International Journal of Innovative Technology and Exploring Engineering(TM)
Exploring Innovation| ISSN:2278-3075(Online)| Reg. No.:65021/BPL/CE/12| Published by BEIESP| Impact Factor:3.48
Home
Articles
Conferences
Editor
Scopes
Author's Instructions
Publication Fee
Terms & Conditions
Privacy Policy
Associated Journals
Contact Us
Volume-2 Issue-5: Published on April 10, 2013
39
Volume-2 Issue-5: Published on April 10, 2013

  Download Abstract Book

S. No

Volume-2 Issue-5, April 2013, ISSN:  2278-3075 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.

1.

Authors:

Tazeem Ahmad Khan, M T Beg, M A Khan

Paper Title:

Performance Analysis of WLAN Using OPNET

Abstract:   Abstract- In this paper analyze the performance of Wireless Local Area Networks (WLANs), it is important to identify what types of network settings can cause bad performance.  Low throughput, high packet loss rate, delayed round trip time (RTT) for packets, increased retransmissions, and increased collisions are the main attributes to look for when analyzing poor network performance. We use the OPNET Modeler to simulate the RTS/CTS mechanism to evaluate the performance of IEEE 802.11 MAC protocol. We have simulated two scenarios with and without RTS/CTS mechanism enabled on network nodes. We have concluded our findings by comparing the total WLAN retransmissions, data traffic sent/received, WLAN Delay of two scenarios.  RTS/CTS mechanism is helpful to reduce the number of retransmissions if hidden node problem persists in network scenarios.

Keywords:
 RTS/CTS, wireless LAN, MAC layer, opnet.


References:

1.        Online Documentation, “OPNET Modeler,”   http://www.opnet.com/, Date  visited: March 2007.
2.        A. Tsertou and D. I. Laurenson, “Insights into the hidden node problem,” Proceeding of the 2006 international conference on Communications and mobile computing, pp. 767-772, 2006.

3.        K. Xu, M. Gerla, and S. Bae, “How Effective is the IEEE 802.11 RTS/CTS Handshake in Ad Hoc Networks?” IEEE GLOBECOM’02, Vol. 1, pp. 72-76, November 2002.

4.        A. Adya, P. Bahl, R. Chandra, and L. Qiu,  “Architecture and techniques for diagnosing faults in IEEE802.11 infrastructure networks,” Proceedings of  the 10th annual international conference on  Mobile computing and networking, pp. 30-44, 2004.

5.        Michael Zhonghua Jiang, “Analysis of  Wireless Data Network Traffic,”University of Science and Technology of  China, M.A.Sc. Thesis, April 2000.

6.        IEEE, “Wireless LAN Media Access Control (MAC) and Physical Layer (PHY)  Specification,” IEEE 802.11 Draft Version 4.0, May 1996.

7.        K. Xu, M. Gerla, and S. Bae,  “Effectiveness of RTS/CTS handshake in  IEEE 802.11 based ad hoc networks,” Ad Hoc Networks, Elsevier, vol. 1, no. 1, pp. 107-123, 2003.

8.        S.Ray, J.B.Carruthers, and D.Starobinski,  “RTS/CTS-induced congestion in ad hoc  wireless LANs,” In WCNC, 2003.

9.        C. K. Toh, Ad Hoc Mobile Wireless  Networks: Protocols and Systems, Prentice  Hall, December 2001.  

1-4

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

2.

Authors:

N. Janardhan, M.V.S. Murali Krishna, P.Ushasri, P.V.K. Murthy

Paper Title:

Comparative studies on Performance, Emissions and Combustion Characteristics of Jatropha Oil in Crude Form and Biodiesel in a Medium Grade Low Heat Rejection Diesel Engine

Abstract:   Experiments were carried out to evaluate the performance of a medium grade LHR diesel engine consisting of air gap insulated piston with 3-mm air gap, with superni (an alloy of nickel) crown and air gap insulated liner with superni insert with different operating conditions of jatropha oil in crude from and biodiesel form with varied injection timing and injection pressure. Performance parameters of brake thermal efficiency (BTE), exhaust gas temperature (EGT) and volumetric efficiency (VE) were determined at various values of brake mean effective pressure (BMEP). Exhaust emissions of smoke and oxides of nitrogen (NOx) were recorded at different values of BMEP. Combustion characteristics were measured with TDC (top dead centre) encoder, pressure transducer, console and special pressure-crank angle software package.  In comparison with CE with diesel operation, biodiesel operation on CE showed compatible performance while LHR engine showed improved performance. The performance of both version of the engine improved with advanced injection timing and higher injection pressure with test fuels. Peak brake thermal efficiency increased by 11%, at peak load operation-brake specific energy consumption decreased by 6%, exhaust gas temperature decreased by 25oC, volumetric efficiency decreased by 5%, smoke levels were compatible and NOx levels increased by 35% with biodiesel operation on LHR engine at its optimum injection timing (31obTDC), when compared with pure diesel operation on CE at manufacturer’s recommended injection timing (27obTDC).

Keywords:
 Crude Jatropha oil, Biodiesel, CE, LHR engine, Fuel Performance, Exhaust emissions, Combustion characteristics.   

References:

1.        Murali Krishna, M.V.S., Naga Sarada,S., Sudha Rani,G., Kalyani Radha, K.and Seshagiri Rao, V.V.R. “A comparative study on exhaust emissions of a low heat rejection diesel engine with two different levels of insulation with carbureted methanol and crude pongamia oil”,  Pollution Research, vol.28 (1),  2009, pp.93-96.
2.        Seshagiri Rao, V.V.R., Murali Krishna, M.V.S., KIshen Kumar Reddy, T  and P.V.K. Murthy., “Performance evaluation of a high grade low heat rejection diesel engine with carbureted alcohol and crude Jatropha oil”,  International Journal of Renewable Energy Research, (Turkey), vol. 2(1), , 2012, pp.516-527.

3.        Cummins, C. Lyle, Jr., “Diesel’s Engine, Volume 1: From Conception To 1918”, Wilsonville, OR, USA: Carnot Press, ISBN 978-0-917308-03-1, 1993.

4.        Devan, P.K. and Mahalakshmi, N.V. “Performance, emission and combustion characteristics of poon oil and its blends in a DI diesel engine”,  Fuel, vol.88, 2009, pp.861-870. 

5.        Acharya, S.K., Swain,R.K. and Mohanti, M.K., “The use of rice bran oil as a fuel for a small horse-power diesel engine. Energy Sources, Part A: Recovery”, Utilization, and Environmental Effects,   vol.33 (1), 2009, pp. 80-88. 

6.        Venkanna, B.K., Venkataramana Reddy,C., Swati B. and Wadawadagi. “Performance, emission   and combustion characteristics of direct injection diesel engine running on rice bran oil / diesel fuel blend”,  International Journal of Chemical and Biological Engineering, vol.2(3),  2009, pp.131-137.

7.        Canaker, M., Ozsezen, A.N. and Turkcan, A. “Combustion analysis of preheated crude sunflower oil in an IDI diesel engine”, Biomass Bio-energy, vol.33,  2009, pp.760-770.

8.        Venkanna, B.K. and Venkatarama Reddy,C, ”Performance, emission and combustion characteristics of DI diesel engine running on blends of honne oil/diesel fuel/kerosene”,  International Journal of Agriculture and Biology Engineering, vol.4 (3), 2009, pp.1-10.    

9.        Misra, R.D., Murthy, M.S.”Straight vegetable oils usage in a compression ignition engine—A       review”, Renewable and Sustainable Energy Reviews, vol. 14,   2010, pp.3005–3013.

10.     Hanbey Hazar and Huseyin Aydin. “Performance and emission evaluation of a CI engine fueled with preheated raw rapeseed oil (RRO)-diesel blends”, Applied Energy, vol. 87, 2010, pp.786790.

11.     Jiafeng, S., Jerald, A.C., and Timothy, J.J. “Oxides of nitrogen emissions from biodiesel-fuelled diesel engines”, Progress in Energy and Combustion Science, vol. 6, 2010, pp.677-695.

12.     Venkatramn., Devaradjane, G. “Experimental investigation of performance and emission characteristics of diesel-pungam oil, methyl esters diesel blends fueled DI engine at optimum     engine operating parameters”,  International Journal of Green energy and env, vol.1, 2010, Pp.7-12.  

13.     Venkata Subbaiah, G., Raja Gopal, K., Syed Altaf Hussain, Durga Prasad, B. and Tirupathi Reddy, K. “Rice brawn oil biodiesel as an additive in diesel-ethanol blends for diesel engines”,  International Journal of Research and Reviews in Applied Sciences, vol.3 (3), 2010, pp.33-39.

14.     Rambabu Kantipudi, Appa Rao, B.V., Hari Babu.N and Satyanarayana,Ch. “Studies on DI  diesel engine fueled with rice brawn methyl ester injection and ethanol carburetion”,  International Journal of Applied Engineering Research, Dindigul, vol.1(1), 2010, pp.61-67.

15.     Rasim, B. “Performance and emission study of waste anchovy fish biodiesel in a diesel engine”, Fuel Processing Technology, vol.92, 2011, pp.1187-1194.

16.     Jaichandar, S. and Annamalai, K. “The status of biodiesel as an alternative fuel for  diesel engine- An Overview”, Journal of Sustainable Energy & Environment, vol.2, 2011, pp.71-75 

17.     Ridvan Arslan. “Emission characteristics of a diesel engine using waste cooking oil as a bio-diesel fuel”, African Journal of Bio-Technology,   2011, pp.3790-3794.

18.     Xue, J., Grift, T.E., Hansen, A.C. “Effect of biodiesel on engine performances and emissions”, Renewable and Sustainable Energy Reviews, vol.15, 2011, pp.1098–1116.

19.     McCarthy, P., Rasul, M.G., Moazzem, S. “Analysis and comparison of performance and emissions of an internal combustion engine fuelled with petroleum diesel and different bio-diesels”, Fuel, vol.90, 2011, pp.2147–2157.

20.     Parlak, A., Yasar, H., ldogan O. “The effect of thermal barrier coating on a turbocharged Diesel   engine performance and exergy potential of the exhaust gas”, Energy Conversion and Management, vol. 46(3), 2005, pp.489–499.[21] Ekrem, B., Tahsin, E., Muhammet, C. “Effects of thermal barrier coating on gas emissions and performance of a LHR engine with different injection   timings and valve adjustments”,  Journal of Energy Conversion and Management, vol. 47, 2006, pp.1298-1310.

21.     Ciniviz, M., Hasimoglu, C., Sahin, F., Salman, M. S. “Impact of thermal barrier coating                application on the performance and emissions of a turbocharged diesel engine”,  Proceedings of The Institution of Mechanical Engineers Part D-Journal of Automobile Eng, vol.222 (D12),2008, pp.2447–2455.

22.     Parker, D.A. and Dennison, G.M. “The development of an air gap insulated piston”, SAE Paper No.  870652, 1987.

23.     Ramamohan, K. “Studies on air gap insulated piston engine with pure diesel. Ph.D Thesis”,  Kakatiya University, Warangal, 1995.

24.     Rama Mohan, K., Vara Prasad, C.M., Murali Krishna, M.V.S, ” Performance of a low heat rejection diesel engine with air gap insulated piston”,  ASME Journal of Engineering for Gas Turbines and Power, vol.121(3), 1999, pp.530-540.

25.     Vara Prasad, C.M, Murali Krishna, M.V.S., Prabhakar Reddy, C. and Rama Mohan, K.  “Performance evaluation of non edible vegetable oils as substitute fuels in low heat rejection diesel engine”,  Institute of Engineers (London), 214(2), Part-D, Journal of Automobile Engineering, 2000.

26.     Chennakesava Reddy, Murali Krishna, M.V.S., Murthy, P.V.K., and Ratna Reddy,T. “Potential of low heat rejection diesel engine with crude pongamia oil”, International Journal of Modern         Engineering Research (IJMER), vol.1 (1), 2011, pp210-224.

27.     Janardhan, N., Murali Krishna, M.V.S., Ushasri, P. and Murthy, P.V.K. “Potential of a medium low heat rejection diesel engine with crude Jatropha oil”, International Journal of Automotive Engineering and Technologies, vol.1 (2), 2012, pp.1-16.

28.     Ratna Reddy, T., Murali Krishna, M.V.S., Kesava Reddy, Ch.  and Murthy, P.V.K., “Performance evaluation of a medium grade low heat rejection diesel engine with mohr oil”, International Journal of Recent Advances in Mechanical Engineering (IJMECH), (Australia) vol.1 (1), May 2012, pp.1-17.


5-15

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

3.

Authors:

Mamta Rajgor, Jayeshkumar Pitroda

Paper Title:

Stone Sludge: Economical Solution for Manufacturing of Bricks

Abstract:  A new approach to the production of brick was carried out by using Class F fly ash. Marble and granite industry has grown significantly in the last decades with the privatization trend in the early 1990s.Accordingly, the amount of mining and processing waste has increased .Stone waste is generally a highly polluting waste due to both of its highly alkaline nature,and its manufacturing and processing techniques ,which impose a health threat to the surroundings. Brick is one of the most common masonry units as a building material due to its properties. Many attempts have been made to incorporate wastes into the production of bricks, for examples, limestone dust, wood sawdust, processed waste tea, fly ash, polystyrene and sludge. Recycling such wastes by incorporating them into building materials is a practical solution for pollution problems. This paper represents the utilization of stone sludge waste in manufacturing fly ash bricks. In this paper, an attempt is made to study the properties of stone waste fly ash bricks

Keywords:
 Class F Fly ash, Stone sludge,  Natural  resources,Eco-construction bricks,Sustainability, Environment, Waste re-use, cost feasibility


References:

1.        Ashish Kumar Parashar, Rinku Parashar , “Comparative Study of Compressive Strength of Bricks Made With Various Materials to Clay Bricks”, International Journal of Scientific and Research Publications, Volume 2, Issue 7, ISSN 2250-3153,2012.
2.        Dhaval Vaviya, J J Bhavsar, Jayesh Pitroda “Literature Review On Comparing Clay Bricks Nomograms With Fly Ash Bricks” published in  National Conference on Recent Trends In Engineering & Technology, (NCRTET-2011) B.V.M. Engg. College, V.V.Nagar, Gujarat on 13TH -14TH May 2011.

3.        Fakher J. Aukour , “Incorporation of Marble Sludge in Industrial Building Eco-blocks or Cement Bricks Formulation”, Journal of Civil Engineering, Volume 3, No. 1,2009.

4.        G. Marras1, N. Careddu1, C. Internicola1, G. Siotto, “Recovery and Reuse of Marble power By Product”, Global Stone Congress,2010

5.        A. K. Misra, Renu Mathur, A. P. Singh , “A New Technology of Marble Slurry Waste utilization in Roads”, Journal of scientific and Industrial research, Vol.69, pp. 67-72, 2009.

6.        Jayesh pitroda, Mayur patoliya “An Experimental Study of Utilization Aspects of Natural/Artificial Fiber in Fly Ash Bricks in Central Region of Gujarat” published in National Conference on Advances in Engineering and Technology (NCAET-2012) Kalol Institute of Technology & Research Centre, Kalol, Gujarat 9TH -10TH March 2012.

7.        Jayesh Pitroda , Rajiv Bhatt, Indrajit Patel , Dr. F. S. Umrigar  “ Techno economical  study of FAL-G bricks”-a case study  in National Conference on “FLY ASH/FUTURISTIC MATERIALS IN CIVIL ENGINEERING CONSTRUCTION FOR SUSTAINABLE DEVELOPMENT” held  at the BVM Engineering College. V.V.Nagar Gujarat on 12th August 2010.

8.        Jayesh Pitroda, Dr. F. S. Umrigar, Dr. L. B. Zala “A study of utilization aspects of fly ash in Indian context” presented by in National Conference on “EMERGING VISTAS OF TECHNOLOGY IN 21ST CENTURY” held at the Parul Institute of Engineering & Technology Limba Waghodia Vadodara Gujarat on 4TH - 5TH December 2010.

9.        Jayraj Vinodsinh Solanki, Ronak Prakashkumar Patel,Prof. Jayeshkumar Pitroda (2013), “A  Study on Low Quality Fly Ash as an Opportunity for Sustainable and Economical Concrete”IJSR - International Journal Of Scientific Research, Volume 2 Issue 2 Feb 2013 • ISSN No 2277 – 8179 / 116-118

10.     Rania Hamza, Salah El- Haggar, Safwan Khedr , “Utilization of Marble and Granite Waste in Concrete Bricks”, Singapore,2009.

11.     Mamta B. Rajgor , Prof. Jayeshkumar Pitroda “A Study of Utilization Aspect of Stone Waste in Indian Context” International Global research analysis, (GRA) Volume : 2 Issue : 1 Jan 2013  ISSN No 2277 – 8160, PP 50-54

12.     Dhanada k. Mishra "Fly ash utilization in construction - present status & future prospects.Kettel, B., 1995. "Natural resources and gender implication". Article taken from Appropriate Technology, June 1995.

13.     Mr Sanjay Salla, Prof. J R Pitroda (2012), “A Comparative Review on: Effect of Natural Fibres Inclusion in Fly Ash Bricks”PARIPEX – Indian Journal of Research, (PIJR), Volume: 1, Issue: 12, December 2012, ISSN - 2250-1991, pp-62-64.Malaviya S K, Chatterjee B and Singh K K (1999), "Fly Ash- an emerging alternative building material", proceedings of National Seminar, 26-27 February 1999, pp. 59.

14.     Riddhish shah, Jayesh Pitroda “Recycling of Construction Material for Sustainability” published in National Conference on Recent Trends In Engineering & Technology, (NCRTET-2011) B.V.M. Engg. College, V.V.Nagar, Gujarat 13TH -14TH May 2011.

15.     Rajiv Sinha, “Extract from paper 'Technology: Fly ash Disposal and Utilization:  The Indian Scenario” , Department of Civil Engineering, IIT Kanpur

16.     Environmental Construction and Valuation [Research -Paper] by B.N.Purohit from the Institution of values,  Gujarat zone

17.     Gujarat Narmada Fly ash Company Limited, 901, A- Wing, Alkapuri Arcade, R. C. Dutt Road, Vadodara -390 005

18.     V Karthikeyan and M Ponni (2006), “An Experimental Study of Utilization of  Fly Ash for Manufacturing of Bricks”, 22nd National Conference of Architectural Engineers Trichur.

19.     Om Prakash (1990), “Utilization of Pulverized (Fertilizer Plant) Fly Ash as Low-Cost Bricks and Construction Material” M. Tech. Thesis Submitted to  MNREC, Allahabad.

20.     IS: 3495 (Part 1 and 2)-1992, Methods of tests of Burnt Clay Building Bricks—Specification, Bureau of Indian Standards, New Delhi.

21.     Gupta V, profile of dimensional stone industry in Rajasthan and investment opportunity, Indian stone mart 2000 (Jaipur , Rajasthan ) 2000,233-245.

22.     Sampat Lal Surana, Mechanical Engineer Binder made from Marble Slurry: a solution to the problem , Jaipur.

23.     Sameer Mistry, Jayesh Pitroda, Dr.L.B.Zala, Samip Patel, J J Bhavsar, Dr.F.S. Umrigar “Fly Ash Bricks Masonry: An Experimental Study” presented by in National Conference on Recent Trends In Engineering & Technology, (NCRTET-2011) B.V.M. Engg. College, V. V. Nagar, Gujarat on 13TH -14TH May 2011.


16-20

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

4.

Authors:

Deenanath Sahu, Kartik Dev Bharti, Mohit Singh

Paper Title:

Bandwidth Enhancement and Radiation Properties of Slotted Antenna

Abstract:   The design of low-cost, wideband, printed inverted-F antennas (PIFAs) that are suitable for portable devices operating at the 2–3 GHz band is described. The design specifications were extracted according to the constraints of high data rate wireless sensor devices. Reactive tuning through slot loading was applied to enforce degeneration of a higher resonance, and thus double the bandwidth in the band of interest. Three slotted antenna configurations are reported plus a baseline configuration; a thorough numerical characterisation of performance is provided. Fractional bandwidth (FBW) in the range 22–34% was achieved, which is almost quadruple that of existing implementations. The antennas exhibit total efficiencies around 80% and are elliptically polarised. A suitable figure-of-merit is suggested for performance comparisons; it attempts to capture overall antenna performance in a single quantity. Antenna performance depends heavily on electrical size, which depends on the size of the ground plane, since the RF ground is an integral part of the total radiator. The ground-effect study showed that wrong choice of size can force resonant modes to vanish. Best performance for a slotted PIFA was obtained with a ground plane measuring 0.20l _ 0.28l, significantly smaller than predicted in prior studies. Bandwidth augmentation through slot loading is supported by measurements. Fabricated antennas with sub-optimal ground plane sizes exhibit FBWs in the range 20–23%.

Keywords:
 Degeneration, Configuration. Performance, Antenna, Measurement.


References:

1.        KAKOYIANNIS C.G., KYRLIGKITSI A., CONSTANTINOU P.: ‘Wideband slotted dual-mode PIFA antennas integrated into multimedia wireless sensor devices’. Proc. Mosharaka Int. Conf. Communications, Propagation and Electronics, Ammann, Jordan, March 2009
2.        SKRIVERVIK A.K., ZUERCHER J.-F., STAUB O., MOSIG J.R.: ‘PCS antenna design: the challenge of miniaturization’, IEEE Antennas Propag. Mag., 2001, 43, (4), pp. 12–27

3.        ALI M., HAYES G.J.: ‘Small printed integrated inverted-F antenna for Bluetooth application’, Microw. Opt. Technol. Lett., 2002, 33, (5), pp. 347–349

4.        ANGELOPOULOS E.S., KOSTARIDIS A.I., KAKLAMANI D.I.: ‘A novel dual-band F-inverted antenna printed on a PCMCIA card’, Microw. Opt. Technol. Lett., 2004, 42, (2), pp. 153–156

5.        AZAD M.Z., ALI M.: ‘A new class of miniature embedded inverted-F antennas (IFAs) for 2.4 GHz WLAN application’, IEEE Trans. Antennas Propag., 2006, 54, (9),
pp. 2585–2592
6.        WANG Y.-S., LEE M.-C., CHUNG S.-J.: ‘Two PIFA-related miniaturized dual-band antennas’, IEEE Trans. Antennas Propag., 2007, 55, (3), pp. 805–811
7.        MICHAILIDIS E., TSIMENIDIS C.C., CHESTER E.G.: ‘Parametric study of dual and wide band PIFA’. Proc. 2008 IET Seminar on Wideband Multiband Antennas and Arrays for Defence or Civil Applications, London, UK, March 2008, pp. 145–159

8.        DJAIZ A., NEDIL M., HABIB M.A., DEDIDNI T.A.: ‘Design and implementation of a miniaturized CPW-fed antenna with enhanced bandwidth’, J. Electromagn. Waves Appl., 2008, 22, pp. 1242–1249

9.        AZAD M.Z., ALI M.: ‘A miniaturized Hilbert PIFA for dualband mobile wireless applications’, IEEE Antennas Wirel. Prop. Lett., 2005, 4, pp. 59–62

10.     BOYLE K.: ‘Multiband multisystem antennas in handsets’, in SANCHEZ-HERNANDEZ D.A. (ED.): ‘Multiband integrated antennas for 4G terminals’ (Artech House, 2008, 1st edn.), pp. 33–45


21-23

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

5.

Authors:

Ankit Nileshchandra Patel, Jayeshkumar Pitroda

Paper Title:

Stone Waste :Effective Replacement Of Cement For Establishing Green Concrete

Abstract:   Stone waste is one of the most active research areas that encompass a number of disciplines including civil engineering and construction materials. In India, stone dust is settled by sedimentation and then dumped away which results in environmental pollution, in addition to forming dust in summer and threatening both agriculture and public health. Therefore, utilization of the stone dust in various industrial sectors especially the construction, agriculture, glass and paper industries would help to protect the environment. It is most essential to develop eco-friendly concrete from stone waste.In this research study the(PPC) cement has been replaced by stone waste accordingly in the range of 0%, 10%, 20%, 30% 40%, & 50% by weight for M-25 grade concrete. Concrete mixtures were produced, tested and compared in terms of workability and strength to the conventional concrete. These tests were carried out to evaluate the mechanical properties for 7, 14 and 28 days. As a result, the compressive strength increased up to 20% replacing of stone waste. This research work is concerned with the experimental investigation on strength of concrete and optimum percentage of the partial replacement by replacing (PPC) cement via 0%, 10%, 20%, 30%, 40% and 50% of stone waste. Keeping all this view, the aim of the investigation is the behavior of concrete while replacing of waste with different proportions of stone waste in concrete by using tests like compression strength.

Keywords:
 Industrial Waste,Stone Waste, Eco-Friendly, LowCost, Compressive Strength, PPC Cement


References:

1.        Abrar Awol  “Using Marble Waste Powder in Cement And Concrete Production” March 2011
2.        Azza I. Kandil and Tarek H. Selim “Characteristics of the Marble Industry In Egypt”

3.        Bahar Demirel “The Effect of the Using Waste Marble Dust as Fine Sand on the Mechanical Properties of the Concrete”International Journal of the Physical Sciences Vol. 5(9), Pp. 1372-1380, 18 August, 2010

4.        Baboo Rai, Khan Naushad H, Abhishek Kr, Tabin Rushad S, Duggal S.K “Influence Of Marble Powder/Granules in Concrete Mix” International Journal of Civil and Structural Engineering Volume 1, No 4, 2011

5.        IS: 1489-1991, Specifications for 53-Grade Portland Pozzolona cement, Bureau of Indian Standards, New Delhi, India.

6.        IS: 383-1970, Specifications for coarse and fine aggregates from natural sources for concrete, Bureau of Indian Standards, New Delhi, India.

7.        IS: 10262-1982, Recommended guidelines for concrete mix design, Bureau of Indian Standards, New Delhi, India.

8.        IS: 1199-1959, Indian standard methods of sampling and analysis of concrete, Bureau of Indian Standards, New Delhi, India.

9.        IS: 516-1959, Indian standard code of practice- methods of test for strength of concrete, Bureau of Indian Standards, New Delhi, India.

10.     Elham Khalilzadeh Shirazi “Reusing of Stone Waste in Various Industrial Activities” 2011 2nd International Conference on Environmental Science and Development IPCBEE Vol.4 (2011)

11.     Hanifi Binici, Hasan Kaplan and Salih Yilmaz“Influence of Marble and Limestone Dusts as Additives on Scientific Research and Essay” Vol. 2 (9) ISSN 1992-2248 Accepted 6 August

12.     M. Shahul HameedAnd A. S. S. Sekar “Properties Of Green Concrete Containing   Quarry Rock Dust And Marble Sludge Powder As Fine Aggregate” Arpn Journal of Engineering and Applied Sciences Vol. 4, No. 4, June 2009

13.     M. Belachia And H. Hebhoub “Use of the Marble Wastes in the Hydraulic Concrete” 6th International Advanced Technologies Symposium (IATS’11), 16-18 May 2011, Elazığ, Turkey

14.     Mamta B. Rajgor , Prof. Jayeshkumar Pitroda “A Study of Utilization Aspect of Stone Wastein Indian Context” International Global research analysis, Volume : 2 Issue : 1 Jan 2013  ISSN No 2277 – 8160, PP 50-54

15.     Nutan c patel ,Prof. Jayeshkumar Pitroda “A Technical study on quarrying and processing of marble & its waste Incorporating with concrete” International Journal Global Research analysis (GRA) Volume: 2 Issue: 2 Feb 2013, ISSN: 2277-8160

16.     Nutan c patel , Amit Raval,Prof. Jayeshkumar Pitroda “Marble Waste : opportunities for development of low cost concrete” International Journal Global Research analysis (GRA) Volume: 2 Issue: 2 Feb 2013, ISSN: 2277-8160

17.     Prof. P.A. Shirulea, Ataur Rahmanb, Rakesh D.Gupta “Partial Replacement Of Cement With Marble Dust Powder” International Journal of Advanced Engineering Research and Studies April-June, 2012

18.     Prof. J R Pitroda, Dr L B Zala, Dr F S Umrigar (2012), “Hypo Sludge Management: Opportunities For Developing Low Cost Concrete With Glass Fibres” International Journal Global Research Analysis, (GRA), Volume: 1, Issue: 7, Dec 2012, ISSN No 2277 – 8160, pp-56-58.

19.     Prof. Jayeshkumar Pitroda, Dr. L.B.Zala, Dr.F.S.Umrigar (2012), “Experimental Investigations on Partial Replacement of Cement with Fly Ash in Design Mix Concrete” International Journal of Advanced Engineering Technology,IJAET/Vol.III/ Issue IV/Oct.-Dec., 2012/126-129

20.     Prof. Jayeshkumar Pitroda, Dr. L.B.Zala, Dr.F.S.Umrigar (2013), “Innovative Use of Paper Industry Waste (Hypo Sludge) in Design Mix Concrete” International Journal of Advanced Engineering Technology, IJAET / Vol. IV/ Issue I / Jan.-March., 2013 / 31-35

21.     Rania Hamza, Salah El-Haggar, Safwan Khedr “Utilization of Marble And Granite Waste in Concrete Bricks” 2011 International Conference on Environment And Bioscience IPCBEE Vol.21 (2011)


24-27

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

6.

Authors:

Valarmathi.S, Sathishkumar.S, Venkatesan.D

Paper Title:

A Strong Execution Environment for a Critical Application Even in the Presence of Corrupted Environment

Abstract:   A strong execution environment is created for a critical application even in the presence of entrusted environment. Generally in an entrusted environment if any application is going to be executed mean suddenly it terminates an application or data loss is occurred. To overcome this drawback some of the existing technique was developed such as variant based and replication technique and it is not much effective because overhead problem is occurred. A new technique called Virtual Machine is going to be developed. In this technique VM is used as a secondary storage to store all the details. Two modes are created one is user mode and another one is kernel mode. In user mode user can view the file name only they do not have the rights to view the file content. In kernel mode only the user have the rights to view the content of the file. Virtual memory monitors and displays the user details that are when the user comes. This technique is mainly used for critical applications such as colleges, bank and hospitals and so on.

Keywords:
 Memory corruption, Operating System, Security, Virtual machine.


References:

1.        Azab.A.M,Ning.P,Wang.Z,Jiang.X,Zhang.X and Skalsky.N.C, “Hypersentry: Enabling Stealthy In-Context Measurement of Hypervisor Integrity,”  Proc. 17th ACM  Conf. Computer and Comm. Security (CCS), pp. 38-49, 2010.
2.        Huang.R,Deng.D.Y and Suh.G.E, “Orthrus: Efficient SoftwareIntegrity Protection on Multi-Cores,” Proc. Architectural Support for Programming Languages and Operating Systems (ASPLOS), pp. 371-384, 2010.

3.        Kirkpatrick.M.S,Ghinita.G and Bertino.E,”Resilient Authenticated Execution of Critical Applications in Untrusted Environments,“IEEETransation on dependable and secure computing,july/august 2012.

4.        Litty.L,Lagar-Cavilla.H.A and Lie.D,“Hypervisor Support for Identifying Covertly Executing Binaries,” Proc.17th USENIX Conf. SecuritySymp., pp.243-258,2008.

5.        Piromsopa.K and Enbody.R.J,“SecureBit:Transparent,Hardware Buffer Overflow Protection,” IEEE Trans.Dependable and Secure Computing, vol.3,no.4,pp.365-376,Oct.-Dec.2006.

6.        Rhee.J,Riley.R,Xu.D and Jiang.X,s“Defeating Dynamic Data Kernel RootkitAttacks via VMM-Based Guest-Transparent Monitoring,” Proc.Fifth Int’l Conf.Availability,Reliability and Security(ARES), 2009.

7.        Riley.R,Jiang.X and Xu.D, “Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing,” Proc.11th Int’l Symp. Recent Advances in Intrusion Detection (RAID),pp. 1-20, 2008.

8.        Rinard.M,Cadar.C,Dumitran.D,Roy.D.M,Leu.T and Beebee.W.S,“Enhancing Server Availability and Security Through Failure-Oblivious Computing,” Proc. Sixth Conf. Symp. Operating Systems Design and Implementation (OSDI), pp. 21-21, 2004.

9.        Salamat.B, Gal.A, Jackson.T,  Manivannan.K, Wagner.G, and  Franz.M, “Multi-Variant Program Execution: Using Multi-Core Systems to Defuse Buffer-Overflow Vulnerabilities,” Proc. Int’l Conf. Complex, Intelligent and Software Intensive Systems, pp. 843-848, 2008.

10.     Salamat.B,Jackson.T,Gal.A and Franz.M, “Orchestra: Intrusion Detection Using Parallel Execution and Monitoring of Program Variants in User-Space,” Proc. Fourth ACM European Conf.Computer Systems (Eurosys), pp. 33-46, 2009.

11.     Sidiroglou.S,LocastoM.E, Boyd.S.W and  KeromytisA.D,“Building A Reactive Immune System for Software Services,”Proc. USENIX Ann. Technical Conf., pp. 149-161, 2005.

12.     Trachsel.O and  Gross.T.R, “Variant-Based Competitive Parallel Execution of Sequential Programs,” Proc. Seventh ACM Int,l Conf.Computing,Frontiers,pp.197-206,2010.


28-30

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

7.

Authors:

Abhay Kumar Singh

Paper Title:

Network Switch a Centralized Access Approach

Abstract:   This work gives a mechanism for doing authentication and authorization between managed element and server from a single database using a Centralized controller which can control a multiple switches. This work allows having one or more authentication servers for the switches to authenticate against which centralizes the authentication databases, making it easier to manage switch. Moreover, switch continues to support the pre-existing local authentication which works as a fallback in case of loss of connectivity to authentication server. Command authorization on per user basis is added which makes possible to have authorization of user to execute specific commands. Old access level authorization is continued to support as well. Protocol client is added and integrated into the existing system. As a part of this this work Remote authentication is supported meaning that authentication has not to be done by each switch by its own. Authentication database is shared with each other by switches now. Therefore each switch need not to be configured individually for a specific user and password in the network which will make the process of adding/modifying users very fast as opposed to time consuming in a large switch network and it is no more a security concern also. Chances of misconfiguration and mismatch are minimized.

Keywords:
 AAA, API, Authentication, Authorization, C, Database, Ftp, NAS, Session, Switch, Telnet, SSH.


References:

1.        Avgeriou Paris, Uwe Zdun. Architectural patterns revisited: a  pattern language. 10th European Conference on Pattern Languages of Programs (EuroPlop 2005); July 2005; Irsael, Germany.
2.        Buschmann F, Meunier R, Rohnert H, Sommerlad P and Stal M. Pattern-Oriented Software Architecture: A System of Patterns. Chichester: John Wiley & Sons, 1996

3.        Kernighan, Dennis M. Ritchie. The C Programming Language. Englewood Cliffs, NJ:Prentice Hall,1988

4.        Manual. VxWorks Programmer's Guide 5.3.1. Alameda, CA: Wind River  Systems Inc, 4 may 1998

5.        Alex Berson. Client Server Architecture McGraw-Hill, 1996

6.        Douglas Comer. Interworking with TCP/IP: Prentice Hall 2006

7.        Forouzan : TCP/IP protocol suite: 2nd Edition : Tata Mcgraw  Hills

8.        James Rumbaugh,Ivar Jacobson,Grady Booch :The Unified Modeling LanguageReference Manual : second Edition : Pearson Education

9.        Erich Gamma, Richard Helm, Ralph Johnson :Design Patterns: Elements of Reusable Object-Oriented Software : Pearson Education, 1-Oct-1994

10.     Joshua Kerievsky: Refactoring to Patterns:Pearson Education, 05-Aug-2004
 

31-33

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

8.

