Abstarct_Book_IJEAT_v3i4_April 2014.pdf - International ...

57
International Journal of Engineering and Advanced Technology International Journal of Engineering and Advanced Technology International Journal of Engineering and Advanced Technology International Journal of Engineering and Advanced Technology ISSN : 2249 - 8958 Website: www.ijeat.org e d c T e n c a h v n d o A l o d g n y a g n i r e e n i I n g t n e E r n f a o l ti o a n n r a u o J l IJEat IJEat Exploring Innovation www.ijeat.org E X P L O R I N G I N N O V A T ION Volume-3 Issue-4, April 2014 Volume-3 Issue-4, April 2014 Published by: Blue Eyes Intelligence Engineering and Sciences Publication Pvt. Ltd. Published by: Blue Eyes Intelligence Engineering and Sciences Publication Pvt. Ltd.

Transcript of Abstarct_Book_IJEAT_v3i4_April 2014.pdf - International ...

International Journal of Engineering and Advanced Technology

International Journal of Engineering and Advanced Technology

International Journal of Engineering and Advanced Technology

International Journal of Engineering and Advanced Technology

ISSN : 2249 - 8958Website: www.ijeat.org

edc Ten ca hv nd oA l od gn ya g

nire

eni Ing tn eE r nf ao l tioan nr auoJ l

IJEatIJEat

Exploring Innovation

www.ijeat.org

EXPLORING INNOVA

TION

Volume-3 Issue-4, April 2014Volume-3 Issue-4, April 2014

Published by: Blue Eyes Intelligence Engineering and Sciences Publication Pvt. Ltd.

Published by: Blue Eyes Intelligence Engineering and Sciences Publication Pvt. Ltd.

Editor In Chief

Dr. Shiv K Sahu

Ph.D. (CSE), M.Tech. (IT, Honors), B.Tech. (IT)

Director, Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd., Bhopal (M.P.), India

Dr. Shachi Sahu

Ph.D. (Chemistry), M.Sc. (Organic Chemistry)

Additional Director, Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd., Bhopal (M.P.), India

Vice Editor In Chief

Dr. Vahid Nourani

Professor, Faculty of Civil Engineering, University of Tabriz, Iran

Prof.(Dr.) Anuranjan Misra

Professor & Head, Computer Science & Engineering and Information Technology & Engineering, Noida International University,

Noida (U.P.), India

Chief Advisory Board

Prof. (Dr.) Hamid Saremi

Vice Chancellor of Islamic Azad University of Iran, Quchan Branch, Quchan-Iran

Dr. Uma Shanker

Professor & Head, Department of Mathematics, CEC, Bilaspur(C.G.), India

Dr. Rama Shanker

Professor & Head, Department of Statistics, Eritrea Institute of Technology, Asmara, Eritrea

Dr. Vinita Kumari

Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd., India

Dr. Kapil Kumar Bansal

Head (Research and Publication), SRM University, Gaziabad (U.P.), India

Dr. Deepak Garg

Professor, Department of Computer Science and Engineering, Thapar University, Patiala (Punjab), India, Senior Member of IEEE,

Secretary of IEEE Computer Society (Delhi Section), Life Member of Computer Society of India (CSI), Indian Society of Technical

Education (ISTE), Indian Science Congress Association Kolkata.

Dr. Vijay Anant Athavale

Director of SVS Group of Institutions, Mawana, Meerut (U.P.) India/ U.P. Technical University, India

Dr. T.C. Manjunath

Principal & Professor, HKBK College of Engg, Nagawara, Arabic College Road, Bengaluru-560045, Karnataka, India

Dr. Kosta Yogeshwar Prasad

Director, Technical Campus, Marwadi Education Foundation’s Group of Institutions, Rajkot-Morbi Highway, Gauridad, Rajkot,

Gujarat, India

Dr. Dinesh Varshney

Director of College Development Counceling, Devi Ahilya University, Indore (M.P.), Professor, School of Physics, Devi Ahilya

University, Indore (M.P.), and Regional Director, Madhya Pradesh Bhoj (Open) University, Indore (M.P.), India

Dr. P. Dananjayan

Professor, Department of Department of ECE, Pondicherry Engineering College, Pondicherry,India

Dr. Sadhana Vishwakarma

Associate Professor, Department of Engineering Chemistry, Technocrat Institute of Technology, Bhopal(M.P.), India

Dr. Kamal Mehta

Associate Professor, Deptment of Computer Engineering, Institute of Technology, NIRMA University, Ahmedabad (Gujarat), India

Dr. CheeFai Tan

Faculty of Mechanical Engineering, University Technical, Malaysia Melaka, Malaysia

Dr. Suresh Babu Perli

Professor & Head, Department of Electrical and Electronic Engineering, Narasaraopeta Engineering College, Guntur, A.P., India

Dr. Binod Kumar

Associate Professor, Schhool of Engineering and Computer Technology, Faculty of Integrative Sciences and Technology, Quest

International University, Ipoh, Perak, Malaysia

Dr. Chiladze George

Professor, Faculty of Law, Akhaltsikhe State University, Tbilisi University, Georgia

Dr. Kavita Khare

Professor, Department of Electronics & Communication Engineering., MANIT, Bhopal (M.P.), INDIA

Dr. C. Saravanan

Associate Professor (System Manager) & Head, Computer Center, NIT, Durgapur, W.B. India

Dr. S. Saravanan

Professor, Department of Electrical and Electronics Engineering, Muthayamal Engineering College, Resipuram, Tamilnadu, India

Dr. Amit Kumar Garg

Professor & Head, Department of Electronics and Communication Engineering, Maharishi Markandeshwar University, Mulllana,

Ambala (Haryana), India

Dr. T.C.Manjunath

Principal & Professor, HKBK College of Engg, Nagawara, Arabic College Road, Bengaluru-560045, Karnataka, India

Dr. P. Dananjayan

Professor, Department of Department of ECE, Pondicherry Engineering College, Pondicherry, India

Dr. Kamal K Mehta

Associate Professor, Department of Computer Engineering, Institute of Technology, NIRMA University, Ahmedabad (Gujarat), India

Dr. Rajiv Srivastava

Director, Department of Computer Science & Engineering, Sagar Institute of Research & Technology, Bhopal (M.P.), India

Dr. Chakunta Venkata Guru Rao

Professor, Department of Computer Science & Engineering, SR Engineering College, Ananthasagar, Warangal, Andhra Pradesh, India

Dr. Anuranjan Misra

Professor, Department of Computer Science & Engineering, Bhagwant Institute of Technology, NH-24, Jindal Nagar, Ghaziabad,

India

Dr. Robert Brian Smith

International Development Assistance Consultant, Department of AEC Consultants Pty Ltd, AEC Consultants Pty Ltd, Macquarie

Centre, North Ryde, New South Wales, Australia

Dr. Saber Mohamed Abd-Allah

Associate Professor, Department of Biochemistry, Shanghai Institute of Biochemistry and Cell Biology, Yue Yang Road, Shanghai,

China

Dr. Himani Sharma

Professor & Dean, Department of Electronics & Communication Engineering, MLR Institute of Technology, Laxman Reddy Avenue,

Dundigal, Hyderabad, India

Dr. Sahab Singh

Associate Professor, Department of Management Studies, Dronacharya Group of Institutions, Knowledge Park-III, Greater Noida,

India

Dr. Umesh Kumar

Principal: Govt Women Poly, Ranchi, India

Dr. Syed Zaheer Hasan

Scientist-G Petroleum Research Wing, Gujarat Energy Research and Management Institute, Energy Building, Pandit Deendayal

Petroleum University Campus, Raisan, Gandhinagar-382007, Gujarat, India.

Dr. Jaswant Singh Bhomrah

Director, Department of Profit Oriented Technique, 1 – B Crystal Gold, Vijalpore Road, Navsari 396445, Gujarat. India

Technical Advisory Board

Dr. Mohd. Husain

Director. MG Institute of Management & Technology, Banthara, Lucknow (U.P.), India

Dr. T. Jayanthy

Principal. Panimalar Institute of Technology, Chennai (TN), India

Dr. Umesh A.S.

Director, Technocrats Institute of Technology & Science, Bhopal(M.P.), India

Dr. B. Kanagasabapathi

Infosys Labs, Infosys Limited, Center for Advance Modeling and Simulation, Infosys Labs, Infosys Limited, Electronics City,

Bangalore, India

Dr. C.B. Gupta

Professor, Department of Mathematics, Birla Institute of Technology & Sciences, Pilani (Rajasthan), India

Dr. Sunandan Bhunia

Associate Professor & Head,, Dept. of Electronics & Communication Engineering, Haldia Institute of Technology, Haldia, West

Bengal, India

Dr. Jaydeb Bhaumik

Associate Professor, Dept. of Electronics & Communication Engineering, Haldia Institute of Technology, Haldia, West Bengal, India

Dr. Rajesh Das

Associate Professor, School of Applied Sciences, Haldia Institute of Technology, Haldia, West Bengal, India

Dr. Mrutyunjaya Panda

Professor & Head, Department of EEE, Gandhi Institute for Technological Development, Bhubaneswar, Odisha, India

Dr. Mohd. Nazri Ismail

Associate Professor, Department of System and Networking, University of Kuala (UniKL), Kuala Lumpur, Malaysia

Dr. Haw Su Cheng

Faculty of Information Technology, Multimedia University (MMU), Jalan Multimedia, 63100 Cyberjaya

Dr. Hossein Rajabalipour Cheshmehgaz

Industrial Modeling and Computing Department, Faculty of Computer Science and Information Systems, Universiti Teknologi

Malaysia (UTM) 81310, Skudai, Malaysia

Dr. Sudhinder Singh Chowhan

Associate Professor, Institute of Management and Computer Science, NIMS University, Jaipur (Rajasthan), India

Dr. Neeta Sharma

Professor & Head, Department of Communication Skils, Technocrat Institute of Technology, Bhopal(M.P.), India

Dr. Ashish Rastogi

Associate Professor, Department of CSIT, Guru Ghansi Das University, Bilaspur (C.G.), India

Dr. Santosh Kumar Nanda

Professor, Department of Computer Science and Engineering, Eastern Academy of Science and Technology (EAST), Khurda (Orisa),

India

Dr. Hai Shanker Hota

Associate Professor, Department of CSIT, Guru Ghansi Das University, Bilaspur (C.G.), India

Dr. Sunil Kumar Singla

Professor, Department of Electrical and Instrumentation Engineering, Thapar University, Patiala (Punjab), India

Dr. A. K. Verma

Professor, Department of Computer Science and Engineering, Thapar University, Patiala (Punjab), India

Dr. Durgesh Mishra

Chairman, IEEE Computer Society Chapter Bombay Section, Chairman IEEE MP Subsection, Professor & Dean (R&D), Acropolis

Institute of Technology, Indore (M.P.), India

Dr. Xiaoguang Yue

Associate Professor, College of Computer and Information, Southwest Forestry University, Kunming (Yunnan), China

Dr. Veronica Mc Gowan

Associate Professor, Department of Computer and Business Information Systems,Delaware Valley College, Doylestown, PA, Allman

China

Dr. Mohd. Ali Hussain

Professor, Department of Computer Science and Engineering, Sri Sai Madhavi Institute of Science & Technology, Rajahmundry

(A.P.), India

Dr. Mohd. Nazri Ismail

Professor, System and Networking Department, Jalan Sultan Ismail, Kaula Lumpur, MALAYSIA

Dr. Sunil Mishra

Associate Professor, Department of Communication Skills (English), Dronacharya College of Engineering, Farrukhnagar, Gurgaon

(Haryana), India

Dr. Labib Francis Gergis Rofaiel

Associate Professor, Department of Digital Communications and Electronics, Misr Academy for Engineering and Technology,

Mansoura City, Egypt

Dr. Pavol Tanuska

Associate Professor, Department of Applied Informetics, Automation, and Mathematics, Trnava, Slovakia

Dr. VS Giridhar Akula

Professor, Avanthi's Research & Technological Academy, Gunthapally, Hyderabad, Andhra Pradesh, India

Dr. S. Satyanarayana

Associate Professor, Department of Computer Science and Engineering, KL University, Guntur, Andhra Pradesh, India

Dr. Bhupendra Kumar Sharma

Associate Professor, Department of Mathematics, KL University, BITS, Pilani, India

Dr. Praveen Agarwal

Associate Professor & Head, Department of Mathematics, Anand International College of Engineering, Jaipur (Rajasthan), India

Dr. Manoj Kumar

Professor, Department of Mathematics, Rashtriya Kishan Post Graduate Degree, College, Shamli, Prabudh Nagar, (U.P.), India

Dr. Shaikh Abdul Hannan

Associate Professor, Department of Computer Science, Vivekanand Arts Sardar Dalipsing Arts and Science College, Aurangabad

(Maharashtra), India

Dr. K.M. Pandey

Professor, Department of Mechanical Engineering,National Institute of Technology, Silchar, India

Prof. Pranav Parashar

Technical Advisor, International Journal of Soft Computing and Engineering (IJSCE), Bhopal (M.P.), India

Dr. Biswajit Chakraborty

MECON Limited, Research and Development Division (A Govt. of India Enterprise), Ranchi-834002, Jharkhand, India

Dr. D.V. Ashoka

Professor & Head, Department of Information Science & Engineering, SJB Institute of Technology, Kengeri, Bangalore, India

Dr. Sasidhar Babu Suvanam

Professor & Academic Cordinator, Department of Computer Science & Engineering, Sree Narayana Gurukulam College of

Engineering, Kadayiuruppu, Kolenchery, Kerala, India

Dr. C. Venkatesh

Professor & Dean, Faculty of Engineering, EBET Group of Institutions, Kangayam, Erode, Caimbatore (Tamil Nadu), India

Dr. Nilay Khare

Assoc. Professor & Head, Department of Computer Science, MANIT, Bhopal (M.P.), India

Dr. Sandra De Iaco

Professor, Dip.to Di Scienze Dell’Economia-Sez. Matematico-Statistica, Italy

Dr. Yaduvir Singh

Associate Professor, Department of Computer Science & Engineering, Ideal Institute of Technology, Govindpuram Ghaziabad,

Lucknow (U.P.), India

Dr. Angela Amphawan

Head of Optical Technology, School of Computing, School Of Computing, Universiti Utara Malaysia, 06010 Sintok, Kedah, Malaysia

Dr. Ashwini Kumar Arya

Associate Professor, Department of Electronics & Communication Engineering, Faculty of Engineering and Technology,Graphic Era

University, Dehradun (U.K.), India

Dr. Yash Pal Singh

Professor, Department of Electronics & Communication Engg, Director, KLS Institute Of Engg.& Technology, Director, KLSIET,

Chandok, Bijnor, (U.P.), India

Dr. Ashish Jain

Associate Professor, Department of Computer Science & Engineering, Accurate Institute of Management & Technology, Gr. Noida

(U.P.), India

Dr. Abhay Saxena

Associate Professor&Head, Department. of Computer Science, Dev Sanskriti University, Haridwar, Uttrakhand, India

Dr. Judy. M.V

Associate Professor, Head of the Department CS &IT, Amrita School of Arts and Sciences, Amrita Vishwa Vidyapeetham,

Brahmasthanam, Edapally, Cochin, Kerala, India

Dr. Sangkyun Kim

Professor, Department of Industrial Engineering, Kangwon National University, Hyoja 2 dong, Chunche0nsi, Gangwondo, Korea

Dr. Sanjay M. Gulhane

Professor, Department of Electronics & Telecommunication Engineering, Jawaharlal Darda Institute of Engineering & Technology,

Yavatmal, Maharastra, India

Dr. K.K. Thyagharajan

Principal & Professor, Department of Informational Technology, RMK College of Engineering & Technology, RSM Nagar,

Thiruyallur, Tamil Nadu, India

Dr. P. Subashini

Asso. Professor, Department of Computer Science, Coimbatore, India

Dr. G. Srinivasrao

Professor, Department of Mechanical Engineering, RVR & JC, College of Engineering, Chowdavaram, Guntur, India

Dr. Rajesh Verma

Professor, Department of Computer Science & Engg. and Deptt. of Information Technology, Kurukshetra Institute of Technology &

Management, Bhor Sadian, Pehowa, Kurukshetra (Haryana), India

Dr. Pawan Kumar Shukla

Associate Professor, Satya College of Engineering & Technology, Haryana, India

Dr. U C Srivastava

Associate Professor, Department of Applied Physics, Amity Institute of Applied Sciences, Amity University, Noida, India

Dr. Reena Dadhich

Prof. & Head, Department of Computer Science and Informatics, MBS MArg, Near Kabir Circle, University of Kota, Rajasthan, India

Dr. Aashis.S.Roy

Department of Materials Engineering, Indian Institute of Science, Bangalore Karnataka, India

Dr. Sudhir Nigam

Professor Department of Civil Engineering, Principal, Lakshmi Narain College of Technology and Science, Raisen, Road, Bhopal,

(M.P.), India

Dr. S.Senthilkumar

Doctorate, Department of Center for Advanced Image and Information Technology, Division of Computer Science and Engineering,

Graduate School of Electronics and Information Engineering, Chon Buk National University Deok Jin-Dong, Jeonju, Chon Buk, 561-

756, South Korea Tamilnadu, India

Dr. Gufran Ahmad Ansari

Associate Professor, Department of Information Technology, College of Computer, Qassim University, Al-Qassim, Kingdom of

Saudi Arabia (KSA)

Dr. R.Navaneethakrishnan

Associate Professor, Department of MCA, Bharathiyar College of Engg & Tech, Karaikal Puducherry, India

Dr. Hossein Rajabalipour Cheshmejgaz

Industrial Modeling and Computing Department, Faculty of Computer Science and Information Systems, Universiti Teknologi Skudai,

Malaysia

Dr. Veronica McGowan

Associate Professor, Department of Computer and Business Information Systems, Delaware Valley College, Doylestown, PA, Allman

China

Dr. Sanjay Sharma

Associate Professor, Department of Mathematics, Bhilai Institute of Technology, Durg, Chhattisgarh, India

Dr. Taghreed Hashim Al-Noor

Professor, Department of Chemistry, Ibn-Al-Haitham Education for pure Science College, University of Baghdad, Iraq

Dr. Madhumita Dash

Professor, Department of Electronics & Telecommunication, Orissa Engineering College , Bhubaneswar,Odisha, India

Dr. Anita Sagadevan Ethiraj

Associate Professor, Department of Centre for Nanotechnology Research (CNR), School of Electronics Engineering (Sense), Vellore

Institute of Technology (VIT) University, Tamilnadu, India

Dr. Sibasis Acharya

Project Consultant, Department of Metallurgy & Mineral Processing, Midas Tech International, 30 Mukin Street, Jindalee-4074,

Queensland, Australia

Dr. Neelam Ruhil

Professor, Department of Electronics & Computer Engineering, Dronacharya College of Engineering, Gurgaon, Haryana, India

Dr. Faizullah Mahar

Professor, Department of Electrical Engineering, Balochistan University of Engineering and Technology, Pakistan

Dr. K. Selvaraju

Head, PG & Research, Department of Physics, Kandaswami Kandars College (Govt. Aided), Velur (PO), Namakkal DT. Tamil Nadu,

India

Dr. M. K. Bhanarkar

Associate Professor, Department of Electronics, Shivaji University, Kolhapur, Maharashtra, India

Dr. Sanjay Hari Sawant

Professor, Department of Mechanical Engineering, Dr. J. J. Magdum College of Engineering, Jaysingpur, India

Dr. Arindam Ghosal

Professor, Department of Mechanical Engineering, Dronacharya Group of Institutions, B-27, Part-III, Knowledge Park,Greater Noida,

India

Dr. M. Chithirai Pon Selvan

Associate Professor, Department of Mechanical Engineering, School of Engineering & Information Technology, Amity University,

Dubai, UAE

Dr. S. Sambhu Prasad

Professor & Principal, Department of Mechanical Engineering, Pragati College of Engineering, Andhra Pradesh, India.

Dr. Muhammad Attique Khan Shahid

Professor of Physics & Chairman, Department of Physics, Advisor (SAAP) at Government Post Graduate College of Science,

Faisalabad.

Dr. Kuldeep Pareta

Professor & Head, Department of Remote Sensing/GIS & NRM, B-30 Kailash Colony, New Delhi 110 048, India

Dr. Th. Kiranbala Devi

Associate Professor, Department of Civil Engineering, Manipur Institute of Technology, Takyelpat, Imphal, Manipur, India

Dr. Nirmala Mungamuru

Associate Professor, Department of Computing, School of Engineering, Adama Science and Technology University, Ethiopia

Dr. Srilalitha Girija Kumari Sagi

Associate Professor, Department of Management, Gandhi Institute of Technology and Management, India

Dr. Vishnu Narayan Mishra

Associate Professor, Department of Mathematics, Sardar Vallabhbhai National Institute of Technology, Ichchhanath Mahadev Dumas

Road, Surat (Gujarat), India

Dr. Yash Pal Singh

Director/Principal, Somany (P.G.) Institute of Technology & Management, Garhi Bolni Road , Rewari Haryana, India.

Dr. Sripada Rama Sree

Vice Principal, Associate Professor, Department of Computer Science and Engineering, Aditya Engineering College, Surampalem,

Andhra Pradesh. India.

Dr. Rustom Mamlook

Associate Professor, Department of Electrical and Computer Engineering, Dhofar University, Salalah, Oman. Middle East.

Dr. Ramzi Raphael Ibraheem Al Barwari

Assistant Professor, Department of Mechanical Engineering, College of Engineering, Salahaddin University – Hawler (SUH) Erbil –

Kurdistan, Erbil Iraq.

Dr. Kapil Chandra Agarwal

H.O.D. & Professor, Department of Applied Sciences & Humanities, Radha Govind Engineering College, U. P. Technical University,

Jai Bheem Nagar, Meerut, (U.P). India.

Dr. Anil Kumar Tripathy

Associate Professor, Department of Environmental Science & Engineering, Ghanashyama Hemalata Institute of Technology and

Management, Puri Odisha, India.

Managing Editor

Mr. Jitendra Kumar Sen

International Journal of Engineering and Advanced Technology (IJEAT)

Editorial Board

Dr. Soni Changlani

Professor, Department of Electronics & Communication, Lakshmi Narain College of Technology & Science, Bhopal (.M.P.), India

Dr. M .M. Manyuchi

Professor, Department Chemical and Process Systems Engineering, Lecturer-Harare Institute of Technology, Zimbabwe

Dr. John Kaiser S. Calautit

Professor, Department Civil Engineering, School of Civil Engineering, University of Leeds, LS2 9JT, Leeds, United Kingdom

Dr. Audai Hussein Al-Abbas

Deputy Head, Department AL-Musaib Technical College/ Foundation of Technical Education/Babylon, Iraq

Dr. Şeref Doğuşcan Akbaş

Professor, Department Civil Engineering, Şehit Muhtar Mah. Öğüt Sok. No:2/37 Beyoğlu Istanbul, Turkey

Dr. H S Behera

Associate Professor, Department Computer Science & Engineering, Veer Surendra Sai University of Technology (VSSUT) A Unitary

Technical University Established by the Government of Odisha, India

Dr. Rajeev Tiwari

Associate Professor, Department Computer Science & Engineering, University of Petroleum & Energy Studies (UPES), Bidholi,

Uttrakhand, India

Dr. Piyush Kumar Shukla

Assoc. Professor, Department of Computer Science and Engineering, University Institute of Technology, RGPV, Bhopal (M.P.), India

Dr. Piyush Lotia

Assoc.Professor, Department of Electronics and Instrumentation, Shankaracharya College of Engineering and Technology, Bhilai

(C.G.), India

Dr. Asha Rai

Assoc. Professor, Department of Communication Skils, Technocrat Institute of Technology, Bhopal (M.P.), India

Dr. Vahid Nourani

Assoc. Professor, Department of Civil Engineering, University of Minnesota, USA

Dr. Hung-Wei Wu

Assoc. Professor, Department of Computer and Communication, Kun Shan University, Taiwan

Dr. Vuda Sreenivasarao

Associate Professor, Department of Computr And Information Technology, Defence University College, Debrezeit Ethiopia, India

Dr. Sanjay Bhargava

Assoc. Professor, Department of Computer Science, Banasthali University, Jaipur, India

Dr. Sanjoy Deb

Assoc. Professor, Department of ECE, BIT Sathy, Sathyamangalam, Tamilnadu, India

Dr. Papita Das (Saha)

Assoc. Professor, Department of Biotechnology, National Institute of Technology, Duragpur, India

Dr. Waail Mahmod Lafta Al-waely

Assoc. Professor, Department of Mechatronics Engineering, Al-Mustafa University College – Plastain Street near AL-SAAKKRA

square- Baghdad - Iraq

Dr. P. P. Satya Paul Kumar

Assoc. Professor, Department of Physical Education & Sports Sciences, University College of Physical Education & Sports Sciences,

Guntur

Dr. Sohrab Mirsaeidi

Associate Professor, Department of Electrical Engineering, Universiti Teknologi Malaysia (UTM), Skudai, Johor, Malaysia

Dr. Ehsan Noroozinejad Farsangi

Associate Professor, Department of Civil Engineering, International Institute of Earthquake Engineering and Seismology (IIEES)

Farmanieh, Tehran - Iran

Dr. Omed Ghareb Abdullah

Associate Professor, Department of Physics, School of Science, University of Sulaimani, Iraq

Dr. Khaled Eskaf

Associate Professor, Department of Computer Engineering, College of Computing and Information Technology, Alexandria, Egypt

Dr. Nitin W. Ingole

Associate Professor & Head, Department of Civil Engineering, Prof Ram Meghe Institute of Technology and Research, Badnera

Amravati

Dr. P. K. Gupta

Associate Professor, Department of Computer Science and Engineering, Jaypee University of Information Technology, P.O. Dumehar

Bani, Solan, India

Dr. P.Ganesh Kumar

Associate Professor, Department of Electronics & Communication, Sri Krishna College of Engineering and Technology, Linyi Top

Network Co Ltd Linyi , Shandong Provience, China

Dr. Santhosh K V

Associate Professor, Department of Instrumentation and Control Engineering, Manipal Institute of Technology, Manipal, Karnataka,

India

Dr. Subhendu Kumar Pani

Assoc. Professor, Department of Computer Science and Engineering, Orissa Engineering College, India

Dr. Syed Asif Ali

Professor/ Chairman, Department of Computer Science, SMI University, Karachi, Pakistan

Dr. Vilas Warudkar

Assoc. Professor, Department of Mechanical Engineering, Maulana Azad National Institute of Technology, Bhopal, India

Dr. S. Chandra Mohan Reddy

Associate Professor & Head, Department of Electronics & Communication Engineering, JNTUA College of Engineering

(Autonomous), Cuddapah, Andhra Pradesh, India

Dr. V. Chittaranjan Das

Associate Professor, Department of Mechanical Engineering, R.V.R. & J.C. College of Engineering, Guntur, Andhra Pradesh, India

Dr. Jamal Fathi Abu Hasna

Associate Professor, Department of Electrical & Electronics and Computer Engineering, Near East University, TRNC, Turkey

Dr. S. Deivanayaki

Associate Professor, Department of Physics, Sri Ramakrishna Engineering College, Tamil Nadu, India

Dr. Nirvesh S. Mehta

Professor, Department of Mechanical Engineering, Sardar Vallabhbhai National Institute of Technology, Surat, South Gujarat, India

Dr. A.Vijaya Bhasakar Reddy

Associate Professor, Research Scientist, Department of Chemistry, Sri Venkateswara University, Andhra Pradesh, India

Dr. C. Jaya Subba Reddy

Associate Professor, Department of Mathematics, Sri Venkateswara University Tirupathi Andhra Pradesh, India

Dr. TOFAN Cezarina Adina

Associate Professor, Department of Sciences Engineering, Spiru Haret University, Arges, Romania

Dr. Balbir Singh

Associate Professor, Department of Health Studies, Human Development Area, Administrative Staff College of India, Bella Vista,

Andhra Pradesh, India

Dr. D. RAJU

Associate Professor, Department of Mathematics, Vidya Jyothi Institute of Technology (VJIT), Aziz Nagar Gate, Hyderabad, India

Dr. Salim Y. Amdani

Associate Professor & Head, Department of Computer Science Engineering, B. N. College of Engineering, PUSAD, (M.S.), India

Dr. K. Kiran Kumar

Associate Professor, Department of Information Technology, Bapatla Engineering College, Andhra Pradesh, India

Dr. Md. Abdullah Al Humayun

Associate Professor, Department of Electrical Systems Engineering, University Malaysia Perlis, Malaysia

Dr. Vellore Vasu

Teaching Assistant, Department of Mathematics, S.V.University Tirupati, Andhra Pradesh, India

Dr. Naveen K. Mehta

Associate Professor & Head, Department of Communication Skills, Mahakal Institute of Technology, Ujjain, India

Dr. Gujar Anant kumar Jotiram

Associate Professor, Department of Mechanical Engineering, Ashokrao Mane Group of Institutions, Vathar, Maharashtra, India

Dr. Pratibhamoy Das

Scientist, Department of Mathematics, IMU Berlin Einstein Foundation Fellow Technical University of Berlin, Germany

Dr. Messaouda AZZOUZI

Associate Professor, Department of Sciences & Technology, University of Djelfa, Algeria

Dr. Vandana Swarnkar

Associate Professor, Department of Chemistry, Jiwaji University Gwalior, India

Dr. Arvind K. Sharma

Associate Professor, Department of Computer Science Engineering, University of Kota, Kabir Circle, Rajasthan, India

Dr. R. Balu

Associate Professor, Department of Computr Applications, Bharathiar University, Tamilnadu, India

Dr. S. Suriyanarayanan

Associate Professor, Department of Water and Health, Jagadguru Sri Shivarathreeswara University, Karnataka, India

Dr. Dinesh Kumar

Associate Professor, Department of Mathematics, Pratap University, Jaipur, Rajasthan, India

Dr. Sandeep N

Associate Professor, Department of Mathematics, Vellore Institute of Technology, Tamil Nadu, India

Dr. Dharmpal Singh

Associate Professor, Department of Computer Science Engineering, JIS College of Engineering, West Bengal, India

Dr. Farshad Zahedi

Associate Professor, Department of Mechanical Engineering, University of Texas at Arlington, Tehran, Iran

Dr. Atishey Mittal

Associate Professor, Department of Mechanical Engineering, SRM University NCR Campus Meerut Delhi Road Modinagar, Aligarh,

India

Dr. Hussein Togun

Associate Professor, Department of Mechanical Engineering, University of Thiqar, Iraq

Dr. Shrikaant Kulkarni

Associate Professor, Department of Senior faculty V.I.T., Pune (M.S.), India

Dr. Mukesh Negi

Project Manager, Department of Computer Science & IT, Mukesh Negi, Project Manager, Noida, India

Dr. Sachin Madhavrao Kanawade

Associate Professor, Department Chemical Engineering, Pravara Rural Education Society’s,Sir Visvesvaraya Institute of Technology,

Nashik, India

Dr. Ganesh S Sable

Professor, Department of Electronics and Telecommunication, Maharashtra Institute of Technology Satara Parisar, Aurangabad,

Maharashtra, India

Dr. T.V. Rajini Kanth

Professor, Department of Computer Science Engineering, Sreenidhi Institute of Science and Technology, Hyderabad, India

Dr. Anuj Kumar Gupta

Associate Professor, Department of Computer Science & Engineering, RIMT Institute of Engineering & Technology, NH-1, Mandi

Godindgarh, Punjab, India

Dr. Hasan Ashrafi- Rizi

Associate Professor, Medical Library and Information Science Department of Health Information Technology Research Center,

Isfahan University of Medical Sciences, Isfahan, Iran

Dr. Golam Kibria

Associate Professor, Department of Mechanical Engineering, Aliah University, Kolkata, India

Dr. Mohammad Jannati

Professor, Department of Energy Conversion, UTM-PROTON Future Drive Laboratory, Faculty of Electrical Enginering, Universit

Teknologi Malaysia,

Dr. Mohammed Saber Mohammed Gad

Professor, Department of Mechanical Engineering, National Research Centre- El Behoos Street, El Dokki, Giza, Cairo, Egypt,

Dr. V. Balaji

Professor, Department of EEE, Sapthagiri College of Engineering Periyanahalli,(P.O) Palacode (Taluk) Dharmapuri,

Dr. Naveen Beri

Associate Professor, Department of Mechanical Engineering, Beant College of Engg. & Tech., Gurdaspur - 143 521, Punjab, India

Dr. Abdel-Baset H. Mekky

Associate Professor, Department of Physics, Buraydah Colleges Al Qassim / Saudi Arabia

Dr. T. Abdul Razak

Associate Professor, Department of Computer Science Jamal Mohamed College (Autonomous), Tiruchirappalli – 620 020 India

Dr. Preeti Singh Bahadur

Associate Professor, Department of Applied Physics Amity University, Greater Noida (U.P.) India

Dr. Ramadan Elaiess

Associate Professor, Department of Information Studies, Faculty of Arts University of Benghazi, Libya

Dr. R . Emmaniel

Professor & Head, Department of Business Administration ST, ANN, College of Engineering & Technology Vetapaliem. Po, Chirala,

Prakasam. DT, AP. India

Dr. C. Phani Ramesh

Director cum Associate Professor, Department of Computer Science Engineering, PRIST University, Manamai, Chennai Campus,

India

Dr. Rachna Goswami

Associate Professor, Department of Faculty in Bio-Science, Rajiv Gandhi University of Knowledge Technologies (RGUKT) District-

Krishna, Andhra Pradesh, India

Dr. Sudhakar Singh

Assoc. Prof. & Head, Department of Physics and Computer Science, Sardar Patel College of Technology, Balaghat (M.P.), India

Dr. Xiaolin Qin

Associate Professor & Assistant Director of Laboratory for Automated Reasoning and Programming, Chengdu Institute of Computer

Applications, Chinese Academy of Sciences, China

Dr. Maddila Lakshmi Chaitanya

Assoc. Prof. Department of Mechanical, Pragati Engineering College 1-378, ADB Road, Surampalem, Near Peddapuram, East

Godavari District, A.P., India

Dr. Jyoti Anand

Assistant Professor, Department of Mathematics, Dronacharya College of Engineering, Gurgaon, Haryana, India

Dr. Nasser Fegh-hi Farahmand

Assoc. Professor, Department of Industrial Management, College of Management, Economy and Accounting, Tabriz Branch, Islamic

Azad University, Tabriz, Iran

Dr. Ravindra Jilte

Assist. Prof. & Head, Department of Mechanical Engineering, VCET Vasai, University of Mumbai , Thane, Maharshtra 401202, India

Dr. Sarita Gajbhiye Meshram

Research Scholar, Department of Water Resources Development & Management Indian Institute of Technology, Roorkee, India

Dr. G. Komarasamy

Associate Professor, Senior Grade, Department of Computer Science & Engineering, Bannari Amman Institute of Technology,

Sathyamangalam,Tamil Nadu, India

Dr. P. Raman

Professor, Department of Management Studies, Panimalar Engineering College Chennai, India

Dr. M. Anto Bennet

Professor, Department of Electronics & Communication Engineering, Veltech Engineering College, Chennai, India

Dr. P. Keerthika

Associate Professor, Department of Computer Science & Engineering, Kongu Engineering College Perundurai, Tamilnadu, India

Dr. Santosh Kumar Behera

Associate Professor, Department of Education, Sidho-Kanho-Birsha University, Ranchi Road, P.O. Sainik School, Dist-Purulia, West

Bengal, India

Dr. P. Suresh

Associate Professor, Department of Information Technology, Kongu Engineering College Perundurai, Tamilnadu, India

Dr. Santosh Shivajirao Lomte

Associate Professor, Department of Computer Science and Information Technology, Radhai Mahavidyalaya, N-2 J sector, opp.

Aurangabad Gymkhana, Jalna Road Aurangabad, India

Dr. Altaf Ali Siyal

Professor, Department of Land and Water Management, Sindh Agriculture University Tandojam, Pakistan

Dr. Mohammad Valipour

Associate Professor, Sari Agricultural Sciences and Natural Resources University, Sari, Iran

Dr. Prakash H. Patil

Professor and Head, Department of Electronics and Tele Communication, Indira College of Engineering and Management Pune, India

Dr. Smolarek Małgorzata

Associate Professor, Department of Institute of Management and Economics, High School of Humanitas in Sosnowiec, Wyższa

Szkoła Humanitas Instytut Zarządzania i Ekonomii ul. Kilińskiego Sosnowiec Poland, India

Dr. Umakant Vyankatesh Kongre

Associate Professor, Department of Mechanical Engineering, Jawaharlal Darda Institute of Engineering and Technology, Yavatmal,

Maharashtra, India

Dr. Niranjana S

Associate Professor, Department of Biomedical Engineering, Manipal Institute of Technology (MIT) Manipal University, Manipal,

Karnataka, India

Dr. Naseema Khatoon

Associate Professor, Department of Chemistry, Integral University Lucknow (U.P), India

Dr. P. Samuel

Associate Professor, Department of English, KSR College of Engineering Tiruchengode – 637 215 Namakkal Dt. Tamilnadu, India

Dr. Mohammad Sajid

Associate Professor, Department of Mathematics, College of Engineering Qassim University Buraidah 51452, Al-Qassim Saudi

Arabia

Dr. Sanjay Pachauri

Associate Professor, Department of Computer Science & Engineering, IMS Unison University Makkawala Greens Dehradun-248009

(UK)

Dr. S. Kishore Reddy

Professor, Department of School of Electrical & Computer Engineering, Adama Science & Technology University, Adama

Dr. Muthukumar Subramanyam

Professor, Department of Computer Science & Engineering, National Institute of Technology, Puducherry, India

Dr. Latika Kharb

Associate Professor, Faculty of Information Technology, Jagan Institute of Management Studies (JIMS), Rohini, Delhi, India

Dr. Kusum Yadav

Associate Professor, Department of Information Systems, College of Computer Engineering & Science Salman bin Abdulaziz

University, Saudi Arabia

Dr. Preeti Gera

Assoc. Professor, Department of Computer Science & Engineering, Savera Group of Institutions, Farrukh Nagar, Gurgaon, India

Dr. Ajeet Kumar

Associate Professor, Department of Chemistry and Biomolecular Science, Clarkson University 8 Clarkson Avenue, New York

Dr. M. Jinnah S Mohamed

Associate Professor, Department of Mechanical Engineering, National College of Engineering, Maruthakulam.Tirunelveli, Tamil

Nadu, India

Dr. Mostafa Eslami

Assistant Professor, Department of Mathematics, University of Mazandaran Babolsar, Iran

Dr. Akram Mohammad Hassan Elentably

Professor, Department of Economics of Maritime Transport, Faculty of Maritime Studies, Ports & Maritime Transport, King Abdul-

Aziz University

Dr. Ebrahim Nohani

Associate Professor, Department of Hydraulic Structures, Dezful Branch, Islamic Azad University, Dezful, Iran

Dr. Aarti Tolia

Faculty, Prahaldbhai Dalmia Lions College of Commerce & Economics, Mumbai, India

Dr. Ramachandra C G

Professor & Head, Department of Marine Engineering, Srinivas Institute of Technology, Valachil, Mangalore-574143, India

Dr. G. Anandharaj

Associate Professor, Department of M.C.A, Ganadipathy Tulsi's Jain Engineering College, Chittoor- Cuddalore Road, Kaniyambadi,

Vellore, Tamil Nadu, India

S.

No

Volume-3 Issue-4, April 2014, ISSN: 2249-8958 (Online)

Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd.

Page

No.

1.

Authors: T.S.Keerthiga, S.Sarika

Paper Title: Data Hiding and Secured Data Storage with Access Control towards Multiparty Protocols

Abstract: Secure multiparty protocols is used as third party protocols in the data hiding and security. The major

problem is, there is no Security Scheme operated for Data Storage Services between Multi Party protocols. To

overcome this look-ahead approach, specifically for secure multiparty protocols to achieve distributed k-anonymity,

which helps parties to decide if the utility benefit from the protocol is within an acceptable range before initiating the

protocol. The look-ahead operation is highly localized and its accuracy depends on the amount of information. The

system deals with Generalization approach, with a common Identification. Suppression approach, used for Hiding

User Identity. In the secure random key algorithm, an Authentication Key is generated before a user change/update

the data for Verification. Entire Data is encrypted to ensure Security.

Keywords: Security, Privacy, k-anonymity, Multi Party protocols.

References: 1. Mehmet Ercan Nergiz,Abdullah Ercument Cicek,Thomas B.Pedersen,and Yucel Saygin,”A Look-Ahead Approach to Secure Multiparty

Protocols”,IEEE Transactions on knowledge and data engineering,VOL.24,NO.7,JULY 2012. 2. M.Kantarclu and C.Clifton, “Privacy-Preserving Distributed Mining of association Rules on Horizontally Partitioned Data,”IEEE Trans.

Knowledge and Data Eng., vol. 16, no. 9,pp. 1026-1037,Sept. 2004.

3. R.C.-W. Wong, J. Li, A.W.-C. Fu, and K. Wang, “(α, k)-Anonymity:An Enhanced K-Anonymity Model for Privacy Preserving Data Publishing,” Proc. 12th ACM SIGKDD Int’l Conf. Knowledge Discovery and Data Mining (KDD ’06), pp. 754-759, 2006.

4. B.-C. Chen, K. LeFevre, and R. Ramakrishnan,“Privacy Skyline:Privacy with Multidimensional Adversarial Knowledge,” Proc.33rd Int’l

Conf. Very Large Data Bases (VLDB ’07), pp. 770-781, 2007. 5. S.R. Ganta, S.P. Kasiviswanathan, and A. Smith, “CompositionAttacks and Auxiliary Information in Data Privacy,” Proc. 14thACM

SIGKDD Int’l Conf. Knowledge Discovery and Data Mining(KDD ’08), pp. 265-273, http://doi.acm.org/10.1145/1401890.1401926, 2008. 6. G.Ghinita,P.Karras,P.Kalnis,and N.Mamoulis,”Fast Data Anonymization with Low Information Loss”,Proc.33rd Int’l conf.Very Large Data

Bases(VLDB’07),PP.758-769,2007.

7. M.E.Nergiz,M.Atzori,andC.Clifton,”Hiding the presence of individuals in Shared Databases”,Proc.ACM SIGMOD Int’l Conf.Management of Data(SIGMOD’07),June-2007

1-3

2.

