International Journal of Innovative
Technology and Exploring Engineering
ISSN : 2278 - 3075Website: www.ijitee.org
Volume-8 Issue-4, FEBRUARY 2019
Published by: Blue Eyes Intelligence Engineering and Sciences Publication
Published by: Blue Eyes Intelligence Engineering and Sciences Publication
grin lo Ep nx gE id nn ea e riy ng golon
hce T e Iv nit tea rv no an tin oI nf o a l la Jnr uo
Exploring Innovation
www.ijitee.org
IjItEeIjItEe
EXPLORING INNOVA
TION
Editor-In-Chief Chair Dr. Shiv Kumar
Ph.D. (CSE), M.Tech. (IT, Honors), B.Tech. (IT), Senior Member of IEEE
Professor, Department of Computer Science & Engineering, Lakshmi Narain College of Technology Excellence (LNCTE), Bhopal
(M.P.), India
Associated Editor-In-Chief Chair Dr. Vinod Kumar Singh
Associate Professor and Head, Department of Electrical Engineering, S.R.Group of Institutions, Jhansi (U.P.), India
Associated Editor-In-Chief Members Dr. Hai Shanker Hota
Ph.D. (CSE), MCA, MSc (Mathematics)
Professor & Head, Department of CS, Bilaspur University, Bilaspur (C.G.), India
Dr. Gamal Abd El-Nasser Ahmed Mohamed Said
Ph.D(CSE), MS(CSE), BSc(EE)
Department of Computer and Information Technology , Port Training Institute, Arab Academy for Science ,Technology and Maritime
Transport, Egypt
Dr. Mayank Singh
PDF (Purs), Ph.D(CSE), ME(Software Engineering), BE(CSE), SMACM, MIEEE, LMCSI, SMIACSIT
Department of Electrical, Electronic and Computer Engineering, School of Engineering, Howard College, University of KwaZulu-
Natal, Durban, South Africa.
Scientific Editors Prof. (Dr.) Hamid Saremi
Vice Chancellor of Islamic Azad University of Iran, Quchan Branch, Quchan-Iran
Dr. Moinuddin Sarker
Vice President of Research & Development, Head of Science Team, Natural State Research, Inc., 37 Brown House Road (2nd Floor)
Stamford, USA.
Dr. Shanmugha Priya. Pon
Principal, Department of Commerce and Management, St. Joseph College of Management and Finance, Makambako, Tanzania, East
Africa, Tanzania
Dr. Veronica Mc Gowan
Associate Professor, Department of Computer and Business Information Systems,Delaware Valley College, Doylestown, PA, Allman,
China.
Dr. Fadiya Samson Oluwaseun
Assistant Professor, Girne American University, as a Lecturer & International Admission Officer (African Region) Girne, Northern
Cyprus, Turkey.
Dr. Robert Brian Smith
International Development Assistance Consultant, Department of AEC Consultants Pty Ltd, AEC Consultants Pty Ltd, Macquarie
Centre, North Ryde, New South Wales, Australia
Dr. Durgesh Mishra
Professor & Dean (R&D), Acropolis Institute of Technology, Indore (M.P.), India
Executive Editor Chair Dr. Deepak Garg
Professor & Head, Department Of Computer Science And Engineering, Bennett University, Times Group, Greater Noida (UP), India
Executive Editor Members Dr. Vahid Nourani
Professor, Faculty of Civil Engineering, University of Tabriz, Iran.
Dr. Saber Mohamed Abd-Allah
Associate Professor, Department of Biochemistry, Shanghai Institute of Biochemistry and Cell Biology, Shanghai, China.
Dr. Xiaoguang Yue
Associate Professor, Department of Computer and Information, Southwest Forestry University, Kunming (Yunnan), China.
Dr. Labib Francis Gergis Rofaiel
Associate Professor, Department of Digital Communications and Electronics, Misr Academy for Engineering and Technology,
Mansoura, Egypt.
Dr. Hugo A.F.A. Santos
ICES, Institute for Computational Engineering and Sciences, The University of Texas, Austin, USA.
Dr. Sunandan Bhunia
Associate Professor & Head, Department of Electronics & Communication Engineering, Haldia Institute of Technology, Haldia
(Bengal), India.
Dr. Awatif Mohammed Ali Elsiddieg
Assistant Professor, Department of Mathematics, Faculty of Science and Humatarian Studies, Elnielain University, Khartoum Sudan,
Saudi Arabia.
Technical Program Committee Chair Dr. Mohd. Nazri Ismail
Associate Professor, Department of System and Networking, University of Kuala (UniKL), Kuala Lumpur, Malaysia.
Technical Program Committee Members Dr. Srilalitha Girija Kumari Sagi
Associate Professor, Department of Management, Gandhi Institute of Technology and Management, Visakhapatnam (A.P.) India.
Dr. Vishnu Narayan Mishra
Associate Professor, Department of Mathematics, Sardar Vallabhbhai National Institute of Technology, Ichchhanath Mahadev Dumas
Road, Surat (Gujarat), India.
Dr. Sripada Rama Sree
Vice Principal, Associate Professor, Department of Computer Science and Engineering, Aditya Engineering College, Surampalem
(Andhra Pradesh), India.
Dr. Ramzi Raphael Ibraheem Al Barwari
Assistant Professor, Department of Mechanical Engineering, College of Engineering, Salahaddin University – Hawler (SUH) Erbil –
Kurdistan, Erbil Iraq.
Dr. Kapil Chandra Agarwal
H.O.D. & Professor, Department of Applied Sciences & Humanities, Radha Govind Engineering College, U. P. Technical University,
Jai Bheem Nagar, Meerut, (U.P). India.
Convener Chair Mr. Jitendra Kumar Sen
Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd., Bhopal (M.P.), India
Editorial Chair Dr. Saeed Balochian
Associate Professor, Gonaabad Branch, Islamic Azad University, Gonabad, Iran.
Editorial Members Dr. Gyanesh Shrivastava
Associate Professor, Department of Information Technology, MATS University, Raipur (Chhattisgarh), India.
Dr. Swapnil B. Mohod
Assistant Professor, Department of Electrical Engineering, Prof. Ram Meghe College of Engineering & Management, Badnera,
Amravati (Maharashtra), India.
Dr. Subramani Roychoudri
Professor, Department of Computer Science and Engineering, Usha Rama College of Engineering and Technology, Telaprolu (Andhra
Pradesh), India.
Dr. KPNV Satyasree
Professor, Department of Computer Science and Engineering, Usha Rama College of Engineering and Technology, Telaprolu (Andhra
Pradesh), India.
Dr. Parul Mishra
Assistant Professor, Department of English, GD Goenka University Gurugram, Gurgaon (Haryana), India.
S.
No
Volume-8 Issue-4, February 2019, ISSN: 2278-3075 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication
Page
No.
1.
Authors: Ranjit Sadakale, R. A. Patil, N V K Ramesh
Paper Title: An Efficient AODV Routing Protocol for Vehicular Ad hoc Network
Abstract: Vehicular Ad-hoc Network (VANET) is considered as a sensor network with special characteristics
and some advance features. For VANET nodes treated with high mobility and fast topology change. These nodes
can sense its neighboring area to provide various services like traffic monitoring, speed of vehicle and some
environmental parameters monitoring. One of the advance reactive routing protocol is Ad Hoc on-demand
Distance Vector (AODV) is most commonly used routing protocol in topology based routing. This paper is
presenting improved AODV protocol, in order to consider different parameters like node mobility, sent packet rate,
delay and throughput. Results are implemented using Network Simulator-2.
Keywords: Cooperative Communication, Intelligent Transportation System (ITS), Packet combining, VANET.
References: 1. Jothi K R,Dr,Ebenezer Keyakumar A,”A Survey on Broadcasting Protocols in VANETs”,IJITEE, Vol.3 Nov 2013, ISSN 2278-3075.
2. Kulla E.,Morita S.,Katayama K., “Route lifetime prediction methos in VANET by using AODV routing protocol”, Advances in
Intelligent systems and computing, 772 pp.3-11, 2019 3. Abbasi I.A., Khan A.S., Ali S., “A Reliable Path Selection and Packet Forwarding Routing for Vehicular Ad hoc Networks”, EJWCN,
2018(1), 236.
4. S. Peters, A. Panah, K. Truong, and R. Heath, “Relay Architectures for 3GPP LTE Advanced,”, EURASIP Journal on Wireless Communications and Networking, May 2009.
5. T. Beniero, S. Redana, J. Hmlinen, and B. Raaf, “Effect of Relaying on Coverage in 3GPP LTE-Advanced,” IEEE Vehicular Technology
Conference, vol. 53, pp. 1–5, Apr. 2009. 6. J. Cho and Z. Haas, “On the Throughput Enhancement of the Downstream Channel in Cellular Radio Networks Through Multihop
Relaying,” IEEE Journal on Selected Areas in Communications, pp. 1206–1219, Sept. 2004.
7. R. Irmer and F. Diehm, “On coverage and capacity of relaying in LTE-advanced in example deployments,” IEEE Symposium on Personal, Indoor and Mobile Radio Communications, pp. 1–5, Sept. 2008.
8. Tarek Bejaoui,”Qos-Oriented High Dynamic Resource Allocation in Vehicular Communication Networks”, The Scientific World journal ,
vol 14 Article ID 718698. 9. IEEE 802.16 Broadband Wireless Access Working Group, “Amendment working document for Air Interface for Fixed and Mobile
Broadband Wireless Access Systems,” June 2009.
10. J. Laneman, D. Tse, and G. Wornell, “Cooperative Diversity in Wireless Networks: Efficient Protocols and Outage Behavior,” IEEE Transactions on Information Theory, vol. 50, pp. 3062–3080, Dec. 2004.
11. LI Yong,Hou Yi-bin,HUANNG Zhang-qin, WEI yi-fei, “High Throughput relay policy in wireless cooperative relaying networks on
stochastic control theory”, Elsevier, August 2011, 18(4). 12. Georgios Papadimitriou, Nikolas Pappas ,“ Network –level performance evaluation of a two-relay cooperative random access wireless
system”, Computer networks 88 (2015) 187-201.
13. Mohmad Feteiha, Hossam S Hassanein, “Decode-and –Forward cooperative vehicular relaying for LTE-A MIMO-downlink”, Vehicular communications 3 (2016) 12-20.
14. G.G. Md.Nawaz Ali,Edward Chan,Wenzhong Li, “On scheduling data access witj cooperative load balancing in vehicular adhoc
networks”, J Supercomput (2014) 67:438-468 15. Zeyu Zheng,Shengli Fu,Kejie Lu, “On the relay selection for cooperative wireless networks with physical layer network coding”,
Wireless Netw (2012) 18:653-665.
16. Kai Liu,Joseph K Y Ng, “Cooperative Data scheduling in Hybrid VANETs: VANET as a software Defined Network”, ACM transactions on Networking, Vol 24, No 3 June 2016.
17. Suman Saha,”Research Challenges of Position Based Routing Protocol in Vehiculat Adhoc Networks”, IOSRJEN, ISSN(e): 2250-
3021,Nov 2016,Vol 06,Issue 11. 18. S. Meko and P. Chaporkar, “Channel Partitioning and Relay Placement in Multi-hop Cellular Networks,” International Symposium on
Wireless Communication Systems, pp. 66–70, Sept. 2009.
19. J. Cioffi, “A Multicarrier Primer,” Nov. 1991. 20. Angelos Antonopolous, Christos Verikoukis, Charalabos Skianis and Ozgur B. Akan “Energy efficient network coding-based MAC for
cooperative ARQ wireless networks” Ad Hoc Networks 11 (2016) 190–200
1-4
2.
Authors: Hemant R. Deshmukh, Mahip M. Bartere
Paper Title: Enhancement of Image Stegnography Technique for Improvement of Security
Abstract: Steganography will pick up its significance because of the exponential development and mystery
correspondence of potential PC clients over the web. It can likewise be characterized as the investigation of
undetectable correspondence that ordinarily deals with the techniques for disguising the nearness of the bestowed
message. For the most part information implanting is accomplished in correspondence, picture, content, voice or
interactive media content for copyright, military correspondence, confirmation and numerous different purposes.
In picture Steganography, riddle correspondence is expert to introduce a message into cover picture (used as the
transporter to embed message into) and deliver a stego picture (created picture which is passing on a covered
message). In this paper we have on a very basic level researched diverse steganographic strategies. For hiding data
we used virtual key replacement technique which provides high data security in terms of payload, Image Quality
etc.
Keywords: Data Hiding, Security, Payload capacity.
References: 1. Hong Cao and Alex C. Kot, On Establishing Edge Adaptive Grid for Bilevel Image Data Hiding”, IEEE transactions on information
forensics and security, vol. 8, no. 9, September 2013.
5-8
2. Che-Wei Lee and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of
the PNG Image With a Data Repair Capability, IEEE transactions on image processing, vol. 21, no. 1, January 2012.
3. Ming Li, Michel K. Kulhandjian, Dimitris A. Pados, Stella N. Batalama, and Michael J. Medley, Extracting Spread-Spectrum Hidden
Data From Digital Media, IEEE transactions on information forensics and security, vol. 8, no. 7, July 2013.
4. Chunfang Yang, Fenlin Liu, Xiangyang Luo, and Ying Zeng, Pixel Group Trace Model-Based Quantitative Steganalysis for Multiple
Least-Significant Bits Steganography, IEEE transactions on information forensics and security, vol. 8, no. 1, january 2013.
5. A. E. Mustafa, A.M.F. ElGamal, M.E. ElAlmi, Ahmed.BD, A Proposed Algorithm For Steganography In Digital Image Based on Least
Significant Bit , Issue No. 21, April. 2011.
6. D. C. Wu and W. H. Tsai, “A steganographic method for images by pixel-value differencing”, Pattern Recognition Letters, vol. 24, no. 9-
10, pp. 1613–1626, 2003.
7. Weiqi Luo, Fangjun Huang, Jiwu Huang, “Edge Adaptive Image Steganography Based on LSB Matching Revisited”, IEEE Transactions
on Information Forensics and Security, Vol. 5, No. 2, June 2010, pp. 201-214.
8. G.Karthigai Seivi, Leon Mariadhasan, K. L. Shunmuganathan, “Steganography using Edge Adaptive Image”, Proc. of the
International Conference on Computing, Electronics and Electrical Technologies (ICCEET), pp. 1023-1027, 2012.
9. Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang , Hung-Min Sun, “Adaptive Data Hiding in Edge Areas of Images With
Spatial LSB Domain Systems”, IEEE Transactions on Information Forensics and Security, Vol. 3, No. 3, September 2008, pp.488-497.
10. R. L. Tataru, D. Battikh, S. El Assad, H. Noura, O. Deforges, “Enhanced Adaptive Data Hiding in Spatial LSB Domain by using Chaotic
Sequences”, Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 85-88, 2012.
11. Zhu Liehuang, Li Wenzhuo, Liao Lejian , Li Hong, “A Novel Algorithm for Scrambling Digital Image Based on Cat Chaotic Mapping”,
International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 601-605, 2006.
12. Sahar Mazloom, Amir-Masud Eftekhari-Moghadam, “Color Image Cryptosystem using Chaotic Maps”, IEEE Symposium
on Computational Intelligence for Multimedia, Signal and Vision Processing, pp. 142-147, 2011.
13. Qian-chuan Zhong, Qing-xin Zhu , Ping-Li Zhang ,“A Spatial Domain Color Watermarking Scheme based on Chaos”,
International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA), pp. 137-142, 2008.
14. Chen Wei-bin, Zhang Xin, “Image Encryption Algorithm based on Henon Chaotic System”, International Conference on Image Analysis
and Signal Processing (IASP), pp. 94-97, 2009.
15. A. E. Mustafa, A.M.F. ElGamal, M.E. ElAlmi, Ahmed.BD, A Proposed Algorithm For Steganography In Digital Image Based on Least
Significant Bit , Issue No. 21, April. 2011.
16. Anuja Yeole, Mahip Bartere ,”An X-Or Base Image Encryption and Data Security through Higher LSB Data Hiding Approach: Result
Oriented”, International Journal of Engineering Science and Computing, April 2016 Volume 6 Issue No. 4.
17. Wu, D.C., and Tsai, W.H.: ‘A steganographic method for images by pixel-value differencing’, Pattern Recognit. Lett., 2003, 24, (9-10),
pp. 1613–1626
18. H.-C. Wu, N.-I. Wu, C.-S. Tsai and M.-S. Hwang,”Image steganographic scheme based on pixel-value differencing and LSB
replacement methods”IEE Proc.-Vis. Image Signal Process., Vol. 152, No. 5, October 2005.
19. Ran-Zan Wang and Yeh-Shun Chen,” High-Payload Image Steganography Using Two-Way Block Matching”, IEEE Signal Processing
Letters, Vol. 13, No. 3, March 2006 161.
20. Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang,” Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain
Systems”, IEEE Transactions On Information Forensics And Security, Vol. 3, No. 3, September 2008.
21. M.B. Ould Medeni,” A Novel Steganographic Method for Gray-Level Images With four-pixel Differencing and LSB Substitution”,978-
1-61284-732-0/11/$26.00 ©2010 IEEE.
3.
Authors: P.Meghana, S. SagarImambi, P. Sivateja, K. Sairam
Paper Title: Image Recognition for Automatic Number Plate Surveillance
Abstract: Automatic number plate recognition is a well known proposal in todays world due to the rapid growth
of cars, bikes and other vehicles. This automatic number plate recognition system uses image processing
technology for identification of the vehicles. This system can be used in highly populated areas and higly restricted
areas to easily identify traffic rule violated vehicles and owners name, address and other information can be
retrieved using this system. This system can be automated and it is used to recognize vehicles without
authorization ,vehicles that violated rules at populated areas like malls, universities, hospitals and other car
parking lots. This can also be used in the case of car usage in terrorist activites, smuggling, invalid number plates,
stolen cars and other illegal activities. It can also be used in highway electronic toll collection. Image of the car
number plate is captured and detection is done by image processing ,character segmentation which locate the alpha
numeric characters on a number plate.Then the segmented characters are translated into text entries using optical
character recognition(ocr).ANPR systems are already available but efficiency is not gained thoroughly. These
systems are developed using different methodologies butsome factors like vehicle speed, different font
styles,font sizes, language of vehicle number and light conditions are required to be explored .These can affect a
lot in the overall recognition rate. ANPR systems use (ocr) optical character recognition to scan the vehical number
plates, and it can be retrieved whenever required. The other details of the owners of the vehicles like address and
mobile number can be manipulated whenever necessary by contacting the system administrative. The purpose of
this paper is to recognize a car number plate using ann, image segmentation. We intended to develop a system in
mat lab which can perform detection as well as recognition of a car number plate.
Keywords: ANPR, histogram approach, OCR, template matching
References: 1. Rahim Panahi, Iman Gholampour. "Accurate Detection and Recognition of Dirty Vehicle Plate Numbers for High-Speed Applications",
IEEE Transactions on Intelligent Transportation Systems, 2017
2. H. Caner, H. S. Gecim, and A. Z. Alkar, “Efficient embedded neural network- based license plate recognition system,” IEEE Trans. Veh. Technol., vol. 57, no. 5, pp. 2675–2683, Sep. 2008.
3. Unsupervised Category Modeling, Recognition, and Segmentation in Images Sinisa Todorovic, Member, IEEE, and Narendra Ahuja,
Fellow, IEEE 4. V. Abolghasemi and A. Ahmadyfard, “An edge-based color-aided method for license plate detection,” Image Vis. Comput., vol. 27, no. 8,
pp. 1134–1142, Jul. 2009.
5. Semantic Image Segmentation with Contextual Hierarchical Models Mojtaba Seyedhosseini and Tolga Tasdizen, Senior Member, IEEE. 6. A Complete System for Vehicle Plate Localization, Segmentation and Recognition in Real Life Scene A.Conci, J. E. R. de Carvalho, T.
W. Rauber
9-12
7. M. H. Glauberman, “Character recognition for business machines,” Electronics, vol. 29, pp. 132–136, 1956.
8. Automatic License Plate Recognition Shyang-Lih Chang, Li-Shien Chen, Yun-Chung Chung, and Sei-Wan Chen, Senior Member, IEEE
9. Automatic License-Plate Location and Recognition Based on Feature Salience Zhen-Xue Chen, Cheng-Yun Liu, Fa-Liang Chang, and Guo-You Wang
4.
Authors: Maram AL Muhisen, Hüseyin Gökçekuş, Mohammad Abazid
Paper Title: Study of Redesign for Commercial Environmental Building
Abstract: In recent times, sustainable construction is universally considered essential in structure developments,
specifically in the commercial fields. Moreover, a nationwide non-profit association, USGBC (United States Green
Building Council), was capable of establishing regulations and an assessment system for the sustainable structures
known as LEED or the Leadership in Energy and Environmental Design. The fundamental basis for green
structures is utilization of sustainable proficiency techniques either in newly constructed developments or
renovations of existing estates, so that the operating and maintenance expenditures are reduced. While the rental
cost or value of the structure is increased, the energy cost is minimized. Conversely, practical verification affecting
the valuing techniques of sustainable structures and properties is restricted. Hence, the objective of the
following study is to acknowledge the concerns linked to sustainable commercial developments and the rate-added
interval, in which the aspects that influence energy costs are examined. The rate- added interval depicts the
variations among the high value of construction value and energy rates, where a green profit is resembled by a
positive difference value.
Keywords: Sustainable, Structures, LEED, Rate-Added Interval, Green Building Council.
References: 1. Howe, J. C. (2010). Overview of green buildings. National Wetlands Newsletter,33 (1).
2. Samer, M. (2013). Towards the implementation of the Green Building concept in agricultural buildings: a literature review. Agricultural Engineering International: CIGR Journal, 15 (2), 25-46.
3. Boschmann, E. E., & Gabriel, J. N. (2013). Urban sustainability and the LEED rating system: case studies on the role of regional
characteristics and adaptive reuse in green building in Denver and Boulder, Colorado. Geographical Journal, 179 (3), 221-233 4. Ellison, L. and Sayce, S. (2007) Assessing Sustainability in The Existing Commercial Property Stock Establishing Sustainability Criteria
Relevant for The Commercial Property Investment Sector. Journal of Property Management, Vol. 25 No. 3, pp. 287-304.
5. Lzkendorf, T. and Lorenz, D. (2005) Sustainable Property Investment: Valuing Sustainable Buildings Through Property Performance Assessment, Building research and information, 33(3), 212-234.
6. Mansfield, J. (2009). The Valuation of Sustainable Freehold Property: A CRE Perspective. Journal of Corporate Real Estate, Vol. 11 No.
2 pp. 91-105. 7. Almuhisen, M. & Gökçekuş, H. (2018). Climate Change Impact on Economy. International Journal of Scientific & Engineering Research,
9(6), 1661-1669.
8. Abazid, M., & Harb, H. (2018). An Overview of Risk Management in The Construction Projects. Academic Research International, 9(2), 73–79.
9. Abazid, M. (2017). The Quality Control Implementation in the Construction Projects in Saudi Arabia.
10. Nouban, F. & Abazid, M. (2017). An Overview of The Total Quality Management in Construction Management. Academic Research International, 8(4), 68-74.
11. Abazid, M., & Gökçekus, H. (2019). Application of Total Quality Management on The Construction Sector in Saudi Arabia. International
Journal of Technology. 12. Abazid, M., Gökçekus, H. and Çelik, T. (2019). Study of the Quality concepts Implementation in the Construction of Projects in Saudi
Arabia by using building information Modelling (BIM). International Journal of Innovative Technology and Exploring Engineering, 8(3), 84-87.
13-17
5.
Authors: Gopi Dattatreya and K. K. Naik
Paper Title: Circular Patch on Rectangular Slits loaded Antenna with DGS for Biomedical Applications
Abstract: In recent times, sustainable construction is universally considered essential in structure developments,
specifically in the commercial fields. Moreover, a nationwide non-profit association, USGBC (United States Green
Building Council), was capable of establishing regulations and an assessment system for the sustainable structures
known as LEED or the Leadership in Energy and Environmental Design. The fundamental basis for green
structures is utilization of sustainable proficiency techniques either in newly constructed developments or
renovations of existing estates, so that the operating and maintenance expenditures are reduced. While the rental
cost or value of the structure is increased, the energy cost is minimized. Conversely, practical verification affecting
the valuing techniques of sustainable structures and properties is restricted. Hence, the objective of the
following study is to acknowledge the concerns linked to sustainable commercial developments and the rate-added
interval, in which the aspects that influence energy costs are examined. The rate- added interval depicts the
variations among the high value of construction value and energy rates, where a green profit is resembled by a
positive difference value.
Keywords: Sustainable, Structures, LEED, Rate-Added Interval, Green Building Council.
References:
1. S. Yano and A. Ishimaru, "A theoretical study of the input impedance of a circular microstrip disk antenna," IEEE Transactions on
Antennas and Propagation, vol. 29, pp. 77-83, 1981.
2. K. S. Kim, T. Kim, and J. Choi, "Dual‐frequency aperture‐coupled square patch antenna with double notches," Microwave and Optical
Technology Letters, vol. 24, pp. 370-374, 2000.
3. G. D. Ntouni, A. S. Lioumpas, and K. S. Nikita, "Reliable and energy-efficient communications for wireless biomedical implant
systems," IEEE journal of biomedical and health informatics, vol. 18, pp. 1848-1856, 2014. 4. K. K. Naik, P. A. V. Sri, and J. Srilakshmi, "Design of implantable monopole inset-feed c-shaped slot patch antenna for bio-medical
applications," in Progress in Electromagnetics Research Symposium-Fall (PIERS-FALL), 2017, 2017, pp. 2645-2649.
18-21
5. A. Kiourti and K. S. Nikita, "Miniature scalp-implantable antennas for telemetry in the MICS and ISM bands: design, safety
considerations and link budget analysis," IEEE Transactions on Antennas and Propagation, vol. 60, pp. 3568-3575, 2012.
6. X. Tong, C. Liu, X. Liu, H. Guo, and X. Yang, "Switchable ON-/OFF-Body Antenna for 2.45 GHz WBAN Applications," IEEE Transactions on Antennas and Propagation, vol. 66, pp. 967-971, 2018.
7. S. A. Kumar and T. Shanmuganantham, "Design of implantable CPW fed monopole H-slot antenna for 2.45 GHz ISM band
applications," AEU-International Journal of Electronics and Communications, vol. 68, pp. 661-666, 2014.
8. Ketavath Kumar Naik and Dattatreya Gopi, "Flexible CPW-fed split-triangular shaped patch antenna for WiMAX applications,
"Progress In Electromagnetics Research M, vol. 70, pp. 157–166, 2018.
9. C. Liu, Y.-X. Guo, and S. Xiao, "Compact dual-band antenna for implantable devices," IEEE Antennas and Wireless Propagation Letters, vol. 11, pp. 1508-1511, 2012.
10. H. Younesiraad, M. Bemani, and S. Nikmehr, "A Dual-Band Slotted Square Ring Patch Antenna for Local Hyperthermia Applications,"
Progress In Electromagnetics Research, vol. 71, pp. 97-102, 2017.
6.
Authors: K. Haribabu, Ch. Umashankar, S.V.S Prasad
Paper Title: An IoT Detection of Milk Parameters using Raspberry PI and GSM for Diary Farmers
Abstract: The Raspberry pi development board controller which based to measure some of the parameters. It
will be very simple to measure the milk parameters of ph value fat and CLR value. The ph detector it will detects
the ph value levels in the milk and similarly in the same way the lactometer will measure how the milk purity
obtained. The milk purity will be studied deeply by purely qualitatively quantitatively. In this domain the sensors
will be interfaced to the raspberry pi controller. Every farmer will have Rfid interface user id and it will be
connected to farmer mobile number by the gsm module. The measured parameters of milk will be sms to the
connected to the farmer mobile number. The measured content will be uploaded to the webpage through internet
using the gprs with date and time it will be displayed in the lcd monitor. It can be a coffee price and economical
tool to sight purityness of the milk. With the assistance of GSM and GPRS method the milk can be easily traded
and reading parameter information of milk will be sent to the govt so it will be helpful to the govt about the illegal
things can be overcome such as milk impurity. The farmers swipes RFID the cardboard it reads the Milk
parameters like pH worth CLR and every RFID coupled with various farmer mobile variety, once mensuration
done of the Milk parameters SMS the parameters information to the farmer. By exploitation the GPRS technology
the knowledge will transfer to the server for the longer term analysis and records.
Keywords: Raspberry Pi, Rfid Reader Module, GSM Module, Ph Sensor, CLR(Corrected lactometer Reading),
IOT(Thing speak).
References: 1. Prof. S.V. Arote, Prof. S.B. Lavhate, Prof. V. S. 2. Phatangare, “Low value Milk Analyzing and asking System victimization Electronic Card”, International Journal of Computer
Technology and physical science Engineering-Volume two, Issue 2.Page no 5 to 13.
3. Sheryl S. Chougule, Mahesh S. Kumbhar, “To Develop processing System for farm Auto ----mation”,International Journal of
engineering and Electronics Engineering and Science Vol.No.05, May 2016.
4. Kejal monarch, Rajeshri Kelkar, Amruta fish genus, M .S. Chavan, “Photometric primarily based Sensor for Fat Detection in
contemporary Milk”, International Journal of Innovative Research in pc and communication Engineering.vol 3,Issue 4,April 2015. 5. Prof.A.S.Mali1, Arena A. Chougale, “Low Budget
6. System for measure of Milk Parameters and asking for Dairy” SSRG International Journal of Electronics
and Communication Engineering – Volume two, Issue 5, May 2015. 7. Ropak Chakravarty, a paper on IT at Milk Collection centres in cooperative Diaries:The National Dairy Development Board
Experience,pp 37-47.
22-24
7.
Authors: Gousiya Begum, S. Zahoor Ul Huq, A.P. Siva Kumar
Paper Title: Security Vulnerabilities in Hadoop Framework
Abstract: Apache Hadoop emerged as the widely used distributed parallel computing framework for Big Data
Processing. Apache Hadoop is an open source framework suitable for processing large scale data sets using
clusters of computers. Data is stored in Hadoop using Hadoop Distributed File System. Though Hadoop is widely
used for distributed parallel processing of Big Data, some security vulnerabilities does exist. As part of our
research we have investigated Hadoop Framework for possible security vulnerabilities and also demonstrated the
mechanism to address the identified security vulnerabilities. Our findings include the vulnerabilities in logging
mechanism, file system vulnerabilities, and addition of external jar files to the framework. we have addressed
these vulnerabilities using custom Map Reduce jobs.
Keywords: Custom Map Reduce, Hadoop Distributed File System, Hadoop Framework, Security vulnerabilities.
References: 1. Srinivasan, Madhan Kumar, and P. Revathy, "State-of-the-art Big Data Security Taxonomies," Proceedings of the 11th Innovations in
Software Engineering Conference, ACM, 2018.
2. Wang, Jiayin, et al. "Seina: A stealthy and effective internal attack in hadoop system," Computing, Networking and Communications (ICNC), 2017 International Conference on. IEEE, 2017.
3. Parmar, Raj R., et al. "Large-scale encryption in the Hadoop environment: Challenges and solutions," IEEE Access 5 (2017): 7156-7163.
4. Rao, P. Ram Mohan, S. Murali Krishna, and AP Siva Kumar. "Privacy preservation techniques in big data analytics: a survey," Journal of Big Data 5.1 (2018): 33.
5. Dou, Zuochao, et al. "Robust insider attacks countermeasure for Hadoop: Design and implementation,." IEEE Systems Journal 12.2
(2018): 1874-1885. 6. Cloud Security Overview https://www.cloudera.com/documentation/enterprise/5-12-x/PDF/cloudera-security.pdf
25-28
8.
Authors: T. Raghavendra Vishnu, D. Venkata Ratnam, P. Bhanu Priyanka, M. Sridhar, K. Padma Raju
Paper Title: Detection and Analysis of Cycle Slips from GNSS Observations
Abstract: Global Positioning System (GPS) receiver’s high precision and high reliability has gained importance in
recent years as a result of continuous demand for GPS applications in various fields. In order to obtain accurate
positioning information the GPS receivers use carrier phase measurements for high-precision applications. Carrier
phase measurements are greatly affected by Cycle Slips (CS). In this paper, detection of the cycle slips analysis is
carried out using the raw carrier phase data recorded for the solar maximum year 2013 at Koneru Lakshmaiah (K
L) University, Guntur, India. Higher-order phase differencing scheme is used for the detection of the cycle slips.
At higher-order differences, the amplification of sudden jumps associated with the cycle slips can be observed
thereby improving the ability to detect cycle slips. It is found that cycle slips occurrence is high during the solar
maximum year (2013). The connection of cycle slip occurrence with ionospheric scintillations is also investigated.
During the geomagnetic storm event on 29 June, 2013, maximum S4 has been observed due to fall in C/N0 leading
to occurrence of cycle slips. Empirical Mode Decomposition-Detrended Fluctuation Analysis (EMD-DFA)
algorithm is used for mitigating the effects of ionospheric scintillations.
Keywords: Cycle slips, EMD-DFA, Scintillations
References: 1. Hoffmann-Wellenhof, B., H. Lichtenegger, and J. Collins (1994), GPS theory and practice, Springer-Verlag, New York. 2. Leick, A., L. Rapoport, and D. Tatarnikov (2015), GPS satellite surveying, John Wiley & Sons.
3. Dai, Z. (2012), MATLAB software for GPS cycle-slip processing, GPS solutions, 16(2), 267-272.
4. Skone, S., K. Knudsen, and M. De Jong (2001), Limitations in GPS receiver tracking performance under ionospheric scintillation conditions, Physics and Chemistry of the Earth, Part A: Solid Earth and Geodesy, 26 (6), 613-621.
5. Silva, P. (2013), Cycle Slip Detection and Correction for Precise Point Positioning, Proceedings of the Institute of Navigation ION GNSS,
22 (2015), 47. 6. Blewitt, G. (1990), Jet Propulsion Laboratory, California Institute of Technology, Pasadena, Geophysical Research Letters, 17(3), 199-
202.
7. de Lacy, M. C., M. Reguzzoni, F. Sansò, and G. Venuti (2008), The Bayesian detection of discontinuities in a polynomial regression and its application to the cycle-slip problem, Journal of Geodesy, 82(9), 527-542.
8. Sunda, S., R. Sridharan, B. Vyas, P. Khekale, K. Parikh, A. Ganeshan, C. Sudhir, S. Satish, and M. S. Bagiya (2015), Satellite‐based
augmentation systems: A novel and cost‐effective tool for ionospheric and space weather studies, Space Weather, 13 (1), 6-15.
9. Liu, Z. (2011), A new automated cycle slip detection and repair method for a single dual-frequency GPS receiver, Journal of Geodesy,
85(3), 171-183.
10. Dai, Z., S. Knedlik, and O. Loffeld (2009), Instantaneous triple-frequency GPS cycle-slip detection and repair, International Journal of Navigation and Observation.
11. Kim, D., and R. B. Langley, Instantaneous Real‐Time Cycle‐Slip Correction for Quality Control of GPS Carrier‐Phase Measurements
(2002), Navigation, vol. 49, pp. 205-222.
12. Banville, S., R. Langley, S. Saito, and T. Yoshihara (2010), Handling cycle slips in GPS data during ionospheric plasma bubble events, Radio Science, vol. 45.
13. Zhang, D., L. Cai, Y. Hao, Z. Xiao, L. Shi, G. Yang, and Y. Suo (2010), Solar cycle variation of the GPS cycle slip occurrence in China
low‐latitude region, Space Weather, 8(10).
14. Zhao, L., L. Li, Y. Liu, and N. Li (2014), Cycle slip detection and repair with triple frequency combination method, paper presented at
2014 IEEE/ION Position, Location and Navigation Symposium-PLANS 2014, IEEE. 15. Yue, X., W. S. Schreiner, N. M. Pedatella, and Y. H. Kuo (2016), Characterizing GPS radio occultation loss of lock due to ionospheric
weather, Space Weather, 14 (4), 285-299.
16. Dejie Yu, Junsheng Cheng, Yu Yang (2003), Application of EMD method and Hilbert spectrum to the fault diagnosis of roller bearings, doi:10.1016/S0888-3270(03)00099-2.
17. Yih Jeng, Ming-Juin Lin, Chih-Sung Chen, and Yu-Huai Wang (2007), Noise reduction and data recovery for a VLF-EM survey using a nonlinear decomposition method, Geophysics,Vol. 72, No. 5, P. F223–F235.
18. Kantelhardt, J. W., S. A. Zschiegner, E. Koscielny-Bunde, S. Havlin, A. Bunde, and H. E. Stanley (2002), Multifractal detrended
fluctuation analysis of nonstationary time series, Physica A: Statistical Mechanics and its Applications, 316(1), 87-114. 19. Saba, M. F., W. Gonzalez, and A. Clúa de Gonzalez (1997), Relationships between the AE, ap and Dst indices near solar minimum (1974)
and at solar maximum (1979), Annales Geophysicae, pp. 1265-1270.
20. Afraimovich, E. L., V. V. Demyanov, T. N. Kondakova (2003), Degradation of GPS performance in geomagnetically disturbed conditions, GPS Solutions, No.7, 109–119.
21. Koster, J. R., Equatorial scintillation (1972), Planetary and Space Science, vol. 20, pp. 1999-2014.
22. Burke, W., L. Gentile, C. Huang, C. Valladares, and S. Su, Longitudinal variability of equatorial plasma bubbles observed by DMSP and
ROCSAT‐1 (2004), Journal of Geophysical Research: Space Physics, vol. 109.
23. Tanna, H., and K. Pathak, Multifractality due to long-range correlation in the L-band ionospheric scintillation S 4 index time series (2014), Astrophysics and Space Science, vol. 350, pp. 47-56.
29-34
9.
Authors: Albert Allen D Mello, G. Ramanan, Dhanaya Prakash R Babu
Paper Title: Effect of Carbon Nanotube Layers on Change in Mechanical Characteristic of E-Glass Fiber
Reinforced Epoxy Composite
Abstract: Polymer composite reinforced with fiber materials have always proven its superior significant
enactment over numerous traditional materials, considering their incomparable strength to weight ratio and
stiffness. The Carbon nanotubes (CNTs) usage in glass-fiber reinforced polymer (GFRP) has high potential in
changing the characteristics of composite laminates. Carbon nanotubes (CNT) because of their outstanding
mechanical, electrical and thermal properties have engrossed composite fraternity in exploring the opportunity of
utilizing them as a supplementary reinforcement in fiber reinforced polymer composites. Reports of the fabrication
of GFRP with and without CNT are discussed in this paper. The target in this study is to examine the mechanical
characters of GFRP with and without Multi-walled carbon nanotubes (MWCNT). GFRP laminated composite are
fabricated by hand lay-up technique. Composite laminated layers are fabricated using epoxy resin without CNT
and with 0.5% and 1.5% MWCNT. The materials were tested to determine tensile, flexural and compression
properties. It is observed that carbon nanotubes can enhance the mechanical properties in the composite laminates.
Composite laminate with 1.5wt% MWCNT exhibited good mechanical properties compared to that with 0.5wt%
MWCNT and without MWCNT.
35-40
Keywords: CFRP Composites, Carbon nanotubes, Mechanical Characteristics, Bending moment
References: 1. Friedrich, K. Polymer composites for tribological applications. Advanced Industrial and Engineering Polymer Research. 1(1), 2018, pp.3-
39.
2. Saba, N., & Jawaid, M. A Review on Thermo mechanical Properties of Polymers and Fibers Reinforced Polymer Composites. J. of
Industrial and Engineering Chemistry, 67, 2018, pp.1-11.
3. Darwins, A. K., Satheesh, M., and Ramanan, G., Modelling and optimization of friction stir welding parameters of Mg-ZE42 alloy using
grey relational analysis with entropy measurement. IOP Conference Series: Materials Science and Engineering, 402(1), 2018, pp.12162.
4. Islam, M. E., Mahdi, T. H., Hosur, M. V., and Jeelani, S. Characterization of carbon fiber reinforced epoxy composites modified with
nanoclay and carbon nanotubes. Procedia Engineering, 105, 2015, pp.821-828.
5. Periyardhasan, R., and Devaraju, A. Mechanical Characterization of Steel Wire Embeded GFRP Composites. Materials Today:
Proceedings, 5(6), 2018, pp.14339-14344.
6. Ramanan, G., Dhas, J. E. R. Multi Objective Optimization of Wire EDM Machining Parameters for AA7075-PAC Composite Using Grey-
Fuzzy Technique. Materials Today: Proceedings, 5(2), 2018, pp.8280-8289.
7. Maciel, N. D. O. R., Ferreira, J. B., da Silva Vieira, J., Ribeiro, C. G. D., Lopes, F. P. D., Margem, and Silva, L. C. Comparative tensile
strength analysis between epoxy composites reinforced with curaua fiber and glass fiber. Journal of Materials Research and Technology,
2018, pp.136-148.
8. Rana, R. S., Rana, S., and Purohit, R. Characterization of Properties of epoxy sisal/Glass Fiber Reinforced hybrid composite. Materials
Today: Proceedings, 4(4), 2017, pp.5445-5451.
9. Sivasaravanan, S., and Raja, V. B. Impact characterization of epoxy LY556/E-glass fibre/nano clay hybrid nano composite
materials. Procedia Engineering, 97, 2014, pp.968-974.
10. Ramanan, G., Samuel, G.D., Sherin, S.M., Samuel, K.., Modeling and prediction of machining parameters in composite manufacturing
using artificial neural network, IOP Conference Series: Materials Science and Engineering, 402, 2018, pp.012163.
11. Naqi, A., Abbas, N., Zahra, N., Hussain, A., and Shabbir, S. Q. Effect of multi-walled carbon nanotubes (MWCNTs) on the strength
development of cementations materials. Journal of Materials Research and Technology, 2018, pp.156-163.
12. Masoumeh Nazem Salimi, Mehdi Torabi Merajin and Mohammad Kazem Besharati Givi, Enhanced mechanical properties of
multifunctional multiscale glass/carbon/epoxy composite reinforced with carbon nanotubes and simultaneous carbon nanotubes/nanoclays,
Journal of Composite Materials, 2016, pp.1–14.
10.
Authors: K.S Rajasekhar, T Ranga Babu
Paper Title: Analysis of Dermoscopic Images using Multiresolution Approach
Abstract: Abnormal growth of cells in any part of the body is called cancer. Cancer that is formed on skin is
called skin cancer. Life span of a cancer patient can be increased by the early detection of tumor part. This paper
deals with classification of dermoscopic images, i.e. benign or malignant based on coefficients extracted from
multiresolution analysis based wavelet functions and tetrolet transform. Statistical texture features such as Mean,
Standard Deviation, Kurtosis and Skewness are calculated from the coefficients of the multiresolution transfroms.
The Gray Level Co-occurence Matrix(GLCM) is calculated for the dermoscopic images from which features such
as homogenity, energy and entropy are calculated. In addition to these shape features are also taken into
consideration. K-Nearest Neighbor(KNN) classifier is used for classification of dermoscopic images. In this work,
dermoscopic images are obtained from the International Skin Imaging Archive (ISIC). The performance of the
system is evaluated using accu-racy, sensitivity and specificity. The area under the curve(AUC) demonstrates the
superiority of tetrolet transform.
Keywords: Dermoscopic images, Texture features, GLCM features, Shape features, KNN classifier, Accuracy,
Sensitivity, Specificity and AUC.
References: 1. http://www.skincancer.org/skin-cancer-information/skin-cancer-facts. 2. Sheha, Mariam A., Mai S. Mabrouk, and Amr Sharawy. "Automatic detection of melanoma skin cancer using texture analysis."
International Journal of Computer Applications 42.20 (2012): 22-26.
3. Dobrescu, Radu, et al. "Medical images classification for skin cancer diagnosis based on combined texture and fractal analysis." WISEAS Transactions on Biology and Biomedicine 7.3 (2010): 223-232.
4. Celebi, M. Emre, et al. "A methodological approach to the classification of dermoscopy images." Computerized Medical Imaging and
Graphics 31.6 (2007): 362-373.
5. Lau, Ho Tak, and Adel Al-Jumaily. "Automatically early detection of skin cancer: Study based on nueral netwok classification." Soft
Computing and Pattern Recognition, 2009. SOCPAR’09. International Conference of. IEEE, 2009.
6. Elgamal, Mahmoud. "Automatic skin cancer images classification." IJACSA) International Journal of Advanced Computer Science and Applications 4.3 (2013): 287-294..
7. Yuan, Xiaojing, et al. "SVM-based texture classification and application to early melanoma detection." Engineering in Medicine and
Biology Society, 2006. EMBS’06. 28th Annual International Conference of the IEEE. IEEE, 2006. 8. Yu, Lequan, et al. "Automated melanoma recognition in dermoscopy images via very deep residual networks." IEEE transactions on
medical imaging 36.4 (2017): 994-1004.
9. https://isic-archive.com. 10. Krommweh, Jens. "Tetrolet transform: A new adaptive Haar wavelet algorithm for sparse image representation." Journal of Visual
Communication and Image Representation 21.4 (2010): 364-374J. Jones. (1991, May 10). Networks (2nd ed.) [Online]. Available:
http://www.atm.com 11. (Haenssle, H. A., et al. "Man against machine: diagnostic performance of a deep learning convolutional neural network for dermoscopic
melanoma recognition in comparison to 58 dermatologists." Annals of Oncology (2018).
12. Bi, Lei, et al. "Dermoscopic image segmentation via multi-stage fully convolutional networks." IEEE Trans. Biomed. Eng 64.9 (2017): 2065-2074.
13. Rahman, Mahmudur, Nuh Alpaslan, and Prabir Bhattacharya. "Developing a retrieval based diagnostic aid for automated melanoma
recognition of dermoscopic images." 2016 IEEE Applied Imagery Pattern Recognition Workshop (AIPR). IEEE, 2016 14. Sultana, Nazneen N., and N. B. Puhan. "Recent Deep Learning Methods for Melanoma Detection: A Review." International Conference
on Mathematics and Computing. Springer, Singapore, 2018.
15. Adria Romero,Lopez et al. "Skin lesion classification from dermoscopic images using deep learning techniques." Biomedical Engineering (BioMed), 2017 13th IASTED International Conference on. IEEE, 2017.
41-48
16. Codella, Noel, et al. "Deep learning, sparse coding, and SVM for melanoma recognition in dermoscopy images." International Workshop
on Machine Learning in Medical Imaging. Springer, Cham, 2015.
17. Yu, Lequan, et al. "Automated melanoma recognition in dermoscopy images via very deep residual networks." IEEE transactions on medical imaging 36.4 (2017): 994-1004.
18. Oliveira, Roberta B., Aledir S. Pereira, and João Manuel RS Tavares. "Skin lesion computational diagnosis of dermoscopic images:
Ensemble models based on input feature manipulation." Computer methods and programs in biomedicine 149 (2017): 43-53.
19. Yi, Xin, Ekta Walia, and Paul Babyn. "Unsupervised and semi-supervised learning with Categorical Generative Adversarial Networks
assisted by Wasserstein distance for dermoscopy image Classification." arXiv preprint arXiv:1804.03700 (2018).
20. Castillejos-Fernández, Heydy, et al. "An Intelligent System for the Diagnosis of Skin Cancer on Digital Images taken with Dermoscopy." Acta Polytechnica Hungarica 14.3 (2017).
21. Majtner, Tomas, Sule Yildirim-Yayilgan, and Jon Yngve Hardeberg. "Combining deep learning and hand-crafted features for skin lesion
classification." Image Processing Theory Tools and Applications (IPTA), 2016 6th International Conference on. IEEE, 2016
11.
Authors: K Ram Prasad, B Rajasekhar Reddy, C Hari Prasad, Dinakara Prasad Reddy P
Paper Title: Monarch Butterfly Optimization Algorithm for Capacitor Placement in Radial Distribution Systems
Abstract: Monarch butterfly optimization (MBO) is used for the optimal capacitor placement problem. Loss
Sensitivity method is used for optimal locations of capacitors. Capacitor sizes by MBO algorithm in radial
distribution systemscorresponding to maximum loss reductions are determined in this paper. The results are
presented with test system15-bus, 34-bus and 69-bus.
Keywords: Monarch butterfly optimization algorithm, Loss Sensitivity Method.
References: 1. Karimianfard, Hossein, and Hossein Haghighat. "Generic Resource Allocation in Distribution Grid." IEEE Transactions on Power
Systems 34, no. 1 (2019): 810-813.
2. Mandal, S., K. K. Mandal, B. Tudu, and N. Chakraborty. "A New Improved Hybrid Algorithm for Multi-objective Capacitor Allocation
in Radial Distribution Networks." In Soft Computing for Problem Solving, pp. 585-597. Springer, Singapore, 2019. 3. Cuevas, Erik, Emilio BarocioEspejo, and Arturo Conde Enríquez. "A Modified Crow Search Algorithm with Applications to Power
System Problems." In Metaheuristics Algorithms in Power Systems, pp. 137-166. Springer, Cham, 2019.
4. Reddy, P., et al. "An Efficient Distribution Load Flow Method for Radial Distribution Systems with Load Models." International Journal Of Grid And Distributed Computing 11.3 (20Reddy,
5. Veera, DinakaraPrasasd Reddy P. VC, and Reddy T. Gowri. "Ant Lion optimization algorithm for optimal sizing of." Electrical Power &
Energy Systems 28 (2017): 669-678. 6. DinakaraPrasasd Reddy, P. V. C., and T. Reddy Dr. "Optimal renewable resources placement in distribution." Electrical Power & Energy
Systems 28 (2017): 669-678.
7. Dinakara Prasad Reddy. "Sensitivity based capacitor placement using cuckoo search algorithm for maximum annual savings." IOSR Journal of Engineering 4.4 (2014): 6.
8. G. G. Wang, X. Zhao and S. Deb, "A Novel Monarch Butterfly Optimization with Greedy Strategy and Self-Adaptive," 2015 Second
International Conference on Soft Computing and Machine Intelligence (ISCMI), Hong Kong, 2015, pp. 45-50.
49-51
12.
Authors: Jyothi Budida, Sanjai Kumar Mortha, Sreerama Lakshmi Narayana
Paper Title: Constrained Optimization of Linear Antenna Arrays using Novel Social Group Optimization Algorithm
Abstract: Antenna array optimization is a major research problem in the field of electromagnetic and antenna
engineering. The optimization typically involves in handling several radiation parameters like Sidelobe level (SL)
and beamwidth (BW). In this paper, the linear antenna array (LAA) configuration is considered with symmetrical
distribution of excitation and special distribution. The objective of the design problem considered involves in
generating optimized patterns in terms of SLL and BW and check the robustness of the social group optimization
algorithm (SGOA). The analysis of the design problem is carried out in terms of radiation pattern plots. The
simulation is carried out in Matlab.
Keywords: Antenna array, optimization, SGOA
References: 1. Balanis, C. A., Antenna Theory: Analysis and Design, John Wileyand Sons, 1982
2. Cheng, K. D: Optimization techniques for antenna arrays. In: Proceedings of the IEEE, 59(12) 1664–1674 (1971) . 3. On the Linear Antenna Array Synthesis Techniques for Sum and Difference Patterns
4. Using Flower Pollination Algorithm V. V. S. S. S. Chakravarthy · P. S. R. Chowdary · Ganapati Panda ·Jaume Anguera · Aurora Andújar
· Babita Majhi Proceedings of Arabian Journal for Science and Engineering – Springer Nature Hub. 5. Ram, G.; Mandal, D.; Ghoshal, S.P.; Kar, R.: Nature-inspired algorithm- based optimization for beamforming of linear antenna array
system. In: Patnaik, S. et al. (eds.) Nature-Inspired Computing and Optimization 2017, pp. 185–215. Springer, Berlin. doi:10.1007/978-3-
319-50920-4_8 6. Performance of Beamwidth Constrained Linear Array Synthesis Techniques Using Novel Evolutionary Computing Tools CSR Paladuga,
CV Vedula, J Anguera, RK Mishra, AAndújar, applied computational electromagnetics society journal 33 (3),273-278
7. Saxena, P.; Kothari, A.: Linear Antenna Array Optimization Using Flower Pollination Algorithm. Springer, Berlin(2016). 8. Suresh Satapathy and Anima Naik.:Social group optimization (SGO): a new population evolutionary optimization technique. In: Complex
Intell. Syst., (2) 173–203 (2016).
9. Antenna Array Synthesis Using Social Group Optimization VS Chakravarthy, PSR Chowdary, SC Satpathy, SK Terlapu, J Anguera Microelectronics, Electromagnetics and Telecommunications,895-905.
52-56
13.
Authors: Suvarna Sharma, Amit Bhagat
Paper Title: Automation of Manual Seed URLs Cull Approach for Web Crawlers
Abstract: Web mining has become a more emerging topic these days and is speedily increasing with the
growth of data on web. It is playing an essential role in our life as it helps us providing quicker information by
using new trends and technologies to improve. Hyperlink structure analysis and web crawling provide scope for
more advanced research topics. If a system coverers various most relevant web pages in search engine
57-63
environment, then it can improve the result of search engine. This URL’s set may be useful for extracting more
relevant information or improving on existing and may also be useful to manage crawling infrastructure to offer
quicker responses. Today, web crawling is an emerging issue in search engine which considers search quality,
accessing pages at various servers to extract features. In the current scenario, the user may only be interested in the
best result with some specific constraints. The constraint may define to the domain of search or importance of
relevant pages. Here, we consider important or useful pages for particular user in searching environment. We
proposed a framework, namely BUDG (Base URL’s Set for Directed Graph) which deals with URL’s hyperlink
structure and generates a min set of ‘K’ URLs and then discover the covered graph for directed graph.
Experimental results show that the proposed framework is working properly for different domain.
Keywords: Information Retrieval, Seed URLs, Web crawler, Web graph analysis, Web Mining.
References: 1. S. Brin, and L. Page , “The anatomy of a large-scale hypertextual web
2. search engine,” Computer networks and ISDN systems, vol. 30, no. 1,pp.107-117,Apr. 1998.
3. S. Sharma, A. Bhagat, “Research on Ranking Algorithms in Web Structure Mining,” International Journal of Knowledge Based Computer Systems, vol. 3, no. 2, pp.13-20, Dec. 2015.
4. S. Mirtaheri, M. E. Dincturk, S. Hooshmand, G. Bochmann and G.-V. Jourdan, “A Brief History of Web Crawlers,” Proc. of the 2013 Conf.
of the Center for Advanced Studies on Collaborative Research. IBM Corp, pp.40-54, Nov. 2013. 5. C. Olston and M. Najork, “Web crawling,” Foundations and Trends in Information Retrieval, vol. 4,no. 3, pp.175-246, Feb. 2010.
6. S. Zheng, P. Dmitriev, and C. Giles, “Graph based crawler seed selection,” In Proc. of the 18th ACM international Conf. on Information
and knowledge management, ACM, pp.1089-1090, Nov. 2009. 7. P. Dmitriev, “Host-based seed selection algorithm for web crawlers,” US Patent App. 12/259,164, Oct. 2008.
8. P. N. Priyatam, A. Dubey, K. Perumal, S. Praneeth, D. Kakadia, and V. Varma, “Seed Selection for Domain-Specific Search,” In Proc. of the 23rd International Conf. on World Wide Web, ACM, pp.923-928, April 2014.
9. Y. J. Du, Y. F. Hai, C. Z. Xie, and X. M. Wang, “An approach for selecting seed URLs of focused crawler based on user-interest ontology,”
Applied Soft Computing , (Elsevier) , vol.14, pp.663–676, Jan. 2014. 10. Weisstein and W. E., “Website of the Simple Directed Graph – from Wolfram Math world,” 1996
11. J. M. Kleinberg, “Authoritative sources in a hyperlinked environment,” Journal of the ACM, vol.46,no.5, pp.604-632, Sep. 1999.
12. TORONTO.EDU, “Website of the Datasets for Experiments on Link Analysis Ranking Algorithms,” http://www.cs.toronto.edu/tsap/experiments/datasets/index.html, 1986
14.
Authors: Pranta Sutradhar, Pritam Maity, Sayan Kar, Sourav Poddar
Paper Title: Modelling and Optimization of PSA (Pressure Swing Adsorption) Unit by using Aspen Plus® and
Design Expert ®
Abstract: Pressure swing adsorption (PSA) is a well-established technique for separation of components from
air, which is commonly known as Air Separation Unit (ASU), drying of gas and nitrogen and hydrogen
purification separation and etc. In PSA processes, the most important is adsorbent material depending upon its
properties. Generally, ASU is difficult to operate due to high degree of energy integration into itself. This research
article represents the separation of nitrogen from air. As separation of nitrogen is a very important in the field of
chemical engineering as it has wide applications in the various process industries. There are various techniques for
separation of nitrogen, amongst them the most common are reverse stirling cycle, LINDE-HAMPSON cycle, Joule
Thompson effect and etc. This article mainly focusses on the separation of nitrogen using PSA unit only. The
whole process was simulated using Aspen Plus ® and the simulated results were then optimized using Design
Expert ®. Various flowrates ranging from 50 kg/h to 200 kg/h were selected, depending upon the process
conditions. The output of the simulated results from Aspen Plus ® were then optimized using Box Behnken
method, in order to obtain the optimized flowrate of Nitrogen. The response pattern suggest that the flowrates of
nitrogen and other gases follows quadratic equation. The significance of the coefficients of the equation and the
adequacy of the fit were determined using Student-t test and Fischer F-test respectively. The final flowrates
obtained are interchanged in order to obtain the maximum conditions, except for nitrogen production other
production rates remain the same.
Keywords: Nitrogen, PSA (pressure swing Adsorption), Aspen Plus®, Design Expert®.
References: 1. Ming-Lung Li, Hao-Yeh Lee, Ming-Wei Lee and I-lung Chien,“ Simulation and Formula Regressionof an Air Separation Unit in China
Steel Corporation“ , ADCONP, 2014, pp. 213-218.
2. D.R.Vinson,“ Air separation control technology“, Computers and Chemical Engineering, 30, 2006, pp. 1436-1446 3. S.Ivanova, R. Lewis,“ Producing Nitrogen via Pressure swing Adsorption“, Chemical Engineering Progress,108(6), 2012, pp. 38 -42..
4. Z. Xu, J. Zhao, X. Chen, Z. Shao, J. Qian, L. Zhu, Z. Zhou, H. Qin,“ Automatic load change system of cryogenic air separation process“,
Separation and Purification Technology, 81, 2011, pp. 451-465. 5. Aspen Plus Tutorial #1: Aspen Basic. Available: https://www.aspentech.com
6. Aspen PlusTutorial #2: Thermodynamic Method. Available: https://www.aspentech.com
7. Stoecker W.F., “Design of Thermal stress”, Toronto, Tata McGraw Hill, 1986. 8. Aspen Tech, Aspen Physical Property System 11.1. Aspen Technology, Inc ,Cambridge, MA, USA, 2001, Available:
https://www.aspentech.com
9. http://www.statease.com/training.html (Stat-Ease Webinars) 10. Marcos Almeida Bezerra, Ricardo Erthal Santelli, Eliane Padua Oliveira, Leonardo SilveiraVillar, Luciane Amélia Escaleira, “Response
surface methodology (RSM) as a tool for optimization in analytical chemistry“, Talanta, 75(5), 2008, pp. 965 -977.
11. http://www.weibull.com/hotwire/issue130/hottopics130.htm (Box-Behnken Designs for optimizing Product Performance Designs for optimizing Product Performance)
12. Box, G. and Behnken, D., “Some New Three. Level Designs for the Study of Quantitative. Variables“, Technometrics, 2, 1960, pp. 455 – 475.
13. http://www.weibull.com/hotwire/issue130/hottopics130.htm (Box-Behnken Designs for optimizing Product Performance)
14. Chatterjee, S., B. Price, Regression Analysis by Example. 2nd Edition, John Wiley & Sons, New York, 1991, xvii, 278 pp., ISBN:
0‐471‐88479‐0, Available: https://onlinelibrary.wiley.com
64-69
15. W.F. Castle, “Air separation and liquefaction: recent developments and prospects for the beginning of the new millennium”,
International Journal of Refrigeration, 25, 2002, pp. 158-172.
16. Randall F. Barron, Cryogenic systems, 2nd edition, Oxford University Press, 1985, ISBN-13: 978-0195035674, Available: https://www.amazon.com.
15.
Authors: N. Phani Madhuri, A. Meghana, PVRD. Prasada Rao, P.Prem Kumar
Paper Title: Ailment Prognosis and Propose Antidote for Skin using Deep Learning
Abstract: Nowadays The disease prediction by the using the machine learning has become very common.
With the end goal to accomplish a compelling method to distinguish skin disease at a beginning period without
playing out any pointless skin biopsies, advanced pictures of melanoma skin injuries have been explored. In this
paper, distinctive computerized pictures have been investigated dependent on unsupervised division strategies.
feature extraction systems are then connected on these portioned pictures. After this, a complete dialog has been
investigated dependent on the outcomes. Melanoma spreads through metastasis, and along these lines it has been
turned out to be exceptionally deadly. Feature that excess prologue to radiations from the sun dynamically
disintegrate melanin in the skin. Likewise, such radiations invade into the skin thusly pulverizing the melanocyte
cells. Melanomas are uneven and have sporadic edges, indented edges, and shading assortments, so examining the
shape, shading, and surface of the skin sore is basic for melanoma early acknowledgment. In this work, the
fragments of an advantageous steady non-invasive skin sore examination structure to help the melanoma
abhorrence and early disclosure are proposed. The initial segment is a constant caution to help customers with
anticipating skin duplicate caused by sunshine; a novel condition to enroll the perfect open door for skin to
duplicate is along these lines introduced. The second part is an automated picture examination including picture
obtainment, hair area and dismissal, damage division, feature extraction, and plan. The framework has been
created in a propelled application in Matlab. The preliminary outcomes show that the proposed structure is
compelling, achieving high plan correctness
Keywords: Melanoma, Skin Biopsies, Non-Invasive, Unsupervised Division Strategies, Sporadic Fringes.
References: 1. S. Suer, S. Kockara, and M. Mete, ``An improved border detection in dermoscopy images for density-based clustering,''BMC
Bioinformat., vol. 12, no. 10, p. S12, 2011.
2. M. Rademaker and A. Oakley, ``Digital monitoring by whole body photography and sequential digital dermoscopy detect thinner melanomas,'‘ J. Primary Health Care, vol. 2, no. 4, pp. 268272, 2010.
3. O. Abuzaghleh, B. D. Barkana, and M. Faezipour, ``SKINcure: A real-time image analysis system to aid in the malignant melanoma
prevention and early detection,'' in Proc. IEEE Southwest Symp. Image Anal. Interpretation (SSIAI), Apr. 2014, pp. 8588. 4. O. Abuzaghleh, B. D. Barkana, and M. Faezipour, ``Automated skin lesion analysis based on color and shape geometry feature set for
melanoma early detection and prevention,'' inProc. IEEE Long Island Syst., Appl. Technol. Conf. (LISAT), May 2014, pp. 16. 5. (Mar. 27, 2014). American Cancer Society, Cancer Facts & Figures. [Online]. Available:
http://www.cancer.org/research/cancerfactsstatistics/ cancerfactsgures2014/index
70-74
16.
Authors: Sabjan S.N, Maheshwar Pratap
Paper Title: The Implementation of TPM on Manufacturing Performance at FMCG Company
Abstract: The focus of this paper is to enlighten the commitments of Quality Maintenance Pillar of TPM in
increasing the product quality in a FMCG industry involved in the manufacturing of HDPE bottles and coconut oil.
QM pillar is a critical activity of the TPM approach which expects to delight the customer through zero defect
manufacturing. TPM that is effectively implemented increases the production efficiency with an ultimate aim of
achieving zero losses, zero breakdown and zero defects. The main aim of QM pillar is to eliminate the non-
conformances in a methodical way and maintain the equipment for high quality products. Activities involved with
QM pillar was able to decrease the customer complaints and regulatory complaints to zero. The targets put forward
by the QM pillar was effectively achieved by the industry, the targets included maintaining the customer
complaints at zero, reduce the in process defects by 50% and increase the production of Total value of goods worth
50 lakhs to one crore worth SKU.
Keywords: TPM, Quality Maintanance pillar
References: 1. Cua, K. O., McKone, K. E., & Schroeder, R. G. (2001). Relationships between implementation of TQM, JIT, and TPM and manufacturing
performance. Journal of operations management, 19(6), 675-694. 2. McKone, K. E., Schroeder, R. G., & Cua, K. O. (2001). The impact of total productive maintenance practices on manufacturing
performance. Journal of operations management, 19(1), 39-58.
3. Ahuja, I. P. S., & Khamba, J. S. (2008). An evaluation of TPM initiatives in Indian industry for enhanced manufacturing performance. International Journal of Quality & Reliability Management, 25(2), 147-172.
4. Ahuja, I. P. S., & Khamba, J. S. (2007). An evaluation of TPM implementation initiatives in an Indian manufacturing enterprise. Journal
of quality in maintenance engineering, 13(4), 338-352. 5. Ahuja, I. P. S., & Khamba, J. S. (2008). Strategies and success factors for overcoming challenges in TPM implementation in Indian
manufacturing industry. Journal of Quality in Maintenance Engineering, 14(2), 123-147.
6. Chan, F. T. S., Lau, H. C. W., Ip, R. W. L., Chan, H. K., & Kong, S. (2005). Implementation of total productive maintenance: A case study. International journal of production economics, 95(1), 71-94.
7. Tangen, S. (2003). An overview of frequently used performance measures. Work study, 52(7), 347-354.
8. Brah, S. A., & Chong, W. K. (2004). Relationship between total productive maintenance and performance. International Journal of Production Research, 42(12), 2383-2401.
9. Blanchard, B. S. (1997). An enhanced approach for implementing total productive maintenance in the manufacturing environment. Journal
of quality in Maintenance Engineering, 3(2), 69-80. 10. Seth, D., & Tripathi, D. (2006). A critical study of TQM and TPM approaches on business performance of Indian manufacturing
industry. Total Quality Management & Business Excellence, 17(7), 811-824.
75-87
11. Eti, M. C., Ogaji, S. O. T., & Probert, S. D. (2004). Implementing total productive maintenance in Nigerian manufacturing
industries. Applied energy, 79(4), 385-401.
12. McKone, K. E., Schroeder, R. G., & Cua, K. O. (1999). Total productive maintenance: a contextual view. Journal of operations management, 17(2), 123-144.
17.
Authors: Riktesh Srivastava, Mohd. Abu Faiz
Paper Title: Reviews Analysis of Online Retail Stores in UAE: Analytical Study of Sentiments Through Social Media
Abstract: Text mining for social media has now become decisive tool for marketing, and many businesses
understand the supremacy of embracing technology into their marketing campaigns. These texts are the
“Consumer language”, owing to its spread and reach. There is no reservation that use of user generated texts has
stimulated the companies to identify them and use it for decision making, however, classifying sentiment analysis
through these texts is still a fresh sensation. Online retail companies in UAE are an early adopter of social media,
but how do they use text mining techniques is still a matter to wary upon. The study proposes a model to collect
reviews from multiple sources and identify sentiments and topics simultaneously. The model is the tested on 3
online retail companies in UAE and the results depicts productive outcomes.
Keywords: Sentiment Analysis, Liu Hu algorithm, Plutchik modeling, Latent Semantic Indexing.
References: 1. J. Marshall, “Companies Increasingly Trademark Hashtags,” Wall Street Journal, 30-Mar-2016. 2. W. G. Mangold and D. J. Faulds, “Social media: The new hybrid element of the promotion mix,” Bus. Horiz., vol. 52, no. 4, pp. 357–365,
Jul. 2009.
3. Read, “How to Increase Your Reach on Any Social Network,” 2015. [Online]. Available: https://blog.bufferapp.com/increase-reach. [Accessed: 10-Nov-2018].
4. J. Marshall, “Companies Increasingly Trademark Hashtags,” Wall Street Journal, 30-Mar-2016.
5. N. Patel, “How to Use Hashtags to Increase Your Online Presence,” 2014. [Online]. Available: https://www.quicksprout.com/2014/04/04/how-to-use-hashtags-to-increase-your-online-presence/. [Accessed: 10-Nov-2018].
6. Z. Yuzdepski, “Goodbye Stars, Hello Facebook Business Recommendations,” Vendasta Blog, 2018.
7. J. Jansen, M. Zhang, K. Sobel, and A. Chowdury, “Micro-blogging as online word of mouth branding,” in Proceedings of the 27th international conference extended abstracts on Human factors in computing systems - CHI EA ’09, Boston, MA, USA, 2009, p. 3859.
8. Y.-M. Li, C.-Y. Lai, and C.-W. Chen, “Identifying Bloggers with Marketing Influence in the Blogosphere,” in Proceedings of the 11th
International Conference on Electronic Commerce, New York, NY, USA, 2009, pp. 335–340. 9. L. Kolowich, “22 Customer Review Sites for Collecting Business & Product Reviews,” 2018. [Online]. Available:
https://blog.hubspot.com/service/customer-review-sites. [Accessed: 10-Nov-2018].
10. M. Hu and B. Liu, “Mining and Summarizing Customer Reviews,” in Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, New York, NY, USA, 2004, pp. 168–177.
11. N. Hu, I. Bose, N. S. Koh, and L. Liu, “Manipulation of online reviews: An analysis of ratings, readability, and sentiments,” Decis.
Support Syst., vol. 52, no. 3, pp. 674–684, Feb. 2012. 12. X. Hu, L. Tang, J. Tang, and H. Liu, “Exploiting Social Relations for Sentiment Analysis in Microblogging,” in Proceedings of the Sixth
ACM International Conference on Web Search and Data Mining, New York, NY, USA, 2013, pp. 537–546.
13. W. Ding, S. Yu, S. Yu, W. Wei, and Q. Wang, “LRLW-LSI: An Improved Latent Semantic Indexing (LSI) Text Classifier,” in Rough Sets and Knowledge Technology, 2008, pp. 483–490.
14. R. Ortega Bueno, A. Fonseca Bruzón, C. Muñiz Cuza, Y. Gutiérrez, and A. Montoyo, “UO_UA: Using Latent Semantic Analysis to Build
a Domain-Dependent Sentiment Resource,” in Proceedings of the 8th International Workshop on Semantic Evaluation (SemEval 2014), Dublin, Ireland, 2014, pp. 773–778.
15. Chiru, T. Rebedea, and S. Ciotec, “Comparison between LSA-LDA-Lexical Chains,” in WEBIST-2014, 2014, p. 8.
16. Haddi, X. Liu, and Y. Shi, “The Role of Text Pre-processing in Sentiment Analysis,” Procedia Comput. Sci., vol. 17, pp. 26–32, 2013. 17. K. Kenyon-Dean et al., “Sentiment Analysis: It’s Complicated!,” in Proceedings of the 2018 Conference of the North American Chapter
of the Association for Computational Linguistics: Human Language Technologies, Volume 1 (Long Papers), New Orleans, Louisiana,
2018, pp. 1886–1895. 18. Krouska, C. Troussas, and M. Virvou, “The effect of preprocessing techniques on Twitter sentiment analysis,” in 2016 7th International
Conference on Information, Intelligence, Systems Applications (IISA), 2016, pp. 1–5.
19. S. Guha, A. Joshi, and V. Varma, “Sentibase: Sentiment Analysis in Twitter on a Budget,” in Proceedings of the 9th International Workshop on Semantic Evaluation (SemEval 2015), Denver, Colorado, 2015, pp. 590–594.
20. R. Srivastava, “3 years - 3 moves Government verdicts to renovate Customary Bharat to Contemporary India: Evaluation of opinions from
citizens,” Int. J. Bus. Data Anal., vol. 1, no. 1, 2018. 21. B. Dickinson, M. Ganger, and W. Hu, “Dimensionality Reduction of Distributed Vector Word Representations and Emoticon Stemming
for Sentiment Analysis,” J. Data Anal. Inf. Process., vol. 03, p. 153, Nov. 2015.
22. S. M. Arif and M. Mustapha, “The Effect of Noise Elimination and Stemming in Sentiment Analysis for Malay Documents,” in Proceedings of the International Conference on Computing, Mathematics and Statistics (iCMS 2015), 2017, pp. 93–102.
23. C. Manning, P. Raghavan, and H. Schuetze, Introduction to Information Retrieval, 1st ed. England: Cambridge University Press, 2009.
24. Dempsey, “Porter2 Stemmer Documentation,” 2016. 25. Y. Lin, J. Zhang, X. Wang, and A. Zhou, “An Information Theoretic Approach to Sentiment Polarity Classification,” in Proceedings of
the 2Nd Joint WICOW/AIRWeb Workshop on Web Quality, New York, NY, USA, 2012, pp. 35–40. 26. R. Plutchik, “A psychoevolutionary theory of emotions,” Soc. Sci. Inf., vol. 21, no. 4–5, pp. 529–553, Jul. 1982.
27. R. Plutchik, “The Nature of Emotions: Clinical Implications,” in Emotions and Psychopathology, Springer, Boston, MA, 1988, pp. 1–20.
28. R. Srivastava and J. S. Rathore, “Content Analysis Concerning Online Shopping in UAE: Evaluation of Impact Score from News | International Journal of Business Analytics and Intelligence-Volume 6 Issue 1,” Int. J. Bus. Anal. Intell., vol. 6, no. 1, pp. 9–13, 2018.
88-92
18.
Authors: D. Rajesh, T. Jaya
Paper Title: Exploration on Cluster Related Energy Proficient Routing in Mobile Wireless Sensor Network
Abstract: Mobile Wireless Sensor Network is a encompassing of spatially conveyed self declaration frames
works with a correspondence for examining and recording circumstances at conflicting areas. Mobility based
wireless sensor network includes thousands of mobile sensor nodes in the heterogeneous network, wherever each
sensor nodes is associated with sensor node head. Mobility based wireless sensor network is arising and appealing
exploration region in which a few applications, for example, human services, agribusiness, and military are making
utilization of it. Energy proficiency is a standout amongst the most critical problem in mobility based wireless
sensor network. Clustering authorize high accessibility, overhead and parallel processing. A tactic is used in
93-97
heterogeneous moveable sensor network is clustering to reduce the energy exploitation and boosts the duration of
network. Clustering approach weaken mobility stream, restrict energy exploitation, develop remaining energy and
increase the duration of the heterogeneous sensor network mobile sensor network. This article assimilates
exploration of unusual energy productive clustering protocols in mobility based wireless sensor network.
Keywords: Mobile Wireless Sensor Network MWSN, clustering, Cluster-Head, Energy Effectiveness,
Information gathering, Security.
References: 1. Vishal Singh, 2016, “A Survey of Energy-Efficient-Clustering Algorithms in Wireless Sensor Networks”, International Journal of
Engineering and Computer Science. 2. M.Sheik Dawood et al, 2015, “A Survey on Energy-Efficient-Clustering Protocols for Wireless Sensor Networks,” International Journal
of Computer Science and Mobile Computing.
3. Vinay Kumar, Sanjeey Jain and Sudarshan Tiwari, “Energy-Efficient-Clustering Algorithms in Wireless Sensor Networks: Survey, 2011,” IJCSI International Journal of Computer Science, Vol. 8, No 2, pg. 259-268.
4. Firoj Ahamad, Rakesh Kumar, 2015 “Energy-Efficient-Routing Protocols for Wireless Sensor Networks: A Review,” International
Journal of Innovations & Advancement in Computer Science, Vol. 4, pg. 165-171. 5. Swati Shamkumar, Vimal Shukla, 2014, “A Review on Energy-Efficient Routing Protocols in Wireless Sensor Networks,” International
Journal of Emerging Technology and Advanced Engineering, Vol. 4, Pg. 653-657.
6. Sissy Annamma Johnson, Josmy George, 2016 , “A Survey on Different Types of Clustering-Based-Routing Protocols in Wireless Sensor Networks,” Journal of Research, Vol. 2, pg. 13-16.
7. Santal Pal Singh, S.C. Sharma, 2015, “A Survey on Cluster-Based Routing-Protocols in Wireless Sensor Networks,” International
Confrence in Advanced Computing Technologies and Applications, pg. 687- 695. 8. Sanjeev Kumar Gupta, Neeraj Jain, Poonam Sinha, 2013, “Clustering Protocols in Wireless Sensor Networks: A Survey”, International
Journal of Applied Information, Vol. 5, No-2, pg. 41-50. 9. Xu-Xun Liu, 2012,“A Survey on Clustering-Routing Protocols in Wireless Sensor Networks”, School of Electronic and Information
Engineering, ISSN 1424-8220.
10. Kunkunuru Udayakumar et al, 2015, “Analysis of Various Clustering-Algorithms in Wireless Sensor Networks”, International Journal of Computer Science and Information Technologies.
11. Vandna Sharma, Payal Jain, 2013, “Various Hierarchical-Routing Protocols in Wireless Sensor Network: A Survey,” IJCSMC, Vol. 2,
Issue.5, pg. 63-72. 12. R.U. Anitha P. Kamalakkannan, 2013,“EEDBC-M: Enhancement of Leach-Mobile protocol with Energy-Efficient Density-based
Clustering for Mobile Sensor Networks (MSNs)”, International Journal of Computer Applications (0975 – 8887), Volume 74– No.14.
13. Punret Gurbani, Hansa Acharya, Anurag Jain, 2016, “Hierarchical-Cluster Based Energy- Efficient Routing-Protocol for Wireless Sensor Networks: A Survey”, International Journal of Computer Science and Information Technologies, Vol.7(2), pg.682-687.
14. Sangeeta Badiger, Mohan B A, 2015, “Secure and Energy-Efficient Clustering-Scheme (SAEECS) With Data-Aggregation in Mobile
Wireless Sensor Networks”, International Research Journal of Engineering and Technology (IRJET), Volume: 02 Issue: 03. 15. Dr. V. Ramesh, 2017, “Energy-Efficient Clustering Scheme (EECS) With Secure Data Aggregation for Mobile Wireless Sensor
Networks”, International Journal of Electrical Electronics & Computer Science Engineering, Volume 4, Issue 5
16. Awatef Benfradj Guiloufi, Nejeh Nasri, Abdennaceur Kachouri, 2014, “Energy-Efficient Clustering Algorithms for Fixed and Mobile Wireless Sensor Networks”, IEEE.
17. ChanglinMa, Nian Liu, and Yuan Ruan, 2013, “A Dynamic and Energy-Efficient Clustering Algorithm in Large-Scale Mobile Sensor
Networks”, International Journal of Distributed Sensor Networks. 18. Muhammad Arshad, Mohamad Y. Aalsalem, Farhan A. Siddiqui, 2014, “Energy-Efficient Cluster Head Selection In Mobile Wireless
Sensor Networks”, Journal of Engineering Science and Technology.
19. Rajesh. D, M. Firoja Banu, D. Stella, Ansila. P. Grace, 2016 “Ch Panel Based Routing Scheme for Mobile Wireless Sensor Network”, International Journal of MC Square Scientific Research, Vol.8, No.1.
19.
Authors: Malan D. Sale, V. Chandra Prakash
Paper Title: Dynamic Dispatching of Elevators in Elevator Group Control System: Research and Survey
Abstract: With an increase in the population and demand for elevators in high-rise buildings, there is a need for
installing more number of elevators to transport passengers efficiently. In tall buildings, Elevator Group Control
System (EGCS) is the system for managing vertical transportation facility. The paper presents a survey of different
techniques used to schedule and dispatch elevators in EGCS. The research study focuses on the dynamic
scheduling of elevators for all up and down landing calls that aims to overcome the limitations and weaknesses of
the existing works. The main aim of the research work is to reduce the waiting time of passengers for a car call on
a specific floor and save power consumption of the elevators or lifts. Fuzzy algorithms, neural network algorithms,
and genetic algorithms are the primary methods used to dispatch elevators in the control system. The study
compares experimental results generated by various methods.
Keywords: EGCS, Elevators, up-peak traffic, down-peak traffic
References: 1. Fernandez, J., et al., "Dynamic Fuzzy Logic Elevator Group Control System with Relative Waiting Time Consideration," Industrial
Electronics, IEEE Transactions on 61.9 2014: 4912-4919.
2. Fu, Lijun, and Tiegang Hao., "Analysis and simulation of passenger flow model of elevator group control system," Fuzzy F Systems S and Knowledge K Discovery D, 2012 9th International Conference on. IEEE, 2012.
3. Qiu, JianDong, and ZhaoYuan Jiang, "The research and simulation on the elevator group control system EGCS scheduling algorithm,"
Electrical and Control Engineering (ICECE), 2011 International Conference on. IEEE, 2011. 4. Yang, Suying, Jianzhe Tai, and Cheng Shao, "Dynamic partition of elevator group control system with destination floor guidance in up-
peak traffic," journal of computers 4.1 2009: 45-52.
5. Fernández, Joaquín, et al., "Dynamic fuzzy logic (EGCS) elevator group control system for energy optimization," International Journal of Information Technology & Decision Making 12.03 (2013): 591-617.
6. Liting, Cao, Zhang Zhaoli, and Hou Jue, "Dynamic Optimized Dispatching System for Elevator Group Based on Artificial Intelligent
Theory," Electronic Measurement and Instruments, 2007. ICEMI'07. Eighth International Conference on. IEEE 2007.
7. Sun, Jin, Qian-Chuan Zhao, and Peter B. Luh, "Optimization of group elevator scheduling with advance information," Automation
Science and Engineering, IEEE Transactions on 7.2 2010: 352-363.
8. Wang, Donghua, and Baofeng Li., "An Optimization Model of Elevators Group Zoning Dispatching and It’s Application," Cryptography
98-102
and Network Security, Data Mining and Knowledge Discovery, E-Commerce & Its Applications and Embedded Systems (CDEE), 2010
First ACIS International Symposium on. IEEE 2010.
9. Cortés, Pablo, et al., "Fuzzy logic based controller for peak traffic detection in elevator systems, "Journal of computational and theoretical nanoscience. 9.2 2012: 310-318.
10. Chen, Ta Cheng, et al., "GA Based Hybrid Fuzzy Rule Optimization Approach for Elevator Group Control System," Applied Mechanics
and Materials. Vol. 284. 2013.
11. Cao, Liting, Shiru Zhou, and Shuo Yang, "Elevator Group Dynamic Dispatching System Based on Artificial Intelligent Theory,"
Intelligent Computation Technology and Automation (ICICTA), 2008 International Conference on. Vol. 1. IEEE 2008.
12. Liu, Yaowu, et al., "Energy saving of elevator group control based on optimal zoning strategy with interfloor traffic," Information Management, Innovation Management and Industrial Engineering (ICIII), 2010 International Conference on. Vol. 3. IEEE 2010.
13. Rashid, M. M., et al., "Design of fuzzy based controller for modern elevator group with floor priority constraints," Mechatronics (ICOM),
2011 fourth International Conference On. IEEE 2011. 14. Zhang, Yine, Yun Yi, and Jian Zhong, "The Application of the Fuzzy Neural Network Control in Elevator Intelligent Scheduling
Simulation," Information Science and Engineering (ISISE), 2010 International Symposium on. IEEE 2010.
15. Sorsa, J., Ehtamo, H., Kuusinen, JM., et al.,” Modeling uncertain passenger arrivals in the elevator dispatching problem with destination control,” Optim Lett (2018) 12: 171. https://doi.org/10.1007/s11590-017-1130-0
16. Albert So, et. at.,” Traffic analysis of a three-dimensional elevator system,” building services engineering research and technology,2017
DOI: 10.1177/0143624417710106 17. You Zhou et al. ,“ An Elevator Monitoring System Based On the Internet of Things,” 8th International Congress of Information and
Communication Technology (ICICT-2018) Procedia Computer Science 131 (2018) 541–544
18. Shuo-Yan Chou et al., ”Improving Elevator Dynamic Control Policies Based on Energy and Demand Visibility,” 2018 3rd International Conference on Intelligent Green Building and Smart Grid (IGBSG) 22-25 April 2018
19. Liu, Weipeng, et al.," Dispatching algorithm design for elevator group control system with Q-learning based on a recurrent neural
network," Control and Decision Conference (CCDC), 2013 25th Chinese. IEEE, 2013. 20. Li, Zhonghua, Zongyuan Mao, and Jianping Wu. , "Research on dynamic zoning of elevator traffic based on an artificial immune
algorithm," Control, Automation, Robotics, and Vision Conference, 2004. ICARCV 2004 8th. Vol. 3. IEEE, 2004.
