deliver the required power to other subsystems. In case of any

abnormality such as battery short circuit or other reasons, the temperature of the battery may shoot up to the alarm

levels at various places of the battery and other sub sections near to the battery because the temperature is

transferred from battery to the nearby shell and other subsystems. For this application, Multi-channel temperature

controller is designed, verified and tested in the battery assembly. The proposed system can monitor and control up

to the 32 temperature channels by integrating thermistors in the complete test set-up and it is designed in such a

way that the battery is disconnected from the other subsystems in case of any abnormality or temperature is

increased beyond the safety limit. In this paper, design, calibration and integration and testing of multi-channel

Temperature controller using FPGA with thermistors is discussed and the system has internal memory and it can

store the temperature at various channels in flash memory so that the system is well suited for not only self-

controlled underwater vehicles but also thermal engine based systems. The system can also monitor and control the

temperature in harsh environment even also in industrial applications. The system is designed in Spartan 3FPGA

using VHDL and verification of the design is done Xilinx chip-scope-pro. The front end Graphical User Interface

(GUI) is designed for online monitoring, data downloading and processing using visual C++ and MATLAB.

Keywords: Multi-channel Intelligent temperature controller, FPGA based system, Thermistors, Battery controller

with onboard systems, Battery monitoring system, Data Acquisition Systems, Graphical User Interface (GUI).

References: 1. Circuit Design with VHDL--- Volnei A.Pedroni .

2. FPGA Prototyping by VHDL Examples Xilinx SpartanTM-3 version----Pong P. Chu 3. Practical Data Acquisition for instrumentation & control system---- john park & steve mackay.

4. PI Daijun, ZHANG Haiyong and YE ianyang, "Design of High Speed Real-time Data Acquisition System Based on FPGA ", in Modem

electronic technology, 2009, pp. 12-14.High Performance Octal UART XR16L788 data sheet, REV1.2.2, October 2005. 5. OMEGA Temperature Measurement Handbook, Omega Instruments, Inc..

6. AD7655 16 bit Analog to Digital Converter,Data sheet, Analog Devices.

7. FDTI Chip FT245R USB FIFO IC Datasheet. 8. Xilinx Spartan-3E FPGAFamily Data Sheet.

9. Numonyx SLC NAND Flash Memories datasheet.

10. Jie Li, Qiao Jiang, Xi-ning Yu and Ying DU (2010), “Intelligent Temperature Detecting System”, 2010 International Conference on Intelligent System Design and Engineering Application, National Key Laboratory for Electronic Measurement, North University of

China, Taiyuan, 030051, China

11. S. Thanee S. Somkuarnpanit , “FPGA Based multi protocol data acquisition system with High speed USB interface”. IMECS, March 10-12, 2010.

360-364

66.

Authors: Vijayakumar R, NidhyaKumari R, Himani J, Rahul V, Varun V

Paper Title: Fabrication of Low Cost Solar using Polypropylene (PPR) Pipes – An Investigation

Abstract: The conversion of solar energy into thermal and electrical form is possible is possible by the using

photovoltaic modules and solar collectors. Solar collector absorbs the direct solar radiation and converts it into

thermal energy, which can be stored in the form of sensible heat/ latent heat and a combination of both diffused in

the working fluids. Present work deals with the performance evaluation of solar power based air heater fabricated

using polypropylene (PPR) pipes foiled with aluminium. The use of PPR polymer results in the reduction of total

initial cost of fabrication. The working fluid, which was air, is introduced into the collector system made of

polypropylene pipes and were the fluid (air) is heated by using solar energy. The outer surface of the PPR pipes

were paint in black color to maximize the absorption of incoming solar radiation. The air absorbs the entrapped

heat of the pipe and the heated air was comes out of the system. Further, to minimize heat losses from the front

collector, glass is used as a top cover. The change in temperature of the fluid with respect to time was observed.

The effectual inlet load of fluid (air) on the performance of solar heater was investigated by varying the mass flow

rate (MFR) of the fluid (air)

Keywords: air solar heater, PPR pipes, mass flow rate, efficiency

References: 1. R. K. Aharwal, K. Bhupendra Gandhi, J. S. Saini. "Heat transfer and friction characteristics of SAH ducts on absorber plate." International

journal of heat and mass transfer, volume 52, no. 25, 2009, pp. 5970-5977.

2. S. Y.-Ali. "Study and optimization of the thermal performances fin absorber plates, with various glazing." Renewable Energy, Volume 30,

no. 2, 2005, pp. 271-280. 3. Chabane, Foued, NoureddineMoummi, Said Benramache. "Experimental analysis on thermal performance of a solar air collector in a

region of Biskra, Algeria." Journal of Power Technologies, Volume 93, no. 1, 2013, pp.52-58.

4. Chow, Tin Tai. "A review on photovoltaic/thermal hybrid solar technology." Applied energy, Volume 87, no. 2, 2010, pp. 365-379. 5. P. Dhiman, N. S. Thakur, A. Kumar, S. Singh. "An analytical model of a novel parallel flow packed bed SAH." Applied energy, Volume

88, 2011, pp. 2157-2167

6. Y. K. Durgesh, A. K. Rai, V. Sachan. "Experimental study of SAH." International Journal of Advanced Research in Engineering and

Technology, volume 5, no. 5, 2014, pp.102–106

365-367

67. Authors: Dinokumar Kongkham, M.Sundararajan

Page 48: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

Paper Title: Minimized Interference in CRN using Conjunction Analysis and Resource Utilization over the Network

Abstract: Subjective radio system is a main correspondence organize which makes a long range

correspondence in a minimal effort and it is a quickest remote system. Usage of unused range band of essential

client by optional client. Because of expanding more number of optional clients at that point naturally emerging

shot for the impact of the two signs. The impedance is the principle issue in the intellectual radio system because

of movement and various correspondence. To diminish obstruction numerous methodologies and calculations are

proposed. Yet at the same time it stays unsolved. To decrease the obstruction besides we proposed a bar structure

i.e. the signs of a similar group hubs or adjacent hubs join a flag and asset to frame a solid flag called shaft flag and

after that correspondence will be continued. The bar will assist correspondence with being solid and limit the

impedance with different bars. We can diminish impedance up to 7-8% of the current approach.

Keywords: Intellectual radio network(CRN), obstruction, bar flag; bunch of hubs.

References: 1. Sheng ; Wang ; Cai Qin ; Weidong Wang, “Interference Alignment assisted by D2D communication for the Downlink of MIMO

Heterogeneous Networks,” EEE Access, ISSN: 2169-3536, 2018.

2. Solmaz Niknam ; Balasubramaniam Natarajan ; Reza Barazideh, “Interference Analysis for Finite-Area 5G mmWave Networks Considering Blockage Effect,” IEEE Access, ISSN: 2169-3536, 2018.

3. Longwei Wang ; Qilian Liang, “Partial Interference Alignment for Heterogeneous Cellular Networks,” IEEE Access, ISSN: 2169-3536,

2018.

4. Sina Maleki ; Juan Merlano Duncan ; Jevgenij Krivochiza ; Symeon Chatzinotas ; Björn Ottesten, “SDR Implementation of a Test bed

for Real-Time Interference Detection With Signal Cancellation,” IEEE Access ( Volume: 6 ), Pp 20807 – 20821, 2018

5. Yunchao Song ; Chen Liu ;, “The Pre-coding Scheme Based on Domain Selective Interference Cancellation in 3D Massive MIMO,” EEE Communications Letters, pp. 1–1, 2018.

6. Cui ; Yu Chen ; Wei Ni ; Tao ; Ping Zhang, “Effective Capacity Analysis in Ultra-Dense Wireless Networks With Random

Interference,” IEEE Access ( Volume: 6 ), pp. 19499 - 19508, 2018. 7. Yang ; Pei Liu ; Liang Li, “Interference Compensation for Smart Grid Communications: A Distributed Power Control Approach,” IEEE

Access ( Volume: 6 ), pp. 18643 - 18654 , 2018.

8. Salama S. ; Wessam Mesbah ; Thomas Kaiser, “Artificial Noise-Based Physical-Layer Security in Interference Alignment Multi pair Two-Way Relaying Networks,” EEE Access, vol. 6, pp. 19073 - 19085, 2018.

9. Chao Dong ; Kai ; Lin, “An Ordered Successive Interference Cancellation Detector With Soft Detection Feedback in IDMA

Transmission,” EEE Access ( Volume: 6 ), Pp. 8161 - 8172, 2018. 10. Christos ; Kai-Kit Wong, “Constructive Interference Based Secure Pre-coding: A New Dimension in Physical Layer Security,” EEE

Transactions on Information Forensics and Security, vol. 13, issue. 9, pp. 2256 - 2268, 2018.

11. S. Haykin, “Cognitive radio: Brain-empowered wireless communications,” IEEE J. Sel. Areas Common., vol. 23, pp. 201-220, Feb. 2005. 12. Goldsmith, S., I. Maric, and S. Srinivasa, “Breaking spectrum gridlock with cognitive radios: an information theoretic perspective,” Proc.

IEEE, vol. 97, no. 5, pp. 894-914, May 2009. 13. J. N. Laneman, D. N. C. Tse and G. W. Wornell, “Cooperative diversity in wireless networks: efficient protocols and outage behavior,”

IEEE Trans. Info. Theory, vol. 50, no. 12, pp. 3062-3080, Dec. 2004.

14. X. Zhang, Z. Yan, Y. Gao, and W. Wang, “On the study of outage performance for cognitive relay networks (CRN) with the Nth best-relay selection in Rayleigh-fading channels,” IEEE Wireless Commun. Lett. vol. 2, no. 1, pp. 110-113, Feb. 2013.

15. M. Xia and S. A¨, “Cooperative AF relaying in spectrum-sharing systems: performance analysis under average interference power

constraints and Nakagami-m fading,” IEEE Trans. Commun., vol. 60, no. 6, June 2012. 16. S. I. Husain, M.-S. Alouini, K. Qaraqe, and M. Hasna, “Reactive relay selection in underlay cognitive networks with fixed gain relays,”

IEEE Int’l Conf. on Commun. (ICC’12), Canada, June 2012, pp. 1784-1788.

17. T. Q. Duong, V. N. Q. Bao, H. Tran, G. C. Alexandropoulos and H.-J. Zepernick, “Effect of primary network on performance of spectrum sharing AF relaying,” Electronics., 5th January 2012, vol. 48, no. 1.

18. X. Guan, W. Yang, and Y. Cai, “Outage performance of statistical CSI assisted cognitive relay with interference from primary user,”

IEEE Commun. Lett. vol. 17, no. 7, pp. 1416-1419, July 2013. 19. P. Yang, Q. Zhang, L. J. Qin, “Outage performance of underlay cognitive opportunistic multi-relay networks in the presence of

interference from primary user,” Wireless Pers. Commun. (2014) 74:343-358.

20. X. Wang, H. Zhang, T. A. Gulliver, W. Shi, “Outage performance of a proactive DF cognitive relay network with a maximum transmit power limit,” Journal of Information & Computational Science, 10:18 (2013), pp. 5927-5934, Dec. 2013

368-375

68.

Authors: Dinokumar Kongkham, M Sundararajan

Paper Title: Optimization Scheme with Energy Detector Model for Cognitive Radio Networks

Abstract: Cognitive Radio (CR) is a promising technology in the wireless communication system for resolving

the resource utilization problems and spectral clogging problems in the spectrum based applications. It aims to

enhance spectrum sharing scheme in Multiple-input multiple-output orthogonal frequency division multiplexing

(MIMO-OFDM) to enable with next generation systems. Efficient utilization of Spectrum sensing and

computational complexity is still an unsolved issue in the ultra-wide band (UWB) radio spectrum. Generally,

conventional methods include spectrum sensing to identify the primary users and spectrum usage, which helps to

make data transmission possible from secondary users. However, they obtain poor throughput, higher transmission

power and longer sensing time. In order to resolve this issue, we propose novel hybrid access optimization scheme

with energy detector model for achieving the significant compressive spectrum sensing in the MIMO-OFDM,

which is based on cognitive ratio network (CRN). The proposed method develops sparsity signal model with the

help of orthogonal transform of Fractional Fourier Transformation (FRFT) for reducing the signal to noise ratio

(SNR). Furthermore, modulated signals from secondary users are forwarded to DSP (Digital signal Processing).

Hence, the proposed system achieves higher accuracy in detecting the false probability, energy detection, optimal

sensing time, and higher throughput than efficient compressive sensing method.

Keywords: Spectrum Sensing, Novel Hybrid Access Optimization scheme, Energy detector, Sparsity Signal

Model and Fractional Fourier Transformation.

376-381

Page 49: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

References: 1. W. Lee and D.-H. Cho. (2013). “Channel selection and spectrum availability check scheme for cognitive radio systems considering user

mobility,” IEEE Commun. Lett., vol. 17, no. 3, pp. 463–466, Mar.

2. J. Lee, J. G. Andrews, and D. Hong. (2015). “Spectrum-sharing transmission capacity with interference cancellation,” IEEE Trans. Commun., vol. 61, no. 1, pp. 76–86, Jan.

3. B.Rassouli and A. Olfat. (2012). “Periodic spectrum sensing parameters optimization in cognitive radio networks,” IET Commun., vol.

6, no. 18,pp. 3329–3338, Dec. 4. Q. Li, Z. Li, J. Shen, and R. Gao. (2015), “A novel spectrum sensing method in cognitive radio based on suprathreshold stochastic

resonance,” in Proc.IEEE Int. Conf. Commun. (ICC), pp. 4426–4430.

5. Y. Huret al.. (2007). “A wideband analog multi-resolution spectrum sensing (MRSS) technique for cognitive radio (CR) systems,” in Proc. IEEEInt. Symp. Circuits Syst. (ISCAS), May, pp. 1–4.

6. T. Yucek and H. Arslan. (2010). “A survey of spectrum sensing algorithms for cognitive radio applications,” IEEE Commun. Surveys

Tuts., vol. 11, no. 1, pp. 116–130. 7. Y. Pei, A. T. Hoang, and Y.-C. Liang. (2015). “Sensing-throughput tradeoff in cognitive radio networks: How frequently should

spectrum sensing be carried out?” in Proc. IEEE 18th Int. Symp. Personal, Indoor MobileRadio Commun. (PIMRC), pp. 1–5.

8. S. Stotas and A. Nallanathan. (2012). “Overcoming the sensing-throughput tradeoff in cognitive radio networks,” in Proc. IEEE Int. Conf.Commun. (ICC), pp. 1–5.

9. Y.-C. Liang, Y. Zeng, E. C. Y. Peh, and A. T. Hoang. (2010). “Sensingthroughput tradeoff for cognitive radio networks,” IEEE Trans.

WirelessCommun., vol. 7, no. 4, pp. 1326–1337. 10. A PHY/MAC Proposal for IEEE 802.22 WRAN Systems Part 1: The PHY, IEEE Standard 802, 2006.

11. H. Kim and K. G. Shin. (2013). “In-band spectrum sensing in cognitive radio networks: Energy detection or feature detection?” in Proc.

14th ACMInt. Conf. Mobile Comput. Netw.pp. 14–25. 12. S. Kyperountas, N. Correal, and Q. Shi. (2010). “A comparison of fusion rules for cooperative spectrum sensing in fading channels,”

EMS Research, Motorola, Libertyville, IL, USA

13. H. Urkowitz. (2006). “Energy detection of unknown deterministic signals,” Proc. IEEE, vol. 55, no. 4, pp. 523–531. 14. H. V. Poor. (1988). An Introduction to Signal Detection and Estimation, vol. 1. New York, NY, USA: Springer-Verlag p. 559.

15. E. C. Y. Peh, Y.-C. Liang, Y. L. Guan, and Y. Zeng. (2015). “Optimization of cooperative sensing in cognitive radio networks: A sensing-throughput tradeoff view,” IEEE Trans. Veh. Technol., vol. 58, no. 9, pp. 5294–5299.

16. D. Cabric, S. M. Mishra, and R. W. Brodersen. (2004). “Implementation issues in spectrum sensing for cognitive radios,” in Proc. Conf.

Rec. 38thAsilomar Conf. Signals, Syst. Comput., vol. 1. Nov. 2004, pp. 772–776. 17. W. H. Press, S. A. Teukolsky, W. T. Vetterling, and B. P. Flannery. (2009). “Numerical recipes source code CD-ROM,” in The Art of

ScientificComputing, 3rd ed. Cambridge, U.K.: Cambridge Univ. Press.

18. L. N. de Castro and J. Timmis. (2006). Artificial Immune Systems: A New Computational Intelligence Approach. New York, NY, USA:Springer-Verlag.

19. J. Kennedy. (2012). “Particle swarm optimization,” in Encyclopedia of Machine Learning. New York, NY, USA: Springer-Verlag, pp.

760–766. 20. J. F. Kennedy, J. Kennedy, and R. C. Eberhart, Swarm Intelligence. San Mateo, CA, USA: Morgan Kaufmann, 2001.

69.

Authors: Altaf C, Shah Aqueel Ahmed

Paper Title: Energy Efficient and Reliable Routing Protocol in Wireless Ad Hoc Network

Abstract: In wireless ad hoc network, increased lifetime, reliability and energy efficiency is main concern. The

significant techniques Reliable Minimum Energy Routing (RMER) and Reliable Minimum Energy Cost Routing

(RMECR) are developed here to reach this concern. These protocols are compared with TMER (Traditional

Minimum Energy Routing) and ETX (Expected Transmission Count) by energy utilization, battery energy of

nodes remaining along with quality of links, also comparison has made here. With investigations made on Energy-

Aware Routing in ad hoc networks, two techniques namely RMER and RMECR stated here can increase the

operational lifetime of the network by means of reliable, energy-efficient routes. The RMECR is the new idea of

wireless ad hoc networks in case of energy efficient routing algorithm. RMER technique is the point of reference

in understanding Energy Efficiency of the RMECR algorithm determines the routes which are required low energy

consumption while transmitting packets without considering the battery energy left of the nodes.

Keywords: Mobile Ad hoc network, Routing, Energy Efficiency, Reliability, RMER and RMECR.

References: 1. D.J. and D.D Vergados and Pantazis NA, “Energy- Efficient Route Selection Strategies for Wireless Sensor Networks,” Mobile

Networks and Applications, vol. 13, nos. 3-4,pp. 285-296, Aug. 2008.

2. H. Zhang, A.A, and P. Sinha, “Link Estimation and Routing in Sensor Network Backbones: Beacon-Based or Data-Driven?” IEEE Transaction on Mobile Computing, vol. 8(5), pp. 653-667, May 2009.

3. Z.J Qiao.C and Wang.X (2006) ‘On Accurate Energy Consumption Models for Wireless Ad Hoc Networks,’ IEEE Transactions on

Wireless Communications. Vol. 5(11), pp. 3077-3086. 4. Verma, S. Kim, S. Choi, and S.-J. Lee, “Reliable, Low Overhead Link Quality Estimation for 802.11 Wireless Mesh Networks,”

Proceeding. IEEE Fifth Annual Communication Society Conf. Sensor, Mesh and Ad Hoc Communications and Networks (SECON ’08),

June 2008. 5. A.Misra and S.Banerjee(2002) ‘MRPC: Maximizing Network Lifetime for Reliable Routing in Wireless Environments,’ Proceeding.

IEEE Wireless Communications and Networking Conference. (WCNC’02).Vol 7,No.6, pp. 800-806.

6. Mohanoor.A.B S.Radhakrishnan and V.Sarangan(2009) ‘Online Energy Aware Routing in Wireless Networks,’Ad Hoc Networks. Vol. 7, No. 5, pp. 918-931.

7. J.H Chang and L.Tassiulas ( 2004) ‘Maximum Lifetime Routing in Wireless Sensor Networks,’ IEEE/ACM Transactions on

Networking.Vol. 12, No. 4, pp. 609-619. 8. Nishant G.S, R. Das, (1998 )’Energy-Aware On-Demand Routing For Mobile Ad Hoc Networks’, IEEE Transactions on Wireless

communications, vol.6 , no.11,pp.1300-1313.

9. Canming J.Yi Shi and Thomas H.Y (2005) ‘Cherish every Joule: Maximizing throughput with an eye on network-wide energy consumption’ Proceedings. IEEE Wireless communications. Vol 3, No.5, pp.850-857.

10. K.K.H and K.G Shin.V “On Accurate Measurement of Link Quality in Multi-Hop Wireless Mesh Networks,” Proceeding. ACM Mobile

Communications, pp. 38-49, 2006.

382-385

70.

Authors: AC. Priya Ranjani, M. Sridhar

Paper Title: Distributed Web Usage Mining Based Ecommender System in Big Data Analytics using Hybrid Firefly

Algorithm

Page 50: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

Abstract: One of the fast upcoming data mining disciplines that deal with large, unstructured complex data is

Big data analysis. Web usage mining is a primary area of research that has been focusing on the valuable

information derived from web server logs. Not having any explicit ratings of the users, the large data volume and

its sparse nature have been posing challenges to the techniques of collaborative filtering with respect to

performance and scalability. Techniques like clustering are dependent on the discovery of offline patterns from

the user transactions and are used to improve scalability in terms of collaborative filtering but at reduced cost

and recommendation accuracy. To improve the situation, this work has been taken up on the basis of nature

inspired, meta heuristic algorithms Firefly and Teaching Learning Based Optimization (FA-TLBO). This FA-

TLBO was hybridized using the K-Means algorithm (FA-TLBO with K-Means) in order to obtain optimal cluster

centres. There were numerical experiments which indicated the fact that novel FA-TLBO with K-means was more

efficient compared to TLBO algorithm.

Keywords: Big Data Analysis, Web Usage Mining, Recommender System, Clustering, K-Means Algorithm,

Firefly Algorithm (FA) and Teaching Learning Based Optimization (TLBO).

References: 1. J. Zakir, T.Seymour, and K.Berg, “Big Data Analytics,” Issues in Information Systems, 2015, .16(2), pp. 81-90.

2. V.Dagade, M.Lagali, S.Avadhani, and P. Kalekar, “Big Data Weather Analytics Using Hadoop,” in IJETCSE, 14(2), pp.847-851.

3. R.Ali, “Cluster Optimization for Improved Web Usage Mining”, in IJRITCC, 2015,3(11), pp.6394-6399.

4. M. Sajwan, K.Acharya, and S.Bhargava, “Swarm intelligence based optimization for web usage mining in recommender system,” 2014, IJCATR, 3(2), pp.119-124.

5. J.Vellingiri, S.Kaliraj, S.Satheeshkumar, and T.Parthiban . “A novel approach for user navigation pattern discovery and analysis for web

usage mining,”. JCS, 2015, 11(2), pp.372-382. 6. Abbas, L.Zhang, and S.U.Khan, “A survey on context-aware recommender systems based on computational intelligence techniques,” In

Computing, Springer, 97(7), pp.667-690.

7. M.Jafari, F.S.Sabzchi, and A.J.Irani, “Applying web usage mining techniques to design effective web recommendation systems: A case study”, Advances in Computer Science: an International Journal, 3(2), 2014, pp.78-90.

8. 8 .C.Shahabi and F.Banaei-Kashani, “Efficient and anonymous web-usage mining for web personalization”, INFORMS Journal on

Computing, 2003, pp.123-147. 9. 9..A.G.Abdalla, T.M.Ahmed and M.E.Seliaman, “Web Usage Mining and the Challenge of Big Data: A Review of Emerging Tools and

Techniques”, In Handbook of Research on Trends and Future Directions in Big Data and Web Intelligence, . IGI Global, 2015, (pp. 418-

447. 10. 10. S.P.Malarvizhi, and B.Sathiyabhama, “Frequent page sets from web log by enhanced weighted association rule mining”, Cluster

Computing, 2016, 19(1), pp.269-277.

11. 11.E.Tuba, R.Jovanovic, R.C.Hrosik, A. Alihodzic and M.Tuba, “Web Intelligence Data Clustering by Bare Bone Fireworks Algorithm Combined with K-Means”. In Proceedings of the 8th International Conference on Web Intelligence, Mining and Semantics, (2018, June)

12. (article 7). ACM

13. 12.R.Katarya and O.P.Verma, “An effective web page recommender system with fuzzy c-mean clustering. Multimedia Tools and Applications”, ,2017, 76(20), pp.21481-21496.

14. A.K.Tripathi, K.Sharma and M.Bala, “A Novel Clustering Method Using Enhanced Grey Wolf Optimizer and MapReduce. “,Big Data

Research, Elsevier, 2018 15. Q.Lin, X.Wang, B.Hu, L.Ma, F. Chen, J.Li, and C.A.Coello Coello, “Multiobjective Personalized Recommendation Algorithm Using

Extreme Point Guided Evolutionary Computation”, Hindawi Complexity, 2018.

16. 15.Y.Djenouri, Z.Habbas, D.Djenouri, and M.Comuzzi, “Diversification heuristics in bees swarm optimization for association rules mining,” In Pacific-Asia Conference on Knowledge Discovery and Data Mining “, Springer, 2017, pp. 68-78.

17. 16.K.E.Heraguemi, N.Kamel, and H.Drias, “Multi-swarm bat algorithm for association rule mining using multiple cooperative

strategies,” Applied Intelligence, 2016, 45(4), pp.1021-1033. 18. 17.X.Wei, Y.Wang, Z.Li, Z., Zou, T., & Yang, G. “Mining users interest navigation patterns using improved ant colony optimization.

Intelligent Automation & Soft Computing”, 2015, 21(3), pp.445-454. 19. A.Agarwal, and N.Nanavati, “Association rule mining using hybrid GA-PSO for multi-objective optimisation,” In Computational

Intelligence and Computing Research (ICCIC), 2016 IEEE International Conference on pp. 1-7.

20. 19.J.Umarani, R.Sivaprakash, and G.Thangaraju, “Web Usage Mining Analysis for Big Data Applications in Government Sectors of India”, International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE), 2016, 23 (5), pp.201-211.

21. 20.S.Burla, “High Dimensional Data Clustering Using Hybridized Teaching-Learning-Based Optimization”, Journal of Computer and

Mathematical Sciences, 2013, 4(3), pp.135-201. 22. S.X.Yang, and X.He “Firefly algorithm: recent advances and applications”,2013, arXiv preprint arXiv: pp.1308.3898.

23. L.Zhang, L.Liu, S.X.Yang, andY. Dai, “A novel hybrid firefly algorithm for global optimization,” 2016, PloS one, 11(9), e0163230.

24. L.Zhou, and L.Li,(2018). “Improvement of the Firefly-based K-means Clustering Algorithm,” International Conference on Data

Science,2018, pp.157-162.

25. R.V.Rao, V.J.Savsani, and D.P.Vakharia,, “Teaching–learning-based optimization: a novel method for constrained mechanical design

optimization problems,” 2011, Computer-Aided Design, 43(3), pp.303-315. 26. 25.R.R.Kurada, K.K.Pavan, and A.A.Rao, “Automatic teaching–learning-based optimization: A novel clustering method for gene

functional enrichments”, In Computational Intelligence Techniques for Comparative Genomics, Springer, Singapore, pp. 17-35.

27. P.K.Mummareddy, and S.C.Satapaty, “An hybrid approach for data clustering using K-means and teaching learning based optimization,” In Emerging ICT for Bridging the Future-Proceedings of the 49th Annual Convention of the Computer Society of India CSI , Springer,

Cham, 2015, Vol. 2, pp. 165-171.

28. R.Singh, H.Chaudhary, and A.K.Singh, “A new hybrid teaching–learning particle swarm optimization algorithm for synthesis of linkages

to generate path, In Sadhana, 2017, 42(11), pp.1851-1870. 29. R.Singh, H.Chaudhary, and A.K.Singh, “A new hybrid teachinglearningparticle swarm optimization algorithm for synthesis of linkages

to generate path, In Sadhana, 2017, 42(11), pp.1851-1870.

30. S.Tuo, L.Yong, Y.Li, Y.Lin and Q.Lu, “HSTLBO: A hybrid algorithm based on Harmony Search and Teaching-Learning-Based Optimization for complex high-dimensional optimization problems”, PloS one, 2017, 12(4), e0175114.

386-393

71.

Authors: Srinivasa Rao Divvela, V Sucharitha

Paper Title: Efficient Algorithm using Big Data for Frequent Itemsets Mining

Abstract: Future trends are being estimated with the help of tools in data mining which allows the making of

decisions to be data driven and analyze them carefully with the corresponding tools. In various fields of mining the

most important practice of mining of data is the Associate-rule mining. Major issue in any of the techniques being

394-396

Page 51: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

the generation of the frequent data-item sets which has to be solved efficiently. Many techniques have been put

forth for this only purpose of itemset generation like Apriori-algorithm, FP_Growth-algorithm, and many other

solutions are being offered to solve the issue. Many outsets of the problem yet to be fully implemented such as

large clusters solving and distribution along with parallelization (automatic) etc. Many of these issues can be

solved with the implementation of Framework of MapReduce on Improved Apriori algorithm. Lessening of time

due to parallel executions can be achieved with the help of this. This procedure considerably decreases the time of

execution and also a significant rise in efficiency is observed.

Keywords: MapReduce, Improved Apriori, mining, Frequent data-item sets.

References: 1. YalingXun, Jifu Zhang and Xian Qin, “Fidoop: Parallel mining of frequent Itemsets using MapReduce”, IEEE Trans.onsys.man and

cybernetics, Vol. 46,No.3, March 2016.

2. Sheelagole and Bharat Tidke, “Frequent Itemset Mining for BigData in social media using ClustBigFIM algorithm”, Intl Conf.on

Pervasive Computing, IEEE 2015. 3. Marconi K, Lehmann H. Big Data and Health Analytics[M]. BocaRaton:CRC Press, 2014.

4. McKinsey&Company. The big-data revolution in US health care: Accelerating value and innovation [R].

http://www.mckinsey.com/industries/healthcare-systems-and-services/our-insights/the-big-data-revolution-in-us-health-care, 2013. 5. Zahra Farzanyar and Nick Cercone, “Efficient mining of frequent itemsets in social network data based on MapReduce framework”,

Proceedings of the 2013 IEEE International Conference on Advances inSocial Networks Analysis and Mining.

6. M.-Y. Lin, P.-Y. Lee, and S.-C. Hsueh, “Apriori-based frequent itemset mining algorithms on MapReduce”, International Conference onUbiquitous Information Management and Communication, ACM, 2012.

72.

Authors: Alwyn Varghese, Anand. N, Prince Arulraj G

Paper Title: Investigation on Impact Strength of Fiber Reinforced Concrete Subjected To Elevated Temperature

Abstract: The effect of elevated temperature on impact strength of Fiber Reinforced Concretes (FRC) is

investigated in this paper. Cylinder specimens are used with different types of fibers such as Aramid, Basalt,

Carbon, Glass, Polypropylene and PVA. All the specimens were exposed to elevated temperature as per standard

fire curve following ISO 834. After heating the specimens are cooled by natural air prior to impact strength test.

The tests are conducted as per ACI committee 544. Test result reveals that addition of fiber enhances the impact

strength of concrete specimens. Concrete with Carbon fiber and Basalt fiber exhibits better performance than

concrete with other fibers. In unheated condition Carbon fiber shows 5.9 times increase in impact resistance with

respect to reference specimen. For 90 minutes of heat exposure, all FRCs except concrete with Aramid fiber shows

2 times better impact resistance than that of reference specimen.

Keywords: Fiber Reinforced Concrete, Impact Strength, Elevated Temperature, Carbon Fiber, Basalt Fiber

References: 1. Ramakrishna, G., & Sundararajan, T. (2005). Impact strength of a few natural fibre reinforced cement mortar slabs: a comparative

study. Cement and concrete composites, 27(5), 547-553.

2. Gopalaratnam, V. S. et al,. (1984). A modified instrumented Charpy test for cement-based composites. Experimental mechanics, 24(2), 102-111.

3. Hibbert, A. P., & Hannant, D. J. (1978, April). The design of an instrumented impact test machine for fibre concretes. In Testing and Test

Method of Fibre Cement Composites’, Proceedings of RILEM Symposium (The Construction Press, Sheffield, 1978) (pp. 107-120). 4. Schrader, E. K. (1981, March). Impact resistance and test procedure for concrete. In Journal Proceedings (Vol. 78, No. 2, pp. 141-146).

5. Cantwell, W. J., & Morton, J. (1991). The impact resistance of composite materials—a review. composites, 22(5), 347-362.

6. Gopalaratnam, V. S., & Shah, S. P. (1985). Strength, Deformation and Fracture Toughness of Fiber Cement Composites at Different Rates of Flexural Loading. In Unknown Host Publication Title. Swedish Cement & Concrete Research Inst.

7. Swamy RN, Jojagha AH. (1982 Nov) Impact resistance of steel fibre reinforced lightweight concrete. International Journal of Cement

Composites and Lightweight Concrete. 1;4(4), 209-20. 8. Banthia, N. et al. (1998). Impact resistance of fiber reinforced concrete at subnorma temperatures. Cement and Concrete

Composites, 20(5), 393-404.

9. Muguruma, H., & Watanabe, F. (1990). Ductility improvement of high-strength concrete columns with lateral confinement. Special Publication, 121, 47-60.

10. Ho, J. C. M., et al. (2010). Effectiveness of adding confinement for ductility improvement of high-strength concrete columns. Engineering

Structures, 32(3), 714-725. 11. Balendran, R. V. et al. (2002). Influence of steel fibres on strength and ductility of normal and lightweight high strength

concrete. Building and environment, 37(12), 1361-1367.

12. Nili, M., & Afroughsabet, V. (2010). The effects of silica fume and polypropylene fibers on the impact resistance and mechanical properties of concrete. Construction and Building Materials, 24(6), 927-933.

13. Fraternali, F. et al. (2011). Experimental study of the thermo-mechanical properties of recycled PET fiber-reinforced concrete. Composite Structures, 93(9), 2368-2374.

14. Ruan, Z. et al. (2015). Numerical investigation into dynamic responses of RC columns subjected for fire and blast. Journal of Loss

Prevention in the Process Industries, 34, 10-21. 15. Ngo, T. et al. (2007). Blast loading and blast effects on structures–an overview. Electronic Journal of Structural Engineering, 7(S1), 76-

91.

16. Choi, S. J., et al. (2017). Impact or blast induced fire simulation of bi-directional PSC panel considering concrete confinement and spalling effect. Engineering Structures, 149, 113-130.

17. ACI Committee 544, (July 1978). Measurement of properties of fibre reinforced concrete. Journal, American Concrete Institute, Proc.

Vol. 75, No. 7, pp. 283-90. 18. IS: 516–1959. Methods of Tests for Strength of Concrete.

19. ISO 1975 ‘‘Fire resistance tests-elements of building construction.’’ International Standard ISO 834, Geneva.

20. Saxena, R., et al. (2018). Impact resistance and energy absorption capacity of concrete containing plastic waste. Construction and Building Materials, 176, 415-421.

21. Mohammad hosseini H, et al. (2017). The impact resistance and mechanical properties of concrete reinforced with waste polypropylene

carpet fibres. Construction and Building Materials. 143, 147-157. 22. Mastali M, et al. (2016). The impact resistance and mechanical properties of reinforced self-compacting concrete with recycled glass fibre

397-402

Page 52: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

reinforced polymers. Journal of Cleaner Production. 124, 312-324.

23. Guo YC, et al. (2014). Compressive behaviour of concrete structures incorporating recycled concrete aggregates, rubber crumb and

reinforced with steel fibre, subjected to elevated temperatures. Journal of Cleaner Production. 72, 193-203. 24. Anand N and Prince Arulraj G. (2014). Effect of grade of concrete on the performance of self-compacting concrete beams subjected to

elevated temperatures, Fire Technology. 50(5), 1269–1284.

25. Anand N, et al. (2014). Stress strain behavior of Normal compacting and Self compacting concrete under elevated temperatures, Journal

of Structural Fire Engineering. 5 (1), 63–75.

26. Antony Godwin, et al. (2016). Influence of mineral admixtures on mechanical properties of self-compacting concrete under elevated

temperature, Fire and Materials. 40(7), 940–958. 27. Purkiss, J. A. (1988). Toughness measurements on steel fibre concrete at elevated temperatures. International Journal of Cement

Composites and Lightweight Concrete, 10(1), 39-47.

28. Alwyn Varghese, et al. (2018). Studies on Behaviour of Fire Affected Fiber Reinforced Concrete, International Journal of civil engineering and technology. 9(10), 1668–1675.

73.

Authors: Annamahesh A, Sunitha K Rangarajan S

Paper Title: Study on Mechanical Behavior of Graphene Based Polymer Composites

Abstract: Addition of Graphene in the matrix improves the mechanical properties, which makes it potentially

good reinforcement in polymer composites. Graphene possess unique mechanical properties, which makes it

attractive filler for producing multi-functional composites for a wide range of applications. It is an overview on the

state of the art of graphene, including material synthesis and characterization. It helps in identifying its influence

on the multi-functional and mechanical properties of the composites. Graphene was synthesized by a simple

method (Hummer’s Method). Characterization is done by X-Ray Diffraction, SEM images for the prepared

graphene. It is found that mechanical properties are improved tensile strength, flexural strength and heat distortion

temperature of the glass epoxy laminated composite when the small amount of grapheme added to the epoxy

matrix material.

Keywords: Epoxy Nano Composites, Graphene, Mechanical properties.

References: 1. Tapas kuilla, SambhuBhadra and Dahuyao, Recent advances in graphene based polymer composites, Polymer Science, 35,(10), 1350-

1375, 2010.

2. Yuchi Fan, Lianjun Wang and Jianlin, Preparation and Electrical properties of graphenenano sheet/Al2O3composites, Carbon Science,

48(10), 1743-1749, 2010. 3. Pandyaraj, V., Ravi Kumar, L., Chandramohan, D. Experimental investigation of mechanical properties of GFRP reinforced with coir and

flax, International Journal of Mechanical Engineering and Technology,9(1034-1042), pp. 1034-1042.

4. Chandramohan.D and S.Rajesh, Increasing Combusting Resistance For Hybrid Composites, International Journal of Applied Engineering Research,9(20), 6979-6985,2014.

5. Chandramohan.D et.al., Review On Tribological Performance Of Natural Fibre Reinforced Polymer Composites,Journal of Bio- and Tribo-Corrosion, Journal of Bio- and Tribo-Corrosion,4(4),55,2018.

6. Chandramohan, D and John Presin Kumar A. Experimental data on the properties of natural fiber particle reinforced polymer composite

material, Data in Brief,13, pp. 460-468,2017. 7. Adams R.D and Singh M.M, The effect of immersion in sea water on the dynamic properties of fibre-reinforced flexibilised epoxy

composites, Composite Structures, 31(2 ), 1995.

8. Jeffrey R.Potts and Todd.M.Alam, Thermomechanical properties of chemically modifiedgraphene/poly(methyl methacrylate) composites madeby in situ polymerization, Carbon Science, 49(10), s 2615-2623, 2011.

9. Chandramohan.D et.al., Progress of biomaterials in the field of orthopaedics, American Journal of Applied Sciences, 11 (4),623-630,2014.

10. Chandramohan, D., Marimuthu, K. Applications of natural fiber composites for replacement of orthopaedic alloys, Proceedings of the International Conference on Nanoscience, Engineering and Technology, 6167942, pp. 137-145,2011.

11. Chandramohan.D., and A.Senthilathiban. Effects of chemical treatment on jute fiber reinforced composites, International Journal of

Applied Chemistry, 10 (1),153-162,2014. 12. Murali, B., Chandra Mohan, D., Nagoor Vali, S.K., Muthukumarasamy, S., Mohan, A. Mechanical behavior of chemically treated

jute/polymer composites, Carbon - Science and Technology,6(1), pp. 330-335.

13. Murali, B., Chandra Mohan, D. Chemical treatment on hemp/polymer composites, Journal of Chemical and Pharmaceutical Research,6(9), pp. 419-423.

14. Chandramohan, D., Bharanichandar, J. Natural fiber reinforced polymer composites for automobile accessories, American Journal

of Environmental Sciences,9(6), 494-504,2014. 15. Chandramohan, D.and Marimuthu, K., Natural fibre particle reinforced composite material for bone implant, European Journal of Scientific

Research, Vol.54, No.3,384-406,2011.

16. Chandramohan, D. and Marimuthu, K., Characterization of natural fibers and their application in bone grafting substitutes, Acta of Bioengineering and Biomechanics, 13(1),77-84,2011.

17. Praveenkumar, R., Periyasamy, P., Mohanavel, V., Chandramohan, D. Microstructure and mechanical properties of MG/WC composites

prepared by stir casting method, International Journal of Mechanical Engineering and Technology,9(10), pp. 1504-1511,2018. 18. Chandramohan.D and S.Rajesh, Increasing Combusting Resistance For Hybrid Composites, International Journal of Applied

Engineering Research,9(20), 6979-6985,2014.

403-406

74.

Authors: Naveen Kumar K, Maheshwar Pratap

Paper Title: Identifying Durability Failure Parts using 24 Months-In-Service Data: A Case-Based Empirical Study

from an Automobile Manufacturer in India

Abstract: This paper analyses the warranty claims data to identify faulty parts contributing to increasing

failure using Weibull Analysis, in the automobile industry. Unlike studies in the past, this study uses 24 month

service data to investigate the cause of failure due to faulty parts.Usually, the forecasting of the part failure is done

for the 3 months in service (MIS) data and the automobile manufacturers use this parameter to set Key

Performance Indicators (KPI) for quality improvement among design engineers. The KPI set using 3MIS data is

used to determine 12 MIS and 24MIS KPIs. The period used in the development of KPIs affects the number of

failed parts to be selected for improvement. As the monitoring period of countermeasure takes long durations, the

repetitive failures added in data during the monitoring period, make the analysis complicated. Also, the seasonal

pattern of failures cannot be addressed using 3MIS data. By increasing the analysis period to 24MIS, this paper

407-411

Page 53: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

finds evidence that increase in MIS leads to the identification of faulty parts that are causing repeated failures. The

scope of the study extends towardsthe detection of new issues and towards monitoringthe effectiveness of existing

countermeasures.This reduces warranty costs for the manufacturer and provides time to develop appropriate

countermeasures along with increased monitoring period of failure parts leading to durability quality improvement.

Keywords: Warranty claims forecasting, Warranty Analysis,Weibull Analysis, Part Drability.

References: 1. Rinne, H. (2008). The Weibull distribution: a handbook. Chapman and Hall/CRC.

2. S. J. Mitchell, ―The effect of the threshold stress on the determination of the Weibull parameters in probabilistic failure analysis‖, Engineer Fracture Mechanics, vol. 70, (2003) pp. 2559-2567.

3. Brombacher, A. C., Sander, P. C., Sonnemans, P. J., & Rouvroye, J. L. (2005). Managing product reliability in business processes ‘under

pressure’. Reliability Engineering & System Safety, 88(2), 137-146. 4. Aarset, M. V. (1987). How to identify a bathtub hazard rate. IEEE Transactions on Reliability, 36(1), 106-108.

5. Kunitz, H. (1989). A new class of bathtub-shaped hazard rates and its application in a comparison of two test-statistics. IEEE Transactions

on Reliability, 38(3), 351-354. 6. Jagtap, M. M., & Teli, S. N. WARRANTY PROCESS FLOW ANALYSIS IN AUTOMOTIVE INDUSTRY.

7. Lipson, C., SHETH, N., & SHELDON, D. (1966, July). Reliability and Maintainability in Industry and the Universities. In Symposium on

Deep Submergence Propulsion and Marine Systems (p. 2598). 8. Huang, G., Lin, W., & Niu, Q. (2016). Risk Analysis Model of Automobile Defect Based on Weibull. International Journal of Hybrid

Information Technology, 9(1), 353-366.

9. Kleyner, A., & Sandborn, P. (2005). A warranty forecasting model based on piecewise statistical distributions and stochastic simulation. Reliability Engineering & System Safety, 88(3), 207-214.

10. Guida, M., & Pulcini, G. (2002). Automotive reliability inference based on past data and technical knowledge. Reliability Engineering &

System Safety, 76(2), 129-137. 11. Wu, S. (2012). Warranty data analysis: a review. Quality and Reliability Engineering International, 28(8), 795-805

12. Davis, T. (1999). A simple method for estimating the joint failure time and failure mileage distribution from automobile warranty

data. Ford Technical Journal, 2(6), 1-11. 13. Rai, B., & Singh, N. (2005). A modeling framework for assessing the impact of new time/mileage warranty limits on the number and cost

of automotive warranty claims. Reliability Engineering & System Safety, 88(2), 157-169.

14. Wu, J., McHenry, S., & Quandt, J. (2013). An application of Weibull analysis to determine failure rates in automotive components. In 23rd International Technical COnference on the Enhanced Safety of Vehicles (ESV) (pp. 13-0027).

15. Aldridge, D. S. (2006, January). Prediction of potential warranty exposure and life distribution based upon early warranty data.

In Reliability and Maintainability Symposium, 2006. RAMS'06. Annual (pp. 159-164). IEEE. 16. Summit, R. A. (2012). Modelling component reliability using warranty data. ANZIAM Journal, 53, 437-450.

