International Journal of Innovative Technology and Exploring Engineering(TM)
Exploring Innovation| ISSN:2278-3075(Online)| Reg. No.:65021/BPL/CE/12| Published by BEIESP| Impact Factor:3.48
Home
Articles
Conferences
Editor
Scopes
Author's Instructions
Publication Fee
Terms & Conditions
Privacy Policy
Associated Journals
Contact Us
Volume-2 Issue-4: Published on March 10, 2013
43
Volume-2 Issue-4: Published on March 10, 2013
  Download Abstract Book

S. No

Volume-2 Issue-4, March 2013, ISSN:  2278-3075 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.

1.

Authors:

Aditya Bakshi, A.K.Sharma, Atul Mishra

Paper Title:

Significance of Mobile AD-HOC Networks (MANETS)

Abstract:   Wireless networks use radio frequencies in air to transmit and receive data instead of using some physical cables. Wireless networks are formed of routers and hosts. In a wireless network, the routers are responsible for forwarding packets in the network and hosts may be sources or sinks of data flows .The fundamental difference between wired and wireless networks is the that the networks components communicate. A wired network relies on physical cables to transfer data. In a wireless network, the communication between different network components can be either wired or wireless. Since wireless communication does not have the constraint of physical cables, it allows a certain freedom for the host and/or router in the wireless network to move. This is one of the advantages of a wireless network.

Keywords:
1.Communication 2.Wireless 3.Network 4. Mobile 5. MANET


References:

1.        Poongothai T. and Jayarajan K., “A non cooperative game approach for intrusion detection in Mobile Adhoc networks”, Internatonal conference of computing, communication and networking (ICCC), 18-20 Dec 2008, St. Thomas, VI, pp 1-4.
2.        DjamelDjenouri and LyesKhelladi, “A survey of security issues in mobile ad hoc and sensor network”, IEEE communications Surveys and Tutorials journal,Volume 7, Number 4, 2005, pp 2-29.

3.        Michele Nogueria Lima, AldriLuiz dos Santos and Guy pujolle, “A Survey of Survivability in Mobile Ad Hoc Networks”, IEEE Communications Surveys and Tutorials COMSUR), Volume 11, Number 1, 2009, pp 1-3.

4.        NishuGarg and R.P Mahapatra, “MANET Security Issues”, International journal of Computer Science and Network Security (IJCSNS), Volume 9, Number 8, 2009, pp. 241-246.

5.        Wenjia Li and Anupamjoshi, “Security Issues in Mobile Ad hoc Networks – A Survey”. Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore Country, 2006.

6.        Bing Wu, Jianmin Chen, Jie Wu and MihaelaCardei, “A Survey on Attacks and countermeasures in Mobile Ad Hoc Networks”, Wireless/Mobile Network security, ch-12,2006.

7.        Hao yang, Haiyunlyo, Fan Ye,Songwu Lu and Lixi

8.        HesiriWeerasinghe  “Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation”, Proceedings of the Future Generation Communication and Networking, Volume 2, 2007, pp 362-367.

9.        Mehdi Medadian, M.H. Yektaie and A.M.Rahmani, “ Combat with Black Hole Attack in AODV routing protocol in MANET”, First Asian Himalayas International Conference on Internet (AH-IC12009), 3-5th Nov, 2009.

10.     Bo sung Yong, Guan Jianchen and Udo W. Pooch, “ Detecting Black-hole Attack in Mobile Ad hoc Networks”, The Institution of Electrical Engineers (IEE), Volume 5, Number 6, 2003, pp 490-495.

11.     ElmarGerhards- Padilla, Nils Aschenbruck, Peter Martini Marko Jahnke and Jens Tolle, “Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs”, 32nd IEEE Conference on Local Computer Networks, 15-18th Oct 2007, Dublin, pp 1043-1050.

12.     GaoXiaopeng and Chen Wei, “A Novel Gray Hole Attack Detection Scheme for Mobile Ad-Hoc Networks”, IFIP International Conference on Network and Parallel Computing – Workshops, 18-21 Sep 2007, Dalian, China, pp 449-460, 2009.


1-5

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

2.

Authors:

Kanika Gupta, S.K Gupta

Paper Title:

Image Denoising Techniques- A Review paper

Abstract:  Removal of noise from the original signal is still a bottleneck for researchers. There are several methods and techniques published and each method has its own advantages, disadvantages and assumptions. This paper presents a review of some significant work in the field of Image Denoising.The brief introduction of some popular approaches is provided and discussed. Insights and potential future trends are also discussed.

Keywords:
 Denoising, Spatial Filters, Threshold, Orthogonal Transforms.


References:

1.       Stefan Schulte,Mike  Stefan Schulte, Mike  Nachtegael, Valerie De Witte, Dietrich Van der Weken , Etienne E.Kerre,”Fuzzy Random Impulse Noise removal from Image sequences”
2.       Rafael C. Gonzalez and Richard E.Woods, “Digital    Image Processing”, Pearson Education, Second Edition, 2005.

3.       Kenny Kal Vin Toh,Nor, Ashidi Mat Isa,”   Noise Adaptive Fuzzy Switching Median Filter for Salt-and-Pepper Noise Reduction”, IEEE  Trans. Image Processing, Vol 17, No. 3, March 2010.

4.       Sheng-Fu Liang, Shih-Mao Lu, Jyh-Yeong Chang, and Chin-Teng (CT) Lin, “A Novel Two-Stage Impulse Noise Removal Technique Based on Neural Networks and Fuzzy Decision”, IEEE  Trans. Image Processing, Vol 16, No. 4, August 2008.

5.         Stefan Schulte, Valerie De Witte, Mike Nachtegael, Dietrich Van der Weken, and Etienne E. Kerre,” Fuzzy Two-Step Filter for Impulse Noise Reduction From Color Images” , IEEE  Trans. Image Processing, Vol 15, No. 11, November 2006

6.       H. Guo, J. E. Odegard, M. Lang, R. A. Gopinath,   I.W. Selesnick, and C. S. Burrus, "Wavelet based speckle reduction with application to SAR based ATD/R," First Int'l Conf. on Image Processing, vol. 1, pp. 75-79, Nov. 1994.

7.       Robert D. Nowak, “Wavelet Based Rician Noise Removal”, IEEE Transactions on Image    Processing,vol. 8, no. 10, pp.1408, October 1999

8.       S. G. Mallat and W. L. Hwang, “Singularity  detection and processing with wavelets,” IEEE Trans. Inform. Theory, vol. 38, pp. 617–643,     Mar. 1992.

9.       D. L. Donoho, “De-noising by soft-thresholding”,IEEE Trans. Information Theory, vol.41, no.3, pp.613-627, May1995.

10.     Imola K. Fodor, Chandrika Kamath, “Denoising through wavlet shrinkage: An empirical study”, Center for applied science computing Lawrence Livermore National Laboratory, July 27, 2001.

11.     R. Coifman and D. Donoho, "Translation invariant de-noising," in Lecture Notes in Statistics: Wavelets and Statistics, vol. New York: Springer-Verlag, pp. 125--150, 1995.

12.     R. Yang, L. Yin, M. Gabbouj, J. Astola, and Y.Neuvo, “Optimal weighted median filters understructural constraints,” IEEE Trans. Signal Processing, vol. 43, pp. 591–604, Mar. 1995.

13.     R. C. Hardie and K. E. Barner, “Rank conditioned rank selection filters for signal restoration,” IEEE Trans.   Image Processing, vol. 3, pp.192–206, Mar. 1994.

14.     A. Ben Hamza, P. Luque, J. Martinez, and R.Roman, “Removing noise and preserving details     with relaxed median filters,” J. Math. Imag. Vision, vol. 11, no. 2, pp. 161–177, Oct. 1999.

15.     A.K.Jain, Fundamentals of digital image processing. Prentice-Hall,1989

16.     David L. Donoho and Iain M. Johnstone,“Ideal spatial  adaption via wavelet shrinkage”, Biometrika,    vol.81, pp 425-455, September 1994.

17.     David L. Donoho and Iain M. Johnstone.,“Adapting to unknown smoothness via wavelet shrinkage”, Journal of the American Statistical Association, vol.90, no432, pp.1200-1224, December 1995. National Laboratory, July 27, 2001

18.     V. Strela. “Denoising via block Wiener filtering in wavelet domain”. In 3rd European Congress of Mathematics, Barcelona, July 2000. Birkhäuser Verlag.

19.     H. Choi and R. G. Baraniuk, "Analysis of wavelet   domain Wiener filters," in IEEE Int. Symp. Time-

20.     Frequency and Time-Scale Analysis, (Pittsburgh), Oct.1998.http://citeseer.ist.psu.edu/article/choi98analysis

21.     H. Zhang, Aria Nosratinia, and R. O. Wells, Jr.,“Image denoising via wavelet-domain spatially adaptive FIR Wiener filtering”, in IEEE Proc. Int. Conf. Acoust., Speech, Signal Processing, Istanbul, Turkey, June 2000.

22.     E. P. Simoncelli and E. H. Adelson. Noise removal via Bayesian wavelet coring. In Third Int'l Conf on Image Proc, volume I, pages 379-382, Lausanne, September 1996. IEEE Signal Proc Society.

23.     H. A. Chipman, E. D. Kolaczyk, and R. E.McCulloch: ‘Adaptive Bayesian wavelet shrinkage’, J.Amer. Stat. Assoc., Vol. 92, No 440, Dec. 1997, pp.1413-1421.

24.     Marteen Jansen, Ph. D. Thesis in “Wavelet thresholding and noise reduction” 2000.

25.     M. Lang, H. Guo, J.E. Odegard, and C.S. Burrus, "Nonlinear processing of a shift invariant DWT for noise reduction," SPIE, Mathematical Imaging: Wavelet Applications for Dual Use, April 1995.

26.     I.Cohen, S. Raz and D. Malah,   Translationinvariant  denoising using the minimum description length criterion, Signal Processing, 75, 3, 201-223,(1999).

27.     T. D. Bui and G. Y. Chen, "Translation-invariant denoising using multiwavelets", IEEE Transactions on Signal Processing, Vol.46, No.12, pp.3414-3420, 1998

28.     T. D. Bui and G. Y. Chen, "Translation-invariant

29.     denoising using multiwavelets", IEEE Transactions   on Signal Processing, Vol.46, No.12, pp.3414-3420, 1998

30.     R. G. Baraniuk, “Optimal tree approximation   with wavelets,” in Proc. SPIE Tech. Conf.Wavelet Applications Signal Processing VII, vol. 3813, Denver, CO, 1999, pp. 196-207.

31.     J. Lu, J. B.Weaver, D.M. Healy, and Y. Xu, “Noise reduction with multiscale edge representation and perceptual criteria,” in Proc. IEEE-SP Int. Symp. Time- Frequency and Time-Scale Analysis, Victoria, BC, Oct.1992, pp. 555–558.

32.     D. L. Donoho, “CART and best-ortho-basis: A connection,” Ann. Statist., pp. 1870–1911, 1997.


6-9

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

3.

Authors:

Arunkumar Dwivedi, Dhiraj Kumar S. Lal

Paper Title:

Influence of Addition of Pond Ash as Partial Replacement with Sand and Cement on the Properties of Mortar

Abstract:   This paper presents an experimental investigation on the effect of addition of pond ash partially replaced with cement and sand in the mortar. Effect of pond ash on compressive strength, flexural strength and bulk density were observed under standard curing conditions. Pond ash of 0% to 40% (with increase of 5%) by weight to cement and sand replacement respectively were used. The specimens were casted and cured under standard curing conditions for 3, 7, 28 and 90 days. At the end of each curing period, compressive strength and flexural strength values were determined. Dry bulk densities for each replacement were recorded after 28 days curing period. The result shows that in case of cement replacement in compression as well as flexure strength gives higher values for 15% to 20% replacement of pond ash. The result of dry bulk density test also indicates that the values of density for cement replacement as well as sand replacement decreases with increase in percentage of pond ash.

Keywords:
 bulk dry density, cement replacement, compressive strength, pond ash, sand replacement.


References:

1.       Alain, Bilodeau, V, Mohan. Malhotra VM, “High-volume fly ash system: concrete solution for sustainable development,”  ACI Material Journal, 2000; 97(1), pp. 41–47.
2.       Naik TR, Singh S, Mohammad M. Hossain, “Permeability of high strength concrete containing low cement factor”. Journal of Energy Engineering 1996; 122(1): pp.21-39.

3.       Zhang MH, Malhotra VM. “Leach ability of trace metal elements from fly ash concrete: results from column-leaching and batch leaching tests”. ACI Material Journal 2001; 98(2): pp.126-136.

4.       Poon CS, Lam L., Wang YL. “A study on high strength concrete prepared with large volume of low calcium fly ash”, Cement Concrete Research 2001; 30(3): pp.447-456.

5.       Rafat S. “Effect of fine aggregate replacement with class F fly ash on the mechanical properties of concrete”. ”, Cement Concrete Research 2003; 33 (4): pp.539-547.

6.       BIS Codes No. IS 2250:1981 (reaffirmed 2005) - Code of Practice for Preparation and Use of Masonry Mortars (First Revision), IS 1905: 1987 (Reaffirmed 2007).

7.       BIS 8112 (2005) Specification for 53 grade Ordinary Portland Cement. Manak Bhavan New Delhi.

8.       ASTM (C) 150-86, Standard Specification for Portland cement, Annual Book of ASTM Standards, 1988, (Vol. 4.01-Cements, Lime, Gypsum), Easton, USA.

9.       BIS 383 (1970), Specification for Coarse and Fine Aggregate from natural Sources for Concrete (Second Revision), Bureau of Indian Standards, New Delhi, India.

10.     BIS 2116 (1980) Specification for Sand for masonry mortars (1st revision), Manak Bhavan New Delhi, India.

11.     BIS-3812 (Part-1):2003 Pulverized fuel ash-specification for use as pozzolana in cement, cement mortar and concrete, Bureau of Indian Standards, New Delhi, India.

12.     EN 1015-10 (1999) European Code for Methods of test for mortar for masonry - Determination of dry bulk density of hardened mortar.

13.     ASTM C-780 Standard Test Method for Preconstruction and Construction Evaluation of Mortars for Plain and Reinforced Unit Masonry.

14.     ASTM C-270 Standard Specification for Mortar for Unit Masonry.

15.     ASTM C109 / C109M - 11b Standard Test Method for Compressive Strength of Hydraulic Cement Mortars (Using 2-in. or [50-mm] Cube Specimens).

16.     ASTM C348 - 08 Standard Test Method for Flexural Strength of Hydraulic-Cement Mortars.


10-13

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

4.

Authors:

Shabnam S.Mahat, P.P.Jamsandekar, K.M. Nalawade

Paper Title:

Major Problems Associated With the Use of ICT in Institution

Abstract:   In many countries, information and communication technology (ICT) has a clear impact on the development of educational curricula. The absence of a formal and established ICT curriculum leads to an ambiguous situation, because there is nevertheless an observable policy towards the adoption of ICT in education. This policy fosters the integration of ICT in teaching and learning processes, but builds on the professional attitude and willingness of the individuals.  However, it has never been examined whether teachers are using ICT in accordance with the competencies proposed by the UGC and AICTE. In order to answer this question, a survey was conducted among the  colleges in sangli city. Results show that teachers mainly focus on the development of technical ICT skills, whereas the ICT curriculum centres on the integrated use of ICT within the learning and teaching process. This indicates the existence of a gap between the proposed and the implemented curriculum for ICT.  The present study investigates how and to what extent colleges implement the new expectations arising from the national authorities. In particular, it examines which ICT competencies teachers actually adopt (actual use) and which competencies they intend to adopt in the future (preferred use).

Keywords:
 ICT, Security concerns.


References:

1.       Youssef, B., A., & Dahmani, M. (2008). Student's performances and ICTs, University and Knowledge Society Journal (RUSC), March 2008, 45-56.
2.       www.cbse.nic.in/prosak1.doc

3.       http://www.sakshat.ac.in

4.       http://sakshat.ignou.ac.in/sakshat/index.aspx

5.       http://sakshat.gov.in

14-16

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

5.

Authors:

Hemraj R. Kumavat, Yogesh N. Sonawane

Paper Title:

Feasibility Study of Partial Replacement of Cement and Sand in Mortar by Brick Waste Material

Abstract:   Brick waste is investigated for its use as a replacement of cement and sand in cement mortar as it behaves as a pozzoloana. It may make an important contribution towards decreasing the adverse effect of the production, disposal and the dumping of brick waste on the environment. The results show that richer mixes gives lower value of bulk density and higher values of compressive strength for sand replacement with brick waste up to 40%. The paper presents useful data for the brick manufacturing industry, builders and mortar manufacturing companies in terms of minimizing the impact of brick waste and using eco-efficient materials.

Keywords:
 Bulk dry density of fresh and hardened mortar, cement replacement, compressive strength, sand replacement.


References:

1.       Amorim L. V., Lira H. L. and Ferreira H. C. (2003) “Use of residential construction waste and residues from red ceramic industry in alternative mortars.” J. Environ. Eng., 129-10, pp- 916–920.
2.       J Silva, J de Brito and R Veiga (2008) “ Fine ceramics replacing cement in mortars partial replacement of cement with fine ceramics in rendering mortars” Materials and structures (2008) 41, pp- 1333-1344

3.       Miranda L. , Selmo S. (1999). “Evaluation of the effect of recycled waste on the properties of hardened mortars, by rational proportioning procedures.” Proc., III Brazilian Symp. of Mortars Technology (SBTA), IPT, Vitoria, Brazil, 583–594

4.       Nehdi M. and Khan A. (2004) Protective system for buried infrastructure using recycled tire rubber-filled cement mortars Rep. No. SP- 219, American Concrete Institute (ACI), Detroit, pp- 99–114.

5.       R. D. Toleda Filho, J.P.  Goncalves, B. B. Americano and E. M. R. Fairbairn “Potential for use of crushed waste calcined clay brick as a supplementary cementitious material in brazil” Cement and concrete research 37-2007, pp-1357-1365

6.       Silva J. (2006) “Incorporation of red-brick waste in cement mortars.” ME dissertation, IST Technical Univ. of Lisbon, Lisbon, Portugal.

7.       Toledo Filho R., Americano B., Fairbairn E., Rolim J., and Filho J.(2001) “Potential of crushed waste burnt clay brick as a partial replacement for Portland cement.” Rep. No. SP-202, American Concrete Institute (ACI), Detroit, PP-147–160.

8.       A B. Tardale, S S Patil, N. J. Pathak, (2011), “Feasibility Study of Replacement of Cement and Sand in Concrete and Mortar by  ECOSPHERE Material”, International Journal of Earth Sciences and Engineering , Volume 04, No 06 SPL, October 2011, pp- 920-923

9.       Moriconi G, Corinaldesi V, Antonucci R (2003) “Environmentally-  friendly mortars: a way to improve bond between mortar and brick”,  Material and Structure, 36(10), pp-702–708

10.     Angelim RR, Angelim SCM, Carasek H (2003) “Influence of the addition of limestone, siliceous and clay fines in the properties of mortars and renderings”, Paper presented at the V Brazilian Symposium on Mortars Technology (SBTA),  Paulo, Brazil, 11–13 June 2003


17-20

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

6.

Authors:

Kanika Gupta, Apurva, Priya Jindal, Vishakha Snehi

Paper Title:

Implementing Kalman Filter in GPS Navigation

Abstract:   This paper describes about the increase in efficiency of the GPS Navigation System when conventional tracking loops are replaced by the Kalman Filter. The Kalman Filter is a recursive algorithm that helps in reducing the square root of the error in the non-linear and noisy dynamic systems. The approach is also called Digital Filtering, more precisely - Adaptive Filtering. The paper highlights various errors in the GPS Systems and describes how Kalman Filter can effectively reduce them. The various kinds of errors are ionospheric error, tropospheric error, onboard clock error, that is, error in the satellite’s clock, receiver clock error, ephemeris data errors, that is, small error in the position of the satellite. We aim at reducing such errors by using the Extended Kalman Filter. The Kalman Gain coefficient is the most important component of the entire algorithm. It will we multiplied with the error residuals iteratively, which will reduce the error value in the final readings eventually. Also, by replacing conventional looping, which provides accurate readings after 3rd or 4th iteration, with the Kalman Filter will provide the accurate readings before so many iterations which will reduce the delay. As a result, the new GPS Navigation system will provide much accurate and faster readings to the user.

Keywords:
 Ephemeris Errors, GPS Navigation, Kalman Filter, Tracking Loops.


References:

1.       B.L.Malleswari. V.MuraliKrishna, K. Lalkishore, M.Seetha, Nagaratna, P. Hegde, “THE ROLE OF KALMAN FILTER IN THE MODELLING OF GPS ERRORS”, JTAIT, Hyderabad, 2009.
2.       Rachel Kleinbaeur, “THE ROLE OF KALMAN FILTER IN THE MODELLING OF GPS ERRORS”, University of Stuttgart, Helsinki, November 2004.

3.       Dan Simon, “Kalman Filtering”, Embedded Systems Programming, June 2001, pg 71-79.

4.       Mohinder S.Grewal, Lawrence R. Weill, Angus P.Andrews, “Global Positioning Systems Inertial Navigation and Integration”, Wiley & Sons Publications, New York, 2001.

5.       Dah-Jing Jwo1, Mu-Yen Chen1, Chien-Hao Tseng1 and Ta-Shun Cho2, “Adaptive and Nonlinear Kalman Filtering for GPS Navigation Processing”,National Taiwan Ocean University, Taiwan

6.       Grewal, M. S. and Andrews, A. P. (1993), “Kalman Filtering Theory    and Practice”, Prentice Hall.

7.       Fakhar Ahsan, “Hardware/Software Co-Design of Kalman Filter for Radar Applications”, Presentation.

8.       Greg Welch and Gary Bishop, “An Introduction to the Kalman Filter”, University of North Carolina at Chapel Hill, North Carolina, 24th June, 2006.

9.       Allankliu, “GPS receiver design”,  http://dev.emcelettronica.com, 9th April, 2008.

10.     Jouni Hartikainen, Arno Solin, Simo Sakka, “ Optimal Filtering with Kalman Filter and Smoothers“,Department of Biomedica Engineering and Computational Sciences, Aalto University School of Science, 16th August 2011.

11.     C.Mongredien, M.E.Cannon and G.Lachapelle, “ Performance Evaluation of  Kalman Filter Based Tracking for the New GPS L5 Signal”, Department of Geomatics Engineering, University og Calgary, 25th-28th Sepember, 2007.

12.     Carole R.M.Bolduc, “Self-Alignment and Navigation Algorithm for DREO Navigation Labroratory Heading Reference Unit”, Carleton University, Ottawa, 1995.

13.     Arthur Gelb, “Applied  Optimal Estimation”, M.I.T Press, Cambridge, Massachusetts, 1974.

14.     Mohamed, A. H. & Schwarz, K. P.,”Adaptive Kalman filtering for INS/GPS. Journal of Geodesy”, 73 (4),1999,  pp. 193-203.

15.     Xu, T. & Cui, P.,” Fuzzy adaptive interacting multiple model algorithm for INS/GPS, IEEE International Conference on Mechatronics and Automation”, pp. 2963-2967, 2007.


21-25

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

7.

Authors:

Dhrubajyoti Gogoi, Rupam Kumar Sharma

Paper Title:

Android Based Emergency Alert Button

Abstract:   Android is a java based operating system which runs on the Linux 2.6 kernel. It’s lightweight and full featured. Android applications are developed using Java and can be ported to new platform easily thereby fostering huge number of useful mobile applications. This paper describes about a SOS application being developed and its successful implementation with tested results. The application has target users those sections of the people who surprisingly falls into a situation where instant communication of their whereabouts becomes indispensable to be informed to certain authorized persons at remote end.

Keywords:
 Gprs, SOS, security, android


References:

1.       Android a programmers guide by Jerome DiMarzo.
2.       Beginning Android Application Development by Wei-Meng Lee.

3.       Hello Android Introducing Google’s Mobile development Platform by Ed Burnette

4.       Professional Android Application Development by Reto Meier.

5.       Creating Android Applications: Develop and Design ChrisHaseman

6.       https://play.google.com/store/apps/details?id=com.sharecare.sos&hl=en

7.       https://play.google.com/store/apps/details?id=com.capefield.olalashe


26-27

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

8.

Authors:

Chandni Vaghasia, Kirti Bathwar

Paper Title:

Public Key Encryption Algorithms for Wireless Sensor Networks In tinyOS

Abstract:   Generally, when people consider wireless devices they think of items such as cell phones, personal digital assistants, or laptops. These items are costly, target specialized applications, and rely on the pre-deployment of extensive infrastructure support. In contrast, wireless sensor networks use small, low-cost embedded devices for a wide range of applications and do not rely on any pre-existing infrastructure. The emerging field of wireless sensor networks (WSN) combines sensing, computation, and communication into a single tiny device called sensor nodes or motes. Through advanced mesh networking protocols, these devices form a sea of connectivity that extends the reach of cyberspace out into the physical world. here some algorithms are implemented and result is analyzed on different  platforms like PC MICA,Mica 2, Mica2dot and analyze which algorithm is best for which platform.

Keywords:
 Cryptography, Public Key Encryption, Sensor nodes, Wireless Sensor Networks.


References:

1.       Jason Lester Hill: “System Architecture for Wireless Sensor Networks”, Doctor of Philosophy In Computer Science In The Graduate Division Of The University Of California, Berkeley
2.       Steffen Peter, Dirk Westhoff, Member, IEEE, and Claude Castelluccia: “A Survey on the Encryption of Convergecas Traffic with In-Network Processing”.

3.       Suat Ozdemir , Yang Xiao : “Computer Networks”, Department of Computer Science, The University of Alabama, Tuscaloosa, AL 35487-0290, United States.

4.       Tatsuaki Okamoto, Shigenori Uchiyama: “A New Public Cryptosystem as secure as factoring”, Florida Atlantic University, Boca Raton, FL, USA

5.       Joao Girao and Dirk Westhoff  NEC Europe Ltd. Kurf¨ursten-Anlage “Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks”, Einar Mykletun Computer Science Department University of California, Irvine.

6.       D. Naccache and J. Stern. A New Public Key Cryptosystem Based on Higher Residues. ACM Conference on Computer and Communications Security, pages 59–66, 1998.

7.       Einar Mykletun:“Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks”, Computer Science Department University of California, Irvine

8.       Steffen Peter, Dirk Westhoff, Member, IEEE, and Claude Castelluccia:“ A Survey on the Encryption of  Convergecast Traffic with In-Network Processing Wireless Sensor Network Security: A Survey.”.

9.       An Liu:” A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks”, Department of Computer Science NC State University, Raleigh, NC 27695 email: aliu3@ncsu.edu

10.     Chris Karlof, Naveen Sastry, David Wagner:” A Link Layer Security Architecture      for Wireless Sensor Networks” ckarlof@cs.berkeley.edu ,UC Berkeley .

11.     C. Castelluccia, E. Mykletun, and G. Tsudik, “Efficient Aggregation of Encrypted Data       in Wireless Sensor Networks,” Proc. Second Ann. Int’l Conf. Mobile and Ubiquitous Systems: Networking and Services (Mobiquitous ’05), July 2005.

12.     J. Domingo-Ferrer, “A Provably Secure Additive and Multiplicative Privacy Homomorphism,” Proc. Fifth Information Security Conf. (ISC ’02), pp. 471-483, 2002.


28-34

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

9.

Authors:

Pallavi S.  Bangare, Pooja More, Sunil L. Bangare, Ashish Upadhye, Pooja Zambad

Paper Title:

Re-Evaluation of Visual Studio 2010 Add-ins For Coding Guidance

Abstract:  The add-in tool offers developers new means to check code quality and view suggestions based on standards used in coding domain today, thus adding flexibility to the current Visual Studio IDE. Code review is an important phase in implementation which we plan/propose to automate. Visual Studio 2010 add-in is assurance for coding guidelines and to run the review tool so as to find out the guideline violations at the time of coding itself

Keywords:
 Regular expressions, Visual Studio 2010 IDE, Add-in, Coding Guidelines.


References:

1.       www.microsoft.com/visualstudio.
2.       Static Analysis Tools For .NET.

3.       Framework Design Guidelines: Conventions, Idioms, and Patterns For Reusable .Net Libraries - Krzysztof Cwalina, Brad Abrams.

4.       Effective C#: 50 Specific Ways To Improve Your C# by Bill Wagner.

5.       www.submain.com.      

6.       http://visualstudiogallery.msdn.microsoft.com/d0d33361-18e2-46c0-8ff2-4adea1e34fef


35-38

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

10.

Authors:

P.Blessy, R.Jegan, X.Anitha Mary

Paper Title:

Seat Occupancy Detection Based on Impedance Measurement

Abstract:   Improved automotive safety depends on the sensing of the occupancy of the seat. Capacitive sensors are one of the most attractive sensor technologies that are used in seat occupancy detection. With the help of capacitive sensing methods the presence of an object or a person can be detected. This information can be used in vehicles for triggering safety devices, like airbag, only in the case when the seat is occupied by a human. A method for identifying human proximity in a seat by sensing the electric field and by measuring the impedance is introduced in this paper.

Keywords:
 capacitive sensing principle, electrodes, electric field sensing, impedance measurement, integrated circuit.

References:

1.       Armin Satz, Dirk Hammerschmidt, David Tumpold “Capacitive passenger detection utilizing dielectric dispersion in human tissues”, journal on sensors and actuators, Vol: 152 march 2009.
2.       Boby George, Hubert Zangl, Georg Brasseur “A Combined Inductive-capacitive Proximity Sensor for Seat Occupancy Detection”, IEEE transactions on instrumentation and measurement, vol.59, issue no.5, pp: 1463-1469, may 2010.

3.       Boby George, Hubert Zangal, Thomas Bretterklieber, George Brasseur “A Novel Seat Occupancy Detection System Based On Capacitive Sensing”, IEEE International Instrumentation and Measurement Technology Conference, vol: 54, pp: 1515-1519, may 2008.

4.       Fernando Seoane, Javier Ferreira, Juan Jose Sanchez “An analog front end enables electrical impedance spectroscopy system on-chip for biomedical applications” Journal on physiological measurement, Vol: 29, Number 6, pp: S267-S278, 2008.

5.       Georg Brasseur” Capacitive Sensing “, sensor and test conference, pp: 275-280, 2009.

6.       J.Ferreira, F.seoane, A.Ansede and R.Bragos “AD5933 based spectrometer for electrical bioimpedance applications” International conference on electrical bio impedance, Vol: 224, 2010.

7.       Jerzy Hoja 1, Grzegorz Lentka ” Portable analyzer for impedance spectroscopy ”, XIX IMEKO World Congress Fundamental and Applied Metrology, pp:497-502,2009.

8.       Joan Albesa and Manel Gasulla “Seat occupancy and belt detection in removable seats via inductive coupling”, IEEE Vehicular technology conference, page 1-5, Sep 2011.

9.       Jerzy Hoja ,Grzegorz Lentka” Interface circuit for impedance sensors using two specialized single-chip microsystems”,  journal on Sensors and Actuators, Vol:163, Issue1,pp:191–197,2010.


39-41

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

11.

Authors:

Monika Kalra, Dinesh Verma

Paper Title:

Effect of Constant Suction on Transient Free Convective Gelatinous Incompressible Flow past a Perpendicular Plate with Cyclic Temperature Variation in Slip Flow Regime

Abstract:   The wavering free convective gelatinous incompressible flow past a perpendicular permeable flat plate with cyclic temperature in slip flow system has been discussed. Presumptuous constant suction velocity at the porous plate, methodical expressions for flow characteristic are obtained. The possessions of various parameters on the transient velocity, transient temperature, the skin friction and rate of heat transfer are discussed with the help of graphs.

Keywords:
 The possessions of various parameters on the transient velocity,


References:

1.        P.K.Sharma and R.C.Chaudhary, Effect of variable suction on transient free convective viscous incompressible flow past a vertical plate with periodic Temperature variation in slip flow regime Emirates Journal for Engineering Research, 8 (2), 33-38 (2003)
2.        S. Ostrach, New aspects of natural convection heat transfer, Trans. Am. Soc. Mec. Engrs., 75, (1953), 1287-1290.

3.        S. Ostrach, Combined natural and forced convection laminar flow and heat transfer of fluids with and without heat sources in channels with linearly varying wall temperature, NACA TN, (1954), 3141.

4.        R. Siegel, Transient free convection from a vertical flat plate, Transactions of the ASME, 30, (1958), 347-359.

5.        A. A. Berezovsky; O. G. Martynenko and Yu. A. Sokovishin, Free convective heat transfer on a vertical semi infinite plate, J. Engng. Phys., 33, (1977), 32-39.

6.        O. G. Martynenko; A. A. Berezovsky and Yu. A. Sokovishin, Laminar free convection from a vertical plate, Int. J. Heat Mass Transfer, 27, (1984), 869-881.

7.        G. Ramanaiah and G. Malarvizhi, Free convection on a horizontal plate in a saturated porous medium with prescribed heat transfer coefficient, Acta Mech., 87, (1991), 73-80.

8.        K. Anwar, MHD unsteady free convection flow past a vertical porous plate, ZAMM, 78, (1998), 255-270.

9.        U. N. Das ; R. K. Deka and V. M. Soundalgekar, Transient free convection flow past an infinite vertical plate with periodic temperature variation, J. Heat Transfer,(ASME), 121, (1999), 1091-1094.

10.     M. A. Hossain, S. Hussain and D. A. S. Rees, Influence of fluctuating surface temperature and concentration on natural convection flow from a vertical flat plate, ZAMM, 81, (2001), 699-709.


42-44

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

12.

Authors:

Pijus Kanti Khatua, Suraj Chakraborty, Sibaprasad Maity, Gora Das, Arunabha Ghosh

Paper Title:

Eco-Composite Flush Door Shutter Using Bamboo-Jute Fiber

Abstract:   This paper present the development of composite flush door shutter for ecological purpose (eco-composite) using natural fibre like bamboo, jute and their basic mechanical properties. Here, 100 percent indigenous technologies were applied to make flush door shutter of solid core type. Different thermosetting resin adhesives were used as matrix at different stage. The experimental results [as per IS: 2202 (Part I)] of the physico-mechanical properties like surface finishing, tensile strength, internal bond strength, density, screw withdrawal and glue shear strength etc. of the flush door had a sufficient specific strength (influenced by the dilution of resin matrix) which is equivalent to that of the conventional wooden flush door. This technique for the production of flush door using fast growing natural fibre is cost effective and could be an ideal solution with ever depleting forest reserves.

Keywords:
 Fiber; Resin; Composite; Flush door


References:

1.        The Indian Forester April, 2004; Vol. 130(4): 367-374.
2.        Maloney TM. Modern particle board & dry process fiber board manufacturing.  Miller Freeman Publications, San Francisco 1993; CA, USA..