20.
Authors: Manoj Kumar Shukla, Kamal Sharma
Paper Title: Enhanced Dispersion and Tensile Properties of Graphene/CNT Epoxy Composites by Varying the Filler
Ratio
Abstract: In this study a three phase hybrid composite is fabricated comprising of graphene and carbon
nanotube (CNT) nano-fillers reinforced in epoxy resin. The filler contents were maintained 0 and 1 wt. % and the
ratio of graphene and CNT fillers were 1:1, 1:3 and 3:1. Effect of filler ratio on dispersion and tensile properties of
hybrid composite mixture are investigated. Observations of the samples by Dynamic Light Scattering (DLS),
Scanning Electron Microscopy (SEM), and Image Analysis (IA) confirmed formation 3-D hybrid nanostructure.
The best dispersion is observed for graphene: CNT content 1:3 indicating good bonding between both the fillers
and epoxy matrix. The maximum tensile strength of 50.28 MPa and elastic modulus of 2848 MPa is observed for
filler ratio 1:3 (graphene: CNT) which is 57 and 40 % increase as compared with pristine epoxy composite. For
this configuration homogeneous mixture with Poly Dispersity Index (PDI) of 0.513 is investigated for the sample.
The value of PDI is observed to be lowest by both Particle Size Distribution (PSD) analysis methods which make
agreement of results. Analysis of PSD of composite mixture provides a direction for selecting appropriate filler
content and fabrication process.
Keywords: Particle size distribution (PSD), hybrid nano-composite, Image analysis (IA), tensile strength, elastic
modulus.
References: 1. S. K. Srivastava and I. P. Singh, “Hybrid epoxy nanocomposites: lightweight materials for structural applications,” Polym. J., vol. 44,
no. 4, pp. 334–339, 2012.
2. V. Singh, D. Joung, L. Zhai, S. Das, S. I. Khondaker, and S. Seal, “Graphene based materials: Past, present and future,” Prog. Mater. Sci., vol. 56, no. 8, pp. 1178–1271, 2011.
3. S. Chatterjee, F. Nafezarefi, N. H. Tai, L. Schlagenhauf, F. A. Nüesch, and B. T. T. Chu, “Size and synergy effects of nanofiller hybrids
including graphene nanoplatelets and carbon nanotubes in mechanical properties of epoxy composites,” Carbon N. Y., vol. 50, no. 15, pp. 5380–5386, 2012.
4. G. Zhang, F. Wang, J. Dai, and Z. Huang, “Effect of functionalization of graphene nanoplatelets on the mechanical and thermal
properties of silicone rubber composites,” Materials (Basel)., vol. 9, no. 2, p. 92, 2016. 5. P. K. Singh and K. Sharma, “Mechanical and Viscoelastic Properties of In-situ Amine Functionalized Multiple Layer Grpahene / epoxy
Nanocomposites,” pp. 1–11, 2018.
6. Y. J. Wan et al., “Grafting of epoxy chains onto graphene oxide for epoxy composites with improved mechanical and thermal properties,” Carbon N. Y., vol. 69, no. November, pp. 467–480, 2014.
7. J. Li, P. S. Wong, and J. K. Kim, “Hybrid nanocomposites containing carbon nanotubes and graphite nanoplatelets,” Mater. Sci. Eng. A,
vol. 483–484, no. 1–2 C, pp. 660–663, 2008. 8. R. Pecora, “Dynamic light scattering measurements of nanometer particles in liquids,” J. Nan. Part. Res., vol. 2, pp. 123–131, 2000.
9. F. Ross Hallett, “Particle size analysis by dynamic light scattering,” Food Res. Int., vol. 27, no. 2, pp. 195–198, 1994.
10. G. A. Yakaboylu and E. M. Sabolsky, “Determination of a homogeneity factor for composite materials by a microstructural image analysis method,” vol. 00, no. 0, pp. 1–10, 2017.
11. A. Braun and V. Kestens, “RESEARCH PAPER A new certified reference material for size analysis of nanoparticles,” 2012.
12. J. A. V. Gonçalves, D. A. T. Campos, G. de J. Oliveira, M. de L. da S. Rosa, and M. A. Macêdo, “Mechanical properties of epoxy resin based on granite stone powder from the Sergipe fold-and-thrust belt composites,” Mater. Res., vol. 17, no. 4, pp. 878–887, 2014.
13. H. Nolte, C. Schilde, and A. Kwade, “Determination of particle size distributions and the degree of dispersion in nanocomposites,”
Compos. Sci. Technol., vol. 72, no. 9, pp. 948–958, 2012. 14. B. Krause, M. Mende, P. Pötschke, and G. Petzold, “Dispersability and particle size distribution of CNTs in an aqueous surfactant
dispersion as a function of ultrasonic treatment time,” Carbon N. Y., vol. 48, no. 10, pp. 2746–2754, 2010.
15. C. A. Schneider, W. S. Rasband, and K. W. Eliceiri, “NIH Image to ImageJ: 25 years of image analysis,” Nat. Methods, vol. 9, no. 7, pp. 671–675, 2012.
103-107
21.
Authors: Manoj Kumar Shukla, Kamal Sharma
Paper Title: Microstructure and Elemental Investigation of Graphene/ CNT Epoxy Composite
Abstract: Epoxy based graphene/ CNT reinforced hybrid composite was prepared using sonication method
with equal ratio of nano-fillers at weight percent of 0 and 0.25 wt. % are fabricated. In the present work, the
influence of graphene/ CNT substitution on the microstructure and element distribution on hybrid epoxy composite
is reported. The composite was characterized for their morphological properties by Scanning Electron Microscopy
(SEM). The distribution of elements and elemental composition was also evaluated using Energy Dispersive X-
Ray Spectroscopy (EDX). The reaction progress and compositions of elements were analyzed as a function of
microstructure. The presence of functionalized filler and formation of copolymerization of polymer was
confirming with the help of the EDX spectra of the hybrid composite. Hybrid composite confirmed the presence of
Carbon, Chlorine, Silicon and other elements. Variation in the ratio of elements present in pristine and hybrid
epoxy composite confirms the occurrence of chemical reaction during processing of composite sample. SEM-EDX
analysis show better adhesion in hybrid composite as compared to pristine composite. The detailed results will be
presented and discussed.
Keywords: Graphene, CNT, epoxy, hybrid composite, EDX, SEM.
References: 1. R. Atif and F. Inam, “Influence of Macro-Topography on Damage Tolerance and Fracture Toughness of Monolithic Epoxy for
Tribological Applications,” World J. Eng. Technol., no. May, pp. 335–360, 2016.
2. Z. Anwar, A. Kausar, I. Rafique, and B. Muhammad, “Advances in Epoxy/Graphene Nanoplatelet Composite with Enhanced Physical
Properties: A Review,” Polym. Plast. Technol. Eng., vol. 2559, no. January, p. 03602559.2015.1098695, 2015. 3. A. K. Geim and K. S. Novoselov, “The rise of graphene.,” Nat. Mater., vol. 6, no. 3, pp. 183–91, 2007.
4. H. Nolte, C. Schilde, and A. Kwade, “Determination of particle size distributions and the degree of dispersion in nanocomposites,”
Compos. Sci. Technol., vol. 72, no. 9, pp. 948–958, 2012. 5. S. Chatterjee, F. Nafezarefi, N. H. Tai, L. Schlagenhauf, F. A. Nüesch, and B. T. T. Chu, “Size and synergy effects of nanofiller hybrids
including graphene nanoplatelets and carbon nanotubes in mechanical properties of epoxy composites,” Carbon N. Y., vol. 50, no. 15, pp.
5380–5386, 2012. 6. U. Szeluga, B. Kumanek, and B. Trzebicka, “Synergy in hybrid polymer/nanocarbon composites. A review,” Compos. Part A Appl. Sci.
Manuf., vol. 73, pp. 204–231, 2015.
7. J. Wang et al., “Graphene and Carbon Nanotube Polymer Composites for Laser Protection,” J. Inorg. Organomet. Polym. Mater., vol. 21, no. 4, pp. 736–746, 2011.
8. Z. A. Ghaleb, M. Mariatti, and Z. M. Ariff, “Synergy effects of graphene and multiwalled carbon nanotubes hybrid system on properties
of epoxy nanocomposites,” J. Reinf. Plast. Compos., vol. 0(0) 1–11, 2017. 9. P. J. Lu et al., “Methodology for sample preparation and size measurement of commercial ZnO nanoparticles,” J. Food Drug Anal., vol.
26, no. 2, pp. 628–636, 2018.
10. C. Zhao, “Enhanced strength in reduced graphene oxide/nickel composites prepared by molecular-level mixing for structural applications,” Appl. Phys. A Mater. Sci. Process., vol. 118, no. 2, pp. 409–416, 2014.
11. C. C. C.S. Sipaut, N. Ahmed, R.Adnan, I. Rahman, MA Bakar, J Ismail, “2007 Properties and Morphology of Bulk Epoxy Composite
filled with modified fumed silica-epoxy nanocomposite,” J. Appl. Sci., vol. 7, no. (1), pp. 27–34, 2007.
108-111
22.
Authors: Poornaiah Billa, Anandbabu Gopatoti
Paper Title: 3D MR Images Denoising using Adaptive Blockwise Approached Non-Local Means (ABNLM) Filter for
Spatially Varying Noise Levels
Abstract: The uniform noise distribution over the image is assumed in most of the filtering techniques. The
resulting filtering technique becomes problematic when noise not uniformly distributed. Magnetic Resonance
images with spatially varying noise levels were produced by Sensitivity-encoded, intensity inhomogeneity and
surface coil based acquisition techniques. To adapt these spatial variations in noise levels, we propose a new
Adaptive Blockwise approached NL-Means Filter where denoising capability of filter is adjusted based on the
local image noise level. Image Noise levels are spontaneously acquired from the MR images using a proposed new
adaptive technique. To reduce the computational burden of NLM Filter, an Adaptive Blockwise Non-Local Means
Filter is proposed to speed up the denoising process. With adaptive soft wavelet coefficient mixing, a
multiresolution framework is adapted to ABNLM filter for denoising of 3-Dimensional MR images. The proposed
Multiresolution filter adapts the filtering parameters automatically based on image space-frequency resolution. The
outcome of the stated multiresolution Adaptive Blockwise Non-Local Means Filter shows better performance in
considering the non uniform noise when compared to Rician NL-means filters where the noise parameters has to
be specified initially.
Keywords: Non-Local Mean Filter, Blockwise approach, Magnetic Resonance (MR) Image, Wavelet Transform
and denoising.
References: 1. G. Gerig, R. Kikinis, O. K¨ubler, and F. Jolesz, “Nonlinear anisotropic filtering of MRI data,” IEEE Transactions on Medical Imaging,
vol. 11, pp. 221–232, June 1992.
2. R. Nowak, “Wavelet-based rician noise removal for magnetic resonance imaging,” IEEE Transactions on Image Processing, vol. 8,pp.
1408–1419, October 1999.
3. Pizurica, W. Philips, I. Lemahieu, and M. Acheroy, “A versatile wavelet domain noise filtration technique for medical imaging,” IEEE
Trans. Medical Imaging, vol. 22, pp. 323–331, 2003.
4. M. E. Alexander, R. Baumgartner, A. R. Summers, C. Windischberger, M. Klarhoefer, E. Moser, and R. L. Somorjai, “A wavelet-based
method for improving signal-to-noise ratio and contrast in MR images.,” Magn Reson Imaging, vol. 18, pp. 169–180, February 2000.
5. S. Aja-Fernandez, M. Niethammer, M. Kubicki, M. E. Shenton, and C. F. Westin, “Restoration of dwi data using a rician lmmse
estimator,” Medical Imaging, IEEE Transactions on, vol. 27, no. 10, pp. 1389–1403, 2008.
6. P. Coup´e, P. Yger, S. Prima, P. Hellier, C. Kervrann, and C. Barillot, “An Optimized Blockwise NonLocal Means Denoising Filter for
3-D Magnetic Resonance Images,” IEEE Transactions on Medical Imaging, vol. 27, pp. 425–441, April 2008.
7. P. Coup´e, P. Hellier, S. Prima, C. Kervrann, and C. Barillot, “3D wavelet subbands mixing for image denoising,” Journal of Biomedical
Imaging, vol. 2008, no. 3, pp. 1–11, 2008.
8. Buades, B. Coll, and J.-M. Morel, “A review of image denoising algorithms, with a new one,” Multiscale Modeling and Simulation, vol.
112-118
4, no. 2, pp. 490–530, 2005.
9. Gopatoti, A., Gopathoti, K.K., Shanganthi, S.P., Nirmala, C. “Deep CNN based image denoising under different noise conditions”,
Journal of Advanced Research in Dynamical and Control Systems,10(3) (2018), pp. 1094-1101.
10. Gopatoti, A., Ramadass, N. “Performance of adaptive subband thresholding technique in image denoising”, Journal of Advanced Research
in Dynamical and Control Systems, Vol. 9, No. 12, (2017), pp.151-157.
11. Pruessmann KP, Weiger M, Scheidegger MB, Boesiger P. SENSE:sensitivity encoding for fast MRI. Magn Reson Med 1999;42: 952–
962.
12. Griswold MA, Jakob PM, Heidemann RM, et al. Generalized autocalibrating partially parallel acquisitions (GRAPPA). Magn Reson Med
2002;47:1202–1210.
13. Gopatoti, A., Naik, M.C., Gopathoti, K.K.” Convolutional Neural Network based image denoising for better quality of images”,
International Journal of Engineering and Technology(UAE), Vol.7, No.3.27, (2018), pp. 356-361.
14. Gopatoti, A., Veeranjaneyulu, G. and Naik, M.C. Impulse Noise Removal in Digital Images by using Image Fusion Technique. Journal of
Advanced Research in Dynamical and Control Systems 10 (6) (2018).
15. Z.Wang, A. Bovik, H. Sheikh, and E. Simoncelli, “Image quality assessment: from error visibility to structural similarity,” Image
Processing, IEEE Transactions on, vol. 13, pp. 600–612, April 2004.
16. Samsonov A, Johnson C. Noise-adaptive nonlinear diffusion filtering of MR images with spatially varying noise levels. Magn Reson Med
2004;52:798–806.
17. Delakis I, Hammad O, Kitney RI. Wavelet-based de-noising algorithm for images acquired with parallel magnetic resonance imaging
(MRI). Phys Med Biol 2007;52:3741–3751.
18. Mahmoudi M, Sapiro G. Fast image and video denoising via nonlocal means of similar neighborhoods. IEEE Signal Process Lett
2005;12:839–842.
19. Kervrann C, Boulanger J, Coupe´ P. Bayesian non-local means filter, image redundancy and adaptive dictionaries for noise removal. In:
Proc Conf Scale-Space and Variational Meth, Ischia, Italy; 2007. p 520–532.
20. Brox T, Kleinschmidt O, Cremers D. Efficient nonlocal means for denoising of textural patterns. IEEE Trans Image Process 2008;
17:1083–1092.
23.
Authors: Bhupesh Kumar Dewangan, Amit Agarwal, Venkatadri M, Ashutosh Pasricha
Paper Title: Sla-Based Autonomic Cloud Resource Management Framework By Antlion Optimization Algorithm
Abstract: Service level agreement SLA is a key to attract the user to opt service from the cloud. The quality of
service QoS and SLA plays vital role towards the trust to use the services of any application/infrastructure. If SLA
violation rate is high then it directly affect to cost and user distraction. In this paper, we have done state-of-art
survey on various SLA-aware resource management frameworks and obtain the different objective function and
the utilization percentage from year 2014 to 2018. The objective of this paper is to propose SLA-based autonomic
resource management technique SMART through antlion optimization algorithm to maximize the resource
utilization based on SLA and QoS satisfaction. The execution time, cost and SLA violation rate, objective
functions computed for this framework and compare with two existing frameworks. The framework is implements
in cloudsim toolkit and the results recorded the utmost performance. The experimental results confirm that cost,
execution time, and resource cost are increasing while SLA violation rate is increasing.
Keywords: Autonomic Computing, Resource Management, SLA Violation Rate, Resource Utilization.
References: 1. Wu L. et al., “SLA-based resource provisioning for hosted software-as-a-service applications in cloud computing environments,” IEEE
Transactions on services computing, vol. 7, no. 3, pp. 465-485, 2014. 2. Kohne A., “Evaluation of SLA-based decision strategies for VM scheduling in cloud data centers,” in 3rd Workshop on CrossCloud
Infrastructures & Platforms, 2016.
3. Antonescu A. F., “Simulation of SLA-based VM-scaling algorithms for cloud-distributed applications,” Future Generation Computer Systems, vol. 54, no. 1, pp. 260-273, 2016.
4. Garg S. K., “SLA-based virtual machine management for heterogeneous workloads in a cloud datacenter,” Journal of Network and
Computer Applications, vol. 45, pp. 108-120, 2014. 5. B. R. Zhao Y., “SLA-based resource scheduling for big data analytics as a service in cloud computing environments,” in 44th
International Conference on Parallel Processing (ICPP), 2015.
6. S. P. Serrano D., “SLA guarantees for cloud services,” Future Generation Computer Systems, vol. 54, no. 1, pp. 233-246, 2016. 7. Singh S., “ STAR: SLA-aware autonomic management of cloud resources,” IEEE Transactions on Cloud Computing, pp. 1-22, 2017.
8. Cai X., “SLA-aware energy-efficient scheduling scheme for Hadoop YARN,” The Journal of Supercomputing, vol. 73, no. 38, pp. 3526-
3546, 2017. 9. Beloglazov A..Washington, DC: U.S. Patent and Trademark Office Patent 9,363,190, 2016.
10. Mosa A., “Optimizing virtual machine placement for energy and SLA in clouds using utility functions,” Journal of Cloud Computing, vol.
5, no. 1, pp. 1-17, 2016. 11. Panda S. K., “SLA-based task scheduling algorithms for heterogeneous multi-cloud environment,” The Journal of Supercomputing, vol.
73, no. 6, pp. 2730-2762, 2017.
119-123
24.
Authors: Mohan Gupta, Kamal Sharma
Paper Title: Experimental Observation of Heat Exchange and Pressure Drop By Using Many Inserts in a Round
Tube
Abstract: The capability of a convectional heat exchanger (HE) in transferring heat requires improvement for
conveying a considerable proportion of energy at cheaper rate and amount. For augmenting the heat transfer
coefficient, different means have been employed. However, the use of inserts has become an assured method in
enhancing heat transfer through endurable escalation of frictional losses. The objective of the study is the
examination of a round pipe fitted along with multiple inserts with regard to its characteristics related to energy
transfer and water flow; these inserts are organized in clockwise and anticlockwise attitudes.
Keywords: ”Nu”,”Re”, “F”, “Twisted tape inserts”.
References: 1. S. E-ard, C. Thianpong, P. Promvonge, Experimental investigation of heat transfer and flow friction in a circular tube fitted with
124-130
regularly spaced twisted tape elements, Int. Commun. Heat Mass Transfer 33 (2006) 1225–1233.
2. Smith E-ard , Pongjet Promvonge, Heat transfer characteristics in a tube fitted with helical screw-tape with/with no core-rod inserts,
International Communications in Heat and Mass Transfer 34 (2007) 176–185. 3. Chinaruk Thianpong, Petpices E-ard, Khwanchit Wongcharee, Smith E-ard, Compound heat transfer enhancement of a dimpled tube with
a twisted tape swirl generator, International Communications in Heat and Mass Transfer 36 (2009) 698–704.
4. S. E-ard, K. Wongcharee, P. E-ard, C. Thianpong, Heat transfer enhancement in a tube using delta-winglet twisted tape inserts, Applied
Thermal Engineering 30 (2010) 310–318.
5. S. E-ard, C. Thianpong, P. E-ard, Turbulent heat transfer enhancement by counter/co-swirling flow in a tube fitted with twin twisted tapes,
Experimental Thermal and Fluid Science 34 (2010) 53–62. 6. Smith E-ard, Pongjet Promvonge, Performance assessment in a heat exchanger tube with alternate CW and CCW twisted-tape inserts,
International Journal of Heat and Mass Transfer 53 (2010) 1364–1372.
7. Khwanchit Wongcharee, Smith E-ard, Heat transfer enhancement by twisted tapes with alternate-axes and triangular, rectangular and trapezoidal wings, Chemical Engineering and Processing 50 (2011) 211–219.
8. S. Pethkool, S. E-ard, S. Kwankaomeng, P. Promvonge, Turbulent heat transfer enhancement in a heat exchanger using helically
corrugated tube, International Communications in Heat and Mass Transfer 38 (2011) 340–347. 9. K. Wongcharee, S. E-ard, Friction and heat transfer characteristics of laminar swirl flow through the round tubes inserted with alternate
clockwise and counter-clockwise twisted-tapes, International Communications in Heat and Mass Transfer 38 (2011) 348–352.
10. Smith E-ard, Khwanchit Wongcharee, Pongjet Promvonge, Influence of Nonuniform Twisted Tape on Heat Transfer Enhancement Characteristics, Chem. Eng. Comm., 199:1279–1297, 2012.
11. K. Nanan, C. Thianpong, P. Promvonge, S. E-ard, Investigation of heat transfer enhancement by penetrate helical twisted-tapes,
International Communications in Heat and Mass Transfer 52 (2014) 106–112. 12. P. Promvonge, S. E-ard, Heat transfer behaviors in a tube with combined conical-ring and twisted-tape insert, International
Communications in Heat and Mass Transfer 34 (2007) 849–859.
13. [V. Kongkaitpaiboon, K. Nanan, S. E-ard, Experimental investigation of heat transfer and turbulent flow friction in a tube fitted with perforated conical-rings, International Communications in Heat and Mass Transfer 37 (2010) 560–567.
14. Ji-An Meng, Xin-Gang Liang, Ze-Jing Chen, Zhi-Xin Li, Experimental study on convective heat transfer in alternating elliptical axis
tubes, Experimental Thermal and Fluid Science 29 (2005) 457–465. 15. M. Faizal, M.R. Ahmed, Experimental studies on a corrugated plate heat exchanger for small temperature difference applications,
Experimental Thermal and Fluid Science 36 (2012) 242–248.
16. Smith E-ard, Vichan Kongkaitpaiboon and Kwanchai Nanan, Thermohydraulics of Turbulent Flow Through Heat Exchanger Tubes Fitted with Circular-rings and Twisted Tapes, Chinese Journal of Chemical Engineering, 21(6) 585—593 (2013).
17. C. Thianpong, P. E-ard, P. Promvonge, S. E-ard, Effect of perforated twisted-tapes with parallel wings on heat transfer enhancement in a
heat exchanger tube, Energy Procedia 14 (2012) 1117 – 1123. 18. S. E-ard, P. Somkleang, C. Nuntadusit, C. Thianpong, Heat transfer enhancement in tube by inserting uniform/non-uniform twisted-tapes
with alternate axes: Effect of rotated-axis length, Applied Thermal Engineering 54 (2013) 289-309.
19. Smith E-ard, Pongjet Promvonge, Thermal characteristics in round tube fitted with serrated twisted tape, Applied Thermal Engineering 30(2010)1673-1682.
20. Jian Guo, Aiwu Fan, Xiaoyu Zhang, Wei Liu, A numerical study on heat transfer and friction factor characteristics of laminar flow in a
circular tube fitted with center-cleared twisted tape, International Journal of Thermal Sciences 50 (2011) 1263-1270. 21. S. E-ard, P. Promvonge, Experimental investigation of heat transfer and friction characteristics in a circular tube fitted with V-nozzle
turbulators, International Communications in Heat and Mass Transfer 33 (2006) 591–600.
22. S.W. Chang, K.-W. Yu, M.H. Lu, Heat transfers in tubes fitted with single, twin, and triple twisted tapes, Exp. Heat Transfer 18 (4) (2005) 279–294.
23. S.W. Chang, Y.J. Jan, J.S. Liou, Turbulent heat transfer and pressure drop in tube fitted with serrated twisted tape. Int. J. Therm. Sci. 46
(5) (2007) 506-518. 24. S.W. Chang, T.L. Yang, J.S. Liou, Heat transfer and pressure drop in tube with broken twisted tape insert. Exp. Therm. Fluid Sci. 32 (2)
(2007) 489-501.
25. M. Rahimi, S.R. Shabanian, A.A. Alsairafi, Experimental, CFD studies on heat transfer and friction factor characteristics of a tube equipped with modified twisted tape inserts. Chem. Eng. Process. 48 (3) (2009) 762-770.
26. P. Bharadwaj, A.D. Khondge, A.W. Date, Heat transfer and pressure drop in a spirally grooved tube with twisted tape insert. Int. J. Heat
Mass Transfer 52 (7e8) (2009) 1938-1944. 27. S. E-ard, P. Promvonge, Thermal characteristics in round tube fitted with serrated twisted tape, Appl. Therm. Eng. 30 (13) (2010) 1673–
1682. 28. S. E-ard, K.Wongcharee, P. E-ard, C. Thianpong, Thermohydraulic investigation of turbulent flow through a round tube equipped with
twisted tapes consisting of centre wings and alternate-axes, Exp. Thermal Fluid Sci. 34 (8) (2010) 1151–1161.
29. S. E-ard, P. Seemawute, K. Wongcharee, Influences of peripherally-cut twisted tape insert on heat transfer and thermal performance characteristics in laminar and turbulent tube flows, Experimental Thermal and Fluid Science 34 (2010) 711–719.
30. P. Murugesan, K. Mayilsamy, S. Suresh, Turbulent heat transfer and pressure drop in tube fitted with square-cut twisted tape, Chin. J.
Chem. Eng. 18 (4) (2010) 609–617. 31. [31] P. Murugesan, K. Mayilsamy, S. Suresh, P.S.S. Srinivasan, Heat transfer and pressure drop characteristics in a circular tube fitted
with and with no V-cut twisted tape insert, International Communications in Heat and Mass Transfer 38 (2011) 329–334
32. K. Wongcharee and S. E-ard, Heat transfer enhancement by twisted tapes with alternate axes and triangular, rectangular and trapezoidal
wings, Chemical Engineering and Processing 50 (2011) 211–219.
25.
Authors: Amandeep, Sanjeev Kumar, Vikas Chauhan, Prem Kumar
Paper Title: LTE-A Heterogeneous Networks using Femtocells
Abstract: For the improvement of coverage and services of quality, Femtocells play important role in
heterogenous Networks in LTE-A networks. Femtocells are used to provide good indoor voice, increase network
capacity and high data coverage in LTE-A. the problem of Cross-Tier interference is a large problem in Femtocells
Networks. Cross-Tier interference is an interference between Femtocells base station and Microcell’s base station
in a network structure. Throughput is increased while Cross-Tier interference can be decreased using Femtocell in
any Networks. In this paper, we also show experiment results obtain by a simulation framework which shows how
Femtocells can increase the throughput and reduce the interference.
Keywords: Heterogeneous Network, Experiment, Femtocells, LTE, Interference, Throughput, Pathloss, SINR.
References: 1. Yamamoto, T., & Konishi, S. (2013). “Impact of small cell deployments on mobility performance in LTE-Advanced systems”. In
Personal, Indoor and Mobile Radio communications Workshops, IEEE 24th International Symposium, pp. 189-193, 2013.
2. Bouras, C., Kokkinos, V., Kontodimas, K., & Papazois, A.. A simulation framework for LTE-A systems with femtocell overlays. In Proceedings of the 7th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks, pp.
131-134
85-90, (2012).
3. Trestian, R., Vien, Q. T., Shah, P., & Mapp, G. (2015, October). Exploring energy consumption issues for multimedia streaming in LTE
HetNet small cells. In Local Computer Networks (LCN), 2015 IEEE 40th Conference on (pp. 498-501). IEEE. 4. Kosta, C., Hunt, B., Quddus, A. U., & Tafazolli, R.. On interference avoidance through inter-cell interference coordination (ICIC) based
on OFDMA mobile systems. IEEE Communications Surveys & Tutorials, 15(3), 973-995, (2013).
5. Stanze, O., & Weber, A. (2013). Heterogeneous networks with LTE‐Advanced technologies. Bell Labs Technical Journal, 18(1), 41-58.
6. http://www.3gpp.org/technologies/keywords-acronyms/98-lte.
7. http://www.3gpp.org/technologies/keywords-acronyms/97-lte-advanced. 8. Zhou, Hao, Yusheng Ji, Xiaoyan Wang, and Shigeki Yamada. "eICIC configuration algorithm with service scalability in heterogeneous
cellular networks." IEEE/ACM Transactions on Networking (TON) 25, no. 1 (2017): 520-535.
9. Alexiou, A., Bouras, C., Kokkinos, V., Kontodimas, K., & Papazois, A. (2011, October). Interference behavior of
integrated femto and macrocell environments. In Wireless Days (WD), 2011 IFIP (pp. 1-5). IEEE.
10. Claussen, Holger. "Performance of macro-and co-channel femtocells in a hierarchical cell structure." In Personal, Indoor and Mobile
Radio Communications, 2007. PIMRC 2007. IEEE 18th International Symposium on, pp. 1-5. IEEE, 2007. 11. https://en.wikipedia.org/wiki/LTE_(telecommunication)
12. http://www.3glteinfo.com/lte-advanced-heterogeneous-networks/
13. http://www.2cm.com.tw/technologyshow_content.asp?sn=0912230018 14. De La Roche, G., Valcarce, A., López-Pérez, D., & Zhang, J. “Access control mechanisms for femtocells”. IEEE Communications
Magazine, 2010.
15. Slamnik, N., Okic, A., & Musovic, J. “Conceptual radio resource management approach in LTE heterogeneous networks using small cells number variation”. In Telecommunications (BIHTEL), XI International Symposium, pp. 1-5, IEEE, 2016.
16. Seidel, E., & Saad, E. (2010). LTE Home Node Bs and its enhancements in Release 9. Nomor Research, 1-5.
26.
Authors: Vandana Agrawal
Paper Title: Parameterization of Unorganized Point Cloud Data for B-Spline Surface Fitting
Abstract: In the present work an algorithm is presented for the parameterization of unorganized point cloud
data such that a smooth B-spline surface can be fitted. Points belonging to various surfaces and edges are identified
during segmentation. Further edges bounding to segmented region are represented by curves. In the present work
initially B-spline curves are constructed with C1 smoothness by interpolating the measured points lying on the
edges. For each segmented region four such curves named as boundary curves are constructed to enclose it. Using
these boundary curves Coons surface is constructed which serves as base surface for each segmented region. Each
Coons surface is divided into grids and for each measured point the nearest grid vertex is found out. The
parameters of this vertex are used as the parameters of the measured point. Finally, an algorithm using an iterative
approach is given to further improve the parameterization.
Keywords: parameter, data points, curve, surface
References: 1. Puttre M., "Capturing design data with digitizing systems", Mechanical Engineering 1994,116(1),62-65
2. Wohlers T., "The technology behind 3D digitizing", Computer Graphics World 1997,3(20), 47-54 3. Rogers DF, Adams JA, "Mathematical elements for computer graphics", Tata Mc Graw Hill, Second edition 2002
4. Tiller Wayne, Piegl L, "The NURBS Book", New York, Springer-Verlag 1995
5. De Boor C, "A practical guide to splines", New York, Springer-Verlag 1978 6. Bartels RH, Beaty JC and Barskey BA, "An introduction to splines for use computer graphics and geometric modeling", Morgan Kaufman
1987
7. Piegl L, "On NURBS: A survey", IEEE Trans. Computer Graphics and Applications 1991, 11(5) 8. Yamaguchi F, "Curves and surfaces in computer aided geometric design", New York, Springer Verlag 1988
9. Cohen FS, Wang JY, "Modeling image curves using invariant 3D object curve model- A path to 3D recognition and shape estimation
from image contours", IEEE Trans. Pattern analysis and machine intelligence 1994, 16(1),13-21 10. Wang JY, Cohen FS, "3D object recognition and shape estimation from image contours using B-splines, shape invariant matching and
neural network", IEEE Trans. Pattern Analysis and machine Intelligence 1994, 16(1), 13-21
11. Cohen FS, Huang Z, Yang Z, "Matching and identification of curves using B-splines curve representation", IEEE Trans. Image Processing 1995, 4(1), 1-10
12. Huang Z, Cohen FS, "Affine invariant moments and B-splines for object recognition from image curves", IEEE Trans. Image Processing
1996, 5(10), 1473-1480 13. Milroy M, Bradley C, Vickers G, Weir D, "G1 continuity of the B-splines surface patches in reverse engineering", Computer Aided
Design 1995, 27, 471-478
14. Krishnamurthy V, Levoy M, "Fitting smooth surfaces to dense polygon meshes" Proceeding SIGGRAPH, Computer Graphics Proc., Ann. Conf. Series 1996, 313-324
15. Andersson E, Andersson R, Boman M, Elmroth T, Dahlberg B, Johansson B, "Automatic construction of surfaces with prescribed shape",
Computer Aided Design 1988, 317-324 16. Ma W, Kruth J, "Parameterization of randomly measured points for least squares fitting of B-splines curves and surfaces", Computer
Aided Design 1995, 27, 663-675
17. Eck M, Hoppe H, "Automatic reconstruction of B-spline surface of arbitrary topology type", Proceeding SIGGRAPH’96, Comp. Graphics Proc., Ann. Conf. Series 1996, 325-334
18. Cohen FS, "Ordering and parameterizing scattered 3D data for B-spline surface approximation", IEEE Transactions on Pattern analysis and machine intelligence 2000, 22(6)
19. Kuo CC, Yau HT, "A Delaunay based region growing approach to surface reconstruction from unorganized points", Computer Aided
Design 2005, 37,825-835 20. Woo H, Kang E, Wang S, Lee KH, "A new segmentation method for point cloud data", Int. J. of Machine Tools and manufacture 2002,
42, 167-178
21. NAG, "Fortran Library Manual Mark" 15 Numerical Algorithm Group Limited 1991, chapter F04 22. De Boor C, "A practical guide to splines" Springer 1978
23. Cox MG, "Linear algebra support modules for approximation and other software" Scientific software systems, Chapman and Hall 1990,
21-29
135-140
27.
Authors: Deepak Bharadwaj, Manish Prateek
Paper Title: Kinematics and Dynamics of Lower Body of Autonomous Humanoid Biped Robot
Abstract: This paper presents the mathematical modeling of ten degree of freedom of manipulator. Workspace
of each leg calculated by applying the method of Denavit_Hatretnberg notation scheme. Forward and inverse
kinematics obtained for the manipulator of lower body of humanoid robot. Static forces on the joint calculated for
the joint to hold the particular position of the lower body. Dynamics torque obtained by applying the principles of
Lagrangian dynamics. A nonlinear feedback measured from the output end to control the movement of leg. A
computed control torque approach has been used to avoid the oscillation of the system. Several experiment done of
the mat lab to verify the analytical and simulation result
Keywords: Humanoid Robot, Transform approach, Partitioned-proportional derivative
References: 1. Jun Morimoto, Gordon Cheng,et al, “A Simple Reinforcement Learning Algorithm For Biped Walking” Proceedings of the 2004 IEEE
International Conference on Robotics &Automation New Orleans. LA * April 2004
2. Marlon Fernando Velásquez-Lobo, Juan Manuel,etal, “ Modeling a Biped Robot on Matlab/SimMechanics” CONIELECOMP 2013, 23rd
International Conference on Electronics, Communications and Computing, 11-13 March 2013 3. Amarpreet Singh & Ashish Sigla, [2017], Kinematic Modeling of Robotic Manipulators,Proceeding @ The National Academy of Scince,
India ,Sect.A phys.Sci(July-September 2017) 87(3):303-319
4. M.Himanth & L.M Bharath, [2017], Intrenational Journal of Robotics & Automation, Vol3,Issue2, IJRA(2017)21-28 5. Zongxing Lu,1 Chunguang Xu,et al,[2015] Inverse Kinematic Analysis and Evaluation of a Robot for Nondestructive Testing
Application, Journal of Robotics, Volume 2015, Article ID 596327, 7 pages, Hindawi Publishing Corporation
6. N. Latif A. Shaari, Ida S. Md Isa,et al [2015], Torque Analysis Of The lower limb exoskeleton robot design, ARPN Journal of Engineering and Applied Sciences, VOL. 10, NO. 19, OCTOBER 2015
7. C.Hernandez-Santos, E-Rodriguez_leal,et al,[2012]Kinematics and dynamics of a new 16-DOF Humanoid Biped Robot with active toe joint, Intrenational Journal of Advanced robotics system,INTECH,17 Aug,2012.
8. Zhe Li, Gongfa Li, Ying Sun,et al,[2017],Development of articulated robot trajectory planning,Int. J. Computing Science and
Mathematics, Vol. 8, No. 1, 2017 9. GilJin Yang, Byoungwook Choi,et al.[2013], Implementation of Joint Space Trajectory Planning for Mobile Robots with Considering
Velocity Constraints on Xenomai, International Journal of Control and Automation, 7(9):1-3 · October 2013
10. G Maliotis, “A Hybrid Model Reference Adaptive Control/Computed Torque Control Scheme for Robotic Manipulators”, Proceeding of the institute of mechanical engineers,PartI;Journal of systems and control engineering,
Volume: 205 issue: 3, page(s): 215-221,Issue published: August 1, 1991 ,Received: November 21, 1990; Accepted: July 26, 1991
11. MD. Ahhtaruzzaman, Amir Akramin Shafie, [2016], Gait Analysis: Systems, Technologies, And Importance, Journal of Mechanics in Medicine and Biology, Vol. 16, No. 7 (2016) 1630003 (45 pages) °c World Scientific Publishing Company
12. .J-P ,Merlet, Jacobian, manipulability, condition number and accuracy of parallel robots, INRIA , BP 93,06902 Sophia-Antipolis, France
13. Anthony A. Maciejewski * Charles A.Klein,[1989], The Singular Value Decomposition: Computation and Application to Robotics, The international Journal of Robotics Research , Vol8, No 6, December1989,@1989 Massachusetts Institute of Technology
14. J.Denavit, R.S Hartenberg, et al.[2011], Velocity, Acceleration , and static forces analyses of Spatial Linkages, Journal of Applied
Mechanics,Vol 32, Issue 4,903-910,sept15,2011 15. Nikos G.Tsagarakis and Bram Vanderborght, et al[2009], The Mechanical Design of the New Lower Body for the Child Humanoid robot
‘iCub, The 2009 IEEE/RSJ International Conference on Intelligent Robots and Systems October 11-15, 2009 St. Louis, USA
16. Brenna D. Argall, Brett Browning, et al., Mobile Robot Motion Control from Demonstration and Corrective Feedback, The research is
partly sponsored by the Boeing Corporation under GrantNo. CMU-BA-GTA-1, BBNT Solutions under subcontract No. 950008572, via
prime Air Force contract No. SA-8650-06-C-7606, the United States Department of the Interior under Grant No.NBCH-1040007
17. Jianxian Cai, Lixin Li, [2013],Autonomous Navigation Strategy in Mobile Robot, Journal Of Computers, VOL. 8, NO. 8, AUGUST 2013, 18. Robert Platt, Robert Burridge, et al.[2013], Humanoid Mobile Manipulation Using Controller Refinement, Dexterous Robotics Laboratory
Johnson Space Center, NASA,july 2013
141-146
28.
Authors: M Sai Prasanthi,Venkata Bharath Katragadda, Hrushik Perumalla, Bandla Sowmya
Paper Title: Hybrid Approach for Securing the IoT Devices
Abstract: Today the Internet has turned out to be omnipresent, has touched every edge of the globe, and is
influencing human life in incredible ways. We are presently entering a period, where different kind’s appliances
are associated with the web. We are entering a time of the IoT. Internet of Things enables the appliances to
communicate and perform their activities based on network activity. Today, a PC is substantially less helpful
without an association of internet; tomorrow, that will be the situation with apparatuses like a fridge. To put it
plainly, these apparatuses should convey to one another. Sensors in the perception layer gather the information
from the sources. This information will be transmitted through the system layers over the web to the cloud. Today
IoT deals with huge amount of data. This information may be exceptionally touchy and their protection and
security must not be endangered. Here comes the requirement for security algorithms to protect the information. In
this paper, we provide a hybrid approach of security algorithms (AES along with RSA) to secure the data in
network layer.
Keywords: Cryptography, Symmetricencryption, Asymmetric encryption, AES,RSA,Image slicer.
References: 1. Abdelali El Bouchti, Samir Bahsani, Trik Nahhal “Encryption As A Service For Data Healthcare Cloudsecurity. “
2. C. Perera, A. Zaslavsky, P. Christen, D. Georakopoulos,“Context Aware Computing For The Internet Of Things.”
3. J. Gubbi, R. Buyya, S. Marusic, And M. Palaniswami, “Internet Of Things (Iot): A Vision, Architectural Elements, And Future
Directions.”
4. Ch. Qiang, G.Quan, B.Yu, L.Yang, “Research On Security Issues Of The Internet Of Things.”
5. M. Friedemann, And C. Floerkemeier. "From The Internet Of Computers To The Internet Of Things."
6. Y.Challal, E. Natalizio, S.Sen, And A.Maria Vegni “Internet Of Things Security And Privacy: Design Methods And Optimization”, Add
Hoc Network
7. L. Tawalbeh, M. Mowafi And W. Aljoby, "Use Of Elliptic Curve Cryptography For Multimedia Encryption," In Iet Information Security.
8. L. A. Tawalbeh, Y. Jararweh And A. Moh’md. “An Integrated Radix-4 Modular Divider/Multiplier Hardware Architecture For
Cryptographic Applications”.
147-151
9. Iot Ecosystem Components: The Complete Connectivity Layer
10. konink Lijke Phulips: Meethu Personal Wireless Light-ing,(2013).
11. "Cellular Automata For Dynamic S-Boxes In Cryptog-raphy."
12. Implementation Of Multi Mode Aes Algorithm Using Verilog"
13. A Novel Approach To Secure Data Sharing Scheme For Dynamic Members Through Different Secure Methods.
14. A Survey On Applications And Security Issues Of Internet Of Things
15. R. L. Rivest, A. Shamir And L. Adleman, "A Method For Obtaining Digital Signatures And Public-Key Cryptosys-tem”.
16. An Hybrid Of Rsa Token And Iterated Hash Algorithm For Secured Data Transfer
29.
Authors: N. Krishna Jyothi, V. Anitha
Paper Title: Design of Multiple U Slotted Microstrip Antenna for Wimax and Wideband Applications
Abstract: A novel miniaturized configuration of a different U-slotted micro-strip radio wire is outlined in
view of focus recurrence about 4. 7 GHz with dielectric steady (εr) for 4. 4 also substrate thicknesses from
claiming 2. 4mm. The suggested radio wire might meet the interest from claiming WiMax and wideband
requisitions. The way parameters like return loss, VSWR, gain, directivity would simulated, broke down and
optimized utilizing high back structure test system. The recommended radio wire is created and tried utilizing the
Rhode Also Schwarz vector organizes analyzer R&S® ZVL-13 and its execution aspects would got. Those
Outcomes indicate that the Inclination offers Inclination of the recommended radio wire could make incredibly
progressed contrasted with customary micro-strip patavium antennas.
Keywords: Microstrip antennas, WiMaX, Return Loss, VSWR.
References: 1. Implementation and development of single feed design using multiple U slotted patch antenna for wireless applications Vikram Thakur,
International Journal of Engineering Research & technology (IJERT).
2. C. A. Balanis, “Antenna Theory, Analysis and Design”,John Wiley & Sons, New York, 1997.
3. Indrasen Singh, V.S. Tripathi, “Microstrip patch antenna and its applications: A Survey”, International journal of Computer Technology
and Applications, Vol. 2(5), pp.1595-1599, 2011.
4. I.J. Bahl, P. Bhartia, “Microstrip Antennas”, Artech House, 1980.
5. Keith R. Carver, “James W. Mink, “Microstrip Antenna Technology”, IEEE Transactions on antennas and propogations,Vol.AP-29,
No.1, January 1981.
6. R.E Collin, “Foundations for Microwave Engineering” ,IEEE Press 2nd Edition, 2002.
7. S. E James, M.A. Jusoh, M. H. Mazwir and S.N.S. Mahmud, “Finding The Best Feeding Point Location of Patch Antenna using HFSS”,
ARPN Journal of Engineering and Applied Sciences, Vol.10, No. 23, December 2015
8. Vinaybankey,N.AnveshKumar,’’Designand performance issue of microstrip patch antennas’’,International journal of Scientific and
Engineering Research volume6,Issue 3,March-2015 1572
152-155
30.
Authors: Usha N., G. Devakumar
Paper Title: Development of a Model for the Sustainability of Agri Engineering Manufacturing Companies in
Karnataka, India
Abstract: Indian agriculture sector contributes 18% of GDP to the country’s economy and provides
employment about 50% of the workforce. Agriculture sector is facing challenges to get integrated with the
business sector and to getting timely and convenient information to increase the productivity. Agricultural
mechanization helps to overcome this problem. Agri Engineering Manufacturing Companies (AEMC) plays a
major role in effective implementation of Agricultural mechanization. Agricultural mechanization has been
accepted as an important element of modernization of agriculture by the world. Hence this article focused on the
ways to address the contemporary issues for sustainability of AEMC. In this article quantitative research has been
carried out and a thorough literature review has been carried out through scholarly Scopus Indexed journals to
identify the factors for sustainability of AEMC for the purpose of conducting pilot study. The critical factors such
as Entrepreneurial Competency (EC), Business Model (BM), Innovation and Technology (IT) were arrived based
on the rating and ranking scale calculation. Survey questionnaire was developed and validated based on the
feedback given by the entrepreneurs, academicians, subject experts and industry experts. A total population of 372
numbers of AEMC has been identified through agricultural department websites, trade websites and agricultural
events in the state of Karnataka. Census method of sampling has been adopted and the sample was categorised
based on their manufacturing activity such as Equipment and implements, Irrigation, Farm Machineries and
Processing Machineries. The primary data has been collected through face to face interview, telephonic interview
and Google spreadsheet. The collected data has been analysed using Statistical Package for the Social Sciences 25
(SPSS 25) and Analysis of Moment Structures 25 (AMOS 25) software. The data reliability and validity has been
analysed through Cronbach alpha value of 0.785 and KMO value of 0.703 respectively which are well within the
limit. Further Structural Equation Modelling (SEM) has been used to develop a model consisting of the identified
factors such as EC, BM and IT. The obtained Goodness of fit statistics values are well within the acceptable limit.
The output of this research is recommended to implement in AEMC such as farm equipment, machineries and
irrigation equipment manufacturing companies. As per the research finding, it is recommended to concentrate on
the unmet customer need so as to increase the market share and sustain business. Department restructuring enable
the entrepreneurs to adopt the new technology as well as meet the growing needs of the customers. Adoption of
technological forecasting helps the entrepreneurs to sense the future requirement of the market and be equipped to
face the competition. It is suggested to the entrepreneurs to participate in the national and international trade fairs
and exhibitions to secure maximum market share to attain sustainability.
156-164
Keywords: Agri Engineering Flexible Manufacturing Companies, Business Sustainability, Entrepreneurial
Competency, Innovation and Technology.
References: 1. A. Caloffi, F. Rossi, and M. Russo, “What makes SMEs more likely to collaborate? Analysing the role of regional innovation policy”.
European Planning Studies, vol. 23(7), 2015, pp. 1245-1264.
2. A. K. Klevorick, R. C. Levin, R. R. Nelson, and S. G. Winter, “On the sources and significance of inter industry differences in
technological opportunities”, Research Policy, 24(2), 1995, pp. 185–205. 3. A. Spithoven, W. Vanhaverbeke, and N. Roijakkers, “Open innovation practices in SMEs and large enterprises”, Small Business
Economics, vol. 41, 2013, pp. 537-562.
4. B. Bird, “Towards a theory of entrepreneurial competency”, Advances in Entrepreneurship, Firm Emergence and Growth, vol. 2, 1995, pp. 51-72.
5. Baden, C. Fuller, and M. S. Morgan, “Business models as models”, Long Range Planning, vol. 43(2/3), 2010, pp. 156–171.
6. D. George, and M. Paul, IBM SPSS Statistics 23 Step by Step, New York, Routledge, 2016, pp. 231-260. 7. D. L. Brannon, and J. Wiklund, “An analysis of business models : Firm characteristics , innovation and performance”, Academy of
entrepreneruship journal, vol. 22(1), 2016, pp.1–21.
8. D. M. Lambert, and M. C. Cooper, “Issues in supply chain management”, Ind Mark Manage, vol. 29(1), 2000, pp. 65–83. 9. D. S. Diana, “Exploratory or confirmatory Factor Analysis”, Proc. of SUGI 31, 2006, pp.200-23, San Francisco, California.
10. E. Autio, L. Dahlander, and L. Frederiksen, “Information exposure, opportunity evaluation, and entrepreneurial action: An investigation
of an online user community”, Academy of Management Journal, vol. 56, 2013, pp. 1348–1371. 11. E. Zancul, “Product Life Cycle Management: PLM Systems Selection Based on Reference Models”, São Carlos: Escola de Engenharia de
São Carlos, Universidade de São Paulo. 2009.
12. G. Devakumar, and G. Barani, “Marketing strategies for competitive advantage: structural equation modelling approach on agricultural sector industry in South India”, Int. J. Business Excellence, vol. 9(2), 2016, pp.225-239.
13. G. Hosseininia, and A. Ramezani, “Factors Influencing Sustainable Entrepreneurship in Small and Medium-Sized Enterprises in Iran: A
Case Study of Food Industry” Sustainability, vol. 8, 1010, 2016, pp. 1-20. 14. G. Lay, M. Schroeter, and S. Biege, “Service based business concepts: a typology for business to business markets”, European
Management Journal, vol. 27(6), 2009, pp. 442–455.
15. G. Singh, and B. Zhao, “Agricultural mechanization situation in Asia and the Pacific region”, Agricultural Mechanization in Asia, Africa, and Latin America, vol. 47(2), 2016, pp.15-25.
16. G. T. Valderrama, and M. Mendigorri, “Content validation of a measure of R and D effectiveness”, R and D Management, vol. 35(3),
2005, pp. 311-331. 17. H. Daire, C. Joseph and R. M. Michael “Structural Equation Modelling: Guidelines for Determining Model Fit”, Electron Journal of
Business Research Methods, vol. 6(1), 2008, pp. 53-60.
18. H. J. P. Schoemaker, S. Heaton, and D. Teece, “Innovation, dynamic capabilities, and leadership”, California Management Review, 61(1), 2018, pp. 15-42.
19. H. M. Morris, W. J. Webb, J. Fu, and S. Singhal, “A competency-based perspective on entrepreneurship education: Conceptual and
Empirical Insights”, Journal of Small Business Management, vol. 51(3), 2013, pp. 352-369. 20. H. Volberda, and A. Lewin, “Co-evolutionary dynamics within and between firms: From evolution to co-evolution”, Journal of
Management Studies, vol. 40, 2003, pp. 2111-2136.
21. I. Mani, and P. K. Sahoo, “Present status and future prospects of agricultural machinery research in India” Agricultural Mechanization in Asia, Africa and Latin America, vol. 47(2), 2016, pp.36-40.
22. J. D. Thompson, and I. C. MacMillan, “Business models: creating new markets and societal wealth”, Long Range Planning, vol. 43(2/3),
2010, pp. 291–307. 23. J. F. Hair, R. E. Anderson, and R. L. Tatham, Multivariate data analysis, New Jersey, Prentice Hall, 2006.
24. J. F. Hair, R. E. Anderson, R. L. Tatham, and W. C. Black, Multivariate Data Analysis, Prentice- Hall, Upper Saddle River: New Jersey,
1998. 25. K. Koschatzky, and T. Stahlecker, “A new challenge for regional policy-making in Europe? Chances and risks of the merger between
cohesion and innovation policy”, European Planning Studies, vol. 18(1), 2010, pp. 1-19.
26. K. Laursen, and A. Salter, “Open for innovation: The role of openness in explaining innovative performance among UK manufacturing firms”, Strategic Management Journal, vol. 27(2), 2006, pp. 131–150.
27. K. Muff., and T. Dylick, “An organisational roadmap of business sustainability”, April 30, 2014, Available: SSRN: https://ssrn.com/abstract=2442211 or http://dx.doi.org/10.2139/ssrn.2442211
28. L. J. Cronbach, “Estimate alpha and the internal structure of tests”, Psychometrika, vol. 16(3), 1951, pp. 297–334.
29. L. T. Hu, and P. M. Bentler, “Cutoff Criteria for Fit Indexes in Covariance Structure Analysis: Conventional Criteria versus New Alternatives”, Structural Equation Model, vol. 6(1), 1999, pp. 1-55.
30. M. D. Gomez, R. Baxter, R. Roy, and M. Kalta. “Trough-Life Integration Using PLM. Proceeding of the 19th CIRP Design”,
Conference–Competitive Design, Cranfield University, Cranfield, 2009. 31. M. E. Porter, and M. R. Kramer, “Creating shared value”, Harvard Business Review January/February: 63–77, 2011.
32. M. Spence, and H. L. Essoussi, “SME brand building and management: an exploratory study”, European Journal of Marketing, vol.
44(7/8), 2010, pp. 1037-1054.
33. M. Taylor, and A. Murphy, “SMEs and e-business”, Journal of Small Business and Enterprise Development, vol. 11(3), 2004, pp. 280 –
289.
34. N. Bendary, and E. A. Minyawi, “Entrepreneurial competencies effect on Small and Medium Enterprises performance through the mediation effect of psychological contracting of outsourcing”, International Journal of Business and Economic Development, vol. 3(2),
2015, pp. 23-38.
35. P. Anderson, and M. L. Tushman, “Technological discontinuities and dominant designs: A cyclical model of technological change”, Administrative Science Quarterly, vol. 35, 1990, pp. 604–633.
36. P. C. Grindley, and D. J. Teece, “Managing intellectual capital: Licensing and cross-licensing in semiconductors and electronics”
California Management Review, vol. 39(2), 1997, pp. 8–41. 37. P. S. G. D. Oliveira, D. D. Silva, L. F. D. Silva, M. D. S. Lopes, and A. L. Helleno, “Factors that influence product life cycle management
to develop greener products in the mechanical industry”, International Journal of Production Research, vol. 54(15), 2016, pp. 4547-4567.
38. P. Skarzynski, and J. R. Latre, “Lessons to jumpstart disruptive innovation”, Strategy & Leadership, 39(1), 2011, pp. 5-10. 39. R. Amit, and C. Zott, “Value creation in E-Business”, Strategic Management Journal, vol. 22, 2001, pp. 493-520.
40. R. G. McGrath, “Business models: a discovery driven approach”, Long Range Planning, vol. 43(2), 2010, pp. 247–261.
41. R. K. Huet, and D. J. Freyman, “What sustainable entrepreneurship looks like: An exploratory study from a student perspective”, In Social Entrepreneurship Leveraging Economic, Political, and Cultural Dimensions, Springer: Berlin, Germany, 2011, pp. 155–178.
42. R. Katila, and G. Ahuja, “Something old, something new: A longitudinal study of search behavior and new product introduction”
Academy of Management Journal, vol. 45(6), 2002, pp. 1183–1194. 43. R. R. Nelson, and S. G. Winter, An evolutionary theory of economic change. Cambridge, MA: Harvard University Press, 1982.
44. S. A. Kumara, and C. Sahasranam, “Entrepreneurial characteristics among business management students: an empirical study”, The
Icfaian Journal of Management Research, vol. 8(6), 2009, pp. 7-29. 45. S. Evans et. al., “Business model innovation for sustainability: towards a unified perspective for creation of sustainable business models”,
Business Strategy and the Environment, vol. 26, 2017, pp. 597-608.
46. S. Grodal, A. Gotsopoulos, and F. F. Suarez, “The co evolution of technologies and categories during industry emergence”, Academy of
Management Review, vol. 40(3), 2015, pp. 423-445. 47. S. M. Giarratana, M. Mariani, and I. Weller, “Rewards for patents and inventor”, Behaviours in Industrial Research and Development,
vol. 61(1), 2018, pp. 264-292.
48. S. M. Tsai, C. M. Tsai, and C. C. Chang, “The Direct and Indirect Factors on Affecting Organizational Sustainability” Journal of Management and Sustainability, vol. 3(4), 2013, pp. 67-76.
49. S. Mitchelmore, and J. Rowley, “Entrepreneurial competencies : A Literature Review and Development Agenda”, International journal of
entrepreneurial behaviour and research, vol. 16(2), 2010, pp. 92-111. 50. S. S. Webber, “Leadership and trust facilitating cross-functional team success”, Journal of Management Development, vol. 21(3), 2002,
pp. 201 – 214.
51. S. Schaltegger and M. Wagner, “Sustainable entrepreneurship and sustainability innovation: categories and interactions”, Business Strategy and the Environment, vol. 20(4), 2011, pp. 222–237.
52. S. Schaltegger, L. F. Freund, and G. E. Hansen, “Business models for sustainability: A co-evolutionary analysis of sustainable
entrepreneurship, innovation, and transformation”, Organization and Environment, 2016, pp. 1-26. 53. S. Shadfar, and I. Malekmohammadi, “Application of Structural Equation Modelling (SEM) in restructuring state intervention strategies
toward paddy production development”, International Journal of Academic Research in Business and Social Sciences, vol. 3(12), 2013,
pp. 576-618. 54. S. Tehseen, and T. Ramayah, “Entrepreneurial competencies and SMEs business success: The contingent role of external integration”,
Mediterranean Journal of Social Sciences, vol. 6(1), 2015, pp. 50-60.
55. T. Krasnicka, and T. Ingram, “Effects of innovation and their measurement in small and medium sized enterprises”, International Journal of Contemporary Management, vol. 12(3), 2013, pp. 50-65.
56. U. Lichtenthaler, and H. Ernst, “Developing reputation to overcome the imperfections in the markets for knowledge”, Research Policy,
vol. 36(1), 2007, pp. 37–55. 57. W. Stubbs, and C. Cocklin, “Conceptualizing a ‘sustainability business model”, Organization Environment, vol. 21(2), 2008, pp. 103–
127.
58. Y. W. Fan, and E. Ku, “Customer focus, service process fit and customer relationship management profitability: the effect of knowledge sharing”, The Service Industries Journal, vol. 30(2), 2010, pp. 203-223.
31.
Authors: P. Lakshmi Prasanna, D. Rajeswara Rao
Paper Title: Probabilistic Recurrent Neural Network for Topic Modeling
Abstract: Data storing, and retrieving is the most important task in the current situation. Storing can be done
based on the topic that the document describes. To know the topics, we have to classify the documents, to classify
we are using topic modeling. In this paper we proposed probabilistic recurrent neural network (PRORNN) gives
the most prominent result in the classification. it's a Recurrent neural network (RNN)-based language model
designed to directly capture the worldwide linguistics which means relating words during a document via latent
topics. owing to their consecutive nature, RNNs square measure smart at capturing the native structure of a word
sequence – each linguistics and syntactical – however would possibly face problem basic cognitive process long-
range dependencies. As recurrent neural network fails to remember large dependencies, we are using topic
modeling merged with probabilistic recurrent neural network which is called PRORNN. This PRORNN consists of
all the merits of RNN and latent topic models. Thus, it gives most accurate classification as the result. The
proposed PRORNN model integrates the merits of RNNs and latent topic models. In this paper we take the 20
news groups data set in that we take 2000 documents and we can labeled to two topics. to classify this 2000
documents and assigned 2 topics to for that documents and use the rnn package to execute recurrent neural
network in R Tool.
Keywords: PRORNN, Classification, Topic Modeling, local, RNN.
References: 1. Topicrnn: A Recurrent Neural Network With Long-Range Semantic Dependency By Adji B. Dieng, Chong Wang, Jianfeng Gao, John
Paisley.
2. Recurrent And Convolutional Neural Networks By Ji Young Lee, Franck Dernoncourt.
3. Neural Network Approach For Text Classification Usinf+G Relevance Factor As Term Weighted Method By Anuradha Patra And Divakar Singh.
4. Automatic Text Categerization Using Neural Networks By Mignel E.Ruiz.
5. Text Classification Using Artificial Neural Networks By Fraser Murray 6. Hierarchical Text Categorisation Based On Neural Networks And Dempster-Shafer Theory Of Evidence By Gertrud Jeschke And Mounia
Lalmas
7. Generative And Discriminative Text Classification With Recurrent Neural Networks By Dani Yogatama, Chris Dyer, Wang Ling, And Phil Blunsom.
8. Fuzzy Approach Topic Discovery In Health And Medical
9. Corpora By Amir Karami _ Aryya Gangopadhyay _ Bin Zhou _ Hadi Kharrazi 10. Discovering Scientific Influence Using Cross-Domain Dynamic Topic Modeling By Jennifer Sleeman, Milton Halem, Tim Finin, Mark
Cane 11. Textual Document Clustering Using Topic Models By Xiaoping Sun
12. Analysis Of Initialization Method On Fuzzy C-Means Algorithm Based On Singular Value Decomposition For Topic Detection By
Ichsani Mursidah, Hendri Murfi 13. Analyzing Sentiments In One Go: A Supervised Joint Topic Modeling Approach By
14. Zhen Hai, Gao Cong, Kuiyu Chang, Peng Cheng, And Chunyan Miao
15. Topic Models For Unsupervised Cluster Matching By Tomoharu Iwata, Tsutomu Hirao, And Naonori Ueda. 16. Bag-Of-Discriminative-Words (Bodw) Representation Via Topic Modeling By Yueting Zhuang, Hanqi Wang, Jun Xiao, Fei Wu, Yi
Yang,Weiming Lu, And Zhongfei Zhang.
17. Sequential Short-Text Classification With Recurrent And Convolutional Neural Networks By Ji Young Lee ,Franck Dernoncourt_ 18. An Unsupervised Cross-Lingual Topic Model Framework For Sentiment Classification By Zheng Lin, Xiaolong Jin, Xueke Xu,
Yuanzhuo Wang, Xueqi Cheng, Weiping Wang, And Dan Meng.
19. Trending Topic Discovery Of Twitter Tweets Using Clustering And Topic Modeling Algorithms By Ma. Shiela C. Sapul, Than Htike
Aung And Rachsuda Jiamthapthaksin.
20. Impact Of Topic Modelling Methods And Text Classification Techniques In Text Mining: A Survey By Mino George, P. Beaulah
Soundarabai, Karthik Krishnamurthi
165-168
32.
Authors: Jayanti Mehra, RS Thakur
Paper Title: Probability Density Based Fuzzy C Means Clustering for Web Usage Mining
Abstract: The World Wide Web is huge repository and it is growing exponentially. It contains vast amount of
information which is growing and updating rapidly. Various organizations, institutes, government agencies and
service centers update their information regularly. The World Wide Web provides its services to the varieties of
web users. Web users may have different interests, needs and backgrounds. Clustering is one of the most important
tasks in the active areas of Web Usage Knowledge Discovery. It assures to handle the difficulty of information
overload on the Internet while many users are connected on the social media. Clustering is utilized for grouping
information into comparative access design for discovering client interest. There are two drawbacks of FCM
algorithm, firstly the requirements of no. of clusters c and secondly assigning the primary relationship matrix. Due
to these two drawbacks the FCM algorithm is hard to decide about the suitable no. of cluster and this algorithm is
insecure. The determination of desirable preliminary cluster is an important problem, therefore a new technique
called PDFCM algorithm is described.
Keywords: Clustering, FCM, Probability Based Fuzzy c means Clustering (PDFCM), Web Log Mining.
References: 1. A. Gupta and A. Khandekar, "Development of Weblog Mining Based on Improved Fuzzy C-Means Clustering Algorithm", International
Journal of Science, Engineering and Technology Research, Vol.5 (3), pp.688-693, March 2016.
2. A. Kapoor and A. Singhal, "A comparative study of K-Means, K-Means++ and Fuzzy C-Means clustering algorithms", In Proc. of 3rd International Conference on Computational Intelligence & Communication Technology, IEEE, pp. 1-6, 2017.
3. A. Zahid, A. V. Babuy, W Ahmed and M F Azeemz, "A fuzzy set theoretic approach to discover user sessions from web navigational
data", In Proc. of Recent Advances in Intelligent Computational Systems, IEEE, pp. 879-884, 2011. 4. B. Chandra, M. Gupta, and M.P. Gupta, "A multivariate time series clustering approach for crime trends prediction", In Proc of
International Conference on Systems, Man and Cybernetics, IEEE, pp. 892-896, 2008.
5. B. Maheswari and P. Sumathi, "A New Clustering and Preprocessing for weblog mining" In Proc. of World Congress on Computing and Communication Technologies, IEEE, pp. 25-29, 2014.
6. B. S. Shedthi, Shetty and M. Siddappa, "Implementation and comparison of K-means and fuzzy C-means algorithms for agricultural
data", In Proc. of International Conference on Inventive Communication and Computational Technologies, IEEE, pp. 105-108, 2017. 7. C. Baviskar and S. Patil, "Improvement of data object's membership by using Fuzzy K-Means clustering approach", In Proc. of
International Conference on In Computation of Power, Energy Information and Communication, IEEE, pp. 139-147, 2016.
8. C. T. Baviskar and S. S. Patil, "Improvement of data object's membership by using Fuzzy K-Means clustering approach", In Proc. of International Conference on Computation of Power, Energy Information and Communication (ICCPEIC)IEEE, pp. 139-147, 2016.
9. C. Yanyun, Q. Jianlin, G. Xiang, C. Jianping, J. Dan and C. Li, "Advances in research of Fuzzy c-means clustering algorithm", In Proc.
of International Conference on Network Computing and Information Security, IEEE, vol. 2, pp. 28-31, 2011. 10. Chen, Y.L. and Huang, C.K., “Discovering fuzzy time-interval sequential patterns in sequence databases”, IEEE Transactions on Systems,
Man and Cybernetics, Vol. 35(5), pp. 959-972, 2005. 11. D. Koutsoukos, G. Alexandridis, G. Siolas, and A. Stafylopatis, "A new approach to session identification by applying fuzzy c-means
clustering on weblogs", In Proc. of Symposium Series on Computational Intelligence, IEEE, pp. 1-8, 2016.
12. G. S. Chandel, K. Patidar and M. S. Mali, "A Result Evolution Approach for Web usage mining using Fuzzy C-Mean Clustering Algorithm", In Proc. of International Journal of Computer Science and Network Security, Vol.16(1). pp.135-140, 2016.
13. H. Gulat, and P. K. Singh, "Clustering techniques in data mining: A comparison", In Proc. of 2nd International Conference on Computing
for Sustainable Global Development, IEEE, pp.410-415, 2015. 14. H. X. Pei, Z. R. Zheng, C. Wang, C. Li, and Y. H. Shao, "D-FCM: Density based fuzzy c-means clustering algorithm with application in
medical image segmentation", Procedia Computer Science, Vol.122(1), pp. 407-414, 2017.
15. K. Suresh, R. M. Mohana, A. Rama Mohan Reddy, and A. Subramanyam, "Improved FCM algorithm for clustering on web usage mining." In Proc. of International Conference on Computer and Management, pp. 1-4. 2011.
16. P. Sampath and M. Prabhavathy, "Web Page Access Prediction Using Fuzzy Clustering by Local Approximation Memberships (Flame)
Algorithm”, Vol.10 (7), pp.3217-3220, 2006. 17. S. K. Dwivedi and B. Rawat, "A review paper on data preprocessing: A critical phase in web usage mining process", In Proc. of
International Conference on Green Computing and Internet of Things, IEEE, pp. 506-510, 2015.
18. V. Anitha and P. Isakki, "A survey on predicting user behavior based on web server log files in a web usage mining", In Proc. of International Conference on Computing Technologies and Intelligent Data Engineering, IEEE, pp. 1-4, 2016.
19. V. Chitraa, and A. S. Thanamani, "Weblog Data Analysis by Enhanced Fuzzy C Means Clustering”, International Journal on
Computational Sciences & Applications, Vol.4 (2), pp. 81-95, 2014. 20. Y. Hu, Chuncheng Y. Y. Zuo, and F. Qu, "A cluster validity index for fuzzy c-means clustering", In System Science, In Proc. of
International Conference on Engineering Design and Manufacturing Informatization (ICSEM) IEEE, vol. 2, pp. 263-266, 2011.
21. Z. Ansari, S. A. Sattar, A.V. Babu, and M. F. Azeem, “Mountain density-based fuzzy approach for discovering web usage clusters from
weblog data, Fuzzy Sets and Systems”, Vol.279 (1), pp.40-63, 2015.
169-173
33.
Authors: Bingu Rajesh, Puvvada Nagesh, Koppada Gowtham, Gorantla Vivek, N.Srinivasu
Paper Title: A New Scheme to Safeguard Data for Cloud Integrated Internet Things
Abstract: In our day-to-day life people use many electronic gadgets to control things around, which in turn
those things communicate with other things around and get the requested work done, this is Internet of Things. As
there would be enormous amount of data generated by Internet of Things why not we store it in cloud? Here, in
this paper, we discuss how to secure data for cloud integrated Internet of Things. In two main steps we can ensure
the data cannot be tampered. First, the CP-ABE (Cipher text Policy – Attribute Based Encryption) produces a
secret key and encrypts the data. The data can only be decrypted when the secret key is correctly produced. The
second way uses threshold cryptography where secret key is further encrypted by RSA and then generated key is
divided internally and giving to a group of users. Shared key can be produced only if all the authorized users come
together. Above proposed scheme not only provides confidentiality but also helps in reducing number of keys and
prevents unauthorized/malicious users to access our data.
Keywords: CP-ABE (Cipher text Policy – Attribute Based Encryption), Threshold cryptography, Confidentiality,
174-178
Malicious users.
References: 1. Jiguo Li, Wei Yao, Yichen Zhang, Huiling Qian, and Jinguang Han, “Flexible and Fine-Grained Attribute-Based Data Storage in Cloud
Computing”, IEEE,2017.
2. Hongwei Li, Yuanshun Dai1, Ling Tian, “Identity based authentication for cloud computing”, Springer-Verlag Berlin Heidelberg.
3. Changji wang, Xuan Liu,Wentao Li,”Implementing a Personal Health Record Cloud Platform using Ciphertext-Policy Attribute Based
Encryption”, International Confercne on Intelleigent Networking and Collaborative Systems. 4. Threshold cryptography-based data security in cloud computing. IEEE International Conferenceon Computational Intelligence &
Communication Technology 2015.
5. A. Shamir. How to share a secret. Commun. ACM, 22, pp. 612-613, November 1979. 6. Ravleen Kaur, Pragya Kashmira, Kanak Meena, Dr. A.K.Mohapatra “Survey on Different Techniques of Threshold Cryptography”, IOSR
Journal of Electronics and Communication Engineering (IOSR-JECE).
7. Achieving efficient and secure data acquisition for cloud-supported IoT in smart grid, 2017 IEEE. 8. Secure Data Access in Cloud Computing, Sunil Sanka ,2010.
9. Jitender Grover1, Shikha 2, Mohit Sharma3, “Cloud Computing and Its Security Issues - A Review “, IEEE – 33044 , Dec 2015.
10. H. Zhong, and H. Zhen, An Efficient Authenticated Group Key Agreement Protocol,” Security Technology, 2007 41st Annual IEEE International Carnahan Conference on, vol., no., pp.250-254, 8-11 Oct. 2007.
34.
Authors: Pushpendra Kumar, Ramjeevan Singh Thakur
Paper Title: Early Detection of the Liver Disorder from Imbalance Liver Function Test Datasets
Abstract: Aim of this research is to develop a model for early detection of liver disorder from imbalance Liver
Function Test (LFT) results’ datasets that assists the practitioners in diagnosing the liver disease efficiently.
Because in the initial stage symptoms of the diseases are vague so the medical practitioners often fail to detect the
disease. This study used two datasets of Liver Function Test (LFT) for building the systems, one is ILPD dataset
(secondary) taken from UCI repository and second dataset (Primary) is collected form Madhya Pradesh region of
India. We have used Support Vector Machine and K-Nearest Neighbour (KNN) algorithms to implement the
system and Synthetic Minority Oversampling Technique (SMOTE) to balance the datasets. We have compared the
results of both the algorithm on the different parameter for both the imbalanced and balanced datasets. We get the
improved result for accuracy, specificity, precision, false positive rate (FPR) parameters on balanced datasets using
SVM whereas using KNN we get improve results for accuracy, specificity, sensitivity, FPR and FNR parameters
on balanced datasets. We can conclude that the proposed system gives the improve result on balance dataset on
most of the parameter. Proposed system helps the healthcare practitioners in diagnosing the liver disease efficiently
at the early stage.
Keywords: K Nearest Neighbor (KNN), Liver Function Test (LFT), SMOTE, Support Vector Machine (SVM).
References: 1. J. Han, J. Pei, and M. Kamber, Data mining: concepts and techniques. Elsevier, 2011. 2. M. Abdar, M. Zomorodi-Moghadam, R. Das, and I.-H. Ting, "Performance analysis of classification algorithms on early detection of liver
disease," Expert Systems with Applications, vol. 67, pp. 239-251, 2017.
3. M. Hassoon, M. S. Kouhi, M. Zomorodi-Moghadam, and M. Abdar, "Rule Optimization of Boosted C5. 0 Classification Using Genetic Algorithm for Liver disease Prediction," in Computer and Applications (ICCA), 2017 International Conference on, 2017, pp. 299-305:
IEEE.
4. K. Nagaraj and A. Sridhar, "NeuroSVM: A Graphical User Interface for Identification of Liver Patients," arXiv preprint arXiv:1502.05534, 2015.
5. J. Hopkins. (11/05/2018). Liver: Anatomy and Functions.
6. B. S. A. Benjamin Wedro. (11/05/2018). Liver Disease Facts. 7. K.-C. Cheng, W.-Y. Lin, C.-S. Liu, C.-C. Lin, H.-C. Lai, and S.-W. Lai, "Association of different types of liver disease with demographic
and clinical factors," Biomedicine, vol. 6, no. 3, 2016.
8. M. S. P. B. a. N. B. V. Bendi Venkata Ramana. Machine Learning Repository [Online]. 9. S. Bahramirad, A. Mustapha, and M. Eshraghi, "Classification of liver disease diagnosis: a comparative study," in Informatics and
applications (ICIA), 2013 second international conference on, 2013, pp. 42-46: IEEE.
10. M. ABDAR, "A survey and compare the performance of IBM SPSS modeler and rapid miner software for predicting liver disease by using various data mining algorithms," Cumhuriyet Science Journal, vol. 36, no. 3, pp. 3230-3241, 2015.
11. D. Alemayehu and M. L. Berger, "Big Data: transforming drug development and health policy decision making," Health services and
outcomes research methodology, vol. 16, no. 3, pp. 92-102, 2016. 12. S. N. N. Alfisahrin and T. Mantoro, "Data Mining Techniques for Optimization of Liver Disease Classification," in Advanced Computer
Science Applications and Technologies (ACSAT), 2013 International Conference on, 2013, pp. 379-384: IEEE.
13. A. Hammad and S. AbouRizk, "Knowledge discovery in data: A case study," Journal of Computer and Communications, vol. 2, no. 05, p. 1, 2014.
14. M. B. Priya, P. L. Juliet, and P. Tamilselvi, "Performance Analysis of Liver Disease Prediction Using Machine Learning Algorithms," 2018.
15. M. Abdar, N. Y. Yen, and J. C.-S. Hung, "Improving the Diagnosis of Liver Disease Using Multilayer Perceptron Neural Network and
Boosted Decision Trees," Journal of Medical and Biological Engineering, pp. 1-13, 2017. 16. X. Zhou, Y. Zhang, M. Shi, H. Shi, and Z. Zheng, "Early detection of liver disease using data visualisation and classification method,"
Biomedical Signal Processing and Control, vol. 11, pp. 27-35, 2014.
17. . V. Ramana, M. P. Babu, and N. Venkateswarlu, "A critical comparative study of liver patients from USA and INDIA: an exploratory analysis," International Journal of Computer Science Issues, vol. 9, no. 2, pp. 506-516, 2012.
18. S. Kant and I. A. Ansari, "An improved K means clustering with Atkinson index to classify liver patient dataset," International Journal of
System Assurance Engineering and Management, vol. 7, no. 1, pp. 222-228, 2016. 19. C. Cortes and V. Vapnik, "Support-vector networks," Machine learning, vol. 20, no. 3, pp. 273-297, 1995.
20. R. Saxena. (2017, 11/05/2018). SVM CLASSIFIER, INTRODUCTION TO SUPPORT VECTOR MACHINE ALGORITHM.
21. S. Ray. (2015 11/05/2018). Understanding Support Vector Machine algorithm. 22. R. Saxena. (2016, 11/05/2018). KNN CLASSIFIER, INTRODUCTION TO K-NEAREST NEIGHBOR ALGORITHM.
23. H. Patel and G. S. Thakur, "Classification of imbalanced data using a modified fuzzy-neighbor weighted approach," International Journal
of Intelligent Engineering and Systems, vol. 10, no. 1, pp. 56-64, 2017. 24. [24] H. Patel and G. S. Thakur, "Improved Fuzzy-Optimally Weighted Nearest Neighbor Strategy to Classify Imbalanced Data," 2017.
179-186
25. [25] N. V. Chawla, K. W. Bowyer, L. O. Hall, and W. P. Kegelmeyer, "SMOTE: synthetic minority over-sampling technique," Journal of
artificial intelligence research, vol. 16, pp. 321-357, 2002.
26. H. He and E. A. Garcia, "Learning from imbalanced data," IEEE Transactions on knowledge and data engineering, vol. 21, no. 9, pp. 1263-1284, 2009.
27. Y. Xu, C. Wu, K. Zheng, X. Niu, and Y. Yang, "Fuzzy–synthetic minority oversampling technique: Oversampling based on fuzzy set
theory for Android malware detection in imbalanced datasets," International Journal of Distributed Sensor Networks, vol. 13, no. 4, p.
1550147717703116, 2017.
28. Z. Zheng, Y. Cai, and Y. Li, "Oversampling method for imbalanced classification," Computing and Informatics, vol. 34, no. 5, pp. 1017-
1037, 2016. 29. R. Das and A. Sengur, "Evaluation of ensemble methods for diagnosing of valvular heart disease," Expert Systems with Applications, vol.
37, no. 7, pp. 5110-5115, 2010.
30. J. Brownlee. (2016, 11/05/2018). Confusion Matrix in Machine Learning.
35.
Authors: Pankaj Kumar Sharma
Paper Title: Model for Detection and Prevention of MANET Anomalies
Abstract: MANET is a self-configured network of devices in wireless linked network, in an arbitrary topology.
Each node is an independent node, which can play a role of host, router & receiver. The connectivity is established
by operating system hosted on participating nodes. Routing algorithm establishes routes and forwarding
information as packets to and from source to sink station. Many routing techniques attempt to achieve optimal
performance, however modifications are still required in existing routing protocols to improve the performance of
MANET. An efficient MANET leads to fulfillment of three key performance metrics (PDR, AE2ED, and
Overhead). There exist some predominant anomalies in Mobile Ad-hoc Network in terms of above performance
metrics. Anomalies in MANET arise due to various environmental factors like variation in number of connections
among participating nodes, mobility of nodes, pause time of node, rate of data packet forwarded by nodes and total
density of nodes, adversely affecting its performance. In order to overcome some predominant anomalies, in this
research a systematic approach has been used to develop an intelligent system model, which controls the
performance adaptively.
Keywords: MANET, PDR, AE2ED, Overhead, Fuzzy
References: 1. V. Venkata Ramana et al., ” Bio Inspired Approach to Secure Routing in MANETs”, International Journal of Artificial Intelligence &
Applications (IJAIA), Vol.3, No.4, July 2012.
2. S. Umamaheswari and G. Radhamani,” An Improved ACO Based Algorithm for EnhancingPerformance in Wireless Adhoc Network”,
American Journal of Scientific Research ;ISSN 1450-223X Issue 54 (2012), pp. 68-80; © EuroJournals Publishing, Inc. 2012 ;
3. Jun-Zhao Sun, Mobile Ad Hoc Networking: An Essential Technology for pervasive Computing Mediate team, Machine Vision and
Media Processing unit ,info Tech Unit, InfoTech Oulu P.O.Box 4500, FIN-90014 University of Oulu, Finland.
4. Caixia li, Sreenatha Gopalarao Anavatti and Tapabrata Ray, “ Analytical Hierarchy Process using Fuzzy Inference Techniques for
real – time route Guidance system , IEEE Transaction on Intelligent Transportation Systems , vol 15 No 1 February 2014
5. C.-K Toh, Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad hoc Networks‖, , 2001
,IEEE.
6. R. L. Flood and M.C. Jackson , "Creative problem solving". John Wiley and Sons, Chichester, (1991), ISBN 0-471-93052-0.
7. Siddesh Gundagatti Karibasappa , K.N Muralidhara, “ Neuro Fuzzy Based Routing International Conference on
Industrial and Information Systems, ICIIS 2011, Aug. 16 19, 2011 IEEE
8. Dr .C. Suresh Gnana Dhass and N. Kumar, Power Aware Routing protocols in in Mobile Ad hoc Networks-Survey, International
Journal of advanced research in Computer Science and Software Engineering, 2012,Vol. 2, Issue 9.
9. N. Battat and H. Kheddouci, “HMAN: Hierarchical Monitoring for Ad Hoc Network,” in IEEE/IFIP EUC, 2011.
10. K. Kwak, G. Huerta-Canepa, Y. Ko, D. Lee, and S. J. Hyun, “An Overlay-Based Resource Monitoring Scheme for Social Applications in
MANET,” in IEEE COMPSAC, 2009.
11. K. Ramachandran, E. Belding-Royer, and K. Almeroth, “DAMON: A Distributed Architecture for Monitoring Multi-hop Mobile
Networks,” in IEEE SECON, 2004.
12. R. Riggio, M. Gerola, D. Miorandi, A. Zanardi, and F. Jan, “A Distributed Network Monitoring Framework for Wireless Networks,” in
IFIP/IEEE IM, 2011.
13. K. Graffi, D. Stingl, J. Rueckert, A. Kovacevic, and R. Steinmetz, “Monitoring and Management of Structured Peer-to-Peer Systems,” in
IEEE P2P, 2009.
14. M. Jelasity, A. Montresor, and O. Babaoglu, “Gossip-Based Aggregation in Large Dynamic Networks,” ACM Transactions on Computer
Systems, vol. 23, no. 3, pp. 219–252, 2005.
15. R. van de Bovenkamp, F. Kuipers, and P. Van Mieghem, “Gossip-based Counting in Dynamic Networks,” in IFIP NETWORKING,
2012.
16. P. Yalagandula and M. Dahlin, “A Scalable Distributed Information Management System,” ACM SIGCOMM Computer Communication
Review, vol. 34, no. 4, pp. 379–390, 2004.
17. Muhammad Aamir_ and Mustafa A. Zaidi, A Buffer Management Scheme for Packet Queues in MANET, TSINGHUA SCIENCE AND
TECHNOLOGY ISSNll1007- 0214ll01/10llpp543-553 Volume 18, Number 6, December 2013
18. Anita Yadav • Y. N. Singh • R. R. Singh, Improving Routing Performance in AODV with Link Prediction in Mobile Adhoc Networks,
Wireless PersCommun DOI 10.1007/s11277-015-2411-5, Springer Science+Business Media New York 2015.
19. ShariqMahmood Khan • R. Nilavalan • Abdulhafid F. Sallama, A Novel Approach for Reliable Route Discovery in Mobile Ad-Hoc
Network, Wireless PersCommun DOI 10.1007/s11277-015-2461-8, Springer Science+Business Media New York 2015. Networks, ACM
MSWIM’04, October 4–6, 2004, Venezia, Italy.
187-191
36.