17. Lawless, J., Hu, J., & Cao, J. (1995). Methods for the estimation of failure distributions and rates from automobile warranty data. Lifetime

Data Analysis, 1(3), 227-240. 18. Ciampi, A., Lawless, J. F., McKinney, S. M., &Singhal, K. (1988). Regression and recursive partition strategies in the analysis of medical

survival data. Journal of clinical epidemiology, 41(8), 737-748.

19. Achcar, J. A., Brookmeyer, R., & Hunter, W. G. (1985). An application of Bayesian analysis to medical follow‐up data. Statistics in

medicine, 4(4), 509-520.

20. Taghipour, S., Banjevic, D., &Jardine, A. K. (2011). Reliability analysis of maintenance data for complex medical devices. Quality and

Reliability Engineering International, 27(1), 71-84.

21. Della Bona, A., Anusavice, K. J., &DeHoff, P. H. (2003). Weibull analysis and flexural strength of hot-pressed core and veneered ceramic structures. Dental Materials, 19(7), 662-669.Abernethy, Robert, The New Weibull Handbook, (3rd Edition), 1999

22. X. Yan, X. Ma and R. Zheng, ―Comparison of the Parameters Estimation Methods for 3-Parameter Weibull Distribution‖, Journal of

Ningbo University(Natural Science & Engineering Edition, CHN, vol. 18, (2005) March, pp. 301–305. 23. Xie, M., Tang, Y., &Goh, T. N. (2002). A modified Weibull extension with bathtub-shaped failure rate function. Reliability Engineering

& System Safety, 76(3), 279-285.

24. Gupta, R. C., Gupta, P. L., & Gupta, R. D. (1998). Modelling failure time data by Lehman alternatives. Communications in Statistics-Theory and methods, 27(4), 887-904.

25. Crowder, M. J., Kimber, A. C., Smith, R. L., & Sweeting, T. J. (1991). Statistical analysis of reliability dataChapman and Hall. New

York.

75.

Authors: K. Ranjith Kumar, M. Surya Kalavathi

Paper Title: Optimal Sizing of Grid Connected Hybrid PV/Wind/Battery Power System using Satin Bowerbird

Optimization

Abstract: Renewable energy sources are gaining more attention due to quick reduction of fossil fuels,

global warming and energy crisis over the past few decades. Photovoltaic and Wind are the outstanding sources

among the various offered renewable sources owing to the complementary nature of these sources. But the

availability of the generated energy and the cost of the system are the two major limitations of these sources.

Hybrid Power System (HPS) can alleviate the deviations in energy generated with the assistance of energy storage

systems like batteries. On the other hand the cost of the energy needs to be minimized. Therefore, optimization of

energy generation with storage system in light of investment cost and unpredictability alleviation is imposing to

the monetary achievability of Hybrid Power System. This work presents a novel methodology based on Satin

Bower Bird optimization to obtain the optimal sizing and power management of hybrid photovoltaic/wind/battery

power system. The HPS has been simulated using MATLAB using practical load and weather data of PV and wind

system: which gives better performance under all operating conditions.

Keywords: Photovoltaic, Wind, Battery, Hybrid Power System, multi-objective optimization, and Satin Bower

Bird

References: 1. https://www.bloomberg.com

2. Jonathan W K, Brain. T and Robert. S, “A system design approach for unattended solar energy harvesting supply,” IEEE Transactions on

Power Electronics., vol. 24, issue.4, pp. 952–962, April 2009.

3. Mohammed B.H and Robert S, “Optimization of photovoltaic-wind hybrid system for apartment complexes and other community living

environments by minimizing excess capacity,” 2012 38th IEEE Photovoltaic Specialists Conference 2012, pp. 531–536.

412-418

Page 54: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

4. Dhaker A. Andre M, and Gerard. C, “Eco-design optimization of an autonomous hybrid wind/photovoltaic system with battery storage,”

IET Renewable Power Generation, vol. 6, issue.5, pp. 358–371, sept 2012.

5. Bogdan S B., Ziyad M.: ‘Methodology for optimally sizing the combination of a battery bank and PV array in wind/PV Hybrid system’,

IEEE Transactions on Energy Conversion., Vol.11, issue.2, pp. 367–375, June1996

6. Riad C., Saifur R, ‘Unit sizing and control of hybrid wind-solar power systems’, IEEE Transactions on Energy Conversion, Vol.12,

issue.1, pp. 79–85,1997

7. W D Kellogg, Hashem N, Giri V, Victor G, ‘Generation unit sizing and cost analysis for stand-alone wind, photovoltaic, and hybrid

wind/PV systems’, IEEE Trans. Energy Convers., 1998, 13, (1), pp. 70–75

8. Siad D, Gilles N, Belhamel M, Mourad H, M., Alain L.: ‘Design and techno-economical optimization for hybrid PV/Wind system under

various meteorological conditions’, Appl. Energy, 2008, 85, (10), pp. 968–987

9. Jun-h S, Zhi-d Z,Xin.-j Z., Guang.-y C.: ‘Robust design and optimization for autonomous PV-wind hybrid power systems’, J. Zhejiang

Univ. SCIENCEA, 2008, 9, (3), pp. 401–409

10. Hongxing Y, Z Wei., Lou, C.: ‘Optimal design and techno-economic analysis of a hybrid solar-wind power generation system’, Appl.

Energy, 2009, 86, (2), pp. 163–169

11. RNSR Mukhtaruddin, Hasimah HR, Mohammad YH, Jasrul JBJ. Optimal hybrid renewable energy design in autonomous system using

iterative-Pareto-fuzzy technique. Int J Electr Power Energy Syst 2015;64:242–9.

12. Jui-YL, Cheng C-L, Hui-C C. A mathematical technique for hybrid power system design with energy loss considerations. Energy

Convers Manag 2014;82:301–7.

13. Sunanda S, Chandel SS. Review of software tools for hybrid renewable energy systems. Renew Sustain Energy Rev 2014;32:192–205.

14. Mellit A, Kalogirou SA, Drif M. Application of neural networks and genetic algorithms for sizing of photovoltaic systems. Renew Energy

2010;35:2881–93.

15. Rajkumar RK, Ramachandaramurthy VK, Yong BL, Chia DB. Techno-economical optimization of hybrid pv/wind/battery system using

Neuro-Fuzzy. Energy 011;36:5148–53.

16. Luo Y, Shi L, Tu G. Optimal sizing and control strategy of isolated grid with wind power and energy storage system. Energy Convers

Manag 2014;80:407–15.

17. Masoud S, Tarek YV. Multi-objective optimal design of hybrid renewable energy systems using PSO-simulation based approach. Renew

Energy 2014;68:67–79.

18. Akbar M, Alireza A. Artificial bee swarm optimization for optimum sizing of a stand-alone PV/WT/FC hybrid system considering LPSP

concept. Sol Energy 2014;107:227–35.

19. Y. V. P Kumar , R B Singu, Renewable energy based microgrid system sizing and energy management for green buildings. J. Mod. Power

Syst. Clean Energy (2015) 3(1):1–13

20. Y. M. Atwa, E. F. El-Saadany, M. M. A. Salama, and R. Seethapathy, Optimal Renewable Resources Mix for Distribution System

Energy Loss Minimization IEEE Transactions on power systems, vol. 25, no. 1, February 2010 360-370

21. M B. Shadmand, and R S. Balog, Multi-Objective Optimization and Design of Photovoltaic-Wind Hybrid System for Community Smart

DC Microgrid, IEEE Transactions on Smart Grid

22. SH S.Moosavi, V K Bardsiri, Satin bowerbird optimizer: A new optimization algorithm to optimize ANFIS for software development

effort estimation. Eng. Appl. Artif. Intell. 2017, 60, 1–15.

23. https://power.larc.nasa.gov/data-access-viewer/

76.

Authors: S.P. Sundar Singh Sivam, Ganesh Babu Loganathan, K. Saravanan, S. RajendraKumar

Paper Title: Outcome of the Coating Thickness on the Tool Act and Process Parameters When Dry Turning Ti–6Al–

4V Alloy: GRA Taguchi & ANOVA

Abstract: In the primary days of Titanium Nitride tools, before coatings, tool manufacturers appreciated the tools

would last elongate and scuffle cratering if they put a little bit of Titanium Nitride (TiN) in the combination when

making the tool. This had the anticipated consequence, but the more TiN that was added, the feebler and more

brittle the tool became. Then someone hit on the idea of applying a thin layer of TiN to the surface of the tool. This

study results the Turning experiment conducted on the Ti–6Al–4V alloy of orthogonal array with Taughi grey

relational analysis. Emphases on the optimization of turning process Constraints using the technique to get Min

surface roughness (Ra), Roundness (s), Tool Wear and Cutting force in TIN with Different Coating Thickness by

PVD Technique. A number of Turning experiments remained conducted mistreatment the L9 OA on All Gear

Lathe. The experimentations remained achieved on Ti–6Al–4V alloy block of cutting tool of an CNMP120408-SM

TN8025 of 12 mm diameter with cutting point 140 degrees, used throughout the experimental work beneath

different Coating Thickness. Grey relational Analysis & ANOVA was used to work out the foremost important

Cutting speed, feed rate, Depth of Cut and Different Coating Thickness of TIN with 50,100,150 μm by PVD

Method which affecting the response.

Keywords: Ti–6al–4v, TIN Coatings, Grey Relation Taguchi method.

References: 1. https://www.productionmachining.com/articles/cutting-tool-coating-production

2. Tzeng, Y. F.; Chen, F. C. Multi objective process optimization for turning of tool steels. International Journal of Machining and Machinability of Materials. 1, 1(2006), pp. 76-93. DOI: 10.1504/IJMMM.2006.010659

3. Tosun, N. Determination of optimum parameters for multi-performance characteristics in Turning by using grey relational analysis. //

International Journal of Advanced Manufacturing Technology. 28, 5-6(2006), pp. 450-455. DOI: 10.1007/s00170-004-2386-y 4. Chang, C. K.; Lu, H. S. Design optimization of cutting parameters for side milling operations with multiple performance characteristics. //

International Journal of Advanced Manufacturing Technology. 32, 1-2(2007), pp. 18-26. DOI: 10.1007/s00170-005-0313-5

5. S.P. Sundar Singh Sivam, Mr. .Abburi Lakshman kumar, K. Sathiya Moorthy, RajendraKumar. “Investigation exploration outcome of Heat Treatment on Corrosion Resistance of AA 5083 in Marine Application”. International Journal of Chemical Sciences (ISSN 0972-768 X).

Page No Page (15 – 22), 2015.

6. Hrelja, M.; Klancnik, S.; Irgolic, T.; Paulic, M.; Jurkovic, Z.; Balic, J.; Brezocnik, M. Particle swarm optimization approach for modelling a turning process. Advances in Production Engineering & Management. 9, 1(2014), pp. 21-30.DOI: 10.14743/apem2014.1.173

7. S.P. Sundar Singh Sivam, V.G Umasekar, Shubham Mishra, Avishek Mishra, Arpan Mondal. “Orbital cold forming technology - combining high quality forming with cost effectiveness - A review”. Indian Journal of Science and Technology. Vol 9(38), October 2016,

DOI: 10.17485/ijst/2016/v9i38/91426.

8. Nian,C.Y., Yang,W.H.,Tarng, Y.S.,1999. Optimization of turning operations with multiple performance characteristics, Journal of

Materials Processing Technology 95, 90–96.

9. Chang, C. K.; Lu, H. S. Design optimization of cutting parameters for side milling operations with multiple performance characteristics. //

International Journal of Advanced Manufacturing Technology. 32, 1-2(2007), pp. 18-26. DOI: 10.1007/s00170-005-0313-5

419-423

Page 55: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

10. S.P.Sundar Singh Sivam, V.G.UmaSekar, K.Saravanan, S RajendraKumar, P.Karthikeyan, K.SathiyaMoorthy, “Frequently used

Anisotropic Yield Criteria for Sheet Metal Applications: A Review”, Indian Journal of Science and Technology. Indian Journal of Science

and Technology. Volume 9, Issue 47, December 2016. DOI: 10.17485/ijst/2015/v8i1/92107. 11. Gupta, M., Kumar, S.,2013.Multi-objective optimization of cutting parameters in turning using grey relational analysis, International

Journal of Industrial Engineering Computations 4, 547-558.

12. Fung, C. P., 2003.Manufacturing process optimization for wear property of fiber-reinforced polybutylene terephthalate composites with

grey relational analysis, Wear 254, 298–306.

13. Gopalsamy, B. M., Mondal, B. and Ghosh, S., 2009.Optimisation of machining parameters for hard machining: grey relational theory

approach and ANOVA, International Journal of Advanced Manufacturing Technology 45, 1068–1086. 14. Dewangan, S., Biswas, C. K., 2013. Optimization of machining parameters using grey relation analysis for EDM with impulse flushing,

International Journal for Mechatronics and Manufacturing Systems 6, 144-158.

15. S.P. Sundar Singh Sivam, M.Gopal, S.Venkatasamy, Siddhartha Singh, “An Experimental Investigation And Optimisation Of Ecological Machining Parameters On Aluminium 6063 In Its Annealed And Unannealed Form”, Journal Of Chemical And Pharmaceutical Sciences.

Page No Page (46 – 53), 2015.

16. Sivam, S.P.S.S., UmaSekar, V.G., Saravanan, K., RajendraKumar, S., Karthikeyan, P. and SathiyaMoorthy, K. (2016b) ‘Frequently used anisotropic yield criteria for sheet metal applications: a review’, Indian Journal of Science and Technology, December, Vol. 9, No. 47,

DOI: 10.17485/ijst/2015/v8i1/92107.

17. S.P. Sundar Singh Sivam, Mrinal Deepak Ji Bhat, Shashank Natarajan, Nishant Chauhan.” Analysis of residual stresses, thermal stresses, cutting forces and other output responses of face milling operation on ze41 magnesium alloy." International Journal of Modern

Manufacturing Technologies, Pp. No 92-100. ISSN 2067–3604, Vol. X, No. 1 / 2018.

18. Sivam, S. P. S. S., Saravanan, K., Pradeep, N., Moorthy, K. and Rajendrakumar, S. “The Grey Relational Analysis and Anova to Determine the Optimum Process Parameters for Friction Stir Welding of Ti and Mg Alloys”, Periodica Polytechnica Mechanical Engineering. doi:

https://doi.org/10.3311/PPme.12117.

19. P. Sundar Singh Sivam, S., Saravanan, K., Pradeep, N., Rajendra Kumar, S., & Karuppiah, S. (2018). Comparison of Manufacturing Data Analysis For 5 & 3-Axis Vertical Machining Center for the Time and Tool Benefits of Industries. International Journal of Engineering &

Technology, 7(4.5), 196-201. doi:http://dx.doi.org/10.14419/ijet.v7i4.5.20044.

20. P. Sundar Singh Sivam, S., Saravanan, K., Pradeep, N., Rajendra Kumar, S., Mathur, S., Dingankar, U., & Arora, A. (2018). Development of Vibrator Feeding Mechanism Using Two Sets of Rollers for the Separation of Ball Grading For Industry Benefits. International Journal

of Engineering & Technology, 7(4.5), 202-206. doi:http://dx.doi.org/10.14419/ijet.v7i4.5.20045

21. S. P. Sundar Singh Sivam, A. Rajasekaran, S. RajendraKumar, K. SathiyaMoorthy & M. Gopal (2019) A study of cooling time, copper reduction and effects of alloying elements on the microstructure and mechanical properties of SG iron casting during machining, Australian

Journal of Mechanical Engineering, DOI: 10.1080/14484846.2018.1560679

22. S.P. Sundar Singh Sivam, Durai Kumaran, Krishnaswamy Saravanan, Venugopal Guruswamy Umasekar, Sankarapandian Rajendrakumar, Karuppiah Sathiya Moorthy (2018) "THICKNESS DISTRIBUTION AND NUMERICAL MODELLING OF CONVENTIONAL

SUPERPLASTIC FORMING IN AA2024 ALLOY", International Journal of Modern Manufacturing Technologies, ISSN 2067–

3604,76,85, Vol. X, No. 2 / 2018 23. S. P. S. S. Sivam, S. RajendraKumar, S. Karuppiah and A. Rajasekaran, "Competitive study of engineering change process management in

manufacturing industry using product life cycle management — A case study," 2017 International Conference on Inventive Computing and

Informatics (ICICI), Coimbatore, 2017, pp. 76-81. doi: 10.1109/ICICI.2017.8365247.

77.

Authors: Brijesh Kumar, Niraj Kumar Shukla, Sunil Kumar Sinha, Ajay Shekhar Pandey

Paper Title: Autotransformer Connected 24 Pulse AC-DC Converter for Vector Controlled Induction Motor Drive:

A Matlab Simulation

Abstract: This paper deals with the steady state performance analysis of an autotransformer based 24- pulse ac-

dc converter feeding variable frequency vector controlled squirrel cage induction motor drives at different

mechanical load and constant reference speed. These variable frequency induction motor drives are generally

operated in vector controlled mode due to their inherent advantages. There are three new elements which are added

in the proposed model, first is three single phase autotransformers for phase shifting of 3-phase supply, second one

is 24-pulse converter to eliminate the harmonics injected to the source and third one is interphase transformers to

ensure the independent operation of the rectifier circuits. The feedback closed loop control system is used to

control the speed of the induction motor, which has highly nonlinear torque-speed characteristics. This simulation

is done to analyse the parameters of ac electric drive in terms of settling time, steady state error and overshoot. The

simulation results show that the speed control performance reduces the steady state error and maximum overshoot

under different load conditions.

Keywords: Vector Controlled Induction Motor, PWM Inverter, Autotransformer, Interphase Transformers, FOC.

References: 1. G. Seguier’ “Power electronic Converters: AC-DC Conversion,” McGraw Hill Book Company, New York, 1987.

2. B. K. Bose, “Modern Power Electronics and AC Drives”, Pearson Education, New Delhi,2001.

3. Dr. P. S. Bimbhra “Electrical machinery”, Khanna Publishers, Delhi. 4. J. Maslin, Sharon, G. F. Jones and Irwin “Electrical Induction Apparatus”, US Patent 2,307,527, Jan. 5, 1943.

5. D. A. Paice, “Power Electronic Converter Harmonics: Multipulse Methods for Clean Power”, IEEE Press, New York, 1996.

6. Mohamed E. El-Hawary “Principles of Electric Machines with Power Electronic applications,” Prentice- Hall.USA,1986. 7. D.A. Paice, “Wye connected 3-phase to 9-phase autotransformer with reduced winding currents,” U.S. Patent No. 6,191,968 B1, Feb. 20,

2001.

8. L. Chen and G. K. Horng, “A new passive 28-step current shaper for three- phase rectification,” IEEE Trans. on Industrial Electronics, Vol.47, No.6, Dec.2000, pp. 1212-1219.

9. Singh, G. Bhuvaneshwari and Vipin Garg, “A Twelve- Phase AC-DC Converter for Power Quality Improvements in Direct Torque

Controlled Induction Motor Drives”, in Proc. Of Conf. IEEE- ICIEA 2006, May 2006, pp.257-263. 10. V. A. Boshnyaga, L.P. Kalinin and V.M. Postolaty, “Phase- Shifter”, US Patent 4,013,942, March 22, 1977.

11. Muhammad H. Rashid A Hand book of “Power Electronics, Circuits, Devices and Applications” Prentice-HallTM, New Delhi, 110017.

12. R. Krishnan, “Electric Motor Drives: Modeling, Analysis, and Control, “Prentice-Hall of India, New Delhi, 2003. 13. Gopal K. Dubey “Fundamentals of Electric Drives,”. Narosa Publishing house. New delhi,2005.

14. Ion Boldea and S. A. Nasar “Electric drives,” CRC Press, USA. 2006. 15. SINGH B., GARG V., BHUVANESWARI G.: ‘24-pulse ac–dc converter for harmonic mitigation, IET Power Electron., 2009, 2, (4), pp.

364–377

16. SINGH B., BHUVANESWARI G., GARG V.: ‘Polygon connected Autotransformer based 24-pulse converter for harmonic mitigation’.Pending Indian Patent, filed January 2006

17. Goran Rafajlovski and Krste Najdenkoski, “Trends in controlling high performance induction motor drives”, Republic of Macedonia.

424-429

Page 56: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

18. Dal Y. Ohm, “Dynamic model of Induction Motors for vector control” Drivetech, Inc., Blacksburg, Virginia.

19. IEEE Standard 112-1991, "IEEE Standard Test Procedure for Polyphase Induction Motors and Generators", Institute of Electrical and

Electronics Engineers, Inc. 20. B.L. Theraja and A.K. Theraja “A Text book of electrical technology”, Volume II S. Chand & Company LTD, New Delhi.

78.

Authors: Y. Srinivasa Rao, Mohammed Ali Hussain

Paper Title: Adaptive Quality of Service Medium Access Control protocol for IEEE 802.11 based Mobile Ad hoc

Network

Abstract: Mobile ad hoc network is an infrastructure less wireless multi hop network with heterogeneous

mobile nodes dispersed in wireless communication zone. MANET has different application in different fields, due

to its distributed, adaptive and self-formation capabilities. Providing quality of service communication is one of the

important considerable issue in MANET. One of the major facto to achieve the QoS communicates is efficient

MAC protocol. This paper defines a adaptive – QoS MAC protocol (AQMP) for IEEE 802.11 based MANET.

AQMP protocol improve the QoS based on majorly four considerations I). Prioritize the nodes based on their

network load, II). Assignment of nodes for medium access, III). Prioritize the traffic based on their sensitivity, and

IV). Assignment of MAC settings to prioritized traffic. Performance results indicates that proposed MAC protocol

out perform in comparison with existing adaptive MAC protocols.

Keywords: MANET, QoS, MAC, Priority, access categoty and simulation.

References: 1. Mohammad, A. A. K., Mahmood, A. M., & Vemuru, S. “Providing Security Towards the MANETs Based on Chaotic Maps and Its

Performance”, In Microelectronics, Electromagnetics and Telecommunications (pp. 145-152). Springer, (2019)

2. Rao, Y. Srinivasa, and Mohammed Ali Hussain. "Dynamic MAC Protocol to Enhancing the Quality of Real Time Traffic in MANET Using Network Load Adaptation." 1612-1617, (2018)

3. Neeraja, Y., V. Sumalatha, and Sd Muntaz Begum. "Comprehensive Survey of Medium Access Control Protocols for MANETs."

International Journal of Emerging Trends & Technology in Computer Science 2, no. 3 (2013) 4. Holt, Charles C. "Forecasting seasonals and trends by exponentially weighted moving averages." International journal of forecasting 20, no.

1: 5-10. (2004)

5. Draft, I. T. U. T. "recommendation and final draft international standard of joint video specification (ITU-T Rec. H. 264| ISO/IEC 14496-10 AVC)." Joint Video Team (JVT) of ISO/IEC MPEG and ITU-T VCEG, JVTG050 33, (2003)

6. Marwaha, S., Indulska, J. and Portmann, M., , December. Challenges and recent advances in QoS provisioning, signaling, routing and MAC

protocols for MANETs. In Telecommunication Networks and Applications Conference, 2008. ATNAC 2008. Australasian (pp. 97-102), (2008)

7. Dhilip Kumar V, Vinoth Kumar V ,Kandar D, “Data Transmission Between Dedicated Short Range Communication and WiMAX for

Efficient Vehicular Communication” Journal of Computational and Theoretical Nanoscience,Vol.15,No.8,pp.2649-2654, (2018)

8. Lee, Sunghee, and Kwangsue Chung. "The study of dynamic video frame mapping scheme for multimedia streaming over IEEE 802.11 e

WLAN." International Journal of Multimedia and Ubiquitous Engineering 8, no. 1: 163-174, (2013) 9. Choi, Sunghyun, Javier Del Prado, and Stefan Mangold. "IEEE 802.11 e contention-based channel access (EDCF) performance evaluation."

In Communications, 2003. ICC'03. IEEE International Conference on, vol. 2, pp. 1151-1156. IEEE, (2003).

10. Mangold, Stefan, Sunghyun Choi, Guido R. Hiertz, Ole Klein, and Bernhard Walke. "Analysis of IEEE 802.11 e for QoS support in wireless LANs." IEEE wireless communications 10, no. 6 (2003): 40-50.

11. Lucas, James M., and Michael S. Saccucci. "Exponentially weighted moving average control schemes: properties and enhancements."

Technometrics 32, no. 1 : 1-12. (1990) 12. Benyassine, Adil, Eyal Shlomot, H-Y. Su, Dominique Massaloux, Claude Lamblin, and J-P. Petit. "ITU-T Recommendation G. 729 Annex

B: a silence compression scheme for use with G. 729 optimized for V. 70 digital simultaneous voice and data applications." IEEE

Communications Magazine 35, no. 9 : 64-73. (1997) 13. Schwarz, Heiko, Detlev Marpe, and Thomas Wiegand. "Overview of the scalable video coding extension of the H. 264/AVC standard."

IEEE Transactions on circuits and systems for video technology 17, no. 9 : 1103-1120. (2007)

14. Issariyakul, Teerawat, and Ekram Hossain. "Introduction to Network Simulator 2 (NS2)." In Introduction to Network Simulator NS2, pp. 21-40. Springer, Boston, MA, 2012.

15. Rao, Y. Srinivasa, and Mohammed Ali Hussain. "Analytical Approach to Estimate the occurrence of bottleneck node in multi hop

communication Network",IJRECE ,Vol.7,Issue1,ISSN:2393-9028, (2019)

430-433

79.

Authors: Anju Kalwar, Reema Ajmera, C.S. Lamba

Paper Title: An Empirical Study in Small Firms for Web Application Development and Proposed New Parameters

for Develop New Web Application Model

Abstract: Over The last ten decades, the web application has imposed a great impact on the modern society. In

companies and in other sectors of development many web development methodologies are being implemented on

a daily basis for the development out of which some are being customized by the company itself . In this paper, I

was surveyed many web development companies and fill the survey form using some parameters and find new

parameters developing the new web application model.

Keywords: Web Application; Model; Empirical Study

References: 1. Fayad ME, Laitinen M, Ward RP. Thinking objectively: software engineering in the small. Communications of the ACM. 2000 Mar

1;43(3):115-8.

2. Hofer, C., 2002. Software development in Austria: results of an empirical study among small and very small enterprises. In Euromicro Conference, 2002. Proceedings. 28th (pp. 361-366). IEEE.

3. C. Y. Laporte, A. Renault, J. Desharnais, N.Habra, M. Abou El Fattah, and J. Bamba, In Proc. SWDC-REK, (2005), 153–163

4. Dangle, K.C., Larsen, P., Shaw, M. and Zelkowitz, M.V., 2005. Software process improvement in small organizations: a case study. IEEE software, 22(6), pp.68-75.

5. Ahmad, F., Baharom, F. and Husni, M., 2012. Investigating the Awareness of Applying the Important Web Application Development and

Measurement Practices in Small Software Firms. arXiv preprint arXiv:1201.1967. 6. R KETTELERIJ, Faculty of Science, University of Amsterdam, www.science.uva.n, (2006).

7. Eldai, O.I., Ali, A.H.M.H. and Raviraja, S., 2008. Towards a new methodology for developing web-based systems. World Academy of

434-436

Page 57: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

Science, Engineering and Technology, 46, pp.190-195.

8. Mujumdar, A., Masiwal, G. and Chawan, P.M., 2012. Analysis of various software process models. International Journal of Engineering

Research and Applications, 2(3), pp.2015-2021.

80.

Authors: S.P. Sundar Singh Sivam, Ganesh Babu Loganathan, K. Saravanan, S. RajendraKumar

Paper Title: Multi-Response Enhancement of Drilling Process Parameters for AM 60 Magnesium Alloy as per the

Quality Characteristics utilizing Taguchi-Ranking Algorithm and ANOVA

Abstract: This investigation shows the improvement of Drilling parameters on AM-60 Mg alloy made with

the help of Gravity Die Casting and with reactions upheld symmetrical cluster with Grey relational analysis -

GRA. Which Focuses on the streamlining of Drilling constraints utilizing the system to get least surface

Roughness (Ra), Tool Wear, Cutting Time, Power Requirement and Torque and Max MRR. Concentrates on the

optimization of drilling constraints utilizing the procedure to get minimum surface roughness (Ra), Thrust Force,

Burr size and Circularity Error. An amount of drilling experiments remained conducted mistreatment the L9 OA

on CNC Machining Center. The trails remained achieved on Mg alloy block cutting tool of an ISO 460.1-1140-

034A0-XM GC3 of 12 mm diameter with Tool Angle 140 degrees, used throughout the experimental work

beneath dry cutting conditions. This experimental study results like Ra, TF, CE, and BZ were analyzed. GRA &

ANOVA was utilized to effort out the principal essential Spindle speed, feed rate, Titanium Coated for Drill Bits

(TiN, TiAN, TiCN) with 0.020 in Coating Thickness manipulating the Reaction. The essential and collaboration

effect of the data influences on the ordinary responses remain analyzed. The standard qualities and projected

values are truly near.

Keywords: AM 60, Dry Drilling, Grey relational Analysis Taguchi method

References: 1. Davim JP (2003) Study of drilling metal-matrix composites based on the Taguchi Techniques. J Mater Process Technol 132:250– 254

2. Tosun G, Mehtap Muratoglu (2004) The drilling of Al/SiCp metal matrix composites. Part I: Microstructure, Compos Sci Tech 64: 209–308

3. Tosun G, MehtapMuratoglu (2004) The drilling of Al/SiCp metal matrix composites. Part II: Work piece Surface integrity, Compos Sci

Tech 64:1413–1418 4. Davim JP (2003) Design of optimization of cutting parameters for turning metal matrix composites based on the orthogonal arrays. J Mater

Process Technol 132:340–344

5. Manna A, Bhattacharayya B (2003) A study of machinability of Al-SiC metal matrix Composites. J Mater Process Technol 140: 711–716 6. Mohan NS, Ramachandra A, Kulkarni SM (2005) Influence of Process parameters on cutting force and torque during drilling of glass-fiber

polyester reinforced composites. Compos Struct 71:407– 413

7. Tosun N (2006) Determination of optimum parameters for multiperformance characteristics in drilling by using grey relational analysis. Int J Adv Manuf Technol 28:450–455

8. Lin CL, Lin JL, Ko TC (2002) Optimization of the EDM Process based on the orthogonal array with fuzzy logic and

9. Grey relational analysis method. Int J AdvManufTechnol 19: 271–277 10. Deng J (1989) Introduction to grey system. Grey Syst 1:1–24

11. Jeyapaul R, Shahabudeen P, Krishnaiah K (2005) Quality management research by considering multi-response problems in the Taguchi

method - a review. Int J AdvManufTechnol 26: 1331–1337 12. Multi response optimization of machining parameters of drilling Al/SiC metal matrix composite using grey relational analysis in the

Taguchi method 2007, A. NoorulHaq &P. Marimuthu &R. Jeyapaul, Int J AdvManufTechnol (2008) 37:250–255, DOI 10.1007/s00170-

007-0981-4. 13. SIVAM, S. P. Sundar Singh et al.”Multi Response Optimization of Setting Input Variables for Getting Better Product Quality in Machining

of Magnesium AM60 by Grey Relation Analysis and ANOVA." Periodica Polytechnica Mechanical Engineering, [S.l.], 2017. ISSN 1587-

379X. https://doi.org/10.3311/PPme.11034 14. Sivam, S.P.S.S et al.,, , An Experimental Investigation And Optimisation Of Ecological Machining Parameters On Aluminium 6063 In Its

Annealed And Unannealed Form, Journal Of Chemical And Pharmaceutical Sciences. Page No Page (46 – 53), 2015.

15. Sivam, S.P.S.S et al.,, 2015, “Application of Forming Limit Diagram and Yield Surface Diagram to Study Anisotropic Mechanical Properties of Annealed and Unannealed SPRC 440E Steels”. Journal of Chemical and Pharmaceutical Sciences. ISSN: 0974-2115, Page No

(15 – 22).

16. Sivam, S.P.S.S et al.,. (2016). Investigation exploration outcome of heat treatment on corrosion resistance of AA 5083 in marine application. Journal of Science and Technology. 14 : 453-460.14 (S2), 2016, ISSN 0972-768X.

17. Sivam, S.P.S.S., Umasekar, V.G., Mishra, A., Mishra, S. and Mondal, A. (2016) ‘Orbital cold forming technology – combining high

quality forming with cost effectiveness – a review’, Indian Journal of Science and Technology, October, Vol. 9, No. 38, DOI: 10.17485/ijst/2016/ v9i38/91426.

18. Sivam, S.P.S.S et al.,. (2016) ‘Frequently used anisotropic yield criteria for sheet metal applications: a review’, Indian Journal of Science

and Technology, December, Vol. 9, No. 47, DOI: 10.17485/ijst/2015/v8i1/92107. 19. S.P. Sundar Singh Sivam et al,.” Analysis of residual stresses, thermal stresses, cutting forces and other output responses of face milling

operation on ze41 magnesium alloy." International Journal of Modern Manufacturing Technologies, Pp. No 92-100. ISSN 2067–3604, Vol.

X, No. 1 / 2018. 20. Sivam, S. P. S. S et al., “The Grey Relational Analysis and Anova to Determine the Optimum Process Parameters for Friction Stir Welding

of Ti and Mg Alloys”, Periodica Polytechnica Mechanical Engineering. doi: https://doi.org/10.3311/PPme.12117.

21. P. Sundar Singh Sivam et al, S., (2018). Comparison of Manufacturing Data Analysis For 5 & 3-Axis Vertical Machining Center for the Time and Tool Benefits of Industries. International Journal of Engineering & Technology, 7(4.5), 196-201.

doi:http://dx.doi.org/10.14419/ijet.v7i4.5.20044.

22. P. Sundar Singh Sivam et al, (2018). Development of Vibrator Feeding Mechanism Using Two Sets of Rollers for the Separation of Ball Grading For Industry Benefits. International Journal of Engineering & Technology, 7(4.5), 202-206.

doi:http://dx.doi.org/10.14419/ijet.v7i4.5.20045

23. S. P. Sundar Singh Sivam et al, (2019) A study of cooling time, copper reduction and effects of alloying elements on the microstructure and mechanical properties of SG iron casting during machining, Australian Journal of Mechanical Engineering, DOI:

10.1080/14484846.2018.1560679

24. S.P. Sundar Singh Sivam et al, (2018) "THICKNESS DISTRIBUTION AND NUMERICAL MODELLING OF CONVENTIONAL SUPERPLASTIC FORMING IN AA2024 ALLOY", International Journal of Modern Manufacturing Technologies, ISSN 2067–

3604,76,85, Vol. X, No. 2 / 2018 25. S. P. S. S. Sivam et al, "Competitive study of engineering change process management in manufacturing industry using product life cycle

management — A case study," 2017 International Conference on Inventive Computing and Informatics (ICICI), Coimbatore, 2017, pp. 76-

81. doi: 10.1109/ICICI.2017.8365247.

437-440

Page 58: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

81.

Authors: D. Krishna Madhuri

Paper Title: A Machine Learning based Framework for Sentiment Classification: Indian Railways Case Study

Abstract: Machine learning in the field of computer science is the application of Artificial Intelligence (AI)

that helps in making systems intelligent. It focuses on producing algorithms that may lead to AI applications in the

real world. As enterprises are producing huge amount of data, it became indispensable to have machine learning

techniques in place for discovering business intelligence from data for strategic decision making. However, in the

contemporary era, the traditional data may be deemed inadequate for decision making. The rationale behind this is

that people of all walks of life are able to exchange ideas and opinions/sentiments over social media like Facebook

and Twitter. In other words, there is social feedback exists in Online Social Networks (OSNs). Collection of social

media data related to business and using machine learning algorithms to extract useful knowhow from such data

bestows competitive edge to enterprises. The existing literature on sentiment analysis has plenty of methods for

discovering sentiments. However, it is still an open problem to have optimizations. In this paper we proposed a

framework for discovering sentiments from tweets of Indian Railways. This is a domain specific framework which

leverages business intelligence through different classifiers such as C4.5, Naive Bayes, SVM and Random Forest.

An evaluation procedure with measures like precision, recall, F-Measure and accuracy is provided. The empirical

study with Indian Railways case study revealed that the proposed framework is useful in sentiment analysis and

can be tailored to suit other domains as well. By considering the atweets of Indian Railways as a case study

evaluation is made in terms of precision, recall and F-Measure.

Keywords: Sentiment classification, machine learning, C4.5, Naive Bayes, SVM, Random Forest

References: 1. Duyu Tang, Furu Wei, Nan Yang, Ming Zhou, Ting Liu and Bing Qin. (2014). Learning Sentiment-Specific Word Embedding for Twitter

Sentiment Classification, p1555–1565.

2. Duyu Tang, Bing Qin and Ting Liu. (2015). Document Modeling with Gated Recurrent Neural Network for Sentiment Classification, p1422–1432.

3. Abinash Tripathy, Ankit Agrawal and Santanu Kumar Rath. (2016). Classification of sentiment reviews using n-gram machine learning

approach. elsever, p117–126. 4. Xiang Zhang, Junbo Zhao and Yann LeCun. (2015). Character-level Convolutional Networks for Text Classification, p1-9.

5. Leona Yi-Fan Su, Michael A. Cacciatore, Xuan Liang, Dominique Brossard, Dietram A. Scheufele and Michael A. Xenos. (2016).

Analyzing public sentiments online combining human- and computer-based content analysis. Information, Communication & Society, p1-24.

6. Lei Zhang, Riddhiman Ghosh, Mohamed Dekhil, Meichun Hsu and Bing Liu . (2011). Combining Lexicon-based and Learning-based

Methods for Twitter Sentiment Analysis, p1-9. 7. Zhiyuan Chen, Nianzu Ma and Bing Liu. (2018). Lifelong Learning for Sentiment Classification, p1-8.

8. Navonil Majumder, Soujanya Poria, Alexander Gelbukh and Erik Cambria . (2017). Deep Learning-Based Document Modeling for

Personality Detection from Text. iEEE iNTElliGENT SYSTEmS, p74-79.

9. Mehdi Allahyari. (2017). A Brief Survey of Text Mining Classification, Clustering and Extraction Techniques. KDD Bigdas, p1-13.

10. Maria Giatsoglou. (2017). Sentiment analysis leveraging emotions and word embeddings. elsever, p214–224.

11. Aytug˘ Onan and Serdar Korukog˘lu. (2017). A feature selection model based on genetic rank aggregation for text sentiment classification. Journal of Information Science. 43 (1), p25–38.

12. Yafeng Ren, Yue Zhang, Meishan Zhang and Donghong Ji. (2016). Context-Sensitive Twitter Sentiment Classification Using Neural

Network, p1-7. 13. Soujanya Poria, Erik Cambria, Grégoire Winterstein and Guang-Bin Huang. (2014). Sentic patterns: Dependency-based rules for concept-

level sentiment analysis. Elsever, 69, p45–63.

14. Shuhua Monica Liu and Jiun-Hung Chen. (2015). A multi-label classification based approach for sentiment classification. elsever . 42, p1083–1093.

15. Weiyuan Li and Hua Xu . (2013). Text-based emotion classification using emotion cause extraction. elsever, p1-8.

16. Xavier Glorot. (2011). Domain Adaptation for Large-Scale Sentiment Classification A Deep Learning Approach, p1-8. 17. Richard Socher, Alex Perelygin, Jean Y. Wu, Jason Chuang, Christopher D. Manning, Andrew Y. Ng and Christopher Potts. (2013).

Recursive Deep Models for Semantic Compositionality Over a Sentiment Treebank, p1631–1642.

18. Alexander Pak and Patrick Paroubek. (2013). Twitter as a Corpus for Sentiment Analysis and Opinion Mining, p1320-1326. 19. Mike Thelwall, Kevan Buckley, Georgios Paltoglou and Di Cai . (2012). Sentiment Strength Detection in Short Informal Text. Journal of

the American Society for Information Science and Technology. 61 (12), p2544–2558.

20. Andrew L. Maas, Raymond E. Daly, Peter T. Pham, Dan Huang, Andrew Y. Ng and Christopher Potts. (2011). Learning Word Vectors

for Sentiment Analysis, p142–150.

21. Tetsuji Nakagawa. (2010). Dependency Tree-based Sentiment Classification using CRFs with Hidden Variables, p786–794.

22. Long Jiang, Mo Yu, Ming Zhou, Xiaohua Liu and Tiejun Zhao. (2011). Target-dependent Twitter Sentiment Classification, p151–160. 23. Xiaolong Wang. (2011). Topic Sentiment Analysis in Twitter: A Graph-based Hashtag Sentiment Classification Approach. ACM, p1-10.

24. G.Vinodhini and RM.Chandrasekaran. (2012). Sentiment Analysis and Opinion Mining: A Survey. International Journal of Advanced Research in Computer Science and Software Engineering. 2 (6), p1-11.

25. Efstratios Kontopoulos . (2013). Ontology-based sentiment analysis of twitter posts. elsever, p4065–4074.

26. Yan Dang, Yulei Zhang, and Hsinchun Chen. (2010). A Lexicon-Enhanced Method for Sentiment Classification: An Experiment on Online Product Reviews. IEEE, p1-8.

27. Xia Hu, Lei Tang, Jiliang Tang and Huan Liu. (2013). Exploiting Social Relations for Sentiment Analysis in Microblogging. ACM, p1-

10. 28. Morteza Babaie. (2011). Classification and Retrieval of Digital Pathology Scans: A New Dataset. IEEE, p1-10.

29. Soujanya Poriaa. (2017). Ensemble application of convolutional neural networks and multiple kernel learning for multimodal sentiment

analysis. elsever, p217–230.

441-445

82.

Authors: P. Anusha, G. Kalpana, T. Vigneswaran

Paper Title: FPGA Implementation of Logarithmic Multiplier

Abstract: logarithmic multiplier is the vital procedure mainly for DSP, image processing and 3-D graphic

applications. Log multiplier converts the multiplication into addition; hence it will reduce the number of

computation steps to speed up the multiplication. In multiplication process, the reduction of partial products

contributes most to the overall delay, power and area. Adder Compressors are employed to reduce the latency of

446-449

Page 59: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

this step. Analysis is done by coding the designs in HDL and synthesized with Xilinx ISE 14.7 using Virtex6 or

spartan3 series of FPGA. Optimized architectures are synthesized using Encounter RTL Compiler Tool in Cadence

and obtained the reports on power and area. The results indicate the better speed high performance and overall

efficiency of logarithmic multiplication

Keywords: LNS (logarithmic number systems), Arithmetic circuit, multiplication, LUT, Mitchell.

References: 1. Bansal Y, Madhu C and Kaur P. (2014 ) High speed Vedic multiplier designs-A review on IEEE Recent Advances in Engineering and

Computational Sciences (RAECS), (pp. 1-6). 2. M. Fonseca (2011) “Design of Pipelined Butterflies from Radix-2 FFT with Decimation in Time Algorithm using Efficient Adder

Compressors,” in Circuits and Systems (LASCAS), IEEE Second Latin American Symposium on, feb. 2011, pp. 1-4

3. John N Mitchell.(1962) Computer multiplication and division using binary logarithms. IRE Transactions on Electronic Computers, (4):pp. 512-517.

4. V. Mahalingam, N. Rangantathan, (2006) Improving Accuracy in Mitchell’s Logarithmic Multiplication Using Operand Decomposition,

IEEE Transactions on Computers, Vol. 55, No. 2, pp. 1523-1535 5. Ellaithy DM, El. Moursy MA, Ibrahim GH, Zaki A and Zekry (2017) A. Double Logarithmic Arithmetic Technique for Low-Power 3-D

Graphics Applications. IEEE Transactions on Very Large Scale Integration (VLSI) Systems: pp. 2144-52.

6. Ioannis Kouretas, Charalambos Basetas and Vassilis Paliouras. (2014) Low-power logarithmic number system addi- tion/subtraction and their impact on digital filters. IEEE transactions on computers, 62(11), pp. 2196-2209.

7. R. R. Selina, (2013) “VLSI implementation of piecewise approximated antilogarithmicconverter,” in Proc. Int. Conf. Commun. Signal

Process. . (ICCSP), pp. 763–766. 8. Rabaey, J.M., Chandrakasan and Nikolic, B. (2002): ‘Digital integrated circuits’ (Prentice Hall).

9. K. Johansson, O. Gustafsson and L. Wanhammar, (2008) “Implementation of elementary functions for logarithmic number systems,” IET

Comput. Digit.Tech., vol. 2, no. 4, pp. 295–304. 10. C.T. Kuo and T.B. Juang, (2012) “A lower error antilogarithmic converter using novel four-region piecewise-linear approximation,” in

Proc. IEEE Circuits Syst. Conf., vol. 2. Dec., pp. 507 510.

83.