Authors:

Chowdi Ravitej, Elphesj Churchill, Kishore Sonti

Paper Title:

Design and Simulation of Cordic Co-Processor and Its Application in Avionics

Abstract:   A technique is allocated going to discuss the application of cordic algorithm in avionics. Actually here the process is dealing with avionics so, the smart application of cordic algorithm is in ARM processor. In GNSS (global navigation satellite system) receiver make use of ARM processor floating point instruction (FPI) are there to calculate the FPI.  It contains floating point unit (FPU). So, to make easy calculation in FPU have implemented cordic algorithm here cordic calculation means calculating trigonometric values. In this way FPU has implemented. Here trigonometric values means sin, cosine, tangent after getting tangent values  have to see timing response of the binary output. So, in navigation system. Now, accurate signals have been sensed. Without any critical path delay then automatically speed will increase delay will reduce this is more advantage in avionics system. For floating point addition, exponent matching and shifting of 24 bit mantissa and sign logic are coded in behavioral style. Prototypes are implemented on Xilinx vertex-4 and 5. By designing pipelining in cordic and wave pipelining in cordic is implemented in cordic algorithm to reduce the timing response in the navigation system.

Keywords:
 fpu, cordic algorithm, pipelining and wave pipelining in cordic, avionics.


References:

1.        Alexander, C., S. Ishikawa, & M. Silverstein, 1977 A Pattern Language, Oxford University Press.
2.        Brooch, G., 1993 Object-Oriented Analysis and Design, Benjamin Cummings.

3.        Claude-Pierre Jeannerod, Herv´e nochel, Christophe Monat, Member, IEEE, and Guillaume Revy, “Faster floating-point square root for integer processors”, Laboratoire LIP (CNRS, ENSL, INRIA, UCBL) .

4.        Coglianese, L., W. Tracz, D. Batory, M. Goodwin, S. Shafer, R. Smith, R. Szymanski, & P. Young Collected Papers of the Domain-Specific Software Architectures (DSSA) Avionics Domain Application Generation Environment (ADAGE), Document ADAGE-IBM-93-09, IBM Federal Sector Company,1994.

5.        David Goldberg, “What Every Computer Scientist Should Know About Floating-Point Arithmetic”, ACM Computing Surveys, Vol 23, No 1, March 1991, Xerox Palo Alto Research Center, 3333 Coyote Hill Road, Palo Alto, California 94304 .

6.        De Champeaux, D, D. Lea, & P. Faure. 1993 Object Oriented System Development. Addison Wesley.

7.        G. Kappen, T.G. Noll, 2006 “Mapping of multioperable GNSS receiver algorithms to a heterogeneous ASIP based platform”, Proceedings of the International Global Navigation Satellite Systems Society (IGNSS) Symposium 2006, Surfers Paradise, Australia.

8.        J. Duprat and J. M. Muller, 1993 “The CORDIC Algorithm: New Results for fast VLSI Implementation”, IEEE Transactions on Computers.

9.        K. Keutzer, S. Malik, A. R. Newton, 2002 “From ASIC to ASIP: The Next Design Discontinuity”, ICCD Proceedings.

10.     Prof. Kris Gaj, Gaurav, Doshi, Hiren Shah, “Sine/Cosine using CORDIC Algorithm”.

11.     S. Fischer, P. Rastetter, M. Mittnacht, F. Griesauer, P. Silvestrin, “AGGA-3 in an Avionic System“, ESA Workshop on Spacecraft Data Systems and Software.

12.     Samuel Ginsberg, “Compact and Efficient Generation of Trigonometric Functions using a CORDIC algorithm”, Cape Town, South Africa.

13.     T. G. Noll, 2004 “Application Domain Specific Embedded FPGAs for SoC Platforms”, Invited Survey Lecture, IrishSignals and Systems Conference 2004 (ISSC'04), Jun.

14.     Taek-Jun Kwon, Jeff Sondeen, Jeff Draper, “Design Trade-Offs in Floating-Point Unit, Implementation for Embedded and Processing-In-Memory Systems”, USC Information Sciences Institute, 4676 Admiralty Way Marina del Rey, CA 90292 U.S.A.

15.     Yamin Li and Wanming Chu, 1996 “A New Non-Restoring Square Root Algorithm and Its VLSI Implementations”, International Conference on Computer Design (ICCD96), October, Austin, Texas, USA.


34-39

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

9.

Authors:

Kala O.S, R.Premkumar

Paper Title:

A Taxonomy of Web Search Using Search History Clustering Mechanism

Abstract:   The size and richness of information available on the web growing very rapidly. To this end the users are trying to accomplish more complex task through online. The users can break down the complex tasks into a few co-dependent tasks and issue as multiple queries around these tasks. Search engines are the primary means of accessing  information through online.While searching, the search engine can  keep their old queries and clicks. Grouping  of related queries in the search history is useful for a variety of search engine applications.Query grouping allows the search engine to better understand a user’s session and tailor that user’s search experience according to their needs. Hence this system presents a mechanism that automatically identifies query groups in the search history.

Keywords:
 search history, query group, search behavior graphs, query reformulation.


References:

1.        M. Sahami and T.D. Heilman, “A Web-based Kernel Function for Measuring the Similarity of Short Text Snippets,” Proc. the 15th Int’l Conf. World Wide Web 2006.”
2.        R. Jones and K.L. Klinkner, “Beyond the Session Timeout:Automatic Hierarchical Segmentation of Search Topics in Query Logs,” Proc. 17th ACM Conf. Information and Knowledge Management, 2008.
3.        B.J. Jansen, A. Spink, C. Blakely, and S. Koshman, “Defining a Session on Web Search Engines: Research Articles,” J. the Am. Soc. for Information Science and Technology, 2007.
4.        A. Spink, M. Park, B.J. Jansen, and J. Pedersen, “Multitasking during Web Search Sessions,” Information Processing and Management,2006.

5.        P. Boldi, F. Bonchi, C. Castillo, D. Donato, A. Gionis, and S. Vigna, “The Query-Flow Graph: Model and Applications,” Proc. 17th ACM Conf. Information and Knowledge Management (CIKM), 2008.


40-43

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

10.

Authors:

Pradip P.Patel, Sameena Zafar, Syed Uvaid

Paper Title:

Miniaturized Compact Patch Antenna for Multiband Applications Using Combination of Sierpinski Carpet & Giuseppe Peano Fractral Geometries

Abstract:   Modern telecommunication system require antenna with wider bandwidth and smaller dimensions. Various antennas for wide band operation have been studied for communication and radar system. A fractal monopole antenna is proposed for the application in the UWB frequency range, which is designed by the combination of two fractal geometries. The first iterations of Giusepe Peano fractal are applied on the edges of a square patch, and a Sierpinski Carpet fractal is formed on its surface. The fractal antenna is preferred due to small size, light weight and easy installation. A fractal micro strip antenna is used for multiband application in this project provides a simple and efficient method for obtaining the compactness. A sierpinski carpet based fractal antenna is designed for multiband applications. It should be in compactness and less weight is the major point for designing an antenna. This antenna is providing better efficiency.

Keywords:
 component; Sierpinski gasket, fractal, multiband antenna, miniaturization.


References:

1.        Pramendra Tilanthe and P. C. Sharma, “Design of a single layer multiband microstrip square ring antenna” IEEE explore-www.ieee.org, Applied Electromagnetic Conference (AEMC), year: 2009, PP: 1– 4.
2.        Duixian Liu and Brian Gaucher, “A New multiband Antenna for WLAN/Cellular Applications”, Vehicular Technology Conference, 2004;VTC2004-Fall; IEEE 60th, Year: 2004, Vol: 1, PP: 243 – 246.

3.        C. Puente, J. Romeu, R. Pous, A. Cardama, “On the behavior of the Sierpinski multiband antenna,”IEEE Trans. Antennas Propagat., vol. 46, pp. 517-524, Apr. 1998

4.        D. H. Werner, S. Ganguly, "An overview of Fractal Antenna Engineering Research", IEEEAntennas and Propagation Magazine, vol. 45, pp.38-57, 2003.

5.        Philip Tang and Parveen Wahid, “Hexagonal Fractal Multiband Antenna,” Antennas and Propagation Society International Symposium, IEEE, vol. 4, pp. 554-557, June 2002.

6.        Asit K.Panda, Manoj K.Panda, Sudhansu S.Patra “A Compact Multiband Gasket Enable Rectangular Fractal Antenna”IEEE2011 International Conference on Computational Intelligence and Communication Systems. Page(s):11-13

7.        B.R.Franciscatto,T.P.Voung and G.Fontgalland “High gain sierpinski gasket fractal shape antenna design for RFID”IEEE2011.

8.        J. Anguera; C. Borja; C. Puente, “Microstrip Fractal-Shaped Antennas,” A Review, Antennas and Propagation, 2007, EuCAP 2007, The second European Conference on 11-16 Nov. 2007 Page(s):1 – 7

44-47

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

11.

Authors:

Lakshmana Phaneendra Maguluri, Naga Srinivasu Parvathanni, Ravikiran Karri

Paper Title:

An Efficient De noising Based Clustering Algorithm for Detecting Dead Centers and Removal of Noise in Digital Images

Abstract:   As of now, several improvements have been carried out to increase the performance of previous conventional clustering algorithms for image segmentation. However, most of them tend to have met with unsatisfactory results. In order to overcome some of the drawback like dead centers and trapped centers, in this article presents a new clustering-based segmentation technique that may be able to overcome some of the drawbacks we are passing with conventional clustering algorithms. Clustering algorithms are used for segmenting Digital images however noise are introduced  into images during image acquisition, due to switching, sensor temperature. They may also occur due to interference in the channel and due to atmospheric disturbances during image transmission and affecting the segmentation results Noise reduction is a pulmonary step prior to feature extraction attempts from digital images. In order to overcome this drawback, this paper presents a new clustering based segmentation technique that can be used in segmenting noise Digital images. We named this approach as De noising based Optimized K-means clustering algorithm (DOKM).where De noising is fully data driven approach. The qualitative and quantitative analyses have been performed to investigate the robustness of the OKM algorithm. And this new approach is effective to avoid dead centre and trapped centre in segmented Digital Images.

Keywords:
 limitations of conventional clustering algorithms; dead center problem; Salt-and-Pepper Noise; Image segmentation;


References:

1.        S.N. Suleiman and N.A.M. Isa, “Adaptive fuzzy−K−means clustering algorithm for image segmentation”, IEEE T.Consum. Electr. 56, 2661–2668 (2010).
2.        N.A.M. Isa, S.A. Salamah, and U.K. Ngah, “Adaptive fuzzy moving K−means clustering algorithm for image segmenta−tion”, IEEE T. Consum. Electr. 55, 2145–2153 (2010).

3.        F.U. Siddiqui and N.A.M. Isa, “Enhanced moving K−means(EMKM) algorithm for image segmentation”, IEEE T.Consum. Electr. 57, 833–841 (2011).

4.        J.−W Jeong, D.C. Shin, S.H. Do, and V.Z. Marmarelis,“Segmentation methodology for automated classification and differentiation of soft tissues in multiband images of high−resolution ultrasonic transmission tomography”, IEEE T. Med. Imaging 25, 1068–1078 (2006).

5.        W.Lou, “ Efficient Removal of Impulse Noise From Digital Images”, IEEE Transaction on Consumer Electronics, Vol. 52, no.2, pp.523-527, 2006.

6.        S.N. Sulaiman and N.A.M. Isa, Denoising−basedclusteringalgorithms for segmentation of low level salt−and−peppernoise−corrupted images”, IEEE T. Consum. Electr. 56,2702–2710 (2010).

7.        K.K.V.Toh, H.Ibrahim, and=M.N.Mahyuddin, “ Salt andPepperNoise Detection And Reduction UsingFuzzy switching Median Filter”, IEEETransactions on Consumerelectronics, vol.54, no.4, pp.1956-1961, 2008.

8.        Spot Edge Detection of Microarray Images Using B1idimensional Empirical Mode Decomposition”,C3IT -2012,ELSEVEIR, Procedia Technology, Vol 4: pp227-231.

9.        V.P  Dinesh Kumar, and T. Thomas, “Clustering of invariance improved Legendre moment descriptor for content based image retrieval,” IEEE International Conference on Signal Processing, Communications and Networking, pp. 323-327, 2008.

10.     F.U. Siddiqui  and N.A.M. Isa, “Optimized K-means (OKM) clustering algorithm for image segmentation”  in singer by  OPTO−ELECTRONICS REVIEW 20(3), 216–225 DOI: 10.2478/s11772−012−0028−8 in  2012


48-53

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

12.

Authors:

Samarth S. Mabrukar, Nitin S. Sonawane, Jasmine A. Bagban

Paper Title:

Biometric System using Iris Pattern Recognition

Abstract:   Iris is unique body part which does not change with respect to time. Also every individual has unique and different pattern of the Iris for both the eyes. This helps in identifying a person, quite accurately. Initially, a filter must be employed to get rid of any kind of noises before pre-processing stage. Initially we detect the pupil-iris boundary. After that, we give it to Circular Hough transform to detect its center which will be used to extract iris from the image. Using Daugman’s Rubber sheet model, we normalize the iris pattern for making computations easy. Feature Extraction is done by using multi-scale Taylor series expansion of the iris texture. Feature vectors are extracted by binarizing the first and second order multi-scale Taylor coefficients. The proposed algorithm is tested against different images which gives better results in less computation time. The simulation is carried out using CASIA database on MATLAB.

Keywords:
 Hough Transform, Iris, Multi-Scale, Segmentation, Taylor Series Expansion.


References:

1.        F.H. Adler, Physiology of the Eye, Mosby, St. Louis, MO, 1965.
2.        J. Daugman, High confidence visual recognition of persons by a test of statistical independence, IEEE Transactions on Pattern Analysis and Machine Intelligence 15 (11) (1993) 1148–1161.

3.        Chinese Academy of Sciences – Institute of Automation Iris Database 1.0, 2003. Available at:     <http://www.sinobiometrics.com>.

4.        J. Canny (1986) "A computational approach to edge detection", IEEE Trans. Pattern Analysis and Machine Intelligence, vol 8, pages 679-714.

5.        T. Chuan Chen, K. Liang Chung: An Efficient Randomized Algorithm for Detecting Circles. Computer Vision and Image Understanding Vol. 83 (2001) 172-191.

6.        J. Daugman. How Iris Recognition Works. Proceedings of 2002 International Conference on Image Processing, Vol. 1, 2002. Available at http://www.ncits.org/tc_home/m1htm/docs/m1020044.pdf 

7.        Y. Zhu, T. Tan, Y. Wang: Biometric Personal Identification Based on Iris Patterns. Proceedings of ICPR, International Conference on Pattern Recognition Vol. II (2000) 805-808.

8.        Algirdas Bastys, Justas Kranauskas, Volker Krüger , “Iris recognition by fusing different representations of multi-scale Taylor expansion”, Science Direct journals, Computer Vision and Image Understanding 115 (2011) 804–816.

9.        J. Daugman, New methods in iris recognition, IEEE Transactions on Systems, Man, and Cybernetics – Part B: Cybernetics 37 (5) (2007) 1167–1175.

10.     Masek, L. (2003). Recognition of Human Iris Patterns for Biometric Identification. Available at: <http://www.csse.uwa.edu.au/opk/studentprojects/labor>.

11.     Zhang Jin-Yu, Chen Yan, Huang Xian-Xiang,Edge Detection of Images Based on Improved Sobel Operator and Genetic Algorithms.

12.     R.C.Gonzalez and R.Woods,” Digital Image Processing, 3rd edition”, Pearson Publication, Pg 741.


54-57

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

13.

Authors:

Heena Sharma, Navdeep Kaur Kaler

Paper Title:

Data Mining with Improved and Efficient Mechanism in Clustering Analysis and Decision Tree as a Hybrid Approach

Abstract:   In this research, we are using clustering and decision tree methods to mine the data by using hybrid algorithms K-MEANS, SOM and HAC algorithms from clustering and CHAID and C4.5 algorithms from decision tree and it can produce the better results than the traditional algorithms. It also performs the comparative study of these algorithms to obtain high accuracy. Clustering method will use for make the clusters of similar groups to extract the easily features or properties and decision tree method will use for choose to decide the optimal decision to extract the valuable information.This comparison is able to find clusters in large high dimensional spaces efficiently. It is suitable for clustering in the full dimensional space as well as in subspaces. Experiments on both synthetic data and real-life data show that the technique is effective and also scales well for large high dimensional datasets.

Keywords:
 Clustering, Decision tree, HAC, SOM, C4.5, Data Mining, K-Means


References:

1.        Tipawan Silwattananusarn, Dr. KulthidaTuamsuk “Data Mining and Its Applications for Knowledge Management -A Literature Review from 2007 to 2012” International Journal of Data Mining & Knowledge Management Process (IJDKP) Vol.2, No.5, September 2012 pp 13-24.
2.        Hong Yu, Xiaolei Huang, Xiaorong Hu, Hengwen Cai (2010) “A Comparative Study on Data Mining Algorithms for Individual Credit Risk Evaluation”, International Conference on Management of e-Commerce and e-Government.

3.        Ji Dan, Qiu Jianlin (2010) “A Synthesized Data Mining Algorithm Based on Clustering and Decision Tree”, 10th IEEE International Conference on Computer and Information Technology, CIT.

4.        Mohamed El far, Lahcen Moumoun, Mohamed Chahhou, Taoufiq Gadi (2010) “Comparing between data mining algorithms: "Close+, Apriori and CHARM" and “K-Means classification algorithm” and applying them on 3D object indexing”, 10th IEEE International Conference on Computer and Information Technology, CIT.

5.        S.P.Latha (2007) “Algorithm for Efficient Data Mining”, International Conference on Computational Intelligence and Multimedia Applications, Kavaraipettai.

6.        Wangjie Sun, Zhigao Zheng (2010) “An Advanced Design of Data Mining Algorithms”, IEEE.

7.        Abdolreza Hatamlo and Salwani Abdullah    “A Two-Stage Algorithm for Data Clustering” Int Conf. Data Mining DMIN 2011 pp-135-139.

8.        http://en.wikipedia.org/wiki/CURE_data_clustering_Algorithm

9.        S.Balaji and Dr.S.K.Srivatsa” Decision Tree induction based classification for mining Life Insurance Data bases”   International Journal of Computer Science and Information Technology & Security (IJCSITS), ISSN: 2249-9555 Vol. 2, No.3, June 2012 pp-699-703.

10.     Lior Rokach and Oded Maimon” Top-Down Induction of Decision Trees Classifiers- A Survey” IEEE TRANSACTIONS ON SYSTEMS, MAN AND CYBERNETICS: PART C, VOL. 1, NO. 11, NOVEMBER 2002 pp-1-12.

11.     T. Kohonen”The Self-Organizing Map” Proceedings of the IEEE, 78(9):1464-1480, 1990.

12.     Lior Rokach and Oded Maimon” Top-Down Induction of Decision Trees Classifiers- A Survey” IEEE TRANSACTIONS ON SYSTEMS, MAN AND CYBERNETICS: PART C, VOL. 1, NO. 11, NOVEMBER 2002 pp-1-12.


58-60

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

14.

Authors:

R.Gnanajeyaraman, P.Muneeshwari

Paper Title:

Performance Analysis of Low power Low-cost Signal detection of MIMO- OFDM using NSD

Abstract:   This paper aims to maximize throughput by minimizing power as possible. Scores of optimization techniques such as FFT, IFFT and memory optimization are available for reducing power of mobile OFDM systems. An approach for achieving reduction in power of MIMO OFDM system by optimizing FFT architecture is addressed in this paper. Memory references in MIMO OFDM transceivers are costly due to their long delay and high power consumption . To implement fast Fourier transform (FFT) algorithms on MIMO OFDM. The proposed FFT structure is the combination of memory reference reduction    evaluated using performance parameters such as BER and SNR. In order to reduce the hardware complexity of the MIMO OFDM synchronization, this paper proposed an efficient autocorrelation scheme based on time multiplexing technique and the use of reduced samples while preserving the performance.  QoS is an important consideration in networking, but it is also a significant challenge. This QoS is based on some parameter like network traffic, data loss, data collision and speed. The VLSI implementation was done using ModelSim and Xilinx .Strutural realization and analysis pertaining to timing   , power, QoS highthroughput and low-cost design with high performance to detect PSS using NSD is derived in this paper.                                    

Keywords:
 Low power, low cost, primary synchronisation signal(PSS), FFT,LTE, IFFT, Inter symbol interference(ISI)


References:

1.        Fu Bo & Ampadu Paul, J Signal Process Syst, 56(1) (2009) 59-68                    
2.        Chang Y & Park S C, IEICE Tans Fundamentals, E87- (11) (2004) 3020- 3024

3.        Kim Hun Seok, Zhu Weijun, Bhatia Jatin, Mohammed Karim, Shah Anish & Daneshrad Babak, EURASIP J Adv Signal Process, 2008.

4.        LaRoache Isabelle & Roy Sebastien, An Efficient Regular Matrix Inversion Circuit Architecture for MIMO Processing, IEEE Int Symp on Circuits and Systems (ISCAS), May 2006, pp. 4819-4822.  

5.        Lin Y T, Tsai P Y & Chiueh T D, IEE Proc Comput Digit Technol, 152(4) (2005) 499-506.

6.        Perels D, Haene S, Luethi P, Burg A, Felber N,Fichtner W & Bolcskei H, IEEE Trans VLSI Syst, 5(2005) 215-  218.          

7.        Gresien Pierre, Haene Simon & Burg, EURASIP J Embedded Syst, 2008, Article ID242584 

8.        Reisis D & Vlassopoulos N, IEEE Trans Circuits Syst 55(11) (2008) 3438- 3447.

9.        Radhouane R, Liu P & Modlin C, in proc, IEEE Int Symp  Circuits Syst, 1(May 2000) 116-119.      

10.     Yoshizawa Shingo & Miyanaga Yoshikazu, VLSI Implementation of SISO- OFDM Transceivers, IEEEInt Symp Communications Information Technologies          (ISCIT), No. T2D-4, Oct 2006.

11.     Yoshizawa Shingo, Yamauchi Yasushi Miyanaga Yoshikazu, A complete pipelined MMSE detectionArchitecture in a 4x4 MIMO-OFDM receiver, IEEE Int Symp on Circuits and Systems (ISCAS), May 2008, pp. 1248-1251.    

12.     Yoshizawa Shingo, Yamauchi Yasushi Miyanaga Yoshikazu, VLSI Architecture of a 4x4 MIMO-OFDM With an 80-MHz Channel Bandwith Transceiver,IEEE IntSymp on Circuits and Systems (ISCAS), May 2009, pp. 1248-1251. 

13.     Yoshizawa Shingo, Yamauchi Yasushi Miyanaga Yoshikazu, VLSI Implementation of a4x4MIMO- OFDM Tranceiver for 1Gbps Data transmission, IEEE  Int Symp on Circuits and Systems (ISCAS), May 2010, 1743-1746.

14.     Lamarca Rey F & Vazquez M G, IEEE Trans signal  Process, 53 (3) (2009) 1741-1755.

15.     Shin M & Lee H, A high-speed four-parallel radix-2 4FFT/IFFT processor for UWB applications, Proc.IEEE I nt. Symp. Circuits and Systems, May 2008, pp.960-963.

16.     Ma G K & Taylor F J, IEEE ASSP Mag, Jan 1990, pp.6-20.

17.     3rd Generation Partnership Project (3GPP), Sophia- Antipolis Cedex, France, 3GPP TS 36.11 v8.9.0 3rd Generstion Partnership Project; Technical Specification Group Radio Access (E-UTRA); Physical Channels and Modulation (Release 8), 3rd Generation Partnership Project, Dec.2009, 3GPP.

18.     S.Sesiya, I. Toufik, and M. Baker, LTE-The UMTSLong Term Evolution: From Theory to Practice. New -York: Wiley, 2009.       
  

61-65

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

15.

Authors:

Swati Kamra, Deepender Dhull, Nidhi

Paper Title:

Bandwidth Estimation to Provide QoS Routing in MANET

Abstract:   In mobile ad hoc networks (MANETs), the provision of quality of service (QoS) guarantees is much more challenging than in wire line networks, mainly due to node mobility, multi-hop communications, contention for channel access, and a lack of central coordination. QoS guarantees are required by most multimedia and other time- or error-sensitive applications. The difficulties in the provision of such guarantees have limited the usefulness of MANETs. However, in the last decade, much research attention has focused on providing QoS assurances in MANET protocols. The QoS routing protocol is an integral part of any QoS solution. We propose a QoS routing protocol is the use of the approximate bandwidth estimation to react to network traffic. Our approach implements Admission control and feedback scheme by using two bandwidth estimation methods (Hello and Listen). We simulate our QoS- routing protocol for nodes running the IEEE 802.11 medium access control. Results of our experiments show those Comparisons among Hello and Listen Methods with the Qos metrics.

Keywords:
 Bandwidth estimation, mobile ad hoc routing networks (MANETs), Quality-of-service (QoS


References:

1.        D. Kim, “A New Mobile Environment: Mobile Ad Hoc Networks (MANET),” IEEE Vehic. Tech. Soc. News, Aug. 2003, pp. 29–35.
2.        S. Chen, Routing Support for Providing Guaranteed End-to- End Quality-of-Service, Ph.D. thesis, University of Illionois at Urbana-Champaign, 1999.

3.        S. Chakrabarti and A. Mishra, “QoS Issues in Ad Hoc Wireless Networks,” IEEE Common. Mag., vol. 39, Feb. 2001, pp. 142–48.

4.        S. Chakrabarti and A. Mishra, “Quality of Service Challenges for Wireless Mobile Ad Hoc Networks,” Wiley J. Wireless Commun. and Mobile Comp., vol. 4, pp. 129–53, Mar 2004.

5.        J. N. Al-Karaki and A. E. Kamal, “Quality of Service Routing in Mobile Ad Hoc Networks: Current and Future Trends,” Mobile Computing Handbook, I. Mahgoub and M. IIays, Eds., CRC Publishers, 2004.

6.        T. B. Reddy et al., “Quality of Service Provisioning in Ad Hoc Wireless Networks: A Survey of Issues and Solutions,” April 2004, available online: http://www.sciencedirect.com.

7.        L. Chen and W. Heinzelman, “QoS-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks,” IEEE JSAC, vol. 23, Mar. 2005, pp. 561–72.

8.        C. R. Lin and J.-S. Liu, “QoS Routing in Ad Hoc Wireless Networks,” IEEE JSAC, vol. 17, Aug. 1999, pp. 1426–38.

9.        M. Sheng, J. Li, and Y. Shi, “Routing Protocol with QoS Guarantees for Ad-Hoc Network,” Electronics Letters, vol. 39, Jan. 2003, pp. 143– 45.

10.     I. Rubin and Y.-C. Liu, “Link Stability Models for QoS Ad Hoc Routing Algorithms,”Proc. 58th IEEE Vehic. Tech. Conf., vol. 5, Oct. 2003, pp. 3084–88.

11.     L. Barolli, A. Koyama, and N. Shiratori, “A QoS Routing Method for Ad Hoc Networks Based on Genetic Algorithm,” Proc. 14th Int’l Wksp. Database and Expert Systems Applications, Sept. 2003, pp. 175–79.

12.     D. Kim, C.-H. Min, and S. Kim, “On-Demand SIR and Bandwidth- Guaranteed Routing with Transmit Power Assignment in Ad Hoc Mobile Networks,” IEEE Trans. Veh. Tech., vol. 53, pp. 1215–23, July 2004.

13.     N. Wisitpongphan et al., “QoS Provisioning using BER-Based Routing in Ad Hoc Wireless Networks,” Proc. Vehic. Tech. Conf., vol. 4 2005, pp.2483-87.

14.     C. E. Perkins et al., “Performance Comparison of Two On- Demand Routing Protocols for Ad Hoc Networks,” IEEE Pers. Commun. Mag., vol. 8, Feb.2001,pp.16-28.

15.     J. Broch et al., “A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols,” Proc. Int’l. Conf. Mobile Computing and
Networking,Oct.1998.

66-70

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

16.

Authors:

Pramisha Sharma, Amit Dubey, S.K. Chatterjee

Paper Title:

Physico- Chemical Analysis of Surface and Ground Water of Abhanpur Block in Raipur District, Chhattisgarh, INDIA

Abstract:   A segment of this investigation was carried out to study the ground water as well as surface water quality and its physico-chemical characteristics of Abhanpur block district Raipur of Chhattisgarh, India. The geographical area at study is situated between 210 3’ N to 21 035’4” N latitude and 81043’ E to 49.64’5” E longitude. The present work has been conducted by monitoring of ground and surface water i.e. well water, bore - well  water of 8 wards of  Abhanpur block as well as pond and tap water of the Abhanpur. Attempts were made to study and analyze the physico-chemical characteristics of water, i.e. , temperature, pH, total dissolved solids, alkalinity, hardness, and chloride.

Keywords:
 Ground water, Surface water, Physicochemical parameter, Raipur district.


References:

1.        N. Kumar, “A View on Freshwater environment”, Ecol, Env & cons.3, 1997 (3-4)
2.        T.N. Tiwari, and M. Mishra, “Pollution in the river Ganga at Varanashi”. Life Science Advances 5, 1986.pp. 130-137.

3.        T.N. Tiwari, and M. Ali, “River pollution in Katmandu valley variation of water quality index”, JEP 1, 1987,pp.347-351.

4.        P.M Reddy, and V. Venkateswar, “Assessment of water quality in the river Tungabhadra near Kurnel”, A.P.J. Environ. Biol. 8, 1987, pp. 109-199.

5.        R.D.khulab, “Prospective in aquatic biology”. Papyrus Pub. House, New Delhi. ed 1989.

6.        R.A. Vollenweidre, “Scientific fundamental of the eutrophication of lakes and flowing waters with special reference to nitrogen and phosphorus as factoring eutrophication”. O.E.C.D. Paris. 1986.

7.        National Academy of science. Eutrophication causes consequences and correctives. Nat.Acad.Sci. Washington,D.C.

8.        C.P.Milway, “Educational in large lakes and impoundments”. Proc. Upplasale Symp. DECD Paris.1969.

9.        T. Olimax, and U. Sikorska, “Field experiment on the effect of municipal sewage on macrophytes and epifauna in the lake littoral”. Bull. Acad. Pol. Sc. clii 23, 1975, pp.445-447.

10.     E. Piecznska, Usikorna and T. Olimak, “The influence of domestic sewage on the littoral of lakes”. Pol.Arch. Hydrobiol. 22, 1975, pp.141-156.

11.     H.B.Mahanand, M.R. Mahanand, and B.P. Mohanty, “Studies on the Physico-chemical and Biological Parameters of a Fresh Water Pond Ecosystem as an Indicator of Water Pollution”. Ecol. Env & Cons 11(3-4), 2005, pp537-541.

12.     P.D.Moore, Jr.T.C. Daniel, J.T. Gilmour, B.R. Shereve, D.R. Edward, and B.H.Wood, “Decreasing Metal Runoff from Poultry Litter with Aluminum Sulfate”. J.Env. Qual.27, 1998, pp. 92-99.

13.     A. Kumar, Periodicity and Abundance of Plankton in Relation to physico-chemical Characteristics of Tropical Wetlands of South Bihar. Ecol. Env. And Cons. Vol., 1995, pp.47-54.

14.     Gay and Proop, “Aspects of Rive pollution, Butterworth’s Scientific Publication”, London. 1993.

15.     R.A. Vollenwider, “water Management research. Scientific fundamentals of the eutrophication of lakes and flowing waters with particular reference to nitrogen and phosphorus as factor in eutorophication,” 1998, pp.45-72.

16.     B.A. Muller: Residential Water Source and the Risk of Childhood Brain Tumors. Env. Health. Perspt.Vol.109 (6), 2001.

17.     P.G.”Parivesh Groundwater”, Ed Dilip Biswas, July 2003 p.3.

18.     P.J. Veslind, “National Geographic Senior Writer”, national Geographic, Vol. 183, No.5. 1993.

19.     C.L. Zaman, “A Nested Case Control Study of methemoglobinemia Risk Factors in Children of Transylvania, Romania”. Env. Health Perspt. Vol. 110 (B), 2002

20.     R.K. Trivedy, “Physico-Chemical Characteristics and Phytoplankton of the River Panchganaga near Kolhapur, Maharastra”. River Pollution in India (Ed. R.K. Trivedy) Ashish Publishing House, Delhi, 1990, pp.159-178.

21.     Welch Limnology 2nd Edn. McGraw Hill Book Co., New York. 1952.

22.     APHA, “standard method for examination of water and waste and waste water”, American Public Health Association, Washington, D.C. 1989.


71-74

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

17.

Authors:

Neethu Kunjappan, K.Lakshmanan

Paper Title:

Video Survillence using Multifeature Background Subtraction Algorithm: A Self adaptive Security Mechanism

Abstract:   This is a security system based on background subtraction algorithm. Currently existing surveillance systems normally use Closed Circuit TVs. Background modeling and subtraction is a natural technique for object detection in videos captured by a static cameras. The proposed paper uses multi feature background subtraction technique. Here it uses a pixel wise background modeling and subtraction using multiple features. Here generative and discriminative techniques are combined for classification. In this algorithm, gradient, color, and Haar-like features are closely integrated so that they can handle variations in space and time for each and every pixel. A e background model that is pixel wise generative is obtained for each feature by Kernel Density Approximation (KDA). Background subtraction is performed using a Support Vector Machine (SVM). The proposed algorithm is resistant to shadow, illumination changes in light and spatial variations of background. It monitors an already captured environment and if an intruder comes, then it will send message alert to the administrator and it will send current streaming video to the admin system. All these actions are performed so fast that it will be easy to catch the intruder and needs no human interaction which makes the system efficient.

Keywords:
 Background Subtraction Algorithm,Kernel Density Approximation ,Support Vector Machine, Haar-like features


References:

1.        Mittal and N. Paragios, “Motion-based Background Subtraction Using Adaptive Kernel Density Estimation,” Proc. IEEE Conf. Computer Vision and Pattern Recognition, 2004.
2.        Z. Hao, W. Wen, Z. Liu, and X. Yang, “Real-Time Foreground-Background Segmentation Using Adaptive Support Vector Machine Algorithm,” Proc. 17th Int’l Conf. Artificial Neural Networks, pp. 603-610, 2007.

3.        Han, D. Comaniciu, and L. Davis, “Efficient hierarchical method for background subtraction” Proc. Asian Conf. Computer Vision, 2004.

4.        A. Elgammal, D. Harwood, and L. Davis, “Background and Foreground Modeling using Nonparametric Kernel Density estimation for Visual Surveillance” Proc. European Conf. Computer Vision, pp. 751-767, June 2000.

5.        D.S. Lee, “Background subtraction in video using recursive mixture models, spatio-temporal  filtering and shadow removal” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 27,no. 5, pp. 827-832, May 2005.

6.        Z. Zivkovic and F. van der Heijden, “Efficient Adaptive Density Estimation Per Image Pixel for Task of Background Subtraction,” Pattern Recognition Letters, vol. 27, no. 7, pp. 773-780, 2006.

7.        P. Viola and M. Jones, “An Improved Adaptive Background Mixture Model for Real time Tracking with    Shadow  Detection ” Proc. IEEE Conf. Computer Vision and Pattern recognition, pp. 511-518, 2001.

8.        Han, D. Comaniciu, Y. Zhu, and L.S. Davis, “Background subtraction techniques: a review” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 30, no. 7, pp.
1186-1197,July 2008.