Authors: Geeta Chhabra, VasudhaVashisht, Jayanthi Ranjan
Paper Title: Improving Accuracy For Cancerclassification With Gene Selection
Abstract: The article presents a detail overview of different classification techniques for colon cancer prediction 192-199
by gene expression dataand evaluated their performance based on classification accuracy, computational time
&proficiency to reveal gene information. The gene selection methods have been introduced also and evaluated
with respect to their statistical significance to cancer classifier.The purpose is to build a multivariate model for
tumour classification with genetic algorithm.The multivariate models were constructed using nearest centroid, k-
nearest neighbours, support vector machine, maximum likelihood discriminant functions, neural networks and
random forest classifiers combined with genetic algorithm applied to the colon cancer publicly available dataset.It
has been observed from the experimental analysis that Maximum Likelihood Discriminant Functions (MLHD)
performs better and accuracy has been further been improved by using most frequent genes using the forward
selection method. Also, maximum likelihood discriminant functions are cost effective and faster than neural
networks (NNET), nearest centroid (Nearcent) and random forest (RF). Thus, the experiments show that
classification accuracy is affected with the selection of genes that contributes to the accuracy of the model. It will
remove the irrelevant genes thus will reduce the size and make the algorithm fast.
Keywords: data mining; genetic algorithm; machine learning algorithms.
References: 1. AdamsL. J., BelloG. A., Dumancas G.Development and Application of a Genetic Algorithm for Variable Optimization and Predictive
Modeling of Five-Year Mortality Using Questionnaire Data.Bioinformatics and Biology Insights.2015;3(3):31-41.
2. Amancio D.R., Comin C.H., Casanova D., Travieso G., Bruno O.M., Rodrigues, A.F., Costa L. F. A Systematic Comparison of
Supervised Classifiers. PLoS ONE. 2014; 9(4): e94137. Available from Doi:10.1371/journal.pone.0094137 3. Bennet J., Ganaprakasam C.,Kumar N. A. Hybrid Approach for Gene Selection and Classification using Support Vector Machine. The
International Arab Journal of Information Technology. 2015;12(6A):695-700.
4. Bhola A., Tiwari A. K. Machine Learning Based Approaches for Cancer Classification Using Gene Expression Data. Machine Learning and Applications:An International Journal.2015;2(3/4). Available from DOI:10.5121/mlaij.2015.2401.
5. Chen H., Zhao H., Shen J., Zhou R., Zhou Q. Supervised Machine Learning Model for High Dimensional Gene Data in Colon Cancer
Detection. IEEE International Congress on Big Data.2015;134-141. 6. Dagliyan O.,Uney-YuksektepeF., Kavakli IH, Turkay M. Optimization Based Tumor Classification from Microarray Gene Expression
Data. PLoS ONE. 2011; 6(2). Available from https://doi.org/10.1371/journal.pone.0014579.
7. Galván-TejadaC., Zanella-Calzada L., Galván-Tejada J., Celaya-Padilla J.M., Gamboa-Rosales H., Garza-Veloz I., Martinez-Fierro M.L. Multivariate Feature Selection of Image Descriptors Data for Breast Cancer with Computer-Assisted Diagnosis. Diagnostics.
2017;7(1):9.Available from https://doi.org/10.3390/diagnostics7010009
8. Guia J. M. De, Devaraj M. Analysis of Cancer Classification of Gene Expression Data: A Scientometric Review. International Journal of Pure and Applied Mathematics. 2018; 119(12):12505-12513.
9. Kourou K., Exarchos T. P., Exarchos K. P., Karamouzis M. V., Fotiadis D. I. Machine learning applications in cancer prognosis and
prediction. Computational and Structural Biotechnology Journal.2014; 13:8-17. 10. Lu Y., Han J., Cancer classification using gene expression data.Information Systems. 2003; 28: 243–268.
11. Maher B. A., Mahmoud A. M., El-Horbaty El-S., SalemM. Abdel-B. Classification of Two Types of Cancer Based on Microarray Data.
Egyptian Computer Science Journal. 2014; 38(2):56-66. 12. Merk S.colonCA: exprSet for Alon et al. (1999) colon cancer data. R package version 1.22.0. 2018.
13. Moorthy K., Mohamad M. S., Deris S. A Review on Missing Value Imputation Algorithms for Microarray Gene Expression Data.Current
Bioinformatics.2014;9:18-22. 14. Mashhour M. E.,Houby E.M.F, Wassif T. K.,Salah A.I. Survey on different Methods for Classifying Gene Expression using Microarray
Approach. International Journal of Computer Applications.2016; 150(1):12-21.
15. Novakovic J. Dj., Veljovic A., Ilic S.S., Papic Z., Tomovic M. Evaluation of Classification Models in Machine Learning. Theory and Applications of Mathematics & Computer Science. 2017; 7(1):39 – 46.
16. Reena S. G., Rajeswari P. A Survey of Human Cancer Classification using Micro Array Data. International Journal of Computer
Technology and Applications. 2011; 2 (5):1523-1533. 17. Siang T. C., Soon T.W., Kasim S., Mohamad M. S., Howe C. W., Deris S.,Zakaria Z., Shah A.Z., Ibrahim Z. A review of cancer
classification software for gene expression data. International Journal of Bio-Science and Bio-Technology.2015;7(4):89-108. 18. Tarek S., Elwahab R. A., Shoman M. Gene expression-based cancer classification. Egyptian Informatics Journal.2016; 18:151-159.
19. Trevino V., Falciani F.GALGO:An R package for Genetic Algorithm Searches. Bioinformatics.2006.
20. Torrente A., Lukk M., Xue V., Parkinson H., RungJ., Brazma A. Identification of Cancer Related Genes Using a Comprehensive Map of Human Gene Expression. PLOS ONE. 2016;11(6):1-20. Available from DOI:10.1371/journal.pone.0157484.
21. Venkatesan E.V., Velmurugan T.Performance Analysis of Decision Tree Algorithms for Breast Cancer Classification. Indian Journal of
Science and Technology.2015;8(29). Available from DOI: 10.17485/ijst/2015/v8i29/84646. 22. Worrawat E., Chan J.H. Apriori gene set-based microarray analysis for disease classification using unlabeled data. Procedia Computer
Science. 2013; 23:137-145.
23. Zhang H., Wang H., Dai Z., Chen M.,Chen M.S., Yuan Z. Improving accuracy for cancer classification with a new algorithm for genes
selection. BMC Bioinformatics.2012;13:298. Available from https://doi.org/10.1186/1471-2105-13-298.
24. Meyer D., DimitriadouE., Hornik K., WeingesselA., LeischF. e1071: Misc Functions of the Department of Statistics, Probability
TheoryGroup. 2017. Available fromhttps://CRAN.R-project.org/package=e1071.
37.
Authors: Venkatesh. P, R Sivaprakasam.
Paper Title: Studies on the Effect of Turning Operation on Mean Cutting Force and Cutting Power of AISI 3415
Alloy Steel
Abstract: This exploration is conceded to reveal the outcome of machining factors such as cutting velocity,
depth of cut and feed rate on the mean cutting force and the cutting power on turning AISI 3415 cylindrical steel
alloy components. The experiments are planned based on the (33) full factorial design and conducted on an All
Geared Lathe with TiN coated cutting tool insert of 0.8mm nose radius, simultaneously cutting forces such as feed
force, thrust force and tangential force are observed using a calibrated lathe tool dynamometer adapted in the tool
holder. A mathematical expression representing mean cutting force and cutting power is created by means of non-
linear regression examination. The outcome of each machining factors on the mean cutting force and the cutting
power is studied and presented accordingly.
Keywords: AISI 3415 steel alloy; Cutting force; Cutting power; Full factorial design; Lathe; Regression analysis
References:
200-204
1. Tomé, L.I., Baião, V., da Silva, W. and Brett, C.M., 2018. Deep eutectic solvents for the production and application of new
materials. Applied Materials Today, 10, pp.30-50.
2. Selvam, M.D., Senthil, P. and Sivaram, N.M., 2017. Parametric optimisation for surface roughness of AISI 4340 steel during turning under near dry machining condition. International Journal of Machining and Machinability of Materials, 19(6), pp.554-569.
3. Hassanalian, M. and Abdelkefi, A., 2017. Classifications, applications, and design challenges of drones: A review. Progress in Aerospace
Sciences, 91, pp.99-131.
4. Selvam, M.D. and Senthil, P., 2016. Investigation on the effect of turning operation on surface roughness of hardened C45 carbon
steel. Australian Journal of Mechanical Engineering, 14(2), pp.131-137.
5. Salamati, M., Soltanpour, M., Fazli, A. and Zajkani, A., 2018. Processing and tooling considerations in joining by forming technologies; part A—mechanical joining. The International Journal of Advanced Manufacturing Technology, pp.1-55.
6. Dennison, M.S., Sivaram, N.M. and Meji, M.A., 2018. A Comparative Study on the Tool-Work Interface Temperature Observed during
the Turning Operation of AISI 4340 Steel in Flooded, Near Dry, and Dry, Machining Conditions. i-Manager's Journal on Future Engineering and Technology, 13(4), p.34.
7. DENNISON, M.S. and MEJI, M.A., 2018. A Comparative Study on the Surface Finish Achieved During Face Milling of AISI 1045 Steel
Components. i-Manager's Journal on Mechanical Engineering, 8(2), p.18. 8. Stephenson, D.A. and Agapiou, J.S., 2016. Metal cutting theory and practice. CRC press.
9. Selvam, M.D., Dawood, D.A.S. and Karuppusami, D.G., 2012. Optimization of machining parameters for face milling operation in a
vertical CNC milling machine using genetic algorithm. IRACST-Engineering Science and Technology: An International Journal (ESTIJ), 2(4).
10. Selvam, M.D. and Sivaram, N.M., 2017. The effectiveness of various cutting fluids on the surface roughness of AISI 1045 steel during
turning operation using minimum quantity lubrication system. i-Manager's Journal on Future Engineering and Technology, 13(1), p.36. 11. Selvam, M.D., Srinivasan, V. and Sekar, C.B., 2014. An Attempt To Minimize Lubricants In Various Metal Cutting
Processes. International Journal of Applied Engineering Research, 9(22), pp.7688-7692.
12. Selvam, M.D. and Sivaram, N.M., 2018. A comparative study on the surface finish achieved during turning operation of AISI 4340 steel in flooded, near-dry and dry conditions. Australian Journal of Mechanical Engineering, pp.1-10.
13. Khorasani, A.M., Gibson, I., Goldberg, M., Nomani, J. and Littlefair, G., 2016. Machinability of Metallic and Ceramic Biomaterials: A
review. Science of Advanced Materials, 8(8), pp.1491-1511. 14. Thakur, A., Gangopadhyay, S., Maity, K.P. and Sahoo, S.K., 2016. Evaluation on effectiveness of CVD and PVD coated tools during dry
machining of Incoloy 825. Tribology Transactions, 59(6), pp.1048-1058.
15. Bhattacharya, A., Das, S., Majumder, P. and Batish, A., 2009. Estimating the effect of cutting parameters on surface finish and power consumption during high speed machining of AISI 1045 steel using Taguchi design and ANOVA. Production Engineering, 3(1), pp.31-40.
16. Aggarwal, A., Singh, H., Kumar, P. and Singh, M., 2008. Optimizing power consumption for CNC turned parts using response surface
methodology and Taguchi's technique—a comparative analysis. Journal of materials processing technology, 200(1-3), pp.373-384. 17. Nur, R., Noordin, M.Y., Izman, S. and Kurniawan, D., 2017. Machining parameters effect in dry turning of AISI 316L stainless steel
using coated carbide tools. Proceedings of the Institution of Mechanical Engineers, Part E: Journal of Process Mechanical
Engineering, 231(4), pp.676-683. 18. Cakir, M.C., Ensarioglu, C. and Demirayak, I., 2009. Mathematical modeling of surface roughness for evaluating the effects of cutting
parameters and coating material. Journal of materials processing technology, 209(1), pp.102-109.
19. Asiltürk, I., Neşeli, S. and Ince, M.A., 2016. Optimisation of parameters affecting surface roughness of Co28Cr6Mo medical material during CNC lathe machining by using the Taguchi and RSM methods. Measurement, 78, pp.120-128.
38.
Authors: Nadeem Gulzar Shahmir, Manzoor Ahmad Tantray
Paper Title: Life Cycle Cost Analysis of Translucent Concrete
Abstract: Translucent concrete permits the daylight specifically to go starting with one of its end then onto the
next end. This is to be finished by embedding plastic optical filaments in concrete which is chiefly utilized for
correspondence reason and the optical strands take a shot at the premise of Nano optics; in this paper cost
examination on execution of translucent concrete in room (translucent concrete room) is talked about. The
examination depends on the estimations and analyses, computations are done on the suppositions that plastic
optical filaments of 2mm width are utilized in the room having specific measurements. By using these plastic
optical filaments in concrete was checked for the expense as well as checked for the light force going crosswise
over casted concrete blocks. Lux meter was utilized for estimating power of light and sizes of (150mm x 150mm)
(22500mm sq. surface zone) with thickness of 75mm solid 3D shapes was cast to check the outcomes. By utilizing
translucent concrete in room won't just keep up the quality of the room yet will likewise enable the light to go into
the room bringing about immense measure of vitality sparing and giving different advantages of daylight. Base on
the presumptions of utilizing these casted cuboids in the room the last expense of the room was determined and
was contrasted with the expense of regular room and last outcomes rely upon the measure of vitality that gets
spared by utilizing translucent concrete in room and different advantages of utilizing translucent concrete in room
and it was found to be economical and energy efficient source to utilize translucent concrete in rooms or buildings.
Keywords: Translucent solid, plastic optical filaments, lux meter, daylight, vitality sparing, concrete samples,
translucent concrete room..
References: 1. Experimental Analysis of Translucent Concrete by using Optical Fibres by Nikhil, Umer farooq, Silal ahmed, Juraige, Shabeeba omar
march 2016 SSRG International Journal of Civil Engineering. 2. Computational Modelling of Translucent Concrete Panels by Aashish Ahuja; Khalid M. Mosalam and Tarek I. Zohdi in November 2014
journal of architectural engineering.
3. Analysis of Transparent Concrete as an Innovative Material Used in Civil Engineering by Monika Zielińska, Albert Ciesielski in 2018 IOP Conference Series: Materials Science and Engineering.
4. Experimental study of light transmitting concrete by Abdulmajeed altomate, Faisal Alatshan , Mohmad Jadan in 2016 International
Journal of Sustainable Building Technology and Urban Development. 5. Translucent Concrete: Test of Compressive Strength and Transmittance A Karandikar N. Virdhi A. Deep.
6. Effect of Plastic Optical Fibre on Some Properties of Translucent Concrete by Dr. Shakir Ahmed Salih, Dr. Hasan Hamodi Joni , Safaa
Adnan Mohamed in November 2014 Eng. &Tech. Journal, Vol. 32, Part (A), No.12, 2014 7. Compressive strength of translucent concrete by Salmabanu Luhar, Urvashi Khandelwal in Sept 2015 International Journal of
Engineering Sciences & Emerging Technologies
8. Litracon by Shreyas.K in Sept 2018 International Journal of New Technologies in Science and Engineering. 9. Translucent concrete: Test of compressive strength and transmittance by A. Karandikar in 2015 International journal of engineering
205-207
research and technology
10. Experimental Study of Light Transmitting Concrete Using Optical Fibre by Sachin Sahu, Amlan Kumar Sahoo, Aman Kumar Singhal,
Kuramana Stephen, Tamo Talom, Subham Saroj Tripathy, Sidhant Das in 2018 11. Experimental Evaluation on Light Transmittance Performance of Translucent Concrete by Awetehagn Tuaum, Stanley Muse Shitote and
Walter Odhiambo Oyawa in 2018 international journal of applied engineering research.
12. A novel translucent concrete panel with waste glass inclusions for architectural applications by Valerio R.M. Lo Verso, Simonetta L.
Pagliolico and Laura Ligi in july 2015 the indian concrete journal.
13. Evaluation of The Mechanical Properties of Translucent Concrete by Dr. Shakir Ahmed Salih , Dr. Hasan Hamodi Jonj , Safaa Adnan
Mohamad in april 2018 International Journal of Engineering Trends and Technology (IJETT) 14. Study of Translucent Glass Concrete by Sisira Sugunan , Nisha Babu, Sowparnika M. in 2016 IOSR Journal of Mechanical and Civil
Engineering
39.
Authors: Mohd Azlishah Othman, Abd Shukur Jaafar, Nurmala Irdawaty Hassan
Paper Title: Development of Broadband EMF Sensors for Energy Harvesting using RF and Microwave Signals
Abstract: Telecommunication Tower has been built for giving the wide coverage on UHF for communication
devices. The radiation power from the tower gives awareness that radiation by the cellular tower might affect the
human health. Hence, this contribution leads to invention of EMF Meter exists specifically focus on power
radiation which is known as RF power meter. The RF power meter is use to detect broadband frequency of UHF in
ranging from 300 MHz to 3 GHz radiation power. Within the UHF range, Radio Energy Harvesting technology
was introduced. This gives the innovative opportunity of Radio Energy harvesting application on RF power meter.
By combining both technologies, the RF power meter could detect the power radiation while harvesting RF energy
at the same time. The solution provide on having devices able to power up with less consumption on power supply.
In this project, RF power meter was programmed by Arduino and RF energy harvesting was designed. The RF
power meter able to achieve 98.6% accuracy and at the input power level of -10 dBm, the measured result shows a
RF to DC conversion efficiency achieving 63.3% with the corresponding DC output voltage of 2.11 V.
Keywords: About; Broadband EMF Sensor, Harvest RF Energy, 1.8 GHz to 2.4 GHz, Voltage Multiplier
Circuit.
References: 1. Flint, X. Lu, N. Privault, D. Niyato, and P. Wang, “Performance Analysis of Ambient RF Energy Harvesting with Repulsive Point
Process Modeling,” pp. 1–21, 2015.
2. X. Lu, P. Wang, D. Niyato, D. I. Kim, and Z. Han, “Wireless Networks with RF Energy Harvesting: A Contemporary Survey,” vol. 17,
no. 2, pp. 757–789, 2014. 3. Q. M. Bashayreh, A. a. Omar, and A. M. Alshamali, “The effect of RF radiation on human health using stratified human head model,”
2010 IEEE Radar Conf., pp. 178–182, 2010.
4. Ahmad, R. Ariffin, N. M. Noor, and M. A. Sagiruddin, “1.8 GHz Radio Frequency signal radiation effects on human health,” 2011 IEEE Int. Conf. Control Syst. Comput. Eng., pp. 546–550, 2011.
5. G. Kumar and I. I. T. Bombay, “Cell Phone / Tower Radiation Hazards & Solutions,” no. July, 2012.
6. M. M. Dawoud, “High Frequency Radiation and Human Exposure,” no. October, pp. 1–7, 2003. 7. T. Le, K. Mayaram, and T. Fiez, “Efficient far-field radio frequency energy harvesting for passive powered sensor networks,” IEEE J.
Solid-State Circuits, vol. 43(5), no. 5, pp. 1287–1302, 2008.
8. H. Kanaya, “Multi-Band Miniaturized Slot Antenna with Multi-Band Impedance Matching Circuit,” vol. 0, pp. 551–554, 2014. 9. B. Dixon, “Radio Frequency Energy Harvesting,” pp. 2–3, 2014.
10. X. Lu, P. Wang, D. Niyato, and Z. Han, “Resource Allocation in Wireless Networks with RF Energy Harvesting and Transfer,” no.
December, pp. 68–75, 2014. 11. N. Degrenne et al., “Self-Starting DC : DC Boost Converter for Low-Power and Low-Voltage Microbial Electric Generators To cite this
version : Self-Starting DC : DC Boost Converter for Low-Power and Low-Voltage Microbial Electric Generators,” Ecce, pp. 889–896,
2011. 12. Q. Yuan and S. Suzuki, “B-21-2 Exact Approach to Design Matching Circuit with Element Ohmic Loss,” vol. 2, no. 3, p. 2016, 2016.
13. S. S. Chouhan and K. Halonen, “A modified cross coupled rectifier based charge pump for energy harvesting using RF to DC
conversion,” Circuit Theory Des. (ECCTD), 2013 Eur. Conf., no. 1, pp. 1–4, 2013. 14. J. Emery, “Cockcroft-Walton Voltage Multiplier,” pp. 1–8, 2013.
15. N. M. Waghamare and R. P. Argelwar, “High Voltage Generation by using Cockcroft-Walton Multiplier,” vol. 4, no. 2, pp. 256–259,
2015. 16. R. Thakare, S. B. Urkude, and R. P. Argelwar, “Analysis of Cockcroft - Walton Voltage Multiplier,” vol. 5, no. 3, pp. 3–5, 2015.
17. P. Rengalakshmi, “Rectifier for RF Energy Harvesting,” vol. 143, no. 10, pp. 14–17, 2016.
18. Michelon et al., “Performance Analysis of Ambient RF Energy Harvesting with Repulsive Point Process Modeling,” 2016 17th Int. Symp. Antenna Technol. Appl. Electromagn. ANTEM 2016, vol. 17, no. 5, pp. 5–6, 2016.
19. Khansalee, Y. Zhao, and E. Leelarasmee, “A Dual-Band Rectifier for RF Energy Harvesting Systems,” pp. 0–3, 2014.
20. Chaour, S. Bdiri, A. Fakhfakh, and O. Kanoun, “Modified Rectifier Circuit for High Efficiency and Low Power RF Energy Harvester,” pp. 619–623.
21. P. Haddad, S. Member, G. Gosset, and J. Raskin, “Automated Design of a 13 . 56 MHz 19 µ W Passive Rectifier With 72 % Efficiency Under 10 µ A load,” vol. 51, no. 5, pp. 1290–1301, 2016.
22. C. Liou, S. Member, M. Lee, and S. Huang, “High-Power and High-Ef fi ciency RF Recti fi ers Using Series and Parallel Power-Dividing
Networks and Their Applications to Wirelessly Powered Devices,” vol. 61, no. 1, pp. 616–624, 2013. 23. V. Kuhn, C. Lahuec, F. Seguin, and C. Person, “A Multi-Band Stacked RF Energy Harvester With RF-to-DC Efficiency Up to 84 %,”
vol. 63, no. 5, pp. 1768–1778, 2015.
24. Michelon, E. Bergeret, A. Di Giacomo, and P. Pannier, “RF Energy Harvester with Sub-threshold Step-up Converter,” 2016.
208-211
40.
Authors: Yogesh Kumar, Rahul Rishi
Paper Title: A Robust Pattern Based Re-engineering Model Guided by MODA and ELM for Software Testing
Effort Estimation
Abstract: Software Testing Effort (STE) plays a big role in code development method that highly contributes
in complete development effort. Reducing the testing effort while not altering the standard/quality of the final code
is always imperative; thus, STE measure is incredibly essential to conduct code testing method in associate
economical manner. In this paper, a MODA aided Pattern based re-engineering (PBRE) model has been proposed
for the selection of desirable number of projects with their respective features from within company and cross-
212-218
company projects. The five input features selected by the MODA for Software Testing Effort (STE) estimation
prior to development are Project Duration, Development Personnel, Test Cases, Function Points and Project Cost.
We subjected the selected projects and features to train an ELM model for estimating STE using the k-fold cross
validation approach. Outcomes shows that the anticipated model for estimating STE from cross-company projects
and within-company projects yielded similar results to actual effort.
Keywords: Software Testing Effort (STE), Multi-objective Dragonfly algorithm (MODA), Pattern based
reengineering (PBRE), Extreme Learning Machine (ELM), Root Means Square Estimation (RMSE).
References: 1. Chemuturi M, “Mastering software quality assurance: best practices, tools and techniques for software developers”, 2010. 2. Bardsiri VK, Jawawi DN, Hashim SZ, Khatibi E, “Increasing the accuracy of software development effort estimation using projects
clustering”, IET software,Vol.6,No.6,pp.461-473,2012.
3. Benestad HC, Anda B, Arisholm E, “Understanding cost drivers of software evolution: a quantitative and qualitative investigation of change effort in two evolving software systems”, Empirical Software Engineering, Vol.15, No.2, pp.166-203, 2010.
4. Pai DR, McFall KS, Subramanian GH, “Software effort estimation using a neural network ensemble”, Journal of Computer Information
Systems, Vol.53, No.4, pp.49-58, 2013. 5. Jorgensen M, Shepperd M, “A systematic review of software development cost estimation studies”, IEEE Transactions on software
engineering, Vol.33, No.1, pp.33-53, 2007.
6. Jorgensen M, Shepperd M, “A systematic review of software development cost estimation studies”, IEEE Transactions on software engineering, Vol.33, No.1, pp.33-52, 2007.
7. Seyedali Mirjalili, “Dragonfly algorithm : a new meta-heuristic optimization technique for solving single-objective, discrete, and multi-
objective problems”, Neural Computing and Application, Vol. 27, Issue 4, pp 1053-1073, May-2016. 8. Hieu, Trung, Huynh, Yonggwan and Won, “Regularized online sequential learning algorithm for single-hidden layer feedforward neural
networks”, Pattern Recognition Letters, Volume 32, Issue 14, 15 October 2011, Pages 1930-1935.
9. WeiweiZong, Guang-BinHuang and Yiqiang Chen, “Weighted extreme learning machine for imbalance learning”, Neurocomputing, Volume 101, 4 February 2013, Pages 229-242.
10. Zhifei, Shao and Meng Joo, “An online sequential learning algorithm for regularized Extreme Learning Machine”, Neurocomputing,
Volume 173, Part 3, 15 January 2016, Pages 778-788. 11. Yogesh Kumar, Rahl Rishi, “Dragonfly algorithm guided extreme learning machine based prediction model for software testing effort
estimation”, in Journal of advanced research in dynamical and control system, Special Issue-07, 2018. Pp. 1948-1958.
12. Yogesh Kumar, “Comparative analysis of software size estimation techniques in project management”, in International journal for research in applied science & engineering technology, Vol. 5, Issue VIII, Aug-2017. Pg 1470-1477.
13. Tannu, Yogesh Kumar, “Comparative Analysis of Different Software Cost Estimation Methods”, International Journal of Computer
Science and Mobile Computing, Volume 3, Issue 6, 04 July 2014, pg.547-557.
41.
Authors: Rajarajan.S, Sivaprakasam.R
Paper Title: Optimisation of Machining Factors for Surface Roughness and Mean Cutting Force of AISI 52100 Steel
During Turning Under Microlubrication Condition
Abstract: This research work is conducted inorder to find the best practicable turning factors to achieve enhanced
surface quality cylindrical AISI52100 steel components under microlubrication condition. The turning operation is
performed in a turning centre (All Geared Lathe) with CBN insert of 0.8mm nose radius. The turning factors
namely feed rate, cutting velocity and depth of cut are preferred to accomplish the experimentation based on
Taguchi’s L25(53) orthogonal array, simultaneously the cutting forces such as feed force, tangential force and
thrust force are observed using a calibrated lathe tool dynamometer adapted in the tool holder. The surface
roughness of the turned steel alloy components is deliberated by means of a precise surface roughness apparatus. A
prediction model in lieu of average surface roughness and mean cutting force is created by means of nonlinear
regression examination with the aid of MINITAB software. The most favorable machining settings for surface
roughness and mean cutting force are recognized by Taguchi’s method and verified with a confirmation trial.
Keywords: AISI52100; Microlubrication condition; Surface roughness; Cutting force; Lathe; Regression
analysis; Taguchi method.
References: 1. Ali, S.M., Dhar, N.R. and Dey, S.K., 2011. Effect of minimum quantity lubrication (MQL) on cutting performance in turning medium
carbon steel by uncoated carbide insert at different speed-feed combinations. Advances in Production Engineering & Management, 6(3).
2. Selvam, M.D. and Senthil, P., 2016. Investigation on the effect of turning operation on surface roughness of hardened C45 carbon steel. Australian Journal of Mechanical Engineering, 14(2), pp.131-137.
3. Leppert, T., 2011. Effect of cooling and lubrication conditions on surface topography and turning process of C45 steel. International
Journal of Machine Tools and Manufacture, 51(2), pp.120-126. 4. Sharma, A.K., Tiwari, A.K. and Dixit, A.R., 2016. Effects of Minimum Quantity Lubrication (MQL) in machining processes using
conventional and nanofluid based cutting fluids: A comprehensive review. Journal of Cleaner Production, 127, pp.1-18.
5. Selvam, M.D., Dawood, D.A.S. and Karuppusami, D.G., 2012. Optimization of machining parameters for face milling operation in a vertical CNC milling machine using genetic algorithm. IRACST-Engineering Science and Technology: An International Journal
(ESTIJ), 2(4).
6. Dennison, M.S., Sivaram, N.M. and Meji, M.A., 2018. A Comparative Study on the Tool-Work Interface Temperature Observed during the Turning Operation of AISI 4340 Steel in Flooded, Near Dry, and Dry, Machining Conditions. i-Manager's Journal on Future
Engineering and Technology, 13(4), p.34.
7. Selvam, M.D. and Sivaram, N.M., 2017. The effectiveness of various cutting fluids on the surface roughness of AISI 1045 steel during turning operation using minimum quantity lubrication system. i-Manager's Journal on Future Engineering and Technology, 13(1), p.36.
8. Kurgin, S., Dasch, J.M., Simon, D.L., Barber, G.C. and Zou, Q., 2012. Evaluation of the convective heat transfer coefficient for
minimum quantity lubrication (MQL). Industrial Lubrication and Tribology, 64(6), pp.376-386. 9. Selvam, M.D., Srinivasan, V. and Sekar, C.B., 2014. An Attempt To Minimize Lubricants In Various Metal Cutting
Processes. International Journal of Applied Engineering Research, 9(22), pp.7688-7692. 10. Debnath, S., Reddy, M.M. and Yi, Q.S., 2014. Environmental friendly cutting fluids and cooling techniques in machining: a
review. Journal of cleaner production, 83, pp.33-47.
11. Dureja, J.S., Singh, R. and Bhatti, M.S., 2014. Optimizing flank wear and surface roughness during hard turning of AISI D3 steel by Taguchi and RSM methods. Production & Manufacturing Research, 2(1), pp.767-783.
219-225
12. Selvam, M.D., Senthil, P. and Sivaram, N.M., 2017. Parametric optimisation for surface roughness of AISI 4340 steel during turning
under near dry machining condition. International Journal of Machining and Machinability of Materials, 19(6), pp.554-569.
13. Liao, Y.S., Liao, C.H. and Lin, H.M., 2017. Study of oil-water ratio and flow rate of MQL fluid in high speed milling of Inconel 718. International Journal of Precision Engineering and Manufacturing, 18(2), pp.257-262.
14. Ramasamy, K., Dennison, M.S. and Baburaj, E., 2018. Surface Finish Achieved in Producing Pneumatic Piston Rod: An Experimental
Investigation. i-Manager's Journal on Mechanical Engineering, 8(3), p.9.
15. Sarhan, A.A., Sayuti, M. and Hamdi, M., 2012. Reduction of power and lubricant oil consumption in milling process using a new SiO 2
nanolubrication system. The International Journal of Advanced Manufacturing Technology, 63(5-8), pp.505-512.
16. Rahim, E.A. and Sasahara, H., 2011. A study of the effect of palm oil as MQL lubricant on high speed drilling of titanium alloys. Tribology International, 44(3), pp.309-317.
17. Boubekri, N., Shaikh, V. and Foster, P.R., 2010. A technology enabler for green machining: minimum quantity lubrication
(MQL). Journal of Manufacturing Technology Management, 21(5), pp.556-566. 18. Vijayakumar, E. and Selvam, M.D., 2018. The Effect of Cutting Fluid on Surface Roughness of AISI 4340 Steel during Turning
Operation. International Journal of ChemTech Research, 11(03), pp.227-230.
19. DENNISON, M.S. and MEJI, M.A., 2018. A Comparative Study on the Surface Finish Achieved During Face Milling of AISI 1045 Steel Components. i-Manager's Journal on Mechanical Engineering, 8(2), p.18.
20. Sharma, J. and Sidhu, B.S., 2014. Investigation of effects of dry and near dry machining on AISI D2 steel using vegetable oil. Journal of
cleaner production, 66, pp.619-623. 21. Selvam, M.D. and Sivaram, N.M., 2018. A comparative study on the surface finish achieved during turning operation of AISI 4340 steel
in flooded, near-dry and dry conditions. Australian Journal of Mechanical Engineering, pp.1-10.
42.
Authors: Sukanya Ledalla, Tummala Sita Mahalakshmi
Paper Title: Sentiment Analysis using Legion Kernel Convolutional Neural Network with LSTM
Abstract: Social media is growing as a communication medium where people can express their feelings online
and opinions on a variety of topics in ways they rarely do in person. Detecting sentiments in texts have gained a
considerable amount of attention in the last few years. Thus, the terms sentiment analysis have taken their own
path to become essential elements of computational linguistics and text analytics. These terms are designed to
detect peoples’ opinions that consist of subjective expressions across a variety of products or political decisions. In
recent years, in India, opinions are expressed using multi-lingual words. This has become a new challenge in the
area of sentiment analysis. Machine learning techniques, such as neural networks, have proven success in this task;
however, there is room to advance to higher-accuracy networks. In this paper, a novel sentiment analysis system is
developed which uses Legion Kernel Convolutional Neural Network with Long Short-Term Memory (LSTM). In
this investigation U. S. English, Hindi dialects and datasets like twitter sentiment corpus, transliteration pairs,
English word- frequency list, Hindi word-frequency list and various public opinion datasets are used. The
proposed network can achieve the highest known accuracy of 92.25%. Thus the proposed network’s success can be
extended to other fields also.
Keywords: Convolutional Neural Network; Long Short-Term Memory; Sentiment Analysis; Subjective
Expressions; Multi-Lingual Sentence; F-Score
References: 1. Szegedy, C., Ioffe, S., Vanhoucke, V., & Alemi, A. A. (2017). Inception-v4, Inception- ResNet and the Impact of Residual Connections
on Learning. In AAAI (pp. 4278- 4284).
2. Tripathy, A., Agrawal, A., & Rath, S. K. (2016). Classification of sentiment reviews using n-gram machine learning approach. Expert Systems with Applications, 57, 117-126.
3. Verma, A. & Liu, Y. (2017). Hybrid Deep Learning Ensemble Model for Improved Large-Scale Car Recognition. IEEE Smart World
Congress 4. Al-Barazanchi, H. A., Qassim, H., & Verma, A. (2016, October). Novel CNN architecture with residual learning and deep supervision for
large-scale scene image categorization. In Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), IEEE
Annual (pp. 1-7). IEEE. 5. Vo, H. H., & Verma, A. (2016, December). New Deep Neural Nets for Fine-Grained Diabetic Retinopathy Recognition on Hybrid Color
Space. In Multimedia (ISM), 2016 IEEE International Symposium on (pp. 209-215). IEEE.
6. Bojanowski, P., Grave, E., Joulin, A., & Mikolov, T. (2016). Enriching word vectors with subword information. arXiv preprint arXiv:1607.04606
7. Wang, J., Yu, L. C., Lai, K. R., & Zhang, X. (2016, August). Dimensional sentiment analysis using a regional CNN-LSTM model. In
ACL 2016—Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics. Berlin, Germany (Vol. 2, pp. 225-230).
8. Zhang, K., Chao, W. L., Sha, F., & Grauman, K. (2016, October). Video summarization with long short-term memory. In European
Conference on Computer Vision (pp. 766-782). Springer International Publishing. 9. Madhu Bala Myneni, L V Narasimha Prasad, J Sirisha Devi (2017). In A Framework for Sementic Level Social Sentiment Analysis
Model. Journal of Theoretical and Applied Information Technology
10. Medel, J. R., & Savakis, A. (2016). Anomaly detection in video using predictive convolutional long short-term memory networks. arXiv preprint arXiv:1612.00390.
11. J Sirisha Devi, Siva Prasad Nandyala, P Vijaya Bhaskar Reddy (2019). A Novel Approach for Sentiment Analysis of Public Posts. In Innovations in Computer Science and Engineering
12. Rahman, L., Mohammed, N., & Al Azad, A. K. (2016, September). A new LSTM model by introducing biological cell state. In Electrical
Engineering and Information Communication Technology (ICEEICT), 2016 3rd International Conference on (pp. 1-6). IEEE.
226-229
43.
Authors: M. Bindusri, S. Koteswara Rao
Paper Title: Sunspot Data Denoising using Wavelet
Abstract: In data analysis, signal processing plays a prominent role since the received sunspot data continuously
fluctuates. Sunspot number data is corrupted with Gaussian noise and for statistical analysis; the noise needs to be
filtered using wavelet transform. Traditional methods, Fourier transform and Kalman filter has limitations when
analyzing the sunspot number data. A Wavelet transform is a promising tool that provides the time-frequency
representation of the data. Daily sunspot number data from 2001 to 2018 is analyzed using Daubechies wavelet
transform. Daubechies wavelet transform provides flexibility and is used for wide ranges of data using different
230-236
denoising techniques such as Rigrsure, Sqtwolog, Heursure, Minimaxi thresholding methods. Results showed
Sqtwolog (Universal (or) global threshold) and Heursure gave the better- denoised results compared with the other
two denoising threshold methods for the sunspot number data.
Keywords: Denoising methods- Heursure, Minimaxi, Rigrsure, Sqtwolog, Sunspot number, wavelets.
References: 1. HAN YANBEN, HAN YONGGANG (30-Aug 2013). Wavelet analysis of sunspot relative numbers.
2. ASWATHY MARY PRINCE, Dr. SANISH THOMAS, Er. RAVI JOHN, Dr.D.P. JAYAPANDIAN (2013). A study on themed range
periodicity of sunspot number during solar cycles 21, 22, 23and 24, International journal of scientific and research publications. 3. Sunspots essay research paper.
4. SATISH KUMAR KASDE, DEEPAK KUMAR SONDHIYA, ASHOK KUMAR GWAL (September 2016), Volume 5. Analysis of
sunspot time series during the ascending phase of solar cycle24 using the wavelet transform 5. S. POSTALCLOGLU, K. ERKAN, E.D. BOLAT. Comparison of Kalman filter and wavelet filter for denoising.
6. P.M. BENTLEY, J.T.E. MC DONNEL, Wavelet transforms an introduction, Volume 6.
7. BABATUNDE S. EMMANUEL. Discrete wavelet mathematical transformation method for non-stationary heart sound signal analysis ( August 2012), Vol: 7, No: 8.
8. I.M. DREMIN, O.V. IVANOV, V.A.NECHITAILO LEBEDEV physical institute, Moscow117294, Russia. Wavelets and their use.
9. BURHAN ERGEN, FIRAT University, TURKEY. Signal and Image denoising using wavelet transform. 10. LEI LEI, CHAO WANG, XIN LIU (2013), Vol:7, No:9. Discrete wavelet transform decomposition level determination exploiting
sparseness measurement.
11. C EDRIC VONNESCH, THIERRY BLU, MICHAEL UNSER (20-Aug-2007). Generalized Daubechies wavelet families, Volume 55. 12. S.C SHIRALASHETTI (2014). An application of the Daubechies orthogonal wavelets in power system engineering, Recent advances in
Information technology. 13. LU JNG-YI, LIN HONG, YE DONG, ZHANG YAN-SHENG (2016). A new wavelet threshold function and denoising application,
http://dx.doi.org/10.1155/2016/3195492.
14. BARTOSZ KOZLOWSKI, Journal of Telecommunications and Information technology, 2005. Time series denoising with wavelet transforms.
15. E.HOSTALKOVA, A. PROCHAZKA. Wavelet signal and Image denoising.
16. PIOTR LIPINSKI, MYKHAYLO YATSYMIRSKYY. Efficient 1D and 2D Daubechies wavelet transforms with application to signal processing.
17. M. PITCHAMMAL, N. RIGANA FATHIMA, S. SHAJUN NISHA (2016). Emprical evaluation of wavelet transforms using Shrinkage
thresholding techniques with medical images., Vol:6. 18. MARIO MASTRIANI. Denoising and compression in wavelet domain via projection onto approximation coefficients.
19. YALI LIU (2015). Image denoising method based on threshold, wavelet transform and genetic algorithm, Vol: 8, No: 2.
20. VAISHALI V. THORAT, ELECTRONICS and TELECOMMUNICATION ENGINEERING department, SAVITRIBHAI PHULE Pune University. Study of Denoising algorithms- Review paper.
21. M. STNDAG, A. SENGR, M. GKBULUT and F. ATA, “PRZEGLD ELEKTRO TECHNICZNY (2012), Vol: 89, No 5, pp 2047-2052.
Performance comparison of wavelet thresholding techniques on weak ECG signals denoising. 22. JEENA ROY, SALCE PETER, NEETHA JOHN (2013),Vol-2. Denoising using soft thresholding.
23. DANIEL VALENCIA, Member IEEE, DAVID OREJUALA, JEFERSON SALAZAR, JOSE VALENCIA, Member IEEE. Comparison
analysis between Rigrsure, Sqtwolog, Heursure and Minimaxi techniques using Hard and Soft thresholding methods.
44.
Authors: Poonthamil R, Maheshwar Pratap
Paper Title: “Optimization of Instrumental Workflow in CSSD” at Hospital Sector
Abstract: Theobjective of this paper is to analyze the existing instrument workflow of CSSD [Central Sterile
Supply Department] and to suggest the optimized workflow solutions for the hospital. We need to study about
CSSDand what are the various activities which takes placethere along with the timings they required for each
activity. By knowing those, we need to find out the critical and non-critical activities to create a map.The basic
outline of the map is that the instruments from OT [Operation Theatre] to TSSD [Theatrical Sterile Supply
Department], TSSD to CSSD, then CSSD to TSSD and TSSD to OT store. In detail, we will study about each area
how the instruments are moving, and how much time it consumes.For that we need to create an existing workflow
with the lean tool called VSM [Value Stream Mapping] and in that pick out the critical and non–critical activities.
We can remove the non–critical activities and create a new workflow.With the new workflow we will form the
Program Evaluation & Review Technique model which helps to know the percentage of efficiency has been
improved in accordance to the existing workflow. With this solution, we can propose a new workflow of
Instruments with the minimized critical activity and time period for the activities which takes place in CSSD of the
hospital sector.
Keywords: Value Stream Mapping, Program Evaluation and Review Technique, Optimized Workflow.
References: 1. Ben-Tovim, D. I., Bassham, J. E., Bolch, D., Martin, M. A., Dougherty, M., &Szwarcbord, M. (2007). Lean thinking across a hospital:
redesigning care at the Flinders Medical Centre. Australian Health Review, 31(1), 10-15. 2. Du, G., Zheng, L., & Ouyang, X. (2017). Real-time scheduling optimization considering the unexpected events in home health
care. Journal of Combinatorial Optimization, 1-25.
3. Lummus, R. R., Vokurka, R. J., &Rodeghiero, B. (2006). Improving quality through value stream mapping: A case study of a physician's clinic. Total Quality Management, 17(8), 1063-1075.
4. Cima, R. R., Brown, M. J., Hebl, J. R., Moore, R., Rogers, J. C., Kollengode, A., ...& Team, S. P. I. (2011). Use of lean and six sigma
methodology to improve operating room efficiency in a high-volume tertiary-care academic medical center. Journal of the American College of Surgeons, 213(1), 83-92.
5. Toussaint, J. S., & Berry, L. L. (2013, January). The promise of Lean in health care. In Mayo clinic proceedings (Vol. 88, No. 1, pp. 74-
82). Elsevier. 6. Gill, P. S. (2012). Application of value stream mapping to eliminate waste in an emergency room. Global Journal of Medical
Research, 12(6).
7. Gwadz, M. V., Collins, L. M., Cleland, C. M., Leonard, N. R., Wilton, L., Gandhi, M., ...& Ritchie, A. S. (2017). Using the multiphase optimization strategy (MOST) to optimize an HIV care continuum intervention for vulnerable populations: a study protocol. BMC public
237-242
health, 17(1), 383.
8. Van de Klundert, J., Muls, P., &Schadd, M. (2008). Optimizing sterilization logistics in hospitals. Health care management
science, 11(1), 23-33. 9. Kushwaha, N., & Pant, M. (2018). Fuzzy magnetic optimization clustering algorithm with its application to health care. Journal of
Ambient Intelligence and Humanized Computing, 1-10.
10. Lin, Q. L., Liu, H. C., Wang, D. J., & Liu, L. (2015). Integrating systematic layout planning with fuzzy constraint theory to design and
optimize the facility layout for operating theatre in hospitals. Journal of Intelligent Manufacturing, 26(1), 87-95.
11. Schwarz, P., Pannes, K. D., Nathan, M., Reimer, H. J., Kleespies, A., Kuhn, N., ...&Zügel, N. P. (2011). Lean processes for optimizing
OR capacity utilization: prospective analysis before and after implementation of value stream mapping (VSM). Langenbeck's archives of surgery, 396(7), 1047.
12. Doğan, N. Ö., &Unutulmaz, O. (2016). Lean production in healthcare: a simulation-based value stream mapping in the physical therapy
and rehabilitation department of a public hospital. Total Quality Management & Business Excellence, 27(1-2), 64-80. 13. Henrique, D. B., Rentes, A. F., GodinhoFilho, M., &Esposto, K. F. (2016). A new value stream mapping approach for healthcare
environments. Production Planning & Control, 27(1), 24-48.
14. Lorence, D., & Wu, L. F. (2012). Meeting US Health Reform Mandates with Computerized Health Services Utilization Matching and Optimization. Journal of medical systems, 36(3), 2047-2055.
15. Mallor, F., &Azcárate, C. (2014). Combining optimization with simulation to obtain credible models for intensive care units. Annals of
Operations Research, 221(1), 255-271. 16. Masterson, B. J., Mihara, T. G., Miller, G., Randolph, S. C., Forkner, M. E., &Crouter, A. L. (2004). Using models and data to support
optimization of the military health system: A case study in an intensive care unit. Health Care Management Science, 7(3), 217-224.
17. Meisami, A., Deglise-Hawkinson, J., Cowen, M. E., & Van Oyen, M. P. (2018). Data-driven optimization methodology for admission control in critical care units. Health care management science, 1-18.
18. Goh, M. M., Tan, A. B., & Leong, M. H. (2016). Bar Code‐Based Management to Enhance Efficiency of a Sterile Supply Unit in
Singapore. AORN journal, 103(4), 407-413.
19. Fuhrer, P., &Guinard, D. (2006). Building a smart hospital using RFID technologies: use cases and implementation. Fribourg, Switzerland: Department of Informatics-University of Fribourg.
20. Scholl, J., Syed-Abdul, S., & Ahmed, L. A. (2011). A case study of an EMR system at a large hospital in India: challenges and strategies
for successful adoption. Journal of biomedical informatics, 44(6), 958-967. 21. Vetter, T. R., Uhler, L. M., &Bozic, K. J. (2017). Value-based healthcare: Preoperative assessment and global optimization (PASS-GO):
Improving value in total joint replacement care. Clinical Orthopaedics and Related Research®, 475(8), 1958-1962.
22. Kleinberg, S., &Hripcsak, G. (2011). A review of causal inference for biomedical informatics. Journal of biomedical informatics, 44(6), 1102-1112.
23. Holzinger, A., Kosec, P., Schwantzer, G., Debevc, M., Hofmann-Wellenhof, R., &Frühauf, J. (2011). Design and development of a
mobile computer application to reengineer workflows in the hospital and the methodology to evaluate its effectiveness. Journal of biomedical informatics, 44(6), 968-977.
24. Xing, J., Burkom, H., &Tokars, J. (2011). Method selection and adaptation for distributed monitoring of infectious diseases for
syndromic surveillance. Journal of biomedical informatics, 44(6), 1093-1101. 25. Chunning, Z., & Kumar, A. (2000). JIT application: process-oriented supply chain management in a health care system. In Management
of Innovation and Technology, 2000. ICMIT 2000. Proceedings of the 2000 IEEE International Conference on (Vol. 2, pp. 788-791).
IEEE. 26. AbuKhousa, E., Al-Jaroodi, J., Lazarova-Molnar, S., & Mohamed, N. (2014). Simulation and modeling efforts to support decision
making in healthcare supply chain management. The Scientific World Journal, 2014.
27. Acheampong, P., Zhiwen, L., Antwi, H. A., Boateng, F., Akomeah, M. O., &Boadu, A. B. (2017). Engaging Constructive Modelling
Concepts to Augment Supply Chain Management Decisions in Ghana's Health Sector. European Journal of Contemporary
Research, 6(1).
45.
Authors: Amandeep, Sanjeev Kumar, Vikas Chauhan, Prem Kumar
Paper Title: LTE-A Heterogeneous Networks Using Femtocells
Abstract: For the improvement of coverage and services of quality, Femtocells play important role in
heterogenous Networks in LTE-A networks. Femtocells are used to provide good indoor voice, increase network
capacity and high data coverage in LTE-A. the problem of Cross-Tier interference is a large problem in Femtocells
Networks. Cross-Tier interference is an interference between Femtocells base station and Microcell’s base station
in a network structure. Throughput is increased while Cross-Tier interference can be decreased using Femtocell in
any Networks. In this paper, we also show experiment results obtain by a simulation framework which shows how
Femtocells can increase the throughput and reduce the interference.
Keywords: Heterogeneous Network, Experiment, Femtocells, LTE, Interference, Throughput, Pathloss, SINR.
References: 1. Yamamoto, T., & Konishi, S. (2013). “Impact of small cell deployments on mobility performance in LTE-Advanced systems”. In
Personal, Indoor and Mobile Radio communications Workshops, IEEE 24th International Symposium, pp. 189-193, 2013.
2. Bouras, C., Kokkinos, V., Kontodimas, K., & Papazois, A.. A simulation framework for LTE-A systems with femtocell overlays. In
Proceedings of the 7th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks, pp. 85-90, (2012).
3. Trestian, R., Vien, Q. T., Shah, P., & Mapp, G. (2015, October). Exploring energy consumption issues for multimedia streaming in LTE HetNet small cells. In Local Computer Networks (LCN), 2015 IEEE 40th Conference on (pp. 498-501). IEEE.
4. Kosta, C., Hunt, B., Quddus, A. U., & Tafazolli, R.. On interference avoidance through inter-cell interference coordination (ICIC) based
on OFDMA mobile systems. IEEE Communications Surveys & Tutorials, 15(3), 973-995, (2013).
5. Stanze, O., & Weber, A. (2013). Heterogeneous networks with LTE‐Advanced technologies. Bell Labs Technical Journal, 18(1), 41-58.
6. http://www.3gpp.org/technologies/keywords-acronyms/98-lte. 7. http://www.3gpp.org/technologies/keywords-acronyms/97-lte-advanced.
8. Zhou, Hao, Yusheng Ji, Xiaoyan Wang, and Shigeki Yamada. "eICIC configuration algorithm with service scalability in heterogeneous
cellular networks." IEEE/ACM Transactions on Networking (TON) 25, no. 1 (2017): 520-535. 9. Alexiou, A., Bouras, C., Kokkinos, V., Kontodimas, K., & Papazois, A. (2011, October). Interference behavior of integrated femto and
macrocell environments. In Wireless Days (WD), 2011 IFIP (pp. 1-5). IEEE.
10. Claussen, Holger. "Performance of macro-and co-channel femtocells in a hierarchical cell structure." In Personal, Indoor and Mobile Radio Communications, 2007. PIMRC 2007. IEEE 18th International Symposium on, pp. 1-5. IEEE, 2007.
11. https://en.wikipedia.org/wiki/LTE_(telecommunication)
12. http://www.3glteinfo.com/lte-advanced-heterogeneous-networks/ 13. http://www.2cm.com.tw/technologyshow_content.asp?sn=0912230018
14. De La Roche, G., Valcarce, A., López-Pérez, D., & Zhang, J. “Access control mechanisms for femtocells”. IEEE Communications
243-246
Magazine, 2010.
15. Slamnik, N., Okic, A., & Musovic, J. “Conceptual radio resource management approach in LTE heterogeneous networks using small cells
number variation”. In Telecommunications (BIHTEL), XI International Symposium, pp. 1-5, IEEE, 2016. 16. Seidel, E., & Saad, E. (2010). LTE Home Node Bs and its enhancements in Release 9. Nomor Research, 1-5.
46.
Authors: K. Himaja, K. S. Ramesh, S.Koteswara Rao
Paper Title: Analysis of Seismic Signal using Maximum Entropy Method
Abstract: Seismogenic disturbances are unpredictable hard knocks and are inevitable in nature. Earthquakes
are one of the major seismic disturbances that are generated due to the sudden movement of the tectonic plates
resulting in great loss to humanity. During the earthquake, abnormal energy is suddenly emanated into the earth’s
lithosphere thereby generating the seismic waves. Seismic signals thus generated travel through the earth layers
and are highly combined with locally generated noise. The noise thus associated with seismic signals can be
eliminated using FIR based band pass filter. In this paper an attempt is made to apply Maximum Entropy Method
for deriving the frequency components of the seismic signals, for which the power spectrum of the seismic signals
is analyzed.
Keywords: Adaptive signal processing, Applied statistics, Maximum Entropy Method, Seismology, Stochastic
Signal Processing.
References: 1. Monson H. Hayes, “Statistical Digital Signal Processing and Modeling”, John Wiley & Sons, INC, New York, 1976. 2. Dr. N. Purnachandra Rao, “Earthquakes” Andhra Pradesh Akademi of Sciences (APAS) publishers.
3. Donelan. M, A. Babanin, E. Sanina, D. Chalikov, “A Comparison Of Methods For Estimating Directional Spectra Of Surface Waves”,
2015. 4. Wail A. Mousa , Abdullatif A. Al-Shuhail, “Processing of Seisemic Reflection data using Matlab”, Synthesis Lectures On Signal
Processing., Morgon & Claypool Publishers.
5. Sverre holm, “Spectral Moment Matching- A Rational For Maximum Entropy Analysis”, Elsevier, pp.479-482, 1983. 6. Miguel A. Lagunas-Hernandez, M. Eugenia Santamaria-Perez, Anibal R. Figueiras-vidal, “ARMA Model Maximum Entropy Power
Spectral Estimation”, IEEE Transactions on Acoustics, Speech, And Signal Processing, Vol. ASSP-32, No. 5, pp.984-990,Oct.1984.
7. L.H. Feng and G.Y. Luo “Maximum Entropy Method And Seismic Frequency – Magnitude Relation”, Department of Geography, Zhejiang Normal University, Jinhua 321004, China 2008.
8. Edwin T.Janes, “On the Rationale of Max-Ent Method”, Proceedings of The IEEE, Vol.70, No.9, pp.939-952, Sep.1982.
9. Sverre holm and Jens M. Hovem, “Estimation of Scalar Ocean Wave Spectra by Maximum Entropy Method”, IEEE journal on Oceanic Engineering, Vol. OE-4, No.3, pp.76-83, Jul.1979.
10. B.V.K. Vijaya Kumar & S.K. Mullick “Power Spectrum Estimation Using Maximum Entropy Method”, IETE Journal of Research 2015.
11. Abdussalam Addeeb, Abdulmagid Omar and Charles Slivinsky, “Maximum Entropy Method for Estimating Seismic Wave Amplitude”, IEEE, pp.1041-1046, 1989.
12. Petre Stoica and Randolph Moses, “Spectral Analysis Of Signals”, Prentice Hall, Inc, 2005. 13. G. Manolakis and Vinay k. Ingle, “Statistical And Adaptive Signal Processing” McGraw-Hill, 2000.
14. Sverre Holm, “Spectral Moment Matching in the Maximum Entropy Spectral Analysis Method”, IEEE transactions on information
theory, vol. it-29, no. 2, march 1983. 15. S. J. Johnsen And N. Andersen, “On Power Estimation In Maximum Entropy Spectral Analysis”, Geophysics, Vol. 13. No. 4, June 1978.
16. B.V.K. Vijaya Kumar & S.K. Mullick, “Power Spectrum Estimation Using Maximum Entropy Method”, IETE Journal of Research.
17. S. Haykin and S. Kc&r, “Prediction-error filtering and maximum entropy spectral estimation,” in Nonlinear Methods of Spectral Analysis, S.Haykin, Ed. New York: Springer-Verlag, 1979, pp. 9-72.
18. Abies (J G), “Notes on Maximum Entropy Spectral Analysis”.Astron Astrophys, Suppl. 15, 1974.
19. Akaike (H). “Power Spectrum Estimation through Autoregressive Model Fitting”. Ann. Inst. Star. Math. 21, 3; 1969; 407-419. 20. S.F. Gull and J. Skilling, “Maximum entropy method in image processing” IEEE Proceedings, Vol. 131, Pt. F, No. 6, OCTOBER 1984.
247-251
47.
Authors: Umit Isikdag
Paper Title: An Evaluation of Barriers to E-Procurement in Turkish Construction Industry
Abstract: What: E-procurement provides chances for enhancing the traditional procurement approaches of the
construction industry. Both suppliers and buyers in the supply chain utilize e-procurement methods as these help in
the processes through providing opportunities for better communication and coordination. E-procurement expands
the marketplace for all parties, which take part in the process. With e-procurement, the buyer gains the strategic
advantage of i.) reaching more and more suppliers and ii.) the products of lower cost, while the supplier gets the
advantage of reaching new customers in the online markets. In contrast to the globalization of procurement in
many of the production sectors, research indicates that the advancement of e-procurement in the construction
industry is slow and mostly occurs at the national level. This current situation is mainly caused by the barriers to e-
procurement that appear from both supplier and buyer sides. How: This paper explores the barriers to e-
procurement in relation to the Construction Industry based on the data gathered from Turkey. The study involves
an extensive literature review and a web-based questionnaire survey and interviews to determine the key barriers to
e-procurement in the construction industry. 64 stakeholders including engineers, architects from the public and
private organizations (such as contractors, sub-contractors), and the providers of e-procurement services in Turkey
participated in the study. Why: The findings indicated that the construction business organizations still seem to
have not benefited from most values of e-procurement. The results of the study indicated the lack of trust between
the parties and inadequacy of legal infrastructure as the most critical barriers. Another key barrier appears as the
fear of unauthorized access to the critical project information. Efforts towards enhancing the security such as
implementation of blockchain technologies and development of the legal infrastructure supporting these
technologies can a key step towards overcoming key barriers to e-procurement.
Keywords: Construction, e-Procurement, e-Commerce, Turkey, Barriers
252-259
References: 1. European Commission “ICT Uptake, Working Group 1. ICT Uptake Working Group draft Outline Report”, October. Retrieved March
2008 from http://ec.europa.eu/enterprise/ict/policy/taskforce/wg/wg1_report.pdf.
2. BERR “Supporting Innovation in Services, Department for Business”, Enterprise and Regulatory Reform, Crown copyright, URN 08/1126.
3. Eadie R, Perera S, Heaney G. “A cross-discipline comparison of rankings for e-procurement drivers and barriers within UK construction
organizations”, Journal of Information Technology in Construction (ITcon), 15, 217-233. 4. Martin J. “E-Tendering about time too”, RICS paper http://www.rics.org/site/scripts/download_info.aspx?downloadID=254&fileID=264
5. McIntosh, G., Sloan, B. “The potential impact of electronic procurement and global sourcing within the UK construction industry.” In
proceedings of the 17th ARCOM Annual Conference, 5-7. 6. Love, P.E.D., Irani, Z., Li,H., Cheng, E.W.L., Tse, R.Y.C. "An empirical analysis of the barriers to implementing e-commerce in small-
medium sized construction contractors in the state of Victoria, Australia", Construction Innovation: Information, Process, Management,
1, 31 – 41.
7. Kong, C.W., Li, H., Love, P.E.D. "An e‐commerce system for construction material procurement", Construction Innovation, 1(1), 43-54
8. Tserng H.P., Lin P.H. “An accelerated subcontracting and procuring model for construction projects”, Automation in Construction,
11(1), 105–125.
9. Chao, L., Hua, G.B. “Process modelling of E-procurement in the Singapore construction industry”, In the Proceedings of Distributing Knowledge In Building, Arhus, Denmark.,2002
10. Li, H., Kong, C., Pang, Y., Shi, W., and Yu, L. "Internet-Based Geographical Information Systems System for E-Commerce Application
in Construction Material Procurement." J. Constr. Eng. Manage., 10.1061/(ASCE)0733-9364 129:6(689), 689-697. 11. Wamelink, H., Teunissen, W. “E-Business in the construction industry: a search for practical applications using the Internet”.
International Association for Automation and Robotics in Construction. available at http://www.iaarc.org/publications/fulltext/isarc2003-
93.pdf, 543-547. 12. Dzeng, R.-J., Lin, Y.-C., “Intelligent agents for supporting construction procurement negotiation”, Expert Systems with
Applications,(27), 107–119.
13. Kong, S.C.W., Li, Heng, Liang., Y. Hung, T. Anumba, C., Chen,Z. “Web services enhanced interoperable construction products catalogue”, Automation in Construction, 14(3) , 343-352
14. Hadikusumo, B., Petchpong, S., & Charoenngam, C. “Construction material procurement using Internet-based agent system.”
Automation in Construction, 14(6), 736-749. 15. Luu, D.T., Ng, S.T., Chen, S.E., Jefferies, M. "A strategy for evaluating a fuzzy case-based construction procurement selection system",
Advances in Engineering Software, 37(3), 159-171.
16. Stephenson, P., Chia, P. P. “E-Procurement: An Assessment of UK Practice In. Construction”, In proceedings of the CCIM2006 Sustainable Development through Culture and Innovation, Dubai, UAE, 592-601.
17. Perera, S., Eadie, R., Heaney, G., Carlisle, J. “Methodology for Developing a Model for the Analysis of E-Procurement Capability
Maturity of Construction Organisations”, In proceedings of the Joint International Conference on Construction Culture, Innovation, and Management (CCIM), British University in Dubai, 634-644
18. Eadie R., Perera S., Heaney G., Carlisle J. “Drivers and Barriers To Public Sector E-Procurement Within Northern Ireland’s
Construction Industry”, Journal of Information Technology in Construction, Journal of Information Technology in Construction (ITcon), 12, 103-120.
19. Vitkauskaitė, E., Gatautis, R. “E-Procurement perspectives in construction sector SMEs”, Journal of Civil Engineering and Management,
14(4), 287–294. 20. Alarcón, L.F., Muturana, S., Schonherr, I. “Benefits of Using E-Marketplace in Construction Companies: A Case Study”, in:
Construction Supply Chain Management Handbook, London: CRC Press, Taylor & Francis Group, 17.1 – 17.19.
21. Eadie, R., Perera, S., Heaney, G. “Identification of e-procurement drivers and barriers for UK construction organisations and ranking of these from the perspective of quantity surveyors”, Journal of Information Technology in Construction (ITcon), 15, 23-43.
22. Hashim N., Said I., Idris N. H. “Exploring e-Procurement value for construction companies in Malaysia”, Procedia Technology, Vol. 9,
2013, pp. 836−845. 23. Ibem E. O., Laryea S. “e-Procurement use in the South African construction industry”, Journal of Information Technology in
Construction, Vol. 20, 2015, pp. 364−384.
24. Aduwo E. B., Ibem E. O., Tunji-Olayeni P., Uwakonye O. U., Ayo-Vaughan E. K. “Barriers to the uptake of e-Procurement in the Nigerian building industry”, International Journal of Applied Theoretical and Applied Information Technology, Vol. 89, No. 1, 2016, pp.
133−147.
48.
Authors: T. Charan Singh, K. Raghu Ram, B.V. Sanker Ram
Paper Title: Transient Stability Analysis of Six Phase Transmission System with Integration of WPGS and
STATCOM with Smart Grid
Abstract: In recent times Transient stability analysis has become a major concern in the operation of power
systems due to the rising stress on power system networks. These difficulties require assessment of a power
system’s ability to with stand instability while maintaining the excellence of service. Many different techniques
have been projected for transient stability analysis in power systems, especially for a multi machine system. This
paper describes simulation of six phase multi-machine power system (MMPS) with wind power generator
integration in dynamic operation. By the introduction of wind power generation system (WPGS) in multi-machine
at weak bus in parallel with STATCOM can improve the generator load angle deviation during fault condition. The
MMPS performance is analysed by placing six phase line between different buses. The replacement of
transmission line can reduces the line impedances, which results in reduced angle distortion of machines and
improved stability .The proposed WPGS based MMPS phase angle and frequency variations are analyzed during
symmetrical and asymmetrical fault conditions. The MATLAB/Simulation software is used to test the behavior of
proposed system.
Keywords: Wind system, six phase transmission line, STATCOM, multi-machine system, stability.
References: 1. D. Basic, J. G. Zhu, and G. Boardman, “Transient performance study of a brushless doubly fed twin stator induction generator,” IEEE
Trans. energy Convers., vol. 18, no. 3, pp. 400–408, 2003.
2. G. K. Singh, “Modeling and experimental analysis of a self-excited six-phase induction generator for stand-alone renewable energy generation,” Renew. energy, vol. 33, no. 7, pp. 1605–1621, 2008.
3. J. R. Stewart and D. D. Wilson, “High phase order transmission--a feasibility analysis part I--steady state considerations,” IEEE Trans.
Power Appar. Syst., no. 6, pp. 2300–2307, 1978. 4. T. L. Landers, R. J. Richeda, E. Krizanskas, J. R. Stewart, and R. A. Brown, “High phase order economics: constructing a new
transmission line,” IEEE Trans. Power Deliv., vol. 13, no. 4, pp. 1521–1526, 1998.
260-266
5. J. M. Arroyo and A. J. Conejo, “Optimal response of a power generator to energy, AGC, and reserve pool-based markets,” IEEE Trans.
Power Syst., vol. 17, no. 2, pp. 404–410, 2002.
6. J. R. Stewart, E. Kallaur, and I. S. Grant, “Economics of EHV high phase order transmission,” IEEE Trans. power Appar. Syst., no. 11, pp. 3386–3392, 1984.
7. N. G. Hingorani, L. Gyugyi, and M. El-Hawary, Understanding FACTS: concepts and technology of flexible AC transmission systems,
vol. 1. IEEE press New York, 2000.
8. G. Cai, Q. Sun, C. Liu, P. Li, and D. Yang, “A new control strategy to improve voltage stability of the power system containing large-
scale wind power plants,” in Electric Utility Deregulation and Restructuring and Power Technologies (DRPT), 2011 4th International
Conference on, 2011, pp. 1276–1281. 9. L. Wang and C.-T. Hsiung, “Dynamic stability improvement of an integrated grid-connected offshore wind farm and marine-current farm
using a STATCOM,” IEEE Trans. power Syst., vol. 26, no. 2, pp. 690–698, 2011.
10. S. S. Venkata, W. C. Guyker, W. H. Booth, J. Kondragunta, N. K. Saini, and E. K. Stanek, “138-kV, six-phase transmission system: fault analysis,” IEEE Trans. Power Appar. Syst., no. 5, pp. 1203–1218, 1982.
11. A. P. Apostolov and R. G. Raffensperger, “Relay protection operation for faults on NYSEG’s six-phase transmission line,” IEEE Trans.
Power Deliv., vol. 11, no. 1, pp. 191–196, 1996. 12. N. B. Bhatt, S. S. Venkata, W. C. Guyker, and W. H. Booth, “Six-phase (multi-phase) power transmission systems: fault analysis,” IEEE
Trans. Power Appar. Syst., vol. 96, no. 3, pp. 758–767, 1977.
13. R. J. Vidmar, “On the use of atmospheric plasmas as electromagnetic reflectors,” IEEE Trans. Plasma Sci, vol. 21, no. 3, pp. 876–880, 1992.
49.
Authors: K Durga Prasad, D Vasumathi
Paper Title: Privacy Preserving Data Analysis using Decision Tree learning Algorithm through Additive
Homomorphic Encryption
Abstract: Privacy preserving is an emerging concern in the field of data mining. The Randomization technique
protects privacy with loss of accuracy. The secure multi-party computation increases the accuracy and conserves
privacy but the computational complexity is more. The encryption of data using cryptography makes the data
secure without loss of accuracy and reduces the communication complexity. The proposed technique is privacy
preserving decision tree algorithm using cryptographic approach. The data miner collects frequencies and
combined frequencies from the users and learns the classification rules from the decision tree. The data miner
learns only frequencies of the sensitive data. The experimental result shows that proposed privacy preserving
decision tree algorithm is computationally efficient and the accuracy is more than the randomization models. The
communication complexity is less compared with the secure multi-party computation models.
Keywords: Cryptographic encryption, Data Analysis, Decision Tree and Privacy Preserving.
References: 1. Evfimievski A, “Randomization in privacy-preserving Data mining”. ACM Sigkdd Explorations Newsletter, vol.4, no. 2, pp43-48, 2002.
2. Oded Goldreich, “Secure Multi-Party Computation” 2002 with reference to better exposition provided in Chapter 7 of (Volume 2 of)
Foundations of Cryptography. ISBN 0-521-83084-2, Published in the US in May 2004. 3. Lindell Y & Pinkas B, “Secure multiparty computation for privacy-preserving data mining”, Journal of Privacy and Confidentiality, vol.
1, no.1, pp.5 – 27,2009
4. Krishnamurty Muralidhar & Rathindra Sarathy, “Data Shuffling –A New Masking Approach for Numerical Data Management science”, 2006, Sci.52,658-670. DOI=http://dx.doi.org/10.1287/mnsc.1050.0503.
5. Kargupta H, Datta H, et. al. “On the privacy preserving properties of random data perturbation techniques”, 2003, In The Third IEEE
International Conference on Data Mining. 6. A. C. Yao, "Protocols for secure computations" 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)(FOCS), vol.
00, no. , pp. 160-164, 1982. doi:10.1109/SFCS.1982.88
7. B Pinkas, ”Cryptographic techniques for privacy-preserving data mining” ACM SIGKDD, Volume 4 Issue 2, Pages 12-19, doi - 10.1145/772862.772865,2002.
8. Vaidya J & Clifton C ”Privacy preserving naive Bayes classifier on vertically partitioned data”, SIAM International Conference on Data
Mining,2004. 9. Craig Gentry, “Fully homomorphic encryption using ideal lattices” In Proceedings of the forty-first annual ACM symposium on Theory
of computing. ACM, New York, NY, USA, 169-178. DOI: https://doi.org/10.1145/1536414.1536440, 2009.
10. Zhiqiang Yang & Sheng Zhong et al “Privacy-Preserving Classification of User Data without Loss of Accuracy”, PG - 92-102, Proceedings of the 2005 SIAM International Conference on Data Mining, 2005,doi - 10.1137/1.9781611972757.9.
11. Agarwal R & Srikant R, “Privacy preserving data mining” In Proc. of ACM SIGMOD Conference on Management of Data, ACM Press,
pages 439-450,2000. 12. Du W & Zhan Z, “Using randomized response techniques for privacy-preserving data mining”, In Proc.of the Ninth ACM SIGKDD
International Conference on Knowledge Discovery and Data Mining pages 505-510. ACM Press., 2003,doi>10.1145/956750.956810.
13. Zhan J “Using Homomorphic Encryption For Privacy-Preserving Collaborative Decision Tree Classification”, IEEE Symposium on Computational Intelligence and Data Mining, 2007.
14. Chen Tingting & Zhong Sheng, “Privacy-preserving backpropagation neural network learning”, IEEE Transactions, 20(10):1554–1564,
DOI: 10.1109/TNN.2009.2026902,2009. 15. Louis J M Aslett & Esperanca M, et al “A review of homomorphic encryption and software tools for encrypted statistical machine
learning”, arXiv:1508.06574, 2015b. , 2015.
16. Kaleli C & Polat H “Privacy-Preserving Naïve Bayesian Classifier–Based Recommendations on Distributed Data”, Computational Intelligent,Vol. 31, 2015.
17. Huai Mengdi, Huang Liusheng, et al “Privacy Preserving Naive Bayes Classification” In Proc. of International Conference Knowledge
Science, Engineering and Management, Volume 9403, pages 627-638, 2015. 18. Agarwal D, and Agarwal C “On the design and quantification of privacy preserving data mining algorithms” In Proc. of the 20th ACM
SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, ACM Press, pages 247-255,
2001,doi>10.1145/375551.375602. 19. Kantarcioglu M & Vaidya J “Architecture for privacy-preserving mining of client information”, In IEEE ICDM Workshop on Privacy,
Security and Data Mining, pages 37-42, 2002.
20. Rebecca Wright and Zhiqiang Yang “Privacy-preserving Bayesian network structure computation on distributed heterogeneous data”, In Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining (KDD'04),ACM,NewYork,
NY, USA,713-718,2014, DOI=http://dx.doi.org/10.1145/1014052.1014145. 21. Durga Prasad k, et al “Privacy-preserving Data Analysis over Naive Bayesian Classifier for Continuous and Discrete Data”(accepted
paper), 2018.
22. Archer, D. W., Bogdanov, D., Lindell, Y., Kamm, L., Nielsen, K., Pagter, J. I., Wright, R. N. “ From Keys to Databases—Real-World Applications of Secure Multi-Party Computation.” The Computer Journal. doi:10.1093/comjnl/bxy090,2018.
267-272
23. Lindell, Yehuda & Pinkas, Benny.. “Secure Multiparty Computation for Privacy-Preserving Data Mining.” IACR Cryptology ePrint
Archive. 2008. 197. 10.29012/jpc.v1i1.566., 2008.
24. Orlandi, C. “Is multiparty computation any good in practice?” 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). doi:10.1109/icassp.2011.5947691,2011.
50.
Authors: Karanam Deepak.
Paper Title: Design and Analysis of High Speed and Low Power Reversible Vedic Multiplier Incorporating with
QSDN Adder
Abstract: This present work deals with a reversible Vedic type multiplier using the earliest Urdhva
Tiryagbhyam sutras of Vedic type mathematics combine with the QSD adder (Quaternary Signed digit number
adder). There are three activities be intrinsic into duplication halfway items age, fractional items decrease and
expansion. Quick snake design in this way enormously upgrades the speed of the general procedure. A pass on free
math errand be able to be cultivated use a top radix number formation, for instance, QSD adder. In QSD, each one
number can be address by a digit as of - 3 to 3. Pass on complimentary development as well as distinctive exercises
on incalculable, for instance, 64, 128, or more can be executed with consistent deferment and less multifaceted
nature. The proposed multiplier configuration is contrasted and a reversible Vedic multiplier consolidates a QSD
Quaternary Signed digit number adder viper among a transformation section for quaternary to paired change. The
proposition demonstrates a most extreme speed enhancement.
Keywords: Arithmetic Multiplier, Quaternary Signed Digit adder [QSD], UrdhvaTiryagbhyam, Vedic type
Mathematics, Carry free addition, QSD, Redundancy.
References: 1. S. TahmasbiOskuii, P. G. Kjeldsberg, and O. Gustafsson, “Transition activity aware design of reduction-stages for parallel multipliers,” in
Proc. 17th Great Lakes Symp.On VLSI, March 2007, pp. 120–125. 2. M. Perkowski, P. Kerntopf, A. Buller, M. Chrzanowska-Jeske, A. Mishchenko, X. Song,A. Al-Rabadi, L. Jozwiak, A. Coppola and B.
Massey, “Regular realization of symmetric functions using reversible logic”, in Proceedings of EUROMICRO Symposium on Digital
Systems Design (Euro-Micro’01),Warsaw, Poland, pp. 245–252, September 2001 3. Ayman A. Fayed, Magdy A. Bayoumi, "A Novel Architecture for Low Power Design of Parallel type of Multipliers," wvlsi, pp.0149,
IEEE Computer Society Workshop on VLSI 2001.
4. C.-Y. Han, H.-J.Park, and L.-S. Kim. A low-power array multiplier using separated multiplication technique. IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing. vol.48, pp. 866- 871 (2001)
5. S. Shah, A. Al-Khalili, and D. Al-Khalili. Comparison of 32-bit multipliers for various performance measures. Proceedings of the 12th
IEEE International Conference on Microelectronics, (2000) 6. K. Thakre, S. S. Chiwande and S. D. Chafale, "Design of low power multiplier using reversible logic gate," 2014 International
Conference on Green Computing Communication and Electrical Engineering (ICGCCEE), Coimbatore, 2014, pp. 1-6.
7. M.Anitha, A.Rajani, N.Pushpalatha, “Optimized multiplier using reversible logic gates: a vedic Mathematical approach”, (IJARCET) Volume 3 Issue 10, October 2014.
8. Gowthami P, RVS Satyanarayana, “Design of Digital Adder Using Reversible Logic”, IJERA, Vol. 6, Issue 2, (Part - 1), pp.53-57,
February 2016.
273-279
51.
Authors: S.P. Sundar Singh Sivam, Ganesh Babu Loganathan, K. Saravanan
Paper Title: Impact of Point Angle on Drill Product Quality and Other Responses When Drilling EN- 8: A Case
Study of Ranking Algorithm
Abstract: In the present work Drilling parameters has been advanced for EN-8 combination steel utilizing
GRA (Grey Relational Examination). The parameters advanced are axle speed (SS - 3000, 3500 and 4000 rpm),
feed rate (FR - 0.18, 0.20 and 0.22 mm/rev) and cemented Carbide twist drill of 14.5 mm width with Three flutes
point angle (PA - 118,127 and 1350) And Lubrications Used Dry, Wet and Air on bases of surface harshness, Hole
distance across, Thrust Force and Burr Size precision reactions. It is performed with the assistance of established
carbide contort drills. On the bases of GRA alongside recognizable proof, huge commitment of parameters has
been completed by utilizing ANOVA. Out of three factors considered point edge has huge impact on reactions as
contrast with other parameters.
Keywords: Drilling, Lubrications, Ranking Algorithm
References: 1. Davim Paulo J., Conceic C.A.¸ & Antonio (2000). Optimal drilling of particulate metal matrix composites based on experimental and
numerical procedures, International Journal of Machine Tools & Manufacture, Vol.41,pp. 21–31. a. TosunNihat (2005). Determination of optimum parameters for multi-performance characteristics in drilling by using grey relational
analysis, Int J Adv Manuf Technol, Vol.28, pp. 450–455.
2. S.P. Sundar Singh Sivam et al.,. “Orbital cold forming technology - combining high quality forming with cost effectiveness - A review”. Indian Journal of Science and Technology. Vol 9(38), October 2016, DOI: 10.17485/ijst/2016/v9i38/91426.
3. Sutherland, J. W., Kulur, V. N., King, N. C., 2000, An Experimental Investigation of Air Quality in Wet and Dry Turning, Annals of the
CIRP, 49/1: 61-64. 4. S.P.Sundar Singh Sivam et al., “Frequently used Anisotropic Yield Criteria for Sheet Metal Applications: A Review”, Indian Journal of
Science and Technology. Indian Journal of Science and Technology. Volume 9, Issue 47, December 2016. DOI:
10.17485/ijst/2015/v8i1/92107. 5. Daniel, C. M., Olson, W. W., Sutherland, J. W., 1997, Research Advances In Dry and Semi-dry Machining, SAE Technical Paper No.
970415 and SAE Transactions, Journal of Materials and Manufacturing, 106: 373-383.
6. S.P. Sundar Singh Sivam et al.,,An Experimental Investigation And Optimisation Of Ecological Machining Parameters On Aluminium 6063 In Its Annealed And Unannealed Form, Journal Of Chemical And Pharmaceutical Sciences. Page No Page (46 – 53), 2015.
7. König, W., 1999, Fertigungsverfahren I – Drehen, Fräsen, Bohren, Springer-Verlag, BerlinHeidelberg.
8. S.P.Sundar Singh Sivam et al., “Frequently used Anisotropic Yield Criteria for Sheet Metal Applications: A Review”, Indian Journal of Science and Technology. Indian Journal of Science and Technology. Volume 9, Issue 47, December 2016. DOI:
10.17485/ijst/2015/v8i1/92107. 9. P. Sundar Singh Sivam, et al., (2018). Comparison of Manufacturing Data Analysis For 5 & 3-Axis Vertical Machining Center for the
Time and Tool Benefits of Industries. International Journal of Engineering & Technology, 7(4.5), 196-201.
280-282
doi:http://dx.doi.org/10.14419/ijet.v7i4.5.20044.
10. P. Sundar Singh Sivam et al.,. (2018). Development of Vibrator Feeding Mechanism Using Two Sets of Rollers for the Separation of
Ball Grading For Industry Benefits. International Journal of Engineering & Technology, 7(4.5), 202-206. doi:http://dx.doi.org/10.14419/ijet.v7i4.5.20045
11. S.P. Sundar Singh Sivam et al., “Investigation exploration outcome of Heat Treatment on Corrosion Resistance of AA 5083 in Marine
Application”. International Journal of Chemical Sciences (ISSN 0972-768 X). Page No Page (15 – 22), 2015.
12. SIVAM, S. P. Sundar Singh et al.”Multi Response Optimization of Setting Input Variables for Getting Better Product Quality in
Machining of Magnesium AM60 by Grey Relation Analysis and ANOVA." Periodica Polytechnica Mechanical Engineering, [S.l.],
2017. ISSN 1587-379X. https://doi.org/10.3311/PPme.11034. 13. S.P. Sundar Singh Sivam et al.,.” Analysis of residual stresses, thermal stresses, cutting forces and other output responses of face milling
operation on ze41 magnesium alloy." International Journal of Modern Manufacturing Technologies, Pp. No 92-100. ISSN 2067–3604,
Vol. X, No. 1 / 2018. 14. Sivam, S. P. S. S., et al., “The Grey Relational Analysis and Anova to Determine the Optimum Process Parameters for Friction Stir
Welding of Ti and Mg Alloys”, Periodica Polytechnica Mechanical Engineering. doi: https://doi.org/10.3311/PPme.12117.
15. S. P. S. S. Sivam et al.,"Competitive study of engineering change process management in manufacturing industry using product life cycle management — A case study," 2017 International Conference on Inventive Computing and Informatics (ICICI), Coimbatore, 2017,
pp. 76-81. doi: 10.1109/ICICI.2017.8365247
16. S. P. Sundar Singh Sivam et al., (2019) A study of cooling time, copper reduction and effects of alloying elements on the microstructure and mechanical properties of SG iron casting during machining, Australian Journal of Mechanical Engineering, DOI:
10.1080/14484846.2018.1560679
17. S.P. Sundar Singh Sivam et al., (2018) "THICKNESS DISTRIBUTION AND NUMERICAL MODELLING OF CONVENTIONAL SUPERPLASTIC FORMING IN AA2024 ALLOY", International Journal of Modern Manufacturing Technologies, ISSN 2067–
3604,76,85, Vol. X, No. 2 / 2018
52.
Authors: Venkata Ramana N, Chandra Sekhar Kolli, Ravi Kumar T, P Nagesh
Paper Title: Hybrid K-Mir Algorithm to Predict Type of Lung Cancer Among Stoicism
Abstract: Health care is the maintenance of health via the prevention, diagnosis, and treatment of disease. The
disease that persists over a long period of time is known as Chronic Disease. Chronic diseases may create
additional activity restrictions. Common chronic conditions include lung disease, heart stroke, cancer, obesity, and
diabetes. Chronic diseases usually show no symptoms and hence not diagnosed in advance. Hence it is necessary
to predict the patient-specific chronic diseases in early stage for effective prevention. Machine learning being the
vital component of Data Analytics that facilitates the medical domain for malignancy predictions. Patients
suffering from misdiagnosed and undiagnosed chronic diseases can be easily recognized with the help of these
hospital systems. These systems enable the doctors to take precautionary measures and thereby minimizing the
chances of a patient being affected. A new hybrid K-MLR framework using K-means and Multiple Linear
Regression has been proposed for diagnosing the type of lung cancer among the patients. As most of the real
datasets are high-dimensional, this hybrid framework uses K-Means clustering algorithm that eliminates the noise
from the image based dataset at the initial stage. Afterward to reduce the dimensionality it detects the features of
nodules in 3D lung CT scans and partitions the data to form the clusters. Finally it reads the new patient data with
malignant nodules to predict the type of associated cancer based on the intensity of the nodule features extracted
from each CT scan report using Multiple Linear Regression Analysis. Clustering prior to classification makes the
hybrid approach beneficial.
Keywords: Lung cancer, pulmonary nodules, CT scan, Prediction, K-means, and Regression
References: 1. Rubin, G. D. (2015). Lung nodule and cancer detection in CT screening. Journal of thoracic imaging, 30(2), 130.