Authors: D. Helen

Paper Title: An Energy-Efficient Routing using Fuzzy Model Based Clustering for Mobile Ad Hoc Network

Abstract: Mobile Ad hoc NETwork (MANET) is an infrastructure-less, autonomous network, the nodes are

connected through the wireless multi-hop links. The absence of infrastructure and dynamic environment demands

to form a new set of routing protocol for MANET. Routing is a main issue in MANET due to its mobility and

inadequate resource availability. Especially, energy-efficient routing is essential because every node is operated by

exhausted battery power. Power failure of an individual node partitioned the entire network architecture. So,

routing in MANET shall use the available battery energy in an effective way to enhance the network lifetime. The

Fuzzy Model-based Clustering (FMC) algorithm recognizes the reliable and loop-free route between the nodes by

choosing an optimal cluster head. The FMC uses the speed, residual energy and signal strength as factors in order

to find the efficient cluster head. The nodes are implementing the fuzzy logic mechanism to estimate the node

cost. The node with the highest cost is selected as cluster head. The cluster head achieves the data packet

transmission. Hence, the FMC preserves the stable network by reducing the reselection of cluster head and

minimizes the re-affiliation of all the nodes in the cluster. The FMC algorithm maintains the packet delivery ratio,

average delay, energy consumption by 87.3%, 17.5 %, and 25.83% respectively, over the existing AODV and

FCESRB protocols.

Keywords: autonomous, clustering, fuzzy logic, signal strength.

References: 1. Adebanjo Adekiigbe. A and Kamalrulnizam Abu Bakar. K (2013),” Using Fuzzy Logic to Improve Cluster Based Routing Protocol in

Mesh Client Networks”, International Journal of Innovative Computing, Vol.3, No.2, pp. 1-11.

2. Beongku An. B and Symeon Papavassiliou. S (2001),” A Mobility-Based Clustering Approach To Support Mobility Management And Multicast Routing In Mobile Ad-Hoc Wireless Networks”, International Journal of Network Management, Vol.11, No.6, pp. 387-395.

3. Deny J, Sundhararajan M (2016),” Performance assessment and comparisons of single and group mobility in MANET,Insdian Journal of

Science and Technology Vol.9, No.21,pp.1–6. 4. Floriano De Rango.F, Francesca Guerriero.F and Peppino Fazio.P (2012), “Link-stability and energy aware routing protocol in distributed

wireless networks”, IEEE Transaction Parallel Distributed System, Vol.23, No.4, pp.713-726.

5. Ghosekar. P, Katkar. G and Ghorpade. P (2010),” Mobile Ad Hoc Networking: Imperatives and Challenges”, International Journal of Computer Applications, Special Issue on “Mobile Ad-Hoc Networks”, pp. 153-158.

6. Hakan Bagci. H, Adnan Yazici.A (2010),”An Energy Aware Fuzzy unequal Clustering Algorithm for Wireless Sensor Networks, In

Proceedings of IEEE World Congress on Computational Intelligence, Barcelona, Spain. 7. Heinzelman. W, Chandrakasan. A and Balakrishnan. H (2000),” Energy Efficient Communication Protocol for Wireless Microsensor

Networks”, Proceeding of the 33rd annual Hawaii International Conference on System Sciences Vol.8, pp.1–10. 8. Helen D, Arivazhagan (2016),” An Intelligent Energy Efficient Routing Protocol for Mobile Ad-Hoc Network”, Indian Journal of

Science and Technology, Vol 9. No.45,pp.1-5

9. Jeoren Hoebeke. J, Ingrid Moerman.I, Bart Dhoedt.B and Piet Demester.P (2004),” An Overview of Mobile ad hoc Networks: Applications &Challenges”, Journal of the Communications Network, Vol.3, No.3, pp.60-66.

10. Jiang. M, Li. J. and Tay. Y. C, (1999), “Cluster Based Routing Protocol (CBRP)”, IETF, Internet draft.

11. Larki.F.A, Seyed. J. M and Harounabadi .A (2014), “Increased Longevity of Wireless Ad hoc Network through Fuzzy System”, Decision Science Letters, Vo.3, No.3, pp. 1-9.

12. Muneer Bani Yassein.M, Naveen Hijazi.N,” Improvement On Cluster Based Routing Protocol Using Vice Cluster Head”, In Proceeding

of 4th International Conference on Next Generation Mobile Application, Services And Technologies, pp.137-141. 13. Sahar Adabi.S,Sam Jabbehdari.S, Ali Rezaee,”Distributed Fuzzy Score Based Clustering Algorithm For Mobile Ad Hoc Network. In

Proceeding of 3rd IEEE Asia-Pacific Services Computing Conference, pp.193-198.

14. Saleh Ali Al-Omari.K, Putra Sumari.P (2010), “ An overview of Mobile Ad hoc networks for existing protocols and applications”,

International journal on applications of graph theory in wireless ad hoc networks and sensor networks, Vol.2,No.1, pp.87-110.

15. Shayesteh Tabatabaei.S,Mohammad Teshnehlab.M,syed Javad Mirabedini.S(2015),“Fuzzy-Based Routing Protocol to Increase

Throughput in Mobile Ad Hoc Networks”, Wireless Personal communications, Vol.84,No.4 , pp. 2307–2325.

450-454

Page 60: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

16. Shanthi HJ and Marie Anita E (2014),” Performance analysis of black hole attacks in geographical routing MANET”, International

Journal of Engineering and Technology (IJET) vol.6,No.5,pp-2382-2387.

84.

Authors: R. Srinivasan, S. Poongavanam , R. Vettriselvan, J. Rengamani, Fabian Andrew James

Paper Title: Network Optimization for Distribution of South Based OEM’s Passenger Vehicles to other Zones of

India with Reduced Lead-Time

Abstract: A survey conducted among top auto makers in India highlighted the fact that technology is widely sent

to be a supply chain enable, reducing inventory levels and stocking, shortening lead times and fostering as sprit of

collaboration with suppliers and dealers. IT Managers indicate lack of alignment between business goals and it

implementation plans in majority of the companies. Although it found that there is a high awareness among Indian

Tier-1 companies regarding lead time. The usage of productive enhancing tools such as data analytics, ERP, rivet

care still at low levels specially among Tier-2 suppliers due to challenges such as cultural, financial, organizational

and technological barriers to be overcome majority of the maimed at improving service levels. E-payment and

clearance facilities and enhancing visibility leading to be after coordination and reducing on core activities, vendor

base rationalization at all echelons of the supply chain.

Keywords: Lead time, Network Optimization, OEM, Passenger, Vehicle

References: 1. Rajasekar D (2017). A study on motivation level of employees in automobile industry, International journal of Mechanical engineering

and technology, 8(12), pp744- 749.

2. Shameem A (2017). Innovative strategy for launch of new brand of cement, International journal of Mechanical engineering and

technology,8(5), pp 411- 417.

3. Nishant Kaushik, Executive- Business Development Wallenius Wilhelmsen Logistics (India) Pvt. Ltd

4. Saranya.S Human Resource Manager Wallenius Wilhelmsen Logistics (India) Pvt. Ltd

5. Industry report 2014

6. Society of Indian Automobile Industry (SIAM)

7. State Transport Authority (Tamil nadu)

8. Vettriselvan R., Ruben Anto., & Jesu Rajan FSA (2018), Rural lighting for energy conservations and sustainable development,

International Journal of Mechanical Engineering and Technology, 9(7):604-611.

455-458

85.

Authors: Arif Sari, Samson Oluwaseun Fadiya, Acheme Okolobia Odeh.

Paper Title: A Rumor Algorithm Propagation Considering Block Omission in a Blockchain System

Abstract: In this article we experimented the rumor spreading algorithm of data propagation in a blockchain

system with specific focus on the block omission rate. The algorithm introduced here was modeled and simulated

by a new class of extended Petri nets called “Elementary nets”. This type of nets is suitable for the representation

of the functions of an information system. The descriptive and analytical power of the elementary net was

employed in this article to model and perform simulation experiments to measure the omission rates of blocks

propagated in the blockchain network using the rumor algorithm. The aim of the research is to model and simulate

block data propagation in the blockchain system considering block omission. The modified rumor algorithm for

the blockchain system was proposed in our Ph.D. thesis with the introduction of a switching module that regulate

block dissemination in the model. The result of our research shows a steady decline in the block omission rates

with increasing number of nodes. This is a very significant criteria in the implementation of a reliable and scalable

block propagation scheme for the blockchain system.

Keywords: Blockchain, Block propagation, Elementary nets, Petri nets, Rumor Algorithm.

References: 1. Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. 2. Li, J. (2018). Data Transmission Scheme Considering Node Failure for Blockchain. Wireless Personal Communications, 1-16.

3. Kostin, A., & Ilushechkina, L. (2010). Modeling and Simulation of Distributed Systems:(With CD-ROM). World Scientific Publishing

Company. 4. Bahri, L., Carminati, B., & Ferrari, E. (2018). Decentralized privacy preserving services for online social networks. Online Social

Networks and Media, 6, 18-25.

5. Biswas, K., & Muthukkumarasamy, V. (2016, December). Securing smart cities using blockchain technology. In High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data

Science and Systems (HPCC/SmartCity/DSS), 2016 IEEE 18th International Conference on (pp. 1392-1393). IEEE.

6. Qin, B., Huang, J., Wang, Q., Luo, X., Liang, B., & Shi, W. (2017). Cecoin: A decentralized PKI mitigating MitM attacks. Future Generation Computer Systems.

7. Sagirlar, G., Carminati, B., Ferrari, E., Sheehan, J. D., & Ragnoli, E. (2018). Hybrid-IoT: Hybrid Blockchain Architecture for Internet of

Things-PoW Sub-blockchains. arXiv preprint arXiv:1804.03903. 8. Feng, Q., He, D., Zeadally, S., Khan, M. K., & Kumar, N. (2018). A survey on privacy protection in blockchain system. Journal of

Network and Computer Applications.

9. Karp, R., Schindelhauer, C., Shenker, S., & Vocking, B. (2000). Randomized rumor spreading. In Foundations of Computer Science, 2000. Proceedings. 41st Annual Symposium on (pp. 565-574). IEEE.

10. Danzi, P., Kalør, A. E., Stefanović, Č., & Popovski, P. (2017). Analysis of the Communication Traffic for Blockchain Synchronization

of IoT Devices. arXiv preprint arXiv:1711.00540. 11. Mattila, J. (2016). The blockchain phenomenon. ):‘Book The Blockchain Phenomenon’(Berkeley Roundtable of the International

Economy, 2016, edn.).

12. Kosba, A., Miller, A., Shi, E., Wen, Z., & Papamanthou, C. (2016, May). Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In Security and Privacy (SP), 2016 IEEE Symposium on (pp. 839-858). IEEE.

13. Zyskind, G., & Nathan, O. (2015, May). Decentralizing privacy: Using blockchain to protect personal data. In Security and Privacy

Workshops (SPW), 2015 IEEE (pp. 180-184). IEEE. 14. Zheng, Z., Xie, S., Dai, H., Chen, X., & Wang, H. (2017, June). An overview of blockchain technology: Architecture, consensus, and

future trends. In Big Data (BigData Congress), 2017 IEEE International Congress on (pp. 557-564). IEEE.

459-467

Page 61: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

15. Cachin, C. (2016, July). Architecture of the Hyperledger blockchain fabric. In Workshop on Distributed Cryptocurrencies and

Consensus Ledgers.

16. Xu, X., Weber, I., Staples, M., Zhu, L., Bosch, J., Bass, L., ... & Rimba, P. (2017, April). A taxonomy of blockchain-based systems for architecture design. In Software Architecture (ICSA), 2017 IEEE International Conference on (pp. 243-252). IEEE.

17. Iansiti, M., & Lakhani, K. R. (2017). The truth about blockchain. Harvard Business Review, 95(1), 118-127.

18. Yasaweerasinghelage, R., Staples, M., & Weber, I. (2017, April). Predicting latency of blockchain-based systems using architectural

modelling and simulation. In Software Architecture (ICSA), 2017 IEEE International Conference on (pp. 253-256). IEEE.

19. Göbel, J., Keeler, H. P., Krzesinski, A. E., & Taylor, P. G. (2016). Bitcoin blockchain dynamics: The selfish-mine strategy in the

presence of propagation delay. Performance Evaluation, 104, 23-41. 20. Lee, V., & Wei, H. (2016, June). Exploratory simulation models for fraudulent detection in Bitcoin system. In Industrial Electronics and

Applications (ICIEA), 2016 IEEE 11th Conference on (pp. 1972-1977). IEEE.

21. Tosh, D. K., Shetty, S., Liang, X., Kamhoua, C. A., Kwiat, K. A., & Njilla, L. (2017, May). Security implications of blockchain cloud with analysis of block withholding attack. In Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid

Computing (pp. 458-467). IEEE Press.

22. Cachin, C., De Caro, A., Moreno-Sanchez, P., Tackmann, B., & Vukolic, M. (2017). The Transaction Graph for Modeling Blockchain Semantics. Cryptology ePrint Archive, Report 2017/1070.

23. Xiong, Z., Zhang, Y., Niyato, D., Wang, P., & Han, Z. (2017). When mobile blockchain meets edge computing: challenges and

applications. arXiv preprint arXiv:1711.05938.

86.

Authors: Aitbek Kakimov, Aleksandr Mayorov, Nadir Ibragimov, Gulmira Zhumadilova, Alibek Muratbayev,

Madina Jumazhanova, Zhunus Soltanbekov, Zhanibek Yessimbekov

Paper Title: Design of Equipment for Probiotics Encapsulation

Abstract: This paper describes the construction and operating principle of the probiotics encapsulation

equipment. The capsules were obtained by drop-by-drop method with different concentration of alginate (0.5, 1.0

and 1.5%) and gelatin. The viscosity of gelling liquids was measured at different temperatures. The most optimal

option is the composition of capsules containing 1% alginate and 1% gelatin, the solution should be used at a

temperature of 30-50 ° C. Capsules made from this composition have a rounded shape, equal size, soft texture,

stable for physical impact.

Keywords: encapsulation, probiotic, alginate, capsule, installation

References: 1. Bepeyeva, A., de Barros, J.M., Albadran, H., Kakimov, A.K., Kakimova, Z.K., Charalampopoulos, D, Khutoryanskiy, V.V., 2017.

Encapsulation of Lactobacillus casei into calcium pectinate‐chitosan beads for enteric delivery. Journal of food science, 82(12), pp. 2954-

2959.

2. Kakimov, A., Kakimova, Z., Mirasheva, G., Bepeyeva, A., Toleubekova, S., Jumazhanova, M., Zhumadilova, G., Yessimbekov, Z., 2017. Amino acid composition of sour-milk drink with encapsulated probiotics. Annual Research and Review in Biology, 18(1), ARRB-36079.

3. Kakimov, A.K., Mayorov, A.A., Ibragimov, N.K., Zhumadilova, G.A., 2017. Capsule forming by drop-by-drop method. Proceeding of international conference “Kazakhstan-Kholod 2017”, Almaty, Kazakhstan, pp. 107-109

4. Burgain, J., Gaiani, C., Linder, M., Scher, J., 2011. Encapsulation of probiotic living cells: From laboratory scale to industrial

applications. Journal of food engineering, 104(4), pp. 467-483. 5. Cook, M.T., Tzortzis, G., Charalampopoulos, D., Khutoryanskiy, V.V., 2012. Microencapsulation of probiotics for gastrointestinal

delivery. Journal of Controlled Release, 162(1), pp. 56-67.

6. Paques, J.P., van der Linden, E., van Rijn, C.J., Sagis, L.M., 2014. Preparation methods of alginate nanoparticles. Advances in colloid and interface science, 209; pp. 163-171.

7. Vivek, K., 2013. Use of encapsulated probiotics in dairy based foods. International Journal of Food, Agriculture and Veterinary Sciences,

3(1), pp. 188-199.

468-471

87.

Authors: K. Selvakumar , G. Pattabirani

Paper Title: A Clustered Fuzzy and Dynamically Well Organized Load Balancing Algorithm (CFDLB) for Network

Life Time Enhancement in Wireless Sensor Networks

Abstract: In recent past, wireless sensor networks have been exploited and tapped for their immense potential

as they are ideal choices for real time wireless communication applications. Nodes which form the back bone of

the wireless sensor networks (WSN) together with an efficient routing scheme define the overall efficiency of the

WSN. In recent times, research on load balancing algorithms have been investigated as the nature of incoming

traffic composed of packets of information is mostly stochastic and unpredictable in nature. Since the nodes are

limited by their power provision in the form of batteries which cannot be frequently replaced, are prone to over

utilization in transmitting all information through a single or selected nodes closest to the base station resulting in

quick drain of power supply. Hence an intelligent and efficient method of load balancing mechanism is necessary

to ensure that the work load is distributed in a more or less uniform manner resulting in ideal power saving. A

clustered fuzzy engine model is proposed in this research article which is capable of sensing the input traffic

conditions and consequently invokes the fuzzy engine to decide upon an optimal cluster head among the set of

available nodes to handle the incoming traffic. The proposed algorithm utilizes a rotational method of utilization of

cluster head (CH) to ensure that all member nodes are utilized in a uniform manner based on the incoming traffic.

The proposed algorithm has been implemented, experimented and compared in performance with LEACH, DLBA

and GLBA algorithms and the proposed hybrid approach outperforms the existing techniques in terms of average

energy consumption and load distribution.

Keywords: Wireless sensor networks, Load balancing algorithms, soft computing, fuzzy inference engine, cluster

head selection.

References:

1. Tang Yunjian, Shi Weiren, Yi Jun, Wang Yanxia (2011), “Dynamic Load-balancing Algorithm of WSN for Data Gathering

Application”, Computer Engineering and Applications, 47(6):122-126.

472-479

Page 62: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

2. Han Zhang, Liang Li, Xin-fang Yan and Xiang Li, "A Load-balancing Clustering Algorithm of WSN for Data Gathering," 2011 2nd

International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC), Dengleng, 2011, pp.

915-918. 3. Ozdemir S, “Secure load balancing via hierarchical data aggregation in heterogeneous sensor networks.” J. Inf. Sci. Eng., vol. 25, no. 6,

pp. 1691–1705, 2009.

4. Eghbali A N and M. Dehghan (2007), “Load-balancing using multi-path directed diffusion in wireless sensor networks,” Mobile Ad-Hoc

and Sensor Networks, 44–55.

5. Meenakshi Diwakar, Sushil Kumar (2012), “An energy efficient level based Clustering routing protocol for wireless Sensor networks”

International Journal Of Advanced Smart Sensor Network Systems, 2(2):55-65. 6. Low C P, C. Fang, J. M. Ng and Y. H. Ang, "Load-Balanced Clustering Algorithms for Wireless Sensor Networks," 2007 IEEE

International Conference on Communications, Glasgow, 2007, pp. 3485-3490.

7. Robin Gulerial and Ankit Kumar Jain (2013), “Geographic load balanced routing in wireless sensor network”, International journal of computer network and information security, 8:62 – 70.

8. Petrioli C, M. Nati, P. Casari, M. Zorzi and S. Basagni, "ALBA-R: Load-Balancing Geographic Routing Around Connectivity Holes in

Wireless Sensor Networks," in IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 3, pp. 529-539, March 2014. 9. Younis O and S. Fahmy (2004), “HEED: A Hybrid, Energy- Efficient, Distributed Clustering Approach for Ad-hoc Sensor Networks,”

IEEE Transactions on Mobile Computing, 3(4):366-379.

10. Sardor Q Hojiev and Dong Seong Kim (2015), “Dynamic load balancing algorithm based on users immigration in wireless LAN”, Journal of advances in computer networks, 114 – 118.

11. Bejerano Y, S.-J. Han, and L. Li, “Fairness and load balancing in wireless LANs using association control,” IEEE/ACM Transactions on

Networking, pp. 560–573, 2007. 12. YSu Y, S. Zheng, S. Gamage and K. Li, "A Dynamic Load Balancing Routing Algorithm for Distributed Wireless Sensor Networks,"

2007 International Conference on Wireless Communications, Networking and Mobile Computing, Shanghai, 2007, pp. 2625-2628.

13. Yan T., Bi Y., Sun L., Zhu H. (2005) Probability Based Dynamic Load-Balancing Tree Algorithm for Wireless Sensor Networks. In: Lu X., Zhao W. (eds) Networking and Mobile Computing. ICCNMC 2005. Lecture Notes in Computer Science, vol 3619. Springer, Berlin,

Heidelberg

14. Ali Ghaffari and Vida Aghakhanloye Takanloo (2011), “QoS based routing protocol with load balancing for wireless multimedia sensor networks using genetic algorithm”, World applied sciences journal, 15(12): 1659 – 1666.

15. Arash Rahbari, Arash Ghorbannia Delavar (2016), “BCWSN: A dynamic load balancing algorithm for decrease in congestion cost in

wireless sensor network”, Journal of mathematics and computer science, 16:18-25. 16. Ren Song Ku and Chia Yi (2015), “A load balancing routing algorithm for wireless sensor networks based on domain decomposition”,

Ad Hoc networks, 30: 63 – 83.

17. Eslami M, J. Vahidi, M. Askarzadeh, Designing and Implementing a Distributed Genetic Algorithm for Optimizing Work Modes in Wireless Sensor Network, J. math. comput. sci., 11 (2014), 291-299.

18. Raha, Arnab & Naskar, M & Paul, Avishek & Chakraborty, Arpita & Karmakar, Anupam (2013) “A Genetic Algorithm Inspired Load

Balancing Protocol for Congestion Control in Wireless Sensor Networks using Trust Based Routing Framework (GACCTR)”, International Journal of Computer Network and Information Security, 5: 9-20.

19. Castano F, A. Rossi, M. Sevaux, N. Velasco, On the use of multiple sinks to extend the lifetime in connected wireless sensor networks,

Electron. Notes Discrete Math., 41 (2013), 77-84. 20. Modupe I A, O. O. Olugbara, A. Modupe, Minimizing Energy Consumption in Wireless Ad hoc Networks with Meta heuristics,

Procedia Comput. Sci., 19 (2013), 106 - 115.

21. Mehmood A, Z. Lv, J. Lloret, and M. M. Umar, “ELDC: an artificial neural network based energy-efficient and robust routing scheme for pollution monitoring in WSNs,” IEEE Transactions on Emerging Topics in Computing, vol. 99, p. 1, 2017

22. Kacimi R, R. Dhaou, A. L. Beylot, Load balancing techniques for lifetime maximizing in wireless sensor networks, Ad Hoc Networks,

vol 11,no8 (2013), 2172 - 2186. 23. E.Vishnupriya, T. Jayasankar and P. Maheswara Venkatesh ,SDAOR: Secure Data Transmission of Optimum Routing Protocol in

Wireless Sensor Networks For Surveillance Applications, ARPN Journal of Engineering and Applied Sciences, 10- 16( 2015), 6917-

6931. 24. K.VinothKumar, T.Jayasankar, M.Prabhakaran and V. Srinivasan, Fuzzy Logic based Efficient Multipath Routing for Mobile Adhoc

Networks, Appl. Math. Inf. Sci. vol 11, no.2, (2017), 449–455.

88.

Authors: Mohammed I. Alwanain

Paper Title: Effects of User-Awareness on the Detection of Phishing Emails: A Case Study

Abstract: In recent years, most of our daily services have been increasingly linked to the Internet, such as

online banking and online shopping, thereby making our lives more comfortable and manageable, wherever we

may be and at any time of day. However, this ubiquity of service also carries a critical security threat, which can

cost Internet users dearly. Therefore, improving Internet users’ security awareness is a matter of high importance,

especially in light of the significant growth of online services. This paper investigates the effects of security

awareness and phishing knowledge on users’ ability to detect phishing emails and websites. In this approach, two

experiments were conducted to evaluate the effects of security awareness. The results of these experiments

revealed that phishing awareness has a significant positive effect on users’ ability to distinguish phishing emails

and websites, thereby avoiding attacks.

Keywords: Anti-phishing countermeasures, online fraud, E-commerce security, online banking security,

evaluation experiments

References: 1. B. B. Gupta, N. Arachchilage, and K. Psannis, “Defending against phishing attacks: taxonomy of methods, current issues and future

directions,” Telecommun. Syst., vol. 67, no. 2, pp. 247–267, 2018.

2. A. K. Jain and B. B. Gupta, “Phishing detection: analysis of visual similarity based approaches,” Secur. Commun. Networks, vol. 2017,

no. 5421046, 2017. 3. FBI, “Annual Internet Crime Report 2017,” 2017. [Online]. Available: https://www.fbi.gov/news/stories/2017-internet-crime-report-

released-050718.

4. S. Ragan, “Senior executives blamed for a majority of undisclosed security incidents,” 2013. [Online]. Available: http://www.networkworld.com/article/2171678/data-center/senior-executives-blamed-for-a-majority-ofundisclosed-%0Dsecurity-

incidents.html.

5. A. Alnajim, “A country based model towards phishing detection enhancement,” Int. J. Innov. Technol. Explor. Eng., vol. 5, no. 1, pp. 52–

57, 2015.

6. R. Dhamija, J. D. Tygar, and M. Hearst, “Why phishing works,” in the SIGCHI conference on Human Factors in computing systems,

2006, pp. 581–590.

480-484

Page 63: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

7. “Symantec, Mitigating Online Fraud: Customer Confidence, Brand Protection, and Loss Minimization.,” 2004. [Online]. Available:

http://www.antiphishing.org/sponsors_technical_papers/symantec_online_fraud.pdf.

8. IID, “eCrime Trends Report.” [Online]. Available: http://internetidentity.com/resources. 9. L. F. Cranor, S. Egelman, J. I. Hong, and Y. Zhang, “Phinding Phish: An Evaluation of Anti-Phishing Toolbars,” 2006.

10. A. Alnajim and M. Munro, “An evaluation of users’ tips effectiveness for Phishing websites detection,” in The third IEEE International

Conference on Digital Information Management ICDIM, 2008, pp. 63–68.

11. S. Sheng, B. Magnien, A. Kumaraguru, Ponnurangam Acquisti, L. F. Cranor, and E. Hong, Jason and Nunge, “Anti-phishing phil: the

design and evaluation of a game that teaches people not to fall for phish,” in The 3rd symposium on usable privacy and security SOUPS

’07, 2007, pp. 88 – 99. 12. P. Kumaraguru, Y. Rhee, A. Acquisti, L. F. Cranor, J. Hong, and E. Nunge, “Protecting people from phishing: the design and evaluation

of an embedded training email system,” in The SIGCHI conference on Human factors in computing systems, 2007, pp. 905 – 914.

13. A. Alnajim and M. Munro, “An anti-phishing approach that uses training intervention for phishing websites detection,” in the 6th IEEE International Conference on Information Technology - New Generations (ITNG), 2009, pp. 405–410.

14. J. S. Downs, M. Holbrook, and L. F. Cranor, “Behavioral response to phishing risk,” in the anti-phishing working groups 2nd annual

eCrime researchers summit, 2007, pp. 37 – 44. 15. T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer, “Social phishing,” Commun. ACM, vol. 50, no. 10, pp. 94–100, 2007.

89.

Authors: B.Murali Krishna, G.L.Madhumati, Habibulla Khan

Paper Title: FPGA based Pseudo Random Sequence Generator using XOR/XNOR for Communication

Cryptography and VLSI Testing Applications

Abstract: Random number generators are most prominently used in the area of communication to provide

security for information systems through pseudo random sequences. It also applicable for key generation in

cryptography applications and signature analyzer to generate test patterns for Built-In-Self Test. In conventional

method, random numbers are generated by a reference value i.e., seed value, using a XOR gate. The new proposed

methods present a linear feedback shift register (LFSR) which generates an arbitrary number based on XOR,

XNOR gates with and without seed value using multiplexer. Multiplexer is append to generate a random value at

user defined state in runtime. Hardware complexity and power consumption is reduced by replacing the

multiplexer with tristate buffers. Result analysis indicates that proposed LFSR with and without seed value gives a

better performance, low power consumption and improves more randomness in runtime with Partial

Reconfiguration (PR). Resource utilization for standard XOR based LFSR is compared with proposed LFSR using

XOR and XNOR logic. Proposed method is designed in Verilog HDL, simulated with ISE Simulator, synthesized

and implemented using Xilinx ISE, targeted for Spartan3E XC3S500E-FG320-4 and Virtex-5 XUPV5LX-110T

architecture.

Keywords: LFSR, XOR, XNOR, Multiplexer, Xilinx, PR, FPGA.

References: 1. S. Ergun and S. Ozoguz, Truly Random Number Generators Based on a Non-autonomous Chaotic Oscillator, AEU-International Journal

Electronics & Communications,Vol. 61, No. 4, 2007, pp. 235-242.

2. YilongLiao, XiangningFan Mathematical calculation of sequence length in LFSR- dithered MASH digital delta-sigma modulator with odd

initial condition, AEU - International Journal of Electronics and Communications Volume 82, December 2017, Pages 533-542. 3. MariosKalyvas, Kostas,Yiannopoulos, Thanassi,s Houbavlis, Hercules Avramopoulos Design Algorithm of All-Optical Linear Feedback

Shift Registers AEU - International Journal of Electronics and Communications Volume 57, Issue 5, 2003, Pages 328-332.

4. Efficient Parallel Architecture for Linear Feedback Shift Registers, J. Jung and H. Yoo and Y. Lee and I. C. Park, IEEE Transactions on Circuits and Systems II: Express Briefs, Nov 2015, volume 62, pp.1068-1072.

5. Test vector encoding using partial LFSR reseeding, C. V. Krishna and A. Jas and N. A. Touba, Proceedings International Test Conference,

2001, pp. 885-893. 6. The K-distribution of Generalized Feedback Shift Register Pseudorandom Numbers, Fushimi, M. and Tezuka, S.,Communications of the

ACM, July 1983, volume 26, pp. 516--523.

7. MC-DS-CDMA pseudo-noise acquisition algorithm research using computer model, A. D. Zolotuev and F. G. Khisamov and M. V. Milovanov and D. M. Sobachkin, 23rd Telecommunications Forum Telfor (TELFOR), Nov2015, pp.329-332.

8. Low Complexity Wiener Filtering in CDMA Systems Using a Class of Pseudo-Noise Spreading Codes, R. Carvajal and K. Mahata and J.

C. Aguero, IEEE Communications Letters, Nov 2012, volume 16, pp.1357-1360. 9. Design and analysis of linear feedback shift register(LFSR) using gate diffusion input(GDI), R. Sharma and B. Singh, 5th International

Conference on Wireless Networks and Embedded Systems (WECON), Oct 2016,pp.1-5.

10. Multiple test set generation method for LFSR-based BIST, Youhua Shi, Zhe Zhang, Proceedings of the 2003 Asia and South Pacific Design Automation Conference, Nov 2003, pp. 863-868.

11. Low-Power Programmable PRPG With Test Compression Capabilities,M. Filipek and G. Mrugalski and N. Mukherjee and B. Nadeau-

Dostie and J. Rajski and J. Solecki and J. Tyszer, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, June 2015, volume 23, pp.1063-1076.

12. An Improved DCM-Based Tunable True Random Number Generator for Xilinx FPGA A. P. Johnson, R. S. Chakraborty and D.

Mukhopadyay, in IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 64, no. 4, pp. 452-456, April 2017. 13. Cellular Automata-Based Parallel Random Number Generators Using FPGAs David H. K. Hoe, Jonathan M. Comer, Juan C. Cerda, Chris

D. Martinez, and Mukul V. ShirvaikarInternational Journal of Reconfigurable Computing Volume 2012, Article ID 219028, 13 pages

14. Design and Implementation of Multibit LFSR on FPGA to Generate Pseudorandom Sequence NumberDebarshi Datta, Bipa Datta, Himadri Sekhar Dutta2017 Devices for Integrated Circuit (DevIC), 23-24 March, 2017, Kalyani, India

15. Low Power Memory Built in Self Test Address Generator Using Clock Controlled Linear Feedback Shift Registers K. Murali Krishna, M.

Sailaja Journal of Electronic Testing Issue 1/2014

485-494

90.

Authors: D Ramamurthy, Mahesh P K

Paper Title: Brain Tumor Segmentation based on Rough Set Theory for MR Images with Cellular Automata

Approach

Abstract: Prediction of brain tumour and analysis is very critical in medical image processing since the treatment

is based on radio surgery. Classifying the enhanced and necrotic cells is very essential in clinical radio surgeries,

where in a radio oncology expert predicts the tumors manually for contrast enhanced T1-MR images. Prediction

best works with cellular automata (CA) iterative algorithm by deriving transition rules from the tumour properties

with adaptive method. Rough set theory with attribute reduction algorithm is used for classifying the enhanced and

necrotic cells. In this work a semi interactive prediction algorithm is used with CA and Rough set theory for

495-499

Page 64: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

incomplete data prediction in medical images. Semi interactive algorithms require less manual intervention with

high computation speed.

Keywords: Brain tumor prediction, Rough Set Algorithm, Cellular automata, magnetic resonance imaging

(MRI), radio surgery, enhanced cells, necrotic cells, reduct.

References: 1. Kailash Sinha, G.R.Sinha., “Efficient Segmentation Methods for Tumor Detection in MRI Images”, 2014 IEEE Student’s Conference on

Electrical, Electronics and Computer Science.

2. Riddhi.S.Kapse , Dr. S.S. Salankar , Madhuri.Babar “Literature Survey on Detection of Brain Tumor from MRI Images”, IOSR Journal of Electronics and Communication Engineering (IOSR-JECE), e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 1, Ver. II (Jan -

Feb. 2015), PP 80-86.

3. Cuttmann” Automated Segmentation of Cerebral Ventricular Compartments”, , C.R.G, ISMRM (2003). 4. M. Prastawa, E. Bullitt, N. Moon, K. Leemput, and G. Gerig, “Automatic brain tumor segmentation by subject specific modification of

atlas priors,” Acad. Radiol., vol. 10, pp. 1341–1348, 2003.

5. M. Prastawa, E. Bullitt, S. Ho, G. Gerig, A brain segmentation framework based on outliner detection, Medical Image Analysis, 8: 275-283, 2004.

6. Rajiv Kumar, Arthanariee A. M,” A Comparative Study of Image Segmentation Using Edge-Based Approach”, World Academy of

Science, Engineering and Technology International Journal of Mathematical and Computational Sciences Vol:7, No:3, 2013. 7. K. S. Angel Viji, Dr J. Jayakumari, “Modified Texture Based Region Growing Segmentation of MR Brain Images”, IEEE Conference on

Information and Communication Technologies (ICT 2013) pp:691-695.

8. K. Jumaat, R. Mahmud and S. S. Yasiran “Region and boundary segmentation of microcalcifications using seed-based region growing and mathematical morphology”, Intemational Conference on Mathematics Education Research, Vol. 8, pp.634—639, 2010.

9. Y. Boykov and M.-P. Jolly, “Interactive graph cuts for optimal boundary and region segmentation of objects in n-d images”, in Proc. ICCV, 2001, pp. 105–112

10. Priyansh Sharma and Jenkin Suji, “A Review on Image Segmentation with its Clustering Techniques”, International Journal of Signal

Processing, Image Processing and Pattern Recognition Vol.9, No.5 (2016), pp.209-218. 11. J.selvakumar, A.Lakshmi, T.Arivoli, “Brain Tumor Segmentation and Its Area Calculation in Brain MR Images using K-Mean Clustering

and Fuzzy C-Mean Algorithm”, IEEE-International Conference On Advances In Engineering, Science And Management

12. S. R. Kannan, ”Segmentation of MRI Using New Unsupervised Fuzzy C-Means Algorithm” ICGST-GVIP Journal, Vol. 5, Issue 2, Jan.2005.

13. Yailé Caballero, Rafael Bello, Delia Alvarez, Maria M. Garcia, “Two new feature selection algorithms with Rough Sets Theory”,IFIP

International Conference on Artificial Intelligence in Theory and Practice IFIP AI 2006: Artificial Intelligence in Theory and Practice pp 209-216.

14. Jianchao Han, Ricardo Sanchez, Xiaohua Hu, “Feature Selection Based on Relative Attribute Dependency: An Experimental Study ”,

International Workshop on Rough Sets, Fuzzy Sets, Data Mining, and Granular-Soft Computing RSFDGrC 2005: Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing pp 214-223.

15. Wu, Y., Phol, K. Warfield, S.K., Andac Hamamci*, Nadir Kucuk, Kutlay Karaman, Kayihan Engin, and Gozde Unal “Tumor-Cut:

Segmentation of Brain Tumors on Contrast Enhanced MR Images for Radiosurgery Applications”, IEEE Transactions On Medical Imaging, Vol. 31, No. 3, March 2012, pp:790-804.

16. Rachana Rana H.S, Bhdauria Annapuma Singh, “Brain Tumour Extraction from MRI Images Using Bounding-Box with Level Set

Method”, IEEE 2013,pp: 319-324.

91.

Authors: K. P. Prasad Rao, P. Srinivasa Varma, RBR Prakash

Paper Title: Five Phase DSTATCOM with Fuzzy Controller for Industrial and Domestic Applications

Abstract: To attain good products from the industry, industry required the quality of power and efficiency of the

systems like machines, lighting system and other equipments. This power quality problems are going to mitigate

by the FACTS devices or controllers. The problems like voltage sag (Power Quality) because of the load increases

suddenly, voltage swell because of load decreases suddenly may happened. In this paper, sag of voltage as a

quality problem in power system arises, since of sudden amplified the load and it is going to mitigate with Static

Synchronous Compensator (STATCOM).

Keywords: DSTATCOM, Ten Pulse VSC, Fuzzy Logic Controller.

References: 1. Atif Iqbal, Shaik Moinuddin, M.Rizwan Khan, Sk.Moin Ahmed, and Haithen Abu-Rub,A Novel Three-Phase to Five-

PhaseTransformation using a special transformer connection” IEEE Transactions on power delivering, vol. 25, no.3, JULY 2010, p. no:

1637 –1644. 2. G. K. Singh, “Self excited induction generator research – a servy,” Elect. Power syst. Res., vol. 69, pp. 107 – 114, 2004.

3. S.Singaravelu, S.Sasikumar, “A novel steady statemodeling andanalysis of six-phase self-excited induction generators forrenewable

energy generation,” International Journal of Emerging Electrical Power Systems, vol. 12 Issue 5, Article 7, 2011. 4. G.K.Singh, K.B. Yadav, R. P. Saini, “Analysis of a saturated multiphase (six-phase) self-excited induction generator,” International

Journal of Emerging Electric Power systems, vol. 7, Issue 2, Article 5, 2006.

5. Zakir Husain, B. Ravindra Kumar Singh & C. Shri NiwasTiwari, “Multi-phase(6-Phase & 12-Phase)Transmission Lines:Performance Characteristics,” International Journal of Mathematics and Computers in Simulation,Volume 1, Issue 2, 2007, pp.150 –159.

6. P.PAO LAOR, A.Isaramongkolark,T.Kulworawanichpang, “Electromagneticfield distribution of phase-sequence orientation of a

doublecircuit power transmission line based on finite element method,” WSEAS Transactions on power systems, vol. 3, Issue 10, October 2008, pp. 653-663.

7. G. K.Singh, V.PantyY.P.singh, “Voltagesourceinverter driven multiphas induction machine,” Computers andElectrical Engineering 29

(2003), pp.813-834. 8. K. N. Pavithran,R. Parimelalagan & M. R Krihnamurthy,“Studies on inverter -fed five -phase induction motor drive” IEEE

Transactionson Power Electronics, vol. 3, no. 2, April 1988, pp.224 –235.

9. FriedrichW.Fuchs, “Some diagnosismethods for voltagesource inverters in variable speed drives with induction machines a survey,” 2003 IEEE, pp. 1378 – 1385.

10. Paul C.Krause, and ThomasA. Lipo, “Analysisand simplified representations of arectifier – inverterinduction motor drive,” IEEE

Transactions on Power Apparatus and systems, vol. pas – 88, no. 5, may 1969, pp. 588 – 596.

11. Edward P.Cornell, andThomasA. Lipo, “Modeling andDesign of Controlled Current Induction Motor Drive Systems,” IEEE Transactions

on Industry Applications, vol. IA-13, NO. 4, JULY/AUGUST 1977, pp. 321 - 330.

12. K. N. Pavithran, R Parimelalagan, G.Sridhara Rao, J. Holtz,Drlng, “Optimum design of an induction motor for operation with current

500-504

Page 65: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

source inverters,” IEEE PROCEEDINGS, Vol. 134, Pt. B, No. 1, JANUARY 1987.

13. Emil Leni, MartinJones, Slobodan N. Vukosanic, and Hamid A. Toliyat, “A Novel concept of a multiphase, multimotor vector controlled

drive system supplied from a single voltagesource inverter,”IEEE Transaction on Power Electronics, vol.19, no.2, march 2004, pp. 320 - 335.

14. Dong Liu, Jia-Q Yang, Jin Huang *, Hai-bo Jiang, “Realization of a SPWM inverter for multi-phase induction motor drives,” pp. 1287 –

1290.

15. D.Casadei,M.Mengoni, G.Serra, A. Tani,L.Zarri, Bologna,Italy, “Comparisn of DifferentFault-Tolerant ControlStrategies for Seven-Phase

Induction Motor Drives”.

16. DrazenDujic,Martin Jones,and Emil Levi, “Analysis of Output Current-Ripple RMS in Multiphase Drives Using Polygon Approach,” IEEE Transactions on Power Electronics, vol. 25, no. 7, JULY 2010, pp. 1838-1849.

17. N. Arvindan and P. Pushpakarthick, “24 - Pulse Rectifier Realization by 3 Phase to Four 3-Phase Transformation using Conventional

Transformers,” NPEC-2010, pp. 1 – 8. 18. Vipin Garg, BhimSingh, G. Bhuvanewsari, “A tapped star connected autotransformer based 24-pulse AC-DC converter for power quality

improvement in induction motor drives,” International Journal of Emerging Electric Power Systems, vol. 7, Issue 4, Article 2, 2006.

19. Bhimsingh, VipinGarg, Gurumoorthy Bhuvaneshwari, “A24-pulse AC-DC converter employinga pulsedoubling technique for vector-controlled induction motor drives.”

20. Bhim Singh,Ganjay Gairole, “Anautotransformer – based 36 – pulse controlled AC-DC converter,” IETE Journal of research, vol.

54,Issue 4, July-August 2008, pp. 255-263. 21. Atif Iqbal, Shaik Moinuddin, M.Rizwan Khan, Sk.MoinAhmed, and Haithen Abu-Rub, “A NovelThree-Phase to Five-Phase

Transformation using a special transformer connection,” IEEE Transactions on power delivering, vol. 25, no. 3, JULY 2010, p. no: 1637 –

1644. 22. P.C.Krause, “Analysis of electric machinery,” Newyork: Mc. Graw Hill, 1986.

23. K.P.Prasad Rao,B. KrishnaVeni, D. RaviTeja, “Five LegInverter for Five Phase Supply,” International Journalof Engineering Trends and

Technology- Volume3Issue2- 2012, pp. 144 – 152. 24. DuroBasic, Jain Guo Zhu, Gerard Boardman, “Transient performance study of brushlessdoubly fed twin stator generator,”IEEE Trans.

Energy convers., vol. 8, no. 3, pp. 400-408, July 2003.

25. V.Krishna Kumar, V. Kamaraj, S. Jeevananthan, "Parrallel Fuzzy Logic ControllersforIndependentControl ofTwo PermanentMagnet Synchronous Motors fed by a Five Leg Inverter for Electric Vehicles", Journal of Electrical Engineering, Volume: 17/2017, Edition: 1.

26. K.P.Prasad Rao, P.Srinivasa Varma, "Five Phase DVR with Fuzzy Logic Controller," Journal of Advanced Research in Dynamical and

Control System, Vol. 9. Sp- 18/ 2017. 27. K.P.Prasad Rao, P.SrinivasaVarma, "A NovelFive PhaseDSATCOM for Industrial Loads," International Journal of Engineering

&Technology, 7 (1.8), 2018 56-61

92.

Authors: N.V. Sarathbabu Goriparti, Ch. S. N. Murthy, M. Aruna

Paper Title: Minimization of Specific Energy of a Belt Conveyor Drive System using Space Vector Modulated Direct

Torque Control

Abstract: The main aim of this paper is to model and minimize the specific energy of belt conveyor drive

system under different operating conditions such as different loading conditions, different conveyor inclinations,

different conveying lengths and lifts, and different capacities using a real time fabricated experimental setup.

Further, it demonstrates the advantages of using a variable speed drives (VSDs) for energy savings. Conveyors are

designed for transporting goods, ores, minerals, and other such products with maximum rated capacities for any

operating sections. But, they operate at a relatively much lower capacity. This is due to the supply and demand side

implications of the operating section, they will run at the same constant rated speed causing higher power losses.

This behavior will highly degrades the energy efficiency of conveyor. In the present study, an attempt is made to

improve the energy efficiency of the conveyor by minimizing the per unit energy consumption using the

methodology having combined advantages of energy efficiency modeling with less friction coefficient as per DIN

22101 and superior speed control technique for conveyor kind of high torque loads called space vector based direct

torque control. In this paper, specific energies are estimated for the same belt conveyor system, found that with the

use of VSDs, specific energies are reduced an amount 10-12% depending upon the capacities at which they have

run.