9.        I. Haritaoglu, D. Harwood, and L.S. Davis, “W4: Real-Time Surveillance of People and Their Activities,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 22, no. 8, pp. 809-830, Aug. 2000.


75-78

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

18.

Authors:

Navneet N Tewani, Neeharika Ithapu, K Raghava Rao, Sheik Nissar Sami, B. Sai Pradeep,V.Krishna Deepak

Paper Title:

Distributed Fault Tolerant Algorithm for Identifying Node Failures in Wireless Sensor Networks

Abstract:   A Wireless Sensor Network is a set of multiple connected components. Sometimes due to the failure of some of its nodes, the sensor network communication fails. So that we consider this problem of node(s) failure termed as “cut” from the remaining nodes of a wireless sensor network. We propose an algorithm that allows (i) every node to detect when the connectivity to a specially designated node has been lost, and (ii) one or more nodes (that are connected to the special node after the cut) to detect the occurrence of the cut. The algorithm we proposed is distributed and asynchronous i.e. every node needs to communicate with only those nodes that are within its communication range. The algorithm is based on the iterative computation of the nodes.  The convergence rate of the underlying iterative scheme is independent of the size and structure of the network. In this algorithm we devised a way to solve the problem of redundant information at the destination which arises due to availability of information at every node that is initially sent from the source node. We demonstrate the effectiveness of the proposed algorithm through simulation.

Keywords:
 Cut, iterative computation, redundancy, simulation, Wireless sensor networks.


References:

1.        Jagdish Pimple, Prof.Yogadhar Pandey “Cut Detection in Wireless Sensor Network using Distributed Source Separation Detection (DSSD) Approach.”, International Journal of Scientific and Research Publications, Volume 2, Issue 12, December 2012 1 ISSN 2250-3153.
2.        “Detecting a Network Failure” by Jon Kleinberg, Internet Mathematics Vol. 1, No. 1: 37-56.

3.        G. Dini, M. Pelagatti, and I.M. Savino, “An Algorithm for Reconnecting Wireless Sensor Network Partitions,” Proc. European Conf. Wireless Sensor Networks, pp. 253-267, 2008..

4.        N. Shrivastava, S. Suri, and C.D. To´ the, “Detecting Cuts in Sensor Networks,” ACM Trans. Sensor Networks, vol. 4, no. 2, pp. 1-25, 2008.

5.        H. Ritter, R. Winter, and J. Schiller, “A Partition Detection System for Mobile Ad-hoc Networks,” Proc. First Ann.  IEEE Comm.  Soc.Conf. Sensor and Ad Hoc Comm.
and Networks (IEEE SECON ’04), pp. 489-497, Oct. 2004.

6.        M. Hauspie, J. Carle, and D. Simplot, “Partition Detection in Mobile Ad-Hoc Networks,” Proc. Second Mediterranean Workshop Ad-Hoc Networks, pp. 25-27, 2003.

7.        “Cut Detection in Wireless Sensor Networks” Prabir Barooah, Member, IEEE, Harshavardhan Chenji, Student Member, IEEE, Radu Stoleru, Member, IEEE, and Tama´s Kalma´r-Nagy IEEE Transactions on Parallel and Distributed Systems, vol.23, no.3, March 2012.

8.        P. Barooah, “Distributed Cut Detection in Sensor Networks, ”Proc. 47th IEEE Conf. Decision and Control, pp. 1097-1102, Dec.2008.

9.        “Fault Tolerant Algorithms/Protocols in Wireless Sensor Networks” Hai Liu, Amiya Nayak, Ivan Stojmenović.

10.     “Towards robustness and energy efficiency of cut detection in wireless sensor networks Myounggyu Won”, Stephen M. George, Radu Stoleru..


79-83

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

19.

Authors:

Rahul Pal, Rahul Gotiya, Pankaj Singh, Amit Agrawal

Paper Title:

Design of A Embedded Ethernet Packet Sniffer

Abstract:   In this paper we are proposing a brief description about embedded Ethernet based event controller Packet sniffers. These are devices or programs capable of intercepting and logging network traffic for which they were not the intended recipient. Their ability to eavesdrop on network traffic has made them indispensable tools for IT administrators. In modern IP networks, packet sniffers are often used to determine the source of network problems, detect intrusions and locate vulnerabilities. Sniffers can also be used for covert surveillance of users internet activities. Ethernet operates at higher bit rate than slow-speed embedded protocols.

Keywords:
 embedded, packet sniffer, collision domain.


References:

1.        Wikipedia,”Packet Sniffer,” [Online Document], 2007 3 April, [Cited 2007 11 May], Available HTTP: http://en.wikipedia.org/wiki/Packet_sniffer
2.        Wikipedia, “Ethernet,” [Online Document], 2007 8 May, [Cited 2007 11 May], Available HTTP: http://en.wikipedia.org/wiki/Ethernet

3.        Michael Myers, Network+ Certification All-In-One Exam Guide, 3rd Edition, McGraw-Hill Osborn Media, 2004.

4.        Linh Trinh, “TCP/IP Sniffer Designs Teaches Basics of Embedded Ethernet,” [Online Document], 2002 15 April, [Cited 2007 11 May], Available HTTP: http://www.elecdesign.com/Articles/Index.cfm?AD=1&ArticleID=2099

5.        Wikipedia, “Request For Comments”, [Online Document], 2006 June 9, [Cited 2007 11 May], Available HTTP: http://en.wikipedia.org/wiki/Request_For_Comments

6.        Altera Corporation, “Quartus II Handbook vol. 5: Altera Embedded Peripherals,” [Online Document], 2007 May, [Cited 2007 11 May], Available HTTP      http://www.altera.com/literature/hb/nios2/n2cpu_nii5v3.pdf

7.        Altera Corporation, “Nios II Software Developer’s Handbook,” [Online Document], 2007 May, [Cited 2007 11 May], Available HTTP: http://www.altera.com/literature/hb/nios2/n2sw_nii5v2.pdf

8.        Altera Corporation, “Nios II Flash Programmer User Guide,” [Online Document], 2007 May, [Cited 2007 11 May], Available HTTPhttp://www.altera.com/literature/ug/ug_nios2_flash_programmer.pdf

9.        Altera Corporation, “Nios II Processor Reference Handbook,” [Online Document], 2007 May, [Cited 2007 11 May], Available HTTP: http://www.altera.com/literature/hb/nios2/n2cpu_nii5v1.pdf

10.     Altera Corporation, “DE2 Development and Education Board User Manual,” [Online Document], 2007 May, [Cited 2007 11 May], Available HTTP:
http://www.altera.com/education/univ/materials/boards/DE2_UserManual.pdf
11.     Jon Postel, “RFC 791 – Internet Protocol,” [Online Document], 1981 September,[Cited 2007 11 May] Available HTTP: http://www.ietf.org/rfc/rfc0791.txt

12.     Jon Postel, “RFC 793 - Transmission Control Protocol,” [Online Document],1981 September, [Cited 2007 11 May] Available HTTP:http://www.ietf.org/rfc/rfc0793.txt

13.     Jon Postel, “RFC 768 – User Datagram Protocol,” [Online Document], 1981 September, [Cited 2007 11 May] Available HTTP: http://www.ietf.org/rfc/rfc0768.txt

14.     David C. Plummer, "RFC 826 - Address Resolution Protocol," [OnlineDocument], 1982 November, [Cited 2007 11 May], Available HTTP:http://www.ietf.org/rfc/rfc0826.txt.

15.     Jon Postel, "RFC 792 - Internet Control Message Protocol," [Online Document],1981 September, [Cited 2007 11 May], Available HTTP:http://www.ietf.org/rfc/rfc0792.txt

16.     R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, T. Berners- Lee, “RFC 2616 – HyperText Transfer Protocol Version 1.1,” [Online Document], 1999 June, [Cited 2007 11 May], Available HTTP: http://www.ietf.org/rfc/rfc2616.txt

17.     M. Crispin, “RFC 3501 – Internet Mail Access Protocol,” [Online Document],2003 March, [Cited 2007 May 11], Available HTTP:http://www.ietf.org/rfc/rfc3501.txt

18.     M. Rose and J. Meyers, “RFC 1939 – Post Office Protocol Version 3” [Online Document], 1996 May, [Cited 11 May 2007], Available HTTP:http://www.ietf.org/rfc/rfc1939.txt

19.     Jon Postel, “RFC 821 – Simple Mail Transfer Protocol,” [Online Document], 1982 August, [Cited 2007 11 May], Available HTTP: http://www.ietf.org/rfc/rfc0821.txt

20.     Wikipedia, “OSCAR Protocol,” [Online Document], 2007 8 May, [Cited 2007 11 May] Available HTTP: http://en.wikipedia.org/wiki/OSCAR_protocol.


84-88

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

20.

Authors:

S. Paul Sathiyan, S. Suresh Kumar, A. Immanuel Selvakumar

Paper Title:

A Comprehensive review on Cruise Control for Intelligent Vehicles

Abstract:   Automatic vehicle speed control is presently one of the most popular research topics throughout the automotive industry and particularly in the Intelligent Transportation Systems field (ITS). Cruise Control (CC) system employs the concept of running at set speed under no obstacle / vehicle in front (velocity Control). CC for the metropolitan areas can significantly enhance the benefits in terms of comfort, safety, traffic flow, noise and emissions with some improved technology. CC fails to work when a vehicle / obstacle is detected in the front of the host vehicle. To overcome this drawback, Adaptive Cruise Control (ACC) system was developed. ACC can also wok in velocity control mode along with distance control mode. In distance control mode ACC can automatically adjust the velocity of the vehicle in order to maintain a proper distance between leading vehicle and the host vehicle. This paper discuss about the various evolutions that has been evolved in the field of cruise control, its recent developments and research trend in the automation of the vehicles in longitudinal/lateral control. The control algorithms like fuzzy logic, sliding mode, genetic algorithm, sensor fusion techniques etc., are used to implement the various level of evolution of cruise control. The techniques with their merits and short comings have been reviewed, keeping safety first and then fuel economy and comfort. The paper concludes with suggestions for future improvement.

Keywords:
 Cruises Control, Distance Control, Intelligent Vehicle, Lateral Control, Longitudinal Control, Velocity Control.


References:

1.       Kwang So Chang, Jae Sung Choi “Automatic Vehicle following using the Fuzzy Logic” in Proc. 6th Int. Conf. Vehicle Navigation and Information Systems, WA, 1995, pp. 206-213.
2.       Nassaree Benalie, Worrawut Pananurak, Somphong Thanok, and Manukid Parnichkun “Improvement of Adaptive Cruise Control System based on Speed Characteristics and Time Headway” IEEE/RSJ Int. Conf.  On Intelligent Robots and Systems, pp 2403-2408.

3.       José E. Naranjo, Carlos González, Ricardo García, and Teresa de Pedro “ACC+Stop&Go Maneuvers With Throttle and Brake Fuzzy Control”, IEEE Transactions On Intelligent Transportation Systems, vol. 7, no. 2, 2006, pp 213-225.

4.       Worrawut Pananurak, Somphong Thanok, Manukid Parnichkun “Adaptive Cruise Control for an Intelligent Vehicle” in  Proc. International Conference on Robotics and Biomimetics, Bangkok, 2009, pp 1794-1799.

5.       Sang-Jin Ko and Ju-Jang Lee “Fuzzy Logic Based Adaptive Cruise Control with Guaranteed String Stability” in Proc. International Conference on Control, Automation and Systems, Seoul, 2007, pp 15–20.

6.       Jassbi S. Khanmohammadi Kharrati “A Hybrid Method for Determination of Fuzzy rules & Membership Functions” IEEE Congress on Evolutionary Computation, Hong Kong, 2008, pp 1649 -1654.

7.       P. Venhovens, K. Naab and B. Adiprasito “Stop and Go Cruise Control”, International Journal of Automotive Technology, Vol. 1, No. 2, 2000, pp. 61-69.

8.       Antonella Ferrara, Claudio Vecchio “Second order sliding mode control of vehicles with distributed collision avoidance capabilities”, Mechatronics, Vol. 19, Issue 4, 2009, Elsevier, P 471 – 477.

9.       Tankut Acarman, Yiting Liu and U mit O zguner “Intelligent Cruise Control Stop and Go with and without Communication” in Proc. American Control Conference, Minneapolis, MN, 2006, pp 4356 – 4361.

10.     SWOV Fact sheet “Advanced Cruise Control (ACC)” SWOV, Leidschendam, the Netherlands August 2008.

11.     Gerrit Naus, Roel van den Bleek, Jeroen Ploeg, Bart Scheepers, Rene van de Molengraft, Maarten Steinbuch “Explicit MPC Design and Evaluation of an ACC Stop & Go” American Control Conference, Washington, USA, 2008, pp 225 – 229.

12.     Donghoon Han', Kyongsu yi and Seungjong “Evaluation of Integrated ACC(Adaptive Cruise Control)/ CA(Collision Avoidance) on a Virtual Test Track” YiSICE-ICASE International Joint Conference, Busan, 2006, pp  2127 – 2132.

13.     Seungwuk Moon, IlkiMoon, KyongsuYi “Design, tuning, and evaluation of a full-range adaptive cruise control system with collision avoidance” Elsevier Control Engineering Practice, Vol 17, Issue 4, 2009,  pp 442–455.

14.     T. Luong, J.Weber, D. Koller', and J. Malik “An integrated stereo-based approach to automatic vehicle guidance” 5th Int. Conf. Computer Vision,  Cambridge, MA, 1995, pp. 206-213.

15.     C. C. Chien and P. loannou  ”Automatic Vehicle-Following”, American Control Conference, USA, 1992, pp 1748 -1752.

16.     José E. Naranjo, Carlos González,, Jesús Reviejo, Ricardo García, and Teresa de Pedro “Adaptive Fuzzy Control for Inter-Vehicle Gap Keeping” IEEE Transactions On Intelligent Transportation Systems, vol. 4, no. 3, 2003, pp 132-142.

17.     Li Bin Wang Rongben Chu Jiangwei “A New Optimal Controller for Intelligent Vehicle Headway Distance” Proceedings of the IEEE Intelligent Vehicle Symposium, vol. 2, 2002, pp 387-392.

18.     John-Jairo Martinez and Carlos Canudas-de-Wit “ A Safe Longitudinal Control for Adaptive Cruise Control and Stop-and-Go Scenarios”  IEEE Transactions On Control Systems Technology, vol. 15, no. 2 ,2007, pp246 -258

19.     Kyongsu Yi, Ilki Moon and Young Do Kwon “A Vehicle-to-Vehicle Distance Control Algorithm for Stop-and-Go Cruise Control”, IEEE Intelligent Transportation Systems Conference Proceedings, Oakland, CA, 2001, pp 478-482.

20.     Arne Kesting, Martin Treiber, Martin Schohof, Dirk Helbing “Adaptive cruise control design for active congestion avoidance” Transportation Research Part C, Vol. 16 Issue 6 , pp 668–683.2008.

21.     Jorn Freyer, Barbara Deml, Markus Maurer, Berthold Farber “ACC with enhanced situation awareness to reduce behavior adaptations in lane change situations”, Proceedings of the IEEE Intelligent Vehicles Symposium, 2007, pp 999- 1004.

22.     Ho Gi Jung, Yun Hee Lee and Pal Joo Yoon “Forward Sensing System for LKS+ACC”, World Congress Detroit SAE Technical paper Series April 2008.

23.     Arne Kesting, Martin Treiber, Martin Sch¨onhof, Florian Kranke, and Dirk Helbing “Jam-avoiding adaptive cruise control (ACC) and its impact on traffic dynamics” Traffic and Granular Flow, Springer (Berlin), 2005, pp 633-643.

24.     Ankur Shrivastava Perry Y. Li, “Traffic flow stability induced by constant time headway policy for adaptive cruise control vehicles”, American Control Conference, vol. 3, 2000, pp 1503-1508.

25.     L. C. Davis, “Effect of adaptive cruise control systems on traffic flow”, The American Physical Society, 2004 (unpublished)

26.     Anouck Renée Girard, João Borges de Sousa, James A. Misener and J. Karl Hedrick “A Control Architecture for Integrated Cooperative Cruise Control and Collision Warning Systems” 40th IEEE Conf. on Decision and Control, vol.2, 2001, pp 1491 – 1496.

27.     Julien Laumonier, Charles Desjardins and Brahim Chaibdraa “Cooperative Adaptive Cruise Control: a Reinforcement Learning Approach,” unpublished.

28.     Kazuaki Takano Tatsuhiko Monji Hiroshi Kondo, Dr. Eng. Yuji Otsuka “Environment Recognition Technologies for Supporting Safe Driving” Hitachi Review Vol. 53 , No. 4 pp217-22. 2004.

29.     R. Hallouzi  V. Verdult  H. Hellendoorn  J. Ploeg  “Experimental Evaluation of A Co-Operative Driving Setup Based On Inter-Vehicle communication” 5th IFAC/EURON Symposium on Intelligent Autonomous vehicle, Portugal, 2004.

30.     Sadayuki TSUGAWA “Trends and Issues in Safe Driver Assistance Systems” IATSS Research vol.30 no.2, 2006, pp 6-18.

31.     William k. Grefe thesis on “Integrating Collision Avoidance, Lane Keeping, And Cruise Control with An Optimal Controller and Fuzzy Controller” April 29, 2005.

32.     Shahram Rezaei, Raja Sengupta, Hariharan Krishnan, Xu Guan “Reducing the communication required by DSRC-based vehicle safety ystems” in Proc. Intelligent Transportation Systems Conference, Seattle, WA,2007, pp361-366.

33.     Xiangheng Liu Andrea Goldsmith “Effects of Communication Delay on String Stability in Vehicle Platoons”, IEEE Intelligent Transportation System Conference (ITSC), USA, 2001, pp 625 – 630.

34.     Peter Morsink, et al  “CARTALK 2000: Development of a Cooperative ADAS based on Vehicle-to Vehicle Communication” 10th World Congress and Exhibition on Intelligent Transport Systems and Service, Spain, 2003.

35.     Jun Luo Jean-Pierre Hubaux “A Survey of Inter-Vehicle Communication” School of Computer and Communication Sciences, Lausanne, Switzerland. EPFL, CH-1015, LCA-REPORT-2000-009.

36.     Shin Kato, Sadayuki Tsugawa, Kiyohito Tokuda, Takeshi Matsui, and Haruki Fujii “Vehicle Control Algorithms for Cooperative Driving With Automated Vehicles and Intervehicle Communications” IEEE Transactions on Intelligent Transportation Systems, vol. 3, no. 3, 2002, pp 155-161.

37.     Yang Bin, Keqieng Li, Xiaomin Lian Hiroshi Ukawa, Masatoshi Handa, Hideyuki Idonuma “Longitudinal Acceleration Tracking Control of Vehicular Stop-and-Go Cruise Control System”, in Proc. Int. Conf. on Networking, Sensing & Control, Taipei, Taiwan, 2004, pp 607-612.

38.     Sadayuki TSUGAWA “Issues and Recent Trends in Vehicle Safety Communication Systems” IATSS Research vol.29 no.1, 2005, pp 7-15

39.     Zille Eizad Ljubo Vlacic “A Control Algorithm and Vehicle Model for Stop & Go Cruise Control” IEEE Intelligent Vehicles Symp., University of Parma Parma, Italy, 2004, pp 401-406.

40.     Wei-Yen Wang, , Ming-Chih Lu, Hung Lin Kao, and Chun-Yen Chu “Nighttime Vehicle Distance Measuring Systems” IEEE Transactions on Circuits and Systems—II: Express Briefs, vol. 54, no. 1, 2007, pp 81 -85.

41.     S .Tokoro, K.Kuroda, A. Kawakubo, K.Fuj ita, H.Fujinami “Electronically Scanned Millimeter-wave Radar for Pre-Crash Safety and Adaptive Cruise Control System” in Proc. of Intelligent Vehicles Symposium, 2003, pp 304-309.

42.     Alessio Carullo and Marco Parvis, “An Ultrasonic Sensor for Distance Measurement in Automotive Applications”, IEEE Sensors Journal, vol. 1, no. 2, 2001, pp 143-147.

43.     Vivek Agarwal, , N. Venkata Murali, and C. Chandramouli  “A Cost- Effective Ultrasonic Sensor-Based Driver-Assistance System for Congested Traffic Conditions” IEEE Transactions on Intelligent Transportation Systems, vol. 10, no. 3, 2009, pp 486 -497.

44.     Ka C. Cheok, G. E. Smid & D.J. McCune  “A Multisensor-Based Collision Avoidance System With Application to a Military HMMWV” 2000 IEEE Intelligent Transportation Systems Conference Proceedings Dearborn (MI), USA, 2000, pp 288-292.

45.     Soo-Yeong Yi, Kil-To Chong “Impedance control for a vehicle platoon system” Mechatronics vol. 15, issue 5, Elsevier 2005, pp 627–638

46.     Willie D. Jones “Keeping Cars from crashing” IEEE Spectrum,  September 2001, pp 40-45

47.     CHI-YING LIANG and HUEI PENG “Optimal Adaptive Cruise Control with  Guaranteed String  Stability”  Vehicle System Dynamics, Swets & Zeitlinger, 1999 pp.313–330.

48.     K.-T. Song, C.-H. Chen, and C.-H. C. Huang, “Design and experimental study of an ultrasonic sensor system for lateral collision avoidance at low speeds,” in Proc. IEEE Intelligent. Vehicles Symp., Parma, Italy, 2004, pp. 647–652.

49.     Morag Chivers, Trimble “Differential GPS Explained” ArcUser Online March2003 http://www.esri.com/news/arcuser/0103/differential1of2.html

50.     Matthias Steinhauer,  Hans-Oliver Ruo B,  Hans Irion, and Wolfgang Menzel, “Millimeter-Wave-Radar Sensor Based on a Transceiver Array for Automotive Applications” IEEE Transactions on Microwave Theory and Techniques, vol. 56, no. 2, 2008, pp261-269


89-96

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

21.

Authors:

Jaimon Chacko Varghese, Binesh Ellupurayil Balachandran

Paper Title:

Low Cost Intelligent Real Time Fuel Mileage Indicator for Motorbikes

Abstract:   The design of “Low Cost Intelligent Real Time Fuel Mileage Indicator for Motorbikes” is intended to developing a low cost device that can actively display the fuel mileage of a motorbike and display it in real time onto a display which is attached/placed on the dashboard of a vehicle along with other driver information system. A unique method and system has been devised for giving instantaneous mileage readings in real time during both driving conditions and idling conditions corresponding to the amount of fuel consumed and the distance travelled by the motorbike. This device can be added as an enhancement to existing motorbikes too which works on carburetor and even on bikes with fuel injection technology. The mathematical calculations done by humans to manually check the mileage of a vehicle can be automated with the implementation of this device. Also, the probable distance that can be travelled by the vehicle corresponding to the amount of fuel in the fuel tank can also be estimated. The method and apparatus in this device includes a flowmeter from which the amount of fuel consumed is sensed and given as the input signal to a microcontroller which in turn also receives the signals from vehicle speed sensors indicating the distance travelled.  The microcontroller access the data obtained from both the sensors and computes numerical value which can be displayed onto a display unit digitally.

Keywords:
 driver information system; engine; flowmeter; fuel; low cost; mileage; motorbike;  sensors


References:

1.       Farrell G. Butler, “ Gasoline Mileage Indicator System,” US Patent 3958453, May 1976.
2.       Kosuge, et al, “Method and apparatus for indicating mileage corresponding to remaining fuel for vehicles,” US Patent 4400779, August 1983.

3.       Min Goo Lee, Yong Kuk Park, Kyung Kwon Jung and Jun Jae Yoo, “Estimation of Fuel Consumption using In-Vehicle Parameters,” International Journal of u- and e- Service, Science and Technology, Vol. 4, No. 4, December, 2011.

4.       Rashmi R, Mrs.Rukmini Durgale, “The Novel of Embedded Based Digital Fuel Gauge,” International Conference on Computing and Control Engineering (ICCCE 2012), 12 & 13 April, 2012.

5.       Altera Corp, “Creating Low-Cost Intelligent Display Modules With an FPGA and Embedded Processor,” v 1.0, September 2008.

6.       http://www.slideshare.net/bikeadvice

7.       Hisao Nezo, Nagaoka, “Odometer”, US Patent 4192450, March 1980.

8.       A. Beaulieu, E. Foucault, P. Braudb, P. Micheaua, P. Szeger, “A flowmeter for unsteady liquid flow measurements,” Science Direct, p. 131-137, January 2011.

9.       Hojat Ghassemi, Hamidreza Farshi Fasih, “Application of small size cavitating venturi as flow controller and flow meter”, Science Direct, p. 406-412, May 2011.

10.     http://en.wikipedia.org/wiki/Tire_size

11.     Robert M. Bucks, Norristown, Frederick M. Ayars, “Vehicle Data Recording System”, US Patent 3792445, February 1974.

12.     Daniel R. McGlynn, “Vehicle Usage Monitoring And Recording System”, US Patent 4072850, February 1978.

13.     http://www.atmel.com/Images/Atmel-2486-8-bit-AVR-microcontroller-ATmega8_L_datasheet.pdf

14.     en.wikipedia.org/wiki/Level_sensor

15.     Electronic equipment on rail vehicles (http:/ / www. selectron. ch/ downloads/ kataloge/ normen-EN-50-155/Standard-EN-50155. Pdf

16.     S. Kawamura, :Development of Navigation Control," Toyota Technology, Vol. 34, December 1984.

17.     http://www.datasheetarchive.com/7--diesel+solenoid-datasheet.html

18.     Reed switch and reed sensor applications, www.reed-sensor.com

19.     "Liquid Level Sensing," Infineon Technologies, February 2009.


97-101

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

22.

Authors:

Pravin W. Raut, S.L. Badjate

Paper Title:

MIMO-Future Wireless Communication

Abstract:   The exceptional growth of the telecommunication industry in recent years fueled by the widespread popularity of mobile phones and wireless computer networking. The demand of wireless communication is constantly growing and need the tether less connectivity. The major limitations to this growth is the disadvantages of traditional wireless communication System due to the limitations of available frequency resources, Bandwidth, channel capacity, complexity, reliability, transmission data rate and physical areas. This paper addresses the overview of new technology Multi-Input-Multi-Output (MIMO)-the Future Wireless system will be much more efficient to meet the heavy demand of Wireless communication in available limited frequency resources. MIMO channel is frequency selective (multipath) and is known to boost channel capacity for high-data rate transmissions, low power implementation, sophisticated signal processing algorithm. The FPGA based coding techniques will reduce the size, complexity and increase the reliability of connectivity.

Keywords:
 MIMO, FPGA, Transmitter, Receiver, OFDM. Antenna, Channel estimation.


References:

1.        VLSI Design Volume 2008, Article ID 312614. This work has been supported by European FP6 IST 2002 507039 Project 4 MORE and by the Spanish Ministry of  Science  and Technology under Project TEC2006-13067-C03-03 from IEEE site
2.        David Gesbert, Mansoor Shafi, Da-shan Shiu, Peter J. Smith, and Ayman Naguib.From theory to practice: An overview of mimo space-time coded wireless systems.IEEE Journal on Selected Areas in Communications, 21(3):281–302, 2003.

3.        Raleigh, G.G. and Cioffi, J.M. . Spatio-temporal coding for wireless communications.IEEE Transactions on Communications, 46(3):357–366, 1998.

4.        Siavash M. Alamouti. A Simple Transmit Diversity Technique for Wireless Communications. IEEE Journal on Select Areas in Communcations, 16(8):1451–1458,October 1998.

5.        Vahid Tarokh, Hamid Jafarkhani, and A. Robert Calderbank. Space-time blockcoding for wireless communications: Performance results. IEEE Journal on Selected Areas in Communications, 17(3):451–460, March 1999.

6.        “Design and implementation of a hardware module for equalization in a 4G MIMO receiver,” in Proc. IEEE Int. Conf. on Field Programmable Logic and Applications FPL’2006), Madrid, Spain, Aug.2006.

7.        Design and Implementation in FPGA of a MIMO Decoder for a 4G Wireless Receiver Alberto Jim´enez-Pacheco, A´ ngel Ferna´ndez-Herrero†and Javier Casaju´s-Quiro´s

8.        An FPGA-Based MIMO and Space-Time Processing Platform -J. Dowle,1 S. H. Kuo,2   K. Mehrotra,1 and I. V.McLoughlin1

9.        Efficient FPGA-based Implementations of the MIMO-OFDM Physical Layer Jeoong S. Park, Hong-Jip Jung and Viktor K. Prasanna,University of Southern California, Los Angeles,

10.     An FPGA-based MIMO and Space-Time processing platform J. Dowle, S. H. Kuo, K. Mehrotra, I. V. McLoughlin Group Research.

11.     An FPGA-based MIMO and Space-Time processing platform J. Dowle, S. H. Kuo, K. Mehrotra, I. V. McLoughlin Group Research.

12.     MIMO: The next revolution in wireless data communications By Babak Daneshrad

13.     AN FPGA IMPLEMENTATION OF ALAMOUTI’S TRANSMIT DIVERSITY TECHNIQUE  Chris Dick- Xilinx, Inc. 2100 Logic Dr.San Jose, CA 95124,Patrick Murphy, J. Patrick Frantz_Rice University - ECE

14.     MIMO in 3G Cellular Systems: Challenges and Future Directions ,Jeffrey G. Andrews, Wan Choi, and Robert W. Heath Jr. IEEE Communication magazine-1

15.     FPGA Implementation of MIMO Module, www.rfwireless-world.com

16.     Bit Error Rate Performance of MIMO Channels for various Modulation Schemes using Maximum Likelihood Detection Technique, IP Multimedia Communications A Special Issue from IJCA - www.ijcaonline.org

17.     Maximum-Likelihood Equalisation for STBC-MIMO on Test-Bed ,Ashu Taneja Assistant Professor,Department of Electronics & Communication Engineering Chitkara University, Baddi. International Journal of Computer Applications (0975 – 8887) Volume 46– No.22, May 2012

18.     Advanced Measurement Techniques for OFDM- and MIMO-based Radio SystemsDemystifying WLAN and WiMAX Testing by keithley

19.     MIMO: from Theory to Reality ,  Ruifeng Wang July 2009

20.     MIMO-OFDM Decoding: From Theory to Practice, 1E. R. de Lima, 2K.Iguchi, 3F.Angarita,3M.J. Canet, 3J.Valls, 1V.Almenar and 1 S. J. Flores Technical University of Valencia, Spain

21.     From Theory to Practice: An Overview of MIMO Space–Time Coded Wireless Systems David Gesbert, Member, IEEE, Mansoor Shafi, Fellow, IEEE, Da-shan Shiu, Member, IEEE, Peter J. Smith, Member, IEEE, and Ayman Naguib, Senior Member, IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 21, NO. 3, APRIL 2003

22.     Implementation of Synchronization for 2×2 MIMO WLAN System, Hsin-Lei Lin, Robert C. Chang, Member, IEEE, Kuang-Hao Lin, Chia-Chen Hsu, IEEE Transactions on Consumer Electronics, Vol. 52, No. 3, AUGUST 2006

23.     FPGA Implementation of an Iterative Receiver for MIMO-OFDM Systems , Laurent Boher, Rodrigue Rabineau and Maryline H´elard , IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 26, NO. 6, AUGUST 2008

24.     G. J. Foschini and M. J. Gans, “On limits of wireless communications in a fading environment when using multiple antennas,” Wireless Pers. Commun., vol. 6, pp. 311–335, Mar. 1998.

25.     G. J. Foschini, “Layered space–time architecture for wireless communication in a fading environment when using multielement antennas,” Bell Labs Tech. J., pp. 41–59, Autumn 1996.

26.     D. Gesbert, M. Shafi, D.-S. Shiu, P. Smith, and A. Naguib, “From theory to practice: an overview of MIMO space-time coded wireless systems,” IEEE Selected Areas in Communications Journal, vol. 21, no. 3, pp. 281–302, Apr. 2003.

27.     V. Jungnickel, V. Pohl, and C. von Helmolt, “Capacity of MIMO systems with closely spaced antennas,” IEEE Communications Letters, vol. 7, no. 8, pp. 361–363, Aug. 2003.

28.     W. Y. Ge, J. S. Zhang and G. L. Xue, “MIMO-Pipe Modeling and Scheduling for Efficient Interference Management in Multihop MIMO Networks,” IEEE Transactions on Vehicular Technology, vol. 59, no. 8, pp.3966-3978, 2010.

29.     A. Goldsmith, S. Jafar, N. Jindal, S. Vishwanath, “ Capacity limits of MIMO channels,” IEEE Journal on Selected Areas in Communications, vol. 21, no. 5, pp. 684-702, 2003.

30.     C. N. Chuah, D. Tse, J. M. Kahn, and R.Valenzuela, “Capacity scaling in MIMO wireless systems under correlated fading,” IEEE Trans. Inform. Theory, vol. 48, pp. 637–650, Mar. 2002.

31.     P. J. Smith and M. Shafi, “On a Gaussian approximation to the capacity of wireless MIMO systems,” in Proc. Int. Conf. Communications, ICC 2002, 2002, pp. 406–410.

32.     “A standardized set of MIMO radio propagation channels,” Lucent,Nokia, Siemens, Ericsson, Jeju, Korea, 3GPP TSG-RAN WG1 23, Nov.19–23, 2001.

33.     L. Hanlen and M. Fu, “Multiple antenna wireless communication systems: Capacity limits for sparse scattering,” in Proc. 3rd Australian Communication Theory Workshop, Aus CTW 2002, Canberra, Australia,2002.

34.     Jack Winters "Optimum Combining in Digital Mobile Radio with Cochannel Interference," Special Issue on Mobile Radio Communications IEEE Journal on Selected Areas in Communications, July 1984, IEEE Trans. on Vehicular Technology, August 1984.

35.     Raleigh, G. G. and Jones, V. K. "Multivariate modulation and coding for wireless communication", IEEE J. Selected Areas in Communication, vol. 17, no. 5, pp. 851-866, May 1999

36.     Gerard. J. Foschini "Layered Space-Time Architecture for Wireless Communication in a Fading Environment When Using Multi-Element Antennas". Bell Laboratories Technical Journal, pp: 41-59. October 1996

37.     Helmut Bolcskei, MIMO Systems, Communication Technology Laboratory, ETH Zurich October 13, 2005

38.     George Lawton Is MIMO the Future of Wireless Communications? July 2004

39.     S. Cui, A. J. Goldsmith, and A. Bahai (August, 2004). "Energy-efficiency of MIMO and Cooperative MIMO in Sensor Networks". IEEE J. Select. Areas of Commun. 22 (6):1089–1098.doi:10.1109/JSAC.2004.830916

40.     L. Zheng and D. N. C. Tse (May 2003). "Diversity and multiplexing: A fundamental tradeoff in multiple-antenna channels". IEEE Trans. Inf. Th.49 (5): 1073–1096.doi:10.1109/TIT.2003.810646.

41.     A Real-Time 4-Stream MIMO-OFDM Transceiver:  System Design, FPGA Implementation, and Characterization, Simon Haene, Member, IEEE,  and Andreas Burg, Member, IEEE, IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 26, NO. 6, AUGUST 2008

42.     P. Wolniansky, G. Foschini, V-BLAST: an architecture for realizing very high data rates over the rich-scattering wireless channel,” IEEE Signals, Systems,and Electronics, pp. 295–300, Oct. 1998.

43.     V. Jungnickel, V. Pohl, and C. von Helmolt, “Capacity of MIMO systems with closely spaced antennas,” IEEE Communications Letters, vol. 7, no. 8, pp. 361–363, Aug. 2003.

102-106

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

23.

