International Journal of Innovative Technology and Exploring Engineering(TM)
Exploring Innovation| ISSN:2278-3075(Online)| Reg. No.:65021/BPL/CE/12| Published by BEIESP| Impact Factor:4.66| UGC Approved Journal
Home
Aims & Scope
Instructions for Authors
Call for Papers
Editorial Board
Archive
Conferences
Publication Fee
Ethics
Download
FAQ
Contact
Volume-4 Issue 2: Published on July 10, 2014
34
Volume-4 Issue 2: Published on July 10, 2014

  Download Abstract Book

S. No

Volume-4 Issue-2, July 2014, ISSN:  2278-3075 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.

1.

Authors:

A.  Arun Kumar, T. Chandra Sekaran, K. Riaz Ahamed

Paper Title:

Preparation of Activated Carbon from the Stem of the Natural Plant Vitex Negundo and Evaluation of Their Physical and Chemical Properties

Abstract: The powdered activated carbon was prepared from Vitex negundo stem agricultural waste, carbonization was done at 400°C and the chemical activation was carried out using various dehydrating agent such as H2SO4, H3PO4, ZnCl2, and KOH  and activation process was carried out at 6000C for five hours and allowed cool at room temperature for four hours.  The materials were grained and sieved with four different sizes 53µ, 106µ, 300µ and 500µ. The aforesaid particle size 53µ was taken to further studies such as physico-chemical parameters. The characteristic parameters were then compared with commercial activated carbon value. The instrumentation analysis such as Fourier transform infrared (FTIR), scanning electron microscope (SEM) were performed to determine the surface morphology of prepared adsorbent.

Keywords:
 Activated carbon, chemical activation, characterization, FTIR, SEM. BET,


References:

1.       Fawzi. A and Banat S. (2000). Biosorbtion of phenol by chicken feathers, Environ Engg and policy. 86 :85-90
2.       Bansal. RC, Donnet. JB, Stoeckli. F. Active carbon (Marcel dekker, New York) (1968) 

3.       Manteu. CL, carbon and graphite hand work(John Willey & Son’s, New York) (1968)
4.       Lopez-Gonzalez. DJ. (1984) high temperature adsorption of hydrocarbons by activated carbons prepared froe online stones, Adv Sci Technol.1: 103-109
5.       Srinivasan K., Balssubramanian. N &Ramakrishna.TV. (1988) studies on chromium removal  by rice husk carbon, Indian J Environ Hlth.30 :376-387

6.       Morais LC., Goncalves EP., Vasconcelos LT& Beca CG., (2000). reactive dyes removal from waste waters by adsorbtion on eucalyptus bark- adsorption equlibria, Environ Technol. 21:577-583

7.       XUX, Shiv&Sun G., (1997) sunflower stalks as adsorbents for colour removal from textile waste water, Indian Engg Chem Res. 36:808-813

8.       Rengaraj S, Banumathi A,  murugesan B., (1999). Preparation and characterization of activated carbon from Agricultural wastes, Indian J. chem. Technol. 6: 1-4.

9.       Ahmedna  M, Marshall W.E. and Rao R.M., (2000). Granular activated carbon from agricultural by-products: preparation  properties and application in cane sugar reefing bulletin of louisana state university agricultural centre.54

10.    Hayashi.  J, Kazehaya. A, Muroyama. K, and Watkinson. A.P.,(2000). “Preparation of activated carbon from lignin by chemical activation”, carbon.38:1873-1878

11.    Guibaud.G, Hullebusch E.V and Bordas F., (2006). Lead and cadmium biosorbtion by extracellular polymeric substances (EPS) extracted from activated sludges: pH-sorbtion edge tests and mathematical equilibrium modeling. Chemosphere.4(11): 1955-1962

12.    Malik R., Ramteke D.S and Wate S.R., (2007). Adsorption of malachite green on groundnut shell waste powdered activated carbon. Waste manage.27:1129-1138

13.    Mu G.N, Tang L.B, (2002).  Adsorption of Cd(II) ion and its complex compounds from  solution on the surface of charcoal treated with an oxidation –negative ionizing method, J. Colloid Interface Sci.247:504-506

14.    Yossef A.M, El-nabrawy.Th, Samra S.E., (2004). Sorption properties of chemically activated carbons:1, sorption of cadmium(II) ions, colloids surf.A. 235:153-163

15.    Nadeem. M, Mahmood A,Shahid S.A, Shah S.S, Khalid A.M, Mckay G., (2006). Sorption of lead from aqueous solution by chemically modified carbon adsorbents. J.Hazard.mater.B.138:604-613

16.    Amuda O.S, Giwa A.A, Bello I.A., (2007). Removal of heavy metal from industrial waste water using modified activated coconut shell carbon, Biochem. Eng.J.36:174-181

17.    Yang L, Chen J.P., (2007). Modification of activated carbon by polyaniline for enhanced adsorption of aqueous arsenate,Ind.Eng.Chem.Res.46:2133-2140
18.    Monser L., Adhoum N., (2002). Modified activated carbon for the removal of copper, zinc, chromium and cyanide from waste water, sep.purif.Technol.26:137-146
19.    Basar C.A., Karagunduz A., Keskinler B., Cakici A., (2003). Effect of presence of ions on surface characteristics of surfactant modified powdered activated carbon(PAC) App.surf.sci.218:169-174

20.    Choi H.-D., Cho J.-M., Baek K., Yang J.-S., Lee J.-Y. (2009). Influence of cationic surfactant on adsorption of Cr(VI) onto activated carbon, J.Hazard.Mater.161:1565-1568

21.    Hong H.-J, Kim H., Baek K., Yang J.-W. (2008). Removal of arsenate, chromate and ferricyanide by cationic surfactant modified powdered activated carbon,Desalination.223:221-228

22.    Rengaraj.s.,Seung.Hyeon Moon, Sivabalan .R et.al.,(2002). Agricultural solid waste For the removal of organics: Adsorbtion of phenol from water and waste water by palm seed coat Activated carbon. Waste management.22:543-548.

23.    Ekpete.O.A, Horsfall M. JNR,(2011). Preparation and Characterization of Activated Carbon derived from Fluted Pumpkin Stem Waste (Telfairia occidentalis Hook F) Res.J.Chem.Sci.1(3)

24.    Hassler J.W., Purification with Activated Carbon, Chemical Publishing Co. Inc., New York, edn. 2 (1974). 


1-6

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

2.

Authors:

Mohan Gowda G S, Janardhan Singh

Paper Title:

Secure Search Engine for Mobile Users for Countering the Attacks over Internet

Abstract:  Mobile user browsing internet is vulnerable to internet attacks. Security is the very important issue for any mobile user. Eventhough there are many security solutions to overcome internet attacks, these solutions may rely on human factors to achieve a good result against phishing websites, SSLStrip-based, Man-In-The-Middle attack and Spam detection. This paper presents a secure web referral service, which is called Secure Search Engine (SSE) for mobile devices. This method uses mobile cloud-based virtual computing and provides each user a Virtual Machine (VM) as a personal security proxy where all Web traffics are redirected through it. Inside the VM SSE uses web crawling technology with a set of checking services to validate IP addresses and certificate chains. Phishing Filter is used to check given URLs in a minimum execution time. This approach uses seperate private caches to protect user privacy and improve performance.

Keywords:
  Security, SSL Strip, Man in the middle, Mobile cloud.


References:

1.       M. Moxie, Sslstrip software, ―http://www. thoghtcrime.org/software/sslstrip. 2009
2.       C.  Jackson  and  A.  Barth, ―ForceHTTPS: Protecting high-security web sites from network attacks, 2008.

3.       Y.  Zhang,  J.  I.  Hong,  and  L.  F.  Cranor, ―Cantina: a content-based approach to detecting phishing web sites.

4.       R. Cox, J. Hansen, S. Gribble, and H. Levy, “A safety-oriented platform for web applications,” in Security and Privacy, 2006 IEEE Symposium on, may 2006, pp. 15 pp.

5.       Moshchuk, S. D. Gribble, and H. M. Levy, “Flashproxy: transparently enabling rich web content via remote execution”.
6.       Xen, ―Xen Virtualization Open Source Project.[Online]. Available: http://xen.org
7.       R-SpamRank: A Spam Detection Algorithm Based on Link Analysis


7-10

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

3.

Authors:

Kiranpal Kaur, Naveen Kumari

Paper Title:

Evaluation and Analysis of Active RFID Protocol in Wireless Sensor Networks

Abstract:   Wireless Sensor Networks (WSN) is a type of self organizing and self managing network which is not made of permanently of sensor nodes of the condition of not having internet infrastructure [6]. A wireless sensor network consists of a large number of nodes spread over a specific area where we want to look after at the changes going on there. A sensor node generally consists of sensors, actuators, memory, a processor and they do have communication ability. But this gives rise to many drastic changes to deal with in the network topology such as updating the path, or the network tree etc. The main task of the sensor node in the sensor network is to remove even, perform quick local data processing and send the data to the destination. Another prominent problem in the network is limited battery lifetime. In the current paper we will discuss how to the Enhance Energy Efficient Active RFID Protocol for the Clock Synchronization using NTP Protocol on Wireless Sensor Networks and thus improve the performance of the wireless networks.

Keywords:
  Wireless Sensor Network, RFID, NTP Protocol, MANET.


References:

1.       Akyildiz Ian F., Chowdhury Kaushik R., MelodiaTommaso,”A survey on wireless multimedia sensor networks”, Elsevier B.V Science Direct, pp.1-40, 5 Oct 2006.
2.       Akyildiz Ian F, Pompili, Dario, Melodia Tommaso,” Underwater acoustic sensor networks: research challenges”, Elsevier B.V Science Direct, pp.275-279, 2 Feb 2005.