2. Wang H, Guo XH, Jia ZW, Li HK, Liang ZG, Li KC, He Q. Multilevel binomial logistic prediction model for malignant pulmonary nodules based on texture features of CT image. Eur J Radiol 2010;74:124-9.
3. Gibbs P, Turnbull LW. Textural analysis of contrast-enhanced MR images of the breast. Magn Reson Med 2003;50:92-8.
4. Cavouras D, Prassopoulos P, Pantelidis N. Image analysis methods for solitary pulmonary nodule characterization by computed tomography. Eur J Radiol 1992;14:169-72.
5. McNitt-Gray MF, Wyckoff N, Sayre JW, Goldin JG, Aberle DR. The effects of co-occurrence matrix based texture parameters on the
classification of solitary pulmonary nodules imaged on computed tomography. Comput Med Imaging Graph 1999;23:339-48. 6. Dujardin M, Gibbs P, Turnbull LW. Texture analysis of 3T high resolution T2 weighted images in ovarian cystadenoma versus borderline
tumor. Proc Intl Soc Magn Reson Med 2014;22:2218. Available
online: http://cds.ismrm.org/protected/14MPresentations/abstracts/2218.pdf 7. Chae HD, Park CM, Park SJ, Lee SM, Kim KG, Goo JM. Computerized texture analysis of persistent part-solid ground-glass nodules:
differentiation of preinvasive lesions from invasive pulmonary adenocarcinomas. Radiology 2014;273:285-93.
8. Ganeshan B, Abaleke S, Young RC, Chatwin CR, Miles KA. Texture analysis of non-small cell lung cancer on unenhanced computed tomography: initial evidence for a relationship with tumour glucose metabolism and stage. Cancer Imaging 2010;10:137-43.
9. Ganeshan B, Goh V, Mandeville HC, Ng QS, Hoskin PJ, Miles KA. Non-small cell lung cancer: histopathologic correlates for texture parameters at CT. Radiology 2013;266:326-36.
10. V.Krishnaiah “Diagnosis of Lung Cancer Prediction System Using Data Mining Classification Techniques” International Journal of
Computer Science and Information Technologies, Vol. 4 (1), 39 – 45 www.ijcsit.Com ISSN: 0975-9646, 2013. 11. Zakaria Suliman zubi “Improves Treatment Programs of Lung Cancer using Data Mining Techniques” Journal of Software Engineering
and Applications, 7, 69-77, February 2014.
12. K. Balachandran “Classifiers based Approach for PreDiagnosis of Lung Cancer Disease” International Journal of Computer Applications® (IJCA) (0975 – 8887), proceedings on National Conference on Emerging Trends in Information & Communication Technology (NCETICT
2013).
13. Anam Tariq, M. Usman Akram and M. Younus Javed, “Lung Nodule Detection in CT Images using Neuro Fuzzy Classifier”, Fourth International Workshop on Computational Intelligence in Medical Imaging (CIMI), pp:49-53, 2013.
14. Ada R. Wolfsen, William D. Odell, ProACTH: Use for early detection of lung cancer, The American Journal of Medicine, Volume 66,
Issue 5, Pages 765–772, May 1979. 15. Dechang Chen “Developing Prognostic Systems of Cancer Patients by Ensemble Clustering” Hindawi publishing corporation, Journal of
Biomedicine and Biotechnology Volume, Article Id 632786, 2009.
16. Vesal, S., Ravikumar, N., Ellman, S., & Maier, A. (2018). Comparative Analysis of Unsupervised Algorithms for Breast MRI Lesion Segmentation. In Bildverarbeitung für die Medizin 2018 (pp. 257-262). Springer Vieweg, Berlin, Heidelberg.
283-287
17. Gao, X., Chu, C., Li, Y., Lu, P., Wang, W., Liu, W., & Yu, L. (2015). The method and efficacy of support vector machine classifiers based
on texture features and multi-resolution histogram from 18F-FDG PET-CT images for the evaluation of mediastinal lymph nodes in
patients with lung cancer. European journal of radiology, 84(2), 312-317. 18. Soni Lanka., Madhavi M. R., Abusahmin, B.S., Puvvada, N., Lakshminarayana, V., (2017), "Predictive data mining techniques for
management of high dimensional big-data". Journal of Industrial Pollution Control vol 33, pp 1430-1436.
19. Venkata Ramana N , Seravana Kumar P. V. M , Puvvada Nagesh .” Analytic architecture to overcome real time traffic control as an
intelligent transportation system using big data”. International Journal of Engineering & Technology, 7 (2.18) (2018) 7-11
20. N. VenkataRamana , Puvvada Nagesh , Seravana Kumar P. V. M , U Vignesh “IoT Based Scientific design to conquer constant movement
control as a canny transportation framework utilizing huge information available in Cloud Networks ”. Jour of Adv Research in Dynamical & Control Systems, Vol. 10, 07-Special Issue, 2018
21. Venkata Ramana N., Nagesh P., Lanka S., Karri R.R. (2019), "Big Data Analytics and IoT Gadgets for Tech Savvy Cities". In: Omar S.,
Haji Suhaili W., Phon-Amnuaisuk S. (eds) Computational Intelligence in Information Systems. CIIS 2018. Advances in Intelligent Systems and Computing, vol 888. pp 131-144, Springer Nature.
22. U. Vignesh, Sivakumar, N. Venkata Ramana “Survey and implementation on classification algorithms with approach on the environment”.
International Journal of Engineering & Technology, 7 (2.33) (2018) 438-440 23. Soni Lanka., Madhavi M. R., Abusahmin, B.S., Puvvada, N., Lakshminarayana, V., (2017), "Predictive data mining techniques for
management of high dimensional big-data". Journal of Industrial Pollution Control vol 33, pp 1430-1436.
53.
Authors: Sanjeev Kumar Gupta, R. C. Mehta, Piyush Singhal
Paper Title: Experimental Evaluation and Empirical Formulation of Hydraulic Jump Characteristics in Sloping
Prismatic Channel
Abstract: Hydraulic jump is frequently used for dissipation excess energy downstream of hydraulic structure.
This abundance energy, whenever left unchecked, will have unfavorable impact on the banks and downstream of
the channel bed. In this paper hydraulic jump characteristics are experimentally evaluated and empirical
correlations for depth ratio and relative height are produced in sloping channel by adopting the impact of both
strategy Froude number and approaching Reynolds number and neglecting the frictional effect. The developed
empirical correlations are validated using Gandhi (2014) data. The present correlation of jump characteristics gives
better agreement with experimental data and can be used for preliminary design.
Keywords: hydraulic jump, Froude number, Reynolds number, energy dissipation etc
References: 1. W. H. Hager, “Energy Dissipators and Hydraulic Jump”, Kluwer Academic Publishers, London, 1992.
2. E.A. Elevatorski, “Hydraulic Energy Dissipator” McGraw Hill, New York, 1959.
3. W. H. Hager, and R. Bremen, “Classical hydraulic jump: Sequent depths”, J. Hydraul. Res., 27(5), 1989, pp. 565–585. 4. B. A.Bakhmeteff, and A. E Matzke, "The Hydraulic Jump in Terms of Dynamic Similarity, Transactions, ASCE, Vol. 101, Paper No.
1935, 1936, pp. 630-680.
5. J. N. Bradley, and A. J Peterka,"The hydraulic design of stilling basins," Journal of Hydr. Div., ASCE, 82(5), 1957, paper 1401. 6. V. T. Chow, “Open-Channel Hydraulics” McGraw Hill, New York, 1959.
7. R. Silvester,. Hydraulic Jump in All Shape of Horizontal Channels, J. Hydraulic Division 90(1), 1964, pp:23–55.
8. N. Rajaratnam and K. Subramanya, “Profile of Hydraulic Jump”, Journal of Hydraulic Division, ASCE, Vol.94, No.3, 1968, pp. 663 – 673.
9. K. Herbrand, ”The Spatial Hydraulic Jump”, Journal of Hydraulic Research, Vol.11, No.3, 1973, pp. 205 – 218.
10. I. Ohtsu and Y. Yasuda, “Characteristics of Supercritical Flow below Sluice Gate”, Journal of Hydraulic Engineering, ASCE, Vol.120, No.3, 1994, pp. 332 – 346
11. 11. H. Chanson and T. Brattberg, “Experimental Study of the Air-Water Shear Flow in a Hydraulic Jump”, Department of Civil
Engineering, the University of Queensland, Brisbane, Australia. International Journal of Multiphase Flow, Vol 26, No 4, 2000, pp.583-607.
12. Noor Afzal and A. Bushra,” Structure of Turbulent Hydraulic Jump in a Trapezoidal Channel”, Journal of Hydraulic Research, Vol – 40,
No – 2, 2002, pp. 168-174. 13. S. Kucukali, H.Chanson, “Turbulence measurements in the bubbly flow region of hydraulic jumps”, Experimental Thermal and Fluid
Science Vol. 33, 2008, pp. 41–53.
14. M. Naseri and F. Othman, “Determination of the length of hydraulic jumps using artificial neural networks”, Advances in Engineering Software, Vol. 48, 2012, pp 27–31.
15. Gupta SK, Mehta RC, Dwivedi VK. Modeling of relative length and relative energy loss of free hydraulic jump in horizontal prismatic
channel. Procedia Engineering. 2013 Jan 1; 51:529-37. 16. Gupta SK, Mehta RC, Dwivedi VK. Modeling of relative length and relative energy loss of hydraulic jump in sloping prismatic channels
for environmental hazards control. 2nd Intern. InConf. on Climate Change & Sustainable Management of Natural Resources, CP–77
2010 Dec (pp. 05-07).
17. N. Y. Saad and E. M. Fattouh, Hydraulic characteristics of flow over weir with circular openings, Ain Shams Engineering Journal,
Volume 8, Issue 4, 2016, pp 515-522.
18. S. Gandhi, “Characteristics of Hydraulic Jump”, International Journal of Mathematical, Computational, Physical, Electrical and Computer Engineering Vol:8, No:4, 2014, pp. 693-697.
288-292
54.
Authors: J Sirisha Devi, Siva Prasad Nandyala
Paper Title: Electroencephalography and Physiological Signals for Emotion Analysis
Abstract: A novel method for Electroencephalography (EEG) based emotion analysis using Gray Level Co-
occurrence Matrix1 (GLCM) features contrast, correlation, energy, and homogeneity has been discussed with
peripheral physiological signals. Emotions are classified using Linear Discriminant Analysis (LDA) and obtained
an accuracy of 93.8. The proposed novel method discussed the effect of distances, and direction on GLCM features
for different emotions. This paper concluded that GLCM features are an effective measure to discriminate the
emotions and give significant knowledge for each emotion. The proposed novel methodology can be used as a tool
for emotion analysis and it can also be useful for observing brain lobe variation globally.
Keywords: Electroencephalography, Gray Level Co-occurrence Matrix1, physiological signals, Linear
Discriminant Analysis
293-297
References: 1. Moataz El Ayadi, Mohamed S Kamel, and Fakhri Karray. Survey on speech emotion recognition: Features, classification schemes, and
databases. Pattern Recognition, 44(3):572–587, 2011.
2. Ira Cohen, Ashutosh Garg, Thomas S Huang, et al. “Emotion recognition from facial expressions using multilevel HMM”, in Neural information processing systems, volume 2. Citeseer, 2000.
3. Yedatore V Venkatesh, Ashraf A Kassim, Jun Yuan, and Tan Dat Nguyen on, “The simultaneous recognition of identity and expression
from bu-3dfe datasets” Pattern recognition letters, 33(13):1785–1793, 2012 4. Bert Arnrich, Cornelia Setz, Roberto La Marca, Gerhard Tr¨oster, and Ulrike Ehlert. What does your chair know about your stress level?
IEEE Transactions on Information Technology in Biomedicine, 14(2):207–214, 2010.
5. Wanhui Wen, Guangyuan Liu, Nanpu Cheng, Jie Wei, Pengchao Shangguan, and Wenjin Huang. Emotion recognition based on multi-variant correlation of physiological signals. IEEE Transactions on Affective Computing, 5(2):126–140, 2014.
6. M Tuceryan and AK Jain. Texture analysis. the handbook of pattern recognition and computer vision, river edge, 1998.
7. Sander Koelstra, Christian Muhl, Mohammad Soleymani, Jong-Seok Lee, Ashkan Yazdani, Touradj Ebrahimi, Thierry Pun, Anton Nijholt, and Ioannis Patras. Deap: A database for emotion analysis; using physiological signals. IEEE Transactions on Affective
Computing, 3(1):18–31, 2012.
8. James A Russell. A circumplex model of affect. Journal of Personality and Social Psychology, 39(6):1161–1178, 1980. 9. Thea Andersen, Gintare Anisimovaite, Anders Christiansen, Mohamed Hussein, Carol Lund, Thomas Nielsen, Eoin Rafferty, Niels C
Nilsson, Rolf Nordahl, and Stefania Serafin. A preliminary study of users’ experiences of meditation in virtual reality. In Virtual Reality
(VR), 2017 IEEE, pages 343–344. IEEE, 2017 10. Zeynab Mohammadi, Javad Frounchi, and Mahmood Amiri. Wavelet-based emotion recognition system using EEG signal. Neural
Computing and Applications, 28(8):1985–1990, 2017.
11. N Murali Krishna, J Sirisha Devi, Y Srinivas. A Novel Approach for Effective Emotion Recognition Using Double Truncated Gaussian Mixture Model and EEG.I.J. Intelligent Systems and Applications, 2017
12. N Murali Krishna, J Sirisha Devi, N Siva Prasad. Emotion Recognition Using Skew Gaussian Mixture Model for Brain–Computer
Interaction. Soft Computing in Data Analytics, Advances in Intelligent Systems and Computing, 2019
55.
Authors: P.Sakthi Shunmuga Sundaram, N.Hari Basker, L.Natrayan
Paper Title: Smart Clothes with Bio-Sensors for ECG Monitoring
Abstract: Aging society leads to more demands on health care system. The study shows that cardiovascular
diseases are the most common and threatening diseases to the elderly. Moreover, more and more elderly live alone
recently. Therefore, a total solution for elderly home care leads the way. In this study, we develop smart clothes to
record three lead electrocardiography (ECG). Our system consists of (1) the conductive fiber clothes with four
electrodes to acquire physiological signals, (2) a gateway to digitize, process and upload raw data to the server, and
(3) the service server to analyze data and make a health profile. The system had been applied to the elderly
community to evaluate performance. The experiment results show the average accuracy of ECG data is 86.82%.
Thirty-five volunteers (age > 65, 15 male and 20 female) feel the smart clothes comfortable and easy to use than
the traditional medical device.
Keywords: Smart Wearable Device; Smart Clothes; Long-Term Care; Electrocardiography; Bio-Sensor
References: 1. Anonymous, “Trends in aging–united states and worldwide,” MMWR Morb Mortal Wkly, vol. 52, no. 6, pp. 101–104, 2003. 2. L. Natrayan and M. Senthil Kumar. Study on Squeeze Casting of Aluminum Matrix Composites-A Review. Advanced
Manufacturing and Materials Science. Springer, Cham, 2018. 75-83. (https://doi.org/10.1007/978-3-319-76276-0_8.)
3. M. Senthil Kumar et. al, Experimental investigations on mechanical and microstructural properties of Al2O3/SiC reinforced hybrid metal matrix composite, IOP Conference Series: Materials Science and Engineering, Volume 402, Number 1, PP 012123.
(https://doi.org/10.1088/1757-899X/402/1/012123)
4. C. C. Lin, M. J. Chiu, C. C. Hsiao, R. G. Lee, and Y. S. Tsai, “A wireless healthcare service system for elderly with Dementia,” IEEE Trans. Inf. Technol. Biomed., vol. 10, no. 4, pp. 696–704, 2006.
5. L.Natrayan et al. Optimization of squeeze cast process parameters on mechanical properties of Al2O3/SiC reinforced hybrid metal
matrix composites using taguchi technique. Mater. Res. Express; 5: 066516. (DOI: 10.1088/2053-1591/aac873,2018) 6. S.Yogeshwaran, R.Prabhu, Natrayan.L, Mechanical Properties Of Leaf Ashes Reinforced Aluminum Alloy Metal Matrix
Composites, International Journal of Applied Engineering Research ISSN 0973-4562 Volume 10, Number 13, 2015.
7. S. Sneha and U. Varshney, “A wireless ECG monitoring system for pervasive healthcare,” Int. J. Electron. Healthcare, vol. 3, no. 1, pp. 32–50, 2007.
8. J. Muhlsteff, O. Such, R. Schmidt, M. Perkuhn, H. Reiter, J. Lauter, J. Thijs, G. Musch, and M. Harris, “Wearable approach for
continuous ECG–and activity patient-monitoring,” in the Proceedings of the 26th Annu. Int. Conf.EMBC. 2004, pp. 2184–2187. 9. L.Natrayan et al. An experimental investigation on mechanical behaviour of SiCp reinforced Al 6061 MMC using squeeze casting
process. Inter J Mech Prod Engi Res Develop., 7(6):663–668, 2017.
10. T. Pawar, N. S. Anantakrishnan, S. Chaudhuri and S. P. Duttagupta, “Impact analysis of body movement in ambulatory ECG,” in the Proceedings of the Engineering in Medicine and Biology Society. 2007, pp. 5453-5456.
11. M. S. Santhosh, R. Sasikumar, L. Natrayan, M. Senthil Kumar, V. Elango and M. Vanmathi. (2018). Investigation of mechanical
and electrical properties of kevlar/E-glass and basalt/E-glass reinforced hybrid Composites. . Inter J Mech Prod Engi Res Develop., 8(3): 591-598.
298-301
56.
Authors: D. Lavanya, N.Thirupathi Rao, Debnath Bhattacharyya, Tai-Hoon Kim
Paper Title: Generalized Detection of Colloid Cyst in Brain using MRI Scan/CT Scan
Abstract: Brain is one of the most important organs in the human body. The working of this organ decides the
human being work and his life to success. In order to lead the good life, one should have the brain and its related
parts under good condition, i.e., not affected with any diseases or any serious problems. The presence of cyst in the
brain is one of the important issues to be considered and identification of such cyst in good time is very important
for the health of a human being. If the cyst is not identified in appropriate times, the brain will be suffered with
serious issues and it may lead to the loss of the human being. Hence, in this article a new approach is taken to
consideration for identification of the cyst in the brain through MRI/CT scan images. In the current work, a new
approach of matrix method with the combination of monochrome images was considered for identification of the
cyst presence with MRI/CT scan images. A new algorithm was also proposed to find the presence of cyst in the
302-306
brain with more accurate performance. The performance of the current model was verified with two sets of scan
images and the results are displayed in the result section.
Keywords: Neuroepithelial Cyst, Magnetic Resonance Images (MRI), Computed Tomography (CT), Fixed
Threshold Method.
References: 1. Q. Javed and A. Dutta, “Third Ventricular Colloid Cyst and Organic Hypomania”, Progress in Neurology and Psychiatry, (2014), pp.18.
2. http://www.medicalnewstoday.com/articles/181727.php[Accessed 17.06.2018].
3. http://www.abta.org/secure/resource-one-sheets/cysts.pdf[Accessed 18.06.2018]. 4. K. Sheikh, V. Sutar and S. Thigale, “Clustering based Segmentation Approach to Detect Brain Tumor from MRI Scan”, International
Journal of Computer Applications (0975 – 8887), vol. 118, no. 8, (2015), pp.36-39.
5. E. E. Mohd, A. Muhd, M. Mohd, H. Z. Z. Htike and S. L. Win, “Brain Tumor Convergence and Services (IJITCS), vol. 4, no. 1, (2014), pp.1-11.
6. V. D. Dharmale and P. A. Tijare, “Segmentation and Canny Edge Method in MRI Brain Cyst Detection”, International Journal of
Advanced Computer Research, vol. 3, no. 4, (2013), pp.289-293. 7. L. P. Bhaiya, S. Goswami and V. Pali, “Classification of MRI Brain Images using NeuroFuzzy Model”, International Journal of
Engineering Inventions, Vol. 1, no. 4, (2012), pp.27-31.
8. M. Tariq, A. Khawajah and M. Hussain, “Image Processing with the specific focus on early tumor detection”, International Journal of Machine Learning and Computing, vol. 3, no. 5, (2013), pp. 404- 407.
9. C. Mamourian, L. D. Cromwell and R. E. Harbaugh, “Colloid Cyst of third Ventricle: Sometimes More Conspicuous on CT than MR”,
AJNR Am J Neuroradiol, (1998), pp.875-878.[Accessed 02.07.2018]. 10. https://www.researchgate.net/publication/286816381_A_Comparative_Analysis_on_Edge
11. detection_ofColloid_Cyst_A_Medical_Imaging_Approach [Accessed 03.07.2018]. 12. http://www.ncbi.nlm.nih.gov/pmc/articles/PMC1550234/[Accessed 03.07.2018].
13. https://en.wikipedia.org/wiki/Image_noise#Low_and_high-ISO_noise_examples [Accessed 05.07.2018].
14. http://mstrzel.eletel.p.lodz.pl/mstrzel/pattern_rec/filtering.pdf[Accessed 06.07.2018]. 15. http://www.mecs-press.org/ijisa/ijisa-v5-n11/IJISA-V5-N11-3.pdf[Accessed 07.07.2018].
16. V. Kshirsagar and J. Panchal, “Segmentation of Brain Tumor and Its Area Calculation”, International Journal of Advanced Research in
Computer Science and Software Engineering, vol. 4, no. 5, (2014), pp. 528-529. 17. https://en.wikipedia.org/wiki/Cyst[Accessed 16.07.2018].
18. Debapriya Hazra, Debnath Bhattacharyya, Hye-Jin Kim, “Detection of Colloid Cyst in Brain through Image Processing Techniques”,
International Journal of Multimedia and Ubiquitous Engineering, Vol.11, No.9 (2016), Pp.343-354.
57.
Authors: Nagi Reddy. B, A. Pandian, O. Chandra Sekhar, M. Ramamoorty
Paper Title: Performance and Dynamic Analysis of Single Switch AC-DC Buck-Boost Buck Converter
Abstract: Dynamic analysis of proposed single switch ac-dc buck-boost buck converter is presented in this
paper. The proposed converter is an integrated converter contains two inductors, one is at input side and other one
is at output side. To achieve unity power factor at input terminals, the input inductor is designed for discontinuous
mode (DCM). This condition will eliminate extra control technique for power factor correction (PFC). The output
side inductor is operated in DCM to reduce the bus capacitor voltage, thereby reducing the capacitance size. A PI
controller is designed to regulate the pulses for the converter. The proposed converter is designed in MATLAB
software for 60V output voltage. The analysis has been done for three different cases (variable frequency, variable
input and variable load) to verify the converter performance.
Keywords: Single switch, ac-dc converter, buck-boost, power factor correction (PFC), dynamic analysis.
References: 1. M. Brkovic and S. Cuk, “Novel single stage ac-to-dc converters with magnetic amplifiers and high power factor,” in Proc. IEEE Appl.
Power Electron. Conf., 1995, pp. 447–453. 2. Nagi Reddy. B, O. Chandra Sekhar, M. Ramamoorty, “Analysis and implementation of single-stage buck-boost buck converter for
battery charging applications”; Journal of Advanced Research in Dynamical and Control Systems (JARDCS), Vol. 10, No. 4, April 2018,
pp 462-475. 3. M. T. Madigan, R.W. Erickson, and E. H. Ismail, “Integrated high quality rectifier-regulators,” IEEE Trans. Ind. Electron., vol. 46, no. 4,
pp. 749–758, Aug. 1999.
4. R. Redl, L. Balogh, and N. O. Sokal, “A new family of single stage isolated power factor correctors with fast regulation of the output voltage,” in Proc. IEEE Power Electron. Spec. Conf., 1994, pp. 1137–1144.
5. M. M. Jovanovic, D. M. Tsang, and F. C. Lee, “Reduction of voltage stress in integrated high quality rectifier regulators by variable
frequency control,” in Proc. IEEE Appl. Power Electron. Conf., 1994, pp. 569–575. 6. M. J. Willers, M. G. Egan, J. M. D. Murphy, and S. Daly, “A BIFRED converter with a wide load range,” in Proc. IEEE Int. Conf. IECON,
1994,
7. pp. 226–231. 8. Nagi Reddy. B, A. Pandian, O. Chandra Sekhar, M. Rammoorty, “Design of Non-isolated integrated type AC-DC converter with extended
voltage gain and high power factor for Class-C&D applications”. International Journal of Recent Technology and Engineering (IJRTE),
Vol. 7, No. 5, Jan 2019, pp 230-236. 9. Nagi Reddy. B, O. Chandra Sekhar, M. Ramamoorty, “Implementation of zero-current switch turn-ON based buck-boost buck type rectifier
for low power applications”. International Journal of electronics – Taylor & Francis publication (Accepted for publication).
307-313
58.
Authors: Richa Gupta, Radhika Goel
Paper Title: A Necessary and Sufficient Condition for the Existence of Asymmetrical Reversible VLCs
Abstract: Affix-free codes are widely used in multimedia communications because of its error tolerance
capbility. Reversible Variable Length Code (RVLC) is a type of affix-free code. In literature, there are many
construction algorithms available for RVLCs. But unlike Variable Length Codes (VLCs), RVLCs lack in the area
of its mathematical development in the form of lower bound or upper bound on average codeword length, bounds
on existence, and related Theorems. Only few mathematicians have done some work on this. In 2014, Richa and
Radhika have proposed and discussed the necessary and sufficient condition on the number of codewords for a
314-317
particular (bit length vector) required for the existence of symmetrical RVLCs. This paper is an extension of the
earlier published paper on the similar ground, but for asymmetrical RVLCs. This paper derives and discusses
necessary and sufficient condition, on bit length vector (the number of codewords for a particular length), required
for the existence of asymmetrical RVLCs over the given D-ary code alphabet.
Keywords: Affix-free codes, Symmetrical RVLC, asymmetrical RVLCs, mathematical bound on RVLC, bit
length vector, Kraft inequality.
References: 1. D. Huffman, “A method for the Construction of Minimum Redundancy Codes”, Proceedings of IRE, 40, 1962, pp. 1098-1101.
2. ISO/IEC JTC1/SC29/WG11/N3908, “MPEG-4 video verification model,” Vers. 18.0, Jan. 2001. 3. ITU-T Recommendation H.263, “Video coding for low bit rate communication,” Annex D, Feb. 1998.
4. H. Wang, S. N. Koh, and W.W. Chang, “Application of reversible variable-length codes in robust speech coding,” IEEE Proc. Commun.,
vol. 152, no. 3, June 2005, pp. 272-276. 5. Y. Takishima, M. Wada, and H. Murakami, “Reversible variable length codes,” IEEE Trans. Commun., vol. 43, Feb.-Apr. 1995, pp.
158–162.
6. C. W. Tsai and J. L. Wu, "Modified symmetrical reversible variable-length code and its theoretical bounds," IEEE Trans. Inform. Theory, vol. 47, Sept. 2001, pp. 2543-2548.
7. W. H. Jeong and Y. S. Ho, “Design of Symmetrical Reversible Variable Length Codes from the Huffman Code,” Picture Coding
Symposium, 2003, pp. 135-138. 8. R.Goel and R. Gupta. "Redesigning of the Construction of Symmetrical RVLCS Based On Graph Model.", International Journal of
Information & Computation Technology, vol. 4, no. 11, 2014, pp. 1063-1068.
9. H. J. Yan, C. Y. Lin, L. Zhong , “On constructing symmetrical reversible variable-length codes independent of the Huffman code, ’’The National Key Laboratory on Integrated Service Networks, Xidian University, Xi’an 710071, China, accepted Feb. 22, 2006.
10. S. Golomb, “Run Length Encodings,” IEEE Transactions on Information Theory, vol. 12, no. 3, 1966, pp. 399-401. 11. Abedini, S. P. Khatri, and S. A. Savari, “A SAT-based scheme to determine optimal fix-free codes,” Proc. of the 2010 IEEE Data
Compression Conference, Snowbird, Utah, March 2010, pp. 169-178.
12. S. M. Hossein, T. Yazdi and S. A. Savari, “On the Relationships among Optimal Symmetric Fix-Free Codes,” IEEE Data Compression Conference, 2013, pp. 391-400.
13. A. Savari, “On optimal reversible-variable-length codes,” Proc. Information Theory and Applications Workshop, La Jolla, CA, February
10, 2009, pp. 311-317. 14. K. Sayood, Introduction to data compression, New Delhi: Elsevier, 2011.
15. L.G. Kraft, A device for quantizing, grouping and coding amplitude modulated pulses, Master’s thesis, Dept. of Electrical Engineering,
M.I.T., Cambridge, Mass., 1949. 16. Goel, R., and Gupta, R. Necessary and sufficient condition for the existence of symmetrical Reversible Variable Length Codes, based on
Kraft's inequality. In IEEE Conference publication Recent Advances and Innovations in Engineering (ICRAIE), May, 2014, pp. 1-3.
59.
Authors: R A Veer, L C Siddanna Gowd
Paper Title: A Novel Classification Approach for MIMO-OFDM
Abstract: The expanding unpredictability of designing cellular networks recommends that machine learning
(ML) can successfully enhance 5G advances. Machine learning has proven successful a performance that scales
with the measure of accessible data. The absence of vast datasets restrains the twist of machine learning
applications in remote interchanges. The transmission state is thought to be a component of the highlights of a
channel situation like the obstruction and noise, the relative motion between the transmitter and the receiver and
this capacity is acquired by the machine learning strategy. The preparation dataset is produced by recreations on
the channel condition. The Jrip, J48 and Naïve Bayes are the three algorithms implemented in this research work.
This research work test if machine learning methods can predict the transmission states with a high accuracy
compared to conventional approaches.
Keywords: Machine Learning, Jrip, MIMO, J48, OFDM, CRC and Naïve Bayes.
References:
1. Omri and R. Bouallegue, New Transmission Scheme for MIMO-OFDM System, International Journal of Next-Generation Networks (IJNGN) Vol.3, No.1, March 2011.
2. Sumitra N. Motade,; Anju V. Kulkarni. Channel Estimation and Data Detection Using Machine Learning for MIMO 5G Communication
Systems in Fading Channel, Technologies, 2018, 6, 72.
3. https://pdfs.semanticscholar.org/d091/af5c2f1e693b5a66ccb76f93956c3199f152.pdf
4. Seppo Hämäläinen, Peter Slanina, Magnus Hartman, Antti Lappeteläinen, Harri Holma, and Oscar Salonaho. A novel interface between
link and system level simulations. In Proceedings of the ACTS Mobile Telecommunications Summit, volume 97, pages599–604, 1997. 5. Joseph Mitola. Cognitive radio—an integrated agent architecture for software definedradio. 2000.
6. Charles Clancy, Joe Hecker, Erich Stuntebeck, and Tim O’Shea. Applications of machine learning to cognitive radio networks. IEEE
Wireless Communications, 14(4), 2007. 7. Tobias Gruber, Sebastian Cammerer, Jakob Hoydis, and Stephan ten Brink. On deep Learning-based channel decoding. arXiv preprint
arXiv:1701.07738, 2017.
8. Emre Telatar. Capacity of multi-antenna gaussian channels. European transactions on telecommunications, 10(6):585–595, 1999. 9. Gerard J Foschini. Layered space-time architecture for wireless communication in a fading environment when using multi-element
antennas. Bell labs technical journal, 1 (2):41–59, 1996.
10. Vahid Tarokh, Hamid Jafarkhani, and A Robert Calderbank. Space-time block codes from orthogonal designs. IEEE Transactions on information theory, 45(5):1456–1467, 1999.
318-320
60.
Authors: Ramjeevan Singh Thakur
Paper Title: Associative Analysis among Attribute of ILPD Medical Datasets Using ARM
Abstract: Early detection of liver disease plays a major role in efficient diagnosis the disease. It significantly
increases the chance of effective treatment. The liver is one of the largest organs in the human body. It plays an
important role in digestion, as detoxifying chemicals in the digestion process. A dreadful fact of liver disease is
that, the liver maintains a normal functionality even after partially damage. The major challenge in liver disease is
321-328
to find the hidden patterns of liver disorder. The proposed approach analysis the patterns on the selected features
using association rule mining (ARM) technique. The performance of the proposed approach is tested on the well-
renowned ILPD dataset from the UCI repository. ILPD dataset consists of different clinical examination
parameter like total bilirubin, direct bilirubin, SGPT, SGOT, alkphos, total protein, albumin etc. The proposed
approach selected the essential features from ILPD and ARM is applied to find the association among attributes to
detect pattern.
Keywords: Indian Liver Patient Datasets, Association rule mining, Liver Disorder, Associative Analysis.
References: 1. Ben-Cohen, E. Klang, A. Kerpel, E. Konen, M. M. Amitai, and H. Greenspan, "Fully convolutional network and sparsity-based dictionary
learning for liver lesion detection in CT examinations," Neurocomputing, vol. 275, pp. 1585-1594, 2018.
2. R.-H. Lin and C.-L. Chuang, "A hybrid diagnosis model for determining the types of the liver disease," Computers in Biology and
Medicine, vol. 40, no. 7, pp. 665-670, 2010. 3. M. Frid-Adar, I. Diamant, E. Klang, M. Amitai, J. Goldberger, and H. Greenspan, "GAN-based Synthetic Medical Image Augmentation
for increased CNN Performance in Liver Lesion Classification," arXiv preprint arXiv:1803.01229, 2018.
4. Z. Janikow, "Fuzzy decision trees: issues and methods," IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), vol. 28, no. 1, pp. 1-14, 1998.
5. T. R. Baitharu and S. K. Pani, "Analysis of Data Mining Techniques for Healthcare Decision Support System Using Liver Disorder
6. Dataset," Procedia Computer Science, vol. 85, pp. 862-870, 2016. 7. Y. Kumar and G. Sahoo, "Prediction of different types of liver diseases using rule based classification model," Technology and Health
Care, vol. 21, no. 5, pp. 417-432, 2013.
8. S. Dhamodharan, "Liver disease prediction using bayesian classification," in 4th National Conference on Advanced Computing, Applications & Technologies, 2014, pp. 1-3.
9. N. Nahar and F. Ara, "Liver disease prediction by using different Decision Tree techniques," International Journal of Data Mining &
Knowledge Management Process (IJDKP), vol. 8, no. 2, 2018. 10. P. Rajeswari and G. S. Reena, "Analysis of liver disorder using data mining algorithm," Global journal of computer science and
technology, vol. 10, no. 14, pp. 48-52, 2010.
11. Pathan, D. Mhaske, S. Jadhav, R. Bhondave, and K. Rajeswari, "Comparative Study of Different Classification Algorithms on ILPD Dataset to Predict Liver Disorder.", IJRASET, vol. 06, pp. 388-394, 2018P.
12. Thangaraju and R. Mehala, "Performance Analysis of PSO-KStar Classifier over Liver Diseases," International Journal of Advanced
Research in Computer Engineering, vol. 04, no. 07, pp. 3132-3137, 2015. 13. R. Agrawal and R. Srikant, "Fast algorithms for mining association rules in large databases, In Proc. of the 20th VLDB Conference, 1994,
pp. 487-499.
14. R. Srikant and R. Agrawal, "Mining generalized association rules," Future generation computer systems 13, no. 2-3, pp.161-180, 1997. 15. R. Srikant, "Fast algorithms for mining association rules and sequential patterns," PhD diss., University of Wisconsin, Madison, 1996.
16. R. V. Priya, A. Vadivel, and R. Thakur, "Frequent pattern mining using modified CP-tree for knowledge discovery," in International
Conference on Advanced Data Mining and Applications, 2010, pp. 254-261: Springer. 17. Sabnis, N. Khare, R. Thakur, and K. Pardasani, "Karnaugh Map Model for Mining Association Relationships in Web Content Data:
Hypertext," Data Mining and Knowledge Engineering, vol. 4, no. 11, pp. 579-587, 2012.
18. V. Tiwari and R. S. Thakur, "P²MS: a phase-wise pattern management system for pattern warehouse," International Journal of Data
Mining, Modelling and Management, vol. 7, no. 4, pp. 331-350, 2015.
19. V. Tiwari and R. S. Thakur, "Towards important issues of pattern retrieval: pattern warehouse," International Journal of Data Science,
vol. 2, no. 1, pp. 1-14, 2017. 20. V. Tiwari and R. Thakur, "A Level Wise Tree Based Approach for Ontology-Driven Association Rules Mining," Data Mining and
Knowledge Engineering, vol. 4, no. 5, pp. 252-259, 2012.
21. S. Rajput, R. S. Thakur, and G. S. Thakur, "An Integrated Approach and Framework for Document Clustering Using Graph Based Association Rule Mining," in Proceedings of the Second International Conference on Soft Computing for Problem Solving (SocProS
2012), December 28-30, 2012, pp. 1421-1437: Springer. 22. J. Han, J. Pei, and M. Kamber, Data mining: concepts and techniques. Elsevier, 2011.
23. ILPD Dataset: https://archive.ics.uci.edu/ml/datasets/ILPD+(Indian+Liver+Patient+Dataset).
61.
Authors: Kulkarni Rashmi Manik, S Arulselvi, B Karthik
Paper Title: Designing Network Interface Component for Peripheral IP cores in Networks-on-chip
Abstract: The Network-Interface-Componant (NIC) is required for IP cores for interconnecting IPs to Routers
in NoC. In implementation of NoC, Interface Component is very crucial for adapting IPs in NoC. NIC as a
software component occupies processor’s considerable execution time. Processor can be relieved from this
overload by introducing separate hardware as NIC. A hierarchical topology for NoC is considered in this research
article. In hierarchical topology, each router can connect to eight nodes (IP) of same hierarchy and to a router in
next hierarchy. Each node is connected to router port with NIC. The fixed address based routing is implemented in
the NOC. The network packet switching based transactions among various nodes is assumed. The implementation
of NIC design with options for different IPs (considering existing bus based interfaces) is attempted in this work.
Keywords: NoC, NIC, IPs, PE, ASIC and NS/CS.
References: 1. Brahim Attia, Abdelkrim Zitouni, Kholdoun Torki and Rached Tourki “A Low Latency and Power ASIC Design of ModularNetwork
Interfaces for Network on Chip”, IJCSES International Journal of Computer Sciences and Engineering Systems, Vol. 5, No. 4, October
2011. 2. Masoud Daneshtalab, Masoumeh Ebrahimi, Juha Plosila, Hannu Tenhunen, “CARS: Congestion-Aware Request Scheduler forNetwork
Interfaces in NoC-based Manycore Systems”.
3. Wang Jian, Yang Zhijia,“Design of network adapter compatible OCP for high-throughput NOC”, Applied Mechanics and Materials Vols. 313-314 pp 1341-1346, Trans Tech Publications, Switzerland, 25 March 2013.
4. Azad Fakhari, “Designing Customizable Network-on-Chip withsupport for Embedded Private Memory for Multi-Processor System-on-
Chips”, Thesesand Dissertations,University of Arkansas, Fayetteville, May 2014
5. Masoumeh Ebrahimi, Masoud Daneshtalab, N P Sreejesh, Pasi Liljeberg, Hannu Tenhunen, “Efficient Network Interface Architecture
forNetwork-on-Chips”, Department of Information Technology, University of Turku, Turku, Finland.
6. Leandro Fiorin, Mariagiovanna Sami, “Fault-Tolerant NetworkInterfaces for Networks-on-Chip”, IEEE Transactionson Dependableand
329-336
Secure Computing, VOL. 11, NO. 1, Jan/Feb 2014.
7. Tung Nguyeny, Duy-Hieu Buiy, Hai-Phong Phany, Trong-Trinh Dangand Xuan-Tu Trany, “High-Performance Adaption of ARM
Processorsinto Network-on-Chip Architectures”, ySIS Laboratory, VNU University of Engineering and Technology,Cau Giay, Hanoi, Vietnam.
8. Rachid Dafali, Jean-Philippe Diguetand Jean-Charles Creput “Self-Adaptive Network-on-Chip Interface”, Submittedto IEEE Embedded
Systemsletters, Vol. X, No. X, Month Year.
9. Ahmed H.M. Soliman, E.M. Saad, M. El-Bablyand Hesham M. A. M. Keshk, “Designing a WISHBONE Protocol Network Adapter for
an Asynchronous Network-on-Chip”,IJCS (International Journal of Computer Science), Issues, Vol. 8, Issue 4, No 2, University of
Helwan, Cairo, Egypt 11795, Helwan, July 2011. 10. Vijaykumar R Urkude1, Dr. P. Sudhakara Rao, “Low Power 2-D Mesh Network-on-Chip Router using Clock Gating Techniques”,IOSR
Journal of VLSI and Signal Processing (IOSR-JVSP) Volume 6, Issue 6, Ver. I, PP 85-91,Nov -Dec 2016.
11. Alexandros Daglis, Stanko Novakovi´c, Edouard Bugnion, Babak Falsafi, Boris Groty,”Manycore Network Interfaces for In-Memory Rack-Scale Computing” In Proceedings of the 42nd International Symposium on Computer Architecture (ISCA 2015), EcoCloud, EPFL
yUniversity of Edinburgh
12. Marcelo Ruaro, Felipe B. Lazzarotto, César A. Marcon, Fernando G. Moraes “DMNI: A Specialized Network Interface for NoCbasedMPSoCs” PUCRS University, Computer Science Department, Porto Alegre, Brazil
13. Ruxandra Pop and Shashi Kumar, “A Survey of Techniques forMapping andScheduling Applications toNetwork on Chip Systems”, ISSN
1404 – 0018, Research Report 04:4, Embedded Systems Group, Department of Electronics and Computer Engineering, School of Engineering, Jönköping University, Jönköping, SWEDEN
14. Brahim Attia,Abdelkrim Zitouni and Rached Tourki, “Design andimplementation of network interfacecompatible OCP For packet based
NOC”, International Conference on Design & Technology of Integrated Systems in Nanoscale Era, Faculty of Sciences of Monastir, Laboratory of Electronic and Micro-Electronic (LAB-IT06), Monastir, 5019, Tunisia, 2010.
15. Sujay Gejji & Tripti Kulkarni, “DesignofreconfigurableandmodularNOCinterfacewithadvancednetworking functionalities”,Department of
E&C, PESIT,IRD India Bangalore, Karnataka. 16. Jens Spars, “Design of Networks-on-Chip for Real-TimeMulti-ProcessorSystems-on-Chip”, Department of Informatics and Mathematical
ModellingTechnical University of Denmark.
17. Nauman Jalil, Adnan Qureshi, Furqan Khan, and Sohaib Ayyaz Qazi, “Routing Algorithms, Process Model for Quality ofServices (QoS) and Architectures forTwo-Dimensional4 x 4 Mesh Topology Network-on-Chip”, International Journal of Computer Theory and
Engineering, Vol. 4, No. 1, February 2012.
18. Ryuya Okada, Prof. Abderazek Ben Abdallah “Design of Core Network Interface for Distributed Routing in OASISNoC”, ASL - Parallel Architecture Group, 2012.
19. Calin Ciordas, Kees Goossens, Twan Basten, Andrei Radulescu, Andre Boon, “Transaction Monitoring in Networks on Chip:The On-
Chip Run-Time Perspective” 20. Design Methodology for Electronic Systems, Eindhoven University of Technology, Eindhoven, Embedded Systems Architectures on
Silicon, Philips ResearchLaboratories, Prof. Holstlaan 4, NL-5656 AA Eindhoven.
21. Chenxin Zhang & Xiaodong Liu, “A presentation on Network-on-Chip(NoC)” 22. P. Gratz, C. Kim, R. McDonald, S.-W. Keckler, and D. Burger, “Implementation and evaluation of on-chip network architectures”,
Proceedings of the International Conference on Computer Design, pages 477–484, October 2006.
23. Glovanni De Michel, Luca Benini, “Networks on chips”, Morgan Koufmann Publications 24. Masoud Oveis-Gharan, Gul N. Khan, “Statistically adaptive multi FIFO buffer architecture for Netwrok on chip, Microprocessor and
Microsystems 39(2015).
25. Jason Cong, Michael Gill, Yuchen Hao, Glenn Reinman, Bo Yuan, “On chip interconnection network for Accelerator-Rich Architectures”. DAC’15.
26. Wan-Ting Su, Jih-Sheng Shen, Pao-Ann Hsiung, “Network on chip router design with buffer stealing”, 2011 IEEE.
27. Sudeep Pasricha, Nikil Dutt, Fadi J. Kurdahi, “Dynamically Re-configurable On-Chip Communication Architectures for Multi Use-Case Chip Multiprocessor Applications”, 2009 IEEE.
28. Zhonghai Lu, Ming Liu, Axel Jantsch, “Layered Switching for Network On Chips”, DAC 2007.
62.
Authors: G Jahnavi Chowdary , S. Palani Kumar
Paper Title: Advance Control Scheme for Correction of Power Factor and Voltage Stability by Using Electric
Spring
Abstract: A novel smart technology has been introduced in the demand side management which can be used
in real time i.e., electric spring. This electric spring provides voltage, power stability and found to be useful in
maintaining the voltage supply in spite of the fluctuations caused by the intermediate nature of renewable energy
sources and implemented in conjunction with non-critical loads and critical loads like electric heaters,
refrigerators, laptops, building security systems. To get better power factor correction, voltage support, power
balance in loads, using the properties of PLL through single phase d-q transformation scheme is developed. In
order to improve power-factor and voltage stability, fuzzy control scheme is proposed in this paper. By using
Fuzzification control scheme, power factor at loads, voltage stability of the system can be achieved. The
integration of electric spring in sequence to non-critical loads forms a smart load. Thereby alteration of active
power and reactive power is done automatically near non-critical loads. Simulation results are carried out for ES
based on PLL control by using fuzzy logic controller and their results are analyzed.
Keywords: Fuzzification, Electric Spring, Critical loads, Non-critical loads, Voltage stability, Renewable energy
sources, Power quality.
References: 1. M. Parvania and M. Fotuhi - Firuzabad, “Demand response scheduling by stochastic SCUC,” IEEE Trans. Smart Grid, vol.1,no.1, pp.89-
98,2010.
2. “Electric springs- A New Smart Grid Technology,” Shu Yuen (Ron) Hui, Fellow, IEEE, Chi Kwan Lee, Member, IEEE, and Felix F. Wu, Fellow, IEEE.
3. C. K. Lee, K. L. Cheng, and W. M. Ng, “Load characterization of electric spring,” in Proc. 2013 IEEE Energy Convers. Congr. Expo.,
Sep. 2013,pp. 4665–4670. 4. C. K. Lee, S. C. Tan, F. F. Wu, S. Y. R. Hui, and B. Chaudhuri, “Use
of Hooke’s law for stabilizing future smart grid—The electric spring
concept,” in Proc. IEEE Energy Convers. Congr. Expo., Sep. 2013, pp. 5253–5257.
5. C. K. Lee, B. Chaudhuri, and S. Y. Hui, “Hardware and control implementation of electric springs for stabilizing future smart grid with
intermittent renewable energy sources,” IEEE J. Emerg. Sel. Topics Power Electron.,vol. 1, no. 1, pp. 18–27, Mar. 2013. 6. K. T. Mok, S. C. Tan, and S. Y. R. Hui, “Decoupled power angle and voltage control of electric springs,” IEEE Trans. Power Electron.,
337-342
vol. 31,no. 2, pp. 1216–1229, Feb. 2016
7. Q. Wang, M. Cheng, and Z. Chen, “Steady-state analysis of electric springs with a novel delta control,” IEEE trans. Power electron.,
vol.30,no.12, pp.7159-7169,dec 2015. 8. C. K. Lee and S. Y. Hui, “Reduction of energy storage requirements in future smart grid using electric springs,” IEEE Trans. Smart Grid,
vol. 4, no. 3, pp. 1282–1288, Sep. 2013.
9. J. Soni and S. K. Panda, “Electric spring for voltage and power stability and power factor correction,” in Proc. 2015 9th Int. Conf. Power Electron.,Jun. 2015, pp. 2091–2097
10. J. Soni, K. R. Krishnanand, and S. K. Panda, “Load-side demand management in buildings using controlled electric springs,” in Proc.
40th Annu. Conf. IEEE Ind. Electron. Soc., Oct. 2014, pp. 5376–5381. 11. F. Xiao, L. Dong, L. Li, and X. Liao, “A frequency-fixed SOGI based PLL for single-phase grid-connected converters,” IEEE Trans.
Power Electron.,vol. 32,
12. Electric Spring for Voltage and Power Stability and Power Factor Correction Jayantika Soni, Student Member, IEEE, and Sanjib Kumar Panda, Senior Member, IEEE no. 3, pp.
1713–1719, Mar. 2016.
13. S. R. Arya, B. Singh, A. Chandra, and K. Al-Haddad, “Power factor correction and zero voltage regulation in distribution system using DSTATCOM,” in Proc. 2012 IEEE Int. Conf. Power Electron., Drives,Energy Syst., Dec. 2012, pp. 1–6.
63.
Authors: M. Jagannath, C. Madan Mohan, Aswin Kumar, M.A. Aswathy, N. Nathiya
Paper Title: Design and Testing of a Spirometer for Pulmonary Functional Analysis
Abstract: Chronic Obstructive Pulmonary Disease (COPD) is considered as one of the greatest life-threatening
syndromes worldwide, and it is estimated that over 600 million are afflicted with the disease. The objective of this
study is to design and develop a spirometer which is functionally as well as cost effective. Authors have planned to
keep the cost below 100$. The proposed spirometer has four main components – spirometer body, Circuitry,
Computer and Software. The spirometer body includes a differential pressure sensor and a pilot tube through
which the patient blows. The output is transmitted to the microcontroller. The analog to digital convertor within
the microcontroller is employed for the conversion. Then the pressure difference output from the pressure sensor is
converted into mass flow rate which is subsequently converted into volume. The microcontroller relays this data
via a Universal Serial Bus (USB) connection to a computer which transmits this to the JavaScript based graphical
user interface. This interface is used to display the flow and volume data in real-time. Then this experiment has
proceeded further with this study by testing it on people. A spirometric test was conducted on 20 individuals of
different ages, heights and gender. Their test results were tabulated and inferences on their breathing condition
were drawn accordingly. The results show that lung capacity decreases with age. Although the current design is
not able to meet clinical accuracy, with professional manufacturing, such a design could yield a device capable of
meeting clinical accuracy without a significant increase in price.
Keywords: Chronic obstructive pulmonary disease; Microcontroller; Spirometer; Universal Serial Bus.
References: 1. https://www.nih.gov/news-events/news-releases/new-survey-suggests-growing-awareness-copd-nations-fourth-leading-killer Last
accessed on January 2019.
2. Á.A. Cruz, R. Stelmach and E.V. Ponte, “Asthma prevalence and severity in low‐resource communities,” Current Opinion in Allergy
and Clinical Immunology, vol. 17, pp. 188–93, 2017.
3. V. Agarwal and N.C.S. Ramachandran, “Design and development of a low-cost spirometer with an embedded web server,” International Journal of Biomedical Engineering and Technology, vol. 1, no. 4, pp. 439-452, 2008.
4. R.O. Crapo, “Pulmonary Function Testing” in Baum’s Textbook of Pulmonary Diseases, 7th ed., Philadelphia:
Lippincott Williams and Wilkins, 2004.
5. A.D. Gascoigne, P.A. Corris, J.H. Dark and G.J. Gibson, “The biphasic spirogram: a clue to unilateral narrowing of a mainstem bronchus,” Thorax, vol. 45, pp. 637-38, 1990.
6. G.T. Ferguson, P.L. Enright, A.S. Buist and M.W. Higgins, “Office spirometry for lung health assessment in adults,” Chest, vol. 117,
pp. 1146-61, 2000. 7. C.W. Lin, D.H. Wang, H.C. Wang and H.D. Wu, “Prototype development of digital spirometer,” Proc. IEEE conference on
Engineering in Medicine and Biology, vol. 20, no. 4, pp. 1786–1788, 1998.
8. G.P.K. Economou, P.D. Goumas and K. Spiropoulos, “A novel medical decision support system,” IEEE Control and Computing Journal, pp. 177–183, 1993.
9. W.G. Downing Jr., “Electronic measurements of pulmonary mechanics,” WESCON ‘95. Conference Record, November, pp.644–649,
1995.
10. J.L. Hankinson, J.R. Odencrantz and K.B. Fedan, “Spirometric reference values from a sample of the general U.S. population,” The
American Journal of Respiratory and Critical Care Medicine, vol.159, pp. 179–187, 1999.
11. M.R. Miller, J. Hankinson, V. Brusasco, F. Burgos, R. Casaburi, A. Coates et al., “Standardisation of spirometry,” The European Respiratory Journal, vol.26, pp. 319-38, 2005.
12. W. Barud, S. Ostrowski, A. Wojnicz, J.A. Hanzlik, B. Samulak and J.J. Tomaszewski, “Evaluation of lung function in male population from vocational mining schools of the Lublin Coal Basin,” Annales Universitatis Mariae Curie-Sklodowska Mathematica, vol. 46, pp.
39-43, 1991.
13. Y. Tang, M.J. Turner, J.S. Yem and A.B. Baker, “Calibration of pneumotachographs using a calibrated syringe,” The Journal of Applied Physiology, vol. 95, pp. 571-76, 2003.
14. S. Stanojevic, A. Wade and J. Stocks, “Reference values for lung function: past, present and future,” The European Respiratory
Journal, vol. 36, pp. 12–19, 2010. 15. F. Al-Ashkar, R. Mehra and P. J. Mazzone, “Interpreting pulmonary function tests: Recognize the pattern, and the diagnosis will
follow,” Cleveland Clinic Journal of Medicine, vol. 70: 866–881, 2003.
343-347
64.
Authors: I V S Venugopal, D Lalitha Bhaskari, M N Seetaramanath
Paper Title: A Progressive Classification Framework for Detecting SPAM emails and Identification of Authors
Abstract: Emails are the most popular form of communication in the space of cyber communications. In the
recent past, many of the instances were observed, where the mode of communication were shifted to instance
communication methods such as instance messages or video-based services for interaction. Nevertheless, for a
detailed communication, there is no replacement of email communications. A number of surveys have reported
348-359
that the amount of emails exchanged daily ranges between 200 to 250 million every day including the personal,
business or promotional emails. Considering such a massive space for information exchange, it is regardless to
mention that this space becomes the target for information misuses. One of the biggest threat to the email
collaboration is spam emails containing unsolicited information or many of the cases asking for critical
information of the recipients. Most of the email service providers helps the users by incorporating a spam filtering
process to prevent spamming in the email servers. Nonetheless, due to the critical nature of language used in
communication makes the spam detection highly difficult. The fundamental strategies followed by most of the
filters are to detect the spam emails based on specified key words. Regardless to mention, that in different domains
of business or studies, some of the keywords carry different significance and cannot be blacklisted. Also, the
inappropriate detection of the email as spam may lead to severe information loss. A good amount of research
attempts is made in the recent past to build a framework for detection of spams as perfect as possible. However,
due to the mentioned restriction the bottleneck still persists in between email filtration and detection of spam
accuracy. Thus, this work proposes a novel automatic framework for detecting the spam emails on a wide range of
domains. The obtained accuracy is significantly high for this framework due to the multiple layered approach
adapted. The framework deploys classification of the emails in various domains and further applies the keyword-
based filtration process with analysis of term frequency along with identification of the nature of the sender for
confirmation of the process resulting into progressive classification in order to make the world of email
communication highly secure and satisfiable.
Keywords: Spam filtering, Term Frequency, Term Relation, Domain Knowledge, Author identification,
progressive classification
References: 1. R. Team, "Email statistics report 2015-2019", Mar. 2015.
2. J. D. Brutlag, C. Meek, "Challenges of the email domain for text classification", Proc. ICML, pp. 103-110, 2000.
3. W. W. Cohen, "Learning rules that classify e-mail", Proc. AAAI Spring Symp. Mach. Learn. Inf. Access, pp. 25, 1996. 4. E. Blanzieri, A. Bryl, "A survey of learning-based techniques of email spam filtering", Artif. Intell. Rev., vol. 29, pp. 63-92, Sep. 2008.
5. T. S. Guzella, W. M. Caminhas, "A review of machine learning approaches to spam filtering", Expert Syst. Appl., vol. 36, pp. 10206-
10222, Oct. 2009. 6. S. Abu-Nimeh, D. Nappa, X. Wang, S. Nair, "A comparison of machine learning techniques for phishing detection", Proc. Anti-Phishing
Work Groups 2nd Annu. Ecrime Res. Summit, pp. 60-69, 2007.
7. A. Almomani, B. B. Gupta, S. Atawneh, A. Meulenberg, E. Almomani, "A survey of phishing email filtering techniques", IEEE Commun. Surveys Tuts., vol. 15, pp. 2070-2090, 4th Quart. 2013.
8. Y. W. Wang, Y. N. Liu, L. Z. Feng, X. D. Zhu, "Novel feature selection method based on harmony search for email classification",
Knowl.-Based Syst., vol. 73, pp. 311-323, Jan. 2015. 9. M. R. Schmid, F. Iqbal, B. C. M. Fung, "E-mail authorship attribution using customized associative classification", Digit. Investigat., vol.
14, pp. S116-S126, Aug. 2015.
10. M. T. Banday, S. A. Sheikh, "Multilingual e-mail classification using Bayesian filtering and language translation", Proc. Int. Conf.
Contemp. Comput. Informat., pp. 696-701, 2015.
11. M. Mohamad, A. Selamat, "An evaluation on the efficiency of hybrid feature selection in spam email classification", Proc. 2nd Int. Conf.
Comput. Commun. Control Technol., pp. 227-231, 2015. 12. N. A. Novino, K. A. Sohn, T. S. Chung, "A graph model based author attribution technique for single-class e-mail classification", Proc.
14th IEEE/ACIS Int. Conf. Comput. Inf. Sci. (ICIS), pp. 191-196, Sep. 2015.
13. W. Li, W. Meng, Z. Tan, Y. Xiang, "Towards designing an email classification system using multi-view based semi-supervised learning", Proc. 13th IEEE Int. Conf. Trust Secur. Privacy Comput. Commun. (TrustCom), pp. 174-181, Sep. 2015.
14. W. Li, W. Meng, "An empirical study on email classification using supervised machine learning in real environments", Proc. IEEE Int.
Conf. Commun. (ICC), pp. 7438-7443, Jun. 2015. 15. Z. J. Wang, Y. Liu, Z. J. Wang, D. L. Liu, X. B. Zhu, K. L. Xu, D. M. Fang, "E-mail filtration and classification based on variable
weights of the Bayesian algorithm" in Applied Science Materials Science and Information Technologies in Industry, Zürich,
Switzerland:Trans Tech Publications Ltd, vol. 513, pp. 2111-2114, 2014. 16. S. A. Saab, N. Mitri, M. Awad, "Ham or spam? A comparative study for some content-based classification algorithms for email filtering",
Proc. (MELECON), pp. 439-443, 2014.
17. M. R. Islam, J. Abawajy, M. Warren, Multi-Tier Phishing Email Classification with an Impact of Classifier Rescheduling, New York, NY, USA:IEEE, 2009.
18. A. A. Akinyelu, A. O. Adewumi, "Classification of phishing email using random forest machine learning technique", J. Appl. Math., vol.
2014, pp. 1-6, Apr. 2014. 19. J. C. Gomez, M. F. Moens, "PCA document reconstruction for email classification", Comput. Statist. Data Anal., vol. 56, pp. 741-751,
Sep. 2012.
20. N. Al Fe’ar, E. Al Turki, A. Al Zaid, M. Al Duwais, M. Al Sheddi, N. Al Khamees, E-Classifier: A Bi-Lingual Email Classification System, New York, NY, USA:IEEE, 2008.
21. E. K. Jamison, I. Gurevych, "Headerless quoteless but not hopeless? Using pairwise email classification to disentangle email threads",
Proc. 9th Int. Conf. Recent Adv. Natural Lang. Process., pp. 327-335, 2013. 22. J. Ratkiewicz et al., "Detecting and Tracking Political Abuse in Social Media", Proc. 5th Int’l AAAI Conf. Weblogs and Social Media,
2011
23. P.-A. Chirita, J. Diederich, W. Nejdl, "Mailrank: Using Ranking for Spam Detection", Proc. 14th ACM Int’l Conf. Information and Knowledge Management, pp. 373-380, 2005
24. H. Yu et al., "Sybillimit: A Near-Optimal Social Network Defense against Sybil Attacks", IEEE/ACM Trans. Networking, vol. 18, no. 3,
pp. 885-898, 2010. 25. J. Ratkiewicz et al., "Truthy: Mapping the Spread of Astroturf in Microblog Streams", Proc. 20th Int’l Conf. Comp. World Wide Web, pp.
249-252, 2011.
26. X. Hu et al., "Social Spammer Detection in Microblogging", Proc. 23rd Int’l Joint Conf. Artificial Intelligence, pp. 2633-2639, 2013. 27. Shivam Aggarwal,Vishal Kumar and S.D.Sudarshan,“Identification and Detection of Phishing Emails Using Natural Language
Processing Techniques”, Proceedings of the 7th International Conference on Security of Information and Networks,2014. 28. A. Pandian and Mohamed Abdul Karim, “Detection of Fraudulent Emails by Authorship Extraction”,International Journal of Computer
Applications (0975 – 8887), Volume 41– No.7, March 2012.
29. Hongming Che, Qinyun Liu and Lin Zou “A Content-Based Phishing Email Detection Method”, IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C),2017.
30. H. Alghamdi, "Can Phishing Education Enable Users To Recognize Phishing Attacks" in Dublin Institute of Technology, Dublin, Ireland,
2017.
65.
Authors: Kadali lakshmi, Anakapalli Suresh, Arshini Gubbala
Paper Title: Development of FPGA Based Multi-Channel Temperature Controller using Thermistors for under
Water Vehicles
Abstract: Under water vehicles with electrical propulsion such as underwater autonomous vehicles are designed
to propel with high energy batteries. These batteries are the main source of power to motor and other electronic
subsystems. Temperature of the batteries is one of the critical parameter that gives the information about the health
of the battery and whether the battery is able to deliver the required power to other subsystems. In case of any
abnormality such as battery short circuit or other reasons, the temperature of the battery may shoot up to the alarm
levels at various places of the battery and other sub sections near to the battery because the temperature is
transferred from battery to the nearby shell and other subsystems. For this application, Multi-channel temperature
controller is designed, verified and tested in the battery assembly. The proposed system can monitor and control up
to the 32 temperature channels by integrating thermistors in the complete test set-up and it is designed in such a
way that the battery is disconnected from the other subsystems in case of any abnormality or temperature is
increased beyond the safety limit. In this paper, design, calibration and integration and testing of multi-channel
Temperature controller using FPGA with thermistors is discussed and the system has internal memory and it can
store the temperature at various channels in flash memory so that the system is well suited for not only self-
controlled underwater vehicles but also thermal engine based systems. The system can also monitor and control the
temperature in harsh environment even also in industrial applications. The system is designed in Spartan 3FPGA
using VHDL and verification of the design is done Xilinx chip-scope-pro. The front end Graphical User Interface
(GUI) is designed for online monitoring, data downloading and processing using visual C++ and MATLAB.
Keywords: Multi-channel Intelligent temperature controller, FPGA based system, Thermistors, Battery controller
with onboard systems, Battery monitoring system, Data Acquisition Systems, Graphical User Interface (GUI).
References: 1. Circuit Design with VHDL--- Volnei A.Pedroni .
2. FPGA Prototyping by VHDL Examples Xilinx SpartanTM-3 version----Pong P. Chu 3. Practical Data Acquisition for instrumentation & control system---- john park & steve mackay.
4. PI Daijun, ZHANG Haiyong and YE ianyang, "Design of High Speed Real-time Data Acquisition System Based on FPGA ", in Modem
electronic technology, 2009, pp. 12-14.High Performance Octal UART XR16L788 data sheet, REV1.2.2, October 2005. 5. OMEGA Temperature Measurement Handbook, Omega Instruments, Inc..
6. AD7655 16 bit Analog to Digital Converter,Data sheet, Analog Devices.
7. FDTI Chip FT245R USB FIFO IC Datasheet. 8. Xilinx Spartan-3E FPGAFamily Data Sheet.
9. Numonyx SLC NAND Flash Memories datasheet.
10. Jie Li, Qiao Jiang, Xi-ning Yu and Ying DU (2010), “Intelligent Temperature Detecting System”, 2010 International Conference on Intelligent System Design and Engineering Application, National Key Laboratory for Electronic Measurement, North University of
China, Taiyuan, 030051, China
11. S. Thanee S. Somkuarnpanit , “FPGA Based multi protocol data acquisition system with High speed USB interface”. IMECS, March 10-12, 2010.
360-364
66.
Authors: Vijayakumar R, NidhyaKumari R, Himani J, Rahul V, Varun V
Paper Title: Fabrication of Low Cost Solar using Polypropylene (PPR) Pipes – An Investigation
Abstract: The conversion of solar energy into thermal and electrical form is possible is possible by the using
photovoltaic modules and solar collectors. Solar collector absorbs the direct solar radiation and converts it into
thermal energy, which can be stored in the form of sensible heat/ latent heat and a combination of both diffused in
the working fluids. Present work deals with the performance evaluation of solar power based air heater fabricated
using polypropylene (PPR) pipes foiled with aluminium. The use of PPR polymer results in the reduction of total
initial cost of fabrication. The working fluid, which was air, is introduced into the collector system made of
polypropylene pipes and were the fluid (air) is heated by using solar energy. The outer surface of the PPR pipes
were paint in black color to maximize the absorption of incoming solar radiation. The air absorbs the entrapped
heat of the pipe and the heated air was comes out of the system. Further, to minimize heat losses from the front
collector, glass is used as a top cover. The change in temperature of the fluid with respect to time was observed.
The effectual inlet load of fluid (air) on the performance of solar heater was investigated by varying the mass flow
rate (MFR) of the fluid (air)
Keywords: air solar heater, PPR pipes, mass flow rate, efficiency
References: 1. R. K. Aharwal, K. Bhupendra Gandhi, J. S. Saini. "Heat transfer and friction characteristics of SAH ducts on absorber plate." International
journal of heat and mass transfer, volume 52, no. 25, 2009, pp. 5970-5977.
2. S. Y.-Ali. "Study and optimization of the thermal performances fin absorber plates, with various glazing." Renewable Energy, Volume 30,
no. 2, 2005, pp. 271-280. 3. Chabane, Foued, NoureddineMoummi, Said Benramache. "Experimental analysis on thermal performance of a solar air collector in a
region of Biskra, Algeria." Journal of Power Technologies, Volume 93, no. 1, 2013, pp.52-58.
4. Chow, Tin Tai. "A review on photovoltaic/thermal hybrid solar technology." Applied energy, Volume 87, no. 2, 2010, pp. 365-379. 5. P. Dhiman, N. S. Thakur, A. Kumar, S. Singh. "An analytical model of a novel parallel flow packed bed SAH." Applied energy, Volume
88, 2011, pp. 2157-2167
6. Y. K. Durgesh, A. K. Rai, V. Sachan. "Experimental study of SAH." International Journal of Advanced Research in Engineering and
Technology, volume 5, no. 5, 2014, pp.102–106
365-367
67. Authors: Dinokumar Kongkham, M.Sundararajan
Paper Title: Minimized Interference in CRN using Conjunction Analysis and Resource Utilization over the Network
Abstract: Subjective radio system is a main correspondence organize which makes a long range
correspondence in a minimal effort and it is a quickest remote system. Usage of unused range band of essential
client by optional client. Because of expanding more number of optional clients at that point naturally emerging
shot for the impact of the two signs. The impedance is the principle issue in the intellectual radio system because
of movement and various correspondence. To diminish obstruction numerous methodologies and calculations are
proposed. Yet at the same time it stays unsolved. To decrease the obstruction besides we proposed a bar structure
i.e. the signs of a similar group hubs or adjacent hubs join a flag and asset to frame a solid flag called shaft flag and
after that correspondence will be continued. The bar will assist correspondence with being solid and limit the
impedance with different bars. We can diminish impedance up to 7-8% of the current approach.
Keywords: Intellectual radio network(CRN), obstruction, bar flag; bunch of hubs.
References: 1. Sheng ; Wang ; Cai Qin ; Weidong Wang, “Interference Alignment assisted by D2D communication for the Downlink of MIMO
Heterogeneous Networks,” EEE Access, ISSN: 2169-3536, 2018.
2. Solmaz Niknam ; Balasubramaniam Natarajan ; Reza Barazideh, “Interference Analysis for Finite-Area 5G mmWave Networks Considering Blockage Effect,” IEEE Access, ISSN: 2169-3536, 2018.
3. Longwei Wang ; Qilian Liang, “Partial Interference Alignment for Heterogeneous Cellular Networks,” IEEE Access, ISSN: 2169-3536,
2018.
4. Sina Maleki ; Juan Merlano Duncan ; Jevgenij Krivochiza ; Symeon Chatzinotas ; Björn Ottesten, “SDR Implementation of a Test bed
for Real-Time Interference Detection With Signal Cancellation,” IEEE Access ( Volume: 6 ), Pp 20807 – 20821, 2018
5. Yunchao Song ; Chen Liu ;, “The Pre-coding Scheme Based on Domain Selective Interference Cancellation in 3D Massive MIMO,” EEE Communications Letters, pp. 1–1, 2018.
6. Cui ; Yu Chen ; Wei Ni ; Tao ; Ping Zhang, “Effective Capacity Analysis in Ultra-Dense Wireless Networks With Random
Interference,” IEEE Access ( Volume: 6 ), pp. 19499 - 19508, 2018. 7. Yang ; Pei Liu ; Liang Li, “Interference Compensation for Smart Grid Communications: A Distributed Power Control Approach,” IEEE
Access ( Volume: 6 ), pp. 18643 - 18654 , 2018.
8. Salama S. ; Wessam Mesbah ; Thomas Kaiser, “Artificial Noise-Based Physical-Layer Security in Interference Alignment Multi pair Two-Way Relaying Networks,” EEE Access, vol. 6, pp. 19073 - 19085, 2018.
9. Chao Dong ; Kai ; Lin, “An Ordered Successive Interference Cancellation Detector With Soft Detection Feedback in IDMA
Transmission,” EEE Access ( Volume: 6 ), Pp. 8161 - 8172, 2018. 10. Christos ; Kai-Kit Wong, “Constructive Interference Based Secure Pre-coding: A New Dimension in Physical Layer Security,” EEE
Transactions on Information Forensics and Security, vol. 13, issue. 9, pp. 2256 - 2268, 2018.
11. S. Haykin, “Cognitive radio: Brain-empowered wireless communications,” IEEE J. Sel. Areas Common., vol. 23, pp. 201-220, Feb. 2005. 12. Goldsmith, S., I. Maric, and S. Srinivasa, “Breaking spectrum gridlock with cognitive radios: an information theoretic perspective,” Proc.
IEEE, vol. 97, no. 5, pp. 894-914, May 2009. 13. J. N. Laneman, D. N. C. Tse and G. W. Wornell, “Cooperative diversity in wireless networks: efficient protocols and outage behavior,”
IEEE Trans. Info. Theory, vol. 50, no. 12, pp. 3062-3080, Dec. 2004.
14. X. Zhang, Z. Yan, Y. Gao, and W. Wang, “On the study of outage performance for cognitive relay networks (CRN) with the Nth best-relay selection in Rayleigh-fading channels,” IEEE Wireless Commun. Lett. vol. 2, no. 1, pp. 110-113, Feb. 2013.
15. M. Xia and S. A¨, “Cooperative AF relaying in spectrum-sharing systems: performance analysis under average interference power
constraints and Nakagami-m fading,” IEEE Trans. Commun., vol. 60, no. 6, June 2012. 16. S. I. Husain, M.-S. Alouini, K. Qaraqe, and M. Hasna, “Reactive relay selection in underlay cognitive networks with fixed gain relays,”
IEEE Int’l Conf. on Commun. (ICC’12), Canada, June 2012, pp. 1784-1788.
17. T. Q. Duong, V. N. Q. Bao, H. Tran, G. C. Alexandropoulos and H.-J. Zepernick, “Effect of primary network on performance of spectrum sharing AF relaying,” Electronics., 5th January 2012, vol. 48, no. 1.
18. X. Guan, W. Yang, and Y. Cai, “Outage performance of statistical CSI assisted cognitive relay with interference from primary user,”
IEEE Commun. Lett. vol. 17, no. 7, pp. 1416-1419, July 2013. 19. P. Yang, Q. Zhang, L. J. Qin, “Outage performance of underlay cognitive opportunistic multi-relay networks in the presence of
interference from primary user,” Wireless Pers. Commun. (2014) 74:343-358.
20. X. Wang, H. Zhang, T. A. Gulliver, W. Shi, “Outage performance of a proactive DF cognitive relay network with a maximum transmit power limit,” Journal of Information & Computational Science, 10:18 (2013), pp. 5927-5934, Dec. 2013
368-375
68.
Authors: Dinokumar Kongkham, M Sundararajan
Paper Title: Optimization Scheme with Energy Detector Model for Cognitive Radio Networks
Abstract: Cognitive Radio (CR) is a promising technology in the wireless communication system for resolving
the resource utilization problems and spectral clogging problems in the spectrum based applications. It aims to
enhance spectrum sharing scheme in Multiple-input multiple-output orthogonal frequency division multiplexing
(MIMO-OFDM) to enable with next generation systems. Efficient utilization of Spectrum sensing and
computational complexity is still an unsolved issue in the ultra-wide band (UWB) radio spectrum. Generally,
conventional methods include spectrum sensing to identify the primary users and spectrum usage, which helps to
make data transmission possible from secondary users. However, they obtain poor throughput, higher transmission
power and longer sensing time. In order to resolve this issue, we propose novel hybrid access optimization scheme
with energy detector model for achieving the significant compressive spectrum sensing in the MIMO-OFDM,
which is based on cognitive ratio network (CRN). The proposed method develops sparsity signal model with the
help of orthogonal transform of Fractional Fourier Transformation (FRFT) for reducing the signal to noise ratio
(SNR). Furthermore, modulated signals from secondary users are forwarded to DSP (Digital signal Processing).
Hence, the proposed system achieves higher accuracy in detecting the false probability, energy detection, optimal
sensing time, and higher throughput than efficient compressive sensing method.
Keywords: Spectrum Sensing, Novel Hybrid Access Optimization scheme, Energy detector, Sparsity Signal
Model and Fractional Fourier Transformation.
376-381
References: 1. W. Lee and D.-H. Cho. (2013). “Channel selection and spectrum availability check scheme for cognitive radio systems considering user
mobility,” IEEE Commun. Lett., vol. 17, no. 3, pp. 463–466, Mar.
2. J. Lee, J. G. Andrews, and D. Hong. (2015). “Spectrum-sharing transmission capacity with interference cancellation,” IEEE Trans. Commun., vol. 61, no. 1, pp. 76–86, Jan.
3. B.Rassouli and A. Olfat. (2012). “Periodic spectrum sensing parameters optimization in cognitive radio networks,” IET Commun., vol.
6, no. 18,pp. 3329–3338, Dec. 4. Q. Li, Z. Li, J. Shen, and R. Gao. (2015), “A novel spectrum sensing method in cognitive radio based on suprathreshold stochastic
resonance,” in Proc.IEEE Int. Conf. Commun. (ICC), pp. 4426–4430.
5. Y. Huret al.. (2007). “A wideband analog multi-resolution spectrum sensing (MRSS) technique for cognitive radio (CR) systems,” in Proc. IEEEInt. Symp. Circuits Syst. (ISCAS), May, pp. 1–4.
6. T. Yucek and H. Arslan. (2010). “A survey of spectrum sensing algorithms for cognitive radio applications,” IEEE Commun. Surveys
Tuts., vol. 11, no. 1, pp. 116–130. 7. Y. Pei, A. T. Hoang, and Y.-C. Liang. (2015). “Sensing-throughput tradeoff in cognitive radio networks: How frequently should
spectrum sensing be carried out?” in Proc. IEEE 18th Int. Symp. Personal, Indoor MobileRadio Commun. (PIMRC), pp. 1–5.
8. S. Stotas and A. Nallanathan. (2012). “Overcoming the sensing-throughput tradeoff in cognitive radio networks,” in Proc. IEEE Int. Conf.Commun. (ICC), pp. 1–5.
9. Y.-C. Liang, Y. Zeng, E. C. Y. Peh, and A. T. Hoang. (2010). “Sensingthroughput tradeoff for cognitive radio networks,” IEEE Trans.
WirelessCommun., vol. 7, no. 4, pp. 1326–1337. 10. A PHY/MAC Proposal for IEEE 802.22 WRAN Systems Part 1: The PHY, IEEE Standard 802, 2006.
11. H. Kim and K. G. Shin. (2013). “In-band spectrum sensing in cognitive radio networks: Energy detection or feature detection?” in Proc.
14th ACMInt. Conf. Mobile Comput. Netw.pp. 14–25. 12. S. Kyperountas, N. Correal, and Q. Shi. (2010). “A comparison of fusion rules for cooperative spectrum sensing in fading channels,”
EMS Research, Motorola, Libertyville, IL, USA
13. H. Urkowitz. (2006). “Energy detection of unknown deterministic signals,” Proc. IEEE, vol. 55, no. 4, pp. 523–531. 14. H. V. Poor. (1988). An Introduction to Signal Detection and Estimation, vol. 1. New York, NY, USA: Springer-Verlag p. 559.
15. E. C. Y. Peh, Y.-C. Liang, Y. L. Guan, and Y. Zeng. (2015). “Optimization of cooperative sensing in cognitive radio networks: A sensing-throughput tradeoff view,” IEEE Trans. Veh. Technol., vol. 58, no. 9, pp. 5294–5299.
16. D. Cabric, S. M. Mishra, and R. W. Brodersen. (2004). “Implementation issues in spectrum sensing for cognitive radios,” in Proc. Conf.
Rec. 38thAsilomar Conf. Signals, Syst. Comput., vol. 1. Nov. 2004, pp. 772–776. 17. W. H. Press, S. A. Teukolsky, W. T. Vetterling, and B. P. Flannery. (2009). “Numerical recipes source code CD-ROM,” in The Art of
ScientificComputing, 3rd ed. Cambridge, U.K.: Cambridge Univ. Press.
18. L. N. de Castro and J. Timmis. (2006). Artificial Immune Systems: A New Computational Intelligence Approach. New York, NY, USA:Springer-Verlag.
19. J. Kennedy. (2012). “Particle swarm optimization,” in Encyclopedia of Machine Learning. New York, NY, USA: Springer-Verlag, pp.
760–766. 20. J. F. Kennedy, J. Kennedy, and R. C. Eberhart, Swarm Intelligence. San Mateo, CA, USA: Morgan Kaufmann, 2001.
69.
Authors: Altaf C, Shah Aqueel Ahmed
Paper Title: Energy Efficient and Reliable Routing Protocol in Wireless Ad Hoc Network
Abstract: In wireless ad hoc network, increased lifetime, reliability and energy efficiency is main concern. The
significant techniques Reliable Minimum Energy Routing (RMER) and Reliable Minimum Energy Cost Routing
(RMECR) are developed here to reach this concern. These protocols are compared with TMER (Traditional
Minimum Energy Routing) and ETX (Expected Transmission Count) by energy utilization, battery energy of
nodes remaining along with quality of links, also comparison has made here. With investigations made on Energy-
Aware Routing in ad hoc networks, two techniques namely RMER and RMECR stated here can increase the
operational lifetime of the network by means of reliable, energy-efficient routes. The RMECR is the new idea of
wireless ad hoc networks in case of energy efficient routing algorithm. RMER technique is the point of reference
in understanding Energy Efficiency of the RMECR algorithm determines the routes which are required low energy
consumption while transmitting packets without considering the battery energy left of the nodes.
Keywords: Mobile Ad hoc network, Routing, Energy Efficiency, Reliability, RMER and RMECR.
References: 1. D.J. and D.D Vergados and Pantazis NA, “Energy- Efficient Route Selection Strategies for Wireless Sensor Networks,” Mobile
Networks and Applications, vol. 13, nos. 3-4,pp. 285-296, Aug. 2008.
2. H. Zhang, A.A, and P. Sinha, “Link Estimation and Routing in Sensor Network Backbones: Beacon-Based or Data-Driven?” IEEE Transaction on Mobile Computing, vol. 8(5), pp. 653-667, May 2009.
3. Z.J Qiao.C and Wang.X (2006) ‘On Accurate Energy Consumption Models for Wireless Ad Hoc Networks,’ IEEE Transactions on
Wireless Communications. Vol. 5(11), pp. 3077-3086. 4. Verma, S. Kim, S. Choi, and S.-J. Lee, “Reliable, Low Overhead Link Quality Estimation for 802.11 Wireless Mesh Networks,”
Proceeding. IEEE Fifth Annual Communication Society Conf. Sensor, Mesh and Ad Hoc Communications and Networks (SECON ’08),
June 2008. 5. A.Misra and S.Banerjee(2002) ‘MRPC: Maximizing Network Lifetime for Reliable Routing in Wireless Environments,’ Proceeding.
IEEE Wireless Communications and Networking Conference. (WCNC’02).Vol 7,No.6, pp. 800-806.
6. Mohanoor.A.B S.Radhakrishnan and V.Sarangan(2009) ‘Online Energy Aware Routing in Wireless Networks,’Ad Hoc Networks. Vol. 7, No. 5, pp. 918-931.
7. J.H Chang and L.Tassiulas ( 2004) ‘Maximum Lifetime Routing in Wireless Sensor Networks,’ IEEE/ACM Transactions on
Networking.Vol. 12, No. 4, pp. 609-619. 8. Nishant G.S, R. Das, (1998 )’Energy-Aware On-Demand Routing For Mobile Ad Hoc Networks’, IEEE Transactions on Wireless
communications, vol.6 , no.11,pp.1300-1313.
9. Canming J.Yi Shi and Thomas H.Y (2005) ‘Cherish every Joule: Maximizing throughput with an eye on network-wide energy consumption’ Proceedings. IEEE Wireless communications. Vol 3, No.5, pp.850-857.
10. K.K.H and K.G Shin.V “On Accurate Measurement of Link Quality in Multi-Hop Wireless Mesh Networks,” Proceeding. ACM Mobile
Communications, pp. 38-49, 2006.
382-385
70.
Authors: AC. Priya Ranjani, M. Sridhar
Paper Title: Distributed Web Usage Mining Based Ecommender System in Big Data Analytics using Hybrid Firefly
Algorithm
Abstract: One of the fast upcoming data mining disciplines that deal with large, unstructured complex data is
Big data analysis. Web usage mining is a primary area of research that has been focusing on the valuable
information derived from web server logs. Not having any explicit ratings of the users, the large data volume and
its sparse nature have been posing challenges to the techniques of collaborative filtering with respect to
performance and scalability. Techniques like clustering are dependent on the discovery of offline patterns from
the user transactions and are used to improve scalability in terms of collaborative filtering but at reduced cost
and recommendation accuracy. To improve the situation, this work has been taken up on the basis of nature
inspired, meta heuristic algorithms Firefly and Teaching Learning Based Optimization (FA-TLBO). This FA-
TLBO was hybridized using the K-Means algorithm (FA-TLBO with K-Means) in order to obtain optimal cluster
centres. There were numerical experiments which indicated the fact that novel FA-TLBO with K-means was more
efficient compared to TLBO algorithm.
Keywords: Big Data Analysis, Web Usage Mining, Recommender System, Clustering, K-Means Algorithm,
Firefly Algorithm (FA) and Teaching Learning Based Optimization (TLBO).
References: 1. J. Zakir, T.Seymour, and K.Berg, “Big Data Analytics,” Issues in Information Systems, 2015, .16(2), pp. 81-90.
2. V.Dagade, M.Lagali, S.Avadhani, and P. Kalekar, “Big Data Weather Analytics Using Hadoop,” in IJETCSE, 14(2), pp.847-851.
3. R.Ali, “Cluster Optimization for Improved Web Usage Mining”, in IJRITCC, 2015,3(11), pp.6394-6399.
4. M. Sajwan, K.Acharya, and S.Bhargava, “Swarm intelligence based optimization for web usage mining in recommender system,” 2014, IJCATR, 3(2), pp.119-124.