Authors:

Jeevan Prasad Adhikari

Paper Title:

Performance Analysis of Protocols RIP & EIGRP

Abstract:   The Routing Information Protocol (RIP) is one of the Internet's first widely used routing protocol.  It is still useful in local and medium area networks. RIP is classified as a distance-vector routing protocol, which employs the hop count as a routing metric, The maximum number of hops allowed for RIP is 15[3]. A hop count of 16 is considered an infinite distance viewing such distance as unreachable and undesirable route in it routing process. This hop count limits the size of network that RIP operate. EIGRP is a Cisco-proprietary routing protocol that is based on IGRP. EIGRP supports CIDR and VLSM, allowing network designers to maximize address space. EIGRP is often described as a hybrid routing protocol that offers the best of distance vector and link-state algorithms. EIGRP is an advanced routing protocol that relies on features commonly associated with link-state protocols. This paper consist of comparisons of  RIP and  EIGRP, it  includes the various trouble resolving techniques and traffic handling techniques during communication in simple as well in bulky networks[5].

Keywords:
 Routing Protocols RIP, IGRP, EIGRP.


References:

1.       Komala CR, Srinivas Shetty, Padmashree S., Elevarasi E., “Wireless Ad hoc Mobile Networks”, National Conference on Computing Communication and Technology, 2010,pp. 168-174.
2.       Dan P., Lixia Z., and Dan M., “A Framework for Resilient Internet Routing Protocols,” Computer Journal of IEEE Network, vol. 4, no. 1, 2004, pp. 1-36.

3.       Jeff. Doyle, Jennifer Carroll “Routing TCP / IP”, Pearson Education, Second edition, 2006.

4.       Talal Mohamed Jaffar, “Simulation-Based Routing Protocols Analysis (Thesis)” Ph.D Thesis, Dept. Elect. Eng., Georgia Institute of Technology, 2007.

5.       Amir Ranjbar, “Troubleshooting and Maintaining Cisco IP Networks (TSHOOT)”,Cisco Press,Indian Polis,USA, first edition, 2010.

6.       Thorenoor, S.G., "Dynamic Routing Protocol Implementation Decision between EIGRP, OSPF and RIP Based on Technical Background Using OPNET Modeler", April 23-25, 2010. Computer and Network Technology (ICCNT), 2010 Second International Conference. Vol. 1, pp. 191-195.

7.       Jeff. Doyle, Jennifer Carroll “Routing TCP / IP”, Pearson Education, Volume I, Second edition, 2006.  


107-111

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

24.

Authors:

Rameshwar T. Murade, Pavan M. Ingale, Rahul U. Kale, Sarfaraz S. Sayyad

Paper Title:

Comparative analysis of IP, ATM and MPLS with their QoS

Abstract:   An ancient philosopher said” Humans are social animals.” Peoples exchanges ideas and information about themselves and other and bout current and past events. People were curious to know what happen and this curiosity combined with inventiveness led them to build networks to facilitated information exchange. For this, networks plays vital role for enhancements of technology. Internet has raising popularity. For its network reliability, efficiency & QoS is required. This kind of real time traffic (i.e. voice and video) required extra care because of delay sensitive, QoS, limited bandwidth.  For this we have three technologies IP, ATM and MPLS. IP is highly used in network core and also it support real time traffic. But IP offers random delay in transmission. All telecommunication operators which provides voice services as significant part their business. They choose ATM has backbone technology. ATM integrate voice and data to guaranty of good QoS & support for further development such video conferencing or ISDN but ATM is not best way to carry IP traffic for transmission of voice, because we cannot replace IP based network. Because of this IP over ATM increases overhead problem to traffic. ATM have not another way to carry IP traffic Solution to all this is MPLS, MPLS is label based technology. MPLS support characteristics of IP & ATM. It based on label switched path (LSP) in network means packet carry label in network   . MPLS make super highway for all types of transmission. It supports all types of services.

Keywords:
 Communication protocol, IP, ATM & MPLS.


References:

1.       Understanding SONET / SDH & ATM communication network for next millellium-stamatics V., Kartolopoulos.
2.       MPLS over ATM & IP over ATM methods for multimedia applications, cemal kocak, Ismail Erturk, Huseyin Ekiz.2009.

3.       Performance comparision of IP, MPLS and ATM based N/W core using OPNET, Hafiz M., Asif and MD Gulam kasoor.

4.       Fast setup of end-to-end paths for bandwidth constained application in an IP/MPLS-ATM integrated environment, Sergio Sonchez-Lopez, Xavier Masip-Bruin, Josep Sole-Pareta, Jardi bominge-Pscual.

5.       Internet traffice engineering using MPLS, Daniel O., Awducte, Bijen Jabbori.2002.

6.       Juniper N/W (2002) “ Migration strategies for IP sevice growth, cell – switched MPLS or IP routed MPLS”

7.       Aspect of N/W migration from ATM to MPLS, Adrian Minta.

8.       Optical N/W : A pratical perstective – Rajiv Ramaswami & Kumar N. Sivarajan , 2 ed. , 2004, ELSEVIER Morgan Kaufmann Publisher.

9.       Introduction to MPLS, Tripti Batra, Gagan Aggarwal, 2006.

10.     Business Class Solutions LLC, Steve Wyant , 2012.

11.     Multiprotocol Label Switching, Author Christian Barbiran.


112-115

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

25.

Authors:

K. Bhaskar Reddy, P Ajay Kumar Reddy, K. Sai Venu Prathap

Paper Title:

Design and Development of Anti-detaining Student Monitoring System

Abstract:   The Idea of Designing an Innovative Anti-detaining student monitoring system is born with the observation of student’s behavior in real life. Most of the students will be bunking the classes, most of the time and due to attendance shortage finally gets detained. And he will be losing his career most of the times. The parents will not be aware until the student crosses the attendance dead line. The purpose of this project is to develop a student monitoring and guardian alert system maintain the attendance of students who are mostly irregular to classes. After observing the attendance of the students in the first month, students whose attendance is below the margin level, (approx. below 40 to 50%) are filtered out and those students should be registered in the system with their identity particulars, finger prints, mobile numbers of their guardians etc…every day the enrolled students has to put their attendance at periodical intervals of the day. If the student fails to put attendance, immediately a SMS message using GSM modem will be sent to the guardian and student mobiles. The main objective of the system is to reduce the students who are getting detained every year.

Keywords:
 RFID, NFC, Biometric, GSM Modem, Attendance.


References:

1.        http://en.wikipedia.org/wiki/Fingerprint
2.        “What is a GSM Modem?” http://www.nowsms.com/faq/what-isa- gsm-modem

3.        “RFGSM Modem”, http://www.electriccurrent.net/tag/playingcards/

4.        “Nitgen Hamster I - PC/Server Fingerprint Reader”,http://www.nitgenltd.com/nitgen-hamster-1-entry-level-pcfingerprint-reader

5.        "Advantages of .NET Framework", http://www.startvbdotnet.com/dotnet/frameworkadvantages.aspx

116-121

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

26.

Authors:

SureshBabu G, Raviteja Boyanapalli, Raja Sekhara Reddy Vanukuri, Prudhvi Gogineni, Janakinandan Nookala, Goutham Kumar Yarlagadda, VinayBabu Gada

Paper Title:

Identification of Critical Speeds of Turbine Blade Along with Stress Stiffing and Spin Softening Effects

Abstract:   Turbo machinery blades pass through several natural frequencies during start up and shut down operations. That will cause the resonance and cumulative damage to the turbine blades. Hence it is important to identify critical speeds. Critical speed is theoretical angular velocity which extends natural frequency of a rotating object, such as shaft, propeller, lead screw or gear. As of the speed of the rotation approaches the objects natural frequency, the object begins to resonate which dramatically increases systematic vibration. The resulting resonance occurs regardless of orientation. In this project the natural frequencies of turbine blade are identified using FINITE ELEMENT modal analysis at different speeds with spin softening and stress stiffening effects. Then the critical speeds are obtained by plotting Campbell diagram.

Keywords:
 
Critical speed is theoretical angular velocity which extends natural frequency of a rotating object

References:

1.       ANSYS help
2.       HYPERMESH help

3.       www.wikipedia.com

4.       www.altair-india.in

5.       B.H.E.L. manual

6.       A textbook of Fluid Mechanics, Thermodynamics of Turbo machinery by S.L. Dixon.  


122-126

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

27.

Authors:

A.Siva Kumar, K.Vijaya Kumar Reddy

Paper Title:

Experimental Investigations on LHR CI Diesel Engine with varied Operating Parameters and its Simulation

Abstract:   Fuel consumption and the performance are two important in the dependent parameter for any internal combustion engines. The present future generation is being looking towards the pollution free environment. Hence there is a need to search suitable automotive engines to meet low emission levels in their long run. The demand for diesel engines is growing rapidly; therefore it is necessary to increase the fuel efficiency. It is known that, the most of energy developed in any IC engines during combustion is rejected through cooling media. To minimize this heat loss to the coolant, a low heat rejection concept was developed. In LHR engines the effective utilization of heat takes place due to insulation coatings applied to cylinder and piston. At the same time problems associated with LHR engines were solved due to its high combustion temperatures. Heavy exhaust blow-down energy and high NOx emissions were identified, which leads to decrease in thermal efficiency and inability to achieve emission legislation levels. The blow down losses can be overcome by using a concept of extended expansion cycle, in which the expansion ratio is greater than that of the compression ratio. This higher expansion ratio can be achieved by late closing of intake valve. In view of this the compression ratios for both LHR and LHR (EEE) engines are varied and compared with the conventional engine. The cumulative work done and thermal efficiency are high for conventional engines at lower compression ratios. The thermal efficiency is increased as the compression ratios increases for LHR and LHR (EEE) engines.

Keywords:
 LHR, LHR (EEE), Simulation, Crank angle, Compression ratios.


References:

1.        Thomas Morel, Rifat Keribar, Paul N. Blumberg, and Edward F. Fort, “ Examination of Key Issues in Low Heat Rejection Engines”, SAE 860316, 1986.
2.        Rao V.K., Bardon M.F., & Gardiner D.P., “A New Concept That Aids In Operating I.C. Engines At Very Low Ambient Temperatures”.

3.        Stephen R.Turns, “An Introduction to Combustion”, McGraw Hill Book Co., 2000.

4.        Rowland S. Benson, White House N.D., “Internal Combustion Engines”, Pergamon Press, Ltd. 1979.

5.        Heywood J.B., “Internal Combustion Engine Fundamentals”, McGraw Hill Book Co., 1988.

6.        Ganesan V., “Computer Simulation of Compression-Ignition Engine Processes”, University Press Ltd., 2000.


127-131

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

28.

Authors:

K.Srinivasa Ravi, G.H.Varun, T.Vamsi, P.Pratyusha

Paper Title:

RFID Based Security System

Abstract:   Radio Frequency Identification (RFID) is one member in the family of Automatic Identification and Data Capture (AIDC) technologies and is a fast and reliable means of identifying any material object. The significant advantage of all types of RFID systems is the non-contact, non-line-of-sight nature of the technology. Tags can be read through a variety of substances such as snow, fog, ice, paint, crusted grime, and other visually and environmentally challenging conditions, where barcodes or other optically read technologies would be useless. This project can provide security for the industries, companies, etc. This security system gives information about the authorized and unauthorized persons. Primarily, the two main components involved in a Radio Frequency Identification system are the Transponder (tags that are attached to the object) and the Interrogator (RFID reader). In this project, when the card is brought near to the RFID module it reads the data in the card and displays on the LCD. The data in the card is compared with the data in the program memory and displays authorized or unauthorized message. The door opens for an authorized person, closes for an unauthorized person; it alerts the persons through a buzzer. The RFID module indicates a buzzer whenever it reads the data from the RFID card.

Keywords:
 Authentication, RFID Reader, RFID Tag, Security.


References:

1.       Parvathy A, Venkat Rohit Raj “rfid based examination hall system”, a paper on IEEE paper.
2.       Kamran Ahasan, Paul Kingston IEEE paper on “rfid applications: an introductory and exploratory study”.

3.       Mingyan Li, Radha Poovendran, Rainer Falk paper on “multi-domain access control using asymmetric key based tag reader mutual authentication.

4.       Wouter van Dullink, Pieter Westein university of Amsterdam, paper on remote relay attack on rfid access control system using NFC enabled devices.

5.       Stephen a. Weis, Sanjay E.Sarma, Ronald.L.Rivest a paper on “Security and privacy aspects of low cost radio frequency identification systems”.

6.       Gynanendra K Verma, Pawan Tripathi, IIIT Allahabad a paper on “A digital security system with door lock system using rfid technology”.

7.       Bruno Crispo, Melanie R.Rieback, Andrew S Tanenbaum a paper on “The evolution of Rfid security.


132-134

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

29.

Authors:

M.Vanitha, R.Raju

Paper Title:

Data Sharing: Efficient Distributed Accountability in Cloud Using Third Party Auditor

Abstract:   We propose a Third party auditor(TPA) between data owner and cloud service provider(CSP) which reduce the burden of data owner to audit the data in the cloud  and it also make the data owner free from worrying about the data lose in cloud storage . To highlight the security purpose we introduce an novel highly decentralized information accountability framework and object-centered approach. we enclosed the data and set  of  policies for the user access which make the data to be secured from the malicious action made in the cloud. The JAR programmable capability which is used to create both dynamic and traveling object. When any access is made to the user’s data will be trigger the authentication and automated logging control to JARs. A distributed auditing mechanism is used to control the users.

Keywords:
 cloud service provider, Third party auditor, accountability, data sharing.


References:

1.        Flickr, http://www.flickr.com/, 2012.
2.        Trusted Java Virtual Machine IBM, http://www.almaden.ibm.com/cs/projects/jvm/, 2012.

3.        OASIS Security Services Technical Committee, “Security Assertion Markup Language (saml) 2.0,” http://www.oasis-open.org/committees/tc home.php?wg abbrev=security, 2012.

4.        G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z.Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,” Proc. ACM Conf. Computer and Comm. Security, pp. 598-609, 2007.

5.        K. Ren, C. Wang, and Q. Wang, “Security Challenges for the Public Cloud,” IEEE Internet Computing, vol. 16, no. 1, pp. 69-73, 2012.

6.        B. Chun and A.C. Bavier, “Decentralized Trust Management and Accountability in Federated Systems,” Proc. Ann. Hawaii Int’l Conf. System Sciences (HICSS), 2004.

7.        Sun Microsystems, Inc., “Building Customer Trust in Cloud Computing with Transparent Security,”  https://www.sun.com/offers/details/sun_transparency.xml, Nov. 2009.

8.        C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring Data Storage Security in Cloud Computing,” Proc. 17th Int’l Workshop Quality of Service (IWQoS ’09), pp. 1-9, July 2009.

9.        M.A. Shah, R. Swaminathan, and M. Baker, “Privacy-Preserving Audit and Extraction of Digital Contents,” Cryptology ePrint Archive, Report 2008/186, http://eprint.iacr.org, 2008.

10.     W. Lee, A. Cinzia Squicciarini, and E. Bertino, “The Design and Evaluation of Accountable Grid Computing System,” Proc. 29th IEEE Int’l Conf. Distributed Computing Systems (ICDCS ’09), pp. 145-154, 2009.


135-138

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

30.

Authors:

Vinod Jain, Saurav Verma

Paper Title:

Design and Analysis of MEMS Piezoresistive Three layers Microcantilever-based Sensor for Biosensing Applications

Abstract:   The field of Microtechnology and Micro-Electro- Mechanical Systems (MEMS) has grown exponentially during the previous two decades .This work is dedicated to finite element (FE) 3Dstructural modeling of three layers micromechanical sensors in ANSYS 13.0 gives 3D model which are close to reality mathematical models. Material used in cantilever for different layers are silicon-dioxide, poly-silicon and nitride. . The emphasis of the analysis is put on tile effects of the angle of inclination of the concentrated force upon the deformed shape, the load-deflection relationship stresses and strain for further analysis with a greater degree of accuracy. The model we made is three layers microcantilever where the centre layer i.e. second layer, is piezoresistive layer that helps to calculate Characteristics i.e. deflection, deformation, stress and strain in the cantilever for the given applied force that can we used for future analysis for the detection of biomolecules in various biosensing application.

Keywords:
 Microcantilever, Piezoresistive, Young modulus and Elasticity.


References:

1.        Nitin S. Kale and V. Ram opal Rao, Senior Member, IEEE ‘Design and Fabrication Issues in Affinity Cantilevers for BioMEMS Applications’.
2.        Roberto Raiteria, Massimo Grattarola,‘Micromechanical cantilever-based biosensors’ University of Genova, via all’Opera Pia 11a, 16145 Genova, Italy.

3.        Mohd Zahid Ansari and Chongdu Cho, ‘An Analytical Model of Joule Heating in Piezoresistive Microcantilevers’, Inha University, Yonghyun-dong, Korea .

4.        Sandeep Kumar Vashist, ‘A Review of Micro cantilevers for Sensing Applications’

5.        University of Alberta - ANSYS Tutorials http://www.scribd.com/doc/7207853/Ansys-Tutorial-Beam-Bendin.

6.        Vinod Jain, Saurav Verma, ‘Design and characteristics comparison of MicroCantilever for Integrated Sensing Applications’, MPSTME NMIMS Mumbai

7.        Karen M. Goeders, Jonathan S. Colton and Lawrence A. Bottomley ‘Microcantilevers: Sensing Chemical Interactions via Mechanical Motion’, Georgia Institute of Technology, Georgia.

8.        Sung-Jin Park, Member, IEEE, Joseph C. Doll, Student Member, IEEE, and Beth L. Pruitt, Member, IEEE ,’Piezoresistive Cantilever Performance Analytical Model for Sensitivity’.

9.        Nina Korlina Madzhi, Anuar Ahmad; ‘Design Simulation and Analysis of Polysiliconbased CMOS Micromachined Piezoresistive Microcantilever for Glucose Sensing’; Proceedings of the World Congress on Engineering 2012 Vol II WCE 2012, July 4 - 6, 2012, London, U.K.


139-142

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

31.

Authors:

Masoom Bi, Mallikarjuna M Dongre

Paper Title:

Energy-Aware with Mobility-Assisted Geographic Routing Protocol for Mobile Ad Hoc Networks

Abstract:   Most of the existing on-demand geographic routing protocol provides energy efficiency but lack due to the continuous motion of nodes. The topology changes frequently which mean tracking down of particular node become difficult. The nodes can easily come out of or into the radio range of various other nodes and the battery power is limited in all the devices, which does not allow infinitive operational time for the nodes.  We propose an energy-aware with mobility-assisted geographic routing protocol for mobile ad hoc networks (EAGRP) that increases accuracy and reduces energy consumption in transmission of packets by considering local position information and residual energy levels of nodes to make routing decisions. Simulation results shows that proposed approach has a good energy conservation performance and also performs better in context of average end-to-end delay without much affecting the throughput.

Keywords:
 on-demand geographic routing, energy-aware geographic routing, simulation.


References:

1.        B. Karp and H.T. Kung, “Greedy Perimeter Stateless Routing for Wireless Networks,” Proc. ACM MobiCom, pp. 243-254, Aug. 2000.
2.        X. Xiang and X. Wang. An Efficient Geographic Multicast Protocol for Mobile Ad Hoc Networks. In IEEE International Symposium on a World of Wireless, Mobile
and Multimedia Networks (WoWMoM), Niagara-Falls, Buffalo, New York, June 2006.

3.        NAVSTAR GPS operations, available via WWW at URL: http://tycho.usno.navy.mil/gpsinfo.html.

4.        B.W. Parkinson and S.W. Gilbert, NAVSTAR: global positioning system  ten years later, Proceedings of the IEEE 71(10) (1983).

5.        Z. Yang, Y. Liu, and X.-Y. Li, “Beyond Trilateration: On the Localizability of Wireless Ad-Hoc Networks,” IEEE/ACM Trans. Networking, vol. 18, no. 6, pp. 1806-1814, Dec. 2010.

6.        J. Li, J. Jannotti, D. S. J. DeCouto, D. R. Karger, and R. Morris, “A Scalable Location Service for Geographic Ad Hoc Routing,” in Proc. Of ACM/IEEE MobiCom, 2000.

7.        P. Bose, P. Morin, I. Stojmenovic, and J. Urrutia, “Routing with Guaranteed Delivery in Ad Hoc Wireless Networks,” Wireless Networks, vol. 7, no. 6, pp. 1572-8196, Nov. 2001.

8.        Zayene, M.A., Tabbane, N., Elidoudi, R., “Performance Evaluation of Greedy Perimeter Stateless Routing Protocol in Ad hoc Networks”, pp.907-912, Computer Sciences and Convergence Information Technology, Seoul, ICCIT 2009.


143-146

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

32.

Authors:

Monica Sood, Preetpal Kaur

Paper Title:

Identification of Influential Customers in Social Network based on BFO

Abstract:   In this paper we have proposed the implementation to identify the most influential customers in the social network. In Social network, different kind of people are communicate with each others and  exchange their ideas, views  about any products ,item or person. Any company or organization can increase the revenue of their product if the company identify  such a customer in the social network  that has the ability to influence to others in the social network . Influential customers whose connections, messages and opinion strongly influence to others  in the specified social network .Such customers in the social network such as friendster, facebook can be identify by Swarm Intelligence algorithm-BFO. BFO has the strength to produce the optimal solution from the number of solution. We have followed the dataset  from the social network site to find the most influential customers in the network. Bacterial Foraging Optimization(BFO) is the used to identify the optimal node  in the social network .The evaluation based on the number of nodes with the highest simulation influence value to identify best nodes. Influence value based on  number of friends, followers, number of messages reply, likes. The simulation influence point ratio is  use to consider as the simulation influence value to identify the popular nodes in the social network with the help of optimized algorithm-BFO.

Keywords:
 BFO, Influential nodes, Optimized nodes, Swarm Intelligence


References:

1.        Chaudhari Chaitrali and Chaudhari D ,”Application of Swarm Intelligence Algorithm for solving optimization problems”, ICEECS 2012, Pune-ISBN: 978-93-82208-18-1.
2.        Passino Kevin, “Biomimicry of Bacterial Foraging:for Distributed optimization and control”, Department of Electrical Engineering, The Ohio State University, 2002 Neil Avenue ,USA  0272-1708/02©2002IEEE.

3.        Yang Wan and Weng Shi ,”Application Of ACO to influence  Maximization  Problem”, International Journal of Swarm Intelligence and Evolutionary Computation Vol. 1 (2012), Article ID 235566.

4.        D. Kempe, J. Kleinberg, and E. Tardos, “Maximizing the spread of  influence through a social network”, in Proc. of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD ’03), Washington, DC, 2003, 137–146.

5.        Daniel  M.  Romero, Wojciech  Galuba, Sitaram Asur, Bernardo A. Huberman ,”Influence and Passivity in Social Media”, ACM 978-1-4503-0637- 2011, Hyderabad, India 113.


147-149

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

33.

Authors:

Raj Nandini, Himadri Singh Raghav, B.P.Singh

Paper Title:

Comparison of Phase Frequency Detectors by Different Logic Gates

Abstract:   The Phase Detectors determines the relative phase difference between the two incoming signals and outputs a signal that is proportional to this phase difference. Some phase detectors also detect the frequency error, they are called Phase Frequency Detectors (PFD). It is very important block for the Delay Locked Loop. This paper presents the different design schemes of the PFD and compares them with their output results. The circuits that have been considered are the PFD using AND Gate, PFD using NOR Gate and PFD using NAND Gate. The different PFD circuits are designed and layouts are also simulated on Tanner EDA Tool using 0.18μm CMOS process technology with supply voltage 1.8V.

Keywords:
 Dead Zone, Layouts, Maximum Operating Frequency, Phase Frequency Detector, Tanner Tool

References:

1.       Ching-Che Chung and Chen-Yi Lee, “A New DLL-Based Approach for All-Digital  Multiphase   Clock Generation,”  IEEE Journal of Solid -State Circuits, vol. 39, no 3, March 2004, pp469-475.
2.       S. B. Rashmi and Siva S. Yellampalli, “Design of Phase Frequency Detector and    Charge Pump for High Frequency PLL,” International Journal of Soft Computing and Engineering, vol.2, Issue-2, May 2012, pp 88-92.

3.       K.Khare, N.Khare, P. Deshpande  and V. Kulhade , “Phase Frequency Detector of Delay Locked Loop at High Frequency,” lCSE  Proc.2008, Johor Bahru, Malaysia ,
pp 113-116

4.       V.Lule, M.A.Gaikwad and V.G.Nasre, “ Low Power 0.18um CMOS phase frequency detector,” International Journal of  Emerging Technology and Advanced Engineering, vol. 2,July 2012,pp 211-214

5.       Evan Lee Eschenko “A low power prescaler, phase frequency detector and charge pump for a 12 GHz frequency synthesizer,” A Thesis of Master of Science,  Office of Graduate Studies of Texas A&M University, Dec 2007

6.       V.Lule and V.Nasre, “ Area  efficient 0.18um CMOS phase frequency detector  for high speed PLL”, International Journal of Engineering Scientific and Research Publication,vol.2,Feb.2012, pp 1-3.

7.       J.M. Rabaey, A. Chandrakasan and B. Nikolic, Digital Integrated Circuits, 2nd ed., Prentice Hall, 2003


150-153

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

34.

Authors:

Lipsa Sadath

Paper Title:

Data Mining: A Tool for Knowledge Management in Human Resource

Abstract:   Competitiveness is a company’s ability to maintain gain and reputation in its respective market or industry. Human Resource Management (HRM) plays a lead role in determining this competitiveness and effectiveness for better survival. The HRM generally refers to the policies, practices and systems influencing employee behavior, attitude and performance. Companies consider HRM as “people practices”. So it becomes the responsibility of the HRM to mine the best talents at the right time, train them, observe their performance, reward them and ultimately keep them happy in a company. It is simply because of the reason that every strategy of an organization is directly or indirectly related to the talents of the same. To gain and sustain a competitive advantage, knowledge management (developing, sharing and applying knowledge) within the organization becomes essential. But then how is HRM connected to Knowledge Management (KM) becomes a very relevant question. When employees are evaluated from their performance, different methods can be used for mining the best knowledge out of them. This paper is an attempt to study and understand the potential of Data Mining (DM) techniques for automated intelligent decisions from rich employee data base for predictions of employee performance implementing the finest KM strategies, thus achieving stable HR system and brilliant business.  

Keywords:
 Data Mining, Knowledge Management, Human Resource Management, Talent Management, Classification, Prediction


References:

1.       Walker, J.W & Reif, W.E (1999) Human Resource leaders’ capability, strengths and gaps. Human Resource planning, 22(4), 21-32.
2.       Petersen, N.J. and Poulfelt, F. (2002) Knowlegde Management in Action: A Study of Knowledge Management in Management Consultancies, Working Paper 1-2002, Kaupmannahöfn: Copenhagen Business School.

3.       Berry, M. J. A., & Linnof, G, Data mining Techniques, New York: Wiley, (1997).

4.       Agrawal, R., Imielinski, T., and Swami, A., 1993. Mining association rules between sets of items in large databases. In          Proceedings of the ACM SIGMOD International Conference on Management of Data (ACM SIGMOD ’93), pages 207 – 216,Washington, USA.
5.       Agrawal, R. and Srikant, R., 1994. Fast algorithms for mining association rules. In Proceedings of the 20th International Conference on Very Large Databases (VLDB ’94), Santiago, Chile

6.       Agrawal, R. and Shim, K., 1996. Developing tightly coupled data mining applications on a relational database system. In Proceedings of the 2nd International Conference on Knowledge Discovery in Databases and Data Mining (KDD ’96), Portland, Oregon, USA

7.       Data Mining definition Available at http://www.gartner.com/it-glossary/data-mining/

8.       Ranjan, J. (2008). Data Mining Techniques for better decisions in Human Resource Management Systems. International Journal of Business Information Systems, 3(5), 464- 481.

9.       Chien, C. F., & Chen, L. F. (2008). Data mining to improve personnel selection and enhance human capital: A case study in high-technology industry. Expert Systems and Applications, 34(1), 380-290.

10.     Scarbrough, H. and Swan, J. (2001) ‘Explaining the diffusion of knowledge management: The role of fashion’, British Journal of Management, 12, 3-12.

11.     Iles Paul, Chaui Xin, Preece David Talent Management and HRM in Multinational companies in Beijing: Definitions, differences and drivers.

12.     Kluge, J., Wolfram, S. and Licht, T. (2001) Knowledge Uplugged. The McKinsey & Company global survey on knowledge management. Houndsmills: Palgrave

13.     Lynne Markus, M. (2001) ‘Toward a Theory of Knowledge Reuse: Types of Knowledge Reuse Situations and Factors in Reuse Success’, Journal of Management Information Systems, 18:1, 57-93.

14.     Hansen, M.T., Nohria, N. and Tierney, T. (1999) ‘What’s your strategy for managing knowlegde?’ Harvard Business Review, 77, 106-116.

15.     Edvardsson,I.R.(2003) Knowledge Management and Creative HRM, Occasional Paper 14,University of Akureyri, Iceland, Department of Human Resource Management University of Strathclyde.

16.     Beardwell, I. (2001) ‘An introduction to human resource management: strategy, style or outcome’ in I. Beardwell and L. Holen (eds.) In Human Resource Management: A contempory approach, Harlow: Prentice Hall.

17.     Schuler, R.S. and Jackson, S. E. (2002) ‘Linking Competitive Strategies with Human Resource Management Practices’ in S. Little, P. Ouintas and T. Ray (eds.) Managing                                                                      Knowledge: An Essential Reader, London: The Open University in association with Sage Publications.

18.     Lynne, M. (2005). Talent Management Value Imperatives: Strategies for Execution: The Conference Board.

19.     Jantan, H., Hamdan, A. R., & Othman, Z. A. Data Mining Classification Techniques for Human Talent Forecasting, Available at www.intechopen.com

20.     Cubbingham, I. (2007). Talent Management: Making it real. Development and Learning in Organizations, 21(2), 4-6.

21.     A TP Track Research Report (2005). Talent Management: A State of the Art: Tower Perrin HR Services.

22.     CHINA UPDATE. (2007). HR News for Your Organization: The Tower Perrin Asia Talent Management Study. Retrieved from www.towersperrin.com. 7/1/2008.

23.     Jantan, H., Hamdan, A. R., & Othman, Z. A., Human Talent Prediction in HRM using C4.5  Classification Algorithm, (IJCSE) International Journal on Computer Science and Engineering Vol. 02, No. 08, 2010, 2526-2534.

24.     J. Han and M. Kamber, Data Mining: Concepts and Techniques. San Francisco: Morgan Kaufmann Publisher, 2006.


154-159

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

35.

Authors:

Pinky Chandwal, Naresh Kumar

Paper Title:

Evaluation of Contribution and Ranking of Software Quality Attributes by using FAHP

Abstract:   Different authors propose different models and methods to define and estimate software quality.  From these models and methods, we can conclude that quality of software depends upon number of attributes and their sub-attributes. But very little or less effort has been devoted to evaluate the contribution of these attributes to the quality of a software product. Therefore, this study proposes the implementation of ISO 9126 quality model along with Fuzzy Analytical Hierarchy Process (FAHP) to develop a framework for the ranking of different quality attributes in order to evaluate the contribution of these attribute of software to the quality of software product.

Keywords:
 Quality attributes, FAHP, Linguistic variables, Crisp Score, Fuzzy numbers.


References:

1.       McCall JA et al (1977)- Factors in Software Quality: Volume 1-3, RADC-TR77-369 Sunnyvale CA: general electric co.
2.       Boehm, B.W. et al-Characteristics of Software Quality

3.       ISO (1994) ISO 9000- Quality Management and Quality Assurance Vocabulary 2nd Edition: Geneva ISO.
4.       Pinky Chandwal, A. S. Zadgaonkar, Abhinav Shukla - Estimation of software Quality by Using fuzzy (FIS) : volume 2, issue-1 IJSCE
5.       ISO, International Organization for Standardization, ”ISO 9126-1:2001,Software engineering-Product quality,Part1:Quality Model”2001

6.       Saty T. L (1990) The Analytical Hierarchy process, RWS Publications, Pittsburgh, PA.

7.       L.A. Zadeh, Fuzzy Sets, Information and Control, 1965

8.       Saaty, T. L., (1980), The Analytical Hierarchy Process, McGraw Hill, New York.

9.       Pairwise Comarision”, Fuzzy sets & systems 29, 133-143.

10.     Zhu, K. J., Jing, Y., and Chang, D. Y., (1999), “A Discussion on Extent AnalysisMethod and Applications of Fuzzy-AHP”, European Journal of Operational Research,


160-163

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

36.

Authors:

G.SureshBabu, S.D.V.S.Jagadeesh, U.B.Saicharan, P.R.S.Praneeth

Paper Title:

Analysis of a Single Cylinder Combustion Engine Using CFD

Abstract:   If we consider the reasons for the Environmental Pollution from the last few decades, it is clear that most of the pollution is because of the hike in the usage of “Fossil fuels” in the transportation. Our attempts to build much energy efficient vehicles and demand for these vehicles are increasing accordingly. From the practical observations we can clearly understand that the UN-burnt fuels in the combustion chamber of an automobile engine causes the pollution and this UN-burnt fuels (carbon particles) will come out through muffler present to the automobile, which causes the pollution in the environment by releasing them. Our project is to understand these effects in a much more meticulous way and suggest few developments that can be made in this particular field. For this we would like to take up the case study of the single cylinder spark ignition engine of 4 stroke and their current efficiency level and the major drawbacks of them. Today, the use of software tools in the field of research and Industry has become inevitable because of the complexities that we are facing at present and the ease with which such problems can be solved using these tools. For an Engineer of this generation, it is a need to be proficient in using these tools. Hence, we would like to model the combustion system in ICEM-CFD and make the analysis of this in CFD.

Keywords:
 UN, ICEM-CFD, CFD.


References:

1.        Modeling Of A Fluid Flow In An Internal Combustion Engine By “J.J.M.SMITHS”
2.        Internal Combustion Engines By “V.GANESHAN”

3.        http://link.springer.com/[1]


164-167

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

37.

Authors:

Aziz Ahmad, Gourav Sharma, Sohan Lal

Paper Title:

Optimization Technique of OFDM Used in SCADA System

Abstract:   SCADA is designed to automate various systems like process industry, power grid etc. SCADA consist of master station (MS) and a number of remote terminal units (RTU). RTUs are connected to Master Station via communication channels. Communication channel limits the speed of data acquisition and control. To send many data from RTUs to Master Station multiplexing technique like Orthogonal Frequency Division Multiplexing (OFDM) can be used. OFDM has been focused on high-data-rate wireless communication. But high Peak-to-average power is one of the main obstacles to limit wide applications. Here a technique of reducing PAPR is presented. This technique is Selective Mapping (SLM) using standard array.

Keywords:
 SCADA, RTU, MS, OFDM, SLM.


References:

1.       Lin Chen and XueLong hu, “Peak To Average Power Ratio Reduction of OFDM signal using signal Scrambling,” Image and signal processing, pp 1-4 IEEE Oct. 2009.
2.       Po-Yen Chen, Houshou Chen, and Jyun-Jie Wang,” A Low Complexity PTS Technique for PAPR Reduction in OFDM Systems”, International Symposium on Intelligent Signal Processing and Communication Systems, pp 1-4, March 2009.

3.       S. H. Han and J. H. Lee, “An overview: Peak-to-Average power ratio reduction techniques for OFDM,” IEEE Transactions on Broadcasting, Vol. 54, pp257-258, June, 2008.

4.       A. Zolghadrasli, M. H. Ghamat, “A New Blind PAPR Reduction and Error Correction Method in OFDM System” IEEE International Conference on Signal Processing and Communications, pp 1-7, Feb. 2007.