3.       Amundson Isaac and Koutsou Xenofon D., “A Survey on Localization for Mobile Wireless Sensor Networks”, Springer, pp. 235–254, 2009.

4.       Atero F.J et.al. ”A Low Energy and Adaptive Architecture for Efficient Routing and Robust Mobility and Management in Wireless Sensor Networks”, IEEE, pp.172-181, 2011.

5.       Bu Kai, Chen Shigang et.al. “Efficient Pinpointing of Misplaced Tags in Large RFID Systems” IEEE, pp.287-295, 2011

6.       Bin-fang Cao, Jian-qi Li, Li Wang and Wen-Hu Wang “Energy Optimized Approach Based on Clustering Routing Protocol for Wireless Sensor Networks”, IEEE, pp.3710-3715, 2013.

7.       Chabalala S.C.,Muddenahalli T.N. and Takawira F.,”Energy efficient dynamic source routing protocol for wireless sensor networks,”IJCSNS International Journal of Computer Science and Network Security,vol.12,pp.98-109,Oct.2012

8.       Chauhan Naveen, Pant Sudhanshu and Prashant Kumar “Effective Cache based Policies in Wireless Sensor Networks”, ACM, vol.11, no.10, Dec.2010.

9.       CHEN Yu-Ping, WU Quincy“Power Consumption Measurement and Clock Synchronization on Low-Power Wireless Sensor Networks”, pp.406-409, Feb.2012.

10.    Dargie, W. and Poellabauer, C., “Fundamentals of  Wireless Sensor Networks: Theory and Practice”, A John Wily and Sons, Ltd., Publication ,2010,pp.7-8.

11.    DENG Huifang ,WANG Tingting “Time Synchronized High Performing Cluster-Based Routing Algorithm for Wireless Sensor Networks” IMBR,vol.5, pp. 561-567, Nov.2013.

12.    Dong, Xin and Vuran, Mehmet C., "A Channel Model for Wireless Underground Sensor Networks Using Lateral Waves" (2011). CSE Conference and Workshop
Papers. Paper 189.

13.    Gouvy Nicolas, Hamouda Essia, Mitton Nathalie and Zorbas Dimitrios “Energy Efficient Multi-Flow Routing in Mobile Sensor Networks”, IEEE, pp.3710-3715, 2013.

14.    Guo Shuxiang and Wang Yu “Optimized Energy-Latency Cooperative Transmission in Duty-Cycled Wireless Sensor Networks”, IEEE, pp.3710-3715, Aug.2013.

15.    Ismail Mahamod and Haron Ahmad Razani “Energy Consumption and Lifetime Analysis for Heterogeneous Wireless Sensor Networks”, IEEE Tencon-Spring, pp.188-193, 2013.

16.    Kim Dong-Hyun, Kim Jong-Deok and Lee Chae-Seok “An Energy Efficient Active RFID Protocol to Avoid Overhearing Problem”, IEEE, vol.14, no.1, pp 15-24, Jan.2014.

17.    Li Guang et.al.”An Energy-Balanced Routing Method Based on Forward-Aware Factor for Wireless Sensor Networks”, IEEE, vol.10, no.1, pp.766-773, 2014.

18.    Lo Nai-wei Li Yingjiu et.al. “A Novel RFID Tag Identification Protocol: Adaptiven-Resolution and k-Collision Arbitration “Springer, Feb .2014.

19.    Mamalis Basilis et.al. “Clustering in Wireless Sensor Networks” RFID and Sensor Networks, pp.323, Jun.2009. 

20.    Raj Deni Ebin” An Efficient Cluster Head Selection Algorithm for Wireless Sensor Networks –Edrleach”,IOSRJCE,vol. 2,pp.39-44,Jul.-Aug.2012.

21.    Ramasubramanian Srinivasan, Krunz Marwan and Younis Ossama “Node Clustering in Wireless Sensor Networks: Recent Developments and Development Challenges”, IEEE, vol.20, Issue 3, pp.20-25, 2006.

22.    S Diwakaran “Energy Efficient Scheduling in Wireless Sensor Networks”, IJSER,vol.2,pp.2347-3878,Jan.2014

23.    Shah.T, N.Javaid, Qureshi.T.N “Energy Efficient Sleep Awake Aware (EESAA) Intelligent Sensor Network  Routing Protocol       “, IEEE.

24.    SissariyakulTeerawa and Hossain Ekram, “Introduction  to  NetworkSimulator NS2”Springer, LLC, 2009
25.    Stuntebeck Erich P. and Tassiulas T.,”Optimal Deployment of large Wireless Sensor Networks”,IEEE Transactions on Information Theory,vol.52,no.7,pp.2935-2953,Ju.2006.
26.    Taheri Hoda, Naghibzadeh Mahmoud and Neamatollahi Peyman, “A Hybrid Clustering Approach for Prolonging in Wireless Sensor Networks”, IEEE, pp.172-181, Feb.2011.

27.    Vhatkar Sangeeta and Atique Mohammad,”Design Issues, Characteristics and Challenges in Routing Protocols for Wireless Sensor Networks”, IJCA ,pp.0975-8887,2013.

11-19

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

4.

Authors:

Jyoti Rani, Tazeem Ahmad Khan

Paper Title:

Performance Optimized DCT Domain Watermarking Technique with JPEG

Abstract:    Image compression is a widely addressed researched area. Many compression standards are in place. But still here there is a scope for high compression with quality reconstruction. The JPEG standard makes use of Discrete Cosine Transform (DCT) for compression. The introduction of the wavelets gave different dimensions to the compression. This paper aims at the analysis of compression using DCT and Wavelet transform by selecting proper threshold method, better result for PSNR have been obtained. Extensive experimentation has been carried out to arrive at the conclusion. Here we used simulation through using MATLAB simulator.

Keywords:
  Discrete Cosine Transform (DST), Wavelet transform, PSNR, Image compression.


References:

1.       Digital Image Processing (Pearson Education, Second Edition) By Rafael C. Gonzalez and Richard E.Woods.
2.       Digital Image Processing by AthurR.Weak

3.       Digital Image Processing using MATLAB (Pearson Education) By Rafael C. Gonzalez, Richard E. Woods and Steven L.Eddins,

4.       T Hong LIU , Lin-pei ZHAIV , Ying GAO, Wen-ming LI‟, Jiu-fei ZHOU‟, “Image Compression Based on  BiorthogonalnWavelet Transform”, IEEE Proceedings of ISCIT2005.

5.       De  Vore  ,  et  al.,n”Image  Compression  through  Wavelet  Transform  Coding”,  IEEE  Transaction  on  Information Theory.

6.       “A Comparative Study of Image Compression Techniques Based on Svd, Dwt-Svt , Dwt-Dct” ICSCI2008 proceedings pg 494-496.

7.       W. Bender, D. Gruhl, N. Morimoto, A. Lu, Techniques for data hiding, IBM Systems J. 35 (3&4)    (1996) 313–336.

8.       I.J. Cox, J. Kilian, F.T. Leighton, T. Shamoon, Secure spread spectrum watermarking for multimedia,      IEEE Trans. Image Process. 6 (12) (Dec. 1997)1673–1687.

9.       I.J. Cox, M.L. Miller, A.L. Mckellips, Watermarking as communication with side information, Proc. IEEE 87 (7) (Jul. 1999) 1127–1141. Electronic For You  www.digitalwatermarking.com

10.    Cox, J.; Miller, M. L.; Bloom, J. A.; Fridrich J. &Kalker T. (2008). Digital Watermarking and Steganography, Morgan Kaufmann Pub., Elsevier Inc.

11.    C. C. Chang, P. Tsai and C. C. Lin, “SVD-based digital image watermarking image scheme”, Pattern Recognition Letters, vol.26, pp. 1577-1586, 2005.

12.    A. Mohammad, A. Alhaj and S. Shaltaf, “An improved SVD-based watermarking scheme

13.    Lin, S. D, Shie, S. C. , and Guo, J. Y. , "Improving the robustness of DCT-based image watermarking against JPEG compression", Journal of Computer Standards & Interfaces, vol. 32, pp. 54-60, 2010.

14.    Jose, S. , Roy, R. C. , and Shashidharan, S. , "Robust Image Watermarking based on DCT-DWT-SVD Method", International Journal of Computer Applications, vol. 58, no. 21, pp. 0975-8887, November 2012.

15.    Xijin, W. , Linxiu, F. , "The Application Research of MD5 Encryption Algorithm in DCT Digital Watermarking", International conference on Solid State Devices and Materials Science, Journal of Physics Procedia, vol. 25, pp. 1264-1269, 2012.

16.    Tao, B., Dickinson, B., "ADAPTIVE WATERMARKING IN THE DCT DOMAIN", IEEE International Conference on Acoustics, Speech, and Signal Processing, pp. 21-24,
1997.

17.    XU, Z. J. , WANG, Z. Z. , and LU, Q. , "Research on Image Watermarking Algorithm based on DCT", 3rd International Conference on Environmental Science and Information Application Technology, Journal of Procedia Environmental Sciences, vol. 10, pp. 1129-1135, 2011.

18.    Kashyap, N. , SINHA, G. R. , "Image Watermarking Using 3-Level Discrete Wavelet Transform", I. J. Modern Education and Computer Science, vol. 3, pp. 50-56, 2012.

19.    Tomar, V.,Mehrotra, D., and ChoudharyA., "A Statistical Comparison of Digital Image Watermarking Techniques", Special Issue of International Journal of Computer Applications (0975 – 8887), for 3rd International IT Summit Confluence 2012 - The Next Generation Information Technology Summit.