Authors: T. Hemanth Kumar, P. Swaminathan, M. Mohanraj

Paper Title: Modeling and Simulation of an Intelligent Power Conversion System for Photovoltaic Generation

Abstract: This paper represents a simulation and design of two types of Maximum Power Point Tracking (MPPT)

algorithm methods is proposed. Here the PV system is composed to a boost converter which can perform with those

algorithm methods. In this the algorithm methods are Perturb and Observe (P&O) and Probability of Neural Network

(PNN). The probability of neural network which can be deals with the neurons and can be included the neural based

Maximum Power Point Tracking. By using these different MPPT techniques we can maximize the PV array output

which can be track continuously from the solar panel’s temperature and irradiation. These MPPT techniques can be

explained by using the MATLAB.

Keywords: Solar Module, Maximum Power Point Tracking (MPPT), Perturb and Observe (P&O) and Probability

of Neural Network (PNN).

References: 1. Samer Alsadi, Basim Alsayid "Maximum Power Point Tracking Simulation for Photovoltaic Systems Using Perturb and Observe

Algorithm" International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 6, December 2012.

2. David Sanz Morales "Maximum Power PointTracking Algorithms for Photovoltaic Applications"Thesis submitted for examination for the degree ofMaster of Science in Technology. Espoo 14.12.2010.

3. J. Surya Kumari and Ch. Sai Babu Mathematical Modeling and Simulation of Photovoltaic Cell using Matlab-Simulink Environment

International Journal of Electrical and Computer Engineering (IJECE) Vol. 2, No. 1, February 2012, pp. 26~34. 4. M.Lokanadham, K.Vijaya Bhaskar / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622

www.ijera.com Vol. 2, Issue 2,Mar-Apr 2012, pp.1420-1424.

5. M.C. Di Piazza, M. Pucci, G. Vitale ConsiglioNazionale delle Ricerche, Istituto di Studi sui Sistemi Intelligenti per l'Automazione (ISSIA - CNR), sezione di Palermo, via Dante 12, 90141 Palermo, Italy.

6. Donald F . Specht "Probabilistic Neural Network" Neural Networks, Vol. 3, pp. 109-118, 1990

7. Mahmoud A. younis, Tamer khatib, Mushtaq najeeb, A Mohd ariffin przegl?d elektrotechniczny (Electrical Review), ISSN 0033-2097, R. 88 NR 3b/2012.

8. Vincent Cheung, Kevin Cannons, Signal & Data Compression Laboratory Electrical & Computer Engineering University of Manitoba June

10, 2002.

4-8

3.

Authors: Khalilimard, Hussein

Paper Title: How Construction Errors Affecting the Bearing Capacity of the Concrete Beams? Inelastic Deflection

of Concrete I-Beams

Abstract: Reinforced concrete I-beams are widely used in bridge construction. The span length to beam height

ratio in these decks is sometimes between 15 and 30. Due to the widespread utilization of these bridges and their

heavy traffic loads, special attention must be directed at recognizing the behaviors that lead to construction errors

associated with these structures. Because of various construction and environmental factors, construction faults might

result in concrete quality or during concrete placement which can consequently lead to inhomogeneities in beam

sections. This means that concrete density and compressive strength in the beam cross section might deteriorate

along the section height.

Extensive research has been conducted on the non-linear and inhomogeneous behavior of concrete beams. However,

9-16

few researchers have specifically addressed density and compressive strength variations along beam cross sections.

The present research is aimed at estimating from elastic material parameters, the concrete I-beam inelastic deflection

resulting from inhomogeneous behavior along the beam cross sectional height. The behavior of the beam under study

was checked by comparing its relevant parameters with the results obtained from the OpenSees Software and the

method proposed in the Concrete Code ACI318. Excellent agreement was observed in both cases. Moreover, a value

of unity was proposed for parameter “n” in the relation set forth by Branson in the Concrete Code ACI318 for

estimating section cracking moment in long span I-beams.

Keywords: Inelastic Deflection, Concrete Beam, Inhomogeneity, Cracked section, Construction errors.

References: 1. Joseph E. Wickline (2002) "A Study of Effective Moment of Inertia Models For Full-Scale Reinforced Concrete T-Beams Subjected To a

Tandem-Axle Load Configuration

2. Y.Y. Chang1, et. al. (2004) "A Simplified Method For Nonlinear Cyclic Analysis of Reinforced Concrete Structures: Direct And Energy

Based Formulations", 13th World Conference on Earthquake Engineering, Vancouver, B.C., Canada, Paper No. 2830. 3. Abd El Aziz, Mohamad Fathy. (2006) "Non-linear analysis of concrete beams prestressed and post-tensioned with carbon fiber reinforced

polymer (CFRP) bars", Electronic Theses and Dissertations.

4. Cengiz Dundar, Ilker Fatih Kara (2007) "Three dimensional analysis of reinforced concrete frames with cracked beam and column elements", Engineering Structures 29, 2262–2273.

5. Bischoff, P. H. and Scanlon, A. (2007) “Effective Moment of Inertia for Calculating Deflections of Concrete Members Containing Steel

Reinforcement and Fiber-Reinforced Polymer Reinforcement”, ACI Structural Journal, Vol. 104, No. 1, pp. 68-75. 6. ACI-CRC Final Report (2008) “A Study of Static and Dynamic Modulus of Elasticity of Concrete”.

7. M. Ahmed et. al. (2008) "Effect of Concrete Cracking on The Lateral Response of RCC Buildings", Asian Journal of Civil Engineering

(building and housing) Vol. 9, No. 1 (2008), pp. 25-34. 8. İlker Kalkan (2010) "Deflection Prediction for Reinforced Concrete Beams Through Different Effective Moment of Inertia Expressions",

Int. J. Eng. Research & Development, Vol. 2, No. 1.

9. Bischoff, P. H., and Gross, S. P. (2011) “Equivalent moment of inertia based on integration of curvature.” Journal of Compos. Constr., 15(3), 263–273.

10. Kulkarni S.K. et. al. (2012) "Elastic Properties of RCC Under Flexural Loading-FE Approach", World Research Journal of Civil

Engineering, ISSN: 2277-5986 & E-ISSN: 2277-5994, Vol. 2, Issue 1, 2012, pp.-30-33. 11. S. Roohollah Mousavi and M. Reza Esfahani (2012), "Effective Moment of Inertia Prediction of FRP-Reinforced Concrete Beams Based on

Experimental Results", Journal of Composites For Construction © ASCE / September/October 2012 16:490-498.

12. Jing Bo An (2012) "Nonlinear Analysis for Bending Cross Section of Tensile-Compression Prestressed Concrete Beam", Applied Mechanics and Materials, 204-208, 4538.

13. Amadio, Claudio et. al. (2012) "Evaluation of the deflection of steel-concrete composite beams at serviceability limit state", Journal of

constructional steel research, Vol. 73 , p. 95-104. ISSN 1873-5983. 14. Lin, X. and Zhang, Y. (2013) "Novel Composite Beam Element with Bond-Slip for Nonlinear Finite-Element Analyses of Steel/FRP-

Reinforced Concrete Beams", J. Struct. Eng. , 10.1061/(ASCE)ST.1943-541X.0000829 , 06013003.

15. Shahida Manzoor, Shuaib Ahmad (2013) "Ductility of RC Beams using Grade 72.5 Re-bar Steel", International Journal of Civil & Environmental Engineering IJCEE-IJENS Vol:13 No:03, p 5-8.

16. Naser Kabashi et al., (2013) "Behaviour of concrete elements under the transversal forces and strengthening with the FRP", 2nd

International Balkans Conference on Challenges of Civil Engineering, BCCCE, Epoka University, Tirana, Albania. 17. Alameer Ali (2013) "Behaviour of Prestressed Ultra-High Performance Concrete I-Beams Subjected to Shear and Flexure", A thesis

submitted to the Faculty of Graduate and Postdoctoral Studies, University of Ottawa, Canada

18. S. B. Kandekar et. al. (2013) "Concrete Grade Variation in Tension and Compression Zones of RCC Beams", International Journal of Innovative Research in Science, Engineering and Technology, ISSN: 2319-8753, Vol. 2, Issue 8

19. Md Shahnewazv (2013) "Shear Behavior of Reinforced Concrete Deep Beams Under Static and Dynamic Loads", Bangladesh University of

Engineering and Technology. 20. Patel, Vipulkumar Ishvarbhai (2013) "Nonlinear inelastic analysis of concrete-filled steel tubular slender beam-columns", PhD thesis thesis,

Victoria University.

21. Amini Najafian H et. al. (2013) "Comparative assessment of finite element and strut and tie based design methods for deep beams", Magazine of Concrete Research, Vol:65, ISSN:0024-9831, Pages:970-986

22. Bukhari IA et al. (2013) "Shear Strengthening of Short Span Reinforced Concrete Beams with CFRP Sheets", Arabian Journal for Science

and Engineering, Vol:38, ISSN:1319-8025, Pages:523-536

23. Stochino, Flavio (2013) "Flexural models of reinforced concrete beams under blast load", Doctoral Thesis, Universita' degli Studi di

Cagliari.

24. ACI 318 (2008) "Building Code Requirements for Reinforced Concrete and Commentary", American Concrete Institute, Michigan.

4.

Authors: D. Usha Nandini, Ezil Sam Leni, M. MariaNimmy

Paper Title: Mining of High Utility Itemsets from Transactional Databases

Abstract: Efficient discovery of high utility itemsets from transactional databases crucial task in data mining. UP-

Growth and UP-Growth+ algorithms are proposed for mining high utility itemsets. In this paper we also proposed a

compact tree structure, called Utility pattern tree (UP-Tree) and it maintains the information of high utility itemsets.

Previously we proposed FP-Growth algorithm for mining only large number of frequent itemsets, but not generate

the high utility itemsets. They have the issue of producing large number of candidate itemsets and probably it

degrades mining performance in terms of speed and space requirement. However, our previous study needs more

space and execution time. Many algorithms are used to show the performance of UP-Growth and UP-Growth+. UP-

Growth and UP-Growth+ becomes more efficient since database contain long transactions and generate fewer

number of candidates than FP-Growth. The experimental results and comparison validate its effectiveness.

Keywords: Candidate pruning, Data mining, Frequent itemset, High utility itemset.

References: 1. R. Srikant and R. Agrawal, “Fast algorithms for mining association rules,” in Proc. of The 20th VLDB Conf,” pp. 487-499, 1994.

2. R. Agrawal, Imielinski. T and A. Swami, “Mining association rules between sets of items in large databases”, in proceedings of the ACM SIGMOD International Conference on Management of data, pp. 207-216, 1993.

3. R. Agrawal and R. Srikant, “Mining Sequential Patterns,” in Proc. of the 11th Int’l Conference on Data Engineering, pp. 3-14, Mar 1995.

4. Liu. Y, Liao. W, A. Choudhary, ”A Fast High Utility Itemsets Mining Algorithm,” In: 1st Workshop on Utility-Based Data Mining. Chicago

17-21

Illinois, 2005. 5. A.W.C. Fu, C.H. Cai, C.H. Cheng, and W.W. Kwong, “Mining Association Rules with Weighted Items,” Proc. Int’l DB Engineering and

Apps Symp. (IDEAS ’98), pp. 68-77, 1998.

6. Tanbeer. S.K., C.F. Ahmed, and Y.-K. Lee, “Efficient Tree Structures for High Utility Pattern Mining in Incremental Databases,” IEEE Trans. Knowledge and Data Engineering, vol. 21, no. 12, pp. 1708-1721, Dec. 2009.

7. J. Yang, W. Wang, and Yu. P, “Efficient Mining of Weighted Association Rules (WAR),” Proc. ACM SIGKDD Conference. Knowledge

Discovery and Data Mining (KDD ‘00), pp. 270-274, 2000. 8. Tao. F, Farid. M, and F. Murtagh, “Weighted Association Rule Mining Using Weighted Support and Significance Framework,” Proc. ACM

SIGKDD Conf. Knowledge Discovery and Data Mining (KDD ’03), pp. 661-666, 2003.

9. Erwin. A, Gopalan. R.P, Achuthan. N.R., “A Bottom-Up Projection Based Set of rules for Mining High Utility Itemsets,” In: International Workshop on Integrating AI and Data Mining. Gold Coast, Australia, 2007.

10. Tseng V.S, C.W. Wu, B.E. Shie, and P.S. Yu, “UP-Growth: An Efficient Algorithm for High Utility Itemsets Mining,” Proc. 16th ACM

SIGKDD Conf. Knowledge Discovery and Data Mining (KDD ’10), pp. 253-262, 2010. 11. Han. J, J. Pei, Yin. Y, “Mining frequent patterns without candidate generation,” In: ACM SIGMOD International Conference on

Management of Data, 2000.

12. S.J. Yen and Y.S. Lee, “Mining High Utility Quantitative Association Rules.” Proc. Ninth Int’l Conf. Data Warehousing and Knowledge Discovery (DWK), pp. 283-292, Sept. 2007.

13. U. Yun, “An Efficient Mining of Weighted Frequent Patterns with Length Decreasing Support Constraints,” Knowledge-Based Systems, vol.

21, no. 8, pp. 741-752, Dec 2008. 14. Y.-C. Li, C.C. Chang and J.S. Yeh, “Isolated Items Discarding Strategy for Discovering High Utility Itemsets,” Data and Knowledge

Engineering, vol. 64, no. 1, pp. 198-217, (Jan 2008).

15. http:// fimi.cs.helsinki.fi/, 2012.Frequent Itemset Mining Implementations Repository,

5.

Authors: P.Chandra Sekhar, M.V.Sai Tej, U.N.S.Vijayshri, J.Nitish Kumar

Paper Title: Design and Implementation of Microwave Inverted ‘L’ and ‘J’ Filter

Abstract: In this paper, a filter is proposed using micro strip, series of patch. S-parameters, return loss and VSWR

are calculated for the filter. A reference filter is designed using a series of patches and is modified into an inverted L

and J line filter (proposed filter). The proposed filter can be easily implemented and has excellent filter

characteristics which are near to the ideal filter. There are many practical applications of this filter for example in

microwave radio relay communication systems, radio astronomy, RADAR. The entire simulation is done using CST

Microwave Studio.

Keywords: Filter, micro strip, return loss, S-parameters, VSWR, transmission coefficient.

References: 1. David M. Pozar, “Microwave Engineering”, John Wiley & Sons, Inc., Fourth Edition, 2011.

2. Constantine A. Balanis, “Antenna Theory: Analysis and Design”, John Wiley & Sons, Inc., Second Edition, 1997.

3. Mathew M. Radmanesh, “Advanced Rf & Microwave Circuit Design: The Ultimate Guide to Superior Design”, Author House, 2009.

4. P. Chandra Sekhar, et.al, “Performance Evaluation of Various filters at X band Frequency”, 10th IEEE International conference on Wireless and Optical Communication Networks (WOCN)-2013, pp.1-5, July 2013.

5. Lotfi Neyestanak A.A, “Ultra wideband rose leaf microstrip patch antenna,” Progress in Electromagnetic Research, Vol. 86, pp.155-168,

2008. 6. Roger L Freeman, “Fundamentals of Telecommunications”, John Wiley & Sons, Second Edition. Aug 2013.

7. Ian C Hunter, “Theory and Design of Microwave Filters”, The institution of Electrical Engineers, 2001.

8. Bates, R. N, “Design of microstrip spur-line band-stop filters,” Microwave, Optics and Acoustics, Vol. 1, No. 6, 1977. 9. Computer Simulation Technology, CST studio suite 2010.

10. H.W. Wu, S.K. Liu, M.H. Weng, C.H. Hung, “Compact microstrip band pass filter with multi spurious Suppression,” Progress in

Electromagnetic Research, Vol. 107, pp.21-30, 2010. 11. Chin K.S. and D.J. Chen, “Novel microstrip band pass filters using direct-coupled triangular stepped-impedance resonators for spurious

suppression.” Progress in Electromagnetic Research Letters, Vol. 12, pp. 11-20. 2009.

12. A K Tiwary and N Gupta, “Performance of two microstrip low pass filter on EBG ground plane”, Microwave Review, Vol. 15, No. 2 , pp, 37-40, Dec. 2009.

13. J S Hong, M J Lancaster, Microwave Filters for RF/Microwave Applications, New York: John Wiley and Sons, Inc; 2001.

22-26

6.

Authors: Zaki Majeed AbduAllah, Omar Talal Mahmood, Ahmed M. T. Ibraheem AL-Naib

Paper Title: Photovoltaic Battery Charging System Based on PIC16F877A Microcontroller

Abstract: This paper presents the design and practical implementation of a buck-type power converter for

Photovoltaic (PV) system for energy storage application based on constant voltage Maximum Power Point Tracking

(MPPT) algorithm. A buck converter is used to regulate battery charging. The system is controlled by a Peripheral

Interface Controller (PIC) 16F877A microcontroller from Microchip via sensing the solar panel voltage and

generating the Pulse Width Modulation (PWM) signal to control duty cycle of the buck converter. This type of

microcontroller was chosen because it has the necessary features for the proposed design such as built-in Analog-to-

Digital Converter (ADC), PWM outputs, low power consumption and low cost. Simulation and experimental results

demonstrate the effectiveness and validity of the proposed system.

Keywords: Photovoltaic, MPPT, Buck Converter, PIC16F877A.

References: 1. S. Masri, P. Chan,“Development of a Microcontroller Based Boost Converter for Photovoltaic System ”, European Journal of Scientific

Research, ISSN 1450-216X,Vol. 41 No.1, pp.38-47, 2010.

2. Zhengshicheng, L. Wei, “Research and Implementation of Photovoltaic Charging System with MPPT”, 3rd IEEE Conference on Industrial

Electronics and Applications, pp.619-624, 2008. 3. M.H. Rashid, “Power Electronics Handbook”, Second Edition, ISBN 13-978-0-12-088479-7, 2007.

4. M.A.S. Masoum, H. Dehbonei, E.F. Fuchs, “ Theoretical and Experimental Analyses of Photovoltaic Systems with Voltage and Current-

Based MPPT ”, IEEE Transactions on Energy Conversion, Vol. 17, No. 4, pp.514-522, December 2002. 5. E Koutroulis, K. Kalaitzakis, N.C. Voulgaris, “Development of a Microcontroller Based Photovoltaic MPPT Control System”, IEEE

Transactionson Power Electronics, Vol. 16, No. 1, pp.46-54, January 2001.

6. M.S. Rahman, “Buck Converter Design Issues”, Master thesis performed in division of Electronic Devices, 2007.

27-31

7. PIC16F87XA Data Sheet DS39582B, Microchip Technology, Inc.

7.

Authors: Rathod Balasaheb S, Satish. M. Rajmane

Paper Title: A Case Study on Design of a Flywheel for Punching Press Operation

Abstract: A flywheel is the heavy rotating mass which is placed between the power source and the driven machine

to act as a reservoir of energy. It is used to store the energy when the demand of energy of energy is less and deliver

it when the demand of energy is high. The current paper is focused on the analytical design of arm type of flywheel

which is used for punching press operation. Now in regard to the design of flywheel it is required to decide the mean

diameter of the flywheel rim, which depends upon two factors such as availability of space and the limiting value of

peripheral velocity of the fly wheel. However the current design problem is formulated for punching machine which

has to be make holes of 30 holes/minute in a steel plate of 18mm thickness with space limitation that is the diameter

of flywheel should not exceed 1000mm, hence it can be observed that the design of the flywheel is to be carried out

(based) on the availability of space limitation and accordingly the fluctuation of energy, dimensions of the flywheel,

stresses induced in the flywheel are determined. Finally after detail analysis it is observed that the induced diameter

of the flywheel is less than the allowable/permissible diameter and hence it can be concluded that the design is safe

from availability of space point of view.

Keywords: Flywheel, peripheral velocity, fluctuation of energy, stresses, stored energy.

References: 1. Akshay P. Punde, G.K.Gattani , Analysis of Flywheel, International Journal of Modern Engineering Research (IJMER) , Vol.3, Issue.2,

March-April. 2013 pp-1097-1099 2. Bjorn Bolund , Hans Bernhoff, Mats Leijon , Flywheel energy and power storage systems,international journal of Renewable and

Sustainable Energy Reviews 11 (2007) 235–258 3. Sudipta Saha, Abhik Bose, G. Sai Tejesh, S.P. Srikanth , computer aided design & analysis on flywheel for greater efficiency, International

Journal of Advanced Engineering Research and Studies, IJAERS/Vol. I/ Issue II/January-March, 2012/299-301

4. M.lavakumar, R.prasanna srinivas, Design and analysis of light weight motor vehicle flywheel, International Journal of Computer Trends and Technology (IJCTT) – volume 4 Issue -7July 2013

5. Sushama G Bawane , A P Ninawe and S K Choudhary, Analysis and optimization of flywheel, International Journal of mechanical

engineering and robotics Vol. 1, No. 2, July 2012 6. S. M. Dhengle, Dr. D. V. Bhope, S. D. Khamankar , sInvestigation of stresses in arm type rotating flywheel, International Journal of

Engineering Science and Technology (IJEST), Vol. 4 No.02 February 2012.

7. D.Y. Shahare, S. M. Choudhary , Design Optimization of Flywheel of Thresher using FEM, Advanced Materials Manufacturing & Characterization Vol3 Issue 1 (2013)

32-35

8.

Authors: K.Suganya, S.Dhamodharan

Paper Title: Assessment of Data Quality in Health Care Using Association Rules

Abstract: To find the outlier and disease possibility of ten cancer diseases. In the existing system, Transactional

data of three companies are taken as input. Association rules are extracted from the input data using open source data

mining tool.By applying consistency rule, the outliers are identified. Outliers are manually examined to determine

whether any data quality is violation has really occurred. Cost for manual examination is estimated using confusion

matrix. In this system, recorded patient details is taken as input. From the input data, association rule is identified and

outliers are detected. Weight is assigned to each symptoms of all considered cancer disease. When user enters the

symptoms, percentage of cancer disease possibility is calculated.

Keywords: Association rule,outlier,consistency rule

References: 1. Ms. Ishtake S.H , Prof. Sanap S.A."Intelligent Heart Disease Prediction System Using Data Mining Techniques" International J. of

Healthcare & Biomedical Research, Volume: 1, Issue: 3, Pages 94-101,April ( 2013)

2. K.Srinivas, B.Kavihta Rani,A.Govrdhan, "Applications of Data Mining Techniques in Healthcare and Prediction of Heart Attacks" K.Srinivas et al. / (IJCSE) International Journal on Computer Science and Engineering,Vol. 02, No. 02, Pages 250-255, (2010)

3. Bendi Venkata Ramana, Prof. M.Surendra Prasad Babu, Prof. N. B. Venkateswarlu,"A Critical Study of Selected Classification Algorithms

for Liver Disease Diagnosis" International Journal of Database Management Systems ( IJDMS ), Vol.3, No.2, May (2011) 4. Chunhua Ju, Yaolin Li ,"An Incremental Outlier Detection Model for Transaction Data Streams" , Journal of Information & Computational

Science 10: 1 Pages: 49–59 (2013)

5. Anjali Barmade, Madhu M.Nashipudinath, "An Efficient Strategy to Detect Outlier Transactions" International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-3, Issue-6, January( 2014 )

6. S.Preetha, V.Radha "Enhanced Outlier Detection Method Using Association Rule Mining Technique" International Journal of Computer

Applications (0975 – 8887) Volume 42– No.7, March (2012 )

36-37

9.

Authors: L.Lakshmanan, D.C.Tomar, Japala Saikrishna Rao

Paper Title: Implementation of Protus2.0 by Ontology for Advanced E Learning

Abstract: Protus2.0 E_ learning environment is used in learning process for decision making, communication and

problem-solving. The semantic web used in real-time annotations of these ontology for debriefing of the students,

student self study and better guidance of the learning methodologies of mentors.A ever-present methodology

environment will provides an interoperable, pervasive, and flawless learning structural design to connect, fix

together, and share three major scope of learning resources such as learning collaborators, learning services, and

learning contents. ever-present learning is characterized for identify right learning collaborators, right learning

contents and right learning services in the right place at the right time. it promotes the achievement of practical

knowledge as well as decision production, communication, and problem solving with help of ontological Skills-

based learning environments. These environments are a important to give feedback about the students from the

practically conducted sessions and comments of learners actions can notify to the assessment of their quality process.

38-40

And also, those learning environments are helping to the researchers for better understand the learning process. The

proposed system examined study environments. Also, achieve the better student improving the knowledge as well as

feedback of the understanding of learning environments; we proposed a new mechanism such as semantic based

approach with the ontology is used.

Keywords: semanticweb,ontology mapping methods, fuzzy logic, fuzzy grouping, k-means algorithms, tutorial

systems.

References: 1. M.J. Weal, D. Michaelides, K.R. Page, D.C. De Roure, E. Monger, and M. Gobbi, “Semantic Annotation of Ubiquitous Learning

Environments,” IEEE Trans. Learning Technologies, vol. 5, no. 2, pp. 143-156, Apr.-June 2012. 2. T. Tiropanis, H. Davis, D. Millard, and M. Weal, “Semantic Technologies for Learning and Teaching in the Web 2.0 Era—A Survey,” Proc.

Society On-Line (WebSci ’09), http://eprints.ecs. soton.ac.uk/17106, 2009.

3. J.W. McDonald, M.O. Gobbi, D. Michaelides, E. Monger, M.J.Weal, and D. De Roure, “Grid-Enabled Data Collection and Analysis: Semantic Annotation in Skills-Based Learning,” Proc.Fourth Int’l Conf. E-Social Science, June 2008.

4. M.J. Weal, D.T. Michaelides, D.C. De Roure, M. Gobbi, E. Monger, and J.W. McDonald, “Semantic Annotation in Ubiquitous Healthcare

Skills-Based Learning Environments,” Proc. Workshop Semantic Web in Ubiquitous Healthcare (ISWC), Nov. 2007. 5. K.R. Page, D.T. Michaelides, S.J.B. Shum, Y.-H. Chen-Burger, J.Dalton, D.C. De Roure, M. Eisenstadt, S. Potter, N.R. Shadbolt, A.Tate, M.

Bachler, and J. Komzak, “Collaboration in the Semantic Grid: A Basis for E-learning,” Applied Artificial Intelligence, vol. 19, nos. 9/10, pp.

881-904, Nov. 2005.

6. O. Lassila and M. Adler, “Semantic Gadgets: Ubiquitous Computing Meets the Semantic Web,” Spinning the Semantic Web, D. Fensel, ed.,

MIT, pp. 363-376, 2003.

7. T. D. of Health, “Delivery 21st Century IT Support for the NHS: National Strategic Programme,” technical report, The Stationary Office, June 2002.

10.

Authors: Richu Sam Alex, R Narciss Starbell

Paper Title: Energy Efficient Intelligent Street Lighting System Using ZIGBEE and Sensors

Abstract: Solar Photovoltaic panel based street lighting systems are becoming more common these days. But the

limitation with these ordinary street light systems is that it lacks intelligent performance. It is very essential to

automate the system so that we can conserve energy as well as to maximize the efficiency of the system. In this paper

a new method is suggested so as to maximize the efficiency of the street lighting system and to conserve the energy

usage by the system with the help of ZIGBEE and sensors. It uses a sensor combination to control and guarantee the

desired system parameters. The information is transferred point by point using ZIGBEE transmitters and receivers

and is sent to the control terminal used to check the state of the street lamps and hence we can take immediate actions

if required.

Keywords: Automation, Atmega, LED, PV, Sensors.

References: 1. A. Valente, R. Morais, C. Serodio, P. Mestre, S. Pinto, and M. Cabral, “A zigbee sensor element for distributed monitoring of soil parame-

ters in environmental monitoring,” Proc. IEEEE Sensors, pp. 135–138, Oct. 2007.

2. Z. Rasin, H. Hamzah, and M. S. M. Aras, “Application and evaluation of high power zigbee based wireless sensor network in water irrigation control monitoring system,” in Proc. IEEE Symp. Ind. Electron. Appl., Oct. 4–6, 2009, vol. 2, pp. 548–551.

3. H. Tao and H. Zhang, “Forest monitoring application systems based on wireless sensor networks,” in Proc. 3rd Int. Symp. Intell. Inf.

Technol. Appl. Workshops, Nov. 21–22, 2009, pp. 227–230. 4. J. Liu, C. Feng, X. Suo, and A. Yun, “Street lamp control system based on power carrier wave,” in Proc. Int. Symp. Intell. Inf. Technol.

Appl. Workshops, Dec. 21–22, 2008, pp. 184–188.

5. Y. Chen and Z. Liu, “Distributed intelligent city street lamp monitoring and control system based on wireless communication chip nRF401,” in Proc. Int. Conf. Netw. Security, Wireless Commun. Trusted Comput., Apr. 25–26, 2009, vol. 2, pp. 278–281.

6. W. Yongqing, H. Chuncheng, Z. Suoliang, H. Yali, and W. Hong, “Design of solar LED street lamp automatic control circuit,” in Proc. Int.

Conf. Energy Environment Technol., Oct. 16–18, 2009, vol. 1, pp. 90–93.

7. M. A. D. Costa, G. H. Costa, A. S. dos Santos, L. Schuch, and J. R. Pinheiro, “A high efficiency autonomous street lighting system based

on solar energy and LEDs,” in Proc. Power Electron. Conf., Brazil, Oct. 1, 2009, pp. 265–273.

41-44

11.

Authors: KR.Akshara, N.Srinivasan

Paper Title: Collective Behavior Learning on Heterogeneous Affiliation in OSN

Abstract: Millions of real world data is generated by the social network like Facebook, twitter etc which gives us

an opportunity to under or predict users behavior by means of collective learning. Many studies have been conducted

already on this field. Existing algorithm uses connection or user relationship to understand their behavior but they

lack the understanding of heterogeneity in their connection which reduces the effectiveness of their algorithm. In this

project we proposed a mechanism to focus on these issues by introducing the concept of edge centric clustering for

classification of users based on their heterogeneity affiliation and extracting the social dimension , relevant

community detection is made and the social dimension is extracted by using chi square testing model. Here in this

work it also reduce the computational problem by scaling the samples applying the scheme sparse social network

Keywords: Collective Learning, Social Dimension, Community Detection

References: 1. L. Tang and H. Liu, “Toward predicting collective behavior via social dimension extraction,” IEEE Intelligent Systems, vol. 25,pp. 19–25,

2010.

2. L.Tang and H.Liu, “Relational learning via latent social dimensions,” in KDD ’09: Proceedings of the 15th ACM SIGKDD internat ional

conference on Knowledge discovery and data mining. New York, NY, USA: ACM, 2009, pp. 817–826. 3. M. Newman, “Finding community structure in networks using the eigenvectors of matrices,” Physical Review E vol. 74, no. 3, 2006.

[Online].Available:http://dx.doi.org/10.1103/PhysRevE.74.036104

4. L. Tang and H. Liu, “Scalable learning of collective behavior based on sparse social dimensions,” in CIKM ’09: Proceeding of the 18th

45-47

ACM conference on Information and knowledge management. New York, NY, USA: ACM, 2009, pp. 1107–1116. 5. P. Singla and M. Richardson, “Yes, there is a correlation: - from social networks to personal behavior on the web,” in WWW ’08:

Proceeding of the 17th international conference on World Wide Web. New York, NY, USA: ACM, 2008, pp. 655–664.

6. M. McPherson, L. Smith-Lovin, and J. M. Cook, -Birds of a feather: Homophily in social networks. 7. A. T. Fiore and J. S. Donath, “Homophily in online dating: when do you like someone like yourself?” in CHI ’05: CHI ’05extended abstracts

on Human factors in computing systems. NewYork, NY, USA: ACM, 2005, pp. 1371–1374.

8. H. W. Lauw, J. C. Shafer, R. Agrawal, and A. Ntoulas, “Homophily in the digital world: A LiveJournal case study,” IEEE Internet Computing, vol. 14, pp. 15–23, 2010.

9. S. A. Macskassy and F. Provost, “Classification in networked data: A toolkit and a univariate case study,” J. Mach. Learn .Res., vol. 8, pp.

935–983, 2007.

10. X. Zhu, “Semi-supervised learning literature survey,” 2006.[Online].Available: ttp://pages.cs.wisc.edu/∼jerryzhu/ pub/ssl survey 12 9

2006.pdf

12.

Authors: A. Prasanth Babu, N. Srinivasan

Paper Title: Temporal Analyzing Time Interval for Text Document in Text Excavation

Abstract: Text excavation has been an unavoidable data excavation technique. There are different methods for

text excavation, the most famous one criterion matching successful will be excavation using the effective criterions.

The quality of excavation text data is the main problem text excavation due to the large number of terms, words,

tables, phrases, and noise. However, the originality of excavation terms in text data may be not high because of lot of

noise in text especially in the domain of text excavation. Pattern taxonomy model is a criterion-based method which

adopts the technique of sequential criterion excavation and uses closed criterions as features in the representative. In

Criterion taxonomy model it does not analyze the time period to the given text documents and also does not provide

the rank to the given sets of documents. Existing is used to term-based approach to extracting the text. In this system

we are going to propose the temporal text excavation approach which it calculates the time series and give the rank of

the documents by decomposing the documents.

Keywords: Text Excavation, Terrestrial sequence, Stumble Criterion Evolution, D-Criterion.

References: 1. M.F. Caropreso, S. Matlin, and F. Sebastiani. Statistical Phrases in Automated Text Categorization, Technical Report IEI-B4-07- 2000,

Instituto di Elaborazione dell’Informazione, 2000. 2. C. Cortes and V. Vapnik. Substantiate-Vector Networks, Machine Learning, vol. 20, no. 3, pp. 273-297, 1995.

3. S.T. Dumais, Improving the Retrieval of Information from External Sources, Behavior Research Methods, Instruments, and Computers,

Vol. 23, No. 2, pp. 229-236, 1991. 4. J. Han and K.C.-C. Chang. Data Excavation for Web Intelligence, Computer, Vol. 35, No. 11, pp. 64-70, Nov. 2002.

5. J. Han, J. Pei, and Y. Yin. Excavation Frequent Criterions without Candidate Generation, Proc. ACM SIGMOD Int’l Conf. Management of

Data (SIGMOD ’00), pp. 1-12, 2000. 6. Y. Huang and S. Lin. Excavation Sequential Criterions Using Graph Search Techniques, Proc. 27th Ann. Int’l Computer Software and

Applications Conf., pp. 4-9, 2003.

7. N. Jindal and B. Liu. Identifying Comparative Sentences in Text Documents, Proc. 29th Ann. Int’l ACM SIGIR Conf. Research and Development in Information Retrieval (SIGIR ’06), pp. 244-251, 2006.

8. K.Aas and L.Eikvil, “Text Categorisation: A Survey,” Technical Report Raport NR 941, Norwegian Computing Center, 1999.

9. R.Agrawal and R.Srikant, “Fast Algorithms for Excavation Association Rules in Large Databases,” Proc. 20th Int’l Conf. Very Large Data Bases (VLDB ’94), pp. 478-499, 1994.

10. H.Ahonen, O.Heinonen, M. Klemettinen, and A.I. Verkamo, “Applying Data Excavation Techniques for Descriptive Phrase Extraction in

Digital Document Collections,” Proc. IEEE Int’l Forum on Research and Technology Advances in Digital Libraries (ADL ’98), pp. 2-11, 1998.

11. R. Baeza-Yates and B.Ribeiro-Neto, Modern Information Retrieval. Addison Wesley, 1999.

12. N.Cancedda, N. Cesa-Bianchi, A. Conconi, and C. Gentile, “Kernel Methods for Document Filtering,” TREC, trec.nist.gov/ ubs/trec11/papers/kermit.ps.gz, 2002.

48-50

13.

Authors: Kulkarni Akshata

Paper Title: A Review on Glucagon like Peptide-1 Approach in Diabetes Melltius

Abstract: Epidemiology of diabetes has gained great significance both in estimating the burden of the disease and

also in finding out the risk factors with an ultimate goal of prevention of the disease. Type 2 diabetes is a progressive

chronic disease resulting from a dynamic interaction between defects in insulin secretion and insulin action. New

molecules have recently been launched and many others are under clinical investigation. Besides classical

sulfonylureas and glinides, new insulin secretagogues are now available, which target the incretin gut hormone

glucagon-like peptide-1 (GLP-1). Indeed, oral incretin enhancers acting as antagonists of the enzyme DPP-4

(dipeptidylpeptidase-4), which inactivates natural GLP-1, and injectable incretin mimetics (exenatide) or analogues

(liraglutide), which reproduce the actions of GLP-1 while resisting to DPP-4, represent new opportunities to

stimulate insulin secretion, without increasing the risk of hypoglycaemia and weight gain. Therapies based on the

incretin hormone glucagon-like peptide 1 (GLP-1) are novel treatment options for type 2 diabetes. Incretin hormones

cause an increase in the amount of insulin released from beta cells in the pancreas following ingestion of food.

Glucagon-like peptide-1 (GLP-1) is the most well-characterized incretin hormone, which is considered to be the most

important incretin released by the gut into the bloodstream in response to meal. In addition to its effects on insulin

secretion after eating, primary function of GLP-1 is to enhance insulin secretion. GLP-1 also has additional effects

that can help in the management of diabetes.

Keywords: Diabetes mellitus, Glucagon like peptide-1, incretins.

References: 1. C Alarcon, B Wicksteed, C.J Rhodes,Exendin 4 controls insulin production in rat islet beta cells predominantly by potentiation of glucose-

stimulated proinsulin biosynthesis at the translational level. Diabetologia;49: 2006.pp-2920–2929.

2. J.M Barragan,J Eng, R Rodriguez,E Blazquez, Neural contribution to the effect of glucagon-like peptide-1-(7-36) amide on arterial blood

51-54

pressure in rats. Am J Physiol; 277: 1999. E784– E791. 3. D.J Drucker,The role of gut hormones in glucose homestasis. J Clin Invest, 2007.117:pp-24-32.

4. M Moller, S.P Sheikh,Central administration of GLP-1-(7-36) amide inhibits food and water intake in rats. Am J Physiol; 271: 1999,R848–

R856. 5. M.M Engelgau, T.J Thompson, W.H Herman ,JP Boyle, Aubert R.E,S.J.Kenny, Diabetes Care,1997, pp-785–91.

6. H.C Fehmann, J.F Habener, Functional receptors for the insulinotropic hormone glucagon-like peptide-I(7-37) on a somatostatin secreting

cell line. FEBS Lett,279,1991, pp-335–340. 7. F.M Gribble, Targetting GLP-1 release as potential strategy for therapy of type-2 diabetes mellitus,In:Diabetic medicine,25(8),1991,pp-889-

894.

8. J.J Holst, C Orskov,O.V Nielsen,T.W Schwartz,Truncated glucagon-like peptide I, an insulin-releasing hormone from the distal gut. FEBS Lett 211,1987,pp-169–174.

9. M.I Harris,R.C Eastman,C.C Cowie,K.M Flegal,M.S Eberhardt MS,Diabetes Care,20,1987,pp-1859–62.

10. B Kreymann,G.Williams,M.A Ghatei,SR Bloom, Glucagon-like peptide-1 7-36: a physiological incretin in man. Lancet; 2: 1987, pp-1300–1304.

11. L.B Knudsen,Pridal,Glucogon like peptide-1(9-36) amide is major metabolite and glucagon like peptide-1(7-38)amide after in vivo

administration to dogs and it acts as antagonist on pancreatic receptor. In: European of journal pharmacology, 318, (2-3),1996,pp-429-435. 12. K Meeran K,D O’Shea,CM Edwards,M..D Turton, MM Heath,I Gunn,S Abusnana,M Rossi,CJ Small,A.P Goldstone,G.M Taylor,D Sunter,J

Steere,S.J Choi,M.A Ghatei,SR Bloom Repeated intracerebroventricular administration of glucagon-like peptide1-(7-36) amide or exendin-

(9-39) alters body weight in the rat. Endocrinology; 140,1999,pp-244–250. 13. S Mojsov,G.C Weir,J.F Habener J.F,Insulinotropin: glucagon-like peptide I (7-37) co-encoded in the glucagon gene is a potent stimulator of

insulin release in the perfused rat pancreas. J Clin Invest,79,1987,pp-616–619.

14. JJ Meier,B Gallwitz,S Salmen,O Goetze,J.J Holst, W.E Schmidt,M.A Nauck Normalization of glucose concentrations and deceleration of

gastric emptying after solid meals during intravenous glucagon-like peptide 1 in patients with type 2 diabetes. J Clin Endocrinol Metab,

88,2003,2719–2725.

15. C Orskov,A Wettergren,J.J Holst J.J,Secretion of incretin hormones glucagon like peptide-1 and gastric inhibition polypeptide with insulin secretion in normal man throughout day .In:Scandianrian journal of gastroenterology,31(7), 1996,pp-665-670.

16. C Ruiz-Grande,C Alarcn,E Mzrida,I Valverde,Lipolytic action of glucagon-like peptides in isolated rat adipocytes. Peptides; 13,1992,pp-13–

16. 17. M Szayna,M.E Doyle,JA Betkey,H.W Holloway,R.G Spencer,N.H Greig,J.M Egan,Exendin-4 decelerates food intake, weight gain, and fat

deposition in Zucker rats. Endocrinology; 141,2000,1936–1941.

18. M.D Turton,D O’Shea,I Gunn,S.A Beak,C.M Edwards,K Meeran,S.J Choi,G.M Taylor,M.M Heath,P.D Lambert, Wilding J.P, Smith DM, Ghatei M.A, Herbert J, Bloom S.R,A role for glucagon-like peptide-1 in the central regulation of feeding. Nature 6;379,1996,pp-69–72.

19. R.E.Wachters-Hagedoorn,M.G.Prieb,A.M Heiner,J.J Holst,The rate of intestinal glucose absorption is corrected with plasma

glucose.Depending insulinotropic polypeptide concentration in healthy men,In:the journal of nutrition,(136) 6,2006,pp-1511-1516. 20. B Willms,J Werner,J.J Holst ,C Orskov,W Creutzfeldt, M.A Nauck,Gastric emptying, glucose responses, and insulin secretion after a liquid

test meal: effects of exogenous glucagon-like peptide-1 (GLP-1)-(7-36) amide in type 2 (noninsulin-dependent) diabetic patients. J Clin

Endocrinol Metab; 81,1996,pp-327–332. 21. M Zander,A Christiansen,S Madsbad,J.J Holst, Additive Effect of Glucagon-Like Peptide 1 and Pioglitazone in Patients with Type 2

Diabetes. Diabetes Care, 27, 2004, pp-1910-1914.

14.