5.       H. Chen and H. Liang, “PAPR reduction of OFDM signals using partial transmit sequences and Reed-Muller codes,” IEEE Communications Letters, vol. 11, pp. 528–530, Jun. 2007.

6.       Emad Alsusa and Lin Yang,” A new PAPR Reduction Technique using Time Domain Symbol for OFDM Systems,” 9th International Symposium on signal processing and Applications pp 1-4, Feb. 2007.

7.       S. Sezginer and H. Sari, “OFDM peak power reduction with simple amplitude predistortion,” IEEE Communications Letters, vol. 10,  pp. 65–67, 2006.

8.       S. H. Han and J. H. Lee, “An overview of peak-to-average power ratio reduction techniques for multicarrier transmission,” IEEE Wireless Communication., vol. 12, pp. 56-65, Apr. 2005.

9.       Yang Chan Cho, Seung Hee Han, and Jae Hong Lee, “Selected Mapping Technique with Novel phase Sequences for PAPR Reduction of an OFDM Signal,”60th Conference on Vehicular Technology, pp 4781-4785, Sept.  2004.

10.     L. J. Jr. Cimini and N. R. Sollenberger, “Peak to average power reduction of an OFDM signal using partial transmit sequences,” IEEE Communications Letters, vol. 4, pp. 86–88, 2000.

11.     S. G. Kang, J. G. Kim, and E. K. Joo, “A novel subblock partition scheme for partial transmits sequence OFDM,” IEEE Trans. Broadcast., vol. 45, pp. 333–338, September 1999.

12.     J. Tell ado, “Peak to Average Power Ratio Reduction for Multicarrier Modulation,” PhD thesis, University of Stanford, Stanford, pp 1790-1800, March 1999.

13.     S. H. Muller and J. B. Huber, “OFDM with reduced peak-to-average power ratio by optimum combination of partial transmit sequences,” IEE Electronics Letters, vol. 33, pp. 36–69, Feb. 1997.

14.     S. H. Muller and J. B. Huber, “A novel peak power reduction scheme for OFDM,” in Proceedings of the 8th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC '97), pp. 1090–1094, Helsinki, Finland, September 1997.

15.     D. Bailey and E. Wright (2003) Practical SCADA for Industry

16.     Andrew Hildick-Smith (2005) Security for Critical Infrastructure SCADA Systems.

17.     http://earth2tech.com/2008/05/01/silver-springs-the-cisco-of-smart-grid/ Accessed: May 2010


168-171

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

38.

Authors:

Sandeep Kaur, K.J. Singh

Paper Title:

Comparative Study of Lead Borate and Lead Silicate Glass Systems Doped With Aluminum Oxide as Gamma-Ray Shielding Materials

Abstract:   Gamma ray shielding properties of PbO-Al2O3-B2O3and PbO-Al2O3-SiO2 glass systems have been evaluated in terms of mass attenuation coefficient,  half value layer, mean free path and effective atomic number parameters. Structural information of both the glass systems has been obtained by using density, XRD, DSC and ultrasonic measurements. It has been inferred that addition of PbO improve the gamma ray shielding properties and simultaneously decrease the rigidity of the glass systems due to formation of non bridging oxygen. Gamma ray shielding properties of our glass systems have been compared with standard nuclear radiation shielding concretes. 

Keywords:
 Attenuation coefficients, DSC studies, Glasses,Ultrasonic measurements.


References:

1.       R.S. Kaundal, SandeepKaur, Narveer Singh and K.J. Singh,  Investigation of structural properties of lead strontium borate glasses for gamma-ray shielding applications.Journal of Physics andChemistry of Solids, 71, 2010, 1191-1195.
2.       Chang-Min Lee, Yoon Hee Lee and Kun Jai Lee, Cracking effect on gamma-ray shielding performance in concrete structure. Programme in Nuclear Energy,  49, 2007, 303–312.

3.       D. Rezaei-Ochbelaghand S.Azimkhani,Investigationof gamma-ray shielding properties of concrete containing of different percentages of lead.  Applied Radiation and Isotopes,70, 2012, 2282-2286.

4.       P. Limkitjaroenporn, J. Kaewkhao, P. Limsuwanand W. Chewpraditkul,Physical,Optical, Structural and gamma-ray shielding properties of lead sodium borate glasses. Journal of Physics and Chemistry of Solids,72, 2011, 245–251.

5.       M. Kurudirek, Y. Ozdemir, O. Simsekand  R. Durak,  Comparison of some lead andnon-lead based glass systems, standard shielding concretes and commercial window glassesin terms of shielding parameters in the energy region of 1 keV-100 GeV: A comparative study. Journal of Nuclear Materials, 407 (2), 2010, 10-115.

6.       Andriy O. Mylyanyh, Mykola A. Sheredko and Svyatoslav K. Melnyk, study of glass structures and crustalline phases in the PbO-Al2O3-SiO2 system.  Journal of Analytical Atomic Spectrometry, 14, 1999, 513-521.

7.       AmanpreetSaini, AtulKhanna,Vladimir K. Michaelis, Scott Kroeker, Fernando Gonzalez andDavid Hernandez,Structure-property correlations in lead borate and borosilicate glasses doped with aluminium oxide. Journal of Non-crystalline Solids, 355, 2009, 2323-2332.

8.       Joanna Pisarska,  Luminescence behaviour of Dy3+ ions in lead borate glasses.  Journal of Optical Matter,(31),2009, 1784–1786.

9.       K.J. Singh, N.  Singh, R.S. Kaundal, andK. Singh, Gamma-ray shielding and structural properties of PbO-SiO2 glasses. Nuclear Instrruments and Methods in Physics Research B, Vol. 266, 2008, 944-948.

10.     S. Tuscharoen , J. Kaewkhao, P. Limkitjaroenporn, P. Limsuwan  and  W. Chewpraditkul, Improvement of BaO:B2O3:Fly ash glasses: radiation shielding, physical and optical properties.Annals of  Nuclear Energy, 49, 2012, 109-113.

11.     N. Tsoulfaniidis,  Measurements and Detection of Radiation”, Mcraw- Hill Book Company, Washington DC, 571P, 1983..

12.     N. Singh, K.J. Singh, K. Singh and H. Singh, Comparative study of lead borate and bismuth lead borate glass system as gamma-radiation shielding materials. Nuclear Instruments and Methods In Physics Research B, 225, (3), 2004, 305-309.

13.     N. Singh, K.J. Singh and H. Singh, Gamma-ray attenuation studies of PbO-BaO-B2O3 glass system.  Radiation Measurements, 41, (1), 2006, 84-88.

14.     N. Chanthima and J. Kaewkhao,  Investigation on radiation shielding parameters of bismuth borosilicate glass from 1keV to 100GeV. Annals of Nuclear Energy,
12:00, 2012, 429.

15.     S.R. Manohara, S.M. Hanagodimath and L. Gerward, Photon interaction and energy absorption in glass: A transparent gamma ray shield.  Journal of Nuclear Materials, 393, 2009, 465-472.

16.     D.P. Button, R. Tandon, C. King, M.H. Velez, H.L. Tuller and D.R. Uhlmann, Insights into the structure of alkali borate glasses. Journal of Non-Crystalline of Solids,  49, 1982, 129–142.

17.     S.W. Martin & C.A. Angell, Glass Formation and Transition Temperatures in Sodiumand Lithium Borate and Aluminoborate melts up to 72 mol%  Alkali”,  Journal of Non-Crystalline of. Solids, 66, 1984, 429-442.


172-175

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

39.

Authors:

S.M.Nandhagopal, S.N.Sivanandam

Paper Title:

Reliable Data Delivery in Mobile Adhoc Networks Using Light Weight Verification Algorithm with High Node Mobility

Abstract:   This paper addresses data aggregation and data packets issues for highly dynamic mobile ad hoc networks and Wireless Sensor Networks thereby leading to a timely and reliable reduction in both communication and energy consumption. But there might be node failures in existing systems and an aggregation framework does not address issues of false sub-aggregate values due to compromised nodes leading to huge errors in base station computed aggregates when data is transferred through mobile sensor nodes. It cannot also transfer data after nodes fail at the intermediate level. This paper proposes a novel lightweight verification algorithm and Position-based Opportunistic Routing (POR) protocol which reduces node failure and data loss issues. Theoretical analysis and simulation prove that POR and the novel lightweight verification algorithm achieve excellent performance under high node mobility with acceptable overhead. Also the new void handling scheme performs efficiently.

Keywords:
Geographic routing, opportunistic forwarding, reliable data delivery, void handling, mobile ad hoc network, Base station, data aggregation, hierarchical aggregation, in-network aggregation, sensor network security, synopsis diffusion.


References:

1.       Madden, S., Franklin, M. J., Hellerstein, J. M., & Hong, W. (2002). TAG: A tiny aggregation service for ad-hoc sensor networks. ACM SIGOPS Operating Systems Review, 36(SI), 131-146.
2.       Law, Y. W., Palaniswami, M., &Phan, R. C. W. (2009). Secure Data Aggregation in Wireless Sensor Networks. Guide to Wireless Sensor Networks, 533-559.

3.       Considine, J., Li, F., Kollios, G., & Byers, J. (2004, March). Approximate aggregation techniques for sensor databases. In Data Engineering, 2004. Proceedings. 20th International Conference on (pp. 449-460). IEEE.

4.       Garofalakis, M., Hellerstein, J. M., &Maniatis, P. (2007, April). Proof sketches: Verifiable in-network aggregation. In Data Engineering, 2007. ICDE 2007. IEEE 23rd International Conference on (pp. 996-1005). IEEE.

5.       Yu, H. (2011). Secure and highly-available aggregation queries in large-scale sensor networks via set sampling. Distributed Computing, 23(5), 373-394.

6.       Frikken, K. B., & Dougherty IV, J. A. (2008, March). An efficient integrity-preserving scheme for hierarchical sensor aggregation. In Proceedings of the first ACM conference on Wireless network security (pp. 68-76). ACM.

7.       Broch, J., Maltz, D. A., Johnson, D. B., Hu, Y. C., &Jetcheva, J. (1998, October). A performance comparison of multi-hop wireless ad hoc network routing protocols. In Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking (pp. 85-97). ACM.

8.       Karp, B., & Kung, H. T. (2000, August). GPSR: Greedy perimeter stateless routing for wireless networks. In Proceedings of the 6th annual international conference on Mobile computing and networking (pp. 243-254). ACM.

9.       Arad, N., &Shavitt, Y. (2009). Minimizing recovery state in geographic ad hoc routing. Mobile Computing, IEEE Transactions on, 8(2), 203-217.

10.     Ganesan, D., Govindan, R., Shenker, S., &Estrin, D. (2001). Highly-resilient, energy-efficient multipath routing in wireless sensor networks. ACM SIGMOBILE Mobile Computing and Communications Review, 5(4), 11-25.

11.     Ye, Z., Krishnamurthy, S. V., &Tripathi, S. K. (2003, March). A framework for reliable routing in mobile ad hoc networks. In INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies (Vol. 1, pp. 270-280). IEEE.

12.     Rozner, E., Seshadri, J., Mehta, Y., &Qiu, L. (2009). SOAR: Simple opportunistic adaptive routing protocol for wireless mesh networks. Mobile Computing, IEEE Transactions on, 8(12), 1622-1635.

13.     Castelluccia, C., Chan, A. C., Mykletun, E., &Tsudik, G. (2009). Efficient and provably secure aggregation of encrypted data in wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 5(3), 20.

14.     Su, L., Gao, Y., Yang, Y., & Cao, G. (2011, May). Towards optimal rate allocation for data aggregation in wireless sensor networks. In Proceedings of the Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing (p. 19). ACM.

15.     Boppana, R. V., &Panp, P. (2009, December). A comparison of secure data aggregation schemes for wireless sensor networks. In High Performance Computing (HiPC), 2009 International Conference on (pp. 179-188). IEEE.

16.     Daabaj, K., Dixon, M., Koziniec, T., & Murray, D. (2010, October). Reliable data delivery in low energy ad hoc sensor networks. In Communications (APCC), 2010 16th Asia-Pacific Conference on (pp. 188-193). IEEE.

17.     Virmani, D., & Jain, S. (2013). Performance Comparison of Proposed Lifetime Maximizing Trees for Data Aggregation in Wireless Sensor Networks. arXiv preprint arXiv:1301.3997.

18.     Peng, A. S., Moen, D. M., Spinks, J. A., Meredith, L. M., He, T., &Lilja, D. J. (2010, October). Reliable data aggregation and dissemination framework in tactical network architecture. In MILITARY COMMUNICATIONS CONFERENCE, 2010-MILCOM 2010 (pp. 569-574). IEEE.


176-180

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

40.

Authors:

Gurpreet Kaur, Kamaljeet Kaur

Paper Title:

Digital Watermarking and Other Data Hiding Techniques

Abstract:   Digital watermarking is not a new name in the technology world but there are different techniques in data hiding which are similar to watermarking. In this paper we compare digital watermarking with other techniques of data hiding. Steganography, Fingerprinting, cryptography and Digital signature techniques are compared with watermarking. We need watermarking for digital data security .It provides ownership assertion, authentication and integrity verification, usage control and con-tent labelling. 

Keywords:
 Cryptography, Digital signature, Fingerprinting, Steganography, Watermarking


References:

1.        Sukriti Bhattacharya, AgastinoCortesi, “Data Authentication by Distortion Free Watermarking”, ICSOFT 2010
2.        Jonathan Cummins, Patrick Diskin, Samuel and Robert Par-lett,“Steganography and Digital Watermarking”, 2004.

3.        Clara Cruz Ramos, Rogelio Reyes Reyes, Mariko Nakano Miyatakeand  Héctor Manuel Pérez Meana, “Watermarking-Based Image Authentication System in the Discrete Wavelet Transform Domain”.intechopen.

4.        Gary C Kessler, “An Overview of Steganography for the Computer Forensics Examiner”. February 2004 (updated June 2011).

5.        Tsutomu Matsumoto ,Hiroyuki Matsumoto ,Koji Yamada ,Satoshi Hoshino, “Impact of Artificial "Gummy" Fingers on Fingerprint Systems” Optical Security and Counterfeit Deterrence Techniques IV, January 2002

6.        http://blog.securemymind.com/wp-content/uploads/2012/11/ encryption-awareness.png

7.        http://www.plagiarismtoday.com

8.        http://www.querycat.com

9.        http://jayitsecurity.blogspot.in

10.     ]http://www.microsoft.com/mspress/ books/sampchap/6429/0-7356-1877-3.gif


181-183

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

41.

Authors:

Saumya Tripathi, Abhinav Rastogi, Kapil Sachdeva, Mohit Sharma, Pankaj Sharma

Paper Title:

PAPR Reduction in OFDM System using DWT with Non linear High Power Amplifier

Abstract:   High Peak to Average Power Ratio (PAPR) of the transmitted signal is a major problem in Orthogonal Frequency Division Multiplexing (OFDM) which induces the degradation of bit error rate (BER) leading to a significant loss in the transmission power efficiency. Simulation results of the proposed technique shows a prominent reduction of 1.63 dB in PAPR. In this paper, we have investigated the performance of DWT-OFDM against conventional FFT-OFDM in terms of PAPR and BER (Bit Error Rate) in the system.

Keywords:
 DWT, FFT, HPA, OFDM, PAPR.


References:

1.       RohitBodhe, SatishNarkhede, Shirish Joshi, ”Design of simulink model for OFDM and comparison of FFT-OFDM and DWT-OFDM”, International Journal of Engineering Science and Technology (IJEST), Vol. 4 No.05, pp.1914-1924, May 2012.
2.       R. W. Bauml, R. F. H. Fischer, and J. B. Huber, “Reducing the peak-to- average power ratio of multicarrier modulation by selected mapping,” Electron. Lett., vol. 32, pp. 2056–2057, Oct. 1996.

3.       Pankaj kumar Sharma, R.K.Nagaria  and T.N.Sharma, “Power Efficiency Improvement in OFDM System using SLM with Adaptive Nonlinear Estimator”in  WASJ,Vol.7, pp.145-151, 2009.

4.       M. Hoch, “Comparsion of ConvOFDM and Wavelet-OFDM for Narrow-Band Powerline Communications,” in Proceedings of 15thInternational OFDM Workshop,
Hamburg, Germany, September 2010, pp. 190–194.

5.       Gupta, D., Vats, B. V., Garg, K, ”Performance Analysis of DFT-OFDM, DCT-OFDM and DWT-   OFDM Systems in AWGN Channel”,  IEEE, the Fourth International Conference on Wireless and Mobile Communications, 214-216, 2008. 

6.       Graps A., “An Introduction to Wavelets,” Computer Journal of IEEE Computational Science and Engineering, vol. 2, no. 2, pp. 50-61, 1995.

7.       Burrus S., Gopinath R., and Guo H., “Introduction to Wavelets and Wavelet Transforms: A Primer”, Prentice Hall, 1998.

8.       Akansu, A. N., and Xueming, L.” A comparative performance evaluation of DMT (OFDM) and DWMT (DSBMT) based DSL communications systems for single and multitone interference”, Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, 1998.

9.       Lee I., Chow J., and Cioffi J., “Performance Evaluation of a Fast Computation Algorithm for the DMT in High-Speed Subscriber Loop,”  Computer Journal of IEEE Select Areas Communication, vol. 13, no. 9, pp. 1564-1570, 2007.

10.     Pankaj kumar Sharma, R.K.Nagaria and T.N.Sharma, “A Novel Approach for Power Saving in OFDM System using SLM PAPR Reduction Technique”  in  IJCITAE,Vol.3, no.1,pp.23-26,Jan.-June 2009.

11.     Goswami C. and Chan K., “Fundamentals of Wavelets Theory, Algorithms, and Applications, John Wiley and Sons Ltd, 1999.

12.     Haixia Zhang, Donfeng Yuan and Matthias Patzold, (2007) “Novel Study on PAPRs reduction in Wavelet-based multicarrier modulation systems”, Digital Signal Processing, Vol. 17, pp 272-279. 

13.     S.H. Han and J.H. Lee, “An overview of peak-to-average power ratio reduction techniques for multicarrier transmission,” IEEE Journal on Wireless Communications, vol. 12, no. 2, pp. 56–65, April 2005.

14.     Khalid, S., and Shah, S. I,”PAPR Reduction by using discrete wavelet transform”, IEEE-ICET, 179-182, 2006.

15.     S. Galli, H. Koga and N. Kodama, “Advanced signal processing for         PLCs: Wavelet-OFDM,” in 2008 IEEE International Symposium on Power Line Communications and Its Applications, April2008, pp. 187-192.

16.     Orthogonal Frequency Division Multiplexing for Wireless Networks by Aníbal Luis Intini, Graduate Student, Electrical and Computer Engineering Department, University of California, Santa Barbara, December 2000.


184-188

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

42.

Authors:

Manjunath S S, Shreenidhi B S, Nagaraja J, Pradeep.B.S

Paper Title:

Morphological Spot Detection and Analysis for Microarray Images

Abstract:   DNA microarray technology has promised a very accelerating research inclination in recent years. There are numerous applications of this technology, including clinical diagnosis and treatment, drug design and discovery, tumor detection, and in the environmental health research.  Enhancement is the major pre-processing step in microarray image analysis. Microarray images when corrupted with noise may drastically affect the subsequent stages of image analysis and finally affects gene expression profile. Spot detection is the major preprocessing stage in microarray image segmentation. In this paper, morphological approach to detect spots in a subgrid. The proposed approach consists of two phases. First phase is morphological preprocessing, second phase includes spot detection model uses bottomhat transform. Experiments on Stanford, TBDB and UNC database illustrate robustness of the proposed approach in the presence of noise, artifacts and weakly expressed spots. Experimental results and analysis illustrates the performance of the proposed method with the contemporary methods discussed in the literature.

Keywords:
 morphology, dilation, erosion, bottomhat transform.


References:

1.       Virgnie Mittard-Runte, “Introduction to microarray” www.cebitac.unibielefeldde/groups/brf/software/emma info/docu.html, April 10, 2008.
2.       Rastislav Lukac, Konstantinos N. Plataniotis “cDNA Microarray Image Segmentation  Using Root Signals” Wiley Periodicals, Inc. Vol. 16, 51–64, 2006.

3.       Emmanouil Athanasiadis , Dionisis Cavouras , Panagiota Spyridonos, Dimitris Glotsos,  Ioannis Kalatzis, and George Nikoforidis  “Segmentation Of Microarray Images Using         Gradient Vector Flow Active Contours Boosted By Gaussian Mixture Models” 2nd         International Conference on Experiments/Process/System Modelling/Simulation &        Optimization, Athens, 4-7 July, 2007.

4.       Eleni Zacharia and Dimitris Maroulis “An Original Genetic Approach to the Fully Automatic Gridding of Microarray Images” IEEE Transactions on Medical Imaging, Vol. 27, No. 6, JUNE 2008.

5.       Emmanouil I. Athanasiadis, Dionisis A. Cavouras, Dimitris Th. Glotsos, Pantelis V.  Georgiadis Ioannis K. Kalatzis, and George C. Nikiforidis “Segmentation of Complementary DNA Microarray Images by Wavelet-Based Markov Random Field Model” IEEE Transactions on Information Technology in Biomedicine, Vol. 13, No. 6, November 2009.

6.       Emmanouil I. Athanasiadis, Dionisis A. Cavouras, Panagiota P. Spyridonos, Dimitris Th.  Glotsos, Ioannis K. Kalatzis, and George C. Nikifridis “Complementary DNA Microarray Image Processing Based on the Fuzzy Gaussian Mixture Model” IEEE Transactions On Information Technology In Biomedicine, Vol. 13, No. 4, July 2009.

7.       Shenghua NI, Pan Wang, Mihaela Paun etal., “Spotted cDNA Microarray image segmentation using ACWE”, Romanian Journal of Information Science and Technology, Vol 12, No. 2, 2009.

8.       Emmanouil I. Athanasiadis, Dionisis A. Cavouras etal., “Segmentation of  Complementary Images by Wavelet-Based Markov Random Field Model”, IEEE  Transactions on Information Technology in Biometry, Vol. 13,No. 6, November 2009.

9.       Eleni Zacharia and Dimitris Maroulis, “3-D Spot Modeling for Automatic Segmentation of cDNA Microarray Images”, IEEE Transactions on Nanobioscience, Vol. 9, No. 3, September 2010.

10.     A.Sri Nagesh, Dr.G.P.S.Varma, Dr A Govardhan “An Improved Iterative Watershed         and Morphological Transformation Techniques for Segmentation of Microarray Images” IJCA Special Issue on “Computer Aided Soft Computing Techniques for Imaging and Biomedical Applications” CASCT, 2010.

11.     Dimitris Bariamis, Dimitris K Iakovidis, Dimitris Maroulis,” M3G: Maximum Margin Microarray Gridding” BMC Bioinformatics, 2010,
http://www.biomedcentral.com/1471-2105/11/49.

12.     S.Raghavarao, M.S.Madhanmohan, Dr.G.M.V.Prasad “Segmentation of Microarray Image Using Information Bottleneck” Global Journal of Computer Science and Technology, Volume 11 Issue 19 Version 1.0 November 2011.

13.     Yan Yang, Phillip Stafford and YoonJoo Kim “Segmentation and intensity estimation   for microarray images with saturated pixels” BMC Bioinformatics 2011.

14.     Richard A Moffitt, Qiqin Yin-Goen, Todd H Stokes, R Mitchell Parry, James H Torrance, John H Phan,Andrew N Young and May D Wang, “caCORRECT2: Improving the accuracy and reliability of microarray data in the presence of artifacts” BMC Bioinformatics 2011.

15.     Luis Rueda and Iman Rezaeian “A fully automatic gridding method for cDNA microarray images” BMC Bioinformatics 2011.

16.     Nagaraja.J, Pradeep.B.S, Manjunath S.S “A Fully Automatic Approach for Enhancement of Microarray Images”2012 International Conference on Electronics Computer Technology (ICECT 2012).

17.     Satish Viswanath and Anant Madabhushi “Consensus embedding: theory, algorithms and application to segmentation and classification of biomedical data” BMC Bioinformatics 2012.

18.     Andrew Janowczyk, Sharat Chandran, Rajendra Singh, Dimitra Sasaroli, George Coukos, Michael D. Feldman, and Anant Madabhushi “High-Throughput Biomarker Segmentation on Ovarian Cancer Tissue Microarrays via Hierarchical Normalized Cuts” IEEE Transactions  On Biomedical Engineering, vol. 59, no. 5, May 2012.

19.     Saiful Islam, Majidul Ahmed  ”A Study on Edge Detection Techniques for Natural Image Segmentation” International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-2, Issue-3, February 2013.

189-193

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

43.

Authors:

Ch.L.Gayatri, Rama.Chakravarthy

Paper Title:

Micro Propagation in Catharanthusroseus

Abstract:   The main objective of this study was the development of root (Rhizogenesis)  and  shoot ( caulogenesis) development in Catharanthusroseus. The nodal segments are sterilized with distilled water and autoclaved distilled water. Then surface sterilized with mercuric chloride for 1min. later these explants were inoculated in MS medium containing tubes. After 7- 10days we observe the development  of shoot in Catharanthusroseus. We observed the growth in medium which contains the combination of two growth hormones i.e IAA (Indoleacetic acid) + BA (Benzyl adinine). IAA is an auxin which promotes the development of roots in the medium where as BA is ancytokinin which promotes the development of shoot. We tried with different combinations of growth hormones at different quantities but finally got the result for  the combination of IAA +BA.

Keywords:
 IAA+BA


References:

1.        Flora of Madagascar: Catharanthusroseus “Germplasm Resources Information Network”.
2.        Catharanthusroseus “a b c Huxley, A., ed. (1992)”.

3.        New RHS Dictionary of Gardening. Macmillan “ISBN 0-333-47494-5. a b Flora of China”.

4.        Catharanthusroseus “College of Micronesia”.

5.        Catharanthusroseus “Jepson Flora”.


194-196

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

44.

Authors:

Kritika Sood, Anuj K.Gupta

Paper Title:

A Survey on Load Balanced Clustering Algorithms

Abstract:   The Ad Hoc network is defined by the mobile nature of the nodes and the removal of the requirement for an infrastructure based network i.e. the use of routers and gateways. Ad Hoc networks generally work in clusters i.e. the grouping of wireless mobile devices (computers or embedded devices which is based on efficient communication between all the nodes). Clusters are formed by clubbing together nodes along the wireless links. Cluster Heads are the nodes which communicate with the other nodes that it can cover under its communication range. Cluster Heads form a virtual backbone and may be used to route packets for nodes in their cluster. Nodes, being in an Ad Hoc network, are presumed to have a non-deterministic mobility pattern. Different heuristics employ different policies to elect Cluster Heads. Many of these policies are biased in favor of some nodes. As a result, these nodes shoulder greater responsibility which may deplete their energy faster due higher number of communication made, causing them to drop out of the network. Therefore, there is a need for load-balancing among Cluster Heads to allow all nodes the opportunity to serve as a Cluster Head. A Survey on various clustering algorithms for load balancing is presented in this paper.

Keywords:
 ad hoc, cluster, Communication, MANETs


References:

1.        J. Y. Yu and P. H. J. Chong, “3hBAC (3-hop between Adjacent Clusterheads): a Novel Non-overlapping Clustering Algorithm for Mobile Ad Hoc Networks,” in proceedings of IEEE Pacrim’03, vol. 1, pp. 318–21, Aug. 2003
2.        T. J. Kwon et al., “Efficient Flooding with Passive Clustering an Overhead-Free Selective Forward Mechanism for Ad Hoc/Sensor Networks,” in proceedings ofIEEE,
vol. 91, no. 8, pp. 1210–20, Aug. 2003

3.        A. D. Amis and R. Prakash, “Load-Balancing Clusters in Wireless Ad Hoc Networks,” in proceedings of 3rd IEEE ASSET’00 , pp. 25–32 Mar. 2000

4.        J. Wu et al., “On Calculating Power-Aware Connected Dominating Sets for Efficient Routing in Ad Hoc Wireless Networks,” J. Commun. and  Networks, vol. 4, no. 1, pp. 59–70 Mar. 2002

5.        J.-H. Ryu, S. Song, and D.-H. Cho, “New Clustering Schemes for Energy Conservation in Two-Tiered Mobile Ad-Hoc Networks,” in proceedings of  IEEE ICC’01, vo1. 3, pp. 862–66, June 2001

6.        M. Chatterjee, S. K. Das, and D. Turgut, “An On-Demand Weighted Clustering Algorithm (WCA) for Ad hocNetworks,” in proceedings of IEEE Globecom’00, pp. 1697–701, 2000

7.        Yu-Xuan Wang, Forrest Sheng Bao, "An Entropy-Based Weighted Clustering Algorithm and Its Optimization for Ad Hoc Networks," wimob,pp.56, Third IEEE International Conference on Wireless and  Mobile Computing, Networking and Communications (WiMob 2007), 2007

8.        F. Li, S. Zhang, X. Wang, X. Xue, H. Shen, “Vote- Based Clustering Algorithm in Mobile Ad Hoc Networks”, proceedings of International Conference on Networking Technologies, 2004

9.        S.K. Dhurandher and G.V. Singh” Weight-based adaptive clustering in wireless ad hoc networks” IEEE 2005

10.     F.D.Tolba, D. Magoni and P. Lorenz“ Connectivity, energy & mobility  driven Weighted clustering algorithm ” in proceedings of IEEE GLOBECOM  2007

11.     M. Gerla and J. T. Tsai, “Multiuser, Mobile, Multimedia Radio Network,” Wireless Networks, vol. 1, pp. 255–65, Oct. 1995

12.     A.D. Amis, R. Prakash, T.H.P Vuong, D.T. Huynh. "Max-Min DCluster Formation in Wireless Ad Hoc Networks". In proceedings of IEEE Conference on Computer Communications (INFOCOM) Vol. 1. pp. 32-41, 2000

13.     P. Basu, N. Khan, and T. D. C. Little, “A Mobility Based Metric for Clustering in Mobile Ad Hoc Networks,” in proceedings of IEEE ICDCSW’ 01, pp. 413–18, Apr. 2001

14.     F.D.Tolba, D. Magoni and P. Lorenz “Connectivity, energy & mobility driven Weighted clustering algorithm” in proceedings of IEEE GLOBECOM 2007

15.     L. Hanzo, R. Tafazolli, ”A Survey of QoS Routing Solution For Mobile Ad hoc Networks”, IEEE Communications Surveys & Tutorials, Vol. 9, Issue: 2, 2007
 

197-200

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

45.

Authors:

Pratik P. Singhai, Siddharth A. Ladhake

Paper Title:

Brain Tumor Detection Using Marker Based Watershed Segmentation from Digital MR Images

Abstract:   This paper presents a method for detection of brain tumor from Magnetic Resonance Image. Pre-processing the image makes it ready for applying the watershed segmentation. Pre-processing includes image resizing, conversion to gray. Gradient magnitude is to be computed before applying the segmentation and magnitude of these gradients is computed using the sobel mask. Watershed segmentation is used for detecting the tumor. The basic watershed algorithm is well recognized as an efficient morphological segmentation tool however, a major problem with the watershed transformation is that it produces a large number of segmented regions in the image around each local minima embedded in the image. A solution to this problem is to use marker based watershed segmentation. Connected component analysis extracts the regions which are not separated by boundary after region boundaries have been detected. Finally tumor area is calculated using connected component analysis.

Keywords:
 Connected Component Analysis (CCA), Magnetic Resonance Imaging (MRI), Sobel mask and Marker based Watershed segmentation.


References:

1.       Rahul Malhotra, Minu Sethi and Parminder Kumar Luthra, “Denoising, Segmentation & Characterization of Brain Tumor from   
2.       Digital MR Images.  CCSE Vol. 4, No. 6; November 2011.

3.       Rajeev Ratan, Sanjay Sharma, S. K. Sharma, “Brain Tumor Detection based on Multi-parameter MRI Image Analysis”. ICGST-GVIP Journal, ISSN 1687-398X, Volume (9), Issue (III), June 2009.

4.       Bieniek, A. & Moga. (2000). “An Efficient Watershed Algorithm Based on Connected Components.” Pattern Recog., 33(6), 907-916. http://dx.doi.org/10.1016/S0031-3203(99)00154-5.

5.       Rajeev Ratan, Sanjay Sharma, S. K. Sharma, “Brain Tumor Detection based on Multi-parameter MRI Image Analysis”. ICGST-GVIP Journal, ISSN 1687-398X, Volume (9), Issue (III), June 2009.

6.       Abdel-Halim Elamy, Maidong Hu. Mining “Brain Tumors & Their Growth rates”. 872-875 IEEE Image Processing Society, 2007.

7.       Mark Schmidt, Ilya Levner, Russell Greiner, Albert Murtha and Aalo Bistritz, “Segmenting Brain Tumors using Alignment-Based Features”

8.       IEEE Computer Society, Proceedings of fourth International Conference on Machine Learning and Applications (ICMLA’05) 0-7695-2495-8/05.

9.       S.Karpagam and S. Gowri, “Detection of Glioma (Tumor) Growth by Advanced Diameter Technique Using MRI Data” proceedings of the 

10.     World Congress on Engineering 2011 Vol. I WCE 2011, July 6 - 8, 2011, London, U.K.


201-204

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

46.

Authors:

Chris Nitin Adonis Petrus, M.S. Razou, M. Rajeev, M. Karthigesan

Paper Title:

Model-Based Test Case Minimization and Prioritization for Improved Early Fault Detection Capability

Abstract:   The primary purpose of software testing is to detect software failures so that defects may be discovered and corrected at earlier stages. Search-based software testing (SBST) is an interesting area of testing which offers a suite of adaptive automated and semi-automated solutions in most of the software engineering problems with multiple competing and conflicting objectives. Model-based testing aims to test the functionality of software according to the applicable requirements. Only limited research has been done on model-based testing. Depending on the size of test suite, the cost of testing varies. Test prioritization orders tests from the existing test suite, for “execution” based on some criteria such that faults can be detected as early as possible in the system. This project uses the Extended Finite State Machine (EFSM) model and the analysis of dynamic dependencies namely data dependence and control dependence along with their interaction patterns. The proposed technique named dynamic interaction-based prioritization modifies the existing approach in order to improve the early fault detection capability. Other criterion for optimization is to reduce the resource cost. The results are compared with the existing prioritization technique for few system models like ATM, Global Banking System, Windscreen Wiper, Automatic Door and Click-Response Event Simulation.

Keywords:
 Control Dependence, Data Dependence, Dynamic Dependencies, Extended Finite State Machine, Interaction Patterns.


References:

1.       Abdul Salam Kalaji, Rober Mark Hierons, Stephen Swift, “An integrated search-based approach for testing from extended finite state machine (EFSM) models”, Information and Software Technology, Elsevier, 2011.
2.       W. Eric Wong, Andy Restrepo, Yu Qi, Byoungju Choi, “An EFSM based test generation for validation of SDL specifications”, AST 2008, May 11, 2008.

3.       Tamimi S, Zahoor M, “Analysis of Model Based Regression Testing Approaches”, 10th WSEAS International Conference on Communications, Electrical & Computer Engineering, pp. 65-70, 2011.

4.       S. Selvakumar and N. Ramaraj, “Regression Test Suite Minimization Using Dynamic Interaction Patterns with Improved FDE”, European Journal of Scientific Research, Vol. 49, No. 3, pp. 332-353, 2011.

5.       Yoo S, Harman M, “Regression Testing Minimization, Selection and Prioritization: A Survey”, Software Testing, Verification and Reliability, Vol. 22, Issue 2, March 2012.