Keywords: Specific energy, Variable speed drives, Energy efficiency

References: 1. He, Y. Pang, and G. Lodewijks, “Green operations of belt conveyors by means of speed control," Applied Energy, vol. 188, pp. 330-341,

2017. 2. B. Lin, Y. Wu, and L. Zhang, “Estimates of the potential for energy conservation in the Chinese steel industry," Energy Policy, vol. 39,

pp. 3680-3689, 2011.

3. S. Zhang and X. Xia, “Modeling and energy efficiency optimization of belt conveyors," Applied Energy, vol. 88, no. 9, pp. 3061-3071, 2011.

4. S. Zhang and X. Xia, “Optimal control of operation efficiency of belt conveyor systems," Applied Energy, vol. 87, no. 6, pp. 1929-1937,

2010. 5. K. Bimal, Modern power electronics and AC drives. Prentice-Hall, 2001.

6. R. Krishnan, Electric motor drives: modeling, analysis, and control, vol. 626. Prentice Hall New Jersey, 2001.

7. P. Vas, Vector control of AC machines, vol. 22. Oxford University Press, USA, 1990. 8. Continuous conveyors – Belt conveyors for loose bulk materials-Basis for calculation and dimensioning, DIN 22101, 2002.

9. Handbook of conveyor & elevator belting, The Good year Tyre and rubber company, Akron, USA, 1975.

10. H.Lauhoff, “Belt conveyor technology, “Speed control of belt conveyors –does it really save energy?” Bulk solid handling, vol.25, pp368-377, 2005.

11. Pimkumwong, Narongrit, Amorn Onkrong, and Tirasak Sapaklom. "Modeling and simulation of direct torque control induction motor

drives via constant volt/hertz technique." Procedia Engineering pp.31, 1211-1216, 2011. I. Takahashi and T. Noguchi, “A new quick-response and high-efficiency control strategy of an induction motor," IEEE Transactions on

Industry applications, no. 5, pp. 820-827, 1986.

12. M. Depenbrock, “Direct self-control (dsc) of inverter-fed induction machine," IEEE transactions on Power Electronics, vol. 3, no. 4, pp. 420{429, 1988.

13. U. Baader, M. Depenbrock, and G. Gierse, “Direct self control (dsc) of inverter-fed induction machine: A basis for speed control without

speed measurement," IEEE transactions on industry applications, vol. 28, no. 3, pp. 581-588, 1992. 14. G. S. Buja and M. P. Kazmierkowski, “Direct torque control of pwm inverter-fed ac motors-a survey," IEEE Transactions on industrial

electronics, vol. 51, no. 4, pp. 744-757, 2004.

505-511

Page 66: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

15. C. Reza, M. D. Islam, and S. Mekhilef, “A review of reliable and energy efficient direct torque controlled induction motor drives,"

Renewable and Sustainable Energy Reviews, vol. 37, pp. 919-932, 2014.

16. C. Lascu, I. Boldea, and F. Blaabjerg, “A modified direct torque control for induction motor sensorless drive," IEEE Transactions on industry applications, vol. 36, no. 1, pp. 122-130, 2000.

17. P. Marino, M. D'incecco, and N. Visciano, “A comparison of direct torque control methodologies for induction motor," in Power Tech

Proceedings, 2001 IEEE Porto, vol. 2, pp. 6-pp, IEEE, 2001.

18. D. Casadei, G. Serra, and A. Tani, “The use of matrix converters in direct torque control of induction machines," IEEE transactions on

industrial electronics, vol. 48, no. 6, pp. 1057-1064, 2001.

19. F. Tazerart, Z. Mokrani, D. Rekioua, and T. Rekioua, “Direct torque control implementation with losses minimization of induction motor for electric vehicle applications with high operating life of the battery," International Journal of Hydrogen Energy, vol. 40, no. 39, pp.

13827-13838, 2015.

20. E. Ozkop and H. Okumus, “Direct torque control of induction motor using space vector modulation (SVM-DTC)," 2008 12th International Middle-East Power System Conference, pp. 368-372, 2008.

21. C. Lascu and A. M. Trzynadlowski, “Combining the principles of sliding mode, direct torque control, and space-vector modulation in a

high-performance sensorless ac drive," IEEE Transactions on industry applications, vol. 40, no. 1, pp. 170-177,2004.

93.

Authors: Gayathiri Kathiresan, Krishna Mohanta, Khanaa VelumailuAsari

Paper Title: COMPACT: Classifying Stream Data Optimally Using a Modified Pruning and Controlled Tie-

threshold

Abstract: Big data mining become important in extracting the potential information from the continuously

arriving stream data. By extracting knowledge, the data mining algorithms significantly compute feasible decisions

for various applications. The Very Fast Decision Tree (VFDT) classifier is a widely applied incremental decision

tree to make better decisions. The VFDT classifier processes the arrival of the new instances, without storing them

and updates the existing tree structure. Most of the conventional incremental decision tree based algorithms exploit

the hoeffding’s bound based on the user-defined tie-threshold to split the tree and to manage the tree growth. Even

though the size of the tree tremendously increases when handling the fluctuated and imbalanced stream data, it

suffers from the misclassification issue due to lack of capturing the optimal attributes over the incoming stream

data and declines the classification accuracy and performance. In order to resolve these issues, this paper extends

the VFDT, named as Classifying stream data optimally using a Modified Pruning technique And Controlled Tie-

threshold (COMPACT). The COMPACT method includes two components, such as enhanced information gain

measurement and tie-breaking threshold based pruning method. In order to improve the VFDT performance

without affecting the imbalanced data stream handling, the enhanced information gain measurement effectively

identifies an optimal number of attributes for a data stream. In order to avoid the information gain biasing, it

utilizes the advantages of enhanced splitting metric in attribute reduction. Instead of randomly selecting the

threshold, the tie-breaking threshold based pruning method determines the tie-breaking threshold using a number

of breaking points. The tie-breaking threshold based pruning method ensures the optimal tree structure while

handling the large-scale stream dataset. Finally, the COMPACT method is evaluated using the weather dataset to

demonstrate the efficiency. The proposed method significantly outperforms the existing DTFA approach in terms

of recall, Root Mean Square Error (RMSE) rate, and execution time.

Keywords: Big data, stream data, VFDT classifier, bias, information gain, threshold, pruning, imbalanced data,

optimal attributes, and decision making.

References: 1. Nasereddin, Hebah HO, “Stream Data Mining,” IJWA, Vol.3, No.2, pp.90-97, 2011. 2. Almalki, EbtesamHamed, and Manal Abdullah, “A survey on big data stream mining,” Journal of Fundamental and Applied

Sciences, Vol.10, No.4S, pp.278-284, 2018.

3. Aggarwal, Charu C, “A Survey of Stream Classification Algorithms,” In Data. Classification: Algorithms and Applications, pp.245-274, 2014.

4. Song, Yan-Yan, and L. U. Ying, “Decision tree methods: applications for classification and prediction,” Shanghaiarchives of

Psychiatry, Vol.27, No.2, pp.130, 2015. 5. Nguyen, Hai-Long, Yew-KwongWoon, and Wee-Keong Ng, “A survey on data stream clustering and classification,” Knowledge and

information systems, Vol.45, No.3, pp.535-569, 2015.

6. Subrahmanyam, M. V. V. S., and R. V. Venkateswara, “VFDT Algorithm for Decision Tree Generation,” International Journal for Development of Computer Science and Technology (IJDCST), Vol.1, No. 7, 2013.

7. Ramírez-Gallego, Sergio, BartoszKrawczyk, Salvador García, MichałWoźniak, and Francisco Herrera, “A survey on data preprocessing

for data stream mining: Current status and future directions,” Neurocomputing, Vol.239, pp.39-57, 2017. 8. Krempl, Georg, IndreŽliobaite, DariuszBrzeziński, EykeHüllermeier, Mark Last, Vincent Lemaire, TinoNoack, et al., “Open challenges

for data stream mining research,” ACM SIGKDD explorations newsletter, Vol.16, No.1, pp.1-10, 2014.

9. Jin, Ruoming, and GaganAgrawal, “Efficient decision tree construction on streaming data,” In Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, pp.571-576, 2003.

10. Rutkowski, Leszek, MaciejJaworski, Lena Pietruczuk, and PiotrDuda, “Decision trees for mining data streams based on the Gaussian

approximation,” IEEE Transactions on Knowledge and Data Engineering,Vol.26, No.1, pp. 108-119, 2014. 11. De Rosa, Rocco, and NicoloCesa-Bianchi, “Splitting with confidence in decision trees with application to stream mining,” In

Proceedings of the IEEE International Joint Conference on Neural Networks (IJCNN), pp.1-8, 2015.

12. Zhao, Minyue, and Xiang Li, “An application of spatial decision tree for classification of air pollution index,” In Proceedings of the 19th IEEE International Conference on Geoinformatics, pp.1-6, 2011.

13. Ben-Haim, Yael, and Elad Tom-Tov, “A streaming parallel decision tree algorithm,” Journal of Machine Learning Research,Vol.11,

pp.849-872, 2010. 14. Liang, Chunquan, Yang Zhang, Peng Shi, and Zhengguo Hu, “Learning accurate very fast decision trees from uncertain data streams,”

International Journal of Systems Science,Vol.46, No.16, pp.3032-3050, 2015.

15. Yang, Hang, and Simon Fong, “Optimized very fast decision tree with balanced classification accuracy and compact tree size,” In IEEE3rd International Conference on Data Mining and Intelligent Information Technology Applications (ICMiA),pp.57-64, 2011.

16. Naidu, Ch SKVR, and T. Y. Ramakrushna, “Augmentation of very fast decision tree algorithm aimed at data mining,” IJRCCT, Vol.4, No. 9, pp.684-690, 2015.

17. Dong, Z. J., S. M. Luo, Tao Wen, F. Y. Zhang, and L. J. Li, “Random forest-based very fast decision tree algorithm for data stream,”

Res. Paper,Vol.12, pp. 52-57, 2017. 18. Da Costa, Victor GuilhermeTurrisi, André Carlos Ponce de Leon Ferreira, and SylvioBarbon Junior, “Strict Very Fast Decision Tree: a

512-519

Page 67: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

memory conservative algorithm for data stream mining,” Pattern Recognition Letters, Vol.116, pp.22-28, 2018.

19. Minegishi, Tatsuya, Masayuki Ise, AyahikoNiimi, and Osamu Konishi, “Extension of Decision Tree Algorithm for Stream Data Mining

Using Real Data,”2009. 20. Yang, Hang, and Simon Fong, “Incremental optimization mechanism for constructing a decision tree in data stream

mining,” Mathematical Problems in Engineering, 2013.

21. Yang, Hang, and Simon Fong, “Moderated VFDT in-stream mining using adaptive tie threshold and incremental pruning,” In Springer International Conference on Data Warehousing and Knowledge Discovery, pp.471-483, 2011.

22. Xu, Wenhua, Zheng Qin, Hao Hu, and Nan Zhao, “Mining uncertain data streams using clustering feature decision trees,” In Springer

Int. Conf. on Advanced Data Mining and Applications, pp.195-208, 2011. 23. Duda, Piotr, MaciejJaworski, Lena Pietruczuk, and LeszekRutkowski, “A novel application of hoeffding's inequality to decision trees

construction for data streams,” In IEEE International Joint Conference on Neural Networks (IJCNN), pp.3324-3330, 2014.

24. Al-Kateb, Mohammed, and Byung Suk Lee, “Adaptive stratified reservoir sampling over heterogeneous data streams”, Information Systems, Vol.39, pp.199-216, 2014.

94.

Authors: B. Teertha Priyanka, K. Rekhamchala, CH. Jothi Naga Sindhura, P. Sai Amal Mohith, V. Saritha

Paper Title: Analysis and Design of Compact Triple Band Notched Circular Monopole Antenna Using Mushroom

EBG Structures and Compact Spiral Slotted EBG Structures

Abstract: This work presents analysis and design of a low profile multi band notched UWB circular

monopole antenna. Multi band rejection characteristics of the proposed antenna can be achieved by placing the

EBG structures in the proximity of the feed line. To avoid the interference with narrow bands with frequency

ranges from (3.2-4.0) GHz – WiMAX, (5.0-5.9) GHz – WLAN and (7.1-8.4) GHz – X-Band (both uplink and

downlink), it is essential for any antenna operating in UWB to have band rejection features. The proposed antenna

has the dimensions of 46x26x1.6 mm3. The simulation was carried out through HFSS.

Keywords: EBG structure, Multi Band-Notch, UWB antenna.

References: 1. NaveenJaglan, Binod K.Kanaujia, Samir D.Gupta, andShweta Srivastava “Triple Band NotchedUWB AntennaDesign Using

Electromagnetic Band GapStructures” Progress In Electromagnetics Research C, Vol. 66, 139–147, 2016. 2. Son rinh-Van, ChienDao-Ngoc SchoolofElectronicsand Telecommunications,Hanoi University of Science and Technology,

Hanoi,Vietnam “DualBand-Notched UWBAntenna based on ElectromagneticBand Gap Structures” REVJournal on Electronics and

Communications, Vol. 1, No. 2, April – June, 2011. 3. F.Alizadeh,J.Nourinia, Ch. Ghobadi,and B. Mohammadi “A Dual Band Rejection UWB AntennaUsing EBG” 2017 IEEE

4thInternational Conference n Knowledge-Based Engineering and Innovation (KBEI) December 22nd, 2017.

4. Dinesh Sethi,Ajay Yadav R. K. Khanna “Dual Notched Ultra Wideband Microstrip Antenna With CSRR Slot and EBG structure” International Journal of EngineeringResearch & Technology(IJERT) ISSN: 2278-0181 Vol.3 Issue 9, September, 2014.

5. Hao Liu andZiqiang Xu “Design of UWB MonopoleAntenna withDual NotchedBandsUsing OneModifiedElectromagnetic-Bandgap

Structure”Hindawi PublishingCorporation The ScientificWorld Journal Volume 2013, Article ID 917965, 9 pages. 6. F. Mouhouche,A. Azrar,M. Dehmas and K.Djafri “Compact Dual-Band Reject UWBMonopoleAntenna using EBGStructures” The 5th

InternationalConference onElectrical Engineering –Boumerdes (ICEE-B) October 29-31, 2017,Boumerdes,Algeria.

7. Abdel moumenKaabal, SaidaAhyoud andAdelAsselman “ANew Design of Star Antenna for Ultra Wide Band Applicationswith WLAN-Band-Notched Using EBG Structures” International Journal of Microwave and Optical Technology, vol.9, no.5, September 2014.

8. GauravK. Pandey, Hari S. Singh, Pradutt K. Bharti, and Manoj K. Meshram, “DESIGN OF WLAN BANDNOTCHED UWB

MONOPOLEANTENNA WITHSTEPPED GEOMETRYUSING MODIFIED EBG STRUCTURE”,ProgressInElectromagnetics Research B, Vol. 50, 201–217, 2013.

9. F.Yang and Y.Rahmat-Samii, “Electromagnetic BandGap Structures in Antenna Engineering”, 1st edition,Cambridge University

Press,2009. 10. AthiraKaladharan, RiaMaria George, “AWideband Bluetooth-UWB AntennawithTribandNotchedCharacteristics”,2016International

Conference on EmergingTechnological Trends (ICETT) ,Oct – 2016.

11. SayedArif Ali,DeepakJhanwar ,Dhirendra Mathur,“Design of a CompactTriple Band-Notch Flower-Shaped Hexagonal Microstrip Patch Antenna”,InternationalConference on Information Technology (InCITe) Oct – 2016.

12. Vaishali.S.Varpe, Dr.R.P.Labade, “ACompact PrintedWide-SlotUWB Antenna with Band-Notched Characteristics”, InternationalConference on ComputingCommunication Controlandautomation (ICCUBEA), August 2016.

13. M. A. Abdalla,A. Al-Mohamadi, A. Mostafa “Dual Notching of UWB Antenna Using Double InversedU-ShapeCompact EBG

Structure”, 10th InternationalCongress onAdvanced ElectromagneticMaterialsin Microwaves andOptics – Metamaterials, Greece,17-22 September 2016.

14. Zhang, S., & Pedersen,Gert Frølund. (2016). Mutual coupling reduction for UWBMIMO antennas witha widebandneutralization line

IEEE Antenna andWireless Propagation Letters, 15,166–169. 15. Wang,J.-H., Yin, Y.-Z., Liu X.-L., & Wang, T. (2013).Trapezoid UWB antenna withdual bandnotchedcharacteristics

forWiMAX/WLAN bands. Electronics Letters, 49(11), 685–686.

520-525

95.

Authors: S. M. K. CHAITANYA, P. RAJESH KUMAR

Paper Title: Classification of Kidney Images using Particle Swarm Optimization Algorithm and Artificial Neural

Networks

Abstract: Ultrasound (US) imaging is used to provide the structural abnormalities like stones, infections and

cysts for kidney diagnosis and also able to produce information about kidney functions. The main aim of this work

is classifying the kidney images by using US according to relevant features selection. In this work, images of

kidney are classified as abnormal images by pre-processing (i.e. grey-scale conversion), generate region-of-

interest, extracting the features as multi-scale wavelet-based Gabor method, Particle Swarm algorithm (PSO) for

optimization and Artificial Neural Networks (ANN). The PSO-ANN method is simulated on the platform of

MATLAB and these results are evaluated and contrasted. The results obtained through this method are better in

terms of accuracy, sensitivity and specificity.

Keywords: Artificial Neural Networks, Gabor feature extraction, Kidney diagnosis, Particle Swarm Optimization,

Ultrasound images.

References: 1. F. Kanavati, T. Tong, K. Misawa, M. Fujiwara, K. Mori, D. Rueckert, and B. Glocker, “Supervoxel classification forests for estimating

526-530

Page 68: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

pairwise image correspondences.,” Pattern Recognition, vol. 63, pp. 561-569, 2017.

2. Eklund, P. Dufort, D. Forsberg and S. M. La Conte, “Medical image processing on the GPU – past, present and future,” Med. Image

Anal., vol. 17, pp. 1073–1094, 2013. 3. O. Reiche, K. Häublein, M. Reichenbach, M. Schmid, F. Hannig, J. Teich and D. Fey, “Synthesis and optimization of image processing

accelerators using domain knowledge,” J. Syst. Architect., vol. 61, pp. 646–658, 2015.

4. K. Sharma, N. D. Toussaint, G. J. Elder, R. Masterson, S. G. Holt, P. L. Robertson, and C. S. Rajapakse, “Magnetic resonance imaging

based assessment of bone microstructure as a non-invasive alternative to histomorphometry in patients with chronic kidney

disease,” Bone, 2018.

5. Razik, C. J. Das, and S. Sharma, "Angiomyolipoma of the Kidneys: Current Perspectives and Challenges in Diagnostic Imaging and Image-Guided Therapy," Current problems in diagnostic radiology 2018.

6. Świetlicka, “Trained stochastic model of biological neural network used in image processing task,” Appl. Math. Comput, vol. 267, pp.

716–726, 2015. 7. J. Tian, J. Xue, Y. Dai, J. Chen and J. Zheng, “A novel software platform for medical image processing and analyzing,” IEEE Trans. Inf.

Technol. Biomed, vol. 12, pp. 800–812, 2008.

8. S. Gur and M. Top, “Regional clustering of medical imaging technologies,” Comput. Hum. Behav., vol. 61, pp. 333–343, 2016. 9. F. Rengier, M. F. Häfnerb, R. Unterhinninghofenc, R. Nawrotzkid, J. Kirsch, H.-U. Kauczor and F. L. Giesel, “Integration of interactive

three-dimensional image post-processing software into undergraduate radiology education effectively improves diagnostic skills and

visual-spatial ability,” Eur. J. Radiol, vol. 82, pp. 1366–1371, 2013. 10. L. Sajn and M. Kukar, “Image processing and machine learning for fully automated probabilistic evaluation of medical images,” Comput.

Methods Prog. Biomed, vol. 104, pp. e75–e86, 2011.

11. F. Zhao, J. Zhao, W. Zhao, F. Qu and L. Sui, “Local region statistics combining multi-parameter intensity fitting module for medical image segmentation with intensity in homogeneity and complex composition,” Optics Laser Technol, vol. 82, pp. 17–27, 2016.

12. J. Serrat, F. Lumbreras, F. Blanco, M. Valiente, and M. López-Mesas, “myStone: A system for automatic kidney stone

classification,” Expert Systems with Applications, vol. 89, pp. 41-51, 2017. 13. J. Verma, M. Nath, P. Tripathi, and K. K. Saini, “Analysis and identification of kidney stone using Kth nearest neighbour (KNN) and

support vector machine (SVM) classification techniques,” Pattern Recognition and Image Analysis, vol. 27, no. 3, pp. 574-580, 2017.

14. M. B. Subramanya, V. Kumar, S. Mukherjee, and M. Saini, “SVM-based CAC system for B-mode kidney ultrasound images,” Journal of digital imaging, vol. 28, no. 4, pp. 448-458, 2015.

15. S. A. Tuncer, and A. Alkan, "A decision support system for detection of the renal cell cancer in the kidney." Measurement vol. 123, pp.

298-303, 2018. 16. K. D. Krishna, V. Akkala, R. Bharath, P. Rajalakshmi, A. M. Mohammed, S. N. Merchant, and U. B. Desai, “Computer aided abnormality

detection for kidney on FPGA based IoT enabled portable ultrasound imaging system,” Irbm, vol. 37, no. 4, pp. 189-197, 2016.

96.

Authors: Dhana Lakshmi Potteti, Venkateswara Rao N

Paper Title: Spectrum Sensing using Single Ring Law

Abstract: The concept of cognitive radio is becoming increasing popular as it is a prominent solution for

spectrum scarcity problem. A smart and wise usage of available spectral resources is an interesting feature of

cognitive radio. In the terminology of cognitive radio, a primary (licensed) user and a secondary (unlicensed) user

are usually heard. A secondary user transmits data only if the primary user does not use the alloted spectral

resources. For sensing the presence or absence of the primary user, spectrum sensing is necessary. Conventionally

many techniques such as energy detection (ED), eigenvalue based approaches have been designed for spectrum

sensing. Recently large random matrix theory based analytics has shown that Single Ring Law (SRL) can be an

effective solution for binary hypothesis testing problems. Hence, in this paper spectrum sensing for multiple

antenna system is investigated using SRL based parameters. In Rayleigh and Nakagami fading channels, the SRL

based detection is employed and has been found to be a consistent tool for spectrum sensing.

Keywords: spectrum sensing, single ring law, detection probability, opportunistic spectrum access, secondary

user, energy detection

References: 1. Ngo,Hien Quoc, Erik G. Larsson, and Thomas L. Marzetta. Energy and spectral efficiency of very large multiuser MIMO

systems." IEEE Transactions on Communications 61 (4) (2013) 1436-1449.

2. Malik, Shahzad A.,Shah, M. A.,Dar,A. H., Haq, A., Khan, A. U., Javed, T., & Khan, S. A. "Comparative analysis of primary

transmitter detection based spectrumsensing techniques in cognitive radio systems."Australianjournalofbasicandapplied sciences 4 (9) (2010) 4522-4531.

3. Urkowitz,Harry."Energydetectionofunknowndeterministic signals." Proceedingsof the IEEE 55.4 (1967) 523-531.

4. Zeng, Yonghong, andYing-Chang Liang."Spectrum-sensing algorithms for cognitive radio based on statistical covariances." IEEE transactions on Vehicular Techlogy 58 (4) (2009) 1804-1815.

5. Wang, Rui, and Meixia Tao. "Blindspectrumsensing byinformation theoreticcriteria." GlobalTelecommunicationsConference

(GLOBECOM 2010), IEEE (2010) 1-5. 6. Ciuonzo, Domenico, Pierluigi Salvo Rossi,andSubhrakantiDey. "Massive MIMO channel-aware decision fusion." IEEE Transactions

on Signal Processing 63 (3) (2015): 604-619.

7. Ding, Guoru, Xiqi Gao, Zhen Xue, Yongpeng Wu,andQingjiang Shi. "Massive MIMO for Distributed Detection with Transceiver Impairments." IEEE Transactions onVehicular Technology (2017).

8. Guionnet, Alice, Manjunath Krishnapur, and Ofer Zeitouni. "The single ring theorem." Annals of mathematics (2011): 1189-1217.

9. Pallaviram Sure,NarendraBabuC andChandraMohanBhuma, “Applicability of big data analytics to massive MIMO systems,” IEEE Annual India Conference (INDICON), IEEE (2016) 1-5.

10. Zhang, Changchun, and RobertC. Qiu. "Massive MIMOas abig data system: Random matrix models and testbed." IEEE Access 3

(2015) 837-851.

531-534

97.

Authors: Pravallika Injarapu, Harsha Sanka, Naga Sai Manasa, Vineeth Chowdary, Saritha Vanka

Paper Title: Analysis and Design of a Low Profile Multiband Antenna for IOT Applications

Abstract: Increased intervention of IOT in everyday applications created an open challenge to the researchers

regarding the usage of RFID technique. This requires the process of integrating IOT to various wireless standards.

This work proposes, a very low profile planar circular patch united with Koch fractals and rectangles alternatively

on its circumference fed by a microstrip line and two more Koch fractals on either side of the circular patch which

operates over the bands of 1.5GHz-1.65GHz, 1.92GHz-2.17GH, 2.56GHz-2.85GHz, 3.68GHz-4.0GHz, 4.73GHz-

535-539

Page 69: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

4.94GHz, 5.36GHz-5.57GHz at SHF, UHF and Microwave frequency bands ,GSM 850 MHz, GSM 900 MHz,

LTE-700 MHz, LTE-800MHz, TV broadcasting.

Keywords: GSM, Internet of Things (IOT), Long Term Evolution, RFID.

References: 1. VyshnaviDas S K, Dr. T.Shanmuganantha “DesignofMultiband Microstrip PatchAntenna forIOT Applications”, Proceedings of2017

IEEE InternationalConference onCircuits and

2. Kumud RanjanJha, GhanshyamMishra and Satish K.Sharma “An Systems (ICCS 2017).Octahedron ShapedPlanarAntenna for IOT Applications”, 2017 IEEE.

3. Vyshnavi Das S K,T Shanuganatham “Design of Triple StarfishShaped Microstrip PatchAntenna for IOT Applications”,Proceedingsof

2017 IEEE Internationa Conference onCircuits andSystems (ICCS 2017). 4. Duong Thi Thanh Tu,Nguyen TuanNgoc, ForestZhu, Diep N. Nguyen, ErykDutkiewicz “Quad-Band Antennafor GSM/WSN/WLAN

/LTE -A Applicationin IOTDevices” , 201717th International Symposium on Communications and Information Technologies (ISCIT).

5. VikramN, KashwanK. R“Designof ISMBand RFID Reader Antenna for IOT Applications”, IEEE WiSPNET 2016conference. 6. Mehr-e-Munir “E-ShapePatchAntenna for4G, LTEand S-BandApplications”, proceedingsof 2018, 15thInternationalBhurban

Conferenceon Applied Sciences andTechnology (IBCAST).

7. Praveen V. Naidu,Arvind Kumar, andVinay Kumar “AMiniaturized Triple Band ACS-fedMonopolePrinted AntennawithMeandered and Circular RingShapeResonatorsforWLAN/WiMAX Applications”, 2017 Progress in Electromagnetics Research Symposium Fall (PIERS

— FALL), Singapore, 19–22 November.

8. MuhammadSajid Iqbal,Syed Awais Wahab Shah “Design of aCompact UWB Patch Antenna havingRectangular ParasiticElementsfor UWB andBluetooth Applications”, 2017IEEE.

9. D. Paret, “RFID at ultra andsuper high frequenciestheory and application,” Hoboken, NJ, USA, Wiley, 2009.

10. Daniel Zucchetto,Andrea Zanella, “Uncoordinated accessschemes for the IOT:approaches, regulations, and performance”,IEEE Communication Magazine, 2017. (In Press)

11. Ala Al-Fuqaha, Mohsen Guizani,MehdiMohammadiMohammed Aledhari and Moussa Ayyash, “Internet of Things: A Survey on

EnablingTechnologies,Protocols, andApplications,” IEEE Communications Surveys &Tutorials, vol. 17,Issue. 4, fourth quarter 2015, pp. 2347-2376, June 2015.

12. S. Purushothaman, S. Ragahavan and SenthilKumar, “A design of compact metamaterial encumberedmonopoleantenna with defected

groundstructurefornavigation (L/S-band) applications”,India Conference (INDICON), IEEE Annual, 2016. 13. C Elavarasi andT Shanmuganantham, “SRR loaded periwinkleflower shapedfractalantenna formultiband applications”,Microwave and

Optical Technology Letters 59 (10), 2518-2525, 2017.

14. ChowYenDesmond Sim, Yuan KaiShih, and Ming Hsuan Chang, “Compact slot antenna for wirelesslocal network2.4/5.2/5.8GHz applications,” IETMicrowave,Antenna and Propagation, vol.9, issue.6, pp. 495-501, April 2015.

98.

Authors: G Aloy Anuja Mary, Sheeba Santosh

Paper Title: Impact of Secondary user Density on Cognitive Radio Networks

Abstract: Reasonableness plays a central movement for each structure blends intellectual radio systems

(CRNs). Point of fact, CRNs gives a fit, free and dynamic specific condition performing specific activities, through

which unlicensed clients get the favored viewpoint to utilize, understood run. This paper tends to the joint issues in

CRNs, for example, helpful hand-off determination, range partaking in asset portion. In this paper, we propose a

half and half enhancement method for effective asset designation (HOERA) in CRNs. The basic target is to open

up execution of system as for the general structure compel by playing out a joint hand-off choice and asset portion

among different transfers. In the first place, bunching is performed by an enhanced swarm streamlining (ISO)

calculation that understands the challenges in extensive scale advancement issue specifically to partition arrange

into gatherings. At that point, Stephanie-Mathisen basic leadership show used to figure the transfer hubs to

apportioning the activity levels in the system. In addition, the asset designation is performed to accomplish most

extreme utility expecting parallel power allotment. The outcomes demonstrates that the viability of proposed

HOERA plot which enhances framework execution and less computational unpredictability for bigger systems.

Keywords: optimal resource allocation, clustering, relay selection, hybrid optimization technique

References: 1. H. Zhang, C. Jiang, N. Beaulieu, X. Chu, X. Wen and M. Tao, "Asset Allocation in Spectrum-Sharing OFDMA Femtocells With

Heterogeneous Services", IEEE Transactions on Communications, vol. 62, no. 7, pp. 2366-2377, 2014. 2. H. Zhang, C. Jiang, R. Hu and Y. Qian, "Self-association in catastrophe versatile heterogeneous little cell systems", IEEE Network, vol.

30, no. 2, pp. 116-121, 2016.

3. H. Zhang, X. Chu, W. Guo and S. Wang, "Conjunction of Wi-Fi and heterogeneous little cell systems sharing unlicensed range", IEEE Commun. Mag., vol. 53, no. 3, pp. 158-164, 2015.

4. S. Dastangoo, C. Fossa, Y. Gwon and H. Kung, "Contending Cognitive Resilient Networks", IEEE Trans. Cogn. Commun. Netw., vol. 2,

no. 1, pp. 95-109, 2016. 5. "1000x: More Spectrum-Especially for Small Cells," in Presentation by QUALCOMM Inc., 2013. [Online]. Accessible:

www.qualcomm.com/1000x 6. "Empowering Spectrum Sharing and Small Cell Wireless Broadband Services in the 3.5 GHz Band," 2013. [Online]. Accessible:

www.fcc.gov

7. V. Chandrasekhar, J. Andrews, T. Muharemovic, Zukang Shen and A. Gatherer, "Power control in two-level femtocell systems", IEEE Transactions on Wireless Communications, vol. 8, no. 8, pp. 4316-4328, 2009.

8. X. Kang, R. Zhang and M. Motani, "Cost Based Resource Allocation for Spectrum-Sharing Femtocell Networks: A Stackelberg Game

Approach", IEEE J. Select. Zones Commun., vol. 30, no. 3, pp. 538-549, 2012. 9. J. Yun and K. Shin, "Versatile Interference Management of OFDMA Femtocells for Co-Channel Deployment", IEEE J. Select.

Territories Commun., vol. 29, no. 6, pp. 1225-1241, 2011.

10. S. Guruacharya, D. Niyato, D. Kim and E. Hossain, "Progressive Competition for Downlink Power Allocation in OFDMA Femtocell Networks", IEEE Transactions on Wireless Communications, vol. 12, no. 4, pp. 1543-1553, 2013.

11. J. Huang and V. Krishnamurthy, "Subjective Base Stations in LTE/3GPP Femtocells: A Correlated Equilibrium Game-Theoretic

Approach", IEEE Transactions on Communications, vol. 59, no. 12, pp. 3485-3493, 2011.

12. Y. Chen, J. Zhang and Q. Zhang, "Utility-Aware Refunding Framework for Hybrid Access Femtocell Network", IEEE Transactions on

Wireless Communications, vol. 11, no. 5, pp. 1688-1697, 2012.

13. V. Ha and L. Le, "Disseminated Base Station Association and Power Control for Heterogeneous Cellular Networks", IEEE Trans. Veh.

540-545

Page 70: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

Technol., vol. 63, no. 1, pp. 282-296, 2014.

14. Yanqing Liu and Liang Dong, "Range Sharing in MIMO Cognitive Radio Networks Based on Cooperative Game Theory", IEEE

Transactions on Wireless Communications, vol. 13, no. 9, pp. 4807-4820, 2014. 15. J. Chen and A. Swindlehurst, "Applying Bargaining Solutions to Resource Allocation in Multiuser MIMO-OFDMA Broadcast Systems",

IEEE J. Sel. Top. Flag Process., vol. 6, no. 2, pp. 127-139, 2012.

16. Q. Ni and C. Zarakovitis, "Nash Bargaining Game Theoretic Scheduling for Joint Channel and Power Allocation in Cognitive Radio

Systems", IEEE J. Select. Territories Commun., vol. 30, no. 1, pp. 70-81, 2012.

17. N. Prasad, Kai Li and Xiaodong Wang, "Reasonable Rate Allocation in Multiuser OFDM-SDMA Networks", IEEE Transactions on

Signal Processing, vol. 57, no. 7, pp. 2797-2808, 2009. 18. G. Kramer, I. Marić and R. Yates, "Helpful Communications", FNT in Networking, vol. 1, no. 3-4, pp. 271-425, 2006.

19. L. Ding, T. Melodia, S. Batalama and J. Matyjas, "Appropriated asset assignment in subjective and helpful impromptu systems through

joint steering, transfer choice and range distribution", Computer Networks, vol. 83, pp. 315-331, 2015. 20. S. ZHANG, W. XU, S. LI and J. LIN, "Asset assignment for the group based agreeable multicast in OFDM-based intellectual radio

frameworks", The Journal of China Universities of Posts and Telecommunications, vol. 20, no. 4, pp. 1-7, 2013.

21. Tajer, N. Prasad and X. Wang, "Beamforming and Rate Allocation in MISO Cognitive Radio Networks", IEEE Transactions on Signal Processing, vol. 58, no. 1, pp. 362-377, 2010.

22. F. Khan, C. Masouros and T. Ratnarajah, "Impedance Driven Linear Precoding in Multiuser MISO Downlink Cognitive Radio

Network", IEEE Transactions on Vehicular Technology, vol. 61, no. 6, pp. 2531-2543, 2012. 23. Z. Fei, J. Ni, D. Zhao, C. Xing, N. Wang and J. Kuang, "Ergodic mystery rate of two-client MISO impedance stations with measurable

CSI", Science China Information Sciences, vol. 57, no. 10, pp. 1-14, 2014.

24. Wang and H. Wang, "On the Secrecy Throughput Maximization for MISO Cognitive Radio Network in Slow Fading Channels", IEEE Transactions on Information Forensics and Security, vol. 9, no. 11, pp. 1814-1827, 2014.

25. Xiaoming Chen, Zhaoyang Zhang and Chau Yuen, "Versatile Mode Selection in Multiuser MISO Cognitive Networks With Limited

Cooperation and Feedback", IEEE Transactions on Vehicular Technology, vol. 63, no. 4, pp. 1622-1632, 2014. 26. Ng, M. Shaqfeh, R. Schober and H. Alnuweiri, "Strong Layered Transmission in Secure MISO Multiuser Unicast Cognitive Radio

Systems", IEEE Transactions on Vehicular Technology, vol. 65, no. 10, pp. 8267-8282, 2016.

27. "Sum Rate Maximization for Cognitive MISO Broadcast Channels: Beamforming Design and Large Systems Analysis", IEEE Transactions on Wireless Communications, vol. 13, no. 5, pp. 2383-2401, 2014.

28. J. Xiong, D. Mama, K. Wong and J. Wei, "Strong Masked Beamforming for MISO Cognitive Radio Networks With Unknown

Eavesdroppers", IEEE Transactions on Vehicular Technology, vol. 65, no. 2, pp. 744-755, 2016. 29. X. Zhou, F. Liu, Y. Yin, Q. Li and J. Qin, "Strong Beamforming for Simultaneous Wireless Information and Power Transfer in MISO

Interference Channels", Wireless Personal Communications, 2016.

30. L. Zhang, L. Jin, W. Luo, C. Wang and Y. Tang, "Strong secure transmission for multiuser MISO frameworks with probabilistic QoS requirements", Science China Information Sciences, vol. 59, no. 2, pp. 1-13, 2016.

31. K.Murali,P.Dhana Lakshmi “Spectrum sensing based on forward active channel allocation in wireless 5G communications ” published

in IJMTST Volume 2 | Issue 2 | February 2016 | ISSN 2455-3778 32. B. Awoyemi, B. Maharaj and A. Alfa, "Ideal asset portion answers for heterogeneous psychological radio systems", Digital

Communications and Networks, vol. 3, no. 2, pp. 129-139, 2017.

99.

Authors: Vani G, Bharathi Malakreddy A

Paper Title: A Review on Identification & Analysis of Security Issues and Challenges of IoT based Healthcare

Abstract: Healthcare applications are one of the major fields from the business user’s perspective and an

important domain. Healthcare applications require a degree of authentication & authorization. An Authentication is

a mechanism of authorizing a particular integrity in a communication system which assures the authenticity of the

element in intercommunication. It is one of the fundamental objectives of the security. In this paper, we are

focusing on a multi-factor authentication method for the IoT based healthcare systems. The survey will find the

multi-factor authentication related work, different types of security attacks, risk, security gaps in healthcare

systems. As a result, there will be a gap that could be further investigated so that more types of authentications are

feasible. The conclusion of this paper is that by using a multi-factor authentication method, there are possibilities

for proposing a secured authentication and authorized algorithm for IoT based healthcare system and overviewing

of sensor destruction and different types of potential attacks on IoT devices based on IoT healthcare system

Keywords: Authentication, Authorization, Multi-factor, Role-Based Access Control, data confidentiality,

confidentiality, sensitivity, security attack

References: 1. Alok Kulkar et al, 'Healthcare applications of the internet of things– A Review', Vol.5, 2014, pp 6229-6232. 2. Dylan Sey et al, ‘A survey on authentication methods for the IoT’, Vol.2, 2018, pp 537-567.

3. Hafizah Che Hasan et.al, ‘Comparasion of authentication methods in IoT technology’, Vol. 12, No: 3, 2018

4. Lee T, “Verifier Based three party authentication schemes”, Volume. 38, Number 5, in 2014, pp 464 - 472. 5. K Chen , Y Chang et.al, “Aspect oriented design and implementation of adaptable access control for Electronic Medical Record”, in 2010,

pp181- 203.

6. L Guo, C Zhang et.al, “A Privacy preserving attribute based authentication system for Mobile Health Networks”, in 2014, pp 927 – 1941. 7. Jin .J, Ahn .G, Covington M et.al, “Access Control Model for Sharing Composite Electronic Health Records”, in 2009, pp 340 - 354.

8. Burnap .P, Spasic .I , Gray .W, Hilton .J, Rana .O, and Elwyn .G, “Protecting Patient Privacy in Distributed Collaborative Healthcare

Environments by Retaining Access Control of Shared Information”, in 2012, pp 490-497. 9. H. Zhou, X Lin, Dong X et.al, “Patient Self controllable and Multi level Privacy preserving cooperative authentication in Distributed

MHealthcare Cloud CS', in 2014, pp.1693-1703.

10. Rafidha Rehiman K Aet.al, “A Secure Authentication Infrastructure for IoT Enabled Smart Mobile Devices”, in 2016, in Volumel 9, DOI: '10.17485/ijst/2016/v9i9/86791'.

11. Lella . A; Martin B et al, “The Mobile App Report. available at – www.comscore.com/Insights/Presentationsand-Whitepapers”, in 2015.

12. Anurag Shukla, “A Survey on Next generation Computing IoT Issues & Challenges”, in ‘International Journal of Pure and Applied Mathematics’', Vol.118, No.9 2018, pp 45-64.

13. Hafizah Che Hasan et al, “Comparison pf authentication methods in IoT technology”, Vol.12, pp 3, 2018.

14. Shantha Mary, Joshitta R and Arockiam, 'Authentication in Internet Of Things Environment: A Survey', Vol 6, Issue 10, Cotober 2016, ISSN:2277 128X.

15. Isra Ahmed Zriqat, 'Security and Privacy Issues in Ehealthcare systems - Towards trused services', Vol. 7, pp 9, 2016.

16. Afaa Jabenur, Nabil Sahli et.al , “Survey on Sensor holes: Acause effect solutions perspective”, in procedia CS, Doi10.1016/J.Proces.2013.06.151

17. Somasundaram Ragupathy and Mythili Thirugananam, “IoT in Healthcare: Breaching security issues”.

546-549

Page 71: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

18. Anjali Yeole, Sadaf Ahmedi et.al, “A Robust Scheme for Secure communication in IoT”, in International Research', Volume 3, no.11,

2015, pp 10401- 10406.

19. Barna M , “Ciphertext policy attribute based encryption', pp 497-628. doi: 10.1038/nature12157, Epub 2013 April 28. 20. Gajanayake R, Sharma et.al, “Privacy oriented access control for Health records”, in 'Electronic health information journal', 2014, pp 5.

21. W. Liu et , “Cryptography”, in third IEEE International Conference, Pune, India August 2017, IEEE. Available online at

'ieeexplore.ieee.org/Xplore/home.jsp'.

22. Ometov, Aleksandr et al, “Multi-Factor Authentication - A Survey Cryptography”, vol. 2.

23. Jose Costa, “A Two Factor Authentication scheme”, DOI: 10.13140/RG.2.2.16228.99207, Jun 14, 2017

24. Kennedy. Eand Millard .C, “Data security & Multifactor authentication ' in “Computer Law & Security Review”, Volume: 32, Number 1, 2016, pp 91 - 110.

25. Camenisch J, Fischer S et.al, 'Privacy andidentity management for life', in 'Springer Science & Business Media', 2011.

26. Eldefrawy M.H; Alghathbar K et.al 'OTP based two factor authentication using mobile phones', in 8 International Conference on IT, April 2011, pp 327 - 331.

27. Bruce Ndibanje; Hoon-Jae Lee et.al “Security Analysis and Improvements of Authentication and Access Control in the IoT', in Volume

14, 2014, pp 14786 -14805. 28. Jose L; Hernández Ramos; Antonio J; Skarmeta et al, “Distributed Capability-Based Access Control for the IoT”, in Vol: 3, Number 3/4,

2013, pp.1-16.

29. Bruce Ndibanje , Hoon-Jae Lee, and Sang-Gon Lee, ‘Security Analysis and Improvements of Authentication and Access Control in the Internet of Things’, Sensors, Vol. 14, 2014, pp 14786-14805.

30. Muhammad, K.R.R.S.; Lee S: Lee Y.K. 'Biometric Based Distributed Key Management Approach for Wireless Body Area Network.

Sensors”', in 2010, Vol: 10, pp. 3911-3933. 31. Sanaz Rahimi Moosavi et.al “SEA – A Secure & Efficient authentication and authorization architecture for IoT based Healthcare using

Smart gateways”, in Procedia CS Journal, published in Elsevier in 2015, Vol.52, pp. 452-459

32. Vani.G, Bharathi Malakreddy.A, “Security challenges in Internet of Things in Healthcare Domain”, in September 2016 ,DOI No. IAECS IRAJ DOI 5592,pp.141-144.

33. Vani.G, Bharathi Malakreddy.A, “ Survey on Security challenges in IoT in Healthcare domain”, in ICNTET, 2018,ISBN- CFP18P34-

PRT/978-1-5386-5629-7.

100.