3.        Shin FG, Yipp MW. Analysis of the mechanical properties and microstructure of bamboo-epoxy composites. J Mater Sci 1989; 3483:24.
4.        Baksi S, Srikanth G, Suresh Babu M., Biswas S. Composites as building material - Indian scenario. TIFAC, Dept. of science and technology, Govt. of India. publication, June, 2005.
5.        Jain S, Kumar R, Jindal UC. Mechanical behaviour of bamboo and bamboo composite. J Mater Sci 1992; 27:4598–604.

6.        Ghosh IN, Khatua P, Day A and Roy AK. Jute composite using   euphorbia latex – A natural binder. Journal of Textile Asia(Hongkong); Vol. No. XXXVIX, 2008; 0203: 55-57.

7.        Sefain MZ, Naim NA, Rakha M. Effect of thermal treatment on the properties of sugar cane bagasse hardboard. J Appl Chem Biotechn 1978; 28(2): 79–84.

8.        Mobarak F, Fahmy Y, Augustin H. Binderless lignocellulose composite from bagasse and mechanism of self-bonding. Holzforschung 1982; 36:131–135.

9.        Pizzi A. Advanced Wood Adhesives Technology. Marcel Dekker Inc, New York 1994; 58–60.

10.     Jain S, Kumar R, Jindal UC. Development and fracture mechanism of the bamboo/polyester resin composite. J Mater Sci. Lett 1993; 12: 558–60.

11.     Rajulu AV, Baksh SA, Reddy GR, Chary KN. Chemical resistance and tensile properties of short bamboo fiber reinforced epoxy composites. J Reinforced Plast Compos 1998; 17(17):1507–11.

12.     Li SH, Fu SY, Zhou BL, Zeng QY, Bao XR. Reformed bamboo and reformed bamboo/aluminium composite. J Mater Sci 1994; 29: 5990–6.

13.     Chen X, Guo Q, Mi Y. Bamboo fiber-reinforced polypropylene composites: a study of the mechanical properties. J Appl Polym Sci 1998; 69:1891–9.

14.     Lee AWC, Bai X, Bangi AP. Flexural properties of bamboo reinforced southern pine OSB beams. Forest Prod J 1997; 47(6):74–78.

15.     Yusoff MNM, Kadir AA, Mohamed AH. Utilization of bamboo for pulp and paper and medium density fiberboard. In: Proceedings of national bamboo seminar I, Kuala Lumpur, Malaysia 1994.

16.     Sulastiningsih IM, Nurwati1 SM, Kawai S. The effects of bamboo: cement ratio and magnesium chloride (MgCl2) content on the properties of bamboo–cement boards. ACIAR Proceedings No. 107, Canberra, Australia 2002.

17.     Jindal UC. Development and testing of bamboo-fiber reinforced plastic composites. J Composite Mater 1986; 20:19–29.

18.     Manual on Jute Composites, Indian Jute Industries Research Association, UNDP Jute Program: (1992 – 97).

19.     Naha P, Sen S. Development of jute overlays for panel products, IPIRTI, Research Report No. 2004; 131.

20.     Philip R. Eggers, Elwood K Madsen. Warp and weather resistant solid core wood door and method of making, a United States patent No. 4146662.

21.     Biswas S, Mittal A, Srikanth G. Gujrat earth quake–composite materials towards re–building & rehabitation. Journal of Indian Buildings Congress, December; 2001;  Vol.VIII(2):199-206.

22.     Biswas S, Srikanth G, Nangia S. Development of natural fiber composites proceedings of annual convention & trade show, Composites fabricators' Association at Tampa, Florida, USA, October 03-06, 2001.

23.     Hill MD, Wilson JB. Particleboard strength as affected by unequal resin distribution on different particle fractions. Forest Product Journal 1978; 28(11): 44–48.

24.     BIS, New Delhi, Wood particle boards (Medium Density) for general purpose 1985; IS: 3087 (Internal bond strength) (Cl. – 10.9).

25.     BIS, New Delhi. Method of Test for Wood particle boards and boards from other ligno-cellulosic materials 1977; IS: 2380 (Pt – V & VI)..

26.     BIS, New Delhi. Wood flush door shutters solid core type – Specification. 1999; IS: 2202 (Pt – I).

27.     BIS, New Delhi. Method for test for flush door shutter, BIS, New Delhi 1998; IS: 4020(Pt – 1 to 16).

28.     BIS, New Delhi. Method of test for plywood (Tensile strength) 1983; IS: 1734 (Part -9).

29.     Saheb DN, Jog JP. Natural fiber polymer composite; a review. Adv Polym Technol 1999; 18(4): 351-63.


45-51

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

13.

Authors:

Surinder Chauhan, Vikram Chopra, Shakti Singh

Paper Title:

Transient Stability Improvement of Two Machine System using Fuzzy Controlled STATCOM

Abstract:   A static synchronous compensator is one of the FACTS devices used to improve the transient stability of the power system. In this paper a mamdani based fuzzy logic controller is designed. The inputs to the fuzzy logic are the alternator speed i.e. ω and its derivative i.e. dω/dt and the output is the firing angle α of the voltage source converter. The proposed controller is tested on two machine system using Matlab Simulink Environment. The Results are compared with conventional PI STATCOM Controller.

Keywords:
 Transient Stability, FACTS, STATCOM,  fuzzy logic controller.


References:

1.        Kundur Prabha, “Power system stability and control.” McGraw-Hill, 1994 .
2.        Cong, L. “Coordinated control of Generator excitation and STATCOM for Rotor angle stability and voltage regulation enhancement of power systems.” IEE Proceedings on Generation & Transmission and Distribution, 149(2), pp 659-666, Feb 2003.

3.        Hingorani and N.G. Gyungyi, “Understanding FACTS    Devices.” IEEE Press, 2000.

4.        Spista.V, “Design of a Robust State Feedback Controller for a STATCOM Using Zero Set Concept”, IEEE transactions on Power delivery, 25(1), pp 456-467, Jan 2010.

5.        Haque, M.H. “Improvement of first swing stability limit  by utilizing full benefit of shunt FACTS devices”, IEEE transactions on Power Systems 19(4), pp 1894-1902 , Nov 2004.

6.        Singh.B, “Static Synchronous compensators (STATCOM). A review”,IET transaction on Power electronics), 2(4), pp 297-324, July 2009

7.        Kumar Sahoo, A, “Modeling and simulation of 48-pulse VSC based STATCOM using simulink’s power system blockset,” India International Conference on Power Electronics (IICPE), Chennai, pp 303-308, Dec 2006.

8.        Keyou Wang, “Power System voltage Regulation via STATCOM Internal Nonlinear Control”, IEEE Transactions on Power Systems, 26(3), pp-1252-1262, Aug 2011.

9.        Padiyar, K.R. “HVDC Power Transmission systems.”2 edition, new age international publishers.

10.     Huang Shao-Ping, “Modeling and dynamic Simulation of GTO-BasedSTATCOM,” International Conference on Electrical and Control Engineering (ICECE), Wuhan, pp 1293-1296, June 2010.

11.     Tan, Y.L “Analysis of line compensation by Shunt –connected FACTS controllers: a comparison between SVC and STATCOM”, IEEE proceedings on Power Engineering Review, 19(8), pp 57-58, Aug 1999.

12.     Chun Li, “Design of a rule based Controller for STATCOM” 24th Annual Conference of the IEEE, Aachen, pp 467-472, Aug 2002.

13.     M.Kazerani, “Mid-point sitting of facts devices in transmission lines,” IEEE transaction on power delivery, 12(4), pp-1717-1722, Oct 1997.

14.     Albasri, F.A.“Performance Comparison of Distance Protection Schemes for shunt-Facts Compensated Transmission Lines.” IEEE  transactions on Power delivery , 22(4) , pp 2116-2125,Oct 2007.

15.     Mohaghegi, S. “An adaptive Mamdani fuzzy logic based Controller for a static compensator in a multimachine power system”, Proceedings of the 13th International Conference on Intelligent Systems Applications to Power Systems, Arlington,VA, pp 6, Feb 2006.

16.     Zolghardi, “Power System Transient Stability Improvement using Fuzzy Controlled STATCOM”, International Conference on Power System Technology, Chongqing, pp 1-6, Feb 2007.

17.     Timothy J.Ross, “Fuzzy logic with engineering applications”- John Wiley & Sons, Ltd

18.     Ajami, A. “Application of a Fuzzy Controller for Transient Stability Enhancement of AC Transmission System by STATCOM.”, International Joint Conference on SICE-ICASE, Busan, pp 6059 – 6063, Feb 2007.

19.     A.Ghafouri,“Fuzzy Controlled STATCOM for improving the Power System Transient Stability.” 39th North American PowerSymposium, 2007,Las Cruces, NM, pp 212-216, Dec 2007.   


52-56

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

14.

Authors:

Heena, Jagpreet  Kaur

Paper Title:

A Secure Technique for hiding data under the Fingerprint Images using Modified Haar Wavelet Based Transformation

Abstract:   Steganography refers to the hiding of secret messages in communications over a public channel so that an eavesdropper (who listens to the communications) cannot even tell that a secret message is being sent. Early works has been done on single file media. Which is sometime easy to analyze and find out the secret message . In the current work we are going to propose the multiple fingerprint images to store the secret message. We are also going to choose the modified haar wavelet transformation technique to insert the data. Image sequence is connected as random manner and every image has a tag for another image In this work we are inserting the data in fingerprint image for security and reliability purpose. As in this method the message is embedded in the picture in a random manner depending on the free spaces in the picture and also the message is scrambled with image while embedding to make the retrieval of the message by an unknown user tough.    

Keywords:
 Fingerprints, Eavesdropper, MFHWT, Embedding


References:

1.        Mahmoud Hanan,Al-Dawood Aljoharah [2010] “Novel Technique  for  Steganography in fingerprints Image : Design and Implementation” Sixth  International conference on  Information Assurance and Security .
2.        Marvel L.M [1999] “Spread Spectrum Image Steganography”,IEEE TRANSACTION  ON IMAGE PROCESSING,vol. 8 ,Pp- 1075-1083                                     

3.        Almohammad Adel, Ghine Gheorghita [2010] “Image Steganography and Chrominance Components” 10th IEEE International Conference on Computer and Information Technology, Pp – 996– 1001.

4.        Mathkour Hassan,Al-Sadoon Batool,Touir Ameur[2008]” A New Image Steganography Technique”, IEEE,Pp-1-4

5.        Bhardwaj Anuj and Ali Rashid [2009],” Image Compression Using Modified Fast Haar Wavelet Transform”, World Applied Sciences Journal 7, Pp- 647-653

6.        Herodotus, The Hisories, and chap. 5 - The fifth book entitled Terpsichore, 7 - The seventh book entitled Polymnia, J. M. Dent   & Sons, Ltd, 1992


57-59

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

15.

Authors:

Dibyendu Barman

Paper Title:

Dynamic Time Quantum in Round Robin Algorithm (DTQRR) Depending on Burst and Arrival Time of the Processes

Abstract:  In multitasking and time sharing operating system the performance of the CPU depends on waiting time, response time, turnaround time, context switches from the process mainly depends on the scheduling algorithm. Round Robin is most widely used scheduling algorithm but this algorithm has some disadvantages. Here Time Quantum play very impartment role. If the time quantum is too large then it works like FCFS (First cum First Serve) scheduling algorithm and if time quantum is too small then more context switches is occur which decrease the performance of the CPU. In this paper based on the experiments and calculations a new scheduling algorithm is introduced. In this algorithm the main idea is to adjust time quantum dynamically depending upon arrival time and burst time of the processes

Keywords:
 Round Robin, Context Switch, DTQRR, CPU Scheduling.


References:

1.        “Silberschatz, A., P.B. Galvin and G. Gagne, 2008” Operating Systems Concepts. 7th Edn., John Wiley and Sons, USA., ISBN: 13: 9780471694663,  pp.944.
2.        “Tanenbaun, A.S., 2008” Modern Operating Systems. 3rd Edn., Prentice Hall, ISBN: 13: 9780136006633, pp. 1104.

3.        Sarojhiranwal and D.r. K.C.Roy“Adaptive Round Robin Scheduling using Shortest Burst Approach Based on Smart Time Slice”. volume   2,No. 2,July-Dec 2011,pp.
319-32.                        

4.        R. J. Matarneh, “Seif-Adjustment Time Quantum in Round Robin Algorithm Depending on Burst Time of the Now Running Proceses”,     American Journal of Applied Sciences 6 (10), 2009, pp.1831-1837.

5.        Stallings, W.: Operating Systems Internals and Design Principles, 5th   edition, Prentice Hall, (2004).

6.        .Kaladevi, M.C.A.,M.Phil., and Dr.S.Sathiyabama, M.Sc.,M.Phil.,Ph.D, “A Comparative Study of Scheduling Algorithms for Real Time Task”, International Journal of Advances in Science and Technology, Vol. 1, No. 4, 2010.

7.        Houssine Chetto and Maryline Chetto (1989) “ Some Results of Earliest Deadline Scheduling Algorithm” journal on IEEE TRANSACTION  ON SOFTWARE ENGINEERING. VOL 15. NO.10, pg 1261-1269.

8.        Pallab Banerjee , Probal Banerjee , Shweta Sonali Dhal “Performance  Evaluation of a New Proposed Average Mid Max Round    Robin(AMMRR) Scheduling Algorithm with Round Robin Scheduling Algorithm”,JARCSSE,ISSN:2277-128X,Volume-2,Issue-8,August-2012.

9.        S. M. Mostafa, S. Z. Rida and S. H. Hamad, “Finding Time Quantum of  Round Robin CPU Scheduling Algorithm in General Computing     Systems using Integer Programming”, IJRRAS 5 (1), October 2010, pp.64-71.


60-64

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

16.

Authors:

N.R.Patel, S.S.Thakare, D.S.Chaudhari

Paper Title:

A Review of Different Parameter Monitoring Systems for Increasing Agricultural Yield

Abstract:  In the past couple of decades, there is rapid growth in terms of technology in the field of irrigation. Different monitoring systems are installed in order to improve the yield. Monitoring unit monitors the various agricultural parameters like temperature, relative humidity, moisture, light detection, etc. and controlling unit controls the peripheral devices attached to the controller like valve, watering pump, etc. This paper reviews some of these monitoring systems and proposes an automatic monitoring system model using microcontroler, which may help the farmer to improve the yield.

Keywords:
 Agricultural, Microcontroller, Monitoring System, Wireless Sensor Network.


References:

1.       N. Shah and I. Das, “Precision irrigation: sensor network based irrigation”, CTARA, Department Of Electrical Engineering, IIT Bombay, India, pp. 217-232,2010.
2.       A. Baggio, “Wireless sensor networks in precision agriculture”, Delft University of Technology, Netherlands, pp.1-2, May 2005.

3.       G. Banerjee, R. Singhal, “Microcontroller based polyhouse automation controller”, International Symposium on Electronic System Design, pp. 158-162, Dec 2010.

4.       Q. Wang, A. Terzis, A. Szalay, “A novel soil measuring wireless sensor network”, IEEE, pp. 412-415, 2010.

5.       K. Shinghal, Dr. A. Noor, Dr. N. Srivastava, Dr. R. Singh, “Wireless sensor networks in agriculture: for potato farming”, International Journal of Engineering Science and Technology, Vol. 2(8), pp. 3955-3963, 2010.

6.       V. Ahmed, S. Ladhake, “Innovative cost effective approach from cell phone based remote controlled embedded system for irrigation”, International Conference on Communication Systems and Network Technologies,  pp. 419-144, 2011.

7.       G. Mendez, M. Yunus, “A WiFi based smart wireless sensor network for an agricultural environment,” International Conference on Sensing Technology, pp. 405-410, 2011.

8.       V. Dubey, N. Dubey, S. Chouhan, “Wireless sensor network based remote irrigation control system and automation using DTMF code”, International Conference on Communication Systems and Network Technologies,  pp. 34-37,2011.

9.       Neelam R. Prakash, Dilip Kumar, Tejender Sheoran, “Microcontroller based closed loop automatic irrigation system”, International Journal of Innovative Technology and Exploring Engineering, pp. 4-6, June 2012.

10.     S. Reddy, “Design of remote monitoring and control system with automatic irrigation system using GSM-Bluetooth”, International Journal of Computer Aplication(0975-888), pp. 6-13,2012.

11.     K.Prathyusha1, M. Chaitanya Suman, “Design of embedded system for the automation of drip irrigation”, International Journal of Application or Innovation in Engineering & Management, pp. 254-258, 2012.

12.     P. D. Hande, S. S. Kulkarni, “Microcontroller based irrigation”, International Journal of Microcircuits and Electronic, pp. 1-6, 2012.


65-67

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

17.

Authors:

Rahul. B. Lanjewar, D. S. Chaudhari

Paper Title:

Speech Emotion Recognition: A Review

Abstract:   The man-machine relation has demanded the smart trends that machines have to react after considering the human emotional levels. The technology boost improved the machine intelligence that it gained the capability to identify human emotions at expected level. Harnessing the approaches of signal processing and pattern recognition algorithms a smart and emotions specific man-machine interaction can be achieved with the tremendous scope in the field of automated home as well as commercial applications. This paper reviews the aspects of speech prosody in the form of pitch, intensity, speaking rate at the same the contribution of Mel Frequency Cepstrum Coefficients based speech features in speech emotion recognition implementation. The impact of incorporating  fusion techniques, wavelet domain analysis and the classifier models on the recognition rate in the identification of six emotional categories namely happy, angry, neutral, surprised, fearful and sad from the standard speech database is emphasized with intend to improve recognition fidelity.

Keywords:
 Features, Emotion, MFCC, HMM, Classifier, Database, Fusion.


References:

1.        A. B. Ingale, D. S. Chaudhari,“Speech Emotion Recognition”, Int’l Journal of Soft Computing and Engineering, vol-2, Issue-1, pp 235-238, Mar. 2012.
2.        S. Kim, P. Georgiou, S. Lee, S. Narayanan, “Real-time emotion detection system using     speech: Multi-modal fusion of different timescale features”, Proc. of IEEE
Multimedia Signal Processing Workshop, Greece, 2007

3.        Kwon, Oh-Wook, Chan, K. Hao, J., Lee, Te-Won, “Emotion recognition by speech signals”, EUROSPEECH - Geneva, pp 125–128, 2003.

4.        T. Bänziger, K. R. Scherer, “The role of intonation in emotional expression”, Proc. IEEE Int’l Conf. on Speech Communication, vol.46, pp 252-267, 2005

5.        A. Busso, S. Lee and S. Narayanan, “Analysis of Emotionally Salient Aspects of Fundamental Frequency for Emotion Detection”, IEEE Trans. on Audio, Speech and Language processing, vol. 17, no. 4, pp 582-596,May 2009

6.        E. Navas, I. Hernáez, I. Luengo , “An Objective and Subjective Study of the Role of Semantics and Prosodic Features in Building Corpora for Emotional TTS”, IEEE Trans. on Audio, Speech and Language Processing, vol. 14, no. 4, pp 490-501,Jul. 2006 

7.        I. Luengo, E. Navas,  I. Hernáez , “Feature Analysis and Evaluation for Automatic Emotion Identification in Speech”, IEEE Trans. on Multimedia, vol. 12, no. 6,pp 1117-1127, Oct. 2010

8.        G. Zhou, J. L. Hansen, and J. F. Kaiser, “Methods for Stress Classification: Nonlinear Teo and Linear Speech Based Features, Proc. IEEE Int’l Conf. Acoustics and Signal Processing, pp. 2087-2090, 1999.

9.        T. U. Christiansen and S. Greenberg, “Distinguishing Spectral and Temporal Properties of Speech Using an Information-Theoretic Approach”, Proc. IEEE Int’l Conf. Acoustics and Signal Processing, pp. 2087-2090, 1999.

10.     P. Krishnamoorty and S. R. Mahadeva Prasanna, “Temporal and spectral processing methods for processing of degraded speech: A Review” IETE Technical Review, vol 26, no.2,pp 137-148, Mar-Apr 2009
11.     P. K. Ghosh, A. Sarkar and T. V. Sreenivas, “ALCR and ESTL: Novel Temporal Features and their Application to Speech Segmentation” International Conference on Acoustics, Speech, and Signal Processing - ICASSP , vol. 4, pp. IV-1065-IV-1068, 2007.
12.     O. Farooq and S. Datta, “Mel Filter-Like Admissible Wavelet Packet Structure for Speech Recognition”, IEEE Signal Processing Letters, vol. 8, no. 7,pp 196-198, Jul. 2001             

13.     Yao, Yuan-Ting Zhang, “Bionic Wavelet Transform: A New Time–Frequency Method Based on an Auditory”, IEEE Trans. on Biomedical Engg., vol. 48, no. 8, pp 856-863,Aug. 2001

14.     S. G. Koolagudi, K. Sreenivasa Rao, “Emotion recognition from speech: a review”, Int’l Journal of Speech Technology,pp 99-117,2012

15.     C. Joder, S. Essid, and G. Richard “Temporal Integration for Audio Classification with Application to Musical Instrument Classification”, IEEE Trans. on Audio, Speech and Language Processing, vol. 17, no. 1, pp 174-186, Jan. 2009.

16.     A. Meng, P. Ahrendt, J. Larsen and L. K. Hansen, “Temporal Feature Integration for Music Genre Classification”, IEEE Trans. on Audio, Speech and Language Processing, vol. 15, no. 5, pp 1654-1664,Jul. 2007

17.     T. U. Christiansen and S. Greenberg, “Distinguishing Spectral and Temporal Properties of Speech Using an Information-Theoretic Approach”, Centre for Applied Hearing Research, Technical University of Denmark, Kgs. Lyngby, and Denmark Springer.

18.     F. Dellaert, T. Polzin, A. Waibel, “Recognizing Emotion in Speech”,Pro.Int’l Conference on Spoken Language Processing, pp 473-482, 1996.

19.     A. Nogueiras, A. Moreno, A. Bonafonte, and J. B. Mariño,“Speech Emotion Recognition Using Hidden Markov Models”, Pro. Int’l Conference INTERSPEECH,pp 345-350,2001.

20.     K. B. Khanchandani, M. Hussain, “Emotion recognition using Multilayerd perception and Feedforward neural network”,Journal of Scientific and Industrial Research vol.68, pp. 367-371, May 2009.

21.     Chung-Hsien Wu and Wei-Bin Liang, “Emotion Recognition of Affective Speech Based on Multiple Classifiers Using Acoustic-Prosodic Information and Semantic Labels”, IEEE Trans. on Affective Computing, vol. 2, no. 1, pp 10-21,Jan-Mar 2011

22.     Moataz M. H. El Ayadi, Mohamed S. Kamel, and Fakhri Karray, “Speech Emotion Recognition Using Gaussian Mixture Vector Autoregressive Models”, IEEE Signal Processing Letters, vol. 8, no. 7, pp 957-960,2007.


68-71

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

18.

Authors:

Rakhi Garg, P. K. Mishra

Paper Title:

Data Decomposition Technique Proposed for Candidate Itemsets Generation of Association Rule Mining Algorithms on Heterogeneous Cluster

Abstract:   Among various data mining task, association rule mining (ARM) is the major technique which is widely used in retail marketing, bioinformatics, website navigation analysis etc. It finds correlations among items in a given data sets and establishes an association between two non overlapping sets of frequently occurring values in a database. Various sequential and parallel ARM algorithms have been developed that differs in data layout, search technique, data structure, the number of database scans used and the system on which it is developed i.e. homogeneous or heterogeneous systems. This paper mainly put emphasis in the need of a candidate based ARM  algorithm for heterogeneous PC cluster that reduces the database scans and time complexity. It also describe the design and functioning of the heterogeneous PC cluster i.e. MPICH2 and the data decomposition technique applied for candidate itemsets generation that plays important role in balancing workload as well as enhancing the performance of the algorithm on MPICH2 heterogeneous PC cluster. 

Keywords:
 Association rule mining, candidate 1-itemsets, data mining, heterogeneous cluster


References:

1.       Han Jiwawei, and Kamber Micheline, “Data Mining: Concepts and Techniques”, Book, Published by HarCourt India Pvt. Ltd., New Delhi, Academic Press, Morgan Kaufmann Publisher, 2001, pp. 5-7, 9, 15, 228-229, 246, 269.
2.       Zaki M. J., “Parallel and Distributed Association Mining: A Survey, Concurrency”, IEEE, Special Issue on Parallel Mechanisms for Data Mining, Volume 7, Issue 4, 1999, 14-25.

3.       Ayan Necip. Fazil, “Updating large itemsets with early pruning”, Thesis for Master of Science, submitted to the dept. of Computer Engineering & Information Science & The Institute of Engineering & Science of Bilkent University, 1999.

4.       Pujari Arun K , “Data Mining Techniques”, Book, Universities Press (India) Ltd., Hyderabad, First Edition, 2001, pp.  45, 47, 69,74.

5.       Dunham Margaret H., Xiao Yongqiao, Gruenwald Le, and Hossain Zahid, “A Survey of association rules”, available online at http://ww2.cs.uh.edu/~ceick/6340/grue_assoc.pdf, published in 2008.

6.       Linuxmpich, available online at http://linux.about.com/cs/linux101 /g/mpich.htm; access date 02/05/2011.

7.       Lusk Rusty, MPI and MPICH on clusters, available online at http://www.csm.ornl.gov/JPCA/rusty-jpc4.ppt; access date: 05/05/2011.

8.       Wikipedia, Parallel computing, article published in Wikipedia, available online at http://en.wikipedia.org/wiki/Parallel_computing, access date: 05/01/2011.
9.       MPICH2_flyer, available online at http://www.cels.anl.gov/events /conferences/SC07/presentations /mpich2-flyer.pdf, access date: 05/05/2011.
10.     MPICH2, available online at http://www.mcs.anl. gov/research/projects/mpich2/index.php; access date: 04/05/2011.

11.     Agrawal Rakesh and Shafer  John C., “Parallel Mining of Association Rules”, IEEE Transactions on Knowledge and Data Engineering, Vol. 8, No. 6, December 1996, pp. 962-969.

12.     Zaki M. J., “Parallel and Distributed Association Mining: A Survey, Concurrency”, IEEE, Special Issue on Parallel Mechanisms for Data Mining, Volume 7, Issue 4, pp. 14-25, 1999.  


72-75

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

19.

Authors:

Swarup S. Mathurkar, D. S. Chaudhari

Paper Title:

A Review on Smart Sensors Based Monitoring System for Agriculture

Abstract:   Monitoring of environmental factors is very important over the last few decades. In particular, monitoring agricultural environments for various factors such as temperature, moisture, humidity along with other factors can be of more significance. A traditional approach to measuring these factors in an agricultural environment meant individuals manually taking measurements and checking them at various times. In this paper remote monitoring systems using wireless protocols used by different researchers for betterment of agricultural yield with best possible technologies is discussed. This is followed by proposed introductory model for agricultural monitoring with wireless protocol implemented using field programmable gate array (FPGA).

Keywords:
 Bluetooth, Field Programmable Gate Array (FPGA), Global Positioning System (GPS), LCD display, Microcontroller, Universal Asynchronous Receiver Transmitter (UART), Wireless nodes, Wireless Sensor Network (WSN),  ZigBee


References:

1.       N. Shah and I. Das, “Precision Irrigation Sensor Network Based Irrigation”, a     book on Problems, Perspectives and Challenges of Agricultural Water Management, IIT Bombay, India, pp. 217–232, April 2008.
2.       Y. Kim, R. Evans and W. Iversen, “Remote Sensing and Control of an Irrigation System Using a Distributed Wireless Sensor Network”, IEEE Transactions on Instrumentation and Measurement, pp. 1379–1387, July 2008.

3.       Q. Wang, A. Terzis and A. Szalay, “A Novel Soil Measuring Wireless Sensor Network”, IEEE Transactions on Instrumentation and Measurement, pp. 412–415, August 2010.

4.       I. Aziz, M. Hasan, M. Ismail, M. Mehat and N. Haron, “Remote Monitoring in Agricultural Greenhouse using Wireless Sensor and Short Message Service”, International Journal of Engineering Technology, vol. 9, pp. 1–12,  September 2010.

5.       G. R. Mendez, M. A. Yunus and Dr. S. C. Mukhopadhyay, “A Wi-Fi based Smart Wireless Sensor Network for an Agricultural Environment”, Fifth International Conference on Sensing Technology, pp. 405–410, January 2011.

6.       M. Haefke, S. Mukhopadhyay and H. Ewald, “A Zigbee Based Smart Sensing Platform for Monitoring Environmental Parameters”, IEEE Conference on Instrumentation and Measurement Technology, pp. 1–8, May 2011.

7.       M. Dursun and S. Ozden, “A Wireless Application of Drip Irrigation Automation Supported by Soil Moisture Sensors”, Scientific Research and Essays, pp. 1573–1582, April 2011.

8.       M. Dinesh and P. Saravanam, “FPGA Based Real Time Monitoring System for Agricultural Field”, International Journal of Electronics and Computer Science Engineering, pp. 1514–1519, June 2011.

9.       I. Singh and M. Bansal, “Monitoring Water Level in Agriculture using Sensor Networks”, International Journal of Soft Computing and Engineering, pp. 202–204, November 2011.


76-78

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

20.

Authors:

R. W. Somkuwar, P. L. Paikrao, D. S. Chaudhari

Paper Title:

An Overview: iButton (1-Wire Technology) and ZigBee Wireless Protocol

Abstract:   Many wireless applications in the world require identification and authorisation of a device or a person for carrying information. Also there is a need of transmission schemes for transmitting such signals to the host computer over the network. In such applications different tools are used for authentication, that includes barcodes, magnetic stripes, chip cards, RF tags, iButton, etc. Similarly, different wireless technologies are available viz. Bluetooth, ZigBee, Wi-Fi, etc. A review of different applications based on ibutton and ZigBee used for accessing and data transmission schemes are discussed in this paper.

Keywords:
 Access control, anycast, authentication, data logging, fall monitoring, home automation, iButton®, interrogation, ZigBee, ZigBee power adapter (ZPA..


References:

1.       E. Diaconescu, C. Spirleanu, “An Identifying and Authorizing Application Using 1-Wire® Technology”, 16thIEEE International Symposium for Design and Technology in Electronic Packaging, pp.243-248, 2010.
2.       K. Tee, M. Chew and S. Demidenko, “An Intelligent Warehouse Stock Management and Tracking System based on Silicon Identification Technology and 1-Wire Network Communication”, Sixth IEEE International Symposium on Electronic Design, Test and Application, pp. 110-115, 2011.

3.       G. Martinovic, T. Kis-Konja and Z. Kradija, “Access Control System Based on Electronic Key”, Technical Gazette 15, pp. 3-7, 2008.

4.       W. Lichtenbelt, H. Daanen, L. Wouters, R. Fronczek, R. Raymann, N. Severens and E. Someren, “Evaluation of wireless determination of skin temperature using iButtons”, Physiology & Behavior 88, ScienceDirect, pp. 489-497, 2006.

5.       S. Chen, T. Kao, C. Chan, C. Huang, C. Chiang, C. Lai, T. Tung and P. Wang, “A Reliable Transmission Protocol for ZigBee-Based Wireless Patient Monitoring”, IEEE Transactions on Information Technology in Biomedicine, Vol. 16, No. 1, pp. 6-16, 2012.

6.       K. Gill, S. Yang, F. Yao, and X. Lu, “A ZigBee-Based Home Automation System”, IEEE Transactions on Consumer Electronics, Vol. 55, No. 2, pp. 422-430, 2009.

7.       Il-K. Hwang, D. Lee and J. Baek, “Home Network Configuring Scheme for All Electric Appliances Using ZigBee-based Integrated Remote Controller”, IEEE Transactions on Consumer Electronics, Vol. 55, No. 3, pp. 1300-1307.

8.       M. Pan and Y. Tseng, “A Lightweight Network Repair Scheme for Data Collection Applications in ZigBee WSNs”, IEEE COMMUNICATIONS LETTERS, VOL. 13, NO. 9, pp. 649-651, 2009.

9.       X. Wang, H. Qian, “Design and implementation of anycast services in ad hoc networks connected to IPv6 networks”, J. Netw., vol. 5, pp. 403–410, 2010.

10.     C. Huang, G. Chen, C. Chiang, J. Chang, S. Hsu, W. Chu and C.-T. Chan, “Fall detection system for healthcare quality improvement in residential care facilities”, J. Med. Biol. Eng., vol. 30, no. 4, pp. 247–252,  2010.

11.     iButton Standards

12.     [Online]:http://pdfserv.maximic.com/en/an/appibstd.pdf


79-83

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

21.

Authors:

R.K.Ramesh, A.Kabeer Mohamed Refai

Paper Title:

A Hypothetical Approach on Artificial Intelligence System with Sensors and VRS

Abstract:   One of the most emerging research areas is Artificial Intelligence. Here we are doing some theoretical study and analysis of how AI can be used in our day to day activities. Some case studies by using Sensors and Voice Recognition System is explained here and Comparing Natural Intelligence and AI with some easy examples which generally occur in the world.

Keywords:
 Ant based Algorithms (ABA), Artificial Intelligence(AI),Natural Intelligence(NI),Robots, Sensors, Voice Recognition System(VRS).


References:

1.       M.Dongo and G.Di Caro.The ant colony optimization Meta heuristic.n D.Corne,M.Dorigo and F.Glover,editors,new ideas in Optimization Pages 11-32,Mcgrawhill,London,1999
2.       Artificial intelligence: A Modern Approach by Peter Novig and Stuart Russel.

3.       Artificial   Intelligence 6th Edition by George F Luger.

4        Natural Intelligence-.Body Mind Integration and human development by Susan Aposhyan.


84-85

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

22.

Authors:

Ramandeep Kaur, Tejinder Thind

Paper Title:

Non Local Image Restoration Using Orientation Optimization By Means Of Genetic Algorithm

Abstract:   As we know image de noising is a main part of almost every image processing devices so it’s better to have good algorithm to get good quality of image even after de noising that using some algorithm. Many researchers are doing work in this field to recover pixel lost in given RGB image. We are going to present a noble approach for restoration of pixels in image using optimizing its pixel orientation by means of GA (genetic algorithm). We implement orientation analysis for whole image using genetic algorithm and make unmatched orientation to its best optimized orientation to enhance image PSNR and MSE. This paper presents GA as an efficient algorithm comparable to the original non local means algorithm used for denoising.