Authors: Devarshi Chaurasia

Paper Title: Bus Rapid Transit System (BRTS): A Sustainable Way of City Transport (Case Study of Bhopal

BRTS)

Abstract: Irrespective of the cities of any country around the world, at some point of time they have faced

problems associated with passenger mobility and connecting the city periphery with central part, in urban areas and

found few innovative solutions to overcome the problems. Urban Planners, Engineers and Urban Administrator have

found Bus Rapid Transit (BRT) System as efficient, cost effective and simple as compare to other Light Rail Transit

(LRT) and Metro Rail solution to provide ‘life line’ to city. Many cities around the world operating BRTS and

getting positive results including so many Indian cities. By this technical paper, I am investigating the salient features

and properties of BRT system with the help of various operational BRT. At last, I am presenting an observational

study of Bhopal BRT system to analyze the actual condition and lacunas of BRTS.

Keywords: BRT system, Urban Transport, City, Passenger Mobility.

References: 1. Ahmedabad Bus Rapid Transit System, Urban Transport Initiatives in India: Best Practices in PPP report by National Institute of Urban

Affairs, India http://www.niua.org/projects/tpt/AHMEDABAD%20BRTS.pdf http://www.ahmedabadbrts.com/web/About_JanMarg.html

2. Agarwal P.K., Sharma Anupama, Sing A.R. (2010), An overview on Bus Rapid Transit System, JERS/Vol.-I/Issue-II/ Oct.-Dec./ page.

195-205. 3. Bus Rapid Transit System Bhopal, Presentation by BCEOM International France, Bhopal Municipal Corporation, Sept. 2008 Downloaded

from Internet on Aug. 2013)

4. BRT Case Study, Curitiba, Brazil. http://onlinepubs.trb.org/onlinepubs/tcrp/tcrp90v1_cs/Curitiba.pdf 5. Colleen McCaul (2009), Project Manager of GTZ Consulting Team: Johannesburg Rea Vaya BRT Project, South Africa

http://www.unhabitat.org/downloads/docs/7997_81569_rea_vaya.pdf 6. HT Correspondent, Hindustan Times Bhopal, June 20, 2013 http://www.hindustantimes.com/India-news/Bhopal/3-things-missing-from-

Bhopal-BRTS-estimates-panel/Article1-1079470.aspx

7. Jaiswal Anuj, Sharma Ahsutosh (2012); ‘Optimization of Public Transport Demand : A case study of Bhopal’ IJSRP/Vol.-2/Issue-7/July 2012, ISSN No.: 2250-3153

8. Kadiyali,L.R,(2008),Traffic Engineering and Transportation Planning, Khanna Publishers,Seventh Edition, Delhi.

9. Kumar Manish, Sustainable Cities Collective , Article (Downloaded from Internet net on 6/10.2013)

http://sustainablecitiescollective.com/kumar-manish/180741/my-bus-brts-launched-bhopal-bridges-old-city-and-new-city-india

10. Lloyd Wright, University College London, Book Title-Sustainable Transport: A source book for Policy Makers in Developing Cities,

Module 3b: Bus Rapid Transit http://www.itdp.org/documents/brtplanningguidedec04.pdf 11. Mohan Dinesh, Planning for Public Transport: Integrating Safety, Environment and Economic Issues, Transportation Research and Injury

Prevention Programme Indian Institute of Technology, New Delhi 110 016, India.

12. Rafael Villarsed (2008), Bagota Bus Rapid Transit, Transmilenio Institutional Presentation. http://tram.mcgill.ca/Teaching/seminar/presentations/BRTBog.pdf

13. Transport Research & Injury Prevention Programme-TRIPP (2008), BRTS special Issue, IIT Delhi.

14. Tiwari Geetam, Bus Priority Lanes for Delhi, Transportation Research and Injury Prevention Programme, Indian Institute of Technology, Delhi, India 110016.

15. Yoga Adiwinarto (2013), Expanding TransJakarta BRT through ‘Direct service’ system, 32nd Southern Africa Transport Conference.

55-63

15.

Authors: Remya George, Anjaly Cherian.V, Annet Antony, Harsha Sebestian, Mishal Antony, Rosemary

Babu.T

Paper Title: An Intelligent Security System for Violence against Women in Public Places

Abstract: This paper describes about an intelligent security system for women. Women all over the world are

facing much unethical physical harassment. This acquires a fast pace due to lack of a suitable surveillance system.

Our project is a venture to resolve this problem. The systems mainly consist of a monitoring device, the output of

which is processed to identify insecure environments. Upon identifying unsafe environments system will send

message to near-by control room also turn on alarms placed all around the area letting help from others. This system

can be positioned in public places such as railway stations, bus stands, foot paths and shopping mall, where women

are commonly experiencing attacks. We really believe that this endeavor will make a difference in the life of many

and dream about seeing this world with individuals walking fearlessly.

Keywords: women security, face recognition.

References: 1. “violence against women in India-a literature review”-Sheela Saravanan, Intsitute of social studies trust.

2. Aisha Meethian and B.M.Imran, “Real Time Gesture Recognition Using Gaussian Mixture Model”, International Journal of Scientific &

Engineering Research, Volume 4, Issue 8, August-2013.

3. ”A mobile application for women”-Times of India, Dec 03 2013.

4. “electronic device for women safety”- Times of India, Sep 15 2013.

5. P. Viola and M. J. Jones, “Robust real-time face detection”, International Journal of Computer Vision, 57(2):137–154, 2004. 6. Qiang Li, Bo Li ,”Online Finger Gesture Recognition Using Surface Electromyography Signals”-Journal of Signal and Information

Processing, 2013, 4, 101-105 doi:10.4236/jsip.2013.42013 Published Online May 2013

7. A. Samal and P.A. Iyengar, “Automatic Recognition and Analysis of Human Faces and Facial Expressions: A Survey,” Pattern Recognition, vol. 25, no. 1, pp. 65-77, 1992.

8. Y. Tian, T. Kanade and J. Cohn, “Recognizing Action Units for Facial Expression Analysis,” IEEE Trans. Pattern Analysis and Machine

Intelligence,vol. 23, no. 2, pp. 97–115, 2001. 9. Regina Lionnie, Ivanna K. Timotius and Iwan Setyawan ,“Performance Comparison of Several Pre-Processing Methods in a Hand Gesture

Recognition System based onNearest Neighbor for Different Background Conditions”, ITB J. ICT, Vol. 6, Nov. 3, 2012.

10. Vinay Bettadapura,” Face Expression Recognition and Analysis: The State of the Art” 11. Chen Wu and Hamid Aghajan “Model-based Human Posture Estimation for Gesture Analysis in an Opportunistic Fusion Smart Camera

Network” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 21, no. 9, pp. 884–900, 2007

12. P. Ekman and W.V. Friesen, “Manual for the Facial ActionCoding System,”Consulting Psychologists Press,1977. 13. MPEG Video and SNHC, “Text of ISO/IEC FDIS 14 496-3: Audio,” in Atlantic City MPEG Mtg., Oct. 1998, Doc. ISO/MPEG N2503.

14. “Robust object tracking using local kernels and background information”-Jaideep Jeyakar, R. Venkatesh Babu, K. R. Ramakrishnan

15. “Multiple Object Tracking by Kernel Based Centroid Method for Improve Localization”- Rahul Mishra1, Mahesh K. Chouhan2, Dr. Dhiiraj Nitnawwre3 International Journal of Advanced Research in Computer Science and Software Engineering.

16. M.S. Ryoo and J.K. Aggerwal, “observe and explain: a new approach for multiple hypotheses tracking of humans and objects” , university of

Texsas,pg:1-8,2005 17. Tao Zhao and Ram Nevatia, “tracking multiple human in a crowded environment”, International Journal of Computer Vision, pg:1-9,2004

18. Yao-Te Tsai, Huang-Chia Shih, and Chung-Lin Huang, “Multiple Human Objects Tracking in Crowded Scenes”, International Journal of

Computer Vision, pg:1-4,2006 19. Andrew Rayam, Adam Rossi, “automated facial expression recognition system”, IEEE transactions, pg 1-6, 2009

20. Ole Helvig Jensen, “Implementing the Viola-Jones Face Detection Algorithm”, Technical University of Denmark, pg:1-32,2008

21. Deqing Sun, Stefan Roth, Michael J Black, “secrets of optical flow estimation and their principles”, Brown university, pg:1-8, 2010

64-68

16.

Authors: A.Mathumathi, Nivya.R.Mohan, Neethu Babu, D.Padmapriya, Anoop, M.Geetha Priya

Paper Title: Leakage Power Optimization for VLSI Circuits @90nm CMOS Process

Abstract: In Integrated Circuits (IC), the transistor density is increased by scaling down the size of MOSFETs.

Scaling down of devices sizes for improving the performance has lead to a substantial increase in the subthreshold

leakage current. In this paper, a new method is proposed to reduce leakage power in standby mode of operation. This

proposed method combines Input Vector Control (IVC) and Gate Replacement (GR) techniques. The proposed

method is validated by applying to three different benchmark circuits at 90nm CMOS process technology using

HSPICE. The final results obtained are compared with other well known leakage reduction techniques and the

proposed method proves to be more effective than other existing techniques.

Keywords: leakage reduction, HSPICE, CMOS, full adder, PDP

References: 1. M. Geetha Priya and K. Baskaran, “A Novel Low Power 3 Transistor based Universal Gate for VLSI Applications”, Journal of Scientific

and Industrial Research, vol. 72, pp. 217-221, Apr. 2013

2. M.Geetha Priya and K. Baskaran, “A new universal gate for low power SoC applications”, Sadhana-Academy Proceedings in Engineering Sciences, vol. 38, pp. 6445-651, Aug. 2013

3. Afshin Abdollahi, Farzan Fallah and Massoud Pedram, “Leakage Current Reduction in CMOS VLSI Circuits by Input Vector Control” ,

IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 12, no. 2, pp. 140-154, Feb. 2004

4. Saibal Mukhopadhyay, Cassondra Neau, Riza Tamer Cakici, Amit Agarwal, Chris H. Kim and Kaushik Roy, “Gate Leakage Reduction for

Scaled Devices Using Transistor Stacking”, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 11, no. 4, pp. 716-

730, Aug. 2003 5. Narender Hanchate and Nagarajan Ranganathan, “LECTOR: A Technique for Leakage Reduction in CMOS Circuits”, IEEE Transactions

on Very Large Scale Integration (VLSI) Systems, vol. 12, no. 2, pp. 196-205, Feb. 2004

6. Lin Yuan and Gang Qu, “A Combined Gate Replacement and Input Vector Control Approach for Leakage Current Reduction”, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 14, no. 2, pp. 173-182, Feb. 2006

7. Kaushik Roy, Saibal Mukhopadhyay and Hamid Mahmoodi-Meimand, “Leakage Current Mechanisms and Leakage Reduction Techniques

in Deep-Submicrometer CMOS Circuits”, Proceedings of the IEEE, vol. 91, no. 2, pp. 305-327, Feb. 2003 8. M. Geetha Priya, K. Baskaran, D. Krishnaveni & S. Srinivasan, "A New Leakage Power Reduction Technique for CMOS VLSI Circuits",

Journal of Artificial Intelligence, vol.5, pp. 227-232, 2012

9. Yu Wang, Xiaoming Chen, Wenping Wang, Yu Cao, Yuan Xie and Huazhong Yang, “Leakage Power and Circuit Aging Cooptimization

69-72

by Gate Replacement Techniques”, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 19, no. 4, pp. 615-628, Apr. 2011

17.

Authors: Nandini Ammanagi, Rahul Khadilkar, Akash Harwani, Disha Budhlani, Disha Dembla

Paper Title: Comparison of the Performance of Microstrip Antenna at 2.4GHz Using Different Substrate

Materials

Abstract: This paper discusses the performance of various dielectric substrates, having dielectric constants

ranging from 2 to 5. These designs are basically rectangular micro strip patch antennas for wireless communication

resonating at 2.4 GHz. They are simulated using the evaluator's version of the software IE3D and their performances

are compared with respect to ‘return loss v/s frequency’ and ‘vswr v/s frequency’ parameters. The comparison is

made for four dielectric substrates: FR4, RO-3003, PTFE(Teflon) and Polyguide. Analysis of each is done and

compiled using MATLAB to show relative performance.

Keywords: Antenna, Dielectric substrate, IE3D, Microstrip, Rectangular Patch.

References: 1. C. A. Balanis, “Antenna Theory-Analysis and Design,” 2nd ed., J. Peters, John Wiley and Sons, pp. 728-730.

2. G. Kumar, K. P. Ray, “Broadband microstrip antennas”, Artech House, 2003.

3. N. Agarwal, D.C.Dhubkarya, R. Mittal,“ Designing \& Testing of Rectangular Micro strip antenna operating at 2.0 GHz using IE3D” ,

Global Journal of Researches in Engineering, Volume 11 Issue 1, Version 1.0 February 2011, Journal Publisher: Global Journals Inc.

(USA)

4. K.Praveen Kumar, K.Sanjeeva Rao ,V.Mallikarjuna Rao, et al. “The effect of dielectric permittivity on radiation characteristics of co-axially feed rectangular patch antenna: Design & Analysis”, International Journal of Advanced Research in Computer and Communication

Engineering Vol. 2, Issue 2, February 2013.

5. A. Khan,R Nema. "Analysis of Five Different Dielectric SubstratesOn Microstrip Patch Antenna", International Journal of Computer Applications (0975 – 8887), Volume 55, No.18, October 2012.

73-75

18.

Authors: Naser Hussein Judran, Ravi Jon

Paper Title: A Study on Carbon Nano Tube and Bucky Balls Membrane for Water Purification

Abstract: Carbon Nanotube are single sheets of graphite (called graphene) rolled into cylinders. The diameter of

the tubes is typically of nanometer dimensions, while the lengths are typically micrometers. In this paper we are

going Explore the property of Carbon Nanotube which is currently the focus of intense research. The Nanotube may

consist of one up to tens and hundreds of concentric shells of carbons with adjacent shells separation of 0.34 nm; we

are also going to explore the properties of carbon Nano tube through Raman Spectroscopy, and this paper review the

Bucky paper Membrane for water Filtration.

Keywords: Carbon Nanotube, Optical Properties, Bucky-paper, membrane; filtration method, Raman

Spectroscopy.

References: 1. Edison TA, US Patent 470’925 (1892).

2. Bacon R. Growth, structure and properties of carbon whiskers. J Appl Phys 1960; 31: 283-290.

3. Dresselhaus MS, Dresselhaus G, Sugihara K, Spain IL, and Goldberg HA. Graphite fibers and filaments. (Springer-Verlag, Berlin, 1988), Vol. 5 of Springer Series in Materials Science.

4. Oberlin A, Endo M, and Koyama T. Filamentous growth of carbon through benzene decomposition. J Crystal Growth1975; 32: 335-349.

5. Kroto HW, Heath JR, O’Brian SC, Curl RF, and Smalley RE. C60: Buckminsterfullerene. Nature 1985; 318: 162-163. 6. Dresselhaus MS, Dresselhaus G, Eklund PC. Science of fullerences and carbon nanotubes. Academic Press, San Diego, California,1996.

7. Smalley RE, Semiconductor cluster surface chemistry. DoD Workshop in Washington, DC (December 1990).

8. Dresselhaus MS, Dresselhaus G, and Eklund PC. Symmetry for lattice modes in C60 and alkali-metal-doped C60. Phys Rev B 45 1992; 9. Coleman Henry, Bryce Dorr, Jonathan A. Brant Separation and Purification Technology, Volume 100, (24 October 2012 )

Buckminsterfullerene (C60) nanoparticle fouling of microfiltration membranes operated in a cross-flow configuration

10. Iijima S. Helical microtubules of graphitic carbon. Nature 1991; 354: 56-58. 11. Iijima S and Ichihashi T. Single-shell carbon nanotubes of 1 nm diameter. Nature 1993; 363: 603.

12. Bethune DS, Kiang CH, de Vries MS, Gorman G, Savoy R, Vasquez J, and Beyers R. Cobalt- catalysed growth of carbon nanotubes with

single-atomic-layer walls. Nature 1993; 363:605. 13. Wildoer JWG, Venema LC, Rinzler AG, Smalley RE, Dekker C. Electronic structure of atomically resolved carbon nanotubes. Nature 1998;

391: 59-62.

14. Ajayan PM, Iijima S. Capillarity-induced filling of carbon nanotubes. Nature 1993; 361: 333. 15. Thess A, Lee R, Nikolaev P, Dai H, Petit P, Robert J, Xu C, et al. Crystalline ropes of metallic carbon nanotubes. Science 1996; 273: 483-

487.

16. Buseck PR, Tsipursky SJ, Hettich R. Fullerenes from the geological environment. Science 1992; 257: 215–217. 17. Saito R, Dresselhaus G, Dresselhaus MS. Physical properties of carbon nanotubes. Imperial College Press, London, 1998.

18. Harris PJF, Carbon nanotubes and related structures – New materials for the twenty-first century. Cambridge University Press, Cambridge,

UK, 1999. [19] Nanotube Modeler, JCrystalSoft 2004 – 2005, http://www.icrystal.com. 19. Qin LC, Zhao X, Hirahara K, Miyamoto Y, Ando Y, Iijima S. The smallest carbon nanotube, Nature 2000; 408: 50.

76-79

19.

Authors: P.Rajeswari, S.Pratheeba, S.R.Karthika

Paper Title: A Comprehensive Overview on Different Applications of Wireless Sensor Network

Abstract: The Wireless Sensor Network is built of "nodes" – from a few to several hundreds or even thousands,

where each node is connected to one (or sometimes several) sensors. Each such sensor network node has typically

several parts: a radio transceiver with an internal antenna or connection to an external antenna, a micro controller, an

electronic circuit for interfacing with the sensors and an energy source, usually a battery or an embedded form of

energy harvesting. A sensor node might vary in size. It detects things like temperature, sound, vibrations, pressure,

motion, or pollutants through autonomous sensors. They are currently being used for industries and civilian use such

as industrial process monitoring and control, machine health monitoring, monitoring of the environment, health care

applications, home automation, tracking and traffic control. More specific applications would be things like habitat

80-84

monitoring, tracking objects, detecting fires or landslides, and monitoring traffic. Generally a WSN would be

scattered in an area where its sensor nodes collect data.

Keywords: Applications of Wireless Sensor Network, Area Monitoring, Wireless Sensor Network.

References: 1. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6550437 2. D. J. Cook and S. K. Das, “Smart environments: technologies , protocols and applications,” New York: John Wiley, pp. 13-15, 2004.

3. K. Sohraby, D. Minoli, and T. Znati, “Wireless sensor networks: technology, protocols and applications,” New Jersey: John Wiley, pp. 38-

71, 2007. 4. http://www.memsnet.org/mems/what-is.html

5. F. L. LEWIS,"Wireless Sensor Networks"Associate Director for Research,Head, Advanced Controls, Sensors, and MEMS

Group,Automation and Robotics Research Institute The University of Texas at Arlington. 6. Eric Lee Eekhoff A,“Wireless sensor networks and personal area networks for data integration in a virtual reality environment ” submitted

to the graduate faculty in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE.

7. Theofanis P. L AMBROU ,PhD Thesis Proposal ,Supervisor: Prof. Christos G. PANAYIOTOU, ”Collaborative Area Monitoring Using Wireless Sensor Networks with Stationary and Mobile Nodes ”.

8. Alan Mainwaring -Intel Research Laboratory, Berkeley ,Joseph Polastre2 -2 EECS Department ,University of California at Berkeley ,David

Culler-College of the Atlantic Bar Harbor, Maine :”Wireless Sensor Networks for Habitat Monitoring ”. 9. J. G. T. Anderson. Pilot survey of mid-coast Maine seabird colonies: “an evaluation of techniques”. Bangor, ME, 1995. Report to the State of

Maine Dept. of Inland Fisheries and Wildlife.

10. http://www.eurekalert.org/pub_releases/2008-06/uoa-nws060408.php 11. J. Portilla, A. de Castro, E. de La Torre, and T. Riesgo, “A modular architecture for nodes in wireless sensor networks,” Journal of Universal

Computer Science, vol. 12, no. 3, pp. 328–339, 2006.

12. http://www.advanticsys.com/services/agricultural-environment- monitoring/ 13. J.D. Kenney, D.R. Poole, G.C. Willden, B.A. Abbott, A.P. Morris, R.N. McGinnis, and D.A. Ferrill, "Precise Positioning with Wireless

Sensor Nodes: Monitoring Natural Hazards in All Terrains", 2009 IEEE International Conference on Systems, Man, and Cybernetics, San

Antonio, TX, USA, Oct. 2009. 14. Ma, Y.; Richards, M.; Ghanem, M.; Guo, Y.; Hassard, J. (2008). "Air Pollution Monitoring and Mining Based on Sensor Grid in London".

Sensors 8 (6): 3601

15. T.L. Dinh, W. Hu, P. Sikka, P. Corke, L. Overs and S. Brosnan, "Design and Deployment of a Remote Robust Sensor Network: Experiences from an Outdoor Water Quality Monitoring Network", 2007 32nd IEEE Conference on Local Computer Networks

16. http://ciemcal.org/wireless-sensor-network-and-mobile-ad-hoc- network/

17. http://www.advanticsys.com/services/water-monitoring-equipment/ 18. http://www.enpicbcmed.eu/content/wireless-sensor-networks-accurate-continuous-monitoring-waterways-and-industrial-pipeline-ne.

19. http://www.nireas-iwrc.org/index.php?link=PP-leak_detection.php.

20. F. Viani, P. Rocca, M. Benedetti, G. Oliveri, A. Massa , "Electromagnetic passive localization and tracking of moving targets in a WSN-infrastructured environment " in Inverse Problems, vol. 26, (2010), p. 1-15. - DOI: 10.1088/0266-5611/26/7/074003

21. Surie, D., Laguionie, O., Pederson, T.: "Wireless Sensor Networking of Everyday Objects in a Smart Home Environment". In Proceedings of the 4th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Sydney, Australia, pp. 189-194,

(2008)

22. Yenumula B Reddy,Grambling State University,Grambling, LA 71245,”Survey in Wireless Sensor Network”. 23. http://ciemcal.org/wireless-sensor-network/

20.

Authors: Meera Treesa Mathews, Manju E.V

Paper Title: Extended Distributed RK- Secure Sum Protocol in Apriori Algorithm for Privacy Preserving

Abstract: Secure sum computation is a simple example of Secure Multi party Computation. This provide privacy

to data in case more than two parties are present, while finding combined results of individual data. Association rule

mining algorithms like Apriori are used for mining frequent items from database. In this paper we address secure

mining of frequent items from a horizontally partitioned data. It uses Apriori algorithm for mining frequent items

with the help of a Extended Distributed Rk- Secure Sum Protocol for privacy preserving

Keywords: Secure sum computation, secure multi party computation, Apriori, Extended Distributed Rk- secure

sum protocol, frequent items, Global support

References: 1. Jyotirmayee Rautaray, Raghavendra Kumar, “FP Tree Algorithm using Hybrid Secure Sum Protocol in Distributed Database”, International

Journal of Scientific & Engineering Research, Vol. 4, No. 3,march 2013, pp 1-5.

2. Jyotirmayee Rautaray, Raghavendra Kumar, “Distributed Rk- Secure sum Protocol for Privacy Preserving”, IOSR Journal of Computer

Engineering, Vol. 9, No. 1, January – February 2013, pp. 49 – 52 3. Priyanka Jangde, Gajendra Singh chandel, Durgesh Kumar Mishra, “Hybrid Technique for Secure Sum Protocol”, World of Computer

science and Information Technology Journal, Vol. 1, No. 5, 2011, pp 198 – 201.

4. Ms Shweta, Dr. Kanwal Garg, “Mining Efficient Association Rules through Apriori Algorithm Using Attributes and comparative analysis of various Association Rule Algorithms”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol.

3, No. 6, June 2013, pp. 306 – 312.

5. Sunita B. Aher, Lobo L.M.R.J, “ A Comparative Study of Association Rule Algorithms for Course Recommender System in E-learning”, International Journal of Computer Applications (0975 – 8887), vol . 39, No. 1, February 2012, pp. 48 – 52.

6. Rashid Sheikh, Beerendra Kumar, Durgesh Kumar Mishra,” Distributed k-Secure sum Protocol for secure Multi –Party Computations”,

Journal of Computing, Vol. 2, No. 3, March 2010, pp. 68 – 72.

7. Rashid Sheikh, Beerendra Kumar, Durgesh Kumar Mishra, ”Changing Neighbour k- Secure Sum Protocol for secure multi party

computation”, International Journal of Computer science And Information Security, Vol. 7, No. 1, 2010, pp. 239 – 243.

8. Rashid Sheikh, Beerendra Kumar, Durgesh Kumar Mishra,” A modified ck- Secure Sum Protocol for multi party computation”, Journal of Computing, Vol. 2, No.2, February 2010, pp. 62 – 66.

9. Yehuda Lindell, Benny Pinkas, “Secure Multiparty Computation for Privacy-Preserving Data Mining”, The Journal of Privacy and

Confidentiality, vol.1, No.1, 2009, pp. 59-98. 10. Rashid Sheikh , Beerendra Kumar, “Privacy Preserving K- Secure Sum Protocol”, International Journal of Computer science and

Information Security, Vol. 6, No. 2, 2009, pp. 184 – 188. 11. Murat Kantarcioglu, Chris Clifton, “Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data”, IEEE

Transactions on Knowledge And Data Engineering, Vol. 16, No. 9, September 2004

12. Chris Clifton, Murat Kantarcioglu, Jaideep Vaidya, Xiaodong Lin, Michael Y. Zhu, “Tools for Privacy Preserving Distributed Data

85-88

Mining”, SIGKDD Explorations, Newsletter, vol.4, no.2, ACM Press, 2002, pp.28-34. 13. M. J. Atallah and W. Du. “Secure Multiparty Computational Geometry,” In proceedings of Seventh International Workshop on Algorithms

and Data Structures(WADS2001). Providence, RhodeIsland, USA, 2001, pp. 165-179.

14. W. Du and M.J.Atallah, “Privacy-Preserving Statistical Analysis,” In proceedings of the 17th Annual Computer Security Applications Conference, New Orleans, Louisiana, USA, 2001, pp. 102-110.

15. Wenliang Du, Mikhail J. Atallah, “Secure MultiParty Computation Problems and Their Applications: A Review and Open Problems”, In

proceedings of new security paradigm workshop, Cloudcroft, New Maxico, USA, Sep. 11-13 2001, page 11-20. 16. Rakesh Agrawal, Ramakrishnan Srikant,”Fast algorithm for mining association rules”, Proceedings of the 20th VLDB Conference

Santiago,Chile, 1994.

17. Rakesh Agrawal, Tomasz Imielinski, Arun Swami, “Mining Association Rules between Sets of items in Large Databases”, Proceedings of the 1993 ACM SIGMOD conference Washington DC, USA, May 1993, pp. 1- 10.

18. Jiawie Han, Micheline Kamber, Jian Pie, “Data Mining Concepts and Techniques”, Morgan Kaufmann Publishing, Third edition, pp 248 –

253. 19. http://www.cs.sunysb.edu/~cse634/lecture_notes/ 07apriori.pdf accessed on date 02-02-2012.

21.

Authors: Vidya.M, Reshmi.S

Paper Title: Alleviating Energy Depletion Attacks in Wireless Sensor Networks

Abstract: Network survivability is the capacity of a network keeping connected under loss and intrusions, which

is a major concern to the design and design interpretation of wireless ad hoc sensor networks. Ad-hoc low power

wireless networks are in inquisition in both discerning and ubiquitous computing. The proposed method discusses

about energy draining attacks at the routing protocol layer, which drains battery power. A innovative approach for

routing protocols, affect from attack even those devised to be protected which is short of protection from these

attacks, which we call energy debilitating attacks, which enduringly disable networks by quickly draining nodes

battery power. These energy depletion attacks are not protocol specific but are disturbing and hard to notice, and are

easy to carry out using as few as one malicious insider sending only protocol compliant messages.

Keywords: Denial of service, security, routing, ad hoc networks, sensor networks, wireless networks.

References: 1. Eugene.Y.Vasserman, Nicholas Hopper, Vampire attacks Draining life from ad-hoc wireless sensor networks,IEEE volume 2 (2014).

2. Jae-Hwan Chang and Leandros Tassiulas,Maximum lifetime routing in wireless networks,IEEE/ACM Transactions on Networking 12 (2004), no.4

3. The network simulator — ns-2. http://www.isi.edu/nsnam/ns/

4. Tuomas Aura, Dos-resistant authentication with client puzzles, International workshop on security protocols, 2001. 5. John Bellardo and Stefan Savage, 802.11 denial-of-service attacks: real vulnerabilities and practical solutions, USENIX security, 2003.

6. Daniel Bernstein and Peter Schwabe, New AES software speed records, INDOCRYPT, 2008.

7. I.F. Blake, G. Seroussi, and N.P. Smart, Elliptic curves in cryptography, Vol. 265, Cambridge University Press, 1999. 8. Joppe W. Bos, Dag Arne Osvik, and Deian Stefan, Fast implementations of AES on various platforms, 2009.

9. Haowen Chan and Adrian Perrig, Security and privacy in sensor networks, Computer 36 (2003), no. 10.

89-91

22.

Authors: Dushyant Kumar Shukla, Munish Vashishtha

Paper Title: Noise Analysis of Common-Collector Amplifier using Stochastic Differential Equation

Abstract: In this paper, we analyse the effect of noise in a common-collector amplifier working at high

frequencies. Extrinsic noise is analyzed using time domain method employing techniques from stochastic calculus.

Stochastic differential equations are used to obtain autocorrelation functions of the output noise voltage and other

solution statistics like mean and variance. The analysis leads to important design implications for improved noise

characteristics of the common-collector amplifier.

Keywords: common-collector amplifier, noise, stochastic differential equation, mean and variance.

References: 1. Tarun Kumar Rawat,Abhirup Lahiri, and Ashish Gupta, Noise Analysis of Single-Ended Input Differential Amplifier using Stochastic

Differential Equation, International Journal of Computer, Information, and System Science, and Engineering, pp.191-196,2008. 2. Wei Yu and Bosco H. Lueng, Noise Analysis for Sampling Mixers using Differential Equations, IEEE Tran. On Circuit and Systems-II:

Analog and Digital Signal Processing, Vol. 46, No. 6, June 1999.

3. A. Demir, E.W.Y. Liu, and L.S. Vincentelli, Time Domain Non Monte Carlo Method noise simulation for non linear dynamic circuit with arbitrary excitation, IEEE Tran. Computer Aided Design, Vol. 15, pp.493-505, May 1996.

4. L. Arnold, Stochastic Differential Equation, John Wiley, NewYork.

5. Jacob Millman and Christos C. Halkias, Integrated Electronics, Tata McGraw Hill.

92-94

23.

Authors: Giriraj Sharma, Ashish Kumar Bansal

Paper Title: A Practical Approach to Improve GSM Network Quality by RF Optimization

Abstract: All GSM service provider uses KPI to monitor their QOS performance. Report generated from OMCR

terminal & customer feedback are considered in further network improvement activity. RF optimization and drive

test is the tool to keep continue watch on network QOS .In this paper some practical cases and solutions are adopted

to improve the network QOS during drive test & post processing. Major QOS parameter Handover, call drop,

congestion, interference reasons and solutions are discussed. drive test tool Ascom TEMS 10.2.1 is used to perform

drive test. if optimization done continuously it will attract more and more customers due to service satisfaction.

Keywords: GSM,RF optimization ,Drivetest, TEMS drive test tool, BSC,BTS,TRX,QOS

References: 1. TEMS investigation user’s manual, 11.0, Ascom- 2010.

2. Bilal Haider, M Zafrullah Khan, M.K.Islam: Radio Frequency Optimization and QOS in operational GSM network.

95-99

3. Syed Imran Basha, Idrish Shaik: Reducing Handover Failure Rate by RF Optimization 4. Wireless Communications, Principles and Practice, 2nd edition, Theodore S. Rappaport, Pearson publications.

5. [2] ITU-T recommendation G.1000 (2001), Communication quality ofService: A framework and definition.

24.

Authors: Mohammad Ali Adelian

Paper Title: Improvement of Substation Earthing

Abstract: Designing a proper substation grounding system is quite complicated. Many parameters affect its

design. In order for a grounding design to be safe, it needs to provide a way to carry the electric currents into the

ground under both normal and faulted conditions. Also, it must provide assurance that a person in the vicinity would

not be endangered. The grounding portion of substation design will be explored. In order to properly plan and design

the grounding grid, calculations of the following will be done: maximum fault current, grid resistance, grid current,

safe touch and step voltages, ground potential rise, as well as expected touch and step voltage levels. Background

information and guidelines to design a substation grounding grid will be provided. A set of equations will be

presented to calculate whether the design is safe, and finally, an example will be provided that can be used as a

template.

Keywords: Safety, reliability Step Voltage, Touch Voltage.

References: 1. Design Guide for Rural Substations”, Rural Utilities Service. United States Department of Agriculture. June 2001. 2. Gonen, Turan. “Electric Power Distribution System Engineering.” CRC Press. 2008.

3. Gonen, Turan. “Electric Power Transmission System Engineering: Analysis and Design.” CRC Press. 2009.

4. "IEEE 80-2000 IEEE Guide for Safety in AC Substation Grounding." 5. "IEEE 81-1983 IEEE Guide for Measuring Earth Resistivity, Ground Impedance, and Earth Surface Potentials of a Ground System.”

6. Markovic, D. Miroslav. “Grounding Grid Design in Electric Power Systems.” TESLA Institute, 1994.

7. NFPA 70-2008. National Electrical Code. 2008.

100-104

25.

Authors: Ranjit Kumar Bindal

Paper Title: A Review of Benefits of FACTS Devices in Power System

Abstract: In developing countries, a pressure associated with economical and environmental constraints has

forced the power utilities to meet the future demand by fully utilizing the existing resource of transmission facilities

without building new lines. Flexible alternating current transmission systems (FACTS) devices are used to control

the phase angle, voltage and impedance of high voltage AC lines. By using FACTS devices maximum benefits of

transmission system can be managed i.e. utilization of existing transmission assets; increased transmission system

availability and enabling environmental benefits. This paper presents different types of FACTS devices and their

benefits for transmission in electrical power system.

Keywords: Transmission system, FACTS Devices, Benefits these devices.

References: 1. J.J Paserba, “H ow FACTS controllers benefits AC transmission system,” IEEE transmission on Power Engineering Society, Vol.3, sep-

2003,pp 949-956.

2. V.K.Candrakar, M.M.Missal, V.P.Rajderkar, S.N.Durve, “Flexible Alternating Current Transmission System (FACTS) for cost effective

and reliable transmission of electrical energy,” National Power engineering conference (NPEC-07) ,June-2007. 3. A.A Edris, R Aapa, M H Baker, L Bohman, K Clark, “ Proposed terms and definitions for flexible ac transmission system (FACTS)”, IEEE

Tran. on power delivery Vol. 12, No.4, Oct 1997.

4. N.G. Hingorani , L. Gyugyi, “ Understanding FACTS : Concepts and Technology of Flexible AC Transmission systems, ” IEEE Power Engineering Society, IEEE press, Delhi 2001.

5. ER.Moal Matru , Rajiv K. verma, “tyristor Based FACTS controllers for electrical transmission system ,” IEEE press, wiley Inter science

publication , USA

105-108

26.

Authors: G.Gokilakrishnan, R.Rajesh, R.Sureshkumar, R.Adithya

Paper Title: An Innovative Cost Effective Slipper for Elderly Persons

Abstract: This invention of Safety Slippers relates to the safety measures taken on behalf of elderly persons at

times of emergency. This idea deals with the integration of program with sensor, transmitter and receiver in a normal

slipper to identify the status of the program installed and take the appropriate action in time of need. This idea works

on the principle of application of force which is the body weight of the user on the slipper. The concept involves the

sensing of the force applied by the user through the sensor placed inside the slipper. The signal thus sensed is passed

on to the receiver module through the transmitting module. As long as the signal is sensed continuously, the receiver

module keeps the GSM module in deactivated mode. If the signal from the transmitting module is interrupted more

than the set time limit, the receiver module activates the GSM module. The GSM module is incorporated with

necessary text message or call options to a list of contacts to be sent. When the GSM module activates it alerts the

corresponding contacts automatically without the intervention of human regarding the emergency alert.

Keywords: safety; slippers; sensor; transmitter; receiver; GSM module

References: 1. Ch.Naga KK, Raghu babu YV, A.Gamya, P.Jainath, M. Vijay. Design and development of activation and controlling of home automation

system via SMS through microcontroller. International Journal of Engineering Research and Applications ISSN: 2248-9622 Vol. 2, Issue 2,Mar-Apr 2012, pp.1349-1352

2. Sadeque Reza Khan, Ahmed Al Mansur, Alvir Kabir, Shahid Jaman, Nahian Chowdhury. Design and Implementation of Low Cost Home

Security System using GSM Network - International Journal of Scientific & Engineering Research Volume 3, Issue 3, March -2012. ISSN 2229-5518

109-112

3. Gokilakrishnan G, Sureshkumar R, Rajesh R. Safety Slippers. Official Journal of Patent Office, Government of India, Issue No 43/ 2013: 27413: Application Number: 4569/ CHE/2013.

4. Sathya Narayanan, Gayathri S. Design of wireless home automation and security system using PIC microcontroller. International journal of

computer applications in engineering sciences - Volume iii, special issue, August 2013 - ISSN: 2231-4946 5. www.radiolocman.com

6. www.next.gr

7. www.open-electronics.org

27.

Authors: Ali Fadhil Naser

Paper Title: Optimization of oblique Angle Design of Abutments and piers, and piers Shape of Continuous

Prestressed Concrete Box Girder Bridges: Static Analysis part 1

Abstract: Skewed bridges are normally used to cross roadways, waterways, or railways that are not perpendicular

to the bridge structure at the intersection. It is required when it is often not possible to arrange that a bridge spans

square to the feature that it crosses, particularly where it is important to maintain a relatively straight alignment of a

roadway above or below the bridge. The pier shape has important effect on the structural performance of the bridge

structure according to the location conditions. The main aims of this study are to select the optimal design of piers

shape and skew angles in the prestressed box girder bridge, to study the effects of pier shape and skew angles on the

static structural responses. There are 120 bridge model are used in this study. FEM of SAP2000 Ver. 14.0.2 is used in

the analysis. The results of structural analysis show that the pier shape and skew angle has significant effects on the

static responses of the bridge structure. For vertical displacement, the optimal models are skew angle of bridge

structure is range from 36 degree to 54 degree and the solid rectangular pier (skew abutments and skew piers). The

models of two square piers (skew abutments and without skew piers) and 48 skew angle is the optimal models for

bending moment. For tensile stress, the model of skew angle 48 degree and the model of solid rectangular pier (skew

abutments and skew piers) is the optimal model. It can be concluded that the skewed models gives good results than

straight model.

Keywords: bridge, box girder, bending moment, vertical displacement.

References: 1. F. N. Ali and W. Zonglin, 2011, “Experimental Inspection of Damage and Performance Evaluation after Repair and Strengthening of

Jiamusi Highway Prestressed Concrete Bridge in China“, World Academy of Science, Engineering and Technology,V. 73, 2011, pp: 195-

201. 2. State Department of Transportation, “Washington State Bridge Inspection Manual”, Technical Manual, Washington, USA, 2010.

3. W. N. Al-Rifaie, and A. S. Kareem, “Bridges”, first edition, University of Technology, Baghdad, Iraq, 1986, pp 5-8.

4. G. Fu and P. Chun, “Skewed Highway Bridges”, Final Report to Michigan Department of Transportation, Center for Advanced Bridge

Engineering Department of Civil and Environmental Engineering, Wayne State University, Detroit, Michigan, USA. , 2013.

5. SteelConstruction.info, “The free encyclopedia for UK steel construction information”, 2014,

http://www.steelconstruction.info/Skew_bridges. 6. NCHRP, “SHEAR IN Skewed Multi-Beam Bridges”, Final Report for National Cooperative Highway Research Program Transportation

Research Board National Research Council, USA., 2002.

7. X.H. He, X.W. Sheng, A. Scanlon , D.G. Linzell, X.D. Yu, “Skewed concrete box girder bridge static and dynamic testing and analysis”, Engineering Structures, V. 39, 2012), pp:38–49.

8. S. I. Ibrahim, “Effect of Skew Angle on Behavior of Simply Supported R. C. T-Beam Bridge Decks”, ARPN Journal of Engineering and

Applied Sciences, V. 6, No. 8, 2011, pp:1-14. 9. A. Dhar, M. Mazumder, M. Chowdhury and S. Karmakar, “Effect of Skew Angle on Longitudinal Girder (Support Shear, Moment,

Torsion) and Deck Slab of an IRC Skew Bridge, The Indian Concrete Journal, 2013, pp:46-52.

10. V. Khatri, P. R. Maiti, P. K. Singh and A. Kar, “Analysis of Skew Bridges Using Computational Methods”, International Journal of Computational Engineering V. 2, No.3, 2012, pp:628-636.

11. F. B. Diab, M. Mabsoutb, and K. Tarhinic,” Influence of Skew Angle on Live Load Moments in Steel Girder Bridges, Bridge Structures, V.

7, 2011, pp: 151–163. 12. C. C. Fu, L. Tim and T. Getaneh, “Theoretical and Field Experimental Evaluation of Skewed Modular Slab Bridges”, State Highway

Administration Research Report, Report No.MD-12-SP109B4N, Maryland State Highway Administration. 2012.

13. K. M. Kassahun, “Finite Element Modeling of Skew Slab-Girder Bridges”, Thesis Submitted in partial fulfillment of the requirements for the degree Master of Science Faculty of Civil Engineering and Geosciences Technical University of Delft, 2010.

14. http://en.wikipedia.org/wiki/Vertical_displacement, 2014.

15. V. Samuel, K. Gaston, B. David, C. Denis, and I. Daniele, “Vertical Deflection of a Prestressed Concrete Bridge Obtained Using Deformation Sensor and Inclinometer Measurement”, ACI Structural Journal, V.95, No.5, 1998, pp:518-526.

16. http://www.learneasy.info/MDME/MEMmods/MEM30006A/Bending_Moment/Bending_Moment.html, 2014.

17. http://en.wikipedia.org/wiki/Bending_moment., 2014. 18. http://en.wikipedia.org/wiki/Shear_force, 2014.

113-121

28.