6.       Cagatay Catal, Deepti Mishra, “Test case prioritization: a systematic mapping study”, Software Quality Journal, Springer, 2012.

7.       Luay H. Tahat, Bogdan Korel, Mark Harman, Hasan Ural, “Regression Test Suite Prioritization using System Models”, Software Testing  Verification and Reliability, May 2011.

8.       Mark Harman, “Making the Case for MORTO: Multi Objective Regression Test Optimization”, IEEE Fourth International Conference on Software Testing, Verification and Validation Workshops, pp. 111-114, 2011.

9.       Raju S, Uma G.V, “Factors Oriented Test Case Prioritization Technique in Regression Testing using Genetic Algorithm”, European Journal of Scientific Research, Vol. 74, No. 3, pp. 389-402, 2012.


205-210

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

47.

Authors:

Sarika B. Kale, Gajanan P. Dhok

Paper Title:

Design of Intelligent Ambulance and Traffic Control

Abstract:   This paper represents the unique feature which is very useful to ambulance drivers to take an alternate route in case of congestion. The various performance evaluation criteria are average waiting time, average distance traveled by vehicles, switching frequency of green light at a junction, efficient emergency mode operation and satisfactory operation of SMS using GSM Mobile. The performance of the Intelligent Traffic Light Controller is compared with the Fixed Mode Traffic Light Controller. It is observed that the proposed Intelligent Traffic Light Controller is more efficient than the conventional controller in respect of less waiting time, more distance traveled by average vehicles and efficient operation during emergency mode and GSM interface. Moreover, the designed system has simple architecture, fast response time, user friendliness and scope for further expansion.

Keywords:
 ARM,  Embedded system, Emergency vehicle, Traffic light management


References:

1.       Rajat & Nirbhay Kumar (2007) “RFID Resolution: Your cars will be tagged”, The Economics Times, 25 September.
2.       Elisabeth ILIE-ZUDOR “The RFID Technology and Its Current Applications”, MITIP 2006, ISBN 963 86586 5 7, pp.29-36.

3.       Chong hua Li “Automatic Vehicle Identification System based on RFID”, Anti Counterfeiting Security and Identification in Communication (ASID), 2010, pp 281
284.

4.       Faisal A. Al- Nasser,Hosam Rowaihy “Simulation of Dynamic Traffic control system based on Wireless sensor network”, IEEE Symposium on Computers & Informatics 2011, pp 40-45.

5.       Xu Li, Wei Shu, Minglu Li, Hong-Yu Huang, Pei-En Luo, Min-You Wu, “Performance Evaluation of Vehicle-Based Mobile Sensor Networks for Traffic Monitoring” IEEE transactions on vehicular technology, May 2009, vol. 58, no. 4, pp. 1647-1653.

6.       Harpal Singh,Krishan Kumar,Harbans Kaur, "Intelligent Traffic Lights Based on RFID", International Journal of Computing & Business Research, ISSN 2229-6166.

7.       Khalid Al-Khateeb, Jaiz A. Y. Johari, "Intelligent Dynamic Traffic Light Sequence Using RFID", International Islamic University Malaysia.

8.       Ben Ammar Hatem, Hamam Habib “ Bus Management System Using RFID in WSN”, EMCIS 2010, pp 45-50.

9.       Johari J and Khateeb K, “Ubiquitous RFID Network for Highway Monitoring and Management” IEEE, International Conference on Computer & Communication Engineering (ICCCE), Kuala Lumpur, 2006.

10.     Want R. “Enabling Ubiquitous Sensing with RFID”, Computer, April 2004.

11.     “Requirements for Radio Frequency Identification Device (RFID) Operating in the Frequency Band from 919MHz to 923 MHz” MCMC SRSP-530 RFID, 31 October 2005.

12.     The Insider's Guide to the Philips ARM 7, based microcontrollers, Trevor Martin BSc (hons) CEng.MIEE, Published by Hitex (UK) Ltd., ISBN: 0-9549988 1, First Revision February 2006, Hitex (UK) Ltd. www.hitex.co.uk

13.     Albagul A., Hrairi M., Wahyudi, Hidayathullah M.F., “Design

14.     and Development of Sensor Based Traffic Light System”, American Journal of Applied Sciences 3 (3): 1745-1749, 200

15.     Faisal A. Al- Nasser,Hosam Rowaihy “Simulation of Dynamic Traffic control system based on Wireless sensor network”, IEEE Symposium on Computers & Informatics 2011, pp 40-45.

16.     Chattaraj, A. Chakrabarti, S., Bansal, S., Halder , S. and . Chandra, A. (2008). IntelligentTraffic Control System using RFID. In Proceedings of the National Conference on Device, Intelligent System and Communication & Networking, India.

17.     Visit us at www.sunrom.com.


211-214

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

48.

Authors:

R. Senthil Kumar, P. Kamalakkannan

Paper Title:

A Novel Energy Based Routing Algorithm to Reduce Link Break in Mobile Ad Hoc Networks

Abstract:   Mobile ad hoc networks is a self organizing wireless networks for mobile devices. It does not require any fixed infrastructure due to no wired backbone. It is suitable to use in environment that have a need of on the fly set-up. Every host is a router and packet forwarder. Each node may be mobile, and topology changes frequently and unpredictably due to the arbitrary mobility of mobile nodes. This aspect leads to frequent path failure and route rebuilding. Routing protocol development depends on mobility management, efficient bandwidth and power usage which are critical in ad hoc networks. In this paper, first one is a novel energy based routing algorithm to reduce the link breaks in mobile ad hoc networks and second analysis of network performance under different traffic conditions. This present approach reduces packet loss and finds optimized route by taking into consideration of bandwidth, delay which results by improvement of quality of service. The performance analysis and simulation are carried out to evaluate network performance using network simulator NS-2 based on the quantitative basic parameters like throughput, delay and Packet Delivery Ration(PDR) in term of number of nodes and various mobility rates. A simulation result was during the comparison of AODV protocol with Modified- Reduce Link Break Algorithm Ad hoc On-demand Distance Vector protocol (RLBAAODV) the probability of link break has been decreases in RLBAAODV considering when various pause times and increases number of nodes.

Keywords:
 AODV, RLBAAODV, RSSA, PDR.

References:

1.        Macker P,Corson MS Mobile  ad hoc networking and the IETF[J].Mobile Computing and Communicaation Review, 1999,3(1):pp.11-13.
2.        Seyed Amin Hosseini Seno, Rahmat Budiarto, Tat-Chee Wan “ A routing layer-based hierarchical service advertisement and discovery for MANETs’, Ahoc networks 9(2011) 355-367.

3.        S.Wu, S.Ni, Y.Tseng and J.Sheu, “Route maintenance in a Wireless Mobile Ad hoc Network”, In 33rd Hawai Inetnational conference on System Science, IEEE-2000.

4.        S.Perk and B.Voorst,”Anticipated Route Maintenance (ARM) in Location-Aided obile Ad-hoc Networks”, Globecom, San Antonio, IEEE-2001.

5.        M.Al-shuman, S.M. Yoo and S.Perk,”A Performance simulation for route Maintenance in Wireless ad hoc networks”, in ACM-SE 42: proceeding of the 42nd annual southest regional conference, New York, NY, USA: ACM, 2004.

6.        M. F. Sjaugi, M. Othman and M. F. A. Rasid, “A New RouteMaintence Strategy for Dynamic Source Routing Protocol”,Journal of Computer Science, vol. 4, no.3, pp. 172-180, 2008.

7.        F.K.Hosseini ,”Dynamically Improve Throughput and Minimize End-to-End Delay in MANET”,MIC-CCA IEEE-2008.

8.        D.Espes, Z.Mammeri, “Routing Algorithm to Increase Throughput in Ad hoc Networks”, Proceedings of the International Conference on Networking, IEEE-2006.

9.        M.Veerayya, Vishal Sharma and Abhay Karandikar,”SQAODV: A Novel Energy-Aware Stability-Based Routing Protocol for enhanced QoS in Wireless Ad-hoc networks”,Research, TTSL-IIT Bombay Center for Excellence in Telecom-2009.

10.     Fei Jiang and JianJun Hao , “Simulation of An Improved AODV Algorithm for Ad Hoc Network”, IEEE vol.1 2010.

11.     S.Tabatabaei and K. Tabatabaei ,”Routing and quality of service support for mobile ad hoc networks ”, 2nd international conference on computer engg. and technology, vol.4, IEEE-2010.

12.     Qing Li,Cong Liu, Han-hong Jiang,”The Routing Protocol of AODV Based on Link Failure Prediction” IEEE ICSP 2008 Proceedings.

13.     Khalid Zahedi and Abdul Samad Ismail,”Route Maintenance Approach for Link Breakage Prediction in Mobile Ad hoc Networks” ,IJACSA, Vol 2,No.10,2011.

14.     Sharmila Sankar and Sankaranarayanan “A Cross Layer Design For Route Maintenance In Dense Manets” International Journal of Information Technology and Knowledge Management, Vol 4, No.2,pp 539-543,July-December 2011.

15.     V.Ramesh and P.Subbaiah, ”Modified DSR(Preemptive) to reduce link breakage and routing overhead for MANET using Proactive Route Maintenance(PRM)”,Global Journal of Computer Science and Technology, Vol 9,January 2010.

16.     Achour Rhim and Zbiggniew Dziong,”Routing based on Link Expiration Time for MANET Performance Improvement” ,Proceedings for International Conference on Communications.IEEE-2009.

17.     D.Nitnaware, A.Verma,”Energy Based Gossip RoutingAlgorithm for MANETs”, International Conference on RecentTrends in Information, Telecommunication and computing, IEEE-2010.

18.     www.ietf.org/html.charters/manet-charter.html.

19.     Gaurav Bhatia and Vivek Kumar, “Adapting Mac 802.11 For Performance Optimization Of Manetusing Cross Layer Interaction” International Journal of Wireless & Mobile Networks (IJWMN) Vol.2, No.4,November 2010.

20.     Nityananda Sarma, Sukumar Nandi, “Route Stability Based QoS Routing in Mobile Ad Hoc Networks”, Wireless Pers Comm., Springer, 2009.

21.     Rango, Guerriero, “Link Stability and Energy Aware Routing Protocol in Distributed Wireless Networks”, IEEE Trans. On Parallel and Distributed systems, 2012.

22.     Dube, Rais, K.Wang and S.K. Tripathi, “Signal Stability Based Adaptive Routing for Ad-Hoc mobile network”, IEEE Personal Communication, 1997

23.     Maleki, Karthik, Pedram, “Lifetime prediction routing in Mobile Ad hoc Networks. Wireless Communication and Networking”. WCNC’03, Los Angeles, USA, 2003.

24.     Gupta, Das, “Energy-Aware On-demand routing for Mobile Ad Hoc Networks. Proceedings of IWDC’02, Springer, 2002.

25.     Tutorial of 802.11 Implementation in NS2 “www.winlab.rutgers.edu/~zhibinwu/pdf/tr_ns802_11.pdf”.


215-220

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

49.

Authors:

Swapnil H. Kudke, A. D. Gawande

Paper Title:

Copy- Move Attack Forgery Detection by Using SIFT

Abstract:   Due to rapid advances and availabilities of powerful image processing software’s, it is easy to manipulate and modify digital images. So it is very difficult for a viewer to judge the authenticity of a given image. Nowadays, it is possible to add or remove important features from an image without leaving any obvious traces of tampering. As digital cameras and video cameras replace their analog counterparts, the need for authenticating digital images, validating their content and detecting forgeries will only increase. For digital photographs to be used as evidence in law issues or to be circulated in mass media, it is necessary to check the authenticity of the image. So In this paper, describes an Image forgery detection method based on SIFT. In particular, we focus on detection of a special type of digital forgery – the copy-move attack, in a copy-move image forgery method; a part of an image is copied and then pasted on a different location within the same image. In this approach an improved algorithm based on scale invariant features transform (SIFT) is used to detect such cloning forgery, In this technique Transform is applied to the input image to yield a reduced dimensional representation, After that Apply key point detection and feature descriptor along with a matching over all the key points. Such a method allows us to both understand if a copy–move attack has occurred and, also furthermore gives output by applying clustering over matched points.

Keywords:
 tampering, Image forgery, copy-move attack, scale invariant features transform (SIFT), cloning forgery


References:

1.       J. Fridrich,  "Methods for Tamper Detection in Digital Images", Proc. ACM  Workshop on Multimedia and  Security, Orlando, FL, October 30−31, 1999, pp. 19−23.
2.       S. Saic, J. Flusser, B. Zitová, and J. Lukáš, “Methods for Detection of Additional Manipulations with Digital Images”, Research Report, Project RN19992001003 "Detection of Deliberate Changes in Digital Images", ÚTIA AV ČR, Prague, December 1999 (partially in Czech).

3.       J. Lukáš, “Digital Image Authentication“, Workshop of Czech Technical University 2001,Prague, Czech Republic, February 2001.

4.       A.C.Popescu and H.Farid, “Exposing digital forgeries by detecting duplicated image regions,” Dartmouth College, Hanover, New Hampshire, USA: TR2004-515, 2004.

5.       J. Fridrich, D. Soukal, and J. Lukas, ―Detection of copymove forgery in digital images, Proceedings of the Digital Forensic Research Workshop. Cleveland OH,USA, 2003

6.       B.L.Shivakumar and Lt. Dr. S.Santhosh Baboo “Detection of Region Duplication Forgery in Digital Images Using SURF” IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 4, No 1, July 2011

7.       Sarah A. Summers, Sarah C. Wahl ―Multimedia Security and Forensics. Authentication. of. Digital .images http://cs.uccs.edu/~cs525/studentproj/proj52006/sasummer/doc/cs525projsummer.sasummer/doc/cs525projsummersWahl.doc

8.       G.Li, Q.Wu, D.Tu, and Shaojie Sun, “A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD,”  IEEE International Conference on  Multimedia & Expo, 2007.


221-224

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

50.

Authors:

Amol B. Dhumne, Hemant S. Farkade

Paper Title:

Heat Transfer Analysis of Cylindrical Perforated Fins in Staggered Arrangement

Abstract:   The present paper gives the experimental analysis of on heat transfer enhancement and the corresponding pressure drop over a flat surface equipped with cylindrical cross-sectional perforated pin fins in a rectangular channel. The channel had a cross-sectional area of 250-100 mm2. The experiments covered the following range: Reynolds number 13,500–42,000, the clearance ratio (C/H) 0, 0.33 and 1, the inter-fin spacing ratio (Sy/D) 1.208, 1.524, 1.944 and 3.417. Nusselt number and Reynolds number were considered as performance parameters. Correlation equations were developed for the heat transfer, friction factor and enhancement efficiency. The experimental implementation shows that the use of the cylindrical perforated pin fins leads to heat transfer enhancement than the solid cylindrical fins. Enhancement efficiencies vary depending on the clearance ratio and inter-fin spacing ratio. Both lower clearance ratio and lower inter-fin spacing ratio and comparatively lower Reynolds numbers are suggested for higher thermal performance. 

Keywords:
 Heat Transfer, Cylindrical perforated Fins, Staggered Arrangement


References:

1.        Bayram Sahin, AlparslanDemir Performance analysis of a heat exchanger having perforated   square fins, ELSEVIER, Applied Thermal Engineering 28 (2008)  621–632
2.        R. Karthikeyan* et al. / (IJAEST) International Journal of Advanced Engineering Science And Technology  Vol No. 10, Issue No. 1, 125 – 138

3.        Tzer-Ming Jeng,Sheng-Chungzeng, ELSEVIER, International Journal of Heat and Mass Transfer 50 (2007) 2364–2375

4.        Giovanni Tanda,PERGAMON, International Journal of Heat and Mass Transfer 44 (2001) 3529-3541

5.        G.J. Vanfossen and B.A. Brigham Length to diameter  ratio and row number effects in short pin fin heat transfer, ASME J. Eng. Gas Turbines Power 106  (1984) 241–244.

6.        D.E. Metzger, C.S. Fan, S.W. Haley, Effects of pin  shape and array orientation on heat transfer and pressure  loss in pin fin arrays, J. Eng. Gas Turbines  Power 106 (1984) 252–257.

7.        R.F. Babus’Haq, K. Akintunde, S.D. Probert, Thermal performance of a pin-fin assembly, Int.    J. Heat Fluid   Flow 16 (1995) 50–55.

8.        O.N. Sara, T. Pekdemir, S. Yapici, M. Yılmaz, Heat- transfer enhancement in a channel flow with perforated  rectangular blocks, Int. J. Heat Fluid Fl. 22, 509–518.

9.        P. K. Nag, 2006, “Heat & Mass Transfer”, 2nd Edition,  Tata McGraw Hill Co. Pg. No. : 86-108 & 425-449

10.     J. P. Holman, 2004, “Heat Transfer”, 9thEdition, Tata  McGraw Hill Co,” Pg. No. 43-53& 315-350

11.     Yunus A. Çengel, 2004, “Heat Transfer- A Practical  Approach”, SI units 2nd Edition, Tata McGraw Hill Co., Pg. No. : 156-168, 333-352& 459-500


225-230

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

51.

Authors:

M. M. Abo Elazm, M. F. Shehadeh, A. Arabi

Paper Title:

Experimental Study for Fault Diagnostics on Refrigeration Systems Using the Acoustic Emission Technique

Abstract:   This paper investigates the utilization of Acoustic Emission “AE” systems for monitoring faults of fans in refrigeration system. In this paper the AE counts analysis technique was implemented. A relation between Amplitude and AE hits (density of emission) was obtained in order to determine the behavior of the fault. The results showed that the fault noises are directly proportional to the AE emission with respect to the time. The results also showed that the measured AE energy produced during the fault is lower than that at the ideal case.

Keywords:
 Acoustic Emission, Experimental Study, Fault Diagnostics, Refrigeration


References:

1.     Electricity Association, Electricity industry review 3, Electricity Association, London, (2009) UK,.
2.     M. Kim, S. H. Yoon, P. A. Domanski, W. V. Payne, “Design of a steady-state detector for fault detection and diagnosis of a residential air conditioner”, International Journal of Refrigeration 31 (2008) 790–799.

3.     Minsung Kim, Min Soo Kim, “Performance investigation of a variable speed vapor compression system for fault detection and diagnosis”, International Journal of Refrigeration 28 (2005) 481-48.

4.     S.A. Tassou*, I.N. Grace, “Fault diagnosis and refrigerant leak detection in vapor compression refrigeration systems”, International Journal of Refrigeration 28 (2005) 680–688.

5.     Pollock, A. A., Acoustic Emission Inspection, Physical Acoustics Corporation, Technical Report, TR-103-96-12/89, 2003.

6.     Carlos, M. F., “Acoustic Emission Heeding the warning sounds from materials”, ASTM standardization news, 2003.

7.     Babak Eftekharnejad *, D. Mba , “Seeded fault detection on helical gears with acoustic emission”, Applied Acoustics, 70 (2009) 547–555.

8.     Saad Al-Dossary, R.I. Raja Hamzah, D. Mba, “Observations of changes in acoustic emission waveform for varying seeded defect sizes in a rolling element bearing”, Applied Acoustics 70 (2009) 58–81.


231-234

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

52.

Authors:

Mohammed El Amine LAZOUNI,  Mostafa EL HABIB DAHO, Nesma SETTOUTI, Mohammed Amine CHIKH

Paper Title:

SVM Computer Aided Diagnosis for Anesthetic Doctors

Abstract:   The application of machine learning tools has shown its advantages in medical aided decisions. The purpose of this study is to construct a medical decision support system based on support vector machines (SVM) with 30 physical features for helping the Doctors Specialized in Anesthesia (DSA) in pre-anesthetic DSA examination or preoperative consultation. For that, in this work, a new dataset has been obtained with the help of the DSA. The 898 patients in this database were selected from different private clinics and hospitals of western Algeria. The medical records collected from patients suffering from a variety of diseases ensure the generalization of the performance of the decision system. In this paper, the proposed system is composed of four parts where each one gives a different output. The first step is devoted to the automatic detection of some typical features corresponding to the American Society of Anesthesiologists scores (ASA scores). These characteristic are widely used by all DSA in pre-anesthetic examinations. In the second step, a decision making process is applied in order to accept or refuse the patient for surgery. The goal of the following step is to choose the best anesthetic technique for the patient, either general or local anesthesia. In the final step we examine if the patient's tracheal intubation is easy or hard. Moreover, the robustness of the proposed system was examined using a 6-fold cross-validation method and the results show the SVM-based decision support system can achieve an average classification accuracy of 87.52% for the first module, 91.42% for the second module, 93.31% for the third module and finally 94.76 % for the fourth module.

Keywords:
 Doctors Specialized in Anesthesia, Support vector machines, American Society of Anesthesiologists scores, machine learning, pre-anesthetic examination.


References:

1.       Med Amine Lazouni, Mostafa El Habib Daho and Med Amine Chikh. “Un Système Multi-Agent Pour L’aide Au Diagnostic En Anesthésie” Biomedical Engineering International Conference (BIOMEIC'12), October 10-11,2012, Tlemcen (Algeria), ISSN 2253-0886, page 82.
2.       Peter K, Lutz. The Medical Algorithms Project, Ch31. Anaesthesiology, Section Preoperative Patient Classification and Preparation. Online Excel, 2008, 334 : 681-687.

3.       Hussman J, and Russell RC, “Memorix: Surgery” Chapman & Hall Medical, 1997, page 66.

4.       Karpagavalli S1, Jamuna KS2, and Vijaya MS2 "Machine Learning Approach for Preoperative Anaesthetic Risk Prediction", International Journal of Recent Trends in Engineering, May 2009, Vol. 1, No. 2, pages 19-22.

5.       Srinivas Dukkipati, William W O'Neill, Kishore Harjai, William P Sanders et al, "Characteristics of cerebrovascular accidents after", 7 April      2004, Pages 1161–1167

6.       Thygesen K,  Alpert J S, Jaffe A Simoons M S,Chaitman B R, White H D. “Third  Universal Definition of Myocardial Infarction”, European Heart Journal,2012, 33, pages 2551–2567

7.       Mallampati S, Gatt S, Gugino L, Desai S, Waraksa B, Freiberger D, Liu P. “A clinical sign to predict difficult tracheal intubation”,  Can Anaesth Soc J 32 (4), 1985 429–34. 4027773.

8.       Nuckton TJ, Glidden DV, Browner WS, Claman DM.  “Physical examination: Mallampati score as an independent predictor of obstructive sleep apnea”. Sleep 29 (7). 2006. 903–8. PMID 16895257.

9.       Qing Yan, Hongmei Yan, Fei Han, Xinchuan Wei, and Tao Zhu " SVM-based decision support system for clinic aided tracheal intubation predication with multiple features" Expert Systems with Applications, 36, 2009,  6588–6592

10.     Cortes, Corinna; and Vapnik, Vladimir N.; "Support-Vector Networks", Machine Learning, 20, 1995. 

11.     William H.; Teukolsky, Saul A.; Vetterling, William T.; Flannery, "Support Vector Machines". Numerical Recipes: The Art of Scientific Computing (3rd ed.), 2007, New York: Cambridge University Press. ISBN 978-0-521-88068-8.

12.     Bülent Üstün, "A Comparison of Support Vector  Machines and Partial Least Squares regression on spectral data" Department of Analytical Chemistry, August 2003 Master Thesis .


235-240

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

53.

Authors:

Sunny Dagar, Vinay Kumar, Yogendra Bagoriya

Paper Title:

Image Steganography using Secret Key & Gray Codes

Abstract:  Steganography is an art of hiding some data into another data. Steganography is a very ancient technique which is used to send secret messages inside a simple message e.g. message written through invisible ink etc. Image steganography is a science of hiding secret data i.e. text, audio, video etc. inside an image. In this paper, an image steganography algorithm is proposed which uses secret key and gray codes to hide the secret file inside the cover image. This algorithm takes image of any format like .jpeg, .gif, .bmp etc. as a carrier and converts it into .bmp format. As .bmp image uses lossless compression techniques so compression of .bmp image doesn’t lose any information. Although this paper will not emphasis on image compression. Then the secret data bits are encrypted using gray codes and then this encrypted file is hidden in the LSB of carrier image. The main aim is to prevent the identification of presence of secret data in the carrier image. But use of key increases the security of the secret data

Keywords:  Steganography, Cryptography, Secret Key, LSB Coding, Gray Codes.

References:

1.       Rig Das, Themrichon Tuithung, "A Novel Steganography Method for Image Based on Huffman Encoding".
2.       A.  Nag, S.  Biswas, D.  Sarkar, P. P.  Sarkar,  "A Novel  Technique  for  Image  Steganography  Based  on  Block-OCT  and Huffman  Encoding". International Journal of Computer Science and Information Technology, Volume 2, Number 3, June 2010.

3.       Neil F. Jhonson, Sushil Jajodia, “Exploring Steganography:  Seeing the Unseen", IEEE paper of February 1998.

4.       Kahate Atul, Cryptography and Network Security, the McGraw Hill Companies.

5.       R. Varalakshmi, Dr. V. Rhymend Uthariaraj, "A New Secure Multicast Group Key Management Using Gray Code", IEEE-International Conference on Recent Trends in Information Technology, ICRTIT 2011 MIT, Anna University, Chennai. June 3-5, 2011.

6.       Wayner, Peter (2002), Disappearing cryptography: information hiding: steganography & watermarking. Amsterdam: MK/Morgan Kaufmann Publishers. ISBN 1-55860-769-2.

7.       J. Silman, Steganography and Steganalysis: An Overview, SANS Institute, 2001.

8.       Y.K. Lee and L.H. Chen, High capacity image steganographic model, Visual Image Signal Processing, 147: 03, June 2000.

9.       Anupam Kumar Bairagi, "ASCII based Even-Odd Cryptography with Gray code and Image Steganography: A dimension in Data Security", http://ijcit.org/jcit_papers/vol-1_no-2/IJCIT-110112.pdf.

10.     N.F. Johnson and S. Jajodia, Steganalysis of Images Created Using current Steganography Software, Proceedings of the 2nd Information Hiding Workshop, April 1998.

11.     S. Vendatraman, A. Abraham and M. Paprzycki, Significance of Steganogrpahy on Data Security, Proceedings of the International Conference on Information Technology: Coding and Computing, 2004.


241-245

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

54.

Authors:

Gyanendra Prakash Shukla, M.C.Bhatnagar

Paper Title:

Effect of Substrate on the Morphology of SnO2 Nanowire

Abstract:   Substrate can play crucial rule in the growth of nanostructure for metal oxide (MOS), so variation in substrate can cause variety of nanostructure. In this study, SnO2 nanowire were grown on alumina, quartz and silicon substrates by thermal evaporation technique at atmospheric pressure. The effect of substrates on surface morphology and length to diameter ratio of tin oxide nanowire is presented in this work. The morphological and structural properties of nanowire have been investigated using scanning electron microscopy and x-ray diffraction.

Keywords:
 Tin oxide nanowire, Thermal evaporation  Corresponding Author


References:

1.        Forta,M. Mugnaini, S. Rocchi, V. Vignoli, E. Comini, G. Faglia,A. Ponzoni., Sensors and Actuators B 148 (2010) 283.
2.        R.L. VanderWal , G.W. Hunter, J.C. Xu, M.J. Kulis, G.M. Berger, T.M. Ticich., Sensors and Actuators B 138 (2009) 113.

3.        Jiarui Huang, Kun Yu, Cuiping Gu, Muheng Zhai, Youjie Wu, Min Yang, Jinhuai Liu.,  Sensors and Actuators B 147 (2010) 467.

4.        S. Budak, G.X. Miao, M. Ozdemir, K.B. Chetry, A.Gupta., Journal of Crystal Growth 291 (2006) 405.

5.        X. Feng, K. Shankar, O.K. Varghese, M. Paulose, T.J. Latempa, C.A. Grimes., Nano Lett. 8 (2008) 3781.

6.        Chi Lu, Zhi Chen, Vijay Singh., Sensors and Actuators B 146 (2010) 145.

7.        Hu, J., et al., Acc. Chem. Res. 30 (1999) 435.

8.        Matthias Batzill, Ulrike Diebold., Progress in Surface Science 79 (2005) 47.


246-248

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

55.

Authors:

Mukta Ranjan Singha, Bichitra Kalita

Paper Title:

Estimation of City Bus Travelers Using GSM Network

Abstract:   The mobile phone connectivity and its transition record can be used as useful information to estimate traffic users on urban roads. Mandatory use of a mobile phone dedicated to the city bus, can help in finding all other mobile phone users who are moving in the same city bus. Because, all the mobile phones will have same transition records with the mobile phone dedicated to the city bus. With this arrangement, at the background and Mobile Phone Network as a background data collection system, we have developed an algorithm to estimate the number city bus on an urban road and around a road junction at a particular time. The algorithm will also show the number of city bus users on urban road and around an urban road junction at a particular time. This estimate will help the urban traffic managers to optimize the city bus flow to minimize traffic congestion.

Keywords:
 City bus flow optimization, GSM, Mobile Phone network, Traffic estimation, Urban Traffic Management.


References:

1.       M. R. Singha, B. Kalita, “Using Mobile Phone Network for Urban Traffic Management” International Journal of Computer  Applications, (0975-8887), Volume 65-No.2, March 2013, Pp 12-17.
2.       M. R. Singha, B. Kalita, “ Mapping Mobile Phone Network onto Urban Traffic Network “, Proceeding of  International Multi Conference of Computer Engineers and Scientists 2013“, Vol I, ISBN: 978-988-19251-8-3, 13-15 March 2013, Hongkong.

3.       Guillaume Leduc, “Road Traffic Data: Collection Methods and Applications” , JRC 47967 – 2008.

4.       Bhaskara Tejaswi E , Ashish Verma, “Public Transport System in Guwahati City “, Indian Journal of Transport Management, July = September 2010,Pp210-221.

5.       Tom Thomas, Wendy Weijermars, Eric Van Berkum, “ Prediction of Urban Volumes in Single Time Series”, IEEE Transactions on Intelligent Transportation Systems, Vol 11 No. 1 March 2010.

6.       Asad Salkham, Raymond Cunninggham, Anurag Garg, Vinny Cahil, “ A Collaborative Reinforcement Learning Approach to Urban Traffic Control Optimisation”, IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology”, 2008.

7.       S. O. Fadare , B.B, Ayantoyinbo, “ A Study of the effects of Road Traffic Congestion on Freight Movement in Laos Metropolos”, European Journal of Social Sciences, Vol 16 no. 3 , 2010.

8.       Adekunte J Adermo, Tolu I. Atomode, “Traffic Congestion at Road Intersections in Ilorin, Nigeria”, Austrian Journal of Basic and Applied Sciences, 5(9), 1439-1448, 2011.

9.       Kenedy Aliila Greyson, “Anticipated Traffic Jam Locations Using Inlet and Outlet Factors Analysis”, Int. J. Emerg Sci. 2(2), 193-203, June 2012. ISSN 2222-4254.

10.     Hu Chunchun, Luo Nianxue, Yan Xiaohong, and Shi Wenzhong, “Traffic Flow Data Mining and Evaluation Based on Fuzzy ClusteringTechniques”, International Journal of Fuzzy Systems, Vol. 13, No. 4, December 2011

11.     Ryota Ayaki, Hideki Shimada, Kenya Sato, “A Proposal of Sensor Data Collection System Using Mobile Relay Nodes”, Wireless Sensor Network, 2012, 4, 1-7

12.     Xielin Liu, Feng-Shang Wu, and Wen-Lin Chu, “Diffusion of Mobile Telephony in China: Drivers and Forecasts”, IEEE TRANSACTIONS ON


249-253

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

56.

Authors:

Devendrasingh Thakore, Akhilesh R Upadhyay 

Paper Title:

A Framework to Analyze Object-Oriented Software and Quality Assurance

Abstract:   Software quality cannot be improved simply by following industry standards which require adaptive/upgrading of standards or models very frequently. Quality Assurance (QA) at the design phase, based on typical design artifacts, reduces the efforts to fix the vulnerabilities which affect the cost of product. Different design metrics are available, based on their results design artifacts can be modified. Modifying or making changes in artifacts is not an easy task as these artifacts are designed by rigorous study of requirements. The purpose of this research work is to automatically find out software artifacts for the system from natural language requirement specification as forward engineering and from source code as reengineering, to generate formal models specification in exportable form that can be used by UML compliment tool to visually represent the model of system. This research work also assess these design models artifacts for quality assurance and suggest alternate designs options based on primary constraints given in requirement specification. To analyze, extract and transform the hidden facts in natural language to some formal model has many challenges and obstacles. To overcome some of these obstacles in software analysis there should be some mean or a technique which aims to generate software artifacts to build the formal models such as UML class diagrams. Initially, the proposed technique converts the NL business requirements into a formal intermediate representation to increase the accuracy of the generated artifacts and models. Next, it focuses on identifying the various software artifacts to generate the analysis phase models. Finally it provides output in the format understood by model visualizing tool. The re-engineering process to find out design level artifacts and model information about the previous version of software system from available source code with easy layout is a very difficult task. Performing this task manually has many problems as the ability of human brains to deal with the complexity and security of large software systems is limited. To overcome this difficulty there is need of automated environment which will assess generated design artifacts from natural language as forward engineering and from source code as reengineering and finally suggest and validates alternate designs options for better quality assurance.

Keywords:
 actor, OOA, POS Tagging, quality metrics, software quality, UML, Use case, , XMI. 


References:

1.       Ali Bahrami, Chapter 6, Object Oriented Analysis Process, in Object Oriented System Development.
2.       H. M. Harmain and R. Gaizauskas, CM-Builder: An Automated NL Based CASE tool, in IEEE International Conference on automated software engineering (2000)

3.       Overmyer, S. P., Benoit, L. and Owen R., Conceptual modeling through linguistic analysis using LIDA. International Conference of Software Engineering (ICSE), (2001)

4.       G.S. Anandha Mala, J. Jayaradika, and G. V. Uma, Restructuring Natrual Language Text to Elicit Software Requirements, in proceeding of the International Conference on Cognition and Recognition (2006)

5.       A Visual Analysis and Design Tool for Planning Software Reengineering”, by Martin Beck, Jonas Trumper, Jurgen Dollner

6.       Security metrics for object-oriented class designs”, Alshammari, Bandar and Fidge, Colin J. and Corney, Diane

7.       WordNet 2.1, last updatehttp://wordnet.princeton.edu/wordnet/, 27th October, 2010

8.       “BCEL API documentation” “bcel.sourceforge.net/docs/index.html”

9.       Lionel C. Briand Jie Feng Yvan Labiche," Using Genetic Algorithms and Coupling Measures to Devise Optimal Integration Test Orders" SEKE '02, July 15-19, 2002, Ischia, Italy. ACM 1-58113-556-4/02/0700.

10.     Chidamber and C. Kemerer, “A metrics suite for object oriented design,” IEEE Transactions on Software Engineering, vol. 20, pp. 476–493,  


254-258

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

57.

Authors:

V. Govindasamy, V. Akila, K.S.Raajesh, Muralidhar Moka, B.Augustin Raj

Paper Title:

Data Quality Enhancement with Novel Search Technique to Avoid Repetition of Records

Abstract:   Data quality is the assessment of data’s fitness to serve its purpose in a given context. Characteristics of data quality include: Accuracy, Completeness, Update status, Relevance, Reliability, Appropriate presentation, Accessibility. Data quality is the major problem experienced by many data entry operators. Our project reduces the possible errors more effectively by incorporating a novel search technique which will avoid repetition of data. During a survey, our system initially will create forms dynamically and the required questions can be entered. Then, the questions can be automatically re-ordered by setting necessary constraints to the questions. The default entry values can be entered for any question where the data needs to be constant. While entering data during the process of survey, the system will automatically re-ask the data-entry operators to enter the appropriate data. Then the search technique will search for the previous data and show whether the particular data is already in database or not.