Keywords:
 GA, MSE, PSNR, SAIST


References:

1.       Chao Wang, Lifeng Sun, Peng Cui, Jianwei Zhang, and Shiqiang Yang “Analyzing Image Deblurring Through Three Paradigms” 2012 IEEE
2.       David Corrigan, Anil Kokaram, and Naomi Harte “Algorithms for the Digital Restoration of Torn Films” 2012 IEEE

3.       Jianjun Zhang “An Alternating Minimization Algorithm for Binary Image Restoration” 2012 IEEE

4.       Ui Seong KIM, Jeong Ho LEE, Ki Tae PARK and Young Shik MOON “A Novel Color Restoration Method Using Color Projection” 2012 IEEE

5.       Yuquan Xu, Xiyuan Hu, Lu Wang, Silong Peng “Single Image Blind Deblurring With Image Decomposition” 2012 IEEE

6.       Chanwoo Chun* and Jung-Young Son “Pilot-based 2D-Barcode Image Restoration using Successive Interference Cancellation”

7.       Weisheng Dong and Guangming Shi and Xin Li “ Nonlocal Image Restoration with Bilateral Variance Estimation: a Low-rank Approach”

8.       http://en.wikipedia.org/wiki/Genetic  algorithm


86-88

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

23.

Authors:

G. B. Saboo, D. S. Chaudhari

Paper Title:

Wireless Assistive Technology for Severely Disabled Persons: An Overview

Abstract:   Assistive technology plays very important role in the life of the people who are severely  disabled due to quadriplegia, spinal cord injuries, central nervous system disorders or traumatic brain. Assistive technologies help them to lead a self supportive independent life. This paper provides the brief description about the various assistive technologies which has been developed until now for the severely disabled persons and its limitation. Further Tongue Drive System incorporating wireless assistive technology, which can overcome the limitation of previous related technologies, is discussed. Tongue Drive System is a tongue operated non-invasive or minimal invasive, unobtrusive and effective technology to control many devices in their environment. It helps users with the ability to drive power wheelchairs and access computers using their unconstrained tongue motion.   

Keywords:
 Assistive technologies (ATs), magnetic sensors, spinal cord injuries, wheelchair movement control.


References:

1.       G. Krishnamurthy and M. Ghovanloo, “Tongue Drive: A tongue operated magnetic sensor based wireless assistive technology for people with severe disabilities”, in Proc. IEEE Int. Symp. Circuits Syst., May 2006, pp. 5551–5554.
2.       X. Huo, J. Wang, M. Ghovanloo, “A Magneto-Inductive Sensor Based Wireless Tongue-Computer Interface”, in IEEE Transactions on Neural Systems and Rehabilitation Engineering,Vol.16, No.5, October 2008, pp.497–504.

3.       J. Kim, X. Huo, M. Ghovanloo, J. Minocha, A. Laumann, “Evaluation of a Smartphone Platform as a Wireless Interface Between Tongue Drive System and Electric-Powered Wheelchairs”, in IEEE Transactions on Biomedical Engineering, Vol. 59, No. 6, June 2012, pp.1786–1796.

4.       X. Huo, M. Ghovanloo, “ Using Unconstrained Tongue Motion as an Alternative Control Mechanism for Wheeled Mobility”, in IEEE Transaction on Biomedical Engineering, Vol. 56, No.6, June 2009,pp.1719–1726.

5.       R. Vaidyanathan, B. Chung, L. Gupta, S. Kota and J. West, “Tongue-Movement Communication and Control Concept for Hands-Free Human Machine Interfaces”, in IEEE Transactions on Systems, Man, and Cybernetics—Part A: Systems and Humans, Vol. 37, No. 4, July 2007, pp. 533–546.

6.       R. Simpson, S. Levine, “Voice Control of Powered Wheelchair”, in IEEE Transaction on Neural Systems and Rehabilitation Engineering, Vol. 10, No.2, June 2002,pp. 122–126.

7.       Z. Zhu and Q. Ji, “Novel Eye Gaze Tracking Techniques under Natural Head Movement”, in IEEE Transactions Biomedical Engineering, Vol. 54, No. 12, December 2007,pp. 2246–2260.

8.       Y. Chen, “Application of Tilt Sensors in Human–Computer Mouse Interface for People with Disabilities”, in IEEE Transactions Neural Systems and Rehabilitation Engineering, Vol. 9, No. 3, September 2001, pp. 289–295.

9.       S. Kim et al, “Point-and-Click Cursor Control with an Intracortical Neural Interface System by Humans with Tetraplegia”, IEEE Transactions on Neural Systems and Rehabilitation Engineering, Vol. 2, July 1995, pp. 193–203.

10.     M. Betke, “The Camera Mouse: Visual Tracking of Body Features to Provide Computer Access for People With Severe Disabilities”, IEEE Transactions on Neural Systems and Rehabilitation Engineering, Vol. 10, No.1, March 2002, pp.1–10.  


89-92

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

24.

Authors:

Salas K Jose, X. Anitha Mary, Namitha Mathew

Paper Title:

ARM 7 Based Accident Alert and Vehicle Tracking System

Abstract:   Traffic accidents are one of the leading causes of fatalities. An important indicator of survival rates after an accident is the time between the accident and when emergency medical personnel are dispatched to the accident location. By eliminating the time between when an accident occurs and when the first responders are dispatched to the scene decreases mortality rates, we can save lives. One approach to eliminating the delay between accident occurrence and first responder dispatch is to use in-vehicle automatic accident detection and notification systems, which sense when a traffic accident is likely to occur and immediately notify emergency occurred. These in-vehicle systems, however, are not available in all cars and are unaffordable to retrofit in older vehicles. In this paper, such a system is described the main application of which is early accident detection. It can automatically detect traffic accidents using accelerometers and immediately notify a central emergency dispatch server after an accident, using GPS coordinates. Along with the data it will send the number of the vehicle too. This paper provides the following contributions to detecting traffic accidents via ARM7 controller. Here it is seen how arm controller, accelerometer, GSM connections, and GPS can be used to provide situational awareness responders. The codes are written and compiled in Keil ARMIDE. 

Keywords:
 Accident alert, accelerometer, GSM, GPS, i2c protocol, keil, UART, vehicle tracking.


References:

1.       Abid Khan, Ravi Mishra “GPS – GSM Based Tracking System”, International Journal of Engineering Trends and Technology ,Volume3,Issue2, Pp: 161-169,2012
2.       S.P. Bhumkar, V.V. Deotare, R.V.Babar “Intelligent Car System for Accident Prevention Using ARM-7”, International Journal of Emerging Technology and Advanced Engineering, Volume 2, Issue 4, Pp: 56-78, 2012

3.       Partheeban , R. Rani Hemamalini, ”Vehicular Emission Monitoring Using Internet GPS and Sensors”, International Conference on Environment, Energy and Biotechnology vol.33 , Issue 5, Pp:80 -96,201

4.       Baburao Kodavati, V.K.Raju“GSM AND GPS BASED VEHICLE LOCATION AND TRACKING SYSTEM” International Journal of Engineering Research and Applications, Vol. 1, issue no.3, Pp: 616-625 , 2012

6.       Dr. Kamal Jain and Rahul Goel“GPS Based Low Cost Intelligent Vehicle Tracking System (IVTS)” International Conference on Traffic and Transportation Engineering, Vol. 26, issue no.36, Pp: 93-102 , 2012

7.       Pooja Pathe,Prof. R.H.Talwekar “ GPRS BASED ROUTING & TRACKING OF MOBILE VEHICLES USING ARM ” International Journal of Engineering Research and Applications , Vol. 2, issue no.4, Pp: 1088-1090 ,2012

7.       Syam Krishna, J.Ravindra“  DESIGN AND IMPLEMENTATION OF REMOTE HOME SECURITY SYSTEM BASED ON WSNS AND GSM TECHNOLOGY” International Journal of Engineering science and technology, Vol. 1, issue no.1, Pp: 139 – 142 ,2012

8.       J. Pang, I. Singh  “Accelerometer Based Real-Time Remote Detection and Monitoring of Hand Motion” Proceedings of the World Congress on Engineering and Computer Science, Vol. 2, issue no. Pp: 2078-095, 2011

9.       Amir Salarpour,Arezoo Salarpour “ Vehicle Tracking Using Kalman Filter And Features” Signal & Image Processing : An International JournalVol.2, Issue No.2, Pp: 1-8, June 2011

10.     Pravada P. Wankhade and Prof. S.O. Dahad “Real Time Vehicle Locking and Tracking System using GSM and GPS Technology-An Anti-theft System” International Journal of Technology And Engineering System, Vol.2,Issue no.3, Pp: 272 -235,2011

11.     Victor Olugbemiga ,Emmanuel Adetiba  “Vehicle Accident Alert and Locator” International Journal of Electrical & Computer Sciences Vol: 11 ,Issue No: 02, Pp: 38-55 , 2011

12.     Prof.M.Kamaraju  “A Novel Design Of Low Cost Real Time Vehicle  Navigation System” International Journal of Engineering Science and Technology Vol. 2,Issue no 3, Pp: 1-32 ,2010

13.     Oscar Laureano Casanova,Fragaria Alfissima,” Robot Position Tracking Using Kalman Filter” Proceedings of the World Congress on Engineering, Vol 2, Pp: 1604-1608, July 2008

14.     Grantham Pang, “Evaluation of a Low-cost MEMS Accelerometer for Distance Measurement”, Journal of Intelligent and Robotic Systems ,vol .02 issue no.30, Pp: 249–265 , 2001

15.     Syed Mausd Mahmudm , Snsif I. Alrbary “A new  decision making algorithm for airbag control


93-96

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

25.

Authors:

Pooja Rani

Paper Title:

Middleware and Toolkits in Grid Computing

Abstract:   The increasing demand for more computing power and data storage capacity in many fields of business, research, engineering, medical and science has raised the emergence of Grid Computing. Grid computing facilitates the environment where computers are interconnected with each other in such a manner that for making the execution faster of their tasks they can utilize the unused processing power of other idle systems. The applications of grid demand the secure access to the computational resources in the distributed environment. The secure and uniform access to resources is provided by Grid Middleware. In this paper, I have presented some of the middleware and Toolkits having some advantages and disadvantages.

Keywords:
 Grid Computing, Middleware, Toolkits, Grid Applications.


References:

1.       Hoschek, Wolfgang, Javier Jaen-Martinez, Asad Samar, Heinz Stockinger, and Kurt Stockinger. "Data management in an international data grid project." Grid Computing—GRID 2000 (2000): 333-361.
2.       Maassen, J., Kielmann, T., & Bal, H. E. (2001). Parallel application experience with replicated method invocation. Concurrency and Computation: Practice and Experience, 13(89), 681-712.

3.       Foster, Ian, Carl Kesselman, and Steven Tuecke. "The anatomy of the grid: Enabling scalable virtual organizations." International journal of high performance computing applications 15, no. 3 (2001): 200-222.

4.       Baker, Mark, Rajkumar Buyya, and Domenico Laforenza. "Grids and Grid technologies for widearea distributed computing." Software: Practice and Experience 32, no. 15 (2002): 1437-1466.

5.       Krauter, Klaus, Rajkumar Buyya, and Muthucumaru Maheswaran. "A taxonomy and survey of grid resource management systems for distributed computing." Software: Practice and Experience 32, no. 2 (2002): 135-164.

6.       Buyya, Rajkumar, and Manzur Murshed. "Gridsim: A toolkit for the modeling and simulation of distributed resource management and scheduling for grid computing." Concurrency and Computation: Practice and Experience 14, no. 1315 (2003): 1175-1220.

7.       Karonis, Nicholas T., Brian Toonen, and Ian Foster. "MPICH-G2: a Grid-enabled implementation of the Message Passing Interface." Journal of Parallel and Distributed Computing 63, no. 5 (2003): 551-563.

8.       Goldchleger, Andrei, Fabio Kon, Alfredo Goldman, Marcelo Finger, and Germano Capistrano Bezerra. "InteGrade: objectoriented Grid middleware leveraging the idle computing power of desktop machines." Concurrency and Computation: Practice and Experience 16, no. 5 (2004): 449-459.

9.       Yu, Jia, and Rajkumar Buyya. "A taxonomy of workflow management systems for grid computing." Journal of Grid Computing 3, no. 3 (2005): 171-200.

10.     Buyya, Rajkumar, and Srikumar Venugopal. "A gentle introduction to grid computing and technologies." database 2 (2005): R3.

11.     Allen, Gabrielle, Kelly Davis, Tom Goodale, Andrei Hutanu, Hartmut Kaiser, Thilo Kielmann, Andre Merzky et al. "The grid application toolkit: toward generic and easy application programming interfaces for the grid." Proceedings of the IEEE 93, no. 3 (2005): 534-550.

12.     Foster, Ian. "Globus toolkit version 4: Software for service-oriented systems." Journal of computer science and technology 21, no. 4 (2006): 513-520.

13.     Montagnat, Johan, Ákos Frohner, Daniel Jouvenot, Christophe Pera, Peter Kunszt, Birger Koblitz, Nuno Santos et al. "A secure grid medical data manager interfaced to the glite middleware." Journal of Grid Computing 6, no. 1 (2008): 45-59.

14.     Xhafa, Fatos, Sabri Pllana, Leonard Barolli, and Evjola Spaho. "Grid and P2P middleware for widearea parallel processing." Concurrency and Computation: Practice and Experience 23, no. 5 (2011): 458-476.

15.     Buyya, R., Abramson, D., & Giddy, J. (2000, May). Nimrod/G: An architecture for a resource management and scheduling system in a global computational grid. In High Performance Computing in the Asia-Pacific Region, 2000. Proceedings. The Fourth International Conference/Exhibition on (Vol. 1, pp. 283-289). IEEE.

16.     Casanova, H. (2001). Simgrid: A toolkit for the simulation of application scheduling. In Cluster Computing and the Grid, 2001. Proceedings. First IEEE/ACM International Symposium on (pp. 430-437). IEEE.

17.     Hastings, S., Kurc, T., Langella, S., Catalyurek, U., Pan, T., & Saltz, J. (2003, May). Image processing for the grid: A toolkit for building grid-enabled image processing applications. In Cluster Computing and the Grid, 2003. Proceedings. CCGrid 2003. 3rd IEEE/ACM International Symposium on (pp. 36-43). IEEE.

18.     Buyya, R., & Venugopal, S. (2004, April). The gridbus toolkit for service oriented grid and utility computing: An overview and status report. In Grid Economics and Business Models, 2004. GECON 2004. 1st IEEE International Workshop on (pp. 19-66). IEEE.


97-101

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

26.

Authors:

Namitha Mathew, Prabhakar.S. K.Gerard Joe Nigel

Paper Title:

Certain Approaches of Real Time Object Tracking in Video Sequences on Embedded Linux Platform

Abstract:   Video tracking in real time is one of the most important topic in the field of computer Vision. Detection and tracking of moving objects in the video scenes is the first relevant step in the information extraction in many computer vision applications.This idea can be used for the surveillance purpose, video annotation, traffic monitoring and also in the field of medical In this paper, we are discussing about the different methods for the video trackingusing Python Opencv software and the implementation of the tracking system on the Beagleboard XM. Background Subtraction method, and color based contour tracking are the different methods using for the tracking.And finally, we concluded that the background subtraction method is most efficient method for tracking all the moving objects in the frames.

Keywords:
 Surveillance, python opencv, background Subtraction method, Contour tracking.


References:

1.        Afef SALHI and Ameni YENGUI JAMMOUSSI , “Object tracking system using Camshift, Meanshift and Kalman filter”, World Academy of Science, Engineering and Technology, 2012
2.        Alok K. Watve ,IndianInstitue of Technology, Kharagpur , seminar on “Object tracking in video scenes”, 2005.

3.        Amir Salarpour and ArezooSalarpour and Mahmoud Fathi and MirHosseinDezfulian , “Vehicle tracking using kalman filter and features”, Signal & Image Processing : An International Journal (SIPIJ) Vol.2, No.2, June 2011.

4.        C. Lakshmi Devasena, R. Revathi, “ Video surveillance system-A survey”, IJCSI International journal of computer science Issues, vol 8, issue 4, no.1, Jult 2011

5.        Flavio B. Vidal and Victor H. Casanova Alcalde (2010). “Object Visual Tracking Using Window-Matching Techniques and Kalman Filtering”, Kalman Filter, VedranKordic (Ed.), ISBN: 978-953-307-094-0.

6.        Greice Martins de Freitas, Clésio Luis Tozzi, “Object Tracking by Multiple State Management and Eigenbackground Segmentation”, International Journal of Natural Computing Research, 1(4), 29-36, October-December 2010.

7.        HamidrezaRashidyKanan and ParastoKarimi,“Visual Object Tracking Using Fuzzy-based Thresholding and Kalman Filter”, International Journal of Modeling and Optimization, Vol. 2, No. 3, June 2012.
8.        Jiyan Pan, Bo Hu, and JianQiu Zhang, “An Efficient Object Tracking Algorithm with Adaptive Prediction of Initial Searching Point”, 2006 IEEE Pacific-Rim Symposium on Image and Video Technology (PSIVT'06),December 2006.
9.        Marek CHOVANEC, “Computer vision vehicle tracking using background subtraction”, Journal of Information, Control and Management Systems, Vol. 1, (2005), No.1.

10.     Mr. D. W. Chinchkhede& Mr. N. J. Uke, “Image segmentation in video sequences using modified background subtraction” International Journal of Computer Science & Information Technology (IJCSIT) Vol 4, No 1, Feb 2012.

11.     Priti P. Kuralkar, Prof. V.T.Gaikwad, “ Human Object Tracking using Background Subtraction and Shadow Removal Techniques”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 3, March 2012.

12.     R. Revathi ,M. Hemalatha, “Certain Approach of Object Tracking using Optical Flow Techniques”, International Journal of Computer Applications (0975 – 8887) Volume 53– No.8, September 2012.

13.     SA. Vigus, D.R.Bul1, C.N.Canagarajah,“Video object tracking using region split and merge and a kalman filter tracking algorithm”,IEEEconference on Image processing, p 650-653,August 2001.

14.     Shao-Yi Chien, Shyh-Yih Ma, and Liang-Gee Chen, IEEE, “Efficient Moving Object Segmentation Algorithm Using Background Registration Technique” , IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 12, NO. 7, JULY 2002.


102-105

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

27.

Authors:

J. Sandeep Soni, H. P. Agrawal, R. Gupta and H.O. Bansal

Paper Title:

Potentials and Capabilities of FACTS Controllers for Quality and Performance Enhancement of Power System

Abstract:   At present the demand of electrical power is growing day by day with a very fast rate, so we require much capable transmission and distribution system with the most excellent quality of supply. That’s why power quality is a major issue in the distribution system and this is the area which attracts all electrical engineers. The major impact of poor quality of supply is on the highly loaded distribution system, on which the maximum load is connected. In this paper authors focus on the FACTS technology, classification schemes, applications, potentials and control attributes in terms of the performance and quality issues of power supply. Power quality means the non-standard supply voltage, supply current and supply frequency, that results malfunctioning or failure of operation of various equipments and accessories.   

Keywords:
 FACTS devices, Transmission and distribution system, power quality and Power flow control.


References:

1.       NAERC (North American Electric Reliability Corporation), “Reliability standards for the bulk power system of  North America”, July 2008,Online available: http://www.nerc.com/docs/standards/rs/Reliability_Standards_Complete_Set.pdf
2.       N.G. Hingorani, “Introducing custom Power”, IEEE spectrum, Vol.32.PP:41-48,1995

3.       K.R. Padiyar, “Facts controllers in power transmission and distribution”, New Age international Publishers, 2007

4.       B. Singh, “Application of  FACTS Controllers in power systems for enhance the power system stability: A state-of-the-Art”, International Journal of Review in Computing , 15th July 2011, Vol.6, PP 40-68

5.       F.D.Galiana, K, Almeida, M.Torissaint, J.Griffin, D.Atanackovic, B.T.Ooin and D.Mcgills, “Assessment and Control of the Impact of FACT Devices on Power System Performance”, IEEE transactions on Power Systems, Vol.11, No.4, 1996,

6.       J.J. Paserba, “How FACTS controllers Benefits AC Transmission System”, Fellow IEEE

7.       D.J. Gotham, G.T.Heydt, “Power Flow Control and Power Flow Studies for System with FACT Devices” IEEE Transactions on Power Systems, Vol .13, No. 1, pp.60-65, 1998.

8.       B.Gao,and  P. Kundur , “ Voltage Stability Evaluation  Using Model Analysis”,IEEE Transactions on Power Systems, Vol.7, No.4, pp.1529-1542, 1992.

9.       H. Johal and D. Divan, “ Design considerations for series –connected distributed FACTS converters”, IEEE Transactions on industry applications, Vol.43,PP: 1609-1618, Nov/Dec. 2007

10.     D .M Divan, W. E. Brumsickle,  R. S. Schneider, B. Kranz,  R. W. Gascoigne, D.T. Bradshaw,  M.R. Ingram and I.S. Grant, “ A distributed static series compensator system for realizing active power flow control on existing power lines”, IEEE transactions on power Delivery, Vol.22, No.1, PP:642-649, Jan 2007

11.     K. M. Rogers, “Applications of Distributed Flexible AC Transmission System(D-FACTS) Devices in Power System ”, Fellow , IEEE978-1-4244-4283-6©2008.

12.     M. A. Adibo, “Power System Stability Enhancement Using FACTS Controllers: A Review” The Arabian Journal for Science and Engineering, Vol. 34, No. 1B , April 2009, PP-153-172. 

13.     G. Glanzmann, G. Anderson, “Using FACTS devices to resolve congestions in Transmission Grids” ETH Zentrum, ETL G24-1,8042 Zurich.

14.     A. Edris and Task Force Members, “Proposed Terms and Definitions For Flexible AC Tramsission System (FACTS),” IEEE Transactions on Power Delivery, Vol-12, No. 4, Oct.-1997 PP-1848-1853.

15.     L. E. V, Sanchez–Gasca JJ, Chow J H, “Concept for Design for FACT controller to Damp Power Swings”, IEEE Transactions on Power Systems,Vol.10, No.3, pp. 948-956,1995.

16.     M.R, Zunko P, Povhd, “Improvement of Transient Stability using Unified Power Flow Controller”, IEEE Transactions on Power delivery, Vol.11, pp.485-491, 1996

17.     K R Padiyar, Uma Rao K, “Discrete Control of Series Compensation for Stability Improvement of Power System”, International Journal of Electrical Power Energy System, Vol 19, pp.311-319, 1997

18.     S. Sutha and N. Kamaraj, “Optimal location of Multi type FACTS Devices for Multiple Contingencies Using Particle Swarm Optimisation”, International Journal of Electrical System Sciences and Engineering, Vol.1, No.1, 2008, ISSN 1307-8917

19.     L.Gyugyi, T.R. Rictman, A.Edris, “The Unified Power Flow Controller: A new Approach to Power Transmission Control” IEEE Transactions on Power Delivery Vol. 10, No. 2, 1995.

20.     D. Murali And Dr. M. Rajaram, “Active and Reactive Power Flow Control Using FACTS Devices,” International Journal of Computer Applications, Vol. 9, No. 8, Nov-2010, PP U5-50.

21.     H. P. Agrawal, H O Bansal, Laxmi Srivastava, “Flexible AC Transmission Systems: an Extended Overview”.


106-111

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

28.

Authors:

Rushabh A. Shah, Jayeshkumar Pitroda

Paper Title:

Fly Ash Class F: Opportunities for Development of Low Cost Mortar

Abstract:   Fly ash (Class F) investigated for its use as a partial replacement for cement in cement mortar (1:3). The utilization of Fly Ashas cement replacement material in mortar or as additive in cement introduces many benefits from economical, technical and environmental points of view. This paper presents the results of the cement mortar of mix proportion 1:3 in which cement is partially replaced with Fly Ash(Class F)as 0%, 10%, 30%and 50% by weight of cement. Two set of mixture proportions were made. First were control mix (without Fly Ash(Class F)with regional fine aggregate (sand)) and the other mixing contained Fly Ash(Class F)obtained from Thermal industrythe compressive strength has been obtained with partial replacement of Fly Ash(Class F)withcement.Test results indicate the decreases in the strength properties of mortar with Fly Ash(Class F)for strength at 7 & 28 days as partial replacement with the cement in the cement mortar 1:3. So it can be used in non-structural elements with the low range compressive strength where strength is not required and low cost temporary structure is prepared.

Keywords:
 Fly ash(Class F),Partial replacement, Compressive strength, Cement, Fine aggregate, Cost


References:
1     C Freeda Christy, D Tensing, (2010), “Effect of Class-F Fly Ash as Partial replacement with Cement and Fine Aggregate in Mortar”, International Journal of Engineering & Materials Sciences, Volume 17, April 2010, pp:140-144.
2     IS 1344 - 1968: Code of practice on pozzalona for mortars. Indian standards Institution, New Delhi

3     IS 269 -1970 Code of Practice far Portland cement. Indian standards Institution, New Delhi

4     IS 3812 (part- I) 1966 and part -II Indian standard code of practice on mortars. Indian standards Institution, New Delhi

5     Rushabh A. Shah,Prof. Jayeshkumar Pitroda (2013), “Effect of Pozzocrete as Partial Replacement with Cement in Mortar” International Journal Global Research Analysis, (GRA), Volume: 2, Issue: 1, Jan 2013, ISSN No 2277 – 8160, pp-44-46.

6     Rushabh A. Shah, Prof. Jayeshkumar Pitroda (2013), “Pozzocrete: Modern Material Partially Replaced with Cement in Mortar” International Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN: 2278-3075, Volume-2, Issue-3, February 2013, pp-105-108.


112-115

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

29.

Authors:

Dushyant R. Bhimani, Jayesh Kumar Pitroda, Jaydev J. Bhavsar

Paper Title:

Effect of Used Foundry Sandand Pozzocrete Partial Replacement with Fine Aggregate and Cement in Concrete

Abstract:   To produce low cost concrete by blending various ratios of fine aggregate and cement with used foundry sand and Pozzocrete to reduce disposal and pollution problems due to used foundry sand and Pozzocrete.Pozzocrete P60 is a processed quality assured fly ash, investigated for its use as a partial replacement for cement in concrete (1:1.48:3.21). The utilization of Pozzocrete P60 as cement replacement material in concrete or as additive in cement introduces many benefits from economical, technical and environmental points of view. The innovative use of used foundry sand in concrete formulations as a fine aggregate replacement material was tested as an alternative to traditional concrete. This paper presents the results of the concrete of mix proportion 1:1.48:3.21 in which cement is partially replaced with Pozzocrete P60 as 10% by weight of cement, and fine aggregate is partially replaced with used foundry sand as 10%, 30% and 50% by weight of fine aggregate. Five set of mixture proportions were made. First (A0) were standard mix (without Pozzocrete and used foundry) sand with regional fine aggregate (sand)and coarse aggregate and the second (B0) mix contained 10% Pozzocrete P60obtained from DIRK India Private Limited, Nasik, Maharashtra state. Other mixes (B1, B2, and B3) contained Pozzocrete P60 (10%)plus foundry sand (10%, 30%and 50%)respectively obtained fromferrous and non-ferrous metal casting industries.The compressive strength and water absorption has been obtained with partial replacement of Pozzocrete P60 with cement and foundry sand with fine aggregate. Test results indicate the increase in the strength properties of concrete and decreasing water absorption of concrete up to 10% replacement of cement with pozzocrete plus 30% replacement of fine aggregate with used foundry sand for strength at 7, 14and 28 days. Also it can be used in non-structural elements with the low range compressive strength wherestrength is not required and low cost temporary structure is prepared.

Keywords:
 Pozzocrete P60,used Foundry Sand, Partial replacement,Concrete, Compressive strength, Fine aggregate, Cost.


References:

1.       Abichou T. Benson, C. Edil T., 1998a.Database on beneficial reuse of foundry by- products. Recycled materials in geotechnical applications, Geotech. Spec. Publ.No.79, C. Vipulanandan and D.Elton, eds., ASCE, Reston, Va., 210-223
2.       Bemben,S.M.,Shulze,D.A.,1993.The influence of    selected testing procedures on soil/geomembrane shear strength measurements.Proc.,Geosynthetics ’93,Industrial Fabrics Association International,St.Paul,Minn.,619-631.

3.       Bemben, S.M., Shulze, D.A., 1995.The influence of testing procedures on clay/geomembrane shear strength measurements. Proc. Geosynthetics ’95, IFAI, St.Paul, Minn., 1043-1056.

4.       Dushyant R. Bhimani, Prof. Jayeshkumar Pitroda, Prof. Jaydevbhai J. Bhavsar (2013), “A Study on Foundry Sand: Opportunities for Sustainable and Economical Concrete” International Journal Global Research Analysis, (GRA), Volume: 2, Issue: 1, Jan 2013, ISSN No 2277 – 8160, pp-60-63

5.       Fredlund, D.G., Morgenstern, N.R., Widger, R.A., 1978.Shear strength of unsaturated soils.Can.Geotech.J. Ottawa,15(3),313-321.

6.       IS: 8112-1989, Specifications for 43-Grade Portland cement, Bureau of Indian Standards, New Delhi, India.

7.       IS: 383-1970, Specifications for coarse and fine aggregates from natural sources for concrete, Bureau of Indian Standards, New Delhi, India.

8.       IS: 10262-1982, Recommended guidelines for concrete mix design, Bureau of Indian Standards, New Delhi, India.

9.       IS: 1199-1959, Indian standard methods of sampling and analysis of concrete, Bureau of Indian Standards, New Delhi, India.

10.     IS: 516-1959, Indian standard code of practice- methods of test for strength of concrete, Bureau of Indian Standards, New Delhi, India.

11.     Javed, S., Lovell, C., 1994.Use of Waste foundry sand in Highway construction.Rep. JHRP/INDOT/FHWA-94/2J, Final REP., Purdue   School of Engg., West Lafayette, Ind.

12.     Javed, S., Lovell, C. W., 1994b.Use of waste foundry sand in civil engineering. Transp. Res. Rec. 1486, Transportation Research Board, Washington, D.C., 109–113.

13.     Kleven, J. R., Edil, T. B., Benson, C. H., 2000. Evaluation of excess foundry system sands for use as sub base material. Transp.Res.Rec. 1714, Transportation Research Board, Washington, D.C., 40–48.

14.     Mitchell, J. K., 1993. Fundamentals of soil behavior, Wiley, New York.

15.     Naik, T. R., and Singh, S. S., (1997a). Permeability of flowable slurry materials containing foundry sand and fly ash. J. Geotech. andGeoenvir. Engg., ASCE, 123(5), 446–452.

16.     Naik, T. R., and Singh, S. S., (1997b). Flowable slurry containing foundry sands. J. Mat. in Civil. Engg., ASCE, 9(2), 93–102.

17.     Naik, T. R., Singh, S. Shiw, and Ramme, W. Bruce, April, 2001.Performance and Leaching Assessment of Flowable Slurry. Journals of Environmental Engg., V. 127,No. 4,pp 359-368.

18.     Naik, T.R.; Kraus, N. Rudolph; Chun, Yoon-moon; Ramme, W. Bruce; and Singh S.Shiw, August 2003.Properties of Field Manufactured Cast-Concrete Products Utilizing Recycled Materials. Journals of Materials in Civil Engg.,V.15,No. 4,pp 400-407.

19.     Naik, T.R.; Kraus, N. Rudolph; Chun, Yoon-moon; Ramme, W. Bruce; and SiddiqueRafat, May-June2004.Precast Concrete Products Using Industrial By-Products. ACI Materials Journal. 101,No. 3,pp 199-206.

20.     Reddi, N. Lakshmi, Rieck, P. George, Schwab, A. P., Chou, S. T. and Fan, L.T., May 1995. Stabilization of Phenolicsin  foundry sand using cementious materials. Journals of Hazardous Materials,V. 45, pp 89-106

21.     Stark, T., Eid, H., 1994. Drained residual strength of cohesive soils. J. Geotech.Engg, ASCE, 120(5), 856–871.

22.     Takasumi, D. L., Green, K. R., Holtz, R. D., 1991.Soil-geosynthetics interface strength characteristics: A review of state-of-the-attesting procedures. Proc., Geosynthetics’91, Industrial Fabrics Association International, St. Paul, Minn., 87–100.

23.     Tikalsky, J. Paul, Smith, Earl and Regan, W. Raymond, December 1998. Proportioning Spent Casting Sand in Controlled Low-Strength Materials. ACI Material Journal, V.95, No.6, pp 740-746.


116-120

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

30.

Authors:

Musa Mutah, Kikuchi Akira, Abdul Majid Zaiton, Jaafar Jafariah, Salim Mohd Razman, Ismail Nor Eman

Paper Title:

Production of sugarcane bagasse based activated carbon for Cd2+ removal using factorial design

Abstract:   An evaluation of the effect of preparation conditions on the production of activated carbon from sugarcane bagasse for Cd2+ removal was carried out using a 2-level full factorial design. Sugarcane bagasse based activated carbon was prepared in a single step steam pyrolysis using a horizontal tube furnace. The investigated parameters were temperature (700 - 800oC), time (60 - 120 minutes) and steam flow rate (10 - 50 mL/min), within 11 experimental runs. Two responses were considered, the activated carbon yield and the removal % of Cd2+ from aqueous solution. The predicted results from the full factorial model were compared with the experimental values, with regression coefficients of R2 = 0.986 for yield and R2 = 0.989 for removal. Optimization was applied using desirability function with the selected optimum desirability of 0.592 for the set goals.

Keywords:
 full factorial, activated carbon, cadmium, adsorption


References:

1.       Hussein H.K, Abu-Zinadah O.A, El Rabey H.A.S, Meerasahib M.F (2011), Environmental assessment of ground water pollution by heavy metals and bioaccumulation of mercury residues in chicken tissues, African Journal of Biotechnology Vol. 10(71), pp. 16089-16100.
2.       Boran M, Altinok I (2010), A Review of Heavy Metals in Water, Sediment and Living Organisms in the Black Sea, Turkish Journal of Fisheries and Aquatic Sciences vol. 10,  pp 565-572.

3.       Asio V. B (2009), Heavy metals in the environment and their health effects, Soil & Environment [Online]. Available:  http://soil-environment.blogspot.com/2009/07/heavy-metals-and-their-health-effects.html.

4.       Musa M, Kikuchi A, Jaafar, J, Abdul Majid Z, Salim M.R (2012),  Reuse of Agricultural and Sewage Waste in Water Treatment: An Eco-regional Concept, 1st International Conference on Multiple-governance in Islam, Environmental Development and Conservation. Johor, Malaysia, Nov. 20-21, 2012.

5.       Malik P.K. (2003), Use of activated carbons prepared from sawdust and rice-husk for adsorption of acid dyes: a case study of Acid Yellow 36, Dyes and Pigments vol. 56, pp. 239–249.

6.       Dias J.M, Alvim-Ferraz M.C.M, Almeida M.F, Rivera-Utrilla J., Sa´nchez-Polo M. (2007), Waste materials for activated carbon preparation and its use in aqueous-phase treatment: A review, Journal of Environmental Management, vol. 85, pp 833–846.