Authors: Ashish B Chaudhari, S. Jebarani Evangeline

Paper Title: A Space Vector Pulse Width Modulation Technique to Reduce the Effects of Voltage Unbalances

Abstract: A space vector pulse width modulation (SVPWM) technique is a special technique to determine the

switching sequence of the semiconductor switches of the inverter. SVPWM provides more efficient use of the dc bus

voltage,in comparison with the direct sinusoidal modulation technique.In this paper,switching pulses for three phase

inverter has been carried out by using differentiation of alpha voltage vector.To obtain the phase angle,three phase

voltages has to be transformed into voltage vectors alpha and beta using Clark’s transformation. In this paper,voltage

vector beta has been carried out by differentiating alpha voltage vector using trigonometric relation between alpha

and beta vector.The interaction between two voltage vectors has been reduced,which will give better result compare

to conventional SVM method for unbalanced voltage conditions.Different unbalances has been introduced for

analysis.MATLAB software has been used for simulation.

Keywords: Three phase Inverter,Space Vector Pulse Width Modulation,Clark’s transformation,derivation of alpha

voltage vector,voltage unbalances.

122-127

References: 1. Lutfu Saribulut,Mehmet Tumay, “Robust space vector modulation technique for unbalance voltage disturbances”,Elsevier journal,Electric

power Systems Research 80(2010) 1364-1374.

2. Joseph P John,Dr. S. Suresh Kumar, Jaya B,“Space vector modulation based field oriented control scheme for brushless DC

motor”,,proceedings of ICETECT 2011

3. K.Kishore Reddy,K.Vinoth Kumar,P.Ponrajan,S.Ramsankar,“Diode clamped inverter for SVPWM fed induction motor,proceedings of

APECT’11 March 2011,FX EC,Tvl. 4. Gupta A.K,,A.M. Khambadkone.(2006) “A space vector PWM scheme for multilevel inverters based on two-level space vector PWM”,

IEEE Transactions on Industrial Electronics 53 ,1631–1639

5. Celanovic N.(2000) “Space vector modulation and control of multilevel converters”, Faculty of the Virginia Polytechnic Institute and State University, PhD. Thesis.

6. Fitzer C., M. Barnes, P. Green. (2004) “Voltage sag detection technique for a dynamic voltage restorer”,IEEE Transactions on Industry

Applications 40,203–212. 7. Mondal S.K.,B.K. Bose, V. Oleschuk, J.O.P. Pinto. (2003) “Space vector pulse width modulation of three-level inverter extending

operation into over modulation region”, IEEE Transactions on Power Electronics 18, 604–611

8. Mondal S.K., J.O.P. Pinto, B.K. Bose. (2002) “A neural-network based space-vector PWM controller for a three-level voltage-fed inverter induction motor drive”, IEEE Transactions on Power Electronics 38, 660–669.

9. Pinheiro H., F. Botteron, C. Rech, L. Schuch, R.F. Camargo, H.L. Hey, H.A. Grundling, J.R. Pinheiro.(2002)“Space vector modulation for

voltage-source inverters:a unified approach”, Industrial Electronics Society 1 ,23–29. 10. Rodriguez J, J.S. Lai, F.Z. Peng, (2002) “Multilevel inverters: a survey of topologies, controls and applications”,IEEE Transactions on

Industrial Electronics 49, 724–738.

11. Sani A.M.(2007) “Advanced modulation techniques for power converters”, The University of Manitoba, Master Thesis. 12. Seok S.H., P.H. Gyu, N. Kwanghee(1999) “An instantaneous phase angle detection algorithm under unbalanced line voltage

condition”,Power Electronics Specialists Conference 1, 533–537.

29.

Authors: Amir Aliabadian

Paper Title: A Robust Clustering Approach Based on KNN and Modified C-Means Algorithm

Abstract: Cluster analysis is used for clustering a data set into groups of similar individuals. It is an approach

towards to unsupervised learning and is one of the major techniques in pattern recognition.FCM algorithm needs the

number of classes and initial values of center for each cluster. These values are determined randomly, so it may cause

target function converges to several local center. so many iterative stages are needed, until FCM can reach to global

center for each cluster. In this paper, we suggest robust hybrid algorithm in which, we have real unsupervised

learning algorithm, no need to initial center value and the number of clusters. The First layer in this algorithm finds

initial clustering center by K-nearest neighbor (K-NN) rules based on unsupervised learning approach. In the second

layer, we applied FCM only one time for having optimal clustering. It is done by means of Fuzzy clustering

validation criterion, unlike FCM that needs iterative process. We applied new algorithm to several set of standard

databases (IRIS).results show that this algorithm is more accurate than FCM both in estimation of optimal number of

clusters and correctness of devotion of data to their real clusters.

Keywords: Cluster analysis. FCM algorithm. K-nearest neighbor. target function.

References: 1. Kuo-Lung Wu, Miin-Shen Yang - Alternative c-means clustering algorithms - Pattern Recognition35 (2002) 2267 – 2278.

2. Dae-Won Kima, Kwang H. Lee, Doheon Lee, - On cluster validity index for estimation of the optimalnumber of fuzzy clusters - Pattern

Recognition 37 (2004) 2009 – 2025. 3. Oleg S. Pianykh - Analytically tractable case of fuzzy c-means clustering - Pattern Recognition 39(2006) 35 – 46

4. Luis Rueda, Yuanquan Zhang - Geometric visualization of clusters obtained from fuzzy clusteringalgorithms - Pattern Recognition 39

(2006) 1415 – 1429 5. Carl G. Looney - Interactive clustering and merging with a new fuzzy expected value –PatternRecognition 35 (2005) 2413 – 2423

6. WitoldPedrycz, George Vukovich - Fuzzy clustering with supervision - Pattern Recognition 37(2004) 1339 – 1349

7. Haojun Sun , Shengrui Wang, Qingshan Jiang - FCM-Based Model Selection Algorithms forDetermining the Number of Clusters - Pattern

Recognition 37 (2004) 2027 – 2037

8. Nabil Belacel, Pierre Hansen, NenadMladenovic - FuzzyJ-Means: a new heuristic for fuzzyclustering - Pattern Recognition 35 (2002) 2193 – 2200

9. WeilingCai, Songcan Chen, Daoqiang Zhang - Fast and robust fuzzy c-means clustering algorithmsincorporating local information for

image segmentation - Pattern Recognition 40 (2007) 825 – 838 10. Chien-Hsing Chou, Chin-Chin Lin,Ying-Ho Liu, Fu Chang – A prototype classification method andits use in a hybrid solution for

multiclass pattern recognition - Pattern Recognition 39 (2006) 624 – 634

11. N. Zahid, M. Limouri, A. Essaid - A new cluster-validity for fuzzy clustering - Pattern Recognition32 (1999) 1089}1097 12. Mario G.C.A. Cimino, Beatrice Lazzerini, Francesco Marcelloni – A novel approach to fuzzyclustering based on a dissimilarity relation

extracted from data using a TS system - Pattern Recognition39 (2006) 2077 – 2091

13. Michel MeH nard, Christophe Demko, Pierre Loonis - The fuzzy c-means: solving the ambiguityrejection in clustering - Pattern Recognition 33 (2000) 1219}1237

14. Malay K. Pakhira, SanghamitraBandyopadhyay, UjjwalMaulik - Validity index for crisp and fuzzy clusters - Pattern Recognition 37 (2004)

487 – 501 15. Wuhan, Hubei, China ",A Modified FCM Algorithm for MRI Brain Image Segmentation," 2008 International Seminar on Future Bio

Medical Information Engineering, December18, 2008

128-132

30.

Authors: N.Rajasekhar, T.V.Rajini Kanth

Paper Title: Weather Analysis of Guntur District of Andhra Region using Hybrid SVM Data Mining Techniques

Abstract: In the recent years, weather prediction has drawn much attention for research community because it

helps in safeguarding human life and their wealth. Apart from that, it is useful in effective prediction of natural

calamities, agricultural yield growth, air traffic control, marine navigation, forests growth & military purposes.

Literature studies shows that Machine Learning Algorithms proved to be good than the existing techniques /

methodologies/traditional statistical methods. Hence development of new Hybrid SVM (Support vector machines)

model is required for effective weather prediction by analyzing the given weather data and to recognize the patterns

133-136

existing in it. SVM comes under the set of supervised learning methods for classifications & regression. It will be

yielding good results in predicting the weather than the existing machine learning programming techniques. In this

paper, Guntur district weather data sets were considered for analysis using the hybrid SVM data mining techniques.

Keywords: weather prediction, Machine learning, Data mining techniques, Hybrid SVM.

References: 1. http://www.timeanddate.com/weather/forecast-accuracy-time.html 2. http://en.wikipedia.org/wiki/Weather_forecasting

3. Folorunsho Olaiya, Application of Data Mining Techniques inWeather Prediction and Climate Change Studies, I.J. InformationEngineering

and Electronic Business, 2012, 1, 51-59, Published OnlineFebruary 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijieeb.2012.01.07

4. Dr. M.H.Dunham, Companion slides for the text, “Data Mining,Introductory and Advanced Topics”, Prentice Hall, 2002. 5. Y.Radhika and M.Shashi, “Atmospheric Temperature Predictionusing Support Vector Machines” International Journal of ComputerTheory

and Engineering, Vol. 1, No. 1, April 2009 1793-8201

6. Dr.T. V. Rajini Kanth, Ananthoju Vijay Kumar, Estimation of theInfluence of Fertilizer Nutrients Consumption on the Wheat Crop yield in India- a Data mining Approach, 30 Dec 2013, Volume 3, Issue 2, Pg.No:316-320, ISSN: 2249-8958 (Online).

7. Dr.T. V. Rajini Kanth, Ananthoju Vijay Kumar, A Data Mining Approach for the Estimation of Climate Change on the Jowar Crop Yield in

India, 25Dec2013,Volume 2 Issue 2, Pg.No:16-20, ISSN: 2319-6378 (Online). 8. A. Vijay Kumar, Dr. T. V. Rajini Kanth “Estimation of the Influential Factors of rice yield in India” 2nd International Conference on

Advanced Computing methodologies ICACM-2013, 02-03 Aug 2013, Elsevier Publications, Pg. No: 459-465, ISBN No: 978-93-35107-14-

95. 9. Dr.David, B.Stephenson, Data analysis methods in weather and Limate research Department of Meteorology University of Reading, July,20,

2005 ,http://www.met.rdg.ac.uk /cag/courses/

31.

Authors: Hasan Iqbal, Divendu Mishra, Anchal Ojha, Arun Yadav, Ravi Kumar Srivastava, Satish Kumar

Dwivedi

Paper Title: Brick Lifting Machine

Abstract: As we can see that during any type of construction work there is a need to carry the bricks from one

floor to the other which is done manually by the workers because of which they often get injured and it also

consumes a lot of precious time and in turn increases the labour cost, So in order to tackle with this problem with the

help of mechanical engineering we had proposed to design a brick lifting machine which can lift up to 50 bricks at a

time we had also focused on minimum power consumption and the efficiency so that in minimum power

consumption maximum no. of bricks can be lifted. The key points in the designing of the lift is are factor of safety

and the counterweight, there are many else technical parameters on which designing of lift depends such as Rate

load, rated speed, Height of travel, the number and location of stops, type of drive etc. The motor which will be used

for lifting the load will be D.C series motor and the type of drive is gearless traction drive. The gearless traction drive

is preferred over geared traction drive because it provides higher efficiency.

Keywords: D.C.

References: 1. Aberkom- Results of experimental work on traction drives, Elevator technology 4 (Proceedings of ELEVCON 92) Amsterdam 1992

2. Janovysky L – Elevator mechanical design Elis horwood ltd.

3. Thiemann, H. (1979) Elevators, Veb Verlag Technik, Berlin, (in German). 4. Philips R.S Electric lifts pitman publishing , London 1973

5. Strakosch, G Vertical transportation elevators and escalators 2nd edition John Wiley and sons, new York 1983.

137-142

32.

Authors: Ruchi Sharma, Aditi Gupta

Paper Title: Differentiation of Oral Streptococcal Species by Haemolysis in Blood Agar Medium in Vitro

Abstract: Pathogenic bacteria also cause infections such as tetanus, typhoid fever, diphtheria, syphilis, and leprosy.

Blood agar medium contain a typical nutrient growth medium enriched with 5% sheep blood. It is useful for

encouraging growth of fastidious organisms. The Three Types of Lytic Activities seen on the plate are- clear zone

around bacterial growth -RBC hemolyzed completely (Beta-hemolysis, pathogenic); green zone around growth -RBC

partially hemolyzed (Alpha-hemolysis); no change around growth -RBC is not hemolyzed (Gamma-hemolysis or no

hemolysis). The discrimination of oral bacteria specifically Streptococcal species can be done by haemolysis tests

using blood agar medium. Other than ultramicroscopic and morphological studies this experiment also conveys the

species differentiation due to its lytic activity. Thus, blood agar medium can be a useful medium for pathogenic

bacterial survey and investigation. The present review has proved the importance of blood agar utilization in

diagnostics and disease analysis.

Keywords: Bacteria,Streptococcus, Blood, Agar, Haemolysis

References: 1. Kumar, Vinay; Abbas, Abul K.; Fausto, Nelson; & Mitchell, Richard N. (2007). Robbins Basic Pathology (8th ed.). Saunders Elsevier. pp.

843 ISBN 978-1-4160-2973-1

2. Ray, C. George; Ryan, Kenneth J.; Kenneth, Ryan (July 2004). Sherris Medical Microbiology: An Introduction to Infectious Diseases (4th ed.). McGraw Hill. p. 237. ISBN 978-0-8385-8529-0. LCCN 2003054180. OCLC 52358530.

3. Rickard A H (2008). "Cell-cell Communication in Oral Microbial Communities". Molecular Oral Microbiology. Caister Academic Press.

ISBN 978-1-904455-24-0. 4. Rogers A H (editor). (2008). Molecular Oral Microbiology. Caister Academic Press. ISBN 978-1-904455-24-0.

5. Shaikh N, Leonard E, Martin JM (September 2010). "Prevalence of streptococcal pharyngitis and streptococcal carriage in children: a meta-

analysis". Pediatrics 126 (3): e557–64. doi:10.1542/peds.2009-2648. PMID 20696723 6. HW; Gerber, MA; Kaplan, EL; Lee, G; Martin, JM; Van Beneden, C (Sep 9, 2012). "Clinical Practice Guideline for the Diagnosis and

Management of Group A Streptococcal Pharyngitis: 2012 Update by the Infectious Diseases Society of America.". Clinical infectious

143-144

diseases : an official publication of the Infectious Diseases Society of America 55 (10): e86–102. doi:10.1093/cid/cis629. PMID 22965026. 7. Hahn RG, Knox LM, Forman TA (May 2005). "Evaluation of poststreptococcal illness". Am Fam Physician 71 (10): 1949–54. PMID

15926411.

8. Baltimore RS (February 2010). "Re-evaluation of antibiotic treatment of streptococcal pharyngitis". Curr. Opin. Pediatr. 22 (1): 77–82. 9. A. Wayne, 2007, Clinical Laboratory Standards Institute. Principles and procedures for blood cultures; Approved Guideline. CLSI

document M47-PA: Clinical and Laboratory Standards Institute, 2007

10. Baron EJ, Weinstein MP, Dunne WMJ, Yagupsky P, Welch DF, Wilson DM, eds. Cumitech 1C, blood cultures IV. Washington, DC:ASM Press, 2005

33.

Authors: M. Sai Sarath Kumar, M. Aarthy

Paper Title: A 2.8 GHz Low Power High Tuning Voltage Controlled Ring Oscillator

Abstract: This work describes a two-stage CMOS Voltage Ring Oscillator (VCRO) using differential delay cells

are analyzed. The main aim of the paper is to increase the tuning range of the circuit and obtain a good phase noise at

the cost of design complexity and power consumption. Two-stage VCRO implemented in 90 nm Technology realizes

a tuning range of 53.40% and a phase noise of -156.328 dBc/Hz for a power consumption of 9.85mW. The phase

noise of the VCRO is bettered by cascading more number of stages to trade off power consumption A four-stage

VCRO is implemented and achieved a tuning range of 62.15% and a phase noise of -116.608 dBc/Hz. However the

power consumption of the circuit increased to 16.45mW.

Keywords: Voltage Ring Oscillator, Phase Noise, Tuning Range

References: 1. “A 1.4GHz CMOS Low-Phase Noise Voltage - Controlled Ring Oscillator”, Ahmad Akmal Abd Ghani and Azilah Saparon, The 5th Student

Conference on Research and Development –SCOReD 2007, 11-12 December 2007, Malaysia.

2. “A 900-MHz CMOS Low-Phase-Noise Voltage-Controlled Ring Oscillator”, William Shing Tak Yan and Howard Cam Luong, , IEEE Transactions Circuits and Systems—II:Analog and Digital Signal Processing, VOL. 48, NO. 2,February 2001.

3. B. Fahs, W. Y. Ali-Ahmad, and P. Gamand, “A twostage ring oscillator in 0.13-μm CMOS for UWB impulse radio,” IEEE Trans. Microw.

Theory Tech.,vol. 57, no. 5, pp.1074–1082, May 2009. 4. Y. A. Eken and J. P. Uyemura, “A 5.9-GHz voltagecontrolled ring oscillator in 0.18-μm CMOS,” IEEE J. Solid-State Circuits, vol. 39, no. 1,

pp. 230–233, Jan. 2004.

5. Changzhi Li, and Jenshan Lin, ‘’A 1–9 GHz Linear Wide-Tuning-Range Quadrature Ring Oscillator in 130 nm CMOS for Non-Contact Vital Sign Radar Application, 2009”.IEEE Microwave and wireless components Letters, VOL. 20,NO. 1, January 2010.

6. B. Razavi, “Design of Analog CMOS integrated circuits,” McGraw Hill, 2001.

145-147

34.

Authors: Miloni Ganatra, Ashwin Patani

Paper Title: Time and Energy Optimizing Signature Indexing Technique Perform and Implementation by VHDL

Abstract: The periodic broadcasting of frequently requested data can The periodic broadcasting of frequently

requested data can reduce the workload of uplink channels and improve data access for users in a wireless network.

Since portable devices have limited energy capacities associated with their relies on battery power, it is important to

minimize the time and energy spent on accessing the required data from the broadcasted data. The indexing in the

broadcast data plays an important role in this problem. This research intends to study the indexing technique that is

used to save the power and to minimize the access time. The simple signature technique to index data is one of the

simplest ways to optimize these factors. The VHDL implementation of simple signature model presented here is real

time.

Keywords: Mobile computing, mobile client, broadcast, signature indexing.

References: 1. [Acharya S.,Alonso R., Franklin M and Zdonik S.,”Broadcast Disc: Data Management for Asymmetric Communication Environments”,In

Preceeding of ACM sigmod,pp 199-210.1995

2. Serfert A.and Hung J. “ FlexInd: A Flexible and Parametrised Air Indexing Scheme of Data Broadcast System” EDBT 2006 LNCS 3896

pp 902-920 (2006). 3. T. Imielinski, S. Viswanathan, and B. R. Badrinath. Energy efficiency indexing on air. In Proceedings of the International Conference on

SIGMOD, pages 25–36, 1994.

4. Imielinski T., Viswanathan S. and Badrinath B. R., “Data on Air: Organization and Access”, IEEE Transactions on Knowledge and Data Engineering, 9(3): 353-371, 1997.

5. Lee, D.K., Xu, J., Zheng, B. and Lee, W-C, “Data Management in Location-Dependent Information Services”, IEEE Pervasive Computing,

2(3):65-72, July-Sept, 2002. 6. Amermend, D., Aristugi, M. “An Index Allocation Method for Data Access over Multiple Wireless Broadcast Channel” IPSJ Digital

Courier, Vol. 2, 852 – 862, 2006.

7. Lee G., Chen e, and Lo S-C, “Broadcast Data Allocation for Efficient Access on Multiple Data Items in Mobile Environments”, Mobile Networks and Applications, 8, 365- 375, 2003.

8. Hu Q., Lee W. C. and Lee D. L. “Indexing Techniques for Wireless Data Broadcast under Data Clustering and Scheduling” CIKM ’99, 1

l/99 Kansas City, MO, USA (1996).

148-151

35.

Authors: S.Adebayo Daramola, Olujimi Ajayi, Tiwalade Odu

Paper Title: Robust Palm-print Feature for Human Identification

Abstract: Palm-print is a unique biometric trait commonly uses to distinguish people. Identification of people with

aid of machine is needed to solve insecurity challenges in our society. Human palm-print is a good raw material for

machine based identification systems. These systems require strong predominate feature from palm-print for

successful operation. In this work, a discriminate feature that can be used to differentiate people accurately is

extracted from palm-print image. Edge detected palm-print image is sliced into smaller image blocks through centre

points thereafter robust feature vector is generated from these smaller image blocks. The new feature was

experimental using feature plot and it is shown clearly that this feature will deliver excellent classification result.

152-155

Keywords: Centre points, City block distance, Image blocks, Palm-print.

References: 1. M. Nageshkumar., P.K Mahesh. and M.N. Shanmukha Swamy, “An Efficient Secure Multimodal Biometric Fusion Using Palmprint and

Face Image”, International Journal of Computer Science Issues, Vol.2, 2009, pp49-53,

2. S. Zokaee, K. Faez, “Human Identification Based on Electrocardiogram and Palmprint”, International Journal of Electrical and Computer Engineering, Vol.2, No.2, 2012, pp. 261-266.

3. D. Y Liliana, E. T Utaminingsih, “The Combination of Palm print and Hand Geometry for Biometrics Palm Recognition”, International

Journal of Video & Image Processing and Network Security. Vol.12, No.1, 2012, pp.1-5. 4. S. Kumra. T. Rao, “A Novel Design for a Palm Prints Enabled Biometric System”, IOSR Journal of Computer Engineering (IOSRJCE)

Volume 7, Issue 3, 2012, pp. 1-8.

5. W. K Kong, D. Zhang., W. Li, “Palmprint Feature Extraction using 2-D Gabor Filters”, The Journal of Pattern Recognition Society”, Vol. 36, 2003, pp.2339 – 2347.

6. S. Karar and R. Parekh, “Palmprint Recognition using Phase Symmetry”, International Journal of Scientific and Research Publications, Vol.3, Issue 4, 2013, pp. 1-6.

7. H. M Salman, “Palmprint Characterization Using Multi-wavelet Transform for Human Identification”, Eng.& Tech.Journal, Vol.27, No.3,

2009, pp405-417. 8. J. Guo, Y. Liu, W. Yuan, “Palmprint Recognition Using Local Information from a Single Image Per Person”, Journal of Computational

Information Systems, Vol.8 (8), 2012, pp.3199 – 3206.

9. H Imtiaz, S Aich, S A Fattah, “A Novel Pre-processing Technique for DCT domain Palm-print Recognition”, International Journal of Scientific & Technology Research , Volume 1, Issue 3, 2012, pp.31 – 35.

10. N. Swathi, C. Satish, V. S Satyanarayana, P. Ramesh, H. Kumar, N. Bhuma, C. Himabin, “New Palm Print Authentication System By Using

Wavelet Based Method”, Signal & Image Processing : An International Journal(SIPIJ) , Vol.2, No.1, . 2011, pp.191 – 203 . 11. K. Ito, T. Aoki, H. Nakajima, K. Kobayashi and T. Higuchi, “A Palmprint Recognition Algorithm using Phase-based Image Matching” ,

IEEE International Conference of Image Processing , 2006, pp.2669 – 2672.

12. Jyoti Malik1, Ratna Dahiya1, G. Sainarayanan, “Personal Authentication Using Palmprint with Phase Congruency Feature Extraction Method”, International Journal of Signal Processing, Image Processing and Pattern Recognition system. Vol. 4, No. 3, 2011, pp. 19-34.

13. K .Umadevi1 and L.Latha, An Efficient Searching and Clusterig based Palmprint Identification, Research Journal of Computer Systems

Engineering – RJCSE, Vol 04, 2013, pp. 613 – 617. 14. K.Shanmugapriya, M. Karthika, Dr. S.Valarmathy, M.Arunkumar, “Performance Evaluation of Contourlet Transform based Palmprint

Recognition using Nearest Neighbour Classifier”, International Journal of Emerging Technology and Advanced Engineering Volume 3,

Issue 1, 2013, pp. 294 – 299. 15. J. Malik1, G. Sainarayanan and R. Dahiya, “Personal Authentication using Palmprint with Sobel code, Canny edge and Phase Congruency

Feature Extraction Method”, ICTACT Journal on Image and Video Processing , Vol. 02, Issue 03, 2012, pp.357- 368.

16. Allen George, G.Karthick, “Palmprint Recognition Using Ridge Features”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 2, Issue 11, 2013 , pp.4288 - 4291 .

36.

Authors: R. Abd Allah

Paper Title: Busbar Protection Scheme Based on Alienation Coefficients for Current Signals

Abstract: In modern digital power system protection systems, statistical coefficients technique is recently used for

fault analysis. An alienation technique is developed for busbar protection against all ten types of shunt faults, which

may locate in busbar protection zone, under different loading levels, fault resistances and fault inception angle. It

does not need any extra equipment as it depends only on the three-line currents measurements, of all feeders

connected to the protected busbar, which are mostly available at the relay location. It is able to perform fault

detection, fault confirmation, faulty phase selection and determine the fault location in about a half-cycle period.

Thus, the alienation technique is well suited for implementation in digital protection schemes. The technique is

efficient to detect current transformer saturation conditions without needing any additional algorithm. The effects of

DC components and harmonics are eliminated with estimation of alienation coefficients. The proposed methodology

is applied for a part of 500 KV Egyptian network. Alternative transient program (ATP) and MATLAB package are

used to implement the proposed technique.

Keywords: Busbar protection, current transformer saturation, fault detection, internal and external faults, alienation

coefficient, ATP software, MATLAB.

References: 1. IEEE Guide for the Application of Current Transformers Used for Protective Relaying Purposes IEEE Std. C 37.110-1996.

2. Working group of the Relay Input Sources Subcommittee of the Power System Relaying Committee “Transient response of current

transformers” IEEE Transaction on power apparatus and systems, Vol. PAS-96, no. 6, November/December 1977. 3. W.J. Smolinky “Design Consideration in the Application of Current Transformers For Protective Relaying Purposes”, IEEE Transactions on

Power Apparatus and System, Vol. PAS-92, no.4, July/August 1973.

4. D.A. Bradley, C.B.Gray, D.O’Kelly “Transient compensation of current transformers” IEEE Transactions on Power Apparatus and Systems, Vol. PAS-97, no.4, July/Aug 1978

5. Y.C. Kang, J.K.Park, S.H.Kang, A.T. Johns, R.K. Aggarawal “ An algorithm for compensating secondary currents of current transformers”

IEEE Transactions on Power Delivery, Vol.12, no.1, January 1997 6. D.C.Yu,Z.Wang, J.C. Cummins,H.-J. Yoon,L.A.Kojovic,and D.Stone “Neural network for current transformer saturation correction” in

proc. IEEE Transm. Distrib. Conf., New Orrleans,LA,Apr.1999.

7. M.E. Masoud, E.H.Shehab-Eldin, M.M Eissa, and M.F.Elnagar. “A New Compensating secondary current technique for saturated current transformers” The 8thInternational Middle- East power system conference “MEPECON 2001”, PP549-555.

8. Jiuping Pan, Khoi Vu, and Yi Hu “An Efficient Compensation Algorithm for Current Transformer Saturation Effects” IEEE Transactions on

Power delivery, Vol. 19, no.4, October, 2004, PP1623-1628. 9. M.A. Salem, M.I. Gilany,Z. Osman and E. aboul Zahab “ A new algorithm for compensating the secondary current during current

transformer saturation” The tenth International Middle- East power systems conference “MEPECON 2005” PP 427-433.

10. M.S. Sachdev, T.S. Sidhu, H.S. Gill, ''A busbar protection technique and its performance during CT saturation and CT ratio-mismatch'', Power Delivery, IEEE Transactions on (Volume:15, Issue: 3 ), Page(s):895 - 901, Jul 2000.

11. Xuyang Deng, Jiale Suonan, Zaibin Jiao and Xiaoning Kang, ''A Model Parameter Identification Based Bus-bar Protection Principle'', Power

and Energy Engineering Conference (APPEEC), 2010 Asia-Pacific, Page(s):1 – 6, March 2010. 12. Jiale Suonan, Xuyang Deng and Guobing Song, ''A Novel Busbar Protection Based on Fault Component Integrated Impedance'', Power and

Energy Engineering Conference (APPEEC), 2010 Asia-Pacific, Page(s):1 – 6, March 2010.

13. Libao Xu, Grasset, H., Xingli Dong, Chenliang Xu and Ruidong Xu, ''A new method for busbar protection stability improvement'',

156-167

Developments in Power System Protection (DPSP 2010). Managing the Change, 10th IET International Conference on, Page(s):1-4, April 2010.

14. ATP - version 3.5 for Windows 9x/NT/2000/XP - Users' Manual Preliminary Release No. 1.1 - October 2002.

15. W. Hauschild, and W. Mosch, “Statistical Techniques for High Voltage Engineering”, hand book, English edition published by peter pere grinus Ltd., London, United Kingdom, chapter 2, pp. 78-79, 1992.

16. Edwards, A. L. "The Correlation Coefficient." Ch. 4 in an Introduction to Linear Regression and Correlation. San Francisco, CA: W. H.

Freeman, pp. 33-46, 1976. 17. Snedecor, G. W. and Cochran, W. G. "The Sample Correlation Coefficient r and Properties of r." 10.1-10.2 in Statistical Methods, 7th ed.

Ames, IA: Iowa State Press, pp. 175-178, 1980.

18. Press, W. H.; Flannery, B. P.; Teukolsky, S. A.; and Vetterling, W. T. "Linear Correlation", Cambridge, England: Cambridge University Press, pp. 630-633, 1992.

19. Spiegel, M. R. "Correlation Theory." Ch. 14 in Theory and Problems of Probability and Statistics, 2nd ed. New York: McGraw-Hill, pp. 294-

323, 1992. 20. Instruction Manual for Generator Electrical Equipment, Upper Egypt Electricity Production Company, Elkureimat П 750 MW Combined

Cycle Project, Steam Turbine Generator & Auxiliaries (Generator Electrical Equipment), Hitachi, Ltd., Tokyo Jaban,2006.

37.

Authors: B. Roja Reddy, Uttarakumari M.

Paper Title: Orthogonal MIMO Radar Waveform Performance Analysis with Ambiguity Function

Abstract: In this paper, the basic Multiple Input and Multiple Output ambiguity function tool is used to analyze

the performance of orthogonal waveforms for MIMO radar antenna system. The orthogonal waveforms like modified

Discrete Frequency Coding Waveform Linear Frequency Modulation (DFCW_LFM), Polyphase and Discrete

Frequency Coding Space Time Waveform (DFCSTW) waveforms are considered. The resolution performance is

governed and controlled by the system on transmit using orthogonal waveform diversity. The resolution performance

is illustrated using MIMO radar orthogonal waveforms.

Keywords: Ambiguity Function (AF), Discrete Frequency Coding Space Time Waveform (DFCSTW), Discrete

Frequency Coding Waveform Linear Frequency Modulation (DFCW_LFM), Orthogonal waveforms, Polyphase

Waveforms.

References: 1. E.Fishler, A.Haimovich, R. Blum, L.Cimini, D.Chizhik, and R. Valenzuela, “MIMO radar: An idea whose time has come,” in proceedings of

IEEE International Radar conference, Philadelphia, PA, April 2004, pp No.71-78.

2. Qu JinYou Zhang JianYun Liu ChunQuan, “The Ambiguity Function of MIMO Radar,” in IEEE 2007 International Symposium on

Microwave, Antenna, Propagation, and EMC Technologies For Wireless Communications, Hangzhou, 16-17 , Aug. 2007, pp no.265 – 268. 3. Chun-Yang Chen, P. P. Vaidyanathan, “MIMO Radar Ambiguity Optimization Using Frequency-Hopping Waveforms,” in 41st Asilomar

Conference in Signals, Systems and Computers, Pacific Grove, CA, 4-7 Nov. 2007, pp no. 192 – 196.

4. Chun-Yang Chen, P. P. Vaidyanathan, “MIMO Radar Ambiguity Properties and Optimization Using Frequency-Hopping Waveforms,” in IEEE Transactions on Signal Processing, Vol 56, No. 12, Dec.2008, pp no. 5926- 5936.

5. Harger, Robert O. , “A Note on the Realization of Ambiguity Functions,” in IEEE Transactions on Space Electronics and Telemetry, 12

November 2007, pp no. 127 – 130. 6. Bo Liu, Zishu He, liankui Zeng, “Optimization of Polyphase Code Based on Ambiguity Function for MIMO Radar, ” in International

Conference on Communications, Circuits and Systems, Kokura, 11-13 July 2007, pp no. 111 - 114

7. Chun-Yang Chen and P. P. Vaidyanathan, “ Properties of the MIMO Radar Ambiguity Function, ” in IEEE International Conference Acoustics, Speech and Singal Processing, Las Vegas, NV March 31 2008-April 4 2008, pp no. 2309 – 2312

8. Yuri 1. Abramovich, Gordon 1. Frazer, “MIMO Radar Performance in clutter Limitations Imposed by Bounds on the Volume and Height

Distributions for The MIMO Radar Ambiguity Function,” in 5th IEEE Signal Processing Workshop Array and Multichannel, Darmstadt, 21-23 July 2008, pp no. 441 – 445.

9. Yuri I. Abramovich, Gordon J. Frazer, “Bounds on the Volume and Height Distributions for the MIMO Radar Ambiguity Function,” on

IEEE Signal Processing Letters, Vol 15, 2008, Vol. 15, 2008, pp no. 505– 508. 10. M. A. Haleem and A. Haimovich, “On The Distribution Of Ambiguity Levels in MIMO Radar, ” in 42nd Asilomar Conference on Signals,

Systems, and Computers, Pacific Grove, CA, 26-29 Oct. 2008, pp no. 198 – 202.

11. Daniel R. Fuhrmann, J. Paul Browning, and Muralidhar Rangaswamy, “Ambiguity function analysis for the Hybrid MIMO Phased-array Radar ,” in IEEE Radar Conference, Pasadena, CA, 4-8 May 2009, pp no.1 – 6.

12. Jamil, M. ; Zepernick, H. ; Pettersson, M.I. , “ Properties of ambiguity functions for weighted pulse trains with Oppermann sequences, ” in

International Conference on Signal Processing and Communication Systems, Omaha, NE V, 28-30 Sept. 2009, pp no. 1 – 8. 13. Rajesh Sharma, “Analysis of MIMO Radar Ambiguity Functions and Implications on Clear Region ,” in Radar conference, Washington, DC,

10-14 May 2010, pp no.544 – 548.

14. V.U. Reddy, “Signal Design for a Specified Transmit Beampattern, Spatial Ambiguity Function for MIMO Radar: A Brief Review of Recent Results, ” in IEEE Applied Electromagnetic Conference, Kolkatta, Indiai, 18-22 Dec. 2011, pp no. 1-4.

15. Wicks, M.C. ; Vela, R. ; Lo Monte, L.,“ Range-Doppler-Angle Ambiguity Function Analysis in Modern Radar, ”in IEEE International

Symposium on Antenna and Propagation Society, Chicago, IL 8-14 July 2012, pp no. 1. 16. Wei Zhou, Haowen Chen, Weidong Jiang, Hongqiang Wang, “Generalized Ambiguity Function Analysis of MIMO SAR ,” in IEEE 11th

International Conference Signal Processing, Vol 3, Beijing, 21-25 Oct. 2012, pp no. 1724 – 1728.

17. Honghui Yan, Guowei Shen, Rudolf Zetik, Ole Hirsch, and Reiner S. Thomä, “Ultra-Wideband MIMO Ambiguity Function and Its Factorability, ” in IEEE Transactions on geosciences and Remote Sensing, Vol 51, No. 1, January 2013, pp no.504-519.

18. Uttam K. Majumder, Mark R. Bell, Muralidhar Rangaswamy, “A Novel Approach for Designing Diversity Radar Waveforms that are

Orthogonal on Both Transmit and Receive,” in IEEE Radar Conference, Ottawa, April 29 -May 3 2013, pp no. 1 – 6. 19. Waseem Khan, Ijaz Mansoor Qureshi, and Kiran Sultan,“ Ambiguity Function of Phased–MIMO Radar With Colocated Antennas and Its

Properties,” in IEEE Geoscience and Remote Sensing Letters, vol PP, Issue:99, 05 December 2013, pp no. 1 – 5.

20. H. Deng, “Polyphase code design for orthogonal netted radar systems,” IEEE Trans. Signal Process., vol. 52, no. 11, pp. 3126–3135,

Nov.2004.

21. Bo., Liu., Zishu., He., Jiankui., Zeng., Benyong., Liu, “Polyphase Orthogonal Code Design for MIMO Radar Systems,” Proc. Int. Conf

Radar, Shanghai, April 2006, pp. 1-4. 22. Bo Liu, Zishu He, Jun Li, “Mitigation of Autocorrelation sidelobe peaks of Orthogonal Discrete Frequency-Coding waveform for MIMO

Radar”, in proceedings of IEEE Radar conference, pp 1-6, China, Chengdu,2008.

23. B. Roja Reddy, M uttarakumari, “Generation of orthogonal discrete frequency coded waveform using accelerated particle swarm optimization algorithm for MIMO radar”, Proceedings of the Second International Conference on Computer Science, Engineering and

Applications (ICCSEA 2012), New Delhi, India, Volume 1, pp 13-23, May 25-27, 2012. 24. Smt. B.Roja Reddy, M. Uttara Kumari, “Polyphase orthogonal Wave Form using Modified particle swarm optimization algorithm for MIMO

Radar”, ”IEEE International Conference on Signal Processing Computing and Control at WAKNAGHAT-SHIMLA from March 15-17th -

2012.

168-173

38.

Authors: Samir S. Rathod, G. Niranjana

Paper Title: Effective Resource Utilization for Caching as a Service in Cloud

Abstract: With the growing popularity of cloud based data centers as the enterprise IT platform of choice, there is

a need for effective management strategies capable of maintaining performance. Caching technology improves the

performance of the cloud. Cache as a service (CaaS) model is an additional service to Infrastructure as a service

(IaaS). The cloud server process introduce, pricing model together with the elastic cache system. This will increase

the disk I/O performance of the IaaS, and it will reduce the usage of the physical machines. The emerging cloud

applications provide data management services allowing the user to query the cloud data, paying the price for the

infrastructure they use. Cloud management necessitate an economy that manages the services of multiple users in an

efficient, but also, resource economic way that allows for cloud profit. The cloud caching service can maximize its

profit using an optimal pricing scheme. This scheme requires an appropriately simplified price-demand model that

incorporates the correlations of structures in the cache services. The pricing scheme should be adaptable to time

changes. This paper proposes a novel price demand model designed for a cloud cache and a dynamic pricing scheme

for queries executed in the cloud cache. This will estimates the correlations of the cache services in a time-efficient

manner and improve the efficiency of resources in cloud storage infrastructure to deliver scalable service.

Keywords: Cloud Computing, CaaS model, Virtual Machine, Remote Memory, Optimal pricing scheme.

References: 1. X. Zhang and Y. Dong, "Optimizing Xen VMM Based on Intel Virtualization Technology," Proc. IEEE Int'l Conf. Internet Computing in

Science and Eng. (ICICSE '08), 2008 2. H. Kim, H. Jo, and J. Lee, "XHive: Efficient Cooperative Caching for Virtual Machines, " IEEE Tran s. Computers, vol. 60, no. 1, Jan.

2011 3. G. Jung, M. A. Hiltunen, K. R. Joshi, "Amazon Elastic Compute Cloud", Amazon Web Services, 2010.

4. Verena Kantere , Debabrata Dash , Gregory Francois , Sofia Kyriakopoulou, Anastasia Ailamaki Ecole Polytechnique F'ed'erale de

Lausanne, "Optimal service pricing for a cloud cache", vol. 23, no. 9, pp. 1345-1358, 2011. 5. M.D. Dahlin, R.Y. Wang, T.E. Anderson, and D.A. Patterson, "Cooperative Caching: Using Remote Client Memory to Improve File

System Performance,” Proc. First USENIX Conf. Operating Systems Design and Implementation (OSDI ’94), 1994.

6. A. Menon, A.L. Cox, and W. Zwaenepoel, “Optimizing Network Virtualization in Xen,” Proc. Ann. Conf. USENIX Ann. Technical Conf. (ATC `06), 2006.

7. Hyuck Han, Young Choon Lee, Woong Shin, Hyungsoo Jung, Heon Y. Yeom and Albert Y. Zomaya, "Cashing in on the Cache in the

Cloud", IEEE Transactions on Parallel and Distributed Systems, Vol. 23, no. 8, August 2012. 8. C. Park, P. Talawar, D. Won, M. Jung, J. Im, S. Kim, and Y. Choi, “A High Performance Controller for NAND Flash-Based Solid State

Disk (NSSD),” Proc. IEEE Non-Volatile Semiconductor Memory Workshop (NVSMW `06), 2006.

9. J. Ousterhout, P. Agrawal, D. Erickson, C. Kozyrakis, J. Leverich, D. Mazie'res, S. Mitra, A. Narayanan, G. Parulkar, M. Rosenblum, S.M. Rumble, E. Stratmann, and R. Stutsman, "The Case for RAMClouds: Scalable High-Performance Storage Entirely in DRAM/' ACM

SIGOPS Operating Systems Rev., vol. 43, pp. 92-105, Jan. 2010

10. C.A. Waldspurger, “Memory Resource Management in VMware ESX Server,” Proc. Fifth USENIX Conf. Operating System Design and Implementation (OSDI `02), 2002.

174-178

39.

Authors: Vishal Srivastava, Tejasvi Gupta, Sourabh Kumar, Vinay Kumar, Javed Rafiq, Satish Kumar

Dwivedi

Paper Title: Automatic Side Stand

Abstract: The side stand is used for supporting a parked motorcycle. If the rider may forget to retract the side

stands before riding, then the undistracted stand hitting the ground and affected the riders control during the turn.

Now a day’s sensor are used for ensure that the stand is in released condition. The motorcycle side stand consists of a

metallic rod and helical spring which is offset from the centre.

Some side stand retract automatically when the motorcycle is lifted up the support some other are fit with electrical

interlocks , warning devices or special retracting mechanism. In this paper there is possibility to reduce the evident

which is takes place by the side stand.

Side stand in two wheelers function the entire weight of the vehicle when it is parked. They are perfect on quick stop

when one need to leave the vehicle for short while. They are provided with the spring that pulls it back into position

to ensure extra safety.

The presented mechanism consists of D.C. motor powered by motorcycles battery. Connected to the worm and worm

gear mechanism for reduction of speed of motor and multiply the torque. The motor is actuated by the Rotation

sensor which is mounted on the front of the wheel.

Keywords: D.C.