Authors: Sk. Sadiya Shireen, B. Murali Krishna, K. Naga Lakshmi Prasanna, A. Poorna Chander Reddy

Paper Title: FPGA Based RSA Authenticated Data Hiding in Image through Steganography

Abstract: Now-a-days, information security has a vital role in different applications of digital communications

like medical, military, commerce etc., to conceal the secret data from unauthorized access. Steganography is the

most eminent technique for providing information security with the help of a carrier file. The communication

carrier can be of various formats like text, image, video etc. Among all these, digital images are the most common

format due to high capacity and frequency of availability. In image steganography, the secret data is embedded

into an inconspicuous carrier i.e., digital image is used as cover image to conceal the secret message which is

known as stego image. Cryptography techniques are used to strengthen the security for the stego image. In this

paper, a zigzag method has proposed for concealing patient’s secret information with RSA cryptography algorithm

in a RGB medical cover image. The medical cover image is implemented on Nexys 2 1200E FPGA (Field

Programmable Gate Array)

Keywords: Cryptography, RSA Algorithm, Steganography, RGB medical cover image, Stego image, FPGA

References: 1. ‘Privacy , Confidentiality : and Electronic Medical Records Abstract The enchanced Goals of Informantional Security In Health Care’,

1996.

2. ‘Summary of the HIPAA Security Rule’, pp. 1–8, 2019.

3. M. E. Hellman, ‘M. E. Hellman, “An Overview of Public Key Cryptography,” IEEE Commun. Mag ., vol. 16, no. 6, May 2002, pp. 42–49.’, no. 6, pp. 42–49, 2002.

4. J. Gupta, ‘A Review on Steganography techniques and methods’, vol. 1, no. 1, pp. 1–4, 2015.

5. K. Joshi, P. Dhankhar, and R. Yadav, ‘A new image steganography method in spatial domain using XOR’, in 12th IEEE International Conference Electronics, Energy, Environment, Communication, Computer, Control: (E3-C3), INDICON 2015, 2016.

6. K. H. Jung and K. Y. Yoo, ‘Steganographic method based on interpolation and LSB substitution of digital images’, Multimed. Tools

Appl., 2015. 7. F. Huang, Y. Zhong, and J. Huang, ‘Improved algorithm of edge adaptive image steganography based on LSB matching revisited

algorithm’, Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 8389 LNCS, no. 2, pp.

19–31, 2014. 8. C. G. Tappe and A. V Deorankar, ‘An Improved Image Steganography Technique based on LSB’, Int.Res. J. Eng. Technol., pp. 2395–56,

2017.

9. J. Mielikainen, ‘LSB matching revisited’, IEEE Signal Process. Lett., vol. 13, no. 5, pp. 285–287, 2006. 10. V. M. Potdar and E. Chang, ‘Grey level modification steganography for secret communication’, Ind. Informatics, 2004. INDIN ’04. 2004

2nd IE, no. June, pp. 223–228, 2004.

11. D. George, ‘RSA Encryption System Using Encoded Multiplier and Vedic Mathematics’, pp. 19–22, 2013. 12. F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, ‘Information Hiding — A Survey’, vol. 87, no. July, pp. 1062–1078, 1999.

13. Y. P. Astuti, D. R. Ignatius, M. Setiadi, E. H. Rachmawanto, and C. A. Sari, ‘Simple and Secure Image Steganography using LSB and Triple

14. XOR Operation on MSB’, pp. 191–195, 2018.

15. M. Jain and S. K. Lenka, ‘Diagonal queue medical image steganography with Rabin cryptosystem’, Brain Informatics, vol. 3, no. 1, pp. 39–51, 2016.

16. S. Debnath, M. Kalita, and S. Majumder, ‘A review on hardware implementation of steganography’, Proc. 2nd Int. Conf. 2017 Devices

Integr. Circuit, DevIC 2017, pp. 149–152, 2017. 17. K. Joshi and R.Yadav, ‘A new LSB-S image steganography method blend with cryptography for secure communication’, Proc. 2015 3rd

Int. conf. image Inf. Process. ICIIP.2015,pp-86-90, 2016.

550-554

101.

Authors: Manjula Devarakonda Venkata, Sumalatha Lingamgunta

Paper Title: Triple-Modality Breast Cancer Diagnosis and Analysis in middle aged women by Logistic Regression

Abstract: Breast cancer is found to be the foremost root cause of deaths associated with cancer in Asian women,

and in recent days, it has become common among women out running cervical cancer. This work intends to 555-562

Page 72: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

analyse, evaluate and compare the effectiveness of the existing breast cancer imaging schemes like Ultrasound,

Mammography, and Magnetic resonance imaging techniques using Logistic regression, a statistical prediction

machine learning tool for diagnosing breast cancer. Using the logistic regression tool, breast cancer factor values

are obtained and tabulated to compare the suggested methods. The tabulated results validate that, MRI exhibits

remarkably higher sensitivity values compared to other imaging techniques such as mammography and ultrasound

imaging could be ineffective in patients with cancer history and fails to diagnose some mass in dense breast tissue.

Keywords: Breast Cancer, Mammogram, Magnetic Resonance Imaging, Ultrasound, Logistic regression.

References: 1. Chakraborti, K. L., Bahl, P., Sahoo, M., Ganguly, S. K., & Oberoi, C. (2005). Magentic resonance imaging of breast masses:

Comparison with mammography. Indian Journal of Radiology and Imaging, 15(3), 381.

2. Yusuff, H., Mohamad, N., Ngah, U. K., & Yahaya, A. S. (2012). Breast cancer analysis using logistic regression. International Journal of

Research and Reviews in Applied Sciences, 10(1), 14-22. 3. Prasad, N., & Houserkova, D. (2007). The role of various modalities in breast imaging. Biomedical Papers of the Medical Faculty of

Palacky University in Olomouc, 151(2).

4. Kuhl, C. K., Schrading, S., Leutner, C. C., Morakkabati-Spitz, N., Wardelmann, E., Fimmers, R., & Schild, H. H. (2005). Mammography, breast ultrasound, and magnetic resonance imaging for surveillance of women at high familial risk for breast

cancer. Journal of clinical oncology, 23(33), 8469-8476.

5. Reddy, D. H., & Mendelson, E. B. (2005). Incorporating new imaging models in breast cancer management. Current treatment options in oncology, 6(2), 135-145.

6. Kriege, M., Brekelmans, C. T., Boetes, C., Besnard, P. E., Zonderland, H. M., Obdeijn, I. M., ... & Muller, S. H. (2004). Efficacy of MRI

and mammography for breast-cancer screening in women with a familial or genetic predisposition. New England Journal of Medicine, 351(5), 427-437.

7. Lewin, J. M., Hendrick, R. E., D’Orsi, C. J., Isaacs, P. K., Moss, L. J., Karellas, A., ... & Cutter, G. R. (2001). Comparison of full-field

digital mammography with screen-film mammography for cancer detection: results of 4,945 paired examinations. Radiology, 218(3), 873-880.

8. Fischer, U., Baum, F., Obenauer, S., Luftner-Nagel, S., Von Heyden, D., Vosshenrich, R., & Grabbe, E. (2002). Comparative study in

patients with microcalcifications: full-field digital mammography vs screen-film mammography. European radiology, 12(11), 2679-2683.

9. Kolb, T. M., Lichy, J., & Newhouse, J. H. (2002). Comparison of the performance of screening mammography, physical examination,

and breast US and evaluation of factors that influence them: an analysis of 27,825 patient evaluations. Radiology, 225(1), 165-175. 10. Liberman, L., Morris, E. A., Dershaw, D. D., Abramson, A. F., & Tan, L. K. (2003). MR imaging of the ipsilateral breast in women with

percutaneously proven breast cancer. American Journal of Roentgenology, 180(4), 901-910.

11. Kristoffersen Wiberg, M., Aspelin, P., Perbeck, L., & Bone, B. (2002). Value of MR imaging in clinical evaluation of breast lesions. Acta Radiologica, 43(3), 275-281.

12. Berg, W. A., Gutierrez, L., NessAiver, M. S., Carter, W. B., Bhargavan, M., Lewis, R. S., & Ioffe, O. B. (2004). Diagnostic accuracy of

mammography, clinical examination, US, and MR imaging in preoperative assessment of breast cancer. Radiology, 233(3), 830-849. 13. MARIBS Study Group. (2005). Screening with magnetic resonance imaging and mammography of a UK population at high familial risk

of breast cancer: a prospective multicentre cohort study (MARIBS). The Lancet, 365(9473), 1769-1778.

14. Lee, C. H., Dershaw, D. D., Kopans, D., Evans, P., Monsees, B., Monticciolo, D., & Hendrick, E. (2010). Breast cancer screening with

imaging: recommendations from the Society of Breast Imaging and the ACR on the use of mammography, breast MRI, breast

ultrasound, and other technologies for the detection of clinically occult breast cancer. Journal of the American college of radiology, 7(1),

18-27.

102.

Authors: P Osman, PV Sridevi, K V S N Raju

Paper Title: Dual Band Band-Pass Filters using Plasmonic Split-mode Ring Resonator

Abstract: This article presents a two types of plasmonic split mode ring resonator band-pass filter (BPF) using

metal-insulator-metal (MIM) waveguide. The two filters operate at two optical wavelengths in between O (1260-

nm to1360-nm) and L (1565-nm to 1625-nm) bands. The designed split-modes ring resonators are designed using

local resonance and notch perturbation split-modes respectively. A full wave simulation software tool has been

used in the designing of the split-mode resonator band-pass filter. These filters are used in the designing of dual-

band high density photonic integrated circuits (PICs).

Keywords: (MIM) waveguide, (BPF), (1260-nm to1360-nm), (PICs),(1565-nm to 1625-nm) bands.

References: 1. W.Mu andJ. B.Ketterson, “Long-range surfaceplasmonpolaritons propagating on adielectric waveguide support,” vol.36, no. 23, pp.

4713-4715, Dec. 2011.

2. P. Taylor,C. Li,D. Qi, J. Xin, andF. Hao, “Metal-insulator-metal plasmonicwaveguidefor low- distortionslow lightattelecom frequencies,”vol.61 no.8 , pp. 37-41, Nov. 2014.

3. J. H.Zhu,Q. J.Wang, P. Shum,and X. G. Huang, “A Simple Nanometeric PlasmonicNarrow-Band FilteStructure Basedon Metal -Insulator - Metal Waveguide,” vol 10, no. 6, pp.1371-1376, Nov. 2011.

4. G. Duan,P. Lang, L.Wang, L.Yu, and J Xiao, “Aband-pass plasmonic filter with dual-square ring resonator,” Mod. Phys. Lett. B, vol. 28,

no. 23, pp.1450188(1-5),Sep. 2014. 5. G.Zheng, L.Xu, and Y. Liu,“Tunable plasmonic filter with circular metal-insulator-metal ring resonatorcontaining double narrow gaps,”

Pramana J. Phys., vol. 86, no. 5, pp. 1091-1097, May 2016.

6. N.JankovicandN. Cselyuszka,“Multiple fano-likeMIMplasmonic structure basedon triangularresonatorfor refractiv index sensing,” Sensors (Switzerland), vol 18, no. 1,pp.287(1-10), Jan. 2018.

7. S. M. Grist et al., “Silicon photonic micro-disk resonators for label-free biosensing,” Opt. Express, vol. 21, no.7, pp. 7994-7998, Mar.

2013. 8. Jhonsonand Christy, “Optical Constants ofNoble Metals, ” Phys.Rev. Lett.,vol.6, no. 12, pp.4370-4379, Dec.1972.

9. A. Kamma, G. S.Reddy, P.Suggisetti, andJ. Mukherjee,“A Novel and Compact Ultra-Wide Band ( UWB Filter Using Modified Split

Ring Resonato ( MSRR ),” vol. 8, pp. 69–71, 2014. 10. I. WolffandN.Knoppik, “Microstripring resonatorand dispersion measurementonmicrostrip lines,”Electron. Lett., vol. 7, pp. 779(1-

3),Nov. 1971.

563-565

103. Authors: N Saida Naik, A Sai Pallavi, L Srujana

Page 73: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

Paper Title: Improvement of Sag under Different Fault Conditions

Abstract: The improvement of power flow in a distributed system can be achieved by the FACTS compensator

that is D-STATCOM (DISTRIBUTION_STATIC_COMPENSATOR) also known as which is shunt connected, is

explained in this paper. To reduced the Sag-in-voltage issues(power quality issue), a Distribution-STATCOM is

used which is connected at PCC (Point of Common Coupling).The advantage of quick operation of Distribution-

STATCOM makes the it more efficient and hence power flow is improved. Varied controllers are utilzed to

operate the Distribution-STATCOM. To enhance the power flow, we are simulating and designing it with PI

Controller. In distribution networks with linear balanced loads, their power flow can be increases at varied fault

conditions such as L-L Faults (Line to Line),L-G Faults (Line to Ground), L-L-G Faults, L-L-L-G Faults. These

faults are studied and simulated output waveforms are presented also calculating THD (Total Harmonic Distortion)

with and without Distribution-STATCOM Compensator. The harmonics and Sag-in-voltages due to LG, LLG &

LLLG faults in this proposed system are reduced and we can achieve enhanced power flow. The reduction of faults

and trhe value of THD ( Total-Harmonic-Distortion) can be simulated and studied in MATLAB.

Keywords: DSTATCOM, PI, FAULTS, PWM

References: 1. Lakshman naik popavath, k.palanisamy “a dstatcom for enhancement of power quality in distribution systems” international journal of

pure and applied mathematics volume 118 no. 18 2018, 4083-4094 issn: 1311-8080 (printed version); issn: 1314-3395 (on-line version).

2. Manpreetsingh, jaspreetkaur “role of dstatcom in distribution network under various fault conditions” international journal of advanced

research in electrical,electronics and instrumentation engineering vol. 4, issue 7, july 2015 issn (print) : 2320 – 3765 , issn (online): 2278 – 8875.

3. Miss mallelaleelamounika ,mrk.v.kishore “ modelling and simulation of d-statcom for power quality problems using sinusoidal pulse width

modulation (spwm)” ijcsiet--international journal of computer science information and engg., technologies issue5-volume2, issn 2277-4408.

4. Kartikparmarpratikkabrawala prof. Pinkalj.patel “simulation and analysis of dstatcom” 2014 ijedr volume 2, issue 1 issn: 2321-9939.

5. Darjidhaval d. Patel sumit r. Prof.hardik h. Raval “improving voltage profile of distribution system using dstatcom” 2014 ijedr volume 2, issue 1 issn: 2321-9939.

6. Honey baby swaminathan.p j. Jayakumar “enhancing power quality issues in distribution system using d-statcom” international journal of

recent research aspects issn: 2349-7688, vol. 4, issue 4, dec 2017, pp. 356-359. 7. Akshaybhargav, harsh sharma “control of total harmonic distortion in distribution network using compensation” international journal of

science and research (ijsr) volume 5 issue 5, may 2016 issn (online): 2319-7064

566-569

104.

Authors: T. Charan Singh, K. Raghu Ram, B.V. Sanker Ram

Paper Title: Transient Stability Analysis of Six Phase Transmission System with Integration of WPGS and

STATCOM with Smart Grid

Abstract: In recent times Transient stability analysis has become a major concern in the operation of power

systems due to the rising stress on power system networks. These difficulties require assessment of a power

system’s ability to with stand instability while maintaining the excellence of service. Many different techniques

have been projected for transient stability analysis in power systems, especially for a multi machine system. This

paper describes simulation of six phase multi-machine power system (MMPS) with wind power generator

integration in dynamic operation. By the introduction of wind power generation system (WPGS) in multi-machine

at weak bus in parallel with STATCOM can improve the generator load angle deviation during fault condition. The

MMPS performance is analysed by placing six phase line between different buses. The replacement of

transmission line can reduces the line impedances, which results in reduced angle distortion of machines and

improved stability .The proposed WPGS based MMPS phase angle and frequency variations are analyzed during

symmetrical and asymmetrical fault conditions. The MATLAB/Simulation software is used to test the behavior of

proposed system.

Keywords: Wind system, six phase transmission line, STATCOM, multi-machine system, stability.

References: 1. D. Basic, J. G. Zhu, and G. Boardman, “Transient performance study of a brushless doubly fed twin stator induction generator,” IEEE

Trans. energy Convers., vol. 18, no. 3, pp. 400–408, 2003.

2. G. K. Singh, “Modeling and experimental analysis of a self-excited six-phase induction generator for stand-alone renewable energy

generation,” Renew. energy, vol. 33, no. 7, pp. 1605–1621, 2008. 3. J. R. Stewart and D. D. Wilson, “High phase order transmission--a feasibility analysis part I--steady state considerations,” IEEE Trans.

Power Appar. Syst., no. 6, pp. 2300–2307, 1978. 4. T. L. Landers, R. J. Richeda, E. Krizanskas, J. R. Stewart, and R. A. Brown, “High phase order economics: constructing a new

transmission line,” IEEE Trans. Power Deliv., vol. 13, no. 4, pp. 1521–1526, 1998.

5. J. M. Arroyo and A. J. Conejo, “Optimal response of a power generator to energy, AGC, and reserve pool-based markets,” IEEE Trans. Power Syst., vol. 17, no. 2, pp. 404–410, 2002.

6. J. R. Stewart, E. Kallaur, and I. S. Grant, “Economics of EHV high phase order transmission,” IEEE Trans. power Appar. Syst., no. 11,

pp. 3386–3392, 1984. 7. N. G. Hingorani, L. Gyugyi, and M. El-Hawary, Understanding FACTS: concepts and technology of flexible AC transmission systems,

vol. 1. IEEE press New York, 2000.

8. G. Cai, Q. Sun, C. Liu, P. Li, and D. Yang, “A new control strategy to improve voltage stability of the power system containing large-scale wind power plants,” in Electric Utility Deregulation and Restructuring and Power Technologies (DRPT), 2011 4th International

Conference on, 2011, pp. 1276–1281.

9. L. Wang and C.-T. Hsiung, “Dynamic stability improvement of an integrated grid-connected offshore wind farm and marine-current farm using a STATCOM,” IEEE Trans. power Syst., vol. 26, no. 2, pp. 690–698, 2011.

10. S. S. Venkata, W. C. Guyker, W. H. Booth, J. Kondragunta, N. K. Saini, and E. K. Stanek, “138-kV, six-phase transmission system: fault

analysis,” IEEE Trans. Power Appar. Syst., no. 5, pp. 1203–1218, 1982. 11. A. P. Apostolov and R. G. Raffensperger, “Relay protection operation for faults on NYSEG’s six-phase transmission line,” IEEE Trans.

Power Deliv., vol. 11, no. 1, pp. 191–196, 1996.

570-576

Page 74: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

12. N. B. Bhatt, S. S. Venkata, W. C. Guyker, and W. H. Booth, “Six-phase (multi-phase) power transmission systems: fault analysis,” IEEE

Trans. Power Appar. Syst., vol. 96, no. 3, pp. 758–767, 1977.

13. R. J. Vidmar, “On the use of atmospheric plasmas as electromagnetic reflectors,” IEEE Trans. Plasma Sci, vol. 21, no. 3, pp. 876–880, 1992.

105.

Authors: R. Umamaheswari, Ch. Sumanth Kumar

Paper Title: Optimization of Training Sequence Based Sparse Channel Estimation for Mmwave Communications in

5G

Abstract: In this paper to achieve higher data rates with high spectral efficiency and high accuracy we

designed training sequence sparse channel estimation based on BAT, Cuckoo and Firefly algorithms. By using the

above techniques we design a Training sequence channel estimation to reduce the bit error rate, mean square error

and accurate recovery of data. The firefly optimization is the promising technique to reduce the bit error rate and to

increase the signal to noise ratio to achieve high spectral efficiency Gbps.

Keywords: Quadrature Amplitude Modulation , Bit Error rate, Signal to Noise Ratio

References: 1. Ma, Xu, Fang Yang, Sicong Liu, Jian Song, and Zhu Han. "Design and optimization on training sequence for mmwave communications:

A new approach for sparse channel estimation in massive MIMO." IEEE journal on selected areas in communications 35, no. 7 (2017):

1486-1497. 2. Rappaport, Theodore S., Yunchou Xing, George R. MacCartney, Andreas F. Molisch, Evangelos Mellios, and Jianhua Zhang. "Overview

of Millimeter Wave Communications for Fifth-Generation (5G) Wireless Networks—With a Focus on Propagation Models." IEEE

Transactions on Antennas and Propagation 65, no. 12 (2017): 6213-6230. 3. González-Prelcic, Nuria, Anum Ali, Vutha Va, and Robert W. Heath. "Millimeter-Wave Communication with Out-of-Band Information."

IEEE Communications Magazine 55, no. 12 (2017): 140-146. 4. Niu, Yong, Yong Li, Depeng Jin, Li Su, and Athanasios V. Vasilakos. "A survey of millimeter wave (mmwave) communications for 5g:

opportunities and challenges. arXiv preprint." arXiv preprint arXiv:1502.07228 (2015).

5. Niu, Y., Y. Li, D. Jin, L. Su, and A. Vasilakos. "A survey of milimeter wave (mmwave) communications for 5g: Opportunities and challenges." Computer Science-Networking and Internet Architecture (2015).

6. Schniter, Philip, and Akbar Sayeed. "Channel estimation and precoder design for millimeter-wave communications: The sparse way." In

Signals, Systems and Computers, 2014 48th Asilomar Conference on, pp. 273-277. IEEE, 2014. 7. Xiao, Ming, Shahid Mumtaz, Yongming Huang, Linglong Dai, Yonghui Li, Michail Matthaiou, George K. Karagiannidis et al.

"Millimeter wave communications for future mobile networks." IEEE Journal on Selected Areas in Communications 35, no. 9 (2017):

1909-1935. 8. Zhao, Lou, Derrick Wing Kwan Ng, and Jinhong Yuan. "Multi-user precoding and channel estimation for hybrid millimeter wave

systems." IEEE Journal on Selected Areas in Communications 35, no. 7 (2017): 1576-1590.

9. Zhao, Lou, Derrick Wing Kwan Ng, and Jinhong Yuan. "Multiuser precoding and channel estimation for hybrid millimeter wave MIMO systems." In Communications (ICC), 2017 IEEE International Conference on, pp. 1-7. IEEE, 2017.

10. Arora, Sankalap, and Satvir Singh. "A conceptual comparison of firefly algorithm, bat algorithm and cuckoo search." In Control

Computing Communication & Materials (ICCCCM), 2013 International Conference on, pp. 1-4. IEEE, 2013. 11. Fister Jr, Iztok, Xin-She Yang, Iztok Fister, Janez Brest, and Dušan Fister. "A brief review of nature-inspired algorithms for

optimization." arXiv preprint arXiv:1307.4186 (2013).

577-581

106.

Authors: B. Prasanthi, N. Nagamalleswararao

Paper Title: Optimal kernel based Neutrosophic Soft sets Clustering for Image Segmentation based on Pareto

Optimal Algorithm

Abstract: In bio-medical image processing, brain image segmentation is an aggressive concept in present days.

Disorders of brain mainly requires accurate tissue extraction and classification of magnetic resonance (MR)

medical brain images, which is very effective and important to detect different types of tumors, and necrotic tissue

classification and segmentation. To handle brain image segmentation, mathematical tools like fuzzy sets, rough

sets and soft sets are used to define uncertainty and vagueness of brain images. Accurate and effective

segmentation and detection of tumor on brain image is still a challenging task in medical brain images with respect

to reduction of noise, smoothness of image and accuracy for segmentation of medical brain images and other

parameters. We propose and introduce a Novel Brain Segmentation approach based on neutrosophic soft sets is

introduced to explore uncertainties relates to white, grey and cerebro spinal fluid matters for the detection tumor

from MR brain image with respect to bias field estimation and co-relation based on decision making. Our proposed

approach consist Pareto Optimization algorithm to support neutrosophic soft sets approximations for the optimal

kernel parameters (like kernel functions). These approximations are free to define weight parameters and average,

median, weight filters and less complexity compared to existing algorithms. Our experimental results show

effective performance of proposed approach with respect to segmentation accuracy, time and jacquard parameters

compared to existing algorithms.

Keywords: Segmentation of brain image, fuzzy c-means, Intuitionistic neutrosophic soft sets, rough sets, magnetic

resonance.

References: 1. C. Xu, D.L. Pham, J.L. Prince, Image segmentation using deformable models, Handb. Med. Imaging 2 (2000) 129-174.

2. J. C. Bezdek, Pattern Recognition with Fuzzy Objective Function Algorithms. New York, NY, USA: Plenum, 1981. 3. J.C. Bezdek, L.O. Hall, L.P. Clark, Review of MR segmentation technique in pattern recognition, Medical Physics 10 (20) (1993) 33-48.

4. J.T. Tou, R.C. Gonzalez, Pattern Recognition, Addison-Wesley, Reading, MA,1974.

5. D.S. Modha, W.S. Spangler, Feature weighting in k-means clustering, Mach.Learn. 52 (3) (2003) 217-237. 6. J.C. Bezdek, R. Ehrlich, W. Full, FCM: the fuzzy c-means clustering algorithm, Comput. Geosci. 10 (2) (1984) 191-203.

7. Z. X. Ji, Q. S. Sun, and D. S. Xia, A framework with modified fast FCM for brain MR images segmentation, Pattern Recognition, vol. 44,

pp. 999-1013, May 2011

8. B. Caldairou, N. Passat, P. A. Habas, C. Studholme, and F. Rousseau,A non-local fuzzy segmentation method: Application to brain

MRI,Pattern Recognition, vol. 44, pp. 1916-1927, 2011.

582-591

Page 75: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

9. Z. X. Ji, Q. S. Sun, and D. S. Xia, A modified possibilistic fuzzy c-means clustering algorithm for bias field estimation and segmentation

of brain MR image, Computerized Medical Imaging and Graphics, vol. 35, p. 383397, 2011.

10. Ahmed MN, Yamany S, Mohamed N, Farag A, Moriarty T. A modified fuzzy c-means algorithm for bias field estimation and segmentation of MRI data. IEEE Trans Med Imaging 2002;21(3):193-9.

11. N.R. Pal, K. Pal, J.M. Keller, J.C. Bezdek, A possibilistic fuzzy c-means clustering algorithm, IEEE Trans. Fuzzy Syst. 13 (4) (2005) 517-

530.

12. K.-S. Chuang, H.-L. Tzeng, S. Chen, J. Wu, T.-J. Chen, Fuzzy c-means clusteringwith spatial information for image segmentation,

Comput. Med. ImagingGraph. 30 (1) (2006) 9-15.

13. W. Cai, S. Chen, D. Zhang, Fast and robust fuzzy c-means clustering algorithms incorporating local information for image segmentation, Pattern Recognit. 40(3) (2007) 825-838.

14. S. Krinidis, V. Chatzis, A robust fuzzy local information c-means clustering algorithm, IEEE Trans. Image Process. 19 (5) (2010) 1328-

1337. 15. C. Li, J.C. Gore, C. Davatzikos, Multiplicative intrinsic component optimization(MICO) for MRI bias field estimation and tissue

segmentation, Magn. Reson.Imaging 32 (7) (2014) 913-923.

16. Chen S, Zhang D. Robust image segmentation using FCM with spatial constraint based on new kernel-induced distance measure. IEEE Trans Syst Man Cybern B 2004;34 (4):1907-16.

17. Souza, C.R. Kernel functions for machine learning applications. Creat. Commons Attrib. Noncommer. Share Alike 2010, 3, 29.

18. Lin, K.-P. A novel evolutionary kernel intuitionistic fuzzy C-means clustering algorithm. IEEE Trans. Fuzzy Syst. 2014, 22, 1074–1087. 19. Yang, M.S.; Tsai, H.S. A Gaussian kernel-based fuzzy c-means algorithm with a spatial bias correction.Pattern Recogn. Lett. 2008, 29,

1713–1725.

20. Zhang, D.-Q.; Chen, S.-C. Clustering incomplete data using kernel-based fuzzy C-means algorithm. Neural Process. Lett. 2003, 18, 155–162.

21. Zhang, D.-Q.; Chen, S.-C. A novel kernelized fuzzy c-means algorithm with application in medical image segmentation. Artif. Intell.

Med. 2004, 32, 37–50. 22. Gong, M.G.; Liang, Y.; Shi, J.; Ma, W.P.; Ma, J.J. Fuzzy C-Means Clustering With Local Information and Kernel Metric for Image

Segmentation. IEEE Trans. Image Process. 2013, 22, 573–584.

23. Ji, Z.X.; Liu, J.Y.; Cao, G.; Sun, Q.S.; Chen, Q. Robust spatially constrained fuzzy c-means algorithm for brain MR image segmentation. Pattern Recogn. 2014, 47, 2454–2466.

24. Li, C.M.; Gore, J.C.; Davatzikos, C. Multiplicative intrinsic component optimization (MICO) for MRI bias field estimation and tissue

segmentation. Magn. Reson. Imaging 2014, 32, 913–923. 25. Krinidis, S.; Chatzis, V. A Robust Fuzzy Local Information C-Means Clustering Algorithm. IEEE Trans. Image Process. 2010, 19, 1328–

1337.

26. Goldberg, D.E. Genetic Algorithms in Search, Optimization, and Machine Learning; Addison-Wesley: Boston, MA, USA, 1989. 27. Tao, J.; Wang, N. DNA computing based RNA genetic algorithm with applications in parameter estimation of chemical engineering

processes. Comput. Chem. Eng. 2007, 31, 1602–1618.

28. Zang, W.; Zhang, W.; Zhang, W.; Liu, X. A Genetic Algorithm Using Triplet Nucleotide Encoding and DNA Reproduction Operations for Unconstrained Optimization Problems. Algorithms 2017, 10, 16.

29. Zang,W.; Ren, L.; Zhang,W.; Liu, X. Automatic Density Peaks Clustering Using DNA Genetic Algorithm Optimized Data Field and

Gaussian Process. Int. J. Pattern Recogn. 2017, 31, 1750023. 30. Zang,W.; Jiang, Z.; Ren, L. Improved spectral clustering based on density combining DNA genetic algorithm. Int. J. Pattern Recogn.

2017, 31, 1750010.

31. Zang, W.; Sun, M.; Jiang, Z. A DNA genetic algorithm inspired by biological membrane structure. J. Comput. Theor. Nanosci. 2016, 13, 3763–3772

32. Elazab, A.; Wang, C.; Jia, F.; Wu, J.; Li, G.; Hu, Q. Segmentation of brain tissues from magnetic resonance images using adaptively

regularized kernel-based fuzzy-means clustering. Comput. Math. Method Med 2015. 33. Gong, M.G.; Liang, Y.; Shi, J.; Ma, W.P.; Ma, J.J. Fuzzy C-Means Clustering With Local Information and Kernel Metric for Image

Segmentation. IEEE Trans. Image Process. 2013, 22, 573–584.

34. Pillonetto, G.; Dinuzzo, F.; Chen, T.S.; De Nicolao, G.; Ljung, L. Kernel methods in system identification, machine learning and function estimation: A survey. Automatica 2014, 50, 657–682.

35. Zhang, L.;Wang, N. A modified DNA genetic algorithm for parameter estimation of the 2-Chlorophenol oxidation in supercritical water.

Appl. Math. Model. 2013, 37, 1137–1146. 36. Gousias, I.S.; Edwards, A.D.; Rutherford, M.A.; Counsell, S.J.; Hajnal, J.V.; Rueckert, D.; Hammers, A. Magnetic resonance imaging of

the newborn brain: Manual segmentation of labelled atlases in term-born and preterm infants. Neuroimage 2012, 62, 1499–1509.

107.

Authors: Sandeep Raskar, kamatchi Iyer

Paper Title: Node mobility prediction in Wireless Adhoc Network

Abstract: Generally, Link between any two nodes in the wireless network is a bottleneck in process of selecting a

path in a network, or among or across multiple networks. Nodes are moving in the network unknowingly. So even

if an algorithm selects the node during the path initialization process for the transmission of data among source and

destination node, we cannot predict that node will be on the same position in the network when actual data

transmission starts. There are many algorithm defined in selection of path in ad hoc network. This paper proposes

new concept called Neural Network (NN) model. It predicts the node movements in ad-hoc network during data

transmission. Algorithm can predicts the movement of a node in a network on the basis of information of previous

movements of that node.

Keywords: Network Model; shortest path routing; Neural Network.

References: 1. S.Jayashri and M.Malathi, " Robust against route failure using power proficient reliable routing in MANET", Alexandria Engineering

Journal, Available online, 2016. 2. Qingyang Song, ZhaolongNing, ShiqiangWang and AbbasJamalipour, " Link stabilityestimationbasedonlinkconnectivitychangesinmobile

ad-hoc networks", JournalofNetworkandComputerApplications, vol. 35, pp. 2051–2058,2012.

3. Dr. K. Poulose Jacob, Preetha K G, and Dr. A Unnikrishnan, " An Effective Path Protection Method to Attain the Route Stability in MANET", vol. 2, no. 6, 2013, A International Journal of Advanced Research in Computer and Communication Engineering.

4. Shubhajeet Chatterjee and Swagatam Das, " Ant colony optimization based enhanced dynamic source routing algorithm for mobile Ad-

hoc network", Information Sciences, vol. 295 pp. 67–90, 2015. 5. Alma A.M.Rahat, Richard M.Everson and Jonathan E.Fieldsend, " Evolutionary multi-path routing for network lifetime and robustness in

wireless sensor networks", Ad Hoc Networks, vol. 52, pp. 130-145, 2016.

6. Mawloud Omar, SabrineHedjaz, SouhilaRebouh, KatiaAouchar, BournaneAbbache and AbdelkamelTari, " On-demand source routing with reduced packets protocol in mobile ad-hoc networks", AEU - International Journal of Electronics and Communications, vol. 69,

592-595

Page 76: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

no.10, pp.1429-1436, 2015.

7. Sudip Misra, Sanjay K. Dhurandher, Mohammad S. Obaidat,∗, Pushkar Gupta, Karan Verma and Prayag Narula, " An ant swarm-inspired

energy-aware routing protocol for wireless ad-hoc networks", The Journal of Systems and Software, vol. 83 , pp. 2188–2199, 2010.

8. Huafeng Wu, JunWang, Raghavendra RaoAnanta, Vamsee ReddyKommareddy, RuiWang and PrasantMohapatra, " Prediction based

opportunistic routing for maritime search and rescue wireless sensor network", Journal of Parallel and Distributed Computing, vol. 111, pp. 56-64, 2018.

9. Gyanappa A.Walikar and Rajashekar C.Biradar, " A survey on hybrid routing mechanisms in mobile ad hoc networks", Journal of

Network and Computer Applications", vol. 77, pp. 48-63, 2017. 10. Haiying Shen and Lianyu Zhao, " ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs", IEEE Transactions

on Mobile Computing, vol. 12, no. 6, 2013

11. Ritu Sharma, " A Secure and Proficient Routing Protocol in Mobile Ad-hoc Networks using Genetic Mechanism", International Journal of Innovative Research in Computer and Communication Engineering, vol. 4, no.6, 2016.

12. K. Manjappa and R. M. Reddy Guddeti, "Mobility aware-termite: a novel bio inspired routing protocol for mobile ad-hoc networks," in

IET Networks, vol. 2, no. 4, pp. 188-195, December 2013. 13. Somayeh Taheri, Salke Hartung and Dieter Hogrefe, " Anonymous group-based routing in MANETs", Journal of Information Security

and Applications, vol. 22 no. C, pp. 87-98, 2015.

14. GurpreetSingh, NeerajKumar and AnilKumarVerma, " ANTALG:AnInnovativeACObasedRoutingAlgorithmforMANETs", Journal ofNetworkandComputerApplications, vol. 45, pp. 151–167, 2014.

15. ShahramJamali, LeilaRezaei and Sajjad JahanbakhshGudakahriz, " An Energy-efficient Routing Protocol for MANETs: a Particle Swarm

Optimization Approach", Journal of Applied Research and Technology, vol. 11, no. 6, pp.803-812, 2013. 16. Hasan Abdulwahid, BinDai, BenxiongHuang and ZijingChen, " Scheduled-links multicast routing protocol in MANETs", Journal of

Network and Computer Applications, vol. 63, pp. 56-67, 2016.

17. A.Amuthan, N.Sreenath, P.Boobalan and K.Muthuraj, " Dynamic multi-stage tandem queue modeling-based congestion adaptive routing for MANET", Alexandria Engineering Journal, Available online, 2017.

18. Malik N.Ahmed, Abdul HananAbdullah, HassanChizari and OmprakashKaiwartya, " F3TM: Flooding Factor based Trust Management Framework for secure data transmission in MANETs", Journal of King Saud University - Computer and Information Sciences, vol. 29,

no. 3, pp. 269-280, July 2017.

19. ArindrajitPal, Jyoti PrakashSingh and Paramartha Dutta, " Path length prediction in MANET under AODV routing: Comparative analysis of ARIMA and MLP model", Egyptian Informatics Journal, vol.16, no. 1, pp. 103-111, 2015.

20. Saad M.Adam and RosilahHassan, " Delay aware Reactive Routing Protocols for QoS in MANETs: a Review", Journal of Applied

Research and Technology, vol. 11, no. 6, pp. 844-850, 2013. 21. Vishal Sharma, Harsukhpreet Singh, Mandip Kaur and Vijay Banga, " Performance evaluation of reactive routing protocols in MANET

networks using GSM based voice traffic applications", Optik, vol. 124, pp. 2013– 2016, 2013.

22. Paramjit Singh, Ajay K. Sharma and T.S. Kamal, " An adaptive neuro-fuzzy inference system modeling for VoIP basedIEEE 802.11g MANET", Optik, vol. 127, pp.122–126, 2016.

23. Pedro Garcıa Lopez , Raul Gracia Tinedo and Josep M.Banu´ s Alsina, " Moving routing protocols to the user space in MANET

middleware", Journal of Network and Computer Applications, vol. 33, pp.588–602, 2010. 24. HaidarSafa, Marcel Karam and BassamMoussa, " PHAODV: Power aware heterogeneous routing protocol for MANETs", Journal of

Network and Computer Applications, vol.46, pp. 60-71, 2014.

25. J. Sathiamoorthy, B. Ramakrishnan and Usha. M, " Design of a proficient hybrid protocol for efficient route discovery and secure data transmission in CEAACK MANETs", Journal of Information Security and Applications, vol. 36, pp. 43–58, 2017.

26. Marjan Kuchaki Rafsanjani and Hamideh Fatemidokht, " FBeeAdHoc: A secure routing protocol for BeeAdHoc based on fuzzy logic in

MANETs", AEUE - International Journal of Electronics and Communications, vol. 69, no. 11, pp. 1613-1621, 2015.

27. Rajashekhar C.Biradar and SunilkumarS.Manvi, " Neighbor supportedreliablemultipathmulticastroutinginMANETs", Journal

ofNetworkandComputerApplications, vol. 35, pp.1074–1085, 2012.

28. MEI Jing-qing and JI Hong, LI Yi, " Query routing mismatch alleviation architecture for P2P file lookup in MANETs", The Journal of China Universities of Posts and Telecommunications, vol. 18, no. 4, pp. 111–117, 2011.

29. Fahad TahaAL-Dhief, NaseerSabri, S.Fouad, N.M. AbdulLatiff, Musatafa Abbas, AbboodAlbader, " A review of forest fire surveillance

technologies: Mobile ad-hoc network routing protocols perspective", Journal of King Saud University - Computer and Information Sciences, Available online,2017.

30. Yogeswaran Mohan, Sia Seng Chee, Donica Kan Pei Xin and Lee Poh Foong, " Artificial Neural Network for Classification of

Depressive and Normal in EEG", 2016 IEEE EMBS Conference on Biomedical Engineering and Sciences (IECBES), 2016.

108.

Authors: Sampath S S, Prasanth Sreekumar, Chithirai Pon Selvan M

Paper Title: Estimation of Power in High Altitude Freely Suspended Wind Turbine

Abstract: Conventional wind turbines are restricted in its use due to certain limitations and challenges in its

position. To use wind turbine efficiently and economically, it is required to overcome space requirements, noise,

variation in air current and set up cost. This study attempts to design and fabricate suspended wind turbine to

overcome the above stated hurdles. In this current work, the blades and the alternator are placed in the helium

balloon housing which is adjourned in the atmospheric air and supported to the floor surface with tether. A tether

made of conductive material is todiffuse the generated power from the airborne housing to the floor base. Blades

are made of aluminium and it ensures low rotational inertia. The proposed suspended wind mill in this study is able

to generate power output which is comparatively cheaper than conventional wind turbines and also work will be

able to cater the needs of electric power to remote areas and farms. Entire setup is modelled in 3D software Creo

and the simulation is carried out using ANSYS software.

Keywords: Alternator, finite element method, turbine blade, renewable energy, power

References: 1. M. Diehl, “Airborne wind energy concepts and its physical foundations,” Green Energy Technology, pp. 3–22, 2013. 2. L. Fagiano and T. Marks, “Design of a Small-Scale Prototype in Airborne Wind Energy,” IEEE/ASMETransactions on Mechatronics and

is subject to IEEE, pp. 1–18, 2014.

3. Lorenzo Fagiano and Dario Piga , “Optimization of airborne wind energy generators”, International journal of robust and nonlinear control, September 2011 , pp. 2055–2083, 2009.

4. N. Bilaniuk, D. Ph, P. Eng and L. T. a Windpower, “Generic System Requirements for High Wind Turbines,” October, 2009.

5. C. L. Archer and K. Caldeira, “Global assessment of wind power,” Energies, vol. 2, pp. 307–319, 2009. 6. L. Fagiano, M. Milanese and D. Piga, “High-altitude wind power generation for renewable energy ” .

7. B. Lansdorp and M. Sc, “Comparison of high-altitude wind energy generation with ground based generator” China International

Renewable Energy Equipment & Technology Exhibition and Conference, pp. 1–9, 2005. 8. A. Bolonkin, “Using of High Wind Energy ” , Smart Grid and Renewable Energy , vol. 2011, no. May, pp. 75–85, 2011.

596-602

Page 77: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

9. C. L. Archer, “An Introduction to Meteorology for Airborne Wind Energy” Airborne Wind Energy, Green Energy and Technology, 2013,

pp. 81–94.

10. T. Ezaki, “Effect of coning angle for single-wire-suspended down-wind turbine” pp. 1–6. 11. J.Helsen,F.Vanhollebeke,D.Vandepitte and W.Desmet,“Some trends in wind turbine upscaling.”

12. M. Haastrup, M. R. Hansen and M. K. Ebbesen,“Modeling of Wind Turbine Gearbox Mounting”, Modeling, Identification and Control,

vol. 32, no. 4, pp. 141–149, 2011.

13. W. T. Chong, A. Fazlizan, S. C. Poh, K. C. Pan, W. P. Hew and F. B. Hsiao, “The design , simulation and testing of an urban vertical axis

wind turbine with the omni-direction-guide-vane q,” Appl. Energy, pp. 5–8, 2013.

14. H. A. Yanto, C. Lin, J. Hwang and S. Lin, “Modeling and control of household-size vertical axis wind turbine and electric power generation system,” PEDS, pp. 1301–1307.

15. S. S. Sampath, SawanShetty and ChithiraiPonSelvan M, “Estimation of power in low velocity vertical axis wind turbine” Frontiers of

mechanical engineering, 2015, pp:1-8. 16. D. S. Parker, J. R. Sherwin and B. Hibbs, “Development of High Efficiency Air Conditioner Condenser Fans,” ASHRAE Trans., vol. 111,

p. 511, 2005.

109.

Authors: Rudi Kurniawan Arief, Erry Yulian T. Adesta, Irfan Hilmy

Paper Title: Hardware Improvement of FDM 3D Printer: Issue of Bed Leveling Failures

Abstract: Rapid Prototyping is one of many technologies that trigger the Industrial Revolution 4.0. The open

source system that applied to 3D printer system make the research development grow rapidly. Most favorable

research topics are in the area of extrusion head, material and functional modification. But the difficulties in

leveling the heated bed has created worst user experiment and cause some catastrophic failures to be happens. This

paper reviewed the research conducted around improvement of the FDM printer’s hardware. The cause of most

occur failures in FDM printing also discussed. To overcome the disturbing failure caused by the lack of levelness

of the heated bed, a pine trees liked pin system is introduced.

Keywords: FDM, 3D Printer, Bed Leveling, Heated Bed, Printing Failures.

References: 1. V. Sharma and S. Singh, “Rapid Prototyping : Process advantage , comparison and application,” Int. J. Comput. Intell. Res., vol. 12, no. 1,

pp. 55–61, 2016.

2. A. Kumar Singh and S. Chauhan, “Technique to Enhance FDM 3D Metal Printing,” Bonfring Int. J. Ind. Eng. Manag. Sci., vol. 6, no. 4,

pp. 128–134, 2016. 3. R. Nagpal, R. Gupta, and V. Gupta, “A review on trends and development of rapid prototyping processes in industry,” A Rev. trends Dev.

rapid Prototyp. Process. Ind., vol. 2, no. 4, pp. 224–228, 2017.

4. K. Kun, “Reconstruction and development of a 3D printer using FDM technology,” Procedia Eng., vol. 149, no. June, pp. 203–211, 2016. 5. S. K. Ueng, L. K. Chen, and S. Y. Jen, “A preview system for 3D printing,” Proc. 2017 IEEE Int. Conf. Appl. Syst. Innov. Appl. Syst.

Innov. Mod. Technol. ICASI 2017, pp. 1508–1511, 2017.