Keywords:
 Data quality, Novel search technique, Re-asking, Default entry.


References:

1.        J.M. Hellerstein, “Quantitative Data Cleaning for Large Databases,” United Nations Economic Commission for Europe (UNECE), 2008.
2.        A. Ali and C. Meek, “Predictive Models of Form Filling,” Technical Report MSR-TR-2009-1, Microsoft Research, Jan. 2009.

3.        Dasu and T. Johnson, Exploratory Data Mining and Data Cleaning. Wiley, 2003.

4.        J.C. Schlimmer and P.C. Wells, “Quantitative Results Comparing Three Intelligent Interfaces for Information Capture,” J. Artificial Intelligence Research, vol. 5, pp. 329-349, 1996.

5.        R.M. Groves, F.J. Fowler, M.P. Couper, J.M. Lepkowski, E. Singer, and R. Tourangeau, Survey Methodology. Wiley-Interscience, 2004.

6.        K.L. Norman,, “Online Survey Design Guide,” http://lap.umd. edu/survey_design, 2011.

7.        Y. Yu, J.A. Stamberger, A. Manoharan, and A. Paepcke, “Ecopod:A Mobile Tool for Community Based Biodiversity Collection Building,” Proc. Sixth ACM/IEEE CS Joint Conf. Digital Libraries(JCDL), 2006.

8.        K. Kleinman, “Adaptive Double Data Entry: A Probabilistic Tool for Choosing Which Forms to Reenter,” Controlled Clinical Trials, vol. 22, no. 1, pp. 2-12, 2001.

9.        S. Day, P. Fayers, and D. Harvey, “Double Data Entry: What Value, What Price?” Controlled Clinical Trials, vol. 19, no. 1, pp. 15-24, 1998.

10.     D.W. King and R. Lashley, “A Quantifiable Alternative to Double Data Entry,” Controlled Clinical Trials, vol. 21, no. 2, pp. 94-102, 2000.

11.     Kuang Chen, Student Member, IEEE, Harr Chen, Neil Conway, Joseph M. Hellerstein, Member, IEEE Computer Society, and Tapan S. Parikh, ”Improving Data Quality with Dynamic Forms” IEEE transactions on knowledge and data engineering, vol. 23, no. 8, august 2011.


259-261

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

58.

Authors:

S.Priya, A.Parameswari

Paper Title:

Predictive Models for Vertical Total Electron Content in Ionosphere

Abstract:   The ionosphere is defined as a region of the earth's upper atmosphere where sufficient ionisation can exist to affect the propagation of radio waves. Prediction of ionosphere vertical total electron content (TEC) are crucial and remain as a challenge for GPS positioning and navigation system , space weather forecast, as well as many other Earth Observation System. TEC is an important descriptive quantity for the ionosphere of the Earth. TEC is strongly affected by solar activity. This ionospheric characteristic constitutes an important parameter in trans ionospheric links since it issued to derive the signal delay imposed by the ionosphere. This paper gives an overview of the various predictive models that can be used to predict Total electron content in ionosphere.

Keywords:
 K Nearest neighbor, Linear Predictive coding, Vertical Total Electron Content.


References:

1.       Acharya, R., Roy, B., Sivaraman, M.R. and Dasgupta, A. (2009) Kalman Filter Approach for Prediction of Ionospheric Total Electron Content, International Conference on Computers and Devices for Communication, 1-4.
2.       Adya, M. and Collopy, F. (1998) How effective are neural networks at forecasting and prediction. A review and evaluation. Journal of Forecasting, 17, 481–495.

3.       Balkin, S. D. and Ord, J. K. (2000) Automatic neural network modeling for univariate time series. International Journal of Forecasting, 16, 509–515.

4.       Bates, J. M. and Granger, C.W.J. (1969) Combination of forecasts. Operations Research Quarterly, 20, 451–468.

5.       Bhansali, R.J. (1996) Asymptotically efficient autoregressive model selection for multistep prediction, Annals of the Institute of Statistical Mathematics, Vol 48, 577–602.

6.       Chatfield, C. (1988) What is the ‘best’ method of forecasting? Journal of Applied Statistics, 15, 19–38.

7.       Coomes, P. A. (1992) A Kalman filter formulation for noisy regional job data. International Journal of Forecasting, 7, 473–481.

8.       Coster, A. and Komjathy, A. (2008) Space weather and the global positioning system, Space Weather, Vol, 6, Article No. S10D07.

9.       Darbellay, G. A. and Slama, M. (2000) Forecasting the short-term demand for electricity: Do neural networks stand a better chance? International Journal of Forecasting, 16, 71– 83.

10.     Geriner, P. T. and Ord, J. K. (1991) Automatic forecasting using explanatory variables: A comparative study. International Journal of Forecasting, 7, 127– 140.

11.     Gomez, V. and Maravall, A. (2001) Seasonal adjustment and signal extraction in economic time series. In D. Pen˜a, G. C. Tiao and R. S. Tsay (Eds.), Chapter 8 in a course in time series analysis. New York, John Wiley and Sons.

12.     Gonzalez, R.C. and Woods, R.E. (2008) Digital Image Processing, 3rd ed., Prentice Hall, Upper Saddle River, NJ.

13.     Habarulema, J.B., McKinnell, L.-A., Cilliers, P.J., Opperman, B.D.L. Application of neural networks to South African GPS TEC modelling. Adv. Space Res., 43(11), 1711–1720. doi:10.1016/j.asr.2008.08.020, 2009.

14.     Hafer, R. W. and Sheehan, R. G. (1989) The sensitivity of VAR forecasts to alternative lag structures. International Journal of Forecasting, 5, 399– 408.

15.     Hernández-Pajares, M., Juan, J.M., Sanz, J. and Colombo, O.L. (2000) Application of ionospheric tomography to real-time GPS carrier-phase ambiguities resolution, at scales of 400–1000 km and with high geomagnetic activity, Geophys. Res. Lett., 27(13), 2009–2012.

16.     Ladiray, D. and Quenneville, B. (2004) Implementation issues on shrinkage estimators for seasonal factors within the X-11 seasonal adjustment method. International Journal of Forecasting, 20, 557– 560.

17.     Leandro, R.F., Santos, M.C. (2007) A neural network approach for regional vertical total electron content modelling. Stud. Geophys. Geod. 51 (2), 279–292.

18.     Novales, A. and de Fruto, R. F. (1997) Forecasting with time periodic models: A comparison with time invariant coefficient models. International Journal of Forecasting, 13, 393– 405.

19.     Olson, D. and Mossman, C. (2003) Neural network forecasts of Canadian stock returns using accounting ratios. International Journal of Forecasting, 19, 453– 465.

20.     Thompson, P. A. (1991) Evaluation of the M-competition forecasts via log mean squared error ratio. International Journal of Forecasting, 7, 331– 334.

21.     Tkacz, G. (2001) Neural network forecasting of Canadian GDP growth. International Journal of Forecasting, 17, 57– 69.

22.     Tulunay, E., Senalp, E., Radicella, S., Tulunay, Y. Forecasting total electron content maps by neural network technique. Radio Sci. 41, doi:10.1029/2005RS003285, 2006.

23.     Ullah, T. A. (1993) Forecasting of multivariate periodic autoregressive moving-average process. Journal of Time Series Analysis, 14, 645– 657.

24.     Vinod, H. D. and Basu, P. (1995) Forecasting consumption, income and real interest rates from alternative state space models.International Journal of Forecasting, 11, 217– 231.

25.     Wang, Z. and Bessler, D. A. (2004) Forecasting performance of multivariate time series models with a full and reduced rank: An empirical examination. International Journal of Forecasting, 20, 683– 695.

26.     Wells, J. M. (1997) Modelling seasonal patterns and long-run trends in U.S. time series. International Journal of Forecasting, 13, 407– 420.

27.     West, K.D. (1996) Asymptotic inference about predictive ability, Econometrica, 68, 1084–1097.

28.     West, M., Harrison, P. J. and Migon, H. S. (1985) Dynamic generalized linear models and Bayesian forecasting (with discussion) Journal of the American Statistical Association, 80, 73– 83.

29.     Wieringa, J. E. and Horva´th, C. (2005) Computing level-impulse responses of log-specified VAR systems. International Journal of Forecasting, 21, 279– 289.

30.     Winkler, R. L. and Makridakis, S. (1983) The combination of forecasts. Journal of the Royal Statistical Society (A), 146, 150– 157.


262-266

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

59.

Authors:

Pullar Vadivel, Cinnathambi Subramani Maheswari, Appaswami Lalitha

Paper Title:

Synthesis of β-Amino Carbonyl Compounds via Mannich reaction using sulfated MCM-41

Abstract:   One-pot three-component reaction of anilines with ketone and aldehyde leads to the formation of β-amino carbonyl compounds in the presence of sulfated MCM-41 as a recyclable solid acid catalyst. This method has several advantages like simple and easy work-up procedures with shorter reaction time and high yields of Mannich products.

Keywords:
 β-amino carbonyl compounds, Sulfated MCM-41, solid acid catalyst, Mannich products.

References:

1.       C. Mannich, W. Krosche, Arch. Pharm. (Weinheim, Ger.) 1912, 250, 647; Reviews: (a) S. E. Denmark, Nicaise, O. J.C. Jacobsen, E. N., Pfaltz, A., Yamamoto, H. Eds.; Comprehensive Asymmetric Catalysis; Springer: Heidelberg, 1999; PP. 923-961.
2.       S.  Grabley, and R. Thiericke, “Drug Discovery from Nature,” Berlin: Springer. 1999.

3.       H. R. Shaterian, A. Hosseinian, and M. Ghashang, “Silicasupported perchloric acid (HClO3-SiO2): an efficient catalyst for the preparation of β-amido carbonyl compounds using multicomponent reactions,” Synthetic Communications, Vol. 38, no. 21, PP. 3766-3777, 2008.

4.       A. T. Khan, T. Parvin, and L. H. Choudhury, “Effects of substituents in the β-position of 1,3-dicarbonyl compounds in bromodimethylsulfoniumbromide-catalyzed multicomponent reactions: a facile access to functionalized piperidines,” Journal of Organic Chemistry, Vol. 73, no. 21, PP. 8398-8402, 2008.

5.       M. M. Heravi, L. Ranjbar, F. Derikvand, and F. F. Bamoharram, “A modified and green Dakin-West reaction: an efficient and convenient method for a one-pot synthesis of β-acetamido carbonyl compounds,” Journal of Molecular Catalysis A, Vol. 271, no. 1-2, PP. 28-31, 2007.

6.       B. Das, K. R. Reddy, Y. Srinivas, and R. A. Kumar, “One-pot multicomponent synthesis of β-acetamidoketones catalysed by pTSA,” Canadian Journal of Chemistry, Vol. 85, no. 7-8, PP.479-482, 2007.

7.       X. Wang, H. Mao, Y. Yu, X. Zhu, and C. Zhu, “Samarium triiodide-catalyzed formation of Mannich-type products byamidoalkylation of 1,3-dicarbonyl compounds,” Synthetic Communications, Vol. 37, no. 21, PP. 3751-3758, 2007.

8.       B. Das and K. R. Reddy, “Facile one-pot multicomponent synthesis of β-acetamido ketones with Amberlyst-15 as heterogeneous catalyst,” Helvetica Chimica Acta, Vol. 89, no. 12, PP. 3109-3111, 2006.

9.       L. W.  Xu, C.  G. Xia, and L. Li, “Transition metal salt-catalyzed direct three-component Mannich reactions of aldehydes, ketones, and carbamates: efficient synthesis of N-protected β- aryl-β-amino ketone compounds,” Journal of Organic Chemistry, Vol. 69, no. 24, PP. 8482-8484, 2004.

10.     M. M. Khodaei, A. R.Khosropour, and P. Fattahpour, “Amodified  procedure for the Dakin-West reaction: an efficient and convenient method for a one-pot synthesis of β-acetamidoketones using silica sulfuric acid as catalyst,” Tetrahedron Letters, Vol. 46, no. 12, PP. 2105-2108, 2005
11.     A. Davoodnia, A. T. Nishaburi, and N. T. Hoseini, “Carbon-based Solid Acid Catalyzed One-pot Mannich Reaction: A Facile Synthesis of β-Amino Carbonyl Compounds”, Bull. Korean Chemical Society, Vol. 32, No. 2 PP. 635, 2011.

12.     T.P. Loh, S. B. K. W. Liung,  K. L. Tan and L. Li. Wei, “Three Component Synthesis of b-Amino Carbonyl Compounds Using Indium Trichloride-Catalyzed One-pot Mannich-type Reaction in Water”, Tetrahedron, Vol 56, PP. 3227-3237, 2000.

13.     R. Wang, B. Li, T. Huang, L. Shi and X.  Lu “NbCl5-Catalyzed one-pot Mannich-type reaction: three component synthesis of β-amino carbonyl compounds”, Tetrahedron Letters, Vol. 48, PP. 2071-2073, 2007.

14.     M. Xia and Y. D. Lu, “A novel direct and one-pot Mannich synthesis of fluorinated β-aminobutanones with sulfamic acid as a green catalyst” Journal of Fluorine Chemistry, Vol. 127, PP. 1119-1124, 2006.

15.     M. B. Gawande, A. Velhinho, I. D. Nogueira, C. A. A. Ghumman,d O. M. N. D. Teodorod and Paula S. Branco, “A facile synthesis of cysteine-ferrite magnetic nanoparticles for application in multicomponent reactions a sustainable protocol” RSC Advances, Vol. 2, PP. 6144-6149, 2012.

16.     K. Gong, D. Fang, H. L. Wang, and Z. L. Liu “Basic Functionalized Ionic Liquid Catalyzed One-pot Mannich-type Reaction: Three Component synthesis of β-Amino Carbonyl Compounds,” Monatsheftefur Chemie, Vol. 138, PP. 1195-1198, 2007.

17.     H. Li, H. Zeng, and  H. Shao, “Bismuth(III) chloride-catalyzed one-pot Mannich reaction: three-component synthesis of β -amino carbonyl compounds” Tetrahedron Letters, Vol. 50, PP. 6858-6860, 2007.

18.     Q.  Xu, Z. Yang, D. Yin, and  J. Wang, “One-pot three-component Mannich reaction catalyzed by sucrose char sulfonic acid,” Front. Chem. Eng. China, 3(2) PP. 201-205, 2009.

19.     C. Mukhopadhyay, A. Datta, and  R. J. Butcher, “Highly efficient one-pot, three-component Mannich reaction catalyzed by boric acid and glycerol in water with major ‘syn’ diastereoselectivity”, Tetrahedron Letters, Vol. 50,  PP. 4246-4250, 2009.

20.     W. G. Shou, Y. Y.  Yang and Y. G. Wang, “An efficient synthesis of β-amino esters via Zn(OTf)2 catalyzed Mannich type reaction”, Tetrahedron Letters, Vol. 47, PP. 1845-1847, 2006.

21.     K.M. Parida, D. Rath, “Studies on MCM-41: Effect of sulfate on nitration of phenol”, Journal of Molecular Catalysis A, Chemistry, Vol. 258, PP. 381-387, 2006.

22.     J. S. Beck, J. C. Vartuli, W. J. Roth, M. E. Leonowicz, C. T. Kresge, K. D. Schmitt, C. T. W. Chu, D. H. Olson, E. W. Sheppard,  S. B. McCullen, J. B. Higgins and J. L. Schlenker ,“A new family of mesoporous molecular sieves prepared with liquid crystal templates,” Journal of American Chemical Society, Vol. 114, PP. 10834-10843, 1992.

23.     K. Sivakumar and A. Lalitha, “Cu(II)-impregnated sulfated MCM-41: An efficient and convenient protocol for the synthesis of 1,3-benzodioxoles” Synthesis and Reactivity in Inorganic, Metal-Organic, and Nano-Metal Chemistry, 41, PP. 1-3, 2011.    
   

267-270

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

60.

Authors:

Jyoti hooda, Sarita ola, Manisha Saini

Paper Title:

Design and Analysis of a low Power CMOS Sense Amplifier for Memory Application

Abstract:   This paper we design a low power high speed sense amplifier for CMOS SRAM. It has to sense the lowest possible signal swing from the SRAM bit lines and its response time should be very fast while keeping the power consumption within a tolerable limit. in this presented sense amplifier will be based on latest architectures available in literature and we focus will be to improve the power consumption and response time of this sense amplifier. Typical memory that is available has read access time of 12 ns and power consumption of 160 mW and supply voltage ranges from 1.8 to 3.3V and rise time SAEN signal ranges from 100 to 400ps and offset voltages ranges from 45 to 80mv. In this paper we present to improve access time power consumption two parameters of sense amplifier. Presented Sense amplifier CMOS SRAM all schematic are design tanner EDA S-edit , Simulate T-spice and 0.18µm technology.

Keywords:
 Sense amplifier,offset in sense amplifier, Advanced current latched sense amplifier,Precharged circuit.


References:

1.       G. O. Young, “Synthetic structure of industrial plastics (Book style with paper title and editor),” in Plastics, 2nd ed. vol. 3, J. Peters, Ed.  New York: McGraw-Hill, 1964, pp. 15–64.
2.       Adel S. Sedra and Kenneth C. Smith, “Microelectronics Circuits” Oxford University Press International Edition, New York, 5th Edition 2006. 

3.       Ardalan,S.;  Chen, D.;  Sachdev, M.; Kennings, A.; “Current mode sense amplifier” Circuits and Systems, 2005. 48th Midwest Symposium  Vol. 1,  7-10 Aug. 2005  Page(s):17 – 20.

4.       Hwang-Cherng Chow,Shu-Hsien Chang; “high performance sense amplifier circuit for low power SRAM APPLICATION S: Circuits and

5.       Tegze P. Haraszti, Microcirc Associates “CMOS Memory Circuits”, kluwer academic  publishers New York, boston , dordrecht, London, Moscow. Pages  238-239.     

6.       Chun-Lung Hsu; Mean-Horn Ho; “High-speed sense amplifier for SRAM applications”Volume 1,  6-9 Dec. 2004 Page(s):577 - 580

7.       H. Mahmoodi, S. Mukhopadhyay, and K. Roy, “Estimation of delay variations due to random-dopant fuctuations in nanoscale CMOS circuits,” IEEE J. Solid-State Circuits, vol. 40, pp. 1787 1796, Sept. 2005 

8.       Singh, R.; Bhat, N., “An offset compensation technique for latch type sense amplifiers in high-speed low-power SRAMs” Volume 2000, paper 11.3.4, p. 12,  Issue  6,  June 2004 Page(s):652 – 657..

9.       J. Bhavnagarwala, X. Tang, and J. D. Meindl, “The impactof intrinsic device fluctuations on CMOS SRAM cell stability” IEEE J. Solid-State Circuits, vol. 36, pp. 658–665, Apr. 2001 .

10.     R. Sarpeshkar, J.L. Wyatt, N.C. Lu, and P.D. Gerber, “Analysis of Mismatch Sensitivity in a Simultaneously Latched CMOS Sense Amplifier”, IEEE Trans. on Circuits and Systems-II, Vol. 39, No.5, Muy 1992.

11.     Agarwal, B. Paul, S. Mukhopadhyay, and K. Roy, “Process variation in embedded memories: Failure analysis and variation aware architecture”,IEEE J. Solid-State Circuits, vol. 40, pp. 1804 1813, 2005.

12.     Kiyoo Itoh, “VLSI Memory Chip Design” Springer-Verlag Berlin Heidelberg New York,  p.p. 110, 2001.

13.     System ,ISCAS, Proceedings of the International Symposium,Vol. 223, pp.741.May 2004.

14.     Ying-Chuan Liu, Hung-Yu Wang, Yuan-Long Jeang and Yu-Wei Huang, “A CMOS Current Mirror with Enhanced Input Dynamic Range”, 3rd International Conference on Innovative Computing Information and Control (ICICIC'08) , 2008.

15.     E. Seevinck et al., “Current-Mode Techniques for High-Speed VLSI Circuits with Application to Current Sense Amplifier for CMOS SRAM,” IEEE JSSC, vol. 26, no.4, pp. 525-536, 1991.


271-279

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

61.

Authors:

Neha Mehndiratta, Manju, Harish Bedi

Paper Title:

Energy Efficient Homogeneous vs Heterogeneous LEACH

Abstract:   In Wireless sensor Networks (WSNs), it is an important task to periodically collect data from an area of interest for time-sensitive applications. The Wireless sensor network (WSN) is a type of the wireless ad-hoc networks. It consists of a large number of sensors and those are effective for gathering data in a variety of environments. Clustered sensor networks can be classified into two broad types; homogeneous and heterogeneous sensor networks. In homogeneous networks all the sensor nodes are identical in terms of battery energy and hardware complexity. On the other hand, in a heterogeneous sensor network, two or more different types of nodes with different battery energy and functionality are used. There are two desirable characteristics of a sensor network, viz. lower hardware cost, and uniform energy drainage. While heterogeneous networks achieve the former, the homogeneous networks achieve the latter. However both features cannot be incorporated in the same network. In this paper based on classification of sensor networks we are briefing LEACH as the representative single hop homogeneous network, and a sensor network with two types of nodes as a representative single hop heterogeneous network.

Keywords:
 Clustering, energy efficiency, homogeneous, heterogeneous, LEACH protocol, wireless sensor networks.


References:

1.       I.F. Akyildiz, W. Su, Y. Sankarsubramaniam and E. Cayirci, \Wireless Sensor Networks: a survey", Computer Networks, Vol. 38, pp. 393-422, March 2002.
2.       Vivek Mhatre, Catherine Rosenberg, “Homogeneous vs Heterogeneous Clustered Sensor Networks: A Comparative Study”, IEEE Communicaton Society, 2004.

3.       V. Mhatre and C. Rosenberg, “Design Guidelines for Wireless Sensor Networks: Communication, Clustering and Aggregation”, Adhoc NetworksJournal, Elsevier Science, Vol. 2, Issue 1, pp 45-63, 2004.

4.       Muruganathan S. D., F Ma. D. C., Bhasin R. I., and Fapojuwo A. O., “A Centralized Energy-efficient Routing Protocol for Wireless Sensor Networks”, IEEE Communications Magazine. pp. S8 - S13, 2005.

5.       HaiGang GONG, et a1, Distributed Energy Efficient Data Gathering in Wireless Sensor Networks, ACTA ELECTRONICA SINICA, 2008.

6.       Bo Shen, et al, Cluster-Based Routing Protocols for Wireless Sensor Networks, Journal of Software, 2006.

7.       Gang Hu, et al. Research and Improvement of LEACH for Wireless Sensor Networks. Chinese Journal of Sensors and Actuators 2007.

8.       Frank Comeau, Nauman Aslam, Analysis of LEACH Energy Parameters, Workshop on Emerging Topics in Sensor Networks (EmSeNs 2011), 2011.

9.       W.R.Heinzelman, Energy-efficient Communication protocol for Wireless microsensor networks, In: Proc. of 33rd Annual Hawaii Inter Cord on System Sciences, Hawaii, and USA: IEEE Computer Society, 2000.

10.     W. Heinzelman, A. Chandrakasan and H. Balakrishnan. “An Application-Specific Protocol Architecture for Wireless Microsensor Networks,” IEEE Transactions on Wireless Communications, Vol. 1, No. 4, pp.660-670,  October 2002.

11.     Yan Li, Yan Zhong Li, Energy-Efficient clustering Routing algorithm based on LEACH, Journal of Computer Applications 2007.

12.     Muhammad Imran, Asfandyar khan, Azween B . Abdullah, “Energy Balancing Through cluster head selection using K-THEOREM in Homogeneous Wireless Sensor Networks”, International Conference on Science & Technology: Applications in Industry & Education, 2008.

13.     Yogesh Kumar, Kanwaljit Singh, “Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Networks”, Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012.

14.     LI Han, “LEACH-HPR: An Energy Efficient Routing Algorithm for Heterogeneous WSN”, IEEE Society, 2010.

15.     Sudhanshu Tyagi and Neeraj Kumar, “A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor network”, Journal of Network and Computer Applications, 2013.

16.     BEN ALLA Said, EZZATI abdellah, “Improved and Balanced LEACH for heterogeneous wireless sensor networks”, International Journal on Computer Science and Engineering (IJCSE), Vol. 02, No. 08, 2633-2640, 2010
17.     R.Saravanakumar, S.G.Susila, J.Raja, “Energy Efficient Homogeneous and Heterogeneous System for Wireless Sensor Networks”, International Journal of Computer Applications (0975 – 8887)Volume 17– No.4, March 2011.


280-283

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

62.

Authors:

S. Dilli Babu, Madhu Kumar Patnala

Paper Title:

Design of a New Cryptography Algorithm using Reseeding-Mixing Pseudo Random Number Generator

Abstract:   In this paper, we propose the application of cryptography algorithm to ensure secure communication across the virtual networks. In cryptography, encryption is the process of encoding messages or information in such a way that hackers cannot read it. In an encryption scheme the message or information is encrypted using an encryption algorithm, turning it into an unreadable cipher text. This is usually done with the use of an encryption key. Any adversary that can see the cipher text should not know anything about the original message. To decode the cipher text using an algorithm that usually requires, a secret decryption key. An encryption scheme usually needs a key generating algorithm to randomly produce keys. Pseudo Random Number Generator (PRNG) is an algorithm for generating a sequence of numbers. Due to speed in number generation pseudorandom numbers are very important. The output sequence of RM-PRNG is used as a key to the encryption and decryption modules. The simulation results are obtained by using modelsim 6.3g_p1.

Keywords:
 PRNG, encryption, reseeding, decryption, mixing, RM-PRNG.


References:

1.        Chung-Yi Li, Yuan-Ho Chen, Tsin-Yuan Chang, Lih-Yuan Deng, and Kiwing To, “Period Extension and Randomness Enhancement Using High-Throughput Reseeding-Mixing PRNG”.
2.        J. E. Gentle, “Random Number Generation and Monte Carlo Methods”, 2nd ed. New York: Springer-Verlag, 2003.

3.        M. P. Kennedy, R. Rovatti, and G. Setti, “Chaotic Electronics in Telecommunications”. Boca Raton, FL: CRC, 2000.

4.        D. Knuth, “The Art of Computer Programming”, 2nd ed. Reading, MA: Addison-Wesley, 1981.

5.        A. Klapper and M. Goresky, “Feedback shift registers, 2-adic span, and combiners with memory,” J. Cryptology, vol. 10, pp. 111–147, 1997.

6.        D. H. Lehmer, “Mathematical methods in large-scale computing units,” in Proc. 2nd Symp. Large Scale Digital Comput. Machinery, Cambridge, MA, 1951, pp. 141–146, Harvard Univ. Press.

7.        S. Li, X. Mou, and Y. Cai, “Pseudo-random bit generator based on couple chaotic systems and its application in stream-ciphers cryptography,” in Progr. Cryptol.-INDOCRYPT, 2001, vol. 2247, pp. 316–329, Lecture Notes Comput. Sci.

8.        L. Y. Deng and H. Xu, “A system of high-dimensional, efficient, long cycle and portable uniform random number generators,” ACM Trans. Model Comput. Simul.,vol. 13, no. 4, pp. 299–309, Oct. 1, 2003.

9.        L. Blum, M. Blum, and M. Shub, “A simple   unpredictable pseudorandom number generator,” SIAM J. Comput., vol.   15,       pp. 364–383, 1986.

10.     B. M. Gammel, R. Goettfert, and O. Kniffler, “An NLFSR-based stream cipher,” in Proc. IEEE Int. Symp. Circuits Syst., 2006, pp. 2917–2920.

11.     D. Mukhopadhyay,D. R. Chowdhury, and C. Rebeiro, “Theory of composing non-linear machines with predictable cyclic structures,” in Proc. 8th Int. Conf. Cellular Autom. Res. Ind., 2008, pp. 210–219, Springer.

12.     D. Mukhopadhyay, “Group properties of non-linear cellular automata,” J. Cellular Autom., vol. 5, no. 1, pp. 139–155, Oct. 2009.

13.     J. Cermak, “Digital generators of chaos,” Phys Lett. A, vol. 214, no.3–4, pp. 151–160, 1996.

14.     T. Sang, R.Wang, and Y.Yan, “Perturbance-based algorithm to expand cycle length of chaotic key stream,” Electron. Lett., vol. 34, no. 9, pp. 873–874, Apr. 1998.

15.     T. Sang, R. Wang, and Y. Yan, “Clock-controlled chaotic keystream generators,” Electron. Lett., vol. 34, no. 20, pp. 1932–1934, Oct. 1998.


284-286

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

63.

Authors:

Divya Sharma, Mayank Gupta

Paper Title:

Controller Area Network for Automobile Application Using ASIC Based on PSoC and Analysing Through Vector CANoe

Abstract:   In the automotive industry, embedded control has grown from stand-alone systems to highly integrated and networked control systems. By networking electro-mechanical subsystems, it becomes possible to modularize functionalities and hardware, which facilitates reuse and adds capabilities. With the increasing number of distributed microcontrollers and intelligent peripherals used in today’s electronic systems, such as vehicle controls, networking protocols between the units have become extremely important. A wide range of these applications are using CAN (Controller Area Network) for network communication. The CAN bus was developed by BOSCH as a multi-master, message broadcast system that specifies a maximum signaling rate of 1M bit per second (bps). Unlike a traditional network such as USB or Ethernet, CAN does not send large blocks of data point-to-point from node A to node B under the supervision of a central bus master. In a CAN network many short messages like temperature or RPM are broadcast to the entire network, which allows for data consistency in every node of the system [1].

Keywords:
 Controller Area Network, Cypress PSoC, CANoe, CANalyzer.


References:

1.        Lars-Berno Fredriksson, Controller Area Networks And The Protocol
2.        CAN For Machine Control Systems.

3.        Matthew John, University of Kentucky, Development And Evaluation Of A Controller Area Network Based Autonomous Vehicle.

4.        Steve Corrigan, Introduction to the Controller Area Network, Application Report SLOA101 - August 2002.

5.        Controller-Area-Network- CAN. Available:

6.        http://www.esd-electronics-usa.com

7.        What  is CAN (controllerAreaNetwork). Available:

8.        http://www.gendan.co.uk/article_9.html

9.        Embedded_tutorials/can_tutorial.htm

10.      Ranjhit M , PSoC 3 and PSoC 5LP –getting started with CAN, AN52701, Software Version :PSoC Creator 2.1 SPI.

11.      CANoe 75 manual “Vector Informatik GmbH”  


287-292

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

64.

Authors:

Suvidha Patil, A.C. Attar

Paper Title:

Applications Civil Engineering for Socio Economic Amelioration of Below Poverty Line Families

Abstract:   The application of Civil Engineering For Socio Economic Amelioration of Below Poverty Line Families In Maharashtra State at Amboli village in Kolhapur district near Pethvadgaon during the period of 2010-2012 with main objective is reducing the poverty and socioeconomic development of community. For this purpose Civil Engineering based income generating activity is given to the people. This paper represents the appropriate use of available natural resources and improving the economical status of the people by using the civil engineering application. It is based renewable or non conventional energy source. For this implementation and training programme of compact mini biogas project is given to the people in this village. It reduce the cost of fuel consumption used in domestic appliances and it will be the income generating source by the installation of compact biogas plant.

Keywords:
 Respondent, Income generating activities.


References:

1.        Annual Report (2009-2010), “Ministry of Rural Development Government of India, Pp.1-268.
2.        TANGO International (2009). Sustainability of rural Development projects. Occasional Paper No. 8. May  2009.

3.        Vivek P. Khambalkar (2008), “Assessment of Bioresources Potential of A Rural Village For Self Energy Generation,” Agriculture university, Akola-444104 (India). Vol.3, Pp.566-575.

4.        Dr. Jorge Tarchitzky (2007),” National Report Israel of Rural Development,” Department of Soil and.  


293-295

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

65.

Authors:

L.Megala, B.Devanathan, R.Venkatraman, A.Vishnukumar

Paper Title:

Tunneling Field Effect Transistors for Low Power Digital Systems

Abstract:   MOSFET transistors are commonly used in high speed integrated circuits, yield smaller and faster more functions at lower cost. Various problems exist with scaling of MOSFET devices i.e., short channel effects, drain induced barrier lowering, velocity saturation which limits the performance of MOSFETs. Scaling limitations of MOSFET devices leads to lower ON to OFF current ratio limited by 60mV/dec sub threshold slope. A new type of device called “Tunnel FET” is used to overcome these difficulties. TFET can beat 60mV/dec sub-threshold swing of MOSFETs. In tunnel FET carriers are generated by band-to-band tunneling and OFF current are low. This makes ideal for ultra low power digital systems. Tunnel FET have energy barrier in OFF state, which avoids power-consuming leakages. In this paper sub-threshold swing and low OFF current is simulated and its power is analyzed.

Keywords:
 Tunnel FET, Sub threshold swing, PIN Tunnel FET, PNPN Tunnel FET


References:

1.        W .Y. Choi, B. G. Park, J. D. Lee and   T. J. King Liu, “Tunneling Field-Effect Transistors (TFETs) With Sub threshold Swing (SS) Less Than 60 mV/dec,” IEEE Trans. On Electron De v i c e s L e t t e r s , V o l . 2 8, p p. 7 4 3 - 7 4 5, 2 0 0 7.
2.        F. Mayer, C. Le Royer, J. F. Damlencourt, K. Romanjek, F. Andrieu, C. Tabone, B. Previtali and S. Deleonibus, “Impact of SOI, Si1-xGexOI and GeOI substrates on MOS compatible Tunnel FET performance,” IEDM, pp. 163-166, 2008.

3.        A. Fert, J.-M. George, H. Jaffres, and R. Mattana, “Semiconductors between spin polarized sources and drains,” Electron Devices, IEEE Transactions on, vol. 54, no. 5, pp. 921–932, May 2007.

4.        T. Wagner, W. Krech, B. Frank, H. Muhlig, H.-J. Fuchs, and U. Hubner, “Fabrication and measurement of metallic single electron transistors,” Applied Superconductivity, IEEE Transactions on, vol. 9, no. 2, pp. 4277–4280, Jun 1999.

5.        A. Scott and D. Janes, “Design and characterization of metal-molecule-silicon devices,” in Nanotechnology, 2005. 5th IEEE Conference on, July 2005, pp. 515–518 vol. 2.

6.        J. Appenzeller, Y.-M. Lin, J. Knoch, Z. Chen, and P. Avouris, “Comparing carbon nanotube transistors - the ideal choice: a novel tunneling device design,” Electron Devices, IEEE Transactions on, vol. 52, no. 12, pp. 2568–2576, December 2005.

7.        W. Y. Choi, B.-G. Park, J. D. Lee, and T.-J. K. Liu, “Tunneling fieldeffect transistors (TFETs) with subthreshold swing (SS) less than 60 mv/dec,” Electron Device Letters, IEEE, vol. 28, pp. 743–745, Aug. 2007.

8.        K. K. Bhuwalka, J. Schulze, and I. Eisele, “Scaling the vertical tunnel fet with tunnel bandgap modulation and gate workfunction engineering,”IEEE Transactions on Electron Devices, vol. 52, no. 5, May 2005.

9.        K. Gopalakrishnan, P. Griffin, and J. Plummer, “Impact ionization MOS (I-MOS)-Part I: device and circuit simulations,” Electron Devices, IEEE Transactions on, vol. 52, no. 1, pp. 69–76, January 2005.