References: 1. Everett, S.A., Shults, R.A., Barrios, L.C., Sacks, J.J., Lowry, R. and Oeltmann, J. (2001) Trend and subgroup differences in transportation

related injury risk and safety behaviors among high school students.

2. Reeder, A.I., Chalmers, D.J. and Langeley, J.D. (1996) The risky and protective motorcycling opinions and behaviors of young on road

motorcyclist in New Zealand 3. A journal paper ‘motorcycle accidents- case study and what do learn from them’ by Ecker, H. Viema University of Technology,

4. Bhimbra P.S, 2009-2010, ‘Electrical machine’.

5. Sharma P.C., 2010-2011, ‘Machine design’ study for design purpose. 6. Singh Sadhu, 2009-2010, ‘Machine design’ study for design purpose.

7. R.S. Khurmi, 2008-2010, ‘Theory of machine study for torque calculation.

8. Sabey, B.E. and Taylor, H. (1980) The known risk We run: The Highway. 9. Hurt, H.H., Ouellet, J.V. and Thom, D.R. (1981) Motorcycle accident cause factors.

10. Grayson, G. and Hakkert, A. (1987) Accident analysis and conflict behaviour. In J. Rothengatter and R. de Bruin (eds) Road user and traffic

safety.

179-182

11. Malaterre, G. (1990) Error analysis and in- depth accident analysis. 12. Yin, R.K., (1984) case study research, Applied Social research Methods vol. 5. London Sage Publication.

13. 1891- Frederick G.Taylor and R.L GRANSTON, “bicycle support”, U.S.patent 456,347

14. 1928- W.S. Harley and Arthur R. Constantine assignors to Harley Davidson Motor Co., Milwau-kee, “Cycle Support”, U.S. Patent 1,675,551

40.

Authors: Gazal Betab, Ranjeet Kaur Sandhu

Paper Title: Fingerprints in Automated Teller Machine-A Survey

Abstract: The main objective of this system is to develop a system that will increase the ATM security. However,

despite the numerous advantages of ATM system, ATM fraud has recently become more widespread. In this paper,

we provide an overview of the possible fraudulent activities that may be perpetrated against ATMs and investigates

recommended approaches to prevent these types of frauds.. The ATM will service one customer at a time. A

customer will be required to enter a login id and validate his finger print and both will be sent to the bank for

validation as part of each transaction. This makes the developed ATM software more secure as compared to the

software that authenticates the user merely by using a PIN or password.

Keywords: ATM Fraud, ATM Fraud Countermeasures Biometrics, Fingerprint Verification.

References: 1. ”Automatic Teller Machine”. The history of computing project. Thocp.net. 17 April 2006

2. Bhawna Negi 1 , Varun Sharma”Fingerprint Recognition System”, International Journal of Electronics and Computer Science Engineering

872 , www.ijecse.org ISSN- 2277-2011. 3. Bhupesh Gour, T. K. Bandopadhyaya and Sudhir Sharma, “Fingerprint Feature Extraction using Midpoint Ridge Contour Method and

Neural Network”, International Journal of Computer Science and Network Security, vol. 8, no, 7, pp. 99-109, (2008).

4. G.Sambasiva Rao, C. NagaRaju, L. S. S. Reddy and E. V. Prasad, “A Novel Fingerprints Identification System Based on the Edge Detection”, International Journal of Computer Science and Network Security, vol. 8, pp. 394-397, (2008).

5. Pennnam Krishnamurthy and Mr. M. Maddhusudhan Redddy. “Implementation of ATM Security by Using Fingerprint recognition and

GSM”, International Journal of Electronics Communication and Computer Engineering.Volume 3, Issue (1) NCRTCST, ISSN 2249 –071X 6. Pennam Krishnamurthy, Mr. M. Maddhusudhan Redddy,” Implementation of ATM Security by Using Fingerprint recognition and GSM”,

International Journal of Electronics Communication and Computer Engineering Volume 3, Issue (1) NCRTCST, ISSN 2249 –071X,(2012)

7. Robert Hastings, “Ridge Enhancement in Fingerprint Images Using Oriented Diffusion”, IEEE Computer Society on Digital Image Computing Techniques and Applications, pp. 245-252, (2007).

8. S.S, Das and J. Debbarma, “Designing a Biometric Strategy (Fingerprint) Measure for Enhancing ATM Security in Indian e-banking

System”, International Journal of Information and Communication Technology Research, vol.1, no. 5, pp.197-203, 2011.

183-186

41.

Authors: Priyank Rajvanshi, Subhash Chand Gupta

Paper Title: Single Sign on Using SAML

Abstract: With the proliferation of SaaS and other web-based applications, identity management is becoming a

major concern for businesses. Just think about the number of usernames and password you regularly type each day.

You probably log into your company's network, portal, webmail, benefits system, Google Apps, bespoke applications

and of course Force.com applications. Now multiply this by the number of users in your company and think about

the support and security implications. You need dedicated resources to manage your identity store, respond to

password reset requests, provision new users for each system and deactivate users that no longer need access. Just

think of the number of man hours you could save if you could eliminate 25-50% of your passwords and their

associated costs. Implementing a Single Sign-On (SSO) infrastructure enables users to sign in once and have access

to all authorized resources. In this article, we'll look at the different methods of implementing SSO with Force.com,

how to set up your own open source identity management system for federated authentication using SAML 2, and

how to configure the Force.com platform to utilize your new identify provider. We'll also provide some

troubleshooting techniques and outline some best practices to help you avoid common roadblocks, getting you up

and running fast.

In our approach we are trying to create Single Sign On in Salesforce so that in the applications which are connected

to salesforce can be authenticated with this approach.

Keywords: Security, Identity Provider, SAML, Single Sign-On, Web, Authentication.

References: 1. OASIS Frequently Asked Questions “http://www.oasis- open.org/who/faqs.php”, 2009.

2. P. Madsen. SAML 2: The Building Blocks of Federated Identity “http://www.xml.com/pub/a/2005/01/12/saml2.html”, 2005. 3. Differences Between SAML V2.0 and SAML V1.1. “https://spaces.internet2.edu/display/SHIB/SAMLDiffs”, Feb. 2007.

4. N. Ragouzis et al. Security Assertion Markup Language (SAML) V2.0 Technical Overview. “http://www.oasis-

open.org/committees/download.php/22553/sstc-saml-tech- overview.pdf”, Feb. 2007. 5. S. Cantor et al. Metadata for the OASIS Security Assertion Markup Language (SAML) V2.0. “http://docs.oasis-

open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf”, March 2005.

6. M. Theimer. HttpFox 0.8.4. “https://addons.mozilla.org/en- US/firefox/addon/6647”, 2009. 7. HttpWatch. “http://www.httpwatch.com/”, 2009.

8. F. Hirsch et al. Security and Privacy Considerations for the OASIS Security Assertion Markup Language (SAML) V2.0. “http://docs.oasis-

open.org/security/saml/v2.0/saml- sec-consider-2.0-os.pdf”, March 2005. 9. S. M. Hansen, J. Skriver, and H. R. Nielson. “Using static analysis to validate the SAML single sign-on protocol”, in Proceedings of the

2005 workshop on Issues in the theory of security (WITS ’05), 2005, pages 27–40.

10. T. Großand, and B. Pfitzmann, “Saml Artifact Information Flow Revisited”. Research Report RZ 3643 (99653), IBM Research, “http://www.zurich.ibm.com/security/publications/2006/Gr Pf06.SAML-Artifacts.rz3643.pdf”, 2006.

11. S. Gajek, L. Liao, and J. Schwenk. “Stronger TLS bindings for SAML assertions and SAML artifacts”, in Proceedings of the 2008 ACM

Workshop on Secure Web Services (SWS ’08), 2008, pages 11-20.

187-193

42. Authors: R. Abd Allah

Paper Title: Automatic Power Factor Correction Based on Alienation Technique

Abstract: In modern digital protection and control systems, an alienation technique has recently become the

workhorse of quantitative research and analysis. In this paper, an alienation technique is developed for calculations of

original power factor on-line, active and compensation reactive powers and determination of the required number of

capacitor banks to get the desired power factor. Alienation coefficients are calculated between phase voltage and

current signals of power supply. These calculations are performed within one-cycle. Thus, the algorithm is well

suited for implementation in a digital reactive power control scheme. This scheme is able accurately to identify the

required capacitor rating to get the desired power factor under different loading levels. It does not need any extra

equipment as it depends only on the voltage and line-current measurements which are mostly available at the relay

location. Alternative transient program (ATP) and MATLAB programs are used to implement the proposed

technique.

Keywords: Power system, power factor correction, correlation coefficient, alienation coefficient, reactive power

control relays, ATP software, MATLAB..

References: 1. K. K. Kapil, “Reduction in transmission and distribution loses, an opportunity for earning carbon credits”, Available online:

http://www.slideshare.net/kris_kapil/cdm-in-reduction-in-transmission and-distribution-losses. 2. Y. Jiang, F.C. Lee, G. Hua and W. Tang, “A novel single-phase power factor correction scheme,” Eighth Annual Applied Power Electronics

Conference and Exposition, pp: 287-292, 1993.

3. S. Basu and M.H.J. Bollen, “A Novel Common Power Factor Correction Scheme for Homes and Offices,” IEEE Transactions on Power Delivery, Volume: 20, Issue: 3, pp: 2257 - 2263, 2005.

4. L. W. W. Morrow, “Power-factor correction,” Transactions of the American Institute of Electrical Engineers, vol. XLIV, pp. 1–7, Jan 1925.

5. D.K. Maly and K.S. Kwan, “Optimal battery energy storage system (BESS) charge scheduling with dynamic programming,” IEE Proceedings in Science, Measurement and Technology, pp: 453- 458, 1995.

6. Fang Lin Luo and Hong Ye, ''Research on DC-Modulated Power Factor Correction AC/AC Converters'' Industrial Electronics Society, 2007.

IECON 2007. 33rd Annual Conference of the IEEE, PP: 1478 – 1483, Nov. 2007. 7. Shicheng Zheng, Electr. & Inf. Sch. And Biqing Liao,''Research on active power factor correction based on PDC control'', Industrial

Electronics and Applications, 2009. ICIEA 2009. 4th IEEE Conference on, PP:1413 – 1418, May 2009.

8. Mather, B.A. and Maksimovic, D., ''A Simple Digital Power-Factor Correction Rectifier Controller'', Power Electronics, IEEE Transactions on (Volume: 26 , Issue: 1) , PP: 9 – 19, Jan. 2011.

9. Wang Su, ''Research and Simulation of Active Power Factor Correction Based on the Three-Phase Rectifier'', Power and Energy Engineering

Conference (APPEEC), 2011 Asia-Pacific, PP:1 – 3, March 2011. 10. J. Hazra, Balakrishnan Narayanaswamy, Kaushik Das, Ashok Pon Kumar, Deva P Seetharam, De Silva Liyanage and Sathyajith Mathew

"Decentralized Power Factor Correction." Sustainable Future Energy 2012 and 10th See Forum Innovation for Sustainable and Secure

Energy 21-23 November 2012, Brunei Darussalam. 11. Sanjay N. Patel, Mulav P. Rathod, Keyur C. Patel, Parth H. Panchal, Jaimin N. Prajapati , ''Thyristorised Real Time Power Factor Correction

(TRTPFC)'', International Journal of Engineering Research & Technology, Vol.2 - Issue 3, March – 2013.

12. Abhinav Sharma, Vishal Nayyar, S. Chatterji, Ritula Thakur3and P.K. Lehana, ''PIC Microcontroller Based SVC for Reactive Power Compensation and Power Factor Correction'', International Journal of Advanced Research in Computer Science and Software Engineering,

Volume 3, Issue 9, September 2013.

13. ATP - version 3.5 for Windows 9x/NT/2000/XP - Users' Manual – Preliminary Release No. 1.1 - October 2002. 14. W. Hauschild, and W. Mosch, “Statistical Techniques for High Voltage Engineering”, hand book, English edition published by peter pere

grinus Ltd., London, United Kingdom, chapter 2, pp. 78-79, 1992.

15. Edwards, A. L. "The Correlation Coefficient." Ch. 4 in an Introduction to Linear Regression and Correlation. San Francisco, CA: W. H. Freeman, pp. 33-46, 1976.

16. M.Vitins, "A correlation Method for transmission line protection'', IEEE Transactions Power Apparatus and Systems, Vol.97, No.5, Sep/Oct

1978, pp.1607-1617. 17. Snedecor, G. W. and Cochran, W. G. "The Sample Correlation Coefficient r and Properties of r." 10.1-10.2 in Statistical Methods, 7th ed.

Ames, IA: Iowa State Press, pp. 175-178, 1980. 18. Press, W. H.; Flannery, B. P.; Teukolsky, S. A.; and Vetterling, W. T. "Linear Correlation", Cambridge, England: Cambridge University

Press, pp. 630-633, 1992.

19. Spiegel, M. R. "Correlation Theory." Ch. 14 in Theory and Problems of Probability and Statistics, 2nd ed. New York: McGraw-Hill, pp. 294-323, 1992.

194-202

43.

Authors: R. Abd Allah

Paper Title: Protection Scheme for Transmission Lines Based on Correlation Coefficients

Abstract: In modern digital power system protection systems, statistical coefficients technique is recently used for

fault analysis. A correlation technique is developed for faults detection and discrimination. The proposed technique is

able to accurately identify the condition of phase(s) involved in all ten types of shunt faults that may occur in extra

high-voltage transmission lines under different fault resistances, inception angle and loading levels. The proposed

technique does not need any extra equipment as it depends only on the three line-currents measurements which are

mostly available at the relay location. This technique is able to perform the fault detection, type and phase selection

in about a half-cycle period. Thus, the proposed technique is well suited for implementation in digital protection

schemes. The proposed methodology is applied for a part of 500 KV Egyptian network. Alternative transient

program (ATP) and MATLAB programs are used to implement the proposed technique.

Keywords: Power system, fault detection, fault classification, correlation coefficient.

References: 1. M. M. Saha et al., “A new accurate fault location algorithm for series compensated lines,” IEEE Trans. Power Delivery, vol. 14, pp. 789–

797, July 1999. 2. A. G. Phadke, Computer Relaying for Power Systems. New York: Wiley, 1988.

3. R. K. Aggrawal, Q. Y. Xuan, R. W. Dunn, and A. Bennett, “A novel fault classification technique for double-circuit line based on a

combined unsupervised/supervised neural network,” IEEE Trans. Power Delivery, vol. 14, pp. 1250–125, Oct. 1999. 4. W.-M. Lin, C.-D. Yang, and J. H. Lin, “A fault classification method by RBF neural network with OLS learning procedure,” IEEE Trans.

203-212

Power Delivery, vol. 16, pp. 473–477, Oct. 2001. 5. T. Dalstein and B. Kulicke, “Neural network approach to fault classification for high speed protective relaying,” IEEE Trans. Power

Delivery, vol. 10, pp. 1002–1011, Apr. 1995.

6. D. K. Ranaweera, “Comparison of neural network models for fault diagnosis of power system,” Elect. Power Syst. Res., pp. 99–104, 1994. 7. K. H. Kim and J. K. Park, “Application of hierarchical neural networks to fault diagnosis of power system,” Int. J. Elect. Power Energy

Syst., vol. 15, no. 2, pp. 65–70, 1993.

8. A. L. O. Fernandez and N. K. I. Ghonaim, “A novel approach using a FIRANN for fault detection and direction estimation for high voltage transmission lines,” IEEE Trans. Power Delivery, vol. 17, pp. 894–901, Oct. 2002.

9. Poeltl and K. Frohich, “Two new methods for fast fault type detection by means of parameters fitting and artificial neural networks,” IEEE

Trans. Power Delivery, vol. 14, pp. 1269–1275, Oct. 1999. 10. A. Girgis and M. B. Johns, “Ahybrid expert system for faulted section identification, fault type classification and selection of fault location

algorithms,” IEEE Trans. Power Delivery, vol. 4, pp. 978–985, Apr. 1989.

11. A. Protopapas, K. P. Psatiras, and A. V. Machias, “An expert system for substation fault diagnosis and alarm processing,” IEEE Trans. Power Delivery, vol. 6, pp. 648–655, Apr. 1991.

12. H. T. Yang, W. Y. Chang, and C. L. Huang, “On line fault diagnosis of power substation using connectionist expert system,” IEEE Trans.

Power Syst., vol. 10, pp. 323–331, Feb. 1995. 13. A. Ferrero, S. Sangiovanni, and E. Zapitelli, “A fuzzy set approach to fault type identification in digital relaying,” IEEE Trans. Power

Delivery, vol. 10, pp. 169–175, Jan. 1995.

14. H.Wang andW.W. L. Keerthipala, “Fuzzy neuro approach to fault classification for transmission line protection,” IEEE Trans. Power Delivery, vol. 13, pp. 1093–1104, Oct. 1998.

15. T. Adu, “An accurate fault classification technique for power system monitoring devices,” IEEE Trans. Power Delivery, vol. 17, pp. 684–

690, July 2002.

16. M.E. Masoud, M.M.A. Mahfouz, “Protection scheme for transmission lines based on alienation coefficients for current signals”, IET Gener.

Transm. Distrib., Vol. 4, Iss. 11, pp. 1236 – 1244. March 2010

17. W. Hauschild, and W. Mosch, “Statistical Techniques for High Voltage Engineering”, hand book, English edition published by peter pere grinus Ltd., London, United Kingdom, chapter 2, pp. 78-79, 1992.

18. Instruction Manual for Generator Electrical Equipment, Upper Egypt Electricity Production Company, Elkureimat П 750 MW Combined

Cycle Project, Steam Turbine Generator & Auxiliaries (Generator Electrical Equipment), Hitachi, Ltd., Tokyo Jaban. 19. ATP - version 3.5 for Windows 9x/NT/2000/XP - Users' Manual – Preliminary Release No. 1.1 - October 2002.

44.

Authors: Ghazala Y. Hermiz, Bushra A. Aljurani, Md. Ali H. Al-Beayaty

Paper Title: Effect of Mn Substitution on the Superconducting Properties of Bi1.7Pb0.3Sr2Ca2-xMnxCu3O10+δ

Abstract: The present study includes the preparation of Bi1.7Pb0.3Sr2Ca2-xMnxCu3O10+δ compound with x =

0.0, 0.1, 0.2, 0.3, 0.4 and 0.5 by solid state reaction method. The effect of the substitution of Mn on Ca site on

superconducting properties has been investigated to obtain the optimum conditions for the formation and stabilization

of the high Tc phase. Energy dispersive X-ray spectroscopy (EDX) analysis was used to test the proportions and

energies of the elements of the compound. The crystal structure was examined by XRD for all superconductor

samples; it was found that the crystal structure was orthorhombic and all major peaks in the spectra could be pointed

to 2223-phase with amount of 2212-phase ; a small volume fraction of impurities like Ca2CuO3, CuO and

Sr2Ca2Cu7Oδ were noticed in some samples. The highest Tc obtained for Bi1.7Pb0.3Sr2Ca2-xMnxCu3O10+δ

composition was 118K for the sample with x=0.3.Scanning electron microscopy (SEM) has been used to identify the

morphology of the superconducting phase and to investigate the influence of substitution effect of Mn on Ca site

.The microstructure shows plate –like layered with increasing of voids and defect for samples with x=0.1,0.2,while

the grains become smaller with disappear of grain boundaries of sample with x=0.3.

Keywords: Bi-based superconductors, Mn substitution, •Scanning electronic microscopy.

References: 1. P.Vase,R.Flukiger,M.Leghissa and G.Glowacki,“Current status of high-TC wire,” Supercond. Sci. Technol., vol. 13, 2000,pp. R71-R84.

2. Y. Huang, J.Kerby,T. Nicol and T.Peterson,“Progress in Bi=2223 wire performance” presented at CEC-ICMC , Madison,

Wisconcin,USA,2001,16-20. 3. B.L. Gyorffy, Z. Szotek, W.M. Temmerman, O.K. Andersen and O. Jepsen, “On the Quasi Particle Spectra of High Temperature

Superconductors", Phys.Rev.B vol.58,1998,pp.1025.

4. Retoux R, Studer F, Michel C, Raveau B, Fontaine A, Dartyge E. "Valence state for bismuth in the superconducting bismuth cuprates" Phys Rev. B vol.41(1),1990,pp.193-199 .

5. H.Maeda, Y.Tanaka, M.Fukutomi ,T.Asano"A New High-Tc Oxide Superconductor without a Rare Earth Element"Jpn. J. Appl.Phys.

vol.27, 1988,pp.209–210. 6. G.Yildirim,S.Bal,E.Yucel,M.Dogruer,M.Akdogan.A.Varilci,C.Terzioglu" Effect of Mn Addition on Structural and Superconducting

Properties of (Bi, Pb)-2223 Superconducting Ceramics "J Supercond. Nov. Magn. vol 25,2012,pp.381–390.

7. I.Verma, R. Rawat, V. Ganesan, D. M. Phase and B. Das ,The Effect of Mn Substitution on Properties of Bi1.6Pb0.4Sr2 Ca2−xMnxCu3Oy Superconductors , IndiaJ Supercond Nov Magn.,vol. 25,2012,pp.85–90.

8. R. Kumar• I.Verma • N.Verma ,V. Ganesan “Effect of Mn on the Surface Morphological Properties of (Bi,Pb)2Sr2Ca2Cu3−x

MnxO10+δSuperconductor J. Supercond. Nov. Magn. Vol.25,2012,pp1215–1221. 9. J. S. Hawa,H. Azhan ,S. Y. Yahya ,K. Azman ,H. N. Hidayah and A. W. Norazidah”The effect of Eu substitution onto Ca site in Bi(Pb)-

2223 superconductor via co-precipitation method” J. Supercond. Nov. Magn., Vol. 26, 2013, pp. 979-983.

10. A.Ashish, “processing–property relationships for high Tc ceramic superconductors in the Bi-Ca-Sr-Cu-O system” Ph.D. Thesis, University of Illinois at Urbana –Champaign, 1992.

11. L.W.Lei, Z.Y. Fu, J.Y.Zhang, "Influence of sintering temperature on microstructure and magnetotransport properties of La0.8Na0.2MnO3

ceramics" Materials Letters vol.60, 2006,pp. 970-973 .

12. V.Primo,F.Sapina,M.J.Sanchis,R.Ibanez,A.Beltran,D.Beltran,"A new improved synthesis of the 110 K bismuth superconducting phase:

freeze-drying of acetic solutions” Materials Letters vol.15,1992,pp.149-155.

213-217

45.

Authors: Ms.Anagha.C.K, Mrs.S.Berclin Jeyaprabha , Ms.Shaema Lizbeth Mathew

Paper Title: Optimal Sizing of Building Integrated Hybrid Energy system

Abstract: In this study, an optimal sizing for building integrated hybrid photovoltaic, diesel generator and battery

system for zero load rejection is performed. The optimization is obtained by considering the loss-of-load probability

(LLP) of the system less than 0.01. For this system, the average daily solar radiation is collected from

‘Thondamuthur’region, Coimbatore. The load demand is collected from Civil Department building of Karunya

218-222

University. The optimization presented in this study aims to calculate the optimum size of a PV array and diesel

generator, and battery which examine the minimum system cost. An optimization problem in terms of system unit

cost is solved graphically in this study. The results of the optimization show that a photovoltaic/diesel generator

choice is more feasible compared to a standalone photovoltaic system or diesel generator system.

Keywords: Diesel Generator, Photovoltaic energy, Renewable energy, Sizing of the system

References: 1. R. Dufo-López, J.L. Bernal-Agustín, ―Design and control strategies of PV–diesel systems using genetic algorithms‖, Solar Energy 79

(2005) 33–46.

2. G.C. Seeling-Hochmuth, ―A combined optimisation concept for the design and operation strategy of hybrid-PV energy systems‖, Solar Energy 61 (1997)77–87.

3. S.H. El-Hefnawi, ―Photovoltaic diesel-generator hybrid power system sizing‖,Renewable Energy 13 (1998) 33–40.

4. M. Ashari And, C.V. Nayar, ―An optimum dispatch strategy using set points for aphotovoltaic (PV)–diesel battery hybrid power system‖, Solar Energy 66 (1999)1–9.

5. Tamer Khatib, A. Mohamed, K. Sopian, M. Mahmoud, ―Optimal sizing of building integrated hybrid PV/diesel generator system for zero

load rejection for Malaysia‖. 6. Ganguly, D. Misra, S. Ghosh, ―Modeling and analysis of solar photovoltaic electrolyzer - fuel cell hybrid power system integrated with a

floriculture greenhouse‖, Energy and Buildings42 (2010) 2036–2043.

7. S. Rehman, L.M. Al-Hadhrami, ―Study of a solar PV/diesel /battery hybrid powersystem for a remotely located population near Rafha,

Saudi Arabia‖, Solar Energy 35(2010)46-48.

8. R. Dufo-López, J.L. Bernal-Agustín, ―Design and control strategies of PV–dieselsystems using genetic algorithms‖, Solar Energy 79 (2005)

33–46. 9. G.C. Seeling-Hochmuth, ―A combined optimisation concept for the designand operation strategy of hybrid-PV energy systems‖, Solar

Energy 61 (1997)77–87.

10. S.H. El-Hefnawi, ―Photovoltaic diesel-generator hybrid power system sizing‖,Renewable Energy 13 (1998) 33–40. 11. M. Ashari And, C.V. Nayar, ―An optimum dispatch strategy using set points for aphotovoltaic (PV)–diesel battery hybrid power system‖,

Solar Energy 66 (1999)1–9.

12. S. Rehman, L.M. Al-Hadhrami, ―Study of a solar PVedieselebattery hybrid powersystem for a remotely located population near Rafha, Saudi Arabia‖, Solar Energy 35(2010)46-48

46.

Authors: Shaema Lizbeth Mathew, S.Berclin Jeyaprabha, Anagha.C.K

Paper Title: Optimal Sizing Procedure for Standalone PV System for University Located Near Western Ghats in

India

Abstract: This paper presents an optimal sizing procedure and tracking for standalone photovoltaic system located

in one of the remote areas of India. This work is based on the meteorological data in Thondamuthur region where

Karunya University is located and load demand profile of Computer Technology Centre of Karunya University. The

PV array tilt angle is designed optimally based on the optimization algorithm. The PV array can be tilted at various

angles in order to receive maximum global solar energy in different season. This strategy of tilt angle adjustment can

reduce the use of electromechanical or pure mechanical devices, reduce the number of site visits and increase the

solar radiation capturing efficiency. PV array size and storage battery capacity are calculated based on numerical

method and compared with intuitive method using MATLAB. It is proved in this paper that the system designed by

intuitive method is more expensive than the system designed by the numerical method as the former is based on the

worst month data.

Keywords: Array size, Battery capacity, Optimal Sizing, Optimization of energy sources, PV tilt angle

References: 1. A. McEvoy, T. Markvart, L. Castaner, “Practical Handbook of Photovoltaics: Fundamentals and Applications”, Elsevier, New York, NY,

USA, 2011.

2. M. Benghanem, “Optimization of tilt angle for solar panel: case study for Madinah, Saudi Arabia”, Applied Energy 88 (2011) 1427–1433.

3. G. Shrestha, I. Goel, “A study on optimal sizing of standalone photovoltaic stations”, IEEE Transactions on Energy Conversion 13 (1998) 373–378.

4. J. Hay, “Calculation of monthly mean solar radiation for horizontal and tilted surfaces”, Solar Energy (1979) 23.

5. T. Khatib, A. Mohamed, K. Sopian, M. Mahmoud, “A new approach for metrological variables prediction using ANNs: application for sizing & maintain PV systems”, Journal of Solar Energy Engineering 134 (2) (2012) 205–217.

6. Omidreza Saadatian, K Sopian, B R Elhab, Mh Ruslan, Nilofar Asim, “Optimal Solar Panels’ Tilt Angles and Orientations in Kuala

Lumpur, Malaysia”, Advances in Environment, Biotechnology and Biomedicine ISBN: 978-1-61804-122-7. 7. M.Jamil Ahmed, G.N.Tiwari, “ Optimization of tilt angle of solar collector to receive maximum radiation” , Open Renewable Energy

Journal, 2009, 2, 19-24.

223-229

47.

Authors: Manjula Athani, Neelam Pathak, Asif Ullah Khan

Paper Title: Dynamic Music Recommender System Using Genetic Algorithm

Abstract: Web-based systems are popular in many different areas, with the users they tend to deliver customized

information by means of utilization of recommendation methods.The recommender system also has to recognize and

provide items corresponding with user favorites. In this paper we presented a dynamic recommender system for

music data. This system is able to identifying the n-number of users preferences and adaptively recommend music

tracks according to user preferences. we are extracting unique feature of each music track. Then we are applying

BLX-a crossover to a extracted features of each music track. User favorite and user profiles are included. Multiuser

dynamic recommender system for n-user combines the two methodologies, the content based filtering technique and

the interactive genetic algorithm by providing optimized solution every time and which is based on user’s

preferences hence it give better result and better user system..

Keywords: recommender system: Interactive genetic algorithm; BLX-a crossover.

230-232

References: 1. Hyun-Tae Kim,Jong-Hyun Lee, Chang Wook Ahn :A Recommender system Based on Genitic Algorithm for Music Data Second

International Conference on Computer Engineering and technolory v-6 415

2. Balabanovic ,M.and Shoham,Y.(1997).Recommender as classification: Using Social and Content Based Information in recommendation. In

Proceedings of National Conference on Artificial Intelligence,PP.714-720.

3. Goldberg,D.,Nichols,Oki,B.M.,andTerry,D.(1992).Using Collaborative Recommendation.In Proceedings of European Conference on

Research,7,pp 395-410.

4. Balabanovic ,M.,Shoham Y.FAB: Content-based,Collaborative recommendation.Communications of the Association for Comuputing Machinery 40(3)(1997) 66-72.

5. D.E. Goldberg and J.H. Holland. “Genetic Algorithm and Machine Learning” Machine Learning,vol 3,n0 2-3,pp95-99,1988.

6. H. Takagi,” Interactive Evolutionary Computation: Fusion of the Capabilities of EC Optimization and Human Fvalution, ”Proceedings of the IEEEE, vol 89, pp.1275-1296,2001

7. D.Thierens and D.Goldberg, “Elitist Recombination: An Integrated Selection Recombination GA, “ in Proceedings of the First IEEE Conference on Evoltionary Computation,pp508-512,1994.

8. J.F. Crow and M. Kimura, “ Efficiency of Trucation Selection ,”in Proceedings of the National Academy of Sciences of the United States of

America, vol 76, no 1 396-399,1979. 9. F. Herrea,M.Lozano,and J.L. Verdegay, “Trackling Real-coded Genetic Algorithms : Operators and Tools for Behavioural Analysis,

”Artificial Intelligence Review, vol 12,265-319,318.

10. R .Burke. “Hybrid Web Recommender Systems” Lecture Notes in Computer Science,vol.4321,pp 377-408,Sringer Berlin: Heidelberg,2007. 11. M.J.Pazzani, “A Framework for collaborative, content-based and Demographic Filtering, ”Artificial Intelligence Review,vol.13,no 5-6,pp

.394-408,1999.

12. Elitist Recombination, An Integrated selection; Recombination GA ,In proceeding of the first of the first IEEE conferences on Evolutionary

Computation ,pp 508-512,1994.

13. J.F. Crow and M. Kimura,” Efficiency of Truncation Selection “ in proceedings of the National Academy, of science of the United States of

Americal,vol,76 no 1 ,pp 396-399,1979.

48.

Authors: Benderradji R, Gouidmi H, Beghidja A

Paper Title: Numerical Simulation of the Interaction Shockwave / Turbulent Boundary Layer: Interference

RR/MR

Abstract: This study focuses on both the development of the turbulent boundary layer in supersonic flow over a

flat plate, the distance required for it to invade the entire section of the plate, and the effects of the size of the

interaction area on the development of the boundary layer. Increasing the strength of the interaction is an increase in

size of the areas of interaction leading to the formation of a recirculation bubble which is an area of the head losses.

For this reason, it can increase and decrease the Mach number for a reflection or Mach explains the impact of the

incident shock wave with strong boundary layer. The increase and decrease the Mach number has caused the

appearance of a hysteresis loop which is represented by the contours of iso fields’ density. These studies are in

agreement with respect to the trial that was presented by J. Delery et al (2009). We were given another contribution

and investigations of the phenomenon of wave interaction of shock / turbulent boundary layer. The model used in

this study is the kw-SST model, it is considered as the most suitable for this kind of problem, with special treatment

of the near-wall region. Numerical simulations were performed using FLUENT software.

Keywords: Interaction of shockwave/ boundary layer- Interference shockwaves-Polar shock- RR Reflection-

Reflection MR.

References: 1. J. Deleuze, “Structure d’une couche limite turbulente soumise à une onde de choc incident. Thèse doctorat. Université AIX-Marseille II,

No. 2079588 (1995).

2. H. Laurent, Turbulence d’une interaction onde de choc/couche limite sur une paroi plane adiabatique ou chauffée, thèse de Doctorat,

Université AIX-Marseille II, (1996). 3. J. Délery and J. P. Dussauge, Some physical aspects of shock wave/boundary layer interactions, Shock wave, No. 19 (2009) 453-468.

4. D. S. Dolling, Fifty years of shock-wave/boundary layer interaction research: what next?, AIAA J. No. 39 (8) (2001).

5. A. Hadjadj J, Larsson, B. E. Morgan, J. W. Nichols and S. K. Lele, Large-eddy simulation of shock/boundary layer interaction. Center for

turbulence research-proceeding of the Summer ¨Program (2010).

6. S. Deck, P. E. Weiss, M. Pamiès and E. Garnier, Zonal detached Eddy Simulation of spatially developing flat plate turbulent boundary

layer, Computer§ Fluids No. 48 (2011) 1-15. 7. K. Sinha, K. Mahesh and G. Candler, Modeling the effect of shock unsteadiness in shock-wave/turbulent boundary layer interactions,

AIAA (2004).

8. J. R. Edwards, Numerical simulations of shock/boundary layer interactions using time-dependent modeling techniques: A survey of recent results, Progress in Aerospace Sciences No. 44 (2008) 447-765.

9. J. Y. Choi, I. S. Jeung and Y. Yoon, Scaling effect of the combustion induced by shock-wave boundary layer interaction in premixed Gas,

Twenty-seventh symposium (international) on combustion (1998) 2181-2188. 10. S. Pirozzoli and F. Grasso, Direct numerical simulation of impinging shock wave/turbulent boundary layer interaction at M=2.25, Physics

of fluids No. 18 065113 (2006).

11. E. Touber and N. D. Sandham, Large-eddy simulation of low-frequency unsteadiness in a turbulent shock-induced separation bubble, Theor. Comput. Fluid Dyn. No. 23 (2009) 79-107.

12. S. Teramoto, Large-Eddy simulation of shock wave/Boundary layer interaction, Trans. Japan Coc. Aero. Space sci. Vol. 47, No. 158

(2005) 268-275. 13. B. Morgan, S. Kawai and S. K. Lele, Large-Eddy simulation of an oblique shock wave impinging on a turbulent boundary layer, 10th fluid

dynamics conference and exhibit, AIAA No. 4467 28 june-1 july Chicago, IIIinois (2010).

14. M. Lagha, J. Kim, J. D. Eldredge and X. Zhong, A numerical study of compressible turbulent boundary layers, Physics of fluids No. 23 015106 (2011).

15. M. F. Shahab, G. Lehnasch, T. B. Gatski and P, Comte, DNS of a spatially developing, supersonic turbulent boundary layer flow over a

cooled wall, Turbulence, Heat and Masse Transfer 6, (2009). 16. S. Dubos, Simulation des grandes échelles d’écoulement turbulent supersoniques, These Doctorat, INSA de Rouen (2005).

17. C. Hadad, Instationnarités, mouvements d'onde de choc et tourbillons à grandes échelles dans une interaction onde de choc/couche limite

avec décollement, Thèse Doctorat, Université de Provence Aix-Marseille I (2005). 18. V. S. Murthy and W. C. Rose, Wall shear stress measurements in shock wave boundary layer interaction, AIAA J. No. 7, 16 (1978) 667-

672.

19. E. R. Van Driest, Turbulent boundary layer in compressible fluids, J. Aero. Sc. No. 3, 18 (1951) 145-160. 20. Sebastian Deck, Philippe Duvaeu, Paulo d’Espincy et Philippe Guillen: Development and application of Spalart-Allmaras one equation

233-237

turbulence model to three dimensional supersonic complex configurations. Aerospace Science and Technology. (2002) 171-183.

49.

Authors: Alsana Bashir, Misba Gul, Javed A Naqash, Ajaz Masood

Paper Title: Study of Permeability and Compressive Strength of Silica Fume Concrete

Abstract: Qualitatively permeability within concrete may be defined as the ease with which water, air and other

substances such as chloride ions or contaminants pass through the concrete pore structure. In general, the relative

magnitude of permeability for a given permeant (water, air or any other ion/ salt contaminant) may act as a prima

facie indicative parameter of durability of concrete. More the permeability, lesser may be the durability. As durability

governs the service life of the structure, thus permeability indirectly affects the service life of the structure. Besides,

in relation to durability, permeability invariably becomes a very important aspect for the design of over-head tanks,

water retaining structures and open flat roofs where permeability of concrete becomes objectionable. As such making

concrete least permeable without harming its compressive strength is of a primal importance for researchers.

Present state of knowledge about permeability and methods to decrease it are discretely available from literature.

Few pozzolanic materials have been reported to decrease the permeability remarkably.

Efforts in this experimental study were primarily aimed at evaluating effect of Silica Fume on important

characteristic properties of hardened concrete like crushing strength and permeability. The study was also aimed at

optimizing the weight of cement replacing additive (% by weight of the cement), which may be required to cause

favorable effects like relatively impermeable concrete, without compromising the strength aspect of the hardened

concrete mix. With potential optimization of replacement, the study may also serve as a contrast/guideline, for

relative effectiveness of Silica Fume Concrete over conventional Portland Cement Concrete.

Keywords: Concrete Permeability, Epoxy Sealing, Permeability cell, Silica Fume, Superplasticizer

References: 1. M.G.Alexander, and B.J.Magee, “Durability Perfornance of Concrete Containing Condensed Silica Fume”, Cement Concrete Res., 29(6),

1999, pp.917-922. 2. Bayasi, Zing, Zhou, Jing, “ Properties of Silica Fume Concrete and Mortor”,ACI Materials Journal 90 (4) ,1993, pp.349-356.

3. DL.Venkatesh Babu , SC. Nateshan “Investigations on silica-Fume Concrete”, The Indian Concrete Journal, September 2004, pp.57-60

4. R.Siddique and M. Iqbal Khan, “Supplementary Cementing Materials”, Engineering Materials, Springer-Verlag Berlin Heidelberg ,2011, pp.67-68.

5. Khaloo, A.R; Houseinian, M.R., “Evaluation of Properties of Silica Fume for use in Concrete”, International Conference on Concretes,

Dundee, Scotland, 1999. 6. R. Duval, E.H.Kadri, “ Influence of Silica Fume on the workability and Compressive Strength of High Performance Concrete”, Cement and

Concrete Research, Vol. 28, Issue 4, Pg. 533 – 547.

7. IS: 4031, Methods of Physical Tests for Hydraulic Cement, Part I, IV, V, VI, 1988. 8. IS: 383-1970, “Indian standards specification for coarse and fine aggregates from natural sources for concrete”, Bureau of Indian Standards,

New Delhi.

9. IS 9103-1999 Concrete Admixtures-Specifications, Bureau of Indian Standards, New Delhi, India. 10. IS: 3085 – 1965, “Indian Standard method of test for permeability of cement mortar and concrete”, Bureau of Indian Standards, New Delhi.

11. IS 5514:1969 Apparatus used in Le-Chatelier test, Indian Standards, New Delhi, India.

12. IS 8112:1989 Specifications for 43 grade ordinary Portland cement, Indian Standards Institution, New Delhi.

238-242

50.

Authors: Harjot Kaur, Manpreet Kaur

Paper Title: Detecting Clones in Class Diagrams Using Suffix Array

Abstract: Model Driven Engineering has become standard and important framework in software research field.

UML domain models are conceptual models which are used to design and develop software in software development

life cycle. Unexpected copy of model elements leads to many problem. Models contain design level similarities and

are equally harmful for software maintain -ace as code clones are. So number of clones need to be detected from

UML domain models. This paper introduces an approach to detect clones in class diagrams. Class diagram contains

redundant element which increases the complexity and need to be removed. Firstly, class diagrams are encoded as

XML files. Tokens are extracted and matched using Suffix array technique. The approach is based on finding

similarities in tokens known as clones.

Keywords: Code clones, Model Clones, Suffix Array.

References: 1. Abdul.H.B. and Jarzabek.S.,2005 “Detecting Higher-level Similarity Patterns in Programs” ESEC-FSE’05,ACM,.Lisbon,Portugal. 2. Abdul.H .B., Puglisi.S.J., Smyth.W.F., Turpin.A. and Jarjabek.S., 2007 “Efficient Token Based Clone Detection with Flexible Tokenization”

ESEC/FSE’07,ACM ,Cavtat Croatia.

3. Antony.E.P, Alafi.M.H. and Cordy.J.R,,2013 “ An-Approach to clone detection in Behavioral Models” Queen’s university,Kingston,Canada,AAC-WCRE.

4. Deissenboeck.F, Hummel.B,Juergens.E, Pfaehler.M .and Schaetz, B.,2010”Model Clone Detection in Practice``, IWSC`10,Cape Town, South Africa.,pp.37-44.

5. Deissenboeck.F.,Hummel,B.,Juergens,E.,Schatz,B.,Wagner, S.,Giard,J.F. and Teuchert,S.,2008 “Clone Detection in Automotive model-

Based Development” ICSE` 08,ACM, Leipzig,Germany.pp.603-612. 6. Falke, R., Koschke, R. and Frenzel, P.,2008.” Empirical Evaluation of Clone Detection Using Syntax Suffix Trees”, Empirical Software

Engineering, Vol. 13, No. 6, pp. 601-643.

7. Hummel, B.,Juergens, E. and Steidl, D., 2011” Index-Based Model Clone Detection”, Proceedings of 5th International Workshop on Software Clones, Honolulu, USA, pp-21-27.

8. Lin.H.J. and Peng.L.F.,,2009 “Quick Similarity Measurement of Source Code based on Suffix Array”, International Conference on

Computational Intelligence and Security” ,DOI 10.1109/CIS.2009.175. 9. Liu.H, Zhiyi.M , Zhang.L. and Shao.W.,” Detecting Duplications in Sequence Diagrams Based on Suffix Trees” Software Institute, School

of Electronics Engineering and Computer SciencePeking University, Beijing , China..