7.       Ozturk ., Kavak D. (2004), Boron removal from aqueous solution by adsorption on waste sepiolite and activated waste sepiolite using full factorial design, Adsorption, vol. 10, pp. 245-257.

8.       Al khatib M. F, Muyibi S. A., Amode J. O. (2011) Optimization of activated carbon production from empty fruit bunch fibers in one-step steam pyrolysis for cadmium removal from aqueous solution. Environmentalist, vol.  31, pp. 349-357.

9.       Barka N, Ouzaouit K, Abdennouri M, El Makhfouk M, Quorzal S, Assabbane A, Ait-Ichou Y, Nouna A (2012), Kinetics and equilibrium of cadmium removal from aqueous solutions by sorption onto synthesized hydroxyapatite, Desalination & Water Treatment [Online] DOI:10.1080/19443994.2012.672189.

10.     Wuana R. A, Okieimen F. E (2011), Heavy metals in contaminated soils: A review of sources, chemistry, risk and best available strategies for remediation, ISRN Ecology [Online]. DOI:10.5402/2011/402647.

11.     Oboh I, Aluyor E, Audu T (2009), Biosorption of Heavy Metal Ions from Aqueous Solutions Using a Biomaterial, Leonardo J. Scs vol. 14, pp. 58-65.

12.     Awokunmi E. E, Asaolu S. S, Ipinmoroti K. O (2010), Effect of leaching on heavy metals concentration of soil in some dumpsites, African Journal for Environmental
Science & Technology, vol. 4(8), pp 495-499.

13.     Qureshi K, Bhatti I, Kazi R, Ansari AK (2008), Physical and chemical analysis of activated carbon prepared from sugarcane bagasse and use for sugar decolorisation, International Journal of Chemical and Biological Engineering vol. 1(3) pp 144 – 148.

14.     Del Vecchio R. J (1997), Understanding design of experiments, Hanser Publishers, Munchen Germany, p. 3.

15.     Gottipati R., Mishra S. (2010), Process optimization of adsorption of Cr(VI) on activated carbons prepared from plant precursors by a two-level full factorial design, Chemical Engineering Journal, vol. 160, pp. 99–107.

16.     Goel J., Kadirvelu K., Rajagopal C., Garg K. (2005), Removal of lead(II) by adsorption using treated granular activated carbon: Batch and column studies, Journal of Hazardous Materials vol. B125, pp 211–220.

17.     Alam M. Z, Ameen E. S, Muyibi S. A, Kabbashi N. A (2009), The factors affecting the performance of activated carbon prepared from oil palm empty fruit bunches for adsorption of phenol, Chemical Engineering Journal, vol. 155, pp.191–198.  


121-125

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

31.

Authors:

Stuti Singh, Roshan Srivastava

Paper Title:

Intrusion Detection Using Data Mining Technique

Abstract:   In reality it is not possible to prevent security breaches completely using the existing security technologies. The intrusion detection plays an important role in network security and information system. However, many current intrusion detection systems (IDSs) are signature based systems. The signature based IDS also known as misuse detection looks for a specific signature to match, and identify an intrusion. When the signatures or patterns are provided, they can detect all known attack patterns, but there are some problems for unknown attacks. The rate of false positives is very low but these types of systems are poor at detecting new attacks, variation of known attacks or attacks that act as normal behavior. Statistical Based Intrusion detection System (SBIDS) can overcome many of the aforementioned limitations of signature based intrusion detection systems. Statistical based intrusion detection systems performs better than signature based intrusion detection system for novelty detection i.e. detection of new attack is very important for intrusion detection system. Researchers have implemented various classification algorithms for intrusion detection. This dissertation evaluates a decision tree classifier over a benchmark dataset. It will help intrusion detection system in novelty detection i.e. detection of new attacks. KDD99 dataset is used as the training data set.

Keywords:
 Data Mining, Decision Tree, Intrusion Detection System, KDD99 Dataset.


References:

1.       Litty Lionel, “Hypervisor-based Intrusion Detectio”, Master of Science Graduate department of computer Science University of Torronto, 2005.
2.       Mark Crosbie and gene Spafford, “Active defence of a computer system using anonymous agents”, Technical report 95-008,COAST Group, Department of Computer Science, Purdue University, West Lafayette, Indiana, February 1995.

3.       Litty, Intrusion Detection Http://www.cs.torronto.edu/~litty/papers/MS.pdf.

4.       Network Security by Christos Douligeris, Dimitrios Nikolaou Serpanos page 93.

5.       Anderson.J.P, “Computer Security Threat Monitoring & Surveilance”, Technical Report, James P Anderson co., Fort Washington, Pennsylvania, 1980.

6.       Jake Ryan, Meng - Jang Lin, Risto Miikkulainen, ”Intrusion Processing Detection With Neural Networks”, Advances in Neural Information System 10, Cambridge, MA:MIT Press,1998,DOI:10.1.1.31.3570.

7.       Denning .D.E, ”An Intrusion Detection Model”, Transactions on      Software Engineering, IEEE Communication Magazine, 1987,SE-13, PP-222-232,DOI:10.1109/TSE.1987.232894.

8.       Teng.H.S, Chen.K and Lu.S.C, “Adaptive Real-Time Anomaly  Detection using Inductively Generated Sequential Patterns, in the Proceedings of Symposium on research in Computer Security & Privacy, IEEE Communication Magazine,1990, pp-278-284.

9.       Sekeh.M.A,Bin Maarof.M.A, “Fuzzy Intrusion Detection System Via Data Mining with Sequence of System Calls”, in the Proceedings of International Conference on Information Assurance & security (IAS)2009,IEEE Communication Magazine, pp- 154-158,ISBN:978-0-7695-3744-3,DOI:10.1109/IAS.2009.32.

10.     Dewan Md, Farid, Mohammed Zahidur Rahman, “Anomaly Network Intrusion Detection Based on Improved Self Adaptive Bayesian Algorithm”, Journal of Computers, Vol 5, pp-23-31, Jan 2010, DOI:10.4.304/jcp 5.1.

11.     Sathyabama.S, Irfan Ahmed.M.S, Saravanan.A,”Network Intrusion Detection Using Clustering: A Data Mining Approach”, International Journal of Computer Application (0975-8887), Sep-2011, Vol: 30, No: 4, ISBN: 978-93-80864-87-5, DOI: 10.5120/3670-5071.

12.     Amir Azimi, Alasti, Ahrabi, Ahmad Habibizad Navin, Hadi Bahrbegi, “A New System for Clustering & Classification of Intrusion Detection System Alerts Using SOM”, International Journal of Computer Science & Security, Vol: 4, Issue: 6, pp-589-597, 2011.

13.     Alan Bivens, Chandrika Palagiri, Rasheda Smith, Boleslaw Szymanski, ”Network-Based Intrusion Detection Using Neural Networks”, in Proceedings of the Intelligent Engineering Systems Through Artificial Neural Networks, St.Louis, ANNIE-2002, and Vol: 12, pp- 579-584, ASME Press, New York.

14.     Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham, “Intrusion Detection Using an Ensemble of Intelligent Paradigms”,Journal of Network & Computer Applications ,pp-1-15, 2004.

15.     Shilendra Kumar, Shrivastava ,Preeti Jain, “Effective Anomaly Based Intrusion Detection Using Rough Set Theory & Support Vector Machine(0975-8887), Vol:18,No:3, March 2011,DOI: 10.5120/2261-2906.

16.     Aly Ei-Semary, Janica Edmonds, Jesus Gonzalez-Pino, Mauricio Papa, “Applying Data Mining of Fuzzy Association Rules to Network Intrusion Detection”, in the Proceedings of Workshop on Information Assurance United States Military Academy 2006, IEEE Communication Magazine, West Point, NY,DOI:10.1109/IAW.2006/652083.

17.     Taeshik Shon, Jong Sub Moon, “A Hybrid Machine Learning Approach to Network Anomaly Detection”, Information Sciences 2007, Vol: 177, Issue: 18, Publisher: USENIX Association, pp- 3799-3821, ISSN:00200255,DOI:10.1016/j.ins-2007.03.025.

18.     Sadiq Ali Khan, “Rule-Based Network Intrusion Detection Using Genetic Algorithm”, International Journal of Computer Applications, No: 8, Article: 6, 2011, DOI: 10.5120/2303-2914.

19.     Norouzian.M.R, Merati.S, “Classifying Attacks in a Network Intrusion Detection System Based on Artificial Neural Networks”, in the Proceedings of 13th International Conference on Advanced Communication Technology(ICACT), 2011,ISBN: 978-1-4244-8830-8,pp-868-873.

20.     Jin-Ling Zhao, Jiu-fen Zhao ,Jian-Jun Li, “Intrusion Detection Based on Clustering Genetic Algorithm”, in Proceedings of International Conference on Machine Learning & Cybernetics (ICML),2005, IEEE Communication Magazine,ISBN:0-7803-9091-1,DOI: 10.1109/ ICML.2005.1527621.

 

126-129

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

32.

Authors:

A. Duraisamy, M.Sathiyamoorthy, S.Chandrasekar

Paper Title:

A Server Side Solution for Protection of Web Applications from Cross-Site Scripting Attacks

Abstract:   Cross-Site scripting attacks occur when accessing information in intermediate trusted sites. Cross-Site Scripting (XSS) is one of the major problems of any Web application. Web browsers are used in the execution of commands in web pages to enable dynamic Web pages attackers to make use of this feature and to enforce the execution of malicious code in a user’s Web browser. This paper describes the possibilities to filter JavaScript in Web applications in server side protection. Server side solution effectively protects against information leakage from the user’s environment. Cross-Site scripting attacks are easy to execute, but difficult to detect and prevent. The flexibility of HTML encoding techniques, offers the attacker many possibilities for circumventing server-side input filters that should prevent malicious scripts from being injected into trusted sites. Cross site scripting (XSS) attacks are currently the most exploited security problems in modern web applications. These attacks make use of vulnerabilities in the code of web-applications, resulting in serious consequences, such as theft of cookies, passwords and other personal credentials. It is caused by scripts, which do not sanitize user input.

Keywords:
 Web Application; Cross Site Scripting; Server Side Solution; Detection of XSS Attacks, XSS Filter, HTML Input Filter.


References:

1.        Richard Sharp and David Scott,” Abstracting Application Level    Web Security,” In Proceedings of the 11th ACM International World Wide Web Conference (WWW 2002), May 7-11, 2002.
2.        Peter wurzinger, Christian Platzer, Christian Ludl, and Christopher Kruegel,”SWAP:Mitigating XSS Attacks  using a Reverse Proxy,” In  proceedings of the 2009 ICSE Workshop on Software Engineering for secure systems,pp.33-39,2009.

3.        Engin Kirda, Nenad Jovanovic, Christopher Kruegel and Giovanni Vigna,”Client-Side Cross-Site Scripting Protection,” ScienceDirect Trans.computer and security
,pp.184-197,2009.

4.        Acunetix. Acunetix Web Vulnerability Scanner. http://www.acunetix.com/, 2008.

5.        Nao Ikemiya and Noriko Hanakawa, “A New Web Browser Including A Transferable Function to Ajax Codes”, In Proceedings of 21st IEEE/ACM International Conference on Automated Software Engineering (ASE '06), Tokyo, Japan, pp. 351-352, September 2006.

6.        V. Felmetsger, N. Jovanovic, D.Balzarotti, M. Cova, E. Kirda, and C. Kruegel,”Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web
Applications,” In IEEE Security and Privacy Symposium, 2008.

7.        Ravi Sandhu and Joon S. Park, “Secure Cookies on the Web”, IEEE internet computing, Volume 4, pp. 36-44, July/August 2000.

8.        Engin Kirda, Christopher Kruegel, Giovanni Vigna, and Nenad JovanovicNoxes, “A Client Side Solution for Mitigating Cross-Site Scripting Attacks”, In Proceedings of the 2006 ACM Symposium On Applied Computing (SAC’06), Dijon, France, pp. 330-337, April 2006.

9.        O. Ismaill, M.E. Youki, K. Adobayashi, S. Yamaguch, “A Proposal and Implementation of Automatic Detection/Collection System for Cross-Site Scripting Vulnerability”, In Proceedings of the 18th International Conference On Advanced Information Networking And Application (AINA’04), Fukuoka, Japan, Volume 1, pp.145-151, March 2004.

10.     G.Vignaand, Christopher Krugel, and William Robertson, “A Multi-Model Approach to the Detection of Web Based Attacks”, Computer Networks, Volume 48, Issue 5, pp. 717-738, August 2005.

11.     E. Kirda, C. Kruegel, and N. Jovanovic, “Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities”, In Proceedings of the 2006 IEEE Symposium on Security and Privacy(S&P’06), California, U.S.A, pp. 27-36, May 2006.

12.     Hao Chen and Matthew Van Gundy,”Using randomization to enforce information flow tracking and thwart crosssite scripting attacks,”In Proceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS), 2009.

13.     T. Jim and N. Swamy and M. Hicks. ,”BEEP: Browser- Enforced Embedded Policies,” In 16th International World   Wide Web Conference (WWW2007), Banff, 2007.

14.     C. Kruegel, E. Kirda, G. Vigna P. Vogt, F. Nentwich, and N. Jovanovic, ”Cross site scripting prevention with dynamic data tainting and static analysis,” In 14th Annual Network and Distributed System Security Symposium (NDSS), 2007.

15.     CERT “Advisory CA-2000-2002- Malicious HTML Tags Embedded in Client Web Requests” http://www.cert. org/advisories/CA-2000-02.html, 2000.

16.     Sy-Yen Kuo, Yao-Wen Huang, Chung-Hung Tsai, and D. T. Lee,“Non  Detrimental Web Application Security Scanning”,   In Proceedings of 15th International
Symposium on Software Reliability Engineering (ISSRE'04), France, pp. 219-230, November 2004.

17.     Chung-Hung, Tsai Yao-Wen Huang, Shih-Kun Huang, and Tsung-Po Lin, “Web Application Security Assessment By Fault Injection and Behavior Monitoring”, In Proceedings of the 12th international conference on World Wide Web, Budapest, Hungary, pp. 148 – 159, May 2003.

18.     Dr.M.Ponnavaikko and Jayamsakthi Shanmugam, “A Solution to Block Cross Site Scripting Vulnerabilities Based on Service Oriented Architecture”, In Proceedings of 6th IEEE international conference on computer and information science (ICIS 07) published by IEEE Computer Society in IEEE Xplore, Australia, pp. 861-866, July 11-13, 2007.

19.     Martin Johns, Bjorn Engelmann, and Joachim Posegga,”XSSDS: Server-side Detection of Cross-Site Scripting Attacks,” proc. IEEE Computer Security Applications Conference, pp. 335–343, October 2008.

20.     Yasuhiko Minamide, "Static Approximation of Dynamically Generated Web Pages," In Proceedings of the 14th International Conference on World Wide Web, Chiba, Japan, pp. 432–441,May  2005.

21.     WhiteHat Security. Website Security Statistics Report. http://www.whitehatsec.com/home/ resource/stats.html, 2008.

22.     B. (BK) Rios. Google XSS. http://xs-sniper.com/ blog/2008/04/14/google-xss/, 2008.
23.     Phishmarkt :: de. http://baseportal.com/ baseportal/phishmarkt/de, 2006.
24.     Phishmarkt::at. http://baseportal.com/baseportal/phishmarkt/at, 2007.

25.     S.-Y. Kuo, Y.-W. Huang, F. Yu, C. Hang, C.-H. Tsai, and D. Lee,” Securing Web Application Code by Static Analysis and Runtime Protection,” In Proceedings of the 13th International World Wide Web Conference (WWW 2004), May 2004.


130-137

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

33.

Authors:

Gayathri S,K Gerard Joe Nigel,S Prabakar

Paper Title:

Low Cost Hand Vein Authentication System on Embedded Linux Platform

Abstract:   Biometrics is one of the highly accurate technologies in the field of user identification. This paper presents a low costcontactless biometric identification system on Embedded Linux platform which is used to authenticate a person using the vein pattern in hand. As the system uses the vein pattern which is unique to each individual and is contained within human body, it is highly secure and accurate. Moreover, its contact less feature gives it a hygienic advantage over other personal authentication technologies. The system works by capturing a person’s vein pattern image by radiating it with near -infrared rays. The deoxygenated blood in the vein absorbs the near infrared radiation and thus the vein pattern appearsas black areas in the image. This captured pattern is stored as a template for the user verification. The experimental results of the proposed system shows that the dorsal hand vein pattern is highly unique and is a better alternative for other personal authentication systems. Also, the use of low cost ccd camera and open source Embedded Linux made the system cheaper than the conventional systems without risking accuracy.

Keywords:
 Embedded Linux, Hand vein authentication, pattern extraction, pattern matching, verification.


References:

1.       C. Nandini,Ashwini C, Medha Aparna, Nivedita Ramani, Pragnya Kini,Sheeba k ,“ Biometric Authentication by Dorsal Hand Vein Pattern”, International Journal of  Engineering and Technology, Vol: 2, No. 5, pg:837 -840 ,May 2012.
2.       Zhi Liu and Shangling Song, “An Embedded Real-Time Finger-Vein Recognition System for Mobile Devices”, IEEE Transactions on Consumer Electronics, Vol. 58, No. 2, pg:522-527,May 2012

3.       Azadeh Noori Hoshyar, Riza Sulaiman, Afsaneh Noori Houshyar, “Smart Access Control With Finger Vein Authentication And Neural Network,” Journal of American Science vol:7,No:9,pg:185-191, April 2011

4.       Ushapriya, M. Subramani, “Highly Secure and Reliable User Identification Based on Finger Vein Patterns”, Global Journal of Research in Engineering, Vol:11 ,No:3 Version 1.0,pg: 15-20, April 2011.

5.       Hatim A. Aboalsamh,“A Multi Biometric System Using Combined Vein and Fingerprint Identification”, International Journal Of Circuits, Systems And Signal Processing Vol:5, No:1, pg: 29-36, 2011.

6.       M. Deepamalar and M. Madheswaran, “An Improved Multimodal Palm Vein Recognition System Using Shape and Texture Features”, International Journal of Computer Theory and Engineering, Vol. 2, No. 3, pg:436-444,June 2010

7.       Ajay Kumar and K.Venkata Prathyusha, “Personal Authentication Using Hand Vein Triangulation and Knuckle Shape” IEEE Transactions on Image Processing, vol.18, No.9, September 2009.

8.       Tanushri Chakravorty, “Low Cost Subcutaneous Vein Detection System using ARM9 Single Board Computer” Proc. International journal on Electronics Computer Technology , IEEE Press, April 2011.

9.       T. Venkat Narayana Rao1, K.Preethi2 “Future of Human Security Based on Computational Intelligence Using Palm Vein Technology”, International Journal of Computer Science & Emerging Technologies (IJCSET) 68 Volume 1 Issue 1, June 2010.

10.     Ishani Sarkar1, Farkhod Alisherov2, Tai-hoon Kim3, and Debnath Bhattacharyya2 , “Palm Vein Authentication System: A Review", International Journal of Control and Automation Vol. 3, No. 1, March, 2010

11.     Daniel Hartung, Anika Pflug, Christoph Busch, “Vein Pattern Recognition Using Chain Codes, Spatial Information and Skeleton Fusing” ,The IEEE International journal on biometrics, 2010.

12.     Hao Luo,Fa-xin Yu,Jeng-Shyang Pan,Shu-chuan Chu,Pei-Wei Tsai “ Asurvey of vein recognition techniques”, Information technology journal 9(6):1142,1149,2010.

13.     Maleika Heenaye- Mamode Khan Naushad Ali Mamode Khan“A New Method to Extract Dorsal Hand Vein Pattern using Quadratic Inference Function”, (IJCSIS) International Journal of Computer Science and Information Security ,Vol. 6, No. 3, 2009.

14.     Vincent Paquita, Jeffery R. Pricea, Fabrice M´eriaudeau, Kenneth W. Tobin and Thomas L. Ferrell,“Combining near-infrared illuminants to optimize venous imaging”, OAK RIDGE national laboratory,2008.

15.     Yi-Bo Zhang1, Qin Li2, Jane You2, and Prabir Bhattacharya “Palm Vein Extraction and Matching for Personal Authentication”VISUAL 2007, LNCS 4781, pp. 154–164, 2007.

16.     Mohamed Shahin, Ahmed Badawi, and Mohamed Kamel “Biometric Authentication Using Fast Correlation of Near Infrared Hand Vein Patterns”, International Journal of Biological and Life Sciences 2:3 2006

17.     Naoto Miura, Akio Nagasaka, Takafumi Miyatake, “Feature extraction of finger-vein patterns based on repeated line tracking and its application to personal identification”, Machine Vision and Applications 15: 194–203,2004.


138-141

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

34.

Authors:

P. Divakara Varma, R.Ramana Reddy

Paper Title:

A Novel 1-Bit Full Adder Design Using DCVSL XOR/XNOR Gate and Pass Transistor Multiplexers

Abstract:   Adders are the basic building blocks in digital computer systems. Arithmetic operations are widely used in most digital computer systems. Addition is a fundamental arithmetic operation and is the base for arithmetic operations such as multiplication and the basic adder cell can be modified to function as subtractor by adding another xor gate and can be used for division. Therefore, 1-bit Full Adder cell is the most important and basic block of an arithmetic unit of a system. Hence in order to improve the performance of the digital computer system one must improve the basic 1-bit full adder cell. There is always a trade-off between speed and power dissipation in VLSI Design. To achieve high speeds, high drivability hybrid-DCVSL design methodologies are used to build adder cell in this work. Static CMOS, DCVSL adders are compared with hybrid XOR and XNOR based hybrid adder cell for delay, power dissipation and number of transistors utilized. The hybrid adder is designed using DCVSL gates because these can produce both complementary and true outputs using single gate architecture. The multiplexers in the design are based on the pass transistor logic (PTL) because these are simple to construct and occupies less chip area per component.

Keywords:
 DCVSL, Multiplexer, PTL, XOR/XNOR


References:

1.        John P. Uyemura, (2002) Introduction to VLSI Circuits and Systems, John Wiley & Sons.
2.        H.T. Bui, Y. Wang and Y. Jiang, “Design and analysis of low-power 10-transister full adders using XOR-XNOR gates,” IEEE Trans. Circuits Syst. II, Analog Digit. Signal Process, Vol. 49, no. 1, pp. 25- 30, Jan. 2002.

3.        K. Navi, O. Kaehi, M. Rouholamini, A. Sahafi, S.Mehrabi, N. Dadkhahi, “Low power and High performance 1-bit CMOS fill adder for nanometer design”. IEEE computer Society Annual Symposium VLSI (ISVLSI), Montpellier fr, 2008, pp.

4.        Subodh Wairya, Rajendra Kumar Nagaria and Sudarshan Tiwari, (2011) “New Design Methodologies for High-Speed Low-Voltage 1 Bit CMOS Full Adder Circuits,” Journal of Computer Technology and Application, Vol. 2, No. 3, pp. 190-198.

5.        Sumeer Goel, Mohammed A. Elgamel, Magdy A. Bayoumi, Yasser Hanafy, (2006) “Design Methodologies for High-Performance Noise-Tolerant XOR-XNOR Circuits,” IEEE Transactions on Circuits and Systems- I, Vol. 53, No. 4, pp. 867-878.

6.        Design of Energy efficient Full adder using hybrid CMOS logic style Mohammad Shamim Imtiaz, Md Abdul Aziz Suzon, Mahmudur Rahman, International Journal of Advances in Engineering & Technology, Jan 2012.

7.        Analysis of Several 2:1 Multiplexer Circuits at 90nm and 45nm Technologies, Ila Gupta, Neha Arora, Prof. B.P. Singh, International Journal of Scientific and Research Publications, Volume 2, Issue 2, February 2012

8.        Subodh Wairya , Garima Singh, Vishant, R. K. Nagaria and S. Tiwari (2011), “Design Analysis of XOR (4T) based Low Voltage CMOS Full Adder Cell,” In Proceeding of IEEE International Conference on Current Trends In Technology (NUiCONE’11), Ahmedabad, India pp. 1-7.

9.        Subodh Wairya, Rajendra Kumar Nagaria and Sudarshan Tiwari Comparative Performance Analysis of XORXNOR Function Based High-Speed CMOS Full Adder Circuits For Low Voltage VLSI Design, International Journal of VLSI design & Communication Systems (VLSICS) Vol.3, No.2, April 2012

10.     A New Static Differential CMOS Logic with Superior Low Power Performance Muhammad E.S. Elrabaa Analog Integrated Circuits and Signal Processing, 43, 183–190, 2005

11.     Design Of Energy-Efficient Full Adder Using Hybrid-CMOS Logic Style Mohammad Shamim Imtiaz, Md Abdul Aziz Suzon, Mahmudur RahmanInternational Journal of Advances in Engineering & Technology, Jan 2012.

142-146

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

35.

Authors:

Pankaj Garg, Ruby Verma

Paper Title:

Effect of Using Different Encoders in Bluetooth

Abstract:   IEEE 802.11 and Bluetooth are the two different wireless systems that share the same frequency band in 2.4 GHz and are likely to interfere with each other if operating in the same environment and thus experience a severe decrease in throughput.  The devices equipped with IEEE 802.11 and Bluetooth are mobiles, laptops, watches and many more and in future with WiMAX. Result is the number of co-located devices may cause interference issues in the 2.4 GHz radio frequency spectrum. Like other communication devices Bluetooth also consists of transmitter, channel and receiver. In transmitter and receiver encoders and decoders are used.    In Bluetooth transmitter different types of encoders are used like RS encoder, Hamming encoder, CVSD encoder etc. these encoders have its own advantages and disadvantages. In this paper, by using of two different encoders like hamming encoder and CVSD encoder we analyse the communication of Bluetooth device and compare the BER.

Keywords:
 CVSD, ISM, LMP, L2CAP, HCL, PCM and RFCOMM


References:

1.        Specification of the Bluetooth System Wireless connections made easy Core Version 1.1 February 22, 2001.
2.        Andrew Holmes “A comparison of SCO and ACL packets for audio transmission in Bluetooth”.

3.        Rohit Kapoor, Ling-Jyh Chen, Yeng-Zhong Lee and Mario Gerla “Bluetooth: Carrying Voice over ACL Links”.

4.        Matt Ziegler “An Overview of Bluetooth: Architecture, Power Consumption and
performance”,http://www.ece.virgina.edu/~mmz4s/papers/ECE613project_bluetooth.pdf

5.        Au-System,“Bluetooth Whitepaper”,http://www.palowireless.com/infotoothdocuments/Bluetooth _Whitepaper_AU_System.zip”.

6.        Joe Flynn, Questra Corporation “Communications Protocols for eAppliances: Bluetooth”  http://www.esconline.com/db_area/00fall/340.pdf.

7.        Wireless Communications Information & Services “Bluetooth Specification; Bluetooth Technologyoverview”, http://www.thewirelessdirectory.com/Bluetooth-Overview/Bluetooth-Specification.htm.

8.        P. Varshney and S. Kumar “Performance of GMSK in a land mobile radio channel," in IEEE Transactions on Vehicular Technology, Aug. 1991, vol. 40, pp. 607.

9.        SIG Security (2001) “Sakerhet vid tradlos datakommunikation”, Studentlitteratur, Lund, ISBN   91-44-02197-6, 2001.

10.     Olsson and Fredrik (2002) “Trådlösa nätverk WLAN i praktiken”, Pagina Förlags AB, Göteborg, ISBN 91-636-0739-5, 2002.

11.     Peikari, Cyrus and Fogie, Seth (2002) “Maximum Wireless Security”, Macmillan Computer Pub, ISBN 0672324881, December 2002.

12.     IEEE Std. 802-11 “IEEE Standard for Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification", June 1997.

13.     K. Halford, S. Halford, M. Webster and C. Andren (1999) “Complementary code keying for rake-based wireless communication", in Proceedings of the 1999 International Symposium on Circuits and Systems,1999, vol. 4, pp. 427.

14.     Jarno Pinola and Kostas Pentikousis (2008) "Mobile WiMAX," The Internet Protocol Journal, Volume 11, No. 2, June 2008.

15.     Anil Mathew, Nithin Chandrababu, Khaled Elleithy, and Syed Rizvi (2009) “IEEE 802.11 & Bluetooth Interference: Simulation and Coexistence”, 2009 Seventh
Annual Communications Networks and Services Research Conference, IEEE.

16.     Carla F.Chiasserini and Ramesh R. Rao (2002) “Coexistence Mechanisms for Interference Mitigation between IEEE 802.11 WLANs and Bluetooth”, 0-7803-7476-2/02/2002 IEEE.

17.     N. Golmie, R. E. Van Dyck and A. Soltanian “Interference of Bluetooth and IEEE 802.11: Simulation Modeling and Performance Evaluation” National Institute of Standards and Technology.

18.     Anders Dahlberg, Hans-Jiirgen Zepernick, Gwen Mercankosk and Markus Fiedler (2002) “Multi AP Concepts for SCO Traffic in a Bluetooth Based Radio Infrastructure Network”, 0-7803-7605-6/02/2002 IEEE.

19.     Mladen Russo, Dinko Begusic, Nikola Rozic and Maja Stella (2004)” Speech Recognition over Bluetooth ACL and SCO Links: A Comparison”, 0-7803-8784-8/04/2004 IEEE.

20.     Tsung-Chuan Huang and Shao-Hsien Chiang (2006), “Coexistence Mechanisms for Bluetooth SCO Link and IEEE 802.11 WLAN”, International Conference on Hybrid Information Technology (ICHIT'06), IEEE 2006.


147-149

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

36.

Authors:

Smita Upendra Gumaste, Jyoti Rao

Paper Title:

Investigation and Review of Efficient Method for Multiple Protein Network’s Pairwise Alignment 

Abstract:   Since from last decade, there is rapid growth in the availability of data over the protein-protein interaction (PPI) networks considering the various species like human, fly, bacteria, yeast and worm.  As we know that, one of the highly impacted approach for protein networks is that their comparative analysis which has already gain many researchers attention specially for the predicting the network structure, protein function as well as interaction. The major challenge for execution of this approach is to present robust algorithm for multiple network alignment. In this review paper, we are first presenting the literature review over the network alignment problems and querying problems. In the literature we are also discussing different PPI networks and their alignment problems. Further our main aim is to investigate the algorithm which is presented for efficient, fast with more accuracy pairwise alignment of multiple protein networks. Here we considering the proposed approach is work with novel representation of multiple protein networks those are having linear size. From the experiment and results observations, we found that this approach is more efficient and fast as compared to previous studies for multiple protein networks.

Keywords:
 Protein-protein interactions, pairwise alignment, yeast two-hybrid, data representation, search methods.


References:

1.        “Fast and Accurate Alignment of Multiple Protein Networks”, axim Kalaev1, Vineet Bafna2, and Roded Sharan1, 1 School of Computer Science, Tel Aviv University, Tel Aviv 69978, Israel. fkalaevma,rodedg@post.tau.ac.il 2 CSE, University of California San Diego, USA. vbafna@cs.ucsd.edu.
2.        Aebersold, R., Mann, M.: Mass spectrometry-based proteomics. Nature 422 (2003) 198{207 [3] Uetz, P., et al.: A comprehensive analysis of protein-protein interactions in Saccharomyces cerevisiae. Nature 403 (2000) 623{627

3.        Ito, T., et al.: A comprehensive two-hybrid analysis to explore the yeast protein interactome. Proc. Natl. Acad. Sci. USA 98 (2001) 4569{4574

4.        Ho, Y., et al.: Systematic identification of protein complexes in Saccharomyces cerevisiae by mass spectrometry. Nature 415 (2002) 180{183.

5.        G.D. Bader, I. Donaldson, C. Wolting, B. Ouellette, T. Pawson, and C. Hogue. Bind–the biomolecular interaction network database. Nucleic Acids Research, pages
242–245, 2001.

6.        S. Bandyopadhyay, R. Sharan, and T. Ideker. Systematic identification of functional orthologs based on protein network comparison. Genome Research, 16(3):428–435, 2006.

7.        R. Matthews, P. Vaglio, J. Reboul, H. Ge, B.P. Davis, J. Garrels, S. Vincent, and M. Vidal. Identification of potential interaction networks using sequence–based searches for conserved protein–protein interactions or ”interologs”. Genome Research, 11:2120–2126, 2001.

8.        “PAIRWISE ALIGNMENT OF INTERACTION NETWORKS BY FAST IDENTIFICATION OF MAXIMAL CONSERVED PATTERNS” WENHONG TIAN1,2†, NAGIZA F. SAMATOVA1,2, Pacific Symposium on Biocomputing 14:99-110 (2009).

9.        Sharan, R., S. Suthram, R.M. Kelley, T. Kuhn, S. McCuine, P. Uetz, T. Sittler, R.M. Karp, and T. Ideker, Conserved patterns of protein interaction in multiple species. Proc Natl Acad Sci U S A, 2005. 102(6): p. 1974-9.

10.     Singh, R., J. Xu, and B. Berger, Global alignment of multiple protein interaction networks. Pac Symp Biocomput, 2008: p. 303-14.


150-154

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

37.

Authors:

Kailas I Patil, Jaiprakash Shimpi

Paper Title:

A Graphical Password using Token, Biometric, Knowledge Based Authentication System for Mobile Devices

Abstract:   Passwords provide security mechanism for authentication and protection services against unwanted access to resources. A graphical based password is one promising   alternatives of textual passwords. According to human psychology, humans are able to remember pictures easily. In this paper, we have proposed a new hybrid graphical password based system, which is a combination of recognition and recall based techniques that offers many advantages over the existing systems and may be more convenient for the user. Our scheme is resistant to shoulder surfing attack and many other attacks on graphical passwords. This scheme is proposed for smart mobile devices (like smart phones i.e. ipod, iphone, PDAs etc) which are more handy and convenient to use than traditional desktop computer systems.

Keywords:
 Authentication, Graphical Passwords, Network Security.


References:

1.        Roman V. Y., “User authentication via behavior based passwords,” Systems, Applications and Technology Conference. Farmingdale, NY. 2007.
2.        Rachna Dhamija and Adrian Perrig, “Deja Vu: A User Study. Using Images for Authentication” In Proceedings of the 9th USENIX Security Symposium, August 2000.

155-157

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

38.

Authors:

Manish kumar Rajput, Divyanshu Prabhav, Chitransh Karade

Paper Title:

Design of a Wide Slot Antenna for Bandwidth Enhancement for Wireless Communication Application

Abstract:   In this paper we are proposing a brief description about Microstrip printed wide slot antenna with a fork like tuning stub for bandwidth enhancement. By applying fork like tuning stub to the microstrip wide slot antenna instead of line feed, it is experimentally found that operating bandwidth can be enhanced. Experimental results indicate that the impedance bandwidth, defined by -10Db return loss, of the proposed wide slot antenna can reach operating bandwidth of 3.1 GHz at operating frequency about 2GHz which is 6 times greater than conventional wide slot antenna. A comprehensive parametric study has been carried out to understand the effects of various dimensional parameters and to optimize the performance of the designed antenna.