20.    Keyvanpoura, M.,Bayat, F. M., "Blind image watermarking method based on chaotic key and dynamic coefficient quantization in the DWT domain", Journal of Mathematical and Computer Modelling, July 2012, In Press.

21.    Al-Haj, A., "Combined DWT-DCT Digital Image Watermarking", Journal of Computer Science, vol. 3, no. 9, pp. 740-746, 2007.

22.    Pradhan, C.,Rath, S.,Bisoic, and A. K., "Non Blind Digital Watermarking Technique Using DWT and Cross Chaos", Journal of ProcediaTechnology, vol. 6, pp. 897- 904, 2012.
23.    Keyvanpour, M.,Bayat, F. M., "Robust Dynamic Block-Based Image Watermarking in DWT Domain", Journal of Procedia Computer Science, vol. 3, pp. 238-242, 2011.
24.    [Bhattacharya and Cortesi, 2009b] Bhattacharya, S. and Cortesi, A. (2009b). Ageneric distortion free watermarking technique for relational databases. In Proceedingsof the 5th International Conference on Information Systems Security (ICISS ’09), pages 252–264, Kolkata, India. Springer LNCS, Volume 5905.

25.    [Bhattacharya and Cortesi, 2010] Bhattacharya, S. and Cortesi, A. (2010). Databaseauthentication by distortion-free watermarking. In Proceedings of the 5th InternationalConference on Software and Data Technologies (ICSOFT ’10), pages 219–226, Athens, Greece. INSTICC Press.

26.    [Cui et al., 2006] Cui, X., Qin, X., Sheng, G., and Zheng, J. (2006). A robust algorithmfor watermark numeric relational databases. In Proceedings of the 2010 Internationalconference on Intelligent computing (ICIC ’06), pages 810–815, Kunming, China.  Springer Lecture Notes in Control and Information Sciences.

27.    [Guo et al., 2006a] Guo, F., Wang, J., and Li, D. (2006a). Fingerprinting relationaldatabases. In Proceedings of the 2006 ACM symposium on Applied computing (SAC’06), pages 487–492, Dijon, France. ACM Press.

28.    [Guo et al., 2005] Guo, F.,Wang, J., Zhang, Z., Ye, X., and Li, D. (2005). An improvedalgorithm to watermark numeric relational data. In Proceedings of the 6th International

29.    Workshop on Information Security applications (WISA ’05), pages 138–149,Jeju Island, Korea. Springer LNCS, Volume 3786.

30.    [Guo et al., 2006b] Guo, H., Li, Y., Liua, A., and Jajodia, S. (2006b). A fragile watermarkingscheme for detecting malicious modifications of database relations. InformationSciences, 176:1350–1378.

31.    [Gupta and Pieprzyk, 2009] Gupta, G. and Pieprzyk, J. (2009). Database relationwatermarking resilient against secondary watermarking attacks. In Proceedings ofthe 5th International Conference on Information Systems Security (ICISS ’09), pages222–236, Kolkata, India. Springer LNCS, Volume 5905.

32.    [Hacigumus et al., 2002] Hacigumus, H., Iyer, B., and Mehrotra, S. (2002). Providingdatabase as a service. In Proceedings of the 18th International Conference on Data Engineering (ICDE ’02), pages 29–38, San Jose, California, USA. IEEE ComputerSociety.

33.    [Halder and Cortesi, 2010a] Halder, R. and Cortesi, A. (2010a). A persistent publicwatermarking of relational databases. In Proceedings of the 6th International Conferenceon Information Systems Security (ICISS ’10), pages 216–230, Gandhinagar,Gujarat, India. Springer LNCS, Volume 6503.

34.    [Halder and Cortesi, 2010b] Halder, R. and Cortesi, A. (2010b). Persistent watermarking of relational databases. In Proceedings of the IEEE International Conference


20-24

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

5.

Authors:

Vegi Srinivas, V. Valli Kumari

Paper Title:

A Novel Approach to Trustable Data Storage in Cloud Computing

Abstract: With the advent of new platforms on computing techniques, the cloud is widely accepted and adoptable environment.   Many cloud applications demand ease of use, speed, and fault tolerance over consistency. Though the benefits are  clear,  such  a  service  is  also hand over users physical control of their  outsourced  data,  which  inevitably poses  new  security  risks  toward  the correctness of the data in cloud. In order to address  this  new  problem  and  further achieve  a  secure  and  dependable  cloud storage service. We propose in this paper a flexible distributed storage integrity auditing mechanism, utilizing distributed ensure-coded data. The proposed design allows users to audit the cloud storage with very lightweight communication and computation cost. The auditing result not only ensures identification block of errors, but also simultaneously achieves fast data error localization, i.e., the identification of misbehaving server.

Keywords:
  Cloud computing, data integrity, distributed storage, error localization.


References:

1.    C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring Data StorageSecurity in Cloud Computing,” Proc. 17th Int’l Workshop Quality of Service (IWQoS ’09), pp. 1-9, July 2009.
2.    Amazon.com, “Amazon Web Services(AWS),” http://aws.amazon.com, 2009.

3.    Sun Microsystems, Inc., “Building Customer Trust in Cloud Computing with TransparentSecurity, ”https://www.sun.com/offers/details/sun_transparency.xml, Nov. 2009.

4.    K. Ren, C. Wang, and Q. Wang, “Security Challenges for the Public Cloud,” IEEE Internet Computing, vol. 16, no. 1, pp. 69-73, 2012.

5.    M. Arrington, “Gmail Disaster: Reports of Mass Email Deletions,” http://www.techcrunch.com/2006/12/28/gmail-disasterreportsof-mass-email-deletions, Dec. 2006.

6.    J. Kincaid, “MediaMax/TheLinkup Closes Its Doors,” http://www.techcrunch.com/2008/07/10/mediamaxthelinkup-closesits-doors, July 2008.

7.    Amazon.com, “AmazonS3 AvailabilityEvent:July20,2008, ”http://status.aws.amazon.com/s3-20080720.html, July 2008.

8.    S. Wilson, “Appengine Outage,” http://www.cio-weblog.com/ 50226711/appengine_outage.php, June 2008.

9.    B. Krebs, “Payment Processor Breach May BeLargest Ever,” http://voices.washingtonpost.com/securityfix/2009/01/payment_processor_breach_may_b.html, Jan. 2009.

10. A. Juels and B.S. Kaliski Jr., “PORs: Proofs of Retrievability forLarge Files,” Proc. 14th ACM Conf. Computer and Comm. Security (CCS ’07), pp. 584-597, Oct. 2007.


25-28

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

6.

Authors:

M.S. Joshi, Deepali V. Mahajan

Paper Title:

Arm 7 Based Theft Control, Accident Detection & Vehicle Positioning System

Abstract:  This system makes use of an embedded chip that has an inductive proximity sensor, which senses the key during insertion. This  is  followed  by  the  system  present  in the  car asking the  user to enter  a unique  password. The password consists of few characters and the car key number. The system sends a text message to the owner’s mobile stating that the car is being accessed. If  the  user  fails  to  enter  the  correct  password in three trials, a text message is sent to the owner and police  with  the  vehicle  number about the unauthorized usage and  the  location tracked  using  a  GPS ,GSM  module and ARM7.  Apart from this if your car is stolen, a password like SMS is sent   by the owner, it automatically stops the car. One more application of this project is that it is use for early accident detection. It can automatically detect traffic accidents using accelerometers along with other sensors and immediately notify owner, police station & two more contacts saved in that along with vehicle number & location of that place.

Keywords:
Accident alert, accelerometer, GSM, GPS, i2c protocol, UART, vehicle tracking


References:

1.    Abid Khan, Ravi Mishra ―GPS – GSM Based Tracking System‖, International Journal of Engineering Trends and Technology, Volume3, Issue2, Pp: 161-169, 2012.
2.    S.P. Bhumkar, V.V. Deotare, R.V.Babar ―Intelligent Car System for Accident Prevention Using ARM-7‖, International Journal of Emerging Technology and Advanced Engineering, Volume 2, Issue 4, Pp: 56-78, 2012.

3.    B.G .Nagaraja, Ravi Rayappa, M.Mahesh,Chandrasekhar M Patil, Dr TC Manjunath:‟Design and Development of GSM based vehicle theft control system‟ Advanced Computer Control ICACC ‟09            International conference.pp148.

4.    Xu Li, Wei Shu, Minglu Li, Hong-Yu Huang, Pei-En Luo, and Min-You Wu, “Performance Evaluation of Vehicle-Based Mobile Sensor Networks for Traffic Monitoring” IEEE 2009.

5.    Young, Kar-Keung D. “Automated navigation and mobile vehicle control using wireless sensor network technology,” Proceedings of the IEEE International Conference on Industrial Technology, 2008.


29-31

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

7.

Authors:

Gurnam Singh, Gursewak Singh

Paper Title:

Improvement of Network Efficiency by Preventing Black Hole Attack in Manet

Abstract:   Black  hole  is  a  malicious  node  that  always  gives  the false  replay  for  any  route  request  without  having specified  route  to  the  destination  and  drops  all  the received  packets.  This can be easily employed by exploiting vulnerability of on demand routing protocol AODV. Within mobile Ad hoc networks black hole attack is a harsh threat which is able to prevent by broadcasting the malicious node id to the entire nodes in the network. The obtainable method recognized the attacked node, retransmit the packets and once more find a new way as of source to destination. Here the proposed method to prevent black hole attack with reduced energy consumption of the network this results in improving lifetime by minimizing the packet loss and improved throughput of the network.