10. Kaur M.,Rattan D.,Bhatia R. and Singh M.,”Comparison and Evaluation of Clone Detection Tools: An Experimental Approach.” CSI journal of computing, Vol 1: No of 4,Pg 44-55,2012.

243-246

11. Kaur M.,Rattan D.,Bhatia R. and Singh M.,”Clone detection in Models : an Empirical Study.” 3rd IBM Collaborative Academia Research Exchange(I-CARE) 2011,New Delhi, India,October 13,2011.

12. Pham.N.H, H. A.,Nguyen, T. T., Nguyen, J.M.Kofahi and Nguyen,T.N.,2009.“ Complete and Accurate Clone Detection in Graph-based

Models”, ICSE’09,Vancouver,Canada, IEEE. 13. Petresen.H,2012 “Clone Detection in Matlab Simulink Models” ,IMM-M.Sc,Berlin..

14. Purchase.H.C, Colpoys.L., McGill.M., Carrington.D. and Britton.C.,2001 “UML class diagram syntax: an empirical study of

comprehension”, Australian Symposium on Information Visualization, Sydney,vol.9. 15. Rattan.D, Bhatia.R, and Singh.M ,2013. “Software clone detection: A systematic review”, Information and Software Technology 55

pp.1165-1199.

16. Rattan.D, Bhatia.R and Singh.M, 2012 “ Model Clone detection based on tree comparison”,IEEE ,. 17. Roy, C.K., Cordy J.R. and Koschke, R., 2009. “Comparison and Evaluation of Code Clone Detection Techniques and Tools: A Qualitative

Approach”, Science of Computer Programming , Vol.74,No. 7,pp. 470-495.

18. Roy, C.K., Cordy J.R. and Kosher, R.,2008. “An Empirical Study of Function clones in Open Source Software Systems”, Proceedings of 15 th Working conference on Reverse Engineering,pp-81-90.

19. Roy, C.K., Cordy J.R. and Koschke, R.,2007.” A Survey on Software Clone Detection Resarch”, Technical Report 2007-541, Queen’s

University at Kingston Ontario,Canada,115pp. 20. Storrle.H“ Towards Clone Detection in UML domain models”, DOI:10.1007/s10270-011-0217-9.

21. Yamashina.T, H.Uwano,K.Fushida,Y.Kamei,M.Nagura,S.Kawaguchi and H.Lida,”Shinobi: A Real Time Code Clone Detection Tool for

Software Maintenance” nara institute of science and technology.

51.

Authors: S B Chikalthankar, G D Belurkar, V M Nandedkar

Paper Title: Factors Affecting on Springback in Sheet Metal Bending: A Review

Abstract: Spring-back is a very common and critical phenomenon in sheet metal forming operations, which is

caused by the elastic redistribution of the internal stresses after the removal of deforming forces. Spring-back

compensation is absolutely essential for the accurate geometry of sheet metal components.

This paper reviews the various parameters affecting spring back such as punch angle, grain direction of sheet metal

material, die opening, ratio of die radius to sheet thickness, sheet thickness, punch radius, punch height, coining

force, pre bend condition of strip etc.

Keywords: Bending, Die opening, Grain Direction Springback

References: 1. Huang, H. M., Liu, S. D., and Jiang, S. Stress and strain histories of multiple bending–unbending springback process. Trans. ASME, J. Eng.

Mater.and Technol.,2001, 123, 384–390.

2. Seo, D. G., Chang, S. H., and Lee, S. M. Springback characteristics of steel sheets for warm U-draw bending.Metals Mater. Int., 2003, 9,

497–501.

3. D’Acquisto, L. and Fratini, L. Springback effect evaluation in three-dimensional stamping processes at the varying blank holder force. J.

Mech. Eng. Sci., 2006,220, 1827–1837.

4. Carden, W. D., Geng, L. M., Matlock, D. K., and Wagnor, R. H. Measurement of springback.Int. J. Mech. Sci., 2002, 44, 79–101. 5. Ivina Suchi, Die Design Hnadbook, Edition Second

6. H K Yi1, D W Kim1, C J Van Tyne2, and Y H Moon1, Analytical prediction of springback based on residual differential strain during sheet

metal bending.Int. J. Mech. Sci., 2008, 117-129 7. Recep Kazan, Mehmet Fırat, Aysun Egrisogut Tiryaki, “Source-Prediction of spring back in wipe-bending process of sheet metal using

neural network”, Materials and Design 30 (2009) 418–423.

8. SutasnThipprakmas, Finite element analysis of punch height effect on V-bending angle, Materials and Design 31 (2010) 1593–1598 9. You-Min Huang and Daw-KweiLeu, effects of process variables on v-die bendingprocess of steel sheet, Int. J. Mech. Sci. Vol. 40, No. 7,

631 - 650, 1998

10. W.M.Chan*, H.I. Chew, H.P.Lee, B.T.Cheok Finite Element analysis of springback of V bending sheet metal forming processes, Journal of Materials Processing Technology 148 (2004) 15-24

11. Sutasn Thipprakmas, Wiriyakorn Phanitwong, Process parameter design of springback and spring-go in V bending process using Taguchi

Technique, Material and Design 32 (2011) 4430-4436. 12. Vijay Gautam, Parveen Kumar, Aadityeshwar Singh Deo, Effect of Punch Profile Radius and Localised Compression on Springback in V-

Bending of High Strength Steel and its FEA Simulation, International Journal Of Mechanical EngineeringAnd Technology (Ijmet) , Volume

3, Issue 3, (2012), 517-530 13. Luc Papelux, Jean-Philippe Ponthot, “Finite element simulation of spring back in sheet metal forming”, Material Processing Technology,

125-126 (2002) 785-791.

247-251

52.

Authors: Tahseen Flaih Hasan

Paper Title: FPGA Design Flow for SDR Transceiver using System Generator

Abstract: Software defined radio (SDR) is highly configurable hardware platform that provides technology for

realizing the rapidly expanding third (even future) generation digital wireless communication infrastructure. While

among the silicon alternatives available for implementing the various functions of SDR, field programmable gate

array (FPGA) is an attractive option in terms of performance, power consumption, and flexibility. This paper

examines 16-QAM (Quadrature Amplitude Modulation) SDR transmitter and receiver with an appropriate timing

recovery system using FPGA. We provide a tutorial style overview of techniques and schemes for system

(abstraction) level design of the 16-QAM SDR transmitter and receiver using Xilinx System Generator, ModelSim

and Synplify Pro software, and FPGA implementation (realization) using Xilinx ISE software. Two design

alternatives are presented to highlight the rich design space accessible using the FPGA configurable logic. At last,

this new design technique would help in designing and realizing SDR to 3G wireless communication system and

accelerate the transition to 4G wireless communication system.

Keywords: FPGA, 16QAM, SDR, System Generator

References: 1. A. Pal, “FPGA-based (Xilinx) Embedded System Design,” Workshop on Microcontroller and FPGA-based Embedded System Design, July

2007.

2. The MathWorks, Inc.. DSP – Digital Signal Processing & Communications. , 2009, [Online]. Available:

252-258

http://www.mathworks.com/applications/dsp_comm 3. Xilinx, Inc., DSP Design Flows in FPGA Tutorial Slides, 2003.

4. J. G. Prokis, Digital Communications, 4th ed., New York: McGraw-Hill,2001

5. D. Haessig, J. Hwang, S. Gallagher, and M. Uhm, “Case-Study of a Xilinx System Generator Design Flow for Rapid Development of SDR Waveforms,” in Proc. SDR 05 Forum Tech. Conf. and Product Exposition, Orange County, California, 2005.

6. C. Dick, F. Harris, and M. Rice, “Synchronization in Software Radios Carrier and Timing Recovery Using FPGAs,” , pp. 195- 204. IEEE,

2000. 7. System Generator for DSP User Guide, Release 9.2.01, Xilinx, Inc., 2007.

8. Xilinx ISE 9.2i Software Manuals: Constraints Guide, and Development System Reference Guide, Xilinx, Inc., 2007.

9. P240 Analog Module User Guide, Rev 1.0, Avnet, Inc., May 2006. [Online]. Available: http://www.files.em.avnet.com/files/177/p240_analog-ug.pdf

10. Virtex-4 MB Development Board User’s Guide, Ver. 3.0, AvnetMemec, Dec. 2005. [Online]. Available:

http://www.files.em.avnet.com/files/177/v4mb_user_guide_3_0.pdf 11. “ADS5500: 14-bit, 125 Msps, Analog-to-Digital Converter Data Sheet,” Texas Instrument, Inc., Feb. 2007. [Online]. Available:

http://focus.ti.com/lit/ds/symlink/ads5500.pdf

12. “DAC5687: 16-bit, 500 Msps, 2x-8x, Interpolation Dual-Channel Digital-to-Analog Converter (DAC) Data Sheet,” Texas Instrument, Inc., June 2005. [Online]. Available: http://focus.ti.com/lit/ds/symlink/dac5687.pdf

13. Synplicity FPGA Synthesis Reference Manual, Synplicity, Inc., 2007.

53.

Authors: S.S. Lavhate, Saurabh R. Keskar, Vishal P.Unhale, Avinash Sangale

Paper Title: Advanced Paper Cutting Machine using ARM7

Abstract: The proposed system will be an intelligent automated length measurement device composed of the rotary

encoder, proximity switches, motor and embedded design consisting microcontroller with digital circuitry etc. this

device used as control panel of paper cutting machine, which is used to cut the various kind of paper products,

plastic, thin film, leather, slice of nonferrous metal etc. This system can be applicable in paper cutting industry and

proves how it can be a low cost solution in the production practice.

Keywords: Cutting, Rotary encoder, Safety, touch screen.

References: 1. Gheorghe Livinţ, VasilHorga, Marcel Răţoi and Mihai Albu Gheorghe Asachi Technical University of Iaşi Romania.

2. Abdel Azzeh, Richard duke “CAN control system for Electric Vehicle”, ENZCon 2005, the 12th Electronics New Zeland Conference.

Manukau City, New Zealand, November 2005. 3. Kumar, M. A.Verma, and A. Srividya, Response-Time “Modeling of Controller Area Network (CAN). Distributed Computing and

Networking,

259-261

54.

Authors: Amita Kumari, Rajesh Mehra

Paper Title: Design of Hybrid Method PSO & SVM for Detection of Brain Neoplasm

Abstract: In the field of medical field ,Magnetic resonance imaging (MRI) provides detailed anatomic information

of any part of the body .This methodology consist of 4 steps: image processing ,image enhancement ,feature

extraction and image classification. Image preprocessing is done with the help different gradient operator. Image

enhancement step uses the noise removal and histogram equalization. Wavelet based texture feature are extracted

from normal and tumor regions. At last optimization is done with the help of PSO and SVM classifier

Keywords: MRI, GA, HAAR wavelet, ANN, PSO

References: 1. Kharrat , A; Gasmi K.; Ben Messaoud ,M; Benamrane N. and Abid M. “ A hybrid approach for automatic classification of brain MRI using

genetic algorithm and support vector machine”, Leonardo journal of sciences, Issue 17, pp 71-82, July-Dec ,2010.

2. E.F Badran,.; E.G Mahmoud, N Hamdy .“An algorithm for brain tumor in MRI images”, International Conference on Communication

Computer Engineering and Systems(ICCES), Networking & Broadcasting, pp 368-373, June, 2010.

3. Abdullah, N.; Lee Wee Chuen; Ngah, U.K.; Ahmad, K.A. “Improvement of MRI brain classification using Principles Component Analysis”,

IEEE International Conference on Control System, Computing and Engineering (ICCSCE), ,pp 567-571, March, 2011. 4. Lejian Huang, Elizabeth A. Thompson, Vincent Schmithorst, Scott K. Holland, and Thomas M. Talavage. “partially adaptive STAP

algorithm approaches to functional MRI” ,IEEE transaction on biomedical engineering ,vol56, no2,February 2009

5. M Kociolek , A.Materka,M.Strzelecki P.Szczypinski “Discrete wavelet transform –derived features for digital image texture analysis ,proc. of international confrernce on signal and Electronic System, 18-21 ,sep 2001,Lodz,Poland ,pp.163-168

262-266

55.

Authors: Sunil Kumar Yadav, Rajesh Mehra

Paper Title: Analysis of Different IIR Filter based on Implementation Cost Performance

Abstract: In this paper we examine the optimal implementation cost performance of various IIR Filter, which are

relevant for real time application therefore these filter can realize any transfer function .these IIR filter is designed

and analyzed by FDATOOL and the implementation cost has been analyzed on the basis of filter order, multiplier,

adder, and input samples. The Elliptical IIR Filter is examined and comparison from the Butterworth and Chebyshev

is done. The Elliptical Filter is minimize the order of filter op to 96.59% to Butterworth Filter, and 85.7% to

Chebyshev.

Keywords: Filter, IIR, MATLAB, FDATOOL

References: 1. Soo-Chang Pei, Huei-Shan Lin “Tunable FIR and IIR Fractional-Delay Filter Design and Structure Based on Complex Cepstrum”IEEE

Transactions on circuits and systems—i: regular papers, VOL. 56, pages:2195-2206, OCTOBER 2009.

2. Bojan Jovanovic, and Milun Jevtic “An approach to Digital Low-Pass IIR Filter Design” IEEE Small Systems Simulation Symposium pages:61-66, February 2010

3. Arjuna Madanayake• Thushara K.Gunaratne•Leonard T. Bruton “Reducing the Multiplier-Complexity of Massively Parallel Pollyphase 2D

IIR Broadband Beam Filters” pages:1231-1243, November 2011© Springer

267-270

4. Mariza Wijayanti1, Abdul Hakim2& Sunny Arief Sudiro3 “Designing and Simulation Of Band-Pass Infinite Impulse Response Digital Filter using FPGA Devices” International Technology Research Letters, pages:25-31, 2012

5. Marek Cieplucha “High Performance FPGA-based Implementation of a Parallel Multiplier-Accumulator” 20th International Conference

on"Mixed Design of Integrated Circuits and Systems", pages:485-489 June 2013 6. Fábio Fabian Daitx, Vagner S. Rosa, Eduardo Costa, Paulo Flores, Sérgio Bampi, “VHDL Generation of Optimized FIR Filters”, 2008

International Conference on Signals, Circuits and Systems

7. Ke, Zhang, et al. "The application of the IIR filters based on FPGA in the DTV field." On Computer Science-Technology and Applications,. International Forum on. Vol. 3. IEEE, pages: 406-409 2009.

8. Vagner S. Rosa, Fábio F. Daitx, Eduardo Costa, Sergio Bampi, “Design Flow for the Generation of Optimized FIR Filters”, ICECS 2009.

9. Victor DeBrunner, Linda S. DeBrunner, and Anand Mohan “Using 2nd-0rder information to reduce average coefficient length in IIR Filters” IEEE Conference Publications pages 189-192, 2002

56.

Authors: M.Natheera Banu

Paper Title: FPGA Based Hardware Implementation of Encryption Algorithm

Abstract: Reprogrammable devices such as Field Programmable Gate Arrays (FPGA) are used for hardware

implementations of cryptographic algorithm. This paper presents an FPGA based Hardware implementation of

advanced encryption standard (AES) with 128-bit key as a constant which is used for encrypting the text file and

image for secure transmission. Timing report for the files are taken and conclude that text file of 128 bit size is taking

less time to encrypt and decrypt compare to the image file. Synthesizing and implementation (Translate, Map and

Place and Route) of the VERILOG code is carried out on Xilinx - Project Navigator ISE 12.3 software.

Keywords: AES, decryption, encryption, image and text.

References: 1. Xinmiao Zhang and Keshab K. Parhi “HIGH-SPEED VLSI ARCHITECTURES FOR THE AES ALGORITHM” IEEE TRANSACTIONS

ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 12, NO. 9, SEPTEMBER 2004.

2. Jia Zhao, Xiaoyang Zeng*, Jun Han, Jun Chen State-Key Lab ofASIC and System,“VERY LOW-COST VLSI IMPLEMENTATION OF AES ALGORITHM” IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS,2006

3. Bin Liu, and Bevan M. Baas “PARALLEL AES ENCRYPTION ENGINES FOR MANY- CORE PROCESSOR ARRAYS IEEE

TRANSACTIONS ON COMPUTERS, VOL. 62, NO. 3, MARCH 2013 4. Stefan Mangard Student Member, IEEE, Manfred Aigner, and Sandra Dominikus “A HIGHLY REGULAR AND SCALABLE AES

HARDWARE ARCHITECTURE” IEEE TRANSACTIONS ON COMPUTERS, VOL. 52, NO. 4, APRIL 2003

5. P.Karthigaikumar Soumiya Rasheed “SIMULATION OF IMAGE ENCRYPTION USING AES ALGORITHM” IJCA Special Issue on Computational Science - New Dimensions & Perspectives” NCCSE, 2011.

6. Manoj.B, Manula N Harihar “IMAGE ENCRYPTION AND DECRYPTION USING AES” International Journal of Engineering and

Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-1, Issue-5, June 2012. 7. Jawad Ahmad and Fawad Ahmed “EFFICIENCY ANALYSIS AND SECURE VALUATION OF IMAGE ENCRYPTION SCHEMES”

International Journal of Video & Image Processing and Network Security IJVIPNS-IJENS Vol:12 No:04.

8. Mr. Antosh M. Dyade, Prof. Raafiya Gulmeher “MODIFIED SHIFTROW TRANSFORMATION OF AES FOR IMAGE ENCRYPTION” International Journal of Communications And Engineering Vol. 4 Issue 3, Sept. 2013

9. Sourabh Singh, Anurag Jain “AN ENHANCED TEXT TO IMAGE ENCRYPTION TECHNIQUE USING RGB SUBSTITUTION AND

AES” International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013 10. Amandeep Kaur, Puneet Bhardwaj, Naveen Kumar” FPGA IMPLEMENTATION OF EFFICIENT HARDWARE FOR THE ADVANCED

ENCRYPTION STANDARD” International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075,

Volume-2, Issue-3, February 2013 11. Chityala Prathyusha, P. Sharmila Rani “IMPLEMENTATION OF FAST PIPELINED AES ALGORITHM ON XILINX FPGA”

International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064

13. Mg Suresh, Dr.Nataraj.K.R” AREA OPTIMIZED AND PIPELINED FPGA IMPLEMENTATION OF AES ENCRYPTION AND DECRYPTION” International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue.

271-277

57.

Authors: Sabah SHehd Abdulabas

Paper Title: Efficient Timing Recovery Technique for Software Defined Radio Receiver using FPGA

Abstract: This paper presents the timing recovery in software defined radio receiver as a widely used technique

nowadays. Software defined radios (SDR) is the more configurable hardware platforms that provide the technology

for realizing the fast growing third and new generation digital wireless communication structure. The more complex

duty performed in a high data rate wireless system is the synchronization. The timing synchronization in SDRs using

FPGA based signal processors is introduced. The 16-QAM loop for performing coherent demodulation were

described and reported on the suggestion of FPGA automation. A matched filter control system is used to provide

and addressed the symbol timing recovery technique. To explain the operations of the timing recovery loop and

reflection, much approach is adopted and outlined for FPGA performance.

Keywords: Timing Recovery, SDR, FPGA

References: 1. Chris Dick, fred harris and Michael Rice, “Synchronization in Software Radios - Carrier and Timing Recovery Using FPGAs”, IEEE, 2000,

PP.195-204 2. H. Meyr, M. Moeneclaey and S. A. Fechtal, Digital Communication Receivers, John Wiley & Sons Inc., New York, 1998.

3. B. Sklar, Digital Communications Fundamentals and Applications, Prentice Hall, Englewood Cliffs, New Jersey, 1988.

4. D. R. Brown III and H. Poor, “Time-slotted round-trip carrier synchronization for distributed beamforming,” IEEE Transactions on Signal Processing, 2008

5. D. R. Brown III, G. B. Prince, and J. A. McNeill, “A method for carrier frequency and phase synchronization of two autonomous cooperative

transmitters,” IEEE 6th Workshop on Signal Processing Advances in Wireless Communication, 2005 6. Chan, Tsui, Yeung, and Yuk,“ Design and Complexity Optimization of a New Digital IF for Software Radio Receivers With Prescribed

Output Accuracy” IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS—I: REGULAR PAPERS, VOL. 54, NO. 2, pp 351-366, 2007

7. Durke (2009), “Field Programmable Gate Array Based SDR Design” phd. Thesis, Naval postgraduate school, Department of Electrical and Computer Engineering,California:http://edocs.nps.edu/npspubs/scholarly/theses/2009

8. Ezra, Joseph and kahn, “Carrier Synchronization for 3-bita and 4-bits per symbol optical transmission”, IEEE, Journal of light wave

278-286

technology, Vol.23, pp.4110-4124, 2005 9. Jeffry H. Reed, “Software Radio a modern approach to radio engineering”, Prentice Hall PTR, A division of person education Inc, ISBN 0-

13-081158-0, pp.33-123, 2002

10. Pedro and Nuno, “Multi-Mode Receiver for Software Defined Radio”, Institute of Telecommunication – University of Aveiro – Portugal, online available: http://www.anacom.pt/render.jsp?contentId=761239, 2008

11. Tony, “RF and Digital Signal Processing for Software-Defined Radio”, Elsevier, ISBN 978-0-7506-8210-7, UK, pp. 319, 2009

12. Proakis, and Salehi,. “Digital Communications”, 5th ed., New York, NY: McGraw-Hill, Ch. 3, pp. 95-148, 2008

58.

Authors: Varun Singh Nagar, Subhash Chand Gupta

Paper Title: Voice and Location Based Appliance Automation System Using Mobile Cloud

Abstract: We are in the information technology age. Mobile technology is getting a fast pace in this older

population has more ratio than other age group. Smart phones are a great enhancing the use of technology and its

advancement. In this paper we are going to present the modular based home automation system environment and the

technologies required to achieve the goal of automation. This concept uses voice commands to act as commands to

control the appliances in context to home office or car. Cloud platform is used for processing of commands on the air

and dispatched from cloud server to controlling modules at home, office or car respectively. As cloud computing is

the future of information sharing and shared resource utilization with optimization. This also brief the challenges

involved in implementing voice based appliance automation using cloud platform. As it is evident that home

automation is in its immature state so other technological challenges should be considered which can affect the

system.

Keywords: Android, Cloud, Home automation, Speech recognition, Voice based.

References: 1. Vu Le , Sumit Gulwani , Zhendong Su “SmartSynth: Synthesizing Smartphone Automation Scripts from Natural Language 2013 ACM“

2. Mitali Patil , Aswini Bedare, Varsha Pacharne “ The Design and Implementation of Voice Controlled Wireless Intelligent Home Automation System Based on ZigBee.“ 978-1-4244-4738-1/09/ 2013 IJARCSSE.

3. Syed Anwaarullah , S.V.Altaf “RTOS based Home Automation System using Android “ Jan-2013 IJATCSE.

4. Humaid Al Shu’eili “ Wireless Home Automation based on Voice Recognition” 5. Andre Coucopulus “Voice Processing for Home Automation Systems” Network Systems Design Line January 2007

6. R.Gadalla “Speech Recognition System for Massey SmartHouse”

7. Jianliang Meng , Jhunwei Zhang “Overview of the Speech Recognition Technology” 978-0-7695-4789-3/12 $26.00 © 2012 IEEE. 8. Rawan T.Khalil , AlaF.Khalifeh , Khalid A Dhrabakh “Mobile-Free Driving with Android Phones: System Design and Performance

Evaluation” 2012 – 9th International Multi-Conference on Systems.

9. Fengyu Zhou, Guohui Tian, Yang Yang, Hairong Xiao and Jingshuai Chen “Research and Implementation of Voice Interaction System

Based on PC in Intelligent Space” Proceedings of the 2010 IEEE International Conference on Automation and Logistics August 16-20 2010,

Hong Kong and Macau

10. M. Saadeq Rafieee , Ali Akbar Khazaei “A Novel Model Characteristics for Noise-Robust Automatic Speech Recognition Based onHMM” 978-1-4244-5849-3/10/$26.00 ©2010 IEEE.

287-288

59.

Authors: N.Sasirekha, M.Hemalatha

Paper Title: Quantum Cryptography using Quantum Key Distribution and its Applications

Abstract: Secure transmission of message between the sender and receiver is carried out through a tool called as

cryptography. Traditional cryptographical methods use either public key which is known to everyone or on the

private key. In either case the eavesdroppers are able to detect the key and hence find the message transmitted

without the knowledge of the sender and receiver. Quantum cryptography is a special form of cryptography which

uses the Quantum mechanics to ensure unconditional security towards the transmitted message. Quantum

cryptography uses the distribution of random binary key known as the Quantum Key Distribution (QKD) and hence

enables the communicating parties to detect the presence of potential eavesdropper. This paper also analyses few

application areas of quantum cryptography and its limitations.

Keywords: Classical Cryptography, Photon polarization, Qubit, Quantum Cryptography, Quantum entanglement,

Quantum Key Distribution, Sifting key.

References: 1. Wiesner, Stephen., 1983. "Conjugate coding." ACM Sigact News 15.1: 78-88.

2. Henle, F., 2002. BB84 Demo. http://www.cs.dartmouth.edu/~henle/Quantum/cgi-bin/Q2.cgi 3. Ford, James., 1996. "Quantum cryptography tutorial." http://www.cs.dartmouth.edu/~jford/crypto.html.

4. Harrison, David M., 2001. "Quantum Teleportation, Information and Cryptography."

http://www.upscale.utoronto.ca/GeneralInterest/Harrison/QuantTeleport/ QuantTeleport.html. 5. Knight, Will., 2004. "Entangled photons secure money transfer." Newscientist.com.

http://www.newscientist.com/news/news.jsp?id=ns99994914.

6. Quantum cryptography. Wikipedia, the free encyclopedia. http://en.wikipedia.org/wiki/Quantum_cryptography. Modified 17 September 2004.

7. The BB84 Quantum Coding Scheme, June 2001. http://www.cki.au.dk/experiment/qrypto/doc/QuCrypt/bb84coding.html

8. Gisin, N., Ribordy, G., Tittel, W., Zbinden, H., "Quantum Cryptography", Reviews of Modern Physics, vol. 74, January 2002, pp. 146 - 195.http://www.gap-optique.unige.ch/Publications/Pdf/QC.pdf

9. Martinez-Mateo, Jesus, David Elkouss, and Vicente Martin. "Key reconciliation for high performance quantum key distribution." Scientific

reports 3 (2013). 10. C. H. Bennett and G. Brassard. 1984.Quantum Cryptography: Public Key Distribution and Coin Tossing. In Proc. IEEE Int. Conf. on

Comp.,Sys. and Signal Process., pages 175–179, Bangalore.

11. A. K. Ekert. Quantum Cryptography Based on Bell’s Theorem. Phys. Rev. Lett. 67(6):661–663, 1991. 12. Hughes, Richard J., et al. 1995. "Quantum cryptography." Contemporary Physics 36.3: 149-163.

13. Hoque, S., Fairhurst, M., Howells, G., & Deravi, F. (2005, March 17). Feasibility of generating biometric encryption keys. Electronics

Letters, 41(6), 1-2. 14. Webb, W. (2006, July 20). Hack-proof design. (Cover story). EDN, 51(15), 46-54.

15. Lovoshynovskiy, S., Deguillaume, F., Koval, O., & Pun, T. (2005, January). Information-theoretic data-hiding:: recent achievements and

289-294

openproblems. International Journal of Image & Graphics, 5(1), 5-35. 16. Floyd, D. (2006, Fall2006). Mobile application security system (MASS). Bell Labs Technical Journal, 11(3), 191-198.

17. Hughes, D. (2007, May). Cyberspace Security via Quantum Encryption. Military Technology,31(5), 84-87.

18. Sasirekha, N., And M. Hemalatha. "A Hybrid Indexed Table And Quasigroup Encryption Approach For Code Security Against Various Software Threats." Journal of Theoretical & Applied Information Technology 60.2 (2014).

19. Sasirekha, N., and M. Hemalatha. "Novel Secure Code Encryption Techniques Using Crypto Based Indexed Table for Highly Secured

Software." International Review on Computers & Software 8.8 (2013). 20. Sasirekha, N., and M. Hemalatha. “A Quasigroup Encryption Based Cryptographic Scheme for Software Protection.” International Journal

of Advances in Engineering and Emerging Technology 3.1(2013).

60.

Authors: Anamika Mishra, Anju Jaiswal, Ankita Jaiswal, A.K.Niketa

Paper Title: Design and Analysis of Conventional CMOS and Energy Efficient Adiabatic Logic for Low Power

VLSI Application

Abstract: In recent years, low power circuit design has been an important issue in VLSI design areas. Adiabatic

logics, which dissipate less power than static CMOS logic, have been introduced as a promising new approach in low

power circuit design. energy. This paper proposes an Adder circuit based on energy efficient two-phase clocked

adiabatic logic. A simulative investigation on the proposed 1-bit full adder has been implemented with the proposed

technique and hence compared with standard CMOS, Positive Feedback Adiabatic Logic (PFAL) and Two-Phase

Adiabatic Static Clocked Logic (2PASCL) respectively. Comparison has shown a significant power saving to the

extent of 70% in case of proposed technique as compared to CMOS logic in 10 to 200MHz transition frequency

range. Comparative results has also been shown by a histogram which represents the least power dissipation of

proposed technique. In this paper all circuits are analyzed in terms of power using 0.35um technology and simulated

using Pspice .

Keywords: Adiabatic logic, energy recovery ,power supply, low power ,Full adder, Positive feedback adiabatic

logic, 2PASCL

References: 1. A.K.Maurya, G. Kumar, "Energy Efficient Adiabatic Logic for low power VLSI APPLICATION," IEEE International Conference on

Communication Systems & Network Technologies, pp 460-463,2011.

2. H.M.Meimand and A.A.Kusha and M.Nourani, "Adiabatic Carry look-ahead Adder with Efficient Power Clock Generator," IEEE Proc.-Circuit Devices Systems, Vol. 148, No. 5, pp. 229-234,October.2001

3. S.Kim,M.C.Papefthymiou, "True Single-Phase Adiabatic Circuitry," IEEE Transactions on Very Large Scale Integration (VLSI) Systems,

Vol. 9, No. 1, pp. 52-63, February 2001. 4. W.C.Athas,L.J.Svensson,J.G.Koller,et al.,"Low power digital systems based on adiabatic switching principles,"IEEE Trans.On VLSI

systems,2(4),Dec.1994,pp:398-407. 5. P.Saxena ,Prof. D.Chandra and S.Kumar.V, "An Adiabatic Approach for Low Powerful Adder Design," International Journal On Computer

Science & Engineering, Vol.3, No. 9,pp.3207-3221,2011

6. A.Sajid, A.Nafees & S. Rahman, "Design and Implementation of Low Power 8-bit Carry-lookAhead Adder Using Static CMOS Logic and Adiabatic Logic," International Journal Information Technology and Computer Science, Vol.11, pp. 78-92,2013.

7. N.Anuar, Y.Takahashi, and T.Sekine, "Two Phase Clocked Adiabatic Static CMOS Logic and its Logic Family," Journal of Semiconductor

Technology and Science, Vol. 10,No. 1, pp. 1-10, 2010. 8. M.S.Dhaka, Gayatri and P.Singh Dhaka, "Adiabatic Logic Gate for Low Power Application," International Journal of Engineering Research

and Applications, Vol. 2, No. 3, pp. 2474-2478, 2012.

9. M.Sharma, "Design & Analysis of CMOS Cells using Adiabatic Logic," International Journal of Networks & Systems, Vol. 1, No. 2, pp. 52-57, 2012.

10. S.K.Kelly and J.L.Wyatt, "A Power Efficient Neural Tissue Stimulator with Energy Recovery," IEEE Transactions on Biomedical Circuits

and Systems, Vol.5, No. 1, pp. 20-29, Feb. 2011. 11. G.Singh ,R.Kumar and M.K.Sharma, "Comparative Analysis of Conventional CMOS and ENERGY Efficient Adiabatic Logic Circuits,"

International Journal of Emerging Technology and Advanced Engineering,Vol. 3,No.9,pp 260-264,September 2013.

12. D.Maksimovic´, V.G.Oklobdžija, B.Nikolic´, and K. Wayne Current, "Clocked CMOS Adiabatic Logic with Integrated Single-Phase Power-Clocked Supply," IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol.8, No. 4, pp. 460-463, August 2000

13. P.Teichmann(2012),"Fundamental of Adiabatic Logic," Chapter 2,pp 5-22.

14. S.Goel,A.Kumar and M.A.Bayoumi,(2006),"Design of robust,energy efficient full adders for deep-submicro meter design using hybrib CMOS logic styles," IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol.14, No. 12, pp.1309-1321.

295-299

61.

Authors: A.Vaishnavi, B.Chanakya Raju, G.Prathiksha, L.Harshitha Reddy, C.Santhosh Kumar

Paper Title: Comparison of Two Speaker Recognition Systems

Abstract: This paper presents a comparison between two speaker recognition systems. One system uses 30

Shannon entropy values extracted from a four level wavelet packet decomposition method in addition to the first

three formant frequencies as features and a cascaded feed forward back propagation neural network is used as

classifier. The second system uses Mel frequency cepstral coefficients (MFCC) as features and a support vector

machine (SVM) as classifier. Results suggest that wavelet based system has better performance than the classic

MFCCs with an efficiency of 89.56%.

Keywords: Shannon entropy, Formant frequencies, cascaded neural network, MFCC, SVM.

References: 1. T. Kinnunen and H. Li, “An overview of text-independent speaker recognition from features to super vectors,” Speech communication.vol.

52, pp. 12-40. 2010.

2. K. Daqrouq, “Wavelet entropy and neural network for text-independent speaker identification,” Engineering Applications of Artificial

Intelligence., vol. 24, pp. 796-802. 2011. 3. K. Daqrouq, T. Abu Hilal, M. Sherif, S. El-Hajjar and A. Al-Quawasmi, “Speaker identification system using wavelet transform and neural

network,” Advances in Computational Tools for Engineering Applications (ACTEA)., ZoukMosbeh, Lebanon, pp. 559-564. Jul. 2009.

4. R. Sarikaya, J.H.L. Hansen and L. Bryan, “Wavelet transform features with application to speaker identification,” in Proc. of IEEE Nordic Signal Processing Symp., Visgo, pp. 81-84. 1998.

5. M. Siafarikas, T. Ganchev and N. Fakotakis, “Objective wavelet packet features for speaker verification,” in Proc. Of the InterSpeech-2004-ICSLP., Jeju, Korea, pp. 2365-2368. Oct. 2004.

300-303

6. Kuruvachan K. George, Arunraj K and Sreekumar K.T, “Towards Improving the Performance of Text/Language Independent Speaker Recognition Systems.”

7. D. A. Reynolds, Thomas F. Quatieri and Robert B. Dunn,“Speaker verification using Adaptive Gaussian Mixture Models,” in Digital Signal

Processing Vol. 10.Nos. 1-3,January 2000.

62.

Authors: Misba Gul, Alsana Bashir, Javed A Naqash

Paper Title: Study of Modulus of Elasticity of Steel Fiber Reinforced Concrete

Abstract: Plain, unreinforced concrete is a brittle material, with a low tensile strength, limited ductility and little

resistance to cracking. In order to improve the inherent tensile strength of concrete there is a need of multidirectional

and closely spaced reinforcement, which can be provided in the form of randomly distributed fibers. Steel fiber is one

of the most commonly used fibers. Short, discrete steel fibers provide discontinuous three-dimensional reinforcement

that picks up load and transfer stresses at micro-crack level. This reinforcement provides tensile capacity and crack

control to the concrete section prior to the establishment of visible macro cracks, thereby promoting ductility or

toughness.

The modulus of elasticity of concrete is a very important parameter reflecting the ability of concrete to deform

elastically. In addition, in order to make full use of the compressive strength potential, the structures using high

strength concrete tend to be slimmer and require a higher elastic modulus so as to maintain its stiffness. Therefore,

knowledge of the modulus of elasticity of high strength concrete is very important in avoiding excessive

deformation, providing satisfactory serviceability, and avoiding the most cost-effective designs.

The present experimental study considers the effect of steel fibers on the modulus of elasticity of concrete. Hook end

steel fibers with aspect ratio of 50 and 71 at volume fraction of 0.5%, 1.0% and 1.5% were used. Study on effect of

volume fraction and aspect ratio of fibers on the modulus of elasticity of concrete was also deemed as an important

part of present experimental investigation. The results obtained show that the addition of steel fiber improves the

modulus of elasticity of concrete. It was also analyzed that by increasing the fiber volume fraction from 0.5% to

1.5% and aspect ratio of fibers from 50 to 71 there was a healthy effect on modulus of elasticity of Steel Fiber

Reinforced Concrete.

Keywords: Aspect ratio, Compressometer, Modulus of Elasticity, Steel fiber reinforced concrete, volume fraction.

References: 1. Chen, S, 2004. “Strength of Steel Fibre Reinforced Concrete Ground Slabs”. Proceedings of the Institute of Civil Engineers, Structures and

Buildings (157), Issue SB2, pp. 157-163

2. Banthia,N,Chokri,K, and Trottier,JF,1995. Impact tests on Cement-Based Fiber Reinforced Composites. ACI Publications, Detroit, USA, SP, 155-9, pp.171-188

3. Khaloo, A R and Kim, N, 1997. “Influence of Concrete and Fiber Characteristics on Behaviour of Steel Fiber Reinforced Concrete under

Direct Shear”. ACI Materials Journal, 94, No. 4, pp. 592-601. 4. Johnston, CD, and Zemp, WR, 1991. “Flexural Fatigue performance of Steel Fibre reinforced concrete- Influence of Fibre Content, Aspect

Ratio, and Type”. ACI Material Journal, 88, No.4, pp. 374-383.

5. Elsaigh,WA and Kearsley,EP,2002.”Effect of Steel Fibre Content on Properties of Concrete”. Journal of Concrete/Beton, South Africa, No 102, pp. 8-12.

6. Johnston Gopalaratnam, V.S. and S. Shah, 1987. “Failure mechanism and Fracture of fibre reinforced concrete, Fibre reinforced concrete –

Properties and Application”, American Concrete Institute, Detroit, pp: 1-25 7. A.M Shende et al.. “Comparative Study on Steel Fiber Reinforced cum Control Concrete” International Journal Of Advanced Engineering

Sciences And Technologies Vol. No. 6, Issue No. 1, 116 – 120

8. Mohammed Alias Yusof et al., “Mechanical Properties of Hybrid Steel Fibre Reinforced Concrete with Different Aspect Ratio.” Australian Journal of Basic and Applied Sciences, 5(7): 159-166, 2011

9. Er Prashant Y.Pawade et al. “Effect of Steel Fibres on Modulus of Elasticity of Concrete” (IJAEST) International Journal Of Advanced

Engineering Sciences And Technologies Vol No. 7, Issue No. 2, 169 – 177 10. Osman Gencel et al.. “ Workability and Mechanical Performance of Steel Fiber-Reinforced Self-Compacting Concrete with Fly Ash”

Composite Interfaces 18 (2011) 169–184

11. Saravana Raja Mohan. K, Parthiban. K “Strength and behaviour of Fly Ash based Steel Fibre Reinforced Concrete Composite. 12. J. Mater. “Mechanical Properties of Steel Fiber Reinforced Concrete”, Journal of Materials in Civil Engineering ,Volume 19 , Issue 5, 2007

13. IS: 383-1970, “Indian standards specification for coarse and fine aggregates from natural sources for concrete”, Bureau of Indian

Standards, New Delhi 14. BS 1881: Part 121:1983,” Testing concrete Method for determination of static modulus of elasticity in compression”.

15. ASTM C 469-94” Standard Test Method for Static Modulus of Elasticity and Poisson’s Ratio of Concrete in Compression”

304-309

63.

Authors: K.V.Rama Krishna Rao, K.Durga Rani, S.S.S.V.Gopala Raju

Paper Title: Feasibility Study on Motor Cycle Lanes in Visakhapatnam City

Abstract: The present study addresses a comprehensive analysis and feasibility of motor cycle lanes in two

important city roads, “CMR central to Thatichetlapalem via., Gurudwara junction”, and “Jagadamba junction to old

post office via., Poorna market in Greater Visakhapatnam Municipal Corporation[GVMC]” which are carrying 52%

and 55% of motor cycles in total traffic. The paper discusses the basic understanding of travel time benefits and

travel comfort by separating two wheeler motor cycle traffic from mixed traffic.

Keywords: Exclusive motor cycle lanes, Inclusive motor cycle lanes, Motor cycle traffic, Mixed traffic.

References: 1. Radin Umar R.S., Barton, E. (1997) Preliminary Cost-Benefit Analysis of the Exclusive Motorcycle Lanes in Malaysia, REAAA Journal

No. 9,1997pp 2-6

2. Radin Umar R.S., Murray, G. Mackay and Brian, L. Hills (1995) Preliminary Analysis on Impact of Motorcycle Lanes Along Federal Highway F02, Shah Alam, Malaysia, Journal of IATSSResearch Vol. 19, No. 2, pp 93-98

3. Gopala Raju SSSV, Duraga Rani K (2012) Identification of black spots and junction improvements in Visakhapatnam City, Indian Journal

of innovations & development, Vol.1, No.6, pp.469-471

310-312

4. Gopala Raju SSSV (2011) Vehicular growth and its management: Visakhapatnam city in India– A case study, Indian Journal of Science and Technology, Vol.4, No.8,pp. 903-906.

5. Kumar P.S, Gopala Raju SSSV, Murali M, Prasad CSRK (2007), Assessment of Noise level due to vehicular traffic at Warangal city,

International journal of environment and pollution, Vol.30, No.1, pp137-153. 6. Hussain, H., Radin Umar, R. S., Ahmad Farhan, M. S., & Dadang, M. M. (2005). Key components of a motorcycle-traffic system - A study

along the motorcycle path in Malaysia. IATSS Research, Vol. 29(1),pp.50-56.

7. Tung, S. H., Wong, S. V., Law, T. H., and Radin Umar, R. S. (2008). Crashes with roadside objects along motorcycle lanes in Malaysia. International Journal of Crashworthiness, Vol. 13(2), pp.205-210.

64.