10.     A. S. Verhulst, W. G. Vandenberghe, K. Maex, and G. Groeseneken, “A tunnel field-effect transistor without gate-drain overlap,” Applied Physics Letters, vol. 91, no. 053102, July 2007.

11.     S. Sze, Physics of Semiconductor Devices, 2nd ed. John Wiley & Sons, 1981.

12.     E. O. Kane, “Zener tunneling in semiconductors,” Journal of Physics and Chemistry of Solids, vol. 12, pp. 181–188, 1959.

13.     T. Chan, J. Chen, P. Ko, and C. Hu, “The impact of gate-induced drain leakage current on MOSFET scaling,” Electron Devices Meeting, 1987 International, vol. 33, pp. 718–721, 1987.

14.     A. Qin Zhang; Wei Zhao; Seabaugh, “Low-subthreshold-swing tunnel transistors,” Device Letters, IEEE, vol. 27, no. 4, pp. 297–300, April 2006.


296-299

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

66.

Authors:

A.Aruna Kumari, K.VijayaKumarReddy

Paper Title:

Analysis of Emission Characteristics on CI Diesel Engine Using Safflower Methyl Ester

Abstract:   Unmatched supply of fossil fuels and its inflation of prices have promoted the interest and serious concern about the alternative sources for fossil fuels. In this work, investigations have been carried out to study the emission and combustion charecteristics of Safflower Methyl Ester (SME) as a fuel to diesel engine. For this experiments are conducted on a single cylinder, water cooled, and four stroke stationary engine of 5.2 KW. This engine is coupled with eddy current dynamometer as loading unit. The engine has run with safflower methyl ester using different pistons of combustion geometry by volume basis and readings are recorded. These tests are carried out over entire range of engine operations at varying conditions of load. The emissions obtained from these experiments are computed and compared for different pistons of geometry and presented in this paper.

Keywords:
 
This engine is coupled with eddy current dynamometer as loading unit.

References:

1.       shyam pandey, amit sharma, p. k. sahoo” experimental investigation on the performance and emission characteristics of a diesel engine fuelled with ethanol, diesel and j” international journal of advances in engineering & technology, sept 2012.©ijaet issn: 2231-1963,341 vol.
2.       Sehmus altun” performance and exhaust emissions of a DI diesel engine fueled with waste cooking oil and inedible animal tallow methyl esters” Turkish j. eng. env. sci.35 (2011) , 107 – 114.c_tub˙itak.

3.       E. I. Bello, F. Out and A. Osasona” Cetane number of three vegetable oils, their biodiesels and blends with diesel fuel” Journal of Petroleum Technology and Alternative Fuels Vol. 3(5), pp. 52-57, October, 2012 Available online at http://www.academicjournals.org/JPTAF DOI: 10.5897/JPTAF12.009 ©2012 Academic Journals

4.       Nitin Shrivastava, Dr. S.N. Varma, Dr. Mukesh Pandey” A Comparative study of the Behaviour of Biodiesels of Different origins on the Diesel Engine Performance and Emission” IRACST – Engineering Science and Technology: An International Journal (ESTIJ), ISSN: 2250-3498,Vol.2, No. 4, August 2012

5.       Ekrem b”effect of biodiesel on a DI diesel engine performance, emission and combustion characteristics, fuel” 89(2010), 3099-3105.

6.       Siddalingappa R. Hotti, Omprakash Hebbal” Performance and Combustion Characteristics of Single Cylinder Diesel Engine Running on Karanja Oil/Diesel Fuel Blends” Engineering, 2011, 3, 371-375doi:10.4236/eng.2011.34042 Published Online April 2011 (http://www.SciRP.org/journal/eng)

7.       rajneesh kumar, anoop kumar dixit, gursahib singh manes, rohinish khurana shashi kumar singh”emission and performance characteristics of jatropha ethyl ester blends with diesel fuel in a c.i. engine” international journal of automobile engineering research and development (ijauerd )issn 2277-4785vol.2, issue 2 sep 2012 34-47.

8.       S.kirankumar, prof. k. apparao, prof. r.nagendra babu” experimental investigation on performance, combustion characteristics of diesel engine by using fish oil” engineering research and applications (ijera) issn: 2248-9622 www.ijera.com, vol. 2, issue6, November- December 2012, pp.1258-1263.

9.       p. Suresh kumar, ramesh kumar donga, p. k.sahoo”experimental comparative study between performance and emissions of jatropha biodiesel and diesel under varying injection pressures" international journal of engineering sciences & emerging technologies, august 2012.issn: 2231 – 6604 volume 3, issue 1, pp: 98-112 ©ijeset.

10.     s.jaichander, k.annamalai”performance and emission analysis on pongamia biodiesel with different open combustion chambers in a DI diesel engine”journal of scientific and industrial research, vol 71, july 2012, pp.487-491.

11.     Nitin shrivastava, dr. s.n. varma, dr. mukesh pandey” a comparative study of the behaviour of biodiesels of different origins on the diesel engine performance and emission” iracst – engineering science and technology: an international journal (estij), ISSN: 2250-3498, vol.2, no. 4, august 2012.

12.     c.v. subba reddy, c. eswara reddy , k. hemachandra reddy”  effect of tangential grooves on piston crown of d.i. diesel engine with blends of cotton seed oil methyl easter” ijrras 13 (1)  october 2012.


300-301

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

67.

Authors:

Arunkumar. M, Gurugnanarn. B, Venkatraman. AT.V.R

Paper Title:

Topographic Data Base For Landslides Assessment Using GIS In Between Mettupalayam- Udhagamandalam Highway, South India

Abstract:   Landslide is a common geo-hazard, can result in huge economic losses and enormous casualties in mountainous regions. Analysis of Landslide is a complex which involving multiples of factors and it need to be studied systematically in order to locate the prone zones for landslides. The topographic features play an important role in deciding the areas prone to landslides. In this study, an attempt has been made to derive the landslide cause behind topographic features such as Drainage, Slope and Geology of Mettupalayam- Udhagamandalam road sector lengths of 47 Kilometers. The Survey of India toposheets on 1: 50000 scales were used to extract contours in 20m intervals. The all mentioned parameters were analyzed in GIS by assigning weightages and ranks to prepare the landslide Vulnerability zone map for the study area. The landslide vulnerability map indicates the whole study area which has been divided into three zones as High, Moderate and Low Landslide Vulnerability Zone. Through the landslide hazard zonation map, it can finale that the low landslide zones are the prior for higher landslide vulnerability in the study area. This research would be a basis of landslide vulnerability and hazard assessment.

Keywords:
 landslides, landslide vulnerable zone, GIS, hazard assessment


References:

1.       M. Komac, M. Ribicic, “Landslide susceptibility map of Slovenia at scale 1:250.000”, Geophysical Research Abstracts, Vol. 8, 03990, 2006.
2.       Article titled “Re-crowning the Queen of Hills” in THE HINDU dated April 27, 2003.

3.       S. Lee a, Digna G. Evangelistab, “Landslide Susceptibility Mapping using Probability and Statistics Models in Baguio City, Philippines”, Department of Environment and Natural Resources, North Avenue, Diliman, Quezon City, Philippines.

4.       S.S. Ramakrishnan et al, “Landslide Disaster Management and Planning- A GIS based Approach”, Indian Cartographer, 2002, pp 192-195.

5.       Bonham-Carter, G.F. (1994) Geographic Information Systems for Geoscientists: Modeling with GIS. Pergamon, Ottawa, p. 398.

6.       Carrara, A., Guzzetti, F.(Eds.), (1995) Geographical Information Systems in Assessing Natural Hazards. Academic Publisher, Kluwer, Dordrecht, the Netherlands, pp. 353.

7.       David, R., Godschalk, S.B. and Raymond, B. (2003) public participation in natural hazard mitigation policy formation: challenges for comprehensive planning, Journal of Environmental Planning and Management. Vol.46, pp.733-754.

8.       DeMers, M.N. (2000) Fundamentals of Geographic Information Systems, second ed. John Wiley & Sons, New York, pp. 498.

9.       Gupta, R.P. (2003) Remote Sensing Geology, second ed. Springer-Verlag, Berlin, Heidelberg, Germany, pp. 655.

10.     Kwang-Hoon, C., Kiwon, L., and No-Wook, P., (2002) Landslide stability analysis and prediction modeling with landslide occurrence on KOMPSAT EOC imagery.Korean Journal of Remote sensing.Vol.1, pp.1-12.

11.     Mantovani, F., Soeters, R., and VanWesten, C.J. (1996) Remote sensing techniques for landslide studies and hazard zonation in Europe.Vol.15, pp.213-225.

12.     Nagarajan, R., Mukherjee, A., and Royand, A. (1998) Temporal remote sensing data and GIS application in landslide hazard zonation of part of Western ghat, India, J. Remote sensing. Vol.4, pp.573-585.

13.     Ostir, K., Veljanovski, T., Podobnikar, T., and Stancic, Z. (2003) Application of satellite remote sensing in natural hazard management: the mount Mangart landslide case study, International Journal of Remote Sensing.Vol.20, pp.3983-4002.

14.     Saha, A.K., Gupta, R.P., and Arora, M.K. (2002) GIS-based Landslide Hazard Zonation in the Bhagirathi (Ganga) Valley, Himalayas.Int. J. Remote sensing, vol. 23, No. 2, pp.357–369.

15.     Bernhard Klingseisen and Philip Leopold, Austrian Research Centres, Austria “Landslide Hazard Mapping in Austria” published in GIM International, December 2006, Volume 20, Issue.

16.     Innes, (1983), Rapp & Nyberg, (1981) and Vernes, (1978). Debris flows are a type of Landslide events common to mountainous areas.

17.     Van western et al (2003) Tessina landslide using sequential aerial photographs and Direct field mapping.

18.     Anjou Mahatma et al (2003)

19.     H.X. Lane, C.H. Zhou et at, (2004)


302-306

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

68.

Authors:

M. Velan, R. Saravanane

Paper Title:

CO2 Sequestration and Treatment of Municipal Sewage by Micro Algae

Abstract:  Treatment of wastewater by algae is receiving an ever increasing attention in the field of biofuel production, and carbon dioxide sequestration. In this study five genera’s namely Anabaena, Diatoms, Spirogyra, Hyalophacus, Monoraphidium, were tested for its ability to reduce the organic and inorganic pollutants present in the wastewater, growth studies is carried out in a batch system with a working volume of 7- 10  litres. The growth of microalgae were analysed throughout the growth period for about 107 days and it is found that changes were taken place in certain parameters viz., biomass, Nitrogen and phosphate assimilations and CO2 reduction

Keywords:
 CO2 Sequestration, Micro algae, sewage, biomass .


References:

1.        Abou-Shanab, R.A.I., Hwang, Jae-Hoon, Cho, Yunchul, Min, Booki, Jeon, B.H., 2011a. Characterization of microalgal species isolated from fresh water bodies as a potential source for biodiesel production. Applied Energy 88, 3300-3306.
2.        Abou-Shanab, R.A.I., Matter, Ibrahim A., Kim, Su-Nam, Oh, You-Kwan, Choi, Jaeyoung, Jeon, B.H., 2011b. Characterization and identification of lipid-producing microalgae species isolated from a freshwater lake. Biomass and Bioenergy 35, 3078-3085.

3.        Bei Wang, Christopher Q. Lan(2011)  Biomass production and nitrogen and phosphorus removal by the green alga Neochloris oleoabundansin simulated wastewater and secondary municipal wastewater effluent. Bioresource Technology 102: 5639–5644.

4.        Clarens .A.F., Resurrection. E.P., White. M.A., Closi. L.M., 2010.  Environmental  life cycle comparison of algae to other bioenergy feedstock. Environmental Science and Technology 44, 1813-1819.

5.        Gonzalez, C., Marciniak, J., Villaverde, S., Garcia-Encina, P.A., Munoz, R., 2008. Microalgae-based processes for the biodegradation of pretreated piggery wastewaters.  Applied Microbiology and Biotechnology 80, 891-898.

6.        Krozer, Y., Hophmayer-Tokich, S., Meerendonk, H.V., Tijsma, S., Vos, E., 2010.Innovations in the water chain – experiences in The Netherlands. Journal of Cleaner Production 18, 439–446.

7.        Kumar. M.S., Zhihong. H.M., Sandy. K.W., 2010. Influence of nutrient loads, feeding frequency and inoculum source on growth of Chlorella vulgaris in digested
piggery effluent culture medium. Bioresource Technology 101, 6012-6018.

8.        Lardon, L., Helias, A., Sialve, B., Steyer, J.P., Bernard, O., 2009. Life cycle assessment and biodiesel production from microalgae. Environmental Science and Technology, 43, 6475-6481.

9.        Mulbry, W., Kondrad, S., Buyer, J., 2008. Treatment of dairy and swine manure effluents using freshwater algae: fatty acid content and composition of algal biomass at different manure loading rates. Journal of Applied Phycology 20, 1079-1085.

10.     Richmond, A., 2004. Handbook of Microalgal Culture: Biotechnology and Applied Phycology. Blackwell Science Ltd

11.     Sunja Cho, Thanh Thao Luong, Dukhaeng Lee, You-Kwan Oh, Taeho Lee (2011)  , Reuse of effluent water from a municipal wastewater treatment plantin microalgae cultivation for biofuel production, Bioresource Technology 102 8639–8645.

12.     Yang, J., Xu, M., Hu, Q., Sommerfeld, M., Chen, Y., 2011. Life-cycle analysis on bio-diesel production from microalgae: water footprint and nutrients balance. Bioresource Technology 102, 159-165.

13.     Yecong Li, Wenguang Zhou, Bing Hu, Min Min, Paul Chen, Roger R. Ruan (2011)   Integration of algae cultivation as biodiesel production feedstock with municipal wastewater treatment: Strains screening and significance evaluation of environmental factors Bioresource Technology 102 10861–10867.

14.     Zhou, W., Min, Min, Li, Yecong, Hu, Bing, Ma, Xiaochen, Cheng, Yanling, Liu, Yuhuan, Chen, Paul, Ruan, Roger, 2012. A hetero-photoautotrophic two-stage cultivation process to improve wastewater nutrient removal and enhance algal lipid accumulation. Bioresource Technology 110, 448-455.


307-310

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

69.

Authors:

Monica Sood, Gurline Kaur

Paper Title:

Speaker Recognition Based On Cuckoo Search Algorithm

Abstract:  Today’s world sees a lot of changes being done. These are a result of some modification or some innovation. This research is being done in the field of Swarm Intelligence or SI. It deals with studying the behaviour of organisms or swarms. Swarms are individual entities which are working on their own, yet their combined or aggregate behaviour yields some great results. This begins by studying the behaviour of any organism as fish, ants, bees, cuckoo bird or something like water drops. When the behaviour is understood it is then converted in the form of an algorithm. It is this algorithm that is of utmost importance; it not only studies the behaviour of these organisms but also provides some principles which can help in providing solutions to real world applications. This research is based on an algorithm of Swarm Intelligence called Cuckoo Search. This is an algorithm which is aimed at understanding the breeding behaviour of the cuckoo bird. In this research, it is applied in the field of Biometrics. Biometrics is used to identify an individual as per their some special characteristics as finger print, voice, iris, handwriting, typing speed. In this Cuckoo Search has been applied on Speaker Recognition systems and voice. Thus by applying this algorithm, the process of Speaker Recognition is optimized by a fitness function by matching of voices being done on only the extracted optimized features produced by the Cuckoo Search algorithm.

Keywords:
 Correlation, mean, Fitness Function, Swarm Intelligence.


References:

1.        R. G. Babukartik and P. Dhavachelvan (2012) “Hybrid Algorithm using the advantage of ACO and Cuckoo Search for Job Scheduling”, International Journal of Information Technology Convergence and Services (IJITCS) Vol.2, No. 4, August 2012.
2.        Vipinkumar Tiwari, “Face Recognition Based on Cuckoo Search Algorithm”, Indian Journal of Computer Science and Engineering (IJCSE), June-July 2012.

3.        Xin-She Yang and Suash Deb, “Cuckoo Search via Levy Flights”, In: Proc. Of World Congress son Nature & Biologically Inspired Computing (NaBIC 2009), December 2009, India. IEEE Publications, USA, pp. 210-214(2009).

4.        H.B. Kekre, Vaishali Kulkarni, Prashant Gaikar and Nishant Gupta, ”Speaker Identification using Spectrograms of Varying Frame Sizes”, International Journal of Computer Applications (0975-8887) Volume 50- No. 20, July 2012.


311-313

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

70.

Authors:

T. Gutu

Paper Title:

A Study on the Mechanical Strength Properties of Bamboo to Enhance Its Diversification on Its Utilization

Abstract:   The research is focused on the study of mechanical strength properties of bamboo to establish if bamboo would play a complementary role to wood in both furniture making and construction works as a sustainable material for the wood industries. The research also highlighted the dwindling supply of wood as a main source of material for furniture and construction works in Zimbabwe due to fire destruction of timber plantations.  The study investigated on the  mechanical properties of the bamboo in Zimbabwe aiming at assessing its suitability .The study showed that there is need for additional resources of  material to complement wood. Experiments  carried out on the strength properties to include tensile, compressive, bending, stiffness, elasticity, hardness and durability of bamboo to resist different forces or loads on structural members. Results showed that the strength properties of bamboo are higher than most of the soft and hard woods. The study also indicated that different species of solid bamboo is available in Zimbabwe. The research revealed out that solid and hollow bamboo can equally be utilized for both furniture products and construction works. The researcher used observations, interviews and experiments for collecting  data  .The paper concludes by encouraging schools, colleges , small to medium enterprises and wood industries  on the utilization of bamboo as a complementary resource material for furniture and construction works in view of qualifying strength properties and resource sustainability , renewable and availability in Zimbabwe  and bamboo plantations to start in all provinces .

Keywords:
 
renewable and availability in Zimbabwe  and bamboo plantations to start in all provinces .

References:

1.       CBRC (2009) Cultivation of Bamboo Book 1
2.       CBRC (2009)  Cultivation of Bamboo Book  2

3.       CBRC (2009)  Utilization of Bamboo Book 1

4.       CBRC( 2009)   Utilization  of Bamboo Book 2

5.       CBRC  (2009) Socio –Economy

6.       Amada et al (1998)

7.       Grosser and Liese (1971)
8.       Jassen (1998)

9.       University of Southern Californial Los Angeles (CA90089-2551)

10.     Indian Institute of Technology

11.     H.E.Desch and JM Din Woolie (1968)

12.     Forestry   I.T .College

13.     Mathew and Nair , Adrea Carrasco, Jojn , Frondaand Brain Macrae  (2002)  Mechanical properties of bamboo

14.     Yosorf et al (1992)  Chemical composition of bamboo

15.     http://www.deboerarchitects.com/bamboo thoughts.html

16.     http://www.bikebamboo.com/bamboo properties

17.     http//: www. bamboo calibamboo.com/why bamboo

18.     http//:www mechanical  strength properties of bamboo


314-319

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

71.

Authors:

S.Krishna, M.Sai Vineeth, Ch.Balaji, A.Rama Krishna

Paper Title:

Synthetic Aperture Radar Imaging

Abstract:   In this paper we introduce new synthetic aperture radar (SAR) imaging modality which can provide a high resolution map of the spatial distribution of targets and terrain using a significantly reduced number of needed transmitted and /or received electromagnetic waveforms. This new imaging scheme requires no new hardware components and allows the aperture to be compressed. It also presents many new applications and advantages which include strong resistance to counter measures and interception, imaging much wider swaths and reduced on-board storage requirements.

Keywords:
 SAR


References:

1.       Foucer, S., Benie, G. B &Bouchere, J-(2001), Multiscale map filtering of SAR image IEEE Tran. Image Processing 10(1):49-60.
2.       Hebar, M., gleich, D. &Cucej, Z. (2009). Autobinomial model for SAR image despeckling and information extraction, IEEE Transaction on Geoscience and Remote Sensing 47(8):2818-2835.

3.       Sveinsson, J. R &Benediktsson, J.A. (2007). IEEE international conference on geoscience and remote sensing, Speckle Reduction of SAR Images in the bandelet Domain.

4.       Walessa, M. &Dacu, M. (2000). Model-based despeckling and information extraction from SAR images, IEEE Transaction on Geoscience and Remote Sensing 30:2258-2269.


320-322

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

72.

Authors:

Marjan Eshaghi, S.Z. Gawali

Paper Title:

Web Usage Mining Based on Complex Structure of XML for Web IDS

Abstract:   In current trend, most of the businesses are running through online web applications such as banking, shopping, and several other e-commerce applications. Hence, securing the web sites is becomes must do task in order to secure sensitive information of end users as well as organizations. Web log files are generated for each user whenever he/she navigates through such e-commerce websites, users every click is recorded into such web log files. The analysis of such web log files now a day’s done using concepts of data mining. Further results of this data mining techniques are used in many applications. Most important use of such mining of web logs is in web intrusion detection. To improve the efficiency of intrusion detection on web, we must have efficient web mining technique which will process web log files. In this project, our first aim is to present the efficient web mining technique, in which we will present how various web log files in different format will combined together in one XML format to further mine and detect web attacks. And because log files usually contain noisy and ambiguous data this project will show how data will be preprocessed before applying mining process in order to detect attacks. Hence mining process includes two parts, web log files preprocessing in order to remove the noise or ambiguous data mining process to detect the web attacks.

Keywords:
 log files, web mining, preprocessing, IDS, XML, CRM.


References:

1.        “XML Based Web Usage Mining In Server Logs”, Y.S.S.R Murthy, L.Balaji & Lakshmi Tulasi.Ambat.
2.        A. Hamami, M. Ala’a, S. Hasan. (2006). Applying Data Mining Techniques in Intrusion Detection System on Web and Analysis of Web Usage, Information Technology Journal, 2006.

3.        C.J. Ezeife, J. Dong, A.K. Aggarwal. (2007). SensorWebIDS: A Web Mining Intrusion Detection System, International Journal of Web Information Systems, volume 4, pp. 97-120, 2007.

4.        C. Kruegel, G. Vigna. (2003). Anomaly Detection of Web-based Attacks, CCS, 2003.

5.        G. Shiva, N.V. Suba, U. Dinesh. (2010). Knowledge Discovery from Web Usage Data: A survey of Web Usage Pre-processing Techniques, Springer, 2010.

6.        Andrews, M.: Guest Editor's Introduction: The State of Web Security. IEEE Security and Privacy, 4, 4, 14--15 (2006)

7.        K.R. Suneetha, Dr. R. Krihnamoorthi. (2009). Identifying User Behavior by Analyzing Web Server Access Log File, IJCSNS, 2009.

8.        L.K. Joshila Grace, V.Maheswari, Dhinaharan Nagamalai. (2011). Analysis of web logs and web user in web mining, IJNSA, 2011.

9.        Jaideep Srivastava , Robert Cooley, Mukund Deshpande, Pang-Ning Tan, Web Usage Mining: Discovery and Applications of Usage Patterns from Web Data, SIGKDD Explorations, Volume 1, Issue 2- Pages 12-23.

10.     Adel T. Rahmani and B. Hoda Helmi, EIN-WUM an AIS-based Algorithm for Web Usage Mining, Proceedings of GECCO’08, July 12–16, 2008, Atlanta, Georgia, USA, ACM978-1-60558-130-9/08/07 (Pages 291-292)

11.     Boyd, Stephen, and Keromytis, Angelos. "SQLrand: Preventing SQL injection attacks". In Proc. of the 2nd Applied Cryptography and Network Security. Conf. (ACNS 2004), pages 292–302, Jun. 2004.

12.     Chaofeng, L., 2006. Research and Development of Data Preprocessing in Web Usage Mining .In the Proceedings of International Conference on Management Science and Engineering , 1311-1315.


323-326

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

73.

Authors:

Munqath H. Alattar S.P.  Medhane

Paper Title:

R-WASP: Real Time-Web Application SQL Injection Detector and Preventer

Abstract:   In the real time word, there are many online systems those are major part of software systems in order to make them publically available to perform the remote operations. These online systems are vulnerable to different types of web based attacks. Here in this project we are considering the one such web based attack and its prevention technique in real time web applications as well as presenting the ways to implement same approach for binary applications. Previously, the approach called WASP was proposed as efficient web application SQL injection preventer using the datasets. However, this tool was not evaluated over real time web applications; we did not get its accuracy for prevention of real time web application SQL injection attacks, even though it’s having high accuracy during its tested results over datasets.   Therefore, in this research work we are extending the WASP approach to real time environment in order to evaluate its effectiveness as well as to collect a valuable set of real legal accesses and, possibly, attacks. In addition to this, we are presenting the same approach for binary applications. This new approach or tool we called as R-WASP.

Keywords:
 WASP, SQL injection attack, Binary applications.


References:

1.        “WASP: Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation” , William G.J. Halfond, Alessandro Orso, Member, IEEE Computer Society, and Panagiotis Manolios, Member, IEEE Computer Society, 2008.
2.        Boyd, Stephen, and Keromytis, Angelos. "SQLrand: Preventing SQL injection attacks".  In Proc. of the 2nd Applied Cryptography and Network Security. Conf. (ACNS 2004), pages 292–302, Jun. 2004.

3.        Gould, Carl, Su, Zhendong and Devanbu Premkumar. "Static Checking of Dynamically Generated Queries in Database Applications".  In Proc. of the 26th Intern. Conf. on Software Engineering (ICSE 2004), pages 645–654, May 2004..

4.        Haldar, Vivek, Chandra, Deepak and Franz, Michael. "Dynamic taint propagation for java".  In Proc. of the 21st Annual Computer Security Applications.    Conf. (ACSAC 2005), pages 303–311, Dec. 2005.

5.        Halfond, William and Orso Alessandro. "AMNESIA: Analysis and Monitoring for Neutralizing SQL-Injection Attacks".  In Proc. of the IEEE and ACM Intern. Conf. on Automated Software Engineering (ASE 2005), pages 174–183, Nov. 2005.

6.        Andrews, M.: Guest Editor's Introduction: The State of Web Security. IEEE Security and Privacy, 4, 4, 14--15 (2006)

7.        Janot, E.: SQLDOM4J: Preventing SQL Injections in Object-Oriented Applications. Master thesis, Concordia University College of Alberta (2008), http://waziboo.com/thesis

8.        McClure, R., Krüger, I.: SQL DOM: Compile Time Checking of Dynamic SQL Statements. In: 27th IEEE International Conference on Software Engineering, pp. 88--96. IEEE Press, New York (2005)

9.        Halfond, W., Orso, A.: Preventing SQL Injection Attacks Using AMNESIA. In: Di Nitto, E., Murphy, A.L. (eds.) 28th ACM/IEEE International Conference on Software Engineering, pp. 795--798. ACM, New York (2006)

10.     Yuhanna, N.: The Forrester Wave™: Enterprise Database Auditing And Real-Time Protection, Q4 2007.


327-330

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

74.

Authors:

Arti J. Jari, Pankaj, P. Bhangale

Paper Title:

To Study Critical Factors Necessary for a Successful Construction Project

Abstract:   The construction industry is dynamic in nature due to the increasing uncertainties in technology, budgets, and development processes. Nowadays, building projects are becoming much more complex and difficult. The project team is facing unprecedented changes. The study of project success and the critical success factors (CSFs) are considered to be a means to improve the effectiveness of project. The purpose of this study is to systematically investigate the causes of project failure and how these can be prevented, managed, or controlled. Constructions projects are frequently influenced by success factors’ which can help project parties reach their intended goals with greater efficiency. The aim of this study was to investigate the critical factors leading to construction company success. Many critical success factors such as factors related to project manager’s performance, factors related to organization, factors related to project, factors related to external environment became apparent from this study This study will helpful to identify which factor influence the project success.

Keywords:
 project success; project success factors; critical success factors (CSF); project success criteria


References:

1.       Taneja,S. January-june2011. Critical Success Factors And    Success Criteria of Project Management.In : “bi-annual Of IMS Ghaziabad” Vol 8 No.1,pp.13-23
2.       Ganesh,L.and Mehta A. 2010.Critical Success Factors For Successful enterprise Resource Planning Implementation.In : “International Journal Of Business, Management And Social Sciences” , Vol. 1 No.1, pp. 65-78.

3.       Pundir,A.K. and Ganpathy,L. and Shahu,R. Oct-Dec2011. Success Factors For Construction Projects:A Survey of Selected Projects.In:“NICMAR Jornal of construction management”,Vol.XXVI No.IV,pp.5-18.

4.       Iyer,K.C. And Jha,K.N. AUGUST 2006. Critical Factors Affecting Schedule Performance: Evidence From Indian Construction Projects.IN : “Journal Of Construction Engineering And Management © ASCE”,Vol 132,Issue 8.

5.       Walid Belassi And Oya  Lcmeli  Tukel. 1996.A New Framework For Determing Critical Success Factors In :”Project.Ininternational Journal Of Project Management”,vol 14,no.3.

6.       Terry Cooke-Davies.2002. The real success factors on projects.In: “international kournal of project management”,20,pp.185-190.

7.       Arslan,G.and Kivrak,s.2009.Critical Factors To Company Success In The Construction Industry.In : “international journal of human and social sciences”,4:8,pp.561-564.


331-335

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

75.

Authors:

Raviteja Boyanapalli, Raja Sekhara Reddy Vanukuri, Prudhvi Gogineni, Janakinandan Nookala, Goutham Kumar Yarlagadda, VinayBabu Ga

Paper Title:

Analysis of Composite De-Laval Nozzle Suitable for Rocket Applications

Abstract:   A nozzle is a device designed to control the direction or characteristics of a fluid flow (especially to increase velocity) as it exits (or enters) an enclosed chamber or pipe via an orifice. A nozzle is often a pipe or tube of varying cross sectional area, and it can be used to direct or modify the flow of a fluid (liquid or gas). Nozzles are frequently used to control the rate of flow, speed, direction, mass, shape, and/or the pressure of the stream that emerges from them. A nozzle is a relatively simple device, just a specially shaped tube through which hot gases flow. However, the mathematics, which describes the operation of the nozzle, takes some careful thought. Nozzles come in a variety of shapes and sizes. Simple turbojets, and turboprops, often   have   a   fixed   geometry convergent nozzle as shown on the left of the figure. Turbofan engines often employ a co-annular nozzle as shown at the top left. The core flow exits the centre nozzle while the fan flow exits the annular nozzle. Mixing of the two flows provides some thrust enhancement and these nozzles also tend to be quieter than convergent nozzles. Afterburning turbojets and turbofans require a variable geometry convergent-divergent - CD nozzle.  In this nozzle, the flow first converges down to the minimum area or throat, then is expanded through the divergent section to the exit at the right. The variable geometry causes these nozzles to be heavier than a fixed geometry nozzle, but variable geometry provides efficient engine operation over a wider airflow range than a simple fixed nozzle. Rocket engines also use nozzles to accelerate hot exhaust to produce thrust. Rocket engines usually have a fixed geometry CD nozzle with a much larger divergent section than is required for a gas turbine. All of the nozzles discussed thus far are round tubes. Recently, however, engineers have been experimenting with nozzles with rectangular exits. This allows the exhaust flow to be easily deflected, or vectored. Changing the direction of the thrust with the nozzle makes the aircraft much more manoeuvrable. Because the nozzle conducts the hot exhaust back to the free stream, there can be serious interactions between the engine exhaust flow and the airflow around the aircraft. On fighter aircraft, in particular, large drag penalties can occur near the nozzle exits. As with the inlet design, the external nozzle configuration is often designed by the airframer and subjected to wind tunnel testing to determine the performance effects on the airframe. The internal nozzle is usually the responsibility of the engine manufacturer.

Keywords:
 
The internal nozzle is usually the responsibility of the engine manufacturer.

References:

1.       Salmi, Reino J.; Wong, Alfred; and Rollbuhler, Ralph J.: Experimental Evaluation of Various Non-metallic Ablative Materials as Nozzle Sections of Hydrogen-Oxygen Rocket Engine. NASA TN D-3258, 1966.
2.       Peterson, Donald A.; and Meyer, Carl L.: Experimental Evaluation of Several Ablative Materials as Nozzle Sections of a Storable -Propellant Rocket Engine. NASA TM X -1223, 1996.

3.       Shinn, Arthur: Experimental evaluation of six ablative material thrust chambers as  components of storable propellant rocket engines. NASA TN D-3945, 1967.

4.       Hall, William B.: “Standardization of the Carbon-Phenolic Materials and Processes, Volume I, Experimental Studies,” Professor of Chemical Engineering, Mississippi State University, August 31, 1988.

5.       Kelly, P. and Thompson, A.: “AIAA 89-2661 Low Density Indications in Radiographs of Solid Rocket Motor Ablatives,” 25th Joint Propulsion Conference, Morton Thiokol Inc., July 10-12, 1989.

6.       TWR-10341 (CD) Rev. D: “Manufacturing Plan for Space Shuttle Redesigned Solid Rocket Motor Project,” Prepared by Morton Thiokol Inc., Manufacturing Engineering, NASA Contract NAS8- 30490.  


336-344

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

76.

Authors:

D. Haritha, R. Satya Prasad

Paper Title:

A Sequential Probability Ratio Test in Assessing Software Quality Using LPETM

Abstract:   Rapid growth of software usage enforces us to assess the Software reliability, a critical task in the development of a software system. In this Paper a well known test procedure of statistical science called as Sequential Probability Ratio Test(SPRT) is adopted for Logarithmic Poisson Execution Time Model (LPETM) in assessing the reliability of a developed software. It requires considerably less number of observations when compared with the other existing testing procedures. The model is inspected by using live Data Sets.

Keywords:
 Software reliability, SPRT, Maximum Likelihood Estimation, Software testing, Mean value function.


References:

1.       GOEL, A.L and OKUMOTO, K. (1979). “A Time Dependent Error Detection Rate Model For Software Reliability And Other Performance Measures”, IEEE Transactions on Reliability, vol.R-28, pp.206-211, 1979.
2.       MUSA, J.D., and OKUMOTO, K. (1984). ”A Logorithmic Poisson Execution Time Model For Software Reliability Measurement”, Proceeding Seventh International Conference on Software Engineering, Orlando, 230-238.

3.       PHAM, H.(2005). ”A Generalized Logistic Software Reliability Growth Model”, OPSEARCH, Vol.42, No.4, 322-331.

4.       Pham. H., 2006. “System software reliability”, Springer.

5.       STIEBER, H.A.(1997). “Statistical Quality Control: How To Detect Unreliable Software Components”, Proceedings the 8th International Symposium on Software Reliability Engineering, 8-12.

6.       WALD (1947).”Sequential Analysis”, Wiley,New York.

7.       WOOD, A.(1996).“Predicting Software Reliability”,IEEE Computer, 2253-2264.

8.       R.Satya Prasad and G. Krishna Mohan.(2011).”Detection Of Reliable Software Using SPRT On Time Domain Data”, International Journal of Computer Science, Engineering and Applications, Vol.1, No.4, pp.92-99.

9.       R. Satya Prasad, N. Supriya and  G. Krishna Mohan  (2011).“Detection Of Reliable Software Using SPRT” International Journal of Advanced Computer Science and Applications Vol.2, No: 8,   pp.60-63.

10.     R. Satya Prasad and D. Haritha (2011). “ Discovery of Reliable Software using GOM on Interval Domain Data” , International Journal of Computer Applications Volume 32– No.5,  pp.7-12.

11.     R. Satya Prasad and D. Haritha (2011). “Detection of Reliable Software using HLSRGM” ,International Journal of Computer Information Systems  pp.49-53.

12.     R. Satya Prasad and D. Haritha (2012). “Assessing Reliable Software using SPRT based on LPETM” , Interna tional Journal of Computer Applications Volume 47– No:19,  pp.6-11.


345-348

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html