Keywords:
 Ad-hoc, AODV, Black hole.


References:

1.          Tayal, S., & Gupta, V. (2013). “A Survey of Attacks on Manet Routing Protocols.”International Journal of Innovative Research in Science, Engineering and Technology, 2(6), 2280-2285.
2.          Muthukumaran, K., Jeyakumar, D., &Omkumar, C. U. A “Concise Evaluation of Issues and Challenges in MANET Security”.

3.          Jain, S., &Hemrajani, N. (2013). “Detection and mitigation techniques of black hole attack in MANET: An Overview.” International Journal of Science and Research (IJSR), India Online ISSN, 2319-7064.

4.          Kaur, A., & Singh, A. “A Review on Security Attacks in Mobile Ad-hoc Networks”.

5.          Dangore, M. Y., &Sambare, S. S. (2013). “A Survey on Detection of Blackhole Attack Using AODV Protocol in MANET”. International Journal on Recent and Innovation Trends in Computing and Communication, 1(1), 55-61.

6.          Jain, S. “Review of Prevention and Detection Methods of Black Hole Attack in AODV-based on Mobile Ad Hoc Network”.

7.          Sowmya, K. S., Rakesh, T., &Deepthi, P. H. (2012).” Detection and Prevention of Blackhole Attack in MANET Using ACO”. International Journal of Computer Science and Network Security, 12(5), 21-24.

8.          Tripathi, R., &Tripathi, S. (2001). “PREVENTIVE ASPECT OF BLACK HOLE ATTACK IN MOBILE AD HOC NETWORK”.

9.          Devassy, A., &Jayanthi, K.” Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting”.

10.       John, N. P., & Thomas, A. (2012).” Prevention and Detection of Black Hole Attack in AODV Based Mobile Ad-hoc Networks-A Review”. International Journal of Innovative Research and Development, 1(6), 232-245.

11.       Patel, B., & Trivedi, K.” A Review-Prevention and Detection of Black Hole Attack in AODV based on MANET”.

12.       Hongmei  Deng,  Wei  Li,  and  Dharma  P.  Agarwal, (2002)    "Routing  Security  in  Wireless  Ad  Hoc Networks",  University  of  Cincinnati,  IEEE Communications magazine, Vol.40, No.10

13.       Charles E. Perkins, and Elizabeth M. Royer, “Ad-hoc On-Demand Distance Vector (AODV) routing,” InternetDraft, November 2002.


32-35

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

8.

Authors:

Sunita Arvind Rathod, Siva Yellampalli

Paper Title:

Design of Op-amp, Comparator and D Flip-Flop for Fifth Order Continuous-Time Sigma-Delta Modulator

Abstract:    This paper explains the design of two stage operational amplifier, single bit comparator and D flip- flop best suited for the fifth order continuous-time sigma-delta modulator. A fifth order continuous time sigma delta modulator is chosen for 40MHz Signal Bandwidth with an nyquist frequency of 150MHz. Two stage opamp is used to provide the high gain to the modulator. A single quantizer is used to maintain linearity in the modulator. D flip-flop is used for the sampling of the analog signal with the clock frequency of 300MHz. All the three components are designed and implemented in 180nm CMOS technology

Keywords:
 Operational-amplifier, Comparator, D flip-flop


References:

1.     T. Sepke, J. K. Fiorenza, C. G. Sodini, P. Holloway, and H.-S. Lee. Comparator-based switched-capacitor circuits for scaled CMOS technologies. In Proc. IEEE International Conference Solid-State Circuits, volume 49, pages 220–221, Feb 2006.
2.     S.R.Norworthy , R.Schreier and G.C.Temes, “Delta sigma data converters: theory, design and simulation,” IEEE press, 1998.

3.     Philips E. Allen and Douglas R. Holberg, CMOS Analog Circuit Design, 2nd edition, New York: Oxford University Press, 2004.

4.     Dr. James A. Cherry, “Theory, Practice, and Fundamental Performance Limits of High Speed Data conversion Using Continuous-Time”, A PhD Thesis Submitted to Ottawa Carleton Institute for Electrical and Computer Engineering, Department of Electronics, Carleton University, Ottawa, Ontario, Canada.

5.     Issac Hsu, and Howard C.Luong. “ A 70-MHz Continuous-time CMOS Band-pass ∑∆ Modulator for GSM Recievers” ISCAS 2000-IEEE International Symposium on Circuits and Systems, Geneva, Switzerland, volume 3, page(s): 750-753, May 28-31, 2000.

6.     Dr.Hsu Kuan Chun Issac, “A 70 MHz CMOS Band-pass Sigma-Delta Analog-to-Digital Converter for Wireless Receivers”, A Ph.D thesis submitted to The Hong Kong University of Science and Technology.


36-40

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

9.

Authors:

Anuranjan Misra, Anshul Sharma, Preeti Gulia, Akanksha Bana

Paper Title:

Big Data: Challenges and Opportunities

Abstract: Big Data concern large-volume, complex, growing data sets with multiple, autonomous sources. With the fast development of networking, data storage, and the data collection capacity, Big Data are now rapidly expanding in all science and engineering domains, including physical, biological and biomedical sciences. This paper presents a HACE theorem that characterizes the features of the Big Data revolution, and proposes a Big Data processing model, from the data mining perspective. This data-driven model involves demand-driven aggregation of information sources, mining and analysis, user interest modeling, and security and privacy considerations. We analyze the challenging issues in the data-driven model and also in the Big Data revolution.

Keywords:
 BigData, definition of big data, meseure of big data, Challenges in big data


References:

1.       Jacobs, The pathologies of big data, Commun. ACM Vol. 52 (8) (2009) pp. 36{44.
2.       R. B. Miller, Response time in man-computer conversational transactions, in: Proceedings of the December 9-11, 1968, fall joint computer conference, part I, AFIPS '68 (Fall, part I), New York, NY, USA, 1968, pp. 267{277.

3.       S. C. Seow, User and system response times, in: Designing and Engineering Time: The Psychology of Time Perception in Software, Addison-Wesley Professional, 2008, pp. 33{48.

4.       M. de Berg, O. Cheong, M. van Kreveld, M. Overmars, 1-dimensional range searching, in: Computational Geometry: Algorithms and Application 2ed, Springer Berlin Heidelberg, 2008, pp. 96{99.


41-42

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

10.

Authors:

Anuranjan Misra, Anshul Sharma, Preeti Gulia, Akanksha Bana

Paper Title:

Optimizing Big Data

Abstract:  When sales representatives and customers negotiate, it must be confirmed that the final deals will render a high enough profit for the selling company. Large companies have different methods of doing this, one of which is to run sales simulations. Such simulation systems often need to perform complex calculations over large amounts of data, which in turn requires efficient models and algorithms. This paper intends to evaluate whether it is possible to optimize and extend an existing sales system called PCT, which is currently suffering from unacceptably high running times in its simulation process. This is done through analysis of the current implementation, followed by optimization of its models and development of efficient algorithms. The performance of these optimized and extended models is compared to the existing one in order to evaluate their improvement. The conclusion of this paper is that the simulation process in PCT can indeed be optimized and extended. The optimized models serve as a proof of concept, which shows that results identical to the original system's can be calculated within < 1% of the original running time for the largest customers.

Keywords:
 PCT, optimized, algorithms, simulations.


References:

1.       Jacobs, The pathologies of big data, Commun. ACM Vol. 52 (8) (2009) pp. 36{44.
2.       R. B. Miller, Response time in man-computer conversational transactions, in: Proceedings of the December 9-11, 1968, fall joint computer conference, part I, AFIPS '68 (Fall, part I), New York, NY, USA, 1968, pp. 267{277.

3.       S. C. Seow, User and system response times, in: Designing and Engineering Time: The Psychology of Time Perception in Software, Addison-Wesley Professional, 2008, pp. 33{48.

4.       M. de Berg, O. Cheong, M. van Kreveld, M. Overmars, 1-dimensional range searching, in: Computational Geometry: Algorithms and Application 2ed, Springer Berlin Heidelberg, 2008, pp. 96{99.

5.       Y. Manolopoulos, Y. Theodoridis, V. J. Tsotras, Advanced Database Indexing, Springer US, 2000, Ch. 3. Fundamental Access Methods, pp. 37{59.

6.       Vicknair, M. Macias, Z. Zhao, X. Nan, Y. Chen, D. Wilkins, A comparison of a graph database and a relational database: a data provenance perspective, in: Proceedings of the 48th Annual Southeast Regional Conference, ACM SE '10, ACM, New York, NY, USA, 2010, pp. 42:1{42:6.

7.       S. Batra, C. Tyagi, Comparative analysis of relational and graph databases, International Journal of Soft Computing and Engineering (IJSCE) Volume 2 (Issue 2) (2012) pp. 509{512.


43-46

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

11.

Authors:

Raju B. S, Chandra Sekhar U, Drakshayani D. N

Paper Title:

Optimization of Stereolithography Process Parameters for Part Strength using Taguchi Technique

Abstract:   Rapid prototyping (RP) is an emerging technology that has been implemented in many spheres of industry – particularly in the area of new product development. Growth of this field has been rapid in recent years. Stereolithography (SL) is one of the most popular RP process used for rapid tooling applications. There are several process parameters contributing to the strength of SL product. The contribution of the identified parameters: i.e., layer thickness(Lt), Orientation(O) and hatch spacing (Hs)which are more significant factors  contributing to the strength of an SL product. An attempt has been made in order to study and optimize these process parameters in order to maximize the part strength and also development of an empirical model which depicts the relationship between the process parameters and part strength through taguchi technique and Analysis of variance. The detailed study of the effects of these parameters was carried out over the SLA parts and the data were analyzed by quantitative methods.  The optimum levels of the parameter contributing to higher tensile/ impact and flexural strength of the part are the end results of the paper, which is very useful information for machine designers as well as RP machine users. The results obtained were utilized to select the main influencing parameters and the best parameter settings for yielding the optimum objectives.