Authors: A.Praveena, M.Jayashree

Paper Title: Mitigation of Voltage SAG using Dynamic Voltage Restorer

Abstract: Power quality problem is an occurrence manifested as an nonstandard voltage ,current or frequency that

results in failure of end use equipments .one of the major problem in power quality is voltage sag .To improve the

power quality, custom power devices are used. The custom power device used here is DVR(Dynamic Voltage

Restorer) is role to compensate load voltage during the different fault conditions like voltage sag ,single line to

ground ,double line to ground faults .In this work ,PI controller and discrete PWM pulse generator are used for the

control purpose

Keywords: component; PWM(pulse width modulation) technic,DVR(dynamic voltage restorer),PI(proportional

integral) controller

References: 1. D. Daniel Sabin, Senior member IEEE ,and Ambra Sannino, IEEE “A summary of the draft IEEE P1409 Custom Power Application

Guide” Transmission and Distribution Conference and Exposition, IEEE PES, vol.3,pp.931-936,2003.

2. Yash Pal, A. Swarup Senior Member, IEEE,and Bhim Singh, Senior Member IEEE”A Review of Compensating Type Custom Power Devices for Power Quality Improvement” IEEE Power India Conference,2008.

3. Michael D. Stump, Gerald J. Keane “The Role, of Custom Power Products in Enhancing Power Quality at Industrial Facilities”, Energy

Management and Power Delivery.vol. 2,507-517,International Conference 1998. 4. Bingsen Wang, Giri Venkataramanan and Mahes Illindala,” Operation and Control of a Dynamic Voltage Restorer Using Transformer

Coupled H-Bridge Converters”, IEEE Transactions on power electronics,vol.21,pp.1053-1061,july 2006.

5. Fawzi AL Joeder” Modelling and Simulation of Different System Topologies for Dynamic Voltage Restorer” Electric Power and Energy Conversion Systems,EPECS’09.InternationalConferences,IEEE,pp.1-6,2009.

6. D.N.Katole Research Scholor :Department of Electrical Engg. G. H.Raisoni College of Engineering Nagpur, Maharashtra India.”Analysis

and Mitigation of Balanced Voltage Sag with The Help of Energy Storage System” ICETET pp.317-321,2010. 7. H.P.Tiwari and Sunil Kumar Gupta “Dynamic Voltage Restorer against Voltage Sag” International Journal Of Innovation, Management and

Technology.vol. 1,no. 3,pp.232-237,2010.

313-318

65.

Authors: Amita Kumari, Rajesh Mehra

Paper Title: Hybridized Classification of Brain MRI using PSO & SVM

Abstract: Magnetic resonance imaging (MRI) provides detailed anatomic information of any part of the body. In

this method a hybrid approach for classification of brain tissue in MRI based on Particle Swarm Optimization (PSO)

and Support Vector Machine (SVM) wavelet based texture feature are extracted from normal and tumor region by

using HAAR wavelet. These features are given as input to the SVM classifier which classified them into normal &

abnormal brain neoplasm. The algorithm incorporates steps for pre-processing, image segmentation and image

classification using SVM classifier.

Keywords: MRI, Classification PSO, SVM, HAAR wavelet

References: 1. A .Kharrat, K Gasmi , M Ben Messaoud , N Benamrane and M Abid . “ A hybrid approach for automatic classif ication of brain MRI using

genetic algorithm and support vector machine”, Leonardo journal of sciences, Issue 17, pp 71-82, July-Dec ,2010. 2. E F Badran, E G Mahmoud, N Hamdy “An algorithm for brain tumor in MRI images”, International Conference on Communication

Computer Engineering and Systems (ICCES), Networking & Broadcasting, pp 368-373, June, 2010.

3. N Abdullah, Lee Wee Chuen; U K Ngah, KA Ahmad, “Improvement of MRI brain classification using Principles Component Analysis”, IEEE International Conference on Control System, Computing and Engineering (ICCSCE), ,pp 567-571, March, 2011.

4. M Hasanzadeh ,S Kasaei.”Multispectral brain MRI segmentation using genetic fuzzy systems” international conference on communication

,networking and broadcasting(ISSPA),pp 1-4,June,2001 5. V.vapnik “the nature of statistical learning theory, springer-verlag, newyork, 1995

6. S N Deepa, B A Devi .”Artificial neural networks design for classification of brain tumor” IEEE International Conference on Computer

Communication and Informatics(ICCII), pp 1-6, 2012. 7. E. I.Zacharaki ,Sumei Wang ,S Chawla, Dong Soo Yoo, R Wolf ,E.R Melhem, C.Davatzikos.”MRI based classification of brain tumor type

and grade using SVMRFE”.IEEE Symposium on bioengineering,pp-1035-1038,April ,2009.

8. M .C Clark, L. O Hall, D.B.Goldgof, R.Velthuizen, F.R. Murtagh, and M.S Silbiger. “Automatic tumor segmentation using knowledge based technique, IEEE transaction on medical imaging, vol 17,no 2,pp-187-192,April,1998.

9. W. E. Reddick , J.O Glass, E. N. Cook , T. D Elkin ,R. J. Deaton. “Automated segmentation and classification of multispectral magnetic

resonance images of brain using artificial neural networks”, IEEE transaction on medical imaging, vol 16, no 6,pp 911-918 ,1997. 10. Huazhu Song , Zichun Ding, Cuicui Guo , Zhe Li, Hongxia Xia. “ Research on combination kernel function of Support Vector Machine .”

International Conference on Computer science and software engineering, pp-345-356, 2008

11. Mcconnell Brain Imaging centre (june 2006) stimulated data base [online] available http://www.bic .mni.mcgill.ca /brainweb). 12. Y.J .Kennedy ,R.Eberhart. “ Particle Swarm Optimization.” IEEE International Conference on Neural Network,pp-1942- 1948, 1995.

13. Vladimir N. Vapnik “ The Nature of Statistical Learning Theory” New York: Springer –Verlag,2000

319-323

66.

Authors: Azher Jameel

Paper Title: A Comparative Study of XFEM and EFGM in Solving Frictional Contact Problems

Abstract: In this paper, the extended finite element method (XFEM) and the element free Galerkin method

(EFGM) have been employed to model and simulate the contact type of nonlinearities caused by the discontinuities

due the frictional contact. In order to model these discontinuities, few modifications are made in XFEM and EFGM

324-331

to incorporate these discontinuities in the formulation. The contact interface between the two bodies is modeled by

applying an appropriate enrichment function. The classical approximate solution is enriched with the Heaviside jump

function to simulate the contact behavior between the two surfaces. Gaussian quadrature has been used for the

numerical integration of the weak formulation. Finally, three model problems are solved using XFEM and EFGM

and the results obtained by the two techniques are compared with each other. The results obtained by XFEM show a

good agreement with the results obtained by EFGM.

Keywords: XFEM, EFGM, slip criterion, slip rule, penalty factor, level set, Heaviside jump function.

References: 1. T. Liszka, J. Orkisz, "The finite difference method at arbitrary irregular grids and its application in applied mechanics", Computers and

Structures, vol. 11, 1980, pp. 83-95. 2. J. Oliver, A. E. Huespe, P. J. Sanchez, "A finite element method for crack growth without remeshing", International Journal for Numerical

Methods in Engineering, vol. 46, 1999, pp. 131-150.

3. J. A. A. Portela, M. Aliabadi, D. Rooke, "The dual boundary element method: effective implementation for crack problems", International Journal for Numerical Methods in Engineering, vol. 33, 1991, pp. 1269-1287.

4. U. Haussler, C. Korn, "An adaptive approach with the element free Galerkin method", Computer Methods in Applied Mechanics and

Engineering, vol. 162, 1998, pp. 203-222. 5. A. R. Khoei, S. O. R. Biabanaki, M. Anahid, "Extended finite element method for three-dimensional large plasticity deformations on

arbitrary interfaces", Computer Methods in Applied Mechanics and Engineering, vol. 197, 2008, pp. 1100-1114.

6. J. H. Chen, N. Kikuchi, "An incremental constitutive relation of unilateral contact friction for large deformation analysis", Journal of Applied Mechanics, vol. 52, 1985, pp. 639-648.

7. P. Papadopoulos, R. L. Taylor, "A mixed formulation for the finite element solution of contact problems", Computer Methods in Applied

Mechanics and Engineering, vol. 94, 1992, pp. 373-389. 8. K. J. Bathe, A. Chaudary, "A solution method for planar and axisymmetric contact problems", International Journal for Numerical Methods

in Engineering, vol. 21, 1985, pp. 65-88.

9. N. Sukumar, D. L. Chopp, N. Moes, T. Belytschko, "Modeling holes and inclusions by level sets in the extended finite-element method", Computer Methods in Applied Mechanics and Engineering, vol. 190, 2001, pp. 6183-6200.

10. J. M. Melenk, I. Babuska, "The partition of unity finite element methods: basic theory and applications", Computer Methods in Applied

Mechanics and Engineering, vol. 139, 1996, pp. 289-314. 11. J. Dolbow, N. Moes, T. Belytschko, "An extended finite element method for modeling crack growth with frictional contact", Computer

Methods in Applied Mechanics and Engineering, vol. 190, 2001, pp. 6825-6846.

12. N. Moes, T. Belytschko, "Extended finite element method for cohesive crack growth", Engineering Fracture Mechanics, vol. 69, 2002, pp. 813-833.

13. I. V. Singh, B. K. Mishra, S. Bhattacharya, R. U. Patil, "The numerical simulation of fatigue crack growth using extended finite element

method", International Journal of Fatigue, vol. 36, 2012, pp. 109-119. 14. S. Glodez, Z. Ren, "Modelling of crack growth under cyclic contact loading", Theoretical and Applied Fracture Mechanics, vol. 30, 1998,

pp. 159-173. 15. P. M. A. Areias, T. Belytschko, "Analysis of three-dimensional crack initiation and propagation using the extended finite element method",

International Journal for Numerical Methods in Engineering, vol. 63, 2005, pp. 760-788.

16. A. R. Khoei, A. Shamloo, A. R. Azami, "Extended finite element method in plasticity forming of powder compaction with contact friction", International Journal of solids and structures, vol. 43, 2006, pp. 5421-5448.

17. M. Anahid, A. R. Khoei, "New development in extended finite element modeling of large elasto-plastic deformations", International Journal

for Numerical Methods in Engineering, Vol. 75, 2008, pp. 1133-1171. 18. B. Prabel, A. Combescure, A. Gravouil, S. Marie, "Level set X-FEM non-matching meshes: application to dynamic crack propagation in

elasto-plastic media", International Journal for Numerical Methods in Engineering, vol. 69, 2006, pp. 1553-1569.

19. S. Mariani, U. Perego, "Extended finite element method for quasi-brittle fracture", International Journal for Numerical Methods in Engineering, vol. 58, 2003, pp. 103-126.

20. L. B. Lucy, "A numerical approach to the testing of the fission hypothesis", Astronomical Journal, vol. 82, 1977, pp. 1013-1024.

21. J. W. Swegle, D. L. Hicks, S. W. Attaway, "Smoothed particle hydrodynamics stability analysis", Journal of Computational Physics, vol. 116, 1995, pp. 123-134.

22. S. W. Attaway, M. W. Heinstein, J. W. Swegle, "Coupling of smooth particle hydrodynamics with the finite element method", Nuclear

Engineering and Design, vol. 150, 1994, pp. 199-205. 23. T. Belytschko, L. Gu, Y. Y. Lu, "Fracture and crack growth by element free Galerkin methods", Modeling and Simulation in Materials

Science and Engineering, vol. 2, 1994, pp. 519-534.

24. N. Moes, M. Cloirec, P. Cartraud, J. F. Remacle, "A computational approach to handle complex microstructure geometries", Computer Methods in Applied Mechanics and Engineering, vol. 192, 2003, pp. 3163-3177.

25. J. C. Simo, T. A. Laursen, "An augmented Lagrangian treatment of contact problems involving friction", Computers and Structures, vol. 42,

1992, pp. 97-116. 26. C. Eck, O. Steinbach, W. L. Wendland, "A symmetric boundary element method for contact problems with friction", Mathematics and

Computers in Simulation, vol. 50, 1999, pp. 43-61.

27. A. R. Khoei, M. Nikbakht, "An enriched finite element algorithm for numerical computation of contact friction problems", International Journal of Mechanical Sciences, vol. 49, 2007, pp. 183-199.

67.

Authors: R.Gunasekar

Paper Title: Performance Evaluation of Rotary Vane Compressor Using Oil Separator in Car AC System

Abstract: One of the primary functions of an automobile climate control system is to provide the desired cooling

and stabilize cabin temperatures to comfortable levels in hot climatic conditions. With the increasing demand for

more energy efficient systems and thermal comfort in automobiles, the automobile AC system needs to be optimized

to deliver the required cooling performance with minimum AC power consumption. Proper selection and integration

of AC compressor with other system aggregates results in improved energy efficiency of the system.

There are varies ideas to improve compressor efficiency .But considering manufacturing feasibility ,design and

validation lead time and cost as many of the ideas dropped down. Oil separator is one of the way to improve cooling

efficiency of compressor in which low investment and lead time involved. The function of oil separator is that

separate the oil and refrigerant from the AC system.AC System contains compressor ,condenser, evaporator and txv

as main parts. During AC system on condition, refrigerant flow on in the compressor ,condenser and evaporator txv

too.

Compressor contains OIL which is used for lubrication purpose for compressor internal parts.So that compressor

332-334

moving parts will not damage as wear and tear. During compressor on condition oil also mix with refrigerant which

can circulate the system.This paper response to implication of oil separator in Rotary vane compressor.

Keywords: Compressor, Oil separator

References: 1. G H Hundy ,A.R Trott,TC Welch Refrigeration and Air-conditioning Tata McGraw Hill education Pvt Ltd.,4th Edition (2010). 2. P.N Ananthanarayanan., “Basic Refrigeration and Air conditioning”., Tata McGraw Hill education Pvt Ltd.,3rd Edition (2006).

3. C.P.Arora., “Refrigeration and Air conditioning” Tata McGraw Hill education Pvt Ltd.,17th Edition (2006).

4. Valeo Japan Handbook and test reports.

68.

Authors: Shakeel Ahmad, Rehan Ahmad Khan, Hina Gupta

Paper Title: Seismic Performance of a Masonry Heritage Structure

Abstract: World-wide experience from past earthquakes shows un-reinforced masonry structures are the most

vulnerable and represent overall the largest threat to human life and property in future earthquakes. This highlights

the structural inadequacy of buildings, especially unreinforced masonry buildings, to carry seismic loads and requires

an urgent assessment of existing buildings in terms of the strength, expected performance and safety of existing

buildings during earthquake as well as for carrying out the necessary rehabilitation. As it is a heavy, brittle material

with low tensile strength and exhibits little ductility when subjected to seismic effects, unreinforced masonry is

highly susceptible to earthquake damage than various other types of construction material. Unreinforced masonry

buildings are usually characterized by sudden and dramatic collapse. Present study deals with an evaluation of the

seismic performance of an old unreinforced masonry building structure. The 137 years old masonry heritage school

building is located at Aligarh Muslim University, Aligarh (seismic zone IV). The building does not show any cracks

under gravity loads. Since the historical building was built before the inception of seismic IS code, the point of

concern is performance of building under seismic loads. In the present study, the building is modelled using finite

element technique and its seismic evaluation is carried out using the commercially available Finite Element software

assuming a homogeneous and nonlinear behaviour of the material. The building is subjected to different PGA levels

(0.1g, 0.2g, 0.3g, 0.4g ) as input ground motion to determine its seismic performance.The results thus obtained will

be useful for detecting the weak failure zones of the buildings under future seismic forces and retrofit accordingly

using proper retrofitting techniques.

Keywords: Heritage masonry building, finite element modelling, seismic performance, peak ground acceleration.

References: 1. IS: 1905-1987, Indian Standard Code of Practice for Structural Use of Unreinforced Masonry, Bureau of Indian Standards, New Delhi. 2. IS 1893–2002, Criteria for Earthquake Resistant Design of Structure.

3. Suggested draft IS: 1905, Code of practice for structural use of unreinforced masonry (Draft suggested by IITK GSDMA Program on

Building Codes which is available from www.nicee.org). 4. M. Sirajuddin, N. S. Potty and J. Sunil, “Nonlinear seismic analysis of masonry structures,”, India, Journal of Design and Built

Environment, Vol. 9, December 2011, pp. 1–16.

5. Ueli Camathias (Master Thesis) “Seismic Performance Evaluation of a Historic Unreinforced Masonry Building Structure”, 2013. 6. M. J. DeJong (Ph.D Thesis). “Seismic Assessment Strategies for Masonry Structures”, 2009.

7. S.S. Khadka,” Seismic Performance of Tradational Unreinforced Masonry Building in Nepal,” Kathmandu University Journal of Science,

Engineering and Technology Vol. 9, No. I, July, 2013, pp 15-28. 8. G. Angjeliu1, M. Baballëku,” Seismic assessment of historical masonry structures. The former Italian Embassy,” 2nd International Balkans

Conference on Challenges of Civil Engineering, BCCCE, 23-25 May 2013, Epoka University, Tirana, Albania.

9. P.B. Lourenço,”Computations on historic masonry structures”, Prog. Struct. Engng. Mater., 4, 2002, pp. 301-319. 10. R. Capozucca,” Shear Behaviour of Historic Masonry Made of Clay Bricks,” The Open Construction and Building Technology Journal,

2011, 5, (Suppl 1-M6) pp. 89-96.

11. H. R. Parajuli, J. Kiyono, H. Taniguchi, K. Toki, A. Furukawa, P.N. Maskey, “Parametric study and dynamic Analysis of a Historical Masonry Building of Kathmandu” Disaster Mitigation of Cultural Heritage and Historic cities, Vol.4, July 2010.

335-340

69.

Authors: Sunil Kumar Yadav, Rajesh Mehra

Paper Title: Analysis of FPGA Based Recursive Filter Using Optimization Techniques for High Throughput

Abstract: In this paper we examine the optimal throughput of recursive filter using varies optimization techniques,

which are relevant for real time application. By formulating filter design as a multi-objective optimization problem

and approaching. Different approaches use for implementing of these methods on hardware. In this work FPGA

implementation of recursive filters are examined and the comparison of these methods is done by analyzing the

hardware cost and performance.

Keywords: IIR filter, VHDL, FPGA

References: 1. Bojan Jovanovic, and Milun Jevtic “An approach to Digital Low-Pass IIR Filter Design” IEEE Small Systems Simulation Symposium

pages:61-66, ebruary 2010

2. Arjuna Madanayake• Thushara K.Gunaratne•Leonard T. Bruton “Reducing the Multiplier-Complexity of Massively Parallel Pollyphase 2D

IIR Broadband Beam Filters” pages:1231-1243, November 2011© Springer 3. Mariza Wijayanti1, Abdul Hakim2& Sunny Arief Sudiro3 “Designing and Simulation Of Band-Pass Infinite Impulse Response Digital Filter

using FPGA Devices” International Technology Research Letters, pages:25-31, 2012

4. Marek Cieplucha “High Performance FPGA-based Implementation of a Parallel Multiplier-Accumulator” 20th International Conference on"Mixed Design of Integrated Circuits and Systems", pages:485-489 June 2013

5. Kamboh, Hamid M., and Shoab A. Khan. "An algorithmic transformation for FPGA implementation of high throughput filters." Emerging

Technologies 7th International Conference on. IEEE,pages 1-6 2011.

341-343

70.

Authors: Ravi Prakash Yadav, Ritesh Kumar Mishra

Paper Title: Performance Analysis of OFDM System Employing an Efficient Scheme of ICI Self- Cancellation

Abstract: Orthogonal frequency division multiplexing (OFDM) is very sensitive to frequency offset caused by

Doppler frequency drift or frequency drift between transmitter and receiver oscillator. This leads to a loss in the

orthogonality between sub-carriers and results in inter-carrier-interference (ICI). In this paper we proposed an

efficient ICI self-cancellation scheme to reduce ICI in OFDM system and its performance is compared with existing

methods of self-cancellation in terms of carrier-to-interference ratio (CIR) and bit-error rate (BER). Simulation result

shows that the proposed scheme outperforms the existing schemes.

Keywords: Inter-carrier-interference (ICI), OFDM, self-cancellation (SC), data-conjugate, data-conversion.

References: 1. J. Armstrong, “Analysis of new and existing methods of reducing intercarrier interference due to carrier frequency offset in OFDM”, IEEE

Trans. Commun., vol. 47, no. 3, pp. 365–369, Mar. 1999. 2. P. H. Moose, “A technique for orthogonal frequency division multiplexing frequency offset correction”, IEEE Trans. Commun., vol. 42,

no.10, pp. 2908–2914, 1994.

3. J. Ahn and H. S. Lee, “Frequency domain equalization of OFDM signal over frequency nonselective Rayleigh fading channels,” Electronics letters, vol. 29, no. 16, pp. 1476-1477, Aug. 1993.

4. C. Muschallik, “Improving an OFDM reception using an adaptive Nyquist windowing,” IEEE Transactions on Consumer Electronics, vol.

42, pp. 259-269, Aug. 1996. 5. P. Tan and N. C. Beaulieu , “Reduced ICI in OFDM System Using the “Better Than” Raised Cosine Pulse”, IEEE Commun., letters , vol.8 ,

no.3 , march 2004.

6. Y. Zhao and S. G. Haggman, “Intercarrier Interference Self-Cancellation Scheme for OFDM Mobile Communication Systems”, IEEE Trans. on Commun., vol.49, no. 7, July 2001.

7. K .Sathananthan, R.M.A.P.Rajatheva and S.B.Slimane, “Cancellation technique to reduce intercarrier interference in OFDM, IEEE Elect.

Lett. , Dec. 2000. 8. Y. Fu and C.C. Ko, “A new ICI self-cancellation scheme for OFDM systems based on a generalized signal mapper”, Proc. 5th wireless

Personal Multimedia Communications, pp.995-999, 2002.

9. Y-H Peng, “Performance Analysis of a New ICI-Self- Cancellation Scheme in OFDM Systems”, IEEE Trans. on Consumer Electronics, vol.53, no.4, pp.1333-1338, 2007.

10. H.G. Ryu, Y. Li, J.S.Park, “An Improved ICI Reduction Method in OFDM Communication System”, IEEE Trans. Broadcasting, vol.51,

no.3 pp.395-400, Sep.2005. 11. Q. Shi, Y. Fang, M. Wang, “A novel ICI self-cancellation scheme for OFDM systems”, in IEEE WiCom, pp.1-4, 2009.

12. H. Zhou and Y-F Huang, “A Maximum Likelihood Fine Timing Estimation for Wireless OFDM Systems”, IEEE Trans. on Broadcasting,

Vol.55, No.1, pp.31-41, Mar.2009.

13. Q. Shi, “ICI Mitigation for OFDM Using PEKF”, IEEE Signal Process. Lett. , vol.17, no. 12, pp.981-984, Dec.2010.

344-347

71.

Authors: Chithrakshi, Taranath H.B

Paper Title: Image Compression Using Fuzzy Enhancement

Abstract: Fuzzy logic is a way to embed an engineer’s experience into the system. It mathematically emulates

human reasoning, provides an intuitive way to design function blocks for intelligent control systems, advanced fault

detection and other complex applications. The fuzzy logic, unlike conventional logic system, is able to model

inaccurate or imprecise models. The fuzzy logic approach offers a simpler, quicker and more reliable solution that is

clear advantages over conventional techniques. It can significantly improve response so we are actively

incorporating fuzzy logic into many real time applications. Image processing is one of the area where fuzzy can be

utilized for the image enhancement. Image compression is one of the major image processing techniques that is

widely used in medical, automotive, consumer and military applications. In this project fuzzy technique has been

used in image compression with Discrete Wavelet Transforms (DWT) technique. Discrete wavelet transforms is the

most popular transformation technique adopted for image compression. Complexity of DWT is always high due to

large number of arithmetic operations. In order to minimize the complexity of DWT, modified DA split architecture

has been proposed and implemented on FPGA.

Keywords: DA split architecture, Discrete wavelet transforms (DWT), Fuzzy logic, Image processing

References: 1. David S. Taubman, Michael W. Marcellin - JPEG 2000 - Image compression, fundamentals, standards and practice", Kluwer academic

publishers, Second printing - 2002.

2. G. Knowles, "VLSI Architecture for the Discrete Wavelet Transform," Electronics Letters, vo1.26, pp. 1184-1185,1990. 3. M, Vishwanath, R. M. Owens, and M. 1. Irwin, "VLSI Architectures for the Discrete Wavelet Transform," IEEE Trans. Circuits And

Systems II, vol. 42, no. 5, pp. 305-316, May. 1995.

4. AS. Lewis and G. Knowles, "VLSI Architectures for 2-D Daubechies Wavelet Transform without MUltipliers".Electron Letter, vo1.27, pp. 171-173, Jan 1991.

5. K.K. Parhi and T. Nishitani "VLSI Architecture for Discrete Wavelet Transform", IEEE Trans. VLSI Systems, vol. 1, pp. 191-202, June

1993.

6. M. Vishwanath, R.M. Owens and MJ. Irwin, "VLSI Architecture for the Discrete Wavelet Transform", IEEE Trans. Circuits and Systems,

vol. 42, pp. 305-316, May 1996.

7. C. Chakrabarti and M. Vishwanath, "Architectures for Wavelet Transforms: A Syrvey", Journal of VLSI Signal Processing, Kulwer, vol.lO, pp. 225-236,1995.

348-351

72.

Authors: S.Senthil Kumar, V.Parthasarathy

Paper Title: Juggler Radio Network Using Virtual Wi-Fi

Abstract: A mobile ad hoc network is a kind of wireless communication network that does not rely on a fixed

infrastructure and is lack of any centralized control. Any single radio interface that is dynamically switched to a

wireless channel in different frequency bands to communicate with different nodes. This however incurs frequent

352-355

channel switching overhead of the order of 100s of microseconds which is comparable to packet transmission times.

A more practical method for concurrent channel usage is to use multiple radio interfaces .A multi-channel wireless

mesh network architecture (called Hyacinth) that equips each mesh network node with multiple 802.11 NICs. We

address the problem of interference aware routing in multi-radio infrastructure mesh networks where in each mesh

node is equipped with multiple radio interfaces and a subset of nodes serve as Internet gateways. In proposed Virtual

Refined Wi-Fi Additional interfaces can support parallelism in network flows, improve handoff times, and provide

sideband communication with nearby peers. Completely, such benefits are outweighed by the added costs of an

additional physical interface. Instead, virtual interfaces have been proposed as the solution, multiplexing a single

physical interface across more than one communication endpoint

Keywords: Ad-hoc, Virtual Wi-Fi, Radio interface, Multiracial, WMN.

References: 1. A. Adya, P. Bahl, J. Padhye, A. Wolman, and L. Zhou. A Multi-Radio Unification Protocol for IEEE 802.11 Wireless Networks. In

Broadnets, 2004. R. Draves, J. Padhye, and B. Zill; .Routing in Multi-radio, Multi-hop Wireless Mesh Networks.; ACM MobiCom '04.

2. P. Hsiao, A. Hwang, H. Kung, D. Vlah; .Load-Balancing Routing for Wireless Access Networks.; Proc. of IEEE INFOCOM '01. 3. I. Katzela, M. Naghshineh; .Channel assignment schemes for cellularmobile telecommunication systems: a comprehensive survey.; IEEE

Personal Communications (June '96)

4. T. R. Jensen, B. Toft; .Graph Coloring Problems.; Wiley Inter science, New York, '95. 5. Jie Gao, Li Zhang; .Load Balanced Short Path Routing in Wireless Networks.; Proc. of INFOCOM '04 .

6. H. Hassanein, A. Zhou; .Routing with load balancing in wireless Adhoc networks.; Proc. of ACM MSWiM '01.

7. S.J. Lee and M. Gerla; .Dynamic Load-Aware Routing in Ad hoc Networks.; Proc. of ICC '01. 8. A. Raniwala, K. Gopalan, T. Chiueh; .Centralized Channel Assignment and Routing Algorithms for Multi-channel Wireless Mesh

Networks.;ACM Mobile Computing & Comm Review (MC2R), April '04.

9. C. Villamizar, R. Chandra, R. Govindan; .Internet RFC 2439 – BGP Route Flap Damping. A. Raniwala, K. Gopalan, T. Chiueh; .Centralized Channel Assignment and Routing Algorithms for Multi-channel Wireless Mesh Networks.;

ACM Mobile Computing & Comm Review (MC2R), April '04.

A. Adya, P. Bahl, R. Chandra, and L. Qiu. Architecture and techniquesfor diagnosing faults in ieee 802.11 infrastructure networks. In Proceedings of the International Conference on Mobile Computing .Networking (MobiCom), pages 30–44, Philadelphia, PA, Sept. 2004.

10. M. Shin, S. Lee and Y.-A. Kim, “Distributed Channel Assignment for Multi-Radio Wireless Networks”, IEEE Internat. Conf. on Mobile

Adhoc and Sensor Systems (MASS), Oct. 8–11, 2006, pp. 417–426. 11. J. Tang, X. Guoliang, and W. Zhang, “Interference-aware topology control and QoS routing in multi-channel wireless mesh networks,” in

Proceedings of the 6th ACM International Symposium on Mobile AdHoc Networking and Computing, MobiHoc 2005,.

73.

Authors: Abhay Limaye, Shraddha Kakne, Priti Tiple, Shubhangi Bhamare

Paper Title: Scrutinizing the Art of Intrusion Detection

Abstract: Internet services and applications have become an inextricable part of quotidian life, enabling

communication and the management of confidential information from any place imaginable. These internet services

are bound to be vulnerable to attackers. Billions of dollars are lost every year in mending the systems hit by the

intrusions. The means for pinpointing and tracking these intrusions are called as Intrusion Detection Systems (IDS).

Intrusion Detection Systems are procuring mainstream adulation as companies move more of their critical business

interactions to the Internet. Thus, hereby, in this paper, we present the dissertation on the notion of Intrusion

Detection wherein we first focus on the assorted genres of attacks or intrusions. Furthermore we attempt to discern

the paradigm of Intrusion Detection Systems. Denouement of this paper elaborates pragmatic benefits and unrealistic

conjectures of prevalent Intrusion Detection Systems.

Keywords: Intrusion Detection System (IDS), Dos (Denial of Service), brute force Attack, SQL injection attack.

References: 1. Amrita Anand,Brajesh Patel"International Journal of Advanced Research in Computer Science and Software Engineering",International

Journal of Advenced Research in Computer Science and Software Engineering 2 (8), August- 2012.

2. Sapna S. Kaushik, Dr.Prof.P.R.Deshmukh"Detection of Attacks in an Intrusion Detection System" (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 2 (3) , 2011

3. Renaud Bidou “Denial of Service Attacks”

4. John Bellardo and Stefan Savage “802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions” 5. Faizal, M.A., MohdZaki M., Shahrin Sahib, Robiah, Y., SitiRahayu, S., and AsrulHadi, Y. “Time Based Intrusion Detection on Fast Attack

for Network Intrusion Detection System”, Second International Conference on Network Applications, Protocols and Services, IEEE, 2010.

6. Christopher Kruegel, Fredrik Valeur, Giovanni Vigna(2005). Intrusion Detection and Correlation, Challenges and Solution, Springer Science+Business Media Inc, USA.

356-361

74.

Authors: Munaga Siva Prasanth, Kallepalli Venkatesh

Paper Title: Fire Suppression System in Locomotives

Abstract: Still we had seen a lot of fire accidents and gas leakages are present in trains. So in this paper it is a

remedy to reduce the death loss occurring due to fire accidents in trains. Fire on a running train is more catastrophic

than on a stationary one, since fanning by winds helps spread the fire to other coaches. The damage is heavier due to

improper reach of service at right time due to improper communication. This time delay is causing heavier damage.

Thus, eliminating the time between when an accident occurs and when first responders are dispatched to the scene

decreases the damage.

This projects help in notifying the passengers and emergency services. The project consists of a microcontroller

which is interfaced with the thermistor, gas sensors, water sprinkler and GSM modem, Once the sensors attached in

the compartments of train sense the gas detection and fire detection, it assumes a fire accident. The controller

assumes it as an emergency and power supply will be automatically off, starts the buzzer, doors are opened, Sprinkler

on and GSM modem present in the train sending the message alert to loco pilot and near the railway stations.

362-364

Keywords: Sprinkler, D.C. Motor, Thermistor (NTC) & Smoke sensors, GSM, Buzzer, Submergible pump or

centrifugal pump.

References: 1. “The 8051 Microcontroller and Embedded Systems” by “Muhammad Ali Mazidi, Janice Gillispie Mazidi, Rolin D.McKinlay”

2. “Practical electrical motor handbook” by “Irving Gottlieb” 3. Microcontroller AT89C52 datasheet

4. Thermistor NTC datasheet

5. http://en.wikipedia.org/wiki/Thermistor 6. http://www.ti.com/general/docs/lit/getliterature.tsp? genericPartNumber= lm35&reg =en&fileType=pdf

7. http://www.8085projects.info/Block-diagram-and-working-of-ADC0809.html 8. http://www.dnatechindia.com/Tutorial/8051-Tutorial/Interfacing-Relay-to-Microcontroller.html

9. http://www.systemsensor.com/en-us/Pages/Aspiration.aspx

10. http://www.sohofireprotection.us/water-based-fire-sprinklers.html 11. http://9circuits.com/store/products/pololu/flammable-gas-smoke-sensor/

75.

Authors: Amrita Razdan, M. F. Wani

Paper Title: Experimental Characterization for Wear Rate of Silicon Carbide and Nickel-Base Alloy for Human

Implants

Abstract: Among the available ceramic materials for load bearing bio-implant applications, silicon carbide is

superior for its better biocompatibility, which can increase the longevity of prosthetic joints. The major cause of

revision surgery and implant failure is Osteolysis (aseptic loosening of the prosthetic joint). The product of bearing

wear, microscopic particulate debris in the joint space leads to implant loosening. Prosthetic joint mainly consists of

acetabular cup, acetabular lining and femoral head. The best material for manufacturing acetabular cup is nickel –

base alloy. For manufacturing acetabular lining and femoral head, silicon carbide is the best chosen material. The

acetabular cup or knee cap is prone to catastrophic failures due to walking, stumbling etc. A sliding distance test was

performed on polished surface of silicon carbide and nickel-base alloy (mirror- like finish, 1µm) by using

Reciprocating Friction Monitor (Courtesy; National Institute of Technology, Srinagar) for the evaluation of wear

coefficient by standard test procedures and equation outlined in ASTM F 603. The test was carried out in ambient

temperature. The results obtained showed drastically reduced wear rates. The experiments on Reciprocating Friction

Monitor for Silicon carbide and nickel –base alloy showed that the best choice for prosthetic joint replacement would

be a combination of two materials; silicon carbide for femoral heads and acetabular lining, and nickel-base alloy for

acetabular cup.

Keywords: Aseptic loosening, Nickel base alloy, Silicon Carbide, Total joint replacement, Wear rate.

References: 1. Willert HG, Bertam H, Buchhorn GH. Osteolysis in Alloarthroplasty of the hip: The role of ultra- high monolecular weight polyethylene

wear particles. Clin Orthop Relat Res 1990;258:95-107. 2. Ceramic on ceramic bearing Sukree khumrak, Bangkok medical journal vol.4.

3. Capello WN, D’Antonio JA, Feinberg JR, et al. Ceramicon- ceramic total hip arthroplasty: update. J Arthroplasty

4. Chevillotte C, Pibarot V, Carret JP, et al. Hip squeaking: A 10 years Follow up Study. J Arthroplasty 2012;27: 1008-13 5. Nevelos JE, Ingham E, Doyle C, et al. Wear of HIPed and non-HIPed alumina-alumina hip joints under standard and severe simulator

testing conditions. Biomaterials 2001;22:2191-7.

6. Hannouche D, et al. Ceramics in Total Hip Replacement. Clin Orthop Relate Res 2005;430:62-71. 7. Chevillotte C, Trousdale RT, Chen Q, et al. Hip Squeaking : A Biomechanical study of Ceramic-on-Ceramic Bearing Surfaces. Clin Orthop

Relat Res 2010;468:345-50.

8. Walter WL, Insley GM, Walter WK, et al. Edge loading in third generation alumina ceramic-on-ceramic bearings: stripe wear. J Arthroplasty 2004;19:402-13.

9. Tribochemical polishing of silicon carbide in oxidant solution Zhize Zhu ), Viktor Muratov, Traugott E. Fischer.Department of Materials

Science and Engineering, SteÍens Institute of Technology, Hoboken, NJ 07030, USA .

365-367

76.

Authors: Abdulaziz S. Al-Aboodi

Paper Title: Kinematic Simulation of Three Rollers in Circular Motion Using 2D Planar FE Modeling

Abstract: A method is established for joining a tube to a tubesheet by expanding the tube to the tubesheet. The

expansion done using different method such as rolling. The joint integrity is important to ensure the roundness of the

structure of the heat exchanger, and to prevent leakage. Many parameters affect the joint integrity such as the initial

clearance, wall reduction and material properties. The residual contact stress is the main parameter indicating the

strength of the joint.

In this paper, the two dimensional planar FE model is established for the tube to tubesheet roller expansion. The

planar model is great way for our attempt to understand and analyze the problem. The planar model reveals a realistic

motion of the rollers in addition to the exact geometry of the tubesheet. This eliminates the need for the assumption

of uniform expansion and tubesheet sleeve diameter sets on the axisymmetric model. That, the ligament dimensional

effect will be shown on this model.

Keywords: Kinamatic, Simulation, Finite Element, Rolling, Modeling.

References: 1. Al-Aboodi A (2006) Finite element analysis of roller expanded tubetubesheet joints with overenlarged tubesheet holes. PhD thesis, KFUPM

2. Al-Aboodi A, Merah N, Shuaib AR, Al-Nassar Y, Al-Anizi SS (2008) Modeling the effects of initial tube-tubesheet clearance, wall reduction and material strain hardening on rolled joint strength.

3. ASME J Press Vessel Technol 130/4:041204-1–041204-6

368-372

4. Al-Aboodi A, Merah N, Shuaib AN, Al-Nassar Y (2009) FEA of groove geometry effect on roller and hydraulically expanded tube to tubesheet joint strength. Int J Precis Technol 1(2):201–207

5. Allam M, Bazergui A (2002) Axial strength of tube-to tubesheet joints: finite element and experimental evaluations. J Press Vessel Technol

124:23–31 6. Allam M, Chaaban A, Bazergui A (1998) Estimation of residual stresses in hydraulically expanded tube-to-tubesheet joints. J Press Vessel

Technol 120:129–137

7. Andrieux S, Voldoire F (1995) Stress identification in steam generator tubes from profile measurements. Nucl Eng Design 158:417–427 ANSYS (2004) Version 9.0, program and help documentations, Swanson Analysis System, Inc.

8. Aufaure M (1987) Analysis of residual stresses due to roll-expansion process: finite element computation and validation by experimental

tests. In: Transaction of the 9th international conference of SMIRT, pp 499–503 9. Cizelj L, Mavko B (1995) Propagation of stress corrosion cracks in steam generator tubes. Int J Press Vessel Piping 63:35–43 Cooper

Power Tools (2005) Tube cleaners and expanders airetool manual. SP-1100EN0405–410M

10. Jawad MH, Clarkin EJ, Schuessler RE (1987) Evaluation of tube-totubesheet junctions. J Press Vessel Technol 109:19–26 11. Merah N, Al-Zayer A, Shuaib A, Arif A (2003) Finite Element evaluation of clearance effect on tube-to-tubesheet joint strength. Int J Press

Vessel Piping 80:879–885

12. Merah N, Al-Aboodi A, Shuaib AN, Al-Nassar Y, Al-Anizi SS (2009) Combined effects of tube projection, initial tube-tubesheet clearance and tube material strain hardening on rolled joint strength. ASME J Press Vessel Technol 131/5

13. Merah N, Al-Aboodi A, Shuaib AN, Al-Nassar Y (2010) 3-D FEA of the effects of large overtolerances on roller expanded tubetubesheet

joint strength. In: Abstract published on IVth European conference on computational mechanics, Paris 16–21, 2010 14. Metzger DR, Sauve RG, Nadeau E (1995) Prediction of residual stress by simulation of the rolled joint manufacturing process for steam

generators, PVP vol 305. In: Current topics in computational mechanics. ASME, New York

15. Scott DA, Wolgemuth GA, Aikin JA (1984) Hydraulically expanded tube-to-tubesheet joints. J Press Vessel Technol 106:104–109

16. Shuaib AN, Merah N, Khraisheh MK, Allam IM, Al-Anizi SS (2003) Experimental investigation of heat exchanger tubesheet hole

enlargement. J Press Vessel Technol 125:19–25

17. Standard of the Tubular Exchanger Manufacturer Association ‘TEMA’, 7th edn (1988) TEMA, Terrytown 18. Updike DP, Kalnins A, Caldwell SM (1992) Residual stresses in transition zone of heat exchanger tubes. J Press Vessel Technol 114:149–

156

19. Williams DK (1996) Prediction of residual stresses in the mechanically expanded 0.750” diameter steam generator tube plugs—part 1: 2-D solution, PVP vol 327. In: Residual stresses in design, fabrication, assessment and repair, ASME, New York, pp 173–180

20. Williams DK (1997) Prediction of residual stresses in the mechanically expanded 0.750” diameter steam generator tube plugs-part 2: 3-D

solution, PVP vol 354. In: Current topics in the design and analysis of pressure vessels and piping. ASME, New York, pp 17–28 21. Williams DK (2003) Prediction of residual stresses in the mechanical roll of HX tubes into TEMA grooves, PVP vol 2003–1937. In: Design

and analysis methods and fitness for service, ASME, New York, pp 121–29.

77.

Authors: Ambika Oad, Himanshu Yadav, Anurag Jain

Paper Title: A Review: Image Encryption Techniques and its Terminologies

Abstract: In today’s environment, security becomes an important issue in communication. For secure transmission

of data in open network, encryption is very important methodology. Though encryption we can prevent our data from

unauthorized access during transmission. In recent years many image encryption methods have been proposed and

used to protect confidential data. In this paper, we survey on existing work which is used different techniques for

image encryption and we also give general introduction about cryptography.

Keywords: Cryptography, Image Encryption, Decryption, Security.

References: 1. http://en.wikipedia.org/wiki/Encryption

2. http://en.wikipedia.org/wiki/Plaintext 3. http://en.wikipedia.org/wiki/Ciphertext

4. http://en.wikipedia.org/wiki/Decryption

5. http://en.wikipedia.org/wiki/Cryptography 6. Chang-Mok Shin, Dong-Hoan Seo, Kyu-Bo Chol, Ha-Wmn Lee, and SmJmng Kim, “ Multilevel Image Encryption by Binary Phase XOR

Operations “, IEEE Proceeding in the year 2003.