Keywords:
 Fork like tuning stub, Bandwidth enhancement, wide-slot antenna


References:

1.        Sadat, S., M. Fardis, F. G. Geran, and G. R. Dadashzadeh, A compact microstrip square-ring slot antenna for UWB applications," Progress In Electromagnetics Research,  Vol. 67,173-179, 2007.
2.        Dastranj, A., A. Imani, and M. Naser-Moghaddasi, Printed  wide-slot antenna for wideband applications," IEEE Trans. Antennas’’ Propag., Vol. 56, No. 10, 3097-3102, 2008.

3.        Lin, S.-Y. and B.-J. Ke, \Ultrawideband printed patch antenna in notch," Microwave and Optical Technology Letters, Vol. 51, No. 9, 2080-2084, 2009.

4.        Chair, R., A. A. Kishk, K.-F. Lee, C. E. Smith, and D. Kajfez, Microstrip line and CPW FED ultra wideband slot antennas with U-shaped tuning stub and re°ector," Progress In Electromagnetics Research, Vol. 56, 163-182, 2006.

5.        Chen, W. S. and K. Y. Ku, \Broadband design of non-symmetric ground ¸=4 open slot antenna with small size," Microwave Journal, Vol. 50, 110-121, 2007.

6.        H. F. Pues and A. R. Van de Capelle, “An impedance matching technique for increasing the bandwidth of microstrip antennas,” IEEE Trans. Antennas Propag., vol. AP-37, no. 11, pp. 1345–1354, Nov.1989.

7.        F. Yang, X.-X. Zhang, X. Ye, and Y. Rahmat-Samii, “Wide-band E-patched patch antenna for wireless communications,” IEEE Trans. Antennas Propag., vol. 49, no. 7, pp. 1094–1100, Jul. 2001.

8.        E. Chang, S. A. Long, and W. F. Richards, “Experimental investigation of electrically thick rectangular microstrip antennas,” IEEE Trans. Antennas Propag., vol. AP-34, no. 6, pp. 767–772, Jun. 1986.

9.        C. K. Wu and K. L. Wong, “Broadband microstrip antenna with directly coupled and gap-coupled parasitic patches,” Microw. Opt. Technol. Lett., vol. 22, pp. 348–349, Sep. 1999.

10.     T. Huynh and K. F. Lee, “Single-layer single-patch wideband microstrip antenna,” Electron. Lett., vol. 31, no. 16, pp. 1310–1312, Aug. 1995.

11.     K. L. Wong and Y. F. Lin, “Small broadband rectangular microstrip antenna with chip-resistor loading,” Electron. Lett., vol. 33, no. 19, pp. 1593–1594, Sep. 1997.

12.     M. A. Gonzalez de Aza, J. Zapata, and J. A. Encinar, “Broadband cavity-backed and capacitively probe-fed microstrip patch arrays,” IEEE Trans. Antennas
Propag.,  vol. 48, pp. 784–789, May 2001.

158-161

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

39.

Authors:

S. P. Singh, Vikash Sharma

Paper Title:

Features Enhancement and Efficiency Optimization of HSNP by HSVP System of Vehicle Number Plates

Abstract:   High security number plate (HSNP) deals with metal plate mounted on the motor vehicles having a unique number allotted to that vehicle. The plate is the only identification of the vehicle in the first sight. This plate helps in the searching and tracking of the vehicle whenever required.  These important features of plate make it an important part of the vehicle and increase the chances of its misuse, like its tempering, its replacement with wrong plate etc. The paper proposes a system HSVP (High Security Vehicle Plate), which makes the vehicle secure and restrict the cases of vehicle stolen completely or in parts. The system enhances the features of the existing HSNP system and improving the efficiency of the vehicle tracking system by providing an effective automated system. HSVP may also be utilized to optimize the functioning of the traffic police.

Keywords:
 HSNP, HSRP, HSVP, SVM, SIM, UID, RTO.


References:

1.       http://www.highsecurityplates.com/2012/04/high-security-number-plates-is-starting.html
2.       http://www.jagran.com/delhi/new-delhi-city-9704256.html

3.       http://noida.newzstreet.com/news.php?slug=no-easy-way-for-noidaites-to-install-high-security-number-plates-in vehicles&news_id=10359

4.       http://www.jharkhand.gov.in

5.       Coifman, B., “Vehicle Reidentification and Travel Time Measurement in Real-time on Freeways Using the Existing Loop Detector Infrastructure,” Transp. Res. Rec. 1643, pp. 181-191.

6.       Kim, S.W., Y. Eun, H. Kim, J.I. Ko, W.J. Jung, Y.G.. Choi, Y.G.. Cho and D. Cho, Performance Comparison of Loop/Piezo and Ultrasonic Sensor-based Detection Systems for Collecting Individual Vehicle Information,” Proc. 5th World Congr. Intell.Transp. Syst.,Seoul, Korea.

7.       License Plate Recognition Using Image Processing Techniques & SVM Classifier by Shemesh and David Arieh Fellman

8.       Yung, N.H.C., K.C. Chan and A.H.S. Lai, “Vehicletype Identification through Automated Virtual Loop Assignment and Block-based Direction Biased Motion Estimation,” Proc. IEEE/IEEJ/JSAI Int. Conf. Intell. Transp. Syst., Tokyo, Japan.

9.       Kim, S.W., J.I. Ko, H. Kim, I. Cho and D. Cho, “A New Loop-detector Circuit for Improving lowspeed Performance,” Proc. 6th World Congr. Intell. Transp. Syst., Toronto, Canada.

10.     Passino, K.M. and S. Yurkovich, Fuzzy Control, Addison-Wesley, Reading, MA.

11.     Lai, M., M. Nakano and G. Hsieh, “Application of Fuzzy Logic in the Phase-Locked Loop Speed  Control of Induction Motor Drive,” IEEE Trans. Ind. Electron., Vol. 43, No. 6, pp. 630-639.

162-165

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

40.

Authors:

S. P. Pingat, Shubham Rakhecha, Rishabh Agrawal, Sarika Mhetre, Pranay Raushan

Paper Title:

Real Time Smart Car Security System by Using Biometrics

Abstract:   In this proposed paper, two tier security for car is achieved using Biometrics such as FDS (Face Detection System) and Finger Print Detection System. FDS is used to detect the face of the person driving the car and compare it with the training set.  For example, during night when the owner of car is sleeping and someone tries to rob the car then initially the finger print of that person will be detected and matched with predefined image through handle of the car where the Finger print scanner can be placed. Also in case if that person surpass the Finger print security then FDS image  obtained by one tiny camera which can be hidden easily somewhere in the car. Image obtained through the camera is then compared with stored (training set) image using FDS. If the image does not get match, then the information is sent to the owner through MMS. The image of the thief can be obtained by owner in his mobile through MMS as well as he can get the location of the vehicle through GPS. The owner can get the location of vehicle through SMS. So by using this system, owner can get the image of thief as well as the Car’s Location.

Keywords:
 FDS (Face Detection System), MMS (Multi Media System), PCA (Principle Component Analysis), GPS (Global positioning System), GSM (Global System for Mobile Communication), Finger Print Scanner.


References:

1.       S. Ajaz, M. Asim, M. Ozair, M. Ahmed, M. Siddiqui, Z. Mushtaq, “Autonomous Vehicle Monitoring & Tracking System,” SCONEST 2005, pp. 1 – 4, 2005.
2.       Joseph A. O'Sullivan, Robert Pless, “Advances in Security Technologies: Imaging, Anomaly Detection, and Target and Biometric Recognition”, Microwave Symposium IEEE/MTT-S International Volume, Page(s):761 – 764, 2007.

3.       Sergey Kosov, Kristina Scherbaum, Kamil Faber, ThorstenThorma¨hlen, and Hans-Peter Seidel, 2009, “Rapid stereo-vision enhanced face detection”. in Proc. IEEE International Conference on Image Processing, pp.1221–1224.

4.       Sergey Kosov, Thorsten Thorma¨hlen, Hans-Peter Seidel, 2009,“Accurate Real-Time Disparity Estimation with Variational Methods”, in Proc. International Symposium on Visual Computing, pp.796–807.

5.       T.-H. Sun, M. Chen, S. Lo, and F.-C. Tien, 2007, “Face recognition using 2D and disparity eigenface”, Expert Syst.Appl.,vol.33,no.2, pp.265–273.

166-168

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

41.

Authors:

Yash Dave, Gordhan Jethava

Paper Title:

An Approach to Improve Security on Clone of Mobile Device during Augmented Execution

Abstract:   The goal of cloud computing is usage of cloud resource form anywhere i.e. mobility. Mobile cloud computing, new technology in the field of cloud computing enables cloud users to access cloud from their mobile devices (e.g. Laptops, PDA, Smartphone’s). Computation power and battery life is one of the major issues of these mobile devices. Now a day’s resource starved applications like online HD graphics games, multimedia, etc. needs more bandwidth and computation power that mobile device might not have. So to overcome this problem clones of mobile devices are created on cloud servers. This clone uses resources of the cloud servers. Using augmented execution all complex applications run in this clone and response is sent back to mobile device. This can save battery life for low configured mobile devices. This paper shows how to improve the synchronization between mobile device and clone to communicate more reliably in terms of improving security.

Keywords:
 Augmented execution, clone, cloud computing, mobile cloud computing.


References:

1.        “Mobile Cloud Computing: The Future of Cloud” by Pragya Gupta1, Sudha Gupta in International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering Vol. 1, Issue 3, September 2012
2.        “Mobile cloud computing as future for mobile application implementation, methods and challenges issues” by Shahryar Shafique Qureshi, Toufeeq Ahmad, Khalid Rafique, Shuja-ul-islam in Proceedings of IEEE CCIS2011

3.        Challenges in Securing the Interface between the Cloud and Pervasive Systems” by Brent    Lagesse in Oak Ridge National Laboratory.

4.        “Augmented Smartphone Applications Through Clone Cloud Execution” by Byung-Gon Chun and Petros Maniatis in Intel Research Berkeley

5.        “CloneCloud: Elastic Execution between Mobile Device and Cloud” by Byung-Gon Chun,  Sunghwan Ihm, Petros Maniatis, Mayur Naik and  Ashwin Patti in EuroSys’11, April 10–13, 2011, Salzburg, Austria

6.        “ThinkAir: Dynamic resource allocation and parallel execution in cloud for mobile code offloading” by Sokol Kosta, Andrius Aucinas, Andrius Aucinas, Richard Mortier and Xinw.

7.        “SnowFlock: Rapid Virtual Machine Cloning for Cloud Computing” by H. Andrés Lagar-  Cavilla, Joseph A. Whitney, Adin Scannell, Philip Patchin, Stephen M. Rumble, Eyal de Lara, Michael Brudno, M. Satyanarayanan in University of Toronto and Carnegie Mellon University en Zhang in Google’s 2011 Q2 earnings call.

8.        Technical Report- “Analysis of Dalvik Virtual Machine and Class Path Library”.

9.        http://code.google.com/p/android-dalvik-vm-on-java/wiki/Tutorial1


169-173

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

42.

Authors:

Madhuri Gawali, Mrunal Bewoor, Suhas Patil

Paper Title:

Review: Evaluating and Analyzer to Developing Optimized Text Summary Algorithm

Abstract:   Information available on internet is in unstructured manner, retrieving relevant documents containing the required information is difficult. Due to huge amount of data, query-specific document summarization has become an important problem. It is difficult task for the user to go through all these documents, as the number of documents available on particular topic will be more. It will be helpful for the user if query specific document summery is generated. Comparing different clustering algorithms those provide better result for summarization. Based on this we provide input as one query and get all the documents related to that and on these document different clustering algorithm are used to get results of each Algorithm. Then these algorithms comparing results with each other in terms of speed, memory, and quality of summary. After comparison we can decide which algorithm is better for summarization. So it will help to find the better query dependent clustering algorithm for text document summarization.

Keywords:
 clustering, summarization.


References:

1.        Prashant D. Joshi, S. G. Joshi, M. S. Bewoor & Dr. S. H. Patil, “Comparison between graphs based document Summarization method and clustering method” , International Journal of Advances in Engineering & Technology (IJAET), 2011, Vol. 1, Issue 5, pp. 118-125.
2.        Anna Huang “Similarity Measures for Text Document Clustering”, NZCSRSC, 2008 Christchurch, New Zealand, pp. 49-56.

3.        Harshal J. Jain, M. S. Bewoor, Dr. S. H. Patil, “Context Sensitive Text Summarization Using K Means Clustering Algorithm”, International Journal of Soft Computing and Engineering (IJSCE), 2012, Vol. 2, Issue 2, pp. 301-304.

4.        Ms. Laxmi S. Patil, Prof. M. S. Bewoor, and Dr. S. H. Patil, “Query Specific ROCK Clustering Algorithm for Text Summarization”, International Journal of Engineering Research and Application (IJERA), 2012, Vol. 2, Issue 3, pp. 2617-2620.

5.        Ms. Meghana N. Ingole, Mrs. M. S. Bewoor, Mr. S. H. Patil, “Text Summarization using Expectation Maximization Clustering Algorithm”, International Journal of Engineering Research and Application (IJERA), 2012, Vol. 2, Issue 4, pp. 168-171.

6.        Chin-Yew Lin, “Rouge: A package for automatic evaluation of summaries”, In Proceedings of the ACL-04 Workshop: Text Summarization Branches Out, Barcelona, Spain 2004, pp.74–81.

7.        ”Count Data Modeling and Classification Using Finite Mixtures of Distributions”, IEEE Transaction on Neural Networks.Vol.22, No.2, February 2011.

8.        “Clustering Sentence-Level Text using a Novel Fuzzy Relational Clustering Algorithm”, IEEE Transactions on Knowledge and Data Engineering 2011.

9.        Software Engineering: A Practitioner’s Approach (Sixth Edition) - by Roger S. Pressman.

10.     The complete Reference of .NET, by Matthew, Tata McGraw Hill Publication Edition 2003.

11.     B. Larsen and C. Aone, “Fast and effective text mining using linear-time document clustering”, proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 1999.

12.     Congnan Luo, Yanjun Li, Soon M. Chung “Text document clustering based on neighbors”, Data & Knowledge Engineering 68, Elsevier publication, 2009, pp. 1271-1288.

13.     Abdolreza Eshghi, Dominique Haughton,” Identifying Groups: A Comparison of Methodologies”, journal of Data Science 9, 2011, pp. 271-291.


174-175

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

43.

Authors:

S.Priya, S.Pushpa

Paper Title:

Measurouting Approach for Flow Utility in Routing Assisted Traffic Monitoring

Abstract:   The network operators are interested in monitoring passing traffic in a network for reasons of traffic accounting, debugging or troubleshooting, forensics, and traffic engineering. Previous research has focused on monitor placement across the network for maximizing the monitoring utility. But, traffic characteristics and measurement objectives can change dynamically, rendering a placement of monitors suboptimal. It will not be the feasible solution to dynamically reconfigure measurement infrastructure. The problem is addressed by strategically routing traffic subpopulations over fixed monitors. This approach is referred as MeasuRouting. The challenge of MeasuRouting to work within the intradomain TE operations that are geared for utilizing bandwidth resources and meeting quality-of-service (QoS). A feature of intradomain routing, is specified for aggregate flows which is feasible for measurouting. MeasuRouting can route the components of an total  flow while ensuring that the placement of monitor is compliant to original TE objectives. In this paper, a theoretical framework for MeasuRouting and flow utility function for packet is presented.

Keywords:
 Aggregate flow, intradomain routing, network management, traffic engineering, traffic measurements.


References:

1.       A.   Ramachandran, S. Seetharaman,N. Feamster, and V. Vazirani, “Fast monitoring of traffic subpopulations,” in Proc. ACM SIGCOMM IMC, Vouliagmeni, Greece, Oct. 2008, pp. 257–270.
2.       B.   Estan and G. Varghese, “New directions in traffic measurement and accounting: Focusing on the elephants, ignoring the mice”, Trans.Comput. Syst., vol. 21, no. 3, pp. 270–313, 2003.

3.       C.   Chaudet† E. Fleury‡ I. Gu´erin Lassous‡ H. Rivano “Optimal positioning of active and passive monitoring devices” in Proc.ACM CoNEXT, Toulouse, France, Oct. 2005, pp. 71–82.

4.       J. Mai, C.-N. Chuah, A. Sridharan, T.Ye, and H. Zang, “Is sampled data  sufficient for anomaly detection?,” in Proc. ACM SIGCOMM IMC, Rio de Janeiro, Brazil, Oct. 2006, pp. 165–176.

5.       N. Duffield and C. Lund, “Predicting resource usage and estimation accuracy in an IP flow measurement collection infrastructure,” in Proc. ACM SIGCOMM IMC, Miami Beach, FL, 2003, pp. 179–191.

6.       K. C. Claffy, G. C. Polyzos, and H.-W. Braun, “Application of sampling methodologies to network traffic characterization,” in Proc. ACM SIGCOMM, San Francisco, CA, Sep. 1993, pp. 194–203.

7.       G. R. Cantieni,G. Iannaccone,C.Barakat,C.Diot, and P. Thiran, “Reformulating the monitor placement problem: Optimal network-wide sampling,” in Proc. ACM CoNEXT, Lisboa, Portugal, Dec. 2006, Article no. 5.

8.       S. Raza, G. Huang, C.-N. Chuah, S. Seetharaman, and J. P. Singh, “MeasuRouting: A framework for routing assisted traffic monitoring,” in Proc. IEEE INFOCOM, San Deigo, CA, Mar. 2010, pp. 1–9.

9.       B. Fortz and M. Thorup, “Internet traffic engineering by optimizing OSPFweights,” in Proc. IEEE INFOCOM, Tel-Aviv, Isreal,Mar. 2000, vol. 2, pp. 519–528.

10.     David and V. Sergei, “K-means++: The advantages of careful seeding,” in Proc. ACM–SIAM SODA, Philadelphia, PA, 2007, pp. 1027–1035.

11.     Medina, N. Taft, S. Battacharya, C.Diot, and K. Salamatian, “Traffic matrix estimation: Existing techniques and new directions,” in Proc. ACM SIGCOMM, Pittsburgh, PA, Aug. 2002, pp. 161–174


176-180

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

44.

Authors:

Haval Sardar Kamil , S. U. Kulkarni

Paper Title:

Overview of Wind Turbine Driven Self-Excited Induction Generator

Abstract:   This paper presents an overview of the analysis, modeling as well as controlling of self Excited Induction Generator (SEIG) which is connected by Wind Turbine. The AC capacitors are used to build up the process of an isolated induction generator starts from charge in the capacitors or from a remnant magnetic field in the core. Same process is done at the time of isolated induction generator is excited by inverter/rectifier system. . A closed loop voltage control scheme using a PWM Voltage Source Converter (VSC), dc link capacitor and a P-I voltage controller is proposed. This scheme generates constant voltage and variable frequency using the converter which also acts as a reactive power compensator. In the growing applications and environmental conditions, various types of technologies are introduced to delivering the power to the grid. The main objective of the project is to track and extract maximum power to the grid connected wind energy conversion system. This paper presents only a proposed approach of self-excited induction generator in wind energy conversion system.

Keywords:
 Self Excitation Induction Generator, PWM Inverter, Capacitor, Series Induction Filter, voltage source, grid


References:

1.        M.Sasikumar1 and S.Chenthur Pandian2, “Performance Characteristics of Self-Excited Induction Generator fed Current Source Inverter for Wind Energy Conversion Applications”, International Journal of Computer and Electrical Engineering, Vol.2, No.6, December, 2010, 1793-8163.
2.        Salama, M.H. and Holmes, P.G., “Transient and steady-state load performance of stand-alone self-excited induction generator”, IEE Proc. – Electr. Power Appl., vol. 143, no.1, January 1996, pp.50-58.

3.        Malik, N.H. and Haque, S.E., “Steady-state analysis and performance of an isolated self-excited induction generator”, IEEE Trans. on Energy Conversion, vol. EC- 1, no.3, 1986, pp.134-139.

4.        Malik, N.H. and Mazi, A.A, “Capacitance requirements of self-excited induction generators”, IEEE Trans. on Energy Conversion, vol. EC-2, no.1, 1987, pp.2-9.

5.        B. Palle, M.G. Simoes, F.A. Farret: Dynamic Simulation and Analysis of Parallel Self-Excited Induction Generators for Islanded Wind Farm Systems, IEEE Trans. on Industry Applications, Vol. 41, No. 4, 2005, pp. 1099–1106.

6.        R. Ibtiouen, A. Nesba, S. Mekhtoub, O. Touhami: An approach for the modeling of saturated induction machine, Proc. International AEGAN Conference on Electrical Machines and Power Electronics, ACEMP'01, Kasudasi-Turkey, 27-29 June, 2001, pp. 269–274.

7.        Li Wang, Chaing-Huei Lee , “A novel analysis on the performance of an Isolated self excited induction generators,” IEEE Trans. on Energy conversion June 1993, vol.12, No.2.

8.        “The Dynamic Analysis And Control Of A Self-Excited Induction Generator Driven By A Wind Turbine”, by Dawit Seyoum. 2003.

9.        Ali Nesba, Rachid Ibtiouen, Toohami, “Dynamic performance of self-excited induction generator feeding different static loads”, Serbian Journal of Electrical Engineering, vol. 3, no.1, June 2006, pp.63-76.

10.     Vadhere Shelly and Sandhu, K.S., “Constant voltage operation of self excited induction generator using optimization tools”, International Journal of Energy and Environment, issue 4, vol. 2, 2008.

11.     Simoes, M. Godoy, Farret, Felix A., “Alternative Energy Systems: Design and Analysis with Induction Generators”, Second Edition, CRC Press, Boca Raton, 2007, Chapter 5, pp.93-99.

12.     D. W. Novotny, D. J. Gritter and G. H. Studtmann, “Self-excitation in inverter driven induction machines”, IEEE Transactions on Power Apparatus and Systems, Vol. PAS-96, no.4, July/August 1977, pp. 1117-1125.

13.     Energy Australia “Kooragang wind turbine generator fact sheet”, 2001.

14.     D. Seyoum, C. Grantham and F. Rahman, "The dynamic characteristics of an isolated self-excited induction generator driven by a wind turbine", Proceedings IEEE- IAS 2002 Annual Meeting Pittsburgh, USA, October 13-18, 2002, pp 731-738.
15.     S. S. Murthy, O. P Malik and A. K. Tandon, “Analysis of self-excited induction generators”, IEEE Proc., Vol. 129, No. 6, Nov. 1982, pp. 260-265.
16.     N. H. Malik, and A. H. Al-Bahrani, A.H., “Influence of the terminal capacitor on the performance characteristics of a self-excited induction generator ”, IEE Proc C., Vol. 137, No. 2, March 1990, pp. 168-173.


181-185

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

45.

Authors:

Mustafa Jawad Kadhim, D.S.Chavan

Paper Title:

Stability Analysis of DFIG-based Wind Farms Using Different Bus Systems

Abstract:   This paper shows an overview of the power system stability of DFIG based wind farms and conventional synchronous generator. For the optimized computation, the reduced order DFIG model was used in order to restrict calculation to the fundamental frequency component. It depends on accurate model of DFIG wind generator, modal analysis, PV curves, as well as time domain simulations could be used to study the effect on system stability of replacing conventional generation by DFIG-based wind generation on the IEEE 14-bus, IEEE 30-bus, IEEE 18-bus benchmark system, for  fixed power factor and voltage control operation. This paper presents the block diagram of IEEE 14 bus system by using Wind Turbine. This paper indicates that the oscillatory behavior associated with the dominant mode of the synchronous generator, is improved when the DFIG-based wind turbine is connected to the system; this improvement in the damping ratios is more evident when the wind turbines are operated with terminal voltage control.

Keywords:  Power System, IEEE 14 bus system, IEEE 18 bus system, stability, wind power generation, time domain, power flow analysis, PSAT.


References:

1.        V. Akhmatov, “Analysis of dynamic behavior of electric power systems with large amount of wind power,” Ph.D. dissertation, Technical Univ. Denmark, Lyngby, Denmark, 2003.
2.        J. G. Slootweg, H. Polinder, and W.L. Kling, “Dynamic modeling of a wind turbine with doubly fed induction generator,” in Proc.2001 IEEE Power Eng. Soc. Summer Meeting, pp.644-649, Jul. 2001.

3.        I. Erlich, J. Kretschmann, J. Fortmann, S. Mueller-Engelhardt, and H. Wrede, “Modeling of wind turbines based on doubly-fed induction generators for power system stability studies,” IEEE Trans. Power Syst., vol. 22, pp. 909-919, Aug. 2007.

4.        “Dynamic Modeling of Doubly-Fed Induction Machine Wind-Generators,” DIgSILENT GmbH, Germany, Aug. 2003. [Online]. Available: http//www.digsilent. de/images/Company/ news/DFIGRev1.pdf.

5.        Y. Lei, A. Mullane, G. Lightbody, and R. Yacamini, “Modeling of the wind turbine with a doubly fed induction generator for grid integration studies,” IEEE Trans. Energy Convers., vol. 21, pp. 257–264, Mar. 2006.

6.        L.M. Fernandez, F. Jurado, and J.R. Saenz, “Aggregated dynamic model for wind farms with doubly fed induction generator wind turbines,” Renewable Energy,vol.33, no.1, pp. 129-140, Jan. 2008, [Online]. Available: http// www.sciencedirect.com.

7.        W. Qiao, “Dynamic Modeling and control of Doubly Fed Induction Generators Driven by Wind Turbines,” in Proc. 2009 IEEE/PES Power Systems Conference and Exposition, pp.1-7, Mar. 2009.

8.        P. Ledesma, and J. Usaola, “Effect of Neglecting Stator Transients in Doubly Fed Induction Generators Models,” IEEE Trans. Energy Conv.,vol. 19, pp. 459-461, Jun. 2004.

9.        F. Mei and B. Pal, “Modal analysis of grid-connected doubly fed induction generators,” IEEE Trans. Energy Conv., vol. 22, pp. 728-736, Jun. 2007.

10.     J.G. Slootweg, “Wind power: Modeling and Impact on Power System Dynamics,” Ph.D. dissertation, Delft University of Technology, Delft, Netherlands, 2003.

11.     F. Wu, X.-P. Zhang, K. Godfrey, and P. Ju, “Small signal stability analysis and optimal control of a wind turbine with doubly fed induction generator,” in Proc. 2007 IET Gener. Transm. Distrib., pp. 751-760, Sep. 2007.

12.     L. Sigrist and L. Rouco, “Design of Damping Controllers for doubly Fed Induction Generators Using Eigenvalue Sensitivities,” in Proc. 2009 IEEE/PES Power Systems Conference and Exposition, pp. 1-7, Mar. 2009.

13.     M. V. A. Nunes, J. A. P. Lopes, H. H. Zurn, U. H. Bezerra, and R. G. Almeida, “Influence of the variable-speed wind generators in transient stability margin of the conventional generators integrated in electrical grids,” IEEE Trans. Energy Conv., vol. 19, pp. 692, Dec. 2004.

14.     Ch. Eping, J. Stenzel, M. Poller, and H. Muller, “Impact of Large Scale Wind Power on Power System Stability”. DIgSILENT GmbH, Germany, Apr. 2005. [Online]. Available: http//www.digsilent.de/Consulting/Publications/PaperGlasgow_DIgSILENT.pdf.

15.     D. Gautam, V. Vittal, and T. Harbour, “Impact of Increased Penetration of DFIG-Based Wind Turbine Generators on Transient and Small Signal Stability of Power Systems,” IEEE Trans. Power Syst., vol. 24, pp. 1426-1434, Aug. 2009.

16.     E. Vittal, M. O’Malley, and A. Keane, “A Steady-State Voltage Stability Analysis of Power Systems With High Penetrations of Wind,” IEEE Trans. Power Syst., vol. 25, pp. 433-442, Aug. 2009.


186-190

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

46.

Authors:

Roopali Goel, Ritesh Jain

Paper Title:

Speech Signal Noise Reduction by Wavelets

Abstract:   Speech plays an important role in multimedia system. Speech enhancement is to remove noise from speech for multimedia systems. Noise act as a disturbance in any form of communication which degrades the quality of the information signal. Generally transmission and receiving signals are often corrupted by noise which can cause severe problems for downstream processing and user perception. Therefore an automated removal of noise would be an invaluable first stage for many signal processing tasks. Denoising has long been a focus of research and yet there always remains room for improvement. There are so many ways to improve the signal quality or to regenerate the signal. In this paper we have present a method for speech signal denoising using different wavelets. In this we will demonstrate the usefulness of wavelets to reduce noise in a model system where Gaussian noise is inserted into an audio signal.

Keywords:
 About four key words or phrases in alphabetical order, separated by commas.


References:

1.       Amara Graps. An introduction to wavelets. IEEE Computational Science and Engineering, Summer 1995,vol. 2, num. 2, published by               the IEEE Computer Society, 10662 Los Vaqueros Circle, Los Alamitos, CA 90720, USA.
2.       R.J.E. Merry, Prof. Dr. Ir. M. Steinbuch, Dr. Ir. M.J.G. van de Molengraft. Wavelet Theory and Applications -A literature study, DCT 2005.53.

3.       Florian Luisiera, Thierry Blua, Brigitte Forsterb and Michael Unsera  a Biomedical Imaging Group (BIG), Ecole Polytechnique F´ed´erale de Lausanne (EPFL), Lausanne, Switzerland Centre for Mathematical Sciences, Munich University of Technology (TUM), Munich,Germany. Which wavelet bases are the best for image denoising ?

4.       A. K. Verma, Neema Verma.  A Comparative Performance Analysis of Wavelets in Denoising of Speech Signals, National Conference on Advancement of Technologies – Information Systems & Computer Networks (ISCON – 2012) Proceedings published in International Journal of Computer Applications® (IJCA).

5.       Nathaniel A. Whitmal’, Janet C.Rutledge’, and Jonathan Cohen2.Reducing Correlated Noise in Digital Hearing Aids.

6.       Adrian E. Villanueva- Luna1, Alberto Jaramillo-Nuñez1,Daniel Sanchez-Lucero1, Carlos M. Ortiz-Lima1,J. Gabriel Aguilar-Soto1, Aaron Flores-Gil2 and Manuel May-Alarcon2.. De-Noising Audio Signals Using MATLAB Wavelets Toolbox.

7.       Dr. Parvinder Singh, Dinesh Singh, Deepak Seth. Reduction of Noise from Speech Signal using Haar and Biorthogonal Wavelet, ISSN: 2230-7109(,IJECT Vol. 2, ISSN : 2230-7109(Online) | ISSN : 2230-9543(Print) Issue 3, Sept. 2011.

8.       Sofia Ben Jebara, Research Unit TECHTRA Ecole Sup´erieure des Communications de Tunis Route de Raoued 3.5 Km, Cit´e El Ghazala, 2083, Ariana, Tunisia. Peridoc/Aperiodic Decomposition And Wavelet Transform for Noise Reduction Is Oesophageal Speech.M. Young, The Techincal Writers Handbook.  Mill Valley, CA: University Science, 1989.

9.       Michel Misiti, Yves Misiti, Georges Oppenheim, Jean-Michel Poggi. Wavelet Toolbox for use with matlab.

10.     Rajeev Aggarwal, Sanjay Rathore, Jai Karan Singh, Mukesh Tiwari, Vijay Kumar Gupta, Dr. Anubhuti Khare. Noise Reduction of Speech Signal using Wavelet Transform with Modified Universal Threshold, International Journal of Computer Applications (0975 – 8887) Volume 20– No.5, April 2011

11.     Bahoura M & Rouat J, (2006). Wavelet speech enhancement based on time–scaleadaptatio,SpeechCommunicationVol.48,No.12,pp:1620-1637. ISSN: 0167-6393.

12.     Rajeev Aggarwal, Jay Karan Singh, Vijay Kr. Gupta and Dr. Anubhuti Khare. Elimination of White Noise from Speech Signal Using Wavelet TransformBy Soft and Hard Thresholding, VSRD-IJEECE, Vol. 1 (2), 2011, 62-71.

13.     Davis, G, M, (2002). ‘Noise Reduction in Speech Applications, CRC Press LLC, ISBN 0-8493-0949-2, USA.

14.     Dong E & Pu X. (2008). Speech denoising based on perceptual weighting filter, Proceedings of 9th IEE International Conference on Signal Processing, pp: 705-708, October 26-29, Beijing. Print ISBN: 978-1-4244-2178-7.

15.     Gold, B. & Morgan, N. (1999) Speech and audio signal processing: processing and perception of speech, and music, John Wiley & Sons, INC., ISBN: 0-471-35154-7, New York, USA.

16.     Johnson M. T, Yuan X and Ren Y, (2007). Speech Signal Enhancement through Adaptive Wavelet Thresholding, Speech Communications, Vol. 49, No. 2, pp: 123-133, ISSN: 0167-6393.

17.     Képesia M & Weruaga L. (2006). Adaptive chirp-based time–frequency analysis of speech signals, Speech Communication, Vol. 48, No. 5, pp: 474-492. ISSN: 0167-6393

18.     Li N & Zhou M. (2008). Audio Denoising Algorithm Based on Adaptive Wavelet Soft-Threshold of Gain Factor and Teager Energy Operator, Proceedings of IEEE International Conference on Computer Science and Software Engineering, Vol. 1,pp: 787-790. Print ISBN: 978-0-7695-3336-0.

19.     McLaughlin I (2009). Applied Speech and Audio Processing With MATLAB Examples, Cambridge University Press, ISBN-13 978-0-521-51954-0, UK.

20.     Minkoff, J. (2002). Signal Processing Fundamentals and Applications for Communications and Sensing Systems, ARTECH HOUSE, INC., ISBN 1-58053-360-4, USA.


191-193

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

47.

Authors:

Rajeshwar Singh,Gurpreet Singh Saini

Paper Title:

Multistage Enhancement of Channel Quality using Channel Estimation Techniques for effective BER/SNR using 16 QAM for Mobile Communication

Abstract:   In this paper we present an improved and robustchannel estimation algorithm for OFDM mobile communication systems based on the use of pilot subcarriers.Specifically we present an iterative channel estimation technique to improve the performance of channel estimators.In iterative receiver structures,soft information becomes available after the decoding stage.This information is used to enhance the quality of the channel estimates for the nextiteration.The low complexity proposed receiver including LMS algorithm, has a higher efficiency than conventional methods(without channel estimation,LS& LMMSE ) and it can work in lower amount of SNRs.We derive a generalized estimator based on the linear minimum mean square error (LMMSE) principle for deterministic pilot information combined with soft information. The performance is presented in terms of Bit-error rate (BER) for a system using 16-quadrature amplitude modulation (QAM).Simulation results validate that the proposed channel estimation scheme can achieve tremendous performance as the existing channel estimation methods.