Keywords:
 ANOVA, Hatch space, Layer thickness, Mechanical properties, Orientation, Stereolithography Process, Taguchi Technique.


References:

1.          K P Roysarkar et.al., “ Multi-objective optimization for part quality in stereolithrography”, in IEEE Xplore, 978-1-4244-4136-5/09, 2009, pp 617- 623.
2.          Pham, D. T., Dimov, S. S., (2001). Rapid Manufacturing, 1st edition, Springer verlag, London.

3.          Flexural properties of unreinforced and reinforced plastics and electrical insulating materials, D790-03, (2001). Annual Book of ASTM standards, section 8, vol 8.02: Plastics, 1-11.

4.          Rama Rao, S., and Padmanabhan, G. (2012). Application of Taguchi methods and ANOVA in optimization of process parameters for metal removal rate in electrochemical machining of Al/5%SiC composites, International Journal of Engineering Research and Applications, 2(3),

5.          192-197.

6.          Nataraj, M., Arunachalam, V.P., (2005). Using risk analysis and Taguchi’s method to find optimal conditions of design parameters: a case study.  International Journal of Advanced Manufacturing Technology, 27(5), 445–454.

7.          Barua, P.B., Kumar, P., Gaindhar, J.L. (1997): Optimization of mechanical properties of V-Process castings by Taguchi method. Indian Foundry Journal, 18(3), 17–25.

8.          Dingal, S., Pradhan, T.R,  Sundar, S, Roy C.A.,  Roy S.K. (2004): Experimental investigation of selective laser sintering of iron powder by application of Taguchi method. In: Proceedings of the Laser Assisted Net Shape Engineering conference LANE, Erlangen, Germany, 445–456.

9.          Guharaja, S., Noorulhaq, A., (2006). Optimization of green sand casting process parameters by using Taguchi’s method. International Journal of Advanced Manufacturing Technology, 30(11), 1040–1048.

10.       Nataraj, M., Arunachalam, V.P., (2005). Using risk analysis and Taguchi’s method to find optimal conditions of design parameters: a case study.  International Journal of Advanced Manufacturing Technology, 27(5), 445–454.

11.       Barua, P.B., Kumar, P., Gaindhar, J.L. (1997): Optimization of mechanical properties of V-Process castings by Taguchi method. Indian Foundry Journal, 18(3), 17–25.

12.       User Manual, (1988), 3D System, Valencia, USA.

13.       Taguchi,G., (1990), Introduction to Quality Engineering, Asian productivity organization , Tokyo.

14.       Standard test method for Tensile properties of plastics, D638-01, (2001).  Annual Book of ASTM standards, section 8, vol 8.02: Plastics,  1-15.

15.       Flexural properties of unreinforced and reinforced plastics and electrical insulating materials, D790-03, (2001). Annual Book of ASTM standards, section 8, vol 8.02: Plastics, 1-11.

16.       Standard test methods for determining the Izod pendulum impact resistance of plastic, D256-04, (2001). Annual Book of ASTM Standards, section 8, vol 8.02: Plastics,  1-20.

17.       User Manual, (1988), 3D System, Valencia, USA.

18.       Taguchi,G., (1990), Introduction to Quality Engineering, Asian productivity organization , Tokyo.

19.       Hsaio,Y.C., Ho, K.C., Pan, L.K. and Wan,C.C., (2005). Optimization of nd:yag laser welding onto magnesium alloy via Taguchi analysis,  Optics and Laser technology, Vol.37,  33-42.

20.       Luo R.C. and Tzou, J.H, (2004). The development of an intelligent web based rapid prototyping manufacturing system”, IEEE Transactions on Automation Science and Engineering, Vol.1, No 1,  1-13.

21.       Montgomery,D.C., (2001), Design and analysis of experiments, 3rd edition, John wiley & sons Inc., New York.

22.       Yang,W.H., Tarang,Y.S., (1998). Design optimization of cutting parameters for turning operations based on the taguchi method, Journal of Materials processing
Technology, Vol.84, 122-129.

23.       Tosun,N., Cogun,C., Gul,T., (2004). A study on kerf and material removal rate in WEDM based on Taguchi method, Journal of  Materials Processing Technology , Vol.152,  316-322.

24.       Syrcos, G.P., (2003) Die casting process optimization using Taguchi methods, Journal of Materials Processing Technology, Vol.135, 68-74.

25.       Ghani, J.A., Choudhury, I.A., Hassan, H.H., (2004). Application of Taguchi method in the optimization of end milling parameters, Journal of Materials Processing Technology, Vol.145, 84-92.

26.       Montgomery,D.C., (2001), Design and analysis of experiments, 3rd edition, John wiley & sons Inc., New York.


47-52

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

12.

Authors:

Mohammad Sharear Kabir, Md Moinul Islam, Md Mohar Ali Bepari

Paper Title:

Impact Toughness of Concrete Reinforcement Bars Produced by the THERMEX Process and Ordinary Rolling Process

Abstract: The impact toughness of rebars produced by the THERMEX process and ordinary rolling process was investigated by the Charpy impact test at temperatures between -400C and 1000C. The THERMEX process utilizes quenching and self-tempering technology during the final stages of rolling, whereas the ordinary rolling process does not. The rebars produced by the THERMEX process are known as quenched and self tempered rebars or QST rebars. A novel approach for testing impact toughness of QST rebars was implemented. The impact properties that were investigated comprised the total impact energy, ductile to brittle transition temperature (DBTT), transition temperature at 100% ductile fracture and transition temperature at 100% brittle/cleavage fracture. The QST rebars displayed much higher resistance to ductile fracture at high test temperatures, while its resistance to brittle fracture at low test temperatures was only a little higher than that of the ordinary hot rolled rebars. The QST rebars also displayed lower ductile to brittle transition temperature than the ordinary hot rolled rebar. This increase in the impact toughness of QST rebars can mostly be attributed to its composite microstructure consisting of a strong tempered martensite periphery/case and ductile ferrite-pearlite core.

Keywords:
 ductile to brittle transition temperature (DBTT), impact toughness, quench and self-tempering, THERMEX process.


References:

1.       http://www.hsegmbh.de
2.       Selzer Jacob. Quenched and Tempered Bar. A Publication of the Association for Iron and Steel Technology. AIST.org, pp. 120-126 August 2012.

3.       C.S. Viswanatha, L.N. Prasad, Radhakrishna and H.S. Nataraja. Sub-standard rebars in the Indian market: An insight. The Indian Concrete Journal, January 2004,
Vol. 78, No. 1,pp. 52-55.

4.       Amret R Tuladhar, e-conference (1), BREINS-Building Research Institute (P) Ltd, 30 March, 2010

5.       O.H. Ibrahim: Comparison of Impact Properties for Carbon and Low Alloy SteelsJ. Mater. Sci. Technol., 2011, 27(10), 931-936

6.       Lundberg Sven-Erik. Quenched and Self-tempered Rebar – Process Overview, Layouts, Operational Parameters and Cost Savings. AISTech 2010 Proceedings, Volume II, pp.719-726

7.       JFE Technical Report No. 15 (May 2010)

8.       http://www.concretebasics.org/articlesinfo/tmt5.php

9.       George F. Vander Voort. Metallography: Principles and Practice (#06785G), Copyright © 1984 ASM International ®, www.asminternational.org

10.    Bimal Kumar Panigrahi, Surendra Kumar Jain, “Impact toughness of high strength low alloy TMT reinforcement ribbed bar.” Bull. Mater. Sci., Vol. 25, No. 4, August 2002, pp. 319–324

11.    M.C. Zhao, F.X. Yin, T. Hanamura, K. Nagai and A. Atrens: Scripta Mater., 2007, 57, 857


53-59

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

13.

Authors:

Bhosale Dattatray, G. R. Patil, Sachin Maskar

Paper Title:

Use of Overhead Water Tank to Reduce Peak Response of the Structure

Abstract:  This paper presents analytical investigation carried out to study the use of over head water tank as passive TMD using SAP. Three multi-storey concrete structures, three, five and fifteen storey were taken for the study. The water tank was placed at the roof. The mass and frequency of the tank including its water, walls, roof, beams and columns were tuned to the optimized values. The behaviour of the tank subjected to three earthquake data, namely, Elcentro, Bhuj, Washington was studied under three conditions, namely building only with empty tank, two third full tank and full tank with damping. The results shows if the tank is tuned properly it can reduce the peak response of structures subjected to seismic forces.

Keywords:
 Vibration control; seismic excitation; passive TMD;water tank; optimization


References:

1.       Kareem Ahsan, and Kijewski Tracy, “Mitigation of motions of tall buildings with specific examples of recent applications.” Wind and Structures, Vol. 2, No. 3, (1999), pp. 201-251.
2.       Spencer B.F. Jr., and Sain Michael K., “Controlling Buildings: A New Frontier in Feedback.” Special Issue of the IEEE Control Systems Magazine on Emerging Technology, Vol. 17, No. 6,(1997), pp. 19-35.

3.       Bauer H.F., “Oscillations of immiscible liquids in a rectangular container: A new damper for excited structures.” Journal of Sound and Vibration, 93(1), (1984), pp. 117-133.