7. M.-R. Zhang, G.-C. Shao and K.-C. Yi, ― T-matrix and its applications in image processing‖, IEEE Electronics Letters 9th December 2004 Vol. 40 No. 25

8. Wang Ying, Zheng DeLing, Ju Lei, et al., ―The Spatial-Domain Encryption of Digital Images Based on High-Dimension Chaotic System‖,

Proceeding of 2004 IEEE Conference on Cybernetics and Intelligent Systems, Singapore, pp. 1172-1176, December. 2004 9. Guosheng Gu ,Guoqiang Han “An Enhanced Chaos Based Image Encryption Algorithm”, IEEE Proceedings of the First International

Conference on Innovative Computing, Information and Control (ICICIC'06) in 2006.

10. N.K. Pareek, Vinod Patidar, "Image encryption using chaotic logistic map", Elsevier, Image and Vision Computing 24 (2006) 926–934. 11. Saroj Kumar Panigrahy, Bibhudendra Acharya and Debasish Jen, Image Encryption Using Self-Invertible Key Matrix of Hill Cipher

Algorithm 1st t International Conference on Advances in Computing, Chikhli, India, 21-22 February 2008

12. Mohammad Ali Bani Younes and Aman Jantan, An Image Encryption Approach Using a Combination of Permutation Technique Followed by Encryption , IJCSNS International Journal of Computer Science and Network Security, VOL.8 , April 2008.

13. Mohammad Ali Bani Younes and Aman Jantan ImageEncryption Using Block-Based Transformation Algorithm IAENG International

Journal of Computer Science, 35,2008. 14. Zhang Yun-peng, Liu Wei, Cao Shui-ping, Zhai Zheng-jun, Nie Xuan , Dai Wei-di, Digital image encryption algorithm based on chaos and

improved DES, IEEE International Conference on Systems, Man and Cybernetics, 2009.

15. Sesha Pallavi Indrakanti , P.S.Avadhani, Permutation based Image Encryption Technique, International Journal of Computer Applications (0975 – 8887) Volume 28– No.8, 2011.

16. Amnesh Goel, Reji Mathews & Nidhi Chandra, "Image Encryption based on Inter Pixel Displacement of RGB Values inside Custom Slices",

International Journal of Computer Applications (0975 – 8887), Volume 36– No.3, December 2011. 17. Reji Mathews, Amnesh Goel, Prachur Saxena & Ved Prakash Mishra, "Image Encryption Based on Explosive Inter-pixel Displacement of

the RGB Attributes of a PIXEL", Proceedings of the World Congress on Engineering and Computer Science 2011 Vol I WCECS 2011,

October 19-21, 2011, San Francisco, USA. ISBN: 978-988-18210-9-6. 18. S.Bosu Babu & S.S.P Kumar “Enhanced Color Visual Cryptography” Engineering Science and Technology: An International Journl, , ISSN:

2250-3498, Vol.2, No. 5, October 2012 19. Quist-Aphetsi Keste,“ Image Encryption based on the RGB PIXEL Transposition and Shuffling” I.J.Computer Network and Information

Security, 2013,7, 43-50,2013.

20. Keerti Kushwah, Sini Shibu “New Image Encryption Technique Based On Combination of Block Displacement and Block Cipher Technique,” International Journal of Computer Science and Information Technologies, Vol. 4 (1) , 2013, 61 - 65

21. Nehal Kandele, Shrikant Tiwari “A New Combined Symmetric Key Cryptography CRDDBT Using - Relative Displacement (RDC) and

373-376

Dynamic Base Transformation (DBTC)”, International Journal of Engineering Research & Technology, Vol.2 - Issue 10 (October - 2013)( 2278-0181)

78.

Authors: Aparna A Nair, S.K Sudheer, M. Jayaraju

Paper Title: Analysis of Optical Characteristics for Photonic Crystal Fiber at Small Core Diameters

Abstract: In the present study photonic crystal of eight ring with modified inner most ring has been considered.

The important optical properties like chromatic dispersion, effective area, nonlinear coefficient and confinement loss

has been studied. Each characteristic has been investigated under different core diameter of the photonic crystal

fiber. Each iteration has been done within range of wavelength 1000nm -1600nm .Using software like COMSOL

MULTIPHYSICS and MATLAB, each parameter were realized. This design has made the propagation of

electromagnetic waves of higher wavelength through the core under tight confinement. The novel design has made

the light of higher wavelength to be trapped inside the core of very small diameters (1μm-3μm).A good confinement

loss has been achieved due to increase of the number of rings

Keywords: Photonic crystal fiber (PCF), Finite Element Method, Chromatic Dispersion, Confinement Loss, and

Nonlinear Coefficient.

References: 1. R. K. Sinha and Shailendra K. Varshney, “Dispersion Properties Of Photonic Crystal Fibers”, Microwave And Optical Technology Letters,

Vol. 37, No. 2, 2003 . 2. Tzong-Lin Wu, Senior Member, IEEE, Jung-Sheng Chiang, and Chia-Hsin Chao, “ A Novel Approach for Calculating the Dispersions of

Photonic Crystal Fibers”, IEEE Photonics Technology Letters, Vol. 16, No. 6, 2004.

3. P. St. J. Russell, “Photonic-Crystal Fibers,” J. Lightwave Technol., No. 24 , pp. 4729- 4749, 2006 4. Jianguo Liu, Lifang Xue, Zhi Wang, Guiyun Kai, Yange Liu, Weigang Zhang, and Xiaoyi Dong, “Large Anomalous Dispersion at Short

Wavelength and Modal Properties of a Photonic Crystal Fiber With Large Air Holes” , IEEE Journal Of Quantum Electronics, Vol. 42, No.

9, 2006. 5. Lars Grüner-Nielsen, and Bera Pálsdóttir , “Highly nonlinear fibers for very wideband supercontinuum generation” , Proc. of SPIE Vol.

6873, 68731B, 2008

6. Feroza Begum, Yoshinori Namihira , S.M. Abdur Razzak , Shubi Kaijage , Nguyen Hoang Hai ,Tatsuya Kinjo , Kazuya Miyagi , Nianyu Zou, “Design and analysis of novel highly nonlinear photonic crystal fibers with ultra-flattened chromatic dispersion” Optics

Communications 282 ,1416–1421,2009.

7. Rekha Mehra , Pawan Kumar Inaniya, “Design of Photonic Crystal Fiber for Ultra Low Dispersion in Wide Wavelength Range with Three Zero Dispersion Wavelengths” , AIP Conf. Proc. 1324, 175 ,2010.

8. Md. Anwar Hossain,Yoshinori Namihira, Jingjing Liu, S.M.Abdur Razzak, Md. Asraful Islam, Yuki Hirako, Kazuya Miyagi, Shinya

Nozaki, “Dispersion Flattened Photonic Crystal Fibers For Supercontinuum Generation In A Telecommunication Window” , Proceedings of

ICCTA2011.

9. WANG XiaoYan, LI ShuGuang, HAN Ying, DU Ying, XIA ChangMing & HOU LanTian, “The polarization-dependent supercontinuum

generation in photonic crystal fibers with high birefringence and two-zero dispersion”, Science China:Physics, Mechanics & Astronomy, Vol.55 No.2: 199–203, Feb 2012.

10. M. Samiul Habib, M. A. Motin, M. I. Hasan, M. Selim Habib, S.M. Abdur Razzak, and M. A. Goffar Khan, “Dispersion and Confinement

Loss Control with Decagonal Photonic Crystal Fibers for Wideband Transmission Systems”, IEEE 2013. 11. Aparna A Nair, Dr. S.K Sudheer, Dr. M Jayaraju, “Research on Optical Properties of Photonic Crystal Fiber (PCF) at Telecommunication

Windows”, in proceedings of International Conference on Recent trends in Engineering Technology, ICRTET Cochin, Kerala, pp-80-

85,January 2014

377-380

79.

Authors: Reshma Elizabeth Regi, Haris P.A.

Paper Title: Performance of PAPR Reduction in OFDM System with Complex Hadamard Sequence using SLM

and Clipping

Abstract: Orthogonal Frequency Division Multiplexing (OFDM) is an efficient method of data transmission for

high speed communication systems. However, the main drawback of OFDM system is that, it exhibits high Peak to

Average Power Ratio (PAPR) of the transmitted signals. OFDM consist of large number of independent subcarriers,

as a result of which the amplitude of such a signal can have high peak values. The Selected Mapping (SLM)

technique is one of the promising PAPR reduction techniques for OFDM. This technique however increases the

computational and phase search complexity and PAPR reduction performance is largely dependent on the selection

of random phase sequences. In this paper, a new SLM method which rotates the phase of input data after IFFT by

using matrices generated from complex Hadamard code is proposed. After phase rotation, clipping technique is used

to further reduce the PAPR. From simulation results, we can find that the proposed method has lower PAPR than

conventional SLM combined with clipping technique.

Keywords: OFDM-Orthogonal frequency division multiplexing, Clipping, SLM-Selected Mapping, Hadamard

Sequence.

References: 1. Y. Wu and W. Y. Zou, ”Orthogonal frequency division multiplexing: a multi-carrier modulation scheme,” IEEE Transactions on Consumer

Electron, Aug. 1995.

2. L. J. Cimini Jr., ”Analysis and simulation of a digital mobile channel using orthogonal frequency division multiplexing,” IEEE Trans.

Commun., vol. COM-33, pp. 665-675, July 1985. 3. Dov Wulich,”Definition of Efficient PAPR in OFDM ,” IEEE communication Letters, vol. 9, no. 9, Sept 2005

4. R. van Nee and A. de Wild, “Reducing the Peak-to-Average Power Ratio of OFDM,” in Proc. of Vehicular Technology Conference, IEEE,

vol. 3, pp. 2072-2076.May 1998. 5. L. Wang and C. Tellambura, ”A simplified clipping and filtering technique for par reduction in ofdm systems, ”IEEE Signal Process. Lett,

vol. 12, no. 6, pp. 453–456, 2005

6. J. Armstrong, ”Peak-to-average power reduction for ofdm by repeated clipping and frequency domain filtering,” Electron. Lett, vol. 38, no. 5, pp. 246–247, 2002.

7. Xiaodong Li and Leonard J. Cimini, Jr. “Effects of Clipping and Filtering on the Performance of OFDM, ”IEEE Comm. Letters vol. 2, no.

5, pp. 131-133,1998 8. Steve C. Thompson, John G. Proakis, and James R. Zeidler, “The Effectiveness of Signal Clipping for PAPR and Total Degradation

381-384

Reduction in OFDM Systems,” IEEE Globecom., vol. 30, pp. 2807-2811, 2005. 9. Guoguang Chen, Rashid Ansari, Yingwei Yao,“ Improved Peak Windowing for PAPR Reduction in OFDM,” IEEE Conference

Publications pp. 1-5,2009.

10. A. E. Jones, T. A. Wilkinson, and S. K. Barton, “Block coding scheme for reduction of peak to mean envelope power ratio of multicarrier transmission schemes,” Electron. Lett., vol. 30, pp. 2098-2099, 1994.

11. Wattanasuwakull, T. ; Benjapolakul, W,”PAPR Reduction for OFDM Transmission by using a method of Tone Reservation and Tone

Injection” in proc. of Information, Communications and Signal Processing, Conference, IEEE ,pp. 273 - 277,2005 12. B. S. Krongold and D. L. Jones. “PAR reduction in OFDM via active constellation extension,”IEEE Trans. Broadcasting, April 2002.

13. R.W. Bguml, R.F.H. Fischer and J.B. Huber “Reducing the peak-to-average power ratio of multicarrier modulation by selected mapping,”

Electronics letters, vol. 32, no. 22, pp. 259– 268, October 1996. 14. Sang -Woo Kim, Jin-Kwan Kim and Heung-Gyoon Ryu “A Computational Complexity Reduction Scheme Using Walsh Hadamard

Sequence in SLM Method. ” IEEE conference Publications, pp. 762-766, 2006

15. S.H. Muller and J.B. Huber “OFDM with reduced peak to-average power ratio by optimum combination of partial transmit sequences” Electronics letters, vol. 33,no. 5 ,pp. 368- 369, february 1997.

16. Asma Latif; N. D. Gohar, “Reducing Peak-to-Average Power Ratio (PAPR) Using Partial Transmit Sequence in OFDM Systems, ” Proc of

lEEE, pp. 126-130,2003 17. Aparna P. More, Sunil B. Somani, “The Reduction of PAPR in OFDM Systems Using Clipping and SLM Method, ” Proc on lEEE

conference, pp. 593-597,2013

18. Aye Aung, Boon Poh Ng, and Susanto Rahardja,”Sequence- Ordered Complex Hadamard Transform Properties,Computational Complexity and Applications” ,IEEE Transactions on signal processing , vol. 56, no. 8,pp. 3562-3571 , 2008

80.

Authors: Bibi Ayesha.H.Patel, K.Indira

Paper Title: Automatic Recognition of Rodent Species based on Mathematical Morphological Characterization of

Skull

Abstract: Morphological image processing is a collection of non-linear operations related to the shape or

morphology of features in an image. Digital image processing technique applied to extract morphological features of

skull image taken from optical camera. Based on the prominent nine extracted morphological features of rodent

species, the closed form univariate two-factor analysis is derived. These two factor analysis is used for real time auto-

recognition uniqueness of rodent species such as Meriones unguiculatus, Microtus brandti and Rattus norvegicus.

The same two-factor auto-recognition analysis is used over x-ray image of rodent's skull as well as other rodent

species like squirrel. The considered morphological features are short axis(X1), perimeter(X2), eccentricity(X3),

sphericity(X4), bump area(X5), paraxial area of enclosing rectangle(X6), hu1(X7), hu2(X8), hu3(X9).

Keywords: Morphological image processing , Hu- moments, Rodent species.

References: 1. Onboard Autonomous Rock Shape Analysis For Mars Rovers, IEEE 2002

2. Zhihu Huang, Jinsong Leng "Analysis of Hus Moment Invariants on Image Scaling and Rotation", IEEE 2010 3. J. F. Boyce and W. J. Hossack, " Moment Invariants for Pattern Recognition," Pattern Recognition Letters, vol. 1, pp. 451-456, 1983

4. Jan Flusser and Tomas Suk, "A Moment-based Approach to Registration of Images with Affine Geometric Distortion," IEEE transaction

on Geoscience and Remote Sensing, vol. 32, pp. 382-387, 1994

385-387

81.

Authors: Monali Chaudhari, Amogh Waghmare, Sheldon Fernandes, Sagar Sinkar

Paper Title: Dual Axes Maximum Light Intensity Tracker

Abstract: Efficiency of any solar powered system reduces due to mismatch between the direction of the sun’s rays

and axis of the solar panel. Aim of the proposed and implemented scheme is to increase the efficiency of such a

system, by reorienting the plane of the solar panel orthogonal to the sun’s radiation by using a simple low powered

system. To achieve this, the panel is moved about two axes after a certain interval of time depending upon the

ambient light conditions.

Keywords: LDR, Gimbal Structure, ADC, LSB

References: 1. Saravanan C. , Dr .M.A. Panneerselvam, I. William Christopher, “A Novel Low Cost Automatic Solar Tracking System”.

2. Design, Development and Performance Test of an Automatic Two-Axis Solar Tracker system by Bajpai, P. (Electr. Eng. Dept., IIT Kharagpur, Kharagpur, India) et.al. India Conference (INDICON), 2011 Annual IEEE

3. Design, Manufacturing and Performance Test of a Solar Tracker Made by a Embedded Control by Beltran, J.A. et.al. Electronics, Robotics

and Automotive Mechanics Conference,25-28 Sept. 2007 Page(s): 129 – 134 Print ISBN: 978-0-7695-2974-5

388-391

82.

Authors: Syed Shujauddin Sameer

Paper Title: Privacy Preserving Data Mining: A Novel Approach to Secure Sensitive Data Based on Association

Rules

Abstract: The availability of data on the internet is increasing on a larger basis daily .Privacy Preservation data

mining has emerged to address one of the side effects of data mining Technology. The threat to individual privacy

through data mining is able to infer sensitive information from Non-sensitive information or unclassified data. There

is a n urgent need to be able to infer some mechanism to avoid the projection of all the sensitive information .An

approach in data mining techniques is very much essential. Alteration of data, filtering of the data, blocking of the

data are Some of the approaches. Given specific rules to be hidden, the techniques involve is to hide only the given

sensitive data. In this work we assume that only sensitive datais given and we analyze the approaches to secure

sensitive data in the database.

Keywords: Privacy preserving data mining, Association rules ,Sensitive data.

References: 1 Privacy Preserving Decision Tree Learning Using Unrealized Data Sets ,Issue No 02- February 2012.Vol. 24,Knowledge and Data

392-395

Engineering ,IEEE Transactions 2 D. Agrawal and C. C. Aggarwal, “On the design and quantification of privacy preserving data mining algorithms”, In Proceedings of the

20th Symposium on Principles of Database Systems, Santa Barbara,California, USA, May 2001.

3 R. Agrawal, T. Imielinski, and A. Swami, “Mining Association Rules between Sets of Items in Large Databases”, In Proceedings of ACM SIGMOD International Conference on Management of Data, Washington DC, May 1993.

4 R. Agrawal and R. Srikant, ”Privacy preserving data mining”, In ACM SIGMOD Conference on Management of Data, pages 439–450,

Dallas, Texas, May 2000. 5 Ljiljana Brankovic and Vladimir Estivill-Castro, “Privacy Issues in Knowledge Discovery and Data Mining”, Australian Institute of

Computer Ethics Conference, July, 1999, Lilydale.

6 C. Clifton and D. Marks, “Security and Privacy Implications of Data Mining”, in Workshop on Research Issues on Data Mining and knowledge Discovery, 1996.

7 C. Clifton, “Protecting Against Data Mining Through Samples”, in Proceedings of the ThirteenthAnnual IFIP WG 11.3 Working

Conference on Database Security, 1999. 8 C. Clifton, “Using Sample Size to Limit Exposure to Data Mining”, Journal of Computer Security, 8(4), 2000.SIGMOD

9 Chris Clifton, Murant Kantarcioglu, Xiaodong Lin and Michael Y. Zhu, “ Tools for Privacy PreservingDistributed Data Mining”, SIGKDD

Explorations, 4(2), 1-7, Dec. 2002. 10 E. Dasseni, V. Verykios, A. Elmagarmid and E. Bertino, “Hiding Association Rules by Using Confidence and Support” in Proceedings of

4th Information Hiding Workshop, 369-383, Pittsburgh,PA, 2001.

11 A. Evfimievski, R. Srikant, R. Agrawal, and J. Gehrke, “Privacy preserving mining of association rules”, In Proc. Of the 8th ACM SIGKDD Int’l Conference on Knowledge Discovery and Data Mining, Edmonton, Canada, July 2002.

12 Alexandre Evfimievski, “Randomization in Privacy Preserving Data Mining”, SIGKDD Explorations, 4(2), Issue 2, 43-48, Dec. 2002.

13 Alexandre Evfimievski, Johannes Gehrke and Ramakrishnan Srikant, “Limiting Privacy Breaches in Privacy Preserving Data Mining”,

PODS 2003, June 9-12, 2003, San Diego, CA.

14 M. Kantarcioglu and C. Clifton, “Privacy-preserving distributed mining of association rules onhorizontally partitioned data”, In ACM

SIGMOD Workshop on Research Issues on Data Miningand Knowledge Discovery, June 2002. 15 Y. Lindell and B. Pinkas, “Privacy preserving data mining”, In CRYPTO, pages 36–54, 2000.

16 D. E. O’ Leary, “Knowledge Discovery as a Threat to Database Security”, In G. Piatetsky-Shapiro and W. J.Frawley, editors, Knowledge

Discovery in Databases, 507516, AAAI Press/ MIT Press, Menlo Park, CA, 1991. 17 S. Oliveira, O. Zaiane, “Algorithms for Balancing Privacy and Knowledge Discovery i Association Rule Mining”, Proceedings of 7th

International Database Engineering and ApplicationsSymposium (IDEAS03), Hong Kong, July 2003.

18 S. Oliveira, O. Zaiane, “Protecting Sensitive Knowledge by Data Sanitization”, Proceedings of IEEE International Conference on Data Mining, November 2003.

19 S. J. Rizvi and J. R. Haritsa, “Privacy-preserving Association rule mining”, In Proc. of the 28th Int’l Conference on Very Large Databases,

August 2002. 20 Y. Saygin, V. Verykios, and C. Clifton, “Using Unknowns to Prevent Discovery of Association Rules”, SIGMOD Record 30(4): 45-54,

December 2001.

21 Surajit Chaudhuri. “Efficient evaluation of queries with mining predicates”, In Proc. ofthe 18th Int’l Conference on Data Engineering (ICDE) 529-540,2002.

83.

Authors: Prabodh Sarmah, Devajit Mahanta

Paper Title: Computational Methods for Enzyme Design and Its Biological Significance

Abstract: Enzymes are large biological molecules responsible for the thousands of metabolic processes that sustain

life. They are highly selective catalysts, greatly accelerating both the rate and specificity of metabolic reactions, from

the digestion of food to the synthesis of DNA. Most enzymes are proteins, although some catalytic RNA molecules

have been identified. Enzymes adopt a specific three-dimensional structure, and may employ organic (e.g. biotin) and

inorganic (e.g. magnesium ion) cofactors to assist in catalysis. Multiple experimental approaches have been applied

to generate nearly all possible mutations of target enzymes, allowing the identification of desirable variants with

improved properties to meet the practical needs. Meanwhile, an increasing number of computational methods have

been developed to assist in the modification of enzymes during the past few decades. With the development of

bioinformatics algorithms, computational approaches are now able to provide more precise guidance for enzyme

engineering and make it more efficient and less laborious. In this review, we summarize the recent advances of

method development with significant biological outcomes to provide important insights into successful

computational protein designs.

Keywords: Enzymes, computational approaches

References: 1. Smith AL (Ed) (1997). Oxford dictionary of biochemistry and molecular biology. Oxford [Oxfordshire]: Oxford University Press. ISBN 0-

19-854768-4.

2. Grisham, Charles M.; Reginald H. Garrett (1999). Biochemistry. Philadelphia: Saunders College Pub. pp. 426–7. ISBN 0-03-022318-0. 3. Bairoch A. (2000). "The ENZYME database in 2000" (PDF). Nucleic Acids Res 28(1): 304–5. doi:10.1093/nar/28.1.304. PMC 102465.

PMID 10592255.

4. Lilley D (2005). "Structure, folding and mechanisms of ribozymes". Current Opinion in Structural Biology 15 (3): 313–23. doi:10.1016/j.sbi.2005.05.002. PMID 15919196.

5. Cech T (2000). "Structural biology. The ribosome is a ribozyme". Science 289 (5481): 878–9. doi:10.1126/science.289.5481.878. PMID

10960319. 6. Groves JT (1997). "Artificial enzymes. The importance of being selective". Nature 389(6649): 329–30. doi:10.1038/38602. PMID 9311771.

7. de Réaumur, RAF (1752). "Observations sur la digestion des oiseaux". Histoire de l'academie royale des sciences 1752: 266, 461.

8. Williams, H. S. (1904) A History of Science: in Five Volumes. Volume IV: Modern Development of the Chemical and Biological Sciences

Harper and Brothers (New York) Accessed 4 April 2007

9. Payen, A. et J.-F. Persoz (1833) "Mémoire sur la diastase, les principaux produits de ses réactions et leurs applications aux arts industriels"

(Memoir on diastase, the principal products of its reactions and their applications to the industrial arts), Annales de chimie et de physique, 2nd series, 53 : 73–92.

10. Dubos J. (1951). "Louis Pasteur: Free Lance of Science, Gollancz. Quoted in Manchester K. L. (1995) Louis Pasteur (1822–1895)—chance

and the prepared mind".Trends Biotechnol 13 (12): 511–5. doi:10.1016/S0167-7799(00)89014-9.PMID 8595136. 11. Kühne coined the word "enzyme" in: W. Kühne (1877) Jump up^ Text of Eduard Buchner's 1907 Nobel lecture at http://nobelprize.org.

Retrieved 4 April 2007. 12. The naming of enzymes by adding the suffix "-ase" to the substrate on which the enzyme acts, has been traced to French scientist Jump

up^ Willstätter, R. (1927). Problems and Methods in Enzyme Research. Cornell University Press, Ithaca. quoted in Blow, David (2000).

"So do we understand how enzymes work?" (pdf). Structure 8 (4): R77–R81. doi:10.1016/S0969-2126(00)00125-8.PMID 10801479.

396-403

13. 1946 Nobel prize for Chemistry laureates at http://nobelprize.org. Retrieved 4 April 2007. 14. Blake CC, Koenig DF, Mair GA, North AC, Phillips DC, Sarma VR. (1965). "Structure of hen egg-white lysozyme. A three-dimensional

Fourier synthesis at 2 Angstrom resolution". Nature 206 (4986): 757–61. doi:10.1038/206757a0. PMID 5891407.

15. Chen LH, Kenyon GL, Curtin F, Harayama S, Bembenek ME, Hajipour G, Whitman CP (1992). "4-Oxalocrotonate tautomerase, an enzyme composed of 62 amino acid residues per monomer". J. Biol. Chem. 267 (25): 17716–21. PMID 1339435.

16. Smith S (1 December 1994). "The animal fatty acid synthase: one gene, one polypeptide, seven enzymes". FASEB J. 8 (15): 1248–59.

PMID 8001737. 17. Anfinsen C.B. (1973). "Principles that Govern the Folding of Protein Chains". Science181 (4096): 223–30.

doi:10.1126/science.181.4096.223. PMID 4124164.

18. Dunaway-Mariano D (2008). "Enzyme function discovery". Structure 16 (11): 1599–600. doi:10.1016/j.str.2008.10.001. PMID 19000810. 19. The Catalytic Site Atlas at The European Bioinformatics Institute. Retrieved 4 April 2007.

20. Jaeger KE, Eggert T. (2004). "Enantioselective biocatalysis optimized by directed evolution". Current Opinion in Biotechnology 15 (4):

305– 21. Shevelev IV, Hubscher U. (2002). "The 3' 5' exonucleases". Nature Reviews Molecular Cell Biology 3 (5): 364–

22. Tymoczko, John L.; Stryer Berg Tymoczko; Stryer, Lubert; Berg, Jeremy Mark (2002).Biochemistry. San Francisco: W.H. Freeman. ISBN

23. Ibba M, Soll D. (2000). "Aminoacyl-tRNA synthesis". Annu Rev Biochem. 69: 617–50.doi:10.1146/annurev.biochem.69.1.617. PMID 10966471.

24. Rodnina MV, Wintermeyer W. (2001). "Fidelity of aminoacyl-tRNA selection on the ribosome: kinetic and structural mechanisms". Annu

Rev Biochem. 70: 415–35.doi:10.1146/annurev.biochem.70.1.415. PMID 11395413. 25. Tawfik, O. K. A. D. S.; Tawfik, D. S. (2010). "Enzyme Promiscuity: A Mechanistic and Evolutionary Perspective". Annual Review of

Biochemistry 79: 471–505.doi:10.1146/annurev-biochem-030409-143718. PMID 20235827. edit

26. Fischer E. (1894). "Einfluss der Configuration auf die Wirkung der Enzyme" [Influence of configuration on the action of enzymes].

Berichte der Deutschen chemischen Gesellschaft zu Berlin 27 (3): 2985–93. doi:10.1002/cber.18940270364Jump up^ Koshland D. E.

(1958). "Application of a Theory of Enzyme Specificity to Protein Synthesis". Proc. Natl. Acad. Sci. 44 (2): 98–104.

doi:10.1073/pnas.44.2.98.PMC 335371. PMID 16590179. 27. Davies GJ, Bohm M. (2002). "Glycosidase mechanisms". Current Opinion in Chemical Biology 6 (5): 619–29. doi:10.1016/S1367-

5931(02)00380-0.PMID 12413546.

28. Boyer, Rodney (2002) [2002]. "6". Concepts in Biochemistry (2nd ed.). New York, Chichester, Weinheim, Brisbane, Singapore, Toronto.: John Wiley & Sons, Inc. pp. 137–8. ISBN 0-470-00379-0. OCLC 51720783.

29. Savir Y & Tlusty T (2007). "Conformational proofreading: the impact of conformational changes on the specificity of molecular

recognition". In Scalas, Enrico. PLoS ONE 2(5): e468. doi:10.1371/journal.pone.0000468. PMC 1868595. PMID 17520027. 30. Chou K.C. (1996). "Review: Prediction of human immunodeficiency virus protease cleavage sites in proteins". Analytical Biochemistry

233 (1): 1–14.doi:10.1006/abio.1996.0001. PMID 8789141.

31. Gan, Y. R., Huang, H., Huang, Y. D., Rao, C. M., Zhao, Y., Liu, J. S., Wu, L. & Wei, D. Q. (April 2006). "Synthesis and activity of an octapeptide inhibitor designed for SARS coronavirus main proteinase". Peptides 27 (4): 622–625.doi:10.1016/j.peptides.2005.09.006.

PMID 16242214.

32. Du, Q. S., Wang, S., Wei, D. Q., Sirois, S. & Chou, K. C. (2005). "Molecular modelling and chemical modification for finding peptide inhibitor against SARS CoV Mpro". Analytical Biochemistry 337 (2): 262–270. doi:10.1016/j.ab.2004.10.003.PMID 15691506.

33. Du, Q. S., Sun, H. & Chou, K. C. (2007). "Inhibitor design for SARS coronavirus main protease based on "distorted key theory"".

Medicinal Chemistry 3 (1): 1–6.doi:10.2174/157340607779317616. PMID 17266617.

34. Fersht, Alan (1985). Enzyme structure and mechanism. San Francisco: W.H. Freeman. pp. 50–2. ISBN 0-7167-1615-1.

35. Jencks, William P. (1987). Catalysis in chemistry and enzymology. Mineola, N.Y: Dover. ISBN 0-486-65460-5. 36. Villa J, Strajbl M, Glennon TM, Sham YY, Chu ZT, Warshel A (2000). "How important are entropic contributions to enzyme catalysis?".

Proc. Natl. Acad. Sci. U.S.A. 97(22): 11899–904. doi:10.1073/pnas.97.22.11899. PMC 17266. PMID 11050223.

37. Warshel A, Sharma PK, Kato M, Xiang Y, Liu H, Olsson MH (2006). "Electrostatic basis for enzyme catalysis". Chem. Rev. 106 (8): 3210–35. doi:10.1021/cr0503106.PMID 16895325.

38. Eisenmesser EZ, Bosco DA, Akke M, Kern D (2002). "Enzyme dynamics during catalysis". Science 295 (5559): 1520–3.

doi:10.1126/science.1066176.PMID 11859194. 39. Agarwal PK (2005). "Role of protein dynamics in reaction rate enhancement by enzymes". J. Am. Chem. Soc. 127 (43): 15248–56.

doi:10.1021/ja055251s.PMID 16248667.

40. Eisenmesser EZ, Millet O, Labeikovsky W (2005). "Intrinsic dynamics of an enzyme underlies catalysis". Nature 438 (7064): 117–21. doi:10.1038/nature04105.PMID 16267559.

41. Yang LW, Bahar I (5 June 2005). "Coupling between catalytic site and collective dynamics: A requirement for mechanochemical activity of

enzymes". Structure 13 (6): 893–904. doi:10.1016/j.str.2005.03.015. PMC 1489920. PMID 15939021. 42. Agarwal PK, Billeter SR, Rajagopalan PT, Benkovic SJ, Hammes-Schiffer S. (5 March 2002). "Network of coupled promoting motions in

enzyme catalysis". Proc Natl Acad Sci USA. 99 (5): 2794–9. doi:10.1073/pnas.052005999. PMC 122427.PMID 11867722.

43. Agarwal PK, Geist A, Gorin A (2004). "Protein dynamics and enzymatic catalysis: investigating the peptidyl-prolyl cis-trans isomerization activity of cyclophilin A".Biochemistry 43 (33): 10605–18. doi:10.1021/bi0495228. PMID 15311922.

44. Tousignant A, Pelletier JN. (2004). "Protein motions promote catalysis". Chem Biol. 11(8): 1037–42. doi:10.1016/j.chembiol.2004.06.007.

PMID 15324804 45. Flomenbom O, Velonia K, Loos D et al. (2005). "Stretched exponential decay and correlations in the catalytic activity of fluctuating single

lipase molecules". Proc. Natl. Acad. Sci. U.S.A. 102 (7): 2368–2372. doi:10.1073/pnas.0409039102.PMC 548972. PMID 15695587.

46. English BP, Min W, van Oijen AM et al. (2006). "Ever-fluctuating single enzyme molecules: Michaelis-Menten equation revisited". Nature Chemical Biology 2 (2): 87–94.doi:10.1038/nchembio759. PMID 16415859.

47. Lu H, Xun L, Xie X S (1998). "Single-molecule enzymatic dynamics". Science 282(5395): 1877–1882.

doi:10.1126/science.282.5395.1877. PMID 9836635. 48. Olsson, MH; Parson, WW; Warshel, A (2006). "Dynamical Contributions to Enzyme Catalysis: Critical Tests of A Popular Hypothesis".

Chem. Rev. 106 (5): 1737–.

49. Neet KE (1995). "Cooperativity in enzyme function: equilibrium and kinetic aspects".Meth. Enzymol. Methods in Enzymology 249: 519–67. doi:10.1016/0076-6879(95)49048-5. ISBN 978-0-12-182150-0. PMID 7791626.

50. Changeux JP, Edelstein SJ (2005). "Allosteric mechanisms of signal transduction".Science 308 (5727): 1424–8.

doi:10.1126/science.1108595. PMID 15933191. 51. de Bolster, M.W.G. (1997). "Glossary of Terms Used in Bioinorganic Chemistry: Cofactor". International Union of Pure and Applied

Chemistry. Retrieved 30 October 2007.

52. de Bolster, M.W.G. (1997). "Glossary of Terms Used in Bioinorganic Chemistry: Coenzyme". International Union of Pure and Applied Chemistry. Retrieved 30 October 2007.

53. Fisher Z, Hernandez Prada JA, Tu C, Duda D, Yoshioka C, An H, Govindasamy L, Silverman DN and McKenna R. (2005). "Structural and

kinetic characterization of active-site histidine as a proton shuttle in catalysis by human carbonic anhydrase II".Biochemistry. 44 (4): 1097–115. doi:10.1021/bi0480279. PMID 15667203.

54. Wagner, Arthur L. (1975). Vitamins and Coenzymes. Krieger Pub Co. ISBN 0-88275-258-8.

55. BRENDA The Comprehensive Enzyme Information System. Retrieved 4 April 2007. 56. Törnroth-Horsefield S, Neutze R (2008). "Opening and closing the metabolite gate".Proc. Natl. Acad. Sci. U.S.A. 105 (50): 19565–6.

doi:10.1073/pnas.0810654106.PMC 2604989. PMID 19073922.

57. Ferguson, S. J.; Nicholls, David; Ferguson, Stuart (2002). Bioenergetics 3 (3rd ed.). San Diego: Academic. ISBN 0-12-518121-3. 58. Henri, V. (1902). "Theorie generale de l'action de quelques diastases". Compt. Rend. Hebd. Acad. Sci. Paris 135: 916–9.

59. Sørensen,P.L. (1909). "Enzymstudien {II}. Über die Messung und Bedeutung der Wasserstoffionenkonzentration bei enzymatischen Prozessen". Biochem. Z. 21: 131–304.

60. Michaelis L., Menten M. (1913). "Die Kinetik der Invertinwirkung". Biochem. Z. 49: 333–369. English translation. Retrieved 6 April 2007.

61. Briggs G. E., Haldane J. B. S. (1925). "A note on the kinetics of enzyme action".Biochem. J. 19 (2): 339–339. PMC 1259181. PMID 16743508.

62. Xue X, Liu F, Ou-Yang ZC (2006). "Single molecule Michaelis-Menten equation beyond quasistatic disorder". Phys. Rev. E 74 (3):

030902. doi:10.1103/PhysRevE.74.030902.PMID 17025584. 63. Radzicka A, Wolfenden R. (1995). "A proficient enzyme". Science 267 (5194): 90–931.doi:10.1126/science.7809611. PMID 7809611.

64. Ellis RJ (2001). "Macromolecular crowding: obvious but underappreciated". Trends Biochem. Sci. 26 (10): 597–604. doi:10.1016/S0968-

0004(01)01938-7.PMID 11590012. 65. Kopelman R (1988). "Fractal Reaction Kinetics". Science 241 (4873): 1620–26.doi:10.1126/science.241.4873.1620. PMID 17820893.

66. Savageau MA (1995). "Michaelis-Menten mechanism reconsidered: implications of fractal kinetics". J. Theor. Biol. 176 (1): 115–24.

doi:10.1006/jtbi.1995.0181.PMID 7475096. 67. Schnell S, Turner TE (2004). "Reaction kinetics in intracellular environments with macromolecular crowding: simulations and rate laws".

Prog. Biophys. Mol. Biol. 85 (2–3): 235–60. doi:10.1016/j.pbiomolbio.2004.01.012. PMID 15142746.

68. Xu F, Ding H (2007). "A new kinetic model for heterogeneous (or spatially confined) enzymatic catalysis: Contributions from the fractal and jamming (overcrowding) effects".Appl. Catal. A: Gen. 317 (1): 70–81. doi:10.1016/j.apcata.2006.10.014.

69. Garcia-Viloca M., Gao J., Karplus M., Truhlar D. G. (2004). "How enzymes work: analysis by modern rate theory and computer

simulations". Science 303 (5655): 186–95.doi:10.1126/science.1088172. PMID 14716003. 70. Olsson M. H., Siegbahn P. E., Warshel A. (2004). "Simulations of the large kinetic isotope effect and the temperature dependence of the

hydrogen atom transfer in lipoxygenase". J. Am. Chem. Soc. 126 (9): 2820–8. doi:10.1021/ja037233l.PMID 14995199.

71. Masgrau L., Roujeinikova A., Johannissen L. O., Hothi P., Basran J., Ranaghan K. E., Mulholland A. J., Sutcliffe M. J., Scrutton N. S.,

Leys D. (2006). "Atomic Description of an Enzyme Reaction Dominated by Proton Tunneling". Science 312 (5771): 237–

41.doi:10.1126/science.1126002. PMID 16614214.

72. Cleland, W.W. (1963). "The Kinetics of Enzyme-catalyzed Reactions with two or more Substrates or Products 2. {I}nhibition: Nomenclature and Theory". Biochim. Biophys. Acta 67: 173–87.

73. Price, NC. (1979). "What is meant by 'competitive inhibition'?". Trends in Biochemical Sciences 4 (11): pN272. doi:10.1016/0968-

0004(79)90205-6. 74. R Poulin; Lu, L; Ackermann, B; Bey, P; Pegg,

75. Yoshikawa S and Caughey WS. (15 May 1990). "Infrared evidence of cyanide binding to iron and copper sites in bovine heart cytochrome

c oxidase. Implications regarding oxygen reduction". J Biol Chem. 265 (14): 7945–58. PMID 2159465. 76. Hunter T. (1995). "Protein kinases and phosphatases: the yin and yang of protein phosphorylation and signaling". Cell. 80 (2): 225–36.

doi:10.1016/0092-8674(95)90405-0. PMID 7834742.

77. Berg JS, Powell BC, Cheney RE (1 April 2001). "A millennial myosin census". Mol. Biol. Cell 12 (4): 780–94. doi:10.1091/mbc.12.4.780. PMC 32266.PMID 11294886.

78. Meighen EA (1 March 1991). "Molecular biology of bacterial bioluminescence".Microbiol. Rev. 55 (1): 123–42. PMC 372803. PMID

2030669.

84.

Authors: Anil Sai Bodepudi, Anil Kumar Kopparthy, Annavarapu Santosh Kumar

Paper Title: Mobile Operated Control System for Humanoid Robot

Abstract: In this paper a control system is designed to operate a Humanoid Robot “Bioloid Premium” using DTMF

(Dual-Tone-Multiple- Frequency) technology of mobile phones for long range operations. The mobile phone with

the operator acts as a transmitter and the one attached to the Robot acts as a receiver and hence no additional

communication devices are required. The operator calls the mobile installed in the humanoid Robot which gets

activated through auto answering mode. In the course of a call, if any button is pressed, a DTMF tone corresponding

to the button pressed is heard at the other end of the call. The Humanoid Robot perceives this DTMF tone with the

help of the phone placed on it. The received tone is processed by the Arduino microcontroller with the help of DTMF

decoder. The decoder decodes the DTMF tone into its equivalent binary digit and the same is sent to the

microcontroller. The microcontroller is programmed to take a decision for any given input and outputs its decision to

the CM-530 controller through a Zigbee wireless interface. The output decision of the CM-530 processor is sent to

motor driver in order to control the servo motors in required direction for human like moves. Auto answering video

calling is done in order to control the humanoid very easily and precisely. Experiment based on the DTMF has been

carried out which can be implemented in the humanoid robot for various applications like security or safety, defence,

assistance in medical and environmental hazards and other humanitarian services.

Keywords: Humanoid Robot, DTMF, Microcontroller.

References: 1. Siegmund M. Redl, Matthias K. Weber, Malcolm W. Oilphant, GSM and Personal Communications Handbook, Artech House Boston,

London, 1998 .

2. Sabuj Das Gupta, Arman Riaz Ochi, Mohammad Sakib Hossain, Nahid Alam Siddique, Designing and Implementation of Mobile Operated Toy Car by DTMF, International Journal of Scientific and Research Publications, Vol 3, Issue 1, pp 1-7, 2013.

3. 4Online Available: www.natalnet.br/~aroca/afron/mt8870.pdf Online Available: http://www.arduino.cc/

4. Online Available: http://www.robotis.com/xe.

404-407

85.

Authors: Wail N. Al-Rifaie

Paper Title: An Approximate Method for the Design of Ferrocement Beams

Abstract: A simple analytical model is proposed to design the ferrocement rectangular beam subjected to flexural

loading. The predicted results of cross sectional resistance moment obtained using the proposed model is compared

with ACI (trial and error) method. A parametric study was conducted to estimate the influence of volume fraction of

reinforcement and the depth of the beam. The comparison between the proposed and ACI methods was quite

satisfactory.

Keywords: Frrocement, pre-fabricated building, moment, eco-housing.

References: 1. IFS Committees 10, 2001”Ferrocement Model Code,” Building Code Recommendations for Ferrocement (IFS 10-01).

408-410

2. ACI Publication SP.61, 1979 “Ferrocement–Materials and Applications”, pp 1-195. 3. ACI committee 549, 1980, “Guide for the Design, Construction, and Repair of Ferrocement” ACI Structural Journal, May. June, pp 325-351.