5. J.Vellingiri, S.Kaliraj, S.Satheeshkumar, and T.Parthiban . “A novel approach for user navigation pattern discovery and analysis for web
usage mining,”. JCS, 2015, 11(2), pp.372-382. 6. Abbas, L.Zhang, and S.U.Khan, “A survey on context-aware recommender systems based on computational intelligence techniques,” In
Computing, Springer, 97(7), pp.667-690.
7. M.Jafari, F.S.Sabzchi, and A.J.Irani, “Applying web usage mining techniques to design effective web recommendation systems: A case study”, Advances in Computer Science: an International Journal, 3(2), 2014, pp.78-90.
8. 8 .C.Shahabi and F.Banaei-Kashani, “Efficient and anonymous web-usage mining for web personalization”, INFORMS Journal on
Computing, 2003, pp.123-147. 9. 9..A.G.Abdalla, T.M.Ahmed and M.E.Seliaman, “Web Usage Mining and the Challenge of Big Data: A Review of Emerging Tools and
Techniques”, In Handbook of Research on Trends and Future Directions in Big Data and Web Intelligence, . IGI Global, 2015, (pp. 418-
447. 10. 10. S.P.Malarvizhi, and B.Sathiyabhama, “Frequent page sets from web log by enhanced weighted association rule mining”, Cluster
Computing, 2016, 19(1), pp.269-277.
11. 11.E.Tuba, R.Jovanovic, R.C.Hrosik, A. Alihodzic and M.Tuba, “Web Intelligence Data Clustering by Bare Bone Fireworks Algorithm Combined with K-Means”. In Proceedings of the 8th International Conference on Web Intelligence, Mining and Semantics, (2018, June)
12. (article 7). ACM
13. 12.R.Katarya and O.P.Verma, “An effective web page recommender system with fuzzy c-mean clustering. Multimedia Tools and Applications”, ,2017, 76(20), pp.21481-21496.
14. A.K.Tripathi, K.Sharma and M.Bala, “A Novel Clustering Method Using Enhanced Grey Wolf Optimizer and MapReduce. “,Big Data
Research, Elsevier, 2018 15. Q.Lin, X.Wang, B.Hu, L.Ma, F. Chen, J.Li, and C.A.Coello Coello, “Multiobjective Personalized Recommendation Algorithm Using
Extreme Point Guided Evolutionary Computation”, Hindawi Complexity, 2018.
16. 15.Y.Djenouri, Z.Habbas, D.Djenouri, and M.Comuzzi, “Diversification heuristics in bees swarm optimization for association rules mining,” In Pacific-Asia Conference on Knowledge Discovery and Data Mining “, Springer, 2017, pp. 68-78.
17. 16.K.E.Heraguemi, N.Kamel, and H.Drias, “Multi-swarm bat algorithm for association rule mining using multiple cooperative
strategies,” Applied Intelligence, 2016, 45(4), pp.1021-1033. 18. 17.X.Wei, Y.Wang, Z.Li, Z., Zou, T., & Yang, G. “Mining users interest navigation patterns using improved ant colony optimization.
Intelligent Automation & Soft Computing”, 2015, 21(3), pp.445-454. 19. A.Agarwal, and N.Nanavati, “Association rule mining using hybrid GA-PSO for multi-objective optimisation,” In Computational
Intelligence and Computing Research (ICCIC), 2016 IEEE International Conference on pp. 1-7.
20. 19.J.Umarani, R.Sivaprakash, and G.Thangaraju, “Web Usage Mining Analysis for Big Data Applications in Government Sectors of India”, International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE), 2016, 23 (5), pp.201-211.
21. 20.S.Burla, “High Dimensional Data Clustering Using Hybridized Teaching-Learning-Based Optimization”, Journal of Computer and
Mathematical Sciences, 2013, 4(3), pp.135-201. 22. S.X.Yang, and X.He “Firefly algorithm: recent advances and applications”,2013, arXiv preprint arXiv: pp.1308.3898.
23. L.Zhang, L.Liu, S.X.Yang, andY. Dai, “A novel hybrid firefly algorithm for global optimization,” 2016, PloS one, 11(9), e0163230.
24. L.Zhou, and L.Li,(2018). “Improvement of the Firefly-based K-means Clustering Algorithm,” International Conference on Data
Science,2018, pp.157-162.
25. R.V.Rao, V.J.Savsani, and D.P.Vakharia,, “Teaching–learning-based optimization: a novel method for constrained mechanical design
optimization problems,” 2011, Computer-Aided Design, 43(3), pp.303-315. 26. 25.R.R.Kurada, K.K.Pavan, and A.A.Rao, “Automatic teaching–learning-based optimization: A novel clustering method for gene
functional enrichments”, In Computational Intelligence Techniques for Comparative Genomics, Springer, Singapore, pp. 17-35.
27. P.K.Mummareddy, and S.C.Satapaty, “An hybrid approach for data clustering using K-means and teaching learning based optimization,” In Emerging ICT for Bridging the Future-Proceedings of the 49th Annual Convention of the Computer Society of India CSI , Springer,
Cham, 2015, Vol. 2, pp. 165-171.
28. R.Singh, H.Chaudhary, and A.K.Singh, “A new hybrid teaching–learning particle swarm optimization algorithm for synthesis of linkages
to generate path, In Sadhana, 2017, 42(11), pp.1851-1870. 29. R.Singh, H.Chaudhary, and A.K.Singh, “A new hybrid teachinglearningparticle swarm optimization algorithm for synthesis of linkages
to generate path, In Sadhana, 2017, 42(11), pp.1851-1870.
30. S.Tuo, L.Yong, Y.Li, Y.Lin and Q.Lu, “HSTLBO: A hybrid algorithm based on Harmony Search and Teaching-Learning-Based Optimization for complex high-dimensional optimization problems”, PloS one, 2017, 12(4), e0175114.
386-393
71.
Authors: Srinivasa Rao Divvela, V Sucharitha
Paper Title: Efficient Algorithm using Big Data for Frequent Itemsets Mining
Abstract: Future trends are being estimated with the help of tools in data mining which allows the making of
decisions to be data driven and analyze them carefully with the corresponding tools. In various fields of mining the
most important practice of mining of data is the Associate-rule mining. Major issue in any of the techniques being
394-396
the generation of the frequent data-item sets which has to be solved efficiently. Many techniques have been put
forth for this only purpose of itemset generation like Apriori-algorithm, FP_Growth-algorithm, and many other
solutions are being offered to solve the issue. Many outsets of the problem yet to be fully implemented such as
large clusters solving and distribution along with parallelization (automatic) etc. Many of these issues can be
solved with the implementation of Framework of MapReduce on Improved Apriori algorithm. Lessening of time
due to parallel executions can be achieved with the help of this. This procedure considerably decreases the time of
execution and also a significant rise in efficiency is observed.
Keywords: MapReduce, Improved Apriori, mining, Frequent data-item sets.
References: 1. YalingXun, Jifu Zhang and Xian Qin, “Fidoop: Parallel mining of frequent Itemsets using MapReduce”, IEEE Trans.onsys.man and
cybernetics, Vol. 46,No.3, March 2016.
2. Sheelagole and Bharat Tidke, “Frequent Itemset Mining for BigData in social media using ClustBigFIM algorithm”, Intl Conf.on
Pervasive Computing, IEEE 2015. 3. Marconi K, Lehmann H. Big Data and Health Analytics[M]. BocaRaton:CRC Press, 2014.
4. McKinsey&Company. The big-data revolution in US health care: Accelerating value and innovation [R].
http://www.mckinsey.com/industries/healthcare-systems-and-services/our-insights/the-big-data-revolution-in-us-health-care, 2013. 5. Zahra Farzanyar and Nick Cercone, “Efficient mining of frequent itemsets in social network data based on MapReduce framework”,
Proceedings of the 2013 IEEE International Conference on Advances inSocial Networks Analysis and Mining.
6. M.-Y. Lin, P.-Y. Lee, and S.-C. Hsueh, “Apriori-based frequent itemset mining algorithms on MapReduce”, International Conference onUbiquitous Information Management and Communication, ACM, 2012.
72.
Authors: Alwyn Varghese, Anand. N, Prince Arulraj G
Paper Title: Investigation on Impact Strength of Fiber Reinforced Concrete Subjected To Elevated Temperature
Abstract: The effect of elevated temperature on impact strength of Fiber Reinforced Concretes (FRC) is
investigated in this paper. Cylinder specimens are used with different types of fibers such as Aramid, Basalt,
Carbon, Glass, Polypropylene and PVA. All the specimens were exposed to elevated temperature as per standard
fire curve following ISO 834. After heating the specimens are cooled by natural air prior to impact strength test.
The tests are conducted as per ACI committee 544. Test result reveals that addition of fiber enhances the impact
strength of concrete specimens. Concrete with Carbon fiber and Basalt fiber exhibits better performance than
concrete with other fibers. In unheated condition Carbon fiber shows 5.9 times increase in impact resistance with
respect to reference specimen. For 90 minutes of heat exposure, all FRCs except concrete with Aramid fiber shows
2 times better impact resistance than that of reference specimen.
Keywords: Fiber Reinforced Concrete, Impact Strength, Elevated Temperature, Carbon Fiber, Basalt Fiber
References: 1. Ramakrishna, G., & Sundararajan, T. (2005). Impact strength of a few natural fibre reinforced cement mortar slabs: a comparative
study. Cement and concrete composites, 27(5), 547-553.
2. Gopalaratnam, V. S. et al,. (1984). A modified instrumented Charpy test for cement-based composites. Experimental mechanics, 24(2), 102-111.
3. Hibbert, A. P., & Hannant, D. J. (1978, April). The design of an instrumented impact test machine for fibre concretes. In Testing and Test
Method of Fibre Cement Composites’, Proceedings of RILEM Symposium (The Construction Press, Sheffield, 1978) (pp. 107-120). 4. Schrader, E. K. (1981, March). Impact resistance and test procedure for concrete. In Journal Proceedings (Vol. 78, No. 2, pp. 141-146).
5. Cantwell, W. J., & Morton, J. (1991). The impact resistance of composite materials—a review. composites, 22(5), 347-362.
6. Gopalaratnam, V. S., & Shah, S. P. (1985). Strength, Deformation and Fracture Toughness of Fiber Cement Composites at Different Rates of Flexural Loading. In Unknown Host Publication Title. Swedish Cement & Concrete Research Inst.
7. Swamy RN, Jojagha AH. (1982 Nov) Impact resistance of steel fibre reinforced lightweight concrete. International Journal of Cement
Composites and Lightweight Concrete. 1;4(4), 209-20. 8. Banthia, N. et al. (1998). Impact resistance of fiber reinforced concrete at subnorma temperatures. Cement and Concrete
Composites, 20(5), 393-404.
9. Muguruma, H., & Watanabe, F. (1990). Ductility improvement of high-strength concrete columns with lateral confinement. Special Publication, 121, 47-60.
10. Ho, J. C. M., et al. (2010). Effectiveness of adding confinement for ductility improvement of high-strength concrete columns. Engineering
Structures, 32(3), 714-725. 11. Balendran, R. V. et al. (2002). Influence of steel fibres on strength and ductility of normal and lightweight high strength
concrete. Building and environment, 37(12), 1361-1367.
12. Nili, M., & Afroughsabet, V. (2010). The effects of silica fume and polypropylene fibers on the impact resistance and mechanical properties of concrete. Construction and Building Materials, 24(6), 927-933.
13. Fraternali, F. et al. (2011). Experimental study of the thermo-mechanical properties of recycled PET fiber-reinforced concrete. Composite Structures, 93(9), 2368-2374.
14. Ruan, Z. et al. (2015). Numerical investigation into dynamic responses of RC columns subjected for fire and blast. Journal of Loss
Prevention in the Process Industries, 34, 10-21. 15. Ngo, T. et al. (2007). Blast loading and blast effects on structures–an overview. Electronic Journal of Structural Engineering, 7(S1), 76-
91.
16. Choi, S. J., et al. (2017). Impact or blast induced fire simulation of bi-directional PSC panel considering concrete confinement and spalling effect. Engineering Structures, 149, 113-130.
17. ACI Committee 544, (July 1978). Measurement of properties of fibre reinforced concrete. Journal, American Concrete Institute, Proc.
Vol. 75, No. 7, pp. 283-90. 18. IS: 516–1959. Methods of Tests for Strength of Concrete.
19. ISO 1975 ‘‘Fire resistance tests-elements of building construction.’’ International Standard ISO 834, Geneva.
20. Saxena, R., et al. (2018). Impact resistance and energy absorption capacity of concrete containing plastic waste. Construction and Building Materials, 176, 415-421.
21. Mohammad hosseini H, et al. (2017). The impact resistance and mechanical properties of concrete reinforced with waste polypropylene
carpet fibres. Construction and Building Materials. 143, 147-157. 22. Mastali M, et al. (2016). The impact resistance and mechanical properties of reinforced self-compacting concrete with recycled glass fibre
397-402
reinforced polymers. Journal of Cleaner Production. 124, 312-324.
23. Guo YC, et al. (2014). Compressive behaviour of concrete structures incorporating recycled concrete aggregates, rubber crumb and
reinforced with steel fibre, subjected to elevated temperatures. Journal of Cleaner Production. 72, 193-203. 24. Anand N and Prince Arulraj G. (2014). Effect of grade of concrete on the performance of self-compacting concrete beams subjected to
elevated temperatures, Fire Technology. 50(5), 1269–1284.
25. Anand N, et al. (2014). Stress strain behavior of Normal compacting and Self compacting concrete under elevated temperatures, Journal
of Structural Fire Engineering. 5 (1), 63–75.
26. Antony Godwin, et al. (2016). Influence of mineral admixtures on mechanical properties of self-compacting concrete under elevated
temperature, Fire and Materials. 40(7), 940–958. 27. Purkiss, J. A. (1988). Toughness measurements on steel fibre concrete at elevated temperatures. International Journal of Cement
Composites and Lightweight Concrete, 10(1), 39-47.
28. Alwyn Varghese, et al. (2018). Studies on Behaviour of Fire Affected Fiber Reinforced Concrete, International Journal of civil engineering and technology. 9(10), 1668–1675.
73.
Authors: Annamahesh A, Sunitha K Rangarajan S
Paper Title: Study on Mechanical Behavior of Graphene Based Polymer Composites
Abstract: Addition of Graphene in the matrix improves the mechanical properties, which makes it potentially
good reinforcement in polymer composites. Graphene possess unique mechanical properties, which makes it
attractive filler for producing multi-functional composites for a wide range of applications. It is an overview on the
state of the art of graphene, including material synthesis and characterization. It helps in identifying its influence
on the multi-functional and mechanical properties of the composites. Graphene was synthesized by a simple
method (Hummer’s Method). Characterization is done by X-Ray Diffraction, SEM images for the prepared
graphene. It is found that mechanical properties are improved tensile strength, flexural strength and heat distortion
temperature of the glass epoxy laminated composite when the small amount of grapheme added to the epoxy
matrix material.
Keywords: Epoxy Nano Composites, Graphene, Mechanical properties.
References: 1. Tapas kuilla, SambhuBhadra and Dahuyao, Recent advances in graphene based polymer composites, Polymer Science, 35,(10), 1350-
1375, 2010.
2. Yuchi Fan, Lianjun Wang and Jianlin, Preparation and Electrical properties of graphenenano sheet/Al2O3composites, Carbon Science,
48(10), 1743-1749, 2010. 3. Pandyaraj, V., Ravi Kumar, L., Chandramohan, D. Experimental investigation of mechanical properties of GFRP reinforced with coir and
flax, International Journal of Mechanical Engineering and Technology,9(1034-1042), pp. 1034-1042.
4. Chandramohan.D and S.Rajesh, Increasing Combusting Resistance For Hybrid Composites, International Journal of Applied Engineering Research,9(20), 6979-6985,2014.
5. Chandramohan.D et.al., Review On Tribological Performance Of Natural Fibre Reinforced Polymer Composites,Journal of Bio- and Tribo-Corrosion, Journal of Bio- and Tribo-Corrosion,4(4),55,2018.
6. Chandramohan, D and John Presin Kumar A. Experimental data on the properties of natural fiber particle reinforced polymer composite
material, Data in Brief,13, pp. 460-468,2017. 7. Adams R.D and Singh M.M, The effect of immersion in sea water on the dynamic properties of fibre-reinforced flexibilised epoxy
composites, Composite Structures, 31(2 ), 1995.
8. Jeffrey R.Potts and Todd.M.Alam, Thermomechanical properties of chemically modifiedgraphene/poly(methyl methacrylate) composites madeby in situ polymerization, Carbon Science, 49(10), s 2615-2623, 2011.
9. Chandramohan.D et.al., Progress of biomaterials in the field of orthopaedics, American Journal of Applied Sciences, 11 (4),623-630,2014.
10. Chandramohan, D., Marimuthu, K. Applications of natural fiber composites for replacement of orthopaedic alloys, Proceedings of the International Conference on Nanoscience, Engineering and Technology, 6167942, pp. 137-145,2011.
11. Chandramohan.D., and A.Senthilathiban. Effects of chemical treatment on jute fiber reinforced composites, International Journal of
Applied Chemistry, 10 (1),153-162,2014. 12. Murali, B., Chandra Mohan, D., Nagoor Vali, S.K., Muthukumarasamy, S., Mohan, A. Mechanical behavior of chemically treated
jute/polymer composites, Carbon - Science and Technology,6(1), pp. 330-335.
13. Murali, B., Chandra Mohan, D. Chemical treatment on hemp/polymer composites, Journal of Chemical and Pharmaceutical Research,6(9), pp. 419-423.
14. Chandramohan, D., Bharanichandar, J. Natural fiber reinforced polymer composites for automobile accessories, American Journal
of Environmental Sciences,9(6), 494-504,2014. 15. Chandramohan, D.and Marimuthu, K., Natural fibre particle reinforced composite material for bone implant, European Journal of Scientific
Research, Vol.54, No.3,384-406,2011.
16. Chandramohan, D. and Marimuthu, K., Characterization of natural fibers and their application in bone grafting substitutes, Acta of Bioengineering and Biomechanics, 13(1),77-84,2011.
17. Praveenkumar, R., Periyasamy, P., Mohanavel, V., Chandramohan, D. Microstructure and mechanical properties of MG/WC composites
prepared by stir casting method, International Journal of Mechanical Engineering and Technology,9(10), pp. 1504-1511,2018. 18. Chandramohan.D and S.Rajesh, Increasing Combusting Resistance For Hybrid Composites, International Journal of Applied
Engineering Research,9(20), 6979-6985,2014.
403-406
74.
Authors: Naveen Kumar K, Maheshwar Pratap
Paper Title: Identifying Durability Failure Parts using 24 Months-In-Service Data: A Case-Based Empirical Study
from an Automobile Manufacturer in India
Abstract: This paper analyses the warranty claims data to identify faulty parts contributing to increasing
failure using Weibull Analysis, in the automobile industry. Unlike studies in the past, this study uses 24 month
service data to investigate the cause of failure due to faulty parts.Usually, the forecasting of the part failure is done
for the 3 months in service (MIS) data and the automobile manufacturers use this parameter to set Key
Performance Indicators (KPI) for quality improvement among design engineers. The KPI set using 3MIS data is
used to determine 12 MIS and 24MIS KPIs. The period used in the development of KPIs affects the number of
failed parts to be selected for improvement. As the monitoring period of countermeasure takes long durations, the
repetitive failures added in data during the monitoring period, make the analysis complicated. Also, the seasonal
pattern of failures cannot be addressed using 3MIS data. By increasing the analysis period to 24MIS, this paper
407-411
finds evidence that increase in MIS leads to the identification of faulty parts that are causing repeated failures. The
scope of the study extends towardsthe detection of new issues and towards monitoringthe effectiveness of existing
countermeasures.This reduces warranty costs for the manufacturer and provides time to develop appropriate
countermeasures along with increased monitoring period of failure parts leading to durability quality improvement.
Keywords: Warranty claims forecasting, Warranty Analysis,Weibull Analysis, Part Drability.
References: 1. Rinne, H. (2008). The Weibull distribution: a handbook. Chapman and Hall/CRC.
2. S. J. Mitchell, ―The effect of the threshold stress on the determination of the Weibull parameters in probabilistic failure analysis‖, Engineer Fracture Mechanics, vol. 70, (2003) pp. 2559-2567.
3. Brombacher, A. C., Sander, P. C., Sonnemans, P. J., & Rouvroye, J. L. (2005). Managing product reliability in business processes ‘under
pressure’. Reliability Engineering & System Safety, 88(2), 137-146. 4. Aarset, M. V. (1987). How to identify a bathtub hazard rate. IEEE Transactions on Reliability, 36(1), 106-108.
5. Kunitz, H. (1989). A new class of bathtub-shaped hazard rates and its application in a comparison of two test-statistics. IEEE Transactions
on Reliability, 38(3), 351-354. 6. Jagtap, M. M., & Teli, S. N. WARRANTY PROCESS FLOW ANALYSIS IN AUTOMOTIVE INDUSTRY.
7. Lipson, C., SHETH, N., & SHELDON, D. (1966, July). Reliability and Maintainability in Industry and the Universities. In Symposium on
Deep Submergence Propulsion and Marine Systems (p. 2598). 8. Huang, G., Lin, W., & Niu, Q. (2016). Risk Analysis Model of Automobile Defect Based on Weibull. International Journal of Hybrid
Information Technology, 9(1), 353-366.
9. Kleyner, A., & Sandborn, P. (2005). A warranty forecasting model based on piecewise statistical distributions and stochastic simulation. Reliability Engineering & System Safety, 88(3), 207-214.
10. Guida, M., & Pulcini, G. (2002). Automotive reliability inference based on past data and technical knowledge. Reliability Engineering &
System Safety, 76(2), 129-137. 11. Wu, S. (2012). Warranty data analysis: a review. Quality and Reliability Engineering International, 28(8), 795-805
12. Davis, T. (1999). A simple method for estimating the joint failure time and failure mileage distribution from automobile warranty
data. Ford Technical Journal, 2(6), 1-11. 13. Rai, B., & Singh, N. (2005). A modeling framework for assessing the impact of new time/mileage warranty limits on the number and cost
of automotive warranty claims. Reliability Engineering & System Safety, 88(2), 157-169.
14. Wu, J., McHenry, S., & Quandt, J. (2013). An application of Weibull analysis to determine failure rates in automotive components. In 23rd International Technical COnference on the Enhanced Safety of Vehicles (ESV) (pp. 13-0027).
15. Aldridge, D. S. (2006, January). Prediction of potential warranty exposure and life distribution based upon early warranty data.
In Reliability and Maintainability Symposium, 2006. RAMS'06. Annual (pp. 159-164). IEEE. 16. Summit, R. A. (2012). Modelling component reliability using warranty data. ANZIAM Journal, 53, 437-450.
17. Lawless, J., Hu, J., & Cao, J. (1995). Methods for the estimation of failure distributions and rates from automobile warranty data. Lifetime
Data Analysis, 1(3), 227-240. 18. Ciampi, A., Lawless, J. F., McKinney, S. M., &Singhal, K. (1988). Regression and recursive partition strategies in the analysis of medical
survival data. Journal of clinical epidemiology, 41(8), 737-748.
19. Achcar, J. A., Brookmeyer, R., & Hunter, W. G. (1985). An application of Bayesian analysis to medical follow‐up data. Statistics in
medicine, 4(4), 509-520.
20. Taghipour, S., Banjevic, D., &Jardine, A. K. (2011). Reliability analysis of maintenance data for complex medical devices. Quality and
Reliability Engineering International, 27(1), 71-84.
21. Della Bona, A., Anusavice, K. J., &DeHoff, P. H. (2003). Weibull analysis and flexural strength of hot-pressed core and veneered ceramic structures. Dental Materials, 19(7), 662-669.Abernethy, Robert, The New Weibull Handbook, (3rd Edition), 1999
22. X. Yan, X. Ma and R. Zheng, ―Comparison of the Parameters Estimation Methods for 3-Parameter Weibull Distribution‖, Journal of
Ningbo University(Natural Science & Engineering Edition, CHN, vol. 18, (2005) March, pp. 301–305. 23. Xie, M., Tang, Y., &Goh, T. N. (2002). A modified Weibull extension with bathtub-shaped failure rate function. Reliability Engineering
& System Safety, 76(3), 279-285.
24. Gupta, R. C., Gupta, P. L., & Gupta, R. D. (1998). Modelling failure time data by Lehman alternatives. Communications in Statistics-Theory and methods, 27(4), 887-904.
25. Crowder, M. J., Kimber, A. C., Smith, R. L., & Sweeting, T. J. (1991). Statistical analysis of reliability dataChapman and Hall. New
York.
75.
Authors: K. Ranjith Kumar, M. Surya Kalavathi
Paper Title: Optimal Sizing of Grid Connected Hybrid PV/Wind/Battery Power System using Satin Bowerbird
Optimization
Abstract: Renewable energy sources are gaining more attention due to quick reduction of fossil fuels,
global warming and energy crisis over the past few decades. Photovoltaic and Wind are the outstanding sources
among the various offered renewable sources owing to the complementary nature of these sources. But the
availability of the generated energy and the cost of the system are the two major limitations of these sources.
Hybrid Power System (HPS) can alleviate the deviations in energy generated with the assistance of energy storage
systems like batteries. On the other hand the cost of the energy needs to be minimized. Therefore, optimization of
energy generation with storage system in light of investment cost and unpredictability alleviation is imposing to
the monetary achievability of Hybrid Power System. This work presents a novel methodology based on Satin
Bower Bird optimization to obtain the optimal sizing and power management of hybrid photovoltaic/wind/battery
power system. The HPS has been simulated using MATLAB using practical load and weather data of PV and wind
system: which gives better performance under all operating conditions.
Keywords: Photovoltaic, Wind, Battery, Hybrid Power System, multi-objective optimization, and Satin Bower
Bird
References: 1. https://www.bloomberg.com
2. Jonathan W K, Brain. T and Robert. S, “A system design approach for unattended solar energy harvesting supply,” IEEE Transactions on
Power Electronics., vol. 24, issue.4, pp. 952–962, April 2009.
3. Mohammed B.H and Robert S, “Optimization of photovoltaic-wind hybrid system for apartment complexes and other community living
environments by minimizing excess capacity,” 2012 38th IEEE Photovoltaic Specialists Conference 2012, pp. 531–536.
412-418
4. Dhaker A. Andre M, and Gerard. C, “Eco-design optimization of an autonomous hybrid wind/photovoltaic system with battery storage,”
IET Renewable Power Generation, vol. 6, issue.5, pp. 358–371, sept 2012.
5. Bogdan S B., Ziyad M.: ‘Methodology for optimally sizing the combination of a battery bank and PV array in wind/PV Hybrid system’,
IEEE Transactions on Energy Conversion., Vol.11, issue.2, pp. 367–375, June1996
6. Riad C., Saifur R, ‘Unit sizing and control of hybrid wind-solar power systems’, IEEE Transactions on Energy Conversion, Vol.12,
issue.1, pp. 79–85,1997
7. W D Kellogg, Hashem N, Giri V, Victor G, ‘Generation unit sizing and cost analysis for stand-alone wind, photovoltaic, and hybrid
wind/PV systems’, IEEE Trans. Energy Convers., 1998, 13, (1), pp. 70–75
8. Siad D, Gilles N, Belhamel M, Mourad H, M., Alain L.: ‘Design and techno-economical optimization for hybrid PV/Wind system under
various meteorological conditions’, Appl. Energy, 2008, 85, (10), pp. 968–987
9. Jun-h S, Zhi-d Z,Xin.-j Z., Guang.-y C.: ‘Robust design and optimization for autonomous PV-wind hybrid power systems’, J. Zhejiang
Univ. SCIENCEA, 2008, 9, (3), pp. 401–409
10. Hongxing Y, Z Wei., Lou, C.: ‘Optimal design and techno-economic analysis of a hybrid solar-wind power generation system’, Appl.
Energy, 2009, 86, (2), pp. 163–169
11. RNSR Mukhtaruddin, Hasimah HR, Mohammad YH, Jasrul JBJ. Optimal hybrid renewable energy design in autonomous system using
iterative-Pareto-fuzzy technique. Int J Electr Power Energy Syst 2015;64:242–9.
12. Jui-YL, Cheng C-L, Hui-C C. A mathematical technique for hybrid power system design with energy loss considerations. Energy
Convers Manag 2014;82:301–7.
13. Sunanda S, Chandel SS. Review of software tools for hybrid renewable energy systems. Renew Sustain Energy Rev 2014;32:192–205.
14. Mellit A, Kalogirou SA, Drif M. Application of neural networks and genetic algorithms for sizing of photovoltaic systems. Renew Energy
2010;35:2881–93.
15. Rajkumar RK, Ramachandaramurthy VK, Yong BL, Chia DB. Techno-economical optimization of hybrid pv/wind/battery system using
Neuro-Fuzzy. Energy 011;36:5148–53.
16. Luo Y, Shi L, Tu G. Optimal sizing and control strategy of isolated grid with wind power and energy storage system. Energy Convers
Manag 2014;80:407–15.
17. Masoud S, Tarek YV. Multi-objective optimal design of hybrid renewable energy systems using PSO-simulation based approach. Renew
Energy 2014;68:67–79.
18. Akbar M, Alireza A. Artificial bee swarm optimization for optimum sizing of a stand-alone PV/WT/FC hybrid system considering LPSP
concept. Sol Energy 2014;107:227–35.
19. Y. V. P Kumar , R B Singu, Renewable energy based microgrid system sizing and energy management for green buildings. J. Mod. Power
Syst. Clean Energy (2015) 3(1):1–13
20. Y. M. Atwa, E. F. El-Saadany, M. M. A. Salama, and R. Seethapathy, Optimal Renewable Resources Mix for Distribution System
Energy Loss Minimization IEEE Transactions on power systems, vol. 25, no. 1, February 2010 360-370
21. M B. Shadmand, and R S. Balog, Multi-Objective Optimization and Design of Photovoltaic-Wind Hybrid System for Community Smart
DC Microgrid, IEEE Transactions on Smart Grid
22. SH S.Moosavi, V K Bardsiri, Satin bowerbird optimizer: A new optimization algorithm to optimize ANFIS for software development
effort estimation. Eng. Appl. Artif. Intell. 2017, 60, 1–15.
23. https://power.larc.nasa.gov/data-access-viewer/
76.
Authors: S.P. Sundar Singh Sivam, Ganesh Babu Loganathan, K. Saravanan, S. RajendraKumar
Paper Title: Outcome of the Coating Thickness on the Tool Act and Process Parameters When Dry Turning Ti–6Al–
4V Alloy: GRA Taguchi & ANOVA
Abstract: In the primary days of Titanium Nitride tools, before coatings, tool manufacturers appreciated the tools
would last elongate and scuffle cratering if they put a little bit of Titanium Nitride (TiN) in the combination when
making the tool. This had the anticipated consequence, but the more TiN that was added, the feebler and more
brittle the tool became. Then someone hit on the idea of applying a thin layer of TiN to the surface of the tool. This
study results the Turning experiment conducted on the Ti–6Al–4V alloy of orthogonal array with Taughi grey
relational analysis. Emphases on the optimization of turning process Constraints using the technique to get Min
surface roughness (Ra), Roundness (s), Tool Wear and Cutting force in TIN with Different Coating Thickness by
PVD Technique. A number of Turning experiments remained conducted mistreatment the L9 OA on All Gear
Lathe. The experimentations remained achieved on Ti–6Al–4V alloy block of cutting tool of an CNMP120408-SM
TN8025 of 12 mm diameter with cutting point 140 degrees, used throughout the experimental work beneath
different Coating Thickness. Grey relational Analysis & ANOVA was used to work out the foremost important
Cutting speed, feed rate, Depth of Cut and Different Coating Thickness of TIN with 50,100,150 μm by PVD
Method which affecting the response.
Keywords: Ti–6al–4v, TIN Coatings, Grey Relation Taguchi method.
References: 1. https://www.productionmachining.com/articles/cutting-tool-coating-production
2. Tzeng, Y. F.; Chen, F. C. Multi objective process optimization for turning of tool steels. International Journal of Machining and Machinability of Materials. 1, 1(2006), pp. 76-93. DOI: 10.1504/IJMMM.2006.010659
3. Tosun, N. Determination of optimum parameters for multi-performance characteristics in Turning by using grey relational analysis. //
International Journal of Advanced Manufacturing Technology. 28, 5-6(2006), pp. 450-455. DOI: 10.1007/s00170-004-2386-y 4. Chang, C. K.; Lu, H. S. Design optimization of cutting parameters for side milling operations with multiple performance characteristics. //
International Journal of Advanced Manufacturing Technology. 32, 1-2(2007), pp. 18-26. DOI: 10.1007/s00170-005-0313-5
5. S.P. Sundar Singh Sivam, Mr. .Abburi Lakshman kumar, K. Sathiya Moorthy, RajendraKumar. “Investigation exploration outcome of Heat Treatment on Corrosion Resistance of AA 5083 in Marine Application”. International Journal of Chemical Sciences (ISSN 0972-768 X).
Page No Page (15 – 22), 2015.
6. Hrelja, M.; Klancnik, S.; Irgolic, T.; Paulic, M.; Jurkovic, Z.; Balic, J.; Brezocnik, M. Particle swarm optimization approach for modelling a turning process. Advances in Production Engineering & Management. 9, 1(2014), pp. 21-30.DOI: 10.14743/apem2014.1.173
7. S.P. Sundar Singh Sivam, V.G Umasekar, Shubham Mishra, Avishek Mishra, Arpan Mondal. “Orbital cold forming technology - combining high quality forming with cost effectiveness - A review”. Indian Journal of Science and Technology. Vol 9(38), October 2016,
DOI: 10.17485/ijst/2016/v9i38/91426.
8. Nian,C.Y., Yang,W.H.,Tarng, Y.S.,1999. Optimization of turning operations with multiple performance characteristics, Journal of
Materials Processing Technology 95, 90–96.
9. Chang, C. K.; Lu, H. S. Design optimization of cutting parameters for side milling operations with multiple performance characteristics. //
International Journal of Advanced Manufacturing Technology. 32, 1-2(2007), pp. 18-26. DOI: 10.1007/s00170-005-0313-5
419-423
10. S.P.Sundar Singh Sivam, V.G.UmaSekar, K.Saravanan, S RajendraKumar, P.Karthikeyan, K.SathiyaMoorthy, “Frequently used
Anisotropic Yield Criteria for Sheet Metal Applications: A Review”, Indian Journal of Science and Technology. Indian Journal of Science
and Technology. Volume 9, Issue 47, December 2016. DOI: 10.17485/ijst/2015/v8i1/92107. 11. Gupta, M., Kumar, S.,2013.Multi-objective optimization of cutting parameters in turning using grey relational analysis, International
Journal of Industrial Engineering Computations 4, 547-558.
12. Fung, C. P., 2003.Manufacturing process optimization for wear property of fiber-reinforced polybutylene terephthalate composites with
grey relational analysis, Wear 254, 298–306.
13. Gopalsamy, B. M., Mondal, B. and Ghosh, S., 2009.Optimisation of machining parameters for hard machining: grey relational theory
approach and ANOVA, International Journal of Advanced Manufacturing Technology 45, 1068–1086. 14. Dewangan, S., Biswas, C. K., 2013. Optimization of machining parameters using grey relation analysis for EDM with impulse flushing,
International Journal for Mechatronics and Manufacturing Systems 6, 144-158.
15. S.P. Sundar Singh Sivam, M.Gopal, S.Venkatasamy, Siddhartha Singh, “An Experimental Investigation And Optimisation Of Ecological Machining Parameters On Aluminium 6063 In Its Annealed And Unannealed Form”, Journal Of Chemical And Pharmaceutical Sciences.
Page No Page (46 – 53), 2015.
16. Sivam, S.P.S.S., UmaSekar, V.G., Saravanan, K., RajendraKumar, S., Karthikeyan, P. and SathiyaMoorthy, K. (2016b) ‘Frequently used anisotropic yield criteria for sheet metal applications: a review’, Indian Journal of Science and Technology, December, Vol. 9, No. 47,
DOI: 10.17485/ijst/2015/v8i1/92107.
17. S.P. Sundar Singh Sivam, Mrinal Deepak Ji Bhat, Shashank Natarajan, Nishant Chauhan.” Analysis of residual stresses, thermal stresses, cutting forces and other output responses of face milling operation on ze41 magnesium alloy." International Journal of Modern
Manufacturing Technologies, Pp. No 92-100. ISSN 2067–3604, Vol. X, No. 1 / 2018.
18. Sivam, S. P. S. S., Saravanan, K., Pradeep, N., Moorthy, K. and Rajendrakumar, S. “The Grey Relational Analysis and Anova to Determine the Optimum Process Parameters for Friction Stir Welding of Ti and Mg Alloys”, Periodica Polytechnica Mechanical Engineering. doi:
https://doi.org/10.3311/PPme.12117.
19. P. Sundar Singh Sivam, S., Saravanan, K., Pradeep, N., Rajendra Kumar, S., & Karuppiah, S. (2018). Comparison of Manufacturing Data Analysis For 5 & 3-Axis Vertical Machining Center for the Time and Tool Benefits of Industries. International Journal of Engineering &
Technology, 7(4.5), 196-201. doi:http://dx.doi.org/10.14419/ijet.v7i4.5.20044.
20. P. Sundar Singh Sivam, S., Saravanan, K., Pradeep, N., Rajendra Kumar, S., Mathur, S., Dingankar, U., & Arora, A. (2018). Development of Vibrator Feeding Mechanism Using Two Sets of Rollers for the Separation of Ball Grading For Industry Benefits. International Journal
of Engineering & Technology, 7(4.5), 202-206. doi:http://dx.doi.org/10.14419/ijet.v7i4.5.20045
21. S. P. Sundar Singh Sivam, A. Rajasekaran, S. RajendraKumar, K. SathiyaMoorthy & M. Gopal (2019) A study of cooling time, copper reduction and effects of alloying elements on the microstructure and mechanical properties of SG iron casting during machining, Australian
Journal of Mechanical Engineering, DOI: 10.1080/14484846.2018.1560679
22. S.P. Sundar Singh Sivam, Durai Kumaran, Krishnaswamy Saravanan, Venugopal Guruswamy Umasekar, Sankarapandian Rajendrakumar, Karuppiah Sathiya Moorthy (2018) "THICKNESS DISTRIBUTION AND NUMERICAL MODELLING OF CONVENTIONAL
SUPERPLASTIC FORMING IN AA2024 ALLOY", International Journal of Modern Manufacturing Technologies, ISSN 2067–
3604,76,85, Vol. X, No. 2 / 2018 23. S. P. S. S. Sivam, S. RajendraKumar, S. Karuppiah and A. Rajasekaran, "Competitive study of engineering change process management in
manufacturing industry using product life cycle management — A case study," 2017 International Conference on Inventive Computing and
Informatics (ICICI), Coimbatore, 2017, pp. 76-81. doi: 10.1109/ICICI.2017.8365247.
77.
Authors: Brijesh Kumar, Niraj Kumar Shukla, Sunil Kumar Sinha, Ajay Shekhar Pandey
Paper Title: Autotransformer Connected 24 Pulse AC-DC Converter for Vector Controlled Induction Motor Drive:
A Matlab Simulation
Abstract: This paper deals with the steady state performance analysis of an autotransformer based 24- pulse ac-
dc converter feeding variable frequency vector controlled squirrel cage induction motor drives at different
mechanical load and constant reference speed. These variable frequency induction motor drives are generally
operated in vector controlled mode due to their inherent advantages. There are three new elements which are added
in the proposed model, first is three single phase autotransformers for phase shifting of 3-phase supply, second one
is 24-pulse converter to eliminate the harmonics injected to the source and third one is interphase transformers to
ensure the independent operation of the rectifier circuits. The feedback closed loop control system is used to
control the speed of the induction motor, which has highly nonlinear torque-speed characteristics. This simulation
is done to analyse the parameters of ac electric drive in terms of settling time, steady state error and overshoot. The
simulation results show that the speed control performance reduces the steady state error and maximum overshoot
under different load conditions.
Keywords: Vector Controlled Induction Motor, PWM Inverter, Autotransformer, Interphase Transformers, FOC.
References: 1. G. Seguier’ “Power electronic Converters: AC-DC Conversion,” McGraw Hill Book Company, New York, 1987.
2. B. K. Bose, “Modern Power Electronics and AC Drives”, Pearson Education, New Delhi,2001.
3. Dr. P. S. Bimbhra “Electrical machinery”, Khanna Publishers, Delhi. 4. J. Maslin, Sharon, G. F. Jones and Irwin “Electrical Induction Apparatus”, US Patent 2,307,527, Jan. 5, 1943.
5. D. A. Paice, “Power Electronic Converter Harmonics: Multipulse Methods for Clean Power”, IEEE Press, New York, 1996.
6. Mohamed E. El-Hawary “Principles of Electric Machines with Power Electronic applications,” Prentice- Hall.USA,1986. 7. D.A. Paice, “Wye connected 3-phase to 9-phase autotransformer with reduced winding currents,” U.S. Patent No. 6,191,968 B1, Feb. 20,
2001.
8. L. Chen and G. K. Horng, “A new passive 28-step current shaper for three- phase rectification,” IEEE Trans. on Industrial Electronics, Vol.47, No.6, Dec.2000, pp. 1212-1219.
9. Singh, G. Bhuvaneshwari and Vipin Garg, “A Twelve- Phase AC-DC Converter for Power Quality Improvements in Direct Torque
Controlled Induction Motor Drives”, in Proc. Of Conf. IEEE- ICIEA 2006, May 2006, pp.257-263. 10. V. A. Boshnyaga, L.P. Kalinin and V.M. Postolaty, “Phase- Shifter”, US Patent 4,013,942, March 22, 1977.
11. Muhammad H. Rashid A Hand book of “Power Electronics, Circuits, Devices and Applications” Prentice-HallTM, New Delhi, 110017.
12. R. Krishnan, “Electric Motor Drives: Modeling, Analysis, and Control, “Prentice-Hall of India, New Delhi, 2003. 13. Gopal K. Dubey “Fundamentals of Electric Drives,”. Narosa Publishing house. New delhi,2005.
14. Ion Boldea and S. A. Nasar “Electric drives,” CRC Press, USA. 2006. 15. SINGH B., GARG V., BHUVANESWARI G.: ‘24-pulse ac–dc converter for harmonic mitigation, IET Power Electron., 2009, 2, (4), pp.
364–377
16. SINGH B., BHUVANESWARI G., GARG V.: ‘Polygon connected Autotransformer based 24-pulse converter for harmonic mitigation’.Pending Indian Patent, filed January 2006
17. Goran Rafajlovski and Krste Najdenkoski, “Trends in controlling high performance induction motor drives”, Republic of Macedonia.
424-429
18. Dal Y. Ohm, “Dynamic model of Induction Motors for vector control” Drivetech, Inc., Blacksburg, Virginia.
19. IEEE Standard 112-1991, "IEEE Standard Test Procedure for Polyphase Induction Motors and Generators", Institute of Electrical and
Electronics Engineers, Inc. 20. B.L. Theraja and A.K. Theraja “A Text book of electrical technology”, Volume II S. Chand & Company LTD, New Delhi.
78.
Authors: Y. Srinivasa Rao, Mohammed Ali Hussain
Paper Title: Adaptive Quality of Service Medium Access Control protocol for IEEE 802.11 based Mobile Ad hoc
Network
Abstract: Mobile ad hoc network is an infrastructure less wireless multi hop network with heterogeneous
mobile nodes dispersed in wireless communication zone. MANET has different application in different fields, due
to its distributed, adaptive and self-formation capabilities. Providing quality of service communication is one of the
important considerable issue in MANET. One of the major facto to achieve the QoS communicates is efficient
MAC protocol. This paper defines a adaptive – QoS MAC protocol (AQMP) for IEEE 802.11 based MANET.
AQMP protocol improve the QoS based on majorly four considerations I). Prioritize the nodes based on their
network load, II). Assignment of nodes for medium access, III). Prioritize the traffic based on their sensitivity, and
IV). Assignment of MAC settings to prioritized traffic. Performance results indicates that proposed MAC protocol
out perform in comparison with existing adaptive MAC protocols.
Keywords: MANET, QoS, MAC, Priority, access categoty and simulation.
References: 1. Mohammad, A. A. K., Mahmood, A. M., & Vemuru, S. “Providing Security Towards the MANETs Based on Chaotic Maps and Its
Performance”, In Microelectronics, Electromagnetics and Telecommunications (pp. 145-152). Springer, (2019)
2. Rao, Y. Srinivasa, and Mohammed Ali Hussain. "Dynamic MAC Protocol to Enhancing the Quality of Real Time Traffic in MANET Using Network Load Adaptation." 1612-1617, (2018)
3. Neeraja, Y., V. Sumalatha, and Sd Muntaz Begum. "Comprehensive Survey of Medium Access Control Protocols for MANETs."
International Journal of Emerging Trends & Technology in Computer Science 2, no. 3 (2013) 4. Holt, Charles C. "Forecasting seasonals and trends by exponentially weighted moving averages." International journal of forecasting 20, no.
1: 5-10. (2004)
5. Draft, I. T. U. T. "recommendation and final draft international standard of joint video specification (ITU-T Rec. H. 264| ISO/IEC 14496-10 AVC)." Joint Video Team (JVT) of ISO/IEC MPEG and ITU-T VCEG, JVTG050 33, (2003)
6. Marwaha, S., Indulska, J. and Portmann, M., , December. Challenges and recent advances in QoS provisioning, signaling, routing and MAC
protocols for MANETs. In Telecommunication Networks and Applications Conference, 2008. ATNAC 2008. Australasian (pp. 97-102), (2008)
7. Dhilip Kumar V, Vinoth Kumar V ,Kandar D, “Data Transmission Between Dedicated Short Range Communication and WiMAX for
Efficient Vehicular Communication” Journal of Computational and Theoretical Nanoscience,Vol.15,No.8,pp.2649-2654, (2018)
8. Lee, Sunghee, and Kwangsue Chung. "The study of dynamic video frame mapping scheme for multimedia streaming over IEEE 802.11 e
WLAN." International Journal of Multimedia and Ubiquitous Engineering 8, no. 1: 163-174, (2013) 9. Choi, Sunghyun, Javier Del Prado, and Stefan Mangold. "IEEE 802.11 e contention-based channel access (EDCF) performance evaluation."
In Communications, 2003. ICC'03. IEEE International Conference on, vol. 2, pp. 1151-1156. IEEE, (2003).
10. Mangold, Stefan, Sunghyun Choi, Guido R. Hiertz, Ole Klein, and Bernhard Walke. "Analysis of IEEE 802.11 e for QoS support in wireless LANs." IEEE wireless communications 10, no. 6 (2003): 40-50.
11. Lucas, James M., and Michael S. Saccucci. "Exponentially weighted moving average control schemes: properties and enhancements."
Technometrics 32, no. 1 : 1-12. (1990) 12. Benyassine, Adil, Eyal Shlomot, H-Y. Su, Dominique Massaloux, Claude Lamblin, and J-P. Petit. "ITU-T Recommendation G. 729 Annex
B: a silence compression scheme for use with G. 729 optimized for V. 70 digital simultaneous voice and data applications." IEEE
Communications Magazine 35, no. 9 : 64-73. (1997) 13. Schwarz, Heiko, Detlev Marpe, and Thomas Wiegand. "Overview of the scalable video coding extension of the H. 264/AVC standard."
IEEE Transactions on circuits and systems for video technology 17, no. 9 : 1103-1120. (2007)
14. Issariyakul, Teerawat, and Ekram Hossain. "Introduction to Network Simulator 2 (NS2)." In Introduction to Network Simulator NS2, pp. 21-40. Springer, Boston, MA, 2012.
15. Rao, Y. Srinivasa, and Mohammed Ali Hussain. "Analytical Approach to Estimate the occurrence of bottleneck node in multi hop
communication Network",IJRECE ,Vol.7,Issue1,ISSN:2393-9028, (2019)
430-433
79.
Authors: Anju Kalwar, Reema Ajmera, C.S. Lamba
Paper Title: An Empirical Study in Small Firms for Web Application Development and Proposed New Parameters
for Develop New Web Application Model
Abstract: Over The last ten decades, the web application has imposed a great impact on the modern society. In
companies and in other sectors of development many web development methodologies are being implemented on
a daily basis for the development out of which some are being customized by the company itself . In this paper, I
was surveyed many web development companies and fill the survey form using some parameters and find new
parameters developing the new web application model.
Keywords: Web Application; Model; Empirical Study
References: 1. Fayad ME, Laitinen M, Ward RP. Thinking objectively: software engineering in the small. Communications of the ACM. 2000 Mar
1;43(3):115-8.
2. Hofer, C., 2002. Software development in Austria: results of an empirical study among small and very small enterprises. In Euromicro Conference, 2002. Proceedings. 28th (pp. 361-366). IEEE.
3. C. Y. Laporte, A. Renault, J. Desharnais, N.Habra, M. Abou El Fattah, and J. Bamba, In Proc. SWDC-REK, (2005), 153–163
4. Dangle, K.C., Larsen, P., Shaw, M. and Zelkowitz, M.V., 2005. Software process improvement in small organizations: a case study. IEEE software, 22(6), pp.68-75.
5. Ahmad, F., Baharom, F. and Husni, M., 2012. Investigating the Awareness of Applying the Important Web Application Development and
Measurement Practices in Small Software Firms. arXiv preprint arXiv:1201.1967. 6. R KETTELERIJ, Faculty of Science, University of Amsterdam, www.science.uva.n, (2006).
7. Eldai, O.I., Ali, A.H.M.H. and Raviraja, S., 2008. Towards a new methodology for developing web-based systems. World Academy of
434-436
Science, Engineering and Technology, 46, pp.190-195.
8. Mujumdar, A., Masiwal, G. and Chawan, P.M., 2012. Analysis of various software process models. International Journal of Engineering
Research and Applications, 2(3), pp.2015-2021.
80.
Authors: S.P. Sundar Singh Sivam, Ganesh Babu Loganathan, K. Saravanan, S. RajendraKumar
Paper Title: Multi-Response Enhancement of Drilling Process Parameters for AM 60 Magnesium Alloy as per the
Quality Characteristics utilizing Taguchi-Ranking Algorithm and ANOVA
Abstract: This investigation shows the improvement of Drilling parameters on AM-60 Mg alloy made with
the help of Gravity Die Casting and with reactions upheld symmetrical cluster with Grey relational analysis -
GRA. Which Focuses on the streamlining of Drilling constraints utilizing the system to get least surface
Roughness (Ra), Tool Wear, Cutting Time, Power Requirement and Torque and Max MRR. Concentrates on the
optimization of drilling constraints utilizing the procedure to get minimum surface roughness (Ra), Thrust Force,
Burr size and Circularity Error. An amount of drilling experiments remained conducted mistreatment the L9 OA
on CNC Machining Center. The trails remained achieved on Mg alloy block cutting tool of an ISO 460.1-1140-
034A0-XM GC3 of 12 mm diameter with Tool Angle 140 degrees, used throughout the experimental work
beneath dry cutting conditions. This experimental study results like Ra, TF, CE, and BZ were analyzed. GRA &
ANOVA was utilized to effort out the principal essential Spindle speed, feed rate, Titanium Coated for Drill Bits
(TiN, TiAN, TiCN) with 0.020 in Coating Thickness manipulating the Reaction. The essential and collaboration
effect of the data influences on the ordinary responses remain analyzed. The standard qualities and projected
values are truly near.
Keywords: AM 60, Dry Drilling, Grey relational Analysis Taguchi method
References: 1. Davim JP (2003) Study of drilling metal-matrix composites based on the Taguchi Techniques. J Mater Process Technol 132:250– 254
2. Tosun G, Mehtap Muratoglu (2004) The drilling of Al/SiCp metal matrix composites. Part I: Microstructure, Compos Sci Tech 64: 209–308
3. Tosun G, MehtapMuratoglu (2004) The drilling of Al/SiCp metal matrix composites. Part II: Work piece Surface integrity, Compos Sci
Tech 64:1413–1418 4. Davim JP (2003) Design of optimization of cutting parameters for turning metal matrix composites based on the orthogonal arrays. J Mater
Process Technol 132:340–344
5. Manna A, Bhattacharayya B (2003) A study of machinability of Al-SiC metal matrix Composites. J Mater Process Technol 140: 711–716 6. Mohan NS, Ramachandra A, Kulkarni SM (2005) Influence of Process parameters on cutting force and torque during drilling of glass-fiber
polyester reinforced composites. Compos Struct 71:407– 413
7. Tosun N (2006) Determination of optimum parameters for multiperformance characteristics in drilling by using grey relational analysis. Int J Adv Manuf Technol 28:450–455
8. Lin CL, Lin JL, Ko TC (2002) Optimization of the EDM Process based on the orthogonal array with fuzzy logic and
9. Grey relational analysis method. Int J AdvManufTechnol 19: 271–277 10. Deng J (1989) Introduction to grey system. Grey Syst 1:1–24
11. Jeyapaul R, Shahabudeen P, Krishnaiah K (2005) Quality management research by considering multi-response problems in the Taguchi
method - a review. Int J AdvManufTechnol 26: 1331–1337 12. Multi response optimization of machining parameters of drilling Al/SiC metal matrix composite using grey relational analysis in the
Taguchi method 2007, A. NoorulHaq &P. Marimuthu &R. Jeyapaul, Int J AdvManufTechnol (2008) 37:250–255, DOI 10.1007/s00170-
007-0981-4. 13. SIVAM, S. P. Sundar Singh et al.”Multi Response Optimization of Setting Input Variables for Getting Better Product Quality in Machining
of Magnesium AM60 by Grey Relation Analysis and ANOVA." Periodica Polytechnica Mechanical Engineering, [S.l.], 2017. ISSN 1587-
379X. https://doi.org/10.3311/PPme.11034 14. Sivam, S.P.S.S et al.,, , An Experimental Investigation And Optimisation Of Ecological Machining Parameters On Aluminium 6063 In Its
Annealed And Unannealed Form, Journal Of Chemical And Pharmaceutical Sciences. Page No Page (46 – 53), 2015.
15. Sivam, S.P.S.S et al.,, 2015, “Application of Forming Limit Diagram and Yield Surface Diagram to Study Anisotropic Mechanical Properties of Annealed and Unannealed SPRC 440E Steels”. Journal of Chemical and Pharmaceutical Sciences. ISSN: 0974-2115, Page No
(15 – 22).
16. Sivam, S.P.S.S et al.,. (2016). Investigation exploration outcome of heat treatment on corrosion resistance of AA 5083 in marine application. Journal of Science and Technology. 14 : 453-460.14 (S2), 2016, ISSN 0972-768X.
17. Sivam, S.P.S.S., Umasekar, V.G., Mishra, A., Mishra, S. and Mondal, A. (2016) ‘Orbital cold forming technology – combining high
quality forming with cost effectiveness – a review’, Indian Journal of Science and Technology, October, Vol. 9, No. 38, DOI: 10.17485/ijst/2016/ v9i38/91426.
18. Sivam, S.P.S.S et al.,. (2016) ‘Frequently used anisotropic yield criteria for sheet metal applications: a review’, Indian Journal of Science
and Technology, December, Vol. 9, No. 47, DOI: 10.17485/ijst/2015/v8i1/92107. 19. S.P. Sundar Singh Sivam et al,.” Analysis of residual stresses, thermal stresses, cutting forces and other output responses of face milling
operation on ze41 magnesium alloy." International Journal of Modern Manufacturing Technologies, Pp. No 92-100. ISSN 2067–3604, Vol.
X, No. 1 / 2018. 20. Sivam, S. P. S. S et al., “The Grey Relational Analysis and Anova to Determine the Optimum Process Parameters for Friction Stir Welding
of Ti and Mg Alloys”, Periodica Polytechnica Mechanical Engineering. doi: https://doi.org/10.3311/PPme.12117.
21. P. Sundar Singh Sivam et al, S., (2018). Comparison of Manufacturing Data Analysis For 5 & 3-Axis Vertical Machining Center for the Time and Tool Benefits of Industries. International Journal of Engineering & Technology, 7(4.5), 196-201.
doi:http://dx.doi.org/10.14419/ijet.v7i4.5.20044.
22. P. Sundar Singh Sivam et al, (2018). Development of Vibrator Feeding Mechanism Using Two Sets of Rollers for the Separation of Ball Grading For Industry Benefits. International Journal of Engineering & Technology, 7(4.5), 202-206.
doi:http://dx.doi.org/10.14419/ijet.v7i4.5.20045
23. S. P. Sundar Singh Sivam et al, (2019) A study of cooling time, copper reduction and effects of alloying elements on the microstructure and mechanical properties of SG iron casting during machining, Australian Journal of Mechanical Engineering, DOI:
10.1080/14484846.2018.1560679
24. S.P. Sundar Singh Sivam et al, (2018) "THICKNESS DISTRIBUTION AND NUMERICAL MODELLING OF CONVENTIONAL SUPERPLASTIC FORMING IN AA2024 ALLOY", International Journal of Modern Manufacturing Technologies, ISSN 2067–
3604,76,85, Vol. X, No. 2 / 2018 25. S. P. S. S. Sivam et al, "Competitive study of engineering change process management in manufacturing industry using product life cycle
management — A case study," 2017 International Conference on Inventive Computing and Informatics (ICICI), Coimbatore, 2017, pp. 76-
81. doi: 10.1109/ICICI.2017.8365247.
437-440
81.
Authors: D. Krishna Madhuri
Paper Title: A Machine Learning based Framework for Sentiment Classification: Indian Railways Case Study
Abstract: Machine learning in the field of computer science is the application of Artificial Intelligence (AI)
that helps in making systems intelligent. It focuses on producing algorithms that may lead to AI applications in the
real world. As enterprises are producing huge amount of data, it became indispensable to have machine learning
techniques in place for discovering business intelligence from data for strategic decision making. However, in the
contemporary era, the traditional data may be deemed inadequate for decision making. The rationale behind this is
that people of all walks of life are able to exchange ideas and opinions/sentiments over social media like Facebook
and Twitter. In other words, there is social feedback exists in Online Social Networks (OSNs). Collection of social
media data related to business and using machine learning algorithms to extract useful knowhow from such data
bestows competitive edge to enterprises. The existing literature on sentiment analysis has plenty of methods for
discovering sentiments. However, it is still an open problem to have optimizations. In this paper we proposed a
framework for discovering sentiments from tweets of Indian Railways. This is a domain specific framework which
leverages business intelligence through different classifiers such as C4.5, Naive Bayes, SVM and Random Forest.
An evaluation procedure with measures like precision, recall, F-Measure and accuracy is provided. The empirical
study with Indian Railways case study revealed that the proposed framework is useful in sentiment analysis and
can be tailored to suit other domains as well. By considering the atweets of Indian Railways as a case study
evaluation is made in terms of precision, recall and F-Measure.
Keywords: Sentiment classification, machine learning, C4.5, Naive Bayes, SVM, Random Forest
References: 1. Duyu Tang, Furu Wei, Nan Yang, Ming Zhou, Ting Liu and Bing Qin. (2014). Learning Sentiment-Specific Word Embedding for Twitter
Sentiment Classification, p1555–1565.
2. Duyu Tang, Bing Qin and Ting Liu. (2015). Document Modeling with Gated Recurrent Neural Network for Sentiment Classification, p1422–1432.
3. Abinash Tripathy, Ankit Agrawal and Santanu Kumar Rath. (2016). Classification of sentiment reviews using n-gram machine learning
approach. elsever, p117–126. 4. Xiang Zhang, Junbo Zhao and Yann LeCun. (2015). Character-level Convolutional Networks for Text Classification, p1-9.
5. Leona Yi-Fan Su, Michael A. Cacciatore, Xuan Liang, Dominique Brossard, Dietram A. Scheufele and Michael A. Xenos. (2016).
Analyzing public sentiments online combining human- and computer-based content analysis. Information, Communication & Society, p1-24.
6. Lei Zhang, Riddhiman Ghosh, Mohamed Dekhil, Meichun Hsu and Bing Liu . (2011). Combining Lexicon-based and Learning-based
Methods for Twitter Sentiment Analysis, p1-9. 7. Zhiyuan Chen, Nianzu Ma and Bing Liu. (2018). Lifelong Learning for Sentiment Classification, p1-8.
8. Navonil Majumder, Soujanya Poria, Alexander Gelbukh and Erik Cambria . (2017). Deep Learning-Based Document Modeling for
Personality Detection from Text. iEEE iNTElliGENT SYSTEmS, p74-79.
9. Mehdi Allahyari. (2017). A Brief Survey of Text Mining Classification, Clustering and Extraction Techniques. KDD Bigdas, p1-13.
10. Maria Giatsoglou. (2017). Sentiment analysis leveraging emotions and word embeddings. elsever, p214–224.
11. Aytug˘ Onan and Serdar Korukog˘lu. (2017). A feature selection model based on genetic rank aggregation for text sentiment classification. Journal of Information Science. 43 (1), p25–38.
12. Yafeng Ren, Yue Zhang, Meishan Zhang and Donghong Ji. (2016). Context-Sensitive Twitter Sentiment Classification Using Neural
Network, p1-7. 13. Soujanya Poria, Erik Cambria, Grégoire Winterstein and Guang-Bin Huang. (2014). Sentic patterns: Dependency-based rules for concept-
level sentiment analysis. Elsever, 69, p45–63.
14. Shuhua Monica Liu and Jiun-Hung Chen. (2015). A multi-label classification based approach for sentiment classification. elsever . 42, p1083–1093.
15. Weiyuan Li and Hua Xu . (2013). Text-based emotion classification using emotion cause extraction. elsever, p1-8.
16. Xavier Glorot. (2011). Domain Adaptation for Large-Scale Sentiment Classification A Deep Learning Approach, p1-8. 17. Richard Socher, Alex Perelygin, Jean Y. Wu, Jason Chuang, Christopher D. Manning, Andrew Y. Ng and Christopher Potts. (2013).
Recursive Deep Models for Semantic Compositionality Over a Sentiment Treebank, p1631–1642.
18. Alexander Pak and Patrick Paroubek. (2013). Twitter as a Corpus for Sentiment Analysis and Opinion Mining, p1320-1326. 19. Mike Thelwall, Kevan Buckley, Georgios Paltoglou and Di Cai . (2012). Sentiment Strength Detection in Short Informal Text. Journal of
the American Society for Information Science and Technology. 61 (12), p2544–2558.
20. Andrew L. Maas, Raymond E. Daly, Peter T. Pham, Dan Huang, Andrew Y. Ng and Christopher Potts. (2011). Learning Word Vectors
for Sentiment Analysis, p142–150.
21. Tetsuji Nakagawa. (2010). Dependency Tree-based Sentiment Classification using CRFs with Hidden Variables, p786–794.
22. Long Jiang, Mo Yu, Ming Zhou, Xiaohua Liu and Tiejun Zhao. (2011). Target-dependent Twitter Sentiment Classification, p151–160. 23. Xiaolong Wang. (2011). Topic Sentiment Analysis in Twitter: A Graph-based Hashtag Sentiment Classification Approach. ACM, p1-10.
24. G.Vinodhini and RM.Chandrasekaran. (2012). Sentiment Analysis and Opinion Mining: A Survey. International Journal of Advanced Research in Computer Science and Software Engineering. 2 (6), p1-11.
25. Efstratios Kontopoulos . (2013). Ontology-based sentiment analysis of twitter posts. elsever, p4065–4074.
26. Yan Dang, Yulei Zhang, and Hsinchun Chen. (2010). A Lexicon-Enhanced Method for Sentiment Classification: An Experiment on Online Product Reviews. IEEE, p1-8.
27. Xia Hu, Lei Tang, Jiliang Tang and Huan Liu. (2013). Exploiting Social Relations for Sentiment Analysis in Microblogging. ACM, p1-
10. 28. Morteza Babaie. (2011). Classification and Retrieval of Digital Pathology Scans: A New Dataset. IEEE, p1-10.
29. Soujanya Poriaa. (2017). Ensemble application of convolutional neural networks and multiple kernel learning for multimodal sentiment
analysis. elsever, p217–230.
441-445
82.
Authors: P. Anusha, G. Kalpana, T. Vigneswaran
Paper Title: FPGA Implementation of Logarithmic Multiplier
Abstract: logarithmic multiplier is the vital procedure mainly for DSP, image processing and 3-D graphic
applications. Log multiplier converts the multiplication into addition; hence it will reduce the number of
computation steps to speed up the multiplication. In multiplication process, the reduction of partial products
contributes most to the overall delay, power and area. Adder Compressors are employed to reduce the latency of
446-449
this step. Analysis is done by coding the designs in HDL and synthesized with Xilinx ISE 14.7 using Virtex6 or
spartan3 series of FPGA. Optimized architectures are synthesized using Encounter RTL Compiler Tool in Cadence
and obtained the reports on power and area. The results indicate the better speed high performance and overall
efficiency of logarithmic multiplication
Keywords: LNS (logarithmic number systems), Arithmetic circuit, multiplication, LUT, Mitchell.
References: 1. Bansal Y, Madhu C and Kaur P. (2014 ) High speed Vedic multiplier designs-A review on IEEE Recent Advances in Engineering and
Computational Sciences (RAECS), (pp. 1-6). 2. M. Fonseca (2011) “Design of Pipelined Butterflies from Radix-2 FFT with Decimation in Time Algorithm using Efficient Adder
Compressors,” in Circuits and Systems (LASCAS), IEEE Second Latin American Symposium on, feb. 2011, pp. 1-4
3. John N Mitchell.(1962) Computer multiplication and division using binary logarithms. IRE Transactions on Electronic Computers, (4):pp. 512-517.
4. V. Mahalingam, N. Rangantathan, (2006) Improving Accuracy in Mitchell’s Logarithmic Multiplication Using Operand Decomposition,
IEEE Transactions on Computers, Vol. 55, No. 2, pp. 1523-1535 5. Ellaithy DM, El. Moursy MA, Ibrahim GH, Zaki A and Zekry (2017) A. Double Logarithmic Arithmetic Technique for Low-Power 3-D
Graphics Applications. IEEE Transactions on Very Large Scale Integration (VLSI) Systems: pp. 2144-52.
6. Ioannis Kouretas, Charalambos Basetas and Vassilis Paliouras. (2014) Low-power logarithmic number system addi- tion/subtraction and their impact on digital filters. IEEE transactions on computers, 62(11), pp. 2196-2209.
7. R. R. Selina, (2013) “VLSI implementation of piecewise approximated antilogarithmicconverter,” in Proc. Int. Conf. Commun. Signal
Process. . (ICCSP), pp. 763–766. 8. Rabaey, J.M., Chandrakasan and Nikolic, B. (2002): ‘Digital integrated circuits’ (Prentice Hall).
9. K. Johansson, O. Gustafsson and L. Wanhammar, (2008) “Implementation of elementary functions for logarithmic number systems,” IET
Comput. Digit.Tech., vol. 2, no. 4, pp. 295–304. 10. C.T. Kuo and T.B. Juang, (2012) “A lower error antilogarithmic converter using novel four-region piecewise-linear approximation,” in
Proc. IEEE Circuits Syst. Conf., vol. 2. Dec., pp. 507 510.
83.
Authors: D. Helen
Paper Title: An Energy-Efficient Routing using Fuzzy Model Based Clustering for Mobile Ad Hoc Network
Abstract: Mobile Ad hoc NETwork (MANET) is an infrastructure-less, autonomous network, the nodes are
connected through the wireless multi-hop links. The absence of infrastructure and dynamic environment demands
to form a new set of routing protocol for MANET. Routing is a main issue in MANET due to its mobility and
inadequate resource availability. Especially, energy-efficient routing is essential because every node is operated by
exhausted battery power. Power failure of an individual node partitioned the entire network architecture. So,
routing in MANET shall use the available battery energy in an effective way to enhance the network lifetime. The
Fuzzy Model-based Clustering (FMC) algorithm recognizes the reliable and loop-free route between the nodes by
choosing an optimal cluster head. The FMC uses the speed, residual energy and signal strength as factors in order
to find the efficient cluster head. The nodes are implementing the fuzzy logic mechanism to estimate the node
cost. The node with the highest cost is selected as cluster head. The cluster head achieves the data packet
transmission. Hence, the FMC preserves the stable network by reducing the reselection of cluster head and
minimizes the re-affiliation of all the nodes in the cluster. The FMC algorithm maintains the packet delivery ratio,
average delay, energy consumption by 87.3%, 17.5 %, and 25.83% respectively, over the existing AODV and
FCESRB protocols.
Keywords: autonomous, clustering, fuzzy logic, signal strength.
References: 1. Adebanjo Adekiigbe. A and Kamalrulnizam Abu Bakar. K (2013),” Using Fuzzy Logic to Improve Cluster Based Routing Protocol in
Mesh Client Networks”, International Journal of Innovative Computing, Vol.3, No.2, pp. 1-11.
2. Beongku An. B and Symeon Papavassiliou. S (2001),” A Mobility-Based Clustering Approach To Support Mobility Management And Multicast Routing In Mobile Ad-Hoc Wireless Networks”, International Journal of Network Management, Vol.11, No.6, pp. 387-395.
3. Deny J, Sundhararajan M (2016),” Performance assessment and comparisons of single and group mobility in MANET,Insdian Journal of
Science and Technology Vol.9, No.21,pp.1–6. 4. Floriano De Rango.F, Francesca Guerriero.F and Peppino Fazio.P (2012), “Link-stability and energy aware routing protocol in distributed
wireless networks”, IEEE Transaction Parallel Distributed System, Vol.23, No.4, pp.713-726.
5. Ghosekar. P, Katkar. G and Ghorpade. P (2010),” Mobile Ad Hoc Networking: Imperatives and Challenges”, International Journal of Computer Applications, Special Issue on “Mobile Ad-Hoc Networks”, pp. 153-158.
6. Hakan Bagci. H, Adnan Yazici.A (2010),”An Energy Aware Fuzzy unequal Clustering Algorithm for Wireless Sensor Networks, In
Proceedings of IEEE World Congress on Computational Intelligence, Barcelona, Spain. 7. Heinzelman. W, Chandrakasan. A and Balakrishnan. H (2000),” Energy Efficient Communication Protocol for Wireless Microsensor
Networks”, Proceeding of the 33rd annual Hawaii International Conference on System Sciences Vol.8, pp.1–10. 8. Helen D, Arivazhagan (2016),” An Intelligent Energy Efficient Routing Protocol for Mobile Ad-Hoc Network”, Indian Journal of
Science and Technology, Vol 9. No.45,pp.1-5
9. Jeoren Hoebeke. J, Ingrid Moerman.I, Bart Dhoedt.B and Piet Demester.P (2004),” An Overview of Mobile ad hoc Networks: Applications &Challenges”, Journal of the Communications Network, Vol.3, No.3, pp.60-66.
10. Jiang. M, Li. J. and Tay. Y. C, (1999), “Cluster Based Routing Protocol (CBRP)”, IETF, Internet draft.
11. Larki.F.A, Seyed. J. M and Harounabadi .A (2014), “Increased Longevity of Wireless Ad hoc Network through Fuzzy System”, Decision Science Letters, Vo.3, No.3, pp. 1-9.
12. Muneer Bani Yassein.M, Naveen Hijazi.N,” Improvement On Cluster Based Routing Protocol Using Vice Cluster Head”, In Proceeding
of 4th International Conference on Next Generation Mobile Application, Services And Technologies, pp.137-141. 13. Sahar Adabi.S,Sam Jabbehdari.S, Ali Rezaee,”Distributed Fuzzy Score Based Clustering Algorithm For Mobile Ad Hoc Network. In
Proceeding of 3rd IEEE Asia-Pacific Services Computing Conference, pp.193-198.
14. Saleh Ali Al-Omari.K, Putra Sumari.P (2010), “ An overview of Mobile Ad hoc networks for existing protocols and applications”,
International journal on applications of graph theory in wireless ad hoc networks and sensor networks, Vol.2,No.1, pp.87-110.
15. Shayesteh Tabatabaei.S,Mohammad Teshnehlab.M,syed Javad Mirabedini.S(2015),“Fuzzy-Based Routing Protocol to Increase
Throughput in Mobile Ad Hoc Networks”, Wireless Personal communications, Vol.84,No.4 , pp. 2307–2325.
450-454
16. Shanthi HJ and Marie Anita E (2014),” Performance analysis of black hole attacks in geographical routing MANET”, International
Journal of Engineering and Technology (IJET) vol.6,No.5,pp-2382-2387.
84.
Authors: R. Srinivasan, S. Poongavanam , R. Vettriselvan, J. Rengamani, Fabian Andrew James
Paper Title: Network Optimization for Distribution of South Based OEM’s Passenger Vehicles to other Zones of
India with Reduced Lead-Time
Abstract: A survey conducted among top auto makers in India highlighted the fact that technology is widely sent
to be a supply chain enable, reducing inventory levels and stocking, shortening lead times and fostering as sprit of
collaboration with suppliers and dealers. IT Managers indicate lack of alignment between business goals and it
implementation plans in majority of the companies. Although it found that there is a high awareness among Indian
Tier-1 companies regarding lead time. The usage of productive enhancing tools such as data analytics, ERP, rivet
care still at low levels specially among Tier-2 suppliers due to challenges such as cultural, financial, organizational
and technological barriers to be overcome majority of the maimed at improving service levels. E-payment and
clearance facilities and enhancing visibility leading to be after coordination and reducing on core activities, vendor
base rationalization at all echelons of the supply chain.
Keywords: Lead time, Network Optimization, OEM, Passenger, Vehicle
References: 1. Rajasekar D (2017). A study on motivation level of employees in automobile industry, International journal of Mechanical engineering
and technology, 8(12), pp744- 749.
2. Shameem A (2017). Innovative strategy for launch of new brand of cement, International journal of Mechanical engineering and
technology,8(5), pp 411- 417.
3. Nishant Kaushik, Executive- Business Development Wallenius Wilhelmsen Logistics (India) Pvt. Ltd
4. Saranya.S Human Resource Manager Wallenius Wilhelmsen Logistics (India) Pvt. Ltd
5. Industry report 2014
6. Society of Indian Automobile Industry (SIAM)
7. State Transport Authority (Tamil nadu)
8. Vettriselvan R., Ruben Anto., & Jesu Rajan FSA (2018), Rural lighting for energy conservations and sustainable development,
International Journal of Mechanical Engineering and Technology, 9(7):604-611.
455-458
85.
Authors: Arif Sari, Samson Oluwaseun Fadiya, Acheme Okolobia Odeh.
Paper Title: A Rumor Algorithm Propagation Considering Block Omission in a Blockchain System
Abstract: In this article we experimented the rumor spreading algorithm of data propagation in a blockchain
system with specific focus on the block omission rate. The algorithm introduced here was modeled and simulated
by a new class of extended Petri nets called “Elementary nets”. This type of nets is suitable for the representation
of the functions of an information system. The descriptive and analytical power of the elementary net was
employed in this article to model and perform simulation experiments to measure the omission rates of blocks
propagated in the blockchain network using the rumor algorithm. The aim of the research is to model and simulate
block data propagation in the blockchain system considering block omission. The modified rumor algorithm for
the blockchain system was proposed in our Ph.D. thesis with the introduction of a switching module that regulate
block dissemination in the model. The result of our research shows a steady decline in the block omission rates
with increasing number of nodes. This is a very significant criteria in the implementation of a reliable and scalable
block propagation scheme for the blockchain system.
Keywords: Blockchain, Block propagation, Elementary nets, Petri nets, Rumor Algorithm.
References: 1. Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. 2. Li, J. (2018). Data Transmission Scheme Considering Node Failure for Blockchain. Wireless Personal Communications, 1-16.
3. Kostin, A., & Ilushechkina, L. (2010). Modeling and Simulation of Distributed Systems:(With CD-ROM). World Scientific Publishing
Company. 4. Bahri, L., Carminati, B., & Ferrari, E. (2018). Decentralized privacy preserving services for online social networks. Online Social
Networks and Media, 6, 18-25.
5. Biswas, K., & Muthukkumarasamy, V. (2016, December). Securing smart cities using blockchain technology. In High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data
Science and Systems (HPCC/SmartCity/DSS), 2016 IEEE 18th International Conference on (pp. 1392-1393). IEEE.
6. Qin, B., Huang, J., Wang, Q., Luo, X., Liang, B., & Shi, W. (2017). Cecoin: A decentralized PKI mitigating MitM attacks. Future Generation Computer Systems.
7. Sagirlar, G., Carminati, B., Ferrari, E., Sheehan, J. D., & Ragnoli, E. (2018). Hybrid-IoT: Hybrid Blockchain Architecture for Internet of
Things-PoW Sub-blockchains. arXiv preprint arXiv:1804.03903. 8. Feng, Q., He, D., Zeadally, S., Khan, M. K., & Kumar, N. (2018). A survey on privacy protection in blockchain system. Journal of
Network and Computer Applications.
9. Karp, R., Schindelhauer, C., Shenker, S., & Vocking, B. (2000). Randomized rumor spreading. In Foundations of Computer Science, 2000. Proceedings. 41st Annual Symposium on (pp. 565-574). IEEE.
10. Danzi, P., Kalør, A. E., Stefanović, Č., & Popovski, P. (2017). Analysis of the Communication Traffic for Blockchain Synchronization
of IoT Devices. arXiv preprint arXiv:1711.00540. 11. Mattila, J. (2016). The blockchain phenomenon. ):‘Book The Blockchain Phenomenon’(Berkeley Roundtable of the International
Economy, 2016, edn.).
12. Kosba, A., Miller, A., Shi, E., Wen, Z., & Papamanthou, C. (2016, May). Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In Security and Privacy (SP), 2016 IEEE Symposium on (pp. 839-858). IEEE.
13. Zyskind, G., & Nathan, O. (2015, May). Decentralizing privacy: Using blockchain to protect personal data. In Security and Privacy
Workshops (SPW), 2015 IEEE (pp. 180-184). IEEE. 14. Zheng, Z., Xie, S., Dai, H., Chen, X., & Wang, H. (2017, June). An overview of blockchain technology: Architecture, consensus, and
future trends. In Big Data (BigData Congress), 2017 IEEE International Congress on (pp. 557-564). IEEE.
459-467
15. Cachin, C. (2016, July). Architecture of the Hyperledger blockchain fabric. In Workshop on Distributed Cryptocurrencies and
Consensus Ledgers.
16. Xu, X., Weber, I., Staples, M., Zhu, L., Bosch, J., Bass, L., ... & Rimba, P. (2017, April). A taxonomy of blockchain-based systems for architecture design. In Software Architecture (ICSA), 2017 IEEE International Conference on (pp. 243-252). IEEE.
17. Iansiti, M., & Lakhani, K. R. (2017). The truth about blockchain. Harvard Business Review, 95(1), 118-127.
18. Yasaweerasinghelage, R., Staples, M., & Weber, I. (2017, April). Predicting latency of blockchain-based systems using architectural
modelling and simulation. In Software Architecture (ICSA), 2017 IEEE International Conference on (pp. 253-256). IEEE.
19. Göbel, J., Keeler, H. P., Krzesinski, A. E., & Taylor, P. G. (2016). Bitcoin blockchain dynamics: The selfish-mine strategy in the
presence of propagation delay. Performance Evaluation, 104, 23-41. 20. Lee, V., & Wei, H. (2016, June). Exploratory simulation models for fraudulent detection in Bitcoin system. In Industrial Electronics and
Applications (ICIEA), 2016 IEEE 11th Conference on (pp. 1972-1977). IEEE.
21. Tosh, D. K., Shetty, S., Liang, X., Kamhoua, C. A., Kwiat, K. A., & Njilla, L. (2017, May). Security implications of blockchain cloud with analysis of block withholding attack. In Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid
Computing (pp. 458-467). IEEE Press.
22. Cachin, C., De Caro, A., Moreno-Sanchez, P., Tackmann, B., & Vukolic, M. (2017). The Transaction Graph for Modeling Blockchain Semantics. Cryptology ePrint Archive, Report 2017/1070.
23. Xiong, Z., Zhang, Y., Niyato, D., Wang, P., & Han, Z. (2017). When mobile blockchain meets edge computing: challenges and
applications. arXiv preprint arXiv:1711.05938.
86.
Authors: Aitbek Kakimov, Aleksandr Mayorov, Nadir Ibragimov, Gulmira Zhumadilova, Alibek Muratbayev,
Madina Jumazhanova, Zhunus Soltanbekov, Zhanibek Yessimbekov
Paper Title: Design of Equipment for Probiotics Encapsulation
Abstract: This paper describes the construction and operating principle of the probiotics encapsulation
equipment. The capsules were obtained by drop-by-drop method with different concentration of alginate (0.5, 1.0
and 1.5%) and gelatin. The viscosity of gelling liquids was measured at different temperatures. The most optimal
option is the composition of capsules containing 1% alginate and 1% gelatin, the solution should be used at a
temperature of 30-50 ° C. Capsules made from this composition have a rounded shape, equal size, soft texture,
stable for physical impact.
Keywords: encapsulation, probiotic, alginate, capsule, installation
References: 1. Bepeyeva, A., de Barros, J.M., Albadran, H., Kakimov, A.K., Kakimova, Z.K., Charalampopoulos, D, Khutoryanskiy, V.V., 2017.
Encapsulation of Lactobacillus casei into calcium pectinate‐chitosan beads for enteric delivery. Journal of food science, 82(12), pp. 2954-
2959.
2. Kakimov, A., Kakimova, Z., Mirasheva, G., Bepeyeva, A., Toleubekova, S., Jumazhanova, M., Zhumadilova, G., Yessimbekov, Z., 2017. Amino acid composition of sour-milk drink with encapsulated probiotics. Annual Research and Review in Biology, 18(1), ARRB-36079.
3. Kakimov, A.K., Mayorov, A.A., Ibragimov, N.K., Zhumadilova, G.A., 2017. Capsule forming by drop-by-drop method. Proceeding of international conference “Kazakhstan-Kholod 2017”, Almaty, Kazakhstan, pp. 107-109
4. Burgain, J., Gaiani, C., Linder, M., Scher, J., 2011. Encapsulation of probiotic living cells: From laboratory scale to industrial
applications. Journal of food engineering, 104(4), pp. 467-483. 5. Cook, M.T., Tzortzis, G., Charalampopoulos, D., Khutoryanskiy, V.V., 2012. Microencapsulation of probiotics for gastrointestinal
delivery. Journal of Controlled Release, 162(1), pp. 56-67.
6. Paques, J.P., van der Linden, E., van Rijn, C.J., Sagis, L.M., 2014. Preparation methods of alginate nanoparticles. Advances in colloid and interface science, 209; pp. 163-171.
7. Vivek, K., 2013. Use of encapsulated probiotics in dairy based foods. International Journal of Food, Agriculture and Veterinary Sciences,
3(1), pp. 188-199.
468-471
87.
Authors: K. Selvakumar , G. Pattabirani
Paper Title: A Clustered Fuzzy and Dynamically Well Organized Load Balancing Algorithm (CFDLB) for Network
Life Time Enhancement in Wireless Sensor Networks
Abstract: In recent past, wireless sensor networks have been exploited and tapped for their immense potential
as they are ideal choices for real time wireless communication applications. Nodes which form the back bone of
the wireless sensor networks (WSN) together with an efficient routing scheme define the overall efficiency of the
WSN. In recent times, research on load balancing algorithms have been investigated as the nature of incoming
traffic composed of packets of information is mostly stochastic and unpredictable in nature. Since the nodes are
limited by their power provision in the form of batteries which cannot be frequently replaced, are prone to over
utilization in transmitting all information through a single or selected nodes closest to the base station resulting in
quick drain of power supply. Hence an intelligent and efficient method of load balancing mechanism is necessary
to ensure that the work load is distributed in a more or less uniform manner resulting in ideal power saving. A
clustered fuzzy engine model is proposed in this research article which is capable of sensing the input traffic
conditions and consequently invokes the fuzzy engine to decide upon an optimal cluster head among the set of
available nodes to handle the incoming traffic. The proposed algorithm utilizes a rotational method of utilization of
cluster head (CH) to ensure that all member nodes are utilized in a uniform manner based on the incoming traffic.