4.       Modi V.J., and Welt F., “Damping of wind induced oscillations through liquid sloshing.” Journal of Wind Engineering and Industrial Aerodynamics, 30, (1988), pp. 85-94.
5.       Fujii K., Tamura Y., Sato T., Wakahara T., “Wind-induced vibration of tower and practical applications of Tuned Sloshing Damper.” Journal of Wind Engineering and Industrial Aerodynamics, 33, (1990), pp. 263-272.
6.       Kareem Ahsan, “Reduction of Wind Induced Motion Utilizing a Tuned Sloshing Damper.” Journal of Wind Engineering and Industrial Aerodynamics, 36, (1990), pp. 725-737.

7.       Sun L.M., Fujino Y., Pacheco B.M., and Chaiseri P., “Modeling of Tuned Liquid Damper (TLD).” Journal of Wind Engineering and Industrial Aerodynamics, 41-44, (1992), pp. 1883-1894.

8.       Wakahara T., Ohyama T., and Fujii K., “Suppression of Wind-Induced Vibration of a Tall Building using Tuned Liquid Damper.” Journal of Wind Engineering and
Industrial Aerodynamics, 41-44, (1992), pp. 1895-1906.

9.       Sakai F., Takaeda S., and Tamaki T., “Tuned Liquid Column Damper – New type device for suppression of building vibrations,” Proc. Of International conference on High-rise Buildings, Vol. 2, Nanjing, China, (1989)

10.    Xu X.L., Kwok K.C.S, and Samali B., “The effect of tuned mass dampers and liquid dampers on cross-wind response of tall/slender structures.” Journal of Wind Engineering and Industrial Aerodynamics, 40, (1992), pp. 33-54.


60-64

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

14.

Authors:

Chetan Naik J, S. L. Pinjare, Jharna Majumdar

Paper Title:

Linear-Quadratic Regulator Control for Human Following Robot in Straight Path

Abstract:   the paper presents the design of controller for wheeled mobile robots (WMRs) which continuously follows humans indoors in straight path only. This task uses computer vision in the controller feedback loop and is referred to as vision-based control or visual servo control. Typically, visual servo techniques can be categorised into image based visual servoing (IBVS) and position-based visual servoing (PBVS). The paper discusses Image based visual servoing approaches for following human in an indoor environment.The Robotics system used here consists of camera for extracting the image features. A suitable control law is developed which can learn the robot behaviour policy and autonomously improve its performance to achieve the smooth and efficient travel path towards the object of interest.

Keywords:
 Embedded Computer Vision, Target Tracking, Correlation based Template Matching, Particle filters, Distance Measures, Re-Sampling, ARM, Beagleboard-xM, Linux.


References:

1.       . C. Sanderson and L. E. Weiss, "Adaptive visual servo control of robots" ,in Robot Vision, Springer-Verlag, pp. 107-116, 1983.
2.       S. Hutchinson, G. D. Hager and P. I. Corke, "A tutorial on visual servo control," IEEE Transaction on Robotics and Automation, vol. 12, no.5, pp.651-670, 1996.

3.       E. Malis, "Visual servoing invariant to changes in camera-intrinsic parameters," IEEE Transaction on Robotics and Automation, vol. 20, no.1, pp.72-81, 2004.

4.       Nicola Bellotto and Huosheng Hu, “Multisensor-Based Human Detection and Tracking for Mobile Service Robots”, IEEE Transactions on systems, man, and cybernetics—part b: cybernetics, vol. 39, no. 1, pp-167-181, 2009.

5.       G. Palmieri, M. Palpacelli, M. Battistelli, and M. Callegari, “A Comparison between Position-Based and Image-Based Dynamic Visual Servoings in the Control of a Translating Parallel Manipulator”, Hindawi Publishing Corporation, Journal of Robotics,Vol 12, pp.1-11., 2012.

6.       Haoxiang Lang, Ying Wang and Clarence W. de Silva, “Visual Servoing with LQR Control for Mobile Robots”, IEEE Transaction on Control and automation, pp.317-321, 2010

7.       B. Espiau, F.Chaumette, and P. Rives, “A new approach to visual servoing in robotics”, IEEE Transaction on Robotics and Automation, vol.8, pp.313-326, 1992.

8.       Francois Chaumette, and Steh Hutchinson,”Visual servo control part i: basic approaches”, IEEE Robotics and Automation Magazine, Vol 13, No.4, pp.82-90, December 2006.

9.       Francois Chaumette, and S Hutchinson, “Visual servo control part II advanced approaches”, IEEE Robotics and Automation Magazine, pp.109-118, Vol 14, No.1, March 2007.

10.    A D Luca, G Oriolo, and P R Giordano, “Image based visual servoing schemes for non-holonomic mobile manipulator”, IEEE robotic, vol. 25, no. 2, pp. 131-145, 2007.

11.    P Corke and S Hutchinson, ”A new partitioned approach to image-based visual servo control”, IEEE Transactions on Robotics and Automation, vol. 17, no. 4, pp. 507-515, August 2001.

65-67

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

15.

Authors:

Kanupriya, Meenakshi Sharma

Paper Title:

Level-Based Data Security Model in Cloud Computing

Abstract:   Cloud Computing has brought remarkable advancement in era of computing but still adoption of cloud now days become issue due to security. Security is big concern in cloud computing. Data owner feels that data is insecure hands and vulnerable to many threats. To tackle this problem model has been proposed which check data security at different levels i.e. at cloud service provider level, user level, third party level and network intruder level. Various cryptography techniques used for data encryption, message authentication code is generated for data integrity and role-based dual verification is performed for user authenticity. The proposed model is highly efficient and secure for keeping data at cloud with minimum overhead over data owner. This model also provides data confidentiality, availability, data integrity and cost effective for storing data at cloud without risk.

Keywords:
 Cloud Computing, MAC, Security,  Encryption.


References:

1.       Rajkumar Buyya, Christian Vecchiola and S. Thamarai Selvi, Mastering Cloud Computing Foundations and Applications   Programming. Morgan  Kaufmann, USA.
2.       Sandeep K. Sood, “A Combined Approach to Ensure Data Security in  Cloud Computing”, Submitted to Journal of Network and Computer       Applications, Elsevier Ltd, 2012.

3.       Danan Thilakanatha, Shiping Chen,Surya Nepal,  Rafael A. Calvo  and Leila Alem, “A platform for secure monitoring and sharing of       generic health data in the Cloud”, Elsevier Ltd, 2013.

4.       Huang Jing, LI Renfa, and Tang Zhuo, “The Research of  the Data  Security for  Cloud Disk Based on the Hadoop Framework” Fourth International  Conference on  Intelligent Control and Information      Processing (ICICIP),  IEEE June 9 – 11, 2013, Beijing, China.

5.       Sandeep K. Sood, “A Highly Secure Hybrid Security model for Data      Security at Cloud ”, Submitted to Security  and Communication Networks, John Wiley and Sons  (Interscience),Special Issue on Trust      and Security in  Cloud Computing, 2012.

6.       Keiko Hashizume, David G Rosado, Eduardo Fernández-Medina and      Eduardo B Fernandez, “An analysis of security issues for cloud computing” Journal  of Internet Services and Applications ,Springer      2013.

7.       Jingwei Li, Jin Li, Zheli Liu and Chunfu Jia “Enabling  efficient and  secure  data sharing in cloud computing” Concurrency Computat.:Pract  Exper.,John Wiley & Sons, Ltd.,2013.

8.       Pardeep Sharma, Sandeep K. Sood, SumeetKaur, “Cloud   Implementation  Issues and What to Compute on Cloud”,  International Journal of  Advances in Computer Networks  and its Security, vol.1,       no. 1, pp. 130-135, 2011.

9.       Marten van Dijk and Ari Juels,“On the Impossibility of Cryptography  Alone for Privacy-Preserving Cloud  Computing”.
10.    Amazon Web Services.: “Encrypting Data at Rest in AWS”,        https://aws.amazon.com/whitepapers.
11.    NarendraChandel, Sanjay Mishra, Neetesh Gupta and Amit Sinhal       “Creation of Secure Cloud Environment using RC6”, International  Conference on Intelligent Systems and Signal Processing (ISSP),  IEEE,  2013.
2.    Swetha Reddy Lenkala, Sachin Shetty and Kaiqi Xiong, “Security Risk   Assessment of Cloud Carrier”, International Symposium on Cluster,       Cloud, and Grid Computing, IEEE/ACM, 2013.
13.    Dimitrios Zissis and Dimitrios Lekkas “Addressing cloud computing   security issues”,  Elsevier, 2010.

14.    Chirag Modi , Dhiren Patel, Bhavesh Borisaniya, Avi Patel and    Muttukrishnan Rajara, A survey on security issues and solutions at different layers of Cloud computing”, Springer, 2012.

15.    Sheikh Mahbub Habib, Sascha Hauke, Sebastian Ries and Max   Muhlhauser, “Trust as a facilitator in cloud computing: a survey”, Journal of Cloud Computing: Advances, Systems and Applications,   Springer 2012.


68-71

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

16.

Authors:

Abhishek Majumdar, Meenakshi Sharma

Paper Title:

Enhanced Information Security using DNA Cryptographic Approach

Abstract:    In present days the transmission of data in a secured manner is a big issue. During the transmission different kinds of attack may happen and affect the data. Due to that reason lot of researchers are still working to provide better and secured cryptographic algorithms. The DNA Cryptography is a new and promising area to achieve higher information security, where the characteristics of human DNA molecules are followed as the DNA have complex structure and features. In this paper a couple of 128 bit publicly available DNA sequences are taken to form the secret keys. Moreover a better level of message encryption technique is proposed where two rounds encryption has been carried out among the plain text and the generated two secret keys and produce a cipher DNA sequence with appending some extra information within it.