Keywords:
 Estimation(CE),OFDM(Orthogonal Frequency Division Multiplexing).


References:

1.        H. Sari, G. Karam, and I. Jeanclaude. Transmission  techniques for digital terrestrial TV broadcasting. IEEE Communications Magazine, 33(2):100-109, 1995.
2.        ETSI EN 302 304 Digital Video Broadcasting (DVB); transmission system for handheld terminals (DVB-H).European Telecommunication Standard, November 2004.

3.        Ye. Li, “Pilot-symbol-aided channel estimation for OFDM in wireless  systems,” IEEE Trans. Veh. Technol., vol. 49, no. 4, pp. 1207-1215, 2000

4.        D. K. Borah and B. T. Hart, “Frequency-selective fading channel  estimation with a polynomial time-varying channel model,” IEEE Trans. Commun., vol. 47, no. 6, pp. 862-873, 1999

5.        D. Slock, “Signal Processing challenges for wire- less Communication,” in Proc. 1st Int. Sym. on Control, Communications and Signal Processing, Tunisia, March 21-24 2004, pp. 881–892.

6.        P. Hoeher, S. Kaiser and I. Robertson, “Two di mensional pilot-symbol-aided channel estimation by WienerFiltering,”inProc.IEEEICASSP’97, pp.1845–1848, April 1997.

7.        Ottersten, B., Viberg, M., and Kailath, T., “Performance  Analysis of the Total Least Squares ESPRIT Algorithm,” IEEE Transactions on Signal Processing, vol. 39, pp. 1122–1135, May 1991.

8.        Hou, X., Li, S., Liu, D., Yin, C., and Yue, G., “On Two-dimensional Adaptive Channel Estimation in OFDM  Systems,” 60th IEEE Vehicular Technology Conference, Los Angeles, Ca., vol. 1, pp. 498–502, Sept. 2004.

9.        Sanzi, F., Sven, J., and Speidel, J., “A Comparative Study of Iterative Channel Estimators for Mobile OFDM Systems,” IEEE Transactions on Wireless Communications, vol.2, pp. 849–859, Sept. 2003.

10.     Li, Y., “Simplified Channel Estimation for OFDM  Systems with Multiple Transmit Antennas,” IEEE Transactions on Communications, vol. 1, pp. 67-75, January 2002.

11.     J. J. van de Beek, O. Edfors, M. Sandell, S. K. Wilson, and P.O. Börjesson, “On channel estimation in OFDM systems,” in Proc. IEEE Vehicular Technology Conf., vol. 2, Chicago, IL, July 1995, pp. 815–819.

12.     Coleri, S., Ergen, M., Puri, A., and Bahai, A., “Channel Estimation Techniques Based on Pilot Arrangement in OFDM Systems,” IEEE Transactions on Broadcasting, vol. 48, pp. 223–229, Sept. 2002.

13.     Louis L. Scharf, Statistical Signal Processzng, Addison-Wesley, 1991

14.     Chen, J., C. Chiang and L. Lo, 2007. Iterative Channel  Estimation for MIMO OFDM Systems. Proceeding  of the International Symposium on Intelligent  Signal Processing and Communication Systems, Nov.  28-Dec. 1, IEEE   Xplore Press, Xiamen, pp: 774-777. DOI: 10.1109/ISPACS.2007.4446002.

15.     Qiao, Y., S. Yu, P. Su and L. Zhang, 2005. Research on an iterative algorithm of LS channel estimation in MIMO  OFDM  systems.  IEEE Trans. Broadcast.,51: 149-153. DOI: 10.1109/TBC.2004.842524


194-198

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

48.

Authors:

Er. Ankita, Anand Nayyar

Paper Title:

Review of various PTS (Partial Transmit Sequence) techniques of PAPR (Peak to Average Power Ratio) reduction in MIMO-OFDM

Abstract:   MIMO-OFDM is the most important candidate for wireless communication. The main drawback of this MIMO-OFDM is high PAPR which results in signal distortion and power inefficiency in RF section of transmitter. In this paper we will discuss and compare all the Partial Transmit Sequence (PTS) techniques and conclude that why cooperative PTS is much better than PTS technique.

Keywords:
 PTS (Partial Transmit Sequence), Cooperative PTS, MIMO-OFDM, PAPR, Interleaved partitioning.


References:

1.        Goldsmith Andreas “Wireless Communication” Cambridge University Press 2005 pp.299-318, 367- 370, 417-439.
2.        R. Prasad, OFDM for Wireless Communications System . Artech House, Inc., 2004 pp. 33-51, 119- 153.

3.        Cho Soo Young, Kim Jaekwon “MIMO-OFDM Wireless Communications with MATLAB” Wiley Publication 2010.

4.        Leonard J. Cimini, Jr., Nelson R. Sollenberger, “Peak-to-Average power ratio reduction of an   OFDM signal using partial transmit sequences,”  IEEE Electronic Letters, vol. 4, no. 3, Mar 2000   pp. 88-86.

5.        Sharma Kumar Pankaj et.al, “PAPR REDUCTION   IN MIMO OFDM SYSTEMS USING New PTS”MIT International Journal of Electronics and Communication Engineering Vol.1 No. 2 Aug  2011 pp, 83-87.

6.        Md. Ibrahim Abdullah et.al, “Comparative Study of PAPAR Reduction Techniques in OFDM” vol 1, pp. 264-269, No-8 November (2011).

7.        Wang.L and Liu.J, “ Cooperative PTS for PAPR reduction in MIMO-OFDM” Vol.47, No-5, 3rd  March 2011.

8.        Rani Bharti et.al, “Cooperative PTS for PAPR reduction in SFBC MIMO-OFDM Signal” Vol-3, September-2012, pp-321-327.

9.        Pandurangan Mukunthan et.al, “ Modified PTS with FECs for PAPR Reduction in MIMO-OFDM  System with Different Sub blocks and Sub carriers, International journal of computer science, Vol-8  No-2 July-2011, pp. 444- 452.

10.     Joshi Alok et.al, “ Performance Analysis and  PAPR Reduction of Coded OFDM(with RSCC and Turbo coding) System using modified SLM,PTS and DHT Precoding in fading  environment” Vol-12, January 2013.

11.     Alhasson Hamad Bader et.al, “ PAPR Distribution analysis of OFDM signals in Partial Transmit Sequence. Vol-7 November-2012.

12.     Srinivasarao .K et.al, “ Peak-To-Average Power Reduction in MIMO-OFDM system using Sub-Optimal Algorithm. Vol-3 May 2012.

13.     Jayalath. A.D.S and Tellambura. C,“ Adaptive PTS approach for reduction of PAPR of OFDM  signal” Vol.-36, 6th july 2000.

14.     Han Hee Seung et.al,“PAPR Reduction of OFDM Signals using a Reduced Complexity PTS  Technique” Vol-11, November 2004.

15.     Mata Tanairat et.al, “Proposal of Improved PTS method for STBC MIMO-OFDM in the  non-linear Channel” October 2009.

16.     Foomooljareon. P and W.A.C Fernando, “PAPR Reduction in OFDM Systems” Vol.-7, Sep.-Dec 2002

17.     Singh Sanjay et.al, “Effect Of PAPR  Reduction on the Multicarrier Communication System Performance Parameters” 4th December 2009


199-202

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

49.

Authors:

Ankusha.Biradar, Nagabhushan.Patil

Paper Title:

Implementation of a Hybrid High Power Factor Three-Phase Unidirectional Rectifier

Abstract:   This paper presents a new hybrid three phase rectifier composed by the parallel association of a single switch three phase boost rectifier with a pwm three phase unidirectional rectifier. According to this proposal each rectifier processes about half of the output rated power. The diode rectifier operates at a low frequency and has a higher output power rating Therefore ,the pwm unidirectional rectifier is designed to operate with a small power rating and a high switching frequency. In the proposed scheme,  dsPIC30F2010 controller is used to produce signals. A resistive load(Two incandescent lamps with different watts) are used as load for testing the developed  hardware. Textronics TDS2024B storage oscilloscope is used to store the gate pulses and waveforms. The perfectly sinusoidal input currents with improved power factor can be obtained by this hybrid rectifier.

Keywords:
 Active rectifier, Bridge, IGBT, MOSFETs, passive rectifier, Sensors.


References:

1.        A. Siebert, A. Troedson, and S. Ebner, “AC to DC power conversion now and in the future,” IEEE Trans. Ind. Appl., vol. 38, no. 4, pp. 934–940,Jul./Aug. 2002.
2.        J. W. Kolar and H. Ertl, “Status of the techniques of three-phase rectifier systems with low effects on the mains,” in Proc. Int. Telecommun. Energy Conf., Copenhagen, Denmark, 1999, 16 pp.

3.        J. C. Salmon, “Operating a three-phase diode rectifier with a lowinput current distortion using a series-connected dual boost converter,”IEEE Trans. Power Electron., vol. 11, no. 4, pp. 592–603, Jul.1996.

4.        M. E. Villablanca, J. I. Nadal, and M. A. Bravo, “A 12-pulse AC–DC rectifier with high-quality input/output waveforms,” IEEE Trans. Power Electron., vol. 22, no. 5, pp. 1875–1881, Sep. 2007. [5] B. Singh, S. Gairola, B. N. Singh, A. Chandra, and K. Al-Haddad, “Multipulse AC–DC converters for improving power quality: A review,” IEEE Trans. Power Electron., vol. 23, no. 1, pp. 260–281, Jan.2008.

5.        R. Ghosh and G. Narayanan, “Control of three-phase, four-wire PWM rectifier,” IEEE Trans. Power Electron., vol. 23, no. 1, pp. 96–106, Jan. 2008.

6.        F. A. B. Batista and I. Barbi, “Space vector modulation applied to three-phase three-switch two-level unidirectional PWM rectifier,” IEEE Trans. Power Electron.,
vol. 22, no. 6, pp. 2245–2252, Nov. 2007.

7.        H. Yoo, J. Kim, and S. Sul, “Sensorless operation of a PWM rectifier for a distributed generation,” IEEE Trans. Power Electron., vol. 22, no. 3, pp. 1014–1018, May 2007.

8.        Y. W. Li, B. Wu, N. R. Zargari, J. C. Wiseman, and D. Xu, “Damping of PWM current-source rectifier using a hybrid combination approach,” IEEE Trans. Power Electron., vol. 22, no. 4, pp. 1383–1393, Jul. 2007.

9.        E. H. Ismail and R. W. Erickson, “Single switch 3ϕ low harmonic rectifiers,” IEEE Trans. Power Electron., vol. 11, no. 2, pp. 338–346, Mar.

203-206

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

50.

Authors:

J.Baskaran, P.Pugazhendiran, M.Sujith

Paper Title:

A Novel Digitally Controlled Converter for Renewable Energy Resources

Abstract:   A digital PWM controller for Buck-boost converter is designed using MATLAB-Simulink. The mathematical model of PWM controller is derived to design in MATLAB simulation model. In this Proposed model, the digital PWM controller is used to obtain the positive ouput voltage from the buck boost converter in the range of 101V from the variable input voltage of 50-200V. The proposed model is highly efficient and flexible for all kind of renewable energy conversion methods. In this paper, the basic principles of the proposed digitally controlled Positive buck boost converters are illustrated in detail and also we discussed about the proposed model ouput voltage is employed for DC Motor applications.

Keywords:
 Pulse Width Modulation (PWM) Positive Buck-Boost Converter (PBB), DC motor.


References:

1.       R. W. Erickson and D. Maksimovic, Fundamentals of Power Electronics, 2nd ed. Norwell, MA: Kluwer, 2001.
2.       N. Mohan, T. M. Undeland, and W. P. Robbins, Power Electronics, 2nd ed. New York: Wiley, 2003.

3.       F. L. Luo, “Positive output Luo converters: Voltage lift technique,” Proc. Inst. Elect. Eng.—Elect. Power Appl., vol. 4, no. 146, pp. 415–432, Jul. 1999.

4.       X. Chen, F. L. Luo, and H. Ye, “Modified positive output Luo converter,” in Proc. PEDS Conf., 1999, pp. 450–455.

5.       F. L. Luo and H. Ye, “Positive output super-lift converters,” IEEE Trans. Power Electron., vol. 18, no. 1, pp. 105–113, Jan. 2003.

6.       F. L. Luo and H. Ye, “Positive output multiple-lift push–pull switched capacitor Luo-converters,” IEEE Trans. Ind. Electron., vol. 51, no. 3, pp. 594–602, Jun. 2004.

7.       M. Zhu and F. L. Luo, “Development of voltage lift technique on double output transformerless DC–DC converter,” in Proc. IEEE IECON, 2007, pp. 1983–1988.

8.       M. Zhu and L. Luo, “Implementing of developed voltage lift technique on SEPIC, Cuk and double-output DC–DC converters,” in Proc. IEEE ICIEA Conf., 2007, pp. 674–681.

9.       K. Viswanathan, D. Srinivasan, and R. Oruganti, “A universal fuzzy controller for a non-linear power electronic converter,” in Proc. FUZZ-IEEE Conf., 2002, pp. 46–51.

10.     “A General Approach to Control a Positive Buck-Boost Converter to Achieve Robustness against Input Voltage Fluctuations and Load Changes” Arash A Boora, Student member, IEEE, Firuz Zare, Senior member, IEEE, Gerard Ledwich, Senior member, IEEE, Arindam Ghosh, Fellow, IEEE In PESC 08 : 39th IEEE Annual Power
Electronics Specialists Conference

11.     A.B Arsoy, Y. Liu, P.F. Ribeiro and F. Wang “Static-Synchronous Compensators and Superconducting Magnetis Energy Storage Systems in Controlling Power System Dynamics”

12.     Hyunjae Yoo, Seung-Ki Sul, Yongho Park, and Jongchan Jeong  “System Integration and Power Flow Management for Series Hybrid Electric Vehicle using Super-Capacitors and Batteries” IEEE 2007-10-26

13.     J.M. Timmermans, P. Zadora Y. Cheng, J. Van Mierlo, and Ph. Lataire “Modelling and Design of Super Capacitors as Peak Power Unit for Hybrid Electric Vehicles” IEEE 2005

14.     P. C. Huang, W. Q. Wu, H. H. Ho, and K. H. Chen, “Hybrid buck–boost feedforward and reduced average inductor current techniques in fast linetransient and high-efficiency buck–boost converter,” IEEE Trans. PowerElectron., vol. 25, no. 3, pp. 719–730, Mar. 2010.

15.     K. K. I. Hwu and T. T. J. Peng, “A novel buck–boost converter combiningKY and buck converters,” IEEE Trans. Power Electron., vol. 27, no. 5,pp. 2236–2241, May 2012


207-210

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

51.

Authors:

S. Kumaravel, T. Ramkumar, B.Gurunanam, M. Suresh, K. Dharanirajan

Paper Title:

An Application of Remote Sensing and GIS Based Shoreline Change Studies – A Case Study in the Cuddalore District, East Coast of Tamilnadu, South India

Abstract:   The shoreline is one of the rapidly changing coastal landforms. Shorelines are the key element in coastal GIS and provide the most information on coastal landform dynamics. Therefore, accurate detection and frequent monitoring of shorelines are very essential to understand the coastal processes and dynamics of various coastal features. The present study is to investigate the spatial as well as quantify the shoreline changes along the coast in the parts of Cuddalore district, east coast of Tamil Nadu by using geospatial techniques.  The Survey of India topographic map, multi-temporal Indian Remote Sensing satellite data were used to extract the shorelines. The data is processed and analyzed by software like ERDAS image processing, ArcGIS respectively. The rates of shoreline changes are estimated by overlay analysis by using GIS environment. Due to length of the shoreline, the study area has divided into five segments namely A, B, C, D and E. The study reveals that most of the study area has been undergoing erosion around 3.21km2 for the past four decades except Segment D.  Both natural and anthropogenic processes along the coast modify the shoreline configuration and control the erosion, accretion activities of the coastal zones.

Keywords:
 coastal land forms, dynamics, shoreline, erosion, accretion, coastal zones


References:

1.       Ahmed W, Neil D T (1994) An evaluation of Landsat thematic mapper digital data for discriminating coral reef zonation, heron reef (GPR) [J]. International Journal of Remote Sensing, 15: 2583-2597
2.       Anbarasu K, Baskaran R, Rajamanickam G V (1999) Influence of sea level changes in the development of landforms around Chidambaram, Tamilnadu [J]. Indian Journal of Geomorphology, 4(1&2): 13-18

3.       Boutiba M, Bouakline S (2011) Monitoring shoreline changes using digital aerial photographs, quick-bird image and DGPS topographic survey: Case of the east coast of Algiers, Algeria [J]. European Journal of Scientific Research, 48(3): 361-369

4.       Champati R P K (2000) GIS in  Geoscience. GIS Development [OL]. http://www.gisdevelopment.net/magazine/ gisdev/2000/may/gisg. shtml.

5.       Mani Murali R, Shrivastava D, Vethamony P (2009) Monitoring shoreline environment of Paradip, East coast of India using remote sensing [J]. Current Science, 97(1): 79-84

6.       Chandrasekar N, Immanuel J L (2005) GIS supported categorisation of tsunami experienced beaches along the southern east coast of India: Usage in mitigation activities[C]. Proceedings of the National Seminar on GIS Application in Rural Development, Hyderabad, India

7.       Charatkar (2004) A study of erosion and accretion along Gulf of Khambat, Gujarat coast using remote sensing and GIS[C]. AFITA/WCCA, Joint Congress on Agriculture, Bangkok, Thailand

8.       Desai, P S, Honne Gowda H, Kasturirangan K (2000) Ocean research in India; Perspective for space [J]. Current Science, 87(3): 268-278

9.       Li Ron, Di Kaichang, Ma Ruijin (2001) A comparative study of shoreline mapping techniques[C].The Fourth International Symposium on Computer Mapping and GIS for Coastal Zone Management, Halifax, Nova Scotia, Canada

10.     Makota V, Rose Sallema, Charles Mahika (2004) Monitoring shoreline change using remote sensing and GIS: A case study of Kunduchi Area, Tanzania Western Indian Ocean [J]. J. Mar. Science, 3(1): 1-10

11.     Chandrasekar N, Anil Cherian, Rajamanickam M, et al. (2000) Coastal landform mapping between Tuticorin and Vaippar using IRS-IC data [J]. Indian Journal of Geomorphology, 5(1&2): 114-120

12.     Mujabar S, Chandrasekar N, Immanual J L (2007) Impact of the 26th December 2004 Tsunami along the coast between Kanyakumari and Ovari, Tamilnadu, South India [J]. Shore and Beach, 75(2): 22-29

13.     Nayak S R (2002) Use of satellite data in coastal mapping [J]. Indian Cartographer, 5: 147-157

14.     Wagner T W, Michalek J L, Laurin R (1991) Remote Sensing application in the coastal zone: a case from the Dominician Repulic [R]. Consortium fir International Earth Science Information Network Report, University Center, Michigan


211-215

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

52.

Authors:

A. P. Edlabadkar, Anup P. Ingle

Paper Title:

Work-Study and Design of Material Handling System in Soot Girni

Abstract:   Aim of this research paper is to minimize the processes and cost of the production in soot girni (spinning mill). Work-study is done for the purpose of possible use of man, machine and materials etc. In this soot girni, I have done work-study in carding section for effective use of labor and reduce fatigue of labor .for eliminating the one labor in carding section I need to offsetting the time of carding machine and use of the material handling system. I offset time of the entire carding machine and maintain the smooth flow of drums to the drawing machine. I have given the suggestion of concept of the material handling system to reduce the number of labor. So that, labor cost will reduce and unit cost of the production is reduce.

Keywords:
 material flow, work-study, man-machine char, new material handling process.


References:

1.       S. Chen, B. Mulgrew, and P. M. Grant, “A clustering technique for digital communications channel equalization using radial basis function networks,” IEEE Trans. on Neural Networks, vol. 4, pp. 570-578, July 1993.
2.       J. U. Duncombe, “Infrared navigation—Part I: An assessment of feasibility,” IEEE Trans. Electron Devices, vol. ED-11, pp. 34-39, Jan. 1959.

3.       C. Y. Lin, M. Wu, J. A. Bloom, I. J. Cox, and M. Miller, “Rotation, scale, and translation resilient public watermarking for images,” IEEE Trans. Image Process., vol. 10, no. 5, pp. 767-782, May 2001

4.       Ahkioon, S., Bulgak, A., and Bektas, T. (2009). Integrated cellular manufacturing systems design with production planning and dynamic system reconfiguration. European Journal of Operational Research, 192:414–428.

5.       Baykasoglu, A. (2003). Capability-based distributed layout approach for virtual manufacturing cells. International Journal of Production Research, 41(11):2597–2618.

6.       IRAVANI, S. M. R (2009). Design of a Push      Production assembly) Line. Retrieved        November 13, 2000, from Northwestern University, Department of Industrial Engineering and Management Sciences  
Web site:http://users.iems.northwestern.edu/~iravani//prolab/assembl    y_push.html

216-219

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

53.

Authors:

R. Venkatachalapathy, G. Nandhakumar, P.  Karthikeyan

Paper Title:

Diatoms Community Structure In Relation To Physico-Chemical Factors in Yercaud Lake, Salem District, Tamil Nadu, India

Abstract:  Diatoms are likely to natural conditions in lake and their distribution is mainly governed by the physicochemical composition of the water. Monitoring of water quality with regards to physicochemical parameter is insufficient. Organic indicators of water quality monitoring urbanized during the recent years have served as excellent tools in the area of water pollution studies. Among all the algae, fresh water diatoms are the most commonly used indicators of the conditions of water. Several diatom indices are tested for rivers in other countries, but have not been used for lake water systems. Diatom monitoring studies in India have suffered given that their recognition is difficult and extensive reporting is not accessible mostly. .  Diatoms and water samples were collected in 10 locations during summer season (May 2012). As a result the study aims at applying some of the diatom indices to monitor fresh water lakes of Yercaud city. Three water quality indices and sixteen water chemistry variables were analyzed. 21 diatom species are identified. They are as follows: Amphora ovalis, Bacillaria paxillife, Cyclotella atomus, Cyclotella stelligera, Cymbella tumida, Eunotia curvate, Eunotia pectinalis, Fragilaria rumpens, Frustulia megaliesmontana, Gomphonema lanceolatum, Gomphonema Parvulum, Gomphonema undulatum, Navicula ryhnchocephala, Navicula virudila.  Navicula sigmatifera, Nitzschia microcephala, Nitzschia obtuse, Nitzschia palea, Pinnularia boreanis, syndera ulna, Tabularia tabulate. Fresh water diatoms indices can be applied in water quality monitoring of lakes. Changes in the Diatom of large temperate freshwater lakes have long been recognised as providing a good indicator of the trophic status and environmental quality of the system. To assess the relative importance of environmental influences on diatom assemblages good lake. In this paper we deals with  the current status of the diatom of a Yercaud  lake make comparisons with diatoms  community structure in relation  to physico-chemical factors. Among the physical and chemical variables measured, water pollution, particularly organic contamination and eutrophication, measured from pH, electrical conductivity and total ionic concentration, respectively, appeared to be one of the most important environmental factors determining the composition and structure of species associations in the area studied.

Keywords:
 Freshwater lakes, Environmental quality, Physico-chemical factors.


References:

1.        Biggs BJE., Kilroy C. 2000.  Stream periphyton monitoring manual, New Zealand; NIWA: 226p.
2.        John J. 1981. New Species of freshwater diatoms from Western Australia. Nova Hedwigia 34: 569-576.

3.        John J. 1993. The use of diatoms in monitoring the development of created Wetland at RGC mine site, Capel, Western Australia, Hydrobiologia 269/270:427-436.

4.        Potapova M., Charles D.F. 2003. Distribution of benthic diatoms in U.S. Rivers in relation to conductivity and ionic composition. Freshwater Biology 48 (2):1311-1328

5.        Round FE. 1991. Diatoms in river water monitoring studied. Journal of Applied Phycology 3(1): 129-145.

6.        Dixit, S.S., J.P. Smol, J.C. Kingston, and D.F. Charles. 1992. Diatoms: powerful indicators of environmental change. Environmental Science and Technology 26 (1): 22-33.

7.        Battarbee, R., 1984, Diatom analysis and the acidification of lakes: Phil. Trans. R. soc., Ser. B. v.305, p. 451-477.

8.        Lowe, R., 1974, Environmental requirements and pollution tolerance of freshwater diatoms: Natural Environmental Research Center Office of Research and Development U.S. Environmen¬tal Protection Agency, EPA 670/4-74-005. p. 334.

9.        Davis, R., Norton, S., 1978, Paleolimnologic studies of human impact on lakes in the United States, with emphasis on recent research in New England: Pol. Arch. Hydrobiol. v.25, p. 99-115.


220-222

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

54.

Authors:

Sanjeetha Sara John, P. Anatha Christhu Raj

Paper Title:

Pulse Oximeter using PSoC

Abstract:   A pulse oximeter to measure the oxygen saturation in blood as well as heart rate was developed using PSoC. The method proposed here is to transmit light of two different wavelength through the finger and tissues and to measure the change in absorption intensities. The signals are obtained as photoplethysmograph (PPG) waveforms. The pulse oximeter finds the variations in both the waveforms and calculates the SpO2 and heart rate of an individual. The system developed has a wide clinical application and can be used for patient monitoring and for doing vascular assessment.  It also helps us to explore the use of SOC in medical care devices. An adult SpO2 finger probe nellcor DS100A sensor was used for this project.

Keywords:
 SpO2, oxygen saturation, pulse rate, PPG, PSoC development kit.


References:

1.       Anan Wongjan and Prasit Julsereewong, “Continuous Measurements of ECG and SpO2 for Cardiology Information System”, Proceedings of the IMEC,Vol.2,page no:978-81,March 18 - 20, 2009
2.       Cristian Rotariu, Vasile Manta,“Wireless System for Remote Monitoring of Oxygen Saturation and Heart Rate”,Federated Conference on Computer Science and Information Systems page no: 215–218,2012 .

3.       D.J.R.Kiran Kumar, Nalini Kotnana, “Design and Implementation of Portable Health Monitoring system using PSoC Mixed Signal Array chip”, International Journal of Recent Technology and Engineering (IJRTE) , Vol.1, issue.3,page no.59-65, August 2012

4.       Eun Geun, Hyun Heo,“Measurement site and applied pressure consideration in wrist photoplethysmography” ,23rd international conference on circuits and systems, computer and communications, page no.1129-32,,2009

5.       Jaco Schoevers, Cornie Scheffer, and Ricky Dippenaar ,“ Low Oxygen Saturation Quantification in Human Arterial and Venous Circulation”, IEEE Transactions on Biomedical Engineering, Vol.11,issue.3,page no:846-854, March 2009   

6.       P  Kyriacou, S Powell, R Langford and Jones,“ Investigation of oesophageal photoplethysmographic signals and blood oxygen saturation measurements in cardiothoracic surgery”, Physiological Measurement , Vol.23, page no:533–545, 2002

7.       Roberto Marani, Gennaro Gelao, Anna Gina Perri, “Design and Prototyping of a Miniaturized Sensor for Non-Invasive Monitoring of Oxygen Saturation in Blood”, International Journal of Advances in Engineering & Technology, Vol. 2, issue.1, page no.19-26, Jan 2012.

8.       Sangeeta Bagha, Laxmi Shaw, “ A Real Time Analysis of PPG Signal For Measurement of SpO2 and Pulse Rate” , International journal of computer applications, Vol.36,issue.11,December 2011.

9.       Y. Mendelson, R. J. Duckworth,“A Wearable Reflectance Pulse Oximeter for Remote Physiological Monitoring”, Proceedings of  28th IEEE Annual International Conference New York ,page no:912-915,Aug 30-Sept 3, 2006.

10.     Yitzhak Mendelson. “Pulse Oximetery: Theory and     Application for Noninvasive Monitoring”Clinical Chemistry,Vol 38,issue 9,page no:1601-1609,June 1992.


223-225

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

55.

Authors:

Prajakta D. Phalke, Snehal G. Pote, Sakshi Dhar, Kshitija S. Urane

Paper Title:

Auto Backup with Network Information System

Abstract:   In information technology, Backups have two distinct purposes. The primary purpose is to recover data after its loss, be it by data deletion of corruption. Data loss can be a common experience of computer users. The secondary purpose of backups is to recover data from an earlier time, according to a user-defined data recovery policy, typically configured within a backup application for how long copies of data are required. Though backups popularly represent a simple form disaster recovery, and should be part of a disaster recovery plan, by themselves, backups should not alone be considered disaster recovery. Not all backup systems or backup applications are able to reconstitute a computer system, or in turn other complex configurations such as a computer cluster, active directory servers, or a database server, by restoring only data from a backup. Auto Backup Software is an easy-to-use program designed to automatically backup your critical data to a local disk, the Network neighbourhood or remote FTP servers. Restoring is very easy, you can select files to restore to the original or a new location. Auto Backup Software can do integrated encryption, compression, and can use password protection. You can create self-restoring archives. Flexible backup date and time are specified to backup automatically. You can start backup and restore manually at any convenient time. It is a simple yet powerful backup solution for your business or for your personal needs in a networking environment or on a single machine. Auto Backup Software can work as a Windows NT/2000/XP/2003 service(Only Site License). Multi-threaded backup, restore and transfer engine allows you can start multi-backup and -restoring processes at the same time. You can edit multi-backup tasks at the same time, too. The system tray pop up menu provides for easy access to main functions. NIS is useful for network administrative to manage different clients from one space. NIS support get the screenshot of current screen for a any client on network. Power off the selected client PC. Shut down the PC from Administration PC. Admin can get the processes currently running on client pc and can also kill the unnecessary process running on client pc. It can send a message to particular client or all clients on network.

Keywords:
 Networks Information System(NIS).


References:

1.        "Data Backup and Recovery Based on Data De-Duplication" Guo-Zi Sun (Institute of Computer Technology, Nanjing Univ. of Posts & Telecommunication, Nanjing, China),IEEE, Yu Dong,Dan-Wei Chen and Jie Wei, oct.2010.
2.        “Web log system of automatic backup and remote analysis" Conference Publications. Zhou Hangxia(Coll. of Inf. Eng., China JiLiang Univ., Hangzhou, China), IEEE, Zheng Peng and Yan Yong, oct.2010.

3.        "Based A Self-Adaptive Backup System on Data Integration Mechanism" Xu Wei (Inst. of Computer Technology, Chinese Acad. of Sci., Beijing), IEEE, Wang Min, He Xiang and Xu Lu, Nov. 2008. 

4.        "A Data Backup Method Based on File System Filter Driver" Zhao Zhongmeng(Dept. of Computer Science & Technology, Xi'an Jiaotong Univ., Xi'an, China),IEEE, Yao Hangtian, Dec. 2010

5.        John P. Slone, "Local area network handbook", CRC Press LLC, USA, 2003.

6.        “Distributed data transaction network in client server applications using of M/M(1,b)/1 Markovian models ” Kirubanand,V.B. Palaniammal,S. ,IEEE,DEC 2010.

7.        “The Development of Monitoring Software for Local Area Network” Yuhua Qin, IEEE, June2008.

8.        “Study of security management system based on client/server model” Soon Choul Kim, IEEE,1999.


226-229

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

56.

Authors:

Radhika P. Fuke, M. V. Sarode

Paper Title:

A Novel Approach to Capture Salient Part from JPEG Image

Abstract:   Salient region detection in images is very useful for image processing applications like image segmentation, object detection and recognition. In this paper, an improved approach to detect salient region is presented Using saliency detection technique. Existing saliency detection models are built in the uncompressed domain. Since most images over Internet are typically stored in the compressed domain such as joint photographic experts group (JPEG), we propose a novel saliency detection model in the compressed domain in this paper. The intensity, color, and texture features of the image are extracted in the JPEG bit-stream. Detection of irregular visual patterns in images and in video sequences is useful for a variety of tasks. Detecting suspicious behaviors or unusual objects is important for surveillance and monitoring. Identifying spatial saliency in images is useful for quality control and automatic inspection.

Keywords:
 Compressed domain, image retargeting, joint photographic experts group (JPEG), saliency detection, denoising.


References:

1.       L. Itti, C. Koch, and E. Niebur, “A model of saliency-based visual attention for rapid scene analysis”.
2.       Fan, X., Xie, X., Ma, W.-Y., Zhang, H.-J., and Zhou, H.-Q., \Visual attention based image browsing on mobile devices”.

3.       Liu, H., Xie, X., Ma, W.-Y., and Zhang, H.-J., \Automatic browsing of large pictures on   mobile devices“.

4.       Z. Lu, W. Lin, X. Yang, E. Ong, and S. Yao, “Modeling visual attention’s modulatory aftereffects on visual sensitivity and quality evaluation”.

5.       S. Goferman, L. Zelnik-Manor, and A. Tal, “Context-aware saliency detection”.

6.       X. Hou and L. Zhang, “Saliency detection: A spectral residual approach”.

7.       O. Le Meur, P. Le Callet, D. Barba, and D. Thoreau, “A coherent computational approach to model the bottom-up visual attention”.

8.       S. Avidan and A. Shamir, “Seam carving for content-aware image resizing”.

9.       M. Rubinstein, A. Shamir, and S. Avidan, “Improved seam carving for video retargeting”.

10.     L. Wolf, M. Guttmann, and D. Cohen-Or, “Non-homogeneous content-driven video retargeting”.

11.     Y. Jin, L. Liu, and Q. Wu, “Nonhomogeneous    scaling optimization for realtime image resizing,” Visual Comput., 2010.

12.     Liu, Z., Yan, H., Shen, L., Ngan, K. N., and Zhang, Z., \Adaptive image retargeting using saliency-based continuous seam carving," Optical Engineering 49(1) (2010).

13.     J. Wei, “Color object indexing and retrieval in digital libraries,” IEEE Trans. Image Process., Aug. 2002.


230-232

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

57.

Authors:

Sarisha Satheesan, A. Ilayarajaa

Paper Title:

Proactive Cued Click Points:A Sound Signature Integrated Graphical Password Authentication Mechanism

Abstract:   This system presents an innovative idea that integrates graphical passwords with sound signature. The system encourages the user to select click points from images as their passwords rather than textual words. According to human psychology, one can memorize the click points easily when compared to the textual passwords. The number of click points and the number of images included in the password creation depend upon the user’s choice. Apart from the click points, the system provides sound files that can be integrated to the user’s password. While logging in, the system verifies the click points as well as the sound file. Hence the system provides an efficient method to create more secured passwords which are easier to manage.