6. E. Fang and S. Kumar, “The Trends and Challenges of 3D Printing,” in Encyclopedia of Information Science and Technology, Fourth Edition, 4th ed., no. August, M. Khosrow, Ed. PA: IGI Global, 2018, pp. 4382–4388.

7. S. P. Deshmukh et al., “Design and development of XYZ scanner for 3D printing,” 2017 Int. Conf. Nascent Technol. Eng. ICNTE 2017 -

Proc., 2017.

8. B. M. Schmitt, C. F. Zirbes, C. Bonin, D. Lohmann, D. C. Lencina, and A. da C. Sabino Netto, “A Comparative Study of Cartesian and

Delta 3D Printers on Producing PLA Parts,” Mater. Res., vol. 20, pp. 883–886, 2017. 9. R. Jerez-Mesa, J. A. Travieso-Rodriguez, X. Corbella, R. Busqué, and G. Gomez-Gras, “Finite element analysis of the thermal behavior

of a RepRap 3D printer liquefier,” Mechatronics, vol. 36, pp. 119–126, 2016.

10. M. Teliskova, J. Torek, T. Cmorej, M. Kocisko, and J. Petrus, “Adjustments of RepRap type printer workbench,” 2017 4th Int. Conf. Ind. Eng. Appl. ICIEA 2017, pp. 15–19, 2017.

11. A. Quatrano, M. C. De Simone, Z. B. Rivera, and D. Guida, “Development and implementation of a control system for a retrofitted CNC

machine by using Arduino,” FME Trans., vol. 45, no. 4, pp. 565–571, 2017. 12. K. Gunaydin, “Common FDM 3D Printing Defects,” Istanbul, 2018.

13. F. Sovaila, C. Sovaila, and N. Baroiu, “Universal Delta 3D Printer,” J. Ind. Des. Eng. Graph. 29, vol. 4, no. 4, pp. 33–37, 2016.

14. A. Ogulmus, A. Cakan, and M. Tınkır, “Modeling And Position Control Of Scara Type 3D Printer,” Int. J. Sci. Technol. Res., vol. 5, no. 12, pp. 140–143, 2016.

15. M. R. Pfeifer, “Rapid Prototyping Technologies for Manufacturing and Maintenance Activities,” Technol. Eng., vol. 14, no. 2, pp. 2–4,

2017. 16. H. W. Lim, Cassidy, T. and Cassidy, and T. Diane, “Application Research of 3D Printing Technology on Dress Forms,” Int. J. Eng.

Technol., vol. 9, no. 1, pp. 78–83, 2017.

17. V. G. Surange and P. V Gharat, “3D Printing Process Using Fused Deposition Modelling (FDM),” Int. Res. J. Eng. Technol., vol. 3, no. 3, pp. 1403–1406, 2016.

18. G. I. J. Salentijn, P. E. Oomen, M. Grajewski, and E. Verpoorte, “Fused Deposition Modeling 3D Printing for (Bio)analytical Device

Fabrication: Procedures, Materials, and Applications,” Anal. Chem., vol. 89, no. 13, pp. 7053–7061, 2017. 19. E. Soriano Heras, F. Blaya Haro, J. M. de Agustín del Burgo, M. Islán Marcos, and R. D’Amato, “Filament advance detection sensor for

fused deposition modelling 3D printers,” Sensors (Switzerland), vol. 18, no. 5, 2018.

20. M. Stopka, R. Kohár, P. Weis, and J. Šteininger, “Concept of modular 3D printer construction,” IOP Conf. Ser. Mater. Sci. Eng., vol. 393, p. 012092, 2018.

21. A. Daniel and V. Christian, “Improvements to control system of a multi-extruder 3D printer using a controller duet card,” 2017 Congr.

Int. Innov. y Tendencias en Ing. CONIITI 2017 - Conf. Proc., vol. 2018–Janua, pp. 1–6, 2018. 22. H. L. Oo, K. Z. Ye, and Y. H. Linn, “Modeling and Controlling of Temperature in 3D Printer ( FDM ),” IEEE, pp. 1738–1742, 2018.

23. A. Patil, B. Patil, R. Potwade, A. Shinde, and R. Shinde, “Design and Development of FDM Based Portable 3D Printer,” Int. J. Sci. Eng.

Res., vol. 8, no. 3, pp. 116–120, 2017. 24. P. Zeleny and V. Ruzicka, “The Design of The 3D Printer for Use in Gastronomy,” MM Sci. J., vol. d, no. 1, pp. 1668–1673, 2017.

25. Y. Xie, Y. Tan, G. Ma, J. Zhang, and F. Zhang, “Design and Implementation of Chocolate 3D Printer,” DEStech Trans. Comput. Sci.

Eng., no. itms, 2017. 26. M. Alimanova, A. Zholdygarayev, A. Tursynbekova, and D. Kozhamzharova, “Overview of a Low-cost Self-Made 3D Food Printer,”

IEEE, vol. 0, 2017.

27. E. Acosta, “Laser Printhead Concept Design For a 3D Moving Platform,” California State University, 2017. 28. X. Chen, X. Liu, P. Childs, N. Brandon, and B. Wu, “A Low Cost Desktop Electrochemical Metal 3D Printer,” Adv. Mater. Technol., vol.

2, no. 10, 2017.

29. S. Han, Y. Xiao, T. Qi, Z. Li, and Q. Zeng, “Design and Analysis of Fused Deposition Modeling 3D Printer Nozzle for Color Mixing,” Adv. Mater. Sci. Eng., vol. 2017, 2017.

30. E. Koc, “Investigation of Heat Sink Geometry Effect On Cooling Performance For A FDM 3D Printer Liquefier,” Internaational Conf.

603-614

Page 78: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

Energy Therm. Eng., no. March 2018, pp. 569–573, 2017.

31. L. Maria and E. Piperi, “Extruder head thermal analysis for an open- source 3D printer,” 1st Int. Conf. Eng. Entrep. Proc., no. December,

2017. 32. J. Q. Oberhauser, “Design, Construction, Control, and Analysis of Linear Delta Robot,” Ohio University, 2016.

33. B. Hoy, “Design and Implementation of a Three- Dimensional Printer Using a Cylindrical Printing Process,” San Luis Obispo, 2016.

34. K. H. Lin, C. Y. Shen, J. L. Du, G. Y. Wang, H. M. Chen, and J. D. Tseng, “A design of constant temperature control system in 3D

printer,” 2016 IEEE Int. Conf. Consum. Electron. ICCE-TW 2016, pp. 30–31, 2016.

35. C. T. Hsieh, “Development of an integrated system of 3D printer and laser carving,” Proc. Tech. Pap. - Int. Microsystems, Packag.

Assem. Circuits Technol. Conf. IMPACT, no. 84, pp. 420–423, 2016. 36. G. Wang, L. Yao, W. Wang, J. Ou, C.-Y. Cheng, and H. Ishii, “xPrint: A Modularized Liquid Printer for Smart Materials Deposition,”

Proc. 2016 CHI Conf. Hum. Factors Comput. Syst. - CHI ’16, pp. 5743–5752, 2016.

37. Z. Pilch, J. Domin, and A. Szlapa, “The impact of vibration of the 3D printer table on the quality of print,” 2015 Sel. Probl. Electr. Eng. Electron. WZEE 2015, 2015.

38. W. Gao, Y. Zhang, D. C. Nazzetta, K. Ramani, and R. J. Cipra, “RevoMaker: Enabling Multi-directional and Functionally-embedded 3D

printing using a Rotational Cuboidal Platform,” Proc. 28th Annu. ACM Symp. User Interface Softw. Technol. - UIST ’15, pp. 437–446, 2015.

39. M. H. Ali, N. Mir-Nasiri, and W. L. Ko, “Multi-nozzle extrusion system for 3D printer and its control mechanism,” Int. J. Adv. Manuf.

Technol., vol. 86, no. 1–4, pp. 999–1010, 2015. 40. S. R. Rupanagudi, V. G. Bhat, K. R. V. R. Savarni, S. Bharadwaj, and V. N. P. Prasuna, “A novel automatic low cost cutting machine-

cum-3D printer using an image processing based control,” in 2015 IEEE Bombay Section Symposium: Frontiers of Technology: Fuelling

Prosperity of Planet and People, IBSS 2015, 2015. 41. B. E. Ayodele, “Modeling of FDM 3D Printing For Improved Performance,” A & M University-Kingsville, 2015.

42. G. Kallevik, “Designing a 5-axis 3D printer,” University of Oslo, 2015.

43. R. Celi, A. Sempértegui, D. Morocho, D. Loza, D. Alulema, and M. Proaño, “Study, Design and Construction of a 3D printer implemented through a Delta Robot,” IEEE, vol. 30, no. 9–10, pp. 622–627, 2015.

44. H.-X. Wu, Z.-H. Yu, H. Zhang, Z.-S. Yang, and Y. Wang, “Method for monitoring of FDM 3D printer failure based on acoustic

emission,” Zhejiang Daxue Xuebao (Gongxue Ban)/Journal Zhejiang Univ. (Engineering Sci., vol. 50, no. 1, pp. 78–84, 2014. 45. S. E. Hudson, “Printing Teddy Bears: A Technique for 3D Printing of Soft Interactive Objects,” in CHI 2014, Proceedings of the SIGCHI

Conference on Human Factors in Computing Systems, 2014, pp. 459–468.

46. R. Bartoš, “Design of Heated Print Bed For FDM 3d Printer With F.E.M,” BRNO University of Technology, 2014. 47. David W. Eld, “Ultra Affordable Rapid Prototyping : Creation and Setup of an Experimental Fabrication Machine,” University of Idaho,

2014.

48. J. Dvoracek, “A Distribution of Temperature Field in the Fdm Printhead,” New Technol. Manuf., vol. 2, no. 1, pp. 1–5, 2011. 49. N. I. Jaksic, “What to do when 3D printers go wrong: Laboratory Experiences,” in 122nd ASEE Annual Conference & Exposition, 2015,

no. June 2015, p. 26.1730.1-26.1730.11.

50. R. Song and C. Telenko, “Material Waste of Commercial FDM Printers under Realstic Conditions,” Proc. 27th Annu. Int. Solid Free. Fabr. Symp., no. 2015, pp. 1217–1229, 2016.

51. K. Kumar, S. C. Sai, S. Galla, and V. Sri, “Measurement of Surface Defects in 3D Printed Models,” 2016.

110.

Authors: P. Srinivasa Rao, P. Manoj Kumar, G. Tirupathi Naidu

Paper Title: Study the Impact of Blast Load on G+7 Multistoried RCC Structure with Varied Distances

Abstract: Nowadays, due to increased terrorist activity throughout the world, Blasts have been taking place

irrespective of the location. In order to withstand such blasts, the structure should be designed such a way that the

detailing and grade of concrete should be improvised. This current study includes the behaviour of G+7 multi

storied structure subjected to 100 kg TNT explosion which is assumed to be taken place at 10 m, 20 m, 30 m and

40 m away from the structure. As per IS 4991:1968, Blast Pressures are calculated manually and executed in

STAAD Pro tool. The results of Blast loads on structure is compared in its static condition and redesigned the

structure to sustain the Blast loads.

Keywords: Blast, Tri Nitro Toluene, Blast Pressures, Explosion, STAAD Pro

References: 1. Aditya C, Snehal V. and Mevada V.,Comparative Study of Response of Structures Subjected to Blast and Earthquake loading.

International Journal of Engineering Research and Applications,6(5),62-66, (2016).

2. Aditya Kumar singhand Saha P., Behaviour of Reinforced Concrete Beams under Different Kinds of Blast Loading, International Journal of Civil Engineering Research, 5(1),13-20, (2014).

3. Amol B and Potnis S.C., Blast Analysis of Structures. International Journal of Engineering Research and Technology, 2(7), 2120-2126,

(2013). 4. Aswin Vijay and Subha K. A Review on Blast Analysis of Reinforced Concrete Viaduct Pier, International Research Journal of

Engineering and Technology, 4(3), 986-991, (2013).

5. BhosaleS.D. and SuryawanshiY.R., Dynamic Behaviour of Frame Structure subjected to Blast loading. International Advanced Reasearch Journal in Science, Engineering and Technology, 3(8),245-249, (2016).

6. Deependra Nayakand Vinay Kumar singh.,Analysis the Behaviour of Composite Concrete Structure Subjected to Blast Load.

International Journal for Scientific Research and Development, 5(7), 208-211, (2017). 7. Deshmukh C.M.and PiseC.P., Behaviour of RCC Structural Members for Blast Analysis. International Journal of Engineering Research

and Application, 6(11), 48-53, (2016).

8. Meganadh M and Reshma T. Blast Analysis and blast resistant design of RCC residential building. International Journal of Civil Engineering and Technology, 8(3), 761 – 770, (2017).

9. Paresh Tank and Parikh K., Study of Blast Load on Industrial structure. International Journal of Advance Engineering and Reasearch

Development, 2(2), 256-259, (2015). 10. Prajanaand Deepthishree Aithal., Parametric Study of Multi Storey Buildings for Blast Load. International Journal of Advance Research,

Ideas and Innovations in Technology.

11. Suresh Kumar M.P., and Siva Kumar M., Blast Resistant Structure. International Journal for Scientific Research and Development, 3(8), 815-820, (2015).

12. Swami Gaikwad and Shirsath M.N., Study of Blast Analysis for Structural Building. International Research Journal of Engineering and

Technology, 4(7), 987-99, (2017). 13. Zeynep Koccaz, and Faith Sutcu., Architectural and Stuctural Design for Blast Resistant Buildings. World Conference on Earth Quake

engineering.

615-621

111. Authors: D Narasimha Rao, P Srinivasa Varma

Page 79: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

Paper Title: Fractional Order-PID Controlled Closed-loop MLI based DP-FC for Fourteen-Bus System

Abstract: This work manages improvement of time response in fourteen- bus-framework utilizing MLI based

Distributed Power Flow Controller (DP-FC)with PI and FOPID which is made out of a Distributed Power Flow,

new gadget inside the group of FACTS. The DP-FC has a similar control capacity as the UP-FC, however with

much lower cost and higher unwavering quality. This effort tends to one of the utilizations of the DP-FC to

Compensate Voltage list in Transmissions Systems. Fourteen-bus-framework with ordinary VSI and with nine-

level-MLI based DP-FC is mimicked and their outcomes are exhibited. Closed-loop-fourteen bus-framework With

PI &FOPID-controllers are mimicked and the dynamic reaction shows that FOPID-controlled-DP-FC produces

better reaction when-make-out with-PI-controlled-DP-FC.

Keywords: About four key words or phrases in alphabetical order, separated by commas.

References: 1. GudaPriyanka,-K.Jaghannath,-D.Kumara Swamy, “-A-facts-device: distributed power flow controller(DP-FC)”,international research

journal of advanced engineering& science-ISSN-2455-9024, Volu-1, Issue-3, pp-95-102, 2016.

2. RashmiRaghav, AshrafRaza, Mohammad Asim,”Distributed power flow controller – an improvement of unified powe flow controller”, International-jour of Advance –Engi.& Research Develop, Volu-2,Issu- 5, May-2015.

3. MengluGao;AihongTang;YongHuang ; QiushiXu;Hongsheng Zhao ;XuZheng,“Research on the interaction between the series inverters of

distributed power flow controller, 2017-Interna,Conf.on-Industrial Informatics Computing Technology, Intelligent Technology, Industrial Information Integration (ICI-ICII) Year:2017,Page- 313 – 316.

4. SandeepR. Gaigowal ;M.M.Renge, “Distributed power flow controller using single phase DSSC to realize active power flow control

through transmission line”, 2016 Interna.Confe., on Computation o f Power, Energy Information & Commuincation(ICC-PEIC) -April- 2016.

5. GayathriReddy ; I.KumarSwamy,“Analyzing the performance of distributed power flow controller in transmission system”,2017 Intern

Conf. on intelligent Computing & Control Systems(IC-ICCS)-2017 Page-1196 – 1199 6. G.MadhusudhanaRao ;V.AnweshaKumar ; B.V.SankerRam,“Design of a neural network based distributed power flow controller(DP-FC)

for power system stability”, Inter. Conf, on Signal Processing, Communication, Power& Embedded System (SCO-PES) DOF 5-Oct-2016.

7. V.AnanthaLakshmi ; T.R.Jyothsna,“ Mitigation of voltage & current variations due to three phase fault in a single machine system using distributed power flow controller”, 2016 Intern ,Confe ,on Electrical, Electronics,& Optimization Technique- (IC-EEOT) DOC-: 5-Mar-

2016

8. MonikaSharma ; Annapurna Bhargava ;-Pinky Yadav,“Oscillation Damping with DP-FC Using Optimization Techniques”,-2016 Intern..,Conf on micro electronics & telecommunication engineering(ICM-ETE) 2016 , Page- 343 - 348

9. S.Vadivel, B.Baskaran, “Distributed power flow controller(DP-FC) to improve the power quality of thirty three bus radial system”,

intern.,jour.., of engin..,inventions issn-2278-7461, Volu-5, Issue-10 (Nov-2016)-PP- 31-44 10. Ahmad Jamshidi, S.Masoud Barakati & M.Moradi Ghahderijani, “Impact of distribute power flow controller to improve power quality

based on synchronous reference frame method”, IACSIT Intern..,-jour..,of Engi..,& Tech, Vol-4, No-5, Oct -2012.

11. K.S.Srikanth, “Design & implementation- of new DP-FC to control power quality” Int.- J.Chem.Sci.14(4), 2016, Pg 2066-2074 ISSN-0972-768.

12. Kuldeep Sain, Aakash Saxena, MR-Farooqi,” Analysis of distributed power flow controller in power system network for improving

power flow control”, Indonesian Journal of Electrical Engin..,& Computer Science Vol-2, No-3,Jun-2016, pp-510 - 521. 13. Meghana MC,Shruthi N, ThejarajuYB, VishnuSB, “Application of distributed power flow controller in power system to mitigate voltage

sag&swell”, ISSN (PRINT) 2320 – 8945, Vol -4, Issue -3, 2016.

14. AnjuAntony, Geevarghese Kurian Mathew,“ A comparative study on power quality improvement in a hybrid system using DVR & STATCOM vs. distributed power flow controller (DP-FC)’, International Research Journal of Engg & Tech(IRJET) Volu-3 Issue: 09 -

Sep-2016.

15. Gaurav V.Waghulde, Prasad D. Kulkarni, “Implementation of distributed power flow controller to improve power quality for 220kv transmission line”, International Journal of advanced research in electrical, electronics & instrumentation Engineering , Vol-4, Issue-7,

July-2015

16. NikitaGupta, Vahadood Hasan, “Comparison of performance of distributed power flow controller(DP-FC)& unified power flow controller( UPFC)”, International Journal of Advance Engineering & Research Development Volu-2, Issue-4, Apr- 2015.

17. V.Sudheer Kumar1 , RajaReddy.Duvvuru, “Enhancement of distributed power flow controller during series converter failures”,

International Journal of Innovative research in electrical &electronics instrumentation & control engineering ,vol-4,issu-11,nov-2016 18. Ch.RangaRao, N.HariCharan & K.RajeshBabu, “Modelling & simulation of DP-FC system for power quality improvement”, International

Journal of Electrical & Electronics engineering research (IJEEER)-ISSN (P): 2250-155X; ISSN (E): 2278-943X Vol-5, Issu-3,Jun-

2015,Pg 61-66. 19. M. BinduSahithi , Y.Vishnu Murthulu , “power quality enhancement & mitigation of voltage sag using DP-FC”, International Journal of

Engineering . Trends & Technology (IJETT) Vol-40 Num-5 Oct-2016.

20. P.Ramesh, M.DamodaraReddy, “ Optimal placement of distributed power flow controller for loss reduction using firefly& genetic

algorithm”, IJRET:-International Journal of Research in Engineering & Technology Volume-04 Issue- 09 Sept-2015.

622-627

112.

Authors: Sudha Dukkipati, P Siva Shankar, A V G A Marthanda

Paper Title: A Novel Approach for Power Factor Controller Design

Abstract: Industries facing problem of low power factor (P.F) is very common and so are the efforts at improving

it through various methods. In general shunt capacitor banks are used to improve the power factor and these banks

are located very near and down the final transformer. Attempts will be to maintain the P.F as close to unity as

possible. Switching operation of capacitors in a P.F control panel can be achieved by the micro-controller. But it

may be very involved and difficult task to write and achieve a running and successful programme on micro-

controller for all the power factor values in demand from the same panel. In this work the design procedure of a

programme usable in a micro-controller is shown. This is achieved in/and through a lab tool of simulation and can

be done also through similar tools. P.F control devices doing switching operation of capacitors can also be used.

But they have associated complexity, extra cost, extra efforts at design and finally limitations imposed by the

device in power handling. Hence, the present choice of avoiding P.F Controller may be better. The implicit

instructions derived from the use of the lab tool implemented as required through the use of this programme can

simplify and be extended easily to wide ranges of power handling leading to energy savings.

Keywords: Power Factor, Micro controller, Switched capacitor panel, Shunt capacitor banks, Lab tool simulation

628-631

Page 80: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

devices

References: 1. en.wikipedia.org/wiki/Power_factor_correction.

2. RamasamyNatarajan (2005). “Power System Capacitors.” Boca Raton, FL: Taylor & Francis.

3. T.J.E.MILLER, 1982. “Reactive Power Control in Electric Systems” 1982 by Jihn Wiley & Sons Inc.

4. IEEE Guide for the Protection of Shunt Capacitors Banks.

5. A.S pabla, “Electric Power Distribution” (Fourth edition) Tata McGraw-Hill Publishing Company Limited. 6. William D. Stevenson, Jr, “Elements of Power System Analysis” (Third edition) 1955, 1962, 1975 by McGraw-Hill, Inc.

7. R.S.ARORA. “Handbook of Electrical Engineering.” 2004. (Fourth edition), New Delhi.

8. http://www.electricaltechnology.org/2013/11/how-to-calculate-suitable-capacitor-size-for-power-factor-improvement.html 9. V.K Mehta and Rohit Mehta, “Principles of power system”, S. Chand & Company Ltd, Ramnagar, Newdelhi-110055, 4th Edition,

Chapter, 6.

10. Stephen, J. C. (1999). “Electric Machinery and Power System Fundamentals.” 3rd.ed. United State of America: McGraw-Hill Companies, Inc.

11. Introduction to NI-LabVIEW

12. www.ni.com/nationalinstruments

113.

Authors: Robert Ambunda, Marion Sinclair

Paper Title: Effect of Two-Lane Two-Way Rural Roadway Design Elements on Road Safety

Abstract: Road design elements are some of the key factors influencing road user behaviour and road safety on

roads worldwide. The study developed fatal crash predictive Negative Binomial Regression (NBR) models that

identified statistically significant relationships between the combination of road design elements (radii and number

of horizontal curves, hard shoulder widths, traffic operating speeds, road length and access control) selected for the

study and the fatal crashes rates on the selected roads on the Namibian rural road network. The crash predictive

NBR models developed indicated that the combination of the various selected road design elements had significant

influence on the fatal crash rates, with various correlation magnitudes on roads with various lane widths. The study

results brought to the fore the impact that interactions between selected road design elements has on existing road

design and maintenance methods in Namibia. The NBR fatal crash models will assist transportation engineers in

identifying hazardous road sections and implementing the appropriate remedial measures to reduce crash risk

levels sustainably.

Keywords: Crash modelling; fatal crashes; negative binomial regression; road design elements; road safety

References: 1. Abele, L. and Møller, M. (2011) ‘The Relationship between Road Design and Driving Behavior’, RSS 2011: Road Safety and Simulation

2011 Conference, 2012, pp. 1–16. Available from:

http://scholar.google.com/scholar?hl=en&btnG=Search&q=intitle:THE+RELATIONSHIP+BETWEEN+ROAD+DESIGN+AND+DRIVI

NG+BEHAVIOR#1%5Cnhttp://scholar.google.com/scholar?hl=en&btnG=Search&q=intitle:The+Relationship+between+Road+Design+a

nd+Driving+Behavior#1. (Accessed: 10 November 2017).

2. Ahmed, I. (2013) ‘Road Infrastructure and Road Safety’, Transport and Communications Bulletin for Asia and the Pacific, (83), pp. 19–25.

3. Alsubeai, A. M. (2017) Evaluating the Interactive Effects of Traffic Volumes and Access Density on Crash Frequency. South Dakota

State University. 4. Ben-Bassat, T. and Shinar, D. (2011) ‘Effect of shoulder width, guardrail and roadway geometry on driver perception and behavior’,

Accident Analysis and Prevention. Elsevier Ltd, 43(6), pp. 2142–2152. Available from: doi: 10.1016/j.aap.2011.06.004. (Accessed: 24

July 2018). 5. Čičković, M. (2016) ‘Influence of Human Behaviour on Geometric Road Design’, Transportation Research Procedia, 14(0), pp. 4364–

4373. Available from: doi: 10.1016/j.trpro.2016.05.358. (Accessed: 12 May 2017).

6. Dehuri, A. N. (2013) Impacts of Roadway Condition , Traffic and Manmade Features on Road Safety, Asian Journal of Civil and Road Engineering. India National Institute of Technology.

7. Deller, J. (2013) ‘The influence of road design speed, posted speed limits and lane widths on speed selection: a literature synthesis’, in

Australasian Transport Research Forum, p. 14p. Available from: http://www.atrf.info/papers/2013/index.aspx. (Accessed: 06 June 2017). 8. Dwikat, M. G. (2014) Modeling Relationship between Geometric Design Consistency and Road Safety for Two-Lane Rural Highways in

the West Bank. An- Najah National University.

9. Easa, S. M., Dong, H. and Li, J. (2007) ‘Use of Satellite Imagery for Establishing Road Horizontal Alignments’, Journal of Surveying Engineering, 133(1), pp. 29–35. Available from: doi: 10.1061/(ASCE)0733-9453(2007)133:1(29). (Accessed: 19 May 2017).

10. Garber, N. J. and Hoel, L. a (2009) Traffic and Highway Engineering. Fourth, Cengage Learning. Fourth. Edited by H. Gowans. Toronto,

Canada: Nelson Education Ltd. Available from: doi: 10.1061/(ASCE)HY.1943-7900.0000746 (Accessed: 11 August 2017). 11. Garcia, R. and Abreu, L. (2016) ‘Road safety in rural roads of two lanes’, RevistaIngenieria De Construccion, 31(1), pp. 54–60.

12. Gaudry, M. and Vernier, K. (2002) ‘Effects of road geometry and surface on speed and safety’, Accident Analysis & Prevention 34.3,

34(November 2002), pp. 357–365. 13. Hagenzieker, M. P., Commandeur, J. J. F. and Bijleveld, F. D. (2014) ‘The history of road safety research: A quantitative approach’,

Transportation Research Part F: Traffic Psychology and Behaviour. Elsevier Ltd, 25(PART B), pp. 150–162. Available from: doi: 10.1016/j.trf.2013.10.004. (Accessed: 22 March 2018).

14. Iyinam, A., Iyinam, S. and Ergun, M. (1997) ‘Analysis of relationship between highway safety and road geometric design elements:

Turkish case’, Faculty of Civil Engineering, Turkey. Available from: http://www.trafficforum.ethz.ch/vwt_2003/beitraege/vwt19proceedings_contribution_91.1-91.8.pdf. (Accessed: 09 November 2017).

15. Jaiswal, A. and Bhatore, A. (2016) ‘Effect on Road Safety by Roadway condition, traffic and manmade features’, International Journal of

Latest Trends in Engineering and Technology, 7(3), pp. 41–48. Available from: doi: 10.21172/1.73.006. (Accessed: 14 July 2018). 16. Joanne, M. (2013) RAP Road Risk Mapping Manual : Design Specification.

17. Karlaftis, M. G. and Golias, I. (2002) ‘Effects of Road Geometry and Traffic Volumes on Rural Roadway Accident Rates’, Accident

Analysis and Prevention, 34(3), pp. 357–365. Available from: doi: 10.1016/S0001-4575(01)00033-1. (Accessed: 21 November 2017).

18. Karlaftis, M. G. and Golias, I. (2009) ‘Impacts of Roadway Condition , Traffic and Manmade Features on Road Safety’, International

Journal of Civil Engineering & Technology, 4(July), pp. 19–25. Available from: doi: 10.1061/(ASCE)HY.1943-7900.0000746.

(Accessed: 17 September 2017).

19. Krug, E. and Sharma, G. (2009) ‘Risk factors for road traffic injuries’, AsociatiaVictimelorAccidentelor de Circulatie din Romania, 7(2),

pp. 23–39.

632-637

Page 81: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

20. Mohammed, H. (2013) ‘The Influence of Road Geometric Design Elements on Highway Safety’, International Journal of Civil

Engineering & Technology, 4(4), pp. 146–162.

21. Othman, S. and Thomson, R. (2007) ‘Influence of Road Characteristics on Traffic Safety’, in ESV 20th Conference. Lyon, pp. 1–10. 22. Persia, L., Usami, D., De Simone, F. and Yannis, G. (2016) ‘Management of Road Infrastructure Safety’, Transportation Research

Procedia. Elsevier B.V., 14, pp. 3436–3445. Available from: doi: 10.1016/j.trpro.2016.05.303. (Accessed: 13 June 2018).

23. Porter, R., Donnell, E. and Mason, J. (2012) ‘Geometric Design, Speed, and Safety’, Transportation Research Record: Journal of the

Transportation Research Board, 2309, pp. 39–47. Available from: doi: 10.3141/2309-05. (Accessed: 15 June 2017).

24. Taylor, M. C., Lynam, D. A. and Baruya, A. (2000) ‘The effect of drivers’ speed on the frequency of road accidents’, Transportation

Research Laboratory, p. 56. Available from: doi: 10.1051/ matecconf 2016 00 / 47 3 04. (Accessed: 16 November 2017). 25. Vayalamkuzhi, P. and Amirthalingam, V. (2016) ‘Influence of geometric design characteristics on safety under heterogeneous traffic

flow’, Journal of Traffic and Transportation Engineering (English Edition). Elsevier Ltd, 3(6), pp. 559–570. Available from: doi:

10.1016/j.jtte.2016.05.006. (Accessed: 13 May 2018). 26. Woolley, J. E., Dyson, C. B., Taylor, M., Zito, R. and Stazic, B. (2002) ‘Impacts of Lower Speed Limits in South Australia’, IATSS

Research. International Association of Traffic and Safety Sciences, 26(2), pp. 6–17. Available from: doi: 10.1016/S0386-1112(14)60038-

8. (Accessed: 26 July 2017). 27. Yingxue, Z. (2009) ‘Analysis of the Relation between Highway Horizontal Curve and Traffic Safety’, 2009 International Conference on

Measuring Technology and Mechatronics Automation, ICMTMA 2009, 3, pp. 479–481. Available from: doi:

10.1109/ICMTMA.2009.511. (Accessed: 22 February 2017).

114.

Authors: Manmohan Shukla, B. K. Tripathi

Paper Title: Inversion ofcomplex Neural Network

Abstract: This paper presents a novel application of complex neural network which has been modeled by the

implementation of gradient descent inversion algorithm in complex domain. The methods reported prior to this

work were limited to real domain only. By the learning of function mapping in complex domain, the performance

of neural network has been analyzed. An improved performance of complex neural network has resulted in the

development of a Novel Complex Neuron Model.

Keywords: inversion, complex-valued neural network, gradient descent search and activation function.

References: 1. H. Leung and S. Haykin, “The Complex Backpropagation Algorithm”, IEEE Trans.On Signal Processing, Vol. 39, No. 9, September

(1991).

2. G. M. Georgiou and C. Koutsougeras, “Complex Domain Backpropagation”, IEEE Trans. on Circuits and Systems-II : Analog and

Digital Signal Processing, Vol 39, No. 5, May (1992). 3. N. Benvenuto and F. Piazza, “On the Complex Backpropagation Algorithm”, IEEE Trans. On Signal Processing, Vol. 40, No. 4, April

(1992).

4. T. Nitta, “A Back-propagation Algorithm for Neural Networks Based on 3D Vector Product”, Proc. of 1993 International Joint Conference on Neural Networks.

5. S. Lee and R. M. Kil, “Inverse Mapping of Continuous Functions Using Local and Global Information”, IEEE Tran. on Neural Networks, Vol. 5, No. 3, May(1994).

6. T. Nitta, “A Quaternary Version of the Back-propagation Algorithm”, ICNN 1995.

7. S. Jankowski, A. Lozowski and J. Zurada, “Complex-Valued Multistate Neural Associative Memory”, IEEE Trans. on Neural Networks, Vol. 7, No. 6, November 1996.

8. C.You and D. Hong, “Adaptive Equalization Using the Complex Backpropagation Algorithm”, IEEE International Conference on

Neural Networks, Vol. 4, Jun 1996 9. T. Nitta, “An Extension of the Back-Propagation Algorithm to Complex Numbers”, Neural Networks, Vol. 10, No. 8, 1997.

10. M. H. Hassoun, Fundamentals of Artificial Neural Networks, New Delhi, Prentice Hall of India, 1998.

11. C. A. Jensen, R. D. Reed, R. J. Marks, M. A. El-sharkawi, J. Jung, R. T. Miyamoto, G. M. Anderson and C. J. Eggen, “Inversion of Feedforward Neural Networks: Algorithms and Applications”, Proceedings of the IEEE, Vol. 87, No. 9, September(1999).

12. C. Lin and C. Li, “A sum-of-product neural network (SOPNN)”, Neurocomputing, 2000.

13. T. Nitta, “An Analysis of the Fundamental Structure of Complex-Valued Neurons”, Neural Processing Letters12, pp.239-246, 2000. 14. T. Nitta, “Generalization of the Complex-valued Neural Networks with the Orthogonal Decision Boundary”, KES 2002.

15. C. Igel and M. Husken, “Improving the Rprop Learning Algorithm”, Proc. of the Second International Symposium on Neural

Computation, pp. 115-121, 2000. 16. M. Sinha, P. K. Kalra and K. Kumar, “Parameter estimation using compensatory neural networks”, Sadhana, Vol. 25, April 2000.

638-641

115.

Authors: K. Naga Lakshmi Prasanna, B. Murali Krishna, SK. Sadiya Shireen, A. Poorna Chander Reddy

Paper Title: FPGA Based Convolutional Encoder for GSM-900 Architecture

Abstract: This paper presents one of the most popular current techniques of enhancing the reliability, accuracy

and security in data communication systems i.e., error-correcting codes such as convolutional codes. To correct

and decode the errors that occur during data transmission on communication channels by introducing some

redundancy in their encoding. In advanced wireless communication, reliability and accuracy are two main

constraints of hand held devices such as mobile phones. Now a days, mobile phones uses wireless standards such

as Code Division Multiple Access (CDMA), Global System for Mobile Communication (GSM) for

communication purpose. Apart from above constraints quality of service and security are highly desirable. The

proposed architecture implemented for convolutional encoder GSM-900 by using XOR free approach

methodology with a required constraint length (K=5) and a data transmission code rate (R=1/2) using Xilinx 14.7

ISE software. The convolutional encoder for GSM-900 architecture verified on Nexys2 1200E Field

Programmable Gate Array (FPGA).

Keywords: Convolution Encoder, Error Control Codes, Field Programmable Devices (FPGA) and Global System

for Mobile Communication (GSM), Linear Feedback Shift Register (LFSR) and XOR free approach.

References: 1. J. Dielissen, Eindhoven, N. Engin, S. Sawitzki, and K. van Berkel, “Multistandard FEC Decoders for wireless devices,” IEEE Trans.

Circuits Syst. II, Exp. Briefs, vol. 55, no. 3, pp. 284–288, 2008.

642-650

Page 82: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

2. G. Purohit, K. S. Raju, V. K. Chaubey, “A New XOR-Free Approach for implementation Convolutional Encoder” IEEE embedded

systems letters, vol. 8, no. 1, March 2016.

3. J. Hagenauer, “Forward error correcting for CDMA systems,” in Proc .Int. Symp. Spread Spectr. Tech. Appl. Proc., Mainz, Sep. 1996, pp.566–569.

4. R. Pasko, P. Schaumont, V. Derudder, S.Vernalde, and D. Durackova, “A new algorithm for Elimination of common

subexpressions,”IEEE Trans. Comput. Des. Integr. Circuits Syst., vol. 18, no. 1, pp. 58–68, Jan. 1999. C. [5] Huang, J. Li, and M. Chen,

“Optimizing XOR-based codes,” U.S. Patent 8209577 B2, Jun. 26, 2012.

5. J. Viterbi, “Convolutional codes and their performance in communication systems,”IEEE Trans. Comm. Technol., vol. 19, no. 5, pp.751–

772, Oct. 1971. 6. Y.Yibin, K.Roy, and R.Drechsler, “Power consumption in XOR based circuits,” in Proc.ASP-DAC, pp. 299–302, Jan.1999.

Huang, J. Li, and M. Chen, “Optimizing XOR-based codes,” U.S. Patent 8209577 B2, Jun. 26, 2012.

7. G. Purohit, K. S. Raju, V. K. Chaubey, “XOR-Free Implementation of Convolutional Encoder for Reconfigurable Hardware “Hindwai, vol. 8, no. 1, Jan 2016.

8. R. Mohan and P. P. Chakrabarti, “Factorizing FSM’s with modify and restore method,” IEEE Transactions on Circuits and Systems II:

Analog and Digital Signal Processing, vol.44, No. 5, pp. 371–377, 1997. 9. R. J. McEliece and L. Onyszchuk, “The extended invariant factor algorithm with application to the Forney analysis of convolutional

codes,” in Proceedings of the IEEE International Symposium on Information Theory, p. 142, San Antonio, Tex, USA, January 1993.

10. S.Devdas and A. R. Newton, “Decomposition and factorization of sequential finite State machines,” IEEE Transactions on Computer-Aided Design, vol. 8, no. 11, pp.1206–1217, 1989.

11. G. D. Forney Jr., “Convolutional codes I: algebraic structure,” IEEE Transactions on Information Theory, vol. 16, no. 6, pp. 720–738,

1970. 12. G.D. Forney Jr., “Convolutional codes. II. Maximum-likelihood decoding,” Information and Computation, vol. 25, pp. 222–266, 1974.

13. G.De Micheli, R. K. Brayton, and A. Sangiovanni-Vincentelli, “Optimal state assignment for finite state machines,” IEEE Transactions on

Computer-Aided Design of Integrated Circuits and Systems, vol. 4, no. 3, pp. 269–284, 1985. 14. M. J. Avedillo, J. M. Quintana, and J. L. Huertas, “State merging and state splitting via state assignment: a new FSM synthesis

algorithm,” IEE Proceedings—Computers and Digital Techniques, vol. 141, no. 4, pp. 229–237, 1994.

15. P. Ashar, S. Devadas, and A. R. Newton, “Optimum and heuristic algorithms for an approach to finite state machine decomposition,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 10, no. 3, pp. 296–310,1991.

116.

Authors: M.V.S. Ram Prasad, B. Suribabu Naick, Zaamin Zainuddin Aarif

Paper Title: Design and Implementation of High Speed 16-Bit Approximate Multiplier

Abstract: A multiplier extensively impact on the postpone and strength intake of an arithmetic processor. The

accurate results are not usually required in many packages, like records processing and virtual signal processing

(DSP). Therefore, the layout of multipliers is in particular centered on speed and power consumption. These

parameters are specially finished by way of approximate multipliers. In this paper a new 16 bit approximate

multiplier is designed. The partial merchandise of the proposed multiplier are revised and re organized to introduce

varying probability phrases. The complexities of the addition of those partial merchandise are reduced based at the

possibility. Synthesis results show that the proposed multiplier achieves higher velocity and power consumption in

comparison to the preceding precise multiplier

Keywords: Approximate computing, Compressors, multiplier

References: 1. J. Han and M. Orshansky."Approximate Computing: An Emerging Paradigm For Energy-Efficient Design." In approaches of the eighteenth

IEEE European Test Symposium, Avignon, France, May 2013, pp.1-6.

2. J. Liang, J. Han and F. Lombardi."New measurements for the unwavering best of envisioned and probabilistic adders."IEEE Trans. PCs.

Vol.Sixty two, no.9, pp.1760-1771, Sept. 2013. 3. Momeni, J. Han, P. Montuschi and F. Lombardi."Structure and Analysis of Approximate Compressors for Multiplication." IEEE Trans. PCs,

vol.64, no.4, pp. 984-994, Apr. 2015.

4. C.H. Lin and I.C. Lin. "High exactness estimated multiplier with blunder treatment." In Proc. ICCD'thirteen: In the 2013 IEEE thirty first International Conference on Computer Design (ICCD). Asheville, NC, USA, Oct. 2013, pp. 33-38.

5. K. Bhardwaj, P.S. Maneand J. Henkel. "Power-and territory talented Approximate Wallace Tree Multiplier for blunder versatile

frameworks." In Sym. ISQED'14: In fifteenth International Symposium on Quality Electronic Design (ISQED), Santa Clara, CA, USA. Blemish. 2014, pp. 263-269.

6. S. Narayanamoorthy, H.A. Moghaddam, Z. Liu, T. Park, N.S. Kim, "Vitality Efficient Approximate Multiplication for Digital Signal

Porcessing and Classificaiton Applications." IEEE Trans. Large Scale Integration Systems (VLSI), vol.23, no.6, pp.1180-1184, Jun. 2015. 7. M.S. Lau, K.V. Ling and Y.C. Chu. "Vitality conscious probabilistic multiplier: shape and exam." In Proceedings of the 2009 typical

assembly on Compilers, engineering, and amalgamation for inserted frameworks, Grenoble, France, Oct. 2009, pp.281-290.

651-654

117.

Authors: Vikram Gupta, Sarvjit S. Bhatia

Paper Title: Reliable Cloud Based Framework for the Implementation of ERP

Abstract: Universally, technological innovations act as engine of growth for the developing economy.

Technological revolutions act as an accelerator to enhance the economy worldwide. In the present scenario the

technology has considerably impacted different aspects of life so that the business environment has changed

thoroughly. Simply granting the access to the similar technologies utilized by the large business houses will

flourish the business of small scale industries. As result flexibility, scalability, adaptability, availability, cost

efficiency characteristics will be attained by adopting the innovation i.e. cloud based ERP in the organizations.

Adopting Cloud based ERP system offers highly scalable, reliable, on-demand services with agile management

capabilities on an as-needed basis. The present work is based on the concepts of social sciences and latest trends of

information technology. In the framework, Diffusion of Innovation (DOI) theory and Technology-Organization-

Environment (TOE) framework are synthesized. The framework examines and validates various social,

technological, organizational and environmental factors that impact the cloud based ERP adoption. All these

factors have significant impact on the adoption. The findings will propose practical recommendations to the

successful adoption of cloud based ERP.

Keywords: Cloud Computing, DOI, Enterprise Resource Planning, IaaS, PaaS, SaaS, TOE.

655-661

Page 83: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

References: 1. Yusuf Y., Gunasekaran A., "Enterprise information systems project implementation: a case study of ERP in Rolls-Royce", International

Journal of Production Economics 87 (3) (2004) 251-266 2. I. Saini, A. Khanna and V. Kumar, "ERP Systems: Problems and Solution with Special Reference to Small & Medium Enterprises",

International Journal of Research in IT & Management 2(2) (2012) 715–725.

3. Gupta, V., Bhatia, S., S. "Cloud Computing: An Operational Framework in Implementation of ERP", International Journal of Advanced Research in Computer Science and Software Engineering 7(2) (2017)164-169.

4. Rogers, E.M., "Diffusion of innovations (5th Ed.)", The Free Press, New York, 2003.

5. Saunders, M., Thornhill, A. & Lewis P. "Research methods for business students (5th Ed.)", Financial Times/ Prentice Hall, Harlow, 2009.

6. Zikmund, WG, Babin, BJ, Carr, JC & Griffin, M (2013). "Business research methods, 9th edn", South-Western, Cengage Learning,

USA. 7. Williams B., Brown, T. & Onsman A., "Exploratory factor analysis: a five step guide for novices", Australasian Journal of Paramedicine

8(3) 1-13 (2010).

8. Hair J., Black W., Babin B., & Anderson R. "Multivariate Data Analysis: Global Edition (7th Ed.)", Pearson, Upper Saddle River, 2010. 9. Chin W.W., "Issues and Opinion on Structural Equation Modeling", MIS Quarterly 22(1) vii-xvi (1998).

10. George D., Mallery P., "IBM SPSS Statistics 23 Step by Step: A Simple Guide and Reference (14th Ed.)", (2016).

118.

Authors: S. Sandhya Rani, K. Kumar Naik

Paper Title: Analysis of Circular Patch Antenna with Complementary Split Ring Resonator on Ground Plane

Abstract: A complimentary split ring resonator (CSRR) defected ground structured Circular Patch Antenna is

proposed for WiMAX applications. Rectangular slits are loaded on circular patch with CSRR on ground plane for

better impedance matching and enhanced gain. The proposed antenna is designed using High Frequency Structural

Simulator (HFSS) and Computer Simulation Technology (CST) simulation tools. The proposed rectangular slit

loaded circular patch antenna resonates at 8.5GHz and 8.54 GHz frequencies for HFSS and CST simulator with

return loss of -26.39dB and -33.8 dB respectively. The maximum gain is observed as 8.29dBi and 8.17dBi for both

HFSS and CST simulators.

Keywords: Circular patch antenna, CSRR, WiMAX application.

References: 1. Chandra Bhan , Ajay Kumar Dwivedi, Brijesh Mishra and Anil Kumar, “ Quad Bands U-Shaped Slot Loaded Probe Fed Microstrip

Patch Antenna,” Second International Conference on Advances in Computing and Communication Engineering , pp. 409 – 412, 2015.

2. Mohamed A. , Islam Md. Rafiqul , Sarah Yasmin and K. Badron, “ Design of a quintuple band microstrip patch antenna using multiple

L-Slots,” 2016 International Conference on Computer and Communication Engineering (ICCCE), pp. 30-35, 2016. DOI: 10.1109/ICCCE.2016.20.

3. Partha P. Shome, Taimoor Khan and Rabul H. Laskar, “ A state‐of‐art review on band‐notch characteristics in UWB antennas,” Int J

RF Microw Comput Aided Eng. 2018. https://doi.org/10.1002/mmce.21518.

4. Naimur Rahman, Mohammad Tariqul Islam, Zulfiker Mahmud and Md Samsuzzaman, “ The broken-heart printed antenna for Ultra wideband applications: Design and characteristics analysis,” IEEE Antennas and Propagation Magazine, Vol. 60, Issue 6, pp. 45-51,

2018.

5. Budhadeb Maity, “ Design of dual band L-slot microstrip patch antenna for wireless communication,” International Conference on Computer Communication and Informatics (ICCCI), pp. 1 – 4, 2017. DOI: 10.1109/ICCCI.2017.8117769.

6. Gopinath Samanta, Debasis Mitra , Sekhar Ranjan and Bhadra Chaudhuri, “ Miniaturization of a patch antenna using circular reactive

impedance substrate,” Int J RF Microw Comput Aided Eng. 2017 https://doi.org/10.1002/mmce.21126 7. Sk Nurul Islam, Mukesh Kumar, Gobinda Sen and Santanu Das, “ Design of a compact triple band antenna with independent frequency

tuning for MIMO applications, “ Int J RF Microw Compt Aided Eng. 2018. https://doi.org/10.1002/mmce.21620.

8. L.S.Yang, L.Yang, Y.A.Zhu, Kuniaki Yoshitomi and HaruichiKanaya, “ Polarization reconfigurable slot antenna for 5.8 GHz wireless applications,” AEU-International Journal on Electronics and Communications, Volume 101, pp. 27-32, mar 2019.

https://doi.org/10.1016/j.aeue.2019.01.022

9. Kwok Kan So, Kwai Man Luk and Chi Hou Chan, “ A High- Gain Circularly Polarized U- Slot Patch Antenna Array [Antenna Designers Notebook],” IEEE Antennas and Propagation Magazine, Vol. 60, Issue 5, pp. 147-153, 2018.

10. Som Pal Gangwar , Kapil Gangwar and Arun Kumar, “ A compact microstrip patch antenna with five circular slots for wideband

applications,” 2018 3rd International Conference on Microwave and Photonics (ICMAP), pp. 1 – 2, 2018. 11. Daniel Colles and Dean Arakaki, “Multi-technique broadband microstrip patch antenna design2014,” IEEE Antennas and Propagation

Society International Symposium (APSURSI) , pp. 1879 – 1880, 2014.

12. Mahrukh Khan and Deb Chatterjee, “ Analysis of reactive loading in a U-slot Microstrip patch using the theory of characteristics modes

[Antenna Applications Corner],” IEEE Antennas and Propagation Magazine, Vol. 60, Issue 6, pp. 88- 97, 2018.

662-665

119.

Authors: Amit Verma, Manish Prateek

Paper Title: T-NOT Gate : A Novel Circuit based on Ternary Logic

Abstract: In this paper a novel circuit for the t-NOT gate is proposed using op-amp 741 IC and the basis AND

and OR binary gate. Proposed circuit is based on the concept of ternary logic, where the term ternary means three

logic that is 0, 1 and 2 instead of traditional two logic 0,1 (binary). As the ternary logic can be the altenate for the

radix 2 that is binary logic to reduce the transition delay, enhance the processing speed, reduce the memory

requirement, reduce circuit complexity and number of electronic components The truth table, symbol and state

transition diagram is also presented in the paper. Which show that t-NOT gate is a unary gate that takes single

input and provide the next immediate logic in clockwise cyclic direction as the output as shown in the state

transition diagram mention in the paper. Further the standard working of op-amp 741 IC is discussed, the actual

voltmeter reading for various input voltages greater than the upper limit +VCC is presented in tabular format.

Simulation of the binary AND and OR gate is carried out using proteus to prove that the current binary AND, OR

gate can be used as MIN and MAX gate for logic circuits of higher radix. Here the MIN and MAX logic means the

gate giving the minimum and maximum voltage as the output voltage among the various input voltages.

Keywords: op-amp 741 IC, ternary, multi-valued logic.

666-671

Page 84: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

References: 1. Charles M Allen and Donald D Givone. A minimization technique for multiple-valued logic systems. IEEE Transactions on Computers,

(2):182–184, 1968. 1 2. Robert W Keyes. The evolution of digital electronics towards vlsi. IEEE Journal of Solid-State Circuits, 14(2):193–201, 1979. 1

3. Shweta S Dawley and Pradnya A Gajbhiye. Design and comparative analysis of binary and quaternary logic circuits. In Futuristic Trends

in Research and Innovation for Social Welfare (Startup Conclave), World Conference on, pages 1–6. IEEE, 2016. 1 4. Zvonko G Vranesic and Kenneth C Smith. Engineering aspects of multi-valued logic systems. Computer, 7(9):34–41, 1974. 1, 2

5. Noboru Takagi and Kyoichi Nakashima. Discrete interval truth values logic and its application. IEEE Transactions on Computers,

49(3):219– 229, 2000. 1 6. Daniel Etiemble. On the performance of multivalued integrated circuits: past, present and future. IEICE Transactions on Electronics,

76(3):364– 371, 1993. 1

7. Prabhakara C Balla and Andreas Antoniou. Low power dissipation mos ternary logic family. IEEE Journal of Solid-State Circuits, 19(5):739– 749, 1984. 1, 2

8. Kenneth C Smith. The prospects for multivalued logic: A technology and applications view. IEEE Transactions on Computers, (9):619–

634, 1981. 1 9. Brian Hayes. Computing science: Third base. American scientist, 89(6):490–494, 2001. 1

10. Ben Choi. Advancing from two to four valued logic circuits. In Industrial Technology (ICIT), 2013 IEEE International Conference on,

pages 1057–1062. IEEE, 2013. 1 11. Peter N Marinos. Fuzzy logic and its application to switching systems. IEEE Transactions on Computers, 100(4):343–348, 1969. 1

12. Tomoyuki Araki, Hisayuki Tatsumi, Masao Mukaidono, and Fujio Yamamoto. Minimization of incompletely specified regular ternary

logic functions and its application to fuzzy switching functions. In ismvl, page 289. IEEE, 1998. 1 13. Joel Berman and Masao Mukaidono. Enumerating fuzzy switching functions and free kleene algebras. Computers & mathematics with

applications, 10(1):25–35, 1984. 1

14. Tsutomu Sasao. Ternary decision diagrams. survey. In Multiple-Valued Logic, 1997. Proceedings., 1997 27th International Symposium on, pages 241–250. IEEE, 1997. 1

15. Melvin A Breuer. A note on three-valued logic simulation. IEEE Transactions on Computers, 100(4):399–402, 1972. 1

16. Miron Abramovici, Melvin A Breuer, and Arthur D Friedman. Digital systems testing and testable design, volume 2. Computer science press New York, 1990. 1

17. Yukihiro Iguchi, Tsutomu Sasao, and Munehiro Matsuura. A method to evaluate logic functions in the presence of unknown inputs using

lut cas-cades. In Multiple-Valued Logic, 2004. Proceedings. 34th International Symposium on, pages 302–308. IEEE, 2004. 1 18. Petr Hajek,´ Kamila Bendova,´ and Zdenekˇ Renc. The guha method and the three-valued logic. Kybernetika, 7(6):421–435, 1971. 1

19. Masao Mukaidono. Regular ternary logic functions? ternary logic func-tions suitable for treating ambiguity. IEEE transactions on

computers, 20. (2):179–183, 1986. 1, 2

21. Sheng Lin, Yong-Bin Kim, and Fabrizio Lombardi. Cntfet-based design of ternary logic gates and arithmetic circuits. IEEE transactions

on nanotechnology, 10(2):217–225, 2011. 1, 2 22. CR Mingoto. A quaternary half-adder using current-mode operation with bipolar transistors. In Multiple-Valued Logic, 2006. ISMVL

2006. 36th International Symposium on, pages 15–15. IEEE, 2006. 1

23. Alex Heung and HT Mouftah. Depletion/enhancement cmos for a lower power family of three-valued logic circuits. IEEE Journal of Solid-State Circuits, 20(2):609–616, 1985. 1, 2

24. Sheng Lin, Yong-Bin Kim, and Fabrizio Lombardi. A novel cntfet-based ternary logic gate design. In Circuits and Systems, 2009.

MWSCAS’09. 52nd IEEE International Midwest Symposium on, pages 435–438. IEEE, 2009. 1

25. A Srivastava and K Venkatapathy. Design and implementation of a low power ternary full adder. VLSI Design, 4(1):75–81, 1996. 1, 2

26. TN Rajashekhara and I-SE Chen. A fast adder design using signed-digit numbers and ternary logic. In Southern Tier Technical

Conference, 1990., Proceedings of the 1990 IEEE, pages 187–194. IEEE, 1990. 1 27. LS Phanindra, MN Rajath, V Rakesh, and KS Vasundara Patel. A novel design and implementation of multi-valued logic arithmetic full

adder circuit using cntfet. In Recent Trends in Electronics, Information & Communication Technology (RTEICT), IEEE International

Conference on, pages 563–568. IEEE, 2016. 1 28. HT Mouftah. A study on the implementation of three-valued logic. In Proceedings of the sixth international symposium on Multiple-

valued logic, pages 123–126. IEEE Computer Society Press, 1976. 1 29. HT Mouftah and KC Smith. Injected voltage low-power cmos for 3-valued logic. In IEE Proceedings G-Electronic Circuits and Systems,

volume 129, pages 270–272. IET, 1982. 2

30. HT Mouftah and IB Jordan. Integrated circuits for ternary logic. In Proc. 1974 Int. Symp. Multiple-Valued Logic, pages 285–302, 1974. 2

31. HT Mouftah and KC Smith. Design and implementation of three-valued logic systems with mos integrated circuits. In IEE Proceedings

G-Electronic Circuits and Systems, volume 127, pages 165–168. IET, 1980. 2 32. Alex Heung and HT Mouftah. Decmos—a low power family of three-valued logic circuits for vlsi implementation. In Proc. ISMVL-84,

pages 120–124, 1984. 2

33. HT Mouftah, ANC Heung, and LMC Wong. Qtc-1 a cmos ternary computer. In Proc. ISMVL-84, pages 125–132, 1984. 2 34. HT Mouftah and IB Jordan. Design of ternary cos/mos memory and sequential circuits. IEEE transactions on computers, (3):281–288,

1977. 2

35. John Barkley Rosser and Atwell R Turquette. Many-valued logics. 1954. 2 36. Zvonko G Vranesic and V Carl Hamacher. Ternary logic in parallel multipliers. The Computer Journal, 15(3):254–258, 1972. 2

37. C-Y Wu and H-Y Huang. Design and application of pipelined dynamic cmos ternary logic and simple ternary differential logic. IEEE

journal of solid-state circuits, 28(8):895–906, 1993. 2 38. HT Mouftah and AI Garba. Vlsi implementation of a 5-trit full adder. In IEEE Proceedings G-Electronic Circuits and Systems, volume

131, pages 214–220. IET, 1984. 2

39. Jie Deng and H-S Philip Wong. A compact spice model for carbon-nanotube field-effect transistors including nonidealities and its applica-tion—part i: Model of the intrinsic channel region. IEEE Transactions on Electron Devices, 54(12):3186–3194, 2007. 2

40. Stephen Cole Kleene, NG de Bruijn, J de Groot, and Adriaan Cornelis Zaanen. Introduction to metamathematics, volume 483. van

Nostrand New York, 1952. 2 41. Yoshinori Yamamoto and Masao Mukaidono. Meaningful special classes of ternary logic functions-regular ternary logic functions and

ternary majority functions. IEEE transactions on computers, 37(7):799–806, 1988. 2

42. Masao Mukaidono. On the mathematical structure of the c-type fail safe logic. IEICE Trans. Electron., 52(12):812–819, 1969. 2 43. Michael Yoeli and Shlomo Rinon. Application of ternary algebra to the study of static hazards. Journal of the ACM (JACM), 11(1):84–

97, 1964. 2

120.

Authors: Hee-Dong Park

Paper Title: Design and Implementation of u-Health System to Support Interoperability with Legacy Non-Standard

Medical Devices

Abstract: Although there have been worldwide studies on u-Health services to converge the latest IT

technologies into the medical field, there are still limitations to compatibility and interoperability with existing 672-676

Page 85: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

legacy non-standard medical devices. This paper proposes a u-Health system architecture to utilize legacy non-

standard medical devices for standard u-Healthcare services by adding a codec and algorithms to IEEE 11073

agent. The proposed agent located between medical devices and mobile manager encodes non-standard data of

legacy devices to IEEE 11073 standard data format and decodes vice versa using the developed codec and

algorithms, which makes it possible to support data compatibility and interoperability between u-Health standard

systems and non-standard systems. The proposed system is implemented by using Intel Edison board and android-

based smartphone to verify performance and effectiveness of the proposed system. The implementation results

show that legacy non-standard medical devices can be utilized for the u-Health standard services based on the

IEEE 11073 PHD protocol by using the proposed system, which means that the proposed system can contribute to

the growth and extension of u-Health services by solving the problem of service limitations caused by existing

legacy non-standard devices.

Keywords: Agent, Interoperability, IEEE 11073, Legacy non-standard medical devices, Mobile manager, u-

Health.

References: 1. The Institute of Electrical and Electronics Engineers, ISO/IEEE 11073-20601 Standard for Health Informatics-Personal Health Device

Communication-Application Profile-optimized Exchange Protocol, ISO/IEEE 11073-20601, 2014.

2. The Institute of Electrical and Electronics Engineers, ISO/IEEE 11073-20702 Standard for Health Informatics-Point-of-care medical

device communication—Part 20702: Medical devices communication profile for web services, ISO/IEEE 11073-20702, 2018. 3. Health Level 7 International, Available:

http://www.hl7.org

4. The DICOM Standard PS3.1 2019a, Available: http://dicomstandard.org

5. ZigBee Alliance, ZigBee Wireless Sensor Applications for Health, Wellness and Fitness, 2009. Available:

https://www.zigbee.org 6. Malcolm Clarke, Joost de Folter, Vivek Verma, Hulya Gokalp, “Interoperable End-to-End Remote Patient Monitoring Platform Based on

IEEE 11073 PHD and ZigBee Health Care Profile,” IEEE Transactions on Biomedical Engineering, Vol. 65, Issue 5, 2018, pp. 1014-125.

7. T. H. Laine, C. Lee, H. Suk, “Mobile Gateway for Ubiquitous Health Care System Using ZigBee and Bluetooth," 2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014, pp. 139-145.

8. M. Carke, "Developing a Standard for Personal Health Devices Based on 11073," Proceeding of IEEE EMBS Conference, pp. 6174-6176,

2007. 9. Egner, F. Moldoveanu, N. Goga, A. Moldoveanu, V. Asavei, and A. Morar, “Enhanced Communication Protocol for ISO/IEEE 11073-

20601,” Universitatea Politehnica Bucuresti Scientific Bulletin, Series C, Vol. 75, Issue 2, pp. 3-16, 2013.

10. J.C. Nam, W.K. Seo, J.S. Bea, and Y.Z. Cho, “Design and Development of Personal Healthcare System Based on IEEE 11073/HL7 Standards Using Smartphone,” The Journal of Korean Institute of Communications and Information Sciences, Vol. 36, No. 12, pp. 1556-

1564, 2011.

11. J.Y. Lee, Y.R. Jeong, H.D. Park, “Development of Open H/W-Based IEEE 11073 Agent and Manager for Non-Standard Health Devices,” Journal of Korea Multimedia Society, Vol. 19, No. 3, March 2016, pp. 595-602.

12. ISO/IEC 8824-1:2008 Information Technology Abstract Syntax Notation One: Specification of Basic Notation, 2008.

13. H.H. Do, J.M. In, and S.K. Lee, “Implementation of ASN.1 Converter for Applying ISO/IEEE 11073 MDER,” Korean Institute of Information Technology, Vol. 10, No. 4, pp. 19-30, 2012.

14. ISO/IEEE 11073-20101:2004-Health Informatics-Point-of-Care Medical Device Communication-Part 20101: Application Profiles Base

Standard, 2004.

121.

Authors: Shaikh Afroz Fatima Muneeruddin, Fabiha Fathima, Sameera Iqbal Muhammad Iqbal

Paper Title: Correlative Band Mapping for Multi Spectral Image Fusion

Abstract: This paper presents the process of image fusion, based on spectral correlative property. In the process

of image fusion, frequency domain image fusions are more effective in coding compared to spatial domain fusion.

In the process of frequency based fusion coding, wavelet approach is used in various formats to obtain spectral

resolution and a fusion mapping is derived to map these resolution information. Wherein, spectral based fusion

approach has higher significance of image coding accuracy, the resolution code overhead is observed. It is seen

that, for larger resolution information’s, the retrieved accuracy of fusions higher, however the processing

coefficients are large in count. To overcome this processing overhead issue, a new approach based on correlative

band mapping approach is proposed. The evaluation result for the proposed approach illustrates a higher accuracy

in fusion region prediction and mapping accuracy.

Keywords: Image Fusion, Hierarchical Modeling, correlative band mapping approach, wavelet coding.

References: 1. M. Canaud, A.Nabavi, C.Becarie, D.Villegas and N-E El Faouzi,, “A realistic case study for comparison of data fusion and assimilation

on an urban network – The Archipel Platform”, Transportation Research Procedia Vol.6, pp.28-49, Elsevier, 2015.

2. Zheng Youzhi, Qin Zheng, “Objective Image Fusion Quality Evaluation Using Structural Similarity”, Tsinghua Science and Technology,

Vol.14, No.6, pp.703-709, IEEE, 2009. 3. Yifang Ban, and Alexander Jacob, “Object-Based Fusion of Multitemporal Multiangle ENVISAT ASAR and HJ-1B Multispectral Data

for Urban Land-Cover Mapping”, IEEE Transactions on Geo-science and Remote Sensing, Vol. 51, No. 4, IEEE, 2013.

4. Yang Oua, Dai GuangZhia, “Color Edge Detection Based on Data Fusion Technology in Presence of Gaussian Noise”, Procedia Engineering, Vol.15, Pp.2439–2443, Elsevier, 2011.

5. Li Dapeng, “A novel method for multi-angle SAR image matching”, Chinese Journal of Aeronautics, Vol.28, pp. 240–249 Elsevier, 2015.

6. Changtao He, Quanxi Liu, Hongliang Li, Haixu Wang, “Multimodal medical image fusion based on IHS and PCA”, Procedia Engineering, Vol.7, pp.280–285 Elsevier, 2010.

7. Yong Yang, “A Novel DWT Based Multi-focus Image Fusion Method”, Procedia Engineering, Vol.24, pp.177–181, Elsevier, 24, 2011.

8. QifanWanga, ZhenhongJiaa, XizhongQina, JieYangb, YingjieHuc, “A New Technique for Multispectral and Panchromatic ImageFusion”,

Vol.24, pp. 182–186, Elsevier, 2011.

9. LIU Fu, LI Jin, Huang Caiyun, “Image Fusion Algorithm Based on Simplified PCNN in Non-sub-sampled Contour let Transform

Domain”, Vol.29, 1434–1438, Elsevier, 2012

677-685

Page 86: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

10. Fengrui Chena, Fen Qina, GuangxiongPengb, Shiqiang Chena, “Fusion of Remote Sensing Images Using Improved ICA Mergers Based

on Wavelet Decomposition”, Vol.29, Pp. 2938–2943, Elsevier, 2012.

11. Youdong Ding, Cai xi, Xiaocheng Wei, Jianfei Zhang, “A New Framework for Image Completion Based on ImageFusion Technology”, Vol.29, Pages 3826–3830, Elsevier, 2012.

12. Tao Wu, Xiao-Jun Wu, Xiao-Qing Luo, “A Study on Fusion of Different Resolution Images”, Vol.29, pp. 3980–3985, Elsevier, 2012.

13. LU Heli, QIN Yaochen, ZHANG Lijun, LU Chaojun, LU Fengxian, “A Case Study of Model-Based Satellite Image Fusion”, Vol.37, pp.

268–273, Elsevier, 2012.

14. C.T.Kavitha, C.Chellamuthu, R.Rajesh, “Medical image fusion using combined discrete wavelet and ripplet transforms”, Vol.38,pp. 813–

820, Elsevier, 2012. 15. C.T.Kavitha, C.Chellamuthu, R.Rajesh, “Multimodel medical image fusion using discrete ripplet transform and intersecting cortical

model”, Vol.38, pp. 1409-1414, Elsevier, 2012.

16. Pierre Lassalle, JordiInglada, Julien Michel, “A Scalable Tile-Based Framework forRegion-Merging Segmentation”, IEEE Transactions on Geoscience and Remote Sensing, Vol.53, pp. 5473 – 5485, IEEE, 2015.

17. Bibo Lu, Hui Wang, Chunli Miao, “Medical Image Fusion with Adaptive Local Geometrical Structure and Wavelet Transform”, Vol.8,

pp. 262–269, Elsevier, 2011. 18. Sourav Pramanik, Swagati kaPrusty, Debotosh Bhattacharjee , Piyush Kanti Bhunre, “A Region-to-Pixel Based Multi-sensor Image

Fusion”, Vol.10, pp. 654–662, Elsevier, 2013.

19. Deng Minghuia,Zeng Qingshuanga and Zhang Lanying, “Research on Fusion of Infrared and Visible Images Based on Direction let Transform”, Vol.3, pp. 67–72, Elsevier, 2012.

20. A. AnoopSuraj, Mathew Francis, T.S. Kavya, T.M. Nirmal, “Discrete wavelet transform based image fusion and de-noising in FPGA”,

Vol.1, pp. 72–81, Elsevier, 2014. 21. Shaikh Afroz Fatima Muneeruddin, “Visual Improvements in Color Image Processing Using Regularized Filtration”, American

International Journal of Research in Science, Technology, Engineering & Mathematics, 10(3), March-May, 2015, pp. 277-283

22. Wentao Yao, Zhidong Deng, “A Robust Pedestrian Detection Approach Based on Shape let Feature and Haar Detector Ensembles”, Tsinghua Science and Technology, Vol.13 pp. 314-322, IEEE, 2012.

122.

Authors: K.Suresh Kumar, Y.Rajasree Rao, K.Manjunathachari

Paper Title: Low Power Fault Free Coding Design for Cam Interface

Abstract: In the design modeling of a CAM interface, the controlling and access operation defines the

performance of memory interfacing. In a CAM application, data stored in the Memory units are mapped to a given

query input and an output is developed as a match signal to which as decision is made. in the process of CAM

operation, to obtain a faster matching and low power consumption, a new search approach and pattern alignment

logic is defined. To improve the storage capacity of a CAM unit, a multi page interface is proposed. To the defined

unit a new fault tolerance approach is integrated for a reliable, low power and fast processing CAM application.

Keywords: CAM unit, low power, fast search, high volume, fault tolerant.

References: 1. A. V. Aho and M. J. Corasick, “Efficient string matching: An AID to bibliographic search,” Commun. ACM, vol. 18, no. 6, pp. 333–

340, 1975.

2. Derek Pao1, Wei Lin2,1, and Bin Liu, “Pipelined Architecture for Multi-String Matching”, IEEE Computer Architecture Letters Vol.

7, 2008.

3. M. Alicherry, M. Muthuprasanna, and V. Kumar, “High speed address matching for network IDS/IPS,” in Proc. IEEE Int. Conf. Netw. Protocols (ICNP), 2006, pp. 187–196.

4. B. Brodie, R. Cytron, and D. Taylor, “A scalable architecture for high-throughput regular-expression address matching,” in Proc. 33rd

Int. Symp. Comput. Arch. (ISCA), 2006, pp. 191–122. 5. Z. K. Baker and V. K. Prasanna, “High-throughput linked-address matching for intrusion detection systems,” in Proc. Symp. Arch.

For Netw. Commun. Syst. (ANCS), Oct. 2005, pp. 193–202.

6. Y. H. Cho and W. H. Mangione-Smith, “A address matching co-processor for network security,” in Proc. 42ndIEEE/ACM Des. Autom. Conf., Anaheim, CA, Jun. 13–17, 2005, pp. 234–239

7. Y. H. Cho and W. H. Mangione-Smith, “Fast reconfiguring deep packet filter for 1+Gigabyte Network,” in Proc. 13th Ann. IEEE

Symp. Field Program. Custom Comput. Mach. (FCCM), 2005, pp. 215–224 8. C. R. Clark and D. E. Schimmel, “Scalable address matching on high speed networks,” in Proc. 12th Ann. IEEE Symp. Field Program.

Custom Comput. Mach. (FCCM), 2004, pp. 249–257.

9. Ali, M., Welzl, M., Hessler, S. and Hellebrand, S. (2007) ‘An efficient fault tolerant mechanism to deal with permanent and transient failures in a network on chip’, Int. J. High Performance Systems Architecture, Vol. 1, No. 2, pp.113–123

10. Dou, W., Miao, S. and Li, Y. (2015) ‘Fault-tolerant parallel computing for DEM data blocks with layered dependent relationships based

on redundancy mechanism’, Int. J. High Performance Computing and Networking, Vol. 8, No. 4, pp.337–344. 11. S. Dharmapurikar and J. Lockwood, “Fast and scalable address matching for content filtering,” in Proc. Symp. Arch. for Netw.

Commun. Syst. (ANCS), Oct. 2005, pp. 183–192.

12. E. C. Oh and P. D. Franzon, ‘‘Design considerations and benefits of three-dimensional ternary content addressable memory,’’ in Proc. IEEE Custom Integr. Circuits Conf., 2007,pp. 591–594.

13. D. Bhattacharya, A. Bhoj, and N. Jha,‘‘Design of efficient content addressable memories in high-performance FinFET technology,’’

IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 23, no. 5,pp. 963–967, May 2015. 14. A. McAuley and P. Francis, ‘‘Fast routingtable lookup using CAMs,’’ in Proc. IEEE12th Annu. Joint Conf. IEEE Comput.Commun.

Soc., Netw.: Found. Future,1993, vol. 3, pp. 1382–1391. 15. F. Yu, R. Katz, and T. Lakshman,‘‘Gigabit rate packet pattern-matchingusing TCAM,’’ in Proc. 12th IEEEInt. Conf. Netw. Protocols,

Oct. 2004,pp. 174–183.

16. K. Eshraghian, ‘‘Memristormos contentaddressable memory (MCAM): Hybridarchitecture for future high performancesearch engines,’’ IEEE Trans. Very LargeScale Integr. (VLSI) Syst., vol. 19, no. 8,pp. 1407–1417, Aug. 2011.

17. Q. Guo, X. Guo, Y. Bai, and E. Ipek,‘‘A resistive TCAM accelerator fordata-intensive computing,’’ in Proc. 44thAnnu. IEEE/ACM Int.

Symp. Microarchitect.,2011, pp. 339–350. 18. K.Suresh Kumar, Y.Rajasree Rao, K. Manjunathachari, “Fast Map- Addressing for Content Addressable Memories using Register

Reconfiguration”, 5th IEEE International Conference on Communication and Signal, 2016.

19. K.Suresh Kumar, Y.Rajasree Rao, K. Manjunathachari, “Low-Power Correlative Register Sequencing for Content Addressable Memory”, International Journal of Engineering Studies (IJES) Vol 8, 2016.

20. K.Suresh Kumar, Y.Rajasree Rao, K. Manjunathachari, “A Fault Tolerance Approach For Multi-Page Content Addressable Memory”,

4th IEEE International Conference on Innovations in Information, Embedded And Communication Systems(ICIIECS-2017), March

2017.

21. K.Suresh Kumar, Y.Rajasree Rao, K. Manjunathachari, “ Robust Fault Tolerance In Content Addressable Memory Interface”, IOSR

Journal of VLSI And Signal Processing (IOSR-JVSP), Volume 7, Issue 3, Ver. I, May 2017.

686-692

Page 87: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

23. K.Suresh Kumar, Y.Rajasree Rao, K. Manjunathachari, “Address Mapping in Content Addressable Memory Interface With a Low

Power Approach”, International Journal of Engineering Research and Development(IJERD), Volume 13, Issue 12, Ver I, December,

2017

123.

Authors: Gouse Baig Mohammad, U Ravi Babu

Paper Title: RCAC: A Secure and Privacy Preserving RFID based Cloud-Assisted Access Control to IoT Integrated

Smart Home

Abstract: With the emergence of Internet of Things (IoT), smart and intelligent applications are being developed.

One of the key enabling technologies of IoT is Radio Frequency Identification (RFID). RFID uniquely identifies

all connected devices and things in an IoT use case like smart home which may be part of smart city use case in

turn. Therefore IoT applications are implicitly made RFID critical. Thus ensuring security and privacy in RFID

communications is indispensable for sustainable growth in such applications. With respect to smart home access

control, there might be privacy attacks since RFID carries sensitive information of users. Cyber criminals may

target to destroy critical digital infrastructure. RFID authentication is made large scale in IoT integrated

applications. Therefore, it is essential to have cloud-assisted solution. With cloud integration, RFID authentication

reaps benefits of cloud such as scalability, availability and fault tolerance at server side. Nevertheless, cloud is

untrusted environment from user point of view and vulnerable to attacks. Therefore there is need for secure and

privacy preserving RFID based authentication mechanism. Such system should be able to prevent both internal and

external attacks. The mechanisms found in literature are using various schemes to implement security. However,

consideration of probability of internal attacks solicits a new model for enhancing security in smart home use case.

Towards this end, we proposed a secure and privacy preserving framework to safeguard interests of all

stakeholders of the use case as far as security is concerned. The framework is known as RFID based Cloud-

assisted Access Control (RCAC). It enables secure communications among parties involved in access control

mechanism. It is lightweight, secure, privacy preserving and prevents external and internal attacks. Amazon EC2 is

used as cloud platform to evaluate the framework. Experimental results are encouraging and RCAC shows

performance improvement over the state of the art.

Keywords: Radio Frequency Identification, Internet of Things, RFID based authentication, cloud assisted RFID

authentication

References: 1. Muhammad RaisulAlam, M. B. I. Reaz and M. A. Mohd Ali.(2012). A Review of Smart Homes – Past, Present, and Future. IEEE

Transactions on Systems Man and Cybernetics Part C, p1-16. 2. Pardeep Kumar, AnBraeken, Andrei Gurtov, JariIinatti and Phuong Hoai Ha. (2017). Anonymous Secure Framework in Connected

Smart Home Environments. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY.12 (4), p968-979. 3. José L. Hernández · M. Victoria Moreno · Antonio J. Jara · Antonio F. Skarmeta. (2014). A soft computing based location-aware access

control for smart buildings. 3, p1-16. 4. Joseph Bugeja, Andreas Jacobsson and Paul Davidsson. (2016). On Privacy and Security Challenges in Smart Connected Homes

. European Intelligence and Security Informatics Conference, p172-175. 5. Min Chen, Jiafu Wan, Sergio Gonz´alez, Xiaofei Liao and Victor C.M. Leung. (2014). A Survey of Recent Developments in Home

M2M Networks. IEEE COMMUNICATIONS SURVEYS & TUTORIALS.16 (1), p98-114. 6. ProsantaGope, Ruhul Amin, S.K. Hafizul Islam, Neeraj Kumar, Vinod Kumar Bhalla .(2017). Lightweight and privacy-preserving

RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment. ELSEVIER,

p1-10. 7. Kuan Zhang, Jianbing Ni, Kan Yang, Xiaohui Liang, JuRen, and Xuemin (Sherman) Shen. (2017). Security and Privacy in Smart City

Applications: Challenges and Solutions. IEEE, p122-129. 8. JORDI MONGAY BATALLA, ATHANASIOS VASILAKOS AND MARIUSZ GAJEWSKI. (2017). Secure Smart Homes:

Opportunities and Challenges. ACM Computing Surveys.50 (5), p1-32. 9. Christos Stergioua , Kostas E. Psannis, Byung-GyuKimb, Brij Gupta. (2018). Secure integration of IoT and Cloud

Computing. ELSEVIER.78, P964–975. 10. Mung Chiang and Tao Zhang. (2016). Fog and IoT: An Overview of Research Opportunities. IEEE INTERNET OF THINGS JOURNAL.3

(6), P854-864. 11. Abdul Samada, PrashantMurdeshwar, ZohaibHameed. (2010). High-credibility RFID-based animal data recording system suitable for

small-holding rural dairy farmers. ELSEVIER.73, P213–218. 12. Wei Xie1 , Lei Xie2 , Chen Zhang1 , Quan Zhang1 and Chaojing Tang. (2013). Cloud-based RFID Authentication . IEEE International

Conference on RFID, p168-175. 13. Terence. K. L. Huia, R. Simon Sherratta , Daniel D´ıazS´anchez. (2015). Major Requirements for Building Smart Homes in Smart Cities

based on Internet of Things Technologies, p1-20. 14. Parikshit N. Mahalle, BayuAnggorojati, Neeli R. Prasad and Ramjee Prasad. (2013). Identity Authentication and Capability Based Access

Control (IACAC) for the Internet of Things. Journal of Cyber Security and Mobility. 1, p 309–348. 15. Dieter Uckelmann, Mark Harrison and Florian Michahelles. (2011). Architecting the Internet of Things, p1-378. 16. Dr. V. Bhuvaneswari and Dr. R Porkodi. (2014). The Internet of Things (IoT) Applications and Communication Enabling Technology

Standards: An Overview. International Conference on Intelligent Computing Applications, p324-329. 17. PallaviSethi and Smruti R. Sarangi. (2017). Internet of Things: Architectures, Protocols, and Applications. Journal of Electrical and

Computer Engineering, p1-26. 18. Benjamin Khoo. (2014). RFID - from Tracking to the Internet of Things: A Review of Developments. IEEE, p1-9. 19. Jing Liu and Yang Xiao and C. L. Philip Chen . (2012). Authentication and Access Control in the Internet of Things . 32nd International

Conference on Distributed Computing Systems Workshops, p588-592. 20. Mian Ahmad Jan, Priyadarsi Nanda, Xiangjian He, Zhiyuan Tan and Ren Ping Liu. (2014). A Robust Authentication Scheme for

Observing Resources in the Internet of Things Environment. IEEE, p1-8. 21. SRAVANI CHALLA1 , MOHAMMAD WAZID1 , ASHOK KUMAR DAS, NEERAJ KUMAR, ALAVALAPATI GOUTHAM

REDDY3 , EUN-JUN YOON4 , AND KEE-YOUNG YOO. (2017). Secure Signature-Based Authenticated Key Establishment Scheme

for Future IoT Applications. IEEE. Translations and content mining are permitted for academic research onl. 5, p3028-3043. 22. MuhamedTurkanovic, BoštjanBrumen, Marko Hölbl. (2014). A novel user authentication and key agreement scheme for heterogeneous

ad hoc wireless sensor networks, based on the Internet of Things notion. ELSEVIER.20, p96–112. 23. Alessandra Rizzardi a , Sabrina Sicaria,n , Daniele Miorandi b , Alberto Coen-Porisini . (2016). AUPS: An Open Source AUthenticated

Publish/Subscribe system for the Internet of Things. ELSEVIER.62, p29–41. 24. Son N. Han, Noel Crespi. (2017). Semantic service provisioning for smart objects: Integrating IoT applications into the

693-700

Page 88: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

web. ELSEVIER.76, p180–197. 25. Yudai Komori, Kazuya Sakai, Satoshi Fukumoto, Fast and Secure Tag Authentication in Large-Scale RFID Systems Using Skip Graphs,

Computer Communications (2017), doi: 10.1016/j.comcom.2017.11.008.

124.

Authors: Vani Garikipati, N Naga Malleswara Rao

Paper Title: Secured Cluster Based Distributed Fault Diagnosis Routing for MANET

Abstract: Mobile Ad-hoc Network (MANET) has become very crucial for many industrial applications. It is

dynamic in nature. Due to its mobility and resource constrainedness and dynamic topology, MANET is vulnerable

to many attacks. Therefore it is indispensable to have secure and efficient communications in MANET. Towards

this end, in this paper, a novel routing approach is proposed. It is known as cluster-based distributed fault diagnosis

routing which is highly secure in nature. The proposed system model includes fault diagnosis and also secure key

distribution. Keeping this in mind clusters are created in MANET appropriately. The cluster-based approach in

MANET is capable of distributing the aggregated data. Data in each cluster is to be distributed to respective data

center. A node in the cluster that has high energy resources is considered to be cluster head. The process of secure

routing in the MANET is made by defining a procedure known as pseudonymity. The proposed model is

implemented using NS2 simulations.

Keywords: Mobile Ad Hoc Network, Clustering, Diffie-Hellman key, pseudonym

References: 1. A.A. Abbasi and M. Younis. “A Survey on Clustering Algorithms for Wireless Sensor Networks.”Volume 30, Issues 14–15, 15 October

2007.

2. C. Tselikis, S. Mitropoulos, N. Komninos, and C. Douligeris. “Degree-based clustering algorithms for wireless Ad Hoc networks under

attack.” IEEE Communications Letters, vol. 16, no. 5, pp. 619–621, 2012. 3. P. Chatterjee, I. Sengupta, and S. K. Ghosh, “STACRP: a secure trusted auction oriented clustering based routing protocol for MANET,”

Cluster Computing, vol. 15, pp. 303–320, 2012.

4. YoHan Park, YoungHo Park and SangJae Moon, “Anonymous Cluster-Based MANETs with Threshold Signature”, Hindawi Publishing Corporation International Journal of Distributed Sensor Networks Volume 2013, Article ID 374713.

5. Yuxin Liu, Mianxiong Dong, Member, IEEE, Kaoru Ota, Member, IEEE, Anfeng Liu, “Secure and Trustable Routing in Wireless

Sensor Networks”, IEEE Transactions 1556-6013 (c) pp. 1-14, 2016. 6. Prof. N. Sureshkumar and Dr. S.Bhavani “Residual Energy based Reliable Multipath Routing Scheme for increasing Network Lifetime

in MANET” International Journal of Applied Engineering Research ISSN 0973-4562 pp. 1908-1913 Volume 12, Number 9 (2017) ©

Research India Publications. 7. Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Ad hoc networks, 1(2-3),

293-315.

8. R. J. Ik, O. K. Jeong, and H. L. Dang. “A Diffie-Hellman Key Exchange Protocol without Random Oracles.” in Proc. 5th International Conference on Cryptology and Network Security, Springer-Verlag Berlin, pp. 37-54, 2006.

9. D. Johnson, and A. Menezes. “The Elliptic Curve Digital Signature Algorithm (ECDSA).” Technical Report CORR 99-34, Centre for

Applied Cryptographic Research (CACR), University of Waterloo, 1999.

10. Saju PJohn and PhilipSamuel. “Self-organized key management with trusted certificate exchange in MANET.”

https://doi.org/10.1016/j.asej.2014.09.011

11. J. Ibriq, I. Mahgoub. “HIKES:hierarchical key establishment scheme for wireless sensor networks.” Int J Commun Syst (8 November) (2012), 10.1002/dac.2438.

12. Nilesh Goriya, Indr Jeet Rajput, Mihir Mehta“Low Control Overhead for Cluster Maintenance in Wireless Network for DSR Protocol.”

COMPUSOFT, An international journal of advanced computer technology, 4 (5), May-2015 (Volume-IV, Issue-V) 13. Milan KumarDholey,G.P.Biswas. “Proposal to Provide Security in MANET's DSRRouting

Protocol.”https://doi.org/10.1016/j.procs.2015.04.117

14. Network simulator https://www.isi.edu/nsnam/ns/ 15. Saju P John a, *, Philip Samuel. (2015). Self-organized key management with trusted certificate exchange in MANET, Ain Shams

Engineering Journal (2015) 6, 161–170.

701-705

125.

Authors: K. Sathishkumar, R. Soundararajan, G. Dinesh, S. Surjith

Paper Title: Design and Air Flow Analysis in Intake Manifold with Different Cross Section Using CFD

Abstract: The air-fuel mixture is the important source in engine combustion, the transfer of air-fuel mixture is

done by intake manifold in the intake system of the automobile. So due to improving the efficiency of the engine

most of the automobile manufacturing industry is mainly focused on the intake manifold design for better

performance. This project investigates about flow analysis taken in the different cross-section of an intake

manifold. The main goal of our work is to change the cross-section of the intake manifold and analysis the model.

In this paper, the manifold is designed by considering two different cross-section one is the circular outlet and the

other is the convergent-divergent outlet and the created model is analyzed. The flow analysis is carried by using

CFD and the values are compared and the best cross-section is concluded. The manifold with a convergent-

divergent outlet has high velocity when compared with the circular outlet. The intake manifold can be used in

automobile industries.

Keywords: Air intake manifold, Convergent-divergent outlet manifold, Airflow, Fluent, Circular manifold, CFD.

References: 1. Anilkumar. D.B, Dr. Anoop Kumar Elia , Computational analysis of Intake manifold design of a four cylinder diesel engine in Technical

research organization,5(4), 2018. 2. Wolf Bauer and John B. Heywood, Oshin Avanessian and Derlon Chu , Flow Characteristics in Intake Port of Spark Ignition Engine

Investigated by CFD and Transient Gas Temperature Measurement in SAE technical paper series 961997.

3. V. Bellenger , A. Tcharkhtchi , Ph. Castaing , Thermal and mechanical fatigue of a PA66/glass fibers composite material in ELSEVIER

International Journal of Fatigue 28 (2006) pp.1348–1352.

4. M.A. Ceviz , Intake plenum volume and its influence on the engine performance, cyclic variability and emissions in ELSEVIER Energy

Conversion and Management 48 (2007) pp.961–966 .

706-711

Page 89: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

5. M.A. Ceviz , M. Akin , Design of a new SI engine intake manifold with variable length plenum in ELSEVIER Energy Conversion and

Management 51 (2010) pp.2239–2244 .

6. Ryan Ilardo , Christopher B. Williams, Design and manufacture of a Formula SAE intake system using fused deposition modeling and fiber-reinforced composite materials in Rapid Prototyping Journal, 16(3), pp. 174 – 179.

7. Mohamed Ali Jemni, Gueorgui Kantchev, Mohamed Salah Abid , Influence of intake manifold design on in-cylinder flow and engine

performances in a bus diesel engine converted to LPG gas fuelled, using CFD analyses and experimental investigations in ELSEVIER

Energy 36 (2011) pp.2701-2715.

8. A.Manmadhachary, M.Santosh kumar , Y.Ravi kumar , Design&manufacturing of spiral intake manifold to improve Volument efficiency

of injection diesel engine byAM process in 5th International Conference of Materials Processing and Characterization (ICMPC 2016) pp. 1084–1090.

9. M. Safari , M. Ghamari and A. Nasiritosi , Intake Manifold Optimization by Using 3-D CFD Analysis in SAE technical paper series 2003-

32-0073. 10. Robert M. Siewert, Roger B. Krieger, Mark S. Huebler, Prafulla C. Baruah and Bahram Khalighi and Markus Wesslau , Modifying an

Intake Manifold to Improve Cylinder-to-Cylinder EGR Distribution in a DI Diesel Engine Using Combined CFD and Engine Experiments

in SAE technical paper series 2001-01-3685. 11. Jianmin Xu , Flow analysis of engine intake manifold based on computational fluid dynamics in IOP Conf. Series: Journal of Physics:

Conf. Series 916 (2017) 012043.

12. Jordan Lee, Lisa Roessler , Vibration Welded Composite Intake Manifolds Design Considerations and Material Selection Criteria in SAE technical paper series 970076.

13. Case Study On Plastic intake manifold in MATERIALS & DESIGN 13(6), 1992.

14. Ch. Indira Priyadarsini Flow analysis of intake manifold using CFD in International Journal of Engineering and Advanced Research Technology 2(1), 2016.

15. RepairPal Homepage http://repairpal.com/intake-manifold last accessed on 2017/09/18.

16. Yu, J., Vuorinen, V., Kaario, O., Sarjovaara, T., & Larmi, M.: Visualization and analysis of the characteristics of transitional under expanded jets. International Journal of Heat and Fluid Flow 44, 140-154 (2013).

126.

Authors: D. Rajasekar, J. Rengamani

Paper Title: A Study on the Port Hinterland Connectivity of Chennai Port Sector

Abstract: Port hinterland connectivity plays vital role for the growth of any seaport. The economic growth and

trade in India depends on maritime transport which in turn depends on good port hinterland connectivity. Seaport

hinterland connectivity contains various mode of transport like roadways,railways, airways, inland waterways and

inland freight facilities for various cargos.The seaports are connected to inland freight facilities which act like

transit place which connect both importers and exporters in the hinterland to seaports and facilitating regional and

cross broader trade.The Major ports in India when compared with world class ports still lags behind in hinterland

connectivity, this lead to port congestion and directly affects the port performance.The Public –Private model

investment which is encouraged by the government showing better results in development of port hinterland

connectivity. The Chennai port lacks good hinterland connectivity due to which the port faces lots of challenges.

The study reiterates Port hinterland connectivity at present infrastructure development and challenges faced by

Chennai port.

Keywords: Chennai Port, Congestion, Vessel, Ports, hinterland connectivity, Draft, Berth.

References: 1. Aronietis, R., Van de Voorde, E., Vanelslander, T. (2010). Port competitiveness determinants of selected European ports in the

containerized cargo market. Paper presented at IAME2010. 2. Connie Chen (India spring board, April 2014 issue of Port strategy, 2014 Holman Fenwick Willan LLP.

3. Consequences of Port Congestion on Logistics and Supply Chain in African Ports, by Dr. USMAN GIDADO (FCILT), Sea/Maritime

Transport Modal Representative, CILT Nigeria. 4. D.Rajasekar and Dr. J. Rengamani, A Study on the Infrastructural Facilities of the Seaports in Chennai Cluster. International Journal of

Civil Engineering and Technology, 8(11), 2017, pp. 591–599.

5. Dr.J.Rengamani and Dr.A.Shameem, A Study on the Civil Engineering Logistics Growth and Challenges in India. International Journal of Civil Engineering and Technology, 9(8), 2018, pp. 44-53.

6. Giuliano, G., and T. O’Brien. 2007. “Reducing Port-Related Truck Emissions: The Terminal Gate Appointment System At The Ports Of

Los Angeles And Long Beach.” Transportation Research Part D 12(7), pp. 460–473. 7. Huynh, N., and C. M. Walton. 2008. “Robust Scheduling Of Truck Arrivals At Marine Container Terminals.” Journal of Transportation

Engineering 134(8), pp. 347–353.

8. Huynh, N., F. Harder, D. Smith, S. Omar, and P. Quyen. 2011. “An Assessment of Truck Delays at Seaports Using Terminal Webcams.” TRB paper 2222. pg 54 -62.

9. Issue 7, pp. 523-527. (2007).

10. Muralidharan Balasubramaniam and Dr.J.Rengamani, Inevitability in the Growth and Development of Green Port Operations in the Seaports of Chennai Cluster, International Journal of Mechanical Engineering and Technology, 9(9), 2018, pp. 489–496.

11. Pallis, A.A., Vitsonis, T.K., and DeLangen, P.W. (2010) Port Economics, Policy, and Management: Review of an Emerging Research

Field. Transport Reviews, 30(1), 115-161. 12. Port Congestion and Implications to Maritime Logistics, chapter 4, by Hilde Meersman, Eddy Van de Voorde and Thierry Vane/slander,

2012 by Emerald group Publishing Limited.

13. Roso V. “Evaluation of the dry port concept from an environmental perspective: A note.” 14. Transportation Research Part D: Transport and Environment, Elsevier B.V., Volume 12,

15. U.S. Container Port Congestion and Related International Supply Chain Issues: Causes, Consequences and Challenges, FMC Port

Forums, 2015 16. Vacca, I., M. Bierlaire, and M. Salani. 2007. “Optimization at Container Terminals: Status, Trends and Perspectives.” In the 7th Swiss

Transport Research Conference.

712-717

127.

Authors: Manas Kumar Yogi, L. Yamuna

Paper Title: Enhancing Ability of User Personalization by Application of Rough Fuzzy Grouping Mechanism for

Improved Web Intelligence

Abstract: In contemporary world, Web personalization tenders accurate means for the evolution of operations

that have the enticing feature to satisfy compelling obligation of their end user. To perform that, developers of web

need to face an decisive trial regarding the disclosure of information of concern which the end users show while

718-722

Page 90: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

they reach out to various sites. Web Usage Mining is a functioning exploration region which regards the disclosure

of helpful examples of run of the mill client practices by using utilization information. Grouping has been hugely

applied for sake of classifying users having identical concerns. Rough fuzzy grouping proves to be an mechanism

handy to deduce user sections from web use information accessible via server history files. It is well known that

fuzzy grouping works on mechanism of distance-based metrics to judge the similarity among user choices. But the

application of such techniques may propel to feeble outcomes by classifying user groups that do not include the

meaningful knowledge assimilated . In this paper, we advocate an technique based on a rough fuzzy grouping

algorithm armed with a rough fuzzy similarity metric to deduce user groups. For pertinence, we deploy the

presented technique on users data extricated from server history files of a popular web site.

Keywords: rough ,fuzzy, similarity measures, grouping, personalization, user categorization.

References: 1. Abraham, A., Wang, X.: i-Miner: A Web Usage Mining Framework Using Hierarchi- cal Intelligent Systems. In: The IEEE Int. Conf. on

Rough fuzzySystems, pp. 1129–1134. IEEE Press, Los Alamitos (2003)

2. Arotaritei, D., Mitra, S.: Web Mining: a survey in the rough fuzzyframework. Rough fuzzySets and System 148, 5–19 (2004) 3. K.C. Lee, J.S. Kim, N.H. Chung, and S.J. Kwon, “Fussy Cognitive Map Approach to Web-Mining Inference Amplification,” Expert

System with Applications, vol. 22, pp. 197-211, 2002.

4. Y. Li and N. Zhong, “Ontoserver historyy-Based Web Mining Model: Representations of User Profiles,” Proc. IEEE/WIC Int’l Conf. Web Intelligence, pp. 96-103, 2003

5. N. Zhong, J. Liu, and Y.Y. Yao, “In Search of the Wisdom Web,” Computer, vol. 35, no. 11, pp. 27-31, Nov. 2002.

6. Z.Y. Lu, Y.Y. Yao, and N. Zhong, “Web Server history Mining,” Web Intelligence, pp. 174-194, 2003. 7. M. Perkowitz and O. Etzioni, “Adaptive Web Sites,” Comm. ACM, vol. 43, no. 8, pp. 152-158, 2002.

8. T.Y. Yan, M. Jacobsen, H. Garcia-Molina, and U. Dayal, “From User Access Patterns to Dynamic Hypertext Linking,” Proc. Fifth Int’ World Wide Web Conf., 1996.

9. Martin-Bautista, M.J., Vila, M.A., Escbar-Jeria, V.H.: In: IADIS European Conference Data Mining, pp. 73–76 (2008)

128.

Authors: Pooja G, S. Murali Krishna, V. Ravi

Paper Title: Multi-Level Memristor Memory: Design and Performance Analysis

Abstract: Memristor-based memories are one of the attractive candidates to replace present memory

technologies due to its novel characteristics such as non-volatile storage, nanosize cell, compatibility with CMOS,

low power dissipation, and multi-level cell (MLC) operation etc. However, the device needs to overcome the

potential challenges such as process variations, non-deterministic nature of the operation, sneak path issues, non-

destructive write and read operation. One of the most important characteristics of memristor memories is its ability

to store multiple bits in one cell. In this paper, we design a low power, high-speed multi-level memristor based

memories. Additionally, the performance analysis of the multi-level memristor memories has been performed

under various memristor models and window functions.

Keywords: Memristor, Non-volatile memory,

References: 1. Chua L. Memristor-the missing circuit element. IEEE Trans Circuit Theory 1971;18:507–19.

2. Strukov DB, Snider GS, Stewart DR, Williams RS. The missing memristor found. Nature 2008;453:80. 3. Amdapurkar A, Naik DK, Ravi V. Design and Development of Memristor-based Combinational Circuits. Int J Recent Innov Trends

Comput Commun 2016;4.

4. Chandni MD, Ravi V. Built in self test architecture using concurrent approach. Indian J Sci Technol 2016;9. 5. Sharma A, Ravi V. Built in self-test scheme for SRAM memories. Adv. Comput. Commun. Informatics (ICACCI), 2016 Int. Conf., IEEE;

2016, p. 1266–70.

6. Chaitanya MK, Ravi V. Design and development of BIST architecture for characterization of S-RAM stability. Indian J Sci Technol 2016;9.

7. Rabbani P, Dehghani R, Shahpari N. A multilevel memristor–CMOS memory cell as a ReRAM. Microelectronics J 2015;46:1283–90.

8. Kvatinsky S, Ramadan M, Friedman EG, Kolodny A. VTEAM: A general model for voltage-controlled memristors. IEEE Trans Circuits Syst II Express Briefs 2015;62:786–90.

9. Wong H-SP, Lee H-Y, Yu S, Chen Y-S, Wu Y, Chen P-S, et al. Metal–oxide RRAM. Proc IEEE 2012;100:1951–70.

10. Strukov DB, Snider GS, Stewart DR, Williams RS. The missing memristor found. Nature 2009;459:1154–1154.

doi:10.1038/nature08166.

11. Kvatinsky S, Talisveyberg K, Fliter D, Kolodny A, Weiser UC, Friedman EG. Models of memristors for SPICE simulations. Electr.

Electron. Eng. Isr. (IEEEI), 2012 IEEE 27th Conv., IEEE; 2012, p. 1–5. 12. Radwan AG, Fouda ME. On the mathematical modeling of memristor, memcapacitor, and meminductor. vol. 26. Springer; 2015.

13. Biolek Z, Biolek D, Biolková V. SPICE model of memristor with nonlinear dopant drift. Radioengineering 2009;18:210–4.

14. Kvatinsky S, Friedman EG, Kolodny A, Member S, Weiser UC. TEAM : ThrEshold Adaptive Memristor Model 2013;60:211–21. 15. Zha J, Huang H, Liu Y. A novel window function for memristor model with application in programming analog circuits. IEEE Trans

Circuits Syst II Express Briefs 2016;63:423–7.

16. Kvatinsky S, Talisveyberg K, Fliter D, Friedman EG, Kolodny A, Weiser UC. Verilog-A for Memristor Models. CCIT Tech Rep 2011;8. 17. Ravi V, Prabaharan SRS. Fault tolerant adaptive write schemes for improving endurance and reliability of memristor memories. AEU-

International J Electron Commun 2018;94:392–406.

18. Ravi V, Prabaharan SRS. Weak Cell Detection Techniques for Memristor-Based Memories 2018:101–10. 19. Reddy MGSP, Ravi V. Nondestructive Read Circuit for Memristor-Based Memories. Nanoelectron. Mater. Devices, Springer; 2018, p.

123–31.

20. Ho Y, Huang GM, Member S, Li P, Member S. Dynamical Properties and Design Analysis for Nonvolatile memristor memories

2011;58:724–36.

723-729

129.

Authors: Harish Baraithiya, R. K. Pateriya

Paper Title: Classifiers Ensemble for Fake Review Detection

Abstract: The growth of e-commerce businesses has attracted many consumers, because they offer a range of 730-736

Page 91: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

products at competitive prices. One thing most purchasers rely on when they purchase online is for product

reviews to conclude their decision. Many sellers use the decision to impact the review to hire the paid review

authors. These paid review authors target the particular brand, store or product and write reviews to promote or

demote them according to the requirements of their hired employees. In view of the effects of these fake reviews, a

number of techniques to detect these fake reviews have already been proposed. Because of nature of the reviews it

is difficult to classify them using single classifier. Hence in this paper, we proposed an ensemble classifier based

approach to detect the fake reviews. The proposed ensemble classifier uses support vector machine (SVM), Naïve

Byes classifier and k- nearest neighbor (KNN mutual) classifiers. The proposed technique is evaluated using Yelp

and Ott. et al [10] datasets. The evaluation results show that the proposed classifier provides better classification

accuracy on both datasets.

Keywords: Fake review detection, ensemble classifiers, Behavioral analysis, Opinion Spam.

References: 1. Cone Research. Game changer: Corn survey finds 4-out-of-5 consumers reverse purchase decisions based on negative online reviews.

2011. www.conecomm.com/contentmgr/ 5showdetails.php/id/4008. 2. Cui, Geng and Lui, Hon-Kwong and Guo, Xiaoning, The effect of online consumer reviews on new product sales, International Journal of

Electronic Commerce, 17, 39-58 (2012).

3. Mukherjee, Arjun and Venkataraman, Vivek and Liu, Bing and Glance, Natalie, Fake review detection: Classification and analysis of real and pseudo reviews, Technical Report UIC-CS-2013--03, University of Illinois at Chicago, Tech. Rep., (2013).

4. Sun, Chengai and Du, Qiaolin and Tian, Gang, Exploiting product related review features for fake review detection, Mathematical

Problems in Engineering, (2016). 5. Dave, Kushal and Lawrence, Steve and Pennock, David M, Mining the peanut gallery: Opinion extraction and semantic classification of

product reviews, Proceedings of the 12th international conference on World Wide Web, 519--528 (2003).

6. Duan, Huiying and Zirn, C{\"a}cilia, Can we identify manipulative behavior and the corresponding suspects on review websites using supervised learning?, Nordic Conference on Secure IT Systems, 215--230 (2012).

7. Feng, Song and Banerjee, Ritwik and Choi, Yejin, Syntactic stylometry for deception detection, Proceedings of the 50th Annual Meeting

of the Association for Computational Linguistics, 2, 171--175 (2012). 8. Yuan, Ling and Li, Dan and Wei, Shikang and Wang, Mingli, Research of Deceptive Review Detection Based on Target Product

Identification and Metapath Feature Weight Calculation, Complexity, (2018).

9. Li, Luyang and Qin, Bing and Ren, Wenjing and Liu, Ting, Document representation and feature combination for deceptive spam review detection, Neurocomputing, 254, 33--41 (2017).

10. Ott, Myle and Choi, Yejin and Cardie, Claire and Hancock, Jeffrey T, Finding deceptive opinion spam by any stretch of the imagination,

Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies, 1, 309--319 (2011).

11. Khalifa, Malika Ben and Elouedi, Zied and Lef{\`e}vre, Eric, Fake Reviews Detection Under Belief Function Framework, International

Conference on Advanced Intelligent Systems and Informatics, 395--404 (2018). 12. Mukherjee, Subhabrata and Dutta, Sourav and Weikum, Gerhard, Credible review detection with limited information using consistency

features, Joint European Conference on Machine Learning and Knowledge Discovery in Databases, 195--213 (2016).

13. Chauhan, Shashank Kumar and Goel, Anupam and Goel, Prafull and Chauhan, Avishkar and Gurve, Mahendra K, 2017 4th International

Conference on Signal Processing and Integrated Networks (SPIN), , 390--393 (2017).

14. Mukherjee, Arjun and Venkataraman, Vivek and Liu, Bing and Glance, Natalie S, What yelp fake review filter might be doing?, ICWSM,

409--418 (2013). 15. Rout, Jitendra Kumar and Dalmia, Anmol and Choo, Kim-Kwang Raymond and Bakshi, Sambit and Jena, Sanjay Kumar, Revisiting

Semi-Supervised Learning for Online Deceptive Review Detection., IEEE Access, 5-1, 1319--1327 (2017).

16. Liu, Yuanchao and Pang, Bo, A Unified Framework for Detecting Author Spamicity by Modeling Review Deviation, Expert Systems with Applications, (2018).

17. Jindal, Nitin and Liu, Bing, Opinion spam and analysis, Proceedings of the 2008 international conference on web search and data mining, 219--230 (2008).

18. Mukherjee, Arjun and Kumar, Abhinav and Liu, Bing and Wang, Junhui and Hsu, Meichun and Castellanos, Malu and Ghosh,

Riddhiman, Spotting opinion spammers using behavioral footprints, Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, 632--640 (2013).

19. Wang, Guan and Xie, Sihong and Liu, Bing and Philip, S Yu, Review graph based online store review spammer detection, 2011 ieee 11th

international conference on Data mining (icdm), 1242--1247 (2011). 20. Mukherjee, Arjun and Liu, Bing and Wang, Junhui and Glance, Natalie and Jindal, Nitin, Detecting group review spam, Proceedings of

the 20th international conference companion on World wide web. 93--94 (2011).

21. Lim, Ee-Peng and Nguyen, Viet-An and Jindal, Nitin and Liu, Bing and Lauw, Hady Wirawan, Detecting product review spammers using rating behaviors, Proceedings of the 19th ACM international conference on Information and knowledge management, 939--948 (2010).

22. Mukherjee, Arjun and Liu, Bing and Glance, Natalie, Spotting fake reviewer groups in consumer reviews, Proceedings of the 21st

international conference on World Wide Web, 191--200 (2012). 23. Jindal, Nitin and Liu, Bing and Lim, Ee-Peng, Finding unusual review patterns using unexpected rules, Proceedings of the 19th ACM

international conference on Information and knowledge management, 1549--1552 (2010).

24. Mukherjee, Arjun and Liu, Bing, Improving gender classification of blog authors, Proceedings of the 2010 conference on Empirical Methods in natural Language Processing, 207--217 (2010).

25. Li, Jiwei and Ott, Myle and Cardie, Claire and Hovy, Eduard, Towards a general rule for identifying deceptive opinion spam, Proceedings

of the 52nd Annual Meeting of the Association for Computational Linguistics, 1, 1566--1576 (2014). 26. Li, Fangtao and Huang, Minlie and Yang, Yi and Zhu, Xiaoyan, Learning to identify review spam, IJCAI Proceedings-International Joint

Conference on Artificial Intelligence, 22-3, 2488 (2011).

27. Hammad, A. S. A., and Alaa El-Halees. "An approach for detecting spam in arabic opinion reviews." The International Arab Journal of Information Technology 12 (2013).

28. Fei, Geli, et al. "Exploiting Burstiness in Reviews for Review Spammer Detection." Icwsm 13 (2013): 175-184.

29. Alexander Poliakov “An Example of Fuzzy Decision-Making System”, Proceedings of the 7th Korea-Russia International Symposium,KORUS 2003.

30. Taneja, Shweta, Bhawna Suri, Himanshu Narwal, Anchit Jain, Akshay Kathuria, and Sachin Gupta. "A new approach for data

classification using Fuzzy logic." In Cloud System and Big Data Engineering (Confluence), 2016 6th International Conference, pp. 22-27. IEEE, 2016.

31. Song, Qinbao, Jingjie Ni, and Guangtao Wang. "A fast clustering-based feature subset selection algorithm for high-dimensional data."

IEEE transactions on knowledge and data engineering 25, no. 1 (2013): 1-14.

32. Lin, Lin, Xue-Hai Yuan, and Zun-Quan Xia. "Multicriteria fuzzy decision-making methods based on intuitionistic fuzzy sets." Journal of

computer and System Sciences 73, no. 1 (2007): 84-88.

33. Perera, L. P., J. P. Carvalho, and C. Guedes Soares. "Fuzzy logic based decision making system for collision avoidance of ocean

Page 92: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

navigation under critical collision conditions." Journal of marine science and technology 16, no. 1 (2011): 84-99.

34. Ishibuchi, Hisao, Ken Nozaki, Naohisa Yamamoto, and Hideo Tanaka. "Construction of fuzzy classification systems with rectangular

fuzzy rules using genetic algorithms." Fuzzy sets and systems 65, no. 2-3 (1994): 237-253. 35. Zhou, Enwang, and Alireza Khotanzad. "Fuzzy classifier design using genetic algorithms." Pattern Recognition 40, no. 12 (2007): 3401-

3414.

36. Ghosh, Soumadip, Sushanta Biswas, Debasree Sarkar, and Partha Pratim Sarkar. "A novel Neuro-fuzzy classification technique for data

mining." Egyptian Informatics Journal 15, no. 3 (2014): 129-147.

37. Nauck, Detlef, and Rudolf Kruse. "A neuro-fuzzy method to learn fuzzy classification rules from data." Fuzzy sets and Systems 89, no. 3

(1997): 277-288. 38. Zadeh, Lotfi A. "Fuzzy sets." Information and control 8, no. 3 (1965): 338-353.

39. Mamdani, Ebrahim H., and Sedrak Assilian. "An experiment in linguistic synthesis with a fuzzy logic controller." International journal of

man-machine studies 7, no. 1 (1975): 1-13. 40. Yager, Ronald R., and Dimitar P. Filev. "Essentials of fuzzy modeling and control." New York 388 (1994).

41. Ikonomakis, M., Sotiris Kotsiantis, and V. Tampakas. "Text classification using machine learning techniques." WSEAS transactions on

computers 4, no. 8 (2005): 966-974. 42. Ishibuchi, Hisao, and T. Nakashima. "Designing compact fuzzy rule-based systems with default hierarchies for linguistic approximation."

In Evolutionary Computation, 1999. CEC 99. Proceedings of the 1999 Congress on, vol. 3, pp. 2341-2348. IEEE, 1999.

43. Battiti, Roberto. "Using mutual information for selecting features in supervised neural net learning." IEEE Transactions on neural networks 5, no. 4 (1994): 537-550.

44. Quadrianto, Novi, Alex J. Smola, Tiberio S. Caetano, and Quoc V. Le. "Estimating labels from label proportions." Journal of Machine

Learning Research 10, no. Oct (2009): 2349-2374. 45. Utami, Iut Tri, Bagus Sartono, and Kusman Sadik. "Comparison of Single and Ensemble Classifiers of Support Vector Machine and

Classification Tree." Journal of Mathematical Sciences and Applications 2.2 (2014): 17-20.

46. Ektefa, Mohammadreza, Sara Memar, Fatimah Sidi, and Lilly Suriani Affendey. "Intrusion detection using data mining techniques." In Information Retrieval & Knowledge Management,(CAMP), 2010 International Conference on, pp. 200-203. IEEE, 2010.

47. Etaiwi, Wael, Arafat Awajan, and Dima Suleiman. "Statistical Arabic Name Entity Recognition Approaches: A Survey." Procedia

Computer Science 113 (2017): 57-64. 48. J. Han, and M. Kamber, “Data mining: concepts and techniques’” (2nd ed.). Morgan Kaufmann Publishers, 2006.

49. D. L. Olson, D. Delen, “Advanced Data Mining Techniques,” 2008.

50. Breiman, Leo. "Bagging predictors." Machine learning 24, no. 2 (1996): 123-140. 51. Bauer, Eric, and Ron Kohavi. "An empirical comparison of voting classification algorithms: Bagging, boosting, and variants." Machine

learning 36, no. 1-2 (1999): 105-139.

52. Dietterich, Thomas G. "Ensemble methods in machine learning." In International workshop on multiple classifier systems, pp. 1-15. Springer, Berlin, Heidelberg, 2000.

130.

Authors: P. Devika, V.Prashanthi, G.Vijay Kanth, J Thirupathi

Paper Title: RFID Based Theft Detection and Vehicle Monitoring System using Cloud

Abstract: The rapid advancement in technology has become important to deploy various technology boosters in

our daily life that fulfil our requirements by increasing security. Now a day’s thefts are making up their offence on

committed areas like banks, street robbery, commercial robbery, jewellery, public vehicles etc. Theft is not just

about losing property, sometimes, victims may get seriously injured. Generally when the vehicles get robbed, we

file compliant or search CC footages for identification which is time consuming and inaccurate. In this paper we

propose a system for theft detection and vehicle security. Our main aim is to implement IOT & RFID based theft

detection and vehicle monitoring system using cloud. The RFID tag is used for authentication and raspberry pi is

used as the micro controller .Whenever a vehicle theft takes place, the authorized person (owner) will receive a

mail including the picture of the vehicle from the information that is stored in cloud.

Keywords: street robbery, commercial robbery, jewellery, public vehicles

References: 1. Manish Buhptani, Shahram Moradpour, "RFID Field Guide - Developing Radio Frequency Identification Systems", Prentice Hall, 2005,

pp 7-9, 16-225, 160, 231

2. Intelligent Traffic Management system, CCTV Capable of generating E-challan for Indore city (RLVD System) 3. An Introduction to RFID Technology (Radio Frequency Identification ) Communications and Network, 2010, August, 2,

3Communications and Network

4. Raspberry Pi:credit card-sized single-board computer- http://www.plusdigit.com/2014/10/25/ raspberry-picredit-card-sized-single-board-computer/

5. RFID - http://ageqnies.com/html/rfid.html

6. RFID reader module with antenna - usb – uart- https://robokits.co.in/wireless-solutions/rfid/rfid - reader -module-with-antenna-usb-uart 7. “A Smart Information System for Counting People”, P. Devika, A. Manusha Reddy, G. Vijay Kanth, Chaitrali Dangare, Y. Indu and B.

Padmaja, Journal of Advanced Research in Dynamical and Control Systems, Issue 11, 2018.

8. “Exploring M-Learning Benefits for Higher School Education”, Chaitrali S. Dangare, B. Anand Kumar, A. Manusha Reddy, Y. Indu and B. Padmaja, , Journal of Advanced Research in Dynamical and Control Systems, Issue 11, 2018.

9. “Secure data communication using isecLEACH protocol in WSN’s”, M.Anitha, P. Devika, A. Manusha Reddy, G. Vijay Kanth, ISSN

1314-3395, IJPAM,2018. 10. V.Prashanthi, D.Suresh Babu, C.V.Guru Rao, Network Coding aware Routing for Efficient Communication in Mobile Ad-hoc Networks,

International Journal of Engineering & Technology(UAE), ISSN: 2227-524X. 7 (3) (2018) 1474-1481

737-739

131.

Authors: MSV. Prasad, G. Chaitanya Eswara Naidu, B. Sandya Sri

Paper Title: Assessing Investors’ Knowledge about Commodity Trading in India

Abstract: The study involves investors’ knowledge of the commodity market. Management brokerage services

can know whether investors understand the commodity market. Provide investors with further development advice

on organizational development and awareness rising. The goal is to study the level of knowledge, preferably

demographics and factors that influence commodity investment. This study uses a descriptive research project. Use

self-contained questionnaires to collect respondents' data. The questionnaire includes factors that affect investors in

the commodity market. In order to understand investors’ understanding of the commodity market, investors’

opinions were collected as the main data by conducting surveys of 500 individual respondents in Hyderabad. Other

740-748

Page 93: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

data is collected from books, magazines, etc. Data compilation and analysis use statistical tools. Chi-square tests

and analysis of variance are also used to test hypotheses. Compared with other commodities, investment

preferences are oil, silver, copper and gold. The main factors affecting commodity investment are online software,

friends and brokerage services.

Keywords: brokerage services, hypotheses, factors affecting commodity investment

References: 1. Jena, Pratap Kumar and PhannidraGoyari. "Real Relationship Between Commodities, Stocks and Credit Cards in India: DCC Model

Analysis". IUP Journal of Applied Finance 22, no. 1 (2016): 37. 2. Capil, Sheba and Kanval Nyan Kapil. "Merchandise Trade Advisor (ctas) for the Indian Commodity Market." International Journal of the

Five (2010): 124-137.

3. Ftiti, Z., Kablan, S. &Guesmi, K. (2016). What can we learn about commodities and credit cycles? Evidence from African exporting countries. Energy Economics, 60, 313-324.

4. Han, L., Li, Z., & Yin, L. (2017). Impact of investor attention on future commodity markets. Newspapers on futures market.

5. Bring Bush (2017). Investor protection and information is an important pillar of agenda and post-crisis rule control - the way forward. Sector and economic outlook, 56 (1), 29-60.

6. Erb, c. B, and Harvey, CIM (2016). Misleading confusion about future investment in raw materials. Data from financial analyst 72 (4),

26-35. 7. Monga, O.P., Dawra, S., Monga, A. & Bansal, A.A.K. (2016). Investor Perspectives on Gold Investing: Some Reflections. International

Journal of Engineering Engineering Business and Enterprise (IJEBEA), 17 (1), 05-09

8. Periyasamy, S. (2016). Impact of investor information programs on potential investors on the Stock Exchange of India. International Journal of Research, Information, and Governance Research 6 (2), 21-23.

9. Chen, Y. & Chang, Y. K. (2015). Investor structure and information efficiency of future commodity prices. Review of International

Monetary Fund, 42, 358-367. 10. Mellios, C., Six, P. & Lai, A.N. (2016). Dynamic expectations and curbs of future commodity markets with stochastic comfort income.

European Data on Operational Data 250 (2): 493-504.

11. Iqbal, S., Hussain, N., Latif, M & Aslam, S. (2013). Types of Investors and Irregularities in Financial Markets: Comparisons of individual and foreign investors, and their role in decision-making in investment. Journal of Scientific Research 17 (11), 1591-1596.

132.

Authors: Sapna Kumari. C, K. V. Prasad

Paper Title: A Novel S-box Generation of AES using Elliptic Curve Cryptography (ECC)

Abstract: In recent decades, the security of the data is playing a major role in communication systems due to

more attackers between the channel media. The security level is depending on secret key, as per literature survey

of ECC guide, higher the bits size of the keys, higher the security [19]. Therefore the generation of key with large

size is the major challenging task. At present, Advanced Encryption Standard (AES) is a better cryptography

system where the encryption and decryption can be performed with fixed key size of 128bits, 192 bits and 256 bits.

The security level has been increased in AES due to the S-Box and it consists of 256 different values in the form of

16x16 matrixes, but to generate 256 values the Galois Field (GF) has been used. GF requires a lot of hardware

resources with more number of arithmetic operations like multiplication, additions and inversions [20-21]. To

overcome this issue, a novel S-Box generation using Elliptic Curve Cryptography (ECC )and BWMC methods are

proposed. The ECC uses point addition and point doubling to generate 256 values without multiplication

operations. After generation of the matrix, its values are encrypted and decrypted using bitwise matrix code

(BWMC). The proposed work has been designed using Verilog HDL, simulated and validated on Vertex-5 FPGA

development board. From the results obtained from novel S-Box and BWMC techniques there is an improvement

in terms of delay i.e. 73.1% as compared with hamming codes and 69% improvement in speed as compared with

MC’s[22].

Keywords: AES, BWMC, ECC, Point addition, point doubling, FPGA, Security system and S-Box.

References: 1. Arunkumar, Dr. S.S. Tyagi, ManishaRana, NehaAggarwal, PawanBhadana, ManavRachna (2011), A Comparative Study of Public Key

Cryptosystem based on ECC and RSA. International Journal on Computer Science and Engineering (IJCSE), ISSN : 0975-3397 Vol. 3

No. 5 May 2011, 1904-1909. 2. O. Srinivasa Rao (2010), Efficient Mapping Methods For Elliptic Curve Cryptosystems. International Journal of Engineering Science

and Technology, Vol. 2(8), 2010, ISSN: 0975-5462, 3651-3656

3. C. Wang, M. Daneshmand, M. Dohler, X. Mao, R. Q. Hu and H. Wang (2013), Guest Editorial - Special Issue on Internet of Things (IoT): Architecture, Protocols and Services”. IEEE Sensors Journal, vol. 13, issue. 10, pp. 3505–3510.

4. S. Raza, (2014) Secure communication for the Internet of Things - a comparison of link-layer security and IP sec for 6LoWPAN. Security

and Communication Networks, vol. 7, no. 12, pp. 2654–2668. 5. Gonzalez G. Organero M, Kloos C (2008). Early in infrastructure of all Internet of Things in space for learning. 8th IEEE International

Conference on Advance Learning Technologies, pp-381-383.

6. Yanbing Liu, Wenping Hu, Jiang Du (2011), Network Information Security Architecture Based on Internet of Things. ZTE Communication, Vol. 17(1):17-20

7. Riaz Naseer and Jeff Draper (2008), “Parallel Double Error Correcting Code Design to Mitigate Multi-Bit Upsets in SRAMs”. 978-1-

4244-2361-3/08, IEEE. 8. Juan Antonio Maestro, Pedro Reviriego, SanghyeonBaeg, Shijie Wen, Richard Wong (2013), Soft error tolerant Content Addressable

Memories (CAMs) using error detection code and duplication. Microprocessors and Microsystems 37 (2013) 1103–1107, 2013 Elsevier

B.V. http://dx.doi.org/10.1016/j.micpro.2013.10.003, 0141-9331. 9. Gustavo Neuberger, Fernanda Gusmao de lima, kastensmidt and Ricardo Reis (2005), An Automatic Technique for Optimizing Reed –

Solomon Codes to Improve Fault Tolerance in Memories. IEEE Co-published by the IEEE CS and the IEEE CASS IEEE Design & Test of

Computers, 0740-7475/05 10. Sanghyeon Baeg, Pedro Reviriego, Juan Antonio Maestro, Shijie and Richard Wong (2011), Analysis of a Multiple Cell Upset Failure

Model for Memories. ACM Transactions on Design Automation of Electronic Systems, Vol. 16, No. 4, Article 45, 1084-4309

11. Sandeep M D and Rajashekhargouda C. Patil (2016), An Approach to Reduce Number of Redundant Bits used To Overcome Cell Upsets in Memory using Decimal Matrix Code. International Journal of Science, Engineering and Technology Research (IJSETR), Volume 5,

Issue 5, 200-2010.

749-765

Page 94: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

12. Costas Argyrides, StephaniaLoizidou and Dhiraj K. Pradhan (2008), Area Reliability Trade – Off in Improved Reed Muller Coding.

SAMOS 2008, LNCS 5114, 2008 Springer – Verlag Berlin Heidelber, pp. 116-125.

13. Bertozzi, D., Et Al (2005).: Error Control Schemes For On-Chip Communication Links: The Energy-Reliability Tradeoff. IEEE Transactions On Computer-Aided Design Of Integrated Circuits And Systems, Vol. 24, No. 6.

14. Rossi, D., Metra, C(2003): Error correcting strategy for high speed and density reliable flash memories. IEEE Journal. Electronic Testing,

Theory and applications, 19(5), 511–521.

15. Argyrides, C., Pradhan, D.K (2007): Improved Decoding Algorithm for High Reliable Reed Muller Coding. SAMOS 2008, LNCS 5114,

pp. 116–125, 2008, (Eds.): SAMOS 2008, LNCS 5114, pp. 116–125.

16. R.Balamurugan, V.Kamalakannan, S.Tamilselvan and D.RahulGandh, (2014) “Enhancing Security in Text Messages Using Matrix based Mapping and ElGamal Method in Elliptic Curve Cryptography”. International Conference on Contemporary Computing and Informatics

(IC3I 2014), pp 103-106.

17. Smyth N., McLoone M., McCanny J. V (2006). WLAN Security Processor. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, Vol. 53, Issue 7, ISSN: 1057-7122, pp: 1506- 1520.

18. Bae D., Kim G., Kim J., Park S., Song O (2005). An Efficient Design of CCMP for Robust SecurityNetwork. ICISC 2005, Lecture Notes

in Computer Science 3935, Springer-Berlin,2006, pp. 352-361. 19. Syed Mohsin Abbas (2014), "An Efficient Multiple Cell Upsets Tolerant Content-Addressable Memory", IEEE Transactions On

Computers, VOL. 63, NO. 8.

20. Fu Minfeng 92010), Elliptic Curve Cryptosystem EIGamal Encryption and Transmission Scheme. International Conference on Computer Application and System Modeling (ICCASM 2010), 978-1-4244-7237-6/10, IEEE, 2010.

133.

Authors: K. Martin Sagayam, D. Narain Ponraj, Jenkin Winston, Yaspy J C, Esther Jeba D, Antony Clara

Paper Title: Authentication of Biometric System using Fingerprint Recognition with Euclidean Distance and Neural

Network Classifier

Abstract: Nowadays, Fingerprint recognition is the one of the authentication used for security applications. It

provides hope for the society in reliable authentic biometric systems. Fingerprint technology emerges in various

sectors such as government, organizations, libraries, universities, banks etc. It is widely used for biometric systems

other than Iris, Face, Hand, Voice and Signature because of its uniqueness and distinctness. Traditional methods

are not effectively used for analyzing the texture feature of finger print than neural network classifier. Fingerprint

recognition will be identified and classified with the help of Euclidean distance and NN classifier for better

accuracy has proposed in this paper. It uses certain techniques in preprocessing the image such as Histogram

equalization and Fast Fourier transform. The performance of the proposed approach has significant result than the

existing techniques used in the finger print recognition system.

Keywords: Euclidean distance, Fingerprint recognition, NN classifier

References: 1. Ravi.J, K.B.Raja and Venugopal.K.R (2009). “Fingerprint Recognition using Minutia Score Matching”. International Journal of

Engineering Science and Technology.

2. NeerajBharagava, AnchalKumawat, RituBharagava (2015). “Fingerprint Matching of Normalized Image based on Euclidean Distance”. International Journal of computer Application .Volume 120-No 24.

3. Subba Reddy Borra, G.Jagadeeswar Reddy and E.SreenivasaReddy(2016). “An Efficient Fingerprint Enhancement Technique Using

Wave Atom Transform and MCS Algorithm”.Procedia Computer Science 89(2016) 785-793. 4. Anil K. Jain, JianjiangFeng, Karthik Nanda Kumar(2010). “Fingerprint Matching”.IEEE Computer Science.

5. Virginia Espinosa(2002). “Minutiae Detection Algorithm for Fingerprint Recognition”.IEEE AESS System Magazine.

6. Iwasokun Gabriel Babatunde, Alese Boniface Kayoed, AkinyokunOluwole Charles, OlabodeOlatubosun(2012). “Fingerprint Image Enhancement-Segmentation to Thinning”. (IJACSA) International Journal of Advanced Computer Science and Applications.

7. P.Gnanasivam, S. Muttan, “An efficient Algorithm for fingerprint preprocessing and feature extraction”, Science direct (2010)

8. Feng Zhao, Xiaoou Tang, “Preprocessing and post processing for skeleton-based fingerprint minutiae extraction”, Science direct (2007) 9. Khaled Ahmed Nagaty, “Fingerprints classification using artificial neural networks: a combined structural and statistical approach,

Elsevier (2001)

10. Chandana, “Fingerprint Recognition based on Minutiae Information”, International Journal of Computer Applications, Volume 120 – No.10, June 2015

11. Mouad.M.H.Ali, “Fingerprint Recognition for Person Identification and Verification Based on Minutiae Matching”, 2016 IEEE 6th

International Conference on Advanced Computing 12. Lu Jiang, Chaochao Bai, “A Direct Fingerprint Minutiae Extraction Approach Based on Convolutional Neural Networks”, IEEE 2016

13. D. Ezhilmaran , “A Review Study on Fingerprint Image Enhancement Techniques”, International Journal of Computer Science &

Engineering Technology, 2014 14. Morteza Zahedi, “Combining Gabor filter and FFT for fingerprint enhancement based on a regional adaption method and automatic

segmentation”, springer (2015)

15. Manhua Liu, “Latent Fingerprint Enhancement via Multi-Scale Patch Based Sparse Representation”, IEEE(2014) 16. Mikel Galar, Joaquín Derrac. “A survey of fingerprint classification Part II: Experimental analysis and ensemble proposal”,

Elsevier(2015)

17. Mikel Galar, Joaquín Derrac. “A survey of fingerprint classification Part I: Taxonomies on feature extraction methods and learning models”, Elsevier(2015)

18. Gabor A. Werner, “ Tuning an artificial neural network to increase the efficiency of a fingerprint matching algorithm”, IEEE(2016)

19. Asif Iqbal Khan, “Strategy to Extract Reliable Minutia Points for Fingerprint Recognition”, IEEE (2014) 20. Satishkumar Chavan, “Fingerprint Authentication using Gabor Filter based Matching Algorithm”, ICTSD (2015)

21. Atul S. CHAUDHARI,“Implementation of Minutiae Based Fingerprint Identification System Using Crossing Number Concept”,

Informatica Economica vol.18, no.1/2014 22. Puja S. Prasad, B. Sunitha Devi, “A Survey of Fingerprint Recognition Systems and Their Applications”,Springer nature Singapore pvt.

Limited, ICCCE, 2018

23. P. Pakutharivu, M. V. Srinath, “A Comprehensive Survey on Fingerprint Recognition Systems, Indian Journal of Science and Technology, 2015

749-765

134.

Authors: K. Martin Sagayam, D. Narain Ponraj, Jenkin Winston, Yaspy J C, Esther Jeba D, Antony Clara

Paper Title: Authentication of Biometric System using Fingerprint Recognition with Euclidean Distance and Neural

Network Classifier

Abstract: Nowadays, Fingerprint recognition is the one of the authentication used for security applications. It

provides hope for the society in reliable authentic biometric systems. Fingerprint technology emerges in various 749-765

Page 95: International Journal of Innovative Technology and ... · 2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the

sectors such as government, organizations, libraries, universities, banks etc. It is widely used for biometric systems

other than Iris, Face, Hand, Voice and Signature because of its uniqueness and distinctness. Traditional methods

are not effectively used for analyzing the texture feature of finger print than neural network classifier. Fingerprint

recognition will be identified and classified with the help of Euclidean distance and NN classifier for better

accuracy has proposed in this paper. It uses certain techniques in preprocessing the image such as Histogram

equalization and Fast Fourier transform. The performance of the proposed approach has significant result than the

existing techniques used in the finger print recognition system.

Keywords: Euclidean distance, Fingerprint recognition, NN classifier

References: 24. Ravi.J, K.B.Raja and Venugopal.K.R (2009). “Fingerprint Recognition using Minutia Score Matching”. International Journal of

Engineering Science and Technology.

25. NeerajBharagava, AnchalKumawat, RituBharagava (2015). “Fingerprint Matching of Normalized Image based on Euclidean Distance”.

International Journal of computer Application .Volume 120-No 24. 26. Subba Reddy Borra, G.Jagadeeswar Reddy and E.SreenivasaReddy(2016). “An Efficient Fingerprint Enhancement Technique Using

Wave Atom Transform and MCS Algorithm”.Procedia Computer Science 89(2016) 785-793.

27. Anil K. Jain, JianjiangFeng, Karthik Nanda Kumar(2010). “Fingerprint Matching”.IEEE Computer Science. 28. Virginia Espinosa(2002). “Minutiae Detection Algorithm for Fingerprint Recognition”.IEEE AESS System Magazine.

29. Iwasokun Gabriel Babatunde, Alese Boniface Kayoed, AkinyokunOluwole Charles, OlabodeOlatubosun(2012). “Fingerprint Image

Enhancement-Segmentation to Thinning”. (IJACSA) International Journal of Advanced Computer Science and Applications. 30. P.Gnanasivam, S. Muttan, “An efficient Algorithm for fingerprint preprocessing and feature extraction”, Science direct (2010)

31. Feng Zhao, Xiaoou Tang, “Preprocessing and post processing for skeleton-based fingerprint minutiae extraction”, Science direct (2007) 32. Khaled Ahmed Nagaty, “Fingerprints classification using artificial neural networks: a combined structural and statistical approach,

Elsevier (2001)

33. Chandana, “Fingerprint Recognition based on Minutiae Information”, International Journal of Computer Applications, Volume 120 – No.10, June 2015

34. Mouad.M.H.Ali, “Fingerprint Recognition for Person Identification and Verification Based on Minutiae Matching”, 2016 IEEE 6th

International Conference on Advanced Computing 35. Lu Jiang, Chaochao Bai, “A Direct Fingerprint Minutiae Extraction Approach Based on Convolutional Neural Networks”, IEEE 2016

36. D. Ezhilmaran , “A Review Study on Fingerprint Image Enhancement Techniques”, International Journal of Computer Science &

Engineering Technology, 2014 37. Morteza Zahedi, “Combining Gabor filter and FFT for fingerprint enhancement based on a regional adaption method and automatic

segmentation”, springer (2015)

38. Manhua Liu, “Latent Fingerprint Enhancement via Multi-Scale Patch Based Sparse Representation”, IEEE(2014) 39. Mikel Galar, Joaquín Derrac. “A survey of fingerprint classification Part II: Experimental analysis and ensemble proposal”,

Elsevier(2015)

40. Mikel Galar, Joaquín Derrac. “A survey of fingerprint classification Part I: Taxonomies on feature extraction methods and learning models”, Elsevier(2015)

41. Gabor A. Werner, “ Tuning an artificial neural network to increase the efficiency of a fingerprint matching algorithm”, IEEE(2016)

42. Asif Iqbal Khan, “Strategy to Extract Reliable Minutia Points for Fingerprint Recognition”, IEEE (2014)

43. Satishkumar Chavan, “Fingerprint Authentication using Gabor Filter based Matching Algorithm”, ICTSD (2015)

44. Atul S. CHAUDHARI,“Implementation of Minutiae Based Fingerprint Identification System Using Crossing Number Concept”,

Informatica Economica vol.18, no.1/2014 45. Puja S. Prasad, B. Sunitha Devi, “A Survey of Fingerprint Recognition Systems and Their Applications”,Springer nature Singapore pvt.

Limited, ICCCE, 2018

46. P. Pakutharivu, M. V. Srinath, “A Comprehensive Survey on Fingerprint Recognition Systems, Indian Journal of Science and Technology, 2015