Keywords:
 DNA sequence, Final Cipher, Key, Nucleotide


References:

1.        H.Z. Hsu and R.C.T.Lee, “DNA Based Encryption Methods”, The 23rd Workshop on Combinatorial Mathematics and Computation Theory, National Chi Nan University Puli, Nantou Hsies, Taiwan 545, April 2006.
2.        Amal Khalifa and Ahmed Atito. “High-Capacity DNA-based Steganography”, In the 8th International Conference and informatics and Systems (INFOS2012),IEEE,May.2012.

3.        Mohammad Reza Abbasy, Pourya Nikfard, Ali Ordi, Mohammad Reza Najaf Torkaman, "DNA Base Data Hiding Algorithm",  In: International Journal on New Computer Architectures and Their Applications.2012.

4.        Sabari Pramanik, Sanjit Kumar Setua, "DNA Cryptography", In: ICECE,2012,pp.551-554.IEEE.2012. doi:10.1109/ICECE.2012.6471609

5.        Suman Chakraborty, Sudipta Roy, Prof. Samir K. Bandyopadhyay, “Image Steganography Using DNA Sequence and Sudoku Solution Matrix”. In: International Journal of Advanced Research in Computer Science and Software Engineering,Feb 2012.

6.        Nirmalya Kar, Atanu Majumder, Ashim Saha, Anupam Jamatia, Kunal Chakma, Dr. Mukul Chandra Pal,"MobileHealth’13", July 29, 2013, Bangalore, India.ACM(2013).

7.        Bibhash Roy, Atanu Majumder," An Improved Concept of Cryptography Based on DNA Sequencing",In: International Journal of Electronics Communication and Computer Engineering. Vol-3, Issue-6 (Nov2012).

8.        Bibhash Roy, Gautam Rakshit, Pratim Singha, Atanu Majumder, Debabrata Datta, “An improved Symmetric Key Cryptography with DNA Based Strong Cipher”, ICDeCom-2011, BIT Mesra, Ranchi, Jarkhand, India, Feb 2011.

9.        Xing Wang, Qiang Zhang," DNA computing-based cryptography", In Proc. of the 2009 IEEE International Conference, ISBN: 978-1-4244-3867-9/09.

10.     Behrouz A.Forouzen, Debdeep Mukhopadhyay, “Cryptography and Network Security”,2nd edition,Tata McGraw Hill Education Pvt.Ltd.


72-76

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

17.

Authors:

Arpita Biswas, Meenakshi Sharma

Paper Title:

A New Approach of Intrusion Detection System with a Combination of Multilevel and Multiagent

Abstract: the internet systems are attacked by many intruders and the information in the network is not safe here. So we need to protect the network from intruder and the intrusion detection system is needed to detect the intrusion in the network. It monitors the information and detects the intrusion. In this paper used the Multiagent technique with multilevel system to improve the existing Intrusion Detection System. Proposed detection process is very easy and error free. By this process all the high level and low level attacks are detected because information are checked in different levels thoroughly and the time and work burden is also less because multiple agents work together for the same goal.

Keywords:
Multilevel, Multiagent, Security.


References:

1.          Ran Zhang’, Depei Qian, Chongming Bao, Weiguo Wu, “Multiagent Based Intrusion Detection Architecture”, pp 494-501, IEEE 2001.
2.          Siham benhadou, Driss raoui Hicham medromi, “New Methodology for Intrusion Detection based on Multi-Agents System”, Architecture Systems team ENSEM.

3.          Gargi Agrawal, Megha Kamble, “Proposed Multi-Layers Intrusion Detection System(MLIDS) Model”, Gargi Agarwal et al, / (IJCSIT) International Journal of Computer Science and Information Technologies 2012, Vol. 3(5),5040 - 5042

4.          Nita Patil,Chhaya Das, Shreya Patankar, Kshitija Pol, “Analysis of Distributed Intrusion Detection Systems using Mobile Agents”, Datta Meghe College of Engineering, Airoli , Navi Mumbai- 400708, First International Conference on Emerging Trends in Engineering and Technology,pp 1255-1260, IEEE 2008.

5.          Sarit Kraus, Tatjana Plotkin, “Algorithms of distributed task allocation for cooperative agents” ,Department of Mathematics and Computer Science, Bar-Ilan University, 52-900 Ramat- Gan, Israel,Theoretical Computer Science 242 ,Elsevier Science (2000) pp.1-27.

6.          Mueen Uddin, Kamran Khowaja, Azizah Abdul Rehman, “Dynamic Multi-Layer Signature Based Intrusion Detection System Using Mobile Agents”,Department of Information System, UTM, Malaysia ,International Journal of Network Security and Its Applications(IJNSA),Vol.2, No.4, October 2010, pp.129-141.

7.          Tatsuya Baba,Shigeyuki Matsuda , “A Proposal  of Protocol and  Policy-Based Intrusion  Detection System” SYSTEMICS,CYBERNETICS AND INFORMATICS, pp 57-62.

8.          Farah Jemili,Dr. Montaceur Zaghdoud,Pr. Mohamed Ben Ahmed "A Framework for an Adaptive Intrusion Detection System using Bayesian Network",2007 IEEE, pp 66-70.

9.          "Encryption Basics | EFF Surveillance Self-Defense Project." (06 Nov. 2013) Encryption Basics | EFF

10.       Robert Richardson, 2008 CSI “Computer Crime and Security Survey”,at 19.i.cmpnet.com

11.       Goldreich, Oded. “Foundations of Cryptography”    Volume 2, Basic Applications. Vol. 2. Cambridge university press, 2004.


77-79

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

18.

Authors:

Jaspinder Singh, Meenakshi Sharma

Paper Title:

Evaluation of An Energy Efficient Cluster Based Routing in MANET

Abstract:  Mobile Ad-hoc will be a vital part of next generation network due to its flexibility, infrastructure less nature, and ease to maintenance, auto configuration, self-administration capabilities, and cost effectiveness. In MANET Cluster base routing protocol play a significant role in formation of cluster at low energy cost. Energy efficient cluster formation in MANET is one of the major issue because energy of one node in cluster may affect all other nodes and also effect on the life time of the cluster Head. This paper propose an algorithm technique – which is “Signal and Energy Efficient Clustering (SEEC)” base on the Signal level and energy of the nodes to increase the life time of Cluster head. Its emphasis on the cluster maintenance and formation at low cost the resources used that are signal strength, battery power of the node. The Performance metrics are packet delivery ratio, Network Life time, Throughput. The simulation will be done using NS2 network Simulator

Keywords: Cluster, Cluster Head (CH), Energy level, Signal Strength, Routing, CBRP, MANET.


References:

1.       N. Chatterjee, A.Potluri and A.Negi, “A Self Organising Approach to MANET Clustering”, High Performance Computing, Oct. 13, 2006.
2.       Alak Roy, Manasi Hazarika and Mrinal Kanti Debbarma “Energy Efficient Cluster Based Routing    in MANET” International Conference on Communication, Information & Computing Technology (ICCICT), Oct. 2012

3.       Utkarsh, Mukesh Mishra and Suchismita Chinara “ESAR: An Energy Saving Ad Hoc Routing Algorithm for MANET” IEEE- Fourth International Conference on Advanced Computing, ICoAC 2012

4.       J. Liu, Y. Lu, J. Xiao and F. Fu, “Secure Routing for Mobile Ad hoc Networks”, 8th ACIS International Conference, pp 314-318, 2007.

5.       Yan Shuailing, Jiang Huawei, Wang Gaoping “An Improved Clustering Algorithm Based on MANET Network” IEEE International Symposium on IT in Medicine and Education, 2008.

6.       C.R .Lin and M .Gerla. “Adaptive clustering for mobile wireless networks”.IEEE J .Select. Areas Common, vol.15, no.7, pp.1265-1275, Sep.1997.

7.       Li Wang and Fei Gao “A Secure Clustering Scheme Protocol for MANET” International Conference on Multimedia Information Networking and Security, 2010.

8.       H. Deng, W. Li and D.P. Agrawal, “Routing Security in Wireless Ad hoc Networks”, University of Cincinnati, IEEE communication Magazine, 2002, pp.70-75.

9.       M. S. Corson and A. Ephremides, “A Distributed Routing Algorithm for Mobile Wireless Networks”,ACM Journal, Wireless Networks,1(1),1995

10.    Network Simulator Manual, http:www.isi.edu/nsam/ns/index.html.


80-84

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

19.

Authors:

Ravinder Kaur, Meenakshi Sharma, Hardeep Singh

Paper Title:

Code Quality Evaluation for Open Source Software System

Abstract:   Conventionally, the explore on quality attributes  was  set  aside  confidential  inside  the association  that  perform  it  by  means  of  constricted black-box techniques.  The appearance of open source software has transformed this image by permitting us to estimate both software products and procedures that yield them. This paper represent the results of a pilot case study intend to understand open source code evaluation and quality analysis by using statistical description  of  different  source  code  metrics.  Towards this finish we have measured quality characteristic of different versions of an application written in java.

Keywords:
metrics, open source software, software measurement,   statistical   code   evaluation   and   code quality


References:

1.          Ioannis Stamelos , Lefteris Angelis, Apostolos Oikonomou & Georgios L. Bleris “Code quality analysis in open source software development”, Info Systems J (2002) 12, 43–60, published in Wiley Online Library
2.          S. R. Chidamber and C. F. Kemerer, “A metrics suite for object oriented design,” IEEE      Trans. Software Eng., vol. 20, no. 6, pp. 476–493, 1994.