Keywords:
 Authentication, Graphical Password, Sound Signaure, Secure Password Creation.


References:

1.       S. Chiasson, R. Biddle, and P. van Oorschot, “A Second Look at the Usability of Click-Based Graphical Passwords,” Proc. ACM Symp. Usable Privacy and Security (SOUPS), July 2007.
2.       S. Chiasson, A. Forget, R. Biddle, and P. van Oorschot, “Influencing Users towards Better Passwords: Persuasive Cued Click- Points,” Proc. British HCI Group Ann. Conf. People and Computers: Culture, Creativity, Interaction, Sept. 2008.

3.       S. Chiasson, A. Forget, E. Stobert, P. van Oorschot, and R. Biddle, “Multiple Password Interference in Text and Click-Based Graphical Passwords,” Proc. ACM Conf. Computer and Comm. Security (CCS), Nov. 2009.

4.       E. Stobert, A. Forget, S. Chiasson, P. van Oorschot, and R. Biddle, “Exploring Usability Effects of Increasing Security in Click-Based Graphical Passwords,” Proc. Ann. Computer Security Applications Conf. (ACSAC), 2010.

5.       S. Chiasson, A. Forget, R. Biddle, and P.C. van Oorschot, “User Interface Design Affects Security: Patterns in Click-Based Graphical Passwords,” Int’l J. Information Security, vol. 8, no. 6, pp. 387- 398, 2009.

233-236

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

58.

Authors:

S. Kumaravel, B.Gurugnanam, M.Bagyaraj, S. Venkatesan, M.Suresh, K.Dharanirajan

Paper Title:

Monitoring Land Cover Changes in the Parts of East Cost of Tamilnadu and Pondicherry Union Territory Using Geospatial Technology

Abstract:   Monitoring decade changes of land use / land cover using multi-temporal remotely sensed data provides an effective and accurate evaluation of human impact on the environment. Agriculture, tourism and industrial activities are the key elements of study area social structure and economy. The main objective of this study was to monitor land-cover changes in this area using multi-temporal Indian Remote Sensing Satellite data acquired in the year 2000 and 2011. Temporal changes were determined using supervised classification with limited field validation. The results showed that this area involves twelve land cover classes were built-up land, crop land, fallow land, plantation, land with/without scrub, sandy area, waste land and water bodies of canal, river; tank and water logged areas. During the study period, around 67% of land cover features were not changed.  However, overlay analysis shows that land cover features of built-up land and crop land were increased their areal extent. Moreover, land use classes of fallow land and land without scrub was reduced their area of 11 from 14.61 and 2 from 2.86km2 respectively.

Keywords:
 Land use /land cover, Change detection, Satellite remote sensing, GIS, supervised classification.


References:

1.        Ademiluyi IA, Okude AS, Akanni CO, (2008), an appraisal of land use and land cover mapping.  In Nigeria. African Journal of Agricultural Research 3(9), pp. 581- 586.
2.        Bruzzone, L., & Prieto, D. F. (2002). An adaptive semi parametric and context-based approach to unsupervised change detection in multi-temporal remote sensing images. IEEE Transactions on Image Processing, 11(4), 452–466.

3.        Campbell, J. B. (1987). Introduction to remote sensing. The Guilford Press.

4.        Chauhan HB, Nayak S, (2005), Land use/ cover changes near Hazira region, Gujaratusing Remote Sensing Satellite data. Journal of the Indian society of Remote Sensing 33(3), pp. 413-420.

5.        Dietzel, C., Martin, H., Hemphill, J.J., Clarke, K.C., 2005.Spatio-temporal dynamics in California’s Central Valley: empirical links to urban theory. International Journal of Geographical Information Science 19 (2), 175–195.

6.        Geymen, A., Baz, I., 2008. The potential of remote sensing for monitoring land cover changes and effects on physical geography in the area of Kayisdagi Mountain and its surroundings (Istanbul). Environmental Monitoring and Assessment 140 (1–3), 33–42.

7.        Herold, M., Goldstein, N.C., Clarke, K.C., 2003. The spatial - temporal form of urban growth: Measurement, analysis and modeling. Remote Sensing of Environment 86 (3), 286–302.

8.        Lillesand, T. M., & Kiefer, R. W. (1994). Remote sensing and image Interpretation / Thomas M. Lillesand, Ralph W. New York: Kiefer Wiley & Sons.

9.        Lu, D., Mausel, P., Brondízio, E., Moran, E., 2004. Change detection techniques. International Journal of Remote Sensing 24 (12), 2365–2407.

10.     Lu, D., Batistella, M., Mausel, P., Moran, E., 2007. Mapping and monitoring land degradation risks in the Western Brazilian Amazon using multi-temporal Landsat TM/ETM+ images. Land Degradation and Development 18, 41–54.

11.     Maktav, D., Erbek, F.S., 2005. Analysis of urban growth using multi-temporal satellite data in Istanbul, Turkey. International Journal of Remote Sensing 26 (4), 797–810.

12.     Marcal ARS, Borges JS, Gomes JA, Pinto Da Costa JF, 2005, Land Cover update by Supervised classification of segmented ASTER images. International Journal of Remote Sensing, 26(7), pp. 1347–1362.

13.     Masek, J.G., Lindsay, F.E., Goward, S.N., 2000. Dynamics of urban growth in the Washington DC Metropolitan area, 1973–1996, from Landsat observations. International Journal of Remote Sensing 21, 3473–3486.

14.     Nobi EP, Umamaheswar R, Stella C, Thangaradjou T, (2009), Land Use and Land Cover Assessment along Pondicherry and its Surroundings Using Indian Remote Sensing Satellite and GIS, American Eurasian Journal of Scientific Research 4, pp. 54-58.

15.     Raju K, Anil Kumar R, (2006), Land use changes in Udumdbanchola taluk, Idukki District Kerala: An analysis with the application of remote sensing data. Journal of the Indian society of Remote Sensing, 34(2), pp. 161-169.

16.     Singh, A., 1989. Digital change detection techniques using remotely sensed data. International Journal of Remote Sensing 10, 989–1003.

17.     Stow, D. A. (1999). Reducing mis-registration effects for pixel-level analysis of land-cover Change. International Journal of Remote Sensing, 20, 2477–2483.

18.     Thomas, I. L., Benning, V. M., & Ching, N. P. (1987). Classification of remotely sensed images. Bristol: Adam Hilger.


237-240

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

59.

Authors:

Sourav Roy, Amitava Choudhury, Joydeep Mukherjee

Paper Title:

An Approach towards Detection of Indian Number Plate from Vehicle

Abstract:   Vehicle number plate recognition is the most interesting and challenging research topic from past few years. It is shown that the number plates are different shape and size and also have different color in different countries. In India the most common vehicle number plate used yellow or while as background and black used as foreground color. In this paper we proposed a system to localization of number plate mainly for the vehicles in West Bengal (India) and segmented the numbers as to identify each number separately. This paper presents an approach based on simple and efficient morphological operation and sobel edge detection method. We also presents a simple approach to segmented all the letters and numbers used in the number plate. After reducing noise from the input image we try to enhance the contrast of the binarized image using histogram equalization. We mainly concentrate on two steps; one is to locate the number plate and second is to segment all the number and letters to identify each number separately. The project develops by using MATLAB7.4.0.

Keywords:
 Number plate localization, Morphological operation, Character segmentation, Thresholding, Edge detection.


References:

1.       Deniing Jiang, Tulu Muluneh Mekonnen, Tiruneth Embiale,Ashenafi Gebrehiwot  “Car Plate Recognition System”      in Fifth internation conference on Intelligent Networks and Intelligent Systems, IEEE, 978-0-7695-4855-5/12 2012.
2.       Huili Han, Runping Han “Method of License plate Location Based on Edge Detection and Color Information”, IEEE, 978-1-4577-1701-7/11, 2011, pp1477-1480.

3.       Ch. Jaya Lakshmi, Dr A.Jhansi Rani, Dr. K. Sri Ramakrishna, M.Lantikiran, V.R. Siddhartha,”A novel Approach for Indian License Plate Recognition System”, IJAEST, Vol 2 Issue I, 2011, pp 010-014.

4.       Shokri Gendy, Clifton L.Smith, Stefan Lachowicz, “Automatic Car registration Plate Using Fast Hough Transform”, IEEE,  0-7803-3913-4-9/97,1997, pp 209-218

5.       P.Anishiya, Prof.S.M ary Joans,”Number Plate Recognition for Indian Cars Using Morphological Dilation and Erosion with the Aid Of OCRs”, IACSIT,vol.4, 2011, pp 115-119

6.       Phalgun Pandya, Mandeep Singh, “Morphology based Approach to Recognize Number Plates in India”, IJSCE, vol.1, issue 3, 2011, pp107-112.

7.       Thota Sridevi, Chilukuri Sindhu, Pendyala Naga Praveen Kumar, Perupogu.Sagar, “Morphology based Number Plate Localization for Vehicular Surveillance System”, IJMER, vol.2, issue.2, 2012, pp 334-337.

8.       Seyad Hamidreza Mohades Kasaei, Seyad Mohammadreza Mohades Kasaei, “Extraction and Recognition of the vehicle License Plate for passing Under Outside Environment”, IEEE, pp 234-237

9.       Zhigang Xu, Honglei Zhu, “An Efficient Method of Locating Vehicle Licence Plate”, 3rd International conference on Natural Computetion, IEEE, 0-7695-2875-9/07, 2007.

10.     Hanchuan Peng, Fuhui Long, Zheru Chi,”Document Inage Recognition Based on Template Matching of Component Block Projection”, IEEE Transactions ON pattern Analysis and machine Intelligence, vol 25, No9 september 2003.

11.     R. C. Gonzalez, and R. E. Woods and S.I.Eddins Digital Image Processing using MATLAB.Pearson Education, 2008.


241-244

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

60.

Authors:

Renganthan.B, Vinothini.K, Chinnadurai.S

Paper Title:

A Smart Wireless Home Maneuver for Indoor Blind Pedestrians via Indoor Positioning System

Abstract:   In recent times lots of assisting and navigating device were introduced to help the physically challenged person to make their life to be comfortable. When it comes to the blind people, the main concern is about their guidance in both the indoor and outdoor environment to avoid object collision. Basically they were guided by either by the alarm or beep sound when the object is interrupted on their way. What is the name of the object they could face? Whether it is a safe or unsafe? The above two issues is the major problem in assisting a blind person. To overcome this safety problem voice based assistance is provided to blind person in order to identify the objects which interrupt their way. The current location of the indoor environment is preloaded by geo tagging method. And zigbee protocol and digital compass is used to identify the current location of the blind person and adapt to their movement.

Keywords:
 Inertial, Geo-tagging, Haptics, Maneuver, Zigbee.


References:

1.       Da Silva Cascalheira, M. Inst. de Telecomun., Univ. de Aveiro, Aveiro,Portugal Pinho, P. ;  Teixeira, D. “ Indoor guidance system for the blind and the visually impaired”  Volume: 6  , Issue: 10 .
2.       DimitriosDakopoulos and Nikolaos G. Bourbakis, Fellow “Wearable Obstacle Avoidance Electronic Travel Aidsfor Blind: A Survey”,  IEEE transactions on systems, man, and cybernetics—part c: applications and reviews, vol. 40, no. 1, january 2010 25.

3.       Ertan.S, C. Lee, A. Willets, H. Tan, and A. Pentland, “ A wearable haptic navigation guidance system,” IEEE 2nd Int. Symposium on Wearable Computers, 1998.

4.       Gupta, B.K. Acharya, B.M. ;  Mishra, M.K. “Optimization of routing algorithm in wireless mesh networks” Date of Conference: 9-11 Dec. 2009.

5.       Hirahara, Y. Dept. of Electr. Eng., Tokai Univ., KanagawaSakurai, Y. ;  Shiidu, Y. ;  Yanashima, K. ;  Magatani, K. “Development of the navigation system for the
visually impaired by using white cane”Date of Conference: Aug. 30 2006-Sept. 3 2006.

6.       Mahmoud Al-Qutayri, JeedellaJeedella and Majid Al- hamsi Dept. of Electronic Engineering, College of Engineering Khalifa University Sharjah, UAE “An Integrated Wireless Indoor Navigation System for Visually Impaired “.

7.       M. Al-Qutayri and J. Jeedella, “Smart Homes: Technologies and Challenges,” Int. Journal of Computer Aided Engineering and Technology, Vol.2, Nos.2/3, pp.125-144. (2010).

8.       Manh Hung V. Le  DimitrisSaragas Nathan Webb.”Indoor Navigation System for Handheld Devices” October 22, 2009 .

9.       Ran.L, A. Helal, and S. E. Moore, “Drishti: An Integrated Indoor/Outdoor Blind Navigation System and Service”, In Proceeings of the 2nd IEEE Annual Conference on Pervasive Compuing and Communications (PerCom.04), pp. 23-30, 2004.

10.     Takatori, N.; Nojima, K.; Matsumoto, M.; Yanashima, K.; Magatani K “Development of voice navigation system for the visually impaired by using IC tags”. 28th Annual International Conference of the IEEE on Bioengineering , Digital Object Identifier:  10.1109/IEMBS. 2006.260437 “:  2006.


245-248

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

61.

Authors:

Jishmi Jos Choondal, C. Sharavanabhavan

Paper Title:

Design and Implementation of a Natural User Interface Using Hand Gesture Recognition Method

Abstract:   This paper presents a system which is capable of communicating PC using natural gestures. This system integrates the physical surroundings of a person with real time computer generated information. It creates an enhanced perception of the surrounding environment. To achieve this, a Natural User Interface is designed and implemented by using vision Based hand gesture recognition method. It should be capable of tracking the hand gestures and provides a feedback according to the recognized gesture. The user will be able to use his/her hand movements in order to control the operations which are usually carried out with a mouse. According to different hand movements, the system will respond and carry out the respective operations that are available. Here the natural gestures are recognized through analyzing the image frames from the web camera which is focused to the computer monitor. And it relies on a user being able to carry out relatively natural motions, movements or gestures that they quickly discover and control the computer application or manipulate the on-screen content. This system provides an efficient way of communication with PC.

Keywords:
 Hue Saturation Value color space, Human computer interface, Natural user interface, Vision based hand gesture recognition


References:

1.       A. BellarbiI, S. Benbelkacem, N. Zenati-Henda, M. Belhocine, “Hand Gesture Interaction Using Color-Based Method For Tabletop Interfaces”, IEEE 2011.
2.       A. Downey, J. Elkner, and C. Meyers, “How to think like a computer scientist: Learning with python,” Green Tea Press, Wellesley, Massachusetts,2008.

3.       A. Gupta and K.A. Pati, “Finger Tips Detection and Gesture Recognition”, Indian Institute of Technology Kanpur, 2009.

4.       A. Sepehri, Y. Yacoob, and L. S. Davis, “Employing the hand as an interface device,” Journal of Multimedia, 2006.

5.       B. Ionescu and D. Coquin, “Dynamic hand gesture recognition using the skeleton of the hand,” EURASIP Journal on Applied Signal Processing, 2005.

6.       B. Zhang, R. Yun, and H. Qiu, “Hand gesture recognition in natural state based on rotation invariance and opencv realization”, Digital Entertainment Research Center, Nanjing Normal University, 2010.

7.       E. Tamaki, “A robust and accurate 3d hand posture estimation method for interactive systems”. Graduate School of Interdisciplinary Information Studies, University of Tokyo, 2010.

8.       G. Bradski and A. Kaehler, “Learning opencv: Computer vision with the opencv library,”O’Reilly Media, 2008.

9.       J. V. Yoon and J. K. Min, “Enhancing hand gesture recognition using fuzzy clustering based mixture of experts model.”, Yonsei University,134 Shinchon-dong.

10.     M. Billinghurst, “Gesture-based interaction”, Buxton, 2011.

11.     M. Porta, “Vision-based user interfaces: methods and applications,” International Journal of Human-Computer Studies, 2002.

12.     “Open CV Reference Manual”, Release 2.4.3, November 2012.

13.     P. Garg and N. Aggarwal, “Vision based hand gesture recognition.”, World Academy of Science, Engineering and Technology, 2009.

14.     Siddharth S. Rautaray1, Anupam Agrawal, “Real Time Hand Gesture Recognition System for Dynamic Applications”, International Journal of Ubicomp, Vol.3, No.1, January 2012.

15.     Utarakash, “Tracking colored objects in opencv”, 2010.


249-254

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

62.

Authors:

D.Sushma Deevi, G.S.Ajay K Reddy, Narendra Babu

Paper Title:

Geostatistical and Fuzzy C-Mean Clustering For Extraction of White Matter

Abstract:   IMAGE technology allows medical researchers to observe details and to match morphological changes in the physical structure of the brain to changes in neurological and neuropsychiatric function such as cognitive performance over time. Following a vascular model, long-term changes in the vascular structure of the brain may appear as white matter lesions (WMLs) in cortical and sub cortical regions, which may directly or indirectly impact on brain functionality. White matter changes (lesions) are often seen in elderly people.  Detection of white matter changes of the brain using magnetic resonance imaging (MRI) has increasingly been an active and challenging research area in computational neuroscience. There have rarely been any single image analysis methods that can effectively address the issue of automated quantification of neuroimages, which are subject to different interests of various medical hypotheses. Experimental results on MRI data have shown that the proposed image analysis methodology can be applied as a very useful computerized tool for the validation of our particular medical question, where white matter changes of the brain takes place in the people. This paper presents new clustering methods to separate the white matter from the brain image by using clustering techniques. First the MRI brain image is segmented, and the computational models of fuzzy c-means clustering, the effect geostatistics and the combined models of both the clustering techniques are obtained by fusion. There by, increasing the accuracy and time processing is decreased.

Keywords:
 Fuzzy clustering, geostatistics, image egmentation, information combination, magnetic resonance imaging (MRI), white matter changes.


References:

1.        www.cse.unr.edu/~bebis/CS365/FuzzyLogic.pdf
2.        www.calvin.edu/~pribeiro/othrlnks/Fuzzy/home.htm

3.        www.rabbitmq.com/clustering.html

4.        www.norusis.com/pdf/SPC_v13.pdf

5.        www.norusisanalysis.com/pdf/SPC_v13.pdf


255-258

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

63.

Authors:

Bhushan K. Suryawanshi, Prajitsen G.Damle

Paper Title:

Review of Design of Hybrid Aluminum/ Composite Drive Shaft for Automobile

Abstract:   This topic deals with the study of replacement of conventional two-piece steel drive shafts with one-piece automotive hybrid aluminum/composite drive shaft & was developed with a new manufacturing method, in which a carbon fiber epoxy composite layer was co-cured on the inner surface of an aluminum tube rather than wrapping on the outer surface to prevent the composite layer from being damaged by external impact and absorption of moisture. Replacing composite structures with conventional metallic structures has many advantages because of higher specific stiffness and higher specific strength of composite materials. By considering the thermal residual stresses of the interface between the aluminum tube and the composite layer, the optimum stacking sequence is calculated with the help of Finite element analysis. Press fitting method for the joining of the aluminum/composite tube and steel yokes was devised to improve reliability and to reduce manufacturing cost, compared to other joining methods such as adhesively bonded, bolted or riveted and welded joints. The joining of the aluminum - composite tube and steel yoke with improved reliability and optimum manufacturing cost is done by press fitting. In order to increase the torque transmission capacity protrusion shape is provided on the inner surface of steel yoke which will fit on Universal joints.                                                        

Keywords:
 Drive shaft, composite material, Aluminum / composite drive shaft design. Press fitted Joints, Static Torque.


References:

1.        D. G. Lee , H. S. Kim, J. W. Kim, J. K. Kim - Design and manufacture of an automotive hybrid aluminum/composite drive shaft, Composite Structures 63 (2004) Page: 87–99.
2.        Hak Sung Kim, Dai Gil Lee - Optimal design of the press fit joint for a hybrid aluminum/composite drive shaft, Composite Structures 70 (2005) Page: 33–47.

3.        M.A. Badie, E. Mahdi, A.M.S. Hamouda- An investigation into hybrid carbon/glass fiber reinforced epoxy composite automotive drive shaft. 32 (2011) 1485 -1500.

4.        Mahmood M. Shokrieh a - Shear buckling of a composite drive shaft under torsion, Composite Structures 64 (2004) Page: 63–69.

5.        D. H. Cho, D. G. Lee - Manufacture of one-piece automotive drive shafts with aluminum and composite materials, Composire Structures Vol. 38, No. l-4, pp. 309-319, 1997.

6.        T. Rangaswamy, S. Vijayarangan - Optimal Sizing and Stacking Sequence of Composite Drive Shafts, Material Science Vol. 11, No. 2. 2005.

7.        D. Yuan, Qiang Liang and Xihong Zou - Design on Torsion Test-bed of Automobile Drive Shaft, Mechanical Research and Application, Vol. 19 No. 1 (2006) Page: 50.

8.        Dai Gil Lee, Chang Sup Lee, Hak Gu Lee, Hui Yun Hwang, Jong Woon Kim - Novel applications of composite structures to robots, machine tools and automobiles, Composite Structures 66 (2004) Page: 17–39.

9.        S.A. Mutasher - Prediction of the torsional strength of the hybrid aluminum/composite drive shaft, Materials and Design 30 (2009) Page: 215–220.


259-266

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

64.

Authors:

Gaurav Kumar, Kunwar Pal, Dilbahar Singh

Paper Title:

Change in the Key Expansion Function of AES

Abstract:   This paper contains the new changes in key expansion function in Advanced Encryption Standard (AES). AES is vulnerable of various attacks theoretically. All the functions for substitution permutation and confusion-diffusion are applied only in the main part of the algorithm but there is no prefect security for the key expansion function. The related key attack, related sub keys attack and long biclique with meet in the middle attacks are applied on AES because of the weak key expansion function. Authors of AES accepted that the key expansion function of AES is comparatively weak. Here we are trying to remove the weaknesses of AES by changing some basic functions of AES key expansion function. For the security of related key attack and related sub keys attack, we are adding some new function for security of the key expansion. We are changing the Rcon matrix into an Rvar matrix by using given key. This will increase security of AES.

Keywords:
 AES, Key Expansion Function, Rcon Matrix, Rvar Matrix, SSL, Encryption/Decryption, Security.


References:

1.       Shannon, (1949) “Communication Theory of Secrecy Systems,” Bell System Technical Journal, vol. 28, pp. 656-715.
2.       Daemen Joan and Rijmen Vincent (2010) “The First 10 Years of Advanced Encryption”, IEEE Security & Privacy 8(6), pp. 72-74.

3.       FIPS Publication (2001) “Advanced Encryption Standard”, NIST (2001).

4.       Biham Eli (1994) “New Types of Cryptanalytic Attacks Using Related Keys”, in Workshop on the Theory and Application of Cryptographic Techniques Lofthus, Norway, EUROCRYPT ’93, May 23–27, pp. 398-409.

5.       Daemen, J., Knudsen, L.R., Rijmen, V. (1997) “The Block Cipher SQUARE”, In Biham, E., ed.: Fse. Volume 1267 of Lecture Notes in Computer Science, Springer,pp. 149–165.

6.       Ferguson N., Kelsey J., Lucks S., Schneier B., Stay M., Wagner D., Whiting D. (2000) “Improved Cryptanalysis of Rijndael”, In Schneier B., ed. FSE. Volume 1978 of Lecture Notes in Computer Science, Springer pp. 213–230.

7.       Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger (2011) “Biclique Cryptanalysis of the Full AES”, in ASIACRYPT 2011. pp 344-371.

8.       Biryukov Alex, Dunkelman Orr, Keller Nathan, Khovratovich Dmitry, and Shamir Adi (2009) “Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds”, Cryptology ePrint Archive: Report 2009/374, August 2009.

9.       Takahashi J., Fukunaga T. and Yamakoshi K. (2007) “Differential Fault Analysis on the AES Key Schedule”, in Proceedings of 4th International Workshop on Fault
Detection and Tolerance in Cryptography, FDTC, 2007, Springer, pp. 62–72.

10.     Thomas Roche, Victor Lomne and Karim Khalfallah (2011)  “Combined Fault and Side-Channel Attack on Protected Implementations of AES”, in 10th IFIP WG 8.8/11.2

11.     Demirci H., Taskin I., Coban M., Baysal A. (2009) “Improved Meet-in-the-Middle Attacks on AES” In Roy, B.K., Sendrier, N., eds.: Indocrypt. 5922 of Lecture Notes in Computer Science, Springer, pp.144–156.

12.     Biham E. and Keller N. (2000) “Cryptanalysis of Reduced Variants of Rijndael”, technical report, Computer Science Department, Technion – Israel Institute of Technology.

13.     Patrick Derbez, Pierre-Alain Fouque, Delphine Leresteux (2011) “Meet-in-the-Middle and Impossible Differential Fault Analysis on AES”, in 13th International Workshop, Nara, Japan, September28–October1, 2011.  pp 274-291.

14.     Gilbert H. and Minier M. (2000) “A Collision Attack on 7 Rounds of Rijndael”, In AES Candidate Conference, pp. 230–241.

15.     Alex Biryukov and Dmitry Khovratovich.(2009); Related-key cryptanalysis of the full AES-192 and AES-256. In ASIACRYPT'09, Springer, pp. 1-18.

16.     E. Biham and A. Shamir (1997) “Differential Fault Analysis of Secret Key Cryptosystems”, in Advances in Cryptology, Crypto 1997; LNCS 1294.


267-269

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

65.

Authors:

Dilbahar Singh, Sumit Kumar Yadav, Gaurav Kumar

Paper Title:

Data Migration between Crossbreed Platform Using Ant Colony Optimization

Abstract:   In this fast moving world of digitization, cloud computing is becoming an essential part of the daily life if you are somewhat related to the business. Keeping the data secure on the server has become one of the major issues. With the increase in the time factor cloud services has become one the most challenging environment in this world. To overcome this problem cloud computing has emerged into the world but it is quite expensive. Now the problem is if you want to transfer the data along with its architecture from one server to another, it is important to keep the data secure and safe until and unless it reaches to the server end. Cross platform data transfer has been an issue from the last few decades. It has been seen that each and every platform uses different types of protocol for the architecture. In this paper we are proposing a technique for migration of the platform architecture along with the data with perfect accuracy to another cloud platform using Simple Object Access Protocol (SOAP) and Ant Colony Optimization (ACO) concept in Role-Based Access Control System (RBAC) will take a lot of effort due to the sophisticated architecture of a system protocol. This may lead to a new era in the cloud computing.

Keywords:
 Ant Colony Optimization, Cloud Computing, Migration of Platform Architecture with data, Role-Based Control System, Simple Object Access Protocol


References:

1.       Sudipto Das, Shoji Nishimura, Divyakant Agrawal, Amr El Abbadi, “      Live Database Migration for Elasticity in a Multitenant Database for Cloud Platforms”, UCSB Computer Science Technical Report 2010-09.
2.       Mohammad Hajjat, Xin Sun, Yu-Wei Eric Sung, David Maltz, Sanjay Rao, Kunwadee Sripanidkulchai, and Mohit Tawarmalani, "Cloudward Bound: Planning for Beneficial Migration of Enterprise Applications to the Cloud”, IJSC VOL 2 ,2011.

3.       Aaron J. Elmore Live Migration in Shared Nothing Databases for Elastic Cloud vol 1 2011.

4.       Flavio Lombardi, Roberto Di Pietro, “Secure virtualization for cloud computing,” ELSEVIER 2010.

5.       Chaim Fershtman and Neil Gandal, " Migration to the Cloud Ecosystem: Ushering in a New Generation of Platform Competition Forthcoming,” COMMUNICATIONS & STRATEGIES, no. 85, 1st Q. 2012.

6.       Ratan Mishra and Anant Jaiswal, “Ant colony Optimization: A Solution of Load Balancing in Cloud,” International Journal of Web & Semantic Technology (IJWesT) Vol.3, No.2, April 2012.

7.       Pat gelsinger, “Hybrid Cloud Data Migration,” Amazon journal 2012.

8.       Jayson Tom Hilter, “Elastic Migration of the cloud for security enhancement,” EC2 Journals.

9.       Linan Zhu, Qingshui Li, and Lingna He, “ Study on Cloud Computing Resource Scheduling Strategy Based on the Ant Colony Optimization Algorithm,” IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 5, No 2, September 2012.

10.     Vipul Snehadeep Chawathe, “ACO based Mining of a Cloud Data Center,” International Journal of Engineering Research and Development Volume 2, Issue 3 (July 2012), PP. 65-68.


270-273

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

66.

Authors:

Naga Lakshmi, Raja Sekhara Rao, Sai Satyanarayana Reddy

Paper Title:

An Overview of Preprocessing on Web Log Data for Web Usage Analysis

Abstract:   Web has been growing as a dominant platform for retrieving information and discovering knowledge from web data. Web data is stored in web server log files. Web usage analysis or web usage mining or web log mining or click stream analysis is the process of extracting useful knowledge from web server logs, database logs, user queries, client side cookies and user profiles in order to analyze web users’ behavior. Web usage analysis requires data abstraction for pattern discovery. This data abstraction can be achieved through data preprocessing. This paper presents different formats of web server log files and how web server log data is preprocesses for web usage analysis.

Keywords:
 Web server logs, Web usage analysis, preprocessing, data cleaning, user identification, session identification, path completion, pattern discovery, pattern analysis.


References:

1.        Robert Cooley, Bamshad Mobasher, Jaideep Srivastava, “Grouping Web page references into transactions for mining World Wide Web browsing patterns”,  1997.
2.        Robert Cooley, Bamshad Mobasher,  Jaideep Srivastava, “Data preparation for mining World Wide Web browsing patterns”, 1999.

3.        Jaideep Srivastva, Robert Cooly, Mukand Deepande, Pang-MingTan ,  “Web Usage Mining : Discovery and Applications of usage Patterns from Web Data “ , 2000

4.        Drott, M. C, “Using Web Server Logs to Improve Site Design”. Association for Computing Machinery (ACM) Proceeding of the Sixteenth Annual International Conference on Computer Documentation, 1998, pp. 43 – 50.

5.        Navin Kumar Tyagi, A.K. Solanki & Sanjay Tyagi, “An Algorithmic Approach to Data Preprocessing in Web Usage Mining”, International Journal of Information Technology and Knowledge Management, July-December 2010, Volume 2, No. 2, pp. 279-283

6.        Jaideep Srivastava, Robert Cooley, Mukund Deshpande, and Pang-Ning Tan, “Web usage mining: Discovery and applications of usage patterns from Web data”, SIGKDD Explorations, 2000, Vol.1.pp. 12-23

7.        Navin Kumar Tyagi, , A. K. Solanki and Manoj Wadhwa, “ Analysis of Server Log by Web Usage Mining for Website Improvement”,  International Journal of Computer Science Issues (IJCSI), Jul2010, Vol. 7 Issue 4, p17, 2010

8.        Yan Li, Boqin FENG and Qinjiao MAO, “Research on Path Completion Technique in Web Usage Mining”, International Symposium on Computer Science and Computational Technology, IEEE, 2008.

9.        Yan Li and Bo-qin FENG “The Construction of Transactions for Web Usage Mining”, International Conference on Computational Intelligence and Natural Computing, IEEE, 2009.

10.     Karuna P. Joshi, Anupam Joshi and Yelena Yesha, “On using a Ware-house to Analyze Web Logs. Distributed and Parallel Databases, 13(2): pp. 161-180, 2003.

11.     Eleni Stroulea Nan niu and Mohammad El-Ramly., “Understanding Web Usage for Dynamic Web Site Adaptation” A Case Study in Proceedings of Fourth International Workshop on Web Site Evolution (WES, 02). Pages: 53-64, IEEE, 2002.

12.     A.Banarjee and J.Ghosh, "Clickstream Clustering using Weighted Longest Common Subsequences" , in Proceedings of the Web Mining Workshop at the 1st SIAM Conference on Data Mining, 2001.

13.     Jeffery Heer and Edti. Chi, "Mining the Structure of User Activity using Cluster Stability", in Proceeding of the Workshop on Web Analytics, Second SIAM Conference
on Data Mining. ACM press, 2002.

14.     Internet: Hypertext Transfer Protocol Overview, http://www.w3.org/Protocols/, http://www.w3.org/Protocols/rfc2616/rfc261 6-sec1.html, 1995.

15.     Jaideep Srivastava, Robert Cooley, Mukund Deshpande, Pang-Ning Tan,"WebUsage Mining: Discovery and applications of usage patterns from Web data", 2000.


274-279

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

67.

Authors:

I.D.Soubache, P.Ajay-D-Vimal Raj

Paper Title:

Unified Particle Swarm Optimization to Solving Economic Dispatch

Abstract:   This paper proposes the solution for economic dispatch (ED) problem of thermal plants using unified particle swarm optimization (UPSO) method. The proposed optimization technique can take care of economic dispatch problems involving constraints such as transmission losses, power balance and generation capacity. The feasibility of the proposed method is demonstrated for three units and six units system, and is compared with Particle Swarm Optimization (PSO) and Genetic Algorithm (GA) methods in terms of the solution quality and computation efficiency. Compared with the other existing techniques, the proposed algorithm has been found to perform better in a number of cases. The experimental results show that the proposed UPSO method was indeed capable of obtaining higher quality solutions efficiently in ED problems.

Keywords:
 Unified Particle Swarm Optimization (UPSO), Economic Dispatch (ED), Particle Swarm Optimization (PSO), Genetic Algorithm (GA).


References:

1.       B. H. Chowdhury and S. Rahman, “A review of recent advances in economic dispatch,” IEEE Trans. Power Systems, vol. 5, no. 4, pp. 1248–1259, Nov. 1990.
2.       A. J. Wood and B. F. Wollenberg, Power generation operation and control, 2nd ed. John Willy and Sons, 1996.

3.       Z. X. Liang and J. D. Glover, “A zoom feature for a dynamic programming solution to economic dispatch including transmission losses”, IEEE Trans. on Power Systems, vol. 7, no. 2, pp. 544-550, May 1992.

4.       P. H. Chen and H. C. Chang, “Large Scale Economic Dispatch by Genetic Algorithm”, IEEE Trans. on Power Systems, vol. 10, no. 4, Nov. 1995.

5.       A. Bakirtzis, V. Petridis, and S. Kazarlis, “Genetic algorithm solution to the economic dispatch problem,” Proc. Inst. Elect. Eng.–Gen., Transm. Dist., vol. 141, no. 4, pp. 377–382, July 1994.

6.       K. P. Wong and Y. W. Wong, “Genetic and genetic/simulated — Annealing approaches to economic dispatch,” Proc. Inst. Elect. Eng., pt. C, vol. 141, no. 5, pp. 507–513, Sept. 1994.