The proposed algorithm has been implemented, experimented and compared in performance with LEACH, DLBA
and GLBA algorithms and the proposed hybrid approach outperforms the existing techniques in terms of average
energy consumption and load distribution.
Keywords: Wireless sensor networks, Load balancing algorithms, soft computing, fuzzy inference engine, cluster
head selection.
References:
1. Tang Yunjian, Shi Weiren, Yi Jun, Wang Yanxia (2011), “Dynamic Load-balancing Algorithm of WSN for Data Gathering
Application”, Computer Engineering and Applications, 47(6):122-126.
472-479
2. Han Zhang, Liang Li, Xin-fang Yan and Xiang Li, "A Load-balancing Clustering Algorithm of WSN for Data Gathering," 2011 2nd
International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC), Dengleng, 2011, pp.
915-918. 3. Ozdemir S, “Secure load balancing via hierarchical data aggregation in heterogeneous sensor networks.” J. Inf. Sci. Eng., vol. 25, no. 6,
pp. 1691–1705, 2009.
4. Eghbali A N and M. Dehghan (2007), “Load-balancing using multi-path directed diffusion in wireless sensor networks,” Mobile Ad-Hoc
and Sensor Networks, 44–55.
5. Meenakshi Diwakar, Sushil Kumar (2012), “An energy efficient level based Clustering routing protocol for wireless Sensor networks”
International Journal Of Advanced Smart Sensor Network Systems, 2(2):55-65. 6. Low C P, C. Fang, J. M. Ng and Y. H. Ang, "Load-Balanced Clustering Algorithms for Wireless Sensor Networks," 2007 IEEE
International Conference on Communications, Glasgow, 2007, pp. 3485-3490.
7. Robin Gulerial and Ankit Kumar Jain (2013), “Geographic load balanced routing in wireless sensor network”, International journal of computer network and information security, 8:62 – 70.
8. Petrioli C, M. Nati, P. Casari, M. Zorzi and S. Basagni, "ALBA-R: Load-Balancing Geographic Routing Around Connectivity Holes in
Wireless Sensor Networks," in IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 3, pp. 529-539, March 2014. 9. Younis O and S. Fahmy (2004), “HEED: A Hybrid, Energy- Efficient, Distributed Clustering Approach for Ad-hoc Sensor Networks,”
IEEE Transactions on Mobile Computing, 3(4):366-379.
10. Sardor Q Hojiev and Dong Seong Kim (2015), “Dynamic load balancing algorithm based on users immigration in wireless LAN”, Journal of advances in computer networks, 114 – 118.
11. Bejerano Y, S.-J. Han, and L. Li, “Fairness and load balancing in wireless LANs using association control,” IEEE/ACM Transactions on
Networking, pp. 560–573, 2007. 12. YSu Y, S. Zheng, S. Gamage and K. Li, "A Dynamic Load Balancing Routing Algorithm for Distributed Wireless Sensor Networks,"
2007 International Conference on Wireless Communications, Networking and Mobile Computing, Shanghai, 2007, pp. 2625-2628.
13. Yan T., Bi Y., Sun L., Zhu H. (2005) Probability Based Dynamic Load-Balancing Tree Algorithm for Wireless Sensor Networks. In: Lu X., Zhao W. (eds) Networking and Mobile Computing. ICCNMC 2005. Lecture Notes in Computer Science, vol 3619. Springer, Berlin,
Heidelberg
14. Ali Ghaffari and Vida Aghakhanloye Takanloo (2011), “QoS based routing protocol with load balancing for wireless multimedia sensor networks using genetic algorithm”, World applied sciences journal, 15(12): 1659 – 1666.
15. Arash Rahbari, Arash Ghorbannia Delavar (2016), “BCWSN: A dynamic load balancing algorithm for decrease in congestion cost in
wireless sensor network”, Journal of mathematics and computer science, 16:18-25. 16. Ren Song Ku and Chia Yi (2015), “A load balancing routing algorithm for wireless sensor networks based on domain decomposition”,
Ad Hoc networks, 30: 63 – 83.
17. Eslami M, J. Vahidi, M. Askarzadeh, Designing and Implementing a Distributed Genetic Algorithm for Optimizing Work Modes in Wireless Sensor Network, J. math. comput. sci., 11 (2014), 291-299.
18. Raha, Arnab & Naskar, M & Paul, Avishek & Chakraborty, Arpita & Karmakar, Anupam (2013) “A Genetic Algorithm Inspired Load
Balancing Protocol for Congestion Control in Wireless Sensor Networks using Trust Based Routing Framework (GACCTR)”, International Journal of Computer Network and Information Security, 5: 9-20.
19. Castano F, A. Rossi, M. Sevaux, N. Velasco, On the use of multiple sinks to extend the lifetime in connected wireless sensor networks,
Electron. Notes Discrete Math., 41 (2013), 77-84. 20. Modupe I A, O. O. Olugbara, A. Modupe, Minimizing Energy Consumption in Wireless Ad hoc Networks with Meta heuristics,
Procedia Comput. Sci., 19 (2013), 106 - 115.
21. Mehmood A, Z. Lv, J. Lloret, and M. M. Umar, “ELDC: an artificial neural network based energy-efficient and robust routing scheme for pollution monitoring in WSNs,” IEEE Transactions on Emerging Topics in Computing, vol. 99, p. 1, 2017
22. Kacimi R, R. Dhaou, A. L. Beylot, Load balancing techniques for lifetime maximizing in wireless sensor networks, Ad Hoc Networks,
vol 11,no8 (2013), 2172 - 2186. 23. E.Vishnupriya, T. Jayasankar and P. Maheswara Venkatesh ,SDAOR: Secure Data Transmission of Optimum Routing Protocol in
Wireless Sensor Networks For Surveillance Applications, ARPN Journal of Engineering and Applied Sciences, 10- 16( 2015), 6917-
6931. 24. K.VinothKumar, T.Jayasankar, M.Prabhakaran and V. Srinivasan, Fuzzy Logic based Efficient Multipath Routing for Mobile Adhoc
Networks, Appl. Math. Inf. Sci. vol 11, no.2, (2017), 449–455.
88.
Authors: Mohammed I. Alwanain
Paper Title: Effects of User-Awareness on the Detection of Phishing Emails: A Case Study
Abstract: In recent years, most of our daily services have been increasingly linked to the Internet, such as
online banking and online shopping, thereby making our lives more comfortable and manageable, wherever we
may be and at any time of day. However, this ubiquity of service also carries a critical security threat, which can
cost Internet users dearly. Therefore, improving Internet users’ security awareness is a matter of high importance,
especially in light of the significant growth of online services. This paper investigates the effects of security
awareness and phishing knowledge on users’ ability to detect phishing emails and websites. In this approach, two
experiments were conducted to evaluate the effects of security awareness. The results of these experiments
revealed that phishing awareness has a significant positive effect on users’ ability to distinguish phishing emails
and websites, thereby avoiding attacks.
Keywords: Anti-phishing countermeasures, online fraud, E-commerce security, online banking security,
evaluation experiments
References: 1. B. B. Gupta, N. Arachchilage, and K. Psannis, “Defending against phishing attacks: taxonomy of methods, current issues and future
directions,” Telecommun. Syst., vol. 67, no. 2, pp. 247–267, 2018.
2. A. K. Jain and B. B. Gupta, “Phishing detection: analysis of visual similarity based approaches,” Secur. Commun. Networks, vol. 2017,
no. 5421046, 2017. 3. FBI, “Annual Internet Crime Report 2017,” 2017. [Online]. Available: https://www.fbi.gov/news/stories/2017-internet-crime-report-
released-050718.
4. S. Ragan, “Senior executives blamed for a majority of undisclosed security incidents,” 2013. [Online]. Available: http://www.networkworld.com/article/2171678/data-center/senior-executives-blamed-for-a-majority-ofundisclosed-%0Dsecurity-
incidents.html.
5. A. Alnajim, “A country based model towards phishing detection enhancement,” Int. J. Innov. Technol. Explor. Eng., vol. 5, no. 1, pp. 52–
57, 2015.
6. R. Dhamija, J. D. Tygar, and M. Hearst, “Why phishing works,” in the SIGCHI conference on Human Factors in computing systems,
2006, pp. 581–590.
480-484
7. “Symantec, Mitigating Online Fraud: Customer Confidence, Brand Protection, and Loss Minimization.,” 2004. [Online]. Available:
http://www.antiphishing.org/sponsors_technical_papers/symantec_online_fraud.pdf.
8. IID, “eCrime Trends Report.” [Online]. Available: http://internetidentity.com/resources. 9. L. F. Cranor, S. Egelman, J. I. Hong, and Y. Zhang, “Phinding Phish: An Evaluation of Anti-Phishing Toolbars,” 2006.
10. A. Alnajim and M. Munro, “An evaluation of users’ tips effectiveness for Phishing websites detection,” in The third IEEE International
Conference on Digital Information Management ICDIM, 2008, pp. 63–68.
11. S. Sheng, B. Magnien, A. Kumaraguru, Ponnurangam Acquisti, L. F. Cranor, and E. Hong, Jason and Nunge, “Anti-phishing phil: the
design and evaluation of a game that teaches people not to fall for phish,” in The 3rd symposium on usable privacy and security SOUPS
’07, 2007, pp. 88 – 99. 12. P. Kumaraguru, Y. Rhee, A. Acquisti, L. F. Cranor, J. Hong, and E. Nunge, “Protecting people from phishing: the design and evaluation
of an embedded training email system,” in The SIGCHI conference on Human factors in computing systems, 2007, pp. 905 – 914.
13. A. Alnajim and M. Munro, “An anti-phishing approach that uses training intervention for phishing websites detection,” in the 6th IEEE International Conference on Information Technology - New Generations (ITNG), 2009, pp. 405–410.
14. J. S. Downs, M. Holbrook, and L. F. Cranor, “Behavioral response to phishing risk,” in the anti-phishing working groups 2nd annual
eCrime researchers summit, 2007, pp. 37 – 44. 15. T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer, “Social phishing,” Commun. ACM, vol. 50, no. 10, pp. 94–100, 2007.
89.
Authors: B.Murali Krishna, G.L.Madhumati, Habibulla Khan
Paper Title: FPGA based Pseudo Random Sequence Generator using XOR/XNOR for Communication
Cryptography and VLSI Testing Applications
Abstract: Random number generators are most prominently used in the area of communication to provide
security for information systems through pseudo random sequences. It also applicable for key generation in
cryptography applications and signature analyzer to generate test patterns for Built-In-Self Test. In conventional
method, random numbers are generated by a reference value i.e., seed value, using a XOR gate. The new proposed
methods present a linear feedback shift register (LFSR) which generates an arbitrary number based on XOR,
XNOR gates with and without seed value using multiplexer. Multiplexer is append to generate a random value at
user defined state in runtime. Hardware complexity and power consumption is reduced by replacing the
multiplexer with tristate buffers. Result analysis indicates that proposed LFSR with and without seed value gives a
better performance, low power consumption and improves more randomness in runtime with Partial
Reconfiguration (PR). Resource utilization for standard XOR based LFSR is compared with proposed LFSR using
XOR and XNOR logic. Proposed method is designed in Verilog HDL, simulated with ISE Simulator, synthesized
and implemented using Xilinx ISE, targeted for Spartan3E XC3S500E-FG320-4 and Virtex-5 XUPV5LX-110T
architecture.
Keywords: LFSR, XOR, XNOR, Multiplexer, Xilinx, PR, FPGA.
References: 1. S. Ergun and S. Ozoguz, Truly Random Number Generators Based on a Non-autonomous Chaotic Oscillator, AEU-International Journal
Electronics & Communications,Vol. 61, No. 4, 2007, pp. 235-242.
2. YilongLiao, XiangningFan Mathematical calculation of sequence length in LFSR- dithered MASH digital delta-sigma modulator with odd
initial condition, AEU - International Journal of Electronics and Communications Volume 82, December 2017, Pages 533-542. 3. MariosKalyvas, Kostas,Yiannopoulos, Thanassi,s Houbavlis, Hercules Avramopoulos Design Algorithm of All-Optical Linear Feedback
Shift Registers AEU - International Journal of Electronics and Communications Volume 57, Issue 5, 2003, Pages 328-332.
4. Efficient Parallel Architecture for Linear Feedback Shift Registers, J. Jung and H. Yoo and Y. Lee and I. C. Park, IEEE Transactions on Circuits and Systems II: Express Briefs, Nov 2015, volume 62, pp.1068-1072.
5. Test vector encoding using partial LFSR reseeding, C. V. Krishna and A. Jas and N. A. Touba, Proceedings International Test Conference,
2001, pp. 885-893. 6. The K-distribution of Generalized Feedback Shift Register Pseudorandom Numbers, Fushimi, M. and Tezuka, S.,Communications of the
ACM, July 1983, volume 26, pp. 516--523.
7. MC-DS-CDMA pseudo-noise acquisition algorithm research using computer model, A. D. Zolotuev and F. G. Khisamov and M. V. Milovanov and D. M. Sobachkin, 23rd Telecommunications Forum Telfor (TELFOR), Nov2015, pp.329-332.
8. Low Complexity Wiener Filtering in CDMA Systems Using a Class of Pseudo-Noise Spreading Codes, R. Carvajal and K. Mahata and J.
C. Aguero, IEEE Communications Letters, Nov 2012, volume 16, pp.1357-1360. 9. Design and analysis of linear feedback shift register(LFSR) using gate diffusion input(GDI), R. Sharma and B. Singh, 5th International
Conference on Wireless Networks and Embedded Systems (WECON), Oct 2016,pp.1-5.
10. Multiple test set generation method for LFSR-based BIST, Youhua Shi, Zhe Zhang, Proceedings of the 2003 Asia and South Pacific Design Automation Conference, Nov 2003, pp. 863-868.
11. Low-Power Programmable PRPG With Test Compression Capabilities,M. Filipek and G. Mrugalski and N. Mukherjee and B. Nadeau-
Dostie and J. Rajski and J. Solecki and J. Tyszer, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, June 2015, volume 23, pp.1063-1076.
12. An Improved DCM-Based Tunable True Random Number Generator for Xilinx FPGA A. P. Johnson, R. S. Chakraborty and D.
Mukhopadyay, in IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 64, no. 4, pp. 452-456, April 2017. 13. Cellular Automata-Based Parallel Random Number Generators Using FPGAs David H. K. Hoe, Jonathan M. Comer, Juan C. Cerda, Chris
D. Martinez, and Mukul V. ShirvaikarInternational Journal of Reconfigurable Computing Volume 2012, Article ID 219028, 13 pages
14. Design and Implementation of Multibit LFSR on FPGA to Generate Pseudorandom Sequence NumberDebarshi Datta, Bipa Datta, Himadri Sekhar Dutta2017 Devices for Integrated Circuit (DevIC), 23-24 March, 2017, Kalyani, India
15. Low Power Memory Built in Self Test Address Generator Using Clock Controlled Linear Feedback Shift Registers K. Murali Krishna, M.
Sailaja Journal of Electronic Testing Issue 1/2014
485-494
90.
Authors: D Ramamurthy, Mahesh P K
Paper Title: Brain Tumor Segmentation based on Rough Set Theory for MR Images with Cellular Automata
Approach
Abstract: Prediction of brain tumour and analysis is very critical in medical image processing since the treatment
is based on radio surgery. Classifying the enhanced and necrotic cells is very essential in clinical radio surgeries,
where in a radio oncology expert predicts the tumors manually for contrast enhanced T1-MR images. Prediction
best works with cellular automata (CA) iterative algorithm by deriving transition rules from the tumour properties
with adaptive method. Rough set theory with attribute reduction algorithm is used for classifying the enhanced and
necrotic cells. In this work a semi interactive prediction algorithm is used with CA and Rough set theory for
495-499
incomplete data prediction in medical images. Semi interactive algorithms require less manual intervention with
high computation speed.
Keywords: Brain tumor prediction, Rough Set Algorithm, Cellular automata, magnetic resonance imaging
(MRI), radio surgery, enhanced cells, necrotic cells, reduct.
References: 1. Kailash Sinha, G.R.Sinha., “Efficient Segmentation Methods for Tumor Detection in MRI Images”, 2014 IEEE Student’s Conference on
Electrical, Electronics and Computer Science.
2. Riddhi.S.Kapse , Dr. S.S. Salankar , Madhuri.Babar “Literature Survey on Detection of Brain Tumor from MRI Images”, IOSR Journal of Electronics and Communication Engineering (IOSR-JECE), e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 1, Ver. II (Jan -
Feb. 2015), PP 80-86.
3. Cuttmann” Automated Segmentation of Cerebral Ventricular Compartments”, , C.R.G, ISMRM (2003). 4. M. Prastawa, E. Bullitt, N. Moon, K. Leemput, and G. Gerig, “Automatic brain tumor segmentation by subject specific modification of
atlas priors,” Acad. Radiol., vol. 10, pp. 1341–1348, 2003.
5. M. Prastawa, E. Bullitt, S. Ho, G. Gerig, A brain segmentation framework based on outliner detection, Medical Image Analysis, 8: 275-283, 2004.
6. Rajiv Kumar, Arthanariee A. M,” A Comparative Study of Image Segmentation Using Edge-Based Approach”, World Academy of
Science, Engineering and Technology International Journal of Mathematical and Computational Sciences Vol:7, No:3, 2013. 7. K. S. Angel Viji, Dr J. Jayakumari, “Modified Texture Based Region Growing Segmentation of MR Brain Images”, IEEE Conference on
Information and Communication Technologies (ICT 2013) pp:691-695.
8. K. Jumaat, R. Mahmud and S. S. Yasiran “Region and boundary segmentation of microcalcifications using seed-based region growing and mathematical morphology”, Intemational Conference on Mathematics Education Research, Vol. 8, pp.634—639, 2010.
9. Y. Boykov and M.-P. Jolly, “Interactive graph cuts for optimal boundary and region segmentation of objects in n-d images”, in Proc. ICCV, 2001, pp. 105–112
10. Priyansh Sharma and Jenkin Suji, “A Review on Image Segmentation with its Clustering Techniques”, International Journal of Signal
Processing, Image Processing and Pattern Recognition Vol.9, No.5 (2016), pp.209-218. 11. J.selvakumar, A.Lakshmi, T.Arivoli, “Brain Tumor Segmentation and Its Area Calculation in Brain MR Images using K-Mean Clustering
and Fuzzy C-Mean Algorithm”, IEEE-International Conference On Advances In Engineering, Science And Management
12. S. R. Kannan, ”Segmentation of MRI Using New Unsupervised Fuzzy C-Means Algorithm” ICGST-GVIP Journal, Vol. 5, Issue 2, Jan.2005.
13. Yailé Caballero, Rafael Bello, Delia Alvarez, Maria M. Garcia, “Two new feature selection algorithms with Rough Sets Theory”,IFIP
International Conference on Artificial Intelligence in Theory and Practice IFIP AI 2006: Artificial Intelligence in Theory and Practice pp 209-216.
14. Jianchao Han, Ricardo Sanchez, Xiaohua Hu, “Feature Selection Based on Relative Attribute Dependency: An Experimental Study ”,
International Workshop on Rough Sets, Fuzzy Sets, Data Mining, and Granular-Soft Computing RSFDGrC 2005: Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing pp 214-223.
15. Wu, Y., Phol, K. Warfield, S.K., Andac Hamamci*, Nadir Kucuk, Kutlay Karaman, Kayihan Engin, and Gozde Unal “Tumor-Cut:
Segmentation of Brain Tumors on Contrast Enhanced MR Images for Radiosurgery Applications”, IEEE Transactions On Medical Imaging, Vol. 31, No. 3, March 2012, pp:790-804.
16. Rachana Rana H.S, Bhdauria Annapuma Singh, “Brain Tumour Extraction from MRI Images Using Bounding-Box with Level Set
Method”, IEEE 2013,pp: 319-324.
91.
Authors: K. P. Prasad Rao, P. Srinivasa Varma, RBR Prakash
Paper Title: Five Phase DSTATCOM with Fuzzy Controller for Industrial and Domestic Applications
Abstract: To attain good products from the industry, industry required the quality of power and efficiency of the
systems like machines, lighting system and other equipments. This power quality problems are going to mitigate
by the FACTS devices or controllers. The problems like voltage sag (Power Quality) because of the load increases
suddenly, voltage swell because of load decreases suddenly may happened. In this paper, sag of voltage as a
quality problem in power system arises, since of sudden amplified the load and it is going to mitigate with Static
Synchronous Compensator (STATCOM).
Keywords: DSTATCOM, Ten Pulse VSC, Fuzzy Logic Controller.
References: 1. Atif Iqbal, Shaik Moinuddin, M.Rizwan Khan, Sk.Moin Ahmed, and Haithen Abu-Rub,A Novel Three-Phase to Five-
PhaseTransformation using a special transformer connection” IEEE Transactions on power delivering, vol. 25, no.3, JULY 2010, p. no:
1637 –1644. 2. G. K. Singh, “Self excited induction generator research – a servy,” Elect. Power syst. Res., vol. 69, pp. 107 – 114, 2004.
3. S.Singaravelu, S.Sasikumar, “A novel steady statemodeling andanalysis of six-phase self-excited induction generators forrenewable
energy generation,” International Journal of Emerging Electrical Power Systems, vol. 12 Issue 5, Article 7, 2011. 4. G.K.Singh, K.B. Yadav, R. P. Saini, “Analysis of a saturated multiphase (six-phase) self-excited induction generator,” International
Journal of Emerging Electric Power systems, vol. 7, Issue 2, Article 5, 2006.
5. Zakir Husain, B. Ravindra Kumar Singh & C. Shri NiwasTiwari, “Multi-phase(6-Phase & 12-Phase)Transmission Lines:Performance Characteristics,” International Journal of Mathematics and Computers in Simulation,Volume 1, Issue 2, 2007, pp.150 –159.
6. P.PAO LAOR, A.Isaramongkolark,T.Kulworawanichpang, “Electromagneticfield distribution of phase-sequence orientation of a
doublecircuit power transmission line based on finite element method,” WSEAS Transactions on power systems, vol. 3, Issue 10, October 2008, pp. 653-663.
7. G. K.Singh, V.PantyY.P.singh, “Voltagesourceinverter driven multiphas induction machine,” Computers andElectrical Engineering 29
(2003), pp.813-834. 8. K. N. Pavithran,R. Parimelalagan & M. R Krihnamurthy,“Studies on inverter -fed five -phase induction motor drive” IEEE
Transactionson Power Electronics, vol. 3, no. 2, April 1988, pp.224 –235.
9. FriedrichW.Fuchs, “Some diagnosismethods for voltagesource inverters in variable speed drives with induction machines a survey,” 2003 IEEE, pp. 1378 – 1385.
10. Paul C.Krause, and ThomasA. Lipo, “Analysisand simplified representations of arectifier – inverterinduction motor drive,” IEEE
Transactions on Power Apparatus and systems, vol. pas – 88, no. 5, may 1969, pp. 588 – 596.
11. Edward P.Cornell, andThomasA. Lipo, “Modeling andDesign of Controlled Current Induction Motor Drive Systems,” IEEE Transactions
on Industry Applications, vol. IA-13, NO. 4, JULY/AUGUST 1977, pp. 321 - 330.
12. K. N. Pavithran, R Parimelalagan, G.Sridhara Rao, J. Holtz,Drlng, “Optimum design of an induction motor for operation with current
500-504
source inverters,” IEEE PROCEEDINGS, Vol. 134, Pt. B, No. 1, JANUARY 1987.
13. Emil Leni, MartinJones, Slobodan N. Vukosanic, and Hamid A. Toliyat, “A Novel concept of a multiphase, multimotor vector controlled
drive system supplied from a single voltagesource inverter,”IEEE Transaction on Power Electronics, vol.19, no.2, march 2004, pp. 320 - 335.
14. Dong Liu, Jia-Q Yang, Jin Huang *, Hai-bo Jiang, “Realization of a SPWM inverter for multi-phase induction motor drives,” pp. 1287 –
1290.
15. D.Casadei,M.Mengoni, G.Serra, A. Tani,L.Zarri, Bologna,Italy, “Comparisn of DifferentFault-Tolerant ControlStrategies for Seven-Phase
Induction Motor Drives”.
16. DrazenDujic,Martin Jones,and Emil Levi, “Analysis of Output Current-Ripple RMS in Multiphase Drives Using Polygon Approach,” IEEE Transactions on Power Electronics, vol. 25, no. 7, JULY 2010, pp. 1838-1849.
17. N. Arvindan and P. Pushpakarthick, “24 - Pulse Rectifier Realization by 3 Phase to Four 3-Phase Transformation using Conventional
Transformers,” NPEC-2010, pp. 1 – 8. 18. Vipin Garg, BhimSingh, G. Bhuvanewsari, “A tapped star connected autotransformer based 24-pulse AC-DC converter for power quality
improvement in induction motor drives,” International Journal of Emerging Electric Power Systems, vol. 7, Issue 4, Article 2, 2006.
19. Bhimsingh, VipinGarg, Gurumoorthy Bhuvaneshwari, “A24-pulse AC-DC converter employinga pulsedoubling technique for vector-controlled induction motor drives.”
20. Bhim Singh,Ganjay Gairole, “Anautotransformer – based 36 – pulse controlled AC-DC converter,” IETE Journal of research, vol.
54,Issue 4, July-August 2008, pp. 255-263. 21. Atif Iqbal, Shaik Moinuddin, M.Rizwan Khan, Sk.MoinAhmed, and Haithen Abu-Rub, “A NovelThree-Phase to Five-Phase
Transformation using a special transformer connection,” IEEE Transactions on power delivering, vol. 25, no. 3, JULY 2010, p. no: 1637 –
1644. 22. P.C.Krause, “Analysis of electric machinery,” Newyork: Mc. Graw Hill, 1986.
23. K.P.Prasad Rao,B. KrishnaVeni, D. RaviTeja, “Five LegInverter for Five Phase Supply,” International Journalof Engineering Trends and
Technology- Volume3Issue2- 2012, pp. 144 – 152. 24. DuroBasic, Jain Guo Zhu, Gerard Boardman, “Transient performance study of brushlessdoubly fed twin stator generator,”IEEE Trans.
Energy convers., vol. 8, no. 3, pp. 400-408, July 2003.
25. V.Krishna Kumar, V. Kamaraj, S. Jeevananthan, "Parrallel Fuzzy Logic ControllersforIndependentControl ofTwo PermanentMagnet Synchronous Motors fed by a Five Leg Inverter for Electric Vehicles", Journal of Electrical Engineering, Volume: 17/2017, Edition: 1.
26. K.P.Prasad Rao, P.Srinivasa Varma, "Five Phase DVR with Fuzzy Logic Controller," Journal of Advanced Research in Dynamical and
Control System, Vol. 9. Sp- 18/ 2017. 27. K.P.Prasad Rao, P.SrinivasaVarma, "A NovelFive PhaseDSATCOM for Industrial Loads," International Journal of Engineering
&Technology, 7 (1.8), 2018 56-61
92.
Authors: N.V. Sarathbabu Goriparti, Ch. S. N. Murthy, M. Aruna
Paper Title: Minimization of Specific Energy of a Belt Conveyor Drive System using Space Vector Modulated Direct
Torque Control
Abstract: The main aim of this paper is to model and minimize the specific energy of belt conveyor drive
system under different operating conditions such as different loading conditions, different conveyor inclinations,
different conveying lengths and lifts, and different capacities using a real time fabricated experimental setup.
Further, it demonstrates the advantages of using a variable speed drives (VSDs) for energy savings. Conveyors are
designed for transporting goods, ores, minerals, and other such products with maximum rated capacities for any
operating sections. But, they operate at a relatively much lower capacity. This is due to the supply and demand side
implications of the operating section, they will run at the same constant rated speed causing higher power losses.
This behavior will highly degrades the energy efficiency of conveyor. In the present study, an attempt is made to
improve the energy efficiency of the conveyor by minimizing the per unit energy consumption using the
methodology having combined advantages of energy efficiency modeling with less friction coefficient as per DIN
22101 and superior speed control technique for conveyor kind of high torque loads called space vector based direct
torque control. In this paper, specific energies are estimated for the same belt conveyor system, found that with the
use of VSDs, specific energies are reduced an amount 10-12% depending upon the capacities at which they have
run.
Keywords: Specific energy, Variable speed drives, Energy efficiency
References: 1. He, Y. Pang, and G. Lodewijks, “Green operations of belt conveyors by means of speed control," Applied Energy, vol. 188, pp. 330-341,
2017. 2. B. Lin, Y. Wu, and L. Zhang, “Estimates of the potential for energy conservation in the Chinese steel industry," Energy Policy, vol. 39,
pp. 3680-3689, 2011.
3. S. Zhang and X. Xia, “Modeling and energy efficiency optimization of belt conveyors," Applied Energy, vol. 88, no. 9, pp. 3061-3071, 2011.
4. S. Zhang and X. Xia, “Optimal control of operation efficiency of belt conveyor systems," Applied Energy, vol. 87, no. 6, pp. 1929-1937,
2010. 5. K. Bimal, Modern power electronics and AC drives. Prentice-Hall, 2001.
6. R. Krishnan, Electric motor drives: modeling, analysis, and control, vol. 626. Prentice Hall New Jersey, 2001.
7. P. Vas, Vector control of AC machines, vol. 22. Oxford University Press, USA, 1990. 8. Continuous conveyors – Belt conveyors for loose bulk materials-Basis for calculation and dimensioning, DIN 22101, 2002.
9. Handbook of conveyor & elevator belting, The Good year Tyre and rubber company, Akron, USA, 1975.
10. H.Lauhoff, “Belt conveyor technology, “Speed control of belt conveyors –does it really save energy?” Bulk solid handling, vol.25, pp368-377, 2005.
11. Pimkumwong, Narongrit, Amorn Onkrong, and Tirasak Sapaklom. "Modeling and simulation of direct torque control induction motor
drives via constant volt/hertz technique." Procedia Engineering pp.31, 1211-1216, 2011. I. Takahashi and T. Noguchi, “A new quick-response and high-efficiency control strategy of an induction motor," IEEE Transactions on
Industry applications, no. 5, pp. 820-827, 1986.
12. M. Depenbrock, “Direct self-control (dsc) of inverter-fed induction machine," IEEE transactions on Power Electronics, vol. 3, no. 4, pp. 420{429, 1988.
13. U. Baader, M. Depenbrock, and G. Gierse, “Direct self control (dsc) of inverter-fed induction machine: A basis for speed control without
speed measurement," IEEE transactions on industry applications, vol. 28, no. 3, pp. 581-588, 1992. 14. G. S. Buja and M. P. Kazmierkowski, “Direct torque control of pwm inverter-fed ac motors-a survey," IEEE Transactions on industrial
electronics, vol. 51, no. 4, pp. 744-757, 2004.
505-511
15. C. Reza, M. D. Islam, and S. Mekhilef, “A review of reliable and energy efficient direct torque controlled induction motor drives,"
Renewable and Sustainable Energy Reviews, vol. 37, pp. 919-932, 2014.
16. C. Lascu, I. Boldea, and F. Blaabjerg, “A modified direct torque control for induction motor sensorless drive," IEEE Transactions on industry applications, vol. 36, no. 1, pp. 122-130, 2000.
17. P. Marino, M. D'incecco, and N. Visciano, “A comparison of direct torque control methodologies for induction motor," in Power Tech
Proceedings, 2001 IEEE Porto, vol. 2, pp. 6-pp, IEEE, 2001.
18. D. Casadei, G. Serra, and A. Tani, “The use of matrix converters in direct torque control of induction machines," IEEE transactions on
industrial electronics, vol. 48, no. 6, pp. 1057-1064, 2001.
19. F. Tazerart, Z. Mokrani, D. Rekioua, and T. Rekioua, “Direct torque control implementation with losses minimization of induction motor for electric vehicle applications with high operating life of the battery," International Journal of Hydrogen Energy, vol. 40, no. 39, pp.
13827-13838, 2015.
20. E. Ozkop and H. Okumus, “Direct torque control of induction motor using space vector modulation (SVM-DTC)," 2008 12th International Middle-East Power System Conference, pp. 368-372, 2008.
21. C. Lascu and A. M. Trzynadlowski, “Combining the principles of sliding mode, direct torque control, and space-vector modulation in a
high-performance sensorless ac drive," IEEE Transactions on industry applications, vol. 40, no. 1, pp. 170-177,2004.
93.
Authors: Gayathiri Kathiresan, Krishna Mohanta, Khanaa VelumailuAsari
Paper Title: COMPACT: Classifying Stream Data Optimally Using a Modified Pruning and Controlled Tie-
threshold
Abstract: Big data mining become important in extracting the potential information from the continuously
arriving stream data. By extracting knowledge, the data mining algorithms significantly compute feasible decisions
for various applications. The Very Fast Decision Tree (VFDT) classifier is a widely applied incremental decision
tree to make better decisions. The VFDT classifier processes the arrival of the new instances, without storing them
and updates the existing tree structure. Most of the conventional incremental decision tree based algorithms exploit
the hoeffding’s bound based on the user-defined tie-threshold to split the tree and to manage the tree growth. Even
though the size of the tree tremendously increases when handling the fluctuated and imbalanced stream data, it
suffers from the misclassification issue due to lack of capturing the optimal attributes over the incoming stream
data and declines the classification accuracy and performance. In order to resolve these issues, this paper extends
the VFDT, named as Classifying stream data optimally using a Modified Pruning technique And Controlled Tie-
threshold (COMPACT). The COMPACT method includes two components, such as enhanced information gain
measurement and tie-breaking threshold based pruning method. In order to improve the VFDT performance
without affecting the imbalanced data stream handling, the enhanced information gain measurement effectively
identifies an optimal number of attributes for a data stream. In order to avoid the information gain biasing, it
utilizes the advantages of enhanced splitting metric in attribute reduction. Instead of randomly selecting the
threshold, the tie-breaking threshold based pruning method determines the tie-breaking threshold using a number
of breaking points. The tie-breaking threshold based pruning method ensures the optimal tree structure while
handling the large-scale stream dataset. Finally, the COMPACT method is evaluated using the weather dataset to
demonstrate the efficiency. The proposed method significantly outperforms the existing DTFA approach in terms
of recall, Root Mean Square Error (RMSE) rate, and execution time.
Keywords: Big data, stream data, VFDT classifier, bias, information gain, threshold, pruning, imbalanced data,
optimal attributes, and decision making.
References: 1. Nasereddin, Hebah HO, “Stream Data Mining,” IJWA, Vol.3, No.2, pp.90-97, 2011. 2. Almalki, EbtesamHamed, and Manal Abdullah, “A survey on big data stream mining,” Journal of Fundamental and Applied
Sciences, Vol.10, No.4S, pp.278-284, 2018.
3. Aggarwal, Charu C, “A Survey of Stream Classification Algorithms,” In Data. Classification: Algorithms and Applications, pp.245-274, 2014.
4. Song, Yan-Yan, and L. U. Ying, “Decision tree methods: applications for classification and prediction,” Shanghaiarchives of
Psychiatry, Vol.27, No.2, pp.130, 2015. 5. Nguyen, Hai-Long, Yew-KwongWoon, and Wee-Keong Ng, “A survey on data stream clustering and classification,” Knowledge and
information systems, Vol.45, No.3, pp.535-569, 2015.
6. Subrahmanyam, M. V. V. S., and R. V. Venkateswara, “VFDT Algorithm for Decision Tree Generation,” International Journal for Development of Computer Science and Technology (IJDCST), Vol.1, No. 7, 2013.
7. Ramírez-Gallego, Sergio, BartoszKrawczyk, Salvador García, MichałWoźniak, and Francisco Herrera, “A survey on data preprocessing
for data stream mining: Current status and future directions,” Neurocomputing, Vol.239, pp.39-57, 2017. 8. Krempl, Georg, IndreŽliobaite, DariuszBrzeziński, EykeHüllermeier, Mark Last, Vincent Lemaire, TinoNoack, et al., “Open challenges
for data stream mining research,” ACM SIGKDD explorations newsletter, Vol.16, No.1, pp.1-10, 2014.
9. Jin, Ruoming, and GaganAgrawal, “Efficient decision tree construction on streaming data,” In Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, pp.571-576, 2003.
10. Rutkowski, Leszek, MaciejJaworski, Lena Pietruczuk, and PiotrDuda, “Decision trees for mining data streams based on the Gaussian
approximation,” IEEE Transactions on Knowledge and Data Engineering,Vol.26, No.1, pp. 108-119, 2014. 11. De Rosa, Rocco, and NicoloCesa-Bianchi, “Splitting with confidence in decision trees with application to stream mining,” In
Proceedings of the IEEE International Joint Conference on Neural Networks (IJCNN), pp.1-8, 2015.
12. Zhao, Minyue, and Xiang Li, “An application of spatial decision tree for classification of air pollution index,” In Proceedings of the 19th IEEE International Conference on Geoinformatics, pp.1-6, 2011.
13. Ben-Haim, Yael, and Elad Tom-Tov, “A streaming parallel decision tree algorithm,” Journal of Machine Learning Research,Vol.11,
pp.849-872, 2010. 14. Liang, Chunquan, Yang Zhang, Peng Shi, and Zhengguo Hu, “Learning accurate very fast decision trees from uncertain data streams,”
International Journal of Systems Science,Vol.46, No.16, pp.3032-3050, 2015.
15. Yang, Hang, and Simon Fong, “Optimized very fast decision tree with balanced classification accuracy and compact tree size,” In IEEE3rd International Conference on Data Mining and Intelligent Information Technology Applications (ICMiA),pp.57-64, 2011.
16. Naidu, Ch SKVR, and T. Y. Ramakrushna, “Augmentation of very fast decision tree algorithm aimed at data mining,” IJRCCT, Vol.4, No. 9, pp.684-690, 2015.
17. Dong, Z. J., S. M. Luo, Tao Wen, F. Y. Zhang, and L. J. Li, “Random forest-based very fast decision tree algorithm for data stream,”
Res. Paper,Vol.12, pp. 52-57, 2017. 18. Da Costa, Victor GuilhermeTurrisi, André Carlos Ponce de Leon Ferreira, and SylvioBarbon Junior, “Strict Very Fast Decision Tree: a
512-519
memory conservative algorithm for data stream mining,” Pattern Recognition Letters, Vol.116, pp.22-28, 2018.
19. Minegishi, Tatsuya, Masayuki Ise, AyahikoNiimi, and Osamu Konishi, “Extension of Decision Tree Algorithm for Stream Data Mining
Using Real Data,”2009. 20. Yang, Hang, and Simon Fong, “Incremental optimization mechanism for constructing a decision tree in data stream
mining,” Mathematical Problems in Engineering, 2013.
21. Yang, Hang, and Simon Fong, “Moderated VFDT in-stream mining using adaptive tie threshold and incremental pruning,” In Springer International Conference on Data Warehousing and Knowledge Discovery, pp.471-483, 2011.
22. Xu, Wenhua, Zheng Qin, Hao Hu, and Nan Zhao, “Mining uncertain data streams using clustering feature decision trees,” In Springer
Int. Conf. on Advanced Data Mining and Applications, pp.195-208, 2011. 23. Duda, Piotr, MaciejJaworski, Lena Pietruczuk, and LeszekRutkowski, “A novel application of hoeffding's inequality to decision trees
construction for data streams,” In IEEE International Joint Conference on Neural Networks (IJCNN), pp.3324-3330, 2014.
24. Al-Kateb, Mohammed, and Byung Suk Lee, “Adaptive stratified reservoir sampling over heterogeneous data streams”, Information Systems, Vol.39, pp.199-216, 2014.
94.
Authors: B. Teertha Priyanka, K. Rekhamchala, CH. Jothi Naga Sindhura, P. Sai Amal Mohith, V. Saritha
Paper Title: Analysis and Design of Compact Triple Band Notched Circular Monopole Antenna Using Mushroom
EBG Structures and Compact Spiral Slotted EBG Structures
Abstract: This work presents analysis and design of a low profile multi band notched UWB circular
monopole antenna. Multi band rejection characteristics of the proposed antenna can be achieved by placing the
EBG structures in the proximity of the feed line. To avoid the interference with narrow bands with frequency
ranges from (3.2-4.0) GHz – WiMAX, (5.0-5.9) GHz – WLAN and (7.1-8.4) GHz – X-Band (both uplink and
downlink), it is essential for any antenna operating in UWB to have band rejection features. The proposed antenna
has the dimensions of 46x26x1.6 mm3. The simulation was carried out through HFSS.
Keywords: EBG structure, Multi Band-Notch, UWB antenna.
References: 1. NaveenJaglan, Binod K.Kanaujia, Samir D.Gupta, andShweta Srivastava “Triple Band NotchedUWB AntennaDesign Using
Electromagnetic Band GapStructures” Progress In Electromagnetics Research C, Vol. 66, 139–147, 2016. 2. Son rinh-Van, ChienDao-Ngoc SchoolofElectronicsand Telecommunications,Hanoi University of Science and Technology,
Hanoi,Vietnam “DualBand-Notched UWBAntenna based on ElectromagneticBand Gap Structures” REVJournal on Electronics and
Communications, Vol. 1, No. 2, April – June, 2011. 3. F.Alizadeh,J.Nourinia, Ch. Ghobadi,and B. Mohammadi “A Dual Band Rejection UWB AntennaUsing EBG” 2017 IEEE
4thInternational Conference n Knowledge-Based Engineering and Innovation (KBEI) December 22nd, 2017.
4. Dinesh Sethi,Ajay Yadav R. K. Khanna “Dual Notched Ultra Wideband Microstrip Antenna With CSRR Slot and EBG structure” International Journal of EngineeringResearch & Technology(IJERT) ISSN: 2278-0181 Vol.3 Issue 9, September, 2014.
5. Hao Liu andZiqiang Xu “Design of UWB MonopoleAntenna withDual NotchedBandsUsing OneModifiedElectromagnetic-Bandgap
Structure”Hindawi PublishingCorporation The ScientificWorld Journal Volume 2013, Article ID 917965, 9 pages. 6. F. Mouhouche,A. Azrar,M. Dehmas and K.Djafri “Compact Dual-Band Reject UWBMonopoleAntenna using EBGStructures” The 5th
InternationalConference onElectrical Engineering –Boumerdes (ICEE-B) October 29-31, 2017,Boumerdes,Algeria.
7. Abdel moumenKaabal, SaidaAhyoud andAdelAsselman “ANew Design of Star Antenna for Ultra Wide Band Applicationswith WLAN-Band-Notched Using EBG Structures” International Journal of Microwave and Optical Technology, vol.9, no.5, September 2014.
8. GauravK. Pandey, Hari S. Singh, Pradutt K. Bharti, and Manoj K. Meshram, “DESIGN OF WLAN BANDNOTCHED UWB
MONOPOLEANTENNA WITHSTEPPED GEOMETRYUSING MODIFIED EBG STRUCTURE”,ProgressInElectromagnetics Research B, Vol. 50, 201–217, 2013.
9. F.Yang and Y.Rahmat-Samii, “Electromagnetic BandGap Structures in Antenna Engineering”, 1st edition,Cambridge University
Press,2009. 10. AthiraKaladharan, RiaMaria George, “AWideband Bluetooth-UWB AntennawithTribandNotchedCharacteristics”,2016International
Conference on EmergingTechnological Trends (ICETT) ,Oct – 2016.
11. SayedArif Ali,DeepakJhanwar ,Dhirendra Mathur,“Design of a CompactTriple Band-Notch Flower-Shaped Hexagonal Microstrip Patch Antenna”,InternationalConference on Information Technology (InCITe) Oct – 2016.
12. Vaishali.S.Varpe, Dr.R.P.Labade, “ACompact PrintedWide-SlotUWB Antenna with Band-Notched Characteristics”, InternationalConference on ComputingCommunication Controlandautomation (ICCUBEA), August 2016.
13. M. A. Abdalla,A. Al-Mohamadi, A. Mostafa “Dual Notching of UWB Antenna Using Double InversedU-ShapeCompact EBG
Structure”, 10th InternationalCongress onAdvanced ElectromagneticMaterialsin Microwaves andOptics – Metamaterials, Greece,17-22 September 2016.
14. Zhang, S., & Pedersen,Gert Frølund. (2016). Mutual coupling reduction for UWBMIMO antennas witha widebandneutralization line
IEEE Antenna andWireless Propagation Letters, 15,166–169. 15. Wang,J.-H., Yin, Y.-Z., Liu X.-L., & Wang, T. (2013).Trapezoid UWB antenna withdual bandnotchedcharacteristics
forWiMAX/WLAN bands. Electronics Letters, 49(11), 685–686.
520-525
95.
Authors: S. M. K. CHAITANYA, P. RAJESH KUMAR
Paper Title: Classification of Kidney Images using Particle Swarm Optimization Algorithm and Artificial Neural
Networks
Abstract: Ultrasound (US) imaging is used to provide the structural abnormalities like stones, infections and
cysts for kidney diagnosis and also able to produce information about kidney functions. The main aim of this work
is classifying the kidney images by using US according to relevant features selection. In this work, images of
kidney are classified as abnormal images by pre-processing (i.e. grey-scale conversion), generate region-of-
interest, extracting the features as multi-scale wavelet-based Gabor method, Particle Swarm algorithm (PSO) for
optimization and Artificial Neural Networks (ANN). The PSO-ANN method is simulated on the platform of
MATLAB and these results are evaluated and contrasted. The results obtained through this method are better in
terms of accuracy, sensitivity and specificity.
Keywords: Artificial Neural Networks, Gabor feature extraction, Kidney diagnosis, Particle Swarm Optimization,
Ultrasound images.
References: 1. F. Kanavati, T. Tong, K. Misawa, M. Fujiwara, K. Mori, D. Rueckert, and B. Glocker, “Supervoxel classification forests for estimating
526-530
pairwise image correspondences.,” Pattern Recognition, vol. 63, pp. 561-569, 2017.
2. Eklund, P. Dufort, D. Forsberg and S. M. La Conte, “Medical image processing on the GPU – past, present and future,” Med. Image
Anal., vol. 17, pp. 1073–1094, 2013. 3. O. Reiche, K. Häublein, M. Reichenbach, M. Schmid, F. Hannig, J. Teich and D. Fey, “Synthesis and optimization of image processing
accelerators using domain knowledge,” J. Syst. Architect., vol. 61, pp. 646–658, 2015.
4. K. Sharma, N. D. Toussaint, G. J. Elder, R. Masterson, S. G. Holt, P. L. Robertson, and C. S. Rajapakse, “Magnetic resonance imaging
based assessment of bone microstructure as a non-invasive alternative to histomorphometry in patients with chronic kidney
disease,” Bone, 2018.
5. Razik, C. J. Das, and S. Sharma, "Angiomyolipoma of the Kidneys: Current Perspectives and Challenges in Diagnostic Imaging and Image-Guided Therapy," Current problems in diagnostic radiology 2018.
6. Świetlicka, “Trained stochastic model of biological neural network used in image processing task,” Appl. Math. Comput, vol. 267, pp.
716–726, 2015. 7. J. Tian, J. Xue, Y. Dai, J. Chen and J. Zheng, “A novel software platform for medical image processing and analyzing,” IEEE Trans. Inf.
Technol. Biomed, vol. 12, pp. 800–812, 2008.
8. S. Gur and M. Top, “Regional clustering of medical imaging technologies,” Comput. Hum. Behav., vol. 61, pp. 333–343, 2016. 9. F. Rengier, M. F. Häfnerb, R. Unterhinninghofenc, R. Nawrotzkid, J. Kirsch, H.-U. Kauczor and F. L. Giesel, “Integration of interactive
three-dimensional image post-processing software into undergraduate radiology education effectively improves diagnostic skills and
visual-spatial ability,” Eur. J. Radiol, vol. 82, pp. 1366–1371, 2013. 10. L. Sajn and M. Kukar, “Image processing and machine learning for fully automated probabilistic evaluation of medical images,” Comput.
Methods Prog. Biomed, vol. 104, pp. e75–e86, 2011.
11. F. Zhao, J. Zhao, W. Zhao, F. Qu and L. Sui, “Local region statistics combining multi-parameter intensity fitting module for medical image segmentation with intensity in homogeneity and complex composition,” Optics Laser Technol, vol. 82, pp. 17–27, 2016.
12. J. Serrat, F. Lumbreras, F. Blanco, M. Valiente, and M. López-Mesas, “myStone: A system for automatic kidney stone
classification,” Expert Systems with Applications, vol. 89, pp. 41-51, 2017. 13. J. Verma, M. Nath, P. Tripathi, and K. K. Saini, “Analysis and identification of kidney stone using Kth nearest neighbour (KNN) and
support vector machine (SVM) classification techniques,” Pattern Recognition and Image Analysis, vol. 27, no. 3, pp. 574-580, 2017.
14. M. B. Subramanya, V. Kumar, S. Mukherjee, and M. Saini, “SVM-based CAC system for B-mode kidney ultrasound images,” Journal of digital imaging, vol. 28, no. 4, pp. 448-458, 2015.
15. S. A. Tuncer, and A. Alkan, "A decision support system for detection of the renal cell cancer in the kidney." Measurement vol. 123, pp.
298-303, 2018. 16. K. D. Krishna, V. Akkala, R. Bharath, P. Rajalakshmi, A. M. Mohammed, S. N. Merchant, and U. B. Desai, “Computer aided abnormality
detection for kidney on FPGA based IoT enabled portable ultrasound imaging system,” Irbm, vol. 37, no. 4, pp. 189-197, 2016.
96.
Authors: Dhana Lakshmi Potteti, Venkateswara Rao N
Paper Title: Spectrum Sensing using Single Ring Law
Abstract: The concept of cognitive radio is becoming increasing popular as it is a prominent solution for
spectrum scarcity problem. A smart and wise usage of available spectral resources is an interesting feature of
cognitive radio. In the terminology of cognitive radio, a primary (licensed) user and a secondary (unlicensed) user
are usually heard. A secondary user transmits data only if the primary user does not use the alloted spectral
resources. For sensing the presence or absence of the primary user, spectrum sensing is necessary. Conventionally
many techniques such as energy detection (ED), eigenvalue based approaches have been designed for spectrum
sensing. Recently large random matrix theory based analytics has shown that Single Ring Law (SRL) can be an
effective solution for binary hypothesis testing problems. Hence, in this paper spectrum sensing for multiple
antenna system is investigated using SRL based parameters. In Rayleigh and Nakagami fading channels, the SRL
based detection is employed and has been found to be a consistent tool for spectrum sensing.
Keywords: spectrum sensing, single ring law, detection probability, opportunistic spectrum access, secondary
user, energy detection
References: 1. Ngo,Hien Quoc, Erik G. Larsson, and Thomas L. Marzetta. Energy and spectral efficiency of very large multiuser MIMO
systems." IEEE Transactions on Communications 61 (4) (2013) 1436-1449.
2. Malik, Shahzad A.,Shah, M. A.,Dar,A. H., Haq, A., Khan, A. U., Javed, T., & Khan, S. A. "Comparative analysis of primary
transmitter detection based spectrumsensing techniques in cognitive radio systems."Australianjournalofbasicandapplied sciences 4 (9) (2010) 4522-4531.
3. Urkowitz,Harry."Energydetectionofunknowndeterministic signals." Proceedingsof the IEEE 55.4 (1967) 523-531.
4. Zeng, Yonghong, andYing-Chang Liang."Spectrum-sensing algorithms for cognitive radio based on statistical covariances." IEEE transactions on Vehicular Techlogy 58 (4) (2009) 1804-1815.
5. Wang, Rui, and Meixia Tao. "Blindspectrumsensing byinformation theoreticcriteria." GlobalTelecommunicationsConference
(GLOBECOM 2010), IEEE (2010) 1-5. 6. Ciuonzo, Domenico, Pierluigi Salvo Rossi,andSubhrakantiDey. "Massive MIMO channel-aware decision fusion." IEEE Transactions
on Signal Processing 63 (3) (2015): 604-619.
7. Ding, Guoru, Xiqi Gao, Zhen Xue, Yongpeng Wu,andQingjiang Shi. "Massive MIMO for Distributed Detection with Transceiver Impairments." IEEE Transactions onVehicular Technology (2017).
8. Guionnet, Alice, Manjunath Krishnapur, and Ofer Zeitouni. "The single ring theorem." Annals of mathematics (2011): 1189-1217.
9. Pallaviram Sure,NarendraBabuC andChandraMohanBhuma, “Applicability of big data analytics to massive MIMO systems,” IEEE Annual India Conference (INDICON), IEEE (2016) 1-5.
10. Zhang, Changchun, and RobertC. Qiu. "Massive MIMOas abig data system: Random matrix models and testbed." IEEE Access 3
(2015) 837-851.
531-534
97.
Authors: Pravallika Injarapu, Harsha Sanka, Naga Sai Manasa, Vineeth Chowdary, Saritha Vanka
Paper Title: Analysis and Design of a Low Profile Multiband Antenna for IOT Applications
Abstract: Increased intervention of IOT in everyday applications created an open challenge to the researchers
regarding the usage of RFID technique. This requires the process of integrating IOT to various wireless standards.
This work proposes, a very low profile planar circular patch united with Koch fractals and rectangles alternatively
on its circumference fed by a microstrip line and two more Koch fractals on either side of the circular patch which
operates over the bands of 1.5GHz-1.65GHz, 1.92GHz-2.17GH, 2.56GHz-2.85GHz, 3.68GHz-4.0GHz, 4.73GHz-
535-539
4.94GHz, 5.36GHz-5.57GHz at SHF, UHF and Microwave frequency bands ,GSM 850 MHz, GSM 900 MHz,
LTE-700 MHz, LTE-800MHz, TV broadcasting.
Keywords: GSM, Internet of Things (IOT), Long Term Evolution, RFID.
References: 1. VyshnaviDas S K, Dr. T.Shanmuganantha “DesignofMultiband Microstrip PatchAntenna forIOT Applications”, Proceedings of2017
IEEE InternationalConference onCircuits and
2. Kumud RanjanJha, GhanshyamMishra and Satish K.Sharma “An Systems (ICCS 2017).Octahedron ShapedPlanarAntenna for IOT Applications”, 2017 IEEE.
3. Vyshnavi Das S K,T Shanuganatham “Design of Triple StarfishShaped Microstrip PatchAntenna for IOT Applications”,Proceedingsof
2017 IEEE Internationa Conference onCircuits andSystems (ICCS 2017). 4. Duong Thi Thanh Tu,Nguyen TuanNgoc, ForestZhu, Diep N. Nguyen, ErykDutkiewicz “Quad-Band Antennafor GSM/WSN/WLAN
/LTE -A Applicationin IOTDevices” , 201717th International Symposium on Communications and Information Technologies (ISCIT).
5. VikramN, KashwanK. R“Designof ISMBand RFID Reader Antenna for IOT Applications”, IEEE WiSPNET 2016conference. 6. Mehr-e-Munir “E-ShapePatchAntenna for4G, LTEand S-BandApplications”, proceedingsof 2018, 15thInternationalBhurban
Conferenceon Applied Sciences andTechnology (IBCAST).
7. Praveen V. Naidu,Arvind Kumar, andVinay Kumar “AMiniaturized Triple Band ACS-fedMonopolePrinted AntennawithMeandered and Circular RingShapeResonatorsforWLAN/WiMAX Applications”, 2017 Progress in Electromagnetics Research Symposium Fall (PIERS
— FALL), Singapore, 19–22 November.
8. MuhammadSajid Iqbal,Syed Awais Wahab Shah “Design of aCompact UWB Patch Antenna havingRectangular ParasiticElementsfor UWB andBluetooth Applications”, 2017IEEE.
9. D. Paret, “RFID at ultra andsuper high frequenciestheory and application,” Hoboken, NJ, USA, Wiley, 2009.
10. Daniel Zucchetto,Andrea Zanella, “Uncoordinated accessschemes for the IOT:approaches, regulations, and performance”,IEEE Communication Magazine, 2017. (In Press)
11. Ala Al-Fuqaha, Mohsen Guizani,MehdiMohammadiMohammed Aledhari and Moussa Ayyash, “Internet of Things: A Survey on
EnablingTechnologies,Protocols, andApplications,” IEEE Communications Surveys &Tutorials, vol. 17,Issue. 4, fourth quarter 2015, pp. 2347-2376, June 2015.
12. S. Purushothaman, S. Ragahavan and SenthilKumar, “A design of compact metamaterial encumberedmonopoleantenna with defected
groundstructurefornavigation (L/S-band) applications”,India Conference (INDICON), IEEE Annual, 2016. 13. C Elavarasi andT Shanmuganantham, “SRR loaded periwinkleflower shapedfractalantenna formultiband applications”,Microwave and
Optical Technology Letters 59 (10), 2518-2525, 2017.
14. ChowYenDesmond Sim, Yuan KaiShih, and Ming Hsuan Chang, “Compact slot antenna for wirelesslocal network2.4/5.2/5.8GHz applications,” IETMicrowave,Antenna and Propagation, vol.9, issue.6, pp. 495-501, April 2015.
98.
Authors: G Aloy Anuja Mary, Sheeba Santosh
Paper Title: Impact of Secondary user Density on Cognitive Radio Networks
Abstract: Reasonableness plays a central movement for each structure blends intellectual radio systems
(CRNs). Point of fact, CRNs gives a fit, free and dynamic specific condition performing specific activities, through
which unlicensed clients get the favored viewpoint to utilize, understood run. This paper tends to the joint issues in
CRNs, for example, helpful hand-off determination, range partaking in asset portion. In this paper, we propose a
half and half enhancement method for effective asset designation (HOERA) in CRNs. The basic target is to open
up execution of system as for the general structure compel by playing out a joint hand-off choice and asset portion
among different transfers. In the first place, bunching is performed by an enhanced swarm streamlining (ISO)
calculation that understands the challenges in extensive scale advancement issue specifically to partition arrange
into gatherings. At that point, Stephanie-Mathisen basic leadership show used to figure the transfer hubs to
apportioning the activity levels in the system. In addition, the asset designation is performed to accomplish most
extreme utility expecting parallel power allotment. The outcomes demonstrates that the viability of proposed
HOERA plot which enhances framework execution and less computational unpredictability for bigger systems.
Keywords: optimal resource allocation, clustering, relay selection, hybrid optimization technique
References: 1. H. Zhang, C. Jiang, N. Beaulieu, X. Chu, X. Wen and M. Tao, "Asset Allocation in Spectrum-Sharing OFDMA Femtocells With
Heterogeneous Services", IEEE Transactions on Communications, vol. 62, no. 7, pp. 2366-2377, 2014. 2. H. Zhang, C. Jiang, R. Hu and Y. Qian, "Self-association in catastrophe versatile heterogeneous little cell systems", IEEE Network, vol.
30, no. 2, pp. 116-121, 2016.
3. H. Zhang, X. Chu, W. Guo and S. Wang, "Conjunction of Wi-Fi and heterogeneous little cell systems sharing unlicensed range", IEEE Commun. Mag., vol. 53, no. 3, pp. 158-164, 2015.
4. S. Dastangoo, C. Fossa, Y. Gwon and H. Kung, "Contending Cognitive Resilient Networks", IEEE Trans. Cogn. Commun. Netw., vol. 2,
no. 1, pp. 95-109, 2016. 5. "1000x: More Spectrum-Especially for Small Cells," in Presentation by QUALCOMM Inc., 2013. [Online]. Accessible:
www.qualcomm.com/1000x 6. "Empowering Spectrum Sharing and Small Cell Wireless Broadband Services in the 3.5 GHz Band," 2013. [Online]. Accessible:
www.fcc.gov
7. V. Chandrasekhar, J. Andrews, T. Muharemovic, Zukang Shen and A. Gatherer, "Power control in two-level femtocell systems", IEEE Transactions on Wireless Communications, vol. 8, no. 8, pp. 4316-4328, 2009.
8. X. Kang, R. Zhang and M. Motani, "Cost Based Resource Allocation for Spectrum-Sharing Femtocell Networks: A Stackelberg Game
Approach", IEEE J. Select. Zones Commun., vol. 30, no. 3, pp. 538-549, 2012. 9. J. Yun and K. Shin, "Versatile Interference Management of OFDMA Femtocells for Co-Channel Deployment", IEEE J. Select.
Territories Commun., vol. 29, no. 6, pp. 1225-1241, 2011.
10. S. Guruacharya, D. Niyato, D. Kim and E. Hossain, "Progressive Competition for Downlink Power Allocation in OFDMA Femtocell Networks", IEEE Transactions on Wireless Communications, vol. 12, no. 4, pp. 1543-1553, 2013.
11. J. Huang and V. Krishnamurthy, "Subjective Base Stations in LTE/3GPP Femtocells: A Correlated Equilibrium Game-Theoretic
Approach", IEEE Transactions on Communications, vol. 59, no. 12, pp. 3485-3493, 2011.
12. Y. Chen, J. Zhang and Q. Zhang, "Utility-Aware Refunding Framework for Hybrid Access Femtocell Network", IEEE Transactions on
Wireless Communications, vol. 11, no. 5, pp. 1688-1697, 2012.
13. V. Ha and L. Le, "Disseminated Base Station Association and Power Control for Heterogeneous Cellular Networks", IEEE Trans. Veh.
540-545
Technol., vol. 63, no. 1, pp. 282-296, 2014.
14. Yanqing Liu and Liang Dong, "Range Sharing in MIMO Cognitive Radio Networks Based on Cooperative Game Theory", IEEE
Transactions on Wireless Communications, vol. 13, no. 9, pp. 4807-4820, 2014. 15. J. Chen and A. Swindlehurst, "Applying Bargaining Solutions to Resource Allocation in Multiuser MIMO-OFDMA Broadcast Systems",
IEEE J. Sel. Top. Flag Process., vol. 6, no. 2, pp. 127-139, 2012.
16. Q. Ni and C. Zarakovitis, "Nash Bargaining Game Theoretic Scheduling for Joint Channel and Power Allocation in Cognitive Radio
Systems", IEEE J. Select. Territories Commun., vol. 30, no. 1, pp. 70-81, 2012.
17. N. Prasad, Kai Li and Xiaodong Wang, "Reasonable Rate Allocation in Multiuser OFDM-SDMA Networks", IEEE Transactions on
Signal Processing, vol. 57, no. 7, pp. 2797-2808, 2009. 18. G. Kramer, I. Marić and R. Yates, "Helpful Communications", FNT in Networking, vol. 1, no. 3-4, pp. 271-425, 2006.
19. L. Ding, T. Melodia, S. Batalama and J. Matyjas, "Appropriated asset assignment in subjective and helpful impromptu systems through
joint steering, transfer choice and range distribution", Computer Networks, vol. 83, pp. 315-331, 2015. 20. S. ZHANG, W. XU, S. LI and J. LIN, "Asset assignment for the group based agreeable multicast in OFDM-based intellectual radio
frameworks", The Journal of China Universities of Posts and Telecommunications, vol. 20, no. 4, pp. 1-7, 2013.
21. Tajer, N. Prasad and X. Wang, "Beamforming and Rate Allocation in MISO Cognitive Radio Networks", IEEE Transactions on Signal Processing, vol. 58, no. 1, pp. 362-377, 2010.
22. F. Khan, C. Masouros and T. Ratnarajah, "Impedance Driven Linear Precoding in Multiuser MISO Downlink Cognitive Radio
Network", IEEE Transactions on Vehicular Technology, vol. 61, no. 6, pp. 2531-2543, 2012. 23. Z. Fei, J. Ni, D. Zhao, C. Xing, N. Wang and J. Kuang, "Ergodic mystery rate of two-client MISO impedance stations with measurable
CSI", Science China Information Sciences, vol. 57, no. 10, pp. 1-14, 2014.
24. Wang and H. Wang, "On the Secrecy Throughput Maximization for MISO Cognitive Radio Network in Slow Fading Channels", IEEE Transactions on Information Forensics and Security, vol. 9, no. 11, pp. 1814-1827, 2014.
25. Xiaoming Chen, Zhaoyang Zhang and Chau Yuen, "Versatile Mode Selection in Multiuser MISO Cognitive Networks With Limited
Cooperation and Feedback", IEEE Transactions on Vehicular Technology, vol. 63, no. 4, pp. 1622-1632, 2014. 26. Ng, M. Shaqfeh, R. Schober and H. Alnuweiri, "Strong Layered Transmission in Secure MISO Multiuser Unicast Cognitive Radio
Systems", IEEE Transactions on Vehicular Technology, vol. 65, no. 10, pp. 8267-8282, 2016.
27. "Sum Rate Maximization for Cognitive MISO Broadcast Channels: Beamforming Design and Large Systems Analysis", IEEE Transactions on Wireless Communications, vol. 13, no. 5, pp. 2383-2401, 2014.
28. J. Xiong, D. Mama, K. Wong and J. Wei, "Strong Masked Beamforming for MISO Cognitive Radio Networks With Unknown
Eavesdroppers", IEEE Transactions on Vehicular Technology, vol. 65, no. 2, pp. 744-755, 2016. 29. X. Zhou, F. Liu, Y. Yin, Q. Li and J. Qin, "Strong Beamforming for Simultaneous Wireless Information and Power Transfer in MISO
Interference Channels", Wireless Personal Communications, 2016.
30. L. Zhang, L. Jin, W. Luo, C. Wang and Y. Tang, "Strong secure transmission for multiuser MISO frameworks with probabilistic QoS requirements", Science China Information Sciences, vol. 59, no. 2, pp. 1-13, 2016.
31. K.Murali,P.Dhana Lakshmi “Spectrum sensing based on forward active channel allocation in wireless 5G communications ” published
in IJMTST Volume 2 | Issue 2 | February 2016 | ISSN 2455-3778 32. B. Awoyemi, B. Maharaj and A. Alfa, "Ideal asset portion answers for heterogeneous psychological radio systems", Digital
Communications and Networks, vol. 3, no. 2, pp. 129-139, 2017.
99.
Authors: Vani G, Bharathi Malakreddy A
Paper Title: A Review on Identification & Analysis of Security Issues and Challenges of IoT based Healthcare
Abstract: Healthcare applications are one of the major fields from the business user’s perspective and an
important domain. Healthcare applications require a degree of authentication & authorization. An Authentication is
a mechanism of authorizing a particular integrity in a communication system which assures the authenticity of the
element in intercommunication. It is one of the fundamental objectives of the security. In this paper, we are
focusing on a multi-factor authentication method for the IoT based healthcare systems. The survey will find the
multi-factor authentication related work, different types of security attacks, risk, security gaps in healthcare
systems. As a result, there will be a gap that could be further investigated so that more types of authentications are
feasible. The conclusion of this paper is that by using a multi-factor authentication method, there are possibilities
for proposing a secured authentication and authorized algorithm for IoT based healthcare system and overviewing
of sensor destruction and different types of potential attacks on IoT devices based on IoT healthcare system
Keywords: Authentication, Authorization, Multi-factor, Role-Based Access Control, data confidentiality,
confidentiality, sensitivity, security attack
References: 1. Alok Kulkar et al, 'Healthcare applications of the internet of things– A Review', Vol.5, 2014, pp 6229-6232. 2. Dylan Sey et al, ‘A survey on authentication methods for the IoT’, Vol.2, 2018, pp 537-567.
3. Hafizah Che Hasan et.al, ‘Comparasion of authentication methods in IoT technology’, Vol. 12, No: 3, 2018
4. Lee T, “Verifier Based three party authentication schemes”, Volume. 38, Number 5, in 2014, pp 464 - 472. 5. K Chen , Y Chang et.al, “Aspect oriented design and implementation of adaptable access control for Electronic Medical Record”, in 2010,
pp181- 203.
6. L Guo, C Zhang et.al, “A Privacy preserving attribute based authentication system for Mobile Health Networks”, in 2014, pp 927 – 1941. 7. Jin .J, Ahn .G, Covington M et.al, “Access Control Model for Sharing Composite Electronic Health Records”, in 2009, pp 340 - 354.
8. Burnap .P, Spasic .I , Gray .W, Hilton .J, Rana .O, and Elwyn .G, “Protecting Patient Privacy in Distributed Collaborative Healthcare
Environments by Retaining Access Control of Shared Information”, in 2012, pp 490-497. 9. H. Zhou, X Lin, Dong X et.al, “Patient Self controllable and Multi level Privacy preserving cooperative authentication in Distributed
MHealthcare Cloud CS', in 2014, pp.1693-1703.
10. Rafidha Rehiman K Aet.al, “A Secure Authentication Infrastructure for IoT Enabled Smart Mobile Devices”, in 2016, in Volumel 9, DOI: '10.17485/ijst/2016/v9i9/86791'.
11. Lella . A; Martin B et al, “The Mobile App Report. available at – www.comscore.com/Insights/Presentationsand-Whitepapers”, in 2015.
12. Anurag Shukla, “A Survey on Next generation Computing IoT Issues & Challenges”, in ‘International Journal of Pure and Applied Mathematics’', Vol.118, No.9 2018, pp 45-64.
13. Hafizah Che Hasan et al, “Comparison pf authentication methods in IoT technology”, Vol.12, pp 3, 2018.
14. Shantha Mary, Joshitta R and Arockiam, 'Authentication in Internet Of Things Environment: A Survey', Vol 6, Issue 10, Cotober 2016, ISSN:2277 128X.
15. Isra Ahmed Zriqat, 'Security and Privacy Issues in Ehealthcare systems - Towards trused services', Vol. 7, pp 9, 2016.
16. Afaa Jabenur, Nabil Sahli et.al , “Survey on Sensor holes: Acause effect solutions perspective”, in procedia CS, Doi10.1016/J.Proces.2013.06.151
17. Somasundaram Ragupathy and Mythili Thirugananam, “IoT in Healthcare: Breaching security issues”.
546-549
18. Anjali Yeole, Sadaf Ahmedi et.al, “A Robust Scheme for Secure communication in IoT”, in International Research', Volume 3, no.11,
2015, pp 10401- 10406.
19. Barna M , “Ciphertext policy attribute based encryption', pp 497-628. doi: 10.1038/nature12157, Epub 2013 April 28. 20. Gajanayake R, Sharma et.al, “Privacy oriented access control for Health records”, in 'Electronic health information journal', 2014, pp 5.
21. W. Liu et , “Cryptography”, in third IEEE International Conference, Pune, India August 2017, IEEE. Available online at
'ieeexplore.ieee.org/Xplore/home.jsp'.
22. Ometov, Aleksandr et al, “Multi-Factor Authentication - A Survey Cryptography”, vol. 2.
23. Jose Costa, “A Two Factor Authentication scheme”, DOI: 10.13140/RG.2.2.16228.99207, Jun 14, 2017
24. Kennedy. Eand Millard .C, “Data security & Multifactor authentication ' in “Computer Law & Security Review”, Volume: 32, Number 1, 2016, pp 91 - 110.
25. Camenisch J, Fischer S et.al, 'Privacy andidentity management for life', in 'Springer Science & Business Media', 2011.
26. Eldefrawy M.H; Alghathbar K et.al 'OTP based two factor authentication using mobile phones', in 8 International Conference on IT, April 2011, pp 327 - 331.
27. Bruce Ndibanje; Hoon-Jae Lee et.al “Security Analysis and Improvements of Authentication and Access Control in the IoT', in Volume
14, 2014, pp 14786 -14805. 28. Jose L; Hernández Ramos; Antonio J; Skarmeta et al, “Distributed Capability-Based Access Control for the IoT”, in Vol: 3, Number 3/4,
2013, pp.1-16.
29. Bruce Ndibanje , Hoon-Jae Lee, and Sang-Gon Lee, ‘Security Analysis and Improvements of Authentication and Access Control in the Internet of Things’, Sensors, Vol. 14, 2014, pp 14786-14805.
30. Muhammad, K.R.R.S.; Lee S: Lee Y.K. 'Biometric Based Distributed Key Management Approach for Wireless Body Area Network.
Sensors”', in 2010, Vol: 10, pp. 3911-3933. 31. Sanaz Rahimi Moosavi et.al “SEA – A Secure & Efficient authentication and authorization architecture for IoT based Healthcare using
Smart gateways”, in Procedia CS Journal, published in Elsevier in 2015, Vol.52, pp. 452-459
32. Vani.G, Bharathi Malakreddy.A, “Security challenges in Internet of Things in Healthcare Domain”, in September 2016 ,DOI No. IAECS IRAJ DOI 5592,pp.141-144.
33. Vani.G, Bharathi Malakreddy.A, “ Survey on Security challenges in IoT in Healthcare domain”, in ICNTET, 2018,ISBN- CFP18P34-
PRT/978-1-5386-5629-7.
100.
Authors: Sk. Sadiya Shireen, B. Murali Krishna, K. Naga Lakshmi Prasanna, A. Poorna Chander Reddy
Paper Title: FPGA Based RSA Authenticated Data Hiding in Image through Steganography
Abstract: Now-a-days, information security has a vital role in different applications of digital communications
like medical, military, commerce etc., to conceal the secret data from unauthorized access. Steganography is the
most eminent technique for providing information security with the help of a carrier file. The communication
carrier can be of various formats like text, image, video etc. Among all these, digital images are the most common
format due to high capacity and frequency of availability. In image steganography, the secret data is embedded
into an inconspicuous carrier i.e., digital image is used as cover image to conceal the secret message which is
known as stego image. Cryptography techniques are used to strengthen the security for the stego image. In this
paper, a zigzag method has proposed for concealing patient’s secret information with RSA cryptography algorithm
in a RGB medical cover image. The medical cover image is implemented on Nexys 2 1200E FPGA (Field
Programmable Gate Array)
Keywords: Cryptography, RSA Algorithm, Steganography, RGB medical cover image, Stego image, FPGA
References: 1. ‘Privacy , Confidentiality : and Electronic Medical Records Abstract The enchanced Goals of Informantional Security In Health Care’,
1996.
2. ‘Summary of the HIPAA Security Rule’, pp. 1–8, 2019.
3. M. E. Hellman, ‘M. E. Hellman, “An Overview of Public Key Cryptography,” IEEE Commun. Mag ., vol. 16, no. 6, May 2002, pp. 42–49.’, no. 6, pp. 42–49, 2002.
4. J. Gupta, ‘A Review on Steganography techniques and methods’, vol. 1, no. 1, pp. 1–4, 2015.
5. K. Joshi, P. Dhankhar, and R. Yadav, ‘A new image steganography method in spatial domain using XOR’, in 12th IEEE International Conference Electronics, Energy, Environment, Communication, Computer, Control: (E3-C3), INDICON 2015, 2016.
6. K. H. Jung and K. Y. Yoo, ‘Steganographic method based on interpolation and LSB substitution of digital images’, Multimed. Tools
Appl., 2015. 7. F. Huang, Y. Zhong, and J. Huang, ‘Improved algorithm of edge adaptive image steganography based on LSB matching revisited
algorithm’, Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 8389 LNCS, no. 2, pp.
19–31, 2014. 8. C. G. Tappe and A. V Deorankar, ‘An Improved Image Steganography Technique based on LSB’, Int.Res. J. Eng. Technol., pp. 2395–56,
2017.
9. J. Mielikainen, ‘LSB matching revisited’, IEEE Signal Process. Lett., vol. 13, no. 5, pp. 285–287, 2006. 10. V. M. Potdar and E. Chang, ‘Grey level modification steganography for secret communication’, Ind. Informatics, 2004. INDIN ’04. 2004
2nd IE, no. June, pp. 223–228, 2004.
11. D. George, ‘RSA Encryption System Using Encoded Multiplier and Vedic Mathematics’, pp. 19–22, 2013. 12. F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, ‘Information Hiding — A Survey’, vol. 87, no. July, pp. 1062–1078, 1999.
13. Y. P. Astuti, D. R. Ignatius, M. Setiadi, E. H. Rachmawanto, and C. A. Sari, ‘Simple and Secure Image Steganography using LSB and Triple
14. XOR Operation on MSB’, pp. 191–195, 2018.
15. M. Jain and S. K. Lenka, ‘Diagonal queue medical image steganography with Rabin cryptosystem’, Brain Informatics, vol. 3, no. 1, pp. 39–51, 2016.
16. S. Debnath, M. Kalita, and S. Majumder, ‘A review on hardware implementation of steganography’, Proc. 2nd Int. Conf. 2017 Devices
Integr. Circuit, DevIC 2017, pp. 149–152, 2017. 17. K. Joshi and R.Yadav, ‘A new LSB-S image steganography method blend with cryptography for secure communication’, Proc. 2015 3rd
Int. conf. image Inf. Process. ICIIP.2015,pp-86-90, 2016.
550-554
101.
Authors: Manjula Devarakonda Venkata, Sumalatha Lingamgunta
Paper Title: Triple-Modality Breast Cancer Diagnosis and Analysis in middle aged women by Logistic Regression
Abstract: Breast cancer is found to be the foremost root cause of deaths associated with cancer in Asian women,
and in recent days, it has become common among women out running cervical cancer. This work intends to 555-562
analyse, evaluate and compare the effectiveness of the existing breast cancer imaging schemes like Ultrasound,
Mammography, and Magnetic resonance imaging techniques using Logistic regression, a statistical prediction
machine learning tool for diagnosing breast cancer. Using the logistic regression tool, breast cancer factor values
are obtained and tabulated to compare the suggested methods. The tabulated results validate that, MRI exhibits
remarkably higher sensitivity values compared to other imaging techniques such as mammography and ultrasound
imaging could be ineffective in patients with cancer history and fails to diagnose some mass in dense breast tissue.
Keywords: Breast Cancer, Mammogram, Magnetic Resonance Imaging, Ultrasound, Logistic regression.
References: 1. Chakraborti, K. L., Bahl, P., Sahoo, M., Ganguly, S. K., & Oberoi, C. (2005). Magentic resonance imaging of breast masses:
Comparison with mammography. Indian Journal of Radiology and Imaging, 15(3), 381.
2. Yusuff, H., Mohamad, N., Ngah, U. K., & Yahaya, A. S. (2012). Breast cancer analysis using logistic regression. International Journal of
Research and Reviews in Applied Sciences, 10(1), 14-22. 3. Prasad, N., & Houserkova, D. (2007). The role of various modalities in breast imaging. Biomedical Papers of the Medical Faculty of
Palacky University in Olomouc, 151(2).
4. Kuhl, C. K., Schrading, S., Leutner, C. C., Morakkabati-Spitz, N., Wardelmann, E., Fimmers, R., & Schild, H. H. (2005). Mammography, breast ultrasound, and magnetic resonance imaging for surveillance of women at high familial risk for breast
cancer. Journal of clinical oncology, 23(33), 8469-8476.
5. Reddy, D. H., & Mendelson, E. B. (2005). Incorporating new imaging models in breast cancer management. Current treatment options in oncology, 6(2), 135-145.
6. Kriege, M., Brekelmans, C. T., Boetes, C., Besnard, P. E., Zonderland, H. M., Obdeijn, I. M., ... & Muller, S. H. (2004). Efficacy of MRI
and mammography for breast-cancer screening in women with a familial or genetic predisposition. New England Journal of Medicine, 351(5), 427-437.
7. Lewin, J. M., Hendrick, R. E., D’Orsi, C. J., Isaacs, P. K., Moss, L. J., Karellas, A., ... & Cutter, G. R. (2001). Comparison of full-field
digital mammography with screen-film mammography for cancer detection: results of 4,945 paired examinations. Radiology, 218(3), 873-880.
8. Fischer, U., Baum, F., Obenauer, S., Luftner-Nagel, S., Von Heyden, D., Vosshenrich, R., & Grabbe, E. (2002). Comparative study in
patients with microcalcifications: full-field digital mammography vs screen-film mammography. European radiology, 12(11), 2679-2683.
9. Kolb, T. M., Lichy, J., & Newhouse, J. H. (2002). Comparison of the performance of screening mammography, physical examination,
and breast US and evaluation of factors that influence them: an analysis of 27,825 patient evaluations. Radiology, 225(1), 165-175. 10. Liberman, L., Morris, E. A., Dershaw, D. D., Abramson, A. F., & Tan, L. K. (2003). MR imaging of the ipsilateral breast in women with
percutaneously proven breast cancer. American Journal of Roentgenology, 180(4), 901-910.
11. Kristoffersen Wiberg, M., Aspelin, P., Perbeck, L., & Bone, B. (2002). Value of MR imaging in clinical evaluation of breast lesions. Acta Radiologica, 43(3), 275-281.
12. Berg, W. A., Gutierrez, L., NessAiver, M. S., Carter, W. B., Bhargavan, M., Lewis, R. S., & Ioffe, O. B. (2004). Diagnostic accuracy of
mammography, clinical examination, US, and MR imaging in preoperative assessment of breast cancer. Radiology, 233(3), 830-849. 13. MARIBS Study Group. (2005). Screening with magnetic resonance imaging and mammography of a UK population at high familial risk
of breast cancer: a prospective multicentre cohort study (MARIBS). The Lancet, 365(9473), 1769-1778.
14. Lee, C. H., Dershaw, D. D., Kopans, D., Evans, P., Monsees, B., Monticciolo, D., & Hendrick, E. (2010). Breast cancer screening with
imaging: recommendations from the Society of Breast Imaging and the ACR on the use of mammography, breast MRI, breast
ultrasound, and other technologies for the detection of clinically occult breast cancer. Journal of the American college of radiology, 7(1),
18-27.
102.
Authors: P Osman, PV Sridevi, K V S N Raju
Paper Title: Dual Band Band-Pass Filters using Plasmonic Split-mode Ring Resonator
Abstract: This article presents a two types of plasmonic split mode ring resonator band-pass filter (BPF) using
metal-insulator-metal (MIM) waveguide. The two filters operate at two optical wavelengths in between O (1260-
nm to1360-nm) and L (1565-nm to 1625-nm) bands. The designed split-modes ring resonators are designed using
local resonance and notch perturbation split-modes respectively. A full wave simulation software tool has been
used in the designing of the split-mode resonator band-pass filter. These filters are used in the designing of dual-
band high density photonic integrated circuits (PICs).
Keywords: (MIM) waveguide, (BPF), (1260-nm to1360-nm), (PICs),(1565-nm to 1625-nm) bands.
References: 1. W.Mu andJ. B.Ketterson, “Long-range surfaceplasmonpolaritons propagating on adielectric waveguide support,” vol.36, no. 23, pp.
4713-4715, Dec. 2011.
2. P. Taylor,C. Li,D. Qi, J. Xin, andF. Hao, “Metal-insulator-metal plasmonicwaveguidefor low- distortionslow lightattelecom frequencies,”vol.61 no.8 , pp. 37-41, Nov. 2014.
3. J. H.Zhu,Q. J.Wang, P. Shum,and X. G. Huang, “A Simple Nanometeric PlasmonicNarrow-Band FilteStructure Basedon Metal -Insulator - Metal Waveguide,” vol 10, no. 6, pp.1371-1376, Nov. 2011.
4. G. Duan,P. Lang, L.Wang, L.Yu, and J Xiao, “Aband-pass plasmonic filter with dual-square ring resonator,” Mod. Phys. Lett. B, vol. 28,
no. 23, pp.1450188(1-5),Sep. 2014. 5. G.Zheng, L.Xu, and Y. Liu,“Tunable plasmonic filter with circular metal-insulator-metal ring resonatorcontaining double narrow gaps,”
Pramana J. Phys., vol. 86, no. 5, pp. 1091-1097, May 2016.
6. N.JankovicandN. Cselyuszka,“Multiple fano-likeMIMplasmonic structure basedon triangularresonatorfor refractiv index sensing,” Sensors (Switzerland), vol 18, no. 1,pp.287(1-10), Jan. 2018.
7. S. M. Grist et al., “Silicon photonic micro-disk resonators for label-free biosensing,” Opt. Express, vol. 21, no.7, pp. 7994-7998, Mar.
2013. 8. Jhonsonand Christy, “Optical Constants ofNoble Metals, ” Phys.Rev. Lett.,vol.6, no. 12, pp.4370-4379, Dec.1972.
9. A. Kamma, G. S.Reddy, P.Suggisetti, andJ. Mukherjee,“A Novel and Compact Ultra-Wide Band ( UWB Filter Using Modified Split
Ring Resonato ( MSRR ),” vol. 8, pp. 69–71, 2014. 10. I. WolffandN.Knoppik, “Microstripring resonatorand dispersion measurementonmicrostrip lines,”Electron. Lett., vol. 7, pp. 779(1-
3),Nov. 1971.
563-565
103. Authors: N Saida Naik, A Sai Pallavi, L Srujana
Paper Title: Improvement of Sag under Different Fault Conditions
Abstract: The improvement of power flow in a distributed system can be achieved by the FACTS compensator
that is D-STATCOM (DISTRIBUTION_STATIC_COMPENSATOR) also known as which is shunt connected, is
explained in this paper. To reduced the Sag-in-voltage issues(power quality issue), a Distribution-STATCOM is
used which is connected at PCC (Point of Common Coupling).The advantage of quick operation of Distribution-
STATCOM makes the it more efficient and hence power flow is improved. Varied controllers are utilzed to
operate the Distribution-STATCOM. To enhance the power flow, we are simulating and designing it with PI
Controller. In distribution networks with linear balanced loads, their power flow can be increases at varied fault
conditions such as L-L Faults (Line to Line),L-G Faults (Line to Ground), L-L-G Faults, L-L-L-G Faults. These
faults are studied and simulated output waveforms are presented also calculating THD (Total Harmonic Distortion)
with and without Distribution-STATCOM Compensator. The harmonics and Sag-in-voltages due to LG, LLG &
LLLG faults in this proposed system are reduced and we can achieve enhanced power flow. The reduction of faults
and trhe value of THD ( Total-Harmonic-Distortion) can be simulated and studied in MATLAB.
Keywords: DSTATCOM, PI, FAULTS, PWM
References: 1. Lakshman naik popavath, k.palanisamy “a dstatcom for enhancement of power quality in distribution systems” international journal of
pure and applied mathematics volume 118 no. 18 2018, 4083-4094 issn: 1311-8080 (printed version); issn: 1314-3395 (on-line version).
2. Manpreetsingh, jaspreetkaur “role of dstatcom in distribution network under various fault conditions” international journal of advanced
research in electrical,electronics and instrumentation engineering vol. 4, issue 7, july 2015 issn (print) : 2320 – 3765 , issn (online): 2278 – 8875.
3. Miss mallelaleelamounika ,mrk.v.kishore “ modelling and simulation of d-statcom for power quality problems using sinusoidal pulse width
modulation (spwm)” ijcsiet--international journal of computer science information and engg., technologies issue5-volume2, issn 2277-4408.
4. Kartikparmarpratikkabrawala prof. Pinkalj.patel “simulation and analysis of dstatcom” 2014 ijedr volume 2, issue 1 issn: 2321-9939.
5. Darjidhaval d. Patel sumit r. Prof.hardik h. Raval “improving voltage profile of distribution system using dstatcom” 2014 ijedr volume 2, issue 1 issn: 2321-9939.
6. Honey baby swaminathan.p j. Jayakumar “enhancing power quality issues in distribution system using d-statcom” international journal of
recent research aspects issn: 2349-7688, vol. 4, issue 4, dec 2017, pp. 356-359. 7. Akshaybhargav, harsh sharma “control of total harmonic distortion in distribution network using compensation” international journal of
science and research (ijsr) volume 5 issue 5, may 2016 issn (online): 2319-7064
566-569
104.
Authors: T. Charan Singh, K. Raghu Ram, B.V. Sanker Ram
Paper Title: Transient Stability Analysis of Six Phase Transmission System with Integration of WPGS and
STATCOM with Smart Grid
Abstract: In recent times Transient stability analysis has become a major concern in the operation of power
systems due to the rising stress on power system networks. These difficulties require assessment of a power
system’s ability to with stand instability while maintaining the excellence of service. Many different techniques
have been projected for transient stability analysis in power systems, especially for a multi machine system. This
paper describes simulation of six phase multi-machine power system (MMPS) with wind power generator
integration in dynamic operation. By the introduction of wind power generation system (WPGS) in multi-machine
at weak bus in parallel with STATCOM can improve the generator load angle deviation during fault condition. The
MMPS performance is analysed by placing six phase line between different buses. The replacement of
transmission line can reduces the line impedances, which results in reduced angle distortion of machines and
improved stability .The proposed WPGS based MMPS phase angle and frequency variations are analyzed during
symmetrical and asymmetrical fault conditions. The MATLAB/Simulation software is used to test the behavior of
proposed system.
Keywords: Wind system, six phase transmission line, STATCOM, multi-machine system, stability.
References: 1. D. Basic, J. G. Zhu, and G. Boardman, “Transient performance study of a brushless doubly fed twin stator induction generator,” IEEE
Trans. energy Convers., vol. 18, no. 3, pp. 400–408, 2003.
2. G. K. Singh, “Modeling and experimental analysis of a self-excited six-phase induction generator for stand-alone renewable energy
generation,” Renew. energy, vol. 33, no. 7, pp. 1605–1621, 2008. 3. J. R. Stewart and D. D. Wilson, “High phase order transmission--a feasibility analysis part I--steady state considerations,” IEEE Trans.
Power Appar. Syst., no. 6, pp. 2300–2307, 1978. 4. T. L. Landers, R. J. Richeda, E. Krizanskas, J. R. Stewart, and R. A. Brown, “High phase order economics: constructing a new
transmission line,” IEEE Trans. Power Deliv., vol. 13, no. 4, pp. 1521–1526, 1998.
5. J. M. Arroyo and A. J. Conejo, “Optimal response of a power generator to energy, AGC, and reserve pool-based markets,” IEEE Trans. Power Syst., vol. 17, no. 2, pp. 404–410, 2002.
6. J. R. Stewart, E. Kallaur, and I. S. Grant, “Economics of EHV high phase order transmission,” IEEE Trans. power Appar. Syst., no. 11,
pp. 3386–3392, 1984. 7. N. G. Hingorani, L. Gyugyi, and M. El-Hawary, Understanding FACTS: concepts and technology of flexible AC transmission systems,
vol. 1. IEEE press New York, 2000.
8. G. Cai, Q. Sun, C. Liu, P. Li, and D. Yang, “A new control strategy to improve voltage stability of the power system containing large-scale wind power plants,” in Electric Utility Deregulation and Restructuring and Power Technologies (DRPT), 2011 4th International
Conference on, 2011, pp. 1276–1281.
9. L. Wang and C.-T. Hsiung, “Dynamic stability improvement of an integrated grid-connected offshore wind farm and marine-current farm using a STATCOM,” IEEE Trans. power Syst., vol. 26, no. 2, pp. 690–698, 2011.
10. S. S. Venkata, W. C. Guyker, W. H. Booth, J. Kondragunta, N. K. Saini, and E. K. Stanek, “138-kV, six-phase transmission system: fault
analysis,” IEEE Trans. Power Appar. Syst., no. 5, pp. 1203–1218, 1982. 11. A. P. Apostolov and R. G. Raffensperger, “Relay protection operation for faults on NYSEG’s six-phase transmission line,” IEEE Trans.
Power Deliv., vol. 11, no. 1, pp. 191–196, 1996.
570-576
12. N. B. Bhatt, S. S. Venkata, W. C. Guyker, and W. H. Booth, “Six-phase (multi-phase) power transmission systems: fault analysis,” IEEE
Trans. Power Appar. Syst., vol. 96, no. 3, pp. 758–767, 1977.
13. R. J. Vidmar, “On the use of atmospheric plasmas as electromagnetic reflectors,” IEEE Trans. Plasma Sci, vol. 21, no. 3, pp. 876–880, 1992.
105.
Authors: R. Umamaheswari, Ch. Sumanth Kumar
Paper Title: Optimization of Training Sequence Based Sparse Channel Estimation for Mmwave Communications in
5G
Abstract: In this paper to achieve higher data rates with high spectral efficiency and high accuracy we
designed training sequence sparse channel estimation based on BAT, Cuckoo and Firefly algorithms. By using the
above techniques we design a Training sequence channel estimation to reduce the bit error rate, mean square error
and accurate recovery of data. The firefly optimization is the promising technique to reduce the bit error rate and to
increase the signal to noise ratio to achieve high spectral efficiency Gbps.
Keywords: Quadrature Amplitude Modulation , Bit Error rate, Signal to Noise Ratio
References: 1. Ma, Xu, Fang Yang, Sicong Liu, Jian Song, and Zhu Han. "Design and optimization on training sequence for mmwave communications:
A new approach for sparse channel estimation in massive MIMO." IEEE journal on selected areas in communications 35, no. 7 (2017):
1486-1497. 2. Rappaport, Theodore S., Yunchou Xing, George R. MacCartney, Andreas F. Molisch, Evangelos Mellios, and Jianhua Zhang. "Overview
of Millimeter Wave Communications for Fifth-Generation (5G) Wireless Networks—With a Focus on Propagation Models." IEEE
Transactions on Antennas and Propagation 65, no. 12 (2017): 6213-6230. 3. González-Prelcic, Nuria, Anum Ali, Vutha Va, and Robert W. Heath. "Millimeter-Wave Communication with Out-of-Band Information."
IEEE Communications Magazine 55, no. 12 (2017): 140-146. 4. Niu, Yong, Yong Li, Depeng Jin, Li Su, and Athanasios V. Vasilakos. "A survey of millimeter wave (mmwave) communications for 5g:
opportunities and challenges. arXiv preprint." arXiv preprint arXiv:1502.07228 (2015).
5. Niu, Y., Y. Li, D. Jin, L. Su, and A. Vasilakos. "A survey of milimeter wave (mmwave) communications for 5g: Opportunities and challenges." Computer Science-Networking and Internet Architecture (2015).
6. Schniter, Philip, and Akbar Sayeed. "Channel estimation and precoder design for millimeter-wave communications: The sparse way." In
Signals, Systems and Computers, 2014 48th Asilomar Conference on, pp. 273-277. IEEE, 2014. 7. Xiao, Ming, Shahid Mumtaz, Yongming Huang, Linglong Dai, Yonghui Li, Michail Matthaiou, George K. Karagiannidis et al.
"Millimeter wave communications for future mobile networks." IEEE Journal on Selected Areas in Communications 35, no. 9 (2017):
1909-1935. 8. Zhao, Lou, Derrick Wing Kwan Ng, and Jinhong Yuan. "Multi-user precoding and channel estimation for hybrid millimeter wave
systems." IEEE Journal on Selected Areas in Communications 35, no. 7 (2017): 1576-1590.
9. Zhao, Lou, Derrick Wing Kwan Ng, and Jinhong Yuan. "Multiuser precoding and channel estimation for hybrid millimeter wave MIMO systems." In Communications (ICC), 2017 IEEE International Conference on, pp. 1-7. IEEE, 2017.
10. Arora, Sankalap, and Satvir Singh. "A conceptual comparison of firefly algorithm, bat algorithm and cuckoo search." In Control
Computing Communication & Materials (ICCCCM), 2013 International Conference on, pp. 1-4. IEEE, 2013. 11. Fister Jr, Iztok, Xin-She Yang, Iztok Fister, Janez Brest, and Dušan Fister. "A brief review of nature-inspired algorithms for
optimization." arXiv preprint arXiv:1307.4186 (2013).
577-581
106.
Authors: B. Prasanthi, N. Nagamalleswararao
Paper Title: Optimal kernel based Neutrosophic Soft sets Clustering for Image Segmentation based on Pareto
Optimal Algorithm
Abstract: In bio-medical image processing, brain image segmentation is an aggressive concept in present days.
Disorders of brain mainly requires accurate tissue extraction and classification of magnetic resonance (MR)
medical brain images, which is very effective and important to detect different types of tumors, and necrotic tissue
classification and segmentation. To handle brain image segmentation, mathematical tools like fuzzy sets, rough
sets and soft sets are used to define uncertainty and vagueness of brain images. Accurate and effective
segmentation and detection of tumor on brain image is still a challenging task in medical brain images with respect
to reduction of noise, smoothness of image and accuracy for segmentation of medical brain images and other
parameters. We propose and introduce a Novel Brain Segmentation approach based on neutrosophic soft sets is
introduced to explore uncertainties relates to white, grey and cerebro spinal fluid matters for the detection tumor
from MR brain image with respect to bias field estimation and co-relation based on decision making. Our proposed
approach consist Pareto Optimization algorithm to support neutrosophic soft sets approximations for the optimal
kernel parameters (like kernel functions). These approximations are free to define weight parameters and average,
median, weight filters and less complexity compared to existing algorithms. Our experimental results show
effective performance of proposed approach with respect to segmentation accuracy, time and jacquard parameters
compared to existing algorithms.
Keywords: Segmentation of brain image, fuzzy c-means, Intuitionistic neutrosophic soft sets, rough sets, magnetic
resonance.
References: 1. C. Xu, D.L. Pham, J.L. Prince, Image segmentation using deformable models, Handb. Med. Imaging 2 (2000) 129-174.
2. J. C. Bezdek, Pattern Recognition with Fuzzy Objective Function Algorithms. New York, NY, USA: Plenum, 1981. 3. J.C. Bezdek, L.O. Hall, L.P. Clark, Review of MR segmentation technique in pattern recognition, Medical Physics 10 (20) (1993) 33-48.
4. J.T. Tou, R.C. Gonzalez, Pattern Recognition, Addison-Wesley, Reading, MA,1974.
5. D.S. Modha, W.S. Spangler, Feature weighting in k-means clustering, Mach.Learn. 52 (3) (2003) 217-237. 6. J.C. Bezdek, R. Ehrlich, W. Full, FCM: the fuzzy c-means clustering algorithm, Comput. Geosci. 10 (2) (1984) 191-203.
7. Z. X. Ji, Q. S. Sun, and D. S. Xia, A framework with modified fast FCM for brain MR images segmentation, Pattern Recognition, vol. 44,
pp. 999-1013, May 2011
8. B. Caldairou, N. Passat, P. A. Habas, C. Studholme, and F. Rousseau,A non-local fuzzy segmentation method: Application to brain
MRI,Pattern Recognition, vol. 44, pp. 1916-1927, 2011.
582-591
9. Z. X. Ji, Q. S. Sun, and D. S. Xia, A modified possibilistic fuzzy c-means clustering algorithm for bias field estimation and segmentation
of brain MR image, Computerized Medical Imaging and Graphics, vol. 35, p. 383397, 2011.
10. Ahmed MN, Yamany S, Mohamed N, Farag A, Moriarty T. A modified fuzzy c-means algorithm for bias field estimation and segmentation of MRI data. IEEE Trans Med Imaging 2002;21(3):193-9.
11. N.R. Pal, K. Pal, J.M. Keller, J.C. Bezdek, A possibilistic fuzzy c-means clustering algorithm, IEEE Trans. Fuzzy Syst. 13 (4) (2005) 517-
530.
12. K.-S. Chuang, H.-L. Tzeng, S. Chen, J. Wu, T.-J. Chen, Fuzzy c-means clusteringwith spatial information for image segmentation,
Comput. Med. ImagingGraph. 30 (1) (2006) 9-15.
13. W. Cai, S. Chen, D. Zhang, Fast and robust fuzzy c-means clustering algorithms incorporating local information for image segmentation, Pattern Recognit. 40(3) (2007) 825-838.
14. S. Krinidis, V. Chatzis, A robust fuzzy local information c-means clustering algorithm, IEEE Trans. Image Process. 19 (5) (2010) 1328-
1337. 15. C. Li, J.C. Gore, C. Davatzikos, Multiplicative intrinsic component optimization(MICO) for MRI bias field estimation and tissue
segmentation, Magn. Reson.Imaging 32 (7) (2014) 913-923.
16. Chen S, Zhang D. Robust image segmentation using FCM with spatial constraint based on new kernel-induced distance measure. IEEE Trans Syst Man Cybern B 2004;34 (4):1907-16.
17. Souza, C.R. Kernel functions for machine learning applications. Creat. Commons Attrib. Noncommer. Share Alike 2010, 3, 29.
18. Lin, K.-P. A novel evolutionary kernel intuitionistic fuzzy C-means clustering algorithm. IEEE Trans. Fuzzy Syst. 2014, 22, 1074–1087. 19. Yang, M.S.; Tsai, H.S. A Gaussian kernel-based fuzzy c-means algorithm with a spatial bias correction.Pattern Recogn. Lett. 2008, 29,
1713–1725.
20. Zhang, D.-Q.; Chen, S.-C. Clustering incomplete data using kernel-based fuzzy C-means algorithm. Neural Process. Lett. 2003, 18, 155–162.
21. Zhang, D.-Q.; Chen, S.-C. A novel kernelized fuzzy c-means algorithm with application in medical image segmentation. Artif. Intell.
Med. 2004, 32, 37–50. 22. Gong, M.G.; Liang, Y.; Shi, J.; Ma, W.P.; Ma, J.J. Fuzzy C-Means Clustering With Local Information and Kernel Metric for Image
Segmentation. IEEE Trans. Image Process. 2013, 22, 573–584.
23. Ji, Z.X.; Liu, J.Y.; Cao, G.; Sun, Q.S.; Chen, Q. Robust spatially constrained fuzzy c-means algorithm for brain MR image segmentation. Pattern Recogn. 2014, 47, 2454–2466.
24. Li, C.M.; Gore, J.C.; Davatzikos, C. Multiplicative intrinsic component optimization (MICO) for MRI bias field estimation and tissue
segmentation. Magn. Reson. Imaging 2014, 32, 913–923. 25. Krinidis, S.; Chatzis, V. A Robust Fuzzy Local Information C-Means Clustering Algorithm. IEEE Trans. Image Process. 2010, 19, 1328–
1337.
26. Goldberg, D.E. Genetic Algorithms in Search, Optimization, and Machine Learning; Addison-Wesley: Boston, MA, USA, 1989. 27. Tao, J.; Wang, N. DNA computing based RNA genetic algorithm with applications in parameter estimation of chemical engineering
processes. Comput. Chem. Eng. 2007, 31, 1602–1618.
28. Zang, W.; Zhang, W.; Zhang, W.; Liu, X. A Genetic Algorithm Using Triplet Nucleotide Encoding and DNA Reproduction Operations for Unconstrained Optimization Problems. Algorithms 2017, 10, 16.
29. Zang,W.; Ren, L.; Zhang,W.; Liu, X. Automatic Density Peaks Clustering Using DNA Genetic Algorithm Optimized Data Field and
Gaussian Process. Int. J. Pattern Recogn. 2017, 31, 1750023. 30. Zang,W.; Jiang, Z.; Ren, L. Improved spectral clustering based on density combining DNA genetic algorithm. Int. J. Pattern Recogn.
2017, 31, 1750010.
31. Zang, W.; Sun, M.; Jiang, Z. A DNA genetic algorithm inspired by biological membrane structure. J. Comput. Theor. Nanosci. 2016, 13, 3763–3772
32. Elazab, A.; Wang, C.; Jia, F.; Wu, J.; Li, G.; Hu, Q. Segmentation of brain tissues from magnetic resonance images using adaptively
regularized kernel-based fuzzy-means clustering. Comput. Math. Method Med 2015. 33. Gong, M.G.; Liang, Y.; Shi, J.; Ma, W.P.; Ma, J.J. Fuzzy C-Means Clustering With Local Information and Kernel Metric for Image
Segmentation. IEEE Trans. Image Process. 2013, 22, 573–584.
34. Pillonetto, G.; Dinuzzo, F.; Chen, T.S.; De Nicolao, G.; Ljung, L. Kernel methods in system identification, machine learning and function estimation: A survey. Automatica 2014, 50, 657–682.
35. Zhang, L.;Wang, N. A modified DNA genetic algorithm for parameter estimation of the 2-Chlorophenol oxidation in supercritical water.
Appl. Math. Model. 2013, 37, 1137–1146. 36. Gousias, I.S.; Edwards, A.D.; Rutherford, M.A.; Counsell, S.J.; Hajnal, J.V.; Rueckert, D.; Hammers, A. Magnetic resonance imaging of
the newborn brain: Manual segmentation of labelled atlases in term-born and preterm infants. Neuroimage 2012, 62, 1499–1509.
107.
Authors: Sandeep Raskar, kamatchi Iyer
Paper Title: Node mobility prediction in Wireless Adhoc Network
Abstract: Generally, Link between any two nodes in the wireless network is a bottleneck in process of selecting a
path in a network, or among or across multiple networks. Nodes are moving in the network unknowingly. So even
if an algorithm selects the node during the path initialization process for the transmission of data among source and
destination node, we cannot predict that node will be on the same position in the network when actual data
transmission starts. There are many algorithm defined in selection of path in ad hoc network. This paper proposes
new concept called Neural Network (NN) model. It predicts the node movements in ad-hoc network during data
transmission. Algorithm can predicts the movement of a node in a network on the basis of information of previous
movements of that node.
Keywords: Network Model; shortest path routing; Neural Network.
References: 1. S.Jayashri and M.Malathi, " Robust against route failure using power proficient reliable routing in MANET", Alexandria Engineering
Journal, Available online, 2016. 2. Qingyang Song, ZhaolongNing, ShiqiangWang and AbbasJamalipour, " Link stabilityestimationbasedonlinkconnectivitychangesinmobile
ad-hoc networks", JournalofNetworkandComputerApplications, vol. 35, pp. 2051–2058,2012.
3. Dr. K. Poulose Jacob, Preetha K G, and Dr. A Unnikrishnan, " An Effective Path Protection Method to Attain the Route Stability in MANET", vol. 2, no. 6, 2013, A International Journal of Advanced Research in Computer and Communication Engineering.
4. Shubhajeet Chatterjee and Swagatam Das, " Ant colony optimization based enhanced dynamic source routing algorithm for mobile Ad-
hoc network", Information Sciences, vol. 295 pp. 67–90, 2015. 5. Alma A.M.Rahat, Richard M.Everson and Jonathan E.Fieldsend, " Evolutionary multi-path routing for network lifetime and robustness in
wireless sensor networks", Ad Hoc Networks, vol. 52, pp. 130-145, 2016.
6. Mawloud Omar, SabrineHedjaz, SouhilaRebouh, KatiaAouchar, BournaneAbbache and AbdelkamelTari, " On-demand source routing with reduced packets protocol in mobile ad-hoc networks", AEU - International Journal of Electronics and Communications, vol. 69,
592-595
no.10, pp.1429-1436, 2015.
7. Sudip Misra, Sanjay K. Dhurandher, Mohammad S. Obaidat,∗, Pushkar Gupta, Karan Verma and Prayag Narula, " An ant swarm-inspired
energy-aware routing protocol for wireless ad-hoc networks", The Journal of Systems and Software, vol. 83 , pp. 2188–2199, 2010.
8. Huafeng Wu, JunWang, Raghavendra RaoAnanta, Vamsee ReddyKommareddy, RuiWang and PrasantMohapatra, " Prediction based
opportunistic routing for maritime search and rescue wireless sensor network", Journal of Parallel and Distributed Computing, vol. 111, pp. 56-64, 2018.
9. Gyanappa A.Walikar and Rajashekar C.Biradar, " A survey on hybrid routing mechanisms in mobile ad hoc networks", Journal of
Network and Computer Applications", vol. 77, pp. 48-63, 2017. 10. Haiying Shen and Lianyu Zhao, " ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs", IEEE Transactions
on Mobile Computing, vol. 12, no. 6, 2013
11. Ritu Sharma, " A Secure and Proficient Routing Protocol in Mobile Ad-hoc Networks using Genetic Mechanism", International Journal of Innovative Research in Computer and Communication Engineering, vol. 4, no.6, 2016.
12. K. Manjappa and R. M. Reddy Guddeti, "Mobility aware-termite: a novel bio inspired routing protocol for mobile ad-hoc networks," in
IET Networks, vol. 2, no. 4, pp. 188-195, December 2013. 13. Somayeh Taheri, Salke Hartung and Dieter Hogrefe, " Anonymous group-based routing in MANETs", Journal of Information Security
and Applications, vol. 22 no. C, pp. 87-98, 2015.
14. GurpreetSingh, NeerajKumar and AnilKumarVerma, " ANTALG:AnInnovativeACObasedRoutingAlgorithmforMANETs", Journal ofNetworkandComputerApplications, vol. 45, pp. 151–167, 2014.
15. ShahramJamali, LeilaRezaei and Sajjad JahanbakhshGudakahriz, " An Energy-efficient Routing Protocol for MANETs: a Particle Swarm
Optimization Approach", Journal of Applied Research and Technology, vol. 11, no. 6, pp.803-812, 2013. 16. Hasan Abdulwahid, BinDai, BenxiongHuang and ZijingChen, " Scheduled-links multicast routing protocol in MANETs", Journal of
Network and Computer Applications, vol. 63, pp. 56-67, 2016.
17. A.Amuthan, N.Sreenath, P.Boobalan and K.Muthuraj, " Dynamic multi-stage tandem queue modeling-based congestion adaptive routing for MANET", Alexandria Engineering Journal, Available online, 2017.
18. Malik N.Ahmed, Abdul HananAbdullah, HassanChizari and OmprakashKaiwartya, " F3TM: Flooding Factor based Trust Management Framework for secure data transmission in MANETs", Journal of King Saud University - Computer and Information Sciences, vol. 29,
no. 3, pp. 269-280, July 2017.
19. ArindrajitPal, Jyoti PrakashSingh and Paramartha Dutta, " Path length prediction in MANET under AODV routing: Comparative analysis of ARIMA and MLP model", Egyptian Informatics Journal, vol.16, no. 1, pp. 103-111, 2015.
20. Saad M.Adam and RosilahHassan, " Delay aware Reactive Routing Protocols for QoS in MANETs: a Review", Journal of Applied
Research and Technology, vol. 11, no. 6, pp. 844-850, 2013. 21. Vishal Sharma, Harsukhpreet Singh, Mandip Kaur and Vijay Banga, " Performance evaluation of reactive routing protocols in MANET
networks using GSM based voice traffic applications", Optik, vol. 124, pp. 2013– 2016, 2013.
22. Paramjit Singh, Ajay K. Sharma and T.S. Kamal, " An adaptive neuro-fuzzy inference system modeling for VoIP basedIEEE 802.11g MANET", Optik, vol. 127, pp.122–126, 2016.
23. Pedro Garcıa Lopez , Raul Gracia Tinedo and Josep M.Banu´ s Alsina, " Moving routing protocols to the user space in MANET
middleware", Journal of Network and Computer Applications, vol. 33, pp.588–602, 2010. 24. HaidarSafa, Marcel Karam and BassamMoussa, " PHAODV: Power aware heterogeneous routing protocol for MANETs", Journal of
Network and Computer Applications, vol.46, pp. 60-71, 2014.
25. J. Sathiamoorthy, B. Ramakrishnan and Usha. M, " Design of a proficient hybrid protocol for efficient route discovery and secure data transmission in CEAACK MANETs", Journal of Information Security and Applications, vol. 36, pp. 43–58, 2017.
26. Marjan Kuchaki Rafsanjani and Hamideh Fatemidokht, " FBeeAdHoc: A secure routing protocol for BeeAdHoc based on fuzzy logic in
MANETs", AEUE - International Journal of Electronics and Communications, vol. 69, no. 11, pp. 1613-1621, 2015.
27. Rajashekhar C.Biradar and SunilkumarS.Manvi, " Neighbor supportedreliablemultipathmulticastroutinginMANETs", Journal
ofNetworkandComputerApplications, vol. 35, pp.1074–1085, 2012.
28. MEI Jing-qing and JI Hong, LI Yi, " Query routing mismatch alleviation architecture for P2P file lookup in MANETs", The Journal of China Universities of Posts and Telecommunications, vol. 18, no. 4, pp. 111–117, 2011.
29. Fahad TahaAL-Dhief, NaseerSabri, S.Fouad, N.M. AbdulLatiff, Musatafa Abbas, AbboodAlbader, " A review of forest fire surveillance
technologies: Mobile ad-hoc network routing protocols perspective", Journal of King Saud University - Computer and Information Sciences, Available online,2017.
30. Yogeswaran Mohan, Sia Seng Chee, Donica Kan Pei Xin and Lee Poh Foong, " Artificial Neural Network for Classification of
Depressive and Normal in EEG", 2016 IEEE EMBS Conference on Biomedical Engineering and Sciences (IECBES), 2016.
108.
Authors: Sampath S S, Prasanth Sreekumar, Chithirai Pon Selvan M
Paper Title: Estimation of Power in High Altitude Freely Suspended Wind Turbine
Abstract: Conventional wind turbines are restricted in its use due to certain limitations and challenges in its
position. To use wind turbine efficiently and economically, it is required to overcome space requirements, noise,
variation in air current and set up cost. This study attempts to design and fabricate suspended wind turbine to
overcome the above stated hurdles. In this current work, the blades and the alternator are placed in the helium
balloon housing which is adjourned in the atmospheric air and supported to the floor surface with tether. A tether
made of conductive material is todiffuse the generated power from the airborne housing to the floor base. Blades
are made of aluminium and it ensures low rotational inertia. The proposed suspended wind mill in this study is able
to generate power output which is comparatively cheaper than conventional wind turbines and also work will be
able to cater the needs of electric power to remote areas and farms. Entire setup is modelled in 3D software Creo
and the simulation is carried out using ANSYS software.
Keywords: Alternator, finite element method, turbine blade, renewable energy, power
References: 1. M. Diehl, “Airborne wind energy concepts and its physical foundations,” Green Energy Technology, pp. 3–22, 2013. 2. L. Fagiano and T. Marks, “Design of a Small-Scale Prototype in Airborne Wind Energy,” IEEE/ASMETransactions on Mechatronics and
is subject to IEEE, pp. 1–18, 2014.
3. Lorenzo Fagiano and Dario Piga , “Optimization of airborne wind energy generators”, International journal of robust and nonlinear control, September 2011 , pp. 2055–2083, 2009.
4. N. Bilaniuk, D. Ph, P. Eng and L. T. a Windpower, “Generic System Requirements for High Wind Turbines,” October, 2009.
5. C. L. Archer and K. Caldeira, “Global assessment of wind power,” Energies, vol. 2, pp. 307–319, 2009. 6. L. Fagiano, M. Milanese and D. Piga, “High-altitude wind power generation for renewable energy ” .
7. B. Lansdorp and M. Sc, “Comparison of high-altitude wind energy generation with ground based generator” China International
Renewable Energy Equipment & Technology Exhibition and Conference, pp. 1–9, 2005. 8. A. Bolonkin, “Using of High Wind Energy ” , Smart Grid and Renewable Energy , vol. 2011, no. May, pp. 75–85, 2011.
596-602
9. C. L. Archer, “An Introduction to Meteorology for Airborne Wind Energy” Airborne Wind Energy, Green Energy and Technology, 2013,
pp. 81–94.
10. T. Ezaki, “Effect of coning angle for single-wire-suspended down-wind turbine” pp. 1–6. 11. J.Helsen,F.Vanhollebeke,D.Vandepitte and W.Desmet,“Some trends in wind turbine upscaling.”
12. M. Haastrup, M. R. Hansen and M. K. Ebbesen,“Modeling of Wind Turbine Gearbox Mounting”, Modeling, Identification and Control,
vol. 32, no. 4, pp. 141–149, 2011.
13. W. T. Chong, A. Fazlizan, S. C. Poh, K. C. Pan, W. P. Hew and F. B. Hsiao, “The design , simulation and testing of an urban vertical axis
wind turbine with the omni-direction-guide-vane q,” Appl. Energy, pp. 5–8, 2013.
14. H. A. Yanto, C. Lin, J. Hwang and S. Lin, “Modeling and control of household-size vertical axis wind turbine and electric power generation system,” PEDS, pp. 1301–1307.
15. S. S. Sampath, SawanShetty and ChithiraiPonSelvan M, “Estimation of power in low velocity vertical axis wind turbine” Frontiers of
mechanical engineering, 2015, pp:1-8. 16. D. S. Parker, J. R. Sherwin and B. Hibbs, “Development of High Efficiency Air Conditioner Condenser Fans,” ASHRAE Trans., vol. 111,
p. 511, 2005.
109.
Authors: Rudi Kurniawan Arief, Erry Yulian T. Adesta, Irfan Hilmy
Paper Title: Hardware Improvement of FDM 3D Printer: Issue of Bed Leveling Failures
Abstract: Rapid Prototyping is one of many technologies that trigger the Industrial Revolution 4.0. The open
source system that applied to 3D printer system make the research development grow rapidly. Most favorable
research topics are in the area of extrusion head, material and functional modification. But the difficulties in
leveling the heated bed has created worst user experiment and cause some catastrophic failures to be happens. This
paper reviewed the research conducted around improvement of the FDM printer’s hardware. The cause of most
occur failures in FDM printing also discussed. To overcome the disturbing failure caused by the lack of levelness
of the heated bed, a pine trees liked pin system is introduced.
Keywords: FDM, 3D Printer, Bed Leveling, Heated Bed, Printing Failures.
References: 1. V. Sharma and S. Singh, “Rapid Prototyping : Process advantage , comparison and application,” Int. J. Comput. Intell. Res., vol. 12, no. 1,
pp. 55–61, 2016.
2. A. Kumar Singh and S. Chauhan, “Technique to Enhance FDM 3D Metal Printing,” Bonfring Int. J. Ind. Eng. Manag. Sci., vol. 6, no. 4,
pp. 128–134, 2016. 3. R. Nagpal, R. Gupta, and V. Gupta, “A review on trends and development of rapid prototyping processes in industry,” A Rev. trends Dev.
rapid Prototyp. Process. Ind., vol. 2, no. 4, pp. 224–228, 2017.
4. K. Kun, “Reconstruction and development of a 3D printer using FDM technology,” Procedia Eng., vol. 149, no. June, pp. 203–211, 2016. 5. S. K. Ueng, L. K. Chen, and S. Y. Jen, “A preview system for 3D printing,” Proc. 2017 IEEE Int. Conf. Appl. Syst. Innov. Appl. Syst.
Innov. Mod. Technol. ICASI 2017, pp. 1508–1511, 2017.
6. E. Fang and S. Kumar, “The Trends and Challenges of 3D Printing,” in Encyclopedia of Information Science and Technology, Fourth Edition, 4th ed., no. August, M. Khosrow, Ed. PA: IGI Global, 2018, pp. 4382–4388.
7. S. P. Deshmukh et al., “Design and development of XYZ scanner for 3D printing,” 2017 Int. Conf. Nascent Technol. Eng. ICNTE 2017 -
Proc., 2017.
8. B. M. Schmitt, C. F. Zirbes, C. Bonin, D. Lohmann, D. C. Lencina, and A. da C. Sabino Netto, “A Comparative Study of Cartesian and
Delta 3D Printers on Producing PLA Parts,” Mater. Res., vol. 20, pp. 883–886, 2017. 9. R. Jerez-Mesa, J. A. Travieso-Rodriguez, X. Corbella, R. Busqué, and G. Gomez-Gras, “Finite element analysis of the thermal behavior
of a RepRap 3D printer liquefier,” Mechatronics, vol. 36, pp. 119–126, 2016.
10. M. Teliskova, J. Torek, T. Cmorej, M. Kocisko, and J. Petrus, “Adjustments of RepRap type printer workbench,” 2017 4th Int. Conf. Ind. Eng. Appl. ICIEA 2017, pp. 15–19, 2017.
11. A. Quatrano, M. C. De Simone, Z. B. Rivera, and D. Guida, “Development and implementation of a control system for a retrofitted CNC
machine by using Arduino,” FME Trans., vol. 45, no. 4, pp. 565–571, 2017. 12. K. Gunaydin, “Common FDM 3D Printing Defects,” Istanbul, 2018.
13. F. Sovaila, C. Sovaila, and N. Baroiu, “Universal Delta 3D Printer,” J. Ind. Des. Eng. Graph. 29, vol. 4, no. 4, pp. 33–37, 2016.
14. A. Ogulmus, A. Cakan, and M. Tınkır, “Modeling And Position Control Of Scara Type 3D Printer,” Int. J. Sci. Technol. Res., vol. 5, no. 12, pp. 140–143, 2016.
15. M. R. Pfeifer, “Rapid Prototyping Technologies for Manufacturing and Maintenance Activities,” Technol. Eng., vol. 14, no. 2, pp. 2–4,
2017. 16. H. W. Lim, Cassidy, T. and Cassidy, and T. Diane, “Application Research of 3D Printing Technology on Dress Forms,” Int. J. Eng.
Technol., vol. 9, no. 1, pp. 78–83, 2017.
17. V. G. Surange and P. V Gharat, “3D Printing Process Using Fused Deposition Modelling (FDM),” Int. Res. J. Eng. Technol., vol. 3, no. 3, pp. 1403–1406, 2016.
18. G. I. J. Salentijn, P. E. Oomen, M. Grajewski, and E. Verpoorte, “Fused Deposition Modeling 3D Printing for (Bio)analytical Device
Fabrication: Procedures, Materials, and Applications,” Anal. Chem., vol. 89, no. 13, pp. 7053–7061, 2017. 19. E. Soriano Heras, F. Blaya Haro, J. M. de Agustín del Burgo, M. Islán Marcos, and R. D’Amato, “Filament advance detection sensor for
fused deposition modelling 3D printers,” Sensors (Switzerland), vol. 18, no. 5, 2018.
20. M. Stopka, R. Kohár, P. Weis, and J. Šteininger, “Concept of modular 3D printer construction,” IOP Conf. Ser. Mater. Sci. Eng., vol. 393, p. 012092, 2018.
21. A. Daniel and V. Christian, “Improvements to control system of a multi-extruder 3D printer using a controller duet card,” 2017 Congr.
Int. Innov. y Tendencias en Ing. CONIITI 2017 - Conf. Proc., vol. 2018–Janua, pp. 1–6, 2018. 22. H. L. Oo, K. Z. Ye, and Y. H. Linn, “Modeling and Controlling of Temperature in 3D Printer ( FDM ),” IEEE, pp. 1738–1742, 2018.
23. A. Patil, B. Patil, R. Potwade, A. Shinde, and R. Shinde, “Design and Development of FDM Based Portable 3D Printer,” Int. J. Sci. Eng.
Res., vol. 8, no. 3, pp. 116–120, 2017. 24. P. Zeleny and V. Ruzicka, “The Design of The 3D Printer for Use in Gastronomy,” MM Sci. J., vol. d, no. 1, pp. 1668–1673, 2017.
25. Y. Xie, Y. Tan, G. Ma, J. Zhang, and F. Zhang, “Design and Implementation of Chocolate 3D Printer,” DEStech Trans. Comput. Sci.
Eng., no. itms, 2017. 26. M. Alimanova, A. Zholdygarayev, A. Tursynbekova, and D. Kozhamzharova, “Overview of a Low-cost Self-Made 3D Food Printer,”
IEEE, vol. 0, 2017.
27. E. Acosta, “Laser Printhead Concept Design For a 3D Moving Platform,” California State University, 2017. 28. X. Chen, X. Liu, P. Childs, N. Brandon, and B. Wu, “A Low Cost Desktop Electrochemical Metal 3D Printer,” Adv. Mater. Technol., vol.
2, no. 10, 2017.
29. S. Han, Y. Xiao, T. Qi, Z. Li, and Q. Zeng, “Design and Analysis of Fused Deposition Modeling 3D Printer Nozzle for Color Mixing,” Adv. Mater. Sci. Eng., vol. 2017, 2017.
30. E. Koc, “Investigation of Heat Sink Geometry Effect On Cooling Performance For A FDM 3D Printer Liquefier,” Internaational Conf.
603-614
Energy Therm. Eng., no. March 2018, pp. 569–573, 2017.
31. L. Maria and E. Piperi, “Extruder head thermal analysis for an open- source 3D printer,” 1st Int. Conf. Eng. Entrep. Proc., no. December,
2017. 32. J. Q. Oberhauser, “Design, Construction, Control, and Analysis of Linear Delta Robot,” Ohio University, 2016.
33. B. Hoy, “Design and Implementation of a Three- Dimensional Printer Using a Cylindrical Printing Process,” San Luis Obispo, 2016.
34. K. H. Lin, C. Y. Shen, J. L. Du, G. Y. Wang, H. M. Chen, and J. D. Tseng, “A design of constant temperature control system in 3D
printer,” 2016 IEEE Int. Conf. Consum. Electron. ICCE-TW 2016, pp. 30–31, 2016.
35. C. T. Hsieh, “Development of an integrated system of 3D printer and laser carving,” Proc. Tech. Pap. - Int. Microsystems, Packag.
Assem. Circuits Technol. Conf. IMPACT, no. 84, pp. 420–423, 2016. 36. G. Wang, L. Yao, W. Wang, J. Ou, C.-Y. Cheng, and H. Ishii, “xPrint: A Modularized Liquid Printer for Smart Materials Deposition,”
Proc. 2016 CHI Conf. Hum. Factors Comput. Syst. - CHI ’16, pp. 5743–5752, 2016.
37. Z. Pilch, J. Domin, and A. Szlapa, “The impact of vibration of the 3D printer table on the quality of print,” 2015 Sel. Probl. Electr. Eng. Electron. WZEE 2015, 2015.
38. W. Gao, Y. Zhang, D. C. Nazzetta, K. Ramani, and R. J. Cipra, “RevoMaker: Enabling Multi-directional and Functionally-embedded 3D
printing using a Rotational Cuboidal Platform,” Proc. 28th Annu. ACM Symp. User Interface Softw. Technol. - UIST ’15, pp. 437–446, 2015.
39. M. H. Ali, N. Mir-Nasiri, and W. L. Ko, “Multi-nozzle extrusion system for 3D printer and its control mechanism,” Int. J. Adv. Manuf.
Technol., vol. 86, no. 1–4, pp. 999–1010, 2015. 40. S. R. Rupanagudi, V. G. Bhat, K. R. V. R. Savarni, S. Bharadwaj, and V. N. P. Prasuna, “A novel automatic low cost cutting machine-
cum-3D printer using an image processing based control,” in 2015 IEEE Bombay Section Symposium: Frontiers of Technology: Fuelling
Prosperity of Planet and People, IBSS 2015, 2015. 41. B. E. Ayodele, “Modeling of FDM 3D Printing For Improved Performance,” A & M University-Kingsville, 2015.
42. G. Kallevik, “Designing a 5-axis 3D printer,” University of Oslo, 2015.
43. R. Celi, A. Sempértegui, D. Morocho, D. Loza, D. Alulema, and M. Proaño, “Study, Design and Construction of a 3D printer implemented through a Delta Robot,” IEEE, vol. 30, no. 9–10, pp. 622–627, 2015.
44. H.-X. Wu, Z.-H. Yu, H. Zhang, Z.-S. Yang, and Y. Wang, “Method for monitoring of FDM 3D printer failure based on acoustic
emission,” Zhejiang Daxue Xuebao (Gongxue Ban)/Journal Zhejiang Univ. (Engineering Sci., vol. 50, no. 1, pp. 78–84, 2014. 45. S. E. Hudson, “Printing Teddy Bears: A Technique for 3D Printing of Soft Interactive Objects,” in CHI 2014, Proceedings of the SIGCHI
Conference on Human Factors in Computing Systems, 2014, pp. 459–468.
46. R. Bartoš, “Design of Heated Print Bed For FDM 3d Printer With F.E.M,” BRNO University of Technology, 2014. 47. David W. Eld, “Ultra Affordable Rapid Prototyping : Creation and Setup of an Experimental Fabrication Machine,” University of Idaho,
2014.
48. J. Dvoracek, “A Distribution of Temperature Field in the Fdm Printhead,” New Technol. Manuf., vol. 2, no. 1, pp. 1–5, 2011. 49. N. I. Jaksic, “What to do when 3D printers go wrong: Laboratory Experiences,” in 122nd ASEE Annual Conference & Exposition, 2015,
no. June 2015, p. 26.1730.1-26.1730.11.
50. R. Song and C. Telenko, “Material Waste of Commercial FDM Printers under Realstic Conditions,” Proc. 27th Annu. Int. Solid Free. Fabr. Symp., no. 2015, pp. 1217–1229, 2016.
51. K. Kumar, S. C. Sai, S. Galla, and V. Sri, “Measurement of Surface Defects in 3D Printed Models,” 2016.
110.
Authors: P. Srinivasa Rao, P. Manoj Kumar, G. Tirupathi Naidu
Paper Title: Study the Impact of Blast Load on G+7 Multistoried RCC Structure with Varied Distances
Abstract: Nowadays, due to increased terrorist activity throughout the world, Blasts have been taking place
irrespective of the location. In order to withstand such blasts, the structure should be designed such a way that the
detailing and grade of concrete should be improvised. This current study includes the behaviour of G+7 multi
storied structure subjected to 100 kg TNT explosion which is assumed to be taken place at 10 m, 20 m, 30 m and
40 m away from the structure. As per IS 4991:1968, Blast Pressures are calculated manually and executed in
STAAD Pro tool. The results of Blast loads on structure is compared in its static condition and redesigned the
structure to sustain the Blast loads.
Keywords: Blast, Tri Nitro Toluene, Blast Pressures, Explosion, STAAD Pro
References: 1. Aditya C, Snehal V. and Mevada V.,Comparative Study of Response of Structures Subjected to Blast and Earthquake loading.
International Journal of Engineering Research and Applications,6(5),62-66, (2016).
2. Aditya Kumar singhand Saha P., Behaviour of Reinforced Concrete Beams under Different Kinds of Blast Loading, International Journal of Civil Engineering Research, 5(1),13-20, (2014).
3. Amol B and Potnis S.C., Blast Analysis of Structures. International Journal of Engineering Research and Technology, 2(7), 2120-2126,
(2013). 4. Aswin Vijay and Subha K. A Review on Blast Analysis of Reinforced Concrete Viaduct Pier, International Research Journal of
Engineering and Technology, 4(3), 986-991, (2013).
5. BhosaleS.D. and SuryawanshiY.R., Dynamic Behaviour of Frame Structure subjected to Blast loading. International Advanced Reasearch Journal in Science, Engineering and Technology, 3(8),245-249, (2016).
6. Deependra Nayakand Vinay Kumar singh.,Analysis the Behaviour of Composite Concrete Structure Subjected to Blast Load.
International Journal for Scientific Research and Development, 5(7), 208-211, (2017). 7. Deshmukh C.M.and PiseC.P., Behaviour of RCC Structural Members for Blast Analysis. International Journal of Engineering Research
and Application, 6(11), 48-53, (2016).
8. Meganadh M and Reshma T. Blast Analysis and blast resistant design of RCC residential building. International Journal of Civil Engineering and Technology, 8(3), 761 – 770, (2017).
9. Paresh Tank and Parikh K., Study of Blast Load on Industrial structure. International Journal of Advance Engineering and Reasearch
Development, 2(2), 256-259, (2015). 10. Prajanaand Deepthishree Aithal., Parametric Study of Multi Storey Buildings for Blast Load. International Journal of Advance Research,
Ideas and Innovations in Technology.
11. Suresh Kumar M.P., and Siva Kumar M., Blast Resistant Structure. International Journal for Scientific Research and Development, 3(8), 815-820, (2015).
12. Swami Gaikwad and Shirsath M.N., Study of Blast Analysis for Structural Building. International Research Journal of Engineering and
Technology, 4(7), 987-99, (2017). 13. Zeynep Koccaz, and Faith Sutcu., Architectural and Stuctural Design for Blast Resistant Buildings. World Conference on Earth Quake
engineering.
615-621
111. Authors: D Narasimha Rao, P Srinivasa Varma
Paper Title: Fractional Order-PID Controlled Closed-loop MLI based DP-FC for Fourteen-Bus System
Abstract: This work manages improvement of time response in fourteen- bus-framework utilizing MLI based
Distributed Power Flow Controller (DP-FC)with PI and FOPID which is made out of a Distributed Power Flow,
new gadget inside the group of FACTS. The DP-FC has a similar control capacity as the UP-FC, however with
much lower cost and higher unwavering quality. This effort tends to one of the utilizations of the DP-FC to
Compensate Voltage list in Transmissions Systems. Fourteen-bus-framework with ordinary VSI and with nine-
level-MLI based DP-FC is mimicked and their outcomes are exhibited. Closed-loop-fourteen bus-framework With
PI &FOPID-controllers are mimicked and the dynamic reaction shows that FOPID-controlled-DP-FC produces
better reaction when-make-out with-PI-controlled-DP-FC.
Keywords: About four key words or phrases in alphabetical order, separated by commas.
References: 1. GudaPriyanka,-K.Jaghannath,-D.Kumara Swamy, “-A-facts-device: distributed power flow controller(DP-FC)”,international research
journal of advanced engineering& science-ISSN-2455-9024, Volu-1, Issue-3, pp-95-102, 2016.
2. RashmiRaghav, AshrafRaza, Mohammad Asim,”Distributed power flow controller – an improvement of unified powe flow controller”, International-jour of Advance –Engi.& Research Develop, Volu-2,Issu- 5, May-2015.
3. MengluGao;AihongTang;YongHuang ; QiushiXu;Hongsheng Zhao ;XuZheng,“Research on the interaction between the series inverters of
distributed power flow controller, 2017-Interna,Conf.on-Industrial Informatics Computing Technology, Intelligent Technology, Industrial Information Integration (ICI-ICII) Year:2017,Page- 313 – 316.
4. SandeepR. Gaigowal ;M.M.Renge, “Distributed power flow controller using single phase DSSC to realize active power flow control
through transmission line”, 2016 Interna.Confe., on Computation o f Power, Energy Information & Commuincation(ICC-PEIC) -April- 2016.
5. GayathriReddy ; I.KumarSwamy,“Analyzing the performance of distributed power flow controller in transmission system”,2017 Intern
Conf. on intelligent Computing & Control Systems(IC-ICCS)-2017 Page-1196 – 1199 6. G.MadhusudhanaRao ;V.AnweshaKumar ; B.V.SankerRam,“Design of a neural network based distributed power flow controller(DP-FC)
for power system stability”, Inter. Conf, on Signal Processing, Communication, Power& Embedded System (SCO-PES) DOF 5-Oct-2016.
7. V.AnanthaLakshmi ; T.R.Jyothsna,“ Mitigation of voltage & current variations due to three phase fault in a single machine system using distributed power flow controller”, 2016 Intern ,Confe ,on Electrical, Electronics,& Optimization Technique- (IC-EEOT) DOC-: 5-Mar-
2016
8. MonikaSharma ; Annapurna Bhargava ;-Pinky Yadav,“Oscillation Damping with DP-FC Using Optimization Techniques”,-2016 Intern..,Conf on micro electronics & telecommunication engineering(ICM-ETE) 2016 , Page- 343 - 348
9. S.Vadivel, B.Baskaran, “Distributed power flow controller(DP-FC) to improve the power quality of thirty three bus radial system”,
intern.,jour.., of engin..,inventions issn-2278-7461, Volu-5, Issue-10 (Nov-2016)-PP- 31-44 10. Ahmad Jamshidi, S.Masoud Barakati & M.Moradi Ghahderijani, “Impact of distribute power flow controller to improve power quality
based on synchronous reference frame method”, IACSIT Intern..,-jour..,of Engi..,& Tech, Vol-4, No-5, Oct -2012.
11. K.S.Srikanth, “Design & implementation- of new DP-FC to control power quality” Int.- J.Chem.Sci.14(4), 2016, Pg 2066-2074 ISSN-0972-768.
12. Kuldeep Sain, Aakash Saxena, MR-Farooqi,” Analysis of distributed power flow controller in power system network for improving
power flow control”, Indonesian Journal of Electrical Engin..,& Computer Science Vol-2, No-3,Jun-2016, pp-510 - 521. 13. Meghana MC,Shruthi N, ThejarajuYB, VishnuSB, “Application of distributed power flow controller in power system to mitigate voltage
sag&swell”, ISSN (PRINT) 2320 – 8945, Vol -4, Issue -3, 2016.
14. AnjuAntony, Geevarghese Kurian Mathew,“ A comparative study on power quality improvement in a hybrid system using DVR & STATCOM vs. distributed power flow controller (DP-FC)’, International Research Journal of Engg & Tech(IRJET) Volu-3 Issue: 09 -
Sep-2016.
15. Gaurav V.Waghulde, Prasad D. Kulkarni, “Implementation of distributed power flow controller to improve power quality for 220kv transmission line”, International Journal of advanced research in electrical, electronics & instrumentation Engineering , Vol-4, Issue-7,
July-2015
16. NikitaGupta, Vahadood Hasan, “Comparison of performance of distributed power flow controller(DP-FC)& unified power flow controller( UPFC)”, International Journal of Advance Engineering & Research Development Volu-2, Issue-4, Apr- 2015.
17. V.Sudheer Kumar1 , RajaReddy.Duvvuru, “Enhancement of distributed power flow controller during series converter failures”,
International Journal of Innovative research in electrical &electronics instrumentation & control engineering ,vol-4,issu-11,nov-2016 18. Ch.RangaRao, N.HariCharan & K.RajeshBabu, “Modelling & simulation of DP-FC system for power quality improvement”, International
Journal of Electrical & Electronics engineering research (IJEEER)-ISSN (P): 2250-155X; ISSN (E): 2278-943X Vol-5, Issu-3,Jun-
2015,Pg 61-66. 19. M. BinduSahithi , Y.Vishnu Murthulu , “power quality enhancement & mitigation of voltage sag using DP-FC”, International Journal of
Engineering . Trends & Technology (IJETT) Vol-40 Num-5 Oct-2016.
20. P.Ramesh, M.DamodaraReddy, “ Optimal placement of distributed power flow controller for loss reduction using firefly& genetic
algorithm”, IJRET:-International Journal of Research in Engineering & Technology Volume-04 Issue- 09 Sept-2015.
622-627
112.
Authors: Sudha Dukkipati, P Siva Shankar, A V G A Marthanda
Paper Title: A Novel Approach for Power Factor Controller Design
Abstract: Industries facing problem of low power factor (P.F) is very common and so are the efforts at improving
it through various methods. In general shunt capacitor banks are used to improve the power factor and these banks
are located very near and down the final transformer. Attempts will be to maintain the P.F as close to unity as
possible. Switching operation of capacitors in a P.F control panel can be achieved by the micro-controller. But it
may be very involved and difficult task to write and achieve a running and successful programme on micro-
controller for all the power factor values in demand from the same panel. In this work the design procedure of a
programme usable in a micro-controller is shown. This is achieved in/and through a lab tool of simulation and can
be done also through similar tools. P.F control devices doing switching operation of capacitors can also be used.
But they have associated complexity, extra cost, extra efforts at design and finally limitations imposed by the
device in power handling. Hence, the present choice of avoiding P.F Controller may be better. The implicit
instructions derived from the use of the lab tool implemented as required through the use of this programme can
simplify and be extended easily to wide ranges of power handling leading to energy savings.
Keywords: Power Factor, Micro controller, Switched capacitor panel, Shunt capacitor banks, Lab tool simulation
628-631
devices
References: 1. en.wikipedia.org/wiki/Power_factor_correction.
2. RamasamyNatarajan (2005). “Power System Capacitors.” Boca Raton, FL: Taylor & Francis.
3. T.J.E.MILLER, 1982. “Reactive Power Control in Electric Systems” 1982 by Jihn Wiley & Sons Inc.
4. IEEE Guide for the Protection of Shunt Capacitors Banks.
5. A.S pabla, “Electric Power Distribution” (Fourth edition) Tata McGraw-Hill Publishing Company Limited. 6. William D. Stevenson, Jr, “Elements of Power System Analysis” (Third edition) 1955, 1962, 1975 by McGraw-Hill, Inc.
7. R.S.ARORA. “Handbook of Electrical Engineering.” 2004. (Fourth edition), New Delhi.
8. http://www.electricaltechnology.org/2013/11/how-to-calculate-suitable-capacitor-size-for-power-factor-improvement.html 9. V.K Mehta and Rohit Mehta, “Principles of power system”, S. Chand & Company Ltd, Ramnagar, Newdelhi-110055, 4th Edition,
Chapter, 6.
10. Stephen, J. C. (1999). “Electric Machinery and Power System Fundamentals.” 3rd.ed. United State of America: McGraw-Hill Companies, Inc.
11. Introduction to NI-LabVIEW
12. www.ni.com/nationalinstruments
113.
Authors: Robert Ambunda, Marion Sinclair
Paper Title: Effect of Two-Lane Two-Way Rural Roadway Design Elements on Road Safety
Abstract: Road design elements are some of the key factors influencing road user behaviour and road safety on
roads worldwide. The study developed fatal crash predictive Negative Binomial Regression (NBR) models that
identified statistically significant relationships between the combination of road design elements (radii and number
of horizontal curves, hard shoulder widths, traffic operating speeds, road length and access control) selected for the
study and the fatal crashes rates on the selected roads on the Namibian rural road network. The crash predictive
NBR models developed indicated that the combination of the various selected road design elements had significant
influence on the fatal crash rates, with various correlation magnitudes on roads with various lane widths. The study
results brought to the fore the impact that interactions between selected road design elements has on existing road
design and maintenance methods in Namibia. The NBR fatal crash models will assist transportation engineers in
identifying hazardous road sections and implementing the appropriate remedial measures to reduce crash risk
levels sustainably.
Keywords: Crash modelling; fatal crashes; negative binomial regression; road design elements; road safety
References: 1. Abele, L. and Møller, M. (2011) ‘The Relationship between Road Design and Driving Behavior’, RSS 2011: Road Safety and Simulation
2011 Conference, 2012, pp. 1–16. Available from:
http://scholar.google.com/scholar?hl=en&btnG=Search&q=intitle:THE+RELATIONSHIP+BETWEEN+ROAD+DESIGN+AND+DRIVI
NG+BEHAVIOR#1%5Cnhttp://scholar.google.com/scholar?hl=en&btnG=Search&q=intitle:The+Relationship+between+Road+Design+a
nd+Driving+Behavior#1. (Accessed: 10 November 2017).
2. Ahmed, I. (2013) ‘Road Infrastructure and Road Safety’, Transport and Communications Bulletin for Asia and the Pacific, (83), pp. 19–25.
3. Alsubeai, A. M. (2017) Evaluating the Interactive Effects of Traffic Volumes and Access Density on Crash Frequency. South Dakota
State University. 4. Ben-Bassat, T. and Shinar, D. (2011) ‘Effect of shoulder width, guardrail and roadway geometry on driver perception and behavior’,
Accident Analysis and Prevention. Elsevier Ltd, 43(6), pp. 2142–2152. Available from: doi: 10.1016/j.aap.2011.06.004. (Accessed: 24
July 2018). 5. Čičković, M. (2016) ‘Influence of Human Behaviour on Geometric Road Design’, Transportation Research Procedia, 14(0), pp. 4364–
4373. Available from: doi: 10.1016/j.trpro.2016.05.358. (Accessed: 12 May 2017).
6. Dehuri, A. N. (2013) Impacts of Roadway Condition , Traffic and Manmade Features on Road Safety, Asian Journal of Civil and Road Engineering. India National Institute of Technology.
7. Deller, J. (2013) ‘The influence of road design speed, posted speed limits and lane widths on speed selection: a literature synthesis’, in
Australasian Transport Research Forum, p. 14p. Available from: http://www.atrf.info/papers/2013/index.aspx. (Accessed: 06 June 2017). 8. Dwikat, M. G. (2014) Modeling Relationship between Geometric Design Consistency and Road Safety for Two-Lane Rural Highways in
the West Bank. An- Najah National University.
9. Easa, S. M., Dong, H. and Li, J. (2007) ‘Use of Satellite Imagery for Establishing Road Horizontal Alignments’, Journal of Surveying Engineering, 133(1), pp. 29–35. Available from: doi: 10.1061/(ASCE)0733-9453(2007)133:1(29). (Accessed: 19 May 2017).
10. Garber, N. J. and Hoel, L. a (2009) Traffic and Highway Engineering. Fourth, Cengage Learning. Fourth. Edited by H. Gowans. Toronto,
Canada: Nelson Education Ltd. Available from: doi: 10.1061/(ASCE)HY.1943-7900.0000746 (Accessed: 11 August 2017). 11. Garcia, R. and Abreu, L. (2016) ‘Road safety in rural roads of two lanes’, RevistaIngenieria De Construccion, 31(1), pp. 54–60.
12. Gaudry, M. and Vernier, K. (2002) ‘Effects of road geometry and surface on speed and safety’, Accident Analysis & Prevention 34.3,
34(November 2002), pp. 357–365. 13. Hagenzieker, M. P., Commandeur, J. J. F. and Bijleveld, F. D. (2014) ‘The history of road safety research: A quantitative approach’,
Transportation Research Part F: Traffic Psychology and Behaviour. Elsevier Ltd, 25(PART B), pp. 150–162. Available from: doi: 10.1016/j.trf.2013.10.004. (Accessed: 22 March 2018).
14. Iyinam, A., Iyinam, S. and Ergun, M. (1997) ‘Analysis of relationship between highway safety and road geometric design elements:
Turkish case’, Faculty of Civil Engineering, Turkey. Available from: http://www.trafficforum.ethz.ch/vwt_2003/beitraege/vwt19proceedings_contribution_91.1-91.8.pdf. (Accessed: 09 November 2017).
15. Jaiswal, A. and Bhatore, A. (2016) ‘Effect on Road Safety by Roadway condition, traffic and manmade features’, International Journal of
Latest Trends in Engineering and Technology, 7(3), pp. 41–48. Available from: doi: 10.21172/1.73.006. (Accessed: 14 July 2018). 16. Joanne, M. (2013) RAP Road Risk Mapping Manual : Design Specification.
17. Karlaftis, M. G. and Golias, I. (2002) ‘Effects of Road Geometry and Traffic Volumes on Rural Roadway Accident Rates’, Accident
Analysis and Prevention, 34(3), pp. 357–365. Available from: doi: 10.1016/S0001-4575(01)00033-1. (Accessed: 21 November 2017).
18. Karlaftis, M. G. and Golias, I. (2009) ‘Impacts of Roadway Condition , Traffic and Manmade Features on Road Safety’, International
Journal of Civil Engineering & Technology, 4(July), pp. 19–25. Available from: doi: 10.1061/(ASCE)HY.1943-7900.0000746.
(Accessed: 17 September 2017).
19. Krug, E. and Sharma, G. (2009) ‘Risk factors for road traffic injuries’, AsociatiaVictimelorAccidentelor de Circulatie din Romania, 7(2),
pp. 23–39.
632-637
20. Mohammed, H. (2013) ‘The Influence of Road Geometric Design Elements on Highway Safety’, International Journal of Civil
Engineering & Technology, 4(4), pp. 146–162.
21. Othman, S. and Thomson, R. (2007) ‘Influence of Road Characteristics on Traffic Safety’, in ESV 20th Conference. Lyon, pp. 1–10. 22. Persia, L., Usami, D., De Simone, F. and Yannis, G. (2016) ‘Management of Road Infrastructure Safety’, Transportation Research
Procedia. Elsevier B.V., 14, pp. 3436–3445. Available from: doi: 10.1016/j.trpro.2016.05.303. (Accessed: 13 June 2018).
23. Porter, R., Donnell, E. and Mason, J. (2012) ‘Geometric Design, Speed, and Safety’, Transportation Research Record: Journal of the
Transportation Research Board, 2309, pp. 39–47. Available from: doi: 10.3141/2309-05. (Accessed: 15 June 2017).
24. Taylor, M. C., Lynam, D. A. and Baruya, A. (2000) ‘The effect of drivers’ speed on the frequency of road accidents’, Transportation
Research Laboratory, p. 56. Available from: doi: 10.1051/ matecconf 2016 00 / 47 3 04. (Accessed: 16 November 2017). 25. Vayalamkuzhi, P. and Amirthalingam, V. (2016) ‘Influence of geometric design characteristics on safety under heterogeneous traffic
flow’, Journal of Traffic and Transportation Engineering (English Edition). Elsevier Ltd, 3(6), pp. 559–570. Available from: doi:
10.1016/j.jtte.2016.05.006. (Accessed: 13 May 2018). 26. Woolley, J. E., Dyson, C. B., Taylor, M., Zito, R. and Stazic, B. (2002) ‘Impacts of Lower Speed Limits in South Australia’, IATSS
Research. International Association of Traffic and Safety Sciences, 26(2), pp. 6–17. Available from: doi: 10.1016/S0386-1112(14)60038-
8. (Accessed: 26 July 2017). 27. Yingxue, Z. (2009) ‘Analysis of the Relation between Highway Horizontal Curve and Traffic Safety’, 2009 International Conference on
Measuring Technology and Mechatronics Automation, ICMTMA 2009, 3, pp. 479–481. Available from: doi:
10.1109/ICMTMA.2009.511. (Accessed: 22 February 2017).
114.
Authors: Manmohan Shukla, B. K. Tripathi
Paper Title: Inversion ofcomplex Neural Network
Abstract: This paper presents a novel application of complex neural network which has been modeled by the
implementation of gradient descent inversion algorithm in complex domain. The methods reported prior to this
work were limited to real domain only. By the learning of function mapping in complex domain, the performance
of neural network has been analyzed. An improved performance of complex neural network has resulted in the
development of a Novel Complex Neuron Model.
Keywords: inversion, complex-valued neural network, gradient descent search and activation function.
References: 1. H. Leung and S. Haykin, “The Complex Backpropagation Algorithm”, IEEE Trans.On Signal Processing, Vol. 39, No. 9, September
(1991).
2. G. M. Georgiou and C. Koutsougeras, “Complex Domain Backpropagation”, IEEE Trans. on Circuits and Systems-II : Analog and
Digital Signal Processing, Vol 39, No. 5, May (1992). 3. N. Benvenuto and F. Piazza, “On the Complex Backpropagation Algorithm”, IEEE Trans. On Signal Processing, Vol. 40, No. 4, April
(1992).
4. T. Nitta, “A Back-propagation Algorithm for Neural Networks Based on 3D Vector Product”, Proc. of 1993 International Joint Conference on Neural Networks.
5. S. Lee and R. M. Kil, “Inverse Mapping of Continuous Functions Using Local and Global Information”, IEEE Tran. on Neural Networks, Vol. 5, No. 3, May(1994).
6. T. Nitta, “A Quaternary Version of the Back-propagation Algorithm”, ICNN 1995.
7. S. Jankowski, A. Lozowski and J. Zurada, “Complex-Valued Multistate Neural Associative Memory”, IEEE Trans. on Neural Networks, Vol. 7, No. 6, November 1996.
8. C.You and D. Hong, “Adaptive Equalization Using the Complex Backpropagation Algorithm”, IEEE International Conference on
Neural Networks, Vol. 4, Jun 1996 9. T. Nitta, “An Extension of the Back-Propagation Algorithm to Complex Numbers”, Neural Networks, Vol. 10, No. 8, 1997.
10. M. H. Hassoun, Fundamentals of Artificial Neural Networks, New Delhi, Prentice Hall of India, 1998.
11. C. A. Jensen, R. D. Reed, R. J. Marks, M. A. El-sharkawi, J. Jung, R. T. Miyamoto, G. M. Anderson and C. J. Eggen, “Inversion of Feedforward Neural Networks: Algorithms and Applications”, Proceedings of the IEEE, Vol. 87, No. 9, September(1999).
12. C. Lin and C. Li, “A sum-of-product neural network (SOPNN)”, Neurocomputing, 2000.
13. T. Nitta, “An Analysis of the Fundamental Structure of Complex-Valued Neurons”, Neural Processing Letters12, pp.239-246, 2000. 14. T. Nitta, “Generalization of the Complex-valued Neural Networks with the Orthogonal Decision Boundary”, KES 2002.
15. C. Igel and M. Husken, “Improving the Rprop Learning Algorithm”, Proc. of the Second International Symposium on Neural
Computation, pp. 115-121, 2000. 16. M. Sinha, P. K. Kalra and K. Kumar, “Parameter estimation using compensatory neural networks”, Sadhana, Vol. 25, April 2000.
638-641
115.
Authors: K. Naga Lakshmi Prasanna, B. Murali Krishna, SK. Sadiya Shireen, A. Poorna Chander Reddy
Paper Title: FPGA Based Convolutional Encoder for GSM-900 Architecture
Abstract: This paper presents one of the most popular current techniques of enhancing the reliability, accuracy
and security in data communication systems i.e., error-correcting codes such as convolutional codes. To correct
and decode the errors that occur during data transmission on communication channels by introducing some
redundancy in their encoding. In advanced wireless communication, reliability and accuracy are two main
constraints of hand held devices such as mobile phones. Now a days, mobile phones uses wireless standards such
as Code Division Multiple Access (CDMA), Global System for Mobile Communication (GSM) for
communication purpose. Apart from above constraints quality of service and security are highly desirable. The
proposed architecture implemented for convolutional encoder GSM-900 by using XOR free approach
methodology with a required constraint length (K=5) and a data transmission code rate (R=1/2) using Xilinx 14.7
ISE software. The convolutional encoder for GSM-900 architecture verified on Nexys2 1200E Field
Programmable Gate Array (FPGA).
Keywords: Convolution Encoder, Error Control Codes, Field Programmable Devices (FPGA) and Global System
for Mobile Communication (GSM), Linear Feedback Shift Register (LFSR) and XOR free approach.
References: 1. J. Dielissen, Eindhoven, N. Engin, S. Sawitzki, and K. van Berkel, “Multistandard FEC Decoders for wireless devices,” IEEE Trans.
Circuits Syst. II, Exp. Briefs, vol. 55, no. 3, pp. 284–288, 2008.
642-650
2. G. Purohit, K. S. Raju, V. K. Chaubey, “A New XOR-Free Approach for implementation Convolutional Encoder” IEEE embedded
systems letters, vol. 8, no. 1, March 2016.
3. J. Hagenauer, “Forward error correcting for CDMA systems,” in Proc .Int. Symp. Spread Spectr. Tech. Appl. Proc., Mainz, Sep. 1996, pp.566–569.
4. R. Pasko, P. Schaumont, V. Derudder, S.Vernalde, and D. Durackova, “A new algorithm for Elimination of common
subexpressions,”IEEE Trans. Comput. Des. Integr. Circuits Syst., vol. 18, no. 1, pp. 58–68, Jan. 1999. C. [5] Huang, J. Li, and M. Chen,
“Optimizing XOR-based codes,” U.S. Patent 8209577 B2, Jun. 26, 2012.
5. J. Viterbi, “Convolutional codes and their performance in communication systems,”IEEE Trans. Comm. Technol., vol. 19, no. 5, pp.751–
772, Oct. 1971. 6. Y.Yibin, K.Roy, and R.Drechsler, “Power consumption in XOR based circuits,” in Proc.ASP-DAC, pp. 299–302, Jan.1999.
Huang, J. Li, and M. Chen, “Optimizing XOR-based codes,” U.S. Patent 8209577 B2, Jun. 26, 2012.
7. G. Purohit, K. S. Raju, V. K. Chaubey, “XOR-Free Implementation of Convolutional Encoder for Reconfigurable Hardware “Hindwai, vol. 8, no. 1, Jan 2016.
8. R. Mohan and P. P. Chakrabarti, “Factorizing FSM’s with modify and restore method,” IEEE Transactions on Circuits and Systems II:
Analog and Digital Signal Processing, vol.44, No. 5, pp. 371–377, 1997. 9. R. J. McEliece and L. Onyszchuk, “The extended invariant factor algorithm with application to the Forney analysis of convolutional
codes,” in Proceedings of the IEEE International Symposium on Information Theory, p. 142, San Antonio, Tex, USA, January 1993.
10. S.Devdas and A. R. Newton, “Decomposition and factorization of sequential finite State machines,” IEEE Transactions on Computer-Aided Design, vol. 8, no. 11, pp.1206–1217, 1989.
11. G. D. Forney Jr., “Convolutional codes I: algebraic structure,” IEEE Transactions on Information Theory, vol. 16, no. 6, pp. 720–738,
1970. 12. G.D. Forney Jr., “Convolutional codes. II. Maximum-likelihood decoding,” Information and Computation, vol. 25, pp. 222–266, 1974.
13. G.De Micheli, R. K. Brayton, and A. Sangiovanni-Vincentelli, “Optimal state assignment for finite state machines,” IEEE Transactions on
Computer-Aided Design of Integrated Circuits and Systems, vol. 4, no. 3, pp. 269–284, 1985. 14. M. J. Avedillo, J. M. Quintana, and J. L. Huertas, “State merging and state splitting via state assignment: a new FSM synthesis
algorithm,” IEE Proceedings—Computers and Digital Techniques, vol. 141, no. 4, pp. 229–237, 1994.
15. P. Ashar, S. Devadas, and A. R. Newton, “Optimum and heuristic algorithms for an approach to finite state machine decomposition,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 10, no. 3, pp. 296–310,1991.
116.
Authors: M.V.S. Ram Prasad, B. Suribabu Naick, Zaamin Zainuddin Aarif
Paper Title: Design and Implementation of High Speed 16-Bit Approximate Multiplier
Abstract: A multiplier extensively impact on the postpone and strength intake of an arithmetic processor. The
accurate results are not usually required in many packages, like records processing and virtual signal processing
(DSP). Therefore, the layout of multipliers is in particular centered on speed and power consumption. These
parameters are specially finished by way of approximate multipliers. In this paper a new 16 bit approximate
multiplier is designed. The partial merchandise of the proposed multiplier are revised and re organized to introduce
varying probability phrases. The complexities of the addition of those partial merchandise are reduced based at the
possibility. Synthesis results show that the proposed multiplier achieves higher velocity and power consumption in
comparison to the preceding precise multiplier
Keywords: Approximate computing, Compressors, multiplier
References: 1. J. Han and M. Orshansky."Approximate Computing: An Emerging Paradigm For Energy-Efficient Design." In approaches of the eighteenth
IEEE European Test Symposium, Avignon, France, May 2013, pp.1-6.
2. J. Liang, J. Han and F. Lombardi."New measurements for the unwavering best of envisioned and probabilistic adders."IEEE Trans. PCs.
Vol.Sixty two, no.9, pp.1760-1771, Sept. 2013. 3. Momeni, J. Han, P. Montuschi and F. Lombardi."Structure and Analysis of Approximate Compressors for Multiplication." IEEE Trans. PCs,
vol.64, no.4, pp. 984-994, Apr. 2015.
4. C.H. Lin and I.C. Lin. "High exactness estimated multiplier with blunder treatment." In Proc. ICCD'thirteen: In the 2013 IEEE thirty first International Conference on Computer Design (ICCD). Asheville, NC, USA, Oct. 2013, pp. 33-38.
5. K. Bhardwaj, P.S. Maneand J. Henkel. "Power-and territory talented Approximate Wallace Tree Multiplier for blunder versatile
frameworks." In Sym. ISQED'14: In fifteenth International Symposium on Quality Electronic Design (ISQED), Santa Clara, CA, USA. Blemish. 2014, pp. 263-269.
6. S. Narayanamoorthy, H.A. Moghaddam, Z. Liu, T. Park, N.S. Kim, "Vitality Efficient Approximate Multiplication for Digital Signal
Porcessing and Classificaiton Applications." IEEE Trans. Large Scale Integration Systems (VLSI), vol.23, no.6, pp.1180-1184, Jun. 2015. 7. M.S. Lau, K.V. Ling and Y.C. Chu. "Vitality conscious probabilistic multiplier: shape and exam." In Proceedings of the 2009 typical
assembly on Compilers, engineering, and amalgamation for inserted frameworks, Grenoble, France, Oct. 2009, pp.281-290.
651-654
117.
Authors: Vikram Gupta, Sarvjit S. Bhatia
Paper Title: Reliable Cloud Based Framework for the Implementation of ERP
Abstract: Universally, technological innovations act as engine of growth for the developing economy.
Technological revolutions act as an accelerator to enhance the economy worldwide. In the present scenario the
technology has considerably impacted different aspects of life so that the business environment has changed
thoroughly. Simply granting the access to the similar technologies utilized by the large business houses will
flourish the business of small scale industries. As result flexibility, scalability, adaptability, availability, cost
efficiency characteristics will be attained by adopting the innovation i.e. cloud based ERP in the organizations.
Adopting Cloud based ERP system offers highly scalable, reliable, on-demand services with agile management
capabilities on an as-needed basis. The present work is based on the concepts of social sciences and latest trends of
information technology. In the framework, Diffusion of Innovation (DOI) theory and Technology-Organization-
Environment (TOE) framework are synthesized. The framework examines and validates various social,
technological, organizational and environmental factors that impact the cloud based ERP adoption. All these
factors have significant impact on the adoption. The findings will propose practical recommendations to the
successful adoption of cloud based ERP.
Keywords: Cloud Computing, DOI, Enterprise Resource Planning, IaaS, PaaS, SaaS, TOE.
655-661
References: 1. Yusuf Y., Gunasekaran A., "Enterprise information systems project implementation: a case study of ERP in Rolls-Royce", International
Journal of Production Economics 87 (3) (2004) 251-266 2. I. Saini, A. Khanna and V. Kumar, "ERP Systems: Problems and Solution with Special Reference to Small & Medium Enterprises",
International Journal of Research in IT & Management 2(2) (2012) 715–725.
3. Gupta, V., Bhatia, S., S. "Cloud Computing: An Operational Framework in Implementation of ERP", International Journal of Advanced Research in Computer Science and Software Engineering 7(2) (2017)164-169.
4. Rogers, E.M., "Diffusion of innovations (5th Ed.)", The Free Press, New York, 2003.
5. Saunders, M., Thornhill, A. & Lewis P. "Research methods for business students (5th Ed.)", Financial Times/ Prentice Hall, Harlow, 2009.
6. Zikmund, WG, Babin, BJ, Carr, JC & Griffin, M (2013). "Business research methods, 9th edn", South-Western, Cengage Learning,
USA. 7. Williams B., Brown, T. & Onsman A., "Exploratory factor analysis: a five step guide for novices", Australasian Journal of Paramedicine
8(3) 1-13 (2010).
8. Hair J., Black W., Babin B., & Anderson R. "Multivariate Data Analysis: Global Edition (7th Ed.)", Pearson, Upper Saddle River, 2010. 9. Chin W.W., "Issues and Opinion on Structural Equation Modeling", MIS Quarterly 22(1) vii-xvi (1998).
10. George D., Mallery P., "IBM SPSS Statistics 23 Step by Step: A Simple Guide and Reference (14th Ed.)", (2016).
118.
Authors: S. Sandhya Rani, K. Kumar Naik
Paper Title: Analysis of Circular Patch Antenna with Complementary Split Ring Resonator on Ground Plane
Abstract: A complimentary split ring resonator (CSRR) defected ground structured Circular Patch Antenna is
proposed for WiMAX applications. Rectangular slits are loaded on circular patch with CSRR on ground plane for
better impedance matching and enhanced gain. The proposed antenna is designed using High Frequency Structural
Simulator (HFSS) and Computer Simulation Technology (CST) simulation tools. The proposed rectangular slit
loaded circular patch antenna resonates at 8.5GHz and 8.54 GHz frequencies for HFSS and CST simulator with
return loss of -26.39dB and -33.8 dB respectively. The maximum gain is observed as 8.29dBi and 8.17dBi for both
HFSS and CST simulators.
Keywords: Circular patch antenna, CSRR, WiMAX application.
References: 1. Chandra Bhan , Ajay Kumar Dwivedi, Brijesh Mishra and Anil Kumar, “ Quad Bands U-Shaped Slot Loaded Probe Fed Microstrip
Patch Antenna,” Second International Conference on Advances in Computing and Communication Engineering , pp. 409 – 412, 2015.
2. Mohamed A. , Islam Md. Rafiqul , Sarah Yasmin and K. Badron, “ Design of a quintuple band microstrip patch antenna using multiple
L-Slots,” 2016 International Conference on Computer and Communication Engineering (ICCCE), pp. 30-35, 2016. DOI: 10.1109/ICCCE.2016.20.
3. Partha P. Shome, Taimoor Khan and Rabul H. Laskar, “ A state‐of‐art review on band‐notch characteristics in UWB antennas,” Int J
RF Microw Comput Aided Eng. 2018. https://doi.org/10.1002/mmce.21518.
4. Naimur Rahman, Mohammad Tariqul Islam, Zulfiker Mahmud and Md Samsuzzaman, “ The broken-heart printed antenna for Ultra wideband applications: Design and characteristics analysis,” IEEE Antennas and Propagation Magazine, Vol. 60, Issue 6, pp. 45-51,
2018.
5. Budhadeb Maity, “ Design of dual band L-slot microstrip patch antenna for wireless communication,” International Conference on Computer Communication and Informatics (ICCCI), pp. 1 – 4, 2017. DOI: 10.1109/ICCCI.2017.8117769.
6. Gopinath Samanta, Debasis Mitra , Sekhar Ranjan and Bhadra Chaudhuri, “ Miniaturization of a patch antenna using circular reactive
impedance substrate,” Int J RF Microw Comput Aided Eng. 2017 https://doi.org/10.1002/mmce.21126 7. Sk Nurul Islam, Mukesh Kumar, Gobinda Sen and Santanu Das, “ Design of a compact triple band antenna with independent frequency
tuning for MIMO applications, “ Int J RF Microw Compt Aided Eng. 2018. https://doi.org/10.1002/mmce.21620.
8. L.S.Yang, L.Yang, Y.A.Zhu, Kuniaki Yoshitomi and HaruichiKanaya, “ Polarization reconfigurable slot antenna for 5.8 GHz wireless applications,” AEU-International Journal on Electronics and Communications, Volume 101, pp. 27-32, mar 2019.
https://doi.org/10.1016/j.aeue.2019.01.022
9. Kwok Kan So, Kwai Man Luk and Chi Hou Chan, “ A High- Gain Circularly Polarized U- Slot Patch Antenna Array [Antenna Designers Notebook],” IEEE Antennas and Propagation Magazine, Vol. 60, Issue 5, pp. 147-153, 2018.
10. Som Pal Gangwar , Kapil Gangwar and Arun Kumar, “ A compact microstrip patch antenna with five circular slots for wideband
applications,” 2018 3rd International Conference on Microwave and Photonics (ICMAP), pp. 1 – 2, 2018. 11. Daniel Colles and Dean Arakaki, “Multi-technique broadband microstrip patch antenna design2014,” IEEE Antennas and Propagation
Society International Symposium (APSURSI) , pp. 1879 – 1880, 2014.
12. Mahrukh Khan and Deb Chatterjee, “ Analysis of reactive loading in a U-slot Microstrip patch using the theory of characteristics modes
[Antenna Applications Corner],” IEEE Antennas and Propagation Magazine, Vol. 60, Issue 6, pp. 88- 97, 2018.
662-665
119.
Authors: Amit Verma, Manish Prateek
Paper Title: T-NOT Gate : A Novel Circuit based on Ternary Logic
Abstract: In this paper a novel circuit for the t-NOT gate is proposed using op-amp 741 IC and the basis AND
and OR binary gate. Proposed circuit is based on the concept of ternary logic, where the term ternary means three
logic that is 0, 1 and 2 instead of traditional two logic 0,1 (binary). As the ternary logic can be the altenate for the
radix 2 that is binary logic to reduce the transition delay, enhance the processing speed, reduce the memory
requirement, reduce circuit complexity and number of electronic components The truth table, symbol and state
transition diagram is also presented in the paper. Which show that t-NOT gate is a unary gate that takes single
input and provide the next immediate logic in clockwise cyclic direction as the output as shown in the state
transition diagram mention in the paper. Further the standard working of op-amp 741 IC is discussed, the actual
voltmeter reading for various input voltages greater than the upper limit +VCC is presented in tabular format.
Simulation of the binary AND and OR gate is carried out using proteus to prove that the current binary AND, OR
gate can be used as MIN and MAX gate for logic circuits of higher radix. Here the MIN and MAX logic means the
gate giving the minimum and maximum voltage as the output voltage among the various input voltages.
Keywords: op-amp 741 IC, ternary, multi-valued logic.
666-671
References: 1. Charles M Allen and Donald D Givone. A minimization technique for multiple-valued logic systems. IEEE Transactions on Computers,
(2):182–184, 1968. 1 2. Robert W Keyes. The evolution of digital electronics towards vlsi. IEEE Journal of Solid-State Circuits, 14(2):193–201, 1979. 1
3. Shweta S Dawley and Pradnya A Gajbhiye. Design and comparative analysis of binary and quaternary logic circuits. In Futuristic Trends
in Research and Innovation for Social Welfare (Startup Conclave), World Conference on, pages 1–6. IEEE, 2016. 1 4. Zvonko G Vranesic and Kenneth C Smith. Engineering aspects of multi-valued logic systems. Computer, 7(9):34–41, 1974. 1, 2
5. Noboru Takagi and Kyoichi Nakashima. Discrete interval truth values logic and its application. IEEE Transactions on Computers,
49(3):219– 229, 2000. 1 6. Daniel Etiemble. On the performance of multivalued integrated circuits: past, present and future. IEICE Transactions on Electronics,
76(3):364– 371, 1993. 1
7. Prabhakara C Balla and Andreas Antoniou. Low power dissipation mos ternary logic family. IEEE Journal of Solid-State Circuits, 19(5):739– 749, 1984. 1, 2
8. Kenneth C Smith. The prospects for multivalued logic: A technology and applications view. IEEE Transactions on Computers, (9):619–
634, 1981. 1 9. Brian Hayes. Computing science: Third base. American scientist, 89(6):490–494, 2001. 1
10. Ben Choi. Advancing from two to four valued logic circuits. In Industrial Technology (ICIT), 2013 IEEE International Conference on,
pages 1057–1062. IEEE, 2013. 1 11. Peter N Marinos. Fuzzy logic and its application to switching systems. IEEE Transactions on Computers, 100(4):343–348, 1969. 1
12. Tomoyuki Araki, Hisayuki Tatsumi, Masao Mukaidono, and Fujio Yamamoto. Minimization of incompletely specified regular ternary
logic functions and its application to fuzzy switching functions. In ismvl, page 289. IEEE, 1998. 1 13. Joel Berman and Masao Mukaidono. Enumerating fuzzy switching functions and free kleene algebras. Computers & mathematics with
applications, 10(1):25–35, 1984. 1
14. Tsutomu Sasao. Ternary decision diagrams. survey. In Multiple-Valued Logic, 1997. Proceedings., 1997 27th International Symposium on, pages 241–250. IEEE, 1997. 1
15. Melvin A Breuer. A note on three-valued logic simulation. IEEE Transactions on Computers, 100(4):399–402, 1972. 1
16. Miron Abramovici, Melvin A Breuer, and Arthur D Friedman. Digital systems testing and testable design, volume 2. Computer science press New York, 1990. 1
17. Yukihiro Iguchi, Tsutomu Sasao, and Munehiro Matsuura. A method to evaluate logic functions in the presence of unknown inputs using
lut cas-cades. In Multiple-Valued Logic, 2004. Proceedings. 34th International Symposium on, pages 302–308. IEEE, 2004. 1 18. Petr Hajek,´ Kamila Bendova,´ and Zdenekˇ Renc. The guha method and the three-valued logic. Kybernetika, 7(6):421–435, 1971. 1
19. Masao Mukaidono. Regular ternary logic functions? ternary logic func-tions suitable for treating ambiguity. IEEE transactions on
computers, 20. (2):179–183, 1986. 1, 2
21. Sheng Lin, Yong-Bin Kim, and Fabrizio Lombardi. Cntfet-based design of ternary logic gates and arithmetic circuits. IEEE transactions
on nanotechnology, 10(2):217–225, 2011. 1, 2 22. CR Mingoto. A quaternary half-adder using current-mode operation with bipolar transistors. In Multiple-Valued Logic, 2006. ISMVL
2006. 36th International Symposium on, pages 15–15. IEEE, 2006. 1
23. Alex Heung and HT Mouftah. Depletion/enhancement cmos for a lower power family of three-valued logic circuits. IEEE Journal of Solid-State Circuits, 20(2):609–616, 1985. 1, 2
24. Sheng Lin, Yong-Bin Kim, and Fabrizio Lombardi. A novel cntfet-based ternary logic gate design. In Circuits and Systems, 2009.
MWSCAS’09. 52nd IEEE International Midwest Symposium on, pages 435–438. IEEE, 2009. 1
25. A Srivastava and K Venkatapathy. Design and implementation of a low power ternary full adder. VLSI Design, 4(1):75–81, 1996. 1, 2
26. TN Rajashekhara and I-SE Chen. A fast adder design using signed-digit numbers and ternary logic. In Southern Tier Technical
Conference, 1990., Proceedings of the 1990 IEEE, pages 187–194. IEEE, 1990. 1 27. LS Phanindra, MN Rajath, V Rakesh, and KS Vasundara Patel. A novel design and implementation of multi-valued logic arithmetic full
adder circuit using cntfet. In Recent Trends in Electronics, Information & Communication Technology (RTEICT), IEEE International
Conference on, pages 563–568. IEEE, 2016. 1 28. HT Mouftah. A study on the implementation of three-valued logic. In Proceedings of the sixth international symposium on Multiple-
valued logic, pages 123–126. IEEE Computer Society Press, 1976. 1 29. HT Mouftah and KC Smith. Injected voltage low-power cmos for 3-valued logic. In IEE Proceedings G-Electronic Circuits and Systems,
volume 129, pages 270–272. IET, 1982. 2
30. HT Mouftah and IB Jordan. Integrated circuits for ternary logic. In Proc. 1974 Int. Symp. Multiple-Valued Logic, pages 285–302, 1974. 2
31. HT Mouftah and KC Smith. Design and implementation of three-valued logic systems with mos integrated circuits. In IEE Proceedings
G-Electronic Circuits and Systems, volume 127, pages 165–168. IET, 1980. 2 32. Alex Heung and HT Mouftah. Decmos—a low power family of three-valued logic circuits for vlsi implementation. In Proc. ISMVL-84,
pages 120–124, 1984. 2
33. HT Mouftah, ANC Heung, and LMC Wong. Qtc-1 a cmos ternary computer. In Proc. ISMVL-84, pages 125–132, 1984. 2 34. HT Mouftah and IB Jordan. Design of ternary cos/mos memory and sequential circuits. IEEE transactions on computers, (3):281–288,
1977. 2
35. John Barkley Rosser and Atwell R Turquette. Many-valued logics. 1954. 2 36. Zvonko G Vranesic and V Carl Hamacher. Ternary logic in parallel multipliers. The Computer Journal, 15(3):254–258, 1972. 2
37. C-Y Wu and H-Y Huang. Design and application of pipelined dynamic cmos ternary logic and simple ternary differential logic. IEEE
journal of solid-state circuits, 28(8):895–906, 1993. 2 38. HT Mouftah and AI Garba. Vlsi implementation of a 5-trit full adder. In IEEE Proceedings G-Electronic Circuits and Systems, volume
131, pages 214–220. IET, 1984. 2
39. Jie Deng and H-S Philip Wong. A compact spice model for carbon-nanotube field-effect transistors including nonidealities and its applica-tion—part i: Model of the intrinsic channel region. IEEE Transactions on Electron Devices, 54(12):3186–3194, 2007. 2
40. Stephen Cole Kleene, NG de Bruijn, J de Groot, and Adriaan Cornelis Zaanen. Introduction to metamathematics, volume 483. van
Nostrand New York, 1952. 2 41. Yoshinori Yamamoto and Masao Mukaidono. Meaningful special classes of ternary logic functions-regular ternary logic functions and
ternary majority functions. IEEE transactions on computers, 37(7):799–806, 1988. 2
42. Masao Mukaidono. On the mathematical structure of the c-type fail safe logic. IEICE Trans. Electron., 52(12):812–819, 1969. 2 43. Michael Yoeli and Shlomo Rinon. Application of ternary algebra to the study of static hazards. Journal of the ACM (JACM), 11(1):84–
97, 1964. 2
120.
Authors: Hee-Dong Park
Paper Title: Design and Implementation of u-Health System to Support Interoperability with Legacy Non-Standard
Medical Devices
Abstract: Although there have been worldwide studies on u-Health services to converge the latest IT
technologies into the medical field, there are still limitations to compatibility and interoperability with existing 672-676
legacy non-standard medical devices. This paper proposes a u-Health system architecture to utilize legacy non-
standard medical devices for standard u-Healthcare services by adding a codec and algorithms to IEEE 11073
agent. The proposed agent located between medical devices and mobile manager encodes non-standard data of
legacy devices to IEEE 11073 standard data format and decodes vice versa using the developed codec and
algorithms, which makes it possible to support data compatibility and interoperability between u-Health standard
systems and non-standard systems. The proposed system is implemented by using Intel Edison board and android-
based smartphone to verify performance and effectiveness of the proposed system. The implementation results
show that legacy non-standard medical devices can be utilized for the u-Health standard services based on the
IEEE 11073 PHD protocol by using the proposed system, which means that the proposed system can contribute to
the growth and extension of u-Health services by solving the problem of service limitations caused by existing
legacy non-standard devices.
Keywords: Agent, Interoperability, IEEE 11073, Legacy non-standard medical devices, Mobile manager, u-
Health.
References: 1. The Institute of Electrical and Electronics Engineers, ISO/IEEE 11073-20601 Standard for Health Informatics-Personal Health Device
Communication-Application Profile-optimized Exchange Protocol, ISO/IEEE 11073-20601, 2014.
2. The Institute of Electrical and Electronics Engineers, ISO/IEEE 11073-20702 Standard for Health Informatics-Point-of-care medical
device communication—Part 20702: Medical devices communication profile for web services, ISO/IEEE 11073-20702, 2018. 3. Health Level 7 International, Available:
http://www.hl7.org
4. The DICOM Standard PS3.1 2019a, Available: http://dicomstandard.org
5. ZigBee Alliance, ZigBee Wireless Sensor Applications for Health, Wellness and Fitness, 2009. Available:
https://www.zigbee.org 6. Malcolm Clarke, Joost de Folter, Vivek Verma, Hulya Gokalp, “Interoperable End-to-End Remote Patient Monitoring Platform Based on
IEEE 11073 PHD and ZigBee Health Care Profile,” IEEE Transactions on Biomedical Engineering, Vol. 65, Issue 5, 2018, pp. 1014-125.
7. T. H. Laine, C. Lee, H. Suk, “Mobile Gateway for Ubiquitous Health Care System Using ZigBee and Bluetooth," 2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014, pp. 139-145.
8. M. Carke, "Developing a Standard for Personal Health Devices Based on 11073," Proceeding of IEEE EMBS Conference, pp. 6174-6176,
2007. 9. Egner, F. Moldoveanu, N. Goga, A. Moldoveanu, V. Asavei, and A. Morar, “Enhanced Communication Protocol for ISO/IEEE 11073-
20601,” Universitatea Politehnica Bucuresti Scientific Bulletin, Series C, Vol. 75, Issue 2, pp. 3-16, 2013.
10. J.C. Nam, W.K. Seo, J.S. Bea, and Y.Z. Cho, “Design and Development of Personal Healthcare System Based on IEEE 11073/HL7 Standards Using Smartphone,” The Journal of Korean Institute of Communications and Information Sciences, Vol. 36, No. 12, pp. 1556-
1564, 2011.
11. J.Y. Lee, Y.R. Jeong, H.D. Park, “Development of Open H/W-Based IEEE 11073 Agent and Manager for Non-Standard Health Devices,” Journal of Korea Multimedia Society, Vol. 19, No. 3, March 2016, pp. 595-602.
12. ISO/IEC 8824-1:2008 Information Technology Abstract Syntax Notation One: Specification of Basic Notation, 2008.
13. H.H. Do, J.M. In, and S.K. Lee, “Implementation of ASN.1 Converter for Applying ISO/IEEE 11073 MDER,” Korean Institute of Information Technology, Vol. 10, No. 4, pp. 19-30, 2012.
14. ISO/IEEE 11073-20101:2004-Health Informatics-Point-of-Care Medical Device Communication-Part 20101: Application Profiles Base
Standard, 2004.
121.
Authors: Shaikh Afroz Fatima Muneeruddin, Fabiha Fathima, Sameera Iqbal Muhammad Iqbal
Paper Title: Correlative Band Mapping for Multi Spectral Image Fusion
Abstract: This paper presents the process of image fusion, based on spectral correlative property. In the process
of image fusion, frequency domain image fusions are more effective in coding compared to spatial domain fusion.
In the process of frequency based fusion coding, wavelet approach is used in various formats to obtain spectral
resolution and a fusion mapping is derived to map these resolution information. Wherein, spectral based fusion
approach has higher significance of image coding accuracy, the resolution code overhead is observed. It is seen
that, for larger resolution information’s, the retrieved accuracy of fusions higher, however the processing
coefficients are large in count. To overcome this processing overhead issue, a new approach based on correlative
band mapping approach is proposed. The evaluation result for the proposed approach illustrates a higher accuracy
in fusion region prediction and mapping accuracy.
Keywords: Image Fusion, Hierarchical Modeling, correlative band mapping approach, wavelet coding.
References: 1. M. Canaud, A.Nabavi, C.Becarie, D.Villegas and N-E El Faouzi,, “A realistic case study for comparison of data fusion and assimilation
on an urban network – The Archipel Platform”, Transportation Research Procedia Vol.6, pp.28-49, Elsevier, 2015.
2. Zheng Youzhi, Qin Zheng, “Objective Image Fusion Quality Evaluation Using Structural Similarity”, Tsinghua Science and Technology,
Vol.14, No.6, pp.703-709, IEEE, 2009. 3. Yifang Ban, and Alexander Jacob, “Object-Based Fusion of Multitemporal Multiangle ENVISAT ASAR and HJ-1B Multispectral Data
for Urban Land-Cover Mapping”, IEEE Transactions on Geo-science and Remote Sensing, Vol. 51, No. 4, IEEE, 2013.
4. Yang Oua, Dai GuangZhia, “Color Edge Detection Based on Data Fusion Technology in Presence of Gaussian Noise”, Procedia Engineering, Vol.15, Pp.2439–2443, Elsevier, 2011.
5. Li Dapeng, “A novel method for multi-angle SAR image matching”, Chinese Journal of Aeronautics, Vol.28, pp. 240–249 Elsevier, 2015.
6. Changtao He, Quanxi Liu, Hongliang Li, Haixu Wang, “Multimodal medical image fusion based on IHS and PCA”, Procedia Engineering, Vol.7, pp.280–285 Elsevier, 2010.
7. Yong Yang, “A Novel DWT Based Multi-focus Image Fusion Method”, Procedia Engineering, Vol.24, pp.177–181, Elsevier, 24, 2011.
8. QifanWanga, ZhenhongJiaa, XizhongQina, JieYangb, YingjieHuc, “A New Technique for Multispectral and Panchromatic ImageFusion”,
Vol.24, pp. 182–186, Elsevier, 2011.
9. LIU Fu, LI Jin, Huang Caiyun, “Image Fusion Algorithm Based on Simplified PCNN in Non-sub-sampled Contour let Transform
Domain”, Vol.29, 1434–1438, Elsevier, 2012
677-685
10. Fengrui Chena, Fen Qina, GuangxiongPengb, Shiqiang Chena, “Fusion of Remote Sensing Images Using Improved ICA Mergers Based
on Wavelet Decomposition”, Vol.29, Pp. 2938–2943, Elsevier, 2012.
11. Youdong Ding, Cai xi, Xiaocheng Wei, Jianfei Zhang, “A New Framework for Image Completion Based on ImageFusion Technology”, Vol.29, Pages 3826–3830, Elsevier, 2012.
12. Tao Wu, Xiao-Jun Wu, Xiao-Qing Luo, “A Study on Fusion of Different Resolution Images”, Vol.29, pp. 3980–3985, Elsevier, 2012.
13. LU Heli, QIN Yaochen, ZHANG Lijun, LU Chaojun, LU Fengxian, “A Case Study of Model-Based Satellite Image Fusion”, Vol.37, pp.
268–273, Elsevier, 2012.
14. C.T.Kavitha, C.Chellamuthu, R.Rajesh, “Medical image fusion using combined discrete wavelet and ripplet transforms”, Vol.38,pp. 813–
820, Elsevier, 2012. 15. C.T.Kavitha, C.Chellamuthu, R.Rajesh, “Multimodel medical image fusion using discrete ripplet transform and intersecting cortical
model”, Vol.38, pp. 1409-1414, Elsevier, 2012.
16. Pierre Lassalle, JordiInglada, Julien Michel, “A Scalable Tile-Based Framework forRegion-Merging Segmentation”, IEEE Transactions on Geoscience and Remote Sensing, Vol.53, pp. 5473 – 5485, IEEE, 2015.
17. Bibo Lu, Hui Wang, Chunli Miao, “Medical Image Fusion with Adaptive Local Geometrical Structure and Wavelet Transform”, Vol.8,
pp. 262–269, Elsevier, 2011. 18. Sourav Pramanik, Swagati kaPrusty, Debotosh Bhattacharjee , Piyush Kanti Bhunre, “A Region-to-Pixel Based Multi-sensor Image
Fusion”, Vol.10, pp. 654–662, Elsevier, 2013.
19. Deng Minghuia,Zeng Qingshuanga and Zhang Lanying, “Research on Fusion of Infrared and Visible Images Based on Direction let Transform”, Vol.3, pp. 67–72, Elsevier, 2012.
20. A. AnoopSuraj, Mathew Francis, T.S. Kavya, T.M. Nirmal, “Discrete wavelet transform based image fusion and de-noising in FPGA”,
Vol.1, pp. 72–81, Elsevier, 2014. 21. Shaikh Afroz Fatima Muneeruddin, “Visual Improvements in Color Image Processing Using Regularized Filtration”, American
International Journal of Research in Science, Technology, Engineering & Mathematics, 10(3), March-May, 2015, pp. 277-283
22. Wentao Yao, Zhidong Deng, “A Robust Pedestrian Detection Approach Based on Shape let Feature and Haar Detector Ensembles”, Tsinghua Science and Technology, Vol.13 pp. 314-322, IEEE, 2012.
122.
Authors: K.Suresh Kumar, Y.Rajasree Rao, K.Manjunathachari
Paper Title: Low Power Fault Free Coding Design for Cam Interface
Abstract: In the design modeling of a CAM interface, the controlling and access operation defines the
performance of memory interfacing. In a CAM application, data stored in the Memory units are mapped to a given
query input and an output is developed as a match signal to which as decision is made. in the process of CAM
operation, to obtain a faster matching and low power consumption, a new search approach and pattern alignment
logic is defined. To improve the storage capacity of a CAM unit, a multi page interface is proposed. To the defined
unit a new fault tolerance approach is integrated for a reliable, low power and fast processing CAM application.
Keywords: CAM unit, low power, fast search, high volume, fault tolerant.
References: 1. A. V. Aho and M. J. Corasick, “Efficient string matching: An AID to bibliographic search,” Commun. ACM, vol. 18, no. 6, pp. 333–
340, 1975.
2. Derek Pao1, Wei Lin2,1, and Bin Liu, “Pipelined Architecture for Multi-String Matching”, IEEE Computer Architecture Letters Vol.
7, 2008.
3. M. Alicherry, M. Muthuprasanna, and V. Kumar, “High speed address matching for network IDS/IPS,” in Proc. IEEE Int. Conf. Netw. Protocols (ICNP), 2006, pp. 187–196.
4. B. Brodie, R. Cytron, and D. Taylor, “A scalable architecture for high-throughput regular-expression address matching,” in Proc. 33rd
Int. Symp. Comput. Arch. (ISCA), 2006, pp. 191–122. 5. Z. K. Baker and V. K. Prasanna, “High-throughput linked-address matching for intrusion detection systems,” in Proc. Symp. Arch.
For Netw. Commun. Syst. (ANCS), Oct. 2005, pp. 193–202.
6. Y. H. Cho and W. H. Mangione-Smith, “A address matching co-processor for network security,” in Proc. 42ndIEEE/ACM Des. Autom. Conf., Anaheim, CA, Jun. 13–17, 2005, pp. 234–239
7. Y. H. Cho and W. H. Mangione-Smith, “Fast reconfiguring deep packet filter for 1+Gigabyte Network,” in Proc. 13th Ann. IEEE
Symp. Field Program. Custom Comput. Mach. (FCCM), 2005, pp. 215–224 8. C. R. Clark and D. E. Schimmel, “Scalable address matching on high speed networks,” in Proc. 12th Ann. IEEE Symp. Field Program.
Custom Comput. Mach. (FCCM), 2004, pp. 249–257.
9. Ali, M., Welzl, M., Hessler, S. and Hellebrand, S. (2007) ‘An efficient fault tolerant mechanism to deal with permanent and transient failures in a network on chip’, Int. J. High Performance Systems Architecture, Vol. 1, No. 2, pp.113–123
10. Dou, W., Miao, S. and Li, Y. (2015) ‘Fault-tolerant parallel computing for DEM data blocks with layered dependent relationships based
on redundancy mechanism’, Int. J. High Performance Computing and Networking, Vol. 8, No. 4, pp.337–344. 11. S. Dharmapurikar and J. Lockwood, “Fast and scalable address matching for content filtering,” in Proc. Symp. Arch. for Netw.
Commun. Syst. (ANCS), Oct. 2005, pp. 183–192.
12. E. C. Oh and P. D. Franzon, ‘‘Design considerations and benefits of three-dimensional ternary content addressable memory,’’ in Proc. IEEE Custom Integr. Circuits Conf., 2007,pp. 591–594.
13. D. Bhattacharya, A. Bhoj, and N. Jha,‘‘Design of efficient content addressable memories in high-performance FinFET technology,’’
IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 23, no. 5,pp. 963–967, May 2015. 14. A. McAuley and P. Francis, ‘‘Fast routingtable lookup using CAMs,’’ in Proc. IEEE12th Annu. Joint Conf. IEEE Comput.Commun.
Soc., Netw.: Found. Future,1993, vol. 3, pp. 1382–1391. 15. F. Yu, R. Katz, and T. Lakshman,‘‘Gigabit rate packet pattern-matchingusing TCAM,’’ in Proc. 12th IEEEInt. Conf. Netw. Protocols,
Oct. 2004,pp. 174–183.
16. K. Eshraghian, ‘‘Memristormos contentaddressable memory (MCAM): Hybridarchitecture for future high performancesearch engines,’’ IEEE Trans. Very LargeScale Integr. (VLSI) Syst., vol. 19, no. 8,pp. 1407–1417, Aug. 2011.
17. Q. Guo, X. Guo, Y. Bai, and E. Ipek,‘‘A resistive TCAM accelerator fordata-intensive computing,’’ in Proc. 44thAnnu. IEEE/ACM Int.
Symp. Microarchitect.,2011, pp. 339–350. 18. K.Suresh Kumar, Y.Rajasree Rao, K. Manjunathachari, “Fast Map- Addressing for Content Addressable Memories using Register
Reconfiguration”, 5th IEEE International Conference on Communication and Signal, 2016.
19. K.Suresh Kumar, Y.Rajasree Rao, K. Manjunathachari, “Low-Power Correlative Register Sequencing for Content Addressable Memory”, International Journal of Engineering Studies (IJES) Vol 8, 2016.
20. K.Suresh Kumar, Y.Rajasree Rao, K. Manjunathachari, “A Fault Tolerance Approach For Multi-Page Content Addressable Memory”,
4th IEEE International Conference on Innovations in Information, Embedded And Communication Systems(ICIIECS-2017), March
2017.
21. K.Suresh Kumar, Y.Rajasree Rao, K. Manjunathachari, “ Robust Fault Tolerance In Content Addressable Memory Interface”, IOSR
Journal of VLSI And Signal Processing (IOSR-JVSP), Volume 7, Issue 3, Ver. I, May 2017.
686-692
23. K.Suresh Kumar, Y.Rajasree Rao, K. Manjunathachari, “Address Mapping in Content Addressable Memory Interface With a Low
Power Approach”, International Journal of Engineering Research and Development(IJERD), Volume 13, Issue 12, Ver I, December,
2017
123.
Authors: Gouse Baig Mohammad, U Ravi Babu
Paper Title: RCAC: A Secure and Privacy Preserving RFID based Cloud-Assisted Access Control to IoT Integrated
Smart Home
Abstract: With the emergence of Internet of Things (IoT), smart and intelligent applications are being developed.
One of the key enabling technologies of IoT is Radio Frequency Identification (RFID). RFID uniquely identifies
all connected devices and things in an IoT use case like smart home which may be part of smart city use case in
turn. Therefore IoT applications are implicitly made RFID critical. Thus ensuring security and privacy in RFID
communications is indispensable for sustainable growth in such applications. With respect to smart home access
control, there might be privacy attacks since RFID carries sensitive information of users. Cyber criminals may
target to destroy critical digital infrastructure. RFID authentication is made large scale in IoT integrated
applications. Therefore, it is essential to have cloud-assisted solution. With cloud integration, RFID authentication
reaps benefits of cloud such as scalability, availability and fault tolerance at server side. Nevertheless, cloud is
untrusted environment from user point of view and vulnerable to attacks. Therefore there is need for secure and
privacy preserving RFID based authentication mechanism. Such system should be able to prevent both internal and
external attacks. The mechanisms found in literature are using various schemes to implement security. However,
consideration of probability of internal attacks solicits a new model for enhancing security in smart home use case.
Towards this end, we proposed a secure and privacy preserving framework to safeguard interests of all
stakeholders of the use case as far as security is concerned. The framework is known as RFID based Cloud-
assisted Access Control (RCAC). It enables secure communications among parties involved in access control
mechanism. It is lightweight, secure, privacy preserving and prevents external and internal attacks. Amazon EC2 is
used as cloud platform to evaluate the framework. Experimental results are encouraging and RCAC shows
performance improvement over the state of the art.
Keywords: Radio Frequency Identification, Internet of Things, RFID based authentication, cloud assisted RFID
authentication
References: 1. Muhammad RaisulAlam, M. B. I. Reaz and M. A. Mohd Ali.(2012). A Review of Smart Homes – Past, Present, and Future. IEEE
Transactions on Systems Man and Cybernetics Part C, p1-16. 2. Pardeep Kumar, AnBraeken, Andrei Gurtov, JariIinatti and Phuong Hoai Ha. (2017). Anonymous Secure Framework in Connected
Smart Home Environments. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY.12 (4), p968-979. 3. José L. Hernández · M. Victoria Moreno · Antonio J. Jara · Antonio F. Skarmeta. (2014). A soft computing based location-aware access
control for smart buildings. 3, p1-16. 4. Joseph Bugeja, Andreas Jacobsson and Paul Davidsson. (2016). On Privacy and Security Challenges in Smart Connected Homes
. European Intelligence and Security Informatics Conference, p172-175. 5. Min Chen, Jiafu Wan, Sergio Gonz´alez, Xiaofei Liao and Victor C.M. Leung. (2014). A Survey of Recent Developments in Home
M2M Networks. IEEE COMMUNICATIONS SURVEYS & TUTORIALS.16 (1), p98-114. 6. ProsantaGope, Ruhul Amin, S.K. Hafizul Islam, Neeraj Kumar, Vinod Kumar Bhalla .(2017). Lightweight and privacy-preserving
RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment. ELSEVIER,
p1-10. 7. Kuan Zhang, Jianbing Ni, Kan Yang, Xiaohui Liang, JuRen, and Xuemin (Sherman) Shen. (2017). Security and Privacy in Smart City
Applications: Challenges and Solutions. IEEE, p122-129. 8. JORDI MONGAY BATALLA, ATHANASIOS VASILAKOS AND MARIUSZ GAJEWSKI. (2017). Secure Smart Homes:
Opportunities and Challenges. ACM Computing Surveys.50 (5), p1-32. 9. Christos Stergioua , Kostas E. Psannis, Byung-GyuKimb, Brij Gupta. (2018). Secure integration of IoT and Cloud
Computing. ELSEVIER.78, P964–975. 10. Mung Chiang and Tao Zhang. (2016). Fog and IoT: An Overview of Research Opportunities. IEEE INTERNET OF THINGS JOURNAL.3
(6), P854-864. 11. Abdul Samada, PrashantMurdeshwar, ZohaibHameed. (2010). High-credibility RFID-based animal data recording system suitable for
small-holding rural dairy farmers. ELSEVIER.73, P213–218. 12. Wei Xie1 , Lei Xie2 , Chen Zhang1 , Quan Zhang1 and Chaojing Tang. (2013). Cloud-based RFID Authentication . IEEE International
Conference on RFID, p168-175. 13. Terence. K. L. Huia, R. Simon Sherratta , Daniel D´ıazS´anchez. (2015). Major Requirements for Building Smart Homes in Smart Cities
based on Internet of Things Technologies, p1-20. 14. Parikshit N. Mahalle, BayuAnggorojati, Neeli R. Prasad and Ramjee Prasad. (2013). Identity Authentication and Capability Based Access
Control (IACAC) for the Internet of Things. Journal of Cyber Security and Mobility. 1, p 309–348. 15. Dieter Uckelmann, Mark Harrison and Florian Michahelles. (2011). Architecting the Internet of Things, p1-378. 16. Dr. V. Bhuvaneswari and Dr. R Porkodi. (2014). The Internet of Things (IoT) Applications and Communication Enabling Technology
Standards: An Overview. International Conference on Intelligent Computing Applications, p324-329. 17. PallaviSethi and Smruti R. Sarangi. (2017). Internet of Things: Architectures, Protocols, and Applications. Journal of Electrical and
Computer Engineering, p1-26. 18. Benjamin Khoo. (2014). RFID - from Tracking to the Internet of Things: A Review of Developments. IEEE, p1-9. 19. Jing Liu and Yang Xiao and C. L. Philip Chen . (2012). Authentication and Access Control in the Internet of Things . 32nd International
Conference on Distributed Computing Systems Workshops, p588-592. 20. Mian Ahmad Jan, Priyadarsi Nanda, Xiangjian He, Zhiyuan Tan and Ren Ping Liu. (2014). A Robust Authentication Scheme for
Observing Resources in the Internet of Things Environment. IEEE, p1-8. 21. SRAVANI CHALLA1 , MOHAMMAD WAZID1 , ASHOK KUMAR DAS, NEERAJ KUMAR, ALAVALAPATI GOUTHAM
REDDY3 , EUN-JUN YOON4 , AND KEE-YOUNG YOO. (2017). Secure Signature-Based Authenticated Key Establishment Scheme
for Future IoT Applications. IEEE. Translations and content mining are permitted for academic research onl. 5, p3028-3043. 22. MuhamedTurkanovic, BoštjanBrumen, Marko Hölbl. (2014). A novel user authentication and key agreement scheme for heterogeneous
ad hoc wireless sensor networks, based on the Internet of Things notion. ELSEVIER.20, p96–112. 23. Alessandra Rizzardi a , Sabrina Sicaria,n , Daniele Miorandi b , Alberto Coen-Porisini . (2016). AUPS: An Open Source AUthenticated
Publish/Subscribe system for the Internet of Things. ELSEVIER.62, p29–41. 24. Son N. Han, Noel Crespi. (2017). Semantic service provisioning for smart objects: Integrating IoT applications into the
693-700
web. ELSEVIER.76, p180–197. 25. Yudai Komori, Kazuya Sakai, Satoshi Fukumoto, Fast and Secure Tag Authentication in Large-Scale RFID Systems Using Skip Graphs,
Computer Communications (2017), doi: 10.1016/j.comcom.2017.11.008.
124.
Authors: Vani Garikipati, N Naga Malleswara Rao
Paper Title: Secured Cluster Based Distributed Fault Diagnosis Routing for MANET
Abstract: Mobile Ad-hoc Network (MANET) has become very crucial for many industrial applications. It is
dynamic in nature. Due to its mobility and resource constrainedness and dynamic topology, MANET is vulnerable
to many attacks. Therefore it is indispensable to have secure and efficient communications in MANET. Towards
this end, in this paper, a novel routing approach is proposed. It is known as cluster-based distributed fault diagnosis
routing which is highly secure in nature. The proposed system model includes fault diagnosis and also secure key
distribution. Keeping this in mind clusters are created in MANET appropriately. The cluster-based approach in
MANET is capable of distributing the aggregated data. Data in each cluster is to be distributed to respective data
center. A node in the cluster that has high energy resources is considered to be cluster head. The process of secure
routing in the MANET is made by defining a procedure known as pseudonymity. The proposed model is
implemented using NS2 simulations.
Keywords: Mobile Ad Hoc Network, Clustering, Diffie-Hellman key, pseudonym
References: 1. A.A. Abbasi and M. Younis. “A Survey on Clustering Algorithms for Wireless Sensor Networks.”Volume 30, Issues 14–15, 15 October
2007.
2. C. Tselikis, S. Mitropoulos, N. Komninos, and C. Douligeris. “Degree-based clustering algorithms for wireless Ad Hoc networks under
attack.” IEEE Communications Letters, vol. 16, no. 5, pp. 619–621, 2012. 3. P. Chatterjee, I. Sengupta, and S. K. Ghosh, “STACRP: a secure trusted auction oriented clustering based routing protocol for MANET,”
Cluster Computing, vol. 15, pp. 303–320, 2012.
4. YoHan Park, YoungHo Park and SangJae Moon, “Anonymous Cluster-Based MANETs with Threshold Signature”, Hindawi Publishing Corporation International Journal of Distributed Sensor Networks Volume 2013, Article ID 374713.
5. Yuxin Liu, Mianxiong Dong, Member, IEEE, Kaoru Ota, Member, IEEE, Anfeng Liu, “Secure and Trustable Routing in Wireless
Sensor Networks”, IEEE Transactions 1556-6013 (c) pp. 1-14, 2016. 6. Prof. N. Sureshkumar and Dr. S.Bhavani “Residual Energy based Reliable Multipath Routing Scheme for increasing Network Lifetime
in MANET” International Journal of Applied Engineering Research ISSN 0973-4562 pp. 1908-1913 Volume 12, Number 9 (2017) ©
Research India Publications. 7. Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Ad hoc networks, 1(2-3),
293-315.
8. R. J. Ik, O. K. Jeong, and H. L. Dang. “A Diffie-Hellman Key Exchange Protocol without Random Oracles.” in Proc. 5th International Conference on Cryptology and Network Security, Springer-Verlag Berlin, pp. 37-54, 2006.
9. D. Johnson, and A. Menezes. “The Elliptic Curve Digital Signature Algorithm (ECDSA).” Technical Report CORR 99-34, Centre for
Applied Cryptographic Research (CACR), University of Waterloo, 1999.
10. Saju PJohn and PhilipSamuel. “Self-organized key management with trusted certificate exchange in MANET.”
https://doi.org/10.1016/j.asej.2014.09.011
11. J. Ibriq, I. Mahgoub. “HIKES:hierarchical key establishment scheme for wireless sensor networks.” Int J Commun Syst (8 November) (2012), 10.1002/dac.2438.
12. Nilesh Goriya, Indr Jeet Rajput, Mihir Mehta“Low Control Overhead for Cluster Maintenance in Wireless Network for DSR Protocol.”
COMPUSOFT, An international journal of advanced computer technology, 4 (5), May-2015 (Volume-IV, Issue-V) 13. Milan KumarDholey,G.P.Biswas. “Proposal to Provide Security in MANET's DSRRouting
Protocol.”https://doi.org/10.1016/j.procs.2015.04.117
14. Network simulator https://www.isi.edu/nsnam/ns/ 15. Saju P John a, *, Philip Samuel. (2015). Self-organized key management with trusted certificate exchange in MANET, Ain Shams
Engineering Journal (2015) 6, 161–170.
701-705
125.
Authors: K. Sathishkumar, R. Soundararajan, G. Dinesh, S. Surjith
Paper Title: Design and Air Flow Analysis in Intake Manifold with Different Cross Section Using CFD
Abstract: The air-fuel mixture is the important source in engine combustion, the transfer of air-fuel mixture is
done by intake manifold in the intake system of the automobile. So due to improving the efficiency of the engine
most of the automobile manufacturing industry is mainly focused on the intake manifold design for better
performance. This project investigates about flow analysis taken in the different cross-section of an intake
manifold. The main goal of our work is to change the cross-section of the intake manifold and analysis the model.
In this paper, the manifold is designed by considering two different cross-section one is the circular outlet and the
other is the convergent-divergent outlet and the created model is analyzed. The flow analysis is carried by using
CFD and the values are compared and the best cross-section is concluded. The manifold with a convergent-
divergent outlet has high velocity when compared with the circular outlet. The intake manifold can be used in
automobile industries.
Keywords: Air intake manifold, Convergent-divergent outlet manifold, Airflow, Fluent, Circular manifold, CFD.
References: 1. Anilkumar. D.B, Dr. Anoop Kumar Elia , Computational analysis of Intake manifold design of a four cylinder diesel engine in Technical
research organization,5(4), 2018. 2. Wolf Bauer and John B. Heywood, Oshin Avanessian and Derlon Chu , Flow Characteristics in Intake Port of Spark Ignition Engine
Investigated by CFD and Transient Gas Temperature Measurement in SAE technical paper series 961997.
3. V. Bellenger , A. Tcharkhtchi , Ph. Castaing , Thermal and mechanical fatigue of a PA66/glass fibers composite material in ELSEVIER
International Journal of Fatigue 28 (2006) pp.1348–1352.
4. M.A. Ceviz , Intake plenum volume and its influence on the engine performance, cyclic variability and emissions in ELSEVIER Energy
Conversion and Management 48 (2007) pp.961–966 .
706-711
5. M.A. Ceviz , M. Akin , Design of a new SI engine intake manifold with variable length plenum in ELSEVIER Energy Conversion and
Management 51 (2010) pp.2239–2244 .
6. Ryan Ilardo , Christopher B. Williams, Design and manufacture of a Formula SAE intake system using fused deposition modeling and fiber-reinforced composite materials in Rapid Prototyping Journal, 16(3), pp. 174 – 179.
7. Mohamed Ali Jemni, Gueorgui Kantchev, Mohamed Salah Abid , Influence of intake manifold design on in-cylinder flow and engine
performances in a bus diesel engine converted to LPG gas fuelled, using CFD analyses and experimental investigations in ELSEVIER
Energy 36 (2011) pp.2701-2715.
8. A.Manmadhachary, M.Santosh kumar , Y.Ravi kumar , Design&manufacturing of spiral intake manifold to improve Volument efficiency
of injection diesel engine byAM process in 5th International Conference of Materials Processing and Characterization (ICMPC 2016) pp. 1084–1090.
9. M. Safari , M. Ghamari and A. Nasiritosi , Intake Manifold Optimization by Using 3-D CFD Analysis in SAE technical paper series 2003-
32-0073. 10. Robert M. Siewert, Roger B. Krieger, Mark S. Huebler, Prafulla C. Baruah and Bahram Khalighi and Markus Wesslau , Modifying an
Intake Manifold to Improve Cylinder-to-Cylinder EGR Distribution in a DI Diesel Engine Using Combined CFD and Engine Experiments
in SAE technical paper series 2001-01-3685. 11. Jianmin Xu , Flow analysis of engine intake manifold based on computational fluid dynamics in IOP Conf. Series: Journal of Physics:
Conf. Series 916 (2017) 012043.
12. Jordan Lee, Lisa Roessler , Vibration Welded Composite Intake Manifolds Design Considerations and Material Selection Criteria in SAE technical paper series 970076.
13. Case Study On Plastic intake manifold in MATERIALS & DESIGN 13(6), 1992.
14. Ch. Indira Priyadarsini Flow analysis of intake manifold using CFD in International Journal of Engineering and Advanced Research Technology 2(1), 2016.
15. RepairPal Homepage http://repairpal.com/intake-manifold last accessed on 2017/09/18.
16. Yu, J., Vuorinen, V., Kaario, O., Sarjovaara, T., & Larmi, M.: Visualization and analysis of the characteristics of transitional under expanded jets. International Journal of Heat and Fluid Flow 44, 140-154 (2013).
126.
Authors: D. Rajasekar, J. Rengamani
Paper Title: A Study on the Port Hinterland Connectivity of Chennai Port Sector
Abstract: Port hinterland connectivity plays vital role for the growth of any seaport. The economic growth and
trade in India depends on maritime transport which in turn depends on good port hinterland connectivity. Seaport
hinterland connectivity contains various mode of transport like roadways,railways, airways, inland waterways and
inland freight facilities for various cargos.The seaports are connected to inland freight facilities which act like
transit place which connect both importers and exporters in the hinterland to seaports and facilitating regional and
cross broader trade.The Major ports in India when compared with world class ports still lags behind in hinterland
connectivity, this lead to port congestion and directly affects the port performance.The Public –Private model
investment which is encouraged by the government showing better results in development of port hinterland
connectivity. The Chennai port lacks good hinterland connectivity due to which the port faces lots of challenges.
The study reiterates Port hinterland connectivity at present infrastructure development and challenges faced by
Chennai port.
Keywords: Chennai Port, Congestion, Vessel, Ports, hinterland connectivity, Draft, Berth.
References: 1. Aronietis, R., Van de Voorde, E., Vanelslander, T. (2010). Port competitiveness determinants of selected European ports in the
containerized cargo market. Paper presented at IAME2010. 2. Connie Chen (India spring board, April 2014 issue of Port strategy, 2014 Holman Fenwick Willan LLP.
3. Consequences of Port Congestion on Logistics and Supply Chain in African Ports, by Dr. USMAN GIDADO (FCILT), Sea/Maritime
Transport Modal Representative, CILT Nigeria. 4. D.Rajasekar and Dr. J. Rengamani, A Study on the Infrastructural Facilities of the Seaports in Chennai Cluster. International Journal of
Civil Engineering and Technology, 8(11), 2017, pp. 591–599.
5. Dr.J.Rengamani and Dr.A.Shameem, A Study on the Civil Engineering Logistics Growth and Challenges in India. International Journal of Civil Engineering and Technology, 9(8), 2018, pp. 44-53.
6. Giuliano, G., and T. O’Brien. 2007. “Reducing Port-Related Truck Emissions: The Terminal Gate Appointment System At The Ports Of
Los Angeles And Long Beach.” Transportation Research Part D 12(7), pp. 460–473. 7. Huynh, N., and C. M. Walton. 2008. “Robust Scheduling Of Truck Arrivals At Marine Container Terminals.” Journal of Transportation
Engineering 134(8), pp. 347–353.
8. Huynh, N., F. Harder, D. Smith, S. Omar, and P. Quyen. 2011. “An Assessment of Truck Delays at Seaports Using Terminal Webcams.” TRB paper 2222. pg 54 -62.
9. Issue 7, pp. 523-527. (2007).
10. Muralidharan Balasubramaniam and Dr.J.Rengamani, Inevitability in the Growth and Development of Green Port Operations in the Seaports of Chennai Cluster, International Journal of Mechanical Engineering and Technology, 9(9), 2018, pp. 489–496.
11. Pallis, A.A., Vitsonis, T.K., and DeLangen, P.W. (2010) Port Economics, Policy, and Management: Review of an Emerging Research
Field. Transport Reviews, 30(1), 115-161. 12. Port Congestion and Implications to Maritime Logistics, chapter 4, by Hilde Meersman, Eddy Van de Voorde and Thierry Vane/slander,
2012 by Emerald group Publishing Limited.
13. Roso V. “Evaluation of the dry port concept from an environmental perspective: A note.” 14. Transportation Research Part D: Transport and Environment, Elsevier B.V., Volume 12,
15. U.S. Container Port Congestion and Related International Supply Chain Issues: Causes, Consequences and Challenges, FMC Port
Forums, 2015 16. Vacca, I., M. Bierlaire, and M. Salani. 2007. “Optimization at Container Terminals: Status, Trends and Perspectives.” In the 7th Swiss
Transport Research Conference.
712-717
127.
Authors: Manas Kumar Yogi, L. Yamuna
Paper Title: Enhancing Ability of User Personalization by Application of Rough Fuzzy Grouping Mechanism for
Improved Web Intelligence
Abstract: In contemporary world, Web personalization tenders accurate means for the evolution of operations
that have the enticing feature to satisfy compelling obligation of their end user. To perform that, developers of web
need to face an decisive trial regarding the disclosure of information of concern which the end users show while
718-722
they reach out to various sites. Web Usage Mining is a functioning exploration region which regards the disclosure
of helpful examples of run of the mill client practices by using utilization information. Grouping has been hugely
applied for sake of classifying users having identical concerns. Rough fuzzy grouping proves to be an mechanism
handy to deduce user sections from web use information accessible via server history files. It is well known that
fuzzy grouping works on mechanism of distance-based metrics to judge the similarity among user choices. But the
application of such techniques may propel to feeble outcomes by classifying user groups that do not include the
meaningful knowledge assimilated . In this paper, we advocate an technique based on a rough fuzzy grouping
algorithm armed with a rough fuzzy similarity metric to deduce user groups. For pertinence, we deploy the
presented technique on users data extricated from server history files of a popular web site.
Keywords: rough ,fuzzy, similarity measures, grouping, personalization, user categorization.
References: 1. Abraham, A., Wang, X.: i-Miner: A Web Usage Mining Framework Using Hierarchi- cal Intelligent Systems. In: The IEEE Int. Conf. on
Rough fuzzySystems, pp. 1129–1134. IEEE Press, Los Alamitos (2003)
2. Arotaritei, D., Mitra, S.: Web Mining: a survey in the rough fuzzyframework. Rough fuzzySets and System 148, 5–19 (2004) 3. K.C. Lee, J.S. Kim, N.H. Chung, and S.J. Kwon, “Fussy Cognitive Map Approach to Web-Mining Inference Amplification,” Expert
System with Applications, vol. 22, pp. 197-211, 2002.
4. Y. Li and N. Zhong, “Ontoserver historyy-Based Web Mining Model: Representations of User Profiles,” Proc. IEEE/WIC Int’l Conf. Web Intelligence, pp. 96-103, 2003
5. N. Zhong, J. Liu, and Y.Y. Yao, “In Search of the Wisdom Web,” Computer, vol. 35, no. 11, pp. 27-31, Nov. 2002.
6. Z.Y. Lu, Y.Y. Yao, and N. Zhong, “Web Server history Mining,” Web Intelligence, pp. 174-194, 2003. 7. M. Perkowitz and O. Etzioni, “Adaptive Web Sites,” Comm. ACM, vol. 43, no. 8, pp. 152-158, 2002.
8. T.Y. Yan, M. Jacobsen, H. Garcia-Molina, and U. Dayal, “From User Access Patterns to Dynamic Hypertext Linking,” Proc. Fifth Int’ World Wide Web Conf., 1996.
9. Martin-Bautista, M.J., Vila, M.A., Escbar-Jeria, V.H.: In: IADIS European Conference Data Mining, pp. 73–76 (2008)
128.
Authors: Pooja G, S. Murali Krishna, V. Ravi
Paper Title: Multi-Level Memristor Memory: Design and Performance Analysis
Abstract: Memristor-based memories are one of the attractive candidates to replace present memory
technologies due to its novel characteristics such as non-volatile storage, nanosize cell, compatibility with CMOS,
low power dissipation, and multi-level cell (MLC) operation etc. However, the device needs to overcome the
potential challenges such as process variations, non-deterministic nature of the operation, sneak path issues, non-
destructive write and read operation. One of the most important characteristics of memristor memories is its ability
to store multiple bits in one cell. In this paper, we design a low power, high-speed multi-level memristor based
memories. Additionally, the performance analysis of the multi-level memristor memories has been performed
under various memristor models and window functions.
Keywords: Memristor, Non-volatile memory,
References: 1. Chua L. Memristor-the missing circuit element. IEEE Trans Circuit Theory 1971;18:507–19.
2. Strukov DB, Snider GS, Stewart DR, Williams RS. The missing memristor found. Nature 2008;453:80. 3. Amdapurkar A, Naik DK, Ravi V. Design and Development of Memristor-based Combinational Circuits. Int J Recent Innov Trends
Comput Commun 2016;4.
4. Chandni MD, Ravi V. Built in self test architecture using concurrent approach. Indian J Sci Technol 2016;9. 5. Sharma A, Ravi V. Built in self-test scheme for SRAM memories. Adv. Comput. Commun. Informatics (ICACCI), 2016 Int. Conf., IEEE;
2016, p. 1266–70.
6. Chaitanya MK, Ravi V. Design and development of BIST architecture for characterization of S-RAM stability. Indian J Sci Technol 2016;9.
7. Rabbani P, Dehghani R, Shahpari N. A multilevel memristor–CMOS memory cell as a ReRAM. Microelectronics J 2015;46:1283–90.
8. Kvatinsky S, Ramadan M, Friedman EG, Kolodny A. VTEAM: A general model for voltage-controlled memristors. IEEE Trans Circuits Syst II Express Briefs 2015;62:786–90.
9. Wong H-SP, Lee H-Y, Yu S, Chen Y-S, Wu Y, Chen P-S, et al. Metal–oxide RRAM. Proc IEEE 2012;100:1951–70.
10. Strukov DB, Snider GS, Stewart DR, Williams RS. The missing memristor found. Nature 2009;459:1154–1154.
doi:10.1038/nature08166.
11. Kvatinsky S, Talisveyberg K, Fliter D, Kolodny A, Weiser UC, Friedman EG. Models of memristors for SPICE simulations. Electr.
Electron. Eng. Isr. (IEEEI), 2012 IEEE 27th Conv., IEEE; 2012, p. 1–5. 12. Radwan AG, Fouda ME. On the mathematical modeling of memristor, memcapacitor, and meminductor. vol. 26. Springer; 2015.
13. Biolek Z, Biolek D, Biolková V. SPICE model of memristor with nonlinear dopant drift. Radioengineering 2009;18:210–4.
14. Kvatinsky S, Friedman EG, Kolodny A, Member S, Weiser UC. TEAM : ThrEshold Adaptive Memristor Model 2013;60:211–21. 15. Zha J, Huang H, Liu Y. A novel window function for memristor model with application in programming analog circuits. IEEE Trans
Circuits Syst II Express Briefs 2016;63:423–7.
16. Kvatinsky S, Talisveyberg K, Fliter D, Friedman EG, Kolodny A, Weiser UC. Verilog-A for Memristor Models. CCIT Tech Rep 2011;8. 17. Ravi V, Prabaharan SRS. Fault tolerant adaptive write schemes for improving endurance and reliability of memristor memories. AEU-
International J Electron Commun 2018;94:392–406.
18. Ravi V, Prabaharan SRS. Weak Cell Detection Techniques for Memristor-Based Memories 2018:101–10. 19. Reddy MGSP, Ravi V. Nondestructive Read Circuit for Memristor-Based Memories. Nanoelectron. Mater. Devices, Springer; 2018, p.
123–31.
20. Ho Y, Huang GM, Member S, Li P, Member S. Dynamical Properties and Design Analysis for Nonvolatile memristor memories
2011;58:724–36.
723-729
129.
Authors: Harish Baraithiya, R. K. Pateriya
Paper Title: Classifiers Ensemble for Fake Review Detection
Abstract: The growth of e-commerce businesses has attracted many consumers, because they offer a range of 730-736
products at competitive prices. One thing most purchasers rely on when they purchase online is for product
reviews to conclude their decision. Many sellers use the decision to impact the review to hire the paid review
authors. These paid review authors target the particular brand, store or product and write reviews to promote or
demote them according to the requirements of their hired employees. In view of the effects of these fake reviews, a
number of techniques to detect these fake reviews have already been proposed. Because of nature of the reviews it
is difficult to classify them using single classifier. Hence in this paper, we proposed an ensemble classifier based
approach to detect the fake reviews. The proposed ensemble classifier uses support vector machine (SVM), Naïve
Byes classifier and k- nearest neighbor (KNN mutual) classifiers. The proposed technique is evaluated using Yelp
and Ott. et al [10] datasets. The evaluation results show that the proposed classifier provides better classification
accuracy on both datasets.
Keywords: Fake review detection, ensemble classifiers, Behavioral analysis, Opinion Spam.
References: 1. Cone Research. Game changer: Corn survey finds 4-out-of-5 consumers reverse purchase decisions based on negative online reviews.
2011. www.conecomm.com/contentmgr/ 5showdetails.php/id/4008. 2. Cui, Geng and Lui, Hon-Kwong and Guo, Xiaoning, The effect of online consumer reviews on new product sales, International Journal of
Electronic Commerce, 17, 39-58 (2012).
3. Mukherjee, Arjun and Venkataraman, Vivek and Liu, Bing and Glance, Natalie, Fake review detection: Classification and analysis of real and pseudo reviews, Technical Report UIC-CS-2013--03, University of Illinois at Chicago, Tech. Rep., (2013).
4. Sun, Chengai and Du, Qiaolin and Tian, Gang, Exploiting product related review features for fake review detection, Mathematical
Problems in Engineering, (2016). 5. Dave, Kushal and Lawrence, Steve and Pennock, David M, Mining the peanut gallery: Opinion extraction and semantic classification of
product reviews, Proceedings of the 12th international conference on World Wide Web, 519--528 (2003).
6. Duan, Huiying and Zirn, C{\"a}cilia, Can we identify manipulative behavior and the corresponding suspects on review websites using supervised learning?, Nordic Conference on Secure IT Systems, 215--230 (2012).
7. Feng, Song and Banerjee, Ritwik and Choi, Yejin, Syntactic stylometry for deception detection, Proceedings of the 50th Annual Meeting
of the Association for Computational Linguistics, 2, 171--175 (2012). 8. Yuan, Ling and Li, Dan and Wei, Shikang and Wang, Mingli, Research of Deceptive Review Detection Based on Target Product
Identification and Metapath Feature Weight Calculation, Complexity, (2018).
9. Li, Luyang and Qin, Bing and Ren, Wenjing and Liu, Ting, Document representation and feature combination for deceptive spam review detection, Neurocomputing, 254, 33--41 (2017).
10. Ott, Myle and Choi, Yejin and Cardie, Claire and Hancock, Jeffrey T, Finding deceptive opinion spam by any stretch of the imagination,
Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies, 1, 309--319 (2011).
11. Khalifa, Malika Ben and Elouedi, Zied and Lef{\`e}vre, Eric, Fake Reviews Detection Under Belief Function Framework, International
Conference on Advanced Intelligent Systems and Informatics, 395--404 (2018). 12. Mukherjee, Subhabrata and Dutta, Sourav and Weikum, Gerhard, Credible review detection with limited information using consistency
features, Joint European Conference on Machine Learning and Knowledge Discovery in Databases, 195--213 (2016).
13. Chauhan, Shashank Kumar and Goel, Anupam and Goel, Prafull and Chauhan, Avishkar and Gurve, Mahendra K, 2017 4th International
Conference on Signal Processing and Integrated Networks (SPIN), , 390--393 (2017).
14. Mukherjee, Arjun and Venkataraman, Vivek and Liu, Bing and Glance, Natalie S, What yelp fake review filter might be doing?, ICWSM,
409--418 (2013). 15. Rout, Jitendra Kumar and Dalmia, Anmol and Choo, Kim-Kwang Raymond and Bakshi, Sambit and Jena, Sanjay Kumar, Revisiting
Semi-Supervised Learning for Online Deceptive Review Detection., IEEE Access, 5-1, 1319--1327 (2017).
16. Liu, Yuanchao and Pang, Bo, A Unified Framework for Detecting Author Spamicity by Modeling Review Deviation, Expert Systems with Applications, (2018).
17. Jindal, Nitin and Liu, Bing, Opinion spam and analysis, Proceedings of the 2008 international conference on web search and data mining, 219--230 (2008).
18. Mukherjee, Arjun and Kumar, Abhinav and Liu, Bing and Wang, Junhui and Hsu, Meichun and Castellanos, Malu and Ghosh,
Riddhiman, Spotting opinion spammers using behavioral footprints, Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, 632--640 (2013).
19. Wang, Guan and Xie, Sihong and Liu, Bing and Philip, S Yu, Review graph based online store review spammer detection, 2011 ieee 11th
international conference on Data mining (icdm), 1242--1247 (2011). 20. Mukherjee, Arjun and Liu, Bing and Wang, Junhui and Glance, Natalie and Jindal, Nitin, Detecting group review spam, Proceedings of
the 20th international conference companion on World wide web. 93--94 (2011).
21. Lim, Ee-Peng and Nguyen, Viet-An and Jindal, Nitin and Liu, Bing and Lauw, Hady Wirawan, Detecting product review spammers using rating behaviors, Proceedings of the 19th ACM international conference on Information and knowledge management, 939--948 (2010).
22. Mukherjee, Arjun and Liu, Bing and Glance, Natalie, Spotting fake reviewer groups in consumer reviews, Proceedings of the 21st
international conference on World Wide Web, 191--200 (2012). 23. Jindal, Nitin and Liu, Bing and Lim, Ee-Peng, Finding unusual review patterns using unexpected rules, Proceedings of the 19th ACM
international conference on Information and knowledge management, 1549--1552 (2010).
24. Mukherjee, Arjun and Liu, Bing, Improving gender classification of blog authors, Proceedings of the 2010 conference on Empirical Methods in natural Language Processing, 207--217 (2010).
25. Li, Jiwei and Ott, Myle and Cardie, Claire and Hovy, Eduard, Towards a general rule for identifying deceptive opinion spam, Proceedings
of the 52nd Annual Meeting of the Association for Computational Linguistics, 1, 1566--1576 (2014). 26. Li, Fangtao and Huang, Minlie and Yang, Yi and Zhu, Xiaoyan, Learning to identify review spam, IJCAI Proceedings-International Joint
Conference on Artificial Intelligence, 22-3, 2488 (2011).
27. Hammad, A. S. A., and Alaa El-Halees. "An approach for detecting spam in arabic opinion reviews." The International Arab Journal of Information Technology 12 (2013).
28. Fei, Geli, et al. "Exploiting Burstiness in Reviews for Review Spammer Detection." Icwsm 13 (2013): 175-184.
29. Alexander Poliakov “An Example of Fuzzy Decision-Making System”, Proceedings of the 7th Korea-Russia International Symposium,KORUS 2003.
30. Taneja, Shweta, Bhawna Suri, Himanshu Narwal, Anchit Jain, Akshay Kathuria, and Sachin Gupta. "A new approach for data
classification using Fuzzy logic." In Cloud System and Big Data Engineering (Confluence), 2016 6th International Conference, pp. 22-27. IEEE, 2016.
31. Song, Qinbao, Jingjie Ni, and Guangtao Wang. "A fast clustering-based feature subset selection algorithm for high-dimensional data."
IEEE transactions on knowledge and data engineering 25, no. 1 (2013): 1-14.
32. Lin, Lin, Xue-Hai Yuan, and Zun-Quan Xia. "Multicriteria fuzzy decision-making methods based on intuitionistic fuzzy sets." Journal of
computer and System Sciences 73, no. 1 (2007): 84-88.
33. Perera, L. P., J. P. Carvalho, and C. Guedes Soares. "Fuzzy logic based decision making system for collision avoidance of ocean
navigation under critical collision conditions." Journal of marine science and technology 16, no. 1 (2011): 84-99.
34. Ishibuchi, Hisao, Ken Nozaki, Naohisa Yamamoto, and Hideo Tanaka. "Construction of fuzzy classification systems with rectangular
fuzzy rules using genetic algorithms." Fuzzy sets and systems 65, no. 2-3 (1994): 237-253. 35. Zhou, Enwang, and Alireza Khotanzad. "Fuzzy classifier design using genetic algorithms." Pattern Recognition 40, no. 12 (2007): 3401-
3414.
36. Ghosh, Soumadip, Sushanta Biswas, Debasree Sarkar, and Partha Pratim Sarkar. "A novel Neuro-fuzzy classification technique for data
mining." Egyptian Informatics Journal 15, no. 3 (2014): 129-147.
37. Nauck, Detlef, and Rudolf Kruse. "A neuro-fuzzy method to learn fuzzy classification rules from data." Fuzzy sets and Systems 89, no. 3
(1997): 277-288. 38. Zadeh, Lotfi A. "Fuzzy sets." Information and control 8, no. 3 (1965): 338-353.
39. Mamdani, Ebrahim H., and Sedrak Assilian. "An experiment in linguistic synthesis with a fuzzy logic controller." International journal of
man-machine studies 7, no. 1 (1975): 1-13. 40. Yager, Ronald R., and Dimitar P. Filev. "Essentials of fuzzy modeling and control." New York 388 (1994).
41. Ikonomakis, M., Sotiris Kotsiantis, and V. Tampakas. "Text classification using machine learning techniques." WSEAS transactions on
computers 4, no. 8 (2005): 966-974. 42. Ishibuchi, Hisao, and T. Nakashima. "Designing compact fuzzy rule-based systems with default hierarchies for linguistic approximation."
In Evolutionary Computation, 1999. CEC 99. Proceedings of the 1999 Congress on, vol. 3, pp. 2341-2348. IEEE, 1999.
43. Battiti, Roberto. "Using mutual information for selecting features in supervised neural net learning." IEEE Transactions on neural networks 5, no. 4 (1994): 537-550.
44. Quadrianto, Novi, Alex J. Smola, Tiberio S. Caetano, and Quoc V. Le. "Estimating labels from label proportions." Journal of Machine
Learning Research 10, no. Oct (2009): 2349-2374. 45. Utami, Iut Tri, Bagus Sartono, and Kusman Sadik. "Comparison of Single and Ensemble Classifiers of Support Vector Machine and
Classification Tree." Journal of Mathematical Sciences and Applications 2.2 (2014): 17-20.
46. Ektefa, Mohammadreza, Sara Memar, Fatimah Sidi, and Lilly Suriani Affendey. "Intrusion detection using data mining techniques." In Information Retrieval & Knowledge Management,(CAMP), 2010 International Conference on, pp. 200-203. IEEE, 2010.
47. Etaiwi, Wael, Arafat Awajan, and Dima Suleiman. "Statistical Arabic Name Entity Recognition Approaches: A Survey." Procedia
Computer Science 113 (2017): 57-64. 48. J. Han, and M. Kamber, “Data mining: concepts and techniques’” (2nd ed.). Morgan Kaufmann Publishers, 2006.
49. D. L. Olson, D. Delen, “Advanced Data Mining Techniques,” 2008.
50. Breiman, Leo. "Bagging predictors." Machine learning 24, no. 2 (1996): 123-140. 51. Bauer, Eric, and Ron Kohavi. "An empirical comparison of voting classification algorithms: Bagging, boosting, and variants." Machine
learning 36, no. 1-2 (1999): 105-139.
52. Dietterich, Thomas G. "Ensemble methods in machine learning." In International workshop on multiple classifier systems, pp. 1-15. Springer, Berlin, Heidelberg, 2000.
130.
Authors: P. Devika, V.Prashanthi, G.Vijay Kanth, J Thirupathi
Paper Title: RFID Based Theft Detection and Vehicle Monitoring System using Cloud
Abstract: The rapid advancement in technology has become important to deploy various technology boosters in
our daily life that fulfil our requirements by increasing security. Now a day’s thefts are making up their offence on
committed areas like banks, street robbery, commercial robbery, jewellery, public vehicles etc. Theft is not just
about losing property, sometimes, victims may get seriously injured. Generally when the vehicles get robbed, we
file compliant or search CC footages for identification which is time consuming and inaccurate. In this paper we
propose a system for theft detection and vehicle security. Our main aim is to implement IOT & RFID based theft
detection and vehicle monitoring system using cloud. The RFID tag is used for authentication and raspberry pi is
used as the micro controller .Whenever a vehicle theft takes place, the authorized person (owner) will receive a
mail including the picture of the vehicle from the information that is stored in cloud.
Keywords: street robbery, commercial robbery, jewellery, public vehicles
References: 1. Manish Buhptani, Shahram Moradpour, "RFID Field Guide - Developing Radio Frequency Identification Systems", Prentice Hall, 2005,
pp 7-9, 16-225, 160, 231
2. Intelligent Traffic Management system, CCTV Capable of generating E-challan for Indore city (RLVD System) 3. An Introduction to RFID Technology (Radio Frequency Identification ) Communications and Network, 2010, August, 2,
3Communications and Network
4. Raspberry Pi:credit card-sized single-board computer- http://www.plusdigit.com/2014/10/25/ raspberry-picredit-card-sized-single-board-computer/
5. RFID - http://ageqnies.com/html/rfid.html
6. RFID reader module with antenna - usb – uart- https://robokits.co.in/wireless-solutions/rfid/rfid - reader -module-with-antenna-usb-uart 7. “A Smart Information System for Counting People”, P. Devika, A. Manusha Reddy, G. Vijay Kanth, Chaitrali Dangare, Y. Indu and B.
Padmaja, Journal of Advanced Research in Dynamical and Control Systems, Issue 11, 2018.
8. “Exploring M-Learning Benefits for Higher School Education”, Chaitrali S. Dangare, B. Anand Kumar, A. Manusha Reddy, Y. Indu and B. Padmaja, , Journal of Advanced Research in Dynamical and Control Systems, Issue 11, 2018.
9. “Secure data communication using isecLEACH protocol in WSN’s”, M.Anitha, P. Devika, A. Manusha Reddy, G. Vijay Kanth, ISSN
1314-3395, IJPAM,2018. 10. V.Prashanthi, D.Suresh Babu, C.V.Guru Rao, Network Coding aware Routing for Efficient Communication in Mobile Ad-hoc Networks,
International Journal of Engineering & Technology(UAE), ISSN: 2227-524X. 7 (3) (2018) 1474-1481
737-739
131.
Authors: MSV. Prasad, G. Chaitanya Eswara Naidu, B. Sandya Sri
Paper Title: Assessing Investors’ Knowledge about Commodity Trading in India
Abstract: The study involves investors’ knowledge of the commodity market. Management brokerage services
can know whether investors understand the commodity market. Provide investors with further development advice
on organizational development and awareness rising. The goal is to study the level of knowledge, preferably
demographics and factors that influence commodity investment. This study uses a descriptive research project. Use
self-contained questionnaires to collect respondents' data. The questionnaire includes factors that affect investors in
the commodity market. In order to understand investors’ understanding of the commodity market, investors’
opinions were collected as the main data by conducting surveys of 500 individual respondents in Hyderabad. Other
740-748
data is collected from books, magazines, etc. Data compilation and analysis use statistical tools. Chi-square tests
and analysis of variance are also used to test hypotheses. Compared with other commodities, investment
preferences are oil, silver, copper and gold. The main factors affecting commodity investment are online software,
friends and brokerage services.
Keywords: brokerage services, hypotheses, factors affecting commodity investment
References: 1. Jena, Pratap Kumar and PhannidraGoyari. "Real Relationship Between Commodities, Stocks and Credit Cards in India: DCC Model
Analysis". IUP Journal of Applied Finance 22, no. 1 (2016): 37. 2. Capil, Sheba and Kanval Nyan Kapil. "Merchandise Trade Advisor (ctas) for the Indian Commodity Market." International Journal of the
Five (2010): 124-137.
3. Ftiti, Z., Kablan, S. &Guesmi, K. (2016). What can we learn about commodities and credit cycles? Evidence from African exporting countries. Energy Economics, 60, 313-324.
4. Han, L., Li, Z., & Yin, L. (2017). Impact of investor attention on future commodity markets. Newspapers on futures market.
5. Bring Bush (2017). Investor protection and information is an important pillar of agenda and post-crisis rule control - the way forward. Sector and economic outlook, 56 (1), 29-60.
6. Erb, c. B, and Harvey, CIM (2016). Misleading confusion about future investment in raw materials. Data from financial analyst 72 (4),
26-35. 7. Monga, O.P., Dawra, S., Monga, A. & Bansal, A.A.K. (2016). Investor Perspectives on Gold Investing: Some Reflections. International
Journal of Engineering Engineering Business and Enterprise (IJEBEA), 17 (1), 05-09
8. Periyasamy, S. (2016). Impact of investor information programs on potential investors on the Stock Exchange of India. International Journal of Research, Information, and Governance Research 6 (2), 21-23.
9. Chen, Y. & Chang, Y. K. (2015). Investor structure and information efficiency of future commodity prices. Review of International
Monetary Fund, 42, 358-367. 10. Mellios, C., Six, P. & Lai, A.N. (2016). Dynamic expectations and curbs of future commodity markets with stochastic comfort income.
European Data on Operational Data 250 (2): 493-504.
11. Iqbal, S., Hussain, N., Latif, M & Aslam, S. (2013). Types of Investors and Irregularities in Financial Markets: Comparisons of individual and foreign investors, and their role in decision-making in investment. Journal of Scientific Research 17 (11), 1591-1596.
132.
Authors: Sapna Kumari. C, K. V. Prasad
Paper Title: A Novel S-box Generation of AES using Elliptic Curve Cryptography (ECC)
Abstract: In recent decades, the security of the data is playing a major role in communication systems due to
more attackers between the channel media. The security level is depending on secret key, as per literature survey
of ECC guide, higher the bits size of the keys, higher the security [19]. Therefore the generation of key with large
size is the major challenging task. At present, Advanced Encryption Standard (AES) is a better cryptography
system where the encryption and decryption can be performed with fixed key size of 128bits, 192 bits and 256 bits.
The security level has been increased in AES due to the S-Box and it consists of 256 different values in the form of
16x16 matrixes, but to generate 256 values the Galois Field (GF) has been used. GF requires a lot of hardware
resources with more number of arithmetic operations like multiplication, additions and inversions [20-21]. To
overcome this issue, a novel S-Box generation using Elliptic Curve Cryptography (ECC )and BWMC methods are
proposed. The ECC uses point addition and point doubling to generate 256 values without multiplication
operations. After generation of the matrix, its values are encrypted and decrypted using bitwise matrix code
(BWMC). The proposed work has been designed using Verilog HDL, simulated and validated on Vertex-5 FPGA
development board. From the results obtained from novel S-Box and BWMC techniques there is an improvement
in terms of delay i.e. 73.1% as compared with hamming codes and 69% improvement in speed as compared with
MC’s[22].
Keywords: AES, BWMC, ECC, Point addition, point doubling, FPGA, Security system and S-Box.
References: 1. Arunkumar, Dr. S.S. Tyagi, ManishaRana, NehaAggarwal, PawanBhadana, ManavRachna (2011), A Comparative Study of Public Key
Cryptosystem based on ECC and RSA. International Journal on Computer Science and Engineering (IJCSE), ISSN : 0975-3397 Vol. 3
No. 5 May 2011, 1904-1909. 2. O. Srinivasa Rao (2010), Efficient Mapping Methods For Elliptic Curve Cryptosystems. International Journal of Engineering Science
and Technology, Vol. 2(8), 2010, ISSN: 0975-5462, 3651-3656
3. C. Wang, M. Daneshmand, M. Dohler, X. Mao, R. Q. Hu and H. Wang (2013), Guest Editorial - Special Issue on Internet of Things (IoT): Architecture, Protocols and Services”. IEEE Sensors Journal, vol. 13, issue. 10, pp. 3505–3510.
4. S. Raza, (2014) Secure communication for the Internet of Things - a comparison of link-layer security and IP sec for 6LoWPAN. Security
and Communication Networks, vol. 7, no. 12, pp. 2654–2668. 5. Gonzalez G. Organero M, Kloos C (2008). Early in infrastructure of all Internet of Things in space for learning. 8th IEEE International
Conference on Advance Learning Technologies, pp-381-383.
6. Yanbing Liu, Wenping Hu, Jiang Du (2011), Network Information Security Architecture Based on Internet of Things. ZTE Communication, Vol. 17(1):17-20
7. Riaz Naseer and Jeff Draper (2008), “Parallel Double Error Correcting Code Design to Mitigate Multi-Bit Upsets in SRAMs”. 978-1-
4244-2361-3/08, IEEE. 8. Juan Antonio Maestro, Pedro Reviriego, SanghyeonBaeg, Shijie Wen, Richard Wong (2013), Soft error tolerant Content Addressable
Memories (CAMs) using error detection code and duplication. Microprocessors and Microsystems 37 (2013) 1103–1107, 2013 Elsevier
B.V. http://dx.doi.org/10.1016/j.micpro.2013.10.003, 0141-9331. 9. Gustavo Neuberger, Fernanda Gusmao de lima, kastensmidt and Ricardo Reis (2005), An Automatic Technique for Optimizing Reed –
Solomon Codes to Improve Fault Tolerance in Memories. IEEE Co-published by the IEEE CS and the IEEE CASS IEEE Design & Test of
Computers, 0740-7475/05 10. Sanghyeon Baeg, Pedro Reviriego, Juan Antonio Maestro, Shijie and Richard Wong (2011), Analysis of a Multiple Cell Upset Failure
Model for Memories. ACM Transactions on Design Automation of Electronic Systems, Vol. 16, No. 4, Article 45, 1084-4309
11. Sandeep M D and Rajashekhargouda C. Patil (2016), An Approach to Reduce Number of Redundant Bits used To Overcome Cell Upsets in Memory using Decimal Matrix Code. International Journal of Science, Engineering and Technology Research (IJSETR), Volume 5,
Issue 5, 200-2010.
749-765
12. Costas Argyrides, StephaniaLoizidou and Dhiraj K. Pradhan (2008), Area Reliability Trade – Off in Improved Reed Muller Coding.
SAMOS 2008, LNCS 5114, 2008 Springer – Verlag Berlin Heidelber, pp. 116-125.
13. Bertozzi, D., Et Al (2005).: Error Control Schemes For On-Chip Communication Links: The Energy-Reliability Tradeoff. IEEE Transactions On Computer-Aided Design Of Integrated Circuits And Systems, Vol. 24, No. 6.
14. Rossi, D., Metra, C(2003): Error correcting strategy for high speed and density reliable flash memories. IEEE Journal. Electronic Testing,
Theory and applications, 19(5), 511–521.
15. Argyrides, C., Pradhan, D.K (2007): Improved Decoding Algorithm for High Reliable Reed Muller Coding. SAMOS 2008, LNCS 5114,
pp. 116–125, 2008, (Eds.): SAMOS 2008, LNCS 5114, pp. 116–125.
16. R.Balamurugan, V.Kamalakannan, S.Tamilselvan and D.RahulGandh, (2014) “Enhancing Security in Text Messages Using Matrix based Mapping and ElGamal Method in Elliptic Curve Cryptography”. International Conference on Contemporary Computing and Informatics
(IC3I 2014), pp 103-106.
17. Smyth N., McLoone M., McCanny J. V (2006). WLAN Security Processor. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, Vol. 53, Issue 7, ISSN: 1057-7122, pp: 1506- 1520.
18. Bae D., Kim G., Kim J., Park S., Song O (2005). An Efficient Design of CCMP for Robust SecurityNetwork. ICISC 2005, Lecture Notes
in Computer Science 3935, Springer-Berlin,2006, pp. 352-361. 19. Syed Mohsin Abbas (2014), "An Efficient Multiple Cell Upsets Tolerant Content-Addressable Memory", IEEE Transactions On
Computers, VOL. 63, NO. 8.
20. Fu Minfeng 92010), Elliptic Curve Cryptosystem EIGamal Encryption and Transmission Scheme. International Conference on Computer Application and System Modeling (ICCASM 2010), 978-1-4244-7237-6/10, IEEE, 2010.
133.
Authors: K. Martin Sagayam, D. Narain Ponraj, Jenkin Winston, Yaspy J C, Esther Jeba D, Antony Clara
Paper Title: Authentication of Biometric System using Fingerprint Recognition with Euclidean Distance and Neural
Network Classifier
Abstract: Nowadays, Fingerprint recognition is the one of the authentication used for security applications. It
provides hope for the society in reliable authentic biometric systems. Fingerprint technology emerges in various
sectors such as government, organizations, libraries, universities, banks etc. It is widely used for biometric systems
other than Iris, Face, Hand, Voice and Signature because of its uniqueness and distinctness. Traditional methods
are not effectively used for analyzing the texture feature of finger print than neural network classifier. Fingerprint
recognition will be identified and classified with the help of Euclidean distance and NN classifier for better
accuracy has proposed in this paper. It uses certain techniques in preprocessing the image such as Histogram
equalization and Fast Fourier transform. The performance of the proposed approach has significant result than the
existing techniques used in the finger print recognition system.
Keywords: Euclidean distance, Fingerprint recognition, NN classifier
References: 1. Ravi.J, K.B.Raja and Venugopal.K.R (2009). “Fingerprint Recognition using Minutia Score Matching”. International Journal of
Engineering Science and Technology.
2. NeerajBharagava, AnchalKumawat, RituBharagava (2015). “Fingerprint Matching of Normalized Image based on Euclidean Distance”. International Journal of computer Application .Volume 120-No 24.
3. Subba Reddy Borra, G.Jagadeeswar Reddy and E.SreenivasaReddy(2016). “An Efficient Fingerprint Enhancement Technique Using
Wave Atom Transform and MCS Algorithm”.Procedia Computer Science 89(2016) 785-793. 4. Anil K. Jain, JianjiangFeng, Karthik Nanda Kumar(2010). “Fingerprint Matching”.IEEE Computer Science.
5. Virginia Espinosa(2002). “Minutiae Detection Algorithm for Fingerprint Recognition”.IEEE AESS System Magazine.
6. Iwasokun Gabriel Babatunde, Alese Boniface Kayoed, AkinyokunOluwole Charles, OlabodeOlatubosun(2012). “Fingerprint Image Enhancement-Segmentation to Thinning”. (IJACSA) International Journal of Advanced Computer Science and Applications.
7. P.Gnanasivam, S. Muttan, “An efficient Algorithm for fingerprint preprocessing and feature extraction”, Science direct (2010)
8. Feng Zhao, Xiaoou Tang, “Preprocessing and post processing for skeleton-based fingerprint minutiae extraction”, Science direct (2007) 9. Khaled Ahmed Nagaty, “Fingerprints classification using artificial neural networks: a combined structural and statistical approach,
Elsevier (2001)
10. Chandana, “Fingerprint Recognition based on Minutiae Information”, International Journal of Computer Applications, Volume 120 – No.10, June 2015
11. Mouad.M.H.Ali, “Fingerprint Recognition for Person Identification and Verification Based on Minutiae Matching”, 2016 IEEE 6th
International Conference on Advanced Computing 12. Lu Jiang, Chaochao Bai, “A Direct Fingerprint Minutiae Extraction Approach Based on Convolutional Neural Networks”, IEEE 2016
13. D. Ezhilmaran , “A Review Study on Fingerprint Image Enhancement Techniques”, International Journal of Computer Science &
Engineering Technology, 2014 14. Morteza Zahedi, “Combining Gabor filter and FFT for fingerprint enhancement based on a regional adaption method and automatic
segmentation”, springer (2015)
15. Manhua Liu, “Latent Fingerprint Enhancement via Multi-Scale Patch Based Sparse Representation”, IEEE(2014) 16. Mikel Galar, Joaquín Derrac. “A survey of fingerprint classification Part II: Experimental analysis and ensemble proposal”,
Elsevier(2015)
17. Mikel Galar, Joaquín Derrac. “A survey of fingerprint classification Part I: Taxonomies on feature extraction methods and learning models”, Elsevier(2015)
18. Gabor A. Werner, “ Tuning an artificial neural network to increase the efficiency of a fingerprint matching algorithm”, IEEE(2016)
19. Asif Iqbal Khan, “Strategy to Extract Reliable Minutia Points for Fingerprint Recognition”, IEEE (2014) 20. Satishkumar Chavan, “Fingerprint Authentication using Gabor Filter based Matching Algorithm”, ICTSD (2015)
21. Atul S. CHAUDHARI,“Implementation of Minutiae Based Fingerprint Identification System Using Crossing Number Concept”,
Informatica Economica vol.18, no.1/2014 22. Puja S. Prasad, B. Sunitha Devi, “A Survey of Fingerprint Recognition Systems and Their Applications”,Springer nature Singapore pvt.
Limited, ICCCE, 2018
23. P. Pakutharivu, M. V. Srinath, “A Comprehensive Survey on Fingerprint Recognition Systems, Indian Journal of Science and Technology, 2015
749-765
134.
Authors: K. Martin Sagayam, D. Narain Ponraj, Jenkin Winston, Yaspy J C, Esther Jeba D, Antony Clara
Paper Title: Authentication of Biometric System using Fingerprint Recognition with Euclidean Distance and Neural
Network Classifier
Abstract: Nowadays, Fingerprint recognition is the one of the authentication used for security applications. It
provides hope for the society in reliable authentic biometric systems. Fingerprint technology emerges in various 749-765
sectors such as government, organizations, libraries, universities, banks etc. It is widely used for biometric systems
other than Iris, Face, Hand, Voice and Signature because of its uniqueness and distinctness. Traditional methods
are not effectively used for analyzing the texture feature of finger print than neural network classifier. Fingerprint
recognition will be identified and classified with the help of Euclidean distance and NN classifier for better
accuracy has proposed in this paper. It uses certain techniques in preprocessing the image such as Histogram
equalization and Fast Fourier transform. The performance of the proposed approach has significant result than the
existing techniques used in the finger print recognition system.
Keywords: Euclidean distance, Fingerprint recognition, NN classifier
References: 24. Ravi.J, K.B.Raja and Venugopal.K.R (2009). “Fingerprint Recognition using Minutia Score Matching”. International Journal of
Engineering Science and Technology.
25. NeerajBharagava, AnchalKumawat, RituBharagava (2015). “Fingerprint Matching of Normalized Image based on Euclidean Distance”.
International Journal of computer Application .Volume 120-No 24. 26. Subba Reddy Borra, G.Jagadeeswar Reddy and E.SreenivasaReddy(2016). “An Efficient Fingerprint Enhancement Technique Using
Wave Atom Transform and MCS Algorithm”.Procedia Computer Science 89(2016) 785-793.
27. Anil K. Jain, JianjiangFeng, Karthik Nanda Kumar(2010). “Fingerprint Matching”.IEEE Computer Science. 28. Virginia Espinosa(2002). “Minutiae Detection Algorithm for Fingerprint Recognition”.IEEE AESS System Magazine.
29. Iwasokun Gabriel Babatunde, Alese Boniface Kayoed, AkinyokunOluwole Charles, OlabodeOlatubosun(2012). “Fingerprint Image
Enhancement-Segmentation to Thinning”. (IJACSA) International Journal of Advanced Computer Science and Applications. 30. P.Gnanasivam, S. Muttan, “An efficient Algorithm for fingerprint preprocessing and feature extraction”, Science direct (2010)
31. Feng Zhao, Xiaoou Tang, “Preprocessing and post processing for skeleton-based fingerprint minutiae extraction”, Science direct (2007) 32. Khaled Ahmed Nagaty, “Fingerprints classification using artificial neural networks: a combined structural and statistical approach,
Elsevier (2001)
33. Chandana, “Fingerprint Recognition based on Minutiae Information”, International Journal of Computer Applications, Volume 120 – No.10, June 2015
34. Mouad.M.H.Ali, “Fingerprint Recognition for Person Identification and Verification Based on Minutiae Matching”, 2016 IEEE 6th
International Conference on Advanced Computing 35. Lu Jiang, Chaochao Bai, “A Direct Fingerprint Minutiae Extraction Approach Based on Convolutional Neural Networks”, IEEE 2016
36. D. Ezhilmaran , “A Review Study on Fingerprint Image Enhancement Techniques”, International Journal of Computer Science &
Engineering Technology, 2014 37. Morteza Zahedi, “Combining Gabor filter and FFT for fingerprint enhancement based on a regional adaption method and automatic
segmentation”, springer (2015)
38. Manhua Liu, “Latent Fingerprint Enhancement via Multi-Scale Patch Based Sparse Representation”, IEEE(2014) 39. Mikel Galar, Joaquín Derrac. “A survey of fingerprint classification Part II: Experimental analysis and ensemble proposal”,
Elsevier(2015)
40. Mikel Galar, Joaquín Derrac. “A survey of fingerprint classification Part I: Taxonomies on feature extraction methods and learning models”, Elsevier(2015)
41. Gabor A. Werner, “ Tuning an artificial neural network to increase the efficiency of a fingerprint matching algorithm”, IEEE(2016)
42. Asif Iqbal Khan, “Strategy to Extract Reliable Minutia Points for Fingerprint Recognition”, IEEE (2014)
43. Satishkumar Chavan, “Fingerprint Authentication using Gabor Filter based Matching Algorithm”, ICTSD (2015)
44. Atul S. CHAUDHARI,“Implementation of Minutiae Based Fingerprint Identification System Using Crossing Number Concept”,
Informatica Economica vol.18, no.1/2014 45. Puja S. Prasad, B. Sunitha Devi, “A Survey of Fingerprint Recognition Systems and Their Applications”,Springer nature Singapore pvt.
Limited, ICCCE, 2018
46. P. Pakutharivu, M. V. Srinath, “A Comprehensive Survey on Fingerprint Recognition Systems, Indian Journal of Science and Technology, 2015