3.          T.J. McCabe. “A complexity measure’’. IEEE Transactions on Software Engineering, SE-2(4), December 1976.

4.          Lehman, M.M. 1980 “On understanding laws, evolution, and conservation in the large-program life cycle”.     Journal of Systems and Software, Elesvire, 213-221.

5.          http://sourceforge.net/projects/jstock/

6.          Belady,  L.  A.  and  Lehman,  M.M.  1976.  “A model of large program development’. IBM Syst. J. 15, 225–252.
7.          M. Lorenz, J. Kidd, “Object Oriented Software Metrics”,  Prentice  Hall,  NJ,  IEEE  Transactions (1994).Y. Yorozu, M. Hirano, K. Oka, and Y.
8.          Morisio, M. & Tsoukiàs, A. (1997) IusWare, “A methodology for the evaluation and selection of software products.” IEEE Proceedings on Software Engineering, 144, 162–174.

9.          O’Reilly, T. (1999) “Lessons from open source software development”. Communications of the ACM, 42 (4), 33–37.

10.       Pighin, M. & Zamolo, R. (1997) “A predictive metric based on discriminant statistical analysis” Proceedings ACM ICSE ¢97, 262–269.]


85-88

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

20.

Authors:

Alfiya Iqbal Ahmed Shaikh, Sanchika Bajpai

Paper Title:

Frequent Pattern Mining for XML Query-Answering Support

Abstract:    Extracting information from semi structured documents is difficult task. It is more crucial as there is a huge amount of digital information on the Internet is growing rapidly. Sometimes, documents are often so large that the data set returned as answer to a query may be large to even convey interpretable knowledge. This paper describes an approach which takes RSS feeds as input for which Tree-Based Association Rules (TARs): mined rules are used. It provides more approximate and intentional information on both the structure and the contents of Extensible Markup Language (XML) documents which can then be stored in XML format as well. This generated mined knowledge is later used to provide:  1) The gist of the structure and the content of the XML document and 2) Quick and more approximate answers to queries. This paper focuses on the second feature. In this paper we show a novel approach for finding frequent patterns in XML documents.

Keywords:
 XML, document, RSS, TARs, approximate.


References:

1.       Braga, A. Campi, S. Ceri, M. Klemettinen, and P. Lanzi, “Discovering Interesting Information in XML Data  with  Association Rules,”  Proc.  ACM  Symp. Applied Computing, pp. 450-454, 2003.
2.       World Wide Web Consortium, XQuery 1.0:An XML Query  Language  , http://www.w3C.org/TR/xquery, 2007.

3.       World  Wide  Web  Consortium,  Extensible  Markup Language (XML) 1.0,http://www.w3C.org/TR/REC

4.       J.W.W. Wan and G. Dobbie, “Extracting Association Rules from XML Documents Using XQuery,” Proc. Fifth  ACM  Int’l  Workshop  Web  Information and Data Management, pp. 94-97, 2003.

5.       D. Barbosa, L. Mignet, and P. Veltri, “Studying the XML Web: Gathering Statistics from an XML Sample,” World Wide Web, vol. 8, no. 4, pp. 413- 438, 2005.

6.       R.  Agrawal  and  R.  Srikant,  “Fast  Algorithms  for Mining Association Rules in Large Databases,” Proc. 20th Int’l Conf. Very Large Data Bases, pp. 478-499,1994.

7.       C.  Combi,  B.  Oliboni, and  R.  Rossato,  “Querying XML Documents by Using Association Rules,” Proc. 16th   Int’l   Conf.   Database   and   Expert   Systems Applications, pp. 1020-1024, 2005.

8.       J. Paik, H.Y. Youn, and U.M. Kim, “A New Method for Mining Association Rules from a Collection of XML Documents,” Proc. Int’l Conf. Computational Science and Its Applications, pp. 936-945, 2005

9.       Yogesh R.Rochlani , Prof. A.R. Itkikar, “Integrating Heterogeneous Data Sources Using XML Mediator”, ijcsn, vol 1, issue 3, 2012.

10.    Arundhati Birari1, Prof. Ranjit Gawande2, “Mining Tree-Based Association Rules for XML Query Answering”, ijettcs vol 2,issue 3 , 2013

11.    V. Kasthuri Muthu, A. Sameera T. “Mining Algorithm for XML Query Answering Support”, ijcset, vol4, 2013


89-92

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

21.

Authors:

Seyed Yaser Mousavi Siamakani, Abdul Kadir Bin Marsono, Neelam Memon, Shariwati Binti Mansor, Hares Nikookar

Paper Title:

Performance of Concrete Walls with Waste and Recycling Materials for Industrial Building Systems

Abstract:  Concrete walls with lighter weight significantly reduce the dead loads. In this regard, the central question was to find, production of reduce dead load concrete; for this an experimental test were done on four sample scales of walls. The samples were based on size scale (640x220x30mm) which is 1/5 of the real wall size used in Industrial Building Systems (IBS). The samples were: (a) Normal IBS wall (control sample), (b) Bottom ash IBS wall (used 50% of the amount of sand), (c) Crushed brick IBS wall (used 100% of the amount of sand), and (d) No-fines aggregate concrete IBS wall (without sand). For comparison, the samples were tested on 28th day. The density of type (a), type (b), type (c) and type (d) were 2355, 1974, 2038.2  and 1800 kg/mᵌ, respectively. In respect of the compressive strength, type (a) (control sample) was the strongest type with 31N/mm² and type (d) was the weakest type with 8MPa. The other two, type (b) and type (c) with 25 and 28MPa, have been determined as their compressive strength, respectively. For the elastic modulus test; 22GPa, 17GPa, 22GPa, 6GPa were recorded for type (a), type (b), type (c) and type (d), respectively. For the flexural test on the walls, it has been clearly seen that type (a), (b) and (c) had almost the adequate value of 17.7MPa, 13.3MPa and 15.8MPa, sequentially while type (d) achieved the lowest value among the four walls with 8.1MPa. Since type (a) is considered as a control sample; thereby, type (b) and type (c) unlike type (d) are appropriate to be used in IBS wall constructions due to their passable engineering properties (density, compressive strength, E-value and bend rapture).

Keywords:
 IBS Wall, Waste Materials, Recycling Materials, Light weight aggregates, Bottom Ash, Cruched Brick.


References:

1.          Boncukcuoğlu, R., Kocakeri̇m, M. M., Tosunoğlu, V., & Yilmaz, M. T. (2002). Utilization of trommel sieve waste as an additive in Portland cement production.Cement and Concrete Research, 32(1), 35-39.
2.          Topçu, I. B. (1997). Semi lightweight concretes produced by volcanic slags.Cement and Concrete Research, 27(1), 15-21.

3.          Mehta, P. K. (2001). Reducing the environmental impact of concrete. Concrete international, 23(10), 61-66.

4.          Batayneh, M., Marie, I., & Asi, I. (2007). Use of selected waste materials in concrete mixes. Waste Management, 27(12), 1870-1876.

5.          Jurič, B., Hanžič, L., Ilić, R., & Samec, N. (2006). Utilization of municipal solid waste bottom ash and recycled aggregate in concrete. Waste Management,26(12), 1436-1442.

6.          Khalaf, F. M., & DeVenny, A. S. (2004). Recycling of demolished masonry rubble as coarse aggregate in concrete: review. Journal of materials in civil engineering, 16(4), 331-340.

7.          Abedi, M., Fathi, M. S., & Mirasa, A. K. (2011). Establishment and development of IBS in Malaysia.

8.          Kamar, K. A. M., Hamid, Z. A., Azman, A., Nor, M., & Ahamad, M. S. S. (2011). Industrialized Building System (IBS): Revisiting Issues of Definition and Classification. International Journal of Emerging Sciences, 1(2).

9.          Styron, R. W. (1988). U.S. Patent No. 4,741,782. Washington, DC: U.S. Patent and Trademark Office.

10.       Chimenos, J. M., Segarra, M., Fernandez, M. A., & Espiell, F. (1999). Characterization of the bottom ash in municipal solid waste incinerator. Journal of hazardous materials, 64(3), 211-222.

11.       Tabsh, S. W., & Abdelfatah, A. S. (2009). Influence of recycled concrete aggregates on strength properties of concrete. Construction and Building Materials, 23(2), 1163-1167.

12.       Bolouri Bazaz, J., & Khayati, M. (2011). Properties and Performance of Concrete Made with Recycled Low-Quality Crushed Brick. Journal of Materials in Civil Engineering, 24(4), 330-338.

13.       Debieb, F., & Kenai, S. (2008). The use of coarse and fine crushed bricks as aggregate in concrete. Construction and Building Materials, 22(5), 886-893.

14.       D.C. Teychenne, R.E. Franklin, J.C. Nicholls, D.W. Hobbs. Design of Normal Concrete Mixes. Department of the Environment, UK (1988).

15.       BS 1881: Method for determination of properties of concrete cubes BSI, London (1983).

16.       ASTM C78-02. (2002) Standard Test Method for Flexural Strength of Concrete (Using Simple Beam With Third-Point Loading). American Society for Testing and Materials, West Conshohocken.
17.       Aggarwal, P., Aggarwal, Y., & Gupta, S. M. (2007). Effect of bottom ash as replacement of fine aggregates in concrete. Asian journal of civil engineering (building and housing), 8(1), 49-62.

18.       Khatib, J. M. (2005). Properties of concrete incorporating fine recycled aggregate. Cement and Concrete Research, 35(4), 763-769.


93-97

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html