7.       D. N. Simopoulos, S. D. Kavatza and C. D. Vournas, “Unit commitment by an enhanced simulated annealing algorithm,” IEEE Trans. on Power Systems, vol. 21, No. 1, Feb. 2006.
8.       T. Yalcionoz, H. Altun, and M. Uzam, “Economic dispatch solution using a genetic algorithm based on arithmetic crossover,” in Proc. IEEE Proto Power Tech. Conf., Proto, Portugal, Sept. 2001.

9.       C.-L. Chiang, “Improved genetic algorithm for power economic dispatch of units with valve-point effects and multiple fuels,” IEEE Trans. on Power Systems, vol. 20, no. 4, pp. 1690–1699, Nov. 2005.

10.     Z. L. Gaing, “Particle Swarm Optimization to Solving the Economic Dispatch Considering the Generator Constraints”, IEEE Trans. on Power Systems, vol. 18, No. 3, Aug. 2003.

11.     J. Kennedy and R. Eberhart, “Particle swarm optimization”, Proc. IEEE Int. Conf. Neural Networks, vol. 4, pp. 1942–1948, 1995.

12.     J. B. Park, K. S. Lee, J. R. Shin and K. Y. Lee, “A particle swarm optimization for economic dispatch with nonsmooth cost functions”, IEEE Trans. on Power Systems, vol.20, no.1, Feb 2005.

13.     K. E. Parsopoulos and M. N. Vrahatis, “UPSO: A unified particle swarm optimization scheme”, Lecture Series on Computer and Computational Sciences, Vol.1, 2004, pp.863-867.

14.     K. E. Parsopoulos, M. N. Vrahatis, "Unified Particle Swarm Optimization for Solving Constrained Engineering Optimization Problems", In proceeding of: Advances in Natural Computation, First International Conference, ICNC 2005, Aug. 2005

15.     M. Vanitha and K. Thanushkodi, “Solution to Economic Dispatch Problem by Differential Evolution Algorithm Considering Linear Equality and Inequality Constrains,” IJRRECE, vol. 1, no. 1, March 2011

16.     M. Clerc and J. Kennedy, “The Particle Swarm --- Explosion, Stability, and Convergence in a Multidimensional Complex Space”, IEEE Trans. on Evolutionary Computation, Vol.6, No.1, 2002. pp.58-73.

17.     J Kennedy and R Mendes, “Neighborhood topologies in fully informed and best-of-neighborhood particle swarms”, IEEE Trans on Systems, Man, and Cybernetics – Part C: Applications and Reviews, vol36, no4, 2006, pp515-519

18.     R. Mendes and J. Kennedy, “The fully informed particle swarm: simple, maybe better”, IEEE Trans. on Evolutionary Computation, vol.8, no.3, 2004, pp.204-210.


280-284

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

68.

Authors:

T.D. Khadtare, P.R. Thakare, S.A.J. Patel

Paper Title:

An Efficient Personalized Web Search Mechanism using BinRank Algorithm

Abstract:   Dynamic authority-based online keyword search algorithms, such as Object rank and personalized page rank leverage semantic link information to provide high quality, high recall search in databases and the web. Conceptually, these algorithms require a querytime page rank style iterative computation over the full graph. This computation is too expensive for large graphs and not feasible at query time. Alternatively, building an index of precomputed results for some or all keywords involves very expensive processing. We introduce BinRank, a system that approximates ObjectRank results by utilizing a hybrid approach inspired by materialized views in traditional query processing. We materialized relatively small subsets of the data graph so that any keyword query can be answered by running ObjectRank on only one of the subgraphs. BinRank generates the subgraph by partitioning all the terms in corpus based on their cooccurence, executing ObjectRank for each partition using the terms to generate a set of random walk starting points, and keeping only those objects that receive negligible score. We demonstrate that Binrank can achieve subsecond query execution time on the English Wikipedia data set, while producing high-quality search results that closely approximate the results of ObjectRank on the original graph. Our experimental evaluation investigates the trade-off between query execution time, quality of results, and storage requirements of BinRank.

Keywords:
 BinRank, ObjectRank, Online keyword search, Page Rank.


References:

1.        T.H. Haveliwala, “Topic-Sensitive PageRank,” Proc. Int’l World Wide Web Conf. (WWW), 2002.
2.        G. Jeh and J. Widom, “Scaling Personalized Web Search,” Proc. Int’l World Wide Web Conf. (WWW), 2003.

3.        D. Fogaras, B. Ra´cz, K. Csaloga´ny, and T. Sarlo´ s, “Towards Scaling Fully Personalized PageRank: Algorithms, Lower Bounds, and Experiments,” Internet Math., vol. 2, no. 3, pp. 333-358, 2005.

4.        A. Balmin, V. Hristidis, and Y. Papakonstantinou, “ObjectRank: Authority-Based Keyword Search in Databases,” Proc. Int’l Conf. Very Large Data Bases (VLDB), 2004.

5.        Z. Nie, Y. Zhang, J.-R. Wen, and W.-Y. Ma, “Object-Level Ranking: Bringing Order to Web Objects,” Proc. Int’l World Wide Web Conf. (WWW), pp. 567-574, 2005.

6.        Ji-Lin, Ren Yong-jian, Zhang Wei, Xu Xiang-Hua, Wan Jian “Webs Ranking Model Based On PageRank Algorithm” IEEE transactions 2011.

7.        Heasoo Hwang, Andrey Balmin, Berthold Reinwald, and Erik Nijkamp BinRank: Scaling Dynamic Authority-Based Search Using Materialized Subgraphs IEEE Transaction on Knowledge and Data Engineering VOL. 22, NO. 8, August 2010

8.        Mandar Kale Mrs. P.Santhi Thilagam” DYNA-RANK: Efficient calculation and updation of PageRank”  International Conference on Computer Science and Information Technology 2007

9.        Yong Zhen Guo, Kotagiri Ramamohanarao and Laurence A. F. Park” Personalized PageRank for Web Page Prediction Based on Access Time-Length and Frequency” IEEE International conference on web intelligence 2007.  


285-289

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

69.

Authors:

G. N. Raut, P. L. Paikrao, D. S. Chaudhari

Paper Title:

A Study of Quality Assessment Techniques For Fused Images

Abstract:   Critical image processing tasks can be efficiently executed by fusion of images taken from range of distributed sensors. Advancements in digital image processing and communication technology with invent of new sensors experiencing the excessive need of effective image quality assessment of image fusion techniques. Various metrics have been discussed for quality measurement of fused image based on subjective or objective assessment. Objective quality assessment techniques are preferred over subjective since they do not involve the complexity in their practical implementation and validation. Based on availability of an ideally fused (reference) image, the metrics are classified into referential and non referential metrics. This paper presents an overview of different objective techniques for fused image quality assessment. 

Keywords:
 Image quality assessment, image fusion, performance metric


References:

1.        G. Piella, “A general framework for multiresolution image fusion: from pixels to regions”, Information Fusion, Vol. 4, ,2003, pp. 259–280
2.        X. Li, D. Tao, X. Gao, W. Lu, “A natural image quality evaluation metric”, Signal Processing, Vol. 89, 2009, pp. 548–555

3.        N. Cvejic, D. Ziou, T. Seppanen, S. Godsill,  “A Nonreference Image Fusion Metric Based on the Regional Importance Measure”, IEEE journal on selected topics in signal processing, Vol. 3, No. 2, 2009, pp. 212–221

4.        D. Wolin, K. Johnson, Y. Kipman, “The Importance of Objective Analysis in Image Quality Evaluation”, International Conference on Digital Printing Technologies, 1998

5.        D. Kim, R. Park, “New Image Quality Metric Using the Harris Response”, IEEE Signal Processing Letters, Vol. 16, No. 7, 2009, pp. 616–619

6.        Z. Wang, A. Bovik, “A Universal Image Quality Index”, IEEE Signal Processing Letters, Vol. 9, No. 3, 2002, pp.81–84

7.        B. Nava, G. Cristobal, B. Escalante, “Mutual Information improves image fusion quality assessments”, SPIE News Room, 2007 Available: http://spie.org/documents/Newsroom/Imported/0824/0824-2007-08-30.pdf,

8.        M. Hossny, S. Nahavandi and D. Creighton, “Comments on Information measure for performance of image fusion”, Electronic Letters, Vol.44, No. 18, August 2008 , pp. 1066–1067

9.        Y. Zheng, E. Essock, B. Hansen, A. Haun, “A new metric based on extended spatial frequency and its application to DWT based fusion algorithms”, Information Fusion, Vol. 8, 2007, pp. 177–192

10.     F. Zhang, L. Ma, S. Li, K. Ngan, “Practical Image Quality Metric Applied to Image Coding”, IEEE trans. on Multimedia , Vol. 13, No. 4, 2011, pp.615–624

11.     C. Delgorge, C. Rosenberger, G. Poisson, P. Vieyres “Toward a New Tool for the Evaluation of the Quality of Ultrasound Compressed Images”, IEEE trans. on medical imaging, Vol. 25, No. 11, 2006, pp.1502–1509

12.     Gonzalez R, Woods R, ‘Digital Image Processing’, Dorling Kindersley (India), 2008

13.     Theckedath D, ‘Image processing using Matlab codes’, Nandu Printers and    Publishers Private Limited, Mumbai (India), 2008

14.     Measures of image quality, University of Edinburgh,[online], Todd Veldhuizen, (1998, Jan, 16) Available: http://homepages.inf.ed.ac.uk/rbf /CVonline/ LOCAL_COPIES/VELDHUIZEN/node18. html

15.     G. Piella, H. Heijmans, “A new quality metric for image fusion”, Proc. IEEE Int. Conf. Image Process, Barcelona, Spain, 2003, pp.173–176


290-294

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

70.

Authors:

Nikhil  A. Chaudhari, Vivek S. Deshpande, J.  B.  Helonde, V. M. Wadhai

Paper Title:

Behavioral Analysis of Energy In Wireless Sensor Networks

Abstract:   Wireless sensor networking (WSN) is the greatest solution to many problems. It can be easily used in many applications prospectively. Sensor in the WSN is very important and a crucial part. The basic operation of a node in the network is to gather and transmit the information to base station for processing. The most critical question in WSN is to schedule the nodes properly according to time quantum. In this paper, it has been discussed how the nodes are scheduled to execute the data and how the cluster heads are formed in each cluster depending upon the calculated weight based on the energy of node and distance from its adjoining node. Different schemes of energy reduction have also been discussed.

Keywords:
 Wireless Sensor Networking, Energy consumption, TDMA, Scheduling, Clustering.


References:

1.        Ping Ding, JoAnne Holliday, Aslihan Celik,” Distributed Energy- Efficient Hierarchical Clustering for Wireless Sensor Networks”, international conference on Distributed Computing in Sensor Systems, pp. 322-339, 2005.
2.        Yanwei Wu, Xiang-Yang Li, Yun Hao Liu, and Wei Lou, ” Energy-Efficient Wake-Up Scheduling or Data collection and Aggregation”, IEEE Transactions on Parallel and Distributed System, VOL. 21, NO. 2, pp. 275-287, February 2010.

3.        Zhi Tan,” Performance Requirements on Energy Efficiency in WSNs”, Computer Research and Development (ICCRD), 2011 3rd International Conference on, volume no 3, pp. 1573-1578, March 2009.

4.        Albeiro Cort´es Cabezas, Ricardo Gamboa Medina and N´estor M. Pe˜na T,” Low Energy and Low Latency in Wireless Sensor Networks”, ICC'09 Proceedings of the 2009 IEEE international conference on Communications, pp. 5247-5251, 2009.

5.        C.G. Wang, K. Sohraby, B. Li, M. Daneshmand and Y. M. Hu , "A survey of transport protocols for wireless sensor   networks",  IEEE Network, Vol. 20,  No. 3, pp.34-40, 2006.

6.        W. R. Heinzelman,   A. Chandrakasan  and  H. Balakrishnan,  “Energy-  Efficient Communication Protocol for Wireless Micro sensor Networking”, in Proceedings of
IEEE HICSS, Jan  2000.

7.        S. Younis, S. Fahmy, “Distributed Clustering in Ad-hoc Sensor Networks: A Hybrid, Energy-Efficient Approach”, In Proceedings of IEEE INFOCOM, March, Hong Kong,  China, vol. 3, pp. 366-379,  2004.

8.        A. D. Amis, R. Prakash, T. H. P. Vuong, and D. T.    Huynh, “Max-Min D-cluster Formation in Wireless Ad Hoc Networks”, in Proceedings of IEEE INFOCOM, vol. 1, pp. 32-41,  March 2000.

9.        X. Yu, S. Mehrotra, and N. Venkatasubramanian, “Sensor Scheduling for Aggregate Monitoring in Wireless Sensor Networks,” Proc. Int’l Conf. Scientific and Statistical Database Management, pp. 24, 2007.

10.     A. Ephremides, J. E. Wieselthier and D. J. Baker, “A  Design concept for Reliable Mobile Radio Networks with  Frequency Hopping Signaling”, Proceedings of IEEE, vol. 75,  No. 1, pp. 56-73, 1987.

11.     M. Chatterjee, S. K. Das, and D. Turgut, “WCA: A Weighted Clustering Algorithm for Mobile Ad Hoc Networks”, Cluster Compute ring, pp. 193-204, 2002.

12.     C. F. Chiasserini, I. Chlamtac, P. Monti and A. Nucci, “Energy Efficient design of Wireless Ad Hoc Networks”, in Proceedings of European Wireless, pp. 376-386,  Feb. 2002.

13.     S. Bandyopadhyay and E. Coyle, “An Energy-Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks”, in Proceedings of IEEE INFOCOM, vol. 3, pp. 1713-1723, April. 2003.

14.     F. Ye, G. Zhong, S. Lu, and L. Zhang, “PEAS: A Robust Energy Conserving Protocol for Long-lived Sensor Networks”, in International Conference on Distributed Computing Systems (ICDCS), pp. 28-37, 2003.

15.     S.C. Ergen and P. Varaiya, “TDMA Scheduling Algorithms for Sensor Networks,” technical report, Univ. of California, Berkley, 2005.


295-298

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

71.

Authors:

Praful P. Maktedar, Vivek S. Deshpande, J. B. Helonde, V.M. Wadhai

Paper Title:

Performance Analysis of Reliability in Wireless Sensor Network

Abstract:   Nowadays Wireless Sensor Network (WSN) is top rising field .It is broadly used in lots of application areas since previous few years. Sensor is the mainly significant and fundamental part in WSN. Reliability is one of the key aspects of WSN. Reliability is nothing but the consistency in measuring the results. It is necessary for efficient and reliable data transmission process. Congestion control is required for increasing reliability of network. In this paper, we are discussing the effects of node density and reporting rate on the network performance.

Keywords:
 Wireless Sensor Network, Reliability, Congestion, Data Transmission, Node density and Reporting Rate.


References:

1.        I.F.Akyildiz, W.Su, Y. Shankarasubramaniam, E. Caryirci, “Wireless Sensor Networks: A Survey”, Computer Networks, vol 38, pp 393-422, 2001.
2.        Mohammadreza Balouchestani, Kaamran Raahemifar and Sridhar Krishnan,” Increasing The Reliability of Wireless Sensor network With new Testing Approach Based on Compressed Sensing Theory”, pp 1-4, 2011.

3.        Mario Di Franceseo, Giuseppe Anastasi, Marko County and Sajal K.Das,”Reliability and Energy Efficiency in Wireless Sensor Network” vol 29, issues 8, Sept 2011.

4.        Hung Ta Pai, “Reliability Based Adaptive Distributed Classification in Wireless Sensor Network”, vol 59, issues 9, pp 4543-45, 2010.

5.        Giuseppe Campobello, Alessandro Lenardi and Sergio Palazzo,” Improving Energy Saving and Reliability in Wireless Sensor Network Using Simple CRT Based Packet Forwarding Solution”, vol 20, issues 1, pp 191-205, 2012.

6.        Dae Young Kim and JinSung Cho,” Active Caching: A Transmission Method to Guarantee Desired Communication Reliability in Wireless Sensor Network”, journal IEEE communication Letters, vol 13, issues 6, pp 378-380, June 2009.

7.        Yunhuai Liu, Yanmin Zhu, Lionel Mni and Guangtao Xue, “A Reliability Oriented Transmission Services in Wireless Sensor network” journal IEEE transactions on parallel and distributed systems, vol 22, issues 12, pp 2100-2107, Dec 2011.

8.        D.G.Reina, S.L.Toral, P. Johnson and F. Barreiro, “A Reliable Route Selection based on caution Zone and Arrival Angle”, IEEE communication letters, vol 15, issues 11, pp 1252-1255, Nov 2011.

9.        Hongchao Zhoul, Xiaohong Geuan , Chengjie Wu,” Reliable Transport With Memory consideration in Wireless Sensor Network”, IEEE Conference communications, pp 2819-2824, 2009.

10.     Hong Lue, Huixiang Huandong and Sajal K.Das,”A Data Fusion with Desired Reliability in Wireless Sensor Network”, IEEE conference communication, vol 22, issues 3, pp 501-513, 2008.

11.     Jinyun zhang, P.V.Orlik, Z.Sahinoglu, A.F. Molisch, P. Kinrey,”UWB Systems for Wireless Sensor Network”, vol 97, issues 2, pp 313-331, 2009.

12.     R.R.Rout, S.K.Ghosh, S.Chakrabarti, “Cooperative routing for Wireless Sensor Network using network coding”, vol 2, issues 2, pp 75-85, 2012.

13.     Zhan Bo Su, Yuan Ming Wu,”Prediction Based Event to Sink Reliability in Wireless Sensor network”, vol 1, pp 4244-4249, 2009.

14.     Shoubhik Mukhopadhyay, Debashis Panigrahi,”Model Based Techniques for Data Reliability in Wireless Sensor Network”, vol 8, issues 4, April 2009.

15.     Kamil Ataniac and Grzegorz Debita,”Studies on Planarity, Reliability and Energetic Efficiency in Wireless Sensor Network”, IEEE Symposium on Computers and Informatics, pp 293-598, 2011.


299-302

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

72.

Authors:

Shefaly Sharma, Jagpreet Kaur

Paper Title:

An Efficient Method of Watermarking Using Multi Wavelet Technique with Modified Fast Haar Wavelet Transform (MFHWT)

Abstract:   Now a day we share huge amount of data through internet. Data can be of the form of text, image audio or video. We also share critical information with others. Major issue now a days is to secure our data from third person so that it can be protected from harm.  In that case third person can make misuse of our data. So, to solve this problem we will make use of a  new  technique  called  Watermarking  using  Modified  Fast Haar  Wavelet  Transform  (MFHWT). Watermarking is  a technique  used  for  hiding  the  data.  We  need  to  hide  the information  such  that   any   change  in  the  data  should  be imperceptible. It also helps us in know whether the data is having copyright or not.

Keywords:
 HAAR,  Multi Wavelet, MFHWT, Watermarking,Image Processing.


References:

1.        Ali Rashid, Bhardwaj Anuj ,2009, “Image compression using modified fast haar wavelet transform, “world applied sciences journal.
2.        Damien dams,Patterson Halsey,2006,”The Haar Wavelet transform:Compression and Reconstruction”.

3.        Dittmann Jana, Wohlmacher Petra Nahr, 2011, “Using cryptographic and watermarking algorithms,” IEEE.

4.        Hanna Tawfik Magdy, Saaid Monir Mary, Nossair  Bassyouni Zaki,2011,  “An  image  Watermarking  scheme  based  on  Multiresolution

5.        Analysis,” IEEE. Hu Defa , Li Qiadiang, 2011, “A simple  fingerprinting scheme for large user groups,” Springer.

6.        Islam R.M,.Sifuzzaman R.M, Ali Z.M, 2009, “Applications of wavelet transform and its advantages compared to Fourier transform,” Journal of physical science.


303-305

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

73.

Authors:

S.H.Mortazavi, P.S.Avadhani

Paper Title:

RSA Cryptography Algorithm: An Impressive Tool in Decreasing Intrusion Detection System Vulnerabilities in Network Security

Abstract:   This paper is discussed the security of computer networks is a concern for businesses and individuals who are aware of its advantages due to its flexibility. With the increase security of IDS for companies and homes, where information property are shared continually, security is of the nature.. Cryptography is seen as a major instrumentation in the line of defense of network security. This paper discusses the various RSA cryptography algorithm used in network security especially IDS and how effective they are in keeping IDS secure. The risks of using this algorithm are Specified and recommendations for securing IDS are reviewed.

Keywords:
 IDS, NIDS, HIDS, Encryption, Cryptography, RSA, DoS.


References:

1.       William Stallings ,cryptography and network Security ,Fifth adition 2011
2.       Seyed hasan mortazavi: data mining for Intrusion detection system, international conference On computer science and engineering-April 28th, 2012 – Vizag - ISBN: 978-93-81693-57-5

3.       Páez, R. Satizábal C., Forné J. Cooperative Itinerant Agents (CIA): Security Scheme for Intrusion Detection Systems, Proceedings of the International Conference on Internet Surveillance and Protection (ICISP).    ISBN:0-  7695-2649-7. Pag. 26-32. 2006.     

4.       RSA Security. The RSA security survey of San Francisco. RSA Security Inc. http://www.securitymanagement.com/

5.       Tian Fu and Te-Shun Chou International Journal of Computer  Engineering Science    (IJCES) Volume 2 Issue 5 (May 2012) ISSN : 2250:3439


306-310

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

74.

Authors:

E.N. Ganesh

Paper Title:

Single Walled and Multi Walled Carbon Nanotube Structure, Synthesis and Applications

Abstract:   Carbon Nanotubes have exceptional mechanical and electrical properties. Various methods have been thoroughly investigated for the growth of CNTs. The best and the most commonly used method is Chemical Vapour Deposition (CVD). The various techniques include Reaction Chamber heating, Plasma Enhanced CVD, Hot filament CVD, Microwave CVD. The structural uniformity of carbon nanotubes produced by plasma enhanced Chemical Vapour Deposition gives uniform height and diameter. This paper discusses about all the methods listed above and detail comparisons are listed. We have simulated the single layer and multi layer Carbon nano tube using nano explorer tool and enumerated its properties for various applications like power storage and medical applications. The simulated properties of CNT would be used for energy storage purpose as well for transmission of electrical energy. Though it is known that CNT’s have high aspect ratio, Young’s modulus over one terra pascal, Tensile strength of 200 Gigapascal, these properties never remain the same for all the CNT’S. It depends upon the method of preparation, catalyst used etc. So the properties of CNT are studied for specific conditions. Here it is proposed CNT can be modeled for particularly electrical storage purpose.

Keywords:
 Carbon nanotube, chemical vapour depaosition, Plasma enhanced CVD, Multiwall nano tubes.


References:

1.        Niraj sinha, John yeow CARBON NANO TUBE  IEEE transaction on Nano science Vol 4 No 2 June 2005.
2.        Lawerence Berkley net.labs [online] Available: http//www.lbl.gov

3.        S.Ijma “Helical microtubules of graphite carbon”, Nature Volume 354, pp –56 – 58 1991.

4.        S.Ijma, P.M.Ajayan “ Growth model for carbon nano tubes” Phys rev lette, Vol 69, no 21, pp –3100 – 3103,1992

5.        C.Journet, W.K.Master,P.Berneir, A.Loisequ “ Large scale prodution of single wall carbon nano tubes by electric arc technique” Nature volume 388, pp 756 – 758, 1997

6.        A.Thess, R.Lee, P.Nikolav, P.Petut, J.Robert, C.H.Xu, Y.H.Lee, S.G.Kim, A.G.Rinzler “ Crystalline ropes of carbon nano tubes” science volume 273, no 5274, pp 483 – 487, 1996.

7.        R.L.WanderWal, Berger, T.M.Ticich “ Carbon nano tube synthesis in a flame using laser ablation for insitu catalyst generation” Applied Physics Volume 77, no 7, pp 885 – 889, 2003.

8.        M.J.Yaceman, M.M.Yoshida, .Rendson,J,G.Santiestaban “ Catalytic growth of carbon micro tubules with fullerneess structure” Applied physics letter colume – 62, pp 202 –204, 1993.

9.        J.K.Vohs, J.J Brege,J.E.Raymond, A.E.Bnrown  G.L.Williams and B.D>Feblayer “ Low temperature growth of carbon nanotubes from the catalystic decomposition of carbon tetrachloride “ J.Amer. Chemistry society Vol 126, N0 –32, pp – 9936 – 9937

10.     S.Ijima and T.Ichihashi “Single cell carbon nano tube of 1 nanometer diameter” Nature Volume 363, pp –220 – 221,1992.

11.     D.S.Bethune, C.H.Kiang, G.Gorman, R.Savoy, J.Vazquez and R.Bayers “ Cobalt catalyst growth of CNT of single atomic layer walls “ Nature volume 363, page – 305, 1993.

12.     T.W.Ebbesan and P.M.Ajayan “large scale synthesis jof carbon nano tube: Nature volume 358, pp –220 –221, 19092.

13.     H.Dai “ Nano tube growth and charecterization “ Top appl.physics vol 80, pp – 29 –54,2001.

14.     C.Jounet and Bernier P, Applied physics material science and processing 67, page 1 –9, 1998.

15.     World of carbon nano tube – a review jof current carbon nano tube technologies  Tule – Eindhoven university.

16.     Farhet s, Hinkor, I.Chappelle, DI Fan,SS Li and Scott Nasa control publications 2001.

311-320

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

75.

Authors:

Erfaneh Noroozi, Salwani Mohd Daud, Ali Sabouhi

Paper Title:

Secure Digital Signature Schemes Based on Hash Functions

Abstract:  This paper provides a literature review and analysis of the security systems and the emphasis is on digital signature, hashed message algorithm. The proposed algorithm introduces a novel technique for producing small-sized output of digital signature as a result; the new scheme is potentially practical: signing and verifying signatures are reasonably fast, and both speed and time are improved.  

Keywords:
Digital signature, Hashed message algorithm, Public key.


References:

1.       W. Diffie, M. Hellman, New directions in cryptography." Information Theory, IEEE Transactions on 22.6, pp. 644-654, Jun 1976.
2.       R. Rivest, A. Shamir, L. Adleman. "A method for obtaining digital signatures and public-key cryptosystems." Communications of the ACM 21, no. 2, pp. 120-126, May 1978.

3.       E. Noroozi, D. Salwani, A. Sabouhi and M., SalehNamadi, “New Implementation of Hashing and Encoding in Digital Signature”, International Conference on Security Science and Technology –ICSST, Hong Kong, March 2012.

4.       M. Bellare, and P. Rogaway ,“Entity authentication and key distribution”. In Advances in Cryptology — CRYPTO’93, pp. 232-249, 1994.

5.       Sinha and K. Singh, "A technique for image encryption using digital signature." Optics Communications 218, no. 4, pp. 229-234, 2003.

6.       O. Mikle, "Practical attacks on digital signatures using MD5 message digest.", Cryprology ePrint Archive, report 356, 2004.

7.       Q. Sun and S. F. Chang, "A secure and robust digital signature scheme for JPEG2000 image authentication." Multimedia, IEEE Transactions on 7(3), pp. 480-494, 2005.

8.       R. Cramer and V. Shoup, "Signature schemes based on the strong RSA assumption." ACM Transactions on Information and System Security (TISSEC) 3(3), pp.161-185, 2000.

9.       Noore, “A secure conditional access system using digital signature and encryption”. Consumer Electronics, ICCE. 2003 IEEE International Conference on, IEEE, 2003.

10.    J.Stern, D. Pointcheval, "Flaws in applying proof methodologies to signature schemes." Advances in CRYPTO, pp. 215-224,(2002)

11.    M. Aydos, T. Yantk, “A high-speed ECC-based wireless authentication on an ARM microprocessor”. Computer Security Applications, ACSAC'00. 16th Annual Conference, IEEE. (2000).

12.    M. Shah, A. R. Swaminathan, "Privacy-preserving audit and extraction of digital contents." Cryptology ePrintArchive, Report 186, 2008.

13.    J. Ding, B. Y. Yang, “New differential-algebraic attacks and reparametrization of rainbow”. Applied Cryptography and Network Security, Springer, (2008).


321-325

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

76.

Authors:

B. Madhuravani, D. S. R Murthy

Paper Title:

Cryptographic Hash Functions: SHA Family

Abstract:   This paper gives the Study of Cryptographic Hash functions, which plays a vital role in the Security of many applications such as Digital Signatures, Tamper Detection, Password Protection and so on. We start with reviewing basic fundamentals of hashing. Hash functions are being used as building blocks of many complex Cryptographic mechanisms and protocols. Most of the widespread and popular hash functions, such as MD5, SHA-1 and SHA-2 share a common design philosophy. Recent Cryptanalytic advances have raised serious concerns regarding the long–term security of these hash functions. Security flaws have been detected in some of the most commonly used hash functions like MD5 and SHA-1. Even though the SHA-2 family is not really threatened by any attack, it receives little confidence because it is based on the same design principles. The dedicated hash functions from SHA family – SHA0, SHA-1, SHA-2, SHA-3 are compared in this paper.

Keywords:
 Hash Function, MD5, SHA-0, SHA-1, SHA-2, SHA-3.


References:

1.       Krystian Matusiewicz, Analysis of Modern Dedicated Cryptographic Hash Functions, PhD thesis. Macquarie University, 2007.
2.       Xiaoyun Wang and Hongbo Yu, How to Break MD5 and Other Hash Functions, EUROCRYPT, pp. 19–35, 2005.

3.       Xiaoyun Wang, Xuejia Lai, Dengguo Feng, Hui Chen, and Xiuyuan Yu, Cryptanalysis of the Hash Functions MD4 and RIPEMD, EUROCRYPT, pp. 1–18, 2005.

4.       Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu, Finding Collisions in the Full SHA–1,  CRYPTO, pp. 17–36, 2005.

5.       Xiaoyun Wang, Hongbo Yu, and Yiqun Lisa Yin, Efficient Collision search Attacks on SHA–0, CRYPTO, pp. 1–16, 2005.

6.       Menezes, Oorschot, and Vanstone, Handbook of Applied Cryptography, First Edition, CRC Press, Florida, 1997.

7.       Praveen Gauravaram and Lars R. Knudsen, Cryptographic Hash Functions,. Handbook of Information and Communication Security, First Edition, Springer, pp. 59-79. 2010

8.       Ralph C. Merkle, One Way Hash Functions and DES, CRYPTO, pp. 428–446, 1989.

9.       Ivan Damgard, A Design Principle for Hash Functions, CRYPTO, pp. 416–427, 1989.

10.     Eli Biham and Orr Dunkelman, A Framework for Iterative Hash Functions: HAIFA, Proceedings of Second NIST Cryptographic Hash Workshop.

11.     John Kelsey and Bruce Schneier, Second Preimages on n-Bit Hash Functions for Much Less than 2n Work, EUROCRYPT, Springer, pp. 474–490, 2005.

12.     Orr Dunkelman and Eli Biham, A Framework for Iterative Hash Functions: HAIFA, Second NIST Cryptographic Hash Workshop, Santa Barbara, Aug 24–25, 2006.

13.     Guido Bertoni, Joan Daemen, Michael Peeters, and Gilles Van Assche, Sponge Functions, 2007.

14.     http://www.nist.gov/itl/csd/sha-100212.cfm.

15.     http://en.wikipedia.org/wiki/SHA-1/SHA-2


326-329

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

77.

Authors:

Ousmane Sow, Dianguina Diarisso, Nzonzolo ZénobeAmadou MBodji, Mamadou Saliou Diallo, Amadou Diao, Idrissa Gaye,Fabé Idrissa Barro, Grégoire Sissoko

Paper Title:

Experimental Device for Acquisition of Propertiesi-V and V (T) of the Solar By Automatic Change Operating Point

Abstract:   Design and implementation of a device for automation of variations of the resistive load powered by solar cell. It is provided by a PIC16F877 running a computer program that we have developed on the basis of an algorithm according to the operation that we have set.

Keywords:
 Solar cell, PWM, PIC16F877


References:

1.        P. Pernet, ‘Développement de Cellules Solaires en Silicium Amorphe de Type ‘n.i.p’ surSubstrats Souples’, Thèse de l’Ecole Polytechnique Fédérale de Lausanne, ‘EPFL’, N°2303,2000.
2.        A. Boudghene Stambouli, ‘Solar Photovoltaic at the Tipping Point: Pathways from Evolutionary to Disruptive and Revolutionary Technologies’, Université des
Sciences et de la Technologies d’Oran, USTO.MB, 2009.

3.        S. Mbodji, I. Ly, H. L. Diallo, M.M. Dione, O. Diasse, G. Sissoko, Modeling Study of N+/P Solar Cell Resistances from Single I-V Characteristic Curve Considering the JunctionRecombination Velocity (Sf), Res. J. Appl. Sci. Eng. Technol., 4(1): 1-7, 2012.

4.        M.M. Dione, H. Ly Diallo, M. Wade, I. Ly, M. Thiame, F. Toure, A. Gueye Camara, N. Dieme, Z. Nouhou Bako, S. Mbodji, F. I Barro, G. Sissoko, Determination of the shunt andseries resistances of a vertical multijunction solar cell under constant multispectral light,Proceedings of the 26st European Photovoltaic Solar Energy Conference (2011), pp. 250 –254.

5.        PETIBON Stéphane. « Nouvelles architectures distribuées de gestion et de conversion de l’énergie pour les applications photovoltaïques ». DOCTORAT DE L’UNIVERSITÉ DE TOULOUSE. 20 Janvier 2009.

6.        MicrochipDatasheet ‘PIC 16F87x: 28/40 pin CMOS Flash Microcontrollers’, MicrochipTechnology Inc. DS30292B, 1999.

7.        Bigonoff, ‘La Programmation des PIC par Bigonoff’, Seconde partie (PIC16F876-16F877), 7ème Révision, 2003.

8.        P. Mayeux, ‘Apprendre la Programmation des PIC par l’Expérimentation et la Simulation’,plus un CD-ROOM, ETSF 2ème édition 2002.

9.        R. MERAT, R. MOREAU, L. ALLAY, J.-P. DUBOS, J. LAFARGUE, R. LEGOFF,  Electronique numérique ; Edition Nathan / VUEF 2001.

10.     Tahar Neffati, Electricité générale : Analyse et synthèse des circuits, Edition DUNOD 2003.

11.     Jean-Yves FABERT, Sciences industrielles : Automatismes et automatique, Edition Ellipses, 2005.

12.     D. Diarisso, I. Ly, G. Sow, O. Sow, I. Gaye, F.I. Barro and G. Sissoko; “AC Induction Motor (ACIM) Control using a Digital Signal Controller (DSC)”; Research Journal of Applied Sciences, Engineering and Technology 4(19): 3740-3745, 2012


330